Patent | Date |
---|
Write-back invalidate by key identifier Grant 11,379,592 - Shanbhogue , et al. July 5, 2 | 2022-07-05 |
Isa Support For Programming Hardware Over Untrusted Links App 20220209959 - CHHABRA; Siddhartha ;   et al. | 2022-06-30 |
Circuitry And Methods For Spatially Unique And Location Independent Persistent Memory Encryption App 20220100679 - NATU; MAHESH ;   et al. | 2022-03-31 |
Secure Encryption Key Management In Trust Domains App 20210397721 - CASPI; Dror ;   et al. | 2021-12-23 |
Concurrent Volume And File Based Inline Encryption On Commodity Operating Systems App 20210319121 - Dewan; Prashant ;   et al. | 2021-10-14 |
Secure encryption key management in trust domains Grant 11,138,320 - Caspi , et al. October 5, 2 | 2021-10-05 |
Secure Encryption Key Management In Trust Domains App 20200202013 - CASPI; Dror ;   et al. | 2020-06-25 |
Write-back Invalidate By Key Identifier App 20200202012 - SHANBHOGUE; Vedvyas ;   et al. | 2020-06-25 |
Scalable Multi-key Total Memory Encryption Engine App 20200201787 - Shanbhogue; Vedvyas ;   et al. | 2020-06-25 |
Method And Apparatus For Trust Domain Creation And Destruction App 20190147192 - Khosravi; Hormuzd ;   et al. | 2019-05-16 |
Method, device, and system for securely sharing media content from a source device Grant 9,497,171 - Khosravi , et al. November 15, 2 | 2016-11-15 |
Securely pairing computing devices Grant 9,436,819 - Priev , et al. September 6, 2 | 2016-09-06 |
Securely Pairing Computing Devices App 20160085960 - Priev; Avi ;   et al. | 2016-03-24 |
Synchronizing between host and management co-processor for network access control Grant 9,239,915 - Eldar , et al. January 19, 2 | 2016-01-19 |
Enabling access to remote entities in access controlled networks Grant 9,178,884 - Khosravi , et al. November 3, 2 | 2015-11-03 |
Secure vault service for software components within an execution environment Grant 8,839,450 - Durham , et al. September 16, 2 | 2014-09-16 |
Botnet spam detection and filtration on the source machine Grant 8,752,169 - Long , et al. June 10, 2 | 2014-06-10 |
Adaptive block pre-fetching method and system Grant 8,713,260 - Taha , et al. April 29, 2 | 2014-04-29 |
Runtime integrity chain verification Grant 8,701,187 - Schluessler , et al. April 15, 2 | 2014-04-15 |
Remote management over a wireless wide-area network using short message service Grant 8,688,104 - Prakash , et al. April 1, 2 | 2014-04-01 |
Method, Device, And System For Securely Sharing Media Content From A Source Device App 20130297936 - Khosravi; Hormuzd ;   et al. | 2013-11-07 |
Method and system for a platform-based trust verifying service for multi-party verification Grant 8,572,692 - Sunder , et al. October 29, 2 | 2013-10-29 |
Hierarchical trust based posture reporting and policy enforcement Grant 8,555,348 - Khosravi , et al. October 8, 2 | 2013-10-08 |
Method and apparatus allowing scan of data storage device from remote server Grant 8,489,686 - Khosravi , et al. July 16, 2 | 2013-07-16 |
Method and system for whitelisting software components Grant 8,434,067 - Nagabhushan , et al. April 30, 2 | 2013-04-30 |
Dynamic generation of integrity manifest for run-time verification of software program Grant 8,364,973 - Khosravi , et al. January 29, 2 | 2013-01-29 |
Providing protected access to critical memory regions Grant 8,341,369 - Savagaonkar , et al. December 25, 2 | 2012-12-25 |
Proxy detection by service processor Grant 8,332,510 - Khosravi , et al. December 11, 2 | 2012-12-11 |
Network vulnerability assessment of a host platform from an isolated partition in the host platform Grant 8,281,402 - Sahita , et al. October 2, 2 | 2012-10-02 |
Remote Management Over A Wireless Wide-area Network Using Short Message Service App 20120178481 - Prakash; Gyan ;   et al. | 2012-07-12 |
Platform posture and policy information exchange method and apparatus Grant 8,205,238 - Blumenthal , et al. June 19, 2 | 2012-06-19 |
Method and System for Whitelisting Software Components App 20120144482 - Nagabhushan; Gayathri ;   et al. | 2012-06-07 |
Remote management over a wireless wide-area network using short message service Grant 8,195,146 - Prakash , et al. June 5, 2 | 2012-06-05 |
Providing Protected Access To Critical Memory Regions App 20120102285 - Savagaonkar; Uday ;   et al. | 2012-04-26 |
Method and system for whitelisting software components Grant 8,099,718 - Nagabhushan , et al. January 17, 2 | 2012-01-17 |
Providing protected access to critical memory regions Grant 8,099,574 - Savagaonkar , et al. January 17, 2 | 2012-01-17 |
Method And Apparatus Allowing Scan Of Data Storage Device From Remote Server App 20110289146 - Khosravi; Hormuzd ;   et al. | 2011-11-24 |
Proxy Detection By Service Processor App 20110246633 - Khosravi; Hormuzd ;   et al. | 2011-10-06 |
Adaptive Block Pre-fetching Method And System App 20110246722 - Taha; Nadim ;   et al. | 2011-10-06 |
Automatic task performance as scheduled using embedded secondary processor Grant 8,010,965 - Keany , et al. August 30, 2 | 2011-08-30 |
Method And Device For Securely Displaying Digital Content On A Computing Device App 20110161145 - Mahajan; Ayeshwarya B. ;   et al. | 2011-06-30 |
Remote Management Over A Wireless Wide-area Network Using Short Message Service App 20110151854 - Prakash; Gyan ;   et al. | 2011-06-23 |
Computing Device And Method For Wireless Remote Boot In A Networked Environment App 20110125990 - Khosravi; Hormuzd ;   et al. | 2011-05-26 |
Authenticated distributed detection and inference Grant 7,921,453 - Agosta , et al. April 5, 2 | 2011-04-05 |
Tamper protection of software agents operating in a vitual technology environment methods and apparatuses Grant 7,882,318 - Savagaonkar , et al. February 1, 2 | 2011-02-01 |
Detection of network environment for network access control Grant 7,814,531 - Khosravi , et al. October 12, 2 | 2010-10-12 |
Method for optimizing virtualization technology and memory protections using processor-extensions for page table and page directory striping Grant 7,757,035 - Durham , et al. July 13, 2 | 2010-07-13 |
Validating a memory type modification attempt Grant 7,748,037 - Rajagopal , et al. June 29, 2 | 2010-06-29 |
Hierarchical Trust Based Posture Reporting and Policy Enforcement App 20100162356 - Khosravi; Hormuzd ;   et al. | 2010-06-24 |
Security protocols on incompatible transports Grant 7,743,245 - Khosravi June 22, 2 | 2010-06-22 |
Hierarchical trust based posture reporting and policy enforcement Grant 7,703,126 - Khosravi , et al. April 20, 2 | 2010-04-20 |
Method and system for a platform-based trust verifying service for multi-party verification App 20090328164 - Sunder; Divya Naidu ;   et al. | 2009-12-31 |
Operating system agnostic sharing of proteced memory using memory identifiers Grant 7,624,242 - Savagaonkar , et al. November 24, 2 | 2009-11-24 |
Botnet Spam Detection And Filtration On The Source Machine App 20090249481 - Long; Men ;   et al. | 2009-10-01 |
Dynamic Generation Of Integrity Manifest For Run-time Verification Of Software Program App 20090172814 - Khosravi; Hormuzd ;   et al. | 2009-07-02 |
Method and system for whitelisting software components App 20090125885 - Gayathri; Nagabhushan ;   et al. | 2009-05-14 |
Synchronizing between host and management co-processor for network access control App 20090083844 - Eldar; Avigdor ;   et al. | 2009-03-26 |
Enabling access to remote entities in access controlled networks App 20090070467 - Khosravi; Hormuzd ;   et al. | 2009-03-12 |
Secure Vault Service For Software Components Within An Execution Environment App 20090038017 - Durham; David ;   et al. | 2009-02-05 |
Method For Optimizing Virtualization Technology And Memory Protections Using Processor-extensions For Page Table And Page Directory Striping App 20090006714 - Durham; David ;   et al. | 2009-01-01 |
Method to provide high availability in network elements using distributed architectures Grant 7,453,797 - Deval , et al. November 18, 2 | 2008-11-18 |
Runtime integrity chain verification App 20080244114 - Schluessler; Travis T. ;   et al. | 2008-10-02 |
Providing protected access to critical memory regions App 20080162849 - Savagaonkar; Uday ;   et al. | 2008-07-03 |
Authenticated Distributed Detection And Inference App 20080155656 - Agosta; John Mark ;   et al. | 2008-06-26 |
Method for provisioning of credentials and software images in secure network environments App 20080082680 - Grewal; Karanvir ;   et al. | 2008-04-03 |
Tamper protection of software agents operating in a VT environment methods and apparatuses App 20080082772 - Savagaonkar; Uday ;   et al. | 2008-04-03 |
Automatic Task Performance As Scheduled Using Embedded Secondary Processor App 20080059275 - Keany; Bernard ;   et al. | 2008-03-06 |
Detection of network environment App 20080022355 - Khosravi; Hormuzd ;   et al. | 2008-01-24 |
Method and apparatus for multiple inclusion offsets for security protocols App 20080022388 - Grewal; Karanvir ;   et al. | 2008-01-24 |
Method and apparatus for multiple generic exclusion offsets for security protocols App 20080002724 - Grewal; Karanvir ;   et al. | 2008-01-03 |
Network vulnerability assessment of a host platform from an isolated partition in the host platform App 20070271360 - Sahita; Ravi ;   et al. | 2007-11-22 |
Operating system agnostic sharing of proteced memory using memory identifiers App 20070239953 - Savagaonkar; Uday ;   et al. | 2007-10-11 |
Platform posture and policy information exchange method and apparatus App 20070240197 - Blumenthal; Uri ;   et al. | 2007-10-11 |
Hierarchical trust based posture reporting and policy enforcement App 20070234402 - Khosravi; Hormuzd ;   et al. | 2007-10-04 |
Validating a memory type modification attempt App 20070079090 - Rajagopal; Priya ;   et al. | 2007-04-05 |
Providing protected access to critical memory regions App 20070067590 - Savagaonkar; Uday ;   et al. | 2007-03-22 |
Memory filters to aid system remediation App 20070056039 - Khosravi; Hormuzd ;   et al. | 2007-03-08 |
Security protocols on incompatible transports App 20060206705 - Khosravi; Hormuzd | 2006-09-14 |
Method to provide high availability in network elements using distributed architectures App 20060072480 - Deval; Manasi ;   et al. | 2006-04-06 |