loadpatents
name:-0.025213956832886
name:-0.026623964309692
name:-0.0090038776397705
Hoy; Jeffrey Robert Patent Filings

Hoy; Jeffrey Robert

Patent Applications and Registrations

Patent applications and USPTO patent grants for Hoy; Jeffrey Robert.The latest application filed is for "user state tracking and anomaly detection in software-as-a-service environments".

Company Profile
8.24.24
  • Hoy; Jeffrey Robert - Cary NC
  • Hoy; Jeffrey Robert - Southern Pines NC
  • Hoy; Jeffrey Robert - Gibsonia PA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
User state tracking and anomaly detection in software-as-a-service environments
Grant 10,673,885 - Muthukrishnan , et al.
2020-06-02
Application-based security rights in cloud environments
Grant 10,673,900 - Nagaratnam , et al.
2020-06-02
Augmenting gesture based security technology using mobile devices
Grant 10,628,682 - Hoy , et al.
2020-04-21
User state tracking and anomaly detection in software-as-a-service environments
App 20190173903 - Muthukrishnan; Ravi Krishnan ;   et al.
2019-06-06
Secure application zones for cloud burst environments
Grant 10,244,002 - Hoy , et al.
2019-03-26
Using everyday objects as cryptographic keys
Grant 10,237,064 - Hoy , et al.
2019-03-19
Context-based cloud security assurance system
Grant 10,212,190 - Nagaratnam , et al. Feb
2019-02-19
User state tracking and anomaly detection in software-as-a-service environments
Grant 10,200,387 - Muthukrishnan , et al. Fe
2019-02-05
Dynamically defined virtual private network tunnels in hybrid cloud environments
Grant 10,142,293 - Hoy , et al. Nov
2018-11-27
Leveraging mobile devices to enforce restricted area security
Grant 10,028,139 - Iyer , et al. July 17, 2
2018-07-17
Secure application zones for cloud burst environments
App 20180124119 - Hoy; Jeffrey Robert ;   et al.
2018-05-03
Using everyday objects as cryptographic keys
App 20180109380 - Hoy; Jeffrey Robert ;   et al.
2018-04-19
Context-based cloud security assurance system
App 20180103067 - Nagaratnam; Nataraj ;   et al.
2018-04-12
Administration of a context-based cloud security assurance system
Grant 9,912,701 - Nagaratnam , et al. March 6, 2
2018-03-06
Using everyday objects as cryptographic keys
Grant 9,912,477 - Hoy , et al. March 6, 2
2018-03-06
Secure application zones for cloud burst environments
Grant 9,888,040 - Hoy , et al. February 6, 2
2018-02-06
Application-based security rights in cloud environments
App 20180027022 - Nagaratnam; Nataraj ;   et al.
2018-01-25
Augmenting gesture based security technology for improved classification and learning
Grant 9,875,399 - Hoy , et al. January 23, 2
2018-01-23
Administration of a context-based cloud security assurance system
Grant 9,876,822 - Nagaratnam , et al. January 23, 2
2018-01-23
Deployment using a context-based cloud security assurance system
Grant 9,871,822 - Nagaratnam , et al. January 16, 2
2018-01-16
Using everyday objects as cryptographic keys
App 20170353307 - Hoy; Jeffrey Robert ;   et al.
2017-12-07
Context-based cloud security assurance system
Grant 9,838,431 - Nagaratnam , et al. December 5, 2
2017-12-05
Augmenting Gesture Based Security Technology Using Mobile Devices
App 20170316260 - Hoy; Jeffrey Robert ;   et al.
2017-11-02
Augmenting Gesture Based Security Technology For Improved Classification And Learning
App 20170316259 - Hoy; Jeffrey Robert ;   et al.
2017-11-02
Augmenting Gesture Based Security Technology For Improved Differentiation
App 20170316258 - Hoy; Jeffrey Robert ;   et al.
2017-11-02
Application-based security rights in cloud environments
Grant 9,762,616 - Nagaratnam , et al. September 12, 2
2017-09-12
Leveraging mobile devices to enforce restricted area security
Grant 9,756,173 - Iyer , et al. September 5, 2
2017-09-05
Using everyday objects as cryptographic keys
Grant 9,729,318 - Hoy , et al. August 8, 2
2017-08-08
Cost-based configuration using a context-based cloud security assurance system
Grant 9,699,213 - Nagaratnam , et al. July 4, 2
2017-07-04
Systems and Methods for Adjusting Ride-Sharing Schedules and Routes
App 20170169366 - Klein; Daniel Victor ;   et al.
2017-06-15
Dynamically Defined Virtual Private Network Tunnels In Hybrid Cloud Environments
App 20170171158 - Hoy; Jeffrey Robert ;   et al.
2017-06-15
User state tracking and anomaly detection in software-as-a-service environments
App 20170155672 - Muthukrishnan; Ravi Krishnan ;   et al.
2017-06-01
Using everyday objects as cryptographic keys
App 20170099140 - Hoy; Jeffrey Robert ;   et al.
2017-04-06
Application self-service for assured log management in cloud environments
Grant 9,578,063 - Iyer , et al. February 21, 2
2017-02-21
Dynamically defined virtual private network tunnels in hybrid cloud environments
Grant 9,571,457 - Hoy , et al. February 14, 2
2017-02-14
Application-based security rights in cloud environments
App 20170041347 - Nagaratnam; Nataraj ;   et al.
2017-02-09
Secure application zones for cloud burst environments
App 20170013021 - Hoy; Jeffrey Robert ;   et al.
2017-01-12
Leveraging mobile devices to enforce restricted area security
App 20160286034 - Iyer; Sreekanth Ramakrishna ;   et al.
2016-09-29
Leveraging mobile devices to enforce restricted area security
App 20160286394 - Iyer; Sreekanth Ramakrishna ;   et al.
2016-09-29
Administration of a context-based cloud security assurance system
App 20160212175 - Nagaratnam; Nataraj ;   et al.
2016-07-21
Context-based cloud security assurance system
App 20160156661 - Nagaratnam; Nataraj ;   et al.
2016-06-02
Administration of a context-based cloud security assurance system
App 20160156664 - Nagaratnam; Nataraj ;   et al.
2016-06-02
Deployment using a context-based cloud security assurance system
App 20160156662 - Nagaratnam; Nataraj ;   et al.
2016-06-02
Cost-based configuration using a context-based cloud security assurance system
App 20160156663 - Nagaratnam; Nataraj ;   et al.
2016-06-02
Disambiguating conflicting content filter rules
Grant 9,356,937 - Hoy , et al. May 31, 2
2016-05-31
Federated identity mapping using delegated authorization
Grant 9,276,932 - Hoy , et al. March 1, 2
2016-03-01
Disambiguating conflicting content filter rules
App 20150135256 - Hoy; Jeffrey Robert ;   et al.
2015-05-14
Federated identity mapping using delegated authorization
App 20150128242 - Hoy; Jeffrey Robert ;   et al.
2015-05-07

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed