JH

Jeffrey R. Hoy

IBM: 112 patents #469 of 70,183Top 1%
HL Hcl Technologies Limited: 1 patents #81 of 244Top 35%
Google: 1 patents #14,769 of 22,993Top 65%
📍 Southern Pines, NC: #1 of 55 inventorsTop 2%
🗺 North Carolina: #111 of 45,564 inventorsTop 1%
Overall (All Time): #11,112 of 4,157,543Top 1%
114
Patents All Time

Issued Patents All Time

Showing 76–100 of 114 patents

Patent #TitleCo-InventorsDate
9762616 Application-based security rights in cloud environments Nataraj Nagaratnam, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer 2017-09-12
9756173 Leveraging mobile devices to enforce restricted area security Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam 2017-09-05
9733918 Using cloud patterns for installation on unmanaged physical machines and appliances Joshua A. Alger, Barry J. Pellas 2017-08-15
9736158 Delivering author specific content Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess 2017-08-15
9729318 Using everyday objects as cryptographic keys Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam 2017-08-08
9699213 Cost-based configuration using a context-based cloud security assurance system Nataraj Nagaratnam, Sreekanth Ramakrishna Iyer, Sridhar R. Muppidi 2017-07-04
9699580 Electronic media volume control Kulvir S. Bhogal, Jonathan F. Brunn, Asima Silva 2017-07-04
9684798 Audience-based sensitive information handling for shared collaborative documents Kulvir S. Bhogal, Jonathan F. Brunn, Asima Silva 2017-06-20
9684799 Audience-based sensitive information handling for shared collaborative documents Kulvir S. Bhogal, Jonathan F. Brunn, Asima Silva 2017-06-20
9646255 Conversation branching for more efficient resolution Paul R. Bastide, Kulvir S. Bhogal, Asima Silva 2017-05-09
9621698 Identifying a contact based on a voice communication session Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess 2017-04-11
9606711 Evaluating portions of content in an online community Shadi E. Albouyeh, Bernadette A. Carter, Stephanie L. Trunzo 2017-03-28
9600165 Evaluating portions of content in an online community Shadi E. Albouyeh, Bernadette A. Carter, Stephanie L. Trunzo 2017-03-21
9600320 Mitigation of virtual machine security breaches Rick A. Hamilton, II, Jenny S. Li, Shawn P. Mullen 2017-03-21
9588750 Pseudo program use during program installation Barry J. Pellas, Matthew T. Pellas, David M. Stecher 2017-03-07
9578063 Application self-service for assured log management in cloud environments Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam 2017-02-21
9571457 Dynamically defined virtual private network tunnels in hybrid cloud environments Sreekanth Ramakrishna Iyer, Kaushal Kiran Kapadia, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam 2017-02-14
9571618 Identifying a contact based on a voice communication session Jonathan F. Brunn, Jessica W. Forrester, Stephen C. Hess 2017-02-14
9467411 Identifying content in an incoming message on a social network Shadi E. Albouyeh, Bernadette A. Carter, Stephanie L. Trunzo 2016-10-11
9462013 Managing security breaches in a networked computing environment Gregory J. Boss, Rick A. Hamilton, II, Agueda M. H. Magro 2016-10-04
9442710 Method for using shared installation session environment to duplicate installs Barry J. Pellas, David M. Stecher 2016-09-13
9442932 Social networking response management system Shadi E. Albouyeh, Bernadette A. Carter 2016-09-13
9444776 Intelligent, dynamic E-mail signature Shadi E. Albouyeh, Bernadette A. Carter, Stephanie L. Trunzo 2016-09-13
9433858 Access control of user based photograph bundles Andrew J. Ivory, Barry J. Pellas, David M. Stecher 2016-09-06
9426192 Predicting viewing activity of a posting to an activity stream Shadi E. Albouyeh, Bernadette A. Carter, Stephanie L. Trunzo 2016-08-23