Okta Legal Patents

02 June 2025 Time to read: ~

Google PatentTitlePatent NumberProduct 1Product 2Product 3
LINKMetadata Based Platform for Accessing and Managing Multiple Heterogeneous Information ServicesUS8661084B1Universal LoginDeveloper ExperienceIdentity Control Plane
LINKMetadata Based Platform for Accessing and Managing Multiple Heterogeneous Information ServicesUS8965991B1Developer ExperienceUniversal LoginIdentity Control Plane
LINKUpdating Integration Metadata in a Multi-Tenant SystemUS8881129B1MarketplaceWorkflows 
LINKUpdating Integration Metadata in a SystemUS9146733B1MarketplaceWorkflows 
LINKSystems and Methods for Providing and Managing Distributed EnclavesUS9009858B2Identity Control PlaneDatabase Connections 
LINKExtensible Framework for Communicating over a Firewall with a Software Application Regarding a User AccountUS9191364B2Machine-to-MachineWorkforce 
LINKIntegration of Cloud Management Systems with On-Premise SystemsUS8839408B1Time-Based Access  
LINKIntegration of Cloud Management Systems with On-Premise SystemsUS9055031B1Workforce  
LINKFacilitating Single Sign-on to Software ApplicationsUS9548976B2Auth0  
LINKSecure Single Sign-on to Software ApplicationsUS10470040B2Auth0Okta Forms 
LINKAutomated Password Generation and ChangeUS9852286B2FastPassPasswordless 
LINKAutomated Password Generation and ChangeUS9916437B2Password Generation  
LINKAutomated Password Generation and ChangeUS10169569B2FastPassPasswordless 
LINKAutomated Password Generation and ChangeUS10762191B2Password Generation  
LINKMemory-Free Anomaly Detection for Risk Management SystemsUS11374919B2Contextual Access ManagementWorkflows 
LINKDual Domain Cloud Kerberos AuthenticationUS11689520B2Auth0  
LINKEfficient Generation of Identity Provider IntegrationsUS11431710B2Okta Integration NetworkAccess Management 
LINKEfficient Generation of Identity Provider Integrations11785011Okta Integration NetworkAccess Management 
LINKEfficient Generation of Identity Provider Integrations12095766Okta Integration NetworkAccess Management 
LINKProviding Flexible Service Access Using Identity Provider11689537Access ManagementIdentity GovernanceOkta Forms
LINKProviding Flexible Service Access Using Identity Provider12170676Access ManagementIdentity GovernanceOkta Forms
LINKEfficient Transfer of Authentication Credentials Between Client Devices11595214FastPassContextual Access Management 
LINKFactor Health Assessment And Selection For Login At An Identity Provider11677750Identity Control PlaneHealth Insight 
LINKFactor Health Assessment And Selection For Login At An Identity Provider12034722Identity Control PlaneHealth Insight 
LINKDynamically Analyzing Third-Party Application Website Certificates Across Users to Detect Malicious ActivityUS10999080B2Privileged Access  
LINKAccess to Federated Identities on a Shared Kiosk Computing Device11716316SSO  
LINKDigital Signature Injection for User Authentication Across Multiple Independent SystemsUS11533309B2Passwordless  
LINKAutomated Creation of Trusted Network Perimeter11765129Identity Control PlaneRisk EnginePolicy Recommender with Okta AI
LINKAutomated Creation of Trusted Network Perimeter11991148Identity Control PlaneRisk EnginePolicy Recommender with Okta AI
LINKAutomated Creation of Trusted Network Perimeter12206644Identity Control PlaneRisk EnginePolicy Recommender with Okta AI
LINKSecurity Guidance for Creation of Multi factor Authentication PolicyUS11477249B2Adaptive Multi-Factor AuthenticationActions 
LINKDigital Access Control Using Time-based Baseline Access Distributions11652837Contextual Access Management  
LINKDigital Access Control Using Time-based Baseline Access Distributions12309187Contextual Access Management  
LINKCell-Based Backup For Recovering From System Failures In A Multi-Tenant Computing System11700556SSO  
LINKFlexible Identity and Access Management Pipeline11631081Contextual Access Management  
LINKServer-Based Workflow Management Using Priorities12112203Attack ProtectionWorkflows 
LINKServer-Based Workflow Management Using Priorities12124880Attack ProtectionWorkflows 
LINKDevice Risk Level Based on Device Metadata ComparisonUS11457012B2Contextual Access ManagementFastPass 
LINKDevice Risk Level Based on Device Metadata Comparison11736480Contextual Access ManagementFastPass 
LINKDevice Risk Level Based on Device Metadata Comparison12149530Contextual Access ManagementFastPass 
LINKSecured User Credential ManagementUS10505980B2Attack ProtectionIdentity Threat Protection with Okta AIFastPass
LINKDetection and Repair of Broken Single Sign-On IntegrationUS10097533B2FastPassSSO 
LINKFlexible Implementation of User Lifecycle Events for Applications of an EnterpriseUS11153319B2Actions  
LINKLogin Proxy for Third-Party ApplicationsUS10257182B2Attack Protection  
LINKDetecting and Responding to Attempts to Gain Unauthorized Access to User Accounts in an Online System11012468Adaptive Multi-Factor Authentication  
LINKSoftware Update Distribution Within a Multi-Tenant Architecture11748087Device Assurance  
LINKFlexibly Obtaining Device Posture Signals in Multi-Tenant Authentication System12169545Identity Security Posture ManagementFastPass 
LINKDistribution of One-Time Passwords for Multi-Factor Authentication via Blockchain12101408Passwordless  
LINKComputer Network-Based Service for Generation and Installation of Digital Certificates of a Public Key Infrastructure Seamlessly Integrating with Multiple Mobile Device Management Systems12041450Okta Device Access  
LINKAuthentication Risk-Scoring in an Authentication System Based on User-Specific and Organization-Specific Risk Models12028327Multi-Factor AuthenticationAdaptive Multi-Factor AuthenticationRisk Engine
LINKTransparent Short-Range Wireless Device Factor in a Multi-Factor Authentication System11917087Multi-Factor AuthenticationOkta Device Access 
LINKTransparent Short-Range Wireless Device Factor in a Multi-Factor Authentication System12407531Multi-Factor AuthenticationOkta Device Access 
LINKRequest Processing System10685047Contextual Access Management  
LINKSystem for Routing of Requests11468105Contextual Access Management  
LINKSystem for Routing of Requests11928139Contextual Access Management  
LINKSystem for Routing of Requests12386870Contextual Access Management  
LINKDynamic Query Routing SystemUS10795886B1Role-Based Access Control  
LINKSystem for Determining and Modifying Deprecated Data EntriesUS10817483B1Role-Based Access Control  
LINKSystem for Handling Workplace Queries Using Online Learning to Rank11803556Organizations  
LINKPersonalized Search Based On Account AttributesUS11531707B1Organizations  
LINKSystem for Determining Document Portions That Correspond to QueriesUS11947915B1Actions  
LINKMulti-Tenancy via Code Encapsulated in Server Requests10516733Attack Protection  
LINKMulti-Tenancy via Code Encapsulated in Server Requests11622003Attack Protection  
LINKMulti-Tenancy via Code Encapsulated in Server Requests11582303Attack Protection  
LINKMulti-Tenancy via Code Encapsulated in Server Requests11968259Attack Protection  
LINKMulti-Tenancy via Code Encapsulated in Server Requests11736568Attack Protection  
LINKMulti-Tenancy via Code Encapsulated in Server Requests12170709Attack Protection  
LINKIdentity Infrastructure as a ServiceUS10225245B2Universal LoginWorkday 
LINKIdentity Infrastructure as a ServiceUS10225245B2Universal LoginWorkday 
LINKSystems and Methods for Provisioning and Decoupled Maintenance of Cloud-based Database Systems11693748Machine-to-Machine  
LINKSystems and Methods for Provisioning and Decoupled Maintenance of Cloud-based Database Systems12306727Machine-to-Machine  
LINKIntegration of Cloud-Based Services to Create Custom Business ProcessesUS9203707B1Actions  
LINKIntegration of Cloud-Based Services to Create Custom Business ProcessesUS10261677B2Actions  
LINKEngine for Modeling and Executing Custom Business Processes10445680Actions  
LINKIntegration Packaging for a Multi-Tenant Computing Environment11956232Okta Integration Network  
LINKTechniques For Credential And Identity Syncrhonization12423402Okta PersonalPasswordless 
LINKTechniques For Malicious Entity Discovery12294590Attack ProtectionRisk Engine 
LINKTechniques For Discounting Extensibility Latency12363016Auth0Machine-to-Machine 
LINKTechniques For Managing Software Agent Health12169447Health InsightOkta Identity Engine 
LINKTechniques For Detecting Command Injection Attacks12393687Attack ProtectionRisk Engine 
LINKPasskey Integration Techniques For Identity Management12250317PasswordlessFIDO2 (WebAuthn) 
LINKTechniques For Unifying Multiple Identity Clouds12445446Okta Integration NetworkMarketplaceMachine-to-Machine
LINKTechniques For Unifying Multiple Identity Clouds12445449Okta Integration NetworkMarketplaceMachine-to-Machine
LINKTechniques For Dynamically Adjusting Authenticator Assurance Levels12407687PasswordlessMulti-Factor AuthenticationOkta Device Access
LINKCaller Process Verification For Device-Bound Authenticators12445302Machine-to-MachineOkta Integration Network 
LINKTechniques For Binding Tokens To A Device And Collecting Device Posture Signals12388645Passwordless  
LINKUniversal Reporting Using Natural Language Queries12248466Identity GovernanceReporting 
LINKTechniques For Dynamically Translating Fields Using A Generative Language Model12417094Developer Experience  
LINKTechniques For Mapping A Smart Card To Multiple User Personas12418525Smart Card  
LINKUsing Contextual Security Challenges To Prevent Bot Attacks12462052Attack ProtectionAdaptive Multi-Factor Authentication 
LINKEstablishing Sessions Via A Proxy Service12463810Okta Privileged AccessUniversal Logout 
LINKFine-Grained Authorization As A Service Via Relationship- Based Access Control Within A Multi-Tenant System12443741Fine Grained AuthorizationRole-Based Access Control