Issued Patents All Time
Showing 1–16 of 16 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12341814 | Implementing decoys in a network environment | Venu Vissamsetty, Pavan Patel, Prashanth Srinivas Mysore | 2025-06-24 |
| 11888897 | Implementing decoys in a network environment | Venu Vissamsetty, Pavan Patel, Prashanth Srinivas Mysore | 2024-01-30 |
| 11470115 | Implementing decoys in a network environment | Venu Vissamsetty, Pavan Patel, Prashanth Srinivas Mysore | 2022-10-11 |
| 10542044 | Authentication incident detection and management | Venu Vissamsetty, Srikant Vissamsetti, Harinath Vishwanath Ramchetty | 2020-01-21 |
| 9852296 | Rollback feature | Prabhat Singh, Gangadharasa Srinivasa | 2017-12-26 |
| 9703958 | Rollback feature | Prabhat Singh, Gangadharasa Srinivasa | 2017-07-11 |
| 9607150 | Rollback feature | Prabhat Singh, Gangadharasa Srinivasa | 2017-03-28 |
| 9323928 | System and method for non-signature based detection of malicious processes | Romanch Agarwal, Prabhat Singh, Harinath Ramachetty Vishwanath, Palasamudram Ramagopal Prashanth | 2016-04-26 |
| 9032523 | Rollback feature | Prabhat Singh, Gangadharasa Srinivasa | 2015-05-12 |
| 8732296 | System, method, and computer program product for redirecting IRC traffic identified utilizing a port-independent algorithm and controlling IRC based malware | Vinoo Thomas, Cedric Cochin, Rachit Mathur | 2014-05-20 |
| 8677493 | Dynamic cleaning for malware using cloud technology | Prabhat Singh, Palasamudram Ramagopal Prashanth | 2014-03-18 |
| 8667582 | System, method, and computer program product for directing predetermined network traffic to a honeypot | Vinoo Thomas | 2014-03-04 |
| 8539583 | Rollback feature | Prabhat Singh, Gangadharasa Srinivasa | 2013-09-17 |
| 8528092 | System, method, and computer program product for identifying unwanted activity utilizing a honeypot device accessible via VLAN trunking | Vinoo Thomas | 2013-09-03 |
| 8306988 | System, method, and computer program product for segmenting a database based, at least in part, on a prevalence associated with known objects included in the database | Prabhat Singh, Zhenyu Zhong, Guy Roberts, Jeffrey Martin Green, Sven Krasser | 2012-11-06 |
| 8156541 | System, method, and computer program product for identifying unwanted activity utilizing a honeypot device accessible via VLAN trunking | Vinoo Thomas | 2012-04-10 |