| 9838431 |
Context-based cloud security assurance system |
Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Sridhar R. Muppidi |
2017-12-05 |
| 9830342 |
Optimizing database deduplication |
Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi |
2017-11-28 |
| 9792293 |
Managing service access through social context |
Alex Cherian, Sreekanth Ramakrishna Iyer, Rohit Shetty |
2017-10-17 |
| 9767301 |
Context aware data protection |
Srinivas Jandhyala, Albee Jhoney, Sridhar R. Muppidi, Atul Saxena |
2017-09-19 |
| 9762616 |
Application-based security rights in cloud environments |
Jeffrey R. Hoy, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer |
2017-09-12 |
| 9756173 |
Leveraging mobile devices to enforce restricted area security |
Sreekanth Ramakrishna Iyer, Jeffrey R. Hoy, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan |
2017-09-05 |
| 9727902 |
Mitigating distribution and consumption of counterfeit products |
Sanjay M. Kesavan, Lohitashwa Thyagaraj |
2017-08-08 |
| 9729318 |
Using everyday objects as cryptographic keys |
Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan |
2017-08-08 |
| 9727899 |
Manufacturing and distribution to avoid counterfeit products |
Sanjay M. Kesavan, Lohitashwa Thyagaraj |
2017-08-08 |
| 9710834 |
Pre and post purchase identification of counterfeit products |
Sanjay M. Kesavan, Lohitashwa Thyagaraj |
2017-07-18 |
| 9699213 |
Cost-based configuration using a context-based cloud security assurance system |
Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Sridhar R. Muppidi |
2017-07-04 |
| 9665577 |
Controlling enterprise data on mobile device via the use of a tag index |
Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Vikrant Nandakumar |
2017-05-30 |
| 9665576 |
Controlling enterprise data on mobile device via the use of a tag index |
Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Vikrant Nandakumar |
2017-05-30 |
| 9658781 |
Tier based data file management |
Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi |
2017-05-23 |
| 9621592 |
System and method for software defined deployment of security appliances using policy templates |
Paul Ashley, Stefan Berger, Tian Cheng Liu, He Huang, Sreekanth Ramakrishna Iyer +3 more |
2017-04-11 |
| 9607142 |
Context aware recertification |
Manjeri Ramanathan Dharmarajan, Kaushal Kiran Kapadia, Vigneshwarnath Miriyala, Darshini G. Swamy, Suyesh R. Tiwari |
2017-03-28 |
| 9609023 |
System and method for software defined deployment of security appliances using policy templates |
Paul Ashley, Stefan Berger, Tian Cheng Liu, He Huang, Sreekanth Ramakrishna Iyer +3 more |
2017-03-28 |
| 9578063 |
Application self-service for assured log management in cloud environments |
Sreekanth Ramakrishna Iyer, Jeffrey R. Hoy, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan |
2017-02-21 |
| 9571457 |
Dynamically defined virtual private network tunnels in hybrid cloud environments |
Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan |
2017-02-14 |