loadpatents
name:-0.014472007751465
name:-0.031419992446899
name:-0.0079619884490967
Kashyap; Anand Patent Filings

Kashyap; Anand

Patent Applications and Registrations

Patent applications and USPTO patent grants for Kashyap; Anand.The latest application filed is for "secure search service".

Company Profile
8.34.14
  • Kashyap; Anand - Los Altos CA
  • Kashyap; Anand - Pune IN
  • Kashyap; Anand - Mountain View CA
  • Kashyap; Anand - Maharashtra N/A IN
  • Kashyap; Anand - San Jose CA US
  • Kashyap; Anand - Stony Brook NY
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Secure service mesh
Grant 11,399,013 - Bandi , et al. July 26, 2
2022-07-26
Runtime encryption plugin for a key management system
Grant 11,349,822 - Kashyap , et al. May 31, 2
2022-05-31
Secure Search Service
App 20220060451 - Kashyap; Anand ;   et al.
2022-02-24
Obtaining quorum approval to perform an operation with a cryptographic item of a key management system
Grant 11,159,309 - Seyfried , et al. October 26, 2
2021-10-26
Secure Service Mesh
App 20210328971 - Bandi; Nehal ;   et al.
2021-10-21
Geo-fencing Of An Application For A Secure Cryptographic Environment
App 20210312016 - Kashyap; Anand ;   et al.
2021-10-07
Secure Computation Of Multiparty Data
App 20210273921 - Kumar; Ambuj ;   et al.
2021-09-02
Management of and persistent storage for nodes in a secure cluster
Grant 10,911,538 - Kumar , et al. February 2, 2
2021-02-02
Self-encrypting Key Management System
App 20200204530 - KUMAR; Ambuj ;   et al.
2020-06-25
Obtaining Quorum Approval To Perform An Operation With A Cryptographic Item Of A Key Management System
App 20200204357 - Seyfried; Jeffrey ;   et al.
2020-06-25
Secure key caching client
Grant 10,686,769 - Kashyap , et al.
2020-06-16
Self-encrypting key management system
Grant 10,609,006 - Kumar , et al.
2020-03-31
Runtime Encryption Plugin For A Key Management System
App 20190158474 - Kashyap; Anand ;   et al.
2019-05-23
Secure Key Caching Client
App 20190044929 - Kashyap; Anand ;   et al.
2019-02-07
Systems and methods for identifying non-malicious files on computing devices within organizations
Grant 10,169,584 - Roundy , et al. J
2019-01-01
Systems and methods for preventing targeted malware attacks
Grant 10,104,097 - Yumer , et al. October 16, 2
2018-10-16
Management Of And Persistent Storage For Nodes In A Secure Cluster
App 20180295115 - Kumar; Ambuj ;   et al.
2018-10-11
Systems and methods for determining the trustworthiness of files within organizations
Grant 10,055,586 - Roundy , et al. August 21, 2
2018-08-21
Self-encrypting Key Management System
App 20180205711 - KUMAR; Ambuj ;   et al.
2018-07-19
Practical and dynamic approach to enterprise hardening
Grant 10,025,937 - Kashyap , et al. July 17, 2
2018-07-17
Systems and methods for locating unrecognized computing devices
Grant 10,015,768 - Wang , et al. July 3, 2
2018-07-03
Wireless router configured to detect an intruder
Grant 9,972,177 - Kashyap , et al. May 15, 2
2018-05-15
Context aware intruder detection using WIFI MAC addresses
Grant 9,961,079 - Wang , et al. May 1, 2
2018-05-01
System and method of constructing dynamic namespaces in the internet of things
Grant 9,948,603 - Lee , et al. April 17, 2
2018-04-17
Systems and methods for dynamic access control over shared resources
Grant 9,807,094 - Liu , et al. October 31, 2
2017-10-31
Systems and methods for threat detection using a software program update profile
Grant 9,800,590 - Gates , et al. October 24, 2
2017-10-24
Systems and methods for creating security profiles
Grant 9,798,876 - Parker-Wood , et al. October 24, 2
2017-10-24
Using the home wireless router to detect an intruder not carrying any wireless device
Grant 9,786,138 - Kashyap , et al. October 10, 2
2017-10-10
Automatically learning signal strengths at places of interest for wireless signal strength based physical intruder detection
Grant 9,659,474 - Kashyap , et al. May 23, 2
2017-05-23
Systems and methods for detecting information leakage by an organizational insider
Grant 9,652,597 - Roundy , et al. May 16, 2
2017-05-16
Systems and methods for locating unrecognized computing devices
Grant 9,572,125 - Wang , et al. February 14, 2
2017-02-14
Leveraging neighbors' wireless access points in wireless-signal-variation-based physical intruder detection systems
Grant 9,378,634 - Kashyap , et al. June 28, 2
2016-06-28
Faceted application search
Grant 9,311,413 - Franklin , et al. April 12, 2
2016-04-12
Systems and methods for protecting organizations against spear phishing attacks
Grant 9,160,766 - Kashyap , et al. October 13, 2
2015-10-13
Systems And Methods For Protecting Organizations Against Spear Phishing Attacks
App 20150264084 - Kashyap; Anand ;   et al.
2015-09-17
Systems And Methods For Detecting Information Leakage By An Organizational Insider
App 20150261940 - Roundy; Kevin Alejandro ;   et al.
2015-09-17
Systems and methods for determining a rating for an item from user reviews
Grant 8,949,243 - Kashyap , et al. February 3, 2
2015-02-03
Techniques for identifying suspicious applications using requested permissions
Grant 8,769,676 - Kashyap July 1, 2
2014-07-01
Context sensitive power management for a resource
Grant 8,627,125 - Kashyap January 7, 2
2014-01-07
Systems and methods for diagnosing a network configuration of a computing device
Grant 8,543,861 - Sawhney , et al. September 24, 2
2013-09-24
Context Sensitive Power Management For A Resource
App 20120260112 - Kashyap; Anand
2012-10-11
Systems and methods for monitoring a mobile-computing device using geo-location information
Grant 8,111,154 - Puri , et al. February 7, 2
2012-02-07
Measurement Based Link Capacity for Multiple Interferers in an 802.11-Based Wireless Network
App 20090213740 - Ganguly; Samrat ;   et al.
2009-08-27

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed