Issued Patents All Time
Showing 26–50 of 65 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10003467 | Controlling digital certificate use | Derek Del Miller, Rahul G. Patel | 2018-06-19 |
| 9935937 | Implementing network security policies using TPM-based credentials | Alexander Robin Gordon Lucas | 2018-04-03 |
| 9930051 | Remote management of hardware hosts in cloud infrastructure | Jason Alexander Harland, Derek Del Miller, Christopher James BeSerra | 2018-03-27 |
| 9904587 | Detecting anomalous behavior in an electronic environment using hardware-based information | Donald L. Bailey, Richard Weatherly | 2018-02-27 |
| 9898601 | Allocation of shared system resources | Rahul G. Patel, William Earl, Matthew Shawn Wilson | 2018-02-20 |
| 9893885 | Updating cryptographic key pair | Derek Del Miller | 2018-02-13 |
| 9880866 | Cryptographically attested resources for hosting virtual machines | Eric Jason Brandwine, Matthew Shawn Wilson | 2018-01-30 |
| 9876815 | Threat detection and mitigation through run-time introspection and instrumentation | Hassan Sultan, John Schweitzer, Donald L. Bailey, Gregory Branchek Roth | 2018-01-23 |
| 9864636 | Allocating processor resources based on a service-level agreement | Rahul G. Patel, William Earl | 2018-01-09 |
| 9836354 | Automated error detection and recovery for GPU computations in a service environment | John Merrill Phillips, Nicholas Patrick Wilt, Deepak Singh, Scott Michael Le Grand | 2017-12-05 |
| 9819727 | Computing infrastructure for configurable-quality random data | Andrew Paul Mikulski, Donald L. Bailey, Robert Eric Fitzgerald | 2017-11-14 |
| 9792143 | Platform secure execution modes | Derek Del Miller, Mark Bradley Davis, Matthew Shawn Wilson, Eric Jason Brandwine, Anthony Nicholas Liguori +1 more | 2017-10-17 |
| 9754103 | Micro-architecturally delayed timer | Rahul G. Patel, William Earl | 2017-09-05 |
| 9703951 | Allocation of shared system resources | Rahul G. Patel, William Earl, Matthew Shawn Wilson | 2017-07-11 |
| 9684630 | Provisioning of cryptographic modules | Michael David Marr, Matthew D. Klein | 2017-06-20 |
| 9674162 | Updating encrypted cryptographic key pair | Derek Del Miller | 2017-06-06 |
| 9619238 | Remote attestation of host devices | Rachit Chawla, Jeremy Ryan Volkman, Michael David Marr | 2017-04-11 |
| 9594638 | Host recovery using a secure store | Rachit Chawla, Jeremy Ryan Volkman, Michael David Marr | 2017-03-14 |
| 9576155 | Trusted computing host | Michael David Marr, Eric Jason Brandwine, Donald L. Bailey | 2017-02-21 |
| 9578034 | Trusted peripheral device for a host in a shared electronic environment | Michael David Marr | 2017-02-21 |
| 9557792 | Datacenter power management optimizations | James R. Hamilton | 2017-01-31 |
| 9514324 | Approaches for restricting access to data | Jonathan Matthew Miller, Eric Jason Brandwine, Stephen E. Schmidt, Donald L. Bailey | 2016-12-06 |
| 9491112 | Allocating processor resources based on a task identifier | Rahul G. Patel, William Earl | 2016-11-08 |
| 9479340 | Controlling use of encryption keys | Derek Del Miller, Rahul G. Patel | 2016-10-25 |
| 9465652 | Hardware-based mechanisms for updating computer systems | Michael David Marr | 2016-10-11 |