Learn more

ZETTASET INC

Overview
  • Total Patents
    31
  • GoodIP Patent Rank
    70,000
  • Filing trend
    ⇧ 100.0%
About

ZETTASET INC has a total of 31 patent applications. It increased the IP activity by 100.0%. Its first patent ever was published in 2012. It filed its patents most often in United States, WIPO (World Intellectual Property Organization) and Canada. Its main competitors in its focus markets computer technology, digital networks and control are CONJUR INC, HUAWEI DIGITAL TECHNOLOGIES CHENGDU CO LTD and XCERION AB.

Patent filings per year

Chart showing ZETTASET INCs patent filings per year from 1900 to 2020

Top inventors

# Name Total Patents
#1 Murray Eric A 16
#2 Yankovskiy Maksim 7
#3 Dalton Michael W 7
#4 Christian Brian P 3
#5 Cramer Michael J 2
#6 Murray Eric 2
#7 Demarest Timothy 1
#8 Pelykh Konstantin I 1
#9 Yankovsky Maksim 1
#10 Ware Michael A 1

Latest patents

Publication Filing date Title
WO2021067091A1 Dedicated encrypted container storage
US2021103392A1 Dedicated Encrypted Container Storage
US2021103664A1 Dynamic Provisioning of Encrypted Container Storage
US2021103395A1 Dynamic Provisioning of Container Storage
US2021044972A1 Efficient Internet-Of-Things (IoT) Data Encryption/Decryption
US2020311288A1 Transparent high-performance data-at-rest encryption for platform-as-a-service (PaaS) environments
US2020304304A1 Data-at-rest Encryption and Key Management in Unreliably Connected Environments
US2019013936A1 Cloud storage encryption with variable block sizes
US2018082076A1 Cloud storage encryption
US2017048059A1 Format-preserving cipher
US2016277373A1 Securing files under the semi-trusted user threat model using per-file key encryption
US2016321295A1 Scalable distributed metadata file-system using key-value stores
US2016218860A1 Format-preserving cipher
US9313023B1 Format-preserving cipher
US2016098573A1 Securing a Distributed File System
US9141814B1 Methods and computer systems with provisions for high availability of cryptographic keys
US2015288664A1 Method of securing files under the semi-trusted user threat model using symmetric keys and per-block key encryption
US2015092550A1 Capturing data packets from external networks into high availability clusters while maintaining high availability of popular data packets
US2014358977A1 Management of intermediate data spills during the shuffle phase of a map-reduce job
US2014196115A1 Monitoring of authorization-exceeding activity in distributed networks