Issued Patents All Time
Showing 25 most recent of 136 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12401630 | Zero-trust distributed data sharing | Michael James Zwilling | 2025-08-26 |
| 12393720 | Blind subpoena protection | Nishanth Chandran, Panagiotis Antonopoulos, Srinath T.V. SETTY, Basil CHERIAN, Daniel John CARROLL, JR. +1 more | 2025-08-19 |
| 12395331 | Decryption key generation and recovery | Nishanth Chandran | 2025-08-19 |
| 12301714 | Secure data ingestion with edge computing | Ganesh Ananthanarayanan, Yuanchao SHU, Kiran Muthabatulla, Yoganand Rajasekaran | 2025-05-13 |
| 11615410 | Heartbeats and consensus in verifiable outsourced ledgers | Srinath Setty, Soumya Basu | 2023-03-28 |
| 11601439 | Verifiable outsourced ledgers | Srinath Setty | 2023-03-07 |
| 11403631 | Heartbeats and consensus in verifiable outsourced ledgers | Srinath Setty, Soumya Basu | 2022-08-02 |
| 11232214 | Secure data processing on sensitive data using trusted hardware | Shriraghav Kaushik, Arvind Arasu, Spyridon Blanas, Kenneth Eguro, Manas Rajendra Joglekar +3 more | 2022-01-25 |
| 10984134 | Blockchain system for leveraging member nodes to achieve consensus | Srinath Setty, Lidong Zhou, Michael Lowell Roberts, Soumya Basu | 2021-04-20 |
| 10917394 | Data operations using a proxy encryption key | Mitica Manu, Baskar Sridharan, Raghunath Ramakrishnan, Sriram K. Rajamani, Victor Boyko +2 more | 2021-02-09 |
| 10733602 | Heartbeats and consensus in verifiable outsourced ledgers | Srinath Setty, Soumya Basu | 2020-08-04 |
| 10671736 | Secure data processing on sensitive data using trusted hardware | Shriraghav Kaushik, Arvind Arasu, Spyridon Blanas, Kenneth Eguro, Manas Rajendra Joglekar +3 more | 2020-06-02 |
| 10587628 | Verifiable outsourced ledgers | Srinath Setty | 2020-03-10 |
| 10554390 | Homomorphic factorization encryption | Prateek Jain, Jonathan Lee, Kartik Gupta | 2020-02-04 |
| 10491373 | Homomorphic data analysis | Prateek Jain, Jonathan Lee, Kartik Gupta | 2019-11-26 |
| 10484352 | Data operations using a proxy encryption key | Mitica Manu, Baskar Sridharan, Raghunath Ramakrishnan, Sriram K. Rajamani, Victor Boyko +2 more | 2019-11-19 |
| 10409892 | Formatting data by example | Chad Rothschiller, Daniel Battagin, Christopher Benedict, Rodrigo Moreira-Silveira, Dmitri O. Danilov +5 more | 2019-09-10 |
| 10263775 | Policy-based key recovery | Srinath Setty, Brant Lee Zwiefel, Nishanth Chandran, Satyanarayana V. Lokam, Jonathan Lee +1 more | 2019-04-16 |
| 9495552 | Integrated data deduplication and encryption | Ahmed El-Shimi, Paul Adrian Oltean, Ran Kalach, Sudipta Sengupta, Jin Li +2 more | 2016-11-15 |
| 9459893 | Virtualization for diversified tamper resistance | Bertrand Anckaert, Mariusz H. Jakubowski | 2016-10-04 |
| 9213867 | Secure cloud database platform with encrypted database queries | Ravishankar Ramamurthy, Kenneth Eguro | 2015-12-15 |
| 9117094 | Data location obfuscation | Bertrand Anckaert, Mariusz H. Jakubowski, Chit Wei Saw | 2015-08-25 |
| 9053348 | Secure cloud computing platform | Kenneth Eguro, Roy Peter D'Souza | 2015-06-09 |
| 8989706 | Automated secure pairing for wireless devices | Ganesh Ananthanarayanan, Sean Blagsvedt | 2015-03-24 |
| 8595276 | Randomized signal transforms and their applications | Michael Malkin | 2013-11-26 |