loadpatents
name:-0.32296085357666
name:-0.063559055328369
name:-0.0061318874359131
Khosravi; Hormuzd Patent Filings

Khosravi; Hormuzd

Patent Applications and Registrations

Patent applications and USPTO patent grants for Khosravi; Hormuzd.The latest application filed is for "isa support for programming hardware over untrusted links".

Company Profile
6.46.47
  • Khosravi; Hormuzd - Portland OR
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Write-back invalidate by key identifier
Grant 11,379,592 - Shanbhogue , et al. July 5, 2
2022-07-05
Isa Support For Programming Hardware Over Untrusted Links
App 20220209959 - CHHABRA; Siddhartha ;   et al.
2022-06-30
Circuitry And Methods For Spatially Unique And Location Independent Persistent Memory Encryption
App 20220100679 - NATU; MAHESH ;   et al.
2022-03-31
Secure Encryption Key Management In Trust Domains
App 20210397721 - CASPI; Dror ;   et al.
2021-12-23
Concurrent Volume And File Based Inline Encryption On Commodity Operating Systems
App 20210319121 - Dewan; Prashant ;   et al.
2021-10-14
Secure encryption key management in trust domains
Grant 11,138,320 - Caspi , et al. October 5, 2
2021-10-05
Secure Encryption Key Management In Trust Domains
App 20200202013 - CASPI; Dror ;   et al.
2020-06-25
Write-back Invalidate By Key Identifier
App 20200202012 - SHANBHOGUE; Vedvyas ;   et al.
2020-06-25
Scalable Multi-key Total Memory Encryption Engine
App 20200201787 - Shanbhogue; Vedvyas ;   et al.
2020-06-25
Method And Apparatus For Trust Domain Creation And Destruction
App 20190147192 - Khosravi; Hormuzd ;   et al.
2019-05-16
Method, device, and system for securely sharing media content from a source device
Grant 9,497,171 - Khosravi , et al. November 15, 2
2016-11-15
Securely pairing computing devices
Grant 9,436,819 - Priev , et al. September 6, 2
2016-09-06
Securely Pairing Computing Devices
App 20160085960 - Priev; Avi ;   et al.
2016-03-24
Synchronizing between host and management co-processor for network access control
Grant 9,239,915 - Eldar , et al. January 19, 2
2016-01-19
Enabling access to remote entities in access controlled networks
Grant 9,178,884 - Khosravi , et al. November 3, 2
2015-11-03
Secure vault service for software components within an execution environment
Grant 8,839,450 - Durham , et al. September 16, 2
2014-09-16
Botnet spam detection and filtration on the source machine
Grant 8,752,169 - Long , et al. June 10, 2
2014-06-10
Adaptive block pre-fetching method and system
Grant 8,713,260 - Taha , et al. April 29, 2
2014-04-29
Runtime integrity chain verification
Grant 8,701,187 - Schluessler , et al. April 15, 2
2014-04-15
Remote management over a wireless wide-area network using short message service
Grant 8,688,104 - Prakash , et al. April 1, 2
2014-04-01
Method, Device, And System For Securely Sharing Media Content From A Source Device
App 20130297936 - Khosravi; Hormuzd ;   et al.
2013-11-07
Method and system for a platform-based trust verifying service for multi-party verification
Grant 8,572,692 - Sunder , et al. October 29, 2
2013-10-29
Hierarchical trust based posture reporting and policy enforcement
Grant 8,555,348 - Khosravi , et al. October 8, 2
2013-10-08
Method and apparatus allowing scan of data storage device from remote server
Grant 8,489,686 - Khosravi , et al. July 16, 2
2013-07-16
Method and system for whitelisting software components
Grant 8,434,067 - Nagabhushan , et al. April 30, 2
2013-04-30
Dynamic generation of integrity manifest for run-time verification of software program
Grant 8,364,973 - Khosravi , et al. January 29, 2
2013-01-29
Providing protected access to critical memory regions
Grant 8,341,369 - Savagaonkar , et al. December 25, 2
2012-12-25
Proxy detection by service processor
Grant 8,332,510 - Khosravi , et al. December 11, 2
2012-12-11
Network vulnerability assessment of a host platform from an isolated partition in the host platform
Grant 8,281,402 - Sahita , et al. October 2, 2
2012-10-02
Remote Management Over A Wireless Wide-area Network Using Short Message Service
App 20120178481 - Prakash; Gyan ;   et al.
2012-07-12
Platform posture and policy information exchange method and apparatus
Grant 8,205,238 - Blumenthal , et al. June 19, 2
2012-06-19
Method and System for Whitelisting Software Components
App 20120144482 - Nagabhushan; Gayathri ;   et al.
2012-06-07
Remote management over a wireless wide-area network using short message service
Grant 8,195,146 - Prakash , et al. June 5, 2
2012-06-05
Providing Protected Access To Critical Memory Regions
App 20120102285 - Savagaonkar; Uday ;   et al.
2012-04-26
Method and system for whitelisting software components
Grant 8,099,718 - Nagabhushan , et al. January 17, 2
2012-01-17
Providing protected access to critical memory regions
Grant 8,099,574 - Savagaonkar , et al. January 17, 2
2012-01-17
Method And Apparatus Allowing Scan Of Data Storage Device From Remote Server
App 20110289146 - Khosravi; Hormuzd ;   et al.
2011-11-24
Proxy Detection By Service Processor
App 20110246633 - Khosravi; Hormuzd ;   et al.
2011-10-06
Adaptive Block Pre-fetching Method And System
App 20110246722 - Taha; Nadim ;   et al.
2011-10-06
Automatic task performance as scheduled using embedded secondary processor
Grant 8,010,965 - Keany , et al. August 30, 2
2011-08-30
Method And Device For Securely Displaying Digital Content On A Computing Device
App 20110161145 - Mahajan; Ayeshwarya B. ;   et al.
2011-06-30
Remote Management Over A Wireless Wide-area Network Using Short Message Service
App 20110151854 - Prakash; Gyan ;   et al.
2011-06-23
Computing Device And Method For Wireless Remote Boot In A Networked Environment
App 20110125990 - Khosravi; Hormuzd ;   et al.
2011-05-26
Authenticated distributed detection and inference
Grant 7,921,453 - Agosta , et al. April 5, 2
2011-04-05
Tamper protection of software agents operating in a vitual technology environment methods and apparatuses
Grant 7,882,318 - Savagaonkar , et al. February 1, 2
2011-02-01
Detection of network environment for network access control
Grant 7,814,531 - Khosravi , et al. October 12, 2
2010-10-12
Method for optimizing virtualization technology and memory protections using processor-extensions for page table and page directory striping
Grant 7,757,035 - Durham , et al. July 13, 2
2010-07-13
Validating a memory type modification attempt
Grant 7,748,037 - Rajagopal , et al. June 29, 2
2010-06-29
Hierarchical Trust Based Posture Reporting and Policy Enforcement
App 20100162356 - Khosravi; Hormuzd ;   et al.
2010-06-24
Security protocols on incompatible transports
Grant 7,743,245 - Khosravi June 22, 2
2010-06-22
Hierarchical trust based posture reporting and policy enforcement
Grant 7,703,126 - Khosravi , et al. April 20, 2
2010-04-20
Method and system for a platform-based trust verifying service for multi-party verification
App 20090328164 - Sunder; Divya Naidu ;   et al.
2009-12-31
Operating system agnostic sharing of proteced memory using memory identifiers
Grant 7,624,242 - Savagaonkar , et al. November 24, 2
2009-11-24
Botnet Spam Detection And Filtration On The Source Machine
App 20090249481 - Long; Men ;   et al.
2009-10-01
Dynamic Generation Of Integrity Manifest For Run-time Verification Of Software Program
App 20090172814 - Khosravi; Hormuzd ;   et al.
2009-07-02
Method and system for whitelisting software components
App 20090125885 - Gayathri; Nagabhushan ;   et al.
2009-05-14
Synchronizing between host and management co-processor for network access control
App 20090083844 - Eldar; Avigdor ;   et al.
2009-03-26
Enabling access to remote entities in access controlled networks
App 20090070467 - Khosravi; Hormuzd ;   et al.
2009-03-12
Secure Vault Service For Software Components Within An Execution Environment
App 20090038017 - Durham; David ;   et al.
2009-02-05
Method For Optimizing Virtualization Technology And Memory Protections Using Processor-extensions For Page Table And Page Directory Striping
App 20090006714 - Durham; David ;   et al.
2009-01-01
Method to provide high availability in network elements using distributed architectures
Grant 7,453,797 - Deval , et al. November 18, 2
2008-11-18
Runtime integrity chain verification
App 20080244114 - Schluessler; Travis T. ;   et al.
2008-10-02
Providing protected access to critical memory regions
App 20080162849 - Savagaonkar; Uday ;   et al.
2008-07-03
Authenticated Distributed Detection And Inference
App 20080155656 - Agosta; John Mark ;   et al.
2008-06-26
Method for provisioning of credentials and software images in secure network environments
App 20080082680 - Grewal; Karanvir ;   et al.
2008-04-03
Tamper protection of software agents operating in a VT environment methods and apparatuses
App 20080082772 - Savagaonkar; Uday ;   et al.
2008-04-03
Automatic Task Performance As Scheduled Using Embedded Secondary Processor
App 20080059275 - Keany; Bernard ;   et al.
2008-03-06
Detection of network environment
App 20080022355 - Khosravi; Hormuzd ;   et al.
2008-01-24
Method and apparatus for multiple inclusion offsets for security protocols
App 20080022388 - Grewal; Karanvir ;   et al.
2008-01-24
Method and apparatus for multiple generic exclusion offsets for security protocols
App 20080002724 - Grewal; Karanvir ;   et al.
2008-01-03
Network vulnerability assessment of a host platform from an isolated partition in the host platform
App 20070271360 - Sahita; Ravi ;   et al.
2007-11-22
Operating system agnostic sharing of proteced memory using memory identifiers
App 20070239953 - Savagaonkar; Uday ;   et al.
2007-10-11
Platform posture and policy information exchange method and apparatus
App 20070240197 - Blumenthal; Uri ;   et al.
2007-10-11
Hierarchical trust based posture reporting and policy enforcement
App 20070234402 - Khosravi; Hormuzd ;   et al.
2007-10-04
Validating a memory type modification attempt
App 20070079090 - Rajagopal; Priya ;   et al.
2007-04-05
Providing protected access to critical memory regions
App 20070067590 - Savagaonkar; Uday ;   et al.
2007-03-22
Memory filters to aid system remediation
App 20070056039 - Khosravi; Hormuzd ;   et al.
2007-03-08
Security protocols on incompatible transports
App 20060206705 - Khosravi; Hormuzd
2006-09-14
Method to provide high availability in network elements using distributed architectures
App 20060072480 - Deval; Manasi ;   et al.
2006-04-06

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed