loadpatents
name:-0.055361986160278
name:-0.045413970947266
name:-0.0010209083557129
Wang; Jiahe Helen Patent Filings

Wang; Jiahe Helen

Patent Applications and Registrations

Patent applications and USPTO patent grants for Wang; Jiahe Helen.The latest application filed is for "world-driven access control".

Company Profile
0.43.39
  • Wang; Jiahe Helen - Issaquah WA
  • Wang; Jiahe Helen - Redmond WA
  • Wang; Jiahe Helen - Richmond WA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Protection and communication abstractions for web browsers
Grant 10,019,570 - Wang , et al. July 10, 2
2018-07-10
Proxy engine for custom handling of web content
Grant 9,906,549 - Fan , et al. February 27, 2
2018-02-27
World-driven access control using trusted certificates
Grant 9,697,365 - Kohno , et al. July 4, 2
2017-07-04
Virtual data center allocation with bandwidth guarantees
Grant 9,497,112 - Guo , et al. November 15, 2
2016-11-15
Managing shared state information produced by applications
Grant 9,424,239 - Dunn , et al. August 23, 2
2016-08-23
World-driven access control
Grant 9,413,784 - Kohno , et al. August 9, 2
2016-08-09
Managing access by applications to perceptual information
Grant 9,355,268 - D'Antoni , et al. May 31, 2
2016-05-31
Securing anti-virus software with virtualization
Grant 9,230,100 - Wang , et al. January 5, 2
2016-01-05
Resource sharing in multi-principal browser
Grant 8,990,399 - Wang , et al. March 24, 2
2015-03-24
World-Driven Access Control
App 20150074742 - Kohno; Tadayoshi ;   et al.
2015-03-12
World-Driven Access Control Using Trusted Certificates
App 20150074746 - Kohno; Tadayoshi ;   et al.
2015-03-12
Managing Access by Applications to Perceptual Information
App 20150071555 - D'Antoni; Loris ;   et al.
2015-03-12
Managing Shared State Information Produced by Applications
App 20150074506 - Dunn; Alan M. ;   et al.
2015-03-12
Automatic reverse engineering of input formats
Grant 8,935,677 - Cui , et al. January 13, 2
2015-01-13
Virtual Data Center Allocation with Bandwidth Guarantees
App 20140281026 - Guo; Chuanxiong ;   et al.
2014-09-18
Mapping network addresses to geographical locations
Grant 8,788,664 - Guo , et al. July 22, 2
2014-07-22
Lockbox for mitigating same origin policy failures
Grant 8,782,797 - Wang , et al. July 15, 2
2014-07-15
Virtual data center allocation with bandwidth guarantees
Grant 8,667,171 - Guo , et al. March 4, 2
2014-03-04
Automatic data patch generation for unknown vulnerabilities
Grant 8,613,096 - Peinado , et al. December 17, 2
2013-12-17
Remote monitoring of local behavior of network applications
Grant 8,543,683 - Kiciman , et al. September 24, 2
2013-09-24
Systematic approach to uncover visual ambiguity vulnerabilities
Grant 8,539,585 - Chen , et al. September 17, 2
2013-09-17
Resource Sharing in Multi-Principal Browser
App 20130212283 - Wang; Jiahe Helen ;   et al.
2013-08-15
Mapping Network Addresses To Geographical Locations
App 20130145043 - Guo; Chuanxiong ;   et al.
2013-06-06
Securing Anti-virus Software With Virtualization
App 20130055396 - Wang; Jiahe Helen ;   et al.
2013-02-28
Securing anti-virus software with virtualization
Grant 8,307,443 - Wang , et al. November 6, 2
2012-11-06
Access control in a multi-principal browser
Grant 8,266,714 - Wang , et al. September 11, 2
2012-09-11
Secure multi-principal web browser
Grant 8,250,653 - Wang , et al. August 21, 2
2012-08-21
Browser protection module
Grant 8,239,939 - Dunagan , et al. August 7, 2
2012-08-07
Immunizing HTML browsers and extensions from known vulnerabilities
Grant 8,225,392 - Dubrovsky , et al. July 17, 2
2012-07-17
Systematic approach to uncover GUI logic flaws
Grant 8,156,559 - Chen , et al. April 10, 2
2012-04-10
Systematic approach to uncover GUI logic flaws
Grant 8,125,669 - Chen , et al. February 28, 2
2012-02-28
Remote monitoring of local behavior of network applications
Grant 8,108,513 - Kiciman , et al. January 31, 2
2012-01-31
Virtual Data Center Allocation with Bandwidth Guarantees
App 20110296052 - Guo; Chuanxiong ;   et al.
2011-12-01
Security Service Level Agreements With Publicly Verifiable Proofs Of Compliance
App 20110276490 - Wang; Jiahe Helen ;   et al.
2011-11-10
Generic application level protocol analyzer
Grant 7,975,059 - Wang , et al. July 5, 2
2011-07-05
Method and system for collecting information from computer systems based on a trusted relationship
Grant 7,962,571 - Yuan , et al. June 14, 2
2011-06-14
Access Control In A Multi-principal Browser
App 20110055892 - Wang; Jiahe Helen ;   et al.
2011-03-03
Resource Sharing In Multi-principal Browser
App 20110055395 - Wang; Jiahe Helen ;   et al.
2011-03-03
Method and system for troubleshooting a misconfiguration of a computer system based on configurations of other computer systems
Grant 7,890,807 - Verbowski , et al. February 15, 2
2011-02-15
Privacy-preserving data aggregation using homomorphic encryption
Grant 7,856,100 - Wang , et al. December 21, 2
2010-12-21
Secure Multi-principal Web Browser
App 20100281537 - Wang; Jiahe Helen ;   et al.
2010-11-04
Automatic reverse engineering of message formats from network traces
Grant 7,802,009 - Cui , et al. September 21, 2
2010-09-21
Aggregating information from a cluster of peers
Grant 7,743,123 - Wang , et al. June 22, 2
2010-06-22
Method and system for filtering communications to prevent exploitation of a software vulnerability
Grant 7,694,022 - Garms , et al. April 6, 2
2010-04-06
Lockbox For Mitigating Same Origin Policy Failures
App 20100017883 - Wang; Jiahe Helen ;   et al.
2010-01-21
Active learning framework for automatic field extraction from network traffic
Grant 7,650,317 - Basu , et al. January 19, 2
2010-01-19
Automatic Reverse Engineering Of Input Formats
App 20090254891 - Cui; Weidong ;   et al.
2009-10-08
Determining cardinality of a parameter using hash values
Grant 7,584,182 - Wang , et al. September 1, 2
2009-09-01
Method and system for troubleshooting a misconfiguration of a computer system based on configurations of other computer systems
Grant 7,584,382 - Verbowski , et al. September 1, 2
2009-09-01
Automatic Data Patch Generation For Unknown Vulnerabilities
App 20090144827 - Peinado; Marcus ;   et al.
2009-06-04
Securing Anti-virus Software With Virtualization
App 20090089879 - Wang; Jiahe Helen ;   et al.
2009-04-02
Remote Monitoring Of Local Behavior Of Network Applications
App 20090083714 - Kiciman; Emre Mehmet ;   et al.
2009-03-26
Remote Monitoring Of Local Behavior Of Network Applications
App 20090083363 - Kiciman; Emre Mehmet ;   et al.
2009-03-26
Remote Monitoring Of Local Behavior Of Network Applications
App 20090083409 - Kiciman; Emre Mehmet ;   et al.
2009-03-26
Proxy Engine For Custom Handling Of Web Content
App 20090070663 - Fan; Xiaofeng ;   et al.
2009-03-12
Proxy Engine For Custom Handling Of Web Content
App 20090070869 - Fan; Xiaofeng ;   et al.
2009-03-12
Automatic Reverse Engineering of Message Formats From Network Traces
App 20090006645 - Cui; Weidong ;   et al.
2009-01-01
Protection And Communication Abstractions For Web Browsers
App 20080313648 - Wang; Jiahe Helen ;   et al.
2008-12-18
Method And System For Collecting Information From Computer Systems Based On A Trusted Relationship
App 20080201337 - Yuan; Chun ;   et al.
2008-08-21
Method and system for collecting information from computer systems based on a trusted relationship
Grant 7,392,295 - Yuan , et al. June 24, 2
2008-06-24
Active Learning Framework For Automatic Field Extraction From Network Traffic
App 20080140589 - Basu; Sumit ;   et al.
2008-06-12
Systematic Approach to Uncover Visual Ambiguity Vulnerabilities
App 20080133976 - Chen; Shuo ;   et al.
2008-06-05
Systematic Approach to Uncover GUI Logic Flaws
App 20080134338 - Chen; Shuo ;   et al.
2008-06-05
Systematic Approach to Uncover GUI Logic Flaws
App 20080127341 - Chen; Shuo ;   et al.
2008-05-29
Method And System For Troubleshooting A Misconfiguration Of A Computer System Based On Configurations Of Other Computer Systems
App 20070300103 - Verbowski; Chad E. ;   et al.
2007-12-27
Aggregating information from a cluster of peers
App 20070168508 - Wang; Jiahe Helen ;   et al.
2007-07-19
Privacy-preserving data aggregation using homomorphic encryption
App 20070140479 - Wang; Jiahe Helen ;   et al.
2007-06-21
Determining cardinality of a parameter using hash values
App 20070143280 - Wang; Jiahe Helen ;   et al.
2007-06-21
Generic application level protocol analyzer
App 20070112969 - Wang; Jiahe Helen ;   et al.
2007-05-17
Immunizing HTML browsers and extensions from known vulnerabilities
App 20070016948 - Dubrovsky; Opher ;   et al.
2007-01-18
Browser Protection Module
App 20070016949 - Dunagan; John ;   et al.
2007-01-18
Method and system for collecting information from computer systems based on a trusted relationship
App 20060036708 - Yuan; Chun ;   et al.
2006-02-16
Method and system for filtering communications to prevent exploitation of a software vulnerability
App 20050198110 - Garms, Jason ;   et al.
2005-09-08
Method and system for troubleshooting a misconfiguration of a computer system based on configurations of other computer systems
App 20050188268 - Verbowski, Chad E. ;   et al.
2005-08-25

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed