KY

Krishna K. Yellepeddy

IBM: 33 patents #2,996 of 70,183Top 5%
🗺 Texas: #3,346 of 125,132 inventorsTop 3%
Overall (All Time): #107,629 of 4,157,543Top 3%
33
Patents All Time

Issued Patents All Time

Showing 1–25 of 33 patents

Patent #TitleCo-InventorsDate
11095676 Identifying and remediating malware-compromised devices Anne Louise Bolgert, Richard Jay Cohen, Miguel Sang 2021-08-17
10977620 Calendaring dependencies David Bruce Kumhyr 2021-04-13
10623375 Auto-detection of web-based application characteristics for reverse proxy enablement Richard Jay Cohen, Anne Louise Bolgert, Randolph Michael Forlenza, Miguel Sang 2020-04-14
10530804 Identifying and remediating malware-compromised devices Anne Louise Bolgert, Richard Jay Cohen, Miguel Sang 2020-01-07
10523424 Optimizing use of hardware security modules John T. Peck, Kristin Marie Hazlewood, John A. Morganti 2019-12-31
10389527 Event-driven, asset-centric key management in a smart grid Sadanand Rajaram Bajekal, Jai Singh Arun, Michael Delaine Nix 2019-08-20
10164998 Identifying and remediating malware-compromised devices Anne Louise Bolgert, Richard Jay Cohen, Miguel Sang 2018-12-25
10122693 Protocol based key management Bruce Arland Rich, Xiaoyan Zhang 2018-11-06
9881173 Managing keys used for encrypting data Kristin Marie Hazlewood, John T. Peck 2018-01-30
9848010 Identifying and remediating malware-compromised devices Anne Louise Bolgert, Richard Jay Cohen, Miguel Sang 2017-12-19
9794063 Optimizing use of hardware security modules John T. Peck, Kristin Marie Hazlewood, John A. Morganti 2017-10-17
9594920 Managing keys used for encrypting data Kristin Marie Hazlewood, John T. Peck 2017-03-14
9584314 Event-driven, asset-centric key management in a smart grid Sadanand Rajaram Bajekal, Jai Singh Arun, Michael Delaine Nix 2017-02-28
9378388 Managing keys used for encrypting data Kristin Marie Hazlewood, John T. Peck 2016-06-28
8683222 Optimizing use of hardware security modules John T. Peck, Kristin Marie Hazlewood, John A. Morganti 2014-03-25
8675875 Optimizing use of hardware security modules John T. Peck, Kristin Marie Hazlewood, John A. Morganti 2014-03-18
8645182 Integrated calendar and task scheduler Conrad James Johnson, James Ealem Shewbert, Perry Lee Statham, Sandra Lee Tipton 2014-02-04
8091138 Method and apparatus for controlling the presentation of confidential content Conrad James Johnson, Helen McKinstry, Perry Lee Statham, Sandra Lee Tipton 2012-01-03
7971069 Security system for replicated storage devices on computer networks 2011-06-28
7865721 Method and system for configuring highly available online certificate status protocol 2011-01-04
7717326 Method and system for protecting data David Bruce Kumhyr, Pamela A. Nesbitt, Lorin Evan Ullmann 2010-05-18
7318155 Method and system for configuring highly available online certificate status protocol responders 2008-01-08
7236465 System and method for gathering multicast content receiver data Dwip N. Banerjee, Rabindranath Dutta, Kumar Ravi 2007-06-26
7191192 Metadirectory agents having extensible functions Rod Mancisidor 2007-03-13
7146499 Security system for replicated storage devices on computer networks 2006-12-05