SM

Shawn P. Mullen

IBM: 204 patents #156 of 70,183Top 1%
PS Peregrine Surgical: 3 patents #3 of 6Top 50%
TI Trend Micro Incorporated: 2 patents #154 of 749Top 25%
Globalfoundries: 1 patents #2,221 of 4,424Top 55%
Microsoft: 1 patents #24,826 of 40,388Top 65%
📍 Kyle, TX: #1 of 223 inventorsTop 1%
🗺 Texas: #78 of 125,132 inventorsTop 1%
Overall (All Time): #2,879 of 4,157,543Top 1%
214
Patents All Time

Issued Patents All Time

Showing 51–75 of 214 patents

Patent #TitleCo-InventorsDate
9122867 Techniques for presenting password feedback to a computer system user Susann Marie Keohane, Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh 2015-09-01
9111081 Remote direct memory access authentication of a device Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh 2015-08-18
9098625 Viral trace Susann Marie Keohane, Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh 2015-08-04
9088609 Logical partition media access control impostor detector Susann Marie Koehane, Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh 2015-07-21
9037775 Network filtering in a virtualized environment Jeffrey J. Feng, Terry J. Hoffman, Bhargavi B. Reddy 2015-05-19
8955125 Snoop echo response extractor Tristan A. Brown, Venkat Vankatsubra 2015-02-10
8935457 Network filtering in a virtualized environment Jeffrey J. Feng, Terry J. Hoffman, Bhargavi B. Reddy 2015-01-13
8875133 Migration of virtual machines Alan Thomas Joseph Hayward 2014-10-28
8856519 Start method for application cryptographic keystores Jessica C. Murillo, Johnny Meng-Han Shieh 2014-10-07
8850430 Migration of virtual machines Alan Thomas Joseph Hayward 2014-09-30
8788806 General purpose distributed encrypted file system Hussaina N. Begum, Manjunath A. Pattanshetti 2014-07-22
8751789 General purpose distributed encrypted file system Hussaina N. Begum, Manjunath A. Pattanshetti 2014-06-10
8725874 Dynamic determination of an ideal client-server for a collaborative application network Susann Marie Keohane, Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh 2014-05-13
8626852 Email thread monitoring and automatic forwarding of related email messages Susann Marie Keohane, Gerald Francis McBrearty, Jessica Murillo, Johnny Meng-Han Shieh 2014-01-07
8621052 Performance tuning for software as a performance level service Susann Marie Keohane, Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh 2013-12-31
8607071 Preventing replay attacks in encrypted file systems Susann Marie Keohane, Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh 2013-12-10
8589698 Integrity service using regenerated trust integrity gather program Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh 2013-11-19
8515995 Presenting multiple possible selectable domain names from a URL entry Susann Marie Keohane, Gerald Francis McBrearty, Jessica Murillo, Johnny Meng-Han Shieh 2013-08-20
8494167 Method and apparatus for restoring encrypted files to an encrypting file system based on deprecated keystores Neeta Garimella, Alexei Kojenov, Ravi Shankar, John Viksne 2013-07-23
8468209 Method of rescinding previously transmitted e-mail messages Susann Marie Keohane, Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh 2013-06-18
8458320 Alerting a user to an occurrence of a specified event Susann Marie Keohane, Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh 2013-06-04
8448189 Identifying intrusions into a network data processing system Dolapo Martin Falola, Vinit Jain, Shannon Marie MacAlpine, James Tesauro 2013-05-21
8424067 Smart password determination Susann Marie Keohane, Gerald Francis McBrearty, Jessica Murillo, Johnny Meng-Han Shieh 2013-04-16
8391495 Secure shell used to open a user's encrypted file system keystore Tommy L. McLane, Jyoti B. Tenginakai 2013-03-05
8379822 Conference call initialization Susann Marie Keohane, Gerald Francis McBrearty, Jessica Murillo, Johnny Meng-Han Shieh 2013-02-19