loadpatents
name:-0.011111974716187
name:-0.041790962219238
name:-0.0064461231231689
Lin; Derek Patent Filings

Lin; Derek

Patent Applications and Registrations

Patent applications and USPTO patent grants for Lin; Derek.The latest application filed is for "system, method, and computer program for automatically classifying user accounts in a computer network using keys from an identity management system".

Company Profile
7.47.10
  • Lin; Derek - San Mateo CA
  • Lin; Derek - Hsin Chu N/A TW
  • Lin; Derek - Hsinchu TW
  • Lin; Derek - Hsin-Chu City TW
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Detecting unmanaged and unauthorized assets in an information technology network with a recurrent neural network that identifies anomalously-named assets
Grant 11,431,741 - Lin , et al. August 30, 2
2022-08-30
Anomaly detection based on processes executed within a network
Grant 11,423,143 - Lin , et al. August 23, 2
2022-08-23
System, Method, And Computer Program For Automatically Classifying User Accounts In A Computer Network Using Keys From An Identity Management System
App 20220006814 - Lin; Derek ;   et al.
2022-01-06
Self-learning cybersecurity threat detection system, method, and computer program for multi-domain data
Grant 11,178,168 - Lin , et al. November 16, 2
2021-11-16
System, method, and computer program for automatically classifying user accounts in a computer network using keys from an identity management system
Grant 11,140,167 - Lin , et al. October 5, 2
2021-10-05
System, method, and computer program for detection of anomalous user network activity based on multiple data sources
Grant 10,944,777 - Lin , et al. March 9, 2
2021-03-09
Behavior analytics system for determining the cybersecurity risk associated with first-time, user-to-entity access alerts
Grant 10,887,325 - Lin , et al. January 5, 2
2021-01-05
Dynamic rule risk score determination in a cybersecurity monitoring system
Grant 10,841,338 - Lin , et al. November 17, 2
2020-11-17
System, Method, And Computer Program For Detection Of Anomalous User Network Activity Based On Multiple Data Sources
App 20200228557 - Lin; Derek ;   et al.
2020-07-16
System, method, and computer program for detection of anomalous user network activity based on multiple data sources
Grant 10,645,109 - Lin , et al.
2020-05-05
System, method, and computer program for classifying monitored assets based on user labels and for detecting potential misuse of monitored assets based on the classifications
Grant 10,496,815 - Steiman , et al. De
2019-12-03
Scalable predictive early warning system for data backup event log
Grant 10,417,072 - Fang , et al. Sept
2019-09-17
System, method, and computer program for automatically classifying user accounts in a computer network based on account behavior
Grant 10,178,108 - Lin , et al. J
2019-01-08
Scalable Predictive Early Warning System For Data Backup Event Log
App 20180095816 - Fang; Chunsheng ;   et al.
2018-04-05
Dynamic graph anomaly detection framework and scalable system architecture
Grant 9,898,604 - Fang , et al. February 20, 2
2018-02-20
Virtual machine capacity planning
Grant 9,858,106 - Kondaveeti , et al. January 2, 2
2018-01-02
Finding command and control center computers by communication link tracking
Grant 9,853,991 - Yu , et al. December 26, 2
2017-12-26
Scalable predictive early warning system for data backup event log
Grant 9,804,909 - Fang , et al. October 31, 2
2017-10-31
Recommendation system based approach in reducing false positives in anomaly detection
Grant 9,727,723 - Kondaveeti , et al. August 8, 2
2017-08-08
Detection of anomalous utility usage
Grant 9,535,917 - Lin January 3, 2
2017-01-03
Anomaly detection system for enterprise network security
Grant 9,503,469 - Lin November 22, 2
2016-11-22
Predicting data unavailability and data loss events in large database systems
Grant 9,489,379 - Wu , et al. November 8, 2
2016-11-08
Low false positive behavioral fraud detection
Grant 9,479,518 - Fang , et al. October 25, 2
2016-10-25
Analyzing device similarity
Grant 9,460,390 - Lin , et al. October 4, 2
2016-10-04
Detection of malware beaconing activities
Grant 9,369,479 - Lin June 14, 2
2016-06-14
Finding command and control center computers by communication link tracking
Grant 9,344,443 - Yu , et al. May 17, 2
2016-05-17
Finding command and control center computers by communication link tracking
Grant 9,344,442 - Yu , et al. May 17, 2
2016-05-17
Virtual Machine Capacity Planning
App 20160098291 - Kondaveeti; Anirudh ;   et al.
2016-04-07
Analyzing device similarity
Grant 9,292,793 - Lin , et al. March 22, 2
2016-03-22
Dynamic Graph Anomaly Detection Framework And Scalable System Architecture
App 20160048681 - Fang; Chunsheng ;   et al.
2016-02-18
Virtual machine capacity planning
Grant 9,244,711 - Kondaveeti , et al. January 26, 2
2016-01-26
Anomaly Detection System For Enterprise Network Security
App 20150381646 - Lin; Derek
2015-12-31
Dynamic graph anomaly detection framework and scalable system architecture
Grant 9,202,052 - Fang , et al. December 1, 2
2015-12-01
Graph-based method to detect malware command-and-control infrastructure
Grant 9,195,826 - Fang , et al. November 24, 2
2015-11-24
Historical behavior baseline modeling and anomaly detection in machine generated end to end event log
Grant 9,189,623 - Lin , et al. November 17, 2
2015-11-17
Detection Of Malware Beaconing Activities
App 20150304350 - Lin; Derek
2015-10-22
Anomaly detection system for enterprise network security
Grant 9,112,895 - Lin August 18, 2
2015-08-18
Finding command and control center computers by communication link tracking
Grant 9,060,018 - Yu , et al. June 16, 2
2015-06-16
Detection of malware beaconing activities
Grant 9,038,178 - Lin May 19, 2
2015-05-19
Authentication involving authentication operations which cross reference authentication factors
Grant 8,925,058 - Dotan , et al. December 30, 2
2014-12-30
Click stream analysis for fraud detection
Grant 8,880,441 - Chen , et al. November 4, 2
2014-11-04
Method for reducing topography of non-volatile memory and resulting memory cells
Grant 8,809,179 - Wang , et al. August 19, 2
2014-08-19
Access control via organization charts
Grant 8,479,302 - Lin July 2, 2
2013-07-02
Logic compatible storage device
Grant 7,514,740 - Hsu , et al. April 7, 2
2009-04-07
Program methods for split-gate memory
Grant 7,495,960 - Chih , et al. February 24, 2
2009-02-24
Program methods for split-gate memory
App 20080068887 - Chih; Yue-Der ;   et al.
2008-03-20
Logic compatible storage device
App 20080006868 - Hsu; Te-Hsun ;   et al.
2008-01-10
Method for reducing topography of non-volatile memory and resulting memory cells
App 20070241386 - Wang; Shih Wei ;   et al.
2007-10-18

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed