loadpatents
Patent applications and USPTO patent grants for Kapoor; Aditya.The latest application filed is for "machine learning model for malware dynamic analysis".
Patent | Date |
---|---|
Anomaly based malware detection Grant 11,210,394 - Wojnowicz , et al. December 28, 2 | 2021-12-28 |
Determining the reputation of a digital certificate Grant 11,032,266 - Bean , et al. June 8, 2 | 2021-06-08 |
Machine Learning Model for Malware Dynamic Analysis App 20200265139 - Zhao; Xuan ;   et al. | 2020-08-20 |
Lossless conversion of database tables between formats Grant 10,726,040 - Kapoor , et al. | 2020-07-28 |
Protection of sensitive data Grant 10,691,476 - Kapoor , et al. | 2020-06-23 |
Machine learning model for malware dynamic analysis Grant 10,685,112 - Zhao , et al. | 2020-06-16 |
Virtualized trusted storage Grant 10,579,544 - Spurlock , et al. | 2020-03-03 |
Anomaly Based Malware Detection App 20200057854 - Wojnowicz; Michael ;   et al. | 2020-02-20 |
Anomaly based malware detection Grant 10,489,589 - Wojnowicz , et al. Nov | 2019-11-26 |
Lossless Conversion Of Database Tables Between Formats App 20190278862 - Kapoor; Aditya ;   et al. | 2019-09-12 |
Machine Learning Model For Malware Dynamic Analysis App 20190188381 - Zhao; Xuan ;   et al. | 2019-06-20 |
Virtualized Trusted Storage App 20190155752 - Spurlock; Joel R. ;   et al. | 2019-05-23 |
Data verification using enclave attestation Grant 10,176,344 - Smith , et al. J | 2019-01-08 |
Virtualized trusted storage Grant 10,162,767 - Spurlock , et al. Dec | 2018-12-25 |
Method and system for sharepoint server 2013 backup and restore Grant 10,127,118 - Chakraborty , et al. November 13, 2 | 2018-11-13 |
Machine Learning Model For Malware Dynamic Analysis App 20180322287 - Zhao; Xuan ;   et al. | 2018-11-08 |
Detection of malicious thread suspension Grant 10,083,296 - Kapoor , et al. September 25, 2 | 2018-09-25 |
Anomaly Based Malware Detection App 20180144131 - Wojnowicz; Michael ;   et al. | 2018-05-24 |
Pairing Of External Device With Random User Action App 20180113819 - Cochin; Cedric ;   et al. | 2018-04-26 |
Data Verification Using Enclave Attestation App 20180018476 - Smith; Ned ;   et al. | 2018-01-18 |
Pairing of external device with random user action Grant 9,852,086 - Cochin , et al. December 26, 2 | 2017-12-26 |
Data verification using enclave attestation Grant 9,715,597 - Smith , et al. July 25, 2 | 2017-07-25 |
Detection of a malicious peripheral Grant 9,712,545 - Edwards , et al. July 18, 2 | 2017-07-18 |
Outbreak pathology inference Grant 9,679,140 - Smith , et al. June 13, 2 | 2017-06-13 |
Real-time module protection Grant 9,565,214 - Kapoor , et al. February 7, 2 | 2017-02-07 |
Detection Of Malicious Thread Suspension App 20160378979 - Kapoor; Aditya ;   et al. | 2016-12-29 |
Protection Of Sensitive Data App 20160379003 - Kapoor; Aditya ;   et al. | 2016-12-29 |
Virtualized Trusted Storage App 20160378685 - Spurlock; Joel R. ;   et al. | 2016-12-29 |
Negative light-weight rules Grant 9,384,349 - Kapoor , et al. July 5, 2 | 2016-07-05 |
Outbreak Pathology Inference App 20160188880 - Smith; Ned M. ;   et al. | 2016-06-30 |
Detection Of A Malicious Peripheral App 20160182539 - Edwards; Jonathan L. ;   et al. | 2016-06-23 |
Determining The Reputation Of A Digital Certificate App 20160182492 - Bean; James ;   et al. | 2016-06-23 |
Systems And Methods For Malware Detection And Remediation App 20160180087 - Edwards; Jonathan L. ;   et al. | 2016-06-23 |
Pairing Of External Device With Random User Action App 20160179706 - Cochin; Cedric ;   et al. | 2016-06-23 |
Real-Time Module Protection App 20160182569 - Kapoor; Aditya ;   et al. | 2016-06-23 |
Identifying rootkits based on access permissions Grant 9,317,687 - Edwards , et al. April 19, 2 | 2016-04-19 |
Method and system for performing full backup in a failover cluster Grant 9,311,330 - Chockalingam , et al. April 12, 2 | 2016-04-12 |
Data Verification Using Enclave Attestation App 20160092700 - Smith; Ned ;   et al. | 2016-03-31 |
Real-time module protection Grant 9,275,223 - Kapoor , et al. March 1, 2 | 2016-03-01 |
Detecting failover in a database mirroring environment Grant 9,268,659 - Kapoor , et al. February 23, 2 | 2016-02-23 |
Method and system for a database management system add-in for third party backup and restore applications Grant 9,201,739 - Bagchi , et al. December 1, 2 | 2015-12-01 |
Identifying malicious threads Grant 9,135,443 - Ramchetty , et al. September 15, 2 | 2015-09-15 |
Method and system for displaying configuration test results by leveraged data protection software Grant 8,850,425 - Ambastha , et al. September 30, 2 | 2014-09-30 |
Real-Time Module Protection App 20140115652 - Kapoor; Aditya ;   et al. | 2014-04-24 |
Generic framework for application specific data exchange Grant 8,660,989 - Dickgiesser , et al. February 25, 2 | 2014-02-25 |
Identifying Rootkits Based On Access Permissions App 20130312095 - Edwards; Jonathan L. ;   et al. | 2013-11-21 |
Realtime Kernel Object Table and Type Protection App 20130312099 - Edwards; Jonathan L. ;   et al. | 2013-11-21 |
Negative Light-weight Rules App 20130312098 - Kapoor; Aditya ;   et al. | 2013-11-21 |
System, Method, And Computer Program Product For Identifying Hidden Or Modified Data Objects App 20130247182 - Levites; Seagen James ;   et al. | 2013-09-19 |
Rootkit scanning system, method, and computer program product Grant 8,370,941 - Pham , et al. February 5, 2 | 2013-02-05 |
System, method and computer program product for identifying functions in computer code that control a behavior thereof when executed Grant 8,327,439 - Spurlock , et al. December 4, 2 | 2012-12-04 |
Restore optimization Grant 8,315,986 - Kapoor , et al. November 20, 2 | 2012-11-20 |
Generic Framework For Application Specific Data Exchange App 20120054153 - Dickgiesser; Klaus ;   et al. | 2012-03-01 |
Identifying Malicious Threads App 20110277033 - Ramchetty; Harinath Vishwanath ;   et al. | 2011-11-10 |
System, Method And Computer Program Product For Identifying Functions In Computer Code That Control A Behavior Thereof When Executed App 20110271346 - Spurlock; Joel Robert ;   et al. | 2011-11-03 |
System, method and computer program product for identifying functions in computer code that control a behavior thereof when executed Grant 8,001,595 - Spurlock , et al. August 16, 2 | 2011-08-16 |
Point-in-time database restore Grant 7,822,717 - Kapoor , et al. October 26, 2 | 2010-10-26 |
Software configuration methods and common presentation layer Grant 7,716,684 - Singhal , et al. May 11, 2 | 2010-05-11 |
Systems and methods for dynamic data backup Grant 7,526,514 - Chai , et al. April 28, 2 | 2009-04-28 |
Systems and methods for restoring data Grant 7,404,103 - Chai , et al. July 22, 2 | 2008-07-22 |
Point-in-time database restore App 20070185922 - Kapoor; Aditya ;   et al. | 2007-08-09 |
Systems and methods for restoring data App 20070180289 - Chai; Mu ;   et al. | 2007-08-02 |
User interface for piecemeal restore App 20070168401 - Kapoor; Aditya ;   et al. | 2007-07-19 |
Detecting failover in a database mirroring environment App 20070156781 - Kapoor; Aditya ;   et al. | 2007-07-05 |
Systems and methods for restoring data Grant 7,210,060 - Chai , et al. April 24, 2 | 2007-04-24 |
Systems and methods for dynamic data backup App 20060149797 - Chai; Mu ;   et al. | 2006-07-06 |
Systems and methods for dynamic restorating data App 20060149997 - Chai; Mu ;   et al. | 2006-07-06 |
Software configuration methods and client module communication component App 20060117309 - Singhal; Upanshu ;   et al. | 2006-06-01 |
Software configuration methods and common presentation layer App 20060112345 - Singhal; Upanshu ;   et al. | 2006-05-25 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.