Patents by Inventor Keng Lim

Keng Lim has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7877781
    Abstract: A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: January 25, 2011
    Assignee: NextLabs, Inc.
    Inventor: Keng Lim
  • Patent number: 7877409
    Abstract: To prevent conflicts of interest, an information management system is used to make sure two or more groups are kept apart so that information does not circulate freely between these groups. The system has policies to implement an “ethical wall” to separate users or groups of users. The user or groups of user may be organized in any arbitrary way, and may be in the same organization or different organizations. The two groups (or two or more users) will not be able to access information belonging to the other, and users in one group may not be able to pass information to the other group. The system may manage access to documents, e-mail, files, and other forms of information.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: January 25, 2011
    Assignee: NextLabs, Inc.
    Inventor: Keng Lim
  • Publication number: 20100306179
    Abstract: Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile.
    Type: Application
    Filed: August 3, 2010
    Publication date: December 2, 2010
    Applicant: NEXTLABS, INC.
    Inventor: Keng Lim
  • Publication number: 20100223287
    Abstract: In an information management system, relevant policies are deployed to targets while policies which are not relevant are not. By deploying relevant policies, this reduces the amount of space requirements at the target to store the policies and the amount of data that needs to be sent to the target. Also, execution speed at the target may increase since the target does not need to evaluate policies that are not relevant.
    Type: Application
    Filed: May 11, 2010
    Publication date: September 2, 2010
    Applicant: BLUE JUNGLE, INC.
    Inventor: Keng Lim
  • Publication number: 20100221393
    Abstract: A system and reusable plastic container for preserving the quality of a range of fruits and vegetables are provided. The container independently maintains modified atmospheres and relative humidity within the range of 1% to 50% carbon dioxide plus 1% to 15% oxygen and relative humidity of 75% RH and 100% RH. For produce highly susceptible to mould, yeast and/or bacterial growth at RH of 75% to 80% will result in optimum quality retention. The container includes a plastic body, plastic lid and a gas permeable film membrane hermetically sealed between the lid and the container. The plastic body and lid can be polyamide (nylon 6, 11, 12, or 66 and blends thereof), polycarbonate, polyethylene, polyethyleneterepthalate, polypropylene, polystyrene, polyvinylchloride, and mixtures thereof. The lid can be macro-perforated for a three piece application or micro-perforated for a two piece application.
    Type: Application
    Filed: March 21, 2006
    Publication date: September 2, 2010
    Inventors: Loong Keng Lim, Kee Eng Lee
  • Patent number: 7774363
    Abstract: Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile.
    Type: Grant
    Filed: October 30, 2007
    Date of Patent: August 10, 2010
    Assignee: NextLabs, Inc.
    Inventor: Keng Lim
  • Publication number: 20100127059
    Abstract: A water permeable sealed container for preservation of produce such as fruit, vegetables and flowers made out of three layer laminate corrugated to form, further three to five layer construct. The layers also include a layer of Kraft paper fluting and layer of polymer which is enclosed between two layers of Kraft paper. The container has a lid, which absorbs water vapor and transmits water vapor from the interior of the container to the exterior through micro perforations. The container can also regulate relative humidity within a range of 75% to 85% for some foods by removing moisture from the food generated from respiration and suppressing product decay due to microorganisms. The laminate may be die cut to be formed into a range of box designs for vertical profiles that provide ventilation spaces between containers in a vertical stack and to provide airflow channels within a stack.
    Type: Application
    Filed: December 19, 2006
    Publication date: May 27, 2010
    Inventors: Loong Keng Lim, Kee Eng Lee
  • Patent number: 7716240
    Abstract: In an information management system, relevant policies are deployed to targets while policies which are not relevant are not. By deploying relevant policies, this reduces the amount of space requirements at the target to store the policies and the amount of data that needs to be sent to the target. Also, execution speed at the target may increase since the target does not need to evaluate policies that are not relevant.
    Type: Grant
    Filed: December 22, 2006
    Date of Patent: May 11, 2010
    Assignee: NextLabs, Inc.
    Inventor: Keng Lim
  • Publication number: 20080301760
    Abstract: A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.
    Type: Application
    Filed: October 30, 2007
    Publication date: December 4, 2008
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20080294586
    Abstract: A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.
    Type: Application
    Filed: October 30, 2007
    Publication date: November 27, 2008
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20080091682
    Abstract: To prevent conflicts of interest, an information management system is used to make sure two or more groups are kept apart so that information does not circulate freely between these groups. The system has policies to implement an “ethical wall” to separate users or groups of users. The user or groups of user may be organized in any arbitrary way, and may be in the same organization or different organizations. The two groups (or two or more users) will not be able to access information belonging to the other, and users in one group may not be able to pass information to the other group. The system may manage access to documents, e-mail, files, and other forms of information.
    Type: Application
    Filed: October 30, 2007
    Publication date: April 17, 2008
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20080083014
    Abstract: A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.
    Type: Application
    Filed: October 30, 2007
    Publication date: April 3, 2008
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20080071728
    Abstract: Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile.
    Type: Application
    Filed: October 30, 2007
    Publication date: March 20, 2008
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20080066148
    Abstract: A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.
    Type: Application
    Filed: October 30, 2007
    Publication date: March 13, 2008
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20080065700
    Abstract: In an information management system, activity data is collected and analyzed for patterns. The information management system may be policy based. Activity data may be organized as entries including information on user, application, machine, action, object or document, time, and location. When checking for patterns in the activity or historical data, techniques may include inferencing, frequency checking, location and distance checking, and relationship checking, and any combination of these. Analyzing the activity data may include comparing like types or categories of information for two or more entries.
    Type: Application
    Filed: October 30, 2007
    Publication date: March 13, 2008
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20080066149
    Abstract: In an information management system, activity data is collected and analyzed for patterns. The information management system may be policy based. Activity data may be organized as entries including information on user, application, machine, action, object or document, time, and location. When checking for patterns in the activity or historical data, techniques may include inferencing, frequency checking, location and distance checking, and relationship checking, and any combination of these. Analyzing the activity data may include comparing like types or categories of information for two or more entries.
    Type: Application
    Filed: October 30, 2007
    Publication date: March 13, 2008
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20080066150
    Abstract: In an information management system, policies are deployed to targets and targets can evaluate the policies whether they are connected or disconnected to the system. The policies may be transferred to the target, which may be a device or user. Relevant policies may be transferred while not relevant policies are not. The policies may have policy abstractions.
    Type: Application
    Filed: October 30, 2007
    Publication date: March 13, 2008
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20080059474
    Abstract: Activity data is analyzed or evaluated to detect behavioral patterns and anomalies. When a particular pattern or anomaly is detected, a system may send a notification or perform a particular task. This activity data may be collected in an information management system, which may be policy based. Notification may be by way e-mail, report, pop-up message, or system message. Some tasks to perform upon detection may include implementing a policy in the information management system, disallowing a user from connecting to the system, and restricting a user from being allowed to perform certain actions. To detect a pattern, activity data may be compared to a previously defined or generated activity profile.
    Type: Application
    Filed: October 30, 2007
    Publication date: March 6, 2008
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20080060080
    Abstract: A method and apparatus for controlling document access and application usage using centrally managed rules. The rules are stored and manipulated in a central rule database via a rule server. Policy enforcers are installed on client systems and/or on servers and perform document access and application usage control for both direct user document accesses and application usage, and application program document accesses by evaluating the rules sent to the policy enforcer. The rule server decides which rules are required by each policy enforcer. A policy enforcer can also perform obligation and remediation operations as a part of rule evaluation. Policy enforcers on client systems and servers can operate autonomously, evaluating policies that have been received, when communications have been discontinued with the rule server.
    Type: Application
    Filed: October 30, 2007
    Publication date: March 6, 2008
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim
  • Publication number: 20080060051
    Abstract: An information management system approves or denies user requests to access information of the system. The information includes all types of information including documents and e-mail. The information management system is driven using a policy language having policies and policy abstractions. The information management system may approve or deny many different types of requests including opening a document or file, copying a file, printing a file, sending an e-mail, reading an e-mail, cut and paste of a portion of a document, saving a document, executing an application on a file, and many others.
    Type: Application
    Filed: October 30, 2007
    Publication date: March 6, 2008
    Applicant: BLUE JUNGLE
    Inventor: Keng Lim