11
Pau Chen Cheng, Lawrence Koved, Kapil K Singh: Trust/value/risk-based access control policy. International Business Machines Corporation, Yee & Associates P C, Jeffrey S LaBaw, August 30, 2016: US09432375 (1 worldwide citation)

Generating a resource access control decision is provided. A user trust value associated with a user identifier of a user requesting access to a protected resource is modulated based on an estimated risk value associated with a context of a resource access request. The resource access control decisi ...


12
Kay S Anderson, Pau Chen Cheng, Mark D Feblowitz, Genady Grabarnik, Shai Halevi, Nagui Halim, Trent R Jaeger, Paul Ashley Karger, Zhen Liu, Ronald Perez, Anton V Riabov, Pankaj Rohatgi, Angela Marie Schuett, Michael Steiner, Grant M Wagner: Method of managing and mitigating security risks through planning. International Business Machines Corporation, F Chau & Associates, January 17, 2012: US08099781 (1 worldwide citation)

An exemplary method is provided for managing and mitigating security risks through planning. A first security-related information of a requested product is received. A second security-related information of resources that are available for producing the requested product is received. A multi-stage p ...


13
Pau Chen Cheng, Stephen C Gates, Lawrence Koved, Wilfried Teiken: System and method to provide server control for access to mobile client data. INTERNATIONAL BUSINESS MACHINES CORPORATION, Tutunjian & Bitetto P C, Jeff LawBaw, July 18, 2017: US09712565 (1 worldwide citation)

Systems and methods for protecting a data item include, upon initiation of transfer of the data item from a server to a client device, determining a sensitivity score and a current protection level of the data item. A policy is applied to determine an appropriate protection for the data item based u ...


14
Pau Chen Cheng, Lawrence Koved, Kapil K Singh, Calvin B Swart, Sharon M Trewin: Suppression of authorization risk feedback to mitigate risk factor manipulation in an authorization system. International Business Machines Corporation, Scully Scott Murphy & Presser P C, Jeffrey LaBaw Esq, October 2, 2018: US10091181

Dynamic risk communication associated with a computer device may include automatically detecting one or more security risk factors for the computer device based on current context information associated with the computer device. Whether an attempt is being made via the computer device to manipulate ...


15
Pau Chen Cheng, Lawrence Koved, Kapil K Singh, Calvin B Swart, Sharon M Trewin: Suppression of authorization risk feedback to mitigate risk factor manipulation in an authorization system. International Business Machines Corporation, Scully Scott Murphy & Presser P C, Jeff S LaBaw, October 3, 2017: US09781095

Dynamic risk communication associated with a computer device may include automatically detecting one or more security risk factors for the computer device based on current context information associated with the computer device. Whether an attempt is being made via the computer device to manipulate ...


16
Pau Chen Cheng, Stephen C Gates, Lawrence Koved, Wilfried Teiken: System and method to provide server control for access to mobile client data. International Business Machines Corporation, Tutunjian & Bitetto P C, Jeff Labaw, March 14, 2017: US09594921

Systems and methods for protecting a data item include, upon initiation of transfer of the data item from a server to a client device, determining a sensitivity score and a current protection level of the data item. A policy is applied to determine an appropriate protection for the data item based u ...


17
Pau Chen Cheng, Pankaj Rohatgi, Claudia Keser, Josyula R Rao: Risk adaptive information flow based access control. INTERNATIONAL BUSINESS MACHINES CORPORATION, Patent Portfolio Builders PLLC, February 28, 2017: US09582674

Systems and methods are provided to manage risk associated with access to information within a given organization. The overall risk tolerance for the organization is determined and allocated among a plurality of subjects within the organization. Allocation is accomplished using either a centralized, ...


18
Pau Chen Cheng, Stephen C Gates, Lawrence Koved, Wilfried Teiken: System and method to provide server control for access to mobile client data. International Business Machines Corporation, Tutunjian & Bittetto P C, Anne V Dougherty, September 15, 2015: US09135465

Systems and methods for protecting a data item include, upon initiation of transfer of the data item from a server to a client device, determining a sensitivity score and a current protection level of the data item. A policy is applied to determine an appropriate protection for the data item based u ...


19
Pau Chen Cheng, Lawrence Koved, Kapil K Singh: Adaptive behavior profiling and anomaly scoring through continuous learning. International Business Machines Corporation, Yee & Associates P C, Jeffrey S LaBaw, October 31, 2017: US09807105

Generating a behavior profile is provided. A newness score is calculated for a data point corresponding to a context of an access request to a resource made by a user of a client device. Newness scores for a plurality of data points corresponding to contexts of a plurality of access requests are agg ...


20
Suresh N Chari, Pau Chen Cheng, Xin Hu, Lawrence Koved, Josyula R Rao, Reiner Sailer, Douglas L Schales, Kapil K Singh, Marc P Stoecklin: Network data collection and response system. INTERNATIONAL BUSINESS MACHINES CORPORATION, Cantor Colburn, Jeffrey Labaw, December 26, 2017: US09854057

Embodiments include a network data collection and response system for enhancing security in an enterprise network providing a user-supplied computing device with access to the network. A network data collection and response system tracks network activity of the device and maintains a device inventor ...