loadpatents
name:-0.026974201202393
name:-0.028868913650513
name:-0.026731014251709
Muthukrishnan; Ravi Krishnan Patent Filings

Muthukrishnan; Ravi Krishnan

Patent Applications and Registrations

Patent applications and USPTO patent grants for Muthukrishnan; Ravi Krishnan.The latest application filed is for "system, method, and computer program product for validating software agents in robotic process automation systems".

Company Profile
11.18.22
  • Muthukrishnan; Ravi Krishnan - Austin TX
  • Muthukrishnan; Ravi Krishnan - Bangalore IN
  • Muthukrishnan; Ravi Krishnan - Durham NC
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
System, Method, and Computer Program Product for Validating Software Agents in Robotic Process Automation Systems
App 20220085980 - Muthukrishnan; Ravi Krishnan
2022-03-17
System And Method For Protecting Location Data
App 20210397723 - Gryb; Oleg ;   et al.
2021-12-23
System and method for protecting location data
Grant 11,138,321 - Gryb , et al. October 5, 2
2021-10-05
Method, System, and Computer Program Product for Detecting Fraudulent Activity
App 20210019754 - Muthukrishnan; Ravi Krishnan
2021-01-21
System And Method For Protecting Location Data
App 20200410113 - Gryb; Oleg ;   et al.
2020-12-31
Video matrix barcode system
Grant 10,770,114 - Shah , et al. Sep
2020-09-08
User state tracking and anomaly detection in software-as-a-service environments
Grant 10,673,885 - Muthukrishnan , et al.
2020-06-02
Application-based security rights in cloud environments
Grant 10,673,900 - Nagaratnam , et al.
2020-06-02
Video Matrix Barcode System
App 20200168253 - Shah; Nishit ;   et al.
2020-05-28
Augmenting gesture based security technology using mobile devices
Grant 10,628,682 - Hoy , et al.
2020-04-21
System And Method For Fraud Risk Analysis In Iot
App 20190364426 - Muthukrishnan; Ravi Krishnan ;   et al.
2019-11-28
User state tracking and anomaly detection in software-as-a-service environments
App 20190173903 - Muthukrishnan; Ravi Krishnan ;   et al.
2019-06-06
Secure application zones for cloud burst environments
Grant 10,244,002 - Hoy , et al.
2019-03-26
Using everyday objects as cryptographic keys
Grant 10,237,064 - Hoy , et al.
2019-03-19
User state tracking and anomaly detection in software-as-a-service environments
Grant 10,200,387 - Muthukrishnan , et al. Fe
2019-02-05
Dynamically defined virtual private network tunnels in hybrid cloud environments
Grant 10,142,293 - Hoy , et al. Nov
2018-11-27
Leveraging mobile devices to enforce restricted area security
Grant 10,028,139 - Iyer , et al. July 17, 2
2018-07-17
Secure application zones for cloud burst environments
App 20180124119 - Hoy; Jeffrey Robert ;   et al.
2018-05-03
Using everyday objects as cryptographic keys
App 20180109380 - Hoy; Jeffrey Robert ;   et al.
2018-04-19
Using everyday objects as cryptographic keys
Grant 9,912,477 - Hoy , et al. March 6, 2
2018-03-06
Secure application zones for cloud burst environments
Grant 9,888,040 - Hoy , et al. February 6, 2
2018-02-06
Application-based security rights in cloud environments
App 20180027022 - Nagaratnam; Nataraj ;   et al.
2018-01-25
Augmenting gesture based security technology for improved classification and learning
Grant 9,875,399 - Hoy , et al. January 23, 2
2018-01-23
Using everyday objects as cryptographic keys
App 20170353307 - Hoy; Jeffrey Robert ;   et al.
2017-12-07
Augmenting Gesture Based Security Technology For Improved Classification And Learning
App 20170316259 - Hoy; Jeffrey Robert ;   et al.
2017-11-02
Augmenting Gesture Based Security Technology Using Mobile Devices
App 20170316260 - Hoy; Jeffrey Robert ;   et al.
2017-11-02
Augmenting Gesture Based Security Technology For Improved Differentiation
App 20170316258 - Hoy; Jeffrey Robert ;   et al.
2017-11-02
Application-based security rights in cloud environments
Grant 9,762,616 - Nagaratnam , et al. September 12, 2
2017-09-12
Leveraging mobile devices to enforce restricted area security
Grant 9,756,173 - Iyer , et al. September 5, 2
2017-09-05
Using everyday objects as cryptographic keys
Grant 9,729,318 - Hoy , et al. August 8, 2
2017-08-08
Dynamically Defined Virtual Private Network Tunnels In Hybrid Cloud Environments
App 20170171158 - Hoy; Jeffrey Robert ;   et al.
2017-06-15
User state tracking and anomaly detection in software-as-a-service environments
App 20170155672 - Muthukrishnan; Ravi Krishnan ;   et al.
2017-06-01
Mobile-optimized Captcha System Based On Multi-modal Gesture Challenge And Mobile Orientation
App 20170104740 - Hoy; Jeffrey R. ;   et al.
2017-04-13
Using everyday objects as cryptographic keys
App 20170099140 - Hoy; Jeffrey Robert ;   et al.
2017-04-06
Application self-service for assured log management in cloud environments
Grant 9,578,063 - Iyer , et al. February 21, 2
2017-02-21
Dynamically defined virtual private network tunnels in hybrid cloud environments
Grant 9,571,457 - Hoy , et al. February 14, 2
2017-02-14
Application-based security rights in cloud environments
App 20170041347 - Nagaratnam; Nataraj ;   et al.
2017-02-09
Secure application zones for cloud burst environments
App 20170013021 - Hoy; Jeffrey Robert ;   et al.
2017-01-12
Leveraging mobile devices to enforce restricted area security
App 20160286394 - Iyer; Sreekanth Ramakrishna ;   et al.
2016-09-29
Leveraging mobile devices to enforce restricted area security
App 20160286034 - Iyer; Sreekanth Ramakrishna ;   et al.
2016-09-29

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed