loadpatents
Patent applications and USPTO patent grants for Yellepeddy; Krishna K..The latest application filed is for "identifying and remediating malware-compromised devices".
Patent | Date |
---|---|
Identifying and remediating malware-compromised devices Grant 11,095,676 - Bolgert , et al. August 17, 2 | 2021-08-17 |
Calendaring dependencies Grant 10,977,620 - Kumhyr , et al. April 13, 2 | 2021-04-13 |
Identifying And Remediating Malware-compromised Devices App 20200067964 - BOLGERT; Anne L. ;   et al. | 2020-02-27 |
Identifying and remediating malware-compromised devices Grant 10,530,804 - Bolgert , et al. J | 2020-01-07 |
Optimizing use of hardware security modules Grant 10,523,424 - Yellepeddy , et al. Dec | 2019-12-31 |
Identifying And Remediating Malware-compromised Devices App 20190036962 - BOLGERT; Anne L. ;   et al. | 2019-01-31 |
Identifying and remediating malware-compromised devices Grant 10,164,998 - Bolgert , et al. Dec | 2018-12-25 |
Calendaring Dependencies App 20180225636 - KUMHYR; DAVID B. ;   et al. | 2018-08-09 |
Managing keys used for encrypting data Grant 9,881,173 - Hazlewood , et al. January 30, 2 | 2018-01-30 |
Optimizing Use of Hardware Security Modules App 20180013548 - Yellepeddy; Krishna K. ;   et al. | 2018-01-11 |
Identifying And Remediating Malware-compromised Devices App 20180007080 - BOLGERT; Anne L. ;   et al. | 2018-01-04 |
Identifying and remediating malware-compromised devices Grant 9,848,010 - Bolgert , et al. December 19, 2 | 2017-12-19 |
Optimizing use of hardware security modules Grant 9,794,063 - Yellepeddy , et al. October 17, 2 | 2017-10-17 |
Identifying And Remediating Malware-compromised Devices App 20170149815 - BOLGERT; Anne L. ;   et al. | 2017-05-25 |
Managing keys used for encrypting data Grant 9,594,920 - Hazlewood , et al. March 14, 2 | 2017-03-14 |
Managing Keys Used for Encrypting Data App 20160306983 - Hazlewood; Kristin M. ;   et al. | 2016-10-20 |
Managing keys used for encrypting data Grant 9,378,388 - Hazlewood , et al. June 28, 2 | 2016-06-28 |
Optimizing Use of Hardware Security Modules App 20140177842 - Yellepeddy; Krishna K. ;   et al. | 2014-06-26 |
Optimizing use of hardware security modules Grant 8,683,222 - Yellepeddy , et al. March 25, 2 | 2014-03-25 |
Optimizing use of hardware security modules Grant 8,675,875 - Yellepeddy , et al. March 18, 2 | 2014-03-18 |
Managing Keys used for Encrypting Data App 20120191985 - Hazlewood; Kristin M. ;   et al. | 2012-07-26 |
Optimizing Use of Hardware Security Modules App 20120159192 - Yellepeddy; Krishna K. ;   et al. | 2012-06-21 |
Optimizing Use of Hardware Security Modules App 20110289324 - Yellepeddy; Krishna K. ;   et al. | 2011-11-24 |
Method And Apparatus For Managing Keys Used For Encrypting Data App 20110258458 - Hazlewood; Kristin M. ;   et al. | 2011-10-20 |
Method and system for configuring highly available online certificate status protocol Grant 7,865,721 - Yellepeddy January 4, 2 | 2011-01-04 |
Utility For Tasks To Follow A User From Device To Device App 20090204966 - Johnson; Conrad J. ;   et al. | 2009-08-13 |
Method and system for configuring highly available online certificate status protocol App 20080172559 - Yellepeddy; Krishna K. | 2008-07-17 |
Method and system for configuring highly available online certificate status protocol responders Grant 7,318,155 - Yellepeddy January 8, 2 | 2008-01-08 |
Method and system for configuring highly available online certificate status protocol responders App 20040111607 - Yellepeddy, Krishna K. | 2004-06-10 |
System and method for maintaining replicated data coherency in a data processing system Grant 5,434,994 - Shaheen , et al. July 18, 1 | 1995-07-18 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.