Issued Patents All Time
Showing 1–21 of 21 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12388645 | Techniques for binding tokens to a device and collecting device posture signals | Vinayak Shenoy, Yang Chen, Lana Young Choi, Dipti Vivek Shiralkar | 2025-08-12 |
| 12327114 | Processing cores and information transfer circuits arranged in matrix | — | 2025-06-10 |
| 12165042 | Neural network hardware accelerator data parallelism | Nikolay NEZ, Oleg KHAVIN, Jens Huthmann, Sakyasingha Dasgupta | 2024-12-10 |
| 12155400 | Data compression method, data compression apparatus, data decompression method, data decompression apparatus and data storage system | — | 2024-11-26 |
| 12128100 | Immunogenic compositions for treatment of Hepatitis B | David E. Anderson | 2024-10-29 |
| 11657260 | Neural network hardware accelerator data parallelism | Nikolay NEZ, Oleg KHAVIN, Jens Huthmann, Sakyasingha Dasgupta | 2023-05-23 |
| 11481618 | Optimization apparatus and method for controlling neural network | — | 2022-10-25 |
| 11386221 | Fine-grained access control for data manipulation language (DML) operations on relational data | Yi Ru, Chao Liang, Vikram Pesati | 2022-07-12 |
| 11387844 | Data compression method, data compression apparatus, data decompression method, data decompression apparatus and data storage system | — | 2022-07-12 |
| 11360788 | Transfer of control of configuration sources | Peter J. Kaufman, Shayak Lahiri, John Chadwell Spaith, Janani Vasudevan, Dennis Edward Flanagan | 2022-06-14 |
| 11119765 | Processor with processing cores each including arithmetic unit array | — | 2021-09-14 |
| 10736844 | Compositions and methods for treating viral infections | David E. Anderson, Jasminka Bozic, Marc J. Kirchmeier | 2020-08-11 |
| 10628174 | Transfer of control of configuration sources | Peter J. Kaufman, Shayak Lahiri, John Chadwell Spaith, Janani Vasudevan, Dennis Edward Flanagan | 2020-04-21 |
| 10303894 | Fine-grained access control for data manipulation language (DML) operations on relational data | Yi Ru, Chao Liang, Vikram Pesati | 2019-05-28 |
| 10102355 | Optimized enforcement of fine grained access control on data | Yi Ru, Chao Liang, Vikram Pesati | 2018-10-16 |
| 10049205 | Asserting identities of application users in a database system based on delegated trust | Thomas Keefe, Vikram Pesati | 2018-08-14 |
| 9613224 | Integrating a user's security context in a database for access control | Mincai Wang, Chao Liang, Vikram Pesati | 2017-04-04 |
| 9471801 | Method and apparatus to support privileges at multiple levels of authentication using a constraining ACL | Sam Idicula, Thomas Keefe, Mohammed Irfan Rafiq, Vikram Pesati, Nipun Agarwal | 2016-10-18 |
| 9043309 | SQL transformation-based optimization techniques for enforcement of data access control | Thomas Keefe, Chao Liang, Vikram Pesati | 2015-05-26 |
| 8732847 | Access control model of function privileges for enterprise-wide applications | Thomas Keefe, Vikram Pesati, Roger Wigenstam | 2014-05-20 |
| 8095557 | Type system for access control lists | Thomas Keefee, Vikram Pesati, Eric Sedlar | 2012-01-10 |