loadpatents
name:-0.073474884033203
name:-0.062196969985962
name:-0.0057499408721924
Long; Men Patent Filings

Long; Men

Patent Applications and Registrations

Patent applications and USPTO patent grants for Long; Men.The latest application filed is for "encryption interface".

Company Profile
7.80.87
  • Long; Men - Beaverton OR
  • Long; Men - Fullerton CA
  • Long; Men - Hillsboro OR
  • Long; Men - Portland OR
  • Long; Men - Hilsboro OR US
  • Long; Men - Bavarton OR
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Technologies for execute only transactional memory
Grant 11,416,414 - Durham , et al. August 16, 2
2022-08-16
Encryption Interface
App 20220224510 - Kishinevsky; Eugene M. ;   et al.
2022-07-14
Encryption interface
Grant 11,316,661 - Kishinevsky , et al. April 26, 2
2022-04-26
Security plugin for a system-on-a-chip platform
Grant 11,263,352 - Sastry , et al. March 1, 2
2022-03-01
Memory Scanning Methods And Apparatus
App 20210349999 - LeMay; Michael ;   et al.
2021-11-11
Memory scanning methods and apparatus
Grant 11,080,401 - LeMay , et al. August 3, 2
2021-08-03
Security Plugin For A System-on-a-chip Platform
App 20200356699 - Sastry; Manoj R. ;   et al.
2020-11-12
Encryption Interface
App 20200259632 - A1
2020-08-13
Security plugin for a system-on-a-chip platform
Grant 10,726,162 - Sastry , et al.
2020-07-28
Technologies For Execute Only Transactional Memory
App 20200142837 - Durham; David M. ;   et al.
2020-05-07
Memory Scanning Methods And Apparatus
App 20200050764 - LeMay; Michael ;   et al.
2020-02-13
Technologies for execute only transactional memory
Grant 10,558,582 - Durham , et al. Feb
2020-02-11
Encryption interface
Grant 10,530,568 - Kishinevsky , et al. J
2020-01-07
Memory scanning methods and apparatus
Grant 10,452,848 - LeMay , et al. Oc
2019-10-22
Urgency based reordering for priority order servicing of memory requests
Grant 10,223,298 - Chhabra , et al.
2019-03-05
Technologies for memory confidentiality, integrity, and replay protection
Grant 10,108,557 - Durham , et al. October 23, 2
2018-10-23
Method and apparatus for secure network enclaves
Grant 10,079,813 - Grewal , et al. September 18, 2
2018-09-18
Urgency Based Reordering For Priority Order Servicing Of Memory Requests
App 20180165229 - Chhabra; Siddhartha ;   et al.
2018-06-14
Memory integrity with error detection and correction
Grant 9,990,249 - Durham , et al. June 5, 2
2018-06-05
Memory encryption engine integration
Grant 9,910,793 - Chhabra , et al. March 6, 2
2018-03-06
Memory Scanning Methods And Apparatus
App 20180046806 - LeMay; Michael ;   et al.
2018-02-15
Efficient sharing of hardware encryption pipeline for multiple security solutions
Grant 9,893,881 - Bhattacharyya , et al. February 13, 2
2018-02-13
Creating secure channels between a protected execution environment and fixed-function endpoints
Grant 9,852,301 - Narendra Trivedi , et al. December 26, 2
2017-12-26
Memory integrity
Grant 9,847,872 - Durham , et al. December 19, 2
2017-12-19
Efficient key derivation for end-to-end network security with traffic visibility
Grant 9,832,015 - Long , et al. November 28, 2
2017-11-28
Incorporating access control functionality into a system on a chip (SoC)
Grant 9,805,221 - Sastry , et al. October 31, 2
2017-10-31
Memory scanning methods and apparatus
Grant 9,805,194 - LeMay , et al. October 31, 2
2017-10-31
Protecting a memory
Grant 9,792,229 - Kishinevsky , et al. October 17, 2
2017-10-17
Providing enhanced replay protection for a memory
Grant 9,710,675 - Durham , et al. July 18, 2
2017-07-18
Memory integrity with error detection and correction
App 20170185532 - Durham; David M. ;   et al.
2017-06-29
Encryption Interface
App 20170185809 - Kishinevsky; Eugene M. ;   et al.
2017-06-29
Symmetric key distribution framework for the Internet
Grant 9,654,453 - Kolar Sunder , et al. May 16, 2
2017-05-16
Technologies For Execute Only Transactional Memory
App 20170097898 - Durham; David M. ;   et al.
2017-04-06
Encryption interface
Grant 9,614,666 - Kishinevsky , et al. April 4, 2
2017-04-04
Memory Encryption Engine Integration
App 20170075822 - Chhabra; Siddhartha ;   et al.
2017-03-16
Efficient Sharing Of Hardware Encryption Pipeline For Multiple Security Solutions
App 20170063532 - Bhattacharyya; Binata ;   et al.
2017-03-02
Secure vault service for software components within an execution environment
Grant 9,547,772 - Durham , et al. January 17, 2
2017-01-17
Technologies For Memory Confidentiality, Integrity, And Replay Protection
App 20160378687 - Durham; David M. ;   et al.
2016-12-29
Memory encryption engine integration
Grant 9,524,249 - Chhabra , et al. December 20, 2
2016-12-20
Providing Enhanced Replay Protection For A Memory
App 20160283750 - Durham; David M. ;   et al.
2016-09-29
Protecting A Memory
App 20160285892 - Kishinevsky; Eugene M. ;   et al.
2016-09-29
Memory Scanning Methods And Apparatus
App 20160283717 - LeMay; Michael ;   et al.
2016-09-29
Bridging circuitry between a memory controller and request agents in a system having multiple system memory protection schemes
Grant 9,442,864 - Savagaonkar , et al. September 13, 2
2016-09-13
Method And Apparatus For Secure Network Enclaves
App 20160261570 - Grewal; Karanvir ;   et al.
2016-09-08
Memory Integrity
App 20160254905 - Durham; David M. ;   et al.
2016-09-01
Creating Secure Channels Between A Protected Execution Environment And Fixed-function Endpoints
App 20160188889 - NARENDRA TRIVEDI; Alpa ;   et al.
2016-06-30
Security Plugin For A System-on-a-chip Platform
App 20160180114 - Sastry; Manoj R. ;   et al.
2016-06-23
Encryption Interface
App 20160182223 - Kishinevsky; Eugene M. ;   et al.
2016-06-23
Memory Encryption Engine Integration
App 20160179702 - Chhabra; Siddhartha ;   et al.
2016-06-23
Secure vault service for software components within an execution environment
Grant 9,361,471 - Durham , et al. June 7, 2
2016-06-07
Method and apparatus for secure network enclaves
Grant 9,319,220 - Grewal , et al. April 19, 2
2016-04-19
Apparatus, system and method of protecting domains of a multimode wireless radio transceiver
Grant 9,307,409 - Sheikh , et al. April 5, 2
2016-04-05
Platform Based Verification Of Contents Of Input-output Devices
App 20160070910 - Khosravi; Hormuzd M. ;   et al.
2016-03-10
Preserving image privacy when manipulated by cloud services
Grant 9,276,745 - Durham , et al. March 1, 2
2016-03-01
Memory integrity
Grant 9,213,653 - Durham , et al. December 15, 2
2015-12-15
Symmetric Key Distribution Framework For The Internet
App 20150304286 - Kolar Sundar; Divya Naidu ;   et al.
2015-10-22
Method and system for protecting memory information in a platform
Grant 9,092,644 - Narendra Trivedi , et al. July 28, 2
2015-07-28
Methods and systems for cryptographic access control of video
Grant 9,094,733 - Grewal , et al. July 28, 2
2015-07-28
Seamlessly Encrypting Memory Regions To Protect Against Hardware-based Attacks
App 20150205732 - SAVAGAONKAR; Uday ;   et al.
2015-07-23
Bridging Circuitry Between A Memory Controller And Request Agents In A System Having Multiple System Memory Protection Schemes
App 20150186295 - Savagaonkar; Uday R. ;   et al.
2015-07-02
Apparatus, System And Method Of Protecting Domains Of A Multimode Wireless Radio Transceiver
App 20150189509 - Sheikh; Farhana Asrar ;   et al.
2015-07-02
Platform based verification of contents of input-output devices
Grant 9,069,961 - Khosravi , et al. June 30, 2
2015-06-30
Techniques for security management provisioning at a data storage device
Grant 9,064,116 - Triantafillou , et al. June 23, 2
2015-06-23
Memory Integrity
App 20150161059 - Durham; David M. ;   et al.
2015-06-11
Low-overhead cryptographic method and apparatus for providing memory confidentiality, integrity and replay protection
Grant 9,053,346 - Chhabra , et al. June 9, 2
2015-06-09
Secure Vault Service For Software Components Within An Execution Environment
App 20150134952 - Durham; David M. ;   et al.
2015-05-14
Symmetric key distribution framework for the Internet
Grant 9,015,484 - Kolar Sundar , et al. April 21, 2
2015-04-21
Secure Vault Service For Software Components Within An Execution Environment
App 20150074419 - Durham; David M. ;   et al.
2015-03-12
Efficient key derivation for end-to-end network security with traffic visibility
Grant 8,903,084 - Long , et al. December 2, 2
2014-12-02
Establishing, at least in part, secure communication channel between nodes so as to permit inspection, at least in part, of encrypted communication carried out, at least in part, between the nodes
Grant 8,873,746 - Long , et al. October 28, 2
2014-10-28
Secure vault service for software components within an execution environment
Grant 8,839,450 - Durham , et al. September 16, 2
2014-09-16
Cumulative integrity check value (ICV) processor based memory content protection
Grant 8,826,035 - Durham , et al. September 2, 2
2014-09-02
Parallelized counter tree walk for low overhead memory replay protection
Grant 8,819,455 - Chhabra , et al. August 26, 2
2014-08-26
Seamlessly encrypting memory regions to protect against hardware-based attacks
Grant 8,799,673 - Savagaonkar , et al. August 5, 2
2014-08-05
Method And System For Protecting Memory Information In A Platform
App 20140208109 - Narendra Trivedi; Alpa T. ;   et al.
2014-07-24
Botnet spam detection and filtration on the source machine
Grant 8,752,169 - Long , et al. June 10, 2
2014-06-10
INCORPORATING ACCESS CONTROL FUNCTIONALITY INTO A SYSTEM ON A CHIP (SoC)
App 20140137231 - Sastry; Manoj R. ;   et al.
2014-05-15
Parallelized Counter Tree Walk For Low Overhead Memory Replay Protection
App 20140101461 - Chhabra; Siddhartha ;   et al.
2014-04-10
Methods And Systems For Cryptographic Access Control Of Video
App 20140044258 - Grewal; Karanvir S. ;   et al.
2014-02-13
Low-overhead Cryptographic Method And Apparatus For Providing Memory Confidentiality, Integrity And Replay Protection
App 20140040632 - Chhabra; Siddhartha ;   et al.
2014-02-06
Media Encryption Based On Biometric Data
App 20140032924 - Durham; David M. ;   et al.
2014-01-30
Efficient Key Derivation For End-to-end Network Security With Traffic Visibility
App 20140032905 - Long; Men ;   et al.
2014-01-30
Symmetric Key Distribution Framework For The Internet
App 20130311777 - Kolar Sundar; Divya Naidu ;   et al.
2013-11-21
Platform Based Verification Of Contents Of Input-output Devices
App 20130283383 - Khosravi; Hormuzd M. ;   et al.
2013-10-24
Preserving Image Privacy When Manipulated By Cloud Services
App 20130279690 - Durham; David M. ;   et al.
2013-10-24
Symmetric key distribution framework for the internet
Grant 8,532,303 - Sunder , et al. September 10, 2
2013-09-10
Secure platform voucher service for software components within an execution environment
Grant 8,499,151 - Durham , et al. July 30, 2
2013-07-30
Method and apparatus allowing scan of data storage device from remote server
Grant 8,489,686 - Khosravi , et al. July 16, 2
2013-07-16
Platform based verification of contents of input-output devices
Grant 8,468,279 - Khosravi , et al. June 18, 2
2013-06-18
Efficient key derivation for end-to-end network security with traffic visibility
Grant 8,467,527 - Long , et al. June 18, 2
2013-06-18
Intruder traceability for shared security associations
Grant 8,411,868 - Long , et al. April 2, 2
2013-04-02
Dynamic generation of integrity manifest for run-time verification of software program
Grant 8,364,973 - Khosravi , et al. January 29, 2
2013-01-29
Generation and/or reception, at least in part, of packet including encrypted payload
Grant 8,281,122 - Durham , et al. October 2, 2
2012-10-02
Tamper resistant method, apparatus and system for secure portability of digital rights management-protected content
Grant 8,266,707 - Savagaonkar , et al. September 11, 2
2012-09-11
Secure Platform Voucher Service For Software Components Within An Execution Environment
App 20120226903 - Durham; David ;   et al.
2012-09-06
Determination by circuitry of presence of authorized and/or malicious data
Grant 8,214,902 - Khosravi , et al. July 3, 2
2012-07-03
Method, Apparatus And System For Secure Communication Of Radio Front End Test/calibration Instructions
App 20120166812 - Long; Men ;   et al.
2012-06-28
Techniques For Security Management Provisioning At A Data Storage Device
App 20120117348 - Triantafillou; Nicholas D. ;   et al.
2012-05-10
End-to-end Network Security With Traffic Visibility
App 20120096270 - Long; Men ;   et al.
2012-04-19
Secure platform voucher service for software components within an execution environment
Grant 8,132,003 - Durham , et al. March 6, 2
2012-03-06
Method And Apparatus Allowing Scan Of Data Storage Device From Remote Server
App 20110289146 - Khosravi; Hormuzd ;   et al.
2011-11-24
Establishing, At Least In Part, Secure Communication Channel Between Nodes So As To Permit Inspection, At Least In Part, Of Encrypted Communication Carried Out, At Least In Part, Between The Nodes
App 20110182427 - Long; Men ;   et al.
2011-07-28
Seamlessly Encrypting Memory Regions To Protect Against Hardware-based Attacks
App 20110161677 - Savagaonkar; Uday R. ;   et al.
2011-06-30
Cumulative Integrity Check Value (icv) Processor Based Memory Content Protection
App 20110154059 - Durham; David ;   et al.
2011-06-23
Secure Wireless Pairing Of Digital Tv Short-range Transmitter And Receiver
App 20110099591 - Long; Men ;   et al.
2011-04-28
Determination By Circuitry Of Presence Of Authorized And/or Malicious Data
App 20100325729 - Khosravi; Hormuzd M. ;   et al.
2010-12-23
Platform Based Verification Of Contents Of Input-output Devices
App 20100250797 - Khosravi; Hormuzd M. ;   et al.
2010-09-30
Generation And/or Reception, At Least In Part, Of Packet Including Encrypted Payload
App 20100223457 - Durham; David M. ;   et al.
2010-09-02
Synchronizing sequence numbers among peers in a network
Grant 7,778,166 - Dewan , et al. August 17, 2
2010-08-17
Efficient Key Derivation for End-To-End Network Security with Traffic Visibility
App 20100135498 - Long; Men ;   et al.
2010-06-03
Botnet Spam Detection And Filtration On The Source Machine
App 20090249481 - Long; Men ;   et al.
2009-10-01
Tamper Resistant Method, Apparatus And System For Secure Portability Of Digital Rights Management-protected Content
App 20090220090 - Savagaonkar; Uday ;   et al.
2009-09-03
Method And Apparatus For Secure Network Enclaves
App 20090210699 - Grewal; Karanvir ;   et al.
2009-08-20
Dynamic Generation Of Integrity Manifest For Run-time Verification Of Software Program
App 20090172814 - Khosravi; Hormuzd ;   et al.
2009-07-02
Symmetric Key Distribution Framework For The Internet
App 20090154708 - Kolar Sunder; Divya Naidu ;   et al.
2009-06-18
Synchronizing Sequence Numbers Among Peers In A Network
App 20090135827 - Dewan; Prashant ;   et al.
2009-05-28
End-to-end Network Security With Traffic Visibility
App 20090119510 - Long; Men ;   et al.
2009-05-07
Secure Vault Service For Software Components Within An Execution Environment
App 20090038017 - Durham; David ;   et al.
2009-02-05
End-to-end network security with traffic visibility
App 20080244268 - Durham; David ;   et al.
2008-10-02
Intruder Traceability For Shared Security Associations
App 20080240446 - LONG; MEN ;   et al.
2008-10-02
Secure Platform Voucher Service For Software Components Within An Execution Environment
App 20080022129 - Durham; David ;   et al.
2008-01-24
Method and apparatus for multiple inclusion offsets for security protocols
App 20080022388 - Grewal; Karanvir ;   et al.
2008-01-24
Method and apparatus for multiple generic exclusion offsets for security protocols
App 20080002724 - Grewal; Karanvir ;   et al.
2008-01-03

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed