Issued Patents All Time
Showing 76–100 of 114 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9762616 | Application-based security rights in cloud environments | Nataraj Nagaratnam, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer | 2017-09-12 |
| 9756173 | Leveraging mobile devices to enforce restricted area security | Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam | 2017-09-05 |
| 9733918 | Using cloud patterns for installation on unmanaged physical machines and appliances | Joshua A. Alger, Barry J. Pellas | 2017-08-15 |
| 9736158 | Delivering author specific content | Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess | 2017-08-15 |
| 9729318 | Using everyday objects as cryptographic keys | Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam | 2017-08-08 |
| 9699213 | Cost-based configuration using a context-based cloud security assurance system | Nataraj Nagaratnam, Sreekanth Ramakrishna Iyer, Sridhar R. Muppidi | 2017-07-04 |
| 9699580 | Electronic media volume control | Kulvir S. Bhogal, Jonathan F. Brunn, Asima Silva | 2017-07-04 |
| 9684798 | Audience-based sensitive information handling for shared collaborative documents | Kulvir S. Bhogal, Jonathan F. Brunn, Asima Silva | 2017-06-20 |
| 9684799 | Audience-based sensitive information handling for shared collaborative documents | Kulvir S. Bhogal, Jonathan F. Brunn, Asima Silva | 2017-06-20 |
| 9646255 | Conversation branching for more efficient resolution | Paul R. Bastide, Kulvir S. Bhogal, Asima Silva | 2017-05-09 |
| 9621698 | Identifying a contact based on a voice communication session | Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess | 2017-04-11 |
| 9606711 | Evaluating portions of content in an online community | Shadi E. Albouyeh, Bernadette A. Carter, Stephanie L. Trunzo | 2017-03-28 |
| 9600165 | Evaluating portions of content in an online community | Shadi E. Albouyeh, Bernadette A. Carter, Stephanie L. Trunzo | 2017-03-21 |
| 9600320 | Mitigation of virtual machine security breaches | Rick A. Hamilton, II, Jenny S. Li, Shawn P. Mullen | 2017-03-21 |
| 9588750 | Pseudo program use during program installation | Barry J. Pellas, Matthew T. Pellas, David M. Stecher | 2017-03-07 |
| 9578063 | Application self-service for assured log management in cloud environments | Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam | 2017-02-21 |
| 9571457 | Dynamically defined virtual private network tunnels in hybrid cloud environments | Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam | 2017-02-14 |
| 9571618 | Identifying a contact based on a voice communication session | Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess | 2017-02-14 |
| 9467411 | Identifying content in an incoming message on a social network | Shadi E. Albouyeh, Bernadette A. Carter, Stephanie L. Trunzo | 2016-10-11 |
| 9462013 | Managing security breaches in a networked computing environment | Gregory J. Boss, Rick A. Hamilton, II, Agueda M. H. Magro | 2016-10-04 |
| 9442710 | Method for using shared installation session environment to duplicate installs | Barry J. Pellas, David M. Stecher | 2016-09-13 |
| 9442932 | Social networking response management system | Shadi E. Albouyeh, Bernadette A. Carter | 2016-09-13 |
| 9444776 | Intelligent, dynamic E-mail signature | Shadi E. Albouyeh, Bernadette A. Carter, Stephanie L. Trunzo | 2016-09-13 |
| 9433858 | Access control of user based photograph bundles | Andrew J. Ivory, Barry J. Pellas, David M. Stecher | 2016-09-06 |
| 9426192 | Predicting viewing activity of a posting to an activity stream | Shadi E. Albouyeh, Bernadette A. Carter, Stephanie L. Trunzo | 2016-08-23 |