67 patents
Utility
Integration Packaging for a Multi-tenant Computing Environment
18 Jan 24
A multi-tenant authentication system facilitates packaging and installing of integrations for authentication services of system tenants.
Mohamed Elsherif
Filed: 28 Jul 23
Utility
Techniques for Access Certification Reviewer Selection
11 Jan 24
Methods, systems, and devices for discounting extensibility latency are described.
Richard Elmer Loose, JR., Ryan Michael Sullivan, Vijayaraghavan Kodaganallur Pitchumani
Filed: 6 Jul 22
Utility
Techniques for Malicious Entity Discovery
28 Dec 23
Methods, systems, and devices for access management are described.
Tanvir ISLAM
Filed: 28 Jun 22
Utility
Efficient Generation of Identity Provider Integrations
21 Dec 23
An authentication system facilitates efficient generation of authentication integrations with third-party identity providers for client systems.
Daniel Zeller, Lars Kristian Johansen, Venkat Ramanan Viswanathan, Yu Liu, Shantanu Sardal
Filed: 30 Aug 23
Utility
Automated Creation of Trusted Network Perimeter
23 Nov 23
A system generates network perimeter for an organization based on the connection data.
Jinlong Fu, RaghuRam Pamidimarri
Filed: 28 Jul 23
Utility
Server-based Workflow Management Using Priorities
23 Nov 23
A system prioritizes workflows based on priority levels and calculates an amount of resource consumption associated with the workflows.
Brian Kenneth Zuzga, Alec Embke, Ryan Oblak, Daniel Keller, Virginia Chiu
Filed: 28 Jul 23
Utility
Device Risk Level Based on Device Metadata Comparison
2 Nov 23
An authentication system determines a risk level for a client device impersonating a client device enrolled in authentication services by comparing device metadata for the impersonating client device to device metadata for the enrolled client device.
Stephen Woodward Lind
Filed: 7 Jul 23
Utility
Techniques for Credential and Identity Synchronization
2 Nov 23
Methods, systems, and devices for managing identifying information are described.
Jonathan Roman Todd
Filed: 22 Jul 22
Utility
Fine-grained Authorization As a Service Via Relationship- Based Access Control Within a Multi-tenant System
2 Nov 23
An authorization system provides authorization services for multiple tenant organizations.
Damian Ezequiel Schenkelman, Jonathan Cornelius Allie, Yamil Asusta, Javier Alberto Centurion, Raghd Hamzeh, Sebastian Iacomuzzi, Matias Adrian Woloski
Filed: 29 Apr 22
Utility
System for handling workplace queries using online learning to rank
31 Oct 23
A system creates and searches knowledge base (KB) articles inside an organization while supporting operation as a SaaS (Software as-a-Service) across a plurality of organizations.
Rajhans Samdani, Ankit Goyal, Pierre Rappolt, Pratyus Patnaik
Filed: 24 Jul 19
Utility
Access to Federated Identities on a Shared Kiosk Computing Device
12 Oct 23
A kiosk device is shared by many users of an organization in a sequential manner.
Kavitha Chandramohan, Johannes Stockmann
Filed: 13 Jun 23
Utility
Efficient generation of identity provider integrations
10 Oct 23
An authentication system facilitates efficient generation of authentication integrations with third-party identity providers for client systems.
Daniel Zeller, Lars Kristian Johansen, Venkat Ramanan Viswanathan, Yu Liu, Shantanu Sardal
Filed: 15 Jul 22
Utility
Automated creation of trusted network perimeter
19 Sep 23
A system generates network perimeter for an organization based on the connection data.
Jinlong Fu, RaghuRam Pamidimarri
Filed: 28 Jan 21
Utility
Personalized Service-level Agreements for an Electronic Request Management System
7 Sep 23
An organization has or uses an SLA system that selects a service-level agreement (SLA) that should apply to a given user request.
Ankit Goyal, Zachary Thomas Hart, Jose Solano, Tanya Butani, William Stone Potter, Suchit Agarwal, Pratyus Patnaik
Filed: 3 Mar 22
Utility
Digital Access Control Using Time-based Baseline Access Distributions
7 Sep 23
An access analysis system obtains data about user requests to access particular applications, such as identifiers of the particular user and application involved, the time of the request, and (optionally) additional contextual data, and uses that data to generate user access distributions that quantify the distribution of a given user's requests to access applications over time.
Gautam Borah
Filed: 3 Apr 23
Utility
Software update distribution within a multi-tenant architecture
5 Sep 23
A multi-tenant system provides software-updating functionality that selectively updates tenant systems according to a number of different factors.
Manish Agarwal, Apoorva Deshpande, Chuanbo Zhang, Mohammad Rahimi
Filed: 28 Jun 21
Utility
Device risk level based on device metadata comparison
22 Aug 23
An authentication system determines a risk level for a client device impersonating a client device enrolled in authentication services by comparing device metadata for the impersonating client device to device metadata for the enrolled client device.
Stephen Woodward Lind
Filed: 25 Jul 22
Utility
Flexible Identity and Access Management Pipeline
17 Aug 23
A system and a method are disclosed for context-based verification flows for digital identity verification.
William J. Dawson, V, Thomas Abbott, Trevor Thompson, Jonathan R. Todd, Karl McGuinness
Filed: 17 Apr 23
Utility
Implementing Enhanced Computer Security Standard for Secure Cryptographic Key Storage Using a Software-based Keystore
3 Aug 23
A client device that is not originally compliant with a particular security standard (e.g., FIPS) is brought into compliance through the addition of a standard-compliant software-based cryptographic library.
Bidan Sinha, Kavitha Chandramohan, Helen Chen, Karthik Bhat, Fei Chen, Aakash Mehta, Thanh-Ha Nguyen
Filed: 1 Feb 22
Utility
Transparent Short-range Wireless Device Factor In a Multi-factor Authentication System
3 Aug 23
An authentication system supports multi-factor authentication (MFA) when authenticating the identity of a user.
Stephen Woodward Lind, Bidan Sinha, Karthik Bhat, Naveen Kumar Keerthy, Jintai He, Kavitha Chandramohan
Filed: 31 Jan 22