Latest Patents

Patents imply intellectual property and it has a $ value that can be associated depending on the field and type of patent that is allocated. Patents also increase the enterprise value of the company and help prevent copy-cats from copying the idea without having royalt payments or licencing deals. We like it when companies get patents awarded!. To protect IP companies aggressively file provisional patents even before they have a working product. The below table provides a way to look at what has been done by companies and use this as a factor to make investment decisions.

     
Title Filing Date Publication Date Grant Date
Systems and methods for data correlation and artifact matching in identity … 2022-8-19 2022-12-08
System and method for outlier and anomaly detection in identity management … 2022-5-26 2022-11-10
Systems and methods for searching in identity management artificial … 2022-5-26 2022-11-10
Systems and methods for network security using identity management data 2022-3-18 2022-9-22
Identity security gateway agent 2022-2-25 2022-7-07
System and method for incremental training of machine learning models in … 2022-2-11 2022-8-25
System and method for software services platform architecture for supporting … 2022-2-08 2022-7-28
Identity defined secure connect 2021-12-17 2022-4-07
System and method for peer group detection, visualization and analysis in … 2021-10-14 2022-2-10
System and method for predictive modeling for entitlement diffusion and role … 2021-10-14 2022-5-26
Systems and methods for thread management to optimize resource utilization in a … 2021-9-29 2022-7-21
System and method for intelligent agents for decision support in network … 2021-8-02 2021-11-18
System and method for automated access request recommendations 2021-7-30 2022-1-18 2022-1-18
System and method for sql server resources and permissions analysis in identity … 2021-7-28 2022-2-17
System and method for on-demand warm standby disaster recovery 2021-6-08 2022-5-03 2022-5-03
Identity management protocol router 2021-4-12 2022-1-13
Passwordless privilege access 2021-2-22 2022-6-21 2022-6-21
System and method for artifact management and representation in identity … 2021-1-04 2021-4-29
System and method for predictive platforms in identity management artificial … 2020-12-31 2022-3-17
System and method for role validation in identity management artificial … 2020-9-30 2022-11-29 2022-11-29
System and method for role validation in identity management artificial … 2020-9-30 2021-12-16
System and method for role mining in identity management artificial … 2020-8-20 2022-11-29 2022-11-29
System and method for role mining in identity management artificial … 2020-8-20 2020-12-03
System and method for identity management of cloud based computing services in … 2020-7-29 2020-11-12
System and method for identity management of cloud based computing services in … 2020-7-29 2022-11-29 2022-11-29
Systems and methods for data correlation and artifact matching in identity … 2020-3-10 2022-10-04 2022-10-04
System and method for tagging in identity management artificial intelligence … 2020-1-22 2022-7-12 2022-7-12
Systems and methods for emergency shutdown and restore of access entitlements … 2019-12-23 2022-9-27 2022-9-27
Automated access control management for computing systems 2019-4-19 2019-10-24
Vaultless authentication 2019-1-25 2022-10-04 2022-10-04
System and method for securing authentication information in a networked … 2017-6-14 2019-4-30 2019-4-30
Method and apparatus for associating data loss protection (DLP) policies with … 2016-4-08 2019-10-01 2019-10-01
System and method for classifying documents based on access 2016-3-29 2016-9-29
System and method for domain password reset in a secured distributed network … 2016-3-09 2017-3-21 2017-3-21
System and method for data governance 2015-3-30 2015-11-05
Generating an insight view while maintaining report context 2014-9-17 2017-11-28 2017-11-28
Techniques for reconciling permission usage with security policy for policy … 2013-8-19 2016-3-15 2016-3-15
Autonomic assistance for policy generation 2013-1-02 2019-10-22 2019-10-22
Single tenant audit view in a multi-tenant environment 2012-9-05 2014-7-01 2014-7-01
Controlling access to sensitive data based on changes in information … 2011-2-03 2014-8-05 2014-8-05
Method and apparatus for autonomic discovery of sensitive content 2010-11-18 2017-2-14 2017-2-14
System for notification of group membership changes in directory service 2008-12-09 2012-2-14 2012-2-14
System and method for effecting information governance 2008-5-30 2009-2-19
System and method for user access risk scoring 2008-5-14 2010-2-24
Positive multi-subsystems security monitoring (pms-sm) 2008-2-28 2009-9-03
Method and system for multiple sub-systems meta security policy 2008-2-28 2009-9-03
Implementation and use of pii data access control facility employing personally … 2007-6-18 2007-10-25
System and method for role based access control in a content management system 2006-7-21 2008-1-24
Visualization of attributes of workflow weblogs 2005-4-28 2013-4-09 2013-4-09
Role-based views access to a workflow weblog 2004-10-07 2005-6-16
System and method for ensuring proper implementation of computer security … 2002-12-18 2007-2-13 2007-2-13
Grouped access control list actions 2001-7-12 2008-5-27 2008-5-27