Issued Patents All Time
Showing 26–49 of 49 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10897352 | Cryptographic management of lifecycle states | Ronald Perez | 2021-01-19 |
| 10884673 | Virtual one-time programmable memory management | Roy G. Moss | 2021-01-05 |
| 10860229 | Managing privileges of different entities for an integrated circuit | Benjamin Che-Ming Jun, William Craig Rawlings, Mark Evan Marson | 2020-12-08 |
| 10609006 | Self-encrypting key management system | Anand Kashyap, Jethro Gideon Beekman, Faisal Faruqui | 2020-03-31 |
| 10560260 | Outputting a key based on an authorized sequence of operations | Megan Anneke Wachs, Benjamin Che-Ming Jun | 2020-02-11 |
| 10440000 | Secure data provisioning | Daniel Robert Beitel, Benjamin Che-Ming Jun | 2019-10-08 |
| 10417453 | Preemption of a container in a secure computation environment | William Craig Rawlings, Ronald Perez, Denis Alexandrovich Pochuev, Michael Alexander Hamburg, Paul C. Kocher | 2019-09-17 |
| 10379785 | Virtual one-time programmable memory management | Roy G. Moss | 2019-08-13 |
| 10341106 | Location aware cryptography | Mark Evan Marson, Daniel Robert Beitel | 2019-07-02 |
| 10218496 | Outputting a key based on an authorized sequence of operations | Megan Anneke Wachs, Benjamin Che-Ming Jun | 2019-02-26 |
| 9923719 | Location aware cryptography | Mark Evan Marson, Daniel Robert Beitel | 2018-03-20 |
| 9824772 | Hardware chip select training for memory using read commands | Venkata Ramana Malladi, Tony Yuhsiang Cheng, Sharath Raghava, Arunjit Sahni, Paul Lam | 2017-11-21 |
| 9792911 | Background voice recognition trainer | ILYA VEKSLER, Naveen Reddy Korupol | 2017-10-17 |
| 9768957 | Generation and management of multiple base keys based on a device generated key | — | 2017-09-19 |
| 9729331 | Corrupting a hash value corresponding to a key based on a revocation of the key | Benjamin Che-Ming Jun | 2017-08-08 |
| 9607714 | Hardware command training for memory using write leveling mechanism | Venkata Ramana Malladi, Tony Yuhsiang Cheng, Sharath Raghava, Arunjit Sahni, Paul Lam | 2017-03-28 |
| 9584509 | Auditing and permission provisioning mechanisms in a distributed secure asset-management infrastructure | Michael Alexander Hamburg, Benjamin Che-Ming Jun, Paul C. Kocher, Daniel O'Loughlin, Denis Alexandrovich Pochuev | 2017-02-28 |
| 9553722 | Generating a key based on a combination of keys | Benjamin Che-Ming Jun | 2017-01-24 |
| 9444623 | Modular exponentiation optimization for cryptographic systems | Paul C. Kocher, Michael Alexander Hamburg | 2016-09-13 |
| 9436848 | Configurator for secure feature and key manager | Daniel Robert Beitel, Lauren Gao, Christopher Gori, Paul C. Kocher, Andrew John Leiserson | 2016-09-06 |
| 9378169 | Method and system for changing bus direction in memory systems | Brian K. Langendorf, Sharath Raghava, Tony Yuhsiang Cheng | 2016-06-28 |
| 9368169 | Hardware chip select training for memory using write leveling mechanism | Venkata Ramana Malladi, Tony Yuhsiang Cheng, Sharath Raghava, Arunjit Sahni, Paul Lam | 2016-06-14 |
| 8687639 | Method and system for ordering posted packets and non-posted packets transfer | — | 2014-04-01 |
| 7747796 | Control data transfer rates for a serial ATA device by throttling values to control insertion of align primitives in data stream over serial ATA connection | Mark A. Overby | 2010-06-29 |