Issued Patents All Time
Showing 25 most recent of 61 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12333534 | Identity ecosystem | Kapil Kumar Singh, Sridhar R. Muppidi | 2025-06-17 |
| 11748480 | Policy-based detection of anomalous control and data flow paths in an application program | Ashish Kundu, Ian M. Molloy, Dimitrios Pendarakis | 2023-09-05 |
| 11372997 | Automatic audit logging of events in software applications performing regulatory workloads | Ted A. Habeck, Ashish Kundu, Ian M. Molloy | 2022-06-28 |
| 11227232 | Automatic generation of training data for anomaly detection using other user's data samples | Ian M. Molloy, Youngja Park | 2022-01-18 |
| 11178151 | Decentralized database identity management system | Kapil Kumar Singh, Ashish Kundu, Sridhar R. Muppidi, Dong Su | 2021-11-16 |
| 11171946 | Two-level sequence learning for analyzing, metering, generating, and cracking passwords | Taesung Lee, Ian M. Molloy, Youngja Park | 2021-11-09 |
| 11159547 | Malware clustering approaches based on cognitive computing techniques | Heqing Huang, Taesung Lee, Youngja Park | 2021-10-26 |
| 10984322 | Estimating asset sensitivity using information associated with users | Christopher Gates, Stephen C. Gates, Youngja Park, Wilfried Teiken | 2021-04-20 |
| 10984323 | Estimating asset sensitivity using information associated with users | Christopher Gates, Stephen C. Gates, Youngja Park, Wilfried Teiken | 2021-04-20 |
| 10979452 | Blockchain-based malware containment in a network resource | Ashish Kundu, Abhishek Malvankar | 2021-04-13 |
| 10944560 | Privacy-preserving identity asset exchange | Hasini Gunasinghe, Ashish Kundu, Kapil Kumar Singh, Dong Su | 2021-03-09 |
| 10902121 | Policy-based detection of anomalous control and data flow paths in an application program | Ashish Kundu, Ian M. Molloy, Dimitrios Pendarakis | 2021-01-26 |
| 10904246 | Single channel input multi-factor authentication via separate processing pathways | Zhongshu Gu, Heqing Huang, Dimitrios Pendarakis | 2021-01-26 |
| 10891371 | Detecting malicious user activity | Ted A. Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken | 2021-01-12 |
| 10833861 | Protection of confidentiality, privacy and ownership assurance in a blockchain based decentralized identity management system | Hasini Gunasinghe, Hugo M. Krawczyk, Ashish Kundu, Kapil Kumar Singh, Dong Su | 2020-11-10 |
| 10812254 | Identity confidence score based on blockchain based attributes | Ashish Kundu, Sridhar R. Muppidi | 2020-10-20 |
| 10805308 | Jointly discovering user roles and data clusters using both access and side information | Youngja Park, Taesung Lee, Ian M. Molloy, Benjamin J. Edwards | 2020-10-13 |
| 10715317 | Protection of confidentiality, privacy and financial fairness in a blockchain based decentralized identity management system | Hasini Gunasinghe, Ashish Kundu, Kapil Kumar Singh, Dong Su | 2020-07-14 |
| 10631168 | Advanced persistent threat (APT) detection in a mobile device | Zhongshu Gu, Heqing Huang, Xiaokui Shu, Jialong Zhang | 2020-04-21 |
| 10628600 | Automatic audit logging of events in software applications performing regulatory workloads | Ted A. Habeck, Ashish Kundu, Ian M. Molloy | 2020-04-21 |
| 10609044 | Enforcing access control in trigger-action programming using taint analysis | Benjamin E. Andow, Heqing Huang, Kapil Kumar Singh | 2020-03-31 |
| 10609017 | Two-level sequence learning for analyzing, metering, generating, and cracking passwords | Taesung Lee, Ian M. Molloy, Youngja Park | 2020-03-31 |
| 10599837 | Detecting malicious user activity | Ted A. Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken | 2020-03-24 |
| 10540490 | Deep learning for targeted password generation with cognitive user information understanding | Benjamin J. Edwards, Taesung Lee, Ian M. Molloy, Youngja Park | 2020-01-21 |
| 10503911 | Automatic generation of data-centric attack graphs | Ashish Kundu, Ian M. Molloy, Dimitrios Pendarakis, Josyula R. Rao | 2019-12-10 |