Nicira, Inc Patent Portfolio Statistics

Nicira, Inc.

Profile Summary

This article summarizes the perfomance of the assignee in the recent years. The overall statistics for this portfolio help to analyze the areas where the assignee is performing well. The filing trend, perfomance across the tech centers and the perfomance of the recent applications has been mentioned below. All the stats are calculated based on the perfomance in USPTO.

How does the overall patent portfolio of Nicira, Inc. look like?

Assignee Art Units
Total Applications: 739 936,654
Granted Patents: 685 466,967
Grant Index 99.13% 79.1%
Abandoned/Rejected Applications: 6 (0.87%) 123,402 (20.9%)
In-Process Applications: 48 346,285
Average Grant Time: 3.1 Years 3.18 Years
Average Office Actions: 1.8 1.98

Which Technology Area Nicira, Inc. is filing most patents in? (Last 10 years)

Art Unit Definition Total Applications
2465 Multiplex and VoIP 47
2468 Multiplex and VoIP 28
2457 Computer Networks 27
2454 Computer Networks 25
2443 Computer Networks 21

How many patents are Nicira, Inc. filing every year?

Year Total Applications Predicted
2022 0* 676
2021 1* 718
2020 8 488
2019 17 17
2018 85
2017 169
2016 116
2015 105
2014 109
2013 64

*The drop in the number of applications filed in last two years compared to previous years is because applications can take up to 18 months to get published

Recently filed patent applications of Nicira, Inc. in USPTO?

Publication number: US20220094602A1
Application number: 17/542,410

Abstract:
Some embodiments provide a method for maintaining a cluster topology for a cluster of application instances operating across several datacenters. On a particular machine at which a particular one of the application instances operates, the method maintains a cluster topology that identifies, for each application instance of the cluster, the datacenter in which the application instance operates. From the particular application instance, the method receives a query request for at least a portion of the cluster topology through a programmatic interface. The method provides the requested portion of the cluster topology to the particular application instance. The particular application instance uses the cluster topology for processing application data based on the locations of a set of application instances within the several datacenters.

Publication date: 2022-03-24
Applicant: Nicira, Inc.
Inventors: Jeremy Olmsted-Thompson


Publication number: US20220092021A1
Application number: 17/542,414

Abstract:
A method for providing multi-tenancy support for RDMA in a system that includes a plurality of physical hosts. Each each physical host hosts a set of data compute nodes (DCNs). The method, at an RDMA protocol stack of the first host, receives a packet that includes a request from a first DCN hosted on a first host for RDMA data transfer from a second DCN hosted on a second host. The method sends a set of parameters of an overlay network that are associated with the first DCN to an RDMA physical network interface controller of the first host. The set of parameters are used by the RDMA physical NIC to encapsulate the packet with an RDMA data transfer header and an overlay network header by using the set of parameters of the overlay network to transfer the encapsulated packet to the second physical host using the overlay network.

Publication date: 2022-03-24
Applicant: Nicira, Inc.
Inventors: Ingale Tanuja


Publication number: US20220094717A1
Application number: 17/542,411

Abstract:
Systems and techniques are described for virtual machine security. A described technique includes operating one or more virtual machines each in accordance with a respective security container, wherein the respective security container is associated with a respective rule that specifies transfer of the virtual machine from the respective security container to a quarantine container based on one or more criteria. One or more security services are operated on the one or more virtual machines to identify one or more security threats associated with one or more of the virtual machines. One or more tags generated by the endpoint security services are obtained, where each tag is for a virtual machine that is associated with one of the identified security threats. And one of the virtual machines is identified as requiring transfer to the quarantine container based on, at least, one or more of the obtained tags and the one or more criteria.

Publication date: 2022-03-24
Applicant: Nicira, Inc.
Inventors: Anirban Sengupta


How are Nicira, Inc.’s applications performing in USPTO?

Application Number Title Status Art Unit Examiner
17/542,410 Accessible Application Cluster Topology Docketed New Case – Ready for Examination OPAP Central, Docket
17/542,414 Methods And Systems To Achieve Multi-Tenancy In Rdma Over Converged Ethernet Docketed New Case – Ready for Examination OPAP Central, Docket
17/542,411 Framework For Coordination Between Endpoint Security And Network Security Services Docketed New Case – Ready for Examination OPAP Central, Docket
17/525,913 Forwarding Element Implementation For Containers Docketed New Case – Ready for Examination OPAP Central, Docket
17/525,895 Enabling Hardware Switches To Perform Logical Routing Functionalities Docketed New Case – Ready for Examination OPAP Central, Docket