Issued Patents All Time
Showing 25 most recent of 47 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11388232 | Replication of content to one or more servers | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2022-07-12 |
| 11119986 | Intelligent data routing and storage provisioning | Ryan G. DeJana, Lisa Seacat DeLuca, Brian D. Goodman | 2021-09-14 |
| 10616132 | Managing user privileges for computer resources in a networked computing environment | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2020-04-07 |
| 10572915 | Transaction management based on individual orders or number of devices at table for desired distribution | Ryan G. DeJana, Lisa Seacat DeLuca, Soobaek Jang | 2020-02-25 |
| 10554744 | Replication of content to one or more servers | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2020-02-04 |
| 10547676 | Replication of content to one or more servers | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2020-01-28 |
| 10394766 | Intelligent data routing and storage provisioning | Ryan G. DeJana, Lisa Seacat DeLuca, Brian D. Goodman | 2019-08-27 |
| 10275796 | System and method to provide information based on predicted route of travel | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2019-04-30 |
| 10277521 | Authorizing an action request in a networked computing environment | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2019-04-30 |
| 10044661 | Social media message delivery based on user location | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2018-08-07 |
| 9998490 | Security management in a networked computing environment | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2018-06-12 |
| 9973539 | Enforcing runtime policies in a networked computing environment | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2018-05-15 |
| 9935849 | Assessing a service offering in a networked computing environment | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2018-04-03 |
| 9928623 | Socially generated and shared graphical representations | Kelly Abuelsaad, Soobaek Jang, Craig M. Trim | 2018-03-27 |
| 9813423 | Trust-based computing resource authorization in a networked computing environment | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2017-11-07 |
| 9811370 | Determining an optimal datacenter for placing a resource instance in a cloud that would benefit an intended set of end users in a geographical region | Ryan G. DeJana, Lisa Seacat DeLuca, Soobaek Jang | 2017-11-07 |
| 9787717 | Intelligent security analysis and enforcement for data transfer | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2017-10-10 |
| 9781020 | Deploying applications in a networked computing environment | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2017-10-03 |
| 9781220 | Identity management in a networked computing environment | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2017-10-03 |
| 9756060 | Security management in a networked computing environment | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2017-09-05 |
| 9722963 | Social media message delivery based on user location | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2017-08-01 |
| 9722964 | Social media message delivery based on user location | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2017-08-01 |
| 9680715 | Assessing a service offering in a networked computing environment | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2017-06-13 |
| 9654358 | Managing user privileges for computer resources in a networked computing environment | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2017-05-16 |
| 9584491 | Intelligent security analysis and enforcement for data transfer | Kelly Abuelsaad, Lisa Seacat DeLuca, Soobaek Jang | 2017-02-28 |