loadpatents
name:-0.022879838943481
name:-0.027796983718872
name:-0.005263090133667
Lee; Wenke Patent Filings

Lee; Wenke

Patent Applications and Registrations

Patent applications and USPTO patent grants for Lee; Wenke.The latest application filed is for "privacy preserving face-based authentication".

Company Profile
5.26.20
  • Lee; Wenke - Atlanta GA
  • Lee; Wenke - New York NY
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Devices, systems, and methods of program identification, isolation, and profile attachment
Grant 11,036,479 - Duan , et al. June 15, 2
2021-06-15
Privacy Preserving Face-based Authentication
App 20210034729 - Chung; Pak Ho ;   et al.
2021-02-04
rtCaptcha: A Real-Time Captcha Based Liveness Detection System
App 20200097643 - Uzun; Erkam ;   et al.
2020-03-26
Devices, Systems, And Methods Of Program Identification, Isolation, And Profile Attachment
App 20200065074 - Duan; Ruian ;   et al.
2020-02-27
Systems and methods for using video for user and message authentication
Grant 10,476,888 - Chung , et al. Nov
2019-11-12
Method and system for detecting malware
Grant 10,257,212 - Antonakakis , et al.
2019-04-09
Methods and systems for detecting compromised computers
Grant 10,044,748 - Dagon , et al. August 7, 2
2018-08-07
Method and system for detecting malicious and/or botnet-related domain names
Grant 10,027,688 - Perdisci , et al. July 17, 2
2018-07-17
Method and system for network-based detecting of malware from behavioral clustering
Grant 9,948,671 - Perdisci , et al. April 17, 2
2018-04-17
Method and system for detecting DGA-based malware
Grant 9,922,190 - Antonakakis , et al. March 20, 2
2018-03-20
Systems and Methods for Using Video for User and Message Authentication
App 20170279815 - Chung; Simon Pak Ho ;   et al.
2017-09-28
Method And System For Detecting Malware
App 20170201536 - ANTONAKAKIS; Emmanouil ;   et al.
2017-07-13
Method and system for detecting malicious domain names at an upper DNS hierarchy
Grant 9,686,291 - Antonakakis , et al. June 20, 2
2017-06-20
Systems and methods of safeguarding user information while interacting with online service providers
Grant 9,659,189 - Lee , et al. May 23, 2
2017-05-23
Method and system for detecting malware
Grant 9,525,699 - Antonakakis , et al. December 20, 2
2016-12-20
Method and system for determining whether domain names are legitimate or malicious
Grant 9,516,058 - Antonakakis , et al. December 6, 2
2016-12-06
Methods And Systems For Detecting Compromised Computers
App 20160156660 - DAGON; David ;   et al.
2016-06-02
Method and systems for detecting compromised networks and/or computers
Grant 9,306,969 - Dagon , et al. April 5, 2
2016-04-05
Systems and methods for secure in-VM monitoring
Grant 9,129,106 - Sharif , et al. September 8, 2
2015-09-08
Systems And Methods Of Safeguarding User Information While Interacting With Online Service Providers
App 20150106614 - Lee; Wenke ;   et al.
2015-04-16
Method And System For Network-based Detecting Of Malware From Behavioral Clustering
App 20150026808 - PERDISCI; Roberto ;   et al.
2015-01-22
Method and system for network-based detecting of malware from behavioral clustering
Grant 8,826,438 - Perdisci , et al. September 2, 2
2014-09-02
Method And System For Detecting And Responding To Attacking Networks
App 20140245436 - DAGON; David ;   et al.
2014-08-28
Method And System For Detecting Malicious Domain Names At An Upper Dns Hierarchy
App 20140157414 - ANTONAKAKIS; Manos ;   et al.
2014-06-05
Method And System For Detecting Malware
App 20140101759 - ANTONAKAKIS; Emmanouil ;   et al.
2014-04-10
Method and system for detecting malicious domain names at an upper DNS hierarchy
Grant 8,631,489 - Antonakakis , et al. January 14, 2
2014-01-14
Method and system for detecting malware
Grant 8,578,497 - Antonakakis , et al. November 5, 2
2013-11-05
Method and system for detecting and responding to attacking networks
Grant 8,566,928 - Dagon , et al. October 22, 2
2013-10-22
Method And System For Detecting Dga-based Malware
App 20130191915 - ANTONAKAKIS; MANOS ;   et al.
2013-07-25
Systems And Methods For Secure In-vm Monitoring
App 20130091568 - Sharif; Monirul Islam ;   et al.
2013-04-11
Security Systems And Methods For Distinguishing User-intended Traffic From Malicious Traffic
App 20120240224 - Payne; Bryan Douglas ;   et al.
2012-09-20
Method And System For Detecting Malicious Domain Names At An Upper Dns Hierarchy
App 20120198549 - ANTONAKAKIS; Manos ;   et al.
2012-08-02
Method And System For Determining Whether Domain Names Are Legitimate Or Malicious
App 20120042381 - Antonakakis; Manos ;   et al.
2012-02-16
Method And System For Network-based Detecting Of Malware From Behavioral Clustering
App 20110283361 - Perdisci; Roberto ;   et al.
2011-11-17
Method And System For Detecting Malware
App 20110167495 - ANTONAKAKIS; Emmanouil ;   et al.
2011-07-07
Methods for cost-sensitive modeling for intrusion detection and response
Grant 7,818,797 - Fan , et al. October 19, 2
2010-10-19
Method And System For Detecting Malicious And/or Botnet-related Domain Names
App 20100037314 - PERDISCI; Roberto ;   et al.
2010-02-11
Method and system for using intelligent agents for financial transactions, services, accounting, and advice
Grant 5,920,848 - Schutzer , et al. July 6, 1
1999-07-06

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed