loadpatents
name:-0.038655996322632
name:-0.031219959259033
name:-0.0056939125061035
Cheng; Pau-Chen Patent Filings

Cheng; Pau-Chen

Patent Applications and Registrations

Patent applications and USPTO patent grants for Cheng; Pau-Chen.The latest application filed is for "device discovery and classification from encrypted network traffic".

Company Profile
5.31.29
  • Cheng; Pau-Chen - Yorktown Heights NY
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Device discovery and classification from encrypted network traffic
Grant 11,455,569 - Valdez , et al. September 27, 2
2022-09-27
Carbon nanotube physical entropy source
Grant 10,944,556 - Cheng , et al. March 9, 2
2021-03-09
Device Discovery And Classification From Encrypted Network Traffic
App 20200219005 - Valdez; Enriquillo ;   et al.
2020-07-09
System and method to provide server control for access to mobile client data
Grant 10,375,116 - Cheng , et al.
2019-08-06
Carbon Nanotube Physical Entropy Source
App 20190190712 - Cheng; Pau-Chen ;   et al.
2019-06-20
Carbon nanotube physical entropy source
Grant 10,225,082 - Cheng , et al.
2019-03-05
Suppression of authorization risk feedback to mitigate risk factor manipulation in an authorization system
Grant 10,091,181 - Cheng , et al. October 2, 2
2018-10-02
Carbon Nanotube Physical Entropy Source
App 20180034629 - Cheng; Pau-Chen ;   et al.
2018-02-01
Network data collection and response system
Grant 9,854,057 - Chari , et al. December 26, 2
2017-12-26
Adaptive behavior profiling and anomaly scoring through continuous learning
Grant 9,807,105 - Cheng , et al. October 31, 2
2017-10-31
Suppression of authorization risk feedback to mitigate risk factor manipulation in an authorization system
Grant 9,781,095 - Cheng , et al. October 3, 2
2017-10-03
Suppression Of Authorization Risk Feedback To Mitigate Risk Factor Manipulation In An Authorization System
App 20170279787 - Cheng; Pau-Chen ;   et al.
2017-09-28
System and method to provide server control for access to mobile client data
Grant 9,712,565 - Cheng , et al. July 18, 2
2017-07-18
System And Method To Provide Server Control For Access To Mobile Client Data
App 20170180332 - Cheng; Pau-Chen ;   et al.
2017-06-22
Suppression Of Authorization Risk Feedback To Mitigate Risk Factor Manipulation In An Authorization System
App 20170180339 - Cheng; Pau-Chen ;   et al.
2017-06-22
Correlating cognitive biometrics for continuous identify verification
Grant 9,686,275 - Chari , et al. June 20, 2
2017-06-20
Adaptive Behavior Profiling And Anomaly Scoring Through Continuous Learning
App 20170134412 - CHENG; PAU-CHEN ;   et al.
2017-05-11
System and method to provide server control for access to mobile client data
Grant 9,594,921 - Cheng , et al. March 14, 2
2017-03-14
Risk adaptive information flow based access control
Grant 9,582,674 - Cheng , et al. February 28, 2
2017-02-28
System And Method To Provide Server Control For Access To Mobile Client Data
App 20160323321 - Cheng; Pau-Chen ;   et al.
2016-11-03
Trust/value/risk-based access control policy
Grant 9,432,375 - Cheng , et al. August 30, 2
2016-08-30
System and method to provide server control for access to mobile client data
Grant 9,396,352 - Cheng , et al. July 19, 2
2016-07-19
Correlating Cognitive Biometrics For Continuous Identify Verification
App 20160006730 - Chari; Suresh N. ;   et al.
2016-01-07
System And Method To Provide Server Control For Access To Mobile Client Data
App 20150339489 - Cheng; Pau-Chen ;   et al.
2015-11-26
Network Data Collection And Response System
App 20150326594 - Chari; Suresh N. ;   et al.
2015-11-12
System and method to provide server control for access to mobile client data
Grant 9,135,465 - Cheng , et al. September 15, 2
2015-09-15
Trust/value/risk-based Access Control Policy
App 20150106888 - Cheng; Pau-Chen ;   et al.
2015-04-16
Risk Adaptive Information Flow Based Access Control
App 20140101753 - Cheng; Pau-Chen ;   et al.
2014-04-10
Risk adaptive information flow based access control
Grant 8,650,623 - Cheng , et al. February 11, 2
2014-02-11
Policy evolution with machine learning
Grant 8,606,724 - Cheng , et al. December 10, 2
2013-12-10
System And Method To Provide Server Control For Access To Mobile Client Data
App 20130232542 - Cheng; Pau-Chen ;   et al.
2013-09-05
System And Method To Provide Server Control For Access To Mobile Client Data
App 20130232543 - Cheng; Pau-Chen ;   et al.
2013-09-05
System and method for security planning with hard security constraints
Grant 8,276,192 - Anderson , et al. September 25, 2
2012-09-25
System and method for security planning with soft security constraints
Grant 8,132,259 - Anderson , et al. March 6, 2
2012-03-06
Method of managing and mitigating security risks through planning
Grant 8,099,781 - Anderson , et al. January 17, 2
2012-01-17
Fuzzy multi-level security
Grant 8,087,090 - Cheng , et al. December 27, 2
2011-12-27
Risk Adaptive Information Flow Based Access Control
App 20110173084 - Cheng; Pau-Chen ;   et al.
2011-07-14
Policy Evolution With Machine Learning
App 20100332422 - Cheng; Pau-Chen ;   et al.
2010-12-30
Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks
Grant 7,836,295 - Chari , et al. November 16, 2
2010-11-16
Method of managing and mitigating security risks through planning
Grant 7,832,007 - Anderson , et al. November 9, 2
2010-11-09
Method of Managing and Mitigating Security Risks Through Planning
App 20090282487 - Anderson; Kay S. ;   et al.
2009-11-12
System and method for fuzzy multi-level security
Grant 7,530,110 - Cheng , et al. May 5, 2
2009-05-05
System And Method For Security Planning With Hard Security Constraints
App 20090055890 - Anderson; Kay Schwendimann ;   et al.
2009-02-26
System And Method For Fuzzy Multi-level Security
App 20080263662 - Cheng; Pau-Chen ;   et al.
2008-10-23
System And Method For Security Planning With Soft Security Constraints
App 20080168529 - Anderson; Kay Schwendimann ;   et al.
2008-07-10
System and method for security planning with hard security constraints
App 20080016547 - Anderson; Kay Schwendimann ;   et al.
2008-01-17
Method of managing and mitigating security risks through planning
App 20070162976 - Anderson; Kay W. ;   et al.
2007-07-12
System and method for fuzzy multi-level security
App 20060253709 - Cheng; Pau-Chen ;   et al.
2006-11-09
Intrusion detection system
App 20060161982 - Chari; Suresh N. ;   et al.
2006-07-20
Cost effective incident response
App 20050257269 - Chari, Suresh N. ;   et al.
2005-11-17
Virtual private network with multiple tunnels associated with one group name
Grant 6,823,462 - Cheng , et al. November 23, 2
2004-11-23
Method and apparatus for automatic configuration for internet protocol security tunnels in a distributed data processing system
Grant 6,738,909 - Cheng , et al. May 18, 2
2004-05-18
Method and apparatus for improving the resilience of content distribution networks to distributed denial of service attacks
App 20040019781 - Chari, Suresh N. ;   et al.
2004-01-29
System and method for policy-based inter-realm authentication within a distributed processing system
Grant 5,544,322 - Cheng , et al. August 6, 1
1996-08-06

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed