Growing community of inventors

Raleigh, NC, United States of America

Nathaniel Wook Kim

Average Co-Inventor Count = 3.73

ph-index = 8

The patent ph-index is calculated by counting the number of publications for which an author has been cited by other authors at least that same number of times.

Forward Citations = 189

Nathaniel Wook KimAshley Anderson Brock (8 patents)Nathaniel Wook KimCharles Steven Lingafelt (7 patents)Nathaniel Wook KimJeffrey Scott Bardsley (7 patents)Nathaniel Wook KimCharles K Davis, Iii (3 patents)Nathaniel Wook KimJohn Joseph McKenna (3 patents)Nathaniel Wook KimCarlos F Villegas (3 patents)Nathaniel Wook KimNorman Clark Strole (1 patent)Nathaniel Wook KimAllen Leonid Roginsky (1 patent)Nathaniel Wook KimKevin Thomas McClain (1 patent)Nathaniel Wook KimAshley Anderson Brook (1 patent)Nathaniel Wook KimNathaniel Wook Kim (11 patents)Ashley Anderson BrockAshley Anderson Brock (9 patents)Charles Steven LingafeltCharles Steven Lingafelt (163 patents)Jeffrey Scott BardsleyJeffrey Scott Bardsley (28 patents)Charles K Davis, IiiCharles K Davis, Iii (12 patents)John Joseph McKennaJohn Joseph McKenna (8 patents)Carlos F VillegasCarlos F Villegas (4 patents)Norman Clark StroleNorman Clark Strole (39 patents)Allen Leonid RoginskyAllen Leonid Roginsky (31 patents)Kevin Thomas McClainKevin Thomas McClain (7 patents)Ashley Anderson BrookAshley Anderson Brook (1 patent)
..
Inventor’s number of patents
..
Strength of working relationships

Company Filing History:

1. International Business Machines Corporation (9 from 164,306 patents)

2. Lenovo (Singapore) Pte. Ltd. (1 from 4,177 patents)

3. Trend Micro Inc. (1 from 620 patents)


11 patents:

1. 9208321 - Method for administration of computer security threat countermeasures to a computer system

2. 7845004 - Correlating network information and intrusion information to find the entry point of an attack upon a protected computer

3. 7818580 - Control of port based authentication protocols and process to support transfer of connection information

4. 7730537 - Method of operating an intrusion detection system

5. 7386883 - Systems, methods and computer program products for administration of computer security threat countermeasures to a computer system

6. 7370345 - Domain controlling systems, methods and computer program products for administration of computer security threat countermeasures to a domain of target computer systems

7. 7308714 - Limiting the output of alerts generated by an intrusion detection sensor during a denial of service attack

8. 7280931 - Method and system for calibrating an electrical device

9. 7150043 - Intrusion detection method and signature table

10. 7036148 - Method of operating an intrusion detection system according to a set of business rules

11. 6928549 - Dynamic intrusion detection for computer systems

Please report any incorrect information to support@idiyas.com
idiyas.com
as of
1/22/2026
Loading…