Issued Patents 2017
Showing 1–25 of 25 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9853860 | Application hierarchy specification with real-time functional selection | Kulvir S. Bhogal, Jonathan F. Brunn, Asima Silva | 2017-12-26 |
| 9838431 | Context-based cloud security assurance system | Nataraj Nagaratnam, Sreekanth Ramakrishna Iyer, Sridhar R. Muppidi | 2017-12-05 |
| 9838274 | Method for enhancing security access to a node in a homogenous cloud computing environment | Joshua A. Alger, Barry J. Pellas, David M. Stecher | 2017-12-05 |
| 9830477 | Audience-based sensitive information handling for shared collaborative documents | Kulvir S. Bhogal, Jonathan F. Brunn, Asima Silva | 2017-11-28 |
| 9824237 | Audience-based sensitive information handling for shared collaborative documents | Kulvir S. Bhogal, Jonathan F. Brunn, Asima Silva | 2017-11-21 |
| 9794692 | Multi-channel speaker output orientation detection | Kulvir S. Bhogal, Jonathan F. Brunn, Asima Silva | 2017-10-17 |
| 9781013 | Homogenizing tooling for a heterogeneous cloud environment | Joshua A. Alger, Barry J. Pellas, David M. Stecher | 2017-10-03 |
| 9762616 | Application-based security rights in cloud environments | Nataraj Nagaratnam, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer | 2017-09-12 |
| 9756173 | Leveraging mobile devices to enforce restricted area security | Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam | 2017-09-05 |
| 9733918 | Using cloud patterns for installation on unmanaged physical machines and appliances | Joshua A. Alger, Barry J. Pellas | 2017-08-15 |
| 9736158 | Delivering author specific content | Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess | 2017-08-15 |
| 9729318 | Using everyday objects as cryptographic keys | Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam | 2017-08-08 |
| 9699580 | Electronic media volume control | Kulvir S. Bhogal, Jonathan F. Brunn, Asima Silva | 2017-07-04 |
| 9699213 | Cost-based configuration using a context-based cloud security assurance system | Nataraj Nagaratnam, Sreekanth Ramakrishna Iyer, Sridhar R. Muppidi | 2017-07-04 |
| 9684798 | Audience-based sensitive information handling for shared collaborative documents | Kulvir S. Bhogal, Jonathan F. Brunn, Asima Silva | 2017-06-20 |
| 9684799 | Audience-based sensitive information handling for shared collaborative documents | Kulvir S. Bhogal, Jonathan F. Brunn, Asima Silva | 2017-06-20 |
| 9646255 | Conversation branching for more efficient resolution | Paul R. Bastide, Kulvir S. Bhogal, Asima Silva | 2017-05-09 |
| 9621698 | Identifying a contact based on a voice communication session | Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess | 2017-04-11 |
| 9606711 | Evaluating portions of content in an online community | Shadi E. Albouyeh, Bernadette A. Carter, Stephanie L. Trunzo | 2017-03-28 |
| 9600165 | Evaluating portions of content in an online community | Shadi E. Albouyeh, Bernadette A. Carter, Stephanie L. Trunzo | 2017-03-21 |
| 9600320 | Mitigation of virtual machine security breaches | Rick A. Hamilton, II, Jenny S. Li, Shawn P. Mullen | 2017-03-21 |
| 9588750 | Pseudo program use during program installation | Barry J. Pellas, Matthew T. Pellas, David M. Stecher | 2017-03-07 |
| 9578063 | Application self-service for assured log management in cloud environments | Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam | 2017-02-21 |
| 9571618 | Identifying a contact based on a voice communication session | Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess | 2017-02-14 |
| 9571457 | Dynamically defined virtual private network tunnels in hybrid cloud environments | Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam | 2017-02-14 |