Issued Patents All Time
Showing 51–75 of 104 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10303454 | Disk block streaming using a broker computer system | — | 2019-05-28 |
| 10248445 | Provisioning of computer systems using virtual machines | Dilip Khandekar, Dragutin Petkovic, Bich Cau Le | 2019-04-02 |
| 10241819 | Isolating data within a computer system using private shadow mappings | Xiaoxin Chen, Carl A. Waldspurger | 2019-03-26 |
| 10223026 | Consistent and efficient mirroring of nonvolatile memory state in virtualized environments where dirty bit of page table entries in non-volatile memory are not cleared until pages in non-volatile memory are remotely mirrored | Rajesh Venkatasubramanian | 2019-03-05 |
| 10198352 | Efficient pointer swizzling for persistent objects | Zongwei Zhou, Rajesh Venkatasubramanian | 2019-02-05 |
| 10169253 | Cryptographic multi-shadowing with integrity verification | Xiaoxin Chen, Carl A. Waldspurger, Tal Garfinkel, Dan Boneh | 2019-01-01 |
| 10140212 | Consistent and efficient mirroring of nonvolatile memory state in virtualized environments by remote mirroring memory addresses of nonvolatile memory to which cached lines of the nonvolatile memory have been flushed | Rajesh Venkatasubramanian | 2018-11-27 |
| 10048982 | Method for performing control transfers in a system with cloaked pages | Xiaoxin Chen, Carl A. Waldspurger | 2018-08-14 |
| 9740637 | Cryptographic multi-shadowing with integrity verification | Xiaoxin Chen, Carl A. Waldspurger, Tal Garfinkel, Dan Boneh | 2017-08-22 |
| 9727420 | Generating and using checkpoints in a virtual computer system | Carl A. Waldspurger, Michael Nelson, Daniel J. Scales | 2017-08-08 |
| 9658878 | Transparent memory-mapped emulation of I/O calls | Daniel R. K. Ports, Xiaoxin Chen, Carl A. Waldspurger, Tal Garfinkel | 2017-05-23 |
| 9489265 | Method and system for frequent checkpointing | Daniel J. Scales, Ganesh Venkitachalam, Michael Nelson | 2016-11-08 |
| 9344526 | Disk blocking streaming | — | 2016-05-17 |
| 9336033 | Secure identification of execution contexts | Xiaoxin Chen, Carl A. Waldspurger | 2016-05-10 |
| 9274974 | Isolating data within a computer system using private shadow mappings | Xiaoxin Chen, Carl A. Waldspurger | 2016-03-01 |
| 9037689 | Provisioning of computer systems using virtual machines | Dilip Khandekar, Dragutin Petkovic, Bich Cau Le | 2015-05-19 |
| 8898518 | Method and system for enabling checkpointing fault tolerance across remote virtual machines | Ole Agesen, Raviprasad Venkatesha Murthy Mummidi | 2014-11-25 |
| 8819676 | Transparent memory-mapped emulation of I/O calls | Daniel R. K. Ports, Xiaoxin Chen, Carl A. Waldspurger, Tal Garfinkel | 2014-08-26 |
| 8745308 | System and method to enhance memory protection for programs in a virtual machine environment | Xiaoxin Chen | 2014-06-03 |
| 8719823 | Managing latency introduced by virtualization | Carl A. Waldspurger, Vyacheslav V. Malyugin, Tal Garfinkel | 2014-05-06 |
| 8713273 | Generating and using checkpoints in a virtual computer system | Carl A. Waldspurger, Michael Nelson, Daniel J. Scales | 2014-04-29 |
| 8661213 | Method and system for frequent checkpointing | Daniel J. Scales, Ganesh Venkitachalam, Michael Nelson | 2014-02-25 |
| 8607013 | Providing VMM access to guest virtual memory | Xiaoxin Chen, Carl A. Waldspurger | 2013-12-10 |
| 8555081 | Cryptographic multi-shadowing with integrity verification | Xiaoxin Chen, Carl A. Waldspurger, Tal Garfinkel, Dan Boneh | 2013-10-08 |
| 8549241 | Method and system for frequent checkpointing | Daniel J. Scales, Ganesh Venkitachalam, Michael Nelson | 2013-10-01 |