| 9852301 |
Creating secure channels between a protected execution environment and fixed-function endpoints |
Alpa T. Narendra Trivedi, Uday Savagaonkar, Men Long |
2017-12-26 |
| 9838367 |
Binding a trusted input session to a trusted output session |
Prashant Dewan, Reshma Lal, Ulhas Warrier |
2017-12-05 |
| 9799093 |
Secure rendering of display surfaces |
Uday Savagaonkar, Prashant Dewan, Michael A. Goldsmith, David M. Durham |
2017-10-24 |
| 9798900 |
Flexible counter system for memory protection |
Jungju Oh, David M. Durham |
2017-10-24 |
| 9792229 |
Protecting a memory |
Eugene M. Kishinevsky, Men Long, Jungju Oh, David M. Durham |
2017-10-17 |
| 9786205 |
Techniques for enforcing a depth order policy for graphics in a display scene |
Prashant Dewan, Uttam Sengupta, Uday Savagaonkar, David M. Durham, Xiaozhu Kang |
2017-10-10 |
| 9767044 |
Secure memory repartitioning |
Uday Savagaonkar, Michael A. Goldsmith, Simon P. Johnson, Rebekah M. Leslie-Hurd, Francis X. McKeen +9 more |
2017-09-19 |
| 9710675 |
Providing enhanced replay protection for a memory |
David M. Durham, Jungju Oh, Men Long, Eugene M. Kishinevsky |
2017-07-18 |
| 9678894 |
Cache-less split tracker architecture for replay protection trees |
Jungju Oh, David M. Durham |
2017-06-13 |
| 9652609 |
Entry/exit architecture for protected device modules |
Xiaozhu Kang, Alpa T. Narendra Trivedi, Prashant Dewan, Uday Savagaonkar, David M. Durham |
2017-05-16 |
| 9614666 |
Encryption interface |
Eugene M. Kishinevsky, Uday Savagaonkar, Alpa T. Narendra Trivedi, Baiju V. Patel, Men Long +2 more |
2017-04-04 |