loadpatents
name:-0.20852088928223
name:-0.027806043624878
name:-0.0098860263824463
Kapoor; Aditya Patent Filings

Kapoor; Aditya

Patent Applications and Registrations

Patent applications and USPTO patent grants for Kapoor; Aditya.The latest application filed is for "machine learning model for malware dynamic analysis".

Company Profile
10.41.44
  • Kapoor; Aditya - Portland OR
  • Kapoor; Aditya - Gurgaon IN
  • Kapoor; Aditya - Bangalore IN
  • Kapoor; Aditya - Beaverton OR
  • Kapoor; Aditya - Bellevue WA
  • Kapoor; Aditya - Walldorf N/A DE
  • Kapoor; Aditya - Hillsboro OR
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Anomaly based malware detection
Grant 11,210,394 - Wojnowicz , et al. December 28, 2
2021-12-28
Determining the reputation of a digital certificate
Grant 11,032,266 - Bean , et al. June 8, 2
2021-06-08
Machine Learning Model for Malware Dynamic Analysis
App 20200265139 - Zhao; Xuan ;   et al.
2020-08-20
Lossless conversion of database tables between formats
Grant 10,726,040 - Kapoor , et al.
2020-07-28
Protection of sensitive data
Grant 10,691,476 - Kapoor , et al.
2020-06-23
Machine learning model for malware dynamic analysis
Grant 10,685,112 - Zhao , et al.
2020-06-16
Virtualized trusted storage
Grant 10,579,544 - Spurlock , et al.
2020-03-03
Anomaly Based Malware Detection
App 20200057854 - Wojnowicz; Michael ;   et al.
2020-02-20
Anomaly based malware detection
Grant 10,489,589 - Wojnowicz , et al. Nov
2019-11-26
Lossless Conversion Of Database Tables Between Formats
App 20190278862 - Kapoor; Aditya ;   et al.
2019-09-12
Machine Learning Model For Malware Dynamic Analysis
App 20190188381 - Zhao; Xuan ;   et al.
2019-06-20
Virtualized Trusted Storage
App 20190155752 - Spurlock; Joel R. ;   et al.
2019-05-23
Data verification using enclave attestation
Grant 10,176,344 - Smith , et al. J
2019-01-08
Virtualized trusted storage
Grant 10,162,767 - Spurlock , et al. Dec
2018-12-25
Method and system for sharepoint server 2013 backup and restore
Grant 10,127,118 - Chakraborty , et al. November 13, 2
2018-11-13
Machine Learning Model For Malware Dynamic Analysis
App 20180322287 - Zhao; Xuan ;   et al.
2018-11-08
Detection of malicious thread suspension
Grant 10,083,296 - Kapoor , et al. September 25, 2
2018-09-25
Anomaly Based Malware Detection
App 20180144131 - Wojnowicz; Michael ;   et al.
2018-05-24
Pairing Of External Device With Random User Action
App 20180113819 - Cochin; Cedric ;   et al.
2018-04-26
Data Verification Using Enclave Attestation
App 20180018476 - Smith; Ned ;   et al.
2018-01-18
Pairing of external device with random user action
Grant 9,852,086 - Cochin , et al. December 26, 2
2017-12-26
Data verification using enclave attestation
Grant 9,715,597 - Smith , et al. July 25, 2
2017-07-25
Detection of a malicious peripheral
Grant 9,712,545 - Edwards , et al. July 18, 2
2017-07-18
Outbreak pathology inference
Grant 9,679,140 - Smith , et al. June 13, 2
2017-06-13
Real-time module protection
Grant 9,565,214 - Kapoor , et al. February 7, 2
2017-02-07
Detection Of Malicious Thread Suspension
App 20160378979 - Kapoor; Aditya ;   et al.
2016-12-29
Protection Of Sensitive Data
App 20160379003 - Kapoor; Aditya ;   et al.
2016-12-29
Virtualized Trusted Storage
App 20160378685 - Spurlock; Joel R. ;   et al.
2016-12-29
Negative light-weight rules
Grant 9,384,349 - Kapoor , et al. July 5, 2
2016-07-05
Outbreak Pathology Inference
App 20160188880 - Smith; Ned M. ;   et al.
2016-06-30
Detection Of A Malicious Peripheral
App 20160182539 - Edwards; Jonathan L. ;   et al.
2016-06-23
Determining The Reputation Of A Digital Certificate
App 20160182492 - Bean; James ;   et al.
2016-06-23
Systems And Methods For Malware Detection And Remediation
App 20160180087 - Edwards; Jonathan L. ;   et al.
2016-06-23
Pairing Of External Device With Random User Action
App 20160179706 - Cochin; Cedric ;   et al.
2016-06-23
Real-Time Module Protection
App 20160182569 - Kapoor; Aditya ;   et al.
2016-06-23
Identifying rootkits based on access permissions
Grant 9,317,687 - Edwards , et al. April 19, 2
2016-04-19
Method and system for performing full backup in a failover cluster
Grant 9,311,330 - Chockalingam , et al. April 12, 2
2016-04-12
Data Verification Using Enclave Attestation
App 20160092700 - Smith; Ned ;   et al.
2016-03-31
Real-time module protection
Grant 9,275,223 - Kapoor , et al. March 1, 2
2016-03-01
Detecting failover in a database mirroring environment
Grant 9,268,659 - Kapoor , et al. February 23, 2
2016-02-23
Method and system for a database management system add-in for third party backup and restore applications
Grant 9,201,739 - Bagchi , et al. December 1, 2
2015-12-01
Identifying malicious threads
Grant 9,135,443 - Ramchetty , et al. September 15, 2
2015-09-15
Method and system for displaying configuration test results by leveraged data protection software
Grant 8,850,425 - Ambastha , et al. September 30, 2
2014-09-30
Real-Time Module Protection
App 20140115652 - Kapoor; Aditya ;   et al.
2014-04-24
Generic framework for application specific data exchange
Grant 8,660,989 - Dickgiesser , et al. February 25, 2
2014-02-25
Identifying Rootkits Based On Access Permissions
App 20130312095 - Edwards; Jonathan L. ;   et al.
2013-11-21
Realtime Kernel Object Table and Type Protection
App 20130312099 - Edwards; Jonathan L. ;   et al.
2013-11-21
Negative Light-weight Rules
App 20130312098 - Kapoor; Aditya ;   et al.
2013-11-21
System, Method, And Computer Program Product For Identifying Hidden Or Modified Data Objects
App 20130247182 - Levites; Seagen James ;   et al.
2013-09-19
Rootkit scanning system, method, and computer program product
Grant 8,370,941 - Pham , et al. February 5, 2
2013-02-05
System, method and computer program product for identifying functions in computer code that control a behavior thereof when executed
Grant 8,327,439 - Spurlock , et al. December 4, 2
2012-12-04
Restore optimization
Grant 8,315,986 - Kapoor , et al. November 20, 2
2012-11-20
Generic Framework For Application Specific Data Exchange
App 20120054153 - Dickgiesser; Klaus ;   et al.
2012-03-01
Identifying Malicious Threads
App 20110277033 - Ramchetty; Harinath Vishwanath ;   et al.
2011-11-10
System, Method And Computer Program Product For Identifying Functions In Computer Code That Control A Behavior Thereof When Executed
App 20110271346 - Spurlock; Joel Robert ;   et al.
2011-11-03
System, method and computer program product for identifying functions in computer code that control a behavior thereof when executed
Grant 8,001,595 - Spurlock , et al. August 16, 2
2011-08-16
Point-in-time database restore
Grant 7,822,717 - Kapoor , et al. October 26, 2
2010-10-26
Software configuration methods and common presentation layer
Grant 7,716,684 - Singhal , et al. May 11, 2
2010-05-11
Systems and methods for dynamic data backup
Grant 7,526,514 - Chai , et al. April 28, 2
2009-04-28
Systems and methods for restoring data
Grant 7,404,103 - Chai , et al. July 22, 2
2008-07-22
Point-in-time database restore
App 20070185922 - Kapoor; Aditya ;   et al.
2007-08-09
Systems and methods for restoring data
App 20070180289 - Chai; Mu ;   et al.
2007-08-02
User interface for piecemeal restore
App 20070168401 - Kapoor; Aditya ;   et al.
2007-07-19
Detecting failover in a database mirroring environment
App 20070156781 - Kapoor; Aditya ;   et al.
2007-07-05
Systems and methods for restoring data
Grant 7,210,060 - Chai , et al. April 24, 2
2007-04-24
Systems and methods for dynamic data backup
App 20060149797 - Chai; Mu ;   et al.
2006-07-06
Systems and methods for dynamic restorating data
App 20060149997 - Chai; Mu ;   et al.
2006-07-06
Software configuration methods and client module communication component
App 20060117309 - Singhal; Upanshu ;   et al.
2006-06-01
Software configuration methods and common presentation layer
App 20060112345 - Singhal; Upanshu ;   et al.
2006-05-25

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed