AK

Anand Kashyap

Broadcom: 23 patents #385 of 9,346Top 5%
FO Fortanix: 10 patents #2 of 12Top 20%
Overall (All Time): #105,277 of 4,157,543Top 3%
33
Patents All Time

Issued Patents All Time

Showing 25 most recent of 33 patents

Patent #TitleCo-InventorsDate
12267310 Self-encrypting key management system Ambuj Kumar, Jethro Gideon Beekman, Faisal Faruqui 2025-04-01
12086217 Geo-fencing of an application for a secure cryptographic environment Ambuj Kumar 2024-09-10
11627117 Secure search service Ambuj Kumar, Nehal Bandi 2023-04-11
11627116 Secure computation of multiparty data Ambuj Kumar, Nehal Bandi 2023-04-11
11399013 Secure service mesh Nehal Bandi 2022-07-26
11349822 Runtime encryption plugin for a key management system Ambuj Kumar, Jethro Gideon Beekman, Jeffrey Seyfried 2022-05-31
11159309 Obtaining quorum approval to perform an operation with a cryptographic item of a key management system Jeffrey Seyfried, Jethro Gideon Beekman 2021-10-26
10911538 Management of and persistent storage for nodes in a secure cluster Ambuj Kumar, Jethro Gideon Beekman, Faisal Faruqui, Andrew John Leiserson 2021-02-02
10686769 Secure key caching client Andrew John Leiserson, Jeffrey Seyfried, Jethro Gideon Beekman 2020-06-16
10609006 Self-encrypting key management system Ambuj Kumar, Jethro Gideon Beekman, Faisal Faruqui 2020-03-31
10169584 Systems and methods for identifying non-malicious files on computing devices within organizations Kevin Roundy, Sandeep Bhatkar, Aleatha Parker-Wood, Yin-Chen Liu, Leylya Yumer +1 more 2019-01-01
10104097 Systems and methods for preventing targeted malware attacks Leylya Yumer, Olivier Thonnard 2018-10-16
10055586 Systems and methods for determining the trustworthiness of files within organizations Kevin Roundy, Sandeep Bhatkar, Christopher Gates, Yin-Chen Liu, Aleatha Parker-Wood +1 more 2018-08-21
10025937 Practical and dynamic approach to enterprise hardening Kevin Roundy, Sandeep Bhatkar, Aleatha Parker-Wood, Christopher Gates, Yin-Chen Liu +1 more 2018-07-17
10015768 Systems and methods for locating unrecognized computing devices Qiyan Wang 2018-07-03
9972177 Wireless router configured to detect an intruder Qiyan Wang 2018-05-15
9961079 Context aware intruder detection using WIFI MAC addresses Qiyan Wang 2018-05-01
9948603 System and method of constructing dynamic namespaces in the internet of things Eun-Kyu Lee, Petros Efstathopoulos 2018-04-17
9807094 Systems and methods for dynamic access control over shared resources Yin-Chen Liu, Sandeep Bhatkar, Kevin Roundy, Leylya Yumer, Aleatha Parker-Wood +1 more 2017-10-31
9798876 Systems and methods for creating security profiles Aleatha Parker-Wood, Christopher Gates, Kevin Roundy, Leylya Yumer, Sandeep Bhatkar +1 more 2017-10-24
9800590 Systems and methods for threat detection using a software program update profile Christopher Gates, Kevin Roundy, Sandeep Bhatkar, Yin-Chen Liu, Aleatha Parker-Wood +1 more 2017-10-24
9786138 Using the home wireless router to detect an intruder not carrying any wireless device Qiyan Wang 2017-10-10
9659474 Automatically learning signal strengths at places of interest for wireless signal strength based physical intruder detection Yongjie Cai, Qiyan Wang 2017-05-23
9652597 Systems and methods for detecting information leakage by an organizational insider Kevin Roundy 2017-05-16
9572125 Systems and methods for locating unrecognized computing devices Qiyan Wang 2017-02-14