Issued Patents 2019
Showing 1–25 of 27 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10505904 | Dynamically defined virtual private network tunnels in hybrid cloud environments | Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam | 2019-12-10 |
| 10469399 | Managing remote device based on physical state of a management device | Joshua A. Alger, Alan R. Buss, Belinda M. Vennam | 2019-11-05 |
| 10454865 | Social network activity modes | Shadi E. Albouyeh, Bernadette A. Carter, Stephanie L. Trunzo | 2019-10-22 |
| 10452687 | Identifying content in an incoming message on a social network | Shadi E. Albouyeh, Bernadette A. Carter, Stephanie L. Trunzo | 2019-10-22 |
| 10452123 | Predictive power saving and screen dimming for computing devices | Daniel Victor Klein | 2019-10-22 |
| 10445342 | Identifying content in an incoming message on a social network | Shadi E. Albouyeh, Bernadette A. Carter, Stephanie L. Trunzo | 2019-10-15 |
| 10432566 | Determining membership causes for new user and continued involvement in social network sites | Jonathan F. Brunn, Marit L. Imsdahl, Asima Silva | 2019-10-01 |
| 10412104 | Data protection in a networked computing environment | Gregory J. Boss, Rick A. Hamilton, II, Agueda M. H. Magro | 2019-09-10 |
| 10373273 | Evaluating an impact of a user's content utilized in a social network | Jonathan F. Brunn, Asima Silva | 2019-08-06 |
| 10348669 | Encouraging the engagement of users on a social network site | Jonathan F. Brunn, Marit L. Imsdahl, Asima Silva | 2019-07-09 |
| 10341366 | Managing security breaches in a networked computing environment | Gregory J. Boss, Rick A. Hamilton, II, Agueda M. H. Magro | 2019-07-02 |
| 10326785 | Data protection in a networked computing environment | Gregory J. Boss, Rick A. Hamilton, II, Agueda M. H. Magro | 2019-06-18 |
| 10310848 | Parallel development of diverged source streams | Barry J. Pellas, David M. Stecher | 2019-06-04 |
| 10249068 | User experience for multiple uploads of documents based on similar source material | Jonathan F. Brunn, Asima Silva | 2019-04-02 |
| 10244002 | Secure application zones for cloud burst environments | Nataraj Nagaratnam, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer | 2019-03-26 |
| 10237064 | Using everyday objects as cryptographic keys | Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam | 2019-03-19 |
| 10226982 | Automatic vehicle climate control based on predicted air quality | Joshua A. Alger, Alan R. Buss, James D. Creasman | 2019-03-12 |
| 10225141 | Application hierarchy specification with real-time functional selection | Kulvir S. Bhogal, Jonathan F. Brunn, Asima Silva | 2019-03-05 |
| 10216735 | Social networking response management system | Shadi E. Albouyeh, Bernadette A. Carter | 2019-02-26 |
| 10216736 | Social networking response management system | Shadi E. Albouyeh, Bernadette A. Carter | 2019-02-26 |
| 10212190 | Context-based cloud security assurance system | Nataraj Nagaratnam, Sreekanth Ramakrishna Iyer, Sridhar R. Muppidi | 2019-02-19 |
| 10200387 | User state tracking and anomaly detection in software-as-a-service environments | Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Nataraj Nagaratnam | 2019-02-05 |
| 10178414 | Aggregated region-based reduced bandwidth video streaming | Kulvir S. Bhogal, Jonathan F. Brunn, Asima Silva | 2019-01-08 |
| 10178044 | Providing a guest with access to content of a social network | Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess | 2019-01-08 |
| 10171381 | Providing a guest with access to content of a social network | Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess | 2019-01-01 |