Issued Patents 2017
Showing 1–18 of 18 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9842065 | Virtualization-based platform protection technology | Rajesh Banginwar, Sumanth Naropanth, Sunil K. Notalapati Prabhakara, Surendra K. Singh, Arvind Mohan +6 more | 2017-12-12 |
| 9804870 | Instruction-set support for invocation of VMM-configured services without VMM intervention | Gilbert Neiger, Barry E. Huntley, Vedvyas Shanbhogue, Jason W. Brandt | 2017-10-31 |
| 9804871 | Instruction-set support for invocation of VMM-configured services without VMM intervention | Gilbert Neiger, Barry E. Huntley, Vedvyas Shanbhogue, Jason W. Brandt | 2017-10-31 |
| 9792222 | Validating virtual address translation by virtual machine monitor utilizing address validation structure to validate tentative guest physical address and aborting based on flag in extended page table requiring an expected guest physical address in the address validation structure | Gilbert Neiger, David M. Durham, Vedvyas Shanbhogue, Michael LeMay, Ido Ouziel +3 more | 2017-10-17 |
| 9785800 | Non-tracked control transfers within control transfer enforcement | Vedvyas Shanbhogue, Deepak Gupta | 2017-10-10 |
| 9769123 | Mitigating unauthorized access to data traffic | Karanvir S. Grewal, David M. Durham | 2017-09-19 |
| 9767272 | Attack Protection for valid gadget control transfers | Vedvyas Shanbhogue, Yuriy Bulygin, Xiaoning Li, Jason W. Brandt | 2017-09-19 |
| 9753863 | Memory protection with non-readable pages | Rekha N. Bachwani, David M. Durham | 2017-09-05 |
| 9710393 | Dynamic page table edit control | Michael LeMay, David M. Durham, Andrew V. Anderson, Gilbert Neiger | 2017-07-18 |
| 9710293 | Adaptive integrity verification of software using integrity manifest of pre-defined authorized software listing | Uday Savagaonkar | 2017-07-18 |
| 9703703 | Control of entry into protected memory views | Michael LeMay, Barry E. Huntley, David M. Durham, Vedvyas Shanbhogue | 2017-07-11 |
| 9703567 | Control transfer termination instructions of an instruction set architecture (ISA) | Vedvyas Shanbhogue, Jason W. Brandt, Uday Savagaonkar | 2017-07-11 |
| 9684511 | Using software having control transfer termination instructions with software not having control transfer termination instructions | Vedvyas Shanbhogue, Jason W. Brandt, Uday Savagaonkar | 2017-06-20 |
| 9671971 | Managing prior versions of data for logical addresses in a storage device | Sanjeev N. Trika, Benjamin W. Boyer, Xiaoning Li, Faraz A. Siddiqi | 2017-06-06 |
| 9665373 | Protecting confidential data with transactional processing in execute-only memory | Michael LeMay, David M. Durham, Barry E. Huntley, Vedvyas Shanbhogue, Ravi Rajwar | 2017-05-30 |
| 9626508 | Providing supervisor control of control transfer execution profiling | Vedvyas Shanbhogue | 2017-04-18 |
| 9608821 | System and method for high performance secure access to a trusted platform module on a hardware virtualization platform | Travis T. Schluessler | 2017-03-28 |
| 9563455 | Virtualization exceptions | Gilbert Neiger, Mayank Bomb, Manohar R. Castelino, Robert S. Chappell, David M. Durham +5 more | 2017-02-07 |