RC

Ramamohan Chennamsetty

IBM: 18 patents #6,125 of 70,183Top 9%
KY Kyndryl: 1 patents #287 of 874Top 35%
LP Lenovo (Singapore) Pte.: 1 patents #471 of 1,012Top 50%
Overall (All Time): #219,647 of 4,157,543Top 6%
20
Patents All Time

Issued Patents All Time

Patent #TitleCo-InventorsDate
11689523 Facilitating password creation via a secure device Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Mauro Marzorati 2023-06-27
11288234 Placement of data fragments generated by an erasure code in distributed computational devices based on a deduplication factor Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi 2022-03-29
10963580 Systems and methods for rule based dynamic selection of rendering browsers Charles K. Davis, III, Christopher R. Dotson, Charles S. Lingafelt 2021-03-30
10635794 Determine security access level based on user behavior Derek W. Botti, C. Steven Lingafelt, William H. Tworek 2020-04-28
10430595 Systems and methods for rule based dynamic selection of rendering browsers Charles K. Davis, III, Christopher R. Dotson, Charles S. Lingafelt 2019-10-01
10303243 Controlling devices based on physical gestures Charles K. Davis, III, Christopher R. Dotson, Charles S. Lingafelt 2019-05-28
10242020 Placement of data fragments generated by an erasure code in distributed computational devices based on a deduplication factor Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi 2019-03-26
10002048 Point-in-time snap copy management in a deduplication environment Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi 2018-06-19
9870454 Determine security access level based on user behavior Derek W. Botti, C. Steven Lingafelt, William H. Tworek 2018-01-16
9654514 Trust level modifier Derek W. Botti, Anji Greene, Charles S. Lingafelt, William H. Tworek 2017-05-16
9645806 Method to convey an application's development environment characteristics to the hosting provider to facilitate selection of hosting environment or the selection of an optimized production operation of the application Derek W. Botti, Anji Greene, Charles S. Lingafelt, William H. Tworek 2017-05-09
9635058 Trust level modifier Derek W. Botti, Anji Greene, Charles S. Lingafelt, William H. Tworek 2017-04-25
9565196 Trust level modifier Derek W. Botti, Anji Greene, Charles S. Lingafelt, William H. Tworek 2017-02-07
9426023 Automatic reconfiguration of network parameters during file system failover Vinit Jain, Nataraj Nagaratnam, Sandeep R. Patil, Riyazahamad M. Shiraguppi 2016-08-23
9396342 Role based authorization based on product content space Senthil Bakthavachalam, Edward B. Boden 2016-07-19
9389950 Techniques for information protection in a solid-state device based storage pool Nataraj Nagaratnam, Sandeep P. Patil, Riyazahamad M. Shiraguppi 2016-07-12
9251154 Priority based reliability mechanism for archived data Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Gandhi Sivakumar 2016-02-02
9131008 Discovery profile based unified credential processing for disparate security domains Eric W. Brown, Abraham L. Woldemichael 2015-09-08
8676847 Visibility control of resources Eric W. Brown, Kerry A. Ortega, Aaron D. Sahlin, Andrew J. Streit 2014-03-18
8291479 Method, hardware product, and computer program product for optimizing security in the context of credential transformation services Boas Betzler, Jeffrey A. Frey, Michael D. Williams 2012-10-16