loadpatents
name:-0.19111895561218
name:-0.042373895645142
name:-0.0036089420318604
Swaminathan; Ram Patent Filings

Swaminathan; Ram

Patent Applications and Registrations

Patent applications and USPTO patent grants for Swaminathan; Ram.The latest application filed is for "determining cache value currency using persistent markers".

Company Profile
2.49.47
  • Swaminathan; Ram - Cupertino CA
  • Swaminathan; Ram - Palo Alto CA
  • Swaminathan; Ram - New Providence NJ
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Metadata tree with key rotation information
Grant 11,373,736 - Li , et al. June 28, 2
2022-06-28
Determining cache value currency using persistent markers
Grant 10,489,310 - Keeton , et al. Nov
2019-11-26
Determining Cache Value Currency Using Persistent Markers
App 20190121750 - Keeton; Kimberly ;   et al.
2019-04-25
Validating a metadata tree using a metadata integrity validator
Grant 10,025,903 - Li , et al. July 17, 2
2018-07-17
Encrypted data store for records
Grant 9,940,469 - Li , et al. April 10, 2
2018-04-10
Composition of Services
App 20150312107 - Wang; Yin ;   et al.
2015-10-29
Encryption key management using distributed storage of encryption-key fragments
Grant 9,165,158 - Li , et al. October 20, 2
2015-10-20
Metadata Tree With Key Rotation Information
App 20150278450 - Li; Jun ;   et al.
2015-10-01
Electronic Health Record System With Customizable Compliance Policies
App 20150242570 - Li; Jun ;   et al.
2015-08-27
Validating A Metadata Tree Using A Metadata Integrity Validator
App 20150242641 - Li; Jun ;   et al.
2015-08-27
Encrypted Data Store For Records
App 20150220746 - Li; Jun ;   et al.
2015-08-06
Metadata Tree Of A Patient With Lockboxes
App 20150213570 - Li; Jun ;   et al.
2015-07-30
Composition of services
Grant 9,009,281 - Wang , et al. April 14, 2
2015-04-14
Protocol virtualization for a network file system
Grant 8,990,270 - Uysal , et al. March 24, 2
2015-03-24
Encryption key storage with key fragment stores
Grant 8,917,872 - Li , et al. December 23, 2
2014-12-23
Encryption key fragment distribution
Grant 8,538,029 - Li , et al. September 17, 2
2013-09-17
System for and method of writing and reading redundant data
Grant 8,533,478 - Aguilera , et al. September 10, 2
2013-09-10
Determining a metric region in a wireless network
Grant 8,514,776 - Robinson , et al. August 20, 2
2013-08-20
Encryption Key Management
App 20130177157 - Li; Jun ;   et al.
2013-07-11
Method for constructing a histogram
Grant 8,458,547 - Viswanathan , et al. June 4, 2
2013-06-04
Providing Goods Or Services
App 20130111430 - Wang; Yin ;   et al.
2013-05-02
Auditing data integrity
Grant 8,392,708 - Shah , et al. March 5, 2
2013-03-05
System for controlling power consumption of a network
Grant 8,392,737 - Sharma , et al. March 5, 2
2013-03-05
Encryption Key Storage
App 20130010966 - Li; Jun ;   et al.
2013-01-10
Composition Of Services
App 20130007242 - Wang; Yin ;   et al.
2013-01-03
Auditor assisted extraction and verification of client data returned from a storage provided while hiding client data from the auditor
Grant 8,281,151 - Shah , et al. October 2, 2
2012-10-02
Encryption Key Fragment Distribution
App 20120243687 - Li; Jun ;   et al.
2012-09-27
Selecting erasure codes for a fault tolerant system
Grant 8,250,427 - Wylie , et al. August 21, 2
2012-08-21
Selecting wireless mesh node locations
Grant 8,228,912 - Robinson , et al. July 24, 2
2012-07-24
Method For Constructing A Histogram
App 20120102377 - Viswanathan; Krishnamurthy ;   et al.
2012-04-26
System and method for determining the fault-tolerance of an erasure code
Grant 8,127,212 - Wylie , et al. February 28, 2
2012-02-28
Location determination for placing a new capacity point in a wireless network
Grant 8,094,582 - Robinson , et al. January 10, 2
2012-01-10
Method of forming virtual computer cluster within shared computing environment
Grant 8,095,928 - Kallahalla , et al. January 10, 2
2012-01-10
Wavelet Compression With Bootstrap Sampling
App 20110184934 - LAKSHMINARAYAN; Choudur ;   et al.
2011-07-28
Generation Of A Representative Data String
App 20110119284 - Viswanathan; Krishnamurthy ;   et al.
2011-05-19
Data Retention Management
App 20110055559 - Li; Jun ;   et al.
2011-03-03
System For Controlling Power Consumption Of A Network
App 20110055611 - SHARMA; Puneet ;   et al.
2011-03-03
Allocating resources in a system having multiple tiers
Grant 7,886,055 - Zhou , et al. February 8, 2
2011-02-08
Selecting Wireless Mesh Node Locations
App 20100278072 - Robinson; Joshua P. ;   et al.
2010-11-04
Determining A Metric Region In A Wireless Network
App 20100278057 - Robinson; Joshua P. ;   et al.
2010-11-04
Location Determination For Placing A New Capacity Point In A Wireless Network
App 20100254260 - Robinson; Joshua P. ;   et al.
2010-10-07
Method and system for finding conjunctive clusters
Grant 7,739,313 - Mishra , et al. June 15, 2
2010-06-15
System For And Method Of Writing And Reading Redundant Data
App 20100106974 - Aguilera; Marcos K. ;   et al.
2010-04-29
Windowed backward key rotation
Grant 7,697,690 - Fu , et al. April 13, 2
2010-04-13
Selecting Erasure Codes For A Fault Tolerant System
App 20100083069 - Wylie; John Johnson ;   et al.
2010-04-01
Auditor Assisted Extraction And Verification Of Client Data Returned From A Storage Provided While Hiding Client Data From The Auditor
App 20100083001 - SHAH; Mehul A. ;   et al.
2010-04-01
Auditing Data Integrity
App 20100080391 - Shah; Mehul A. ;   et al.
2010-04-01
Method of managing computer system
Grant 7,620,984 - Kallahalla , et al. November 17, 2
2009-11-17
Calculating numbers of servers for tiers of a multi-tiered system
Grant 7,594,016 - Zhou , et al. September 22, 2
2009-09-22
Collaborative Compression
App 20090112900 - Viswanathan; Krishnamurthy ;   et al.
2009-04-30
System and method for determining the fault-tolerance of an erasure code
App 20090083590 - Wylie; John Johnson ;   et al.
2009-03-26
Protocol virtualization for a network file system
App 20080126434 - Uysal; Mustafa ;   et al.
2008-05-29
Method and system for relating cryptographic keys
Grant 7,313,238 - Fu , et al. December 25, 2
2007-12-25
Secure file access control via directory encryption
Grant 7,313,694 - Riedel , et al. December 25, 2
2007-12-25
Global data placement
Grant 7,225,118 - Wang , et al. May 29, 2
2007-05-29
Optimizing costs associated with managing encrypted data
Grant 7,219,230 - Riedel , et al. May 15, 2
2007-05-15
System for enabling lazy-revocation through recursive key generation
Grant 7,203,317 - Kallahalla , et al. April 10, 2
2007-04-10
System for ensuring data privacy and user differentiation in a distributed file system
Grant 7,200,747 - Riedel , et al. April 3, 2
2007-04-03
System for optimized key management with file groups
Grant 7,171,557 - Kallahalla , et al. January 30, 2
2007-01-30
Sharding method and apparatus using directed graphs
Grant 7,043,621 - Merchant , et al. May 9, 2
2006-05-09
Method of forming virtual computer cluster within shared computing environment
App 20060075278 - Kallahalla; Mahesh ;   et al.
2006-04-06
Method of managing computer system
App 20060075252 - Kallahalla; Mahesh ;   et al.
2006-04-06
Method of providing storage to virtual computer cluster within shared computing environment
App 20060075199 - Kallahalla; Mahesh ;   et al.
2006-04-06
System for encrypted file storage optimization via differentiated key lengths
Grant 7,003,116 - Riedel , et al. February 21, 2
2006-02-21
Windowed backward key rotation
App 20050018842 - Fu, Kevin E. ;   et al.
2005-01-27
Method and system for finding conjunctive clusters
App 20040243546 - Mishra, Nina ;   et al.
2004-12-02
Sharding method and apparatus using directed graphs
App 20040230764 - Merchant, Arif ;   et al.
2004-11-18
Method and system for relating cryptographic keys
App 20040151310 - Fu, Kevin E. ;   et al.
2004-08-05
Secure mutual network authentication protocol
Grant 6,757,825 - MacKenzie , et al. June 29, 2
2004-06-29
Global data placement
App 20040088147 - Wang, Qian ;   et al.
2004-05-06
Method and apparatus for assigning raid levels
Grant 6,718,434 - Veitch , et al. April 6, 2
2004-04-06
Optimizing costs associated with managing encrypted data
App 20030210790 - Riedel, Erik ;   et al.
2003-11-13
System for encrypted file storage optimization via differentiated key lengths
App 20030086570 - Riedel, Erik ;   et al.
2003-05-08
System for ensuring data privacy and user differentiation in a distributed file system
App 20030081790 - Kallahalla, Mahesh ;   et al.
2003-05-01
System for enabling lazy-revocation through recursive key generation
App 20030081787 - Kallahalla, Mahesh ;   et al.
2003-05-01
System for optimized key management with file groups
App 20030081784 - Kallahalla, Mahesh ;   et al.
2003-05-01
Secure file access control via directory encryption
App 20030070071 - Riedel, Erik ;   et al.
2003-04-10
Method and apparatus for assigning raid levels
App 20020184442 - Veitch, Alistair C. ;   et al.
2002-12-05

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed