ZR

Zulfikar Ramzan

Broadcom: 28 patents #311 of 9,346Top 4%
ND Ntt Docomo: 27 patents #99 of 1,706Top 6%
EC Emc Ip Holding Company: 8 patents #580 of 4,608Top 15%
CI Cisco: 5 patents #2,800 of 13,007Top 25%
AT AT&T: 2 patents #7,280 of 18,772Top 40%
RS Rsa Security: 2 patents #16 of 69Top 25%
📍 Cupertino, CA: #153 of 6,989 inventorsTop 3%
🗺 California: #4,195 of 386,348 inventorsTop 2%
Overall (All Time): #27,873 of 4,157,543Top 1%
72
Patents All Time

Issued Patents All Time

Showing 26–50 of 72 patents

Patent #TitleCo-InventorsDate
8806046 Application streaming and network file system optimization via integration with identity management solutions Sourabh Satish, Brian Hernacki 2014-08-12
8800030 Individualized time-to-live for reputation scores of computer files Vijay Seshadri, James Hoagland, Adam Glick, Adam Wright 2014-08-05
8799494 Application streaming proactive failover Sourabh Satish, Brian Hernacki 2014-08-05
8707426 Method and apparatus for resolving a cousin domain name to detect web-based fraud Shaun Cooley 2014-04-22
8621233 Malware detection using file names Pratyusa K. Manadhata, Mark Kennedy 2013-12-31
8621654 Using metadata in security tokens to prevent coordinated gaming in a reputation system Carey Nachenberg 2013-12-31
8572007 Systems and methods for classifying unknown files/spam based on a user actions, a file's prevalence within a user community, and a predetermined prevalence threshold Pratyusa K. Manadhata, Kent E. Griffin 2013-10-29
8495096 Decision tree induction that is sensitive to attribute computational complexity Shane Pereira, Sourabh Satish 2013-07-23
8479284 Referrer context identification for remote object links Shaun Cooley 2013-07-02
8434149 Method and apparatus for identifying web attacks Sourabh Satish 2013-04-30
8412952 Systems and methods for authenticating requests from a client running trialware through a proof of work protocol Walter Bogorad, Vijay Seshadri, Vadim Antonov, Pieter Viljoen 2013-04-02
8401982 Using sequencing and timing information of behavior events in machine learning to detect malware Sourabh Satish 2013-03-19
8341737 Detecting fraudulent web sites through an obfuscated reporting mechanism Oliver Friedrichs, Andrea Del Miglio, Candid Wüest, Sourabh Satish 2012-12-25
8321664 Method and apparatus for efficient certificate revocation Craig B. Gentry 2012-11-27
8312272 Secure authentication token management Denis Serenyi 2012-11-13
8266698 Using machine infection characteristics for behavior-based detection of malware Vijay Seshardi, Sourabh Satish, Chandrasekhar Kalle 2012-09-11
8256015 Method and apparatus for authentication of data streams with adaptively controlled losses Craig B. Gentry, Alejandro Hevia, Ravi Jain, Toshiro Kawahara 2012-08-28
8209531 Revocation of cryptographic digital certificates Craig B. Gentry, Bernhard Bruhn 2012-06-26
8190647 Decision tree induction that is sensitive to attribute computational complexity Shane Pereira, Sourabh Satish 2012-05-29
8156327 Revocation of cryptographic digital certificates Craig B. Gentry, Bernhard Bruhn 2012-04-10
8132006 Cryptographic authentication and/or establishment of shared cryptographic keys, including, but not limited to, password authenticated key exchange (PAKE) Craig B. Gentry, Philip Mackenzie 2012-03-06
8103875 Detecting email fraud through fingerprinting Sourabh Satish, Oliver Friedrichs 2012-01-24
8095679 Predictive transmission of content for application streaming and network file systems Sourabh Satish, Brian Hernacki 2012-01-10
8065332 Method and apparatus for communication efficient private information retrieval and oblivious transfer Craig B. Gentry 2011-11-22
8024562 Revocation of cryptographic digital certificates Craig B. Gentry, Bernhard Bruhn 2011-09-20