| 10841315 |
Enhanced security using wearable device with authentication system |
Pamela A. Nesbitt, Sandeep R. Patil, Sachin C. Punadikar |
2020-11-17 |
| 10834100 |
Dynamically defined virtual private network tunnels in hybrid cloud environments |
Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan |
2020-11-10 |
| 10819527 |
Secure trust based distribution of digital certificates |
Karunakar Bojjireddy, Sreekanth Ramakrishna Iyer, Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Gal Shachor |
2020-10-27 |
| 10812276 |
Secure trust based distribution of digital certificates |
Karunakar Bojjireddy, Sreekanth Ramakrishna Iyer, Sudheesh S. Kairali, Vijay R. Kalangumvathakkal, Gal Shachor |
2020-10-20 |
| 10776459 |
Facilitating build and deploy runtime memory encrypted cloud applications and containers |
Karunakar Bojjireddy, Sreekanth Ramakrishna Iyer, Pratheek Karnati |
2020-09-15 |
| 10754835 |
High-efficiency deduplication module of a database-management system |
Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi |
2020-08-25 |
| 10713031 |
Enforcing security policies for software containers |
Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Sulakshan Vajipayajula |
2020-07-14 |
| 10671285 |
Tier based data file management |
Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi |
2020-06-02 |
| 10673900 |
Application-based security rights in cloud environments |
Jeffrey R. Hoy, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer |
2020-06-02 |
| 10673885 |
User state tracking and anomaly detection in software-as-a-service environments |
Ravi Krishnan Muthukrishnan, Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia |
2020-06-02 |
| 10628682 |
Augmenting gesture based security technology using mobile devices |
Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan |
2020-04-21 |
| 10587423 |
Cognitive psychology authentication in multi-factor authentication systems |
Pamela A. Nesbitt, Sandeep R. Patil, Sasikanth Eda |
2020-03-10 |
| 10528261 |
Optimized performance through leveraging appropriate disk sectors for defragmentation in an erasure coded heterogeneous object storage cloud |
Duane M. Baldwin, Abhishek S. Dave, Sasikanth Eda, John T. Olson, Sandeep R. Patil |
2020-01-07 |
| 10528748 |
Context-driven on-device data protection |
Kapil Kumar Singh |
2020-01-07 |