Issued Patents All Time
Showing 1–24 of 24 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12381814 | Information centric network distributed path selection | Yi Zhang, Srikathyayani Srikanteswara, Nageen Himayat, Xiruo Liu | 2025-08-05 |
| 12363028 | Geographic routing | Srikathyayani Srikanteswara, Yi Zhang, Satish Chandra Jha, S M Iftekharul Alam, Marcin Spoczynski +5 more | 2025-07-15 |
| 12363205 | Storage node recruitment in an information centric network | Srikathyayani Srikanteswara, Marcin Spoczynski, Yi Zhang, Kshitij A. Doshi, Francesc Guim Bernat +6 more | 2025-07-15 |
| 12099481 | Online schema change of range-partitioned index in a distributed storage system | Krishnan Varadarajan, Jianwu Gao, Jegan Devaraju, Shane Mainali, Zichen Sun +6 more | 2024-09-24 |
| 12095724 | Capability discovery in an information centric network | Yi Zhang, Srikathyayani Srikanteswara, Nageen Himayat, Gabriel Arrobo Vidal | 2024-09-17 |
| 11816084 | Staging anchor trees for improved concurrency and performance in page range index management | Krishnan Varadarajan, Jegan Devaraju, Shane Mainali, Quan Zhang, Sridhar Srinivasan +4 more | 2023-11-14 |
| 11487734 | Staging anchor trees for improved concurrency and performance in page range index management | Krishnan Varadarajan, Jegan Devaraju, Shane Mainali, Quan Zhang, Sridhar Srinivasan +4 more | 2022-11-01 |
| 11249961 | Online schema change of range-partitioned index in a distributed storage system | Krishnan Varadarajan, Jianwu Gao, Jegan Devaraju, Shane Mainali, Zichen Sun +6 more | 2022-02-15 |
| 11228595 | Evaluating security of data access statements | Sheng Yan Sun | 2022-01-18 |
| 11005850 | Access control for database | Shuo Li, ShengYan Sun, Xin Ying Yang | 2021-05-11 |
| 10909074 | File table index aggregate statistics | Shane Mainali, Krishnan Varadarajan, Quan Zhang, Jegan Devaraju, Ziehen Sun +2 more | 2021-02-02 |
| 10693877 | Evaluating security of data access statements | Sheng Yan Sun | 2020-06-23 |
| 10242058 | Access path optimization through system statistics | Shuo Li, ShengYan Sun, Xin Ying Yang | 2019-03-26 |
| 10205730 | Access control for database | Shuo Li, ShengYan Sun, Xin Ying Yang | 2019-02-12 |
| 10169600 | Encryption policies for various nodes of a file | Shuo Li, ShengYan Sun, Jun Wang | 2019-01-01 |
| 10069848 | Method and system for data security | Hui Jiang, Shuo Li, ShengYan Sun | 2018-09-04 |
| 9930070 | Modifying security policies of related resources | Shuo Li, ShengYan Sun, Jun Wang | 2018-03-27 |
| 9760797 | Protecting specific information | Sheng Yan Sun, Jun Wang | 2017-09-12 |
| 9734203 | Access path optimization through system statistics | Shuo Li, ShengYan Sun, Xin Ying Yang | 2017-08-15 |
| 9703854 | Determining criticality of a SQL statement | Shuo Li, Sheng Yan Sun, Xin Ying Yang | 2017-07-11 |
| 9680830 | Evaluating security of data access statements | Sheng Yan Sun | 2017-06-13 |
| 9591358 | Media playback workload scheduler | Changliang Wang, Akshat Nanda, Yunbiao Lin | 2017-03-07 |
| 9547691 | Access path optimization through system statistics | Shuo Li, ShengYan Sun, Xin Ying Yang | 2017-01-17 |
| 9436735 | Access path optimization through system statistics | Shuo Li, ShengYan Sun, Xin Ying Yang | 2016-09-06 |