| 10984322 |
Estimating asset sensitivity using information associated with users |
Suresh N. Chari, Christopher Gates, Stephen C. Gates, Youngja Park |
2021-04-20 |
| 10984323 |
Estimating asset sensitivity using information associated with users |
Suresh N. Chari, Christopher Gates, Stephen C. Gates, Youngja Park |
2021-04-20 |
| 10891371 |
Detecting malicious user activity |
Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao |
2021-01-12 |
| 10599837 |
Detecting malicious user activity |
Suresh N. Chari, Ted A. Habeck, Ian M. Molloy, Youngja Park, Josyula R. Rao |
2020-03-24 |
| 10419224 |
Preventing monoculture in application distribution |
Suresh N. Chari, Ian M. Molloy |
2019-09-17 |
| 10375116 |
System and method to provide server control for access to mobile client data |
Pau-Chen Cheng, Stephen C. Gates, Lawrence Koved |
2019-08-06 |
| 9712565 |
System and method to provide server control for access to mobile client data |
Pau-Chen Cheng, Stephen C. Gates, Lawrence Koved |
2017-07-18 |
| 9594921 |
System and method to provide server control for access to mobile client data |
Pau-Chen Cheng, Stephen C. Gates, Lawrence Koved |
2017-03-14 |
| 9558347 |
Detecting anomalous user behavior using generative models of user actions |
Suresh N. Chari, Ian M. Molloy, Youngja Park |
2017-01-31 |
| 9396352 |
System and method to provide server control for access to mobile client data |
Pau-Chen Cheng, Stephen C. Gates, Lawrence Koved |
2016-07-19 |
| 9288232 |
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance |
Suresh N. Chari, Ian M. Molloy, Youngja Park |
2016-03-15 |
| 9246945 |
Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance |
Suresh N. Chari, Ian M. Molloy, Youngja Park |
2016-01-26 |
| 9185121 |
Detecting malicious circumvention of virtual private network |
Suresh N. Chari, Josyula R. Rao, Willliam J. Rippon, Wietse Z. Venema |
2015-11-10 |
| 9135465 |
System and method to provide server control for access to mobile client data |
Pau-Chen Cheng, Stephen C. Gates, Lawrence Koved |
2015-09-15 |
| 9014363 |
System and method for automatically generating adaptive interaction logs from customer interaction text |
Roy J. Byrd, Stephen C. Gates, Mary S. Neff, Youngja Park |
2015-04-21 |
| 8644488 |
System and method for automatically generating adaptive interaction logs from customer interaction text |
Roy J. Byrd, Stephen C. Gates, Mary S. Neff, Youngja Park |
2014-02-04 |
| 8560722 |
System and method to govern sensitive data exchange with mobile devices based on threshold sensitivity values |
Stephen C. Gates, Youngja Park, Josyula R. Rao |
2013-10-15 |
| 8370155 |
System and method for real time support for agents in contact center environments |
Roy J. Byrd, Keh-Shin F. Cheng, Stephen C. Gates, Mary S. Neff, Youngja Park |
2013-02-05 |
| 7937338 |
System and method for identifying document structure and associated metainformation |
Branimir K. Boguraev, Roy J. Byrd, Keh-Shin F. Cheng, Anni R. Coden, Michael A. Tanenblatt |
2011-05-03 |