loadpatents
name:-0.018954992294312
name:-0.019474029541016
name:-0.0077240467071533
Kapadia; Kaushal Kiran Patent Filings

Kapadia; Kaushal Kiran

Patent Applications and Registrations

Patent applications and USPTO patent grants for Kapadia; Kaushal Kiran.The latest application filed is for "identifying cyber adversary behavior".

Company Profile
8.21.20
  • Kapadia; Kaushal Kiran - Alpharetta GA
  • Kapadia; Kaushal Kiran - Pune IN
  • Kapadia; Kaushal Kiran - Ashok Nagar N/A IN
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Identifying cyber adversary behavior
Grant 11,228,612 - Vajipayajula , et al. January 18, 2
2022-01-18
Identifying Cyber Adversary Behavior
App 20200314141 - Vajipayajula; Sulakshan ;   et al.
2020-10-01
Application-based security rights in cloud environments
Grant 10,673,900 - Nagaratnam , et al.
2020-06-02
User state tracking and anomaly detection in software-as-a-service environments
Grant 10,673,885 - Muthukrishnan , et al.
2020-06-02
Augmenting gesture based security technology using mobile devices
Grant 10,628,682 - Hoy , et al.
2020-04-21
User state tracking and anomaly detection in software-as-a-service environments
App 20190173903 - Muthukrishnan; Ravi Krishnan ;   et al.
2019-06-06
Secure application zones for cloud burst environments
Grant 10,244,002 - Hoy , et al.
2019-03-26
Using everyday objects as cryptographic keys
Grant 10,237,064 - Hoy , et al.
2019-03-19
User state tracking and anomaly detection in software-as-a-service environments
Grant 10,200,387 - Muthukrishnan , et al. Fe
2019-02-05
Dynamically defined virtual private network tunnels in hybrid cloud environments
Grant 10,142,293 - Hoy , et al. Nov
2018-11-27
Leveraging mobile devices to enforce restricted area security
Grant 10,028,139 - Iyer , et al. July 17, 2
2018-07-17
Secure application zones for cloud burst environments
App 20180124119 - Hoy; Jeffrey Robert ;   et al.
2018-05-03
Using everyday objects as cryptographic keys
App 20180109380 - Hoy; Jeffrey Robert ;   et al.
2018-04-19
Identity context-based access control
Grant 9,916,461 - Kapadia , et al. March 13, 2
2018-03-13
Using everyday objects as cryptographic keys
Grant 9,912,477 - Hoy , et al. March 6, 2
2018-03-06
Secure application zones for cloud burst environments
Grant 9,888,040 - Hoy , et al. February 6, 2
2018-02-06
Application-based security rights in cloud environments
App 20180027022 - Nagaratnam; Nataraj ;   et al.
2018-01-25
Augmenting gesture based security technology for improved classification and learning
Grant 9,875,399 - Hoy , et al. January 23, 2
2018-01-23
Using everyday objects as cryptographic keys
App 20170353307 - Hoy; Jeffrey Robert ;   et al.
2017-12-07
Augmenting Gesture Based Security Technology For Improved Classification And Learning
App 20170316259 - Hoy; Jeffrey Robert ;   et al.
2017-11-02
Augmenting Gesture Based Security Technology For Improved Differentiation
App 20170316258 - Hoy; Jeffrey Robert ;   et al.
2017-11-02
Augmenting Gesture Based Security Technology Using Mobile Devices
App 20170316260 - Hoy; Jeffrey Robert ;   et al.
2017-11-02
Application-based security rights in cloud environments
Grant 9,762,616 - Nagaratnam , et al. September 12, 2
2017-09-12
Leveraging mobile devices to enforce restricted area security
Grant 9,756,173 - Iyer , et al. September 5, 2
2017-09-05
Using everyday objects as cryptographic keys
Grant 9,729,318 - Hoy , et al. August 8, 2
2017-08-08
Dynamically Defined Virtual Private Network Tunnels In Hybrid Cloud Environments
App 20170171158 - Hoy; Jeffrey Robert ;   et al.
2017-06-15
User state tracking and anomaly detection in software-as-a-service environments
App 20170155672 - Muthukrishnan; Ravi Krishnan ;   et al.
2017-06-01
Using everyday objects as cryptographic keys
App 20170099140 - Hoy; Jeffrey Robert ;   et al.
2017-04-06
Application self-service for assured log management in cloud environments
Grant 9,578,063 - Iyer , et al. February 21, 2
2017-02-21
Dynamically defined virtual private network tunnels in hybrid cloud environments
Grant 9,571,457 - Hoy , et al. February 14, 2
2017-02-14
Application-based security rights in cloud environments
App 20170041347 - Nagaratnam; Nataraj ;   et al.
2017-02-09
Secure application zones for cloud burst environments
App 20170013021 - Hoy; Jeffrey Robert ;   et al.
2017-01-12
Policy-driven approach to managing privileged/shared identity in an enterprise
Grant 9,529,993 - Kapadia , et al. December 27, 2
2016-12-27
Leveraging mobile devices to enforce restricted area security
App 20160286034 - Iyer; Sreekanth Ramakrishna ;   et al.
2016-09-29
Leveraging mobile devices to enforce restricted area security
App 20160286394 - Iyer; Sreekanth Ramakrishna ;   et al.
2016-09-29
Identity context-based access control
App 20140075492 - Kapadia; Kaushal Kiran ;   et al.
2014-03-13
Policy-driven approach to managing privileged/shared identity in an enterprise
App 20130232541 - Kapadia; Kaushal Kiran ;   et al.
2013-09-05

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed