Issued Patents All Time
Showing 26–50 of 72 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9244705 | Intelligent micro-virtual machine scheduling | Kiran Bondalapati, Vikram Kapoor, Ian Pratt | 2016-01-26 |
| 9245108 | Dynamic adjustment of the file format to identify untrusted files | Deepak Khajuria, Mahesh Pisal, Krzysztof Uchronski, Vikram Kapoor, Ian Pratt | 2016-01-26 |
| 9239909 | Approaches for protecting sensitive data within a guest operating system | Gianni Tedesco, Anushree Kunal Pole, Andrew Southgate, Ian Pratt, Vikram Kapoor | 2016-01-19 |
| 9201850 | Composing the display of a virtualized web browser | Prakash Buddhiraja, Kiran Bondalapati, Vikram Kapoor, Ian Pratt | 2015-12-01 |
| 9148428 | Seamless management of untrusted data using virtual machines | Sergei Vorobiev, Deepak Khajura, Ian Pratt, Vikram Kapoor, Simon Crosby | 2015-09-29 |
| 9135038 | Mapping free memory pages maintained by a guest operating system to a shared zero page within a machine frame | Krzysztof Uchronski, Martin O'Brien, Jacob Hansen, Kiran Bondalapati, Ian Pratt +1 more | 2015-09-15 |
| 9128743 | Graphic visualization of a suspended virtual machine | Kiran Bondalapati, Vikram Kapoor, Ian Pratt, Prakash Buddhiraja, Stephen Rice | 2015-09-08 |
| 9116733 | Automated provisioning of secure virtual execution environment using virtual machine templates based on requested activity | Kiran Bondalapati, Ian Pratt, Vikram Kapoor | 2015-08-25 |
| 9110701 | Automated identification of virtual machines to process or receive untrusted data based on client policies | Kiran Bondalapati, Ian Pratt, Vikram Kapoor | 2015-08-18 |
| 9106690 | Securing an endpoint by proxying document object models and windows | Kiran Bondalapati, Vikram Kapoor | 2015-08-11 |
| 9104837 | Exposing subset of host file systems to restricted virtual machines based on upon performing user-initiated actions against host files | Deepak Khajuria, Ian Pratt, Vikram Kapoor | 2015-08-11 |
| 9104544 | Mitigating eviction by maintaining mapping tables | Krzysztof Uchronski, Martin O'Brien, Jacob Hansen, Kiran Bondalapati, Ian Pratt +1 more | 2015-08-11 |
| 9015836 | Securing file trust with file format conversions | Rahul Kashyap, Andrew Southgate | 2015-04-21 |
| 8972980 | Automated provisioning of secure virtual execution environment using virtual machine templates based on requested activity | Ian Pratt, Kiran Bondalapati, Vikram Kapoor | 2015-03-03 |
| 8839245 | Transferring files using a virtualized application | Deepak Khajuria, Kiran Bondalapati, Vikram Kapoor, Ian Pratt | 2014-09-16 |
| 8799691 | Hierarchical power management | Kaushik Barde, Anand Pandit | 2014-08-05 |
| 8782232 | Method and apparatus for encapsulating a virtual filer on a filer | Mark Muhlestein | 2014-07-15 |
| 8752047 | Automated management of virtual machines to process untrusted data based on client policy information | Kiran Bondalapati, Ian Pratt, Vikram Kapoor | 2014-06-10 |
| 8745383 | Secure computing environment using a client heartbeat to address theft and unauthorized access | Anahit Tarkhanyan, Ravi Gupta | 2014-06-03 |
| 8719933 | Safe printing | Deepak Khajuria, Vikram Kapoor, Ian Pratt | 2014-05-06 |
| 8667594 | Securing file trust with file format conversions | Rahul Kashyap, Andrew Southgate | 2014-03-04 |
| 8510825 | Secure computing environment to address theft and unauthorized access | Anahit Tarkhanyan, Ravi Gupta | 2013-08-13 |
| 8489847 | Inter operating system memory hotswap to support memory growth in a non-virtualized system | Kaushik Barde | 2013-07-16 |
| 8364825 | Network connection manager | Giridhar Pemmasani, Vishwanathan Rajendran | 2013-01-29 |
| 8346234 | Secure platform management with power savings capacity | Ravi Gupta, Anahit Tarkhanyan | 2013-01-01 |