Issued Patents All Time
Showing 1–23 of 23 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12259998 | Database security through obfuscation | — | 2025-03-25 |
| 11921878 | Database security through obfuscation | — | 2024-03-05 |
| 11698911 | System and methods for performing updated query requests in a system of multiple database engine | Siddharth Shah, Jeremy Norris, Joseph Michael Davis, Kausik Sridharabalan, Rajagopalan Madapusi Ammanur | 2023-07-11 |
| 11620285 | Automatic database query translation | — | 2023-04-04 |
| 11610024 | Systems and methods for protecting search privacy | Susanta K. Nanda, Kevin Roundy | 2023-03-21 |
| 11409610 | Context-driven data backup and recovery | Viswesvaran Janakiraman | 2022-08-09 |
| 11205010 | Systems and methods for identifying privacy leakage information | Petros Efstathopoulos | 2021-12-21 |
| 11036800 | Systems and methods for clustering data to improve data analytics | Henry Aloysius, Bashyam TCA | 2021-06-15 |
| 11032303 | Classification using projection of graphs into summarized spaces | Petros Efstathopoulos | 2021-06-08 |
| 11010492 | Real-time detection of privacy leaks based on linguistic features | Petros Efstathopoulos | 2021-05-18 |
| 10997499 | Systems and methods for file system metadata analytics | Meetali Vaidya, Shailesh Dargude, Himanshu Ashwani | 2021-05-04 |
| 10963501 | Systems and methods for generating a topic tree for digital information | Naveen Ramachandrappa, Ramya Mula, Bashyam TCA | 2021-03-30 |
| 10839300 | Systems and methods for identifying subject-matter experts | Henry Aloysius, Mikhail Tarasyuk, Ankit Agarwal, Stuart Sperling | 2020-11-17 |
| 10742670 | Detecting and preventing execution of a malicious computer application using utility driven graph summarization | Petros Efstathopoulos | 2020-08-11 |
| 10686816 | Insider threat detection under user-resource bi-partite graphs | Saurabh Shintre, Sandeep Bhatkar | 2020-06-16 |
| 10628264 | Context-driven data backup and recovery | Viswesvaran Janakiraman | 2020-04-21 |
| 10606705 | Prioritizing backup operations using heuristic techniques | Viswesvaran Janakiraman | 2020-03-31 |
| 10425435 | Systems and methods for detecting anomalous behavior in shared data repositories | Sandeep Bhatkar, Saurabh Shintre | 2019-09-24 |
| 10341373 | Automatically detecting insider threats using user collaboration patterns | Sandeep Bhatkar, Saurabh Shintre | 2019-07-02 |
| 10311087 | Systems and methods for determining topics of data artifacts | Henry Aloysius, Bashyam Anant | 2019-06-04 |
| 10311231 | Preventing a malicious computer application from executing in a computing environment | Petros Efstathopoulos | 2019-06-04 |
| 10180955 | Systems and methods for applying content-based retention policies to data artifacts | Karthik Rajamony, Henry Aloysius, Scott D. Kaiser | 2019-01-15 |
| 9692768 | Sharing confidential graph data using multi-level graph summarization with varying data utility and privacy protection | Susanta K. Nanda, Petros Efstathopoulos | 2017-06-27 |