Issued Patents All Time
Showing 25 most recent of 26 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11336676 | Centralized trust authority for web application components | Aanand Krishnan, Swapnil Bhalode, Siddhesh Yawalkar, Hemant Puri | 2022-05-17 |
| 11314862 | Method for detecting malicious scripts through modeling of script structure | Swapnil Bhalode, Andrew Joseph Davidson, Somesh Jha, Vaibhav Rastogi | 2022-04-26 |
| 10592676 | Application security service | Aanand Krishnan, Somesh Jha, Andrew Joseph Davidson, Swapnil Bhalode | 2020-03-17 |
| 10069862 | Techniques for predicting and protecting spearphishing targets | Kevin Roundy | 2018-09-04 |
| 9571479 | Role-based access control using dynamically shared cloud accounts | Sharada Sundaram, Robert Koeten | 2017-02-14 |
| 9298561 | Systems and methods for prioritizing restoration speed with deduplicated backups | Weibao Wu, Fanglu Guo | 2016-03-29 |
| 9141790 | Systems and methods for using event-correlation graphs to detect attacks on computing systems | Kevin Roundy, Fanglu Guo, Sandeep Bhatkar, Tao Cheng, Jie Fu +4 more | 2015-09-22 |
| 9116768 | Systems and methods for deploying applications included in application containers | Petros Efstathopoulos, Daniel Marino | 2015-08-25 |
| 9106687 | Mechanism for profiling user and group accesses to content repository | Anantharaman Ganesh | 2015-08-11 |
| 8938782 | Systems and methods for providing network access control in virtual environments | Matthew Conover, Bruce Montague | 2015-01-20 |
| 8874522 | Managing backups of data objects in containers | Fanglu Guo, Petros Efstathopoulos, Xianbo Zhang, Weibao Wu | 2014-10-28 |
| 8874528 | Systems and methods for detecting cloud-based data leaks | Deb Banerjee, Sharada Sundaram | 2014-10-28 |
| 8869244 | Techniques for providing role-based access control using dynamic shared accounts | Sharada Sundaram, Robert Koeten | 2014-10-21 |
| 8824677 | Provably secure and efficient pseudorandom number generation | Zulfikar Ramzan, Virendra Kumar | 2014-09-02 |
| 8762512 | Providing dynamically shared cloud accounts | Sharada Sundaram, Robert Koeten | 2014-06-24 |
| 8543861 | Systems and methods for diagnosing a network configuration of a computing device | Anand Kashyap | 2013-09-24 |
| 8429745 | Systems and methods for data loss prevention on mobile computing systems | Jim Casaburi, Kent E. Griffin, Susanta K. Nanda, Matthew Conover | 2013-04-23 |
| 8387046 | Security driver for hypervisors and operating systems of virtualized datacenters | Bruce Montague, Matthew Conover, Tzi-Cker Chiueh | 2013-02-26 |
| 8370312 | Systems and methods for using cloud-based storage to optimize data-storage operations | Hemant Puri, Hans Van Rietschote | 2013-02-05 |
| 8195688 | Deconstruction and transformation of complex objects for de-duplicated storage | Weibao Wu | 2012-06-05 |
| 8111154 | Systems and methods for monitoring a mobile-computing device using geo-location information | Hemant Puri, Anand Kashyap | 2012-02-07 |
| 6341309 | Firewall system for quality of service management | Aseem Vaid | 2002-01-22 |
| 6243815 | Method and apparatus for reconfiguring and managing firewalls and security devices | Anand K. Antur, Hemant Puri, Naveen S. Bisht | 2001-06-05 |
| 6212558 | Method and apparatus for configuring and managing firewalls and security devices | Anand K. Antur, Hemant Puri, Naveen S. Bisht | 2001-04-03 |
| 6119235 | Method and apparatus for quality of service management | Aseem Vaid | 2000-09-12 |