KK

Kaushal Kiran Kapadia

IBM: 28 patents #3,676 of 70,183Top 6%
HL Hcl Technologies Limited: 1 patents #81 of 244Top 35%
📍 Ashok Nagar, GA: #1 of 1 inventorsTop 100%
Overall (All Time): #130,434 of 4,157,543Top 4%
29
Patents All Time

Issued Patents All Time

Showing 1–25 of 29 patents

Patent #TitleCo-InventorsDate
11228612 Identifying cyber adversary behavior Sulakshan Vajipayajula, Stephen C. Will, Ilgen Banu Yuceer, Kevin Tabb 2022-01-18
11171982 Optimizing ingestion of structured security information into graph databases for security analytics Sulakshan Vajipayajula, Stephen C. Will, Dhilung Hang Kirat, Anne Tilstra 2021-11-09
11082414 Context aware recertification Manjeri Ramanathan Dharmarajan, Vigneshwarnath Miriyala, Nataraj Nagaratnam, Darshini G. Swamy, Suyesh R. Tiwari 2021-08-03
11050773 Selecting security incidents for advanced automatic analysis Stephen C. Will, Kevin Tabb, Ilgen Banu Yuceer, Sulakshan Vajipayajula 2021-06-29
10834100 Dynamically defined virtual private network tunnels in hybrid cloud environments Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam 2020-11-10
10713031 Enforcing security policies for software containers Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam, Sulakshan Vajipayajula 2020-07-14
10673885 User state tracking and anomaly detection in software-as-a-service environments Ravi Krishnan Muthukrishnan, Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Nataraj Nagaratnam 2020-06-02
10673900 Application-based security rights in cloud environments Nataraj Nagaratnam, Jeffrey R. Hoy, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer 2020-06-02
10628682 Augmenting gesture based security technology using mobile devices Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam 2020-04-21
10505904 Dynamically defined virtual private network tunnels in hybrid cloud environments Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam 2019-12-10
10367837 Optimizing security analyses in SaaS environments Dhilung Hang Kirat, Youngja Park, Marc Philippe Stoecklin, Sulakshan Vajipayajula 2019-07-30
10255054 Enforcing security policies for software containers Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam, Sulakshan Vajipayajula 2019-04-09
10244002 Secure application zones for cloud burst environments Jeffrey R. Hoy, Nataraj Nagaratnam, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer 2019-03-26
10237064 Using everyday objects as cryptographic keys Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam 2019-03-19
10200387 User state tracking and anomaly detection in software-as-a-service environments Ravi Krishnan Muthukrishnan, Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Nataraj Nagaratnam 2019-02-05
10142293 Dynamically defined virtual private network tunnels in hybrid cloud environments Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam 2018-11-27
10084804 Optimizing security analyses in SaaS environment Dhilung Hang Kirat, Youngja Park, Marc Philippe Stoecklin, Sulakshan Vajipayajula 2018-09-25
10028139 Leveraging mobile devices to enforce restricted area security Sreekanth Ramakrishna Iyer, Jeffrey R. Hoy, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam 2018-07-17
9916461 Identity context-based access control Rahul Prabhakar Kulkarni, Nataraj Nagaratnam, Anindya Neogi, Magesh Rajamani 2018-03-13
9912477 Using everyday objects as cryptographic keys Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam 2018-03-06
9888040 Secure application zones for cloud burst environments Jeffrey R. Hoy, Nataraj Nagaratnam, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer 2018-02-06
9875399 Augmenting gesture based security technology for improved classification and learning Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam 2018-01-23
9762616 Application-based security rights in cloud environments Nataraj Nagaratnam, Jeffrey R. Hoy, Ravi Krishnan Muthukrishnan, Sreekanth Ramakrishna Iyer 2017-09-12
9756173 Leveraging mobile devices to enforce restricted area security Sreekanth Ramakrishna Iyer, Jeffrey R. Hoy, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam 2017-09-05
9729318 Using everyday objects as cryptographic keys Jeffrey R. Hoy, Sreekanth Ramakrishna Iyer, Ravi Krishnan Muthukrishnan, Nataraj Nagaratnam 2017-08-08