loadpatents
name:-0.11319398880005
name:-0.075678825378418
name:-0.02123498916626
Durham; David Patent Filings

Durham; David

Patent Applications and Registrations

Patent applications and USPTO patent grants for Durham; David.The latest application filed is for "protective footwear".

Company Profile
18.93.106
  • Durham; David - San Clemente CA
  • Durham; David - Beaverton OR
  • Durham; David - Irvine CA
  • Durham; David - Northridge CA
  • Durham; David - Raymond MS
  • Durham; David - Bearverton OR
  • Durham; David - Hillsboro OR
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Protective Footwear
App 20220160082 - Lee; Andre ;   et al.
2022-05-26
Side channel attack prevention by maintaining architectural state consistency
Grant 11,216,556 - Grewal , et al. January 4, 2
2022-01-04
Protective footwear
Grant 11,202,486 - Lee , et al. December 21, 2
2021-12-21
Replay protection for memory based on key refresh
Grant 11,019,098 - Deutsch , et al. May 25, 2
2021-05-25
Methods and arrangements for implicit integrity
Grant 10,929,527 - Kounavis , et al. February 23, 2
2021-02-23
Virtualization exceptions
Grant 10,901,772 - Neiger , et al. January 26, 2
2021-01-26
Method and apparatus to provide secure application execution
Grant 10,885,202 - McKeen , et al. January 5, 2
2021-01-05
Server RAS leveraging multi-key encryption
Grant 10,725,849 - Durham , et al.
2020-07-28
Secure Public Cloud Using Extended Paging And Memory Integrity
App 20200057664 - Durham; David ;   et al.
2020-02-20
System and method for enabling secure memory transactions using enclaves
Grant 10,565,370 - Narendra Trivedi , et al. Feb
2020-02-18
Virtualization Exceptions
App 20190370048 - Neiger; Gilbert ;   et al.
2019-12-05
Virtualization based intra-block workload isolation
Grant 10,395,028 - Dewan , et al. A
2019-08-27
Virtualization exceptions
Grant 10,296,366 - Neiger , et al.
2019-05-21
Garment With Stretch An Rigid Paneling
App 20190133216 - Durham; David
2019-05-09
Side Channel Attack Prevention By Maintaining Architectural State Consistency
App 20190138720 - Grewal; Ken ;   et al.
2019-05-09
Multifunction Perceptrons In Machine Learning Environments
App 20190108447 - Kounavis; Michael ;   et al.
2019-04-11
Method And Apparatus To Provide Secure Application Execution
App 20190087586 - McKEEN; Francis X. ;   et al.
2019-03-21
Server Ras Leveraging Multi-key Encryption
App 20190050283 - Durham; David ;   et al.
2019-02-14
Replay Protection For Memory Based On Key Refresh
App 20190044973 - Deutsch; Sergej ;   et al.
2019-02-07
Methods And Arrangements For Implicit Integrity
App 20190042734 - Kounavis; Michael ;   et al.
2019-02-07
Protective Footwear
App 20190021446 - Lee; Andre ;   et al.
2019-01-24
Interface between a device and a secure processing environment
Grant 10,181,027 - Narendra Trivedi , et al. Ja
2019-01-15
Method and apparatus to provide secure application execution
Grant 10,102,380 - McKeen , et al. October 16, 2
2018-10-16
Techniques to enable scalable cryptographically protected memory using on-chip memory
Grant 10,102,370 - Narendra Trivedi , et al. October 16, 2
2018-10-16
Base Layer Of A Garment
App 20180279694 - Theno; Jake ;   et al.
2018-10-04
Method and System for Providing Interactivity Based on Sensor Measurements
App 20180065051 - Crawford; David ;   et al.
2018-03-08
Techniques For Enforcing A Depth Order Policy For Graphics In A Display Scene
App 20180047307 - Dewan; Prashant ;   et al.
2018-02-15
Virtualization Based Intra-block Workload Isolation
App 20170372063 - DEWAN; PRASHANT ;   et al.
2017-12-28
Method and system for providing interactivity based on sensor measurements
Grant 9,839,856 - Crawford , et al. December 12, 2
2017-12-12
Techniques for enforcing a depth order policy for graphics in a display scene
Grant 9,786,205 - Dewan , et al. October 10, 2
2017-10-10
Mitigating unauthorized access to data traffic
Grant 9,769,123 - Grewal , et al. September 19, 2
2017-09-19
System and method for enabling secure memory transactions using enclaves
App 20170185766 - NARENDRA TRIVEDI; ALPA ;   et al.
2017-06-29
Techniques To Enable Scalable Cryptographically Protected Memory Using On-chip Memory
App 20170177862 - NARENDRA TRIVEDI; ALPA ;   et al.
2017-06-22
Virtualization Exceptions
App 20170109192 - Neiger; Gilbert ;   et al.
2017-04-20
Virtualization exceptions
Grant 9,563,455 - Neiger , et al. February 7, 2
2017-02-07
Full 3D interaction on mobile devices
Grant 9,335,888 - Durham , et al. May 10, 2
2016-05-10
Interface Between A Device And A Secure Processing Environment
App 20160110540 - NARENDRA TRIVEDI; ALPA ;   et al.
2016-04-21
Method and system for providing secure remote access and control
Grant 9,246,979 - Bomgaars , et al. January 26, 2
2016-01-26
Method and system for providing secure remote access and control
Grant 9,225,767 - Bomgaars , et al. December 29, 2
2015-12-29
Methods and systems for cryptographic access control of video
Grant 9,094,733 - Grewal , et al. July 28, 2
2015-07-28
Seamlessly Encrypting Memory Regions To Protect Against Hardware-based Attacks
App 20150205732 - SAVAGAONKAR; Uday ;   et al.
2015-07-23
Method and apparatus to provide secure application execution
Grant 9,087,200 - McKeen , et al. July 21, 2
2015-07-21
Techniques For Enforcing A Depth Order Policy For Graphics In A Display Scene
App 20150180657 - Dewan; Prashant ;   et al.
2015-06-25
Virtualization Exceptions
App 20150121366 - Neiger; Gilbert ;   et al.
2015-04-30
Copy equivalent protection using secure page flipping for software components within an execution environment
Grant 8,909,898 - Durham , et al. December 9, 2
2014-12-09
Switching between multiple operating systems (OSes) using sleep state management and sequestered re-baseable memory
Grant 8,843,733 - Durham September 23, 2
2014-09-23
Secure vault service for software components within an execution environment
Grant 8,839,450 - Durham , et al. September 16, 2
2014-09-16
Techniques for authenticated posture reporting and associated enforcement of network access
Grant 8,826,378 - Durham , et al. September 2, 2
2014-09-02
Cumulative integrity check value (ICV) processor based memory content protection
Grant 8,826,035 - Durham , et al. September 2, 2
2014-09-02
Full 3d Interaction On Mobile Devices
App 20140245230 - Durham; Lenitra M. ;   et al.
2014-08-28
Seamlessly encrypting memory regions to protect against hardware-based attacks
Grant 8,799,673 - Savagaonkar , et al. August 5, 2
2014-08-05
Botnet spam detection and filtration on the source machine
Grant 8,752,169 - Long , et al. June 10, 2
2014-06-10
Generating multiple address space identifiers per virtual machine to switch between protected micro-contexts
Grant 8,738,889 - Savagaonkar , et al. May 27, 2
2014-05-27
Runtime integrity chain verification
Grant 8,701,187 - Schluessler , et al. April 15, 2
2014-04-15
Techniques for authenticated posture reporting and associated enforcement of network access
Grant 8,671,439 - Durham , et al. March 11, 2
2014-03-11
Mitigating Unauthorized Access To Data Traffic
App 20140068704 - Grewal; Karanvir S. ;   et al.
2014-03-06
Methods And Systems For Cryptographic Access Control Of Video
App 20140044258 - Grewal; Karanvir S. ;   et al.
2014-02-13
Method And System For Providing Secure Remote Access And Control
App 20140040397 - Bomgaars; Joel ;   et al.
2014-02-06
Protecting caller function from undesired access by callee function
Grant 8,645,704 - Savagaonkar , et al. February 4, 2
2014-02-04
Method And System For Providing Secure Remote Access And Control
App 20130332548 - Bomgaars; Joel ;   et al.
2013-12-12
Signed manifest for run-time verification of software program identity and integrity
Grant 8,601,273 - Schluessler , et al. December 3, 2
2013-12-03
Copy Equivalent Protection Using Secure Page Flipping For Software Components Within An Execution Environment
App 20130298120 - Durham; David ;   et al.
2013-11-07
Method and system for a platform-based trust verifying service for multi-party verification
Grant 8,572,692 - Sunder , et al. October 29, 2
2013-10-29
Hierarchical trust based posture reporting and policy enforcement
Grant 8,555,348 - Khosravi , et al. October 8, 2
2013-10-08
Method And Apparatus To Provide Secure Application Execution
App 20130198853 - McKEEN; Francis X. ;   et al.
2013-08-01
Secure platform voucher service for software components within an execution environment
Grant 8,499,151 - Durham , et al. July 30, 2
2013-07-30
Method and apparatus allowing scan of data storage device from remote server
Grant 8,489,686 - Khosravi , et al. July 16, 2
2013-07-16
Method And Apparatus To Provide Secure Application Execution
App 20130159726 - MCKEEN; Francis X. ;   et al.
2013-06-20
Copy equivalent protection using secure page flipping for software components within an execution environment
Grant 8,423,747 - Durham , et al. April 16, 2
2013-04-16
Detection and reporting of virtualization malware in computer processor environments
Grant 8,417,945 - Khosravi , et al. April 9, 2
2013-04-09
Intruder traceability for shared security associations
Grant 8,411,868 - Long , et al. April 2, 2
2013-04-02
Generating Multiple Address Space Identifiers Per Virtual Machine To Switch Between Protected Micro-contexts
App 20130036291 - Savagaonkar; Uday ;   et al.
2013-02-07
Methods and systems to directly render an image and correlate corresponding user input in a secure memory domain
Grant 8,364,601 - Dewan , et al. January 29, 2
2013-01-29
Dynamic generation of integrity manifest for run-time verification of software program
Grant 8,364,973 - Khosravi , et al. January 29, 2
2013-01-29
Providing protected access to critical memory regions
Grant 8,341,369 - Savagaonkar , et al. December 25, 2
2012-12-25
Switching Between Multiple Operating Systems (OSes) Using Sleep State Management And Sequestered Re-Baseable Memory
App 20120303947 - Durham; David
2012-11-29
Generating multiple address space identifiers per virtual machine to switch between protected micro-contexts
Grant 8,316,211 - Savagaonkar , et al. November 20, 2
2012-11-20
Cross Validation Of Data Using Multiple Subsystems
App 20120284525 - Durham; David ;   et al.
2012-11-08
Secure Platform Voucher Service For Software Components Within An Execution Environment
App 20120226903 - Durham; David ;   et al.
2012-09-06
Protecting caller function from undesired access by callee function
Grant 8,261,065 - Savagaonkar , et al. September 4, 2
2012-09-04
Switching between multiple operating systems (OSes) using sleep state management and sequestered re-baseable memory
Grant 8,239,667 - Durham August 7, 2
2012-08-07
Cross validation of data using multiple subsystems
Grant 8,225,101 - Durham , et al. July 17, 2
2012-07-17
Providing Protected Access To Critical Memory Regions
App 20120102285 - Savagaonkar; Uday ;   et al.
2012-04-26
End-to-end Network Security With Traffic Visibility
App 20120096270 - Long; Men ;   et al.
2012-04-19
Figment collaboration system
App 20120072843 - Durham; David ;   et al.
2012-03-22
Secure platform voucher service for software components within an execution environment
Grant 8,132,003 - Durham , et al. March 6, 2
2012-03-06
Providing protected access to critical memory regions
Grant 8,099,574 - Savagaonkar , et al. January 17, 2
2012-01-17
Method And Apparatus Allowing Scan Of Data Storage Device From Remote Server
App 20110289146 - Khosravi; Hormuzd ;   et al.
2011-11-24
Apparatus and method for managing subscription requests for a network interface component
Grant 8,032,660 - Sahita , et al. October 4, 2
2011-10-04
Signed Manifest for Run-Time Verification of Software Program Identity and Integrity
App 20110231668 - Schluessler; Travis ;   et al.
2011-09-22
Protective gear for the body and methods of making the same
Grant 7,987,526 - Durham August 2, 2
2011-08-02
Seamlessly Encrypting Memory Regions To Protect Against Hardware-based Attacks
App 20110161677 - Savagaonkar; Uday R. ;   et al.
2011-06-30
Cumulative Integrity Check Value (icv) Processor Based Memory Content Protection
App 20110154059 - Durham; David ;   et al.
2011-06-23
Signed manifest for run-time verification of software program identity and integrity
Grant 7,953,980 - Schluessler , et al. May 31, 2
2011-05-31
Tamper protection of software agents operating in a vitual technology environment methods and apparatuses
Grant 7,882,318 - Savagaonkar , et al. February 1, 2
2011-02-01
Identifier associated with memory locations for managing memory accesses
Grant 7,865,683 - Durham , et al. January 4, 2
2011-01-04
Identifier Associated With Memory Locations For Managing Memory Accesses
App 20100262739 - Durham; David ;   et al.
2010-10-14
Monitoring a target agent execution pattern on a VT-enabled system
Grant 7,802,050 - Savagaonkar , et al. September 21, 2
2010-09-21
Defending against worm or virus attacks on networks
Grant 7,797,749 - Rajagopal , et al. September 14, 2
2010-09-14
Identifier associated with memory locations for managing memory accesses
Grant 7,761,674 - Durham , et al. July 20, 2
2010-07-20
Method for optimizing virtualization technology and memory protections using processor-extensions for page table and page directory striping
Grant 7,757,035 - Durham , et al. July 13, 2
2010-07-13
Apparatus and method for managing subscription requests for a network interface component
App 20100169507 - Sahita; Ravi ;   et al.
2010-07-01
Methods And Systems To Direclty Render An Image And Correlate Corresponding User Input In A Secuire Memory Domain
App 20100169666 - Dewan; Prashant ;   et al.
2010-07-01
Validating a memory type modification attempt
Grant 7,748,037 - Rajagopal , et al. June 29, 2
2010-06-29
Hierarchical Trust Based Posture Reporting and Policy Enforcement
App 20100162356 - Khosravi; Hormuzd ;   et al.
2010-06-24
Techniques for authenticated posture reporting and associated enforcement of network access
Grant 7,739,724 - Durham , et al. June 15, 2
2010-06-15
SWITCHING BETWEEN MULTIPLE OPERATING SYSTEMS (OSes) USING SLEEP STATE MANAGEMENT AND SEQUESTERED RE-BASEABLE MEMORY
App 20100122077 - Durham; David
2010-05-13
Techniques for authenticated posture reporting and associated enforcement of network access
App 20100107224 - Durham; David ;   et al.
2010-04-29
Hierarchical trust based posture reporting and policy enforcement
Grant 7,703,126 - Khosravi , et al. April 20, 2
2010-04-20
Techniques for Authenticated Posture Reporting and Associated Enforcement of Network Access
App 20100071032 - Durham; David ;   et al.
2010-03-18
Generating Multiple Address Space Identifiers Per Virtual Machine To Switch Between Protected Micro-contexts
App 20090327648 - Savagaonkar; Uday R. ;   et al.
2009-12-31
Method and system for a platform-based trust verifying service for multi-party verification
App 20090328164 - Sunder; Divya Naidu ;   et al.
2009-12-31
Detection And Reporting Of Virtualization Malware In Computer Processor Environments
App 20090328042 - Khosravi; Hormuzd M. ;   et al.
2009-12-31
Copy Equivalent Protection Using Secure Page Flipping For Software Components Within An Execution Environment
App 20090327575 - Durham; David ;   et al.
2009-12-31
Cross Validation Of Data Using Multiple Subsystems
App 20090282268 - Durham; David ;   et al.
2009-11-12
Botnet Spam Detection And Filtration On The Source Machine
App 20090249481 - Long; Men ;   et al.
2009-10-01
Cross validation of data using multiple subsystems
Grant 7,594,124 - Durham , et al. September 22, 2
2009-09-22
Platform-based identification of host software circumvention
Grant 7,594,269 - Durham , et al. September 22, 2
2009-09-22
Article of protective gear for the body
Grant D600,860 - Durham September 22, 2
2009-09-22
Method and system for providing interactivity based on sensor measurements
App 20090234666 - Crawford; David ;   et al.
2009-09-17
Dynamic Generation Of Integrity Manifest For Run-time Verification Of Software Program
App 20090172814 - Khosravi; Hormuzd ;   et al.
2009-07-02
Local and remote network based management of an operating system-independent processor
Grant 7,536,479 - Sahita , et al. May 19, 2
2009-05-19
End-to-end Network Security With Traffic Visibility
App 20090119510 - Long; Men ;   et al.
2009-05-07
Dynamically sharing a stack between different code segments
Grant 7,512,768 - Gutti , et al. March 31, 2
2009-03-31
Secure Vault Service For Software Components Within An Execution Environment
App 20090038017 - Durham; David ;   et al.
2009-02-05
Method For Optimizing Virtualization Technology And Memory Protections Using Processor-extensions For Page Table And Page Directory Striping
App 20090006714 - Durham; David ;   et al.
2009-01-01
Protecting Caller Function from Undesired Access by Callee Function
App 20080282358 - Savagaonkar; Uday ;   et al.
2008-11-13
Protecting Caller Function from Undesired Access by Callee Function
App 20080280593 - Savagaonkar; Uday ;   et al.
2008-11-13
Methods and apparatus for detecting patterns in a data stream
Grant 7,440,461 - Sahita , et al. October 21, 2
2008-10-21
Protective Gear For The Body And Methods Of Making The Same
App 20080250552 - Durham; David
2008-10-16
Intruder Traceability For Shared Security Associations
App 20080240446 - LONG; MEN ;   et al.
2008-10-02
Runtime integrity chain verification
App 20080244114 - Schluessler; Travis T. ;   et al.
2008-10-02
End-to-end network security with traffic visibility
App 20080244268 - Durham; David ;   et al.
2008-10-02
Architecture and system for host management
Grant 7,424,711 - Schluessler , et al. September 9, 2
2008-09-09
Preservation Of Integrity Of Data Across A Storage Hierarchy
App 20080201540 - Sahita; Ravi ;   et al.
2008-08-21
Providing protected access to critical memory regions
App 20080162849 - Savagaonkar; Uday ;   et al.
2008-07-03
Tamper-resistant method and apparatus for verification and measurement of host agent dynamic data updates
App 20080134321 - Rajagopal; Priya ;   et al.
2008-06-05
Tamper protection of software agents operating in a VT environment methods and apparatuses
App 20080082772 - Savagaonkar; Uday ;   et al.
2008-04-03
Monitoring a target agent execution pattern on a VT-enabled system
App 20080082722 - Savagaonkar; Uday ;   et al.
2008-04-03
Method and apparatus for secure page swapping in virtual memory systems
App 20080077767 - Khosravi; Hormuzd M. ;   et al.
2008-03-27
Method and apparatus for multiple inclusion offsets for security protocols
App 20080022388 - Grewal; Karanvir ;   et al.
2008-01-24
Dynamically sharing a stack between different code segments
App 20080022065 - Gutti; Subhash ;   et al.
2008-01-24
Secure Platform Voucher Service For Software Components Within An Execution Environment
App 20080022129 - Durham; David ;   et al.
2008-01-24
Method and apparatus for multiple generic exclusion offsets for security protocols
App 20080002724 - Grewal; Karanvir ;   et al.
2008-01-03
Hierarchical trust based posture reporting and policy enforcement
App 20070234402 - Khosravi; Hormuzd ;   et al.
2007-10-04
Identifier associated with memory locations for managing memory accesses
App 20070156999 - Durham; David ;   et al.
2007-07-05
Using sequestered memory for host software communications
App 20070088857 - Schluessler; Travis ;   et al.
2007-04-19
Validating a memory type modification attempt
App 20070079090 - Rajagopal; Priya ;   et al.
2007-04-05
Method for platform independent management of devices using option ROMs
App 20070011491 - Govindarajan; Priya ;   et al.
2007-01-11
Signed manifest for run-time verification of software program identity and integrity
App 20070005992 - Schluessler; Travis ;   et al.
2007-01-04
Architecture and system for host management
App 20070005572 - Schluessler; Travis ;   et al.
2007-01-04
Method and apparatus for securing and validating paged memory system
App 20070005935 - Khosravi; Hormuzd M. ;   et al.
2007-01-04
Techniques for authenticated posture reporting and associated enforcement of network access
App 20070006282 - Durham; David ;   et al.
2007-01-04
Intra-partitioning of software components within an execution environment
App 20070006175 - Durham; David ;   et al.
2007-01-04
Local and remote network based management of an operating system-independent processor
App 20060098646 - Sahita; Ravi ;   et al.
2006-05-11
Platform-based identification of host software circumvention
App 20060095967 - Durham; David ;   et al.
2006-05-04
Extensible service processor architecture
App 20060095551 - Leung; John Chun Kwak ;   et al.
2006-05-04
Defending against worm or virus attacks on networks
App 20060095970 - Rajagopal; Priya ;   et al.
2006-05-04
System and method for secure inter-platform and intra-platform communications
App 20060005015 - Durham; David ;   et al.
2006-01-05
Mechanism for sequestering memory for a bus device
App 20050289316 - Durham, David ;   et al.
2005-12-29
System and method for secure inter-platform and intra-platform communications
App 20050289311 - Durham, David ;   et al.
2005-12-29
Cross validation of data using multiple subsystems
App 20050278499 - Durham, David ;   et al.
2005-12-15
Methods and apparatus for detecting patterns in a data stream
App 20050135380 - Sahita, Ravi ;   et al.
2005-06-23

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed