Issued Patents All Time
Showing 1–25 of 29 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11962624 | Metadata driven selection of entitlements in an identity governance system | Gabriel C. Rebane | 2024-04-16 |
| 11240168 | System and method to exchange identity governance data across multiple identity repositories | David L. Edwards, James Darwin | 2022-02-01 |
| 10432637 | Using social networking thresholds in access control decisions | Ranjan Kumar, Kwabena Mireku, Govindaraj Sampathkumar | 2019-10-01 |
| 9124602 | Method and apparatus for creating custom access control hierarchies | Kwabena Mireku, Govindaraj Sampathkumar, Janette Siu Jong Wong | 2015-09-01 |
| 8918425 | Role engineering scoping and management | Luis B. Casco-Arias Sanchez, Todd D. Jordan, Oriana Jeannette Love, David Walsh Palmieri, Chrystian L. Plachco +2 more | 2014-12-23 |
| 8918426 | Role engineering scoping and management | Luis B. Casco-Arias Sanchez, Todd D. Jordan, Oriana Jeannette Love, David Walsh Palmieri, Chrystian L. Plachco +2 more | 2014-12-23 |
| 8838646 | Using social networking thresholds in access control decisions | Ranjan Kumar, Kwabena Mireku, Govindaraj Sampathkumar | 2014-09-16 |
| 8752162 | Secure sharing of transport layer security session keys with trusted enforcement points | Linwood H. Overby, Jr. | 2014-06-10 |
| 8577806 | Method, system, and computer program product for digital verification of collected privacy policies in electronic transactions | Martin Presler-Marshall, Calvin S. Powers, Timothy Shoriak, John H. Walczyk, III | 2013-11-05 |
| 8533168 | Automatic policy generation based on role entitlements and identity attributes | Pratik Gupta, Govindaraj Sampathkumar, Vincent C. Williams, Sharon L. Cutcher, Sumit Taank +2 more | 2013-09-10 |
| 8260673 | Method, system and computer program product for selective data disclosure and contract negotiation in an E-marketplace based on predetermined preferences | Gordon K. Arnold | 2012-09-04 |
| 7992200 | Secure sharing of transport layer security session keys with trusted enforcement points | Linwood H. Overby, Jr. | 2011-08-02 |
| 7870101 | Method and apparatus for presentation of a security-focused repository with a party-focused repository | Mark Hubbard, Govindaraj Sampathkumar, Janette Siu Jong Wong | 2011-01-11 |
| 7698736 | Secure delegation using public key authentication | John Ryan McGarvey | 2010-04-13 |
| 7694329 | Secure delegation using public key authentication | John Ryan McGarvey | 2010-04-06 |
| 7530097 | Methods, systems, and computer program products that centrally manage password policies | Luis Casco-Arias, Pratik Gupta, Andrew D. Record | 2009-05-05 |
| 7493351 | Rapid integration mechanism for directory based applications | Mandar Jog, John Ryan McGarvey | 2009-02-17 |
| 7428749 | Secure delegation using public key authorization | John Ryan McGarvey | 2008-09-23 |
| 7284000 | Automatic policy generation based on role entitlements and identity attributes | Pratik Gupta, Govindaraj Sampathkumar, Vincent C. Williams, Sharon L. Cutcher, Sumit Taank +2 more | 2007-10-16 |
| 7206758 | Method, system and computer program product for identifying and implementing collected privacy policies as aggregate privacy policies in electronic transactions | Martin Presler-Marshall, Calvin S. Powers, Timothy Shoriak, John H. Walczyk, III | 2007-04-17 |
| 7065509 | Method, system and computer program product for protection of identity information in electronic transactions using attribute certificates | Gordon K. Arnold | 2006-06-20 |
| 6978298 | Method and apparatus for managing session information in a data processing system | — | 2005-12-20 |
| 6920556 | Methods, systems and computer program products for multi-packet message authentication for secured SSL-based communication sessions | Timothy Shoriak | 2005-07-19 |
| 6874084 | Method and apparatus for establishing a secure communication connection between a java application and secure server | Edward Joseph Dobner, Anthony Joseph Nadalin, Xiaoyan Zhang | 2005-03-29 |
| 6785811 | Methods, systems and computer program products for providing multiple cryptographic functions to applications using a common library | John Charles Bihlmeyer, Mark Charles Davis, John Michael Garrison, Reid L. Sayre | 2004-08-31 |