Issued Patents 2018
Showing 1–23 of 23 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10163059 | Conversation branching for more efficient resolution | Paul R. Bastide, Kulvir S. Bhogal, Asima Silva | 2018-12-25 |
| 10148660 | Delivering author specific content | Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess | 2018-12-04 |
| 10142293 | Dynamically defined virtual private network tunnels in hybrid cloud environments | Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam | 2018-11-27 |
| 10140298 | Social networking response management system | Shadi E. Albouyeh, Bernadette A. Carter | 2018-11-27 |
| 10091305 | Disconnect protection for command-line remote terminals | Joshua A. Alger, Alan R. Buss, James D. Creasman | 2018-10-02 |
| 10042885 | Index table based routing for query resource optimization | Rick A. Hamilton, II, Brian M. O'Connell, Clifford A. Pickover, Keith R. Walker | 2018-08-07 |
| 10028139 | Leveraging mobile devices to enforce restricted area security | Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam | 2018-07-17 |
| 10015128 | Social content features based on user tracking | Jonathan F. Brunn, Marit L. Imsdahl, Asima Silva | 2018-07-03 |
| 10009308 | Social content features based on user tracking | Jonathan F. Brunn, Marit L. Imsdahl, Asima Silva | 2018-06-26 |
| 9954870 | System conversion in a networked computing environment | Gregory J. Boss, Rick A. Hamilton, II, Agueda M. H. Magro | 2018-04-24 |
| 9935971 | Mitigation of virtual machine security breaches | Rick A. Hamilton, II, Jenny S. Li, Shawn P. Mullen | 2018-04-03 |
| 9923908 | Data protection in a networked computing environment | Gregory J. Boss, Rick A. Hamilton, II, Agueda M. H. Magro | 2018-03-20 |
| 9912477 | Using everyday objects as cryptographic keys | Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam | 2018-03-06 |
| 9912701 | Administration of a context-based cloud security assurance system | Nataraj Nagaratnam, Sreekanth Ramakrishna Iyer, Sridhar R. Muppidi | 2018-03-06 |
| 9894086 | Managing security breaches in a networked computing environment | Gregory J. Boss, Rick A. Hamilton, II, Agueda M. H. Magro | 2018-02-13 |
| 9888340 | Non-intrusive proximity based advertising and message delivery | Jonathan F. Brunn, Marit L. Imsdahl, Asima Silva | 2018-02-06 |
| 9888040 | Secure application zones for cloud burst environments | Nataraj Nagaratnam, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer | 2018-02-06 |
| 9881345 | Evaluating an impact of a user's content utilized in a social network | Jonathan F. Brunn, Asima Silva | 2018-01-30 |
| 9882979 | Image file transmission | Shadi E. Albouyeh, Stephanie L. Trunzo | 2018-01-30 |
| 9876822 | Administration of a context-based cloud security assurance system | Nataraj Nagaratnam, Sreekanth Ramakrishna Iyer, Sridhar R. Muppidi | 2018-01-23 |
| 9875399 | Augmenting gesture based security technology for improved classification and learning | Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam | 2018-01-23 |
| 9871822 | Deployment using a context-based cloud security assurance system | Nataraj Nagaratnam, Sreekanth Ramakrishna Iyer, Sridhar R. Muppidi | 2018-01-16 |
| 9858625 | Leveraging skipped relationships in a social network | Jonathan F. Brunn, Asima Silva | 2018-01-02 |