| 12126628 |
Adaptive authorization with local route identifier |
Abhijeet Kumar Sinha, Stuart L. S. Kwan, Zhifeng Wang, Adam Edwards, William Bruce Barr, III +3 more |
2024-10-22 |
| 11902327 |
Evaluating a result of enforcement of access control policies instead of enforcing the access control policies |
Daniel Edward Lee Wood, Sarat Chandra Subramaniam, Etan Micah Basseri, Carlos Adrian Lopez Castro, Sandra Jiang +4 more |
2024-02-13 |
| 11627138 |
Client readiness system |
Violet Anna Barhudarian, Jiangfeng Lu, Oren Jordan Melzer, Anirban Basu, Yordan Rouskov +2 more |
2023-04-11 |
| 11405425 |
Rich token rejection system |
Violet Anna Barhudarian, Jiangfeng Lu, Oren Jordan Melzer, Anirban Basu, Yordan Rouskov +4 more |
2022-08-02 |
| 11349844 |
Instant enforcement of centrally configured IT policies |
Violet Anna Barhudarian, Jiangfeng Lu, Oren Jordan Melzer, Anirban Basu, Chandra Sekhar Surapaneni +2 more |
2022-05-31 |
| 11296881 |
Using IP heuristics to protect access tokens from theft and replay |
Violet Anna Barhudarian, Jiangfeng Lu, Oren Jordan Melzer, Anirban Basu, Praveen Murugesan |
2022-04-05 |
| 11171948 |
Adaptive session lifetime |
Violet Anna Barhudarian, George Adrian Drumea, Pui-Yin Winfred Wong, Radhika Kashyap, Titus C. Miron |
2021-11-09 |
| 10873583 |
Extensible framework for authentication |
Alexander T. Weinert, Pui-Yin Winfred Wong, Carlos Adrian Lopez Castro, Yordan Rouskov, Laurentiu Bogdan Cristofor +1 more |
2020-12-22 |
| 9143501 |
Reauthentication to a web service without disruption |
Seng Lin Shee, Jan Lyk Choo, Marcelo Albuquerque Fernandes Mas, Krishnanand K. Shenoy, Samuel Devasahayam |
2015-09-22 |
| 8763093 |
Access control management |
David E. Langworthy, Qian Wang, Andrew Layman, John P. Shewchuk, Shiung-Vei Yong +2 more |
2014-06-24 |