| 11178237 |
Geolocation-based activation and de-activation of hardware and software functionalities in the cloud |
Ashish Kundu |
2021-11-16 |
| 11176255 |
Securely booting a service processor and monitoring service processor integrity |
Patrick J. Callaghan, Kenneth A. Goldman, Guerney D. H. Hunt, Elaine R. Palmer, David R. Safford +3 more |
2021-11-16 |
| 11095454 |
Releasing secret information in a computer system |
Kenneth A. Goldman |
2021-08-17 |
| 11095635 |
Server authentication using multiple authentication chains |
Enriquillo Valdez |
2021-08-17 |
| 11068607 |
Protecting cognitive code and client data in a public cloud via deployment of data and executables into a secure partition with persistent data |
Richard H. Boivie, Jonathan D. Bradbury, William E. Hall, Guerney D. H. Hunt, Jentje Leenstra +3 more |
2021-07-20 |
| 11025640 |
Verification of geolocation of devices in a cloud data center |
Ashish Kundu, David R. Safford |
2021-06-01 |
| 10902121 |
Policy-based detection of anomalous control and data flow paths in an application program |
Suresh N. Chari, Ashish Kundu, Ian M. Molloy |
2021-01-26 |
| 10904246 |
Single channel input multi-factor authentication via separate processing pathways |
Suresh N. Chari, Zhongshu Gu, Heqing Huang |
2021-01-26 |
| 10904226 |
Secure processing environment for protecting sensitive information |
Richard H. Boivie, Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman +4 more |
2021-01-26 |