Issued Patents All Time
Showing 1–25 of 37 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11373736 | Metadata tree with key rotation information | Jun Li, Sharad Singhal | 2022-06-28 |
| 10489310 | Determining cache value currency using persistent markers | Kimberly Keeton, Yupu Zhang, Haris Volos, Evan R. Kirshenbaum | 2019-11-26 |
| 10025903 | Validating a metadata tree using a metadata integrity validator | Jun Li, Sharad Singhal | 2018-07-17 |
| 9940469 | Encrypted data store for records | Jun Li, Sharad Singhal | 2018-04-10 |
| 9165158 | Encryption key management using distributed storage of encryption-key fragments | Jun Li, Alan H. Karp | 2015-10-20 |
| 9021094 | Allocation of resources for tiers of a multi-tiered system based on selecting items from respective sets | Yunhong Zhou, Anshul Kothari, Robert E. Tarjan | 2015-04-28 |
| 9009281 | Composition of services | Yin Wang, Hamid Reza Motahari Nezhad, Sharad Singhal | 2015-04-14 |
| 8990270 | Protocol virtualization for a network file system | Mustafa Uysal, Junwen Lai | 2015-03-24 |
| 8917872 | Encryption key storage with key fragment stores | Jun Li, Sharad Singhal | 2014-12-23 |
| 8538029 | Encryption key fragment distribution | Jun Li, Sharad Singhal, Bryan Stephenson | 2013-09-17 |
| 8533478 | System for and method of writing and reading redundant data | Marcos K. Aguilera | 2013-09-10 |
| 8514776 | Determining a metric region in a wireless network | Joshua Robinson | 2013-08-20 |
| 8458547 | Method for constructing a histogram | Krishnamurthy Viswanathan | 2013-06-04 |
| 8392708 | Auditing data integrity | Mehul A. Shah, Robert Schreiber, Alan H. Karp | 2013-03-05 |
| 8392737 | System for controlling power consumption of a network | Puneet Sharma, Brandon Heller, Priya Mahadevan, Sujata Banerjee, Xiaoyun Zhu +1 more | 2013-03-05 |
| 8281151 | Auditor assisted extraction and verification of client data returned from a storage provided while hiding client data from the auditor | Mehul A. Shah | 2012-10-02 |
| 8250427 | Selecting erasure codes for a fault tolerant system | John Johnson Wylie | 2012-08-21 |
| 8228912 | Selecting wireless mesh node locations | Joshua Robinson, Mustafa Uysal | 2012-07-24 |
| 8127212 | System and method for determining the fault-tolerance of an erasure code | John Johnson Wylie | 2012-02-28 |
| 8095928 | Method of forming virtual computer cluster within shared computing environment | Mahesh Kallahalla, Mustafa Uysal, Frederic Gittler | 2012-01-10 |
| 8094582 | Location determination for placing a new capacity point in a wireless network | Joshua Robinson, Mustafa Uysal | 2012-01-10 |
| 7886055 | Allocating resources in a system having multiple tiers | Yunhong Zhou, Anshul Kothari, Kamalika Chaudhuri, Robert E. Tarjan | 2011-02-08 |
| 7739313 | Method and system for finding conjunctive clusters | Nina Mishra, Dana Ron | 2010-06-15 |
| 7697690 | Windowed backward key rotation | Kevin Fu, Mahesh Kallahalla | 2010-04-13 |
| 7620984 | Method of managing computer system | Mahesh Kallahalla, Mustafa Uysal | 2009-11-17 |