Issued Patents All Time
Showing 25 most recent of 48 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12395344 | Method and system for authenticating a secure credential transfer to a device | Alberto Martin, Andrey Pronin | 2025-08-19 |
| 12346432 | Securing systems employing artificial intelligence | Oleg Pogorelik, Alex Nayshtut, Omer Ben-Shalom, Denis Klimov, Raizy Kellermann +1 more | 2025-07-01 |
| 12314782 | Microservices architecture | Kshitij A. Doshi | 2025-05-27 |
| 12045308 | Bit matrix multiplication | Dmitry Y. Babokin, Kshitij A. Doshi | 2024-07-23 |
| 12041174 | Method and system for authenticating a secure credential transfer to a device | Alberto Martin, Andrey Pronin | 2024-07-16 |
| 11922220 | Function as a service (FaaS) system enhancements | Mohammad R. Haghighat, Kshitij A. Doshi, Andrew J. Herdrich, Anup Mohan, Ravishankar Iyer +25 more | 2024-03-05 |
| 11748178 | Scalable and accelerated function as a service calling architecture | Alexander Bachmutsky, Raghu Kondapalli, Francesc Guim Bernat | 2023-09-05 |
| 11645127 | Microservices architecture | Kshitij A. Doshi | 2023-05-09 |
| 11646980 | Technologies for packet forwarding on ingress queue overflow | Andrey Chilikin | 2023-05-09 |
| 11640305 | Wake-up and timer for scheduling of functions with context hints | Alexander Bachmutsky, Kshitij A. Doshi, Raghu Kondapalli | 2023-05-02 |
| 11568022 | Bit matrix multiplication | Dmitry Y. Babokin, Kshitij A. Doshi | 2023-01-31 |
| 11562063 | Encoded inline capabilities | Michael LeMay, David M. Durham, Michael E. Kounavis, Barry E. Huntley, Vedvyas Shanbhogue +12 more | 2023-01-24 |
| 11552798 | Method and system for authenticating a secure credential transfer to a device | Alberto Martin, Andrey Pronin | 2023-01-10 |
| 11483245 | Technologies for filtering network traffic on ingress | Andrey Chilikin, Ronen Aharon Hyatt | 2022-10-25 |
| 11467888 | Microservices architecture | Kshitij A. Doshi | 2022-10-11 |
| 11388272 | Technologies for network packet processing between cloud and telecommunications networks | Kshitij A. Doshi, Areg Melik-Adamyan | 2022-07-12 |
| 11354240 | Selective execution of cache line flush operations | Kshitij A. Doshi | 2022-06-07 |
| 11347853 | Hardware heuristic-driven binary translation-based execution analysis for return-oriented programming malware detection | Palanivelrajan Rajan Shanmugavelayutham, Koichi Yamada, Igor Muttik, Oleksandr Bazhaniuk, Yuriy Bulygin +6 more | 2022-05-31 |
| 11320837 | Federated automated interoperation between premises and autonomous resources | Kshitij A. Doshi, Katalin K. Bartfai-Walcott | 2022-05-03 |
| 11307854 | Memory write log storage processors, methods, systems, and instructions | Kshitij A. Doshi, Roman Dementiev | 2022-04-19 |
| 11171983 | Techniques to provide function-level isolation with capability-based security | Kshitij A. Doshi, Michael LeMay, Dmitry Y. Babokin, Areg Melik-Adamyan | 2021-11-09 |
| 11126721 | Methods, systems and apparatus to detect polymorphic malware | Alex Nayshtut, Koichi Yamada, Ajay Harikumar, Venkat R. Gokulrangan | 2021-09-21 |
| 11055226 | Mitigation of cache-latency based side-channel attacks | — | 2021-07-06 |
| 10965597 | Virtual network function load balancer | Kshitij A. Doshi, Andrey Chilikin | 2021-03-30 |
| 10929535 | Controlled introduction of uncertainty in system operating parameters | Kshitij A. Doshi, Francesc Guim, Alex Nayshtut | 2021-02-23 |