MM

Michael David Marr

AM Amazon: 140 patents #19 of 19,158Top 1%
Microsoft: 45 patents #411 of 40,388Top 2%
Snap: 39 patents #56 of 1,334Top 5%
📍 Monroe, WA: #1 of 218 inventorsTop 1%
🗺 Washington: #35 of 76,902 inventorsTop 1%
Overall (All Time): #2,538 of 4,157,543Top 1%
226
Patents All Time

Issued Patents All Time

Showing 201–225 of 226 patents

Patent #TitleCo-InventorsDate
8417968 Secure repository with layers of tamper resistance and system and method for providing same John L. Manferdelli, Vinay Krishnaswamy, Mariusz H. Jakubowski 2013-04-09
8406128 Efficient highly connected data centers Jagwinder Singh Brar, Tyson J. Lamoreaux, Mark N. Kelly, Justin O. Pietsch 2013-03-26
8392575 Clustered device dispersion in a multi-tenant environment 2013-03-05
8381264 Managing hardware reboot and reset in shared environments Matthew T. Corddry, James R. Hamilton, Peter N. De Santis 2013-02-19
8370496 Reducing average link bandwidth in an oversubscribed environment 2013-02-05
8300641 Leveraging physical network interface functionality for packet processing Pradeep Vincent 2012-10-30
8214653 Secured firmware updates Matthew T. Corddry, James R. Hamilton 2012-07-03
8155146 Stateless packet segmentation and processing Pradeep Vincent 2012-04-10
7958373 Secure repository with layers of tamper resistance and system and method for providing same John L. Manferdelli, Vinay Krishnaswamy, Mariusz H. Jakubowski 2011-06-07
7831838 Portion-level in-memory module authentication Scott Brender 2010-11-09
7814551 System and method for manifest generation Michael Darweesh, Tony Ureche 2010-10-12
7805761 Disposable red partitions Kenneth D. Ray, Paul England, Nathan T. Lewis 2010-09-28
7739516 Import address table verification Scott Brender, Philip J. Lafornara, Robert Ian Oliver 2010-06-15
7644287 Portion-level in-memory module authentication Timothy J. Oerting, Philip J. Lafornara, Robert Ian Oliver, Scott Brender 2010-01-05
7546587 Run-time call stack verification Scott Brender 2009-06-09
7539875 Secure repository with layers of tamper resistance and system and method for providing same John L. Manferdelli, Vinay Krishnaswamy, Mariusz H. Jakubowski 2009-05-26
7530103 Projection of trustworthiness from a trusted environment to an untrusted environment Bryan Willman, Paul England, Kenneth D. Ray, Keith S. Kaplan, Varugis Kurien 2009-05-05
7444677 Intentional cascade failure 2008-10-28
7383443 System and method for obfuscating code using instruction replacement scheme Pavel Zeman 2008-06-03
7383537 Debugging an application that employs rights-managed content Michael Darweesh, Octavian T. Ureche, Philip J. Lafornara 2008-06-03
7383583 Static and run-time anti-disassembly and anti-debugging Brandon S. Baker 2008-06-03
7376975 Enhancing digital rights management system security through policy enforcement Philip J. Lafornara, Rushmi U. Malaviarachchi, John L. Manferdelli, Charles F. Rose, III, Bradley Serbus 2008-05-20
7051200 System and method for interfacing a software process to secure repositories John L. Manferdelli, Vinay Krishnaswamy, Mariusz H. Jakubowski 2006-05-23
6816622 Generating resized images using ripple free image filtering James F. Blinn, Andrew C. Godfrey, Adrian Secchia 2004-11-09
6418920 Valves for actuating the flow of pressurized fluids and device containing same 2002-07-16