WT

Wilfried Teiken

IBM: 16 patents #6,952 of 70,183Top 10%
Microsoft: 2 patents #17,506 of 40,388Top 45%
Globalfoundries: 1 patents #2,221 of 4,424Top 55%
Overall (All Time): #236,241 of 4,157,543Top 6%
19
Patents All Time

Issued Patents All Time

Patent #TitleCo-InventorsDate
10984322 Estimating asset sensitivity using information associated with users Suresh N. Chari, Christopher Gates, Stephen C. Gates, Youngja Park 2021-04-20
10984323 Estimating asset sensitivity using information associated with users Suresh N. Chari, Christopher Gates, Stephen C. Gates, Youngja Park 2021-04-20
10891371 Detecting malicious user activity Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao 2021-01-12
10599837 Detecting malicious user activity Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao 2020-03-24
10419224 Preventing monoculture in application distribution Suresh N. Chari, Ian M. Molloy 2019-09-17
10375116 System and method to provide server control for access to mobile client data Pau-Chen Cheng, Stephen C. Gates, Lawrence Koved 2019-08-06
9712565 System and method to provide server control for access to mobile client data Pau-Chen Cheng, Stephen C. Gates, Lawrence Koved 2017-07-18
9594921 System and method to provide server control for access to mobile client data Pau-Chen Cheng, Stephen C. Gates, Lawrence Koved 2017-03-14
9558347 Detecting anomalous user behavior using generative models of user actions Suresh N. Chari, Ian M. Molloy, Youngja Park 2017-01-31
9396352 System and method to provide server control for access to mobile client data Pau-Chen Cheng, Stephen C. Gates, Lawrence Koved 2016-07-19
9288232 Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance Suresh N. Chari, Ian M. Molloy, Youngja Park 2016-03-15
9246945 Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance Suresh N. Chari, Ian M. Molloy, Youngja Park 2016-01-26
9185121 Detecting malicious circumvention of virtual private network Suresh N. Chari, Josyula R. Rao, Willliam J. Rippon, Wietse Z. Venema 2015-11-10
9135465 System and method to provide server control for access to mobile client data Pau-Chen Cheng, Stephen C. Gates, Lawrence Koved 2015-09-15
9014363 System and method for automatically generating adaptive interaction logs from customer interaction text Roy J. Byrd, Stephen C. Gates, Mary S. Neff, Youngja Park 2015-04-21
8644488 System and method for automatically generating adaptive interaction logs from customer interaction text Roy J. Byrd, Stephen C. Gates, Mary S. Neff, Youngja Park 2014-02-04
8560722 System and method to govern sensitive data exchange with mobile devices based on threshold sensitivity values Stephen C. Gates, Youngja Park, Josyula R. Rao 2013-10-15
8370155 System and method for real time support for agents in contact center environments Roy J. Byrd, Keh-Shin F. Cheng, Stephen C. Gates, Mary S. Neff, Youngja Park 2013-02-05
7937338 System and method for identifying document structure and associated metainformation Branimir K. Boguraev, Roy J. Byrd, Keh-Shin F. Cheng, Anni R. Coden, Michael A. Tanenblatt 2011-05-03