NJ

Nitin Jyoti

MC Mcafee: 12 patents #64 of 1,127Top 6%
AT AT&T: 2 patents #7,280 of 18,772Top 40%
SE Sentinelone: 2 patents #4 of 6Top 70%
Overall (All Time): #285,754 of 4,157,543Top 7%
16
Patents All Time

Issued Patents All Time

Patent #TitleCo-InventorsDate
12341814 Implementing decoys in a network environment Venu Vissamsetty, Pavan Patel, Prashanth Srinivas Mysore 2025-06-24
11888897 Implementing decoys in a network environment Venu Vissamsetty, Pavan Patel, Prashanth Srinivas Mysore 2024-01-30
11470115 Implementing decoys in a network environment Venu Vissamsetty, Pavan Patel, Prashanth Srinivas Mysore 2022-10-11
10542044 Authentication incident detection and management Venu Vissamsetty, Srikant Vissamsetti, Harinath Vishwanath Ramchetty 2020-01-21
9852296 Rollback feature Prabhat Singh, Gangadharasa Srinivasa 2017-12-26
9703958 Rollback feature Prabhat Singh, Gangadharasa Srinivasa 2017-07-11
9607150 Rollback feature Prabhat Singh, Gangadharasa Srinivasa 2017-03-28
9323928 System and method for non-signature based detection of malicious processes Romanch Agarwal, Prabhat Singh, Harinath Ramachetty Vishwanath, Palasamudram Ramagopal Prashanth 2016-04-26
9032523 Rollback feature Prabhat Singh, Gangadharasa Srinivasa 2015-05-12
8732296 System, method, and computer program product for redirecting IRC traffic identified utilizing a port-independent algorithm and controlling IRC based malware Vinoo Thomas, Cedric Cochin, Rachit Mathur 2014-05-20
8677493 Dynamic cleaning for malware using cloud technology Prabhat Singh, Palasamudram Ramagopal Prashanth 2014-03-18
8667582 System, method, and computer program product for directing predetermined network traffic to a honeypot Vinoo Thomas 2014-03-04
8539583 Rollback feature Prabhat Singh, Gangadharasa Srinivasa 2013-09-17
8528092 System, method, and computer program product for identifying unwanted activity utilizing a honeypot device accessible via VLAN trunking Vinoo Thomas 2013-09-03
8306988 System, method, and computer program product for segmenting a database based, at least in part, on a prevalence associated with known objects included in the database Prabhat Singh, Zhenyu Zhong, Guy Roberts, Jeffrey Martin Green, Sven Krasser 2012-11-06
8156541 System, method, and computer program product for identifying unwanted activity utilizing a honeypot device accessible via VLAN trunking Vinoo Thomas 2012-04-10