Issued Patents 2024
Showing 1–19 of 19 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12182018 | Instruction and micro-architecture support for decompression on core | Jayesh Gaur, Adarsh Chauhan, Vinodh Gopal, Sreenivas Subramoney, Wajdi K. Feghali | 2024-12-31 |
| 12153665 | Device, system and method to efficiently update a secure arbitration mode module | Baruch Chaikin | 2024-11-26 |
| 12135780 | Processor extensions to protect stacks during ring transitions | Jason W. Brandt, Ravi L. Sahita, Barry E. Huntley, Baiju V. Patel, Deepak Gupta | 2024-11-05 |
| 12130738 | Compressed cache memory with decompress on fault | Jayesh Gaur, Wajdi K. Feghali, Vinodh Gopal, Utkarsh Y. Kakaiya | 2024-10-29 |
| 12112171 | Loop support extensions | Anant Vithal Nori, Shankar Balachandran, Sreenivas Subramoney, Joydeep Rakshit, Avishaii Abuhatzera +1 more | 2024-10-08 |
| 12106133 | Method and apparatus for trusted devices using Trust Domain Extensions | Ravi L. Sahita | 2024-10-01 |
| 12099841 | User timer directly programmed by application | Rajesh M. Sankaran, Gilbert Neiger, David A. Koufaty | 2024-09-24 |
| 12086653 | Software visible and controllable lock-stepping with configurable logical processor granularities | Jeff Huxel, Jeffrey G. Wiedemeier, James D. Allen, IV, Arvind Raman, Krishnakumar Ganapathy | 2024-09-10 |
| 12086424 | Memory encryption engine interface in compute express link (CXL) attached memory controllers | Siddhartha Chhabra | 2024-09-10 |
| 12038845 | Device, system and method to provide line level tagging of data at a processor cache | Siddhartha Chhabra | 2024-07-16 |
| 12032485 | 64-bit virtual addresses having metadata bit(s) and canonicality check that does not fail due to non-canonical values of metadata bit(s) | Gilbert Neiger, Stephen J. Robinson, Dan Baum, Ron Gabor | 2024-07-09 |
| 12028094 | Application programming interface for fine grained low latency decompression within processor core | Jayesh Gaur, Adarsh Chauhan, Vinodh Gopal, Sreenivas Subramoney, Wajdi K. Feghali | 2024-07-02 |
| 12021980 | Restricting usage of encryption keys by untrusted software | Ido Ouziel, Arie Aharon, Dror Caspi, Baruch Chaikin, Jacob Doweck +7 more | 2024-06-25 |
| 12013954 | Scalable cloning and replication for trusted execution environments | Ravi L. Sahita, Dror Caspi, Vincent R. Scarlata, Anjo Lucas Vahldiek-Oberwagner, Haidong Xia +1 more | 2024-06-18 |
| 12007938 | Processors, methods, systems, and instructions to atomically store to memory data wider than a natively supported data width | Stephen J. Robinson, Christopher D. Bryant, Jason W. Brandt | 2024-06-11 |
| 12001842 | Hardware apparatuses and methods to switch shadow stack pointers | Jason W. Brandt, Ravi L. Sahita, Barry E. Huntley, Baiju V. Patel, Deepak Gupta | 2024-06-04 |
| 11995001 | Supporting secure memory intent | Krystof C. Zmudzinski, Siddhartha Chhabra, Uday Savagaonkar, Simon P. Johnson, Rebekah M. Leslie-Hurd +10 more | 2024-05-28 |
| 11934843 | Secure arbitration mode to build and operate within trust domain extensions | Ravi L. Sahita, Vincent R. Scarlata, Barry E. Huntley | 2024-03-19 |
| 11907744 | System, apparatus and method for enabling fine-grain quality of service or rate control for work submissions | Utkarsh Y. Kakaiya, Sanjay Kumar, Philip R. Lantz, Gilbert Neiger, Rajesh M. Sankaran | 2024-02-20 |