AG

Anil Gupta

ST Sandisk Technologies: 10 patents #1,320 of 2,224Top 60%
SE Sentinelone: 7 patents #1 of 6Top 20%
WT Western Digital Technologies: 7 patents #12 of 224Top 6%
CR Council Of Scientific And Industrial Research: 7 patents #127 of 4,648Top 3%
IN Intel: 7 patents #5,403 of 30,777Top 20%
HP HP: 6 patents #3,523 of 16,619Top 25%
AT Atmel: 6 patents #132 of 762Top 20%
FI Fireeye: 5 patents #33 of 189Top 20%
Lsi Logic: 4 patents #471 of 1,957Top 25%
SI Seeq Technology, Incorporated: 3 patents #6 of 27Top 25%
HE Hewlett Packard Enterprise: 3 patents #906 of 4,473Top 25%
SU Sundisk: 3 patents #7 of 19Top 40%
UM United Microelectronics: 3 patents #1,523 of 4,560Top 35%
MA Magsil: 2 patents #2 of 8Top 25%
UN Unknown: 2 patents #12,644 of 83,584Top 20%
TI Texas Instruments: 2 patents #5,248 of 12,488Top 45%
Motorola: 2 patents #4,475 of 12,470Top 40%
AT AT&T: 2 patents #7,280 of 18,772Top 40%
IR Indian Council Of Medical Research: 1 patents #4 of 49Top 9%
JPMorgan Chase: 1 patents #1,456 of 3,768Top 40%
EU Encore Computer, U.S.: 1 patents #2 of 10Top 20%
CS Catalyst Semiconductor: 1 patents #21 of 41Top 55%
EM Exel Microelectronics: 1 patents #4 of 11Top 40%
GE: 1 patents #19,878 of 36,430Top 55%
Overall (All Time): #15,059 of 4,157,543Top 1%
98
Patents All Time

Issued Patents All Time

Showing 25 most recent of 98 patents

Patent #TitleCo-InventorsDate
12432253 Deceiving attackers accessing network data Venu Vissamsetty, Harinath Vishwanath Ramchetty 2025-09-30
12418565 Deceiving attackers accessing network data Venu Vissamsetty, Harinath Vishwanath Ramchetty 2025-09-16
12361021 System and method for separating or distributing database calls between active and passive databases Jagdish Mishra, Garima Dokania, Nirav Bipinchandra Mehta, Umesh Payyan Valappil 2025-07-15
12261884 Deceiving attackers accessing active directory data Venu Vissamsetty, Harinath Vishwanath Ramchetty 2025-03-25
12259967 Preserving DLL hooks Harinath Vishwanath Ramchetty 2025-03-25
D1067030 Holder 2025-03-18
11997139 Deceiving attackers accessing network data Venu Vissamsetty, Harinath Vishwanath Ramchetty 2024-05-28
11899782 Preserving DLL hooks Harinath Vishwanath Ramchetty 2024-02-13
11776517 Holder 2023-10-03
11695800 Deceiving attackers accessing network data Venu Vissamsetty, Harinath Vishwanath Ramchetty 2023-07-04
11616812 Deceiving attackers accessing active directory data Venu Vissamsetty, Harinath Vishwanath Ramchetty 2023-03-28
11490745 Pegboard adapter and method Eshan Gupta 2022-11-08
11356932 Channel scan based on mobility state Souvik Sen, Manfred R. Arndt, Jung Gun Lee 2022-06-07
11262018 Storage rack 2022-03-01
10868818 Systems and methods for generation of signature generation using interactive infection visualizations Hirendra Rathor, Kaushal Dalal 2020-12-15
D895401 Pegboard adapter 2020-09-08
10666686 Virtualized exploit detection system Japneet Singh, Harinath Vishwanath Ramchetty 2020-05-26
10609572 Methods and systems for optimizing wireless network performance using behavioral profiling of network devices Roger D. Sands, Hien Q. Nguyen, Louis E. Pereira, John S. Balian, David V. Baker 2020-03-31
10575192 Methods and systems for optimizing wireless network performance using behavioral profiling of network devices Hien Q. Nguyen, Roger D. Sands, Louis E. Pereira, John S. Balian, David V. Baker 2020-02-25
10509905 Ransomware mitigation system Harinath Vishwanath Ramchetty, Venu Vissamsetty 2019-12-17
10503904 Ransomware detection and mitigation Japneet Singh 2019-12-10
10492069 Advertising multiple service set identifiers Mili Hoxha, Souvik Sen 2019-11-26
10271250 Selecting a subset of access points Souvik Sen, Manfred R. Arndt 2019-04-23
10148693 Exploit detection system Japneet Singh, Harinath Vishwanath Ramchetty 2018-12-04
10051978 Pegboard adapter and method Eshan Gupta 2018-08-21