GB

Gaurav Banga

BR Bromium: 35 patents #2 of 28Top 8%
NA Network Appliance: 11 patents #28 of 447Top 7%
HP HP: 8 patents #1,895 of 16,619Top 15%
NE Netapp: 5 patents #399 of 1,846Top 25%
AS Absolute Software: 5 patents #7 of 34Top 25%
AT AT&T: 3 patents #5,550 of 18,772Top 30%
Nokia: 1 patents #2,812 of 5,652Top 50%
📍 Cupertino, CA: #153 of 6,989 inventorsTop 3%
🗺 California: #4,195 of 386,348 inventorsTop 2%
Overall (All Time): #27,903 of 4,157,543Top 1%
72
Patents All Time

Issued Patents All Time

Showing 26–50 of 72 patents

Patent #TitleCo-InventorsDate
9244705 Intelligent micro-virtual machine scheduling Kiran Bondalapati, Vikram Kapoor, Ian Pratt 2016-01-26
9245108 Dynamic adjustment of the file format to identify untrusted files Deepak Khajuria, Mahesh Pisal, Krzysztof Uchronski, Vikram Kapoor, Ian Pratt 2016-01-26
9239909 Approaches for protecting sensitive data within a guest operating system Gianni Tedesco, Anushree Kunal Pole, Andrew Southgate, Ian Pratt, Vikram Kapoor 2016-01-19
9201850 Composing the display of a virtualized web browser Prakash Buddhiraja, Kiran Bondalapati, Vikram Kapoor, Ian Pratt 2015-12-01
9148428 Seamless management of untrusted data using virtual machines Sergei Vorobiev, Deepak Khajura, Ian Pratt, Vikram Kapoor, Simon Crosby 2015-09-29
9135038 Mapping free memory pages maintained by a guest operating system to a shared zero page within a machine frame Krzysztof Uchronski, Martin O'Brien, Jacob Hansen, Kiran Bondalapati, Ian Pratt +1 more 2015-09-15
9128743 Graphic visualization of a suspended virtual machine Kiran Bondalapati, Vikram Kapoor, Ian Pratt, Prakash Buddhiraja, Stephen Rice 2015-09-08
9116733 Automated provisioning of secure virtual execution environment using virtual machine templates based on requested activity Kiran Bondalapati, Ian Pratt, Vikram Kapoor 2015-08-25
9110701 Automated identification of virtual machines to process or receive untrusted data based on client policies Kiran Bondalapati, Ian Pratt, Vikram Kapoor 2015-08-18
9106690 Securing an endpoint by proxying document object models and windows Kiran Bondalapati, Vikram Kapoor 2015-08-11
9104837 Exposing subset of host file systems to restricted virtual machines based on upon performing user-initiated actions against host files Deepak Khajuria, Ian Pratt, Vikram Kapoor 2015-08-11
9104544 Mitigating eviction by maintaining mapping tables Krzysztof Uchronski, Martin O'Brien, Jacob Hansen, Kiran Bondalapati, Ian Pratt +1 more 2015-08-11
9015836 Securing file trust with file format conversions Rahul Kashyap, Andrew Southgate 2015-04-21
8972980 Automated provisioning of secure virtual execution environment using virtual machine templates based on requested activity Ian Pratt, Kiran Bondalapati, Vikram Kapoor 2015-03-03
8839245 Transferring files using a virtualized application Deepak Khajuria, Kiran Bondalapati, Vikram Kapoor, Ian Pratt 2014-09-16
8799691 Hierarchical power management Kaushik Barde, Anand Pandit 2014-08-05
8782232 Method and apparatus for encapsulating a virtual filer on a filer Mark Muhlestein 2014-07-15
8752047 Automated management of virtual machines to process untrusted data based on client policy information Kiran Bondalapati, Ian Pratt, Vikram Kapoor 2014-06-10
8745383 Secure computing environment using a client heartbeat to address theft and unauthorized access Anahit Tarkhanyan, Ravi Gupta 2014-06-03
8719933 Safe printing Deepak Khajuria, Vikram Kapoor, Ian Pratt 2014-05-06
8667594 Securing file trust with file format conversions Rahul Kashyap, Andrew Southgate 2014-03-04
8510825 Secure computing environment to address theft and unauthorized access Anahit Tarkhanyan, Ravi Gupta 2013-08-13
8489847 Inter operating system memory hotswap to support memory growth in a non-virtualized system Kaushik Barde 2013-07-16
8364825 Network connection manager Giridhar Pemmasani, Vishwanathan Rajendran 2013-01-29
8346234 Secure platform management with power savings capacity Ravi Gupta, Anahit Tarkhanyan 2013-01-01