KL

Keng Lim

Apple: 88 patents #229 of 18,612Top 2%
CP Certis Cisco Security Pte: 9 patents #1 of 9Top 15%
📍 Atherton, CA: #10 of 431 inventorsTop 3%
🗺 California: #2,324 of 386,348 inventorsTop 1%
Overall (All Time): #15,072 of 4,157,543Top 1%
98
Patents All Time

Issued Patents All Time

Showing 51–75 of 98 patents

Patent #TitleCo-InventorsDate
9531595 Intelligent policy deployment 2016-12-27
9497219 Enforcing control policies in an information management system with two or more interactive enforcement points 2016-11-15
9413771 Protecting documents using policies and encryption Poon Fung, Andrew Han 2016-08-09
9407662 Analyzing activity data of an information management system 2016-08-02
9396351 Preventing conflicts of interests between two or more groups 2016-07-19
9398051 Enforcing policy-based application and access control in an information management system 2016-07-19
9384358 Enforcing universal access control in an information management system 2016-07-05
9384360 Techniques and system for specifying policies using abstractions 2016-07-05
9384363 Deploying policies and allowing off-line policy evaluations 2016-07-05
9313182 Protecting information using policies and encryption 2016-04-12
9311503 Detecting behavioral patterns and anomalies using activity data 2016-04-12
9298895 Preventing conflicts of interests between two or more groups using applications 2016-03-29
9253216 Techniques of transforming policies to enforce control in an information management system 2016-02-02
9203868 Inspecting code and reducing code size associated to a target 2015-12-01
9152774 Analyzing usage information of an information management system 2015-10-06
9081981 Techniques and system to manage access of information using policies 2015-07-14
9064131 Protecting documents using policies and encryption Poon Fung, Andrew Han 2015-06-23
8990886 Techniques of transforming policies to enforce control in an information management system 2015-03-24
8972449 Preventing conflicts of interests between two or more groups 2015-03-03
8959580 Enforcing policy-based application and access control in an information management system 2015-02-17
8904478 Inspecting code and reducing code size associated to a target 2014-12-02
8875218 Deploying policies and allowing off-line policy evaluations 2014-10-28
8862551 Detecting behavioral patterns and anomalies using activity data 2014-10-14
8849858 Analyzing activity data of an information management system 2014-09-30
8843734 Protecting information using policies and encryption 2014-09-23