loadpatents
name:-0.40314197540283
name:-0.37973809242249
name:-0.047413110733032
Hunt; Guerney D. H. Patent Filings

Hunt; Guerney D. H.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Hunt; Guerney D. H..The latest application filed is for "authorized encryption".

Company Profile
23.33.37
  • Hunt; Guerney D. H. - Yorktown Heights NY
  • Hunt; Guerney D.H. - Yorktown NY
  • Hunt; Guerney D. H. - Ithaca NY
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Authorized Encryption
App 20220284087 - Hunt; Guerney D. H. ;   et al.
2022-09-08
Secure Memory Sharing
App 20220207191 - Hetzler; Steven Robert ;   et al.
2022-06-30
Secure Data Movement
App 20220210139 - Hetzler; Steven Robert ;   et al.
2022-06-30
Provisioning Secure/encrypted Virtual Machines In A Cloud Infrastructure
App 20220198070 - Hunt; Guerney D. H. ;   et al.
2022-06-23
Provisioning Secure/encrypted Virtual Machines In A Cloud Infrastructure
App 20220198064 - Hunt; Guerney D. H. ;   et al.
2022-06-23
Securely booting a service processor and monitoring service processor integrity
Grant 11,176,255 - Callaghan , et al. November 16, 2
2021-11-16
Process-based Virtualization System For Executing A Secure Application Process
App 20210232693 - Leenstra; Jentje ;   et al.
2021-07-29
Securing Data Compression
App 20210234841 - ABALI; Bulent ;   et al.
2021-07-29
Protecting cognitive code and client data in a public cloud via deployment of data and executables into a secure partition with persistent data
Grant 11,068,607 - Boivie , et al. July 20, 2
2021-07-20
Malware Detection System
App 20210110037 - Hunt; Guerney D.H. ;   et al.
2021-04-15
Secure memory implementation for secure execution of virtual machines
Grant 10,831,889 - Hall , et al. November 10, 2
2020-11-10
Hardware based mandatory access control
Grant 10,802,990 - Hall , et al. October 13, 2
2020-10-13
Protecting cognitive code and client data in a public cloud via deployment of data and executables into a stateless secure partition
Grant 10,685,106 - Boivie , et al.
2020-06-16
Securely Booting a Service Processor and Monitoring Service Processor Integrity
App 20200117806 - Callaghan; Patrick J. ;   et al.
2020-04-16
Blockchain checkpoints and certified checkpoints
Grant 10,586,210 - Hunt , et al.
2020-03-10
Securely booting a service processor and monitoring service processor integrity
Grant 10,528,740 - Callaghan , et al. J
2020-01-07
Checkpoints for permissionless blockchains
Grant 10,523,421 - Hunt , et al. Dec
2019-12-31
Secure Memory Implementation For Secure Execution Of Virtual Machines
App 20190392143 - Hall; William E. ;   et al.
2019-12-26
Service Processor and System with Secure Booting and Monitoring of Service Processor Integrity
App 20190364048 - Callaghan; Patrick J. ;   et al.
2019-11-28
Secure memory implementation for secure execution of Virtual Machines
Grant 10,474,816 - Hall , et al. Nov
2019-11-12
Auditing certified blockchain checkpoints
Grant 10,460,289 - Hunt , et al. Oc
2019-10-29
Protecting Cognitive Code And Client Data In A Public Cloud Via Deployment Of Data And Executables Into A Stateless Secure Parti
App 20190278907 - Boivie; Richard H. ;   et al.
2019-09-12
Protecting Cognitive Code And Client Data In A Public Cloud Via Deployment Of Data And Executables Into A Secure Partition With
App 20190278918 - Boivie; Richard H. ;   et al.
2019-09-12
Service processor and system with secure booting and monitoring of service processor integrity
Grant 10,397,230 - Callaghan , et al. A
2019-08-27
Hardware based isolation for secure execution of virtual machines
Grant 10,387,686 - Boivie , et al. A
2019-08-20
Secure memory implementation for secure execution of virtual machines
Grant 10,296,741 - Hall , et al.
2019-05-21
Secure computer architecture
Grant 10,255,463 - Hall , et al.
2019-04-09
Hardware Based Isolation For Secure Execution Of Virtual Machines
App 20190034666 - Boivie; Richard H. ;   et al.
2019-01-31
Secure Memory Implementation For Secure Execution Of Virtual Machines
App 20190034628 - Hall; William E. ;   et al.
2019-01-31
Secure Memory Implementation For Secure Execution Of Virtual Machines
App 20190034627 - Hall; William E. ;   et al.
2019-01-31
Securely Booting a Service Processor and Monitoring Service Processor Integrity
App 20180365424 - Callaghan; Patrick J. ;   et al.
2018-12-20
Service Processor and System with Secure Booting and Monitoring of Service Processor Integrity
App 20180365422 - Callaghan; Patrick J. ;   et al.
2018-12-20
Secure computer architecture
Grant 9,996,709 - Hall , et al. June 12, 2
2018-06-12
Dynamic Reordering Of Blockchain Transactions To Optimize Performance And Scalability
App 20180158034 - Hunt; Guerney D.H. ;   et al.
2018-06-07
Blockchain checkpoints and certified checkpoints
App 20180150799 - Hunt; Guerney D.H. ;   et al.
2018-05-31
Checkpoints for permissionless blockchains
App 20180152289 - Hunt; Guerney D.H. ;   et al.
2018-05-31
Auditing certified blockchain checkpoints
App 20180150835 - Hunt; Guerney D.H. ;   et al.
2018-05-31
Mobile device with multiple security domains
Grant 9,842,207 - Cohn , et al. December 12, 2
2017-12-12
Mobile Device With Multiple Security Domains
App 20160026790 - Cohn; David L. ;   et al.
2016-01-28
Mobile device with multiple security domains
Grant 9,152,223 - Cohn , et al. October 6, 2
2015-10-06
Secure recursive virtualization
Grant 9,075,644 - Hall , et al. July 7, 2
2015-07-07
Processor and data processing method with non-hierarchical computer security enhancements for context states
Grant 8,850,557 - Boivie , et al. September 30, 2
2014-09-30
Hierarchical resource management for a computing utility
Grant 8,655,997 - Eilam , et al. February 18, 2
2014-02-18
Mobile Device With Multiple Security Domains
App 20130232238 - Cohn; David L. ;   et al.
2013-09-05
Processor And Data Processing Method With Non-hierarchical Computer Security Enhancements For Context States
App 20130227704 - Boivie; Richard H. ;   et al.
2013-08-29
Secure Computer Architecture
App 20130019307 - Hall; William E. ;   et al.
2013-01-17
Secure Recursive Virtualization
App 20120331466 - Hall; William E. ;   et al.
2012-12-27
Recursive logical partition real memory map
Grant 8,301,863 - Hall , et al. October 30, 2
2012-10-30
Secure recursive virtualization
Grant 8,286,164 - Hall , et al. October 9, 2
2012-10-09
Logical partition memory
Grant 8,135,937 - Hall , et al. March 13, 2
2012-03-13
Secure Recursive Virtualization
App 20110035532 - Hall; William E. ;   et al.
2011-02-10
Recursive Logical Partition Real Memory Map
App 20100125708 - Hall; William E. ;   et al.
2010-05-20
Logical Partition Memory
App 20100125709 - Hall; William E. ;   et al.
2010-05-20
Secure Computer Architecture
App 20100125915 - Hall; William E. ;   et al.
2010-05-20
Automatic provisioning of services based on a high level description and an infrastructure description
Grant 7,676,552 - Eilam , et al. March 9, 2
2010-03-09
Time based multi-tiered management of resource systems
Grant 7,543,296 - Hunt , et al. June 2, 2
2009-06-02
Arbitration in a computing utility system
Grant 7,487,258 - Eilam , et al. February 3, 2
2009-02-03
Hierarchical Resource Management for a Computing Utility
App 20080216082 - Eilam; Tamar ;   et al.
2008-09-04
Arbitration in a computing utility system
App 20050198641 - Eilam, Tamar ;   et al.
2005-09-08
Automatic provisioning of services based on a high level description and an infrastructure description
App 20050198244 - Eilam, Tamar ;   et al.
2005-09-08
Provisioning of services based on declarative descriptions of a resource structure of a service
App 20050177600 - Eilam, Tamar ;   et al.
2005-08-11
Time based multi-tiered management of resource systems
App 20050049884 - Hunt, Guerney D.H. ;   et al.
2005-03-03
File manager for files shared by heterogeneous clients
Grant 5,535,375 - Eshel , et al. July 9, 1
1996-07-09

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed