loadpatents
name:-0.061731100082397
name:-0.050534009933472
name:-0.027030944824219
Chari; Suresh N. Patent Filings

Chari; Suresh N.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Chari; Suresh N..The latest application filed is for "automatic generation of training data for anomaly detection using other user's data samples".

Company Profile
25.47.55
  • Chari; Suresh N. - Westchester NY
  • Chari; Suresh N. - Yorktown Heights NY
  • Chari; Suresh N. - Tarrytown NY
  • Chari; Suresh N. - Scarsdale NY
  • Chari; Suresh N. - Terrytown NY
  • Chari; Suresh N. - Elmsford NY
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Automatic audit logging of events in software applications performing regulatory workloads
Grant 11,372,997 - Chari , et al. June 28, 2
2022-06-28
Automatic Generation Of Training Data For Anomaly Detection Using Other User's Data Samples
App 20220121995 - Chari; Suresh N. ;   et al.
2022-04-21
Automatic generation of training data for anomaly detection using other user's data samples
Grant 11,227,232 - Chari , et al. January 18, 2
2022-01-18
Decentralized database identity management system
Grant 11,178,151 - Singh , et al. November 16, 2
2021-11-16
Estimating asset sensitivity using information associated with users
Grant 10,984,323 - Chari , et al. April 20, 2
2021-04-20
Estimating asset sensitivity using information associated with users
Grant 10,984,322 - Chari , et al. April 20, 2
2021-04-20
Blockchain-based malware containment in a network resource
Grant 10,979,452 - Kundu , et al. April 13, 2
2021-04-13
Privacy-preserving identity asset exchange
Grant 10,944,560 - Chari , et al. March 9, 2
2021-03-09
Detecting malicious user activity
Grant 10,891,371 - Chari , et al. January 12, 2
2021-01-12
Identity confidence score based on blockchain based attributes
Grant 10,812,254 - Chari , et al. October 20, 2
2020-10-20
Automatic Audit Logging of Events in Software Applications Performing Regulatory Workloads
App 20200210609 - Chari; Suresh N. ;   et al.
2020-07-02
Decentralized Database Identity Management System
App 20200204557 - Singh; Kapil Kumar ;   et al.
2020-06-25
Identity Ecosystem
App 20200184470 - Singh; Kapil Kumar ;   et al.
2020-06-11
Automatic audit logging of events in software applications performing regulatory workloads
Grant 10,628,600 - Chari , et al.
2020-04-21
Enforcing access control in trigger-action programming using taint analysis
Grant 10,609,044 - Andow , et al.
2020-03-31
Blockchain-based Malware Containment In A Network Resource
App 20200099698 - KUNDU; ASHISH ;   et al.
2020-03-26
Detecting malicious user activity
Grant 10,599,837 - Chari , et al.
2020-03-24
Detecting Malicious User Activity
App 20200042699 - Chari; Suresh N. ;   et al.
2020-02-06
Privacy-preserving Identity Asset Exchange
App 20200044848 - CHARI; SURESH N. ;   et al.
2020-02-06
Identity Confidence Score Based On Blackchain Based Attributes
App 20200036515 - CHARI; SURESH N. ;   et al.
2020-01-30
Deep learning for targeted password generation with cognitive user information understanding
Grant 10,540,490 - Chari , et al. Ja
2020-01-21
Automatic generation of data-centric attack graphs
Grant 10,503,911 - Chari , et al. Dec
2019-12-10
Data-centric monitoring of compliance of distributed applications
Grant 10,482,265 - Chari , et al. Nov
2019-11-19
Preventing monoculture in application distribution
Grant 10,419,224 - Chari , et al. Sept
2019-09-17
Sanitizing virtualized composite services
Grant 10,394,591 - Chari , et al. A
2019-08-27
Sanitizing memory of cloud systems
Grant 10,372,631 - Chari , et al.
2019-08-06
Cognitive intelligence based voice authentication
Grant 10,277,590 - Chari , et al.
2019-04-30
Deep Learning for Targeted Password Generation with Cognitive User Information Understanding
App 20190121953 - Chari; Suresh N. ;   et al.
2019-04-25
Automatic Generation Of Training Data For Anomaly Detection Using Other User's Data Samples
App 20190034836 - Chari; Suresh N. ;   et al.
2019-01-31
Enforcing Access Control In Trigger-action Programming Using Taint Analysis
App 20180359266 - ANDOW; BENJAMIN E. ;   et al.
2018-12-13
Automatic generation of training data for anomaly detection using other user's data samples
Grant 10,147,049 - Chari , et al. De
2018-12-04
Automatic Generation of Data-Centric Attack Graphs
App 20180330103 - Chari; Suresh N. ;   et al.
2018-11-15
Automatic generation of data-centric attack graphs
Grant 10,108,803 - Chari , et al. October 23, 2
2018-10-23
Online Audio Delivery Detection in Audio/Video Streaming Services
App 20180246692 - Chari; Suresh N. ;   et al.
2018-08-30
Sanitizing Memory Of Cloud Systems
App 20180225227 - CHARI; SURESH N. ;   et al.
2018-08-09
Cognitive Intelligence Based Voice Authentication
App 20180205726 - Chari; Suresh N. ;   et al.
2018-07-19
Sanitizing Virtualized Composite Services
App 20180203890 - CHARI; SURESH N. ;   et al.
2018-07-19
Automatic Audit Logging of Events in Software Applications Performing Regulatory Workloads
App 20180196958 - Chari; Suresh N. ;   et al.
2018-07-12
Automatic audit logging of events in software applications performing regulatory workloads
Grant 10,007,801 - Chari , et al. June 26, 2
2018-06-26
Sanitization of virtual machine images
Grant 9,881,168 - Chari , et al. January 30, 2
2018-01-30
Sanitization of vitual machine images
Grant 9,881,167 - Chari , et al. January 30, 2
2018-01-30
Discovering communities and expertise of users using semantic analysis of resource access logs
Grant 9,852,208 - Chari , et al. December 26, 2
2017-12-26
Network data collection and response system
Grant 9,854,057 - Chari , et al. December 26, 2
2017-12-26
Preventing Monoculture in Application Distribution
App 20170359181 - CHARI; Suresh N. ;   et al.
2017-12-14
Automatic Audit Logging of Events in Software Applications Performing Regulatory Workloads
App 20170308712 - Chari; Suresh N. ;   et al.
2017-10-26
Detecting Malicious User Activity
App 20170286671 - Chari; Suresh N. ;   et al.
2017-10-05
Automatic Generation of Data-Centric Attack Graphs
App 20170286690 - Chari; Suresh N. ;   et al.
2017-10-05
Inferring security policies from semantic attributes
Grant 9,769,208 - Chari , et al. September 19, 2
2017-09-19
Data-centric Monitoring Of Compliance Of Distributed Applications
App 20170193239 - CHARI; Suresh N. ;   et al.
2017-07-06
Correlating cognitive biometrics for continuous identify verification
Grant 9,686,275 - Chari , et al. June 20, 2
2017-06-20
Identifying Transactional Fraud Utilizing Transaction Payment Relationship Graph Link Prediction
App 20170140382 - CHARI; SURESH N. ;   et al.
2017-05-18
Automatic Generation Of Training Data For Anomaly Detection Using Other User's Data Samples
App 20170061322 - CHARI; Suresh N. ;   et al.
2017-03-02
Detecting anomalous user behavior using generative models of user actions
Grant 9,558,347 - Chari , et al. January 31, 2
2017-01-31
Scoring Transactional Fraud Using Features Of Transaction Payment Relationship Graphs
App 20160364794 - Chari; Suresh N. ;   et al.
2016-12-15
Inferring Security Policies from Semantic Attributes
App 20160352778 - Chari; Suresh N. ;   et al.
2016-12-01
Sanitization of Vitual Machine Images
App 20160210461 - Chari; Suresh N. ;   et al.
2016-07-21
Sanitization of Virtual Machine Images
App 20160210462 - Chari; Suresh N. ;   et al.
2016-07-21
Sanitization of virtual machine images
Grant 9,355,257 - Chari , et al. May 31, 2
2016-05-31
Sanitization of virtual machine images
Grant 9,355,256 - Chari , et al. May 31, 2
2016-05-31
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance
Grant 9,288,232 - Chari , et al. March 15, 2
2016-03-15
Generation of attribute based access control policy from existing authorization system
Grant 9,264,451 - Chari , et al. February 16, 2
2016-02-16
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance
Grant 9,246,945 - Chari , et al. January 26, 2
2016-01-26
Correlating Cognitive Biometrics For Continuous Identify Verification
App 20160006730 - Chari; Suresh N. ;   et al.
2016-01-07
Network Data Collection And Response System
App 20150326594 - Chari; Suresh N. ;   et al.
2015-11-12
Detecting malicious circumvention of virtual private network
Grant 9,185,121 - Chari , et al. November 10, 2
2015-11-10
Generating role-based access control policies based on discovered risk-averse roles
Grant 9,137,263 - Chari , et al. September 15, 2
2015-09-15
Generating role-based access control policies based on discovered risk-averse roles
Grant 9,137,265 - Chari , et al. September 15, 2
2015-09-15
Discovering Communities And Expertise Of Users Using Semantic Analysis Of Resource Access Logs
App 20150242486 - Chari; Suresh N. ;   et al.
2015-08-27
Detecting Malicious Circumvention Of Virtual Private Network
App 20150188931 - Chari; Suresh N. ;   et al.
2015-07-02
Generation Of Attribute Based Access Control Policy From Existing Authorization System
App 20150082377 - Chari; Suresh N. ;   et al.
2015-03-19
Role mining with user attribution using generative models
Grant 8,983,877 - Chari , et al. March 17, 2
2015-03-17
Detecting Anomalous User Behavior Using Generative Models of User Actions
App 20150067845 - Chari; Suresh N. ;   et al.
2015-03-05
Detecting Anomalous User Behavior Using Generative Models of User Actions
App 20150067835 - Chari; Suresh N. ;   et al.
2015-03-05
Sanitization Of Virtual Machine Images
App 20150033221 - Chari; Suresh N. ;   et al.
2015-01-29
Sanitization Of Virtual Machine Images
App 20150033223 - Chari; Suresh N. ;   et al.
2015-01-29
Techniques for Reconciling Permission Usage with Security Policy for Policy Optimization and Monitoring Continuous Compliance
App 20140359695 - Chari; Suresh N. ;   et al.
2014-12-04
Techniques for Reconciling Permission Usage with Security Policy for Policy Optimization and Monitoring Continuous Compliance
App 20140359692 - Chari; Suresh N. ;   et al.
2014-12-04
Enabling authentication of OpenID user when requested identity provider is unavailable
Grant 8,898,754 - Chari , et al. November 25, 2
2014-11-25
Estimating Asset Sensitivity Using Information Associated With Users
App 20140304821 - Chari; Suresh N. ;   et al.
2014-10-09
Estimating Asset Sensitivity Using Information Associated With Users
App 20140304199 - Chari; Suresh N. ;   et al.
2014-10-09
Generating Role-based Access Control Policies Based On Discovered Risk-averse Roles
App 20140196104 - Chari; Suresh N. ;   et al.
2014-07-10
Generating Role-based Access Control Policies Based On Discovered Risk-averse Roles
App 20140196103 - Chari; Suresh N. ;   et al.
2014-07-10
Techniques for Generating Balanced and Class-Independent Training Data From Unlabeled Data Set
App 20130097103 - Chari; Suresh N. ;   et al.
2013-04-18
Role Mining With User Attribution Using Generative Models
App 20120246098 - Chari; Suresh N. ;   et al.
2012-09-27
Virtualizing Human Agents Across Multiple Locations
App 20120219144 - Acharya; Arup ;   et al.
2012-08-30
Enabling authentication of openID user when requested identity provider is unavailable
Grant 8,250,635 - Chari , et al. August 21, 2
2012-08-21
ENABLING AUTHENTICATION OF OpenID USER WHEN REQUESTED IDENTITY PROVIDER IS UNAVAILABLE
App 20120210407 - Chari; Suresh N. ;   et al.
2012-08-16
Method, apparatus and computer program product implementing session-specific URLs and resources
Grant 8,028,072 - George , et al. September 27, 2
2011-09-27
Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks
Grant 7,836,295 - Chari , et al. November 16, 2
2010-11-16
Enabling Authentication Of Openid User When Requested Identity Provider Is Unavailable
App 20100011421 - Chari; Suresh N. ;   et al.
2010-01-14
Method, Apparatus and Computer Program Product Implementing Session-Specific URLs and Resources
App 20090222561 - George; David A. ;   et al.
2009-09-03
Space-efficient, side-channel attack resistant table lookups
Grant 7,142,670 - Chari , et al. November 28, 2
2006-11-28
Intrusion detection system
App 20060161982 - Chari; Suresh N. ;   et al.
2006-07-20
Cost effective incident response
App 20050257269 - Chari, Suresh N. ;   et al.
2005-11-17
Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks
App 20040019781 - Chari, Suresh N. ;   et al.
2004-01-29
Method and apparatus for single sign-on authentication
App 20030226036 - Bivens, John A. ;   et al.
2003-12-04
Space-efficient, side-channel attack resistant table lookups
App 20030044003 - Chari, Suresh N. ;   et al.
2003-03-06
Security model for interactive television applications
Grant 6,148,081 - Szymanski , et al. November 14, 2
2000-11-14
Security model for sharing in interactive television applications
Grant 6,038,319 - Chari March 14, 2
2000-03-14

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed