loadpatents
name:-0.016911029815674
name:-0.01944899559021
name:-0.020176887512207
Ng; George Y. Patent Filings

Ng; George Y.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Ng; George Y..The latest application filed is for "cyber risk analysis and remediation using network monitored sensors and methods of use".

Company Profile
12.16.19
  • Ng; George Y. - San Mateo CA
  • - San Mateo CA US
  • Ng; George Y. - Dublin CA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Cyber Risk Analysis And Remediation Using Network Monitored Sensors And Methods Of Use
App 20220255965 - Parthasarathi; Arvind ;   et al.
2022-08-11
Cyber risk analysis and remediation using network monitored sensors and methods of use
Grant 11,265,350 - Parthasarathi , et al. March 1, 2
2022-03-01
Inferential Analysis Using Feedback For Extracting And Combining Cyber Risk Information
App 20220006840 - Ng; George Y. ;   et al.
2022-01-06
Disaster Scenario Based Inferential Analysis Using Feedback For Extracting And Combining Cyber Risk Information
App 20210400078 - Ng; George Y. ;   et al.
2021-12-23
Inferential analysis using feedback for extracting and combining cyber risk information
Grant 11,153,349 - Ng , et al. October 19, 2
2021-10-19
Disaster scenario based inferential analysis using feedback for extracting and combining cyber risk information
Grant 11,146,585 - Ng , et al. October 12, 2
2021-10-12
Inferential Analysis Using Feedback For Extracting And Combining Cyber Risk Information
App 20200076859 - Ng; George Y. ;   et al.
2020-03-05
Disaster Scenario Based Inferential Analysis Using Feedback For Extracting And Combining Cyber Risk Information
App 20200028872 - Ng; George Y. ;   et al.
2020-01-23
Inferential analysis using feedback for extracting and combining cyber risk information
Grant 10,511,635 - Ng , et al. Dec
2019-12-17
Disaster scenario based inferential analysis using feedback for extracting and combining cyber risk information
Grant 10,498,759 - Ng , et al. De
2019-12-03
Cyber vulnerability scan analyses with actionable feedback
Grant 10,491,624 - Ng , et al. Nov
2019-11-26
Cyber Risk Analysis And Remediation Using Network Monitored Sensors And Methods Of Use
App 20190342343 - Parthasarathi; Arvind ;   et al.
2019-11-07
Cyber risk analysis and remediation using network monitored sensors and methods of use
Grant 10,404,748 - Parthasarathi , et al. Sep
2019-09-03
Diversity analysis with actionable feedback methodologies
Grant 10,341,376 - Ng , et al.
2019-07-02
Diversity analysis with actionable feedback methodologies
Grant 10291642 -
2019-05-14
Inferential analysis using feedback for extracting and combining cyber risk information
Grant 10,230,764 - Ng , et al.
2019-03-12
Cyber vulnerability scan analyses with actionable feedback
Grant 10,218,736 - Ng , et al. Feb
2019-02-26
Synthetic Diversity Analysis with Actionable Feedback Methodologies
App 20190035027 - Ng; George Y. ;   et al.
2019-01-31
Disaster Scenario Based Inferential Analysis Using Feedback For Extracting And Combining Cyber Risk Information
App 20180359276 - Ng; George Y. ;   et al.
2018-12-13
Cyber Vulnerability Scan Analyses With Actionable Feedback
App 20180359275 - Ng; George Y. ;   et al.
2018-12-13
Inferential Analysis Using Feedback For Extracting And Combining Cyber Risk Information
App 20180359281 - Ng; George Y. ;   et al.
2018-12-13
Disaster scenario based inferential analysis using feedback for extracting and combining cyber risk information
Grant 10,050,990 - Ng , et al. August 14, 2
2018-08-14
Inferential analysis using feedback for extracting and combining cyber risk information including proxy connection analyses
Grant 10,050,989 - Ng , et al. August 14, 2
2018-08-14
Cyber vulnerability scan analyses with actionable feedback
Grant 9,699,209 - Ng , et al. July 4, 2
2017-07-04
Cyber Vulnerability Scan Analyses with Actionable Feedback
App 20170187745 - Ng; George Y. ;   et al.
2017-06-29
Disaster Scenario Based Inferential Analysis Using Feedback for Extracting and Combining Cyber Risk Information
App 20170093905 - Ng; George Y. ;   et al.
2017-03-30
Inferential Analysis Using Feedback for Extracting and Combining Cyber Risk Information Including Proxy Connection Analyses
App 20170093904 - Ng; George Y. ;   et al.
2017-03-30
Inferential Analysis Using Feedback for Extracting and Combining Cyber Risk Information
App 20170085595 - Ng; George Y. ;   et al.
2017-03-23
Inferential analysis using feedback for extracting and combining cyber risk information
Grant 9,521,160 - Ng , et al. December 13, 2
2016-12-13
Cyber Risk Analysis and Remediation Using Network Monitored Sensors and Methods of Use
App 20160294854 - Parthasarathi; Arvind ;   et al.
2016-10-06
Cyber Vulnerability Scan Analyses with Actionable Feedback
App 20160248800 - Ng; George Y. ;   et al.
2016-08-25
Inferential Analysis Using Feedback for Extracting and Combining Cyber Risk Information
App 20160248799 - Ng; George Y. ;   et al.
2016-08-25
Diversity Analysis with Actionable Feedback Methodologies
App 20160234247 - Ng; George Y. ;   et al.
2016-08-11
Diversity Analysis with Actionable Feedback Methodologies
App 20160189301 - Ng; George Y. ;   et al.
2016-06-30
Diversity analysis with actionable feedback methodologies
Grant 9,373,144 - Ng , et al. June 21, 2
2016-06-21
Diversity analysis with actionable feedback methodologies
Grant 9,253,203 - Ng February 2, 2
2016-02-02

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed