Issued Patents All Time
Showing 51–75 of 79 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8914844 | Method to automatically map business function level policies to IT management policies | Alain Azagury, Murthy V. Devarakonda, Nikolai A. Joukov, Manoj Kumar, Konstantinos Magoutis +1 more | 2014-12-16 |
| 8856775 | Unstacking software components for migration to virtualized environments | Nikolai A. Joukov, Matthew A. Markley, Michael Tacci | 2014-10-07 |
| 8850423 | Assisting server migration | Eric J. Barkie, James R. Barros, Kamal Bhattacharya, Karen Cheng, Robert Filepp +10 more | 2014-09-30 |
| 8826425 | System and method for automatically discovering security classification of hosts | HariGovind V. Ramasamy, Cheng-Lin Tsao | 2014-09-02 |
| 8819672 | Multi-image migration system and method | Nikolai A. Joukov | 2014-08-26 |
| 8813209 | Automating network reconfiguration during migrations | Kamal Bhattacharya, Nikolai A. Joukov, HariGovind V. Ramasamy | 2014-08-19 |
| 8677339 | Component relinking in migrations | Nikolai A. Joukov, Matthew A. Markley, HariGovind V. Ramasamy | 2014-03-18 |
| 8595792 | Method to automatically map business function level policies to IT management policies | Alain Azagury, Murthy V. Devarakonda, Nikolai A. Joukov, Manoj Kumar, Norbert G. Vogl +1 more | 2013-11-26 |
| 8583709 | Detailed inventory discovery on dormant systems | Nikolai A. Joukov, Shaya Potter, HariGovind V. Ramasamy | 2013-11-12 |
| 8561035 | Method and system to discover possible program variable values by connecting program value extraction with external data sources | Sergej Chicherin, Nikolai A. Joukov, Marco Pistoia, Vasily Tarasov, Takaaki Tateishi +1 more | 2013-10-15 |
| 8533659 | Efficient extraction of software dependencies from program code | Nikolai A. Joukov, Marco Pistoia, Vasily Tarasov, Takaaki Tateishi, Norbert G. Vogl | 2013-09-10 |
| 8255972 | Method to automatically map business function level policies to it management policies | Alain Azagury, Murthy V. Devarakonda, Nikolai A. Joukov, Manoj Kumar, Konstantinos Magoutis +1 more | 2012-08-28 |
| 8205266 | Digital rights management | Michael Waidner | 2012-06-19 |
| 8122138 | Method and system for user-determined attribute storage in a federated environment | George Robert Blakley, III, Heather M. Hinton | 2012-02-21 |
| 8060632 | Method and system for user-determined attribute storage in a federated environment | George Robert Blakley, III, Heather M. Hinton | 2011-11-15 |
| 7992195 | Efficient browser-based identity management providing personal control and anonymity | Michael Waidner | 2011-08-02 |
| 7987253 | Determining an applicable policy for an incoming message | — | 2011-07-26 |
| 7941859 | Reducing access to sensitive information | Jan L. Camenisch, Matthias Schunter, Michael Waidner | 2011-05-10 |
| 7853549 | Method for rule compliance situation checking and related checking system | Ying Huang, Haiqi Liang, Ying Liu, Jian Wang, Xin Zhou +1 more | 2010-12-14 |
| 7836298 | Secure identity management | Thomas R. Gross | 2010-11-16 |
| 7797434 | Method and system for user-determind attribute storage in a federated environment | George Robert Blakley, III, Heather M. Hinton | 2010-09-14 |
| 7725562 | Method and system for user enrollment of user attribute storage in a federated environment | George Robert Blakley, III, Heather M. Hinton, Anthony Joseph Nadalin | 2010-05-25 |
| 7685300 | Method for access by server-side components using unsupported communication protocols through passthrough mechanism | Warwick Leslie Burrows, Guenter Karioth, Matthias Schunter, Anthony Moran, Brian James Turner | 2010-03-23 |
| 7617393 | Implementation and use of PII data access control facility employing personally identifying information labels and purpose serving function sets | Linda N. Betz, John C. Dayka, Walter B. Farrell, Richard Henry Guski, Guenter Karjoth +3 more | 2009-11-10 |
| 7571237 | Determining an applicable policy for an incoming message | — | 2009-08-04 |