KA

Khaja E. Ahmed

Microsoft: 12 patents #3,498 of 40,388Top 9%
AM Amazon: 5 patents #3,253 of 19,158Top 20%
CN Cavium Networks: 2 patents #9 of 28Top 35%
ID Identrus: 2 patents #1 of 12Top 9%
ID Identrust: 2 patents #3 of 24Top 15%
WN Workman Nydegger: 1 patents #1 of 40Top 3%
Overall (All Time): #169,447 of 4,157,543Top 5%
24
Patents All Time

Issued Patents All Time

Patent #TitleCo-InventorsDate
12425416 Threat detection and mitigation in a virtualized computing environment Anthony Joseph Suarez, Dmitry Petrovich Andreychuk 2025-09-23
10382408 Computing instance migration Diwakar Gupta, Matthew Shawn Wilson 2019-08-13
10320813 Threat detection and mitigation in a virtualized computing environment Anthony Joseph Suarez, Dmitry Petrovich Andreychuk 2019-06-11
9712503 Computing instance migration Diwakar Gupta, Matthew Shawn Wilson 2017-07-18
9560068 Network intrusion detection with distributed correlation Igal Figlin, Arthur Zavalkovsky, Lior Arzi, Efim Hudis, Jennifer LeMond +3 more 2017-01-31
9483742 Intelligent traffic analysis to detect malicious activity 2016-11-01
9111079 Trustworthy device claims as a service Eugene (John) Neystadt, Daniel Alon, Yair Tor, Mark F. Novak, Yoav Yassour 2015-08-18
8881247 Federated mobile authentication using a network operator infrastructure Meir Mendelovich, John Neystadt 2014-11-04
8769277 Content retrieval Ravi T. Rao, R. Scott Briggs, Sandeep K. Singhal 2014-07-01
8543808 Trusted intermediary for network data processing 2013-09-24
8516576 Network intrusion detection with distributed correlation Igal Figlin, Arthur Zavalkovsky, Lior Arzi, Efim Hudis, Jennifer LeMond +3 more 2013-08-20
8112477 Content identification for peer-to-peer content retrieval Ravi T. Rao, R. Scott Briggs, Scott Anthony Plant 2012-02-07
8019882 Content identification for peer-to-peer content retrieval Ravi T. Rao, R. Scott Briggs, Scott Anthony Plant 2011-09-13
7921173 Reducing unwanted and unsolicited electronic messages by exchanging electronic message transmission policies and solving and verifying solutions to computational puzzles Robert G. Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Harry S. Katz +3 more 2011-04-05
7734924 System and method for transparently providing certificate validation and other services within an electronic transaction Lawrence R. Miller, Guy S. Tallent, Jr. 2010-06-08
7617322 Secure peer-to-peer cache sharing Daniel R. Simon 2009-11-10
7607008 Authentication broker service John Hal Howard, Daniel Salvatore Schiappa, Kyle S. Young 2009-10-20
7552176 Reducing unwanted and unsolicited electronic messages by exchanging electronic message transmission policies and solving and verifying solutions to computational puzzles Robert G. Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Harry S. Katz +3 more 2009-06-23
7398315 Reducing unwanted and unsolicited electronic messages by preventing connection hijacking and domain spoofing Robert G. Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Harry S. Katz +1 more 2008-07-08
7240203 Method and apparatus for establishing secure sessions Richard E. Kessler, David A. Carlson, Muhammad Raghib Hussain, Robert A. Sanzone, Michael D. Varga 2007-07-03
7200573 System and method for providing warranties in electronic commerce Lawrence R. Miller, Navin Vasanthakumar, Mark A. Robinson, Jeffrey Boyd, Deborah Goldstein +1 more 2007-04-03
7167985 System and method for providing trusted browser verification 2007-01-23
7000105 System and method for transparently providing certificate validation and other services within an electronic transaction Guy S. Tallent, Jr., Lawrence R. Miller 2006-02-14
6789147 Interface for a security coprocessor Richard E. Kessler, David A. Carlson, Muhammad Raghib Hussain, Robert A. Sanzone, Michael D. Varga 2004-09-07