loadpatents
name:-0.039529085159302
name:-0.033204793930054
name:-0.023910999298096
Molloy; Ian M. Patent Filings

Molloy; Ian M.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Molloy; Ian M..The latest application filed is for "privacy enhancing deep learning cloud service using a trusted execution environment".

Company Profile
26.32.39
  • Molloy; Ian M. - Chappaqua NY
  • Molloy; Ian M. - Westchester NY
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Privacy enhancing deep learning cloud service using a trusted execution environment
Grant 11,443,182 - Gu , et al. September 13, 2
2022-09-13
Deep neural network hardening framework
Grant 11,443,178 - Edwards , et al. September 13, 2
2022-09-13
Privacy Enhancing Deep Learning Cloud Service Using a Trusted Execution Environment
App 20220269942 - Gu; Zhongshu ;   et al.
2022-08-25
Self-learning peer group analysis for optimizing identity and access management environments
Grant 11,416,771 - Patil , et al. August 16, 2
2022-08-16
Recurrent Neural Network Based Anomaly Detection
App 20220207137 - Huang; Heqing ;   et al.
2022-06-30
Automatic audit logging of events in software applications performing regulatory workloads
Grant 11,372,997 - Chari , et al. June 28, 2
2022-06-28
Recurrent neural network based anomaly detection
Grant 11,301,563 - Huang , et al. April 12, 2
2022-04-12
Protecting Cognitive Systems from Model Stealing Attacks
App 20210303703 - Lee; Taesung ;   et al.
2021-09-30
Using gradients to detect backdoors in neural networks
Grant 11,132,444 - Carvalho , et al. September 28, 2
2021-09-28
Protecting cognitive systems from model stealing attacks
Grant 11,023,593 - Lee , et al. June 1, 2
2021-06-01
Self-Learning Peer Group Analysis for Optimizing Identity and Access Management Environments
App 20210142209 - Patil; Priti P. ;   et al.
2021-05-13
Detecting malicious user activity
Grant 10,891,371 - Chari , et al. January 12, 2
2021-01-12
Jointly discovering user roles and data clusters using both access and side information
Grant 10,805,308 - Park , et al. October 13, 2
2020-10-13
Recurrent Neural Network Based Anomaly Detection
App 20200293653 - Huang; Heqing ;   et al.
2020-09-17
Automatic Audit Logging of Events in Software Applications Performing Regulatory Workloads
App 20200210609 - Chari; Suresh N. ;   et al.
2020-07-02
Protecting cognitive systems from gradient based attacks through the use of deceiving gradients
Grant 10,657,259 - Lee , et al.
2020-05-19
Automatic audit logging of events in software applications performing regulatory workloads
Grant 10,628,600 - Chari , et al.
2020-04-21
Detecting malicious user activity
Grant 10,599,837 - Chari , et al.
2020-03-24
Verifiable Deep Learning Training Service
App 20200082270 - Gu; Zhongshu ;   et al.
2020-03-12
Enhancing Data Privacy in Remote Deep Learning Services
App 20200082272 - Gu; Zhongshu ;   et al.
2020-03-12
Detecting Malicious User Activity
App 20200042699 - Chari; Suresh N. ;   et al.
2020-02-06
Deep learning for targeted password generation with cognitive user information understanding
Grant 10,540,490 - Chari , et al. Ja
2020-01-21
Adversarial learning of privacy protection layers for image recognition services
Grant 10,535,120 - Edwards , et al. Ja
2020-01-14
Privacy Enhancing Deep Learning Cloud Service Using a Trusted Execution Environment
App 20190392305 - Gu; Zhongshu ;   et al.
2019-12-26
Automatic generation of data-centric attack graphs
Grant 10,503,911 - Chari , et al. Dec
2019-12-10
Data-centric monitoring of compliance of distributed applications
Grant 10,482,265 - Chari , et al. Nov
2019-11-19
Using Gradients to Detect Backdoors in Neural Networks
App 20190318099 - Carvalho; Wilka ;   et al.
2019-10-17
Preventing monoculture in application distribution
Grant 10,419,224 - Chari , et al. Sept
2019-09-17
Dynamic multi-factor authentication challenge generation
Grant 10,375,119 - Aronowitz , et al.
2019-08-06
Clustering for detection of anomalous behavior and insider threat
Grant 10,341,372 - Chari , et al.
2019-07-02
Jointly Discovering User Roles And Data Clusters Using Both Access And Side Information
App 20190199731 - Park; Youngja ;   et al.
2019-06-27
Deep Neural Network Hardening Framework
App 20190188562 - Edwards; Benjamin J. ;   et al.
2019-06-20
Adversarial Learning of Privacy Protection Layers for Image Recognition Services
App 20190188830 - Edwards; Benjamin J. ;   et al.
2019-06-20
Protecting Cognitive Systems from Gradient Based Attacks through the Use of Deceiving Gradients
App 20190130110 - Lee; Taesung ;   et al.
2019-05-02
Protection and verification of user authentication credentials against server compromise
Grant 10,277,591 - Koved , et al.
2019-04-30
Deep Learning for Targeted Password Generation with Cognitive User Information Understanding
App 20190121953 - Chari; Suresh N. ;   et al.
2019-04-25
Protecting Cognitive Systems from Model Stealing Attacks
App 20190095629 - Lee; Taesung ;   et al.
2019-03-28
Clustering for Detection of Anomalous Behavior and Insider Threat
App 20180359270 - Chari; Suresh ;   et al.
2018-12-13
Automatic Generation of Data-Centric Attack Graphs
App 20180330103 - Chari; Suresh N. ;   et al.
2018-11-15
Protection and Verification of User Authentication Credentials against Server Compromise
App 20180316666 - Koved; Lawrence ;   et al.
2018-11-01
Automatic generation of data-centric attack graphs
Grant 10,108,803 - Chari , et al. October 23, 2
2018-10-23
Protection and verification of user authentication credentials against server compromise
Grant 10,097,544 - Koved , et al. October 9, 2
2018-10-09
Automatic Audit Logging of Events in Software Applications Performing Regulatory Workloads
App 20180196958 - Chari; Suresh N. ;   et al.
2018-07-12
Automatic audit logging of events in software applications performing regulatory workloads
Grant 10,007,801 - Chari , et al. June 26, 2
2018-06-26
Dynamic Multi-Factor Authentication Challenge Generation
App 20180034859 - Aronowitz; Hagai ;   et al.
2018-02-01
Discovering communities and expertise of users using semantic analysis of resource access logs
Grant 9,852,208 - Chari , et al. December 26, 2
2017-12-26
Preventing Monoculture in Application Distribution
App 20170359181 - CHARI; Suresh N. ;   et al.
2017-12-14
Protection and Verification of User Authentication Credentials against Server Compromise
App 20170353450 - Koved; Lawrence ;   et al.
2017-12-07
Automatic Audit Logging of Events in Software Applications Performing Regulatory Workloads
App 20170308712 - Chari; Suresh N. ;   et al.
2017-10-26
Automatic Generation of Data-Centric Attack Graphs
App 20170286690 - Chari; Suresh N. ;   et al.
2017-10-05
Detecting Malicious User Activity
App 20170286671 - Chari; Suresh N. ;   et al.
2017-10-05
Inferring security policies from semantic attributes
Grant 9,769,208 - Chari , et al. September 19, 2
2017-09-19
Correlating cognitive biometrics for continuous identify verification
Grant 9,686,275 - Chari , et al. June 20, 2
2017-06-20
Identifying Transactional Fraud Utilizing Transaction Payment Relationship Graph Link Prediction
App 20170140382 - CHARI; SURESH N. ;   et al.
2017-05-18
Detecting anomalous user behavior using generative models of user actions
Grant 9,558,347 - Chari , et al. January 31, 2
2017-01-31
Scoring Transactional Fraud Using Features Of Transaction Payment Relationship Graphs
App 20160364794 - Chari; Suresh N. ;   et al.
2016-12-15
Inferring Security Policies from Semantic Attributes
App 20160352778 - Chari; Suresh N. ;   et al.
2016-12-01
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance
Grant 9,288,232 - Chari , et al. March 15, 2
2016-03-15
Generation of attribute based access control policy from existing authorization system
Grant 9,264,451 - Chari , et al. February 16, 2
2016-02-16
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance
Grant 9,246,945 - Chari , et al. January 26, 2
2016-01-26
Correlating Cognitive Biometrics For Continuous Identify Verification
App 20160006730 - Chari; Suresh N. ;   et al.
2016-01-07
Generating role-based access control policies based on discovered risk-averse roles
Grant 9,137,263 - Chari , et al. September 15, 2
2015-09-15
Generating role-based access control policies based on discovered risk-averse roles
Grant 9,137,265 - Chari , et al. September 15, 2
2015-09-15
Discovering Communities And Expertise Of Users Using Semantic Analysis Of Resource Access Logs
App 20150242486 - Chari; Suresh N. ;   et al.
2015-08-27
Generation Of Attribute Based Access Control Policy From Existing Authorization System
App 20150082377 - Chari; Suresh N. ;   et al.
2015-03-19
Detecting Anomalous User Behavior Using Generative Models of User Actions
App 20150067835 - Chari; Suresh N. ;   et al.
2015-03-05
Detecting Anomalous User Behavior Using Generative Models of User Actions
App 20150067845 - Chari; Suresh N. ;   et al.
2015-03-05
Techniques for Reconciling Permission Usage with Security Policy for Policy Optimization and Monitoring Continuous Compliance
App 20140359695 - Chari; Suresh N. ;   et al.
2014-12-04
Techniques for Reconciling Permission Usage with Security Policy for Policy Optimization and Monitoring Continuous Compliance
App 20140359692 - Chari; Suresh N. ;   et al.
2014-12-04
Generating Role-based Access Control Policies Based On Discovered Risk-averse Roles
App 20140196104 - Chari; Suresh N. ;   et al.
2014-07-10
Generating Role-based Access Control Policies Based On Discovered Risk-averse Roles
App 20140196103 - Chari; Suresh N. ;   et al.
2014-07-10

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed