| 10515218 |
Systems, apparatuses, and methods for platform security |
Neeraj Upasani, Sagar V. Dalvi, David P. Turley, Jeanne Guillory, Mark Chubb +2 more |
2019-12-24 |
| 10489156 |
Techniques to verify and authenticate resources in a data center computer environment |
Alberto J. Munoz, Murugasamy K. Nachimuthu, Mohan J. Kumar, Wojciech Stefan Powiertowski, Neeraj Upasani +3 more |
2019-11-26 |
| 10482278 |
Remote provisioning and authenticated writes to secure storage devices |
Adrian R. Pearson, Thomas R. Bowen, Gamil A. Cain, Jason R. Cox, Faraz A. Siddiqi +1 more |
2019-11-19 |
| 10474596 |
Providing dedicated resources for a system management mode of a processor |
Sarathy Jayakumar, Ashok Raj, John G. Holm, Narayan Ranganathan, Mohan J. Kumar |
2019-11-12 |
| 10318748 |
Techniques to protect fuses against non-destructive attacks |
Neeraj Upasani, David P. Turley, Zhangping Chen, Jason G. Sandri |
2019-06-11 |
| 10296416 |
Read from memory instructions, processors, methods, and systems, that do not take exception on defective data |
Ashok Raj, Ron Gabor, Hisham Shafi, Mohan J. Kumar, Theodros Yigzaw +2 more |
2019-05-21 |
| 10229281 |
Remote provisioning and authenticated writes to secure storage devices |
Adrian R. Pearson, Thomas R. Bowen, Gamil A. Cain, Jason R. Cox, Faraz A. Siddiqi +1 more |
2019-03-12 |