Top Inventors for class "Information security" |
Rank | Inventor's name | Country | City/State | Last publication | # of patent apps in this class |
1 | Omer Tripp | IL | Har-Adar | Dec 29, 2016 / 20160378995 - STATIC SECURITY ANALYSIS USING A HYBRID REPRESENTATION OF STRING VALUES | 79 |
2 | Robert W. Lord | US | Seattle, WA | Nov 25, 2021 / 20210365848 - REAL-TIME CARPOOL COORDINATING SYSTEM | 69 |
3 | Royce A. Levien | US | Lexington, MA | Dec 31, 2020 / 20200412877 - IDENTIFIER TECHNIQUE FOR COMMUNICATION INTERCHANGE | 66 |
4 | Mark A. Malamud | US | Seattle, WA | Dec 31, 2020 / 20200412877 - IDENTIFIER TECHNIQUE FOR COMMUNICATION INTERCHANGE | 65 |
5 | Marco Pistoia | US | Amawalk, NY | Jan 13, 2022 / 20220012390 - INCREMENTAL GENERATION OF QUANTUM CIRCUITS | 63 |
6 | Clarence T. Tegreene | US | Bellevue, WA | Dec 31, 2020 / 20200412877 - IDENTIFIER TECHNIQUE FOR COMMUNICATION INTERCHANGE | 48 |
7 | Richard T. Lord | US | Tacoma, WA | Dec 29, 2016 / 20160379183 - METHODS AND SYSTEMS FOR AGNOSTIC PAYMENT SYSTEMS | 39 |
8 | International Business Machines Corporation | US | Armonk, NY | Sep 18, 2014 / 20140282563 - DEPLOYING PARALLEL DATA INTEGRATION APPLICATIONS TO DISTRIBUTED COMPUTING ENVIRONMENTS | 38 |
9 | Salvatore J. Stolfo | US | Ridgewood, NJ | Jun 30, 2016 / 20160191561 - METHODS OF UNSUPERVISED ANOMALY DETECTION USING A GEOMETRIC FRAMEWORK | 37 |
10 | Lloyd Leon Burch | US | Payson, UT | Sep 14, 2017 / 20170264634 - SYSTEMS AND METHODS FOR SUPPORTING INFORMATION SECURITY AND SUB-SYSTEM OPERATIONAL PROTOCOL CONFORMANCE | 36 |
11 | Rakesh Radhakrishnan | US | Ashburn, VA | Feb 21, 2013 / 20130047266 - METHOD AND APPARATUS FOR TOKEN-BASED ACCESS OF RELATED RESOURCES | 35 |
12 | Erich Stuntebeck | US | Marietta, GA | Aug 20, 2020 / 20200267157 - INCREMENTAL COMPLIANCE REMEDIATION | 35 |
13 | Edward K.y. Jung | US | Bellevue, WA | Dec 31, 2020 / 20200412877 - IDENTIFIER TECHNIQUE FOR COMMUNICATION INTERCHANGE | 34 |
14 | Michael Xie | US | Palo Alto, CA | Jun 07, 2018 / 20180159848 - MANAGEMENT OF CERTIFICATE AUTHORITY (CA) CERTIFICATES | 33 |
15 | John D. Rinaldo, Jr. | US | Bellevue, WA | Dec 31, 2020 / 20200412877 - IDENTIFIER TECHNIQUE FOR COMMUNICATION INTERCHANGE | 32 |
16 | Neil Patrick Adams | CA | Waterloo | Jan 13, 2022 / 20220014572 - Method and System for Managing a Meeting Session | 32 |
17 | Stephen R. Carter | US | Spanish Fork, UT | Sep 14, 2017 / 20170264634 - SYSTEMS AND METHODS FOR SUPPORTING INFORMATION SECURITY AND SUB-SYSTEM OPERATIONAL PROTOCOL CONFORMANCE | 31 |
18 | Ahmed Said Sallam | US | Cupertino, CA | Jun 07, 2018 / 20180157836 - METHOD AND SYSTEM FOR PROACTIVE DETECTION OF MALICIOUS SHARED LIBRARIES VIA A REMOTE REPUTATION SYSTEM | 31 |
19 | Roderick A. Hyde | US | Redmond, WA | Mar 19, 2020 / 20200090805 - MONITORING TREATMENT COMPLIANCE USING PATIENT ACTIVITY PATTERNS | 30 |
20 | Ulf Mattsson | US | Cos Cob, CT | Sep 01, 2022 / 20220277095 - Privacy Preserving Data Search | 26 |
21 | Efim Hudis | US | Bellevue, WA | Jan 03, 2019 / 20190007415 - ACCESS CONTROL MANAGER | 26 |
22 | Yogendra C. Shah | US | Exton, PA | Dec 02, 2021 / 20210373115 - Occupancy-based Service Delivery Systems and Methods | 26 |
23 | Herbert A. Little | CA | Waterloo | Nov 26, 2015 / 20150339495 - SELECTIVELY WIPING A REMOTE DEVICE | 26 |
24 | International Business Machines Corporation | US | | Jun 09, 2016 / 20160164774 - SET UP OF DIRECT MAPPED ROUTERS LOCATED ACROSS INDEPENDENTLY MANAGED COMPUTE AND STORAGE NETWORKS | 25 |
25 | Jeyhan Karaoguz | US | Irvine, CA | Oct 14, 2021 / 20210321248 - METHOD AND SYSTEM FOR A NETWORKED SELF-CONFIGURING COMMUNICATION DEVICE UTILIZING USER PREFERENCE INFORMATION | 25 |
26 | Rick A. Hamilton, Ii | US | Charlottesville, VA | Sep 17, 2020 / 20200294387 - SECURITY SYSTEM WITH COOPERATIVE BEHAVIOR | 25 |
27 | Rajarshi Gupta | US | Sunnyvale, CA | Feb 16, 2017 / 20170046510 - Methods and Systems of Building Classifier Models in Computing Devices | 25 |
28 | Bjorn Markus Jakobsson | US | Mountain View, CA | Jul 28, 2022 / 20220239644 - SYSTEMS AND METHODS FOR AUTHENTICATING A USER BASED ON A BIOMETRIC MODEL ASSOCIATED WITH THE USER | 25 |
29 | Kevin Patrick Mahaffey | US | San Francisco, CA | Aug 18, 2022 / 20220263868 - METHODS AND SYSTEMS FOR PROVIDING A SECURE CONNECTION TO A MOBILE COMMUNICATIONS DEVICE WITH THE LEVEL OF SECURITY BASED ON A CONTEXT OF THE COMMUNICATION | 24 |
30 | Angelos D. Keromytis | US | New York, NY | Mar 24, 2016 / 20160087951 - SYSTEMS AND METHODS FOR INHIBITING ATTACKS WITH A NETWORK | 23 |
31 | Salvatore A. Guarnieri | US | New York, NY | Dec 29, 2016 / 20160378995 - STATIC SECURITY ANALYSIS USING A HYBRID REPRESENTATION OF STRING VALUES | 23 |
32 | Sven Schrecker | US | San Marcos, CA | Nov 11, 2021 / 20210350361 - SECURITY BROKER | 23 |
33 | Paul J. Leach | US | Seattle, WA | Jul 03, 2014 / 20140189823 - Pass-Thru for Client Authentication | 23 |
34 | Keith R. Walker | US | Austin, TX | May 18, 2017 / 20170139687 - PROGRAM CODE LIBRARY SEARCHING AND SELECTION IN A NETWORKED COMPUTING ENVIRONMENT | 23 |
35 | Microsoft Corporation | US | Redmond, WA | Aug 08, 2013 / 20130205382 - Resource Access Based on Multiple Credentials | 22 |
36 | Luis Felipe Cabrera | US | Bellevue, WA | Jul 28, 2022 / 20220237708 - AUGMENTING ELECTRONIC DOCUMENTS WITH EXTERNALLY PRODUCED METADATA | 22 |
37 | Hyun Cheol Jeong | KR | Seoul | Jun 26, 2014 / 20140175402 - RED PHOSPHORESCENT COMPOUND AND ORGANIC LIGHT EMITTING DIODE DEVICE USING THE SAME | 22 |
38 | Zhou Lu | CN | Beijing | Aug 11, 2022 / 20220253565 - TERMINAL ANTI-TAMPER DETECTION METHOD AND APPARATUS | 22 |
39 | M. Shannon Lietz | US | San Marcos, CA | Nov 17, 2016 / 20160337406 - METHOD AND SYSTEM FOR AUTOMATICALLY MANAGING SECURE COMMUNICATIONS AND DISTRIBUTION OF SECRETS IN MULTIPLE COMMUNICATIONS JURISDICTION ZONES | 21 |
40 | Byung-Rae Lee | KR | Seoul | Apr 16, 2015 / 20150103729 - METHOD AND APPARATUS FOR TRANSMITTING/RECEIVING ACCESS INFORMATION OF BROADCAST SERVICE IN A BROADCASTING SYSTEM, AND SYSTEM THEREOF | 21 |
41 | Sourabh Satish | US | Fremont, CA | Aug 04, 2022 / 20220247784 - EXTENSION FRAMEWORK FOR AN INFORMATION TECHNOLOGY AND SECURITY OPERATIONS APPLICATION | 21 |
42 | Hong Li | US | El Dorado Hills, CA | Nov 18, 2021 / 20210360104 - COLLABORATIVE PHONE REPUTATION SYSTEM | 21 |
43 | Gary Barton | US | Boca Raton, FL | Feb 16, 2017 / 20170048204 - CONTROLLING MOBILE DEVICE ACCESS TO SECURE DATA | 21 |
44 | Ned M. Smith | US | Beaverton, OR | Sep 08, 2022 / 20220286354 - Blockchains For Securing IoT Devices | 21 |
45 | Mark J. Stefik | US | Portola Valley, CA | Sep 08, 2022 / 20220284525 - MULTI-TIER BLOCKCHAIN-BASED SYSTEM AND METHOD FOR DOCUMENT TRANSFORMATION AND ACCOUNTABILITY | 21 |
46 | Huazhang Yu | CN | Beijing | Aug 11, 2022 / 20220253565 - TERMINAL ANTI-TAMPER DETECTION METHOD AND APPARATUS | 21 |
47 | Brian M. O'Connell | US | Cary, NC | Mar 19, 2020 / 20200089602 - INTEGRATION TIMES IN A CONTINUOUS INTEGRATION ENVIRONMENT BASED ON STATISTICAL MODELING | 21 |
48 | Mary Ellen Zurko | US | Groton, MA | Dec 29, 2016 / 20160378974 - WEAK PASSWORD SUPPORT IN A MULTI-USER ENVIRONMENT | 20 |
49 | Jason K. Resch | US | Chicago, IL | Jan 13, 2022 / 20220012123 - Encoding Data and Associated Metadata in a Storage Network | 20 |
50 | Jun Cao | CN | Shaanxi | May 14, 2015 / 20150135294 - METHOD, DEVICE, AND SYSTEM FOR AUTHENTICATION | 20 |
51 | Andreas Leicher | DE | Frankfurt | Jun 07, 2018 / 20180159738 - Method and Apparatus for H(e)NB Integrity Verification and Validation | 20 |
52 | Clifford A. Pickover | US | Yorktown Heights, NY | Sep 08, 2022 / 20220282980 - PEDESTRIAN ROUTE GUIDANCE THAT PROVIDES A SPACE BUFFER | 20 |
53 | Gregory G. Raleigh | US | Woodside, CA | Jan 13, 2022 / 20220014512 - End User Device That Secures an Association of Application to Service Policy With an Application Certificate Check | 20 |
54 | Conor Robert White | US | Fairfax, VA | Oct 28, 2021 / 20210334347 - METHODS AND SYSTEMS FOR ENSURING A USER IS PERMITTED TO USE AN OBJECT TO CONDUCT AN ACTIVITY | 20 |
55 | Zhongmin Lang | US | Parkland, FL | Sep 17, 2020 / 20200293364 - Management of Unmanaged User Accounts and Tasks in a Multi-Account Mobile Application | 20 |
56 | Yair Amit | IL | Tel-Aviv | Jan 26, 2017 / 20170026402 - DETECTING STORED CROSS-SITE SCRIPTING VULNERABILITIES IN WEB APPLICATIONS | 20 |
57 | Amit Klein | IL | Herzliya | Jun 01, 2017 / 20170155651 - COMPUTER NETWORK CROSS-BOUNDARY PROTECTION | 19 |
58 | Hideki Matsushima | JP | Osaka | Jun 07, 2018 / 20180159870 - COMMUNICATION METHOD, PROGRAM AND COMMUNICATION DEVICE USING SAME | 19 |
59 | James Robert Walker | US | Deerfield Beach, FL | Feb 16, 2017 / 20170048204 - CONTROLLING MOBILE DEVICE ACCESS TO SECURE DATA | 19 |
60 | Gyan Prakash | US | Beaverton, OR | Dec 02, 2021 / 20210376939 - PROXIMATE COMMUNICATION WITH A TARGET DEVICE | 19 |
61 | Gregory William Dalcher | US | Tigard, OR | Feb 18, 2016 / 20160048686 - SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR MONITORING AN EXECUTION FLOW OF A FUNCTION | 19 |
62 | David Abzarian | US | Kirkland, WA | Jul 09, 2015 / 20150193165 - TRANSIENT STORAGE DEVICE CONFIGURATION SILO | 19 |
63 | Anand Palanigounder | US | San Diego, CA | Aug 25, 2022 / 20220272532 - PC5 LINK SECURITY SETUP USING NON-ACCESS STRATUM SECURITY CONTEXT | 18 |
64 | Prashant Dewan | US | Hillsboro, OR | Dec 27, 2018 / 20180373647 - TECHNOLOGIES FOR PROTECTING VIRTUAL MACHINE MEMORY | 18 |
65 | Andrew A. Hodgkinson | US | Pleasant Grove, UT | Jan 24, 2013 / 20130024908 - SYSTEM AND METHOD FOR APPLICATION-INTEGRATED INFORMATION CARD SELECTION | 18 |
66 | Jason Martin | US | Beaverton, OR | Jan 13, 2022 / 20220012355 - PROVISIONING FEDERATED COMPUTATION ON DISTRIBUTED PRIVATE DATA | 18 |
67 | James D. Bennett | CZ | Hroznetin | Jun 15, 2017 / 20170169510 - COMPUTING SYSTEM SUPPORTING ONLINE PURCHASES | 18 |
68 | Oliver Friedrichs | US | Woodside, CA | Dec 09, 2021 / 20210385123 - GENERATING INCIDENT RESPONSE ACTION RECOMMENDATIONS USING ANONYMIZED ACTION IMPLEMENTATION DATA | 18 |
69 | Gary Stephen Shuster | US | Fresno, CA | Dec 30, 2021 / 20210406323 - METHOD AND APPARATUS FOR PHOTOGRAPH FINDING | 18 |
70 | Yakov Faitelson | IL | Elkana | Dec 27, 2018 / 20180373762 - DATA CLASSIFICATION | 17 |
71 | Lowell L. Wood, Jr. | US | Bellevue, WA | Dec 09, 2021 / 20210381772 - TEMPERATURE-CONTROLLED PORTABLE COOLING UNITS | 17 |
72 | Herbert Anthony Little | CA | Waterloo | Jun 15, 2017 / 20170168932 - Secure Garbage Collection on a Mobile Device | 17 |
73 | Balachander Krishnamurthy | US | New York, NY | Jan 06, 2022 / 20220005077 - METHODS, SYSTEMS, AND DEVICES FOR SELF-CERTIFICATION OF BIAS ABSENCE | 17 |
74 | Daniel A. Gerrity | US | Seattle, WA | Jun 30, 2016 / 20160188929 - SYSTEMS AND METHODS FOR SCANNING A USER ENVIRONMENT AND EVALUATING DATA OF INTEREST | 17 |
75 | Manabu Maeda | JP | Osaka | Sep 01, 2022 / 20220278908 - INFORMATION MANAGEMENT METHOD | 17 |
76 | Sri Ramanathan | US | Lutz, FL | Jun 01, 2017 / 20170154192 - METHOD AND APPARATUS FOR SPECIFYING TIME-VARYING INTELLIGENT SERVICE-ORIENTED MODEL | 17 |
77 | Boris Yanovsky | US | Saratoga, CA | Jun 22, 2017 / 20170178003 - DATA PATTERN ANALYSIS USING OPTIMIZED DETERMINISTIC FINITE AUTOMATION | 17 |
78 | Hongxia Jin | US | San Jose, CA | Jan 06, 2022 / 20220005464 - SYSTEM AND METHOD FOR LEARNING NEW CONCEPTS FROM INPUT UTTERANCES | 17 |
79 | Guillermo Lao | US | Torrance, CA | May 28, 2015 / 20150149369 - METHOD AND APPARATUS FOR ESTABLISHING USAGE RIGHTS FOR DIGITAL CONTENT TO BE CREATED IN THE FUTURE | 17 |
80 | Frampton E. Ellis | US | Jasper, FL | Dec 02, 2021 / 20210375453 - Smartphone-Controlled Active Configuration of Footwear, Including With Concavely Rounded Soles | 17 |
81 | Benjamin Livshits | US | Kirkland, WA | Mar 03, 2016 / 20160062468 - Gesture Processing Using a Domain-Specific Gesture Language | 16 |
82 | Alexander J. Cohen | US | Mill Valley, CA | Dec 31, 2020 / 20200412877 - IDENTIFIER TECHNIQUE FOR COMMUNICATION INTERCHANGE | 16 |
83 | Gustavo De Los Reyes | US | Fair Haven, NJ | Jun 22, 2017 / 20170180416 - System For Distributing Virtual Entity Behavior Profiling In Cloud Deployments | 16 |
84 | Neil P. Adams | CA | Waterloo | Nov 19, 2015 / 20150334120 - Server verification of secure electronic messages | 16 |
85 | Gary W. Grube | US | Barrington Hills, IL | Sep 01, 2022 / 20220279334 - PROVIDING STATUS OF USER DEVICES DURING A BIOLOGICAL THREAT EVENT | 16 |
86 | Brett M. Oliphant | US | Plano, TX | Mar 31, 2016 / 20160094576 - ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT | 16 |
87 | Mats Naslund | SE | Bromma | Jul 14, 2022 / 20220224543 - INTEGRITY PROTECTION | 16 |
88 | Marc E. Davis | US | San Francisco, CA | Sep 25, 2014 / 20140287782 - TIME CODE VALIDATION AND CORRECTION FOR PROXIMITY-BASED AD HOC NETWORKS | 16 |
89 | John P. Blignaut | US | West Lafayette, IN | Mar 31, 2016 / 20160094576 - ANTI-VULNERABILITY SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT | 16 |
90 | Peter L.t. Pirolli | US | San Francisco, CA | Sep 11, 2014 / 20140259187 - SYSTEM AND METHOD FOR UTILIZING CONTENT IN ACCORDANCE WITH USAGE RIGHTS | 16 |
91 | Evgeny Beskrovny | IL | Ramat Gan | May 19, 2016 / 20160142437 - METHOD AND SYSTEM FOR PREVENTING INJECTION-TYPE ATTACKS IN A WEB BASED OPERATING SYSTEM | 16 |
92 | Lisa Seacat Deluca | US | San Francisco, CA | Dec 27, 2018 / 20180374006 - DETERMINING PATHS OF SHOPPERS IN A SHOPPING VENUE | 16 |
93 | Hank Risan | US | Santa Cruz, CA | Oct 01, 2015 / 20150278533 - METHOD FOR REDIRECTING OF KERNEL DATA PATH FOR CONTROLLING RECORDING OF MEDIA | 16 |
94 | Daniel S. Sanders | US | Orem, UT | Jan 24, 2013 / 20130024908 - SYSTEM AND METHOD FOR APPLICATION-INTEGRATED INFORMATION CARD SELECTION | 16 |
95 | Jeffrey A. Aaron | US | Atlanta, GA | Nov 25, 2021 / 20210367835 - METHOD AND APPARATUS FOR OPTIMIZING A SOFTWARE DEFINED NETWORK CONFIGURATION | 16 |
96 | Tobias M. Kohlenberg | US | Portland, OR | Nov 18, 2021 / 20210358059 - Methods, systems, apparatus and articles of manufacture to obfuscate metered data using a mask | 16 |
97 | Keng Lim | US | Atherton, CA | Oct 07, 2021 / 20210312584 - Protecting Documents with Security Overlays | 16 |
98 | Ned M. Smith | US | Hillsboro, OR | Jun 15, 2017 / 20170169231 - TECHNOLOGIES FOR ENHANCED USER AUTHENTICATION USING ADVANCED SENSOR MONITORING | 15 |
99 | Karl Norrman | SE | Stockholm | Sep 15, 2022 / 20220294706 - METHODS, APPARATUS AND MACHINE-READABLE MEDIA RELATING TO MACHINE-LEARNING IN A COMMUNICATION NETWORK | 15 |
100 | Research In Motion Limited | CA | Waterloo | Aug 08, 2013 / 20130205409 - APPARATUS, AND ASSOCIATED METHOD, FOR ALERTING USER OF COMMUNICATION DEVICE OF ENTRIES ON A MAIL MESSAGE DISTRIBUTION LIST | 15 |