Issued Patents All Time
Showing 26–50 of 54 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10540490 | Deep learning for targeted password generation with cognitive user information understanding | Suresh N. Chari, Benjamin J. Edwards, Taesung Lee, Ian M. Molloy | 2020-01-21 |
| 10542015 | Cognitive offense analysis using contextual data and knowledge graphs | William A. Bird, Suzanne C. Deffeyes, Jiyong Jang, Dhilung Hang Kirat, Josyula R. Rao +1 more | 2020-01-21 |
| 10536472 | Cognitive analysis of security data with signal flow-based graph exploration | Jiyong Jang, Dhilung Hang Kirat, Marc Philippe Stoecklin | 2020-01-14 |
| 10380259 | Deep embedding for natural language content based on semantic dependencies | Taesung Lee | 2019-08-13 |
| 10367837 | Optimizing security analyses in SaaS environments | Kaushal Kiran Kapadia, Dhilung Hang Kirat, Marc Philippe Stoecklin, Sulakshan Vajipayajula | 2019-07-30 |
| 10313365 | Cognitive offense analysis using enriched graphs | Jiyong Jang, Dhilung Hang Kirat, Marc Philippe Stoecklin | 2019-06-04 |
| 10147049 | Automatic generation of training data for anomaly detection using other user's data samples | Suresh N. Chari, Ian M. Molloy | 2018-12-04 |
| 10084804 | Optimizing security analyses in SaaS environment | Kaushal Kiran Kapadia, Dhilung Hang Kirat, Marc Philippe Stoecklin, Sulakshan Vajipayajula | 2018-09-25 |
| 9886507 | Reranking search results using download time tolerance | Robert G. Farrell | 2018-02-06 |
| 9852208 | Discovering communities and expertise of users using semantic analysis of resource access logs | Suresh N. Chari, Ian M. Molloy | 2017-12-26 |
| 9686275 | Correlating cognitive biometrics for continuous identify verification | Suresh N. Chari, Pau-Chen Cheng, Lawrence Koved, Ian M. Molloy | 2017-06-20 |
| 9600576 | Estimating data topics of computers using external text content and usage information of the users | Christopher Gates | 2017-03-21 |
| 9600577 | Estimating data topics of computers using external text content and usage information of the users | Christopher Gates | 2017-03-21 |
| 9558347 | Detecting anomalous user behavior using generative models of user actions | Suresh N. Chari, Ian M. Molloy, Wilfried Teiken | 2017-01-31 |
| 9311467 | Composite propensity profile detector | Anni R. Coden, Keith Coleman Houck, Ching-Yung Lin, Wanyi Lin, Peter K. Malkin +2 more | 2016-04-12 |
| 9288232 | Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance | Suresh N. Chari, Ian M. Molloy, Wilfried Teiken | 2016-03-15 |
| 9246945 | Techniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance | Suresh N. Chari, Ian M. Molloy, Wilfried Teiken | 2016-01-26 |
| 9014363 | System and method for automatically generating adaptive interaction logs from customer interaction text | Roy J. Byrd, Stephen C. Gates, Mary S. Neff, Wilfried Teiken | 2015-04-21 |
| 8983877 | Role mining with user attribution using generative models | Suresh N. Chari, Ian M. Molloy | 2015-03-17 |
| 8750489 | System and method for automatic call segmentation at call center | — | 2014-06-10 |
| 8644488 | System and method for automatically generating adaptive interaction logs from customer interaction text | Roy J. Byrd, Stephen C. Gates, Mary S. Neff, Wilfried Teiken | 2014-02-04 |
| 8560722 | System and method to govern sensitive data exchange with mobile devices based on threshold sensitivity values | Stephen C. Gates, Josyula R. Rao, Wilfried Teiken | 2013-10-15 |
| 8370155 | System and method for real time support for agents in contact center environments | Roy J. Byrd, Keh-Shin F. Cheng, Stephen C. Gates, Mary S. Neff, Wilfried Teiken | 2013-02-05 |
| 8121432 | System and method for semantic video segmentation based on joint audiovisual and text analysis | Chitra Dorai, Ying Li | 2012-02-21 |
| 7941310 | System and method for determining affixes of words | — | 2011-05-10 |