CK

Clifford E. Kahn

JN Juniper Networks: 7 patents #456 of 2,602Top 20%
PS Pulse Secure: 6 patents #3 of 63Top 5%
DE Digital Equipment: 3 patents #412 of 2,100Top 20%
HP HP: 2 patents #5,870 of 16,619Top 40%
EM Emc: 2 patents #1,324 of 3,345Top 40%
CG Compaq Information Technologies Group: 1 patents #84 of 407Top 25%
ZS Zscaler: 1 patents #152 of 274Top 60%
Overall (All Time): #190,052 of 4,157,543Top 5%
22
Patents All Time

Issued Patents All Time

Patent #TitleCo-InventorsDate
12341809 Defending against volumetric attacks Jian Liu, Victor Pavlov, Srinivas Kavuri, John Chanak 2025-06-24
11930036 Detecting attacks and quarantining malware infected devices Biju Ramachandra Kaimal, Bandam Radha Shravan, Thiyagu Rajendran 2024-03-12
11483339 Detecting attacks and quarantining malware infected devices Biju Ramachandra Kaimal, Bandam Radha Shravan, Thiyagu Rajendran 2022-10-25
11477028 Preventing account lockout through request throttling Siva Kumar K, Brett Littrell 2022-10-18
10075432 Updating stored passwords Andy Tsang, Roger A. Chickering, Jeffrey C. Venable, Sr. 2018-09-11
9848006 Detecting past intrusions and attacks based on historical network traffic information Stephen R. Hanna 2017-12-19
9485262 Detecting past intrusions and attacks based on historical network traffic information Stephen R. Hanna 2016-11-01
9401913 Updating stored passwords Andy Tsang, Roger A. Chickering, Jeffrey C. Venable, Sr. 2016-07-26
9001999 Updating stored passwords Andy Tsang, Roger A. Chickering, Jeffrey C. Venable, Sr. 2015-04-07
8478797 Atomic deletion of database data categories Roger A. Chickering 2013-07-02
8312540 System for slowing password attacks Jeffrey C. Venable, Sr., Roger A. Chickering 2012-11-13
8290991 Atomic deletion of database data categories Roger A. Chickering 2012-10-16
8214411 Atomic deletion of database data categories Roger A. Chickering 2012-07-03
8094812 Updating stored passwords Andy Tsang, Roger A. Chickering, Jeffrey C. Venable, Sr. 2012-01-10
7185192 Methods and apparatus for controlling access to a resource 2007-02-27
7036022 Verification of trusted-path commands Mary Ellen Zurko, Thomas Andrew Casey, Jr., Morrie Gasser, Judith Shelhorse Hall, Andrew H. Mason +3 more 2006-04-25
7032186 Methods and apparatus for representing resources in a computing system environment Morrie Gasser 2006-04-18
6871283 Processing trusted commands in trusted and untrusted environments Mary Ellen Zurko, Thomas Andrew Casey, Jr., Morrie Gasser, Judith Shelhorse Hall, Andrew H. Mason +3 more 2005-03-22
6507909 Method for executing trusted-path commands Mary Ellen Zurko, Thomas Andrew Casey, Jr., Morrie Gasser, Judith Shelhorse Hall, Andrew H. Mason +3 more 2003-01-14
5826254 System for selectively browsing a large, distributed directory tree using authentication links 1998-10-20
5339449 System and method for reducing storage channels in disk systems Paul A. Karger, Andrew H. Mason, John Clay Richard Wray, Paul T. Robinson, Anthony L. Priborsky +1 more 1994-08-16
5220661 System and method for reducing timing channels in digital data processing systems Wei-Ming Hu, Paul A. Karger, Andrew H. Mason, Paul T. Robinson, John Clay Richard Wray 1993-06-15