loadpatents
name:-0.087870836257935
name:-0.088054895401001
name:-0.012512922286987
Lim; Keng Patent Filings

Lim; Keng

Patent Applications and Registrations

Patent applications and USPTO patent grants for Lim; Keng.The latest application filed is for "protecting documents with security overlays".

Company Profile
11.105.80
  • Lim; Keng - Atherton CA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Applying an authorization policy across multiple application programs with requests submitted through an HTTP-based API
Grant 11,347,880 - Lim , et al. May 31, 2
2022-05-31
Protecting Documents with Security Overlays
App 20210312584 - Lim; Keng ;   et al.
2021-10-07
Protecting documents with centralized and discretionary policies
Grant 11,132,459 - Lim , et al. September 28, 2
2021-09-28
Sharing Encrypted Documents Within and Outside an Organization
App 20210258147 - Lim; Keng ;   et al.
2021-08-19
Protecting documents using policies and encryption
Grant 11,057,355 - Lim , et al. July 6, 2
2021-07-06
Manipulating display content of a graphical user interface
Grant 11,042,955 - Lim , et al. June 22, 2
2021-06-22
Protecting Information Using Policies and Encryption
App 20210119989 - Lim; Keng
2021-04-22
Dynamically granting and enforcing rights on a protected document
Grant 10,936,739 - Lim , et al. March 2, 2
2021-03-02
Sharing encrypted documents within and outside an organization
Grant 10,911,223 - Lim , et al. February 2, 2
2021-02-02
Protecting information using policies and encryption
Grant 10,873,574 - Lim December 22, 2
2020-12-22
Protecting Documents Using Policies and Encryption
App 20200177558 - Lim; Keng ;   et al.
2020-06-04
Sharing Encrypted Documents Within and Outside an Organization
App 20200136812 - Lim; Keng ;   et al.
2020-04-30
Applying an authorization policy across multiple application programs with requests submitted through an HTTP-based API
Grant 10,592,683 - Lim , et al.
2020-03-17
Protecting documents using policies and encryption
Grant 10,554,635 - Lim , et al. Fe
2020-02-04
Enforcing control policies in an information management system with two or more interactive enforcement points
Grant 10,536,485 - Lim Ja
2020-01-14
Sharing encrypted documents within and outside an organization
Grant 10,523,423 - Lim , et al. Dec
2019-12-31
Protecting documents with centralized and discretionary policies
Grant 10,387,669 - Lim , et al. A
2019-08-20
Preventing conflicts of interests between two or more groups using applications
Grant 10,380,363 - Lim A
2019-08-13
Viewing protected documents in a web browser
Grant 10,303,892 - Lim , et al.
2019-05-28
Analyzing policies of in information management system
Grant 10,289,858 - Lim
2019-05-14
Preventing conflicts of interests between two or more groups
Grant 10,223,366 - Lim
2019-03-05
Protecting Information Using Policies and Encryption
App 20190058705 - Lim; Keng
2019-02-21
Managing access of information using policies
Grant 10,181,047 - Lim Ja
2019-01-15
Techniques and system to monitor and log access of information based on system and user context using policies
Grant 10,114,965 - Lim October 30, 2
2018-10-30
Protecting information using policies and encryption
Grant 10,110,597 - Lim October 23, 2
2018-10-23
Enforcing universal access control in an information management system
Grant 10,104,125 - Lim October 16, 2
2018-10-16
Protecting Documents Using Policies and Encryption
App 20180248855 - Lim; Keng ;   et al.
2018-08-30
Enforcing application and access control policies in an information management system with two or more interactive enforcement points
Grant 9,973,533 - Lim May 15, 2
2018-05-15
Protecting documents using policies and encryption
Grant 9,961,049 - Lim , et al. May 1, 2
2018-05-01
Detecting behavioral patterns and anomalies using activity data
Grant 9,946,717 - Lim April 17, 2
2018-04-17
Information management system with two or more interactive enforcement points
Grant 9,942,271 - Lim April 10, 2
2018-04-10
Sharing Encrypted Documents Within and Outside an Organization
App 20180048464 - Lim; Keng ;   et al.
2018-02-15
Multilayer policy language structure
Grant 9,864,752 - Lim January 9, 2
2018-01-09
Enforcing policy-based application and access control in an information management system
Grant 9,866,594 - Lim January 9, 2
2018-01-09
Manipulating Display Content of a Graphical User Interface
App 20170352172 - Lim; Keng ;   et al.
2017-12-07
Detecting behavioral patterns and anomalies using activity profiles
Grant 9,767,302 - Lim September 19, 2
2017-09-19
Deploying policies and allowing offline policy evaluation
Grant 9,740,703 - Lim August 22, 2
2017-08-22
Transforming policies to enforce control in an information management system
Grant 9,703,978 - Lim July 11, 2
2017-07-11
Inspecting code and reducing code size associated to a target
Grant 9,684,795 - Lim June 20, 2
2017-06-20
Detecting Behavioral Patterns and Anomalies Using Activity Data
App 20170142125 - Lim; Keng
2017-05-18
Protecting Information Using Policies and Encryption
App 20170142092 - Lim; Keng
2017-05-18
Enforcing Control Policies in an Information Management System with Two or More Interactive Enforcement Points
App 20170063935 - Lim; Keng
2017-03-02
Detecting behavioral patterns and anomalies using activity data
Grant 9,558,193 - Lim January 31, 2
2017-01-31
Protecting information using policies and encryption
Grant 9,558,360 - Lim January 31, 2
2017-01-31
Intelligent policy deployment
Grant 9,531,595 - Lim December 27, 2
2016-12-27
Protecting Documents Using Policies and Encryption
App 20160352694 - Lim; Keng ;   et al.
2016-12-01
Analyzing Activity Data of an Information Management System
App 20160342805 - Lim; Keng
2016-11-24
Enforcing control policies in an information management system with two or more interactive enforcement points
Grant 9,497,219 - Lim November 15, 2
2016-11-15
Enforcing Policy-based Application and Access Control in an Information Management System
App 20160330247 - Lim; Keng
2016-11-10
Preventing Conflicts of Interests Between Two or More Groups
App 20160328574 - Lim; Keng
2016-11-10
Deploying Policies and Allowing Offline Policy Evaluation
App 20160315971 - Lim; Keng
2016-10-27
Enforcing Universal Access Control in an Information Management System
App 20160315972 - Lim; Keng
2016-10-27
Techniques and System for Specifying Policies Using Abstractions
App 20160308914 - Lim; Keng
2016-10-20
Protecting documents using policies and encryption
Grant 9,413,771 - Lim , et al. August 9, 2
2016-08-09
Protecting Information Using Policies and Encryption
App 20160224796 - Lim; Keng
2016-08-04
Detecting Behavioral Patterns and Anomalies Using Activity Data
App 20160224798 - Lim; Keng
2016-08-04
Analyzing activity data of an information management system
Grant 9,407,662 - Lim August 2, 2
2016-08-02
Preventing Conflicts of Interests Between Two or More Groups Using Applications
App 20160212014 - Lim; Keng
2016-07-21
Preventing conflicts of interests between two or more groups
Grant 9,396,351 - Lim July 19, 2
2016-07-19
Enforcing policy-based application and access control in an information management system
Grant 9,398,051 - Lim July 19, 2
2016-07-19
Deploying policies and allowing off-line policy evaluations
Grant 9,384,363 - Lim July 5, 2
2016-07-05
Techniques and system for specifying policies using abstractions
Grant 9,384,360 - Lim July 5, 2
2016-07-05
Enforcing universal access control in an information management system
Grant 9,384,358 - Lim July 5, 2
2016-07-05
Transforming Policies to Enforce Control in an Information Management System
App 20160154965 - Lim; Keng
2016-06-02
Detecting behavioral patterns and anomalies using activity data
Grant 9,311,503 - Lim April 12, 2
2016-04-12
Protecting information using policies and encryption
Grant 9,313,182 - Lim April 12, 2
2016-04-12
Inspecting Code and Reducing Code Size Associated to a Target
App 20160092694 - Lim; Keng
2016-03-31
Preventing conflicts of interests between two or more groups using applications
Grant 9,298,895 - Lim March 29, 2
2016-03-29
Techniques of transforming policies to enforce control in an information management system
Grant 9,253,216 - Lim February 2, 2
2016-02-02
Analyzing Policies of an Information Management System
App 20160028776 - Lim; Keng
2016-01-28
Inspecting code and reducing code size associated to a target
Grant 9,203,868 - Lim December 1, 2
2015-12-01
Managing Access of Information Using Policies
App 20150324602 - Lim; Keng
2015-11-12
Protecting Documents Using Policies and Encryption
App 20150295941 - Lim; Keng ;   et al.
2015-10-15
Analyzing usage information of an information management system
Grant 9,152,774 - Lim October 6, 2
2015-10-06
Enforcing Policy-based Application and Access Control in an Information Management System
App 20150200970 - Lim; Keng
2015-07-16
Techniques and system to manage access of information using policies
Grant 9,081,981 - Lim July 14, 2
2015-07-14
Techniques of Transforming Policies to Enforce Control in an Information Management System
App 20150195307 - Lim; Keng
2015-07-09
Preventing Conflicts of Interests Between Two or More Groups
App 20150178295 - Lim; Keng
2015-06-25
Protecting documents using policies and encryption
Grant 9,064,131 - Lim , et al. June 23, 2
2015-06-23
Inspecting Code and Reducing Code Size Associated to a Target
App 20150089584 - Lim; Keng
2015-03-26
Techniques of transforming policies to enforce control in an information management system
Grant 8,990,886 - Lim March 24, 2
2015-03-24
Preventing conflicts of interests between two or more groups
Grant 8,972,449 - Lim March 3, 2
2015-03-03
Deploying Policies and Allowing Off-Line Policy Evaluations
App 20150052577 - Lim; Keng
2015-02-19
Enforcing policy-based application and access control in an information management system
Grant 8,959,580 - Lim February 17, 2
2015-02-17
Detecting Behavioral Patterns and Anomalies Using Activity Data
App 20150033288 - Lim; Keng
2015-01-29
Analyzing Activity Data of an Information Management System
App 20150019762 - Lim; Keng
2015-01-15
Protecting Information Using Policies and Encryption
App 20150012741 - Lim; Keng
2015-01-08
Techniques and System to Monitor and Log Access of Information Based on System and User Context Using Policies
App 20140379673 - Lim; Keng
2014-12-25
Inspecting code and reducing code size associated to a target
Grant 8,904,478 - Lim December 2, 2
2014-12-02
Deploying policies and allowing off-line policy evaluations
Grant 8,875,218 - Lim October 28, 2
2014-10-28
Preventing Conflicts of Interests Between Two or More Groups Using Applications
App 20140310423 - Lim; Keng
2014-10-16
Detecting behavioral patterns and anomalies using activity data
Grant 8,862,551 - Lim October 14, 2
2014-10-14
Analyzing activity data of an information management system
Grant 8,849,858 - Lim September 30, 2
2014-09-30
Protecting information using policies and encryption
Grant 8,843,734 - Lim September 23, 2
2014-09-23
Techniques and system to monitor and log access of information based on system and user context using policies
Grant 8,832,048 - Lim September 9, 2
2014-09-09
Analyzing Usage Information of an Information Management System
App 20140208381 - Lim; Keng
2014-07-24
Preventing conflicts of interests between two or more groups using applications
Grant 8,762,412 - Lim June 24, 2
2014-06-24
Inspecting Code and Reducing Code Size Associated to a Target
App 20140143830 - Lim; Keng
2014-05-22
Analyzing usage information of an information management system
Grant 8,694,523 - Lim April 8, 2
2014-04-08
Enforcing Policy-based Application and Access Control in an Information Management System
App 20140090012 - Lim; Keng
2014-03-27
Enforcing access control policies on servers in an information management system
Grant 8,677,499 - Lim March 18, 2
2014-03-18
Policy performance in an information management system
Grant 8,661,003 - Lim February 25, 2
2014-02-25
Inspecting code and reducing code size associated to a target
Grant 8,640,191 - Lim January 28, 2
2014-01-28
Techniques of Transforming Policies to Enforce Control in an Information Management System
App 20140020054 - Lim; Keng
2014-01-16
Enforcing document control in an information management system
Grant 8,627,490 - Lim January 7, 2
2014-01-07
Enforcing control policies in an information management system
Grant 8,621,549 - Lim December 31, 2
2013-12-31
Enforcing policy-based application and access control in an information management system
Grant 8,595,788 - Lim November 26, 2
2013-11-26
Enforcing Universal Access Control in an Information Management System
App 20130283343 - Lim; Keng
2013-10-24
Enforcing Application and Access Control Policies in an Information Management System with Two or More Interactive Enforcement Points
App 20130263210 - Lim; Keng
2013-10-03
Techniques of transforming policies to enforce control in an information management system
Grant 8,544,058 - Lim September 24, 2
2013-09-24
Enforcing universal access control in an information management system
Grant 8,464,314 - Lim June 11, 2
2013-06-11
Protecting Information Using Policies and Encryption
App 20130097421 - Lim; Keng
2013-04-18
Detecting Behavioral Patterns and Anomalies Using Activity Profiles
App 20130086261 - Lim; Keng
2013-04-04
Enforcing application and access control policies in an information management system with two or more interactive enforcement points
Grant 8,407,345 - Lim March 26, 2
2013-03-26
Using information usage data to detect behavioral patterns and anomalies
Grant 8,396,890 - Lim March 12, 2
2013-03-12
Analyzing Usage Information of an Information Management System
App 20120311665 - Lim; Keng
2012-12-06
Detecting behavioral patterns and anomalies using activity profiles
Grant 8,321,437 - Lim November 27, 2
2012-11-27
Intelligent Policy Deployment
App 20120233216 - Lim; Keng
2012-09-13
Analyzing usage information of an information management system
Grant 8,244,745 - Lim August 14, 2
2012-08-14
Inspecting Code and Reducing Code Size Associated to a Target
App 20120198516 - Lim; Keng
2012-08-02
Policy Performance in an Information Management System
App 20120191677 - LIM; Keng
2012-07-26
Techniques and system to deploy policies intelligently
Grant 8,185,548 - Lim May 22, 2
2012-05-22
Associating code to a target through code inspection
Grant 8,156,566 - Lim April 10, 2
2012-04-10
Techniques of optimizing policies in an information management system
Grant 8,150,816 - Lim April 3, 2
2012-04-03
Protecting Documents Using Policies and Encryption
App 20120036370 - Lim; Keng ;   et al.
2012-02-09
Enforcing Universal Access Control in an Information Management System
App 20120017261 - Lim; Keng
2012-01-19
Preventing Conflicts of Interests Between Two or More Groups Using Applications
App 20120017000 - Lim; Keng
2012-01-19
Preventing conflicts of interests between two or more groups using applications
Grant 7,877,409 - Lim January 25, 2
2011-01-25
Enforcing universal access control in an information management system
Grant 7,877,781 - Lim January 25, 2
2011-01-25
Using Information Usage Data to Detect Behavioral Patterns and Anomalies
App 20100306179 - Lim; Keng
2010-12-02
Techniques and System to Deploy Policies Intelligently
App 20100223287 - Lim; Keng
2010-09-02
Detecting behavioral patterns and anomalies using information usage data
Grant 7,774,363 - Lim August 10, 2
2010-08-10
Techniques and system to deploy policies intelligently
Grant 7,716,240 - Lim May 11, 2
2010-05-11
Enforcing Universal Access Control in an Information Management System
App 20080301760 - Lim; Keng
2008-12-04
Enforcing Application and Access Control Policies in an Information Management System with Two or More Interactive Enforcement Points
App 20080294586 - Lim; Keng
2008-11-27
Preventing Conflicts of Interests Between Two or More Groups Using Applications
App 20080091682 - Lim; Keng
2008-04-17
Enforcing Control Policies in an Information Management System with Two or More Interactive Enforcement Points
App 20080083014 - Lim; Keng
2008-04-03
Detecting Behavioral Patterns and Anomalies Using Information Usage Data
App 20080071728 - Lim; Keng
2008-03-20
Analyzing Usage Information of an Information Management System
App 20080065700 - Lim; Keng
2008-03-13
Analyzing Activity Data of an Information Management System
App 20080066149 - Lim; Keng
2008-03-13
Techniques of Transforming Policies to Enforce Control in an Information Management System
App 20080066150 - Lim; Keng
2008-03-13
Enforcing Policy-based Application and Access Control in an Information Management System
App 20080066148 - Lim; Keng
2008-03-13
Detecting Behavioral Patterns and Anomalies Using Activity Profiles
App 20080059474 - Lim; Keng
2008-03-06
Techniques and System to Monitor and Log Access of Information Based on System and User Context Using Policies
App 20080060051 - Lim; Keng
2008-03-06
Enforcing Access Control Policies on Servers in an Information Management System
App 20080060080 - Lim; Keng
2008-03-06
Analyzing Activity Data of an Information Management System
App 20070179987 - Lim; Keng
2007-08-02
Multilayer Policy Language Structure
App 20070169168 - Lim; Keng
2007-07-19
Enforcing Document Control in an Information Management System
App 20070162749 - Lim; Keng
2007-07-12
Techniques Of Optimizing Policies In An Information Management System
App 20070156670 - Lim; Keng
2007-07-05
Preventing Conflicts Of Interests Between Two Or More Groups
App 20070156695 - Lim; Keng
2007-07-05
Techniques and System to Deploy Policies Intelligently
App 20070156659 - Lim; Keng
2007-07-05
Enforcing Control Policies in an Information Management System
App 20070156897 - Lim; Keng
2007-07-05
Associating Code To a Target Through Code Inspection
App 20070156727 - Lim; Keng
2007-07-05
Information Management System with Two or More Interactive Enforcement Points
App 20070157203 - Lim; Keng
2007-07-05
Deploying Policies and Allowing Off-Line Policy Evaluations
App 20070157288 - Lim; Keng
2007-07-05
Techniques and System for Specifying Policies Using Abstractions
App 20070157287 - Lim; Keng
2007-07-05
Techniques And System To Manage Access Of Information Using Policies
App 20070156694 - Lim; Keng
2007-07-05
Detecting Behavioral Patterns and Anomalies Using Activity Data
App 20070156696 - Lim; Keng
2007-07-05

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed