DK

David G. Kuehr-McLaren

IBM: 29 patents #3,528 of 70,183Top 6%
📍 Apex, NC: #65 of 1,394 inventorsTop 5%
🗺 North Carolina: #1,367 of 45,564 inventorsTop 4%
Overall (All Time): #129,296 of 4,157,543Top 4%
29
Patents All Time

Issued Patents All Time

Showing 1–25 of 29 patents

Patent #TitleCo-InventorsDate
11962624 Metadata driven selection of entitlements in an identity governance system Gabriel C. Rebane 2024-04-16
11240168 System and method to exchange identity governance data across multiple identity repositories David L. Edwards, James Darwin 2022-02-01
10432637 Using social networking thresholds in access control decisions Ranjan Kumar, Kwabena Mireku, Govindaraj Sampathkumar 2019-10-01
9124602 Method and apparatus for creating custom access control hierarchies Kwabena Mireku, Govindaraj Sampathkumar, Janette Siu Jong Wong 2015-09-01
8918425 Role engineering scoping and management Luis B. Casco-Arias Sanchez, Todd D. Jordan, Oriana Jeannette Love, David Walsh Palmieri, Chrystian L. Plachco +2 more 2014-12-23
8918426 Role engineering scoping and management Luis B. Casco-Arias Sanchez, Todd D. Jordan, Oriana Jeannette Love, David Walsh Palmieri, Chrystian L. Plachco +2 more 2014-12-23
8838646 Using social networking thresholds in access control decisions Ranjan Kumar, Kwabena Mireku, Govindaraj Sampathkumar 2014-09-16
8752162 Secure sharing of transport layer security session keys with trusted enforcement points Linwood H. Overby, Jr. 2014-06-10
8577806 Method, system, and computer program product for digital verification of collected privacy policies in electronic transactions Martin Presler-Marshall, Calvin S. Powers, Timothy Shoriak, John H. Walczyk, III 2013-11-05
8533168 Automatic policy generation based on role entitlements and identity attributes Pratik Gupta, Govindaraj Sampathkumar, Vincent C. Williams, Sharon L. Cutcher, Sumit Taank +2 more 2013-09-10
8260673 Method, system and computer program product for selective data disclosure and contract negotiation in an E-marketplace based on predetermined preferences Gordon K. Arnold 2012-09-04
7992200 Secure sharing of transport layer security session keys with trusted enforcement points Linwood H. Overby, Jr. 2011-08-02
7870101 Method and apparatus for presentation of a security-focused repository with a party-focused repository Mark Hubbard, Govindaraj Sampathkumar, Janette Siu Jong Wong 2011-01-11
7698736 Secure delegation using public key authentication John Ryan McGarvey 2010-04-13
7694329 Secure delegation using public key authentication John Ryan McGarvey 2010-04-06
7530097 Methods, systems, and computer program products that centrally manage password policies Luis Casco-Arias, Pratik Gupta, Andrew D. Record 2009-05-05
7493351 Rapid integration mechanism for directory based applications Mandar Jog, John Ryan McGarvey 2009-02-17
7428749 Secure delegation using public key authorization John Ryan McGarvey 2008-09-23
7284000 Automatic policy generation based on role entitlements and identity attributes Pratik Gupta, Govindaraj Sampathkumar, Vincent C. Williams, Sharon L. Cutcher, Sumit Taank +2 more 2007-10-16
7206758 Method, system and computer program product for identifying and implementing collected privacy policies as aggregate privacy policies in electronic transactions Martin Presler-Marshall, Calvin S. Powers, Timothy Shoriak, John H. Walczyk, III 2007-04-17
7065509 Method, system and computer program product for protection of identity information in electronic transactions using attribute certificates Gordon K. Arnold 2006-06-20
6978298 Method and apparatus for managing session information in a data processing system 2005-12-20
6920556 Methods, systems and computer program products for multi-packet message authentication for secured SSL-based communication sessions Timothy Shoriak 2005-07-19
6874084 Method and apparatus for establishing a secure communication connection between a java application and secure server Edward Joseph Dobner, Anthony Joseph Nadalin, Xiaoyan Zhang 2005-03-29
6785811 Methods, systems and computer program products for providing multiple cryptographic functions to applications using a common library John Charles Bihlmeyer, Mark Charles Davis, John Michael Garrison, Reid L. Sayre 2004-08-31