loadpatents
name:-0.01124095916748
name:-0.0081851482391357
name:-0.0010650157928467
Kim; Nathaniel Wook Patent Filings

Kim; Nathaniel Wook

Patent Applications and Registrations

Patent applications and USPTO patent grants for Kim; Nathaniel Wook.The latest application filed is for "method of operating an intrusion detection system".

Company Profile
0.7.8
  • Kim; Nathaniel Wook - Raleigh NC
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Correlating network information and intrusion information to find the entry point of an attack upon a protected computer
Grant 7,845,004 - Bardsley , et al. November 30, 2
2010-11-30
Control of port based authentication protocols and process to support transfer of connection information
Grant 7,818,580 - Bardsley , et al. October 19, 2
2010-10-19
Method of operating an intrusion detection system
Grant 7,730,537 - Bardsley , et al. June 1, 2
2010-06-01
Method Of Operating An Intrusion Detection System
App 20080077989 - Bardsley; Jeffrey Scott ;   et al.
2008-03-27
Limiting the output of alerts generated by an intrusion detection sensor during a denial of service attack
Grant 7,308,714 - Bardsley , et al. December 11, 2
2007-12-11
Fail-safe network authentication
App 20070157308 - Bardsley; Jeffrey Scott ;   et al.
2007-07-05
Control of port based authentication protocols and process to support transfer of connection information
App 20070038866 - Bardsley; Jeffrey Scott ;   et al.
2007-02-15
Intrusion detection method and signature table
Grant 7,150,043 - Brock , et al. December 12, 2
2006-12-12
Method of operating an intrusion detection system according to a set of business rules
Grant 7,036,148 - Brook , et al. April 25, 2
2006-04-25
Dynamic intrusion detection for computer systems
Grant 6,928,549 - Brock , et al. August 9, 2
2005-08-09
Intrusion detection method and signature table
App 20030110393 - Brock, Ashley Anderson ;   et al.
2003-06-12
Limiting the output of alerts generated by an intrusion detection sensor during a denial of service attack
App 20030061514 - Bardsley, Jeffrey Scott ;   et al.
2003-03-27
Correlating network information and intrusion information to find the entry point of an attack upon a protected computer
App 20030023876 - Bardsley, Jeffrey Scott ;   et al.
2003-01-30
Dynamic intrusion detection for computer systems
App 20030009693 - Brock, Ashley Anderson ;   et al.
2003-01-09
Method of operating an intrusion detection system according to a set of business rules
App 20020169982 - Brock, Ashley Anderson ;   et al.
2002-11-14

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed