Issued Patents All Time
Showing 1–25 of 31 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12363155 | Adaptive machine learning platform for security penetration and risk assessment | Narsimha Nikhil Raj Padal, Nalamati Sai Rajesh | 2025-07-15 |
| 12063217 | Systems and methods for generating and implementing security profiles | — | 2024-08-13 |
| 11995182 | Baseboard management controller to perform security action based on digital signature comparison in response to trigger | — | 2024-05-28 |
| 11985158 | Adaptive machine learning platform for security penetration and risk assessment | Narsimha Nikhil Raj Padal, Nalamati Sai Rajesh | 2024-05-14 |
| 11966475 | Security level-based and trust-based recommendations for software components | Matthew Yang, Craig A. Rubin | 2024-04-23 |
| 11803646 | Vulnerability scanning | — | 2023-10-31 |
| 11741253 | Operating system service sanitization of data associated with sensitive information | Sridhar Bandi | 2023-08-29 |
| 11647037 | Penetration tests of systems under test | Supriya Kamthania, Nishant Rawtani, Anoop Chandra Bidugalu Nagesh, Ragashree Mysuru Chandrashekar | 2023-05-09 |
| 11637842 | Detection of security intrusion in a computing system | — | 2023-04-25 |
| 11601473 | Information technology stack security control configuration | Sridhar Bandi, Yelaka Surya Prakash, Shiva R. Dasari | 2023-03-07 |
| 11593235 | Application-specific policies for failover from an edge site to a cloud | Smitha Jayaram, Manoj Thankappan Varadamma, Srinivas Krishnappa Shapur, Nagaraju K N, Vijay Ballal | 2023-02-28 |
| 11455396 | Using trusted platform module (TPM) emulator engines to measure firmware images | Shiva R. Dasari | 2022-09-27 |
| 11436324 | Monitoring parameters of controllers for unauthorized modification | — | 2022-09-06 |
| 11397830 | Security rules compliance for personally identifiable information | Mashood Abdulla Kodavanji, Srinivasan Varadarajan Sahasranamam | 2022-07-26 |
| 11218463 | Trust establishment to deploy servers in data centers | Alan L. Goodrum | 2022-01-04 |
| 10956143 | Server updates | John S. Harsany, Peter Hansen | 2021-03-23 |
| 10956575 | Determine malware using firmware | John S. Harsany, Luis E. Luciani, Jr. | 2021-03-23 |
| 10749858 | Secure login information | Alan L. Goodrum, David J. Koenen, Patrick M. Schoeller | 2020-08-18 |
| 10740468 | Multiple roots of trust to verify integrity | Patrick L. Gibbons, Shiva R. Dasari, Luis E. Luciani, Jr., Kevin G. Depew | 2020-08-11 |
| 10719604 | Baseboard management controller to perform security action based on digital signature comparison in response to trigger | — | 2020-07-21 |
| 10496495 | On demand remote diagnostics for hardware component failure and disk drive data recovery using embedded storage media | Sandeep Bangalore Harshavardhana, Raghunandan Chikkaramaiah | 2019-12-03 |
| 10489145 | Secure update of firmware and software | Sandeep B H, Neena M S, Tom L Vaden | 2019-11-26 |
| 10430202 | Dual purpose boot registers | Srinivasan Varadarajan Sahasranamam, Nagaraj S Salotagi | 2019-10-01 |
| 10360370 | Authenticated access to manageability hardware components | Srinivasa Ragavan Rajagopalan, Nagaraj S Salotagi | 2019-07-23 |
| 10318459 | Peripheral device server access | Luis E. Luciani, Jr., Mohammed Saleem, Andrew Brown | 2019-06-11 |