Patent | Date |
---|
Applying an authorization policy across multiple application programs with requests submitted through an HTTP-based API Grant 11,347,880 - Lim , et al. May 31, 2 | 2022-05-31 |
Protecting Documents with Security Overlays App 20210312584 - Lim; Keng ;   et al. | 2021-10-07 |
Protecting documents with centralized and discretionary policies Grant 11,132,459 - Lim , et al. September 28, 2 | 2021-09-28 |
Sharing Encrypted Documents Within and Outside an Organization App 20210258147 - Lim; Keng ;   et al. | 2021-08-19 |
Protecting documents using policies and encryption Grant 11,057,355 - Lim , et al. July 6, 2 | 2021-07-06 |
Manipulating display content of a graphical user interface Grant 11,042,955 - Lim , et al. June 22, 2 | 2021-06-22 |
Protecting Information Using Policies and Encryption App 20210119989 - Lim; Keng | 2021-04-22 |
Dynamically granting and enforcing rights on a protected document Grant 10,936,739 - Lim , et al. March 2, 2 | 2021-03-02 |
Sharing encrypted documents within and outside an organization Grant 10,911,223 - Lim , et al. February 2, 2 | 2021-02-02 |
Protecting information using policies and encryption Grant 10,873,574 - Lim December 22, 2 | 2020-12-22 |
Protecting Documents Using Policies and Encryption App 20200177558 - Lim; Keng ;   et al. | 2020-06-04 |
Sharing Encrypted Documents Within and Outside an Organization App 20200136812 - Lim; Keng ;   et al. | 2020-04-30 |
Applying an authorization policy across multiple application programs with requests submitted through an HTTP-based API Grant 10,592,683 - Lim , et al. | 2020-03-17 |
Protecting documents using policies and encryption Grant 10,554,635 - Lim , et al. Fe | 2020-02-04 |
Enforcing control policies in an information management system with two or more interactive enforcement points Grant 10,536,485 - Lim Ja | 2020-01-14 |
Sharing encrypted documents within and outside an organization Grant 10,523,423 - Lim , et al. Dec | 2019-12-31 |
Protecting documents with centralized and discretionary policies Grant 10,387,669 - Lim , et al. A | 2019-08-20 |
Preventing conflicts of interests between two or more groups using applications Grant 10,380,363 - Lim A | 2019-08-13 |
Viewing protected documents in a web browser Grant 10,303,892 - Lim , et al. | 2019-05-28 |
Analyzing policies of in information management system Grant 10,289,858 - Lim | 2019-05-14 |
Preventing conflicts of interests between two or more groups Grant 10,223,366 - Lim | 2019-03-05 |
Protecting Information Using Policies and Encryption App 20190058705 - Lim; Keng | 2019-02-21 |
Managing access of information using policies Grant 10,181,047 - Lim Ja | 2019-01-15 |
Techniques and system to monitor and log access of information based on system and user context using policies Grant 10,114,965 - Lim October 30, 2 | 2018-10-30 |
Protecting information using policies and encryption Grant 10,110,597 - Lim October 23, 2 | 2018-10-23 |
Enforcing universal access control in an information management system Grant 10,104,125 - Lim October 16, 2 | 2018-10-16 |
Protecting Documents Using Policies and Encryption App 20180248855 - Lim; Keng ;   et al. | 2018-08-30 |
Enforcing application and access control policies in an information management system with two or more interactive enforcement points Grant 9,973,533 - Lim May 15, 2 | 2018-05-15 |
Protecting documents using policies and encryption Grant 9,961,049 - Lim , et al. May 1, 2 | 2018-05-01 |
Detecting behavioral patterns and anomalies using activity data Grant 9,946,717 - Lim April 17, 2 | 2018-04-17 |
Information management system with two or more interactive enforcement points Grant 9,942,271 - Lim April 10, 2 | 2018-04-10 |
Sharing Encrypted Documents Within and Outside an Organization App 20180048464 - Lim; Keng ;   et al. | 2018-02-15 |
Multilayer policy language structure Grant 9,864,752 - Lim January 9, 2 | 2018-01-09 |
Enforcing policy-based application and access control in an information management system Grant 9,866,594 - Lim January 9, 2 | 2018-01-09 |
Manipulating Display Content of a Graphical User Interface App 20170352172 - Lim; Keng ;   et al. | 2017-12-07 |
Detecting behavioral patterns and anomalies using activity profiles Grant 9,767,302 - Lim September 19, 2 | 2017-09-19 |
Deploying policies and allowing offline policy evaluation Grant 9,740,703 - Lim August 22, 2 | 2017-08-22 |
Transforming policies to enforce control in an information management system Grant 9,703,978 - Lim July 11, 2 | 2017-07-11 |
Inspecting code and reducing code size associated to a target Grant 9,684,795 - Lim June 20, 2 | 2017-06-20 |
Detecting Behavioral Patterns and Anomalies Using Activity Data App 20170142125 - Lim; Keng | 2017-05-18 |
Protecting Information Using Policies and Encryption App 20170142092 - Lim; Keng | 2017-05-18 |
Enforcing Control Policies in an Information Management System with Two or More Interactive Enforcement Points App 20170063935 - Lim; Keng | 2017-03-02 |
Detecting behavioral patterns and anomalies using activity data Grant 9,558,193 - Lim January 31, 2 | 2017-01-31 |
Protecting information using policies and encryption Grant 9,558,360 - Lim January 31, 2 | 2017-01-31 |
Intelligent policy deployment Grant 9,531,595 - Lim December 27, 2 | 2016-12-27 |
Protecting Documents Using Policies and Encryption App 20160352694 - Lim; Keng ;   et al. | 2016-12-01 |
Analyzing Activity Data of an Information Management System App 20160342805 - Lim; Keng | 2016-11-24 |
Enforcing control policies in an information management system with two or more interactive enforcement points Grant 9,497,219 - Lim November 15, 2 | 2016-11-15 |
Enforcing Policy-based Application and Access Control in an Information Management System App 20160330247 - Lim; Keng | 2016-11-10 |
Preventing Conflicts of Interests Between Two or More Groups App 20160328574 - Lim; Keng | 2016-11-10 |
Deploying Policies and Allowing Offline Policy Evaluation App 20160315971 - Lim; Keng | 2016-10-27 |
Enforcing Universal Access Control in an Information Management System App 20160315972 - Lim; Keng | 2016-10-27 |
Techniques and System for Specifying Policies Using Abstractions App 20160308914 - Lim; Keng | 2016-10-20 |
Protecting documents using policies and encryption Grant 9,413,771 - Lim , et al. August 9, 2 | 2016-08-09 |
Protecting Information Using Policies and Encryption App 20160224796 - Lim; Keng | 2016-08-04 |
Detecting Behavioral Patterns and Anomalies Using Activity Data App 20160224798 - Lim; Keng | 2016-08-04 |
Analyzing activity data of an information management system Grant 9,407,662 - Lim August 2, 2 | 2016-08-02 |
Preventing Conflicts of Interests Between Two or More Groups Using Applications App 20160212014 - Lim; Keng | 2016-07-21 |
Preventing conflicts of interests between two or more groups Grant 9,396,351 - Lim July 19, 2 | 2016-07-19 |
Enforcing policy-based application and access control in an information management system Grant 9,398,051 - Lim July 19, 2 | 2016-07-19 |
Deploying policies and allowing off-line policy evaluations Grant 9,384,363 - Lim July 5, 2 | 2016-07-05 |
Techniques and system for specifying policies using abstractions Grant 9,384,360 - Lim July 5, 2 | 2016-07-05 |
Enforcing universal access control in an information management system Grant 9,384,358 - Lim July 5, 2 | 2016-07-05 |
Transforming Policies to Enforce Control in an Information Management System App 20160154965 - Lim; Keng | 2016-06-02 |
Detecting behavioral patterns and anomalies using activity data Grant 9,311,503 - Lim April 12, 2 | 2016-04-12 |
Protecting information using policies and encryption Grant 9,313,182 - Lim April 12, 2 | 2016-04-12 |
Inspecting Code and Reducing Code Size Associated to a Target App 20160092694 - Lim; Keng | 2016-03-31 |
Preventing conflicts of interests between two or more groups using applications Grant 9,298,895 - Lim March 29, 2 | 2016-03-29 |
Techniques of transforming policies to enforce control in an information management system Grant 9,253,216 - Lim February 2, 2 | 2016-02-02 |
Analyzing Policies of an Information Management System App 20160028776 - Lim; Keng | 2016-01-28 |
Inspecting code and reducing code size associated to a target Grant 9,203,868 - Lim December 1, 2 | 2015-12-01 |
Managing Access of Information Using Policies App 20150324602 - Lim; Keng | 2015-11-12 |
Protecting Documents Using Policies and Encryption App 20150295941 - Lim; Keng ;   et al. | 2015-10-15 |
Analyzing usage information of an information management system Grant 9,152,774 - Lim October 6, 2 | 2015-10-06 |
Enforcing Policy-based Application and Access Control in an Information Management System App 20150200970 - Lim; Keng | 2015-07-16 |
Techniques and system to manage access of information using policies Grant 9,081,981 - Lim July 14, 2 | 2015-07-14 |
Techniques of Transforming Policies to Enforce Control in an Information Management System App 20150195307 - Lim; Keng | 2015-07-09 |
Preventing Conflicts of Interests Between Two or More Groups App 20150178295 - Lim; Keng | 2015-06-25 |
Protecting documents using policies and encryption Grant 9,064,131 - Lim , et al. June 23, 2 | 2015-06-23 |
Inspecting Code and Reducing Code Size Associated to a Target App 20150089584 - Lim; Keng | 2015-03-26 |
Techniques of transforming policies to enforce control in an information management system Grant 8,990,886 - Lim March 24, 2 | 2015-03-24 |
Preventing conflicts of interests between two or more groups Grant 8,972,449 - Lim March 3, 2 | 2015-03-03 |
Deploying Policies and Allowing Off-Line Policy Evaluations App 20150052577 - Lim; Keng | 2015-02-19 |
Enforcing policy-based application and access control in an information management system Grant 8,959,580 - Lim February 17, 2 | 2015-02-17 |
Detecting Behavioral Patterns and Anomalies Using Activity Data App 20150033288 - Lim; Keng | 2015-01-29 |
Analyzing Activity Data of an Information Management System App 20150019762 - Lim; Keng | 2015-01-15 |
Protecting Information Using Policies and Encryption App 20150012741 - Lim; Keng | 2015-01-08 |
Techniques and System to Monitor and Log Access of Information Based on System and User Context Using Policies App 20140379673 - Lim; Keng | 2014-12-25 |
Inspecting code and reducing code size associated to a target Grant 8,904,478 - Lim December 2, 2 | 2014-12-02 |
Deploying policies and allowing off-line policy evaluations Grant 8,875,218 - Lim October 28, 2 | 2014-10-28 |
Preventing Conflicts of Interests Between Two or More Groups Using Applications App 20140310423 - Lim; Keng | 2014-10-16 |
Detecting behavioral patterns and anomalies using activity data Grant 8,862,551 - Lim October 14, 2 | 2014-10-14 |
Analyzing activity data of an information management system Grant 8,849,858 - Lim September 30, 2 | 2014-09-30 |
Protecting information using policies and encryption Grant 8,843,734 - Lim September 23, 2 | 2014-09-23 |
Techniques and system to monitor and log access of information based on system and user context using policies Grant 8,832,048 - Lim September 9, 2 | 2014-09-09 |
Analyzing Usage Information of an Information Management System App 20140208381 - Lim; Keng | 2014-07-24 |
Preventing conflicts of interests between two or more groups using applications Grant 8,762,412 - Lim June 24, 2 | 2014-06-24 |
Inspecting Code and Reducing Code Size Associated to a Target App 20140143830 - Lim; Keng | 2014-05-22 |
Analyzing usage information of an information management system Grant 8,694,523 - Lim April 8, 2 | 2014-04-08 |
Enforcing Policy-based Application and Access Control in an Information Management System App 20140090012 - Lim; Keng | 2014-03-27 |
Enforcing access control policies on servers in an information management system Grant 8,677,499 - Lim March 18, 2 | 2014-03-18 |
Policy performance in an information management system Grant 8,661,003 - Lim February 25, 2 | 2014-02-25 |
Inspecting code and reducing code size associated to a target Grant 8,640,191 - Lim January 28, 2 | 2014-01-28 |
Techniques of Transforming Policies to Enforce Control in an Information Management System App 20140020054 - Lim; Keng | 2014-01-16 |
Enforcing document control in an information management system Grant 8,627,490 - Lim January 7, 2 | 2014-01-07 |
Enforcing control policies in an information management system Grant 8,621,549 - Lim December 31, 2 | 2013-12-31 |
Enforcing policy-based application and access control in an information management system Grant 8,595,788 - Lim November 26, 2 | 2013-11-26 |
Enforcing Universal Access Control in an Information Management System App 20130283343 - Lim; Keng | 2013-10-24 |
Enforcing Application and Access Control Policies in an Information Management System with Two or More Interactive Enforcement Points App 20130263210 - Lim; Keng | 2013-10-03 |
Techniques of transforming policies to enforce control in an information management system Grant 8,544,058 - Lim September 24, 2 | 2013-09-24 |
Enforcing universal access control in an information management system Grant 8,464,314 - Lim June 11, 2 | 2013-06-11 |
Protecting Information Using Policies and Encryption App 20130097421 - Lim; Keng | 2013-04-18 |
Detecting Behavioral Patterns and Anomalies Using Activity Profiles App 20130086261 - Lim; Keng | 2013-04-04 |
Enforcing application and access control policies in an information management system with two or more interactive enforcement points Grant 8,407,345 - Lim March 26, 2 | 2013-03-26 |
Using information usage data to detect behavioral patterns and anomalies Grant 8,396,890 - Lim March 12, 2 | 2013-03-12 |
Analyzing Usage Information of an Information Management System App 20120311665 - Lim; Keng | 2012-12-06 |
Detecting behavioral patterns and anomalies using activity profiles Grant 8,321,437 - Lim November 27, 2 | 2012-11-27 |
Intelligent Policy Deployment App 20120233216 - Lim; Keng | 2012-09-13 |
Analyzing usage information of an information management system Grant 8,244,745 - Lim August 14, 2 | 2012-08-14 |
Inspecting Code and Reducing Code Size Associated to a Target App 20120198516 - Lim; Keng | 2012-08-02 |
Policy Performance in an Information Management System App 20120191677 - LIM; Keng | 2012-07-26 |
Techniques and system to deploy policies intelligently Grant 8,185,548 - Lim May 22, 2 | 2012-05-22 |
Associating code to a target through code inspection Grant 8,156,566 - Lim April 10, 2 | 2012-04-10 |
Techniques of optimizing policies in an information management system Grant 8,150,816 - Lim April 3, 2 | 2012-04-03 |
Protecting Documents Using Policies and Encryption App 20120036370 - Lim; Keng ;   et al. | 2012-02-09 |
Enforcing Universal Access Control in an Information Management System App 20120017261 - Lim; Keng | 2012-01-19 |
Preventing Conflicts of Interests Between Two or More Groups Using Applications App 20120017000 - Lim; Keng | 2012-01-19 |
Preventing conflicts of interests between two or more groups using applications Grant 7,877,409 - Lim January 25, 2 | 2011-01-25 |
Enforcing universal access control in an information management system Grant 7,877,781 - Lim January 25, 2 | 2011-01-25 |
Using Information Usage Data to Detect Behavioral Patterns and Anomalies App 20100306179 - Lim; Keng | 2010-12-02 |
Techniques and System to Deploy Policies Intelligently App 20100223287 - Lim; Keng | 2010-09-02 |
Detecting behavioral patterns and anomalies using information usage data Grant 7,774,363 - Lim August 10, 2 | 2010-08-10 |
Techniques and system to deploy policies intelligently Grant 7,716,240 - Lim May 11, 2 | 2010-05-11 |
Enforcing Universal Access Control in an Information Management System App 20080301760 - Lim; Keng | 2008-12-04 |
Enforcing Application and Access Control Policies in an Information Management System with Two or More Interactive Enforcement Points App 20080294586 - Lim; Keng | 2008-11-27 |
Preventing Conflicts of Interests Between Two or More Groups Using Applications App 20080091682 - Lim; Keng | 2008-04-17 |
Enforcing Control Policies in an Information Management System with Two or More Interactive Enforcement Points App 20080083014 - Lim; Keng | 2008-04-03 |
Detecting Behavioral Patterns and Anomalies Using Information Usage Data App 20080071728 - Lim; Keng | 2008-03-20 |
Analyzing Usage Information of an Information Management System App 20080065700 - Lim; Keng | 2008-03-13 |
Analyzing Activity Data of an Information Management System App 20080066149 - Lim; Keng | 2008-03-13 |
Techniques of Transforming Policies to Enforce Control in an Information Management System App 20080066150 - Lim; Keng | 2008-03-13 |
Enforcing Policy-based Application and Access Control in an Information Management System App 20080066148 - Lim; Keng | 2008-03-13 |
Detecting Behavioral Patterns and Anomalies Using Activity Profiles App 20080059474 - Lim; Keng | 2008-03-06 |
Techniques and System to Monitor and Log Access of Information Based on System and User Context Using Policies App 20080060051 - Lim; Keng | 2008-03-06 |
Enforcing Access Control Policies on Servers in an Information Management System App 20080060080 - Lim; Keng | 2008-03-06 |
Analyzing Activity Data of an Information Management System App 20070179987 - Lim; Keng | 2007-08-02 |
Multilayer Policy Language Structure App 20070169168 - Lim; Keng | 2007-07-19 |
Enforcing Document Control in an Information Management System App 20070162749 - Lim; Keng | 2007-07-12 |
Techniques Of Optimizing Policies In An Information Management System App 20070156670 - Lim; Keng | 2007-07-05 |
Preventing Conflicts Of Interests Between Two Or More Groups App 20070156695 - Lim; Keng | 2007-07-05 |
Techniques and System to Deploy Policies Intelligently App 20070156659 - Lim; Keng | 2007-07-05 |
Enforcing Control Policies in an Information Management System App 20070156897 - Lim; Keng | 2007-07-05 |
Associating Code To a Target Through Code Inspection App 20070156727 - Lim; Keng | 2007-07-05 |
Information Management System with Two or More Interactive Enforcement Points App 20070157203 - Lim; Keng | 2007-07-05 |
Deploying Policies and Allowing Off-Line Policy Evaluations App 20070157288 - Lim; Keng | 2007-07-05 |
Techniques and System for Specifying Policies Using Abstractions App 20070157287 - Lim; Keng | 2007-07-05 |
Techniques And System To Manage Access Of Information Using Policies App 20070156694 - Lim; Keng | 2007-07-05 |
Detecting Behavioral Patterns and Anomalies Using Activity Data App 20070156696 - Lim; Keng | 2007-07-05 |