loadpatents
name:-0.10645699501038
name:-0.089633941650391
name:-0.029074907302856
Nagaratnam; Nataraj Patent Filings

Nagaratnam; Nataraj

Patent Applications and Registrations

Patent applications and USPTO patent grants for Nagaratnam; Nataraj.The latest application filed is for "security compliance for a secure landing zone".

Company Profile
31.97.96
  • Nagaratnam; Nataraj - Cary NC
  • Nagaratnam; Nataraj - Morrisville NC
  • Nagaratnam; Nataraj - Durham NC US
  • Nagaratnam; Nataraj - Bangalore IN
  • Nagaratnam; Nataraj - Austin TX
  • Nagaratnam, Nataraj - Morrisvile CA
  • Nagaratnam; Nataraj - Syracuse NY
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Security Compliance For A Secure Landing Zone
App 20220300603 - Geiger; Adam Robert ;   et al.
2022-09-22
Optimized performance through leveraging appropriate disk sectors for defragmentation in an erasure coded heterogeneous object storage cloud
Grant 11,119,655 - Baldwin , et al. September 14, 2
2021-09-14
Leveraging social relationships to enhance computer security
Grant 11,095,654 - Nagaratnam , et al. August 17, 2
2021-08-17
Context aware recertification
Grant 11,082,414 - Dharmarajan , et al. August 3, 2
2021-08-03
Trusted statement verification for data privacy
Grant 10,984,457 - Byrd , et al. April 20, 2
2021-04-20
Key identifiers in an obliviousness pseudorandom function (OPRF)-based key management service (KMS)
Grant 10,887,293 - Resch , et al. January 5, 2
2021-01-05
Enhanced security using wearable device with authentication system
Grant 10,841,315 - Nagaratnam , et al. November 17, 2
2020-11-17
Dynamically defined virtual private network tunnels in hybrid cloud environments
Grant 10,834,100 - Hoy , et al. November 10, 2
2020-11-10
Secure trust based distribution of digital certificates
Grant 10,819,527 - Bojjireddy , et al. October 27, 2
2020-10-27
Secure trust based distribution of digital certificates
Grant 10,812,276 - Bojjireddy , et al. October 20, 2
2020-10-20
Facilitating build and deploy runtime memory encrypted cloud applications and containers
Grant 10,776,459 - Bojjireddy , et al. Sept
2020-09-15
High-efficiency deduplication module of a database-management system
Grant 10,754,835 - Dolph , et al. A
2020-08-25
Enforcing security policies for software containers
Grant 10,713,031 - Iyer , et al.
2020-07-14
Tier based data file management
Grant 10,671,285 - Dolph , et al.
2020-06-02
Application-based security rights in cloud environments
Grant 10,673,900 - Nagaratnam , et al.
2020-06-02
User state tracking and anomaly detection in software-as-a-service environments
Grant 10,673,885 - Muthukrishnan , et al.
2020-06-02
Augmenting gesture based security technology using mobile devices
Grant 10,628,682 - Hoy , et al.
2020-04-21
Cognitive psychology authentication in multi-factor authentication systems
Grant 10,587,423 - Nagaratnam , et al.
2020-03-10
Dynamically Defined Virtual Private Network Tunnels In Hybrid Cloud Environments
App 20200067877 - Hoy; Jeffrey R. ;   et al.
2020-02-27
Optimized performance through leveraging appropriate disk sectors for defragmentation in an erasure coded heterogeneous object storage cloud
Grant 10,528,261 - Baldwin , et al. J
2020-01-07
Context-driven on-device data protection
Grant 10,528,748 - Nagaratnam , et al. J
2020-01-07
Optimized Performance Through Leveraging Appropriate Disk Sectors For Defragmentation In An Erasure Coded Heterogeneous Object S
App 20190377499 - Baldwin; Duane ;   et al.
2019-12-12
Dynamically defined virtual private network tunnels in hybrid cloud environments
Grant 10,505,904 - Hoy , et al. Dec
2019-12-10
Secure Trust Based Distribution of Digital Certificates
App 20190372785 - Bojjireddy; Karunakar ;   et al.
2019-12-05
Key Identifiers In An Obliviousness Pseudorandom Function (oprf)-based Key Management Service (kms)
App 20190297064 - Resch; Jason K. ;   et al.
2019-09-26
Secure Trust Based Distribution Of Digital Certificates
App 20190268166 - Bojjireddy; Karunakar ;   et al.
2019-08-29
Leveraging Social Relationships to Enhance Computer Security
App 20190260756 - Nagaratnam; Nataraj ;   et al.
2019-08-22
Enhance computer security by utilizing an authorized user set
Grant 10,389,725 - Nagaratnam , et al. A
2019-08-20
Facilitating Build And Deploy Runtime Memory Encrypted Cloud Applications And Containers
App 20190180006 - Bojjireddy; Karunakar ;   et al.
2019-06-13
Optimized Performance Through Leveraging Appropriate Disk Sectors For Defragmentation In An Erasure Coded Heterogeneous Object S
App 20190171369 - Baldwin; Duane ;   et al.
2019-06-06
User state tracking and anomaly detection in software-as-a-service environments
App 20190173903 - Muthukrishnan; Ravi Krishnan ;   et al.
2019-06-06
Enhanced Security Using Wearable Device with Authentication System
App 20190166130 - Nagaratnam; Nataraj ;   et al.
2019-05-30
Cognitive Psychology Authentication In Multi-factor Authentication Systems
App 20190158477 - Nagaratnam; Nataraj ;   et al.
2019-05-23
Enforcing Security Policies For Software Containers
App 20190114161 - Iyer; Sreekanth R. ;   et al.
2019-04-18
Enforcing security policies for software containers
Grant 10,255,054 - Iyer , et al.
2019-04-09
Enhanced security using wearable device with authentication system
Grant 10,243,961 - Nagaratnam , et al.
2019-03-26
Secure application zones for cloud burst environments
Grant 10,244,002 - Hoy , et al.
2019-03-26
Using everyday objects as cryptographic keys
Grant 10,237,064 - Hoy , et al.
2019-03-19
Context-based cloud security assurance system
Grant 10,212,190 - Nagaratnam , et al. Feb
2019-02-19
Tier Based Data File Management
App 20190050150 - Dolph; Blaine H. ;   et al.
2019-02-14
Dynamically Defined Virtual Private Network Tunnels In Hybrid Cloud Environments
App 20190052601 - Hoy; Jeffrey R ;   et al.
2019-02-14
User state tracking and anomaly detection in software-as-a-service environments
Grant 10,200,387 - Muthukrishnan , et al. Fe
2019-02-05
Dynamically defined virtual private network tunnels in hybrid cloud environments
Grant 10,142,293 - Hoy , et al. Nov
2018-11-27
Tier based data file management
Grant 10,133,484 - Dolph , et al. November 20, 2
2018-11-20
Leveraging mobile devices to enforce restricted area security
Grant 10,028,139 - Iyer , et al. July 17, 2
2018-07-17
Secure application zones for cloud burst environments
App 20180124119 - Hoy; Jeffrey Robert ;   et al.
2018-05-03
Using everyday objects as cryptographic keys
App 20180109380 - Hoy; Jeffrey Robert ;   et al.
2018-04-19
Context-based cloud security assurance system
App 20180103067 - Nagaratnam; Nataraj ;   et al.
2018-04-12
Identity context-based access control
Grant 9,916,461 - Kapadia , et al. March 13, 2
2018-03-13
Using everyday objects as cryptographic keys
Grant 9,912,477 - Hoy , et al. March 6, 2
2018-03-06
Administration of a context-based cloud security assurance system
Grant 9,912,701 - Nagaratnam , et al. March 6, 2
2018-03-06
Tier Based Data File Management
App 20180059949 - Dolph; Blaine H. ;   et al.
2018-03-01
Enhanced Security Using Wearable Device with Authentication System
App 20180063149 - Nagaratnam; Nataraj ;   et al.
2018-03-01
Tier based data file management
Grant 9,891,830 - Dolph , et al. February 13, 2
2018-02-13
Secure application zones for cloud burst environments
Grant 9,888,040 - Hoy , et al. February 6, 2
2018-02-06
Application-based security rights in cloud environments
App 20180027022 - Nagaratnam; Nataraj ;   et al.
2018-01-25
Augmenting gesture based security technology for improved classification and learning
Grant 9,875,399 - Hoy , et al. January 23, 2
2018-01-23
Administration of a context-based cloud security assurance system
Grant 9,876,822 - Nagaratnam , et al. January 23, 2
2018-01-23
High-efficiency Deduplication Module Of A Database-management System
App 20180018354 - Dolph; Blaine H. ;   et al.
2018-01-18
Deployment using a context-based cloud security assurance system
Grant 9,871,822 - Nagaratnam , et al. January 16, 2
2018-01-16
Leveraging Social Relationships to Enhance Computer Security
App 20180007056 - Nagaratnam; Nataraj ;   et al.
2018-01-04
Using everyday objects as cryptographic keys
App 20170353307 - Hoy; Jeffrey Robert ;   et al.
2017-12-07
Context-based cloud security assurance system
Grant 9,838,431 - Nagaratnam , et al. December 5, 2
2017-12-05
Optimizing database deduplication
Grant 9,830,342 - Dolph , et al. November 28, 2
2017-11-28
Augmenting Gesture Based Security Technology For Improved Classification And Learning
App 20170316259 - Hoy; Jeffrey Robert ;   et al.
2017-11-02
Augmenting Gesture Based Security Technology Using Mobile Devices
App 20170316260 - Hoy; Jeffrey Robert ;   et al.
2017-11-02
Augmenting Gesture Based Security Technology For Improved Differentiation
App 20170316258 - Hoy; Jeffrey Robert ;   et al.
2017-11-02
Context-Driven On-Device Data Protection
App 20170308713 - Nagaratnam; Nataraj ;   et al.
2017-10-26
Enforcing Security Policies For Software Containers
App 20170300697 - Iyer; Sreekanth R. ;   et al.
2017-10-19
Managing service access through social context
Grant 9,792,293 - Cherian , et al. October 17, 2
2017-10-17
Context aware data protection
Grant 9,767,301 - Jandhyala , et al. September 19, 2
2017-09-19
Application-based security rights in cloud environments
Grant 9,762,616 - Nagaratnam , et al. September 12, 2
2017-09-12
Leveraging mobile devices to enforce restricted area security
Grant 9,756,173 - Iyer , et al. September 5, 2
2017-09-05
Manufacturing and distribution to avoid counterfeit products
Grant 9,727,899 - Kesavan , et al. August 8, 2
2017-08-08
Mitigating distribution and consumption of counterfeit products
Grant 9,727,902 - Kesavan , et al. August 8, 2
2017-08-08
Using everyday objects as cryptographic keys
Grant 9,729,318 - Hoy , et al. August 8, 2
2017-08-08
Tier Based Data File Management
App 20170206014 - Dolph; Blaine H. ;   et al.
2017-07-20
Pre and post purchase identification of counterfeit products
Grant 9,710,834 - Kesavan , et al. July 18, 2
2017-07-18
Context Aware Recertification
App 20170201505 - Dharmarajan; Manjeri R. ;   et al.
2017-07-13
Cost-based configuration using a context-based cloud security assurance system
Grant 9,699,213 - Nagaratnam , et al. July 4, 2
2017-07-04
Dynamically Defined Virtual Private Network Tunnels In Hybrid Cloud Environments
App 20170171158 - Hoy; Jeffrey Robert ;   et al.
2017-06-15
User state tracking and anomaly detection in software-as-a-service environments
App 20170155672 - Muthukrishnan; Ravi Krishnan ;   et al.
2017-06-01
Controlling enterprise data on mobile device via the use of a tag index
Grant 9,665,576 - Kapoor , et al. May 30, 2
2017-05-30
Controlling enterprise data on mobile device via the use of a tag index
Grant 9,665,577 - Kapoor , et al. May 30, 2
2017-05-30
Tier based data file management
Grant 9,658,781 - Dolph , et al. May 23, 2
2017-05-23
Mobile-optimized Captcha System Based On Multi-modal Gesture Challenge And Mobile Orientation
App 20170104740 - Hoy; Jeffrey R. ;   et al.
2017-04-13
System and method for software defined deployment of security appliances using policy templates
Grant 9,621,592 - Ashley , et al. April 11, 2
2017-04-11
Using everyday objects as cryptographic keys
App 20170099140 - Hoy; Jeffrey Robert ;   et al.
2017-04-06
System and method for software defined deployment of security appliances using policy templates
Grant 9,609,023 - Ashley , et al. March 28, 2
2017-03-28
Context aware recertification
Grant 9,607,142 - Dharmarajan , et al. March 28, 2
2017-03-28
Application self-service for assured log management in cloud environments
Grant 9,578,063 - Iyer , et al. February 21, 2
2017-02-21
Dynamically defined virtual private network tunnels in hybrid cloud environments
Grant 9,571,457 - Hoy , et al. February 14, 2
2017-02-14
Application-based security rights in cloud environments
App 20170041347 - Nagaratnam; Nataraj ;   et al.
2017-02-09
Secure application zones for cloud burst environments
App 20170013021 - Hoy; Jeffrey Robert ;   et al.
2017-01-12
Leveraging mobile devices to enforce restricted area security
App 20160286394 - Iyer; Sreekanth Ramakrishna ;   et al.
2016-09-29
Leveraging mobile devices to enforce restricted area security
App 20160286034 - Iyer; Sreekanth Ramakrishna ;   et al.
2016-09-29
Providing context-based visibility of cloud resources in a multi-tenant environment
Grant 9,444,820 - Muppidi , et al. September 13, 2
2016-09-13
Providing context-based visibility of cloud resources in a multi-tenant environment
Grant 9,444,819 - Muppidi , et al. September 13, 2
2016-09-13
Automatic reconfiguration of network parameters during file system failover
Grant 9,426,023 - Chennamsetty , et al. August 23, 2
2016-08-23
System And Method For Software Defined Deployment Of Security Appliances Using Policy Templates
App 20160234224 - ASHLEY; Paul Anthony ;   et al.
2016-08-11
System And Method For Software Defined Deployment Of Security Appliances Using Policy Templates
App 20160234250 - ASHLEY; Paul Anthony ;   et al.
2016-08-11
Administration of a context-based cloud security assurance system
App 20160212175 - Nagaratnam; Nataraj ;   et al.
2016-07-21
Techniques for information protection in a solid-state device based storage pool
Grant 9,389,950 - Chennamsetty , et al. July 12, 2
2016-07-12
Cost-based configuration using a context-based cloud security assurance system
App 20160156663 - Nagaratnam; Nataraj ;   et al.
2016-06-02
Deployment using a context-based cloud security assurance system
App 20160156662 - Nagaratnam; Nataraj ;   et al.
2016-06-02
Administration of a context-based cloud security assurance system
App 20160156664 - Nagaratnam; Nataraj ;   et al.
2016-06-02
Context-based cloud security assurance system
App 20160156661 - Nagaratnam; Nataraj ;   et al.
2016-06-02
Optimizing Database Deduplication
App 20160147797 - Dolph; Blaine H. ;   et al.
2016-05-26
Tier Based Data File Management
App 20160139821 - Dolph; Blaine H. ;   et al.
2016-05-19
Techniques For Information Protection In A Solid-state Device Based Storage Pool
App 20160139981 - CHENNAMSETTY; RAMAMOHAN ;   et al.
2016-05-19
Dynamic Password-less User Verification
App 20160142909 - Allen; Corville O. ;   et al.
2016-05-19
Dynamic password-less user verification
Grant 9,338,652 - Allen , et al. May 10, 2
2016-05-10
Declarative instance based access control for application resources with persisted attributes and state
Grant 9,292,305 - Poddar , et al. March 22, 2
2016-03-22
Automatic Reconfiguration Of Network Parameters During File System Failover
App 20160043894 - Chennamsetty; Ramamohan ;   et al.
2016-02-11
Database authorization rules and component logic authorization rules aggregation
Grant 9,160,752 - Goldszmidt , et al. October 13, 2
2015-10-13
Managing Service Access Through Social Context
App 20150254269 - Cherian; Alex ;   et al.
2015-09-10
Providing context-based visibility of cloud resources in a multi-tenant environment
App 20150200958 - Muppidi; Sridhar R. ;   et al.
2015-07-16
Providing context-based visibility of cloud resources in a multi-tenant environment
App 20150200941 - Muppidi; Sridhar R. ;   et al.
2015-07-16
Security management for an integrated console for applications associated with multiple user registries
Grant 8,745,387 - Choudhary , et al. June 3, 2
2014-06-03
Federating policies from multiple policy providers
Grant 8,683,545 - Nadalin , et al. March 25, 2
2014-03-25
Identity context-based access control
App 20140075492 - Kapadia; Kaushal Kiran ;   et al.
2014-03-13
Controlling Enterprise Data On Mobile Device Via The Use Of A Tag Index
App 20130305058 - Kapoor; Shalini ;   et al.
2013-11-14
Controlling Enterprise Data On Mobile Device Via The Use Of A Tag Index
App 20130304702 - Kapoor; Shalini ;   et al.
2013-11-14
Information processing apparatus, a server apparatus, a method of an information processing apparatus, a method of a server apparatus, and an apparatus executable program
Grant 8,560,857 - Munetoh , et al. October 15, 2
2013-10-15
Context Aware Recertification
App 20130067538 - Dharmarajan; Manjeri R. ;   et al.
2013-03-14
Type independent permission based access control
Grant 8,387,111 - Koved , et al. February 26, 2
2013-02-26
Trust and identity in secure calendar sharing collaboration
Grant 8,261,329 - Gurney , et al. September 4, 2
2012-09-04
Security management for an integrated console for applications associated with multiple user registries
Grant 8,261,331 - Choudhary , et al. September 4, 2
2012-09-04
Security Management For An Integrated Console For Applications Associated With Multiple User Registries
App 20120210419 - CHOUDHARY; SAMAR ;   et al.
2012-08-16
Information Processing Apparatus, A Server Apparatus, A Method Of An Information Processing Apparatus, A Method Of A Server Apparatus, And An Apparatus Executable Program
App 20120185694 - MUNETOH; SEIJI ;   et al.
2012-07-19
Context Aware Data Protection
App 20120185952 - Jandhyala; Srinivas ;   et al.
2012-07-19
Information processing apparatus, a server apparatus, a method of an information processing apparatus, a method of a server apparatus, and an apparatus executable process
Grant 8,171,295 - Munetoh , et al. May 1, 2
2012-05-01
Classification and policy management for software components
Grant 8,112,370 - Muppidi , et al. February 7, 2
2012-02-07
Pre And Post Purchase Identification Of Counterfeit Products
App 20110302095 - Kesavan; Sanjay Mecheri ;   et al.
2011-12-08
Mitigating Distribution And Consumption Of Counterfeit Products
App 20110302093 - Kesavan; Sanjay Mecheri ;   et al.
2011-12-08
Manufacturing And Distribution To Avoid Counterfeit Products
App 20110302094 - Kesavan; Sanjay Mecheri ;   et al.
2011-12-08
Context Aware Data Protection
App 20110296430 - Jandhyala; Srinivas ;   et al.
2011-12-01
Discovery And Management Of Context-based Entitlements Across Loosely-coupled Environments
App 20110162034 - NAGARATNAM; NATARAJ ;   et al.
2011-06-30
Trust And Identity In Secure Calendar Sharing Collaboration
App 20100306824 - Gurney; Daniel C. ;   et al.
2010-12-02
Classification And Policy Management For Software Components
App 20100076914 - Muppidi; Sridhar R. ;   et al.
2010-03-25
Role-based access control management for multiple heterogeneous application components
Grant 7,676,831 - Britton , et al. March 9, 2
2010-03-09
Federating Policies From Multiple Policy Providers
App 20100043050 - Nadalin; Anthony J. ;   et al.
2010-02-18
Method and system for implementing authorization policies for web services
Grant 7,657,924 - Hondo , et al. February 2, 2
2010-02-02
Declarative Instance Based Access Control For Application Resources With Persisted Attributes And State
App 20090183184 - Nadalin; Anthony J. ;   et al.
2009-07-16
Identity Data Model Broker
App 20090171989 - Byrd; Gregory T. ;   et al.
2009-07-02
Database Authorization Rules And Component Logic Authorization Rules Aggregation
App 20090064272 - Goldszmidt; German S. ;   et al.
2009-03-05
Trusted Statement Verification For Data Privacy
App 20090063289 - Byrd; Gregory T. ;   et al.
2009-03-05
Pluggable trust adapter architecture, method and program product for processing communications
Grant 7,475,239 - Fulkerson, Jr. , et al. January 6, 2
2009-01-06
Role-based Authorization Using Conditional Permissions
App 20080168528 - Lin; Dah-Haur ;   et al.
2008-07-10
Method and system for variable scale time management for simulation environments
App 20080154559 - Ram; Chethan ;   et al.
2008-06-26
Method, System, And Program Product For Controlling Access To Personal Attributes Across Enterprise Domains
App 20080027939 - Chalasani; Nanchariah R. ;   et al.
2008-01-31
Method, apparatus, and program for automated trust zone partitioning
Grant 7,272,714 - Nagaratnam , et al. September 18, 2
2007-09-18
Security management for an integrated console for applications associated with multiple user registries
App 20070180498 - Choudhary; Samar ;   et al.
2007-08-02
Role-based access control management for multiple heterogeneous application components
App 20070056026 - Britton; Kathryn H. ;   et al.
2007-03-08
Secure data communications in web services
App 20060294383 - Austel; Paula ;   et al.
2006-12-28
Role-permission model for security policy administration and enforcement
Grant 7,124,192 - High, Jr. , et al. October 17, 2
2006-10-17
Method And System For Implementing Authorization Policies For Web Services
App 20060230430 - Hondo; Maryann ;   et al.
2006-10-12
Securing non-EJB corba objects using an EJB security mechanism
Grant 7,076,798 - Chang , et al. July 11, 2
2006-07-11
Securing cached data in enterprise environments
Grant 7,051,201 - Cuomo , et al. May 23, 2
2006-05-23
Method and apparatus for securing session information of users in a web application server environment
Grant 7,043,455 - Cuomo , et al. May 9, 2
2006-05-09
Method and apparatus for processing requests in a network data processing system based on a trust association between servers
Grant 6,965,939 - Cuomo , et al. November 15, 2
2005-11-15
Declarative trust model between reverse proxy server and websphere application server
App 20050154886 - Birk, Peter Daniel ;   et al.
2005-07-14
Information processing apparatus, a server apparatus, a method of an information processing apparatus, a method of a server apparatus, and an apparatus executable process
App 20050120219 - Munetoh, Seiji ;   et al.
2005-06-02
Security context maintenance within a distributed environment
App 20040250125 - Janson, Philippe A. ;   et al.
2004-12-09
Pluggable trust adapter architecture, method and program product for processing communications
App 20040059931 - Fulkerson, Carroll Eugene JR. ;   et al.
2004-03-25
Method, apparatus, and program for automated trust zone partitioning
App 20030233543 - Nagaratnam, Nataraj ;   et al.
2003-12-18
Securing cached data in enterprise environments
App 20030177386 - Cuomo, Gennaro A. ;   et al.
2003-09-18
Securing non-EJB corba objects using an EJB security mechanism
App 20030149893 - Chang, David Yu ;   et al.
2003-08-07
Method and apparatus for implementing permission based access control through permission type inheritance
App 20030084325 - Koved, Lawrence ;   et al.
2003-05-01
Method and apparatus for type independent permission based access control
App 20030084324 - Koved, Lawrence ;   et al.
2003-05-01
Role-permission model for security policy administration and enforcement
App 20030046576 - High, Robert Howard JR. ;   et al.
2003-03-06
Method and apparatus for enforcing security policies in Java applications
App 20030018909 - Cuomo, Gennaro A. ;   et al.
2003-01-23
Method and apparatus for processing requests in a network data processing system based on a trust association between servers
App 20020091757 - Cuomo, Gennaro A. ;   et al.
2002-07-11
Method and apparatus for controlling software access to system resources
Grant 6,317,742 - Nagaratnam , et al. November 13, 2
2001-11-13

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed