Patents by Inventor Keng Lim

Keng Lim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9973533
    Abstract: A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.
    Type: Grant
    Filed: March 26, 2013
    Date of Patent: May 15, 2018
    Assignee: NextLabs, Inc.
    Inventor: Keng Lim
  • Patent number: 9961049
    Abstract: A system protects documents at rest and in motion using declarative policies and encryption. A document at rest includes documents on a device such as the hard drive of a computer. A document in motion is a document that is passing through a policy enforcement point. The policy enforcement point can be a server (e.g., mail server, instant messenger server, file server, or network connection server).
    Type: Grant
    Filed: August 9, 2016
    Date of Patent: May 1, 2018
    Assignee: NextLabs, Inc.
    Inventors: Keng Lim, Poon Fung, Andrew Han
  • Patent number: 9946717
    Abstract: Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile.
    Type: Grant
    Filed: January 31, 2017
    Date of Patent: April 17, 2018
    Assignee: NextLabs, Inc.
    Inventor: Keng Lim
  • Patent number: 9942271
    Abstract: A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.
    Type: Grant
    Filed: May 12, 2006
    Date of Patent: April 10, 2018
    Assignee: NextLabs, Inc.
    Inventor: Keng Lim
  • Publication number: 20180048464
    Abstract: A method and system of creating and managing encryption keys that facilitates sharing of encrypted content.
    Type: Application
    Filed: August 9, 2017
    Publication date: February 15, 2018
    Inventors: Keng Lim, Poon Fung
  • Patent number: 9864752
    Abstract: A policy language for an information management system has a three-layer structure that allows specifying one or more policies using policy abstractions. The policies and policy abstractions are in two different layers and decoupled from one another, so policies and policy abstractions may be specified and altered separately from each other. A third layer includes entity objects. A policy may refer to any number of policy abstractions. Multiple policies may reference a single policy abstraction, and a change to that policy abstraction will result in multiple policies being changed. Further, policy abstractions may be nested, so one policy abstraction may reference another policy abstraction, and so forth.
    Type: Grant
    Filed: December 22, 2006
    Date of Patent: January 9, 2018
    Assignee: NextLabs, Inc.
    Inventor: Keng Lim
  • Patent number: 9866594
    Abstract: A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.
    Type: Grant
    Filed: July 19, 2016
    Date of Patent: January 9, 2018
    Assignee: NextLabs, Inc.
    Inventor: Keng Lim
  • Publication number: 20170352172
    Abstract: A method and system of augmenting display content in a graphical user interface environment. Content produced by a graphical user interface is augmented with additional content before the content is displayed. In an example, a security marker may be rendered on top of an existing display content using the method described to protect high-value or sensitive information.
    Type: Application
    Filed: April 7, 2017
    Publication date: December 7, 2017
    Inventors: Keng Lim, Poon Fung
  • Patent number: 9767302
    Abstract: Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile.
    Type: Grant
    Filed: November 27, 2012
    Date of Patent: September 19, 2017
    Assignee: NextLabs, Inc.
    Inventor: Keng Lim
  • Patent number: 9740703
    Abstract: In an information management system, policies are deployed to targets and targets can evaluate the policies whether they are connected or disconnected to the system. The policies may be transferred to the target, which may be a device or user. Relevant policies may be transferred while not relevant policies are not. The policies may have policy abstractions.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: August 22, 2017
    Assignee: NextLabs, Inc.
    Inventor: Keng Lim
  • Patent number: 9703978
    Abstract: In an information management system, policies are deployed to targets and targets can evaluate the policies whether they are connected or disconnected to the system. The policies may be transferred to the target, which may be a device or user. Relevant policies may be transferred while not relevant policies are not. The policies may have policy abstractions.
    Type: Grant
    Filed: February 2, 2016
    Date of Patent: July 11, 2017
    Assignee: NextLabs, Inc.
    Inventor: Keng Lim
  • Patent number: 9684795
    Abstract: Code is associated to a target based on an inspection of the code. A target may be a device or a user. A number of code components may be inspected at one time and then transferred or otherwise associated to a target based on the target's profile. A code component may be a policy of an information management system.
    Type: Grant
    Filed: December 1, 2015
    Date of Patent: June 20, 2017
    Assignee: NextLabs, Inc.
    Inventor: Keng Lim
  • Publication number: 20170142092
    Abstract: A technique and system protects documents at rest and in motion using declarative policies and encryption. Encryption in the system is provided transparently and can work in conjunction with policy enforcers installed at a system. A system can protect information or documents from: (i) insider theft; (ii) ensure confidentiality; and (iii) prevent data loss, while enabling collaboration both inside and outside of a company.
    Type: Application
    Filed: January 31, 2017
    Publication date: May 18, 2017
    Inventor: Keng Lim
  • Publication number: 20170142125
    Abstract: Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile.
    Type: Application
    Filed: January 31, 2017
    Publication date: May 18, 2017
    Inventor: Keng Lim
  • Publication number: 20170063935
    Abstract: A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.
    Type: Application
    Filed: November 15, 2016
    Publication date: March 2, 2017
    Inventor: Keng Lim
  • Patent number: 9558193
    Abstract: Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile.
    Type: Grant
    Filed: April 11, 2016
    Date of Patent: January 31, 2017
    Assignee: NextLabs, Inc.
    Inventor: Keng Lim
  • Patent number: 9558360
    Abstract: A technique and system protects documents at rest and in motion using declarative policies and encryption. Encryption in the system is provided transparently and can work in conjunction with policy enforcers installed at a system. A system can protect information or documents from: (i) insider theft; (ii) ensure confidentiality; and (iii) prevent data loss, while enabling collaboration both inside and outside of a company.
    Type: Grant
    Filed: April 11, 2016
    Date of Patent: January 31, 2017
    Assignee: NextLabs, Inc.
    Inventor: Keng Lim
  • Patent number: 9531595
    Abstract: In an information management system, relevant policies are deployed to targets while policies which are not relevant are not. By deploying relevant policies, this reduces the amount of space requirements at the target to store the policies and the amount of data that needs to be sent to the target. Also, execution speed at the target may increase since the target does not need to evaluate policies that are not relevant.
    Type: Grant
    Filed: May 22, 2012
    Date of Patent: December 27, 2016
    Assignee: NextLabs, Inc.
    Inventor: Keng Lim
  • Publication number: 20160352694
    Abstract: A system protects documents at rest and in motion using declarative policies and encryption. A document at rest includes documents on a device such as the hard drive of a computer. A document in motion is a document that is passing through a policy enforcement point. The policy enforcement point can be a server (e.g., mail server, instant messenger server, file server, or network connection server).
    Type: Application
    Filed: August 9, 2016
    Publication date: December 1, 2016
    Inventors: Keng Lim, Poon Fung, Andrew Han
  • Publication number: 20160342805
    Abstract: In an information management system, activity data is collected and analyzed for patterns. The information management system may be policy based. Activity data may be organized as entries including information on user, application, machine, action, object or document, time, and location. When checking for patterns in the activity or historical data, techniques may include inferencing, frequency checking, location and distance checking, and relationship checking, and any combination of these. Analyzing the activity data may include comparing like types or categories of information for two or more entries.
    Type: Application
    Filed: August 2, 2016
    Publication date: November 24, 2016
    Inventor: Keng Lim