Issued Patents All Time
Showing 25 most recent of 35 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12380342 | Alert management in data processing systems | Hagen Völzer, Ioana Giurgiu, Jinho Hwang, Larisa Shwartz | 2025-08-05 |
| 12236360 | Shiftleft topology construction and information augmentation using machine learning | Jinho Hwang, Larisa Shwartz, Srinivasan Parthasarathy, Qing Wang, Frank Bagehorn +6 more | 2025-02-25 |
| 12050946 | Just in time assembly of transactions | Larisa Shwartz, Qing Wang, Jinho Hwang, Srinivasan Parthasarathy, Frank Bagehorn +5 more | 2024-07-30 |
| 11968224 | Shift-left security risk analysis | Jinho Hwang, Larisa Shwartz, Raghav Batta, Jakub Krchák | 2024-04-23 |
| 11720826 | Feedback loop learning between artificial intelligence systems | Jinho Hwang, Larisa Shwartz, Hagen Völzer, Rodrigo Otavio Castrillon | 2023-08-08 |
| 11645558 | Automatic mapping of records without configuration information | Qing Wang, Larisa Shwartz, Srinivasan Parthasarathy, Jinho Hwang, Tengfei Ma +6 more | 2023-05-09 |
| 11645188 | Pull request risk prediction for bug-introducing changes | Amar Prakash Azad, Harshit Kumar, Raghav Batta, Larisa Shwartz, Pritam S. Gundecha +1 more | 2023-05-09 |
| 11487537 | Linking operational events with system changes | Altynbek Orumbayev, Jinho Hwang, Larisa Shwartz, Jakub Krchák, Qing Wang +5 more | 2022-11-01 |
| 11314575 | Computing system event error corrective action recommendation | Qing Wang, Larisa Shwartz, Jinho Hwang, Srinivasan Parthasarathy, Frank Bagehorn +5 more | 2022-04-26 |
| 11262990 | Application topology discovery | Srinivasan Parthasarathy, Jinho Hwang, Qing Wang, Larisa Shwartz, Frank Bagehorn +5 more | 2022-03-01 |
| 11265288 | Using network configuration analysis to improve server grouping in migration | Joel W. Branch, Birgit M. Pfitzmann | 2022-03-01 |
| 11221908 | Discovery of an inexplicit link between a change and an incident in a computing environment | Raghav Batta, George E. Stark, Maja Vukovic, Alexandre Francisco Da Silva, Jinho Hwang +1 more | 2022-01-11 |
| 10419393 | Using network configuration analysis to improve server grouping in migration | Joel W. Branch, Birgit M. Pfitzmann | 2019-09-17 |
| 10372473 | Sensor virtualization through cloud storage and retrieval mechanisms | Marion L. Blount, Metin Feridun, Suzanne K. McIntosh, Iqbal I. Mohomed, Axel Tanner +1 more | 2019-08-06 |
| 10348768 | Deriving optimal actions from a random forest model | Rhonda L. Childress, Michelle Rivers, George E. Stark, Srinivas B. Tummalapenta, Dorothea Wiesmann | 2019-07-09 |
| 9986030 | Method and device for duplicating a data center | Birgit M. Pfitzmann | 2018-05-29 |
| 9652263 | Migrating servers into a secured environment | Florian Graf, Birgit M. Pfitzmann, Rudiger Rissmann, Gerhard Widmayer, Min Xiang +3 more | 2017-05-16 |
| 9565129 | Resource provisioning planning for enterprise migration and automated application discovery | Kun Bai, Jinho Hwang, Jill L. Jermyn, Michael Tacci, Maja Vukovic | 2017-02-07 |
| 9304511 | Sensor virtualization through cloud storage and retrieval mechanisms | Marion L. Blount, Metin Feridun, Suzanne K. McIntosh, Iqbal I. Mohomed, Axel Tanner +1 more | 2016-04-05 |
| 9256222 | Sensor virtualization through cloud storage and retrieval mechanisms | Marion L. Blount, Metin Feridun, Suzanne K. McIntosh, Iqbal I. Mohomed, Axel Tanner +1 more | 2016-02-09 |
| 9170960 | Location of computing assets within an organization | Rajarshi Das, Metin Feridun, Canturk Isci, Jonathan Lenchner, Suzanne K. McIntosh +2 more | 2015-10-27 |
| 9170961 | Location of computing assets within an organization | Rajarshi Das, Metin Feridun, Canturk Isci, Jonathan Lenchner, Suzanne K. McIntosh +2 more | 2015-10-27 |
| 9094309 | Detecting transparent network communication interception appliances | Joel W. Branch, Ruediger Rissmann | 2015-07-28 |
| 8990904 | Web-based security proxy for computing system environment scanning | Joel W. Branch, Ruediger Rissmann | 2015-03-24 |
| 8984598 | Web-based security proxy for computing system environment scanning | Joel W. Branch, Ruediger Rissmann | 2015-03-17 |