loadpatents
Patent applications and USPTO patent grants for Riabov; Anton Viktorovich.The latest application filed is for "plan recognition with unreliable observations".
Patent | Date |
---|---|
Plan recognition with unreliable observations Grant 10,885,449 - Riabov , et al. January 5, 2 | 2021-01-05 |
Autonomous learning of actionable models from unstrutured data Grant 10,699,199 - Manikonda , et al. | 2020-06-30 |
Autonomous learning of actionable models from unstructured data Grant 10,699,200 - Manikonda , et al. | 2020-06-30 |
Plan Recognition With Unreliable Observations App 20200065687 - RIABOV; Anton Viktorovich ;   et al. | 2020-02-27 |
Plan recognition with unreliable observations Grant 10,552,749 - Riabov , et al. Fe | 2020-02-04 |
Autonomous Learning Of Actionable Models From Unstrutured Data App 20180218272 - Manikonda; Lydia ;   et al. | 2018-08-02 |
Autonomous Learning Of Actionable Models From Unstrutured Data App 20180218270 - Manikonda; Lydia ;   et al. | 2018-08-02 |
Solving Goal Recognition Using Planning App 20180218266 - Halim; Nagui ;   et al. | 2018-08-02 |
Solving Goal Recognition Using Planning App 20180218267 - Halim; Nagui ;   et al. | 2018-08-02 |
Plan Recognition With Unreliable Observations App 20170147923 - RIABOV; Anton Viktorovich ;   et al. | 2017-05-25 |
Pull data transfer method in request-response models Grant 9,264,506 - Feng , et al. February 16, 2 | 2016-02-16 |
Pull Data Transfer Method In Request-response Models App 20140067908 - Feng; Hanhua ;   et al. | 2014-03-06 |
System and method for security planning with hard security constraints Grant 8,276,192 - Anderson , et al. September 25, 2 | 2012-09-25 |
System and method for security planning with soft security constraints Grant 8,132,259 - Anderson , et al. March 6, 2 | 2012-03-06 |
Access control method and a system for privacy protection Grant 8,032,924 - Chen , et al. October 4, 2 | 2011-10-04 |
Access control method and a system for privacy protection Grant 8,020,213 - Chen , et al. September 13, 2 | 2011-09-13 |
Access Control Method And A System For Privacy Protection App 20090064343 - Chen; Weifeng ;   et al. | 2009-03-05 |
System And Method For Security Planning With Soft Security Constraints App 20080168529 - Anderson; Kay Schwendimann ;   et al. | 2008-07-10 |
Apparatus and method of planning through generation of multiple efficient plans App 20080071716 - Anderson; Kay Schwendimann ;   et al. | 2008-03-20 |
Access control method and a system for privacy protection App 20080034439 - Chen; Weifeng ;   et al. | 2008-02-07 |
System and method for security planning with hard security constraints App 20080016547 - Anderson; Kay Schwendimann ;   et al. | 2008-01-17 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.