| 12339956 |
Endpoint isolation and incident response from a secure enclave |
Mandar Nanivadekar, Bharath Kumar Chandrasekhar |
2025-06-24 |
| 12254091 |
Endpoint incident response from a secure enclave through dynamic insertion of an interrupt |
Mandar Nanivadekar, Bharath Kumar Chandrasekhar |
2025-03-18 |
| 12099862 |
Hypervisor-assisted secured memory sharing among host and guest operating system |
Goresh Musalay, Zubraj Singha, Tanay Ganguly, Kashish Bhatia |
2024-09-24 |
| 12095629 |
Security threat detection during service query handling |
Nakul Ogale, Shirish Vijayvargiya |
2024-09-17 |
| 11989298 |
Methods and apparatus to validate and restore machine configurations |
Nilesh Awate, Goresh Musalay, V S V Vijay |
2024-05-21 |
| 11949651 |
Domain name service (DNS) server cache table validation |
Shirish Vijayvargiya, Sunil Hasbe, Nakul Ogale |
2024-04-02 |
| 11934857 |
Supporting execution of a computer program by using a memory page of another computer program |
Goresh Musalay, Zubraj Singha, Tanay Ganguly, Kashish Bhatia |
2024-03-19 |
| 11847221 |
System and method for content scanning using sparse files |
Mandar Nanivadekar, Bharath Kumar Chandrasekhar |
2023-12-19 |
| 11645390 |
Cloud-based method to increase integrity of a next generation antivirus (NGAV) security solution in a virtualized computing environment |
Shirish Vijayvargiya, Vasantha Kumar Dhanasekar, Rayanagouda Bheemanagouda Patil |
2023-05-09 |
| 11645400 |
Secured interprocess communication |
Shirish Vijayvargiya |
2023-05-09 |
| 11575646 |
Domain name service (DNS) server cache table validation |
Shirish Vijayvargiya, Sunil Hasbe, Nakul Ogale |
2023-02-07 |
| 11372524 |
Multimedia communications with synchronized graphical user interfaces |
Juliana Veronica Tarpey, Karthick Sundararaman, Krzysztof Jaroslaw Jakubczyk, Amit Kumar Agarwalla, Ninad Parkhi +2 more |
2022-06-28 |
| 11201847 |
Address resolution protocol entry verification |
Shirish Vijayvargiya, Nakul Ogale, Vasantha Kumar Dhanasekar |
2021-12-14 |
| 11182472 |
Security in a computing environment by monitoring expected operation of processes within the computing environment |
Nakul Ogale, Shirish Vijayvargiya |
2021-11-23 |
| 11170077 |
Validating the integrity of application data using secure hardware enclaves |
Alok Nemchand Kataria, Achindra Bhatnagar, Martim Carbone, Deep Shah |
2021-11-09 |
| 11093625 |
Adaptive file access authorization using process access patterns |
Shirish Vijayvargiya, Amol Katkar, Vivek Parikh |
2021-08-17 |
| 11080402 |
Methods and apparatus to validate and restore machine configurations |
Nilesh Awate, Goresh Musalay, V S V Vijay |
2021-08-03 |
| 11062033 |
Independent integrity verification of security policy data in applications on a client |
Alok Nemchand Kataria, Achindra Bhatnagar |
2021-07-13 |
| 10855644 |
Address resolution protocol entry verification |
Shirish Vijayvargiya, Nakul Ogale, Vasantha Kumar Dhanasekar |
2020-12-01 |