SC

Suresh N. Chari

IBM: 56 patents #1,454 of 70,183Top 3%
AH Arkose Labs Holdings: 2 patents #2 of 11Top 20%
OP Opentv: 2 patents #81 of 164Top 50%
Globalfoundries: 1 patents #2,221 of 4,424Top 55%
Overall (All Time): #37,660 of 4,157,543Top 1%
61
Patents All Time

Issued Patents All Time

Showing 25 most recent of 61 patents

Patent #TitleCo-InventorsDate
12333534 Identity ecosystem Kapil Kumar Singh, Sridhar R. Muppidi 2025-06-17
11748480 Policy-based detection of anomalous control and data flow paths in an application program Ashish Kundu, Ian M. Molloy, Dimitrios Pendarakis 2023-09-05
11372997 Automatic audit logging of events in software applications performing regulatory workloads Ted A. Habeck, Ashish Kundu, Ian M. Molloy 2022-06-28
11227232 Automatic generation of training data for anomaly detection using other user's data samples Ian M. Molloy, Youngja Park 2022-01-18
11178151 Decentralized database identity management system Kapil Kumar Singh, Ashish Kundu, Sridhar R. Muppidi, Dong Su 2021-11-16
11171946 Two-level sequence learning for analyzing, metering, generating, and cracking passwords Taesung Lee, Ian M. Molloy, Youngja Park 2021-11-09
11159547 Malware clustering approaches based on cognitive computing techniques Heqing Huang, Taesung Lee, Youngja Park 2021-10-26
10984322 Estimating asset sensitivity using information associated with users Christopher Gates, Stephen C. Gates, Youngja Park, Wilfried Teiken 2021-04-20
10984323 Estimating asset sensitivity using information associated with users Christopher Gates, Stephen C. Gates, Youngja Park, Wilfried Teiken 2021-04-20
10979452 Blockchain-based malware containment in a network resource Ashish Kundu, Abhishek Malvankar 2021-04-13
10944560 Privacy-preserving identity asset exchange Hasini Gunasinghe, Ashish Kundu, Kapil Kumar Singh, Dong Su 2021-03-09
10902121 Policy-based detection of anomalous control and data flow paths in an application program Ashish Kundu, Ian M. Molloy, Dimitrios Pendarakis 2021-01-26
10904246 Single channel input multi-factor authentication via separate processing pathways Zhongshu Gu, Heqing Huang, Dimitrios Pendarakis 2021-01-26
10891371 Detecting malicious user activity Ted A. Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken 2021-01-12
10833861 Protection of confidentiality, privacy and ownership assurance in a blockchain based decentralized identity management system Hasini Gunasinghe, Hugo M. Krawczyk, Ashish Kundu, Kapil Kumar Singh, Dong Su 2020-11-10
10812254 Identity confidence score based on blockchain based attributes Ashish Kundu, Sridhar R. Muppidi 2020-10-20
10805308 Jointly discovering user roles and data clusters using both access and side information Youngja Park, Taesung Lee, Ian M. Molloy, Benjamin J. Edwards 2020-10-13
10715317 Protection of confidentiality, privacy and financial fairness in a blockchain based decentralized identity management system Hasini Gunasinghe, Ashish Kundu, Kapil Kumar Singh, Dong Su 2020-07-14
10631168 Advanced persistent threat (APT) detection in a mobile device Zhongshu Gu, Heqing Huang, Xiaokui Shu, Jialong Zhang 2020-04-21
10628600 Automatic audit logging of events in software applications performing regulatory workloads Ted A. Habeck, Ashish Kundu, Ian M. Molloy 2020-04-21
10609044 Enforcing access control in trigger-action programming using taint analysis Benjamin E. Andow, Heqing Huang, Kapil Kumar Singh 2020-03-31
10609017 Two-level sequence learning for analyzing, metering, generating, and cracking passwords Taesung Lee, Ian M. Molloy, Youngja Park 2020-03-31
10599837 Detecting malicious user activity Ted A. Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao, Wilfried Teiken 2020-03-24
10540490 Deep learning for targeted password generation with cognitive user information understanding Benjamin J. Edwards, Taesung Lee, Ian M. Molloy, Youngja Park 2020-01-21
10503911 Automatic generation of data-centric attack graphs Ashish Kundu, Ian M. Molloy, Dimitrios Pendarakis, Josyula R. Rao 2019-12-10