Patent | Date |
---|
Automatic audit logging of events in software applications performing regulatory workloads Grant 11,372,997 - Chari , et al. June 28, 2 | 2022-06-28 |
Automatic Generation Of Training Data For Anomaly Detection Using Other User's Data Samples App 20220121995 - Chari; Suresh N. ;   et al. | 2022-04-21 |
Automatic generation of training data for anomaly detection using other user's data samples Grant 11,227,232 - Chari , et al. January 18, 2 | 2022-01-18 |
Decentralized database identity management system Grant 11,178,151 - Singh , et al. November 16, 2 | 2021-11-16 |
Estimating asset sensitivity using information associated with users Grant 10,984,323 - Chari , et al. April 20, 2 | 2021-04-20 |
Estimating asset sensitivity using information associated with users Grant 10,984,322 - Chari , et al. April 20, 2 | 2021-04-20 |
Blockchain-based malware containment in a network resource Grant 10,979,452 - Kundu , et al. April 13, 2 | 2021-04-13 |
Privacy-preserving identity asset exchange Grant 10,944,560 - Chari , et al. March 9, 2 | 2021-03-09 |
Detecting malicious user activity Grant 10,891,371 - Chari , et al. January 12, 2 | 2021-01-12 |
Identity confidence score based on blockchain based attributes Grant 10,812,254 - Chari , et al. October 20, 2 | 2020-10-20 |
Automatic Audit Logging of Events in Software Applications Performing Regulatory Workloads App 20200210609 - Chari; Suresh N. ;   et al. | 2020-07-02 |
Decentralized Database Identity Management System App 20200204557 - Singh; Kapil Kumar ;   et al. | 2020-06-25 |
Identity Ecosystem App 20200184470 - Singh; Kapil Kumar ;   et al. | 2020-06-11 |
Automatic audit logging of events in software applications performing regulatory workloads Grant 10,628,600 - Chari , et al. | 2020-04-21 |
Enforcing access control in trigger-action programming using taint analysis Grant 10,609,044 - Andow , et al. | 2020-03-31 |
Blockchain-based Malware Containment In A Network Resource App 20200099698 - KUNDU; ASHISH ;   et al. | 2020-03-26 |
Detecting malicious user activity Grant 10,599,837 - Chari , et al. | 2020-03-24 |
Detecting Malicious User Activity App 20200042699 - Chari; Suresh N. ;   et al. | 2020-02-06 |
Privacy-preserving Identity Asset Exchange App 20200044848 - CHARI; SURESH N. ;   et al. | 2020-02-06 |
Identity Confidence Score Based On Blackchain Based Attributes App 20200036515 - CHARI; SURESH N. ;   et al. | 2020-01-30 |
Deep learning for targeted password generation with cognitive user information understanding Grant 10,540,490 - Chari , et al. Ja | 2020-01-21 |
Automatic generation of data-centric attack graphs Grant 10,503,911 - Chari , et al. Dec | 2019-12-10 |
Data-centric monitoring of compliance of distributed applications Grant 10,482,265 - Chari , et al. Nov | 2019-11-19 |
Preventing monoculture in application distribution Grant 10,419,224 - Chari , et al. Sept | 2019-09-17 |
Sanitizing virtualized composite services Grant 10,394,591 - Chari , et al. A | 2019-08-27 |
Sanitizing memory of cloud systems Grant 10,372,631 - Chari , et al. | 2019-08-06 |
Cognitive intelligence based voice authentication Grant 10,277,590 - Chari , et al. | 2019-04-30 |
Deep Learning for Targeted Password Generation with Cognitive User Information Understanding App 20190121953 - Chari; Suresh N. ;   et al. | 2019-04-25 |
Automatic Generation Of Training Data For Anomaly Detection Using Other User's Data Samples App 20190034836 - Chari; Suresh N. ;   et al. | 2019-01-31 |
Enforcing Access Control In Trigger-action Programming Using Taint Analysis App 20180359266 - ANDOW; BENJAMIN E. ;   et al. | 2018-12-13 |
Automatic generation of training data for anomaly detection using other user's data samples Grant 10,147,049 - Chari , et al. De | 2018-12-04 |
Automatic Generation of Data-Centric Attack Graphs App 20180330103 - Chari; Suresh N. ;   et al. | 2018-11-15 |
Automatic generation of data-centric attack graphs Grant 10,108,803 - Chari , et al. October 23, 2 | 2018-10-23 |
Online Audio Delivery Detection in Audio/Video Streaming Services App 20180246692 - Chari; Suresh N. ;   et al. | 2018-08-30 |
Sanitizing Memory Of Cloud Systems App 20180225227 - CHARI; SURESH N. ;   et al. | 2018-08-09 |
Cognitive Intelligence Based Voice Authentication App 20180205726 - Chari; Suresh N. ;   et al. | 2018-07-19 |
Sanitizing Virtualized Composite Services App 20180203890 - CHARI; SURESH N. ;   et al. | 2018-07-19 |
Automatic Audit Logging of Events in Software Applications Performing Regulatory Workloads App 20180196958 - Chari; Suresh N. ;   et al. | 2018-07-12 |
Automatic audit logging of events in software applications performing regulatory workloads Grant 10,007,801 - Chari , et al. June 26, 2 | 2018-06-26 |
Sanitization of virtual machine images Grant 9,881,168 - Chari , et al. January 30, 2 | 2018-01-30 |
Sanitization of vitual machine images Grant 9,881,167 - Chari , et al. January 30, 2 | 2018-01-30 |
Discovering communities and expertise of users using semantic analysis of resource access logs Grant 9,852,208 - Chari , et al. December 26, 2 | 2017-12-26 |
Network data collection and response system Grant 9,854,057 - Chari , et al. December 26, 2 | 2017-12-26 |
Preventing Monoculture in Application Distribution App 20170359181 - CHARI; Suresh N. ;   et al. | 2017-12-14 |
Automatic Audit Logging of Events in Software Applications Performing Regulatory Workloads App 20170308712 - Chari; Suresh N. ;   et al. | 2017-10-26 |
Detecting Malicious User Activity App 20170286671 - Chari; Suresh N. ;   et al. | 2017-10-05 |
Automatic Generation of Data-Centric Attack Graphs App 20170286690 - Chari; Suresh N. ;   et al. | 2017-10-05 |
Inferring security policies from semantic attributes Grant 9,769,208 - Chari , et al. September 19, 2 | 2017-09-19 |
Data-centric Monitoring Of Compliance Of Distributed Applications App 20170193239 - CHARI; Suresh N. ;   et al. | 2017-07-06 |
Correlating cognitive biometrics for continuous identify verification Grant 9,686,275 - Chari , et al. June 20, 2 | 2017-06-20 |
Identifying Transactional Fraud Utilizing Transaction Payment Relationship Graph Link Prediction App 20170140382 - CHARI; SURESH N. ;   et al. | 2017-05-18 |
Automatic Generation Of Training Data For Anomaly Detection Using Other User's Data Samples App 20170061322 - CHARI; Suresh N. ;   et al. | 2017-03-02 |
Detecting anomalous user behavior using generative models of user actions Grant 9,558,347 - Chari , et al. January 31, 2 | 2017-01-31 |
Scoring Transactional Fraud Using Features Of Transaction Payment Relationship Graphs App 20160364794 - Chari; Suresh N. ;   et al. | 2016-12-15 |
Inferring Security Policies from Semantic Attributes App 20160352778 - Chari; Suresh N. ;   et al. | 2016-12-01 |
Sanitization of Vitual Machine Images App 20160210461 - Chari; Suresh N. ;   et al. | 2016-07-21 |
Sanitization of Virtual Machine Images App 20160210462 - Chari; Suresh N. ;   et al. | 2016-07-21 |
Sanitization of virtual machine images Grant 9,355,257 - Chari , et al. May 31, 2 | 2016-05-31 |
Sanitization of virtual machine images Grant 9,355,256 - Chari , et al. May 31, 2 | 2016-05-31 |
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance Grant 9,288,232 - Chari , et al. March 15, 2 | 2016-03-15 |
Generation of attribute based access control policy from existing authorization system Grant 9,264,451 - Chari , et al. February 16, 2 | 2016-02-16 |
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance Grant 9,246,945 - Chari , et al. January 26, 2 | 2016-01-26 |
Correlating Cognitive Biometrics For Continuous Identify Verification App 20160006730 - Chari; Suresh N. ;   et al. | 2016-01-07 |
Network Data Collection And Response System App 20150326594 - Chari; Suresh N. ;   et al. | 2015-11-12 |
Detecting malicious circumvention of virtual private network Grant 9,185,121 - Chari , et al. November 10, 2 | 2015-11-10 |
Generating role-based access control policies based on discovered risk-averse roles Grant 9,137,263 - Chari , et al. September 15, 2 | 2015-09-15 |
Generating role-based access control policies based on discovered risk-averse roles Grant 9,137,265 - Chari , et al. September 15, 2 | 2015-09-15 |
Discovering Communities And Expertise Of Users Using Semantic Analysis Of Resource Access Logs App 20150242486 - Chari; Suresh N. ;   et al. | 2015-08-27 |
Detecting Malicious Circumvention Of Virtual Private Network App 20150188931 - Chari; Suresh N. ;   et al. | 2015-07-02 |
Generation Of Attribute Based Access Control Policy From Existing Authorization System App 20150082377 - Chari; Suresh N. ;   et al. | 2015-03-19 |
Role mining with user attribution using generative models Grant 8,983,877 - Chari , et al. March 17, 2 | 2015-03-17 |
Detecting Anomalous User Behavior Using Generative Models of User Actions App 20150067845 - Chari; Suresh N. ;   et al. | 2015-03-05 |
Detecting Anomalous User Behavior Using Generative Models of User Actions App 20150067835 - Chari; Suresh N. ;   et al. | 2015-03-05 |
Sanitization Of Virtual Machine Images App 20150033221 - Chari; Suresh N. ;   et al. | 2015-01-29 |
Sanitization Of Virtual Machine Images App 20150033223 - Chari; Suresh N. ;   et al. | 2015-01-29 |
Techniques for Reconciling Permission Usage with Security Policy for Policy Optimization and Monitoring Continuous Compliance App 20140359695 - Chari; Suresh N. ;   et al. | 2014-12-04 |
Techniques for Reconciling Permission Usage with Security Policy for Policy Optimization and Monitoring Continuous Compliance App 20140359692 - Chari; Suresh N. ;   et al. | 2014-12-04 |
Enabling authentication of OpenID user when requested identity provider is unavailable Grant 8,898,754 - Chari , et al. November 25, 2 | 2014-11-25 |
Estimating Asset Sensitivity Using Information Associated With Users App 20140304821 - Chari; Suresh N. ;   et al. | 2014-10-09 |
Estimating Asset Sensitivity Using Information Associated With Users App 20140304199 - Chari; Suresh N. ;   et al. | 2014-10-09 |
Generating Role-based Access Control Policies Based On Discovered Risk-averse Roles App 20140196104 - Chari; Suresh N. ;   et al. | 2014-07-10 |
Generating Role-based Access Control Policies Based On Discovered Risk-averse Roles App 20140196103 - Chari; Suresh N. ;   et al. | 2014-07-10 |
Techniques for Generating Balanced and Class-Independent Training Data From Unlabeled Data Set App 20130097103 - Chari; Suresh N. ;   et al. | 2013-04-18 |
Role Mining With User Attribution Using Generative Models App 20120246098 - Chari; Suresh N. ;   et al. | 2012-09-27 |
Virtualizing Human Agents Across Multiple Locations App 20120219144 - Acharya; Arup ;   et al. | 2012-08-30 |
Enabling authentication of openID user when requested identity provider is unavailable Grant 8,250,635 - Chari , et al. August 21, 2 | 2012-08-21 |
ENABLING AUTHENTICATION OF OpenID USER WHEN REQUESTED IDENTITY PROVIDER IS UNAVAILABLE App 20120210407 - Chari; Suresh N. ;   et al. | 2012-08-16 |
Method, apparatus and computer program product implementing session-specific URLs and resources Grant 8,028,072 - George , et al. September 27, 2 | 2011-09-27 |
Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks Grant 7,836,295 - Chari , et al. November 16, 2 | 2010-11-16 |
Enabling Authentication Of Openid User When Requested Identity Provider Is Unavailable App 20100011421 - Chari; Suresh N. ;   et al. | 2010-01-14 |
Method, Apparatus and Computer Program Product Implementing Session-Specific URLs and Resources App 20090222561 - George; David A. ;   et al. | 2009-09-03 |
Space-efficient, side-channel attack resistant table lookups Grant 7,142,670 - Chari , et al. November 28, 2 | 2006-11-28 |
Intrusion detection system App 20060161982 - Chari; Suresh N. ;   et al. | 2006-07-20 |
Cost effective incident response App 20050257269 - Chari, Suresh N. ;   et al. | 2005-11-17 |
Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks App 20040019781 - Chari, Suresh N. ;   et al. | 2004-01-29 |
Method and apparatus for single sign-on authentication App 20030226036 - Bivens, John A. ;   et al. | 2003-12-04 |
Space-efficient, side-channel attack resistant table lookups App 20030044003 - Chari, Suresh N. ;   et al. | 2003-03-06 |
Security model for interactive television applications Grant 6,148,081 - Szymanski , et al. November 14, 2 | 2000-11-14 |
Security model for sharing in interactive television applications Grant 6,038,319 - Chari March 14, 2 | 2000-03-14 |