2024
|
Invention
|
Sharing encrypted documents within and outside an organization.
A method and system of creating ... |
|
Invention
|
Policies and encryption to protect digital information.
A technique and system protects document... |
|
Invention
|
Protecting documents with security overlays.
A method and system of augmenting display content i... |
2023
|
Invention
|
Sharing encrypted documents within and outside an organization. A method and system of creating a... |
|
Invention
|
Enforcing data access policies at a database client interface to protect privacy and confidential... |
|
Invention
|
Enforcing data access policies in a reverse proxy.
A method and system of masking, redacting, fi... |
|
Invention
|
Dynamically inserting guard conditions into a database query to protect privacy and confidentiali... |
|
Invention
|
Policies and encryption to protect digital information. A technique and system protects documents... |
2022
|
Invention
|
Applying an authorization policy across multiple application programs with requests submitted thr... |
2021
|
Invention
|
Protecting documents with centralized and discretionary policies. A technique and system protects... |
|
Invention
|
Protecting documents with security overlays. A method and system of augmenting display content in... |
|
Invention
|
Protecting a document with a security overlay on a web browser. A technique and system provide pr... |
2020
|
Invention
|
Protecting information using policies and encryption. A technique and system protects documents a... |
|
Invention
|
Protecting documents using policies and encryption. A system protects documents at rest and in mo... |
2018
|
Invention
|
Dynamically granting and enforcing rights on a protected document. A technique and system provide... |
2017
|
Invention
|
Manipulating display content of a graphical user interface. A method and system of augmenting dis... |
|
Invention
|
Detecting behavioral patterns and anomalies using activity data. Activity data is analyzed or eva... |
2016
|
Invention
|
Enforcing control policies in an information management system with two or more interactive enfor... |
|
Invention
|
Viewing protected documents in a web browser. A technique and system provide protection to a prot... |
|
Invention
|
Analyzing activity data of an information management system.
In an information management system... |
|
Invention
|
Preventing conflicts of interests between two or more groups. To prevent conflicts of interest, a... |
|
Invention
|
Enforcing policy-based application and access control in an information management system. A meth... |
|
Invention
|
Deploying policies and allowing offline policy evaluation. In an information management system, p... |
|
Invention
|
Enforcing universal access control in an information management system. A method and apparatus fo... |
|
Invention
|
Techniques and system for specifying policies using abstractions.
A policy language for an infor... |
|
Invention
|
Preventing conflicts of interests between two or more groups using applications. To prevent confl... |
|
Invention
|
Transforming policies to enforce control in an information management system. In an information m... |
2015
|
Invention
|
Inspecting code and reducing code size associated to a target. Code is associated to a target bas... |
|
Invention
|
Analyzing policies of in information management system. In an information management system, acti... |
|
Invention
|
Managing access of information using policies. An information management system approves or denie... |
|
Invention
|
Techniques of transforming policies to enforce control in an information management system. In an... |
2006
|
P/S
|
computer programs for implementing a computer programming language |
|
P/S
|
computer programs for use in information and network security, system management, information man... |