RS

Ram Swaminathan

HP HP: 32 patents #280 of 16,619Top 2%
ES Entit Software: 2 patents #56 of 462Top 15%
AT AT&T: 1 patents #10,626 of 18,772Top 60%
HE Hewlett Packard Enterprise: 1 patents #2,081 of 4,473Top 50%
MF Micro Focus: 1 patents #277 of 713Top 40%
📍 Cupertino, CA: #392 of 6,989 inventorsTop 6%
🗺 California: #12,730 of 386,348 inventorsTop 4%
Overall (All Time): #89,881 of 4,157,543Top 3%
37
Patents All Time

Issued Patents All Time

Showing 1–25 of 37 patents

Patent #TitleCo-InventorsDate
11373736 Metadata tree with key rotation information Jun Li, Sharad Singhal 2022-06-28
10489310 Determining cache value currency using persistent markers Kimberly Keeton, Yupu Zhang, Haris Volos, Evan R. Kirshenbaum 2019-11-26
10025903 Validating a metadata tree using a metadata integrity validator Jun Li, Sharad Singhal 2018-07-17
9940469 Encrypted data store for records Jun Li, Sharad Singhal 2018-04-10
9165158 Encryption key management using distributed storage of encryption-key fragments Jun Li, Alan H. Karp 2015-10-20
9021094 Allocation of resources for tiers of a multi-tiered system based on selecting items from respective sets Yunhong Zhou, Anshul Kothari, Robert E. Tarjan 2015-04-28
9009281 Composition of services Yin Wang, Hamid Reza Motahari Nezhad, Sharad Singhal 2015-04-14
8990270 Protocol virtualization for a network file system Mustafa Uysal, Junwen Lai 2015-03-24
8917872 Encryption key storage with key fragment stores Jun Li, Sharad Singhal 2014-12-23
8538029 Encryption key fragment distribution Jun Li, Sharad Singhal, Bryan Stephenson 2013-09-17
8533478 System for and method of writing and reading redundant data Marcos K. Aguilera 2013-09-10
8514776 Determining a metric region in a wireless network Joshua Robinson 2013-08-20
8458547 Method for constructing a histogram Krishnamurthy Viswanathan 2013-06-04
8392708 Auditing data integrity Mehul A. Shah, Robert Schreiber, Alan H. Karp 2013-03-05
8392737 System for controlling power consumption of a network Puneet Sharma, Brandon Heller, Priya Mahadevan, Sujata Banerjee, Xiaoyun Zhu +1 more 2013-03-05
8281151 Auditor assisted extraction and verification of client data returned from a storage provided while hiding client data from the auditor Mehul A. Shah 2012-10-02
8250427 Selecting erasure codes for a fault tolerant system John Johnson Wylie 2012-08-21
8228912 Selecting wireless mesh node locations Joshua Robinson, Mustafa Uysal 2012-07-24
8127212 System and method for determining the fault-tolerance of an erasure code John Johnson Wylie 2012-02-28
8095928 Method of forming virtual computer cluster within shared computing environment Mahesh Kallahalla, Mustafa Uysal, Frederic Gittler 2012-01-10
8094582 Location determination for placing a new capacity point in a wireless network Joshua Robinson, Mustafa Uysal 2012-01-10
7886055 Allocating resources in a system having multiple tiers Yunhong Zhou, Anshul Kothari, Kamalika Chaudhuri, Robert E. Tarjan 2011-02-08
7739313 Method and system for finding conjunctive clusters Nina Mishra, Dana Ron 2010-06-15
7697690 Windowed backward key rotation Kevin Fu, Mahesh Kallahalla 2010-04-13
7620984 Method of managing computer system Mahesh Kallahalla, Mustafa Uysal 2009-11-17