Issued Patents All Time
Showing 25 most recent of 33 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12267310 | Self-encrypting key management system | Ambuj Kumar, Jethro Gideon Beekman, Faisal Faruqui | 2025-04-01 |
| 12086217 | Geo-fencing of an application for a secure cryptographic environment | Ambuj Kumar | 2024-09-10 |
| 11627117 | Secure search service | Ambuj Kumar, Nehal Bandi | 2023-04-11 |
| 11627116 | Secure computation of multiparty data | Ambuj Kumar, Nehal Bandi | 2023-04-11 |
| 11399013 | Secure service mesh | Nehal Bandi | 2022-07-26 |
| 11349822 | Runtime encryption plugin for a key management system | Ambuj Kumar, Jethro Gideon Beekman, Jeffrey Seyfried | 2022-05-31 |
| 11159309 | Obtaining quorum approval to perform an operation with a cryptographic item of a key management system | Jeffrey Seyfried, Jethro Gideon Beekman | 2021-10-26 |
| 10911538 | Management of and persistent storage for nodes in a secure cluster | Ambuj Kumar, Jethro Gideon Beekman, Faisal Faruqui, Andrew John Leiserson | 2021-02-02 |
| 10686769 | Secure key caching client | Andrew John Leiserson, Jeffrey Seyfried, Jethro Gideon Beekman | 2020-06-16 |
| 10609006 | Self-encrypting key management system | Ambuj Kumar, Jethro Gideon Beekman, Faisal Faruqui | 2020-03-31 |
| 10169584 | Systems and methods for identifying non-malicious files on computing devices within organizations | Kevin Roundy, Sandeep Bhatkar, Aleatha Parker-Wood, Yin-Chen Liu, Leylya Yumer +1 more | 2019-01-01 |
| 10104097 | Systems and methods for preventing targeted malware attacks | Leylya Yumer, Olivier Thonnard | 2018-10-16 |
| 10055586 | Systems and methods for determining the trustworthiness of files within organizations | Kevin Roundy, Sandeep Bhatkar, Christopher Gates, Yin-Chen Liu, Aleatha Parker-Wood +1 more | 2018-08-21 |
| 10025937 | Practical and dynamic approach to enterprise hardening | Kevin Roundy, Sandeep Bhatkar, Aleatha Parker-Wood, Christopher Gates, Yin-Chen Liu +1 more | 2018-07-17 |
| 10015768 | Systems and methods for locating unrecognized computing devices | Qiyan Wang | 2018-07-03 |
| 9972177 | Wireless router configured to detect an intruder | Qiyan Wang | 2018-05-15 |
| 9961079 | Context aware intruder detection using WIFI MAC addresses | Qiyan Wang | 2018-05-01 |
| 9948603 | System and method of constructing dynamic namespaces in the internet of things | Eun-Kyu Lee, Petros Efstathopoulos | 2018-04-17 |
| 9807094 | Systems and methods for dynamic access control over shared resources | Yin-Chen Liu, Sandeep Bhatkar, Kevin Roundy, Leylya Yumer, Aleatha Parker-Wood +1 more | 2017-10-31 |
| 9798876 | Systems and methods for creating security profiles | Aleatha Parker-Wood, Christopher Gates, Kevin Roundy, Leylya Yumer, Sandeep Bhatkar +1 more | 2017-10-24 |
| 9800590 | Systems and methods for threat detection using a software program update profile | Christopher Gates, Kevin Roundy, Sandeep Bhatkar, Yin-Chen Liu, Aleatha Parker-Wood +1 more | 2017-10-24 |
| 9786138 | Using the home wireless router to detect an intruder not carrying any wireless device | Qiyan Wang | 2017-10-10 |
| 9659474 | Automatically learning signal strengths at places of interest for wireless signal strength based physical intruder detection | Yongjie Cai, Qiyan Wang | 2017-05-23 |
| 9652597 | Systems and methods for detecting information leakage by an organizational insider | Kevin Roundy | 2017-05-16 |
| 9572125 | Systems and methods for locating unrecognized computing devices | Qiyan Wang | 2017-02-14 |