loadpatents
name:-0.049234867095947
name:-0.040222883224487
name:-0.0025880336761475
Sehr; David C. Patent Filings

Sehr; David C.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Sehr; David C..The latest application filed is for "method for validating an untrusted native code module".

Company Profile
2.51.40
  • Sehr; David C. - Cupertino CA
  • Sehr, David C. - Sunnyvale CA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Method for Validating an Untrusted Native Code Module
App 20200257804 - A1
2020-08-13
Method for validating an untrusted native code module
Grant 10,685,123 - Chen , et al.
2020-06-16
Dynamic sandboxing
Grant 10,031,832 - Bastien , et al. July 24, 2
2018-07-24
Method for Validating an Untrusted Native Code Module
App 20180004959 - Chen; J. Bradley ;   et al.
2018-01-04
Machine-specific instruction set translation
Grant 9,756,149 - Sehr , et al. September 5, 2
2017-09-05
Method for validating an untrusted native code module
Grant 9,710,654 - Chen , et al. July 18, 2
2017-07-18
Native code instruction selection
Grant 9,563,424 - Sehr , et al. February 7, 2
2017-02-07
Safely executing an untrusted native code module on a computing device
Grant 9,536,079 - Chen , et al. January 3, 2
2017-01-03
Method for Validating an Untrusted Native Code Module
App 20160283720 - Chen; J. Bradley ;   et al.
2016-09-29
Machine-Specific Instruction Set Translation
App 20160212243 - Sehr; David C. ;   et al.
2016-07-21
Virtual environment having harvard architecture
Grant 9,372,704 - Sehr , et al. June 21, 2
2016-06-21
Validating an untrusted native code module
Grant 9,361,453 - Chen , et al. June 7, 2
2016-06-07
Machine-specific instruction set translation
Grant 9,300,760 - Sehr , et al. March 29, 2
2016-03-29
Method and System for Executing Applications Using Native Code Modules
App 20160048677 - Kokkevis; Evangelos ;   et al.
2016-02-18
Security-Enhanced Web Application Module Translation
App 20160004858 - Chen; J. Bradley ;   et al.
2016-01-07
Portable handling of primitives for concurrent execution
Grant 9,223,550 - Bastien , et al. December 29, 2
2015-12-29
Address pinning
Grant 9,197,446 - Sehr , et al. November 24, 2
2015-11-24
Dynamic sandboxing
Grant 9,189,375 - Bastien , et al. November 17, 2
2015-11-17
Method and system for executing applications using native code modules
Grant 9,176,754 - Kokkevis , et al. November 3, 2
2015-11-03
Software fault isolation for arm thumb
Grant 9,135,414 - Biffle , et al. September 15, 2
2015-09-15
Address Pinning
App 20150195106 - Sehr; David C. ;   et al.
2015-07-09
Machine-Specific Instruction Set Translation
App 20150195376 - Sehr; David C. ;   et al.
2015-07-09
Predicated control flow and store instructions for native code module security
Grant 9,075,625 - Muth , et al. July 7, 2
2015-07-07
Method for validating an untrusted native code module
Grant 9,058,483 - Chen , et al. June 16, 2
2015-06-16
Method for Safely Executing an Untrusted Native Code Module on a Computing Device
App 20150161383 - Chen; J. Bradley ;   et al.
2015-06-11
Dynamic code insertion and removal for static analysis based sandboxes
Grant 8,997,225 - Yee , et al. March 31, 2
2015-03-31
Native code module security for arm instruction set architectures
Grant 8,966,628 - Muth , et al. February 24, 2
2015-02-24
Safely executing an untrusted native code module on a computing device
Grant 8,959,632 - Chen , et al. February 17, 2
2015-02-17
Native Code Module Security for Arm Instruction Set Architectures
App 20150026803 - Muth; Robert ;   et al.
2015-01-22
Native code module security for 64-bit instruction set architectures
Grant 8,935,776 - Sehr , et al. January 13, 2
2015-01-13
Method for Validating an Untrusted Native Code Module
App 20140359765 - Chen; J. Bradley ;   et al.
2014-12-04
Native code module security for arm instruction set architectures
Grant 8,856,925 - Muth , et al. October 7, 2
2014-10-07
Safe self-modifying code
Grant 8,850,574 - Ansel , et al. September 30, 2
2014-09-30
Computing device with untrusted user execution mode
Grant 8,850,573 - Chen , et al. September 30, 2
2014-09-30
Virtual Environment Having Harvard Architecture
App 20140282534 - Sehr; David C. ;   et al.
2014-09-18
Predicated control flow and store instructions for native code module security
Grant 8,819,399 - Muth , et al. August 26, 2
2014-08-26
Native Code Instruction Selection
App 20140052971 - Sehr; David C. ;   et al.
2014-02-20
Native Code Module Security for Arm Instruction Set Architectures
App 20140013430 - Muth; Robert ;   et al.
2014-01-09
Dynamic code insertion for static analysis based sandboxes
Grant 8,621,619 - Yee , et al. December 31, 2
2013-12-31
Dynamic Code Insertion And Removal For Static Analysis Based Sandboxes
App 20130333031 - Yee; Bennet S. ;   et al.
2013-12-12
Masking mechanism that facilitates safely executing untrusted native code
Grant 8,595,832 - Yee , et al. November 26, 2
2013-11-26
Native code module security for arm instruction set architectures
Grant 8,561,183 - Muth , et al. October 15, 2
2013-10-15
Safely Executing an Untrusted Native Code Module on a Computing Device
App 20130185787 - Chen; J. Bradley ;   et al.
2013-07-18
Native code module security for 64-bit instruction set architectures
Grant 8,468,592 - Sehr , et al. June 18, 2
2013-06-18
Dynamic code insertion and removal for static analysis based sandboxes
Grant 8,464,349 - Yee , et al. June 11, 2
2013-06-11
Safely executing an untrusted native code module on a computing device
Grant 8,424,082 - Chen , et al. April 16, 2
2013-04-16
User-level segmentation mechanism that facilitates safely executing untrusted native code
Grant 8,307,193 - Sehr , et al. November 6, 2
2012-11-06
Masking mechanism that facilitates safely executing untrusted native code
Grant 8,151,349 - Yee , et al. April 3, 2
2012-04-03
User-level segmentation mechanism that facilitates safely executing untrusted native code
Grant 8,136,158 - Sehr , et al. March 13, 2
2012-03-13
User-level Secmentation Mechanism That Facilitates Safely Executing Untrusted Native Code
App 20120042145 - Sehr; David C. ;   et al.
2012-02-16
Thread-data affinity optimization using compiler
Grant 8,037,465 - Tian , et al. October 11, 2
2011-10-11
Dynamic Code Insertion And Removal For Static Analysis Based Sandboxes
App 20110138473 - Yee; Bennet S. ;   et al.
2011-06-09
Dynamic Code Insertion And Removal For Static Analysis Based Sandboxes
App 20110138474 - Yee; Bennet S. ;   et al.
2011-06-09
Native Code Module Security For Arm Instruction Set Architectures
App 20110029961 - Muth; Robert ;   et al.
2011-02-03
Native Code Module Security For 64-bit Instruction Set Architectures
App 20110029820 - Sehr; David C. ;   et al.
2011-02-03
Method And System For Executing Applications Using Native Code Modules
App 20100017461 - Kokkevis; Evangelos ;   et al.
2010-01-21
Methods and apparatus to reduce a control flow graph using points-to information
Grant 7,634,765 - Ghiya , et al. December 15, 2
2009-12-15
Method For Validating An Untrusted Native Code Module
App 20090282477 - Chen; J. Bradley ;   et al.
2009-11-12
Method For Safely Executing An Untrusted Native Code Module On A Computing Device
App 20090282474 - Chen; J. Bradley ;   et al.
2009-11-12
Methods and apparatuses for compaction and/or decompaction
App 20080162522 - Lueh; Guei-Yuan ;   et al.
2008-07-03
Methods and apparatus to perform return-address prediction
Grant 7,293,265 - Haghighat , et al. November 6, 2
2007-11-06
Estimation of type-cast sets
Grant 7,257,809 - Ghiya , et al. August 14, 2
2007-08-14
Methods and apparatus for determining if a user-defined software function is a memory allocation function during compile-time
Grant 7,243,342 - Ghiya , et al. July 10, 2
2007-07-10
Thread-data affinity optimization using compiler
App 20070079298 - Tian; Xinmin ;   et al.
2007-04-05
Profile-guided data layout
Grant 7,143,404 - Haghighat , et al. November 28, 2
2006-11-28
Methods and apparatus to reduce a control flow graph using points-to information
App 20060047681 - Ghiya; Rakesh ;   et al.
2006-03-02
Methods and apparatus to minimize debugging and testing time of applications
App 20050120274 - Haghighat, Mohammad R. ;   et al.
2005-06-02
Methods and apparatus to perform return-address prediction
App 20040230779 - Haghighat, Mohammad R. ;   et al.
2004-11-18
Method for collection of memory reference information and memory disambiguation
App 20040205740 - Lavery, Daniel M. ;   et al.
2004-10-14
Optimization based on simulated linking
App 20040194073 - Chan, Sun C. ;   et al.
2004-09-30
Profile-guided data layout
App 20040193815 - Haghighat, Mohammad R. ;   et al.
2004-09-30
Profile-guided regression testing
App 20040154001 - Haghighat, Mohammad R. ;   et al.
2004-08-05
Estimation of type-cast sets
App 20040128657 - Ghiya, Rakesh ;   et al.
2004-07-01
Optimization of software code using N-bit pointer conversion
App 20040117778 - Sehr, David C. ;   et al.
2004-06-17
Methods and apparatus for determining if a user-defined software function is a memory allocation function during compile-time
App 20040078789 - Ghiya, Rakesh ;   et al.
2004-04-22
Method and apparatus for compiler-generated triggering of auxiliary codes
App 20020199179 - Lavery, Daniel M. ;   et al.
2002-12-26

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed