| 12353608 |
Secure collaboration between processors and processing accelerators in enclaves |
Uday Savagaonkar |
2025-07-08 |
| 12010227 |
System and methods for securing role credentials |
Jasmeet Chhabra, Rebecca C. Weiss |
2024-06-11 |
| 11928496 |
System for live migration of virtual machines with assigned peripheral devices |
Benjamin C. Serebrin, Grigory Makarevich |
2024-03-12 |
| 11921905 |
Secure collaboration between processors and processing accelerators in enclaves |
Uday Savagaonkar |
2024-03-05 |
| 11853771 |
Offload card based virtualization of a pre-assembled computer system integrated into a server for a virtualization service |
Peter Zachary Bowen, Darin Lee Frink, David Skirmont, Manish Singh Rathaur |
2023-12-26 |
| 11635984 |
System for live migration of virtual machines with assigned peripheral devices |
Benjamin C. Serebrin, Grigory Makarevich |
2023-04-25 |
| 11360794 |
System for live migration of virtual machines with assigned peripheral devices |
Benjamin C. Serebrin, Grigory Makarevich |
2022-06-14 |
| 11363012 |
System and methods for using role credentials associated with a VM instance |
Jasmeet Chhabra, Rebecca C. Weiss |
2022-06-14 |
| 11243589 |
Remote power button actuation device for a pre-assembled computer system integrated into a server for a virtualization service |
Peter Zachary Bowen, Darin Lee Frink, David Skirmont, Manish Singh Rathaur |
2022-02-08 |
| 11113046 |
Integration and remote control of a pre-assembled computer system into a server for a virtualization service |
Peter Zachary Bowen, Darin Lee Frink, David Skirmont, Manish Singh Rathaur |
2021-09-07 |
| 10977191 |
TLB shootdowns for low overhead |
Benjamin C. Serebrin |
2021-04-13 |
| 10540292 |
TLB shootdowns for low overhead |
Benjamin C. Serebrin |
2020-01-21 |
| 9576129 |
Defensive techniques to increase computer security |
— |
2017-02-21 |
| 9448830 |
Service bridges |
Evan K. Anderson, Alexander Mohr, Joseph S. Beda, III, Michael H. Waychison, Cory T. Maccarrone +1 more |
2016-09-20 |
| 9251341 |
Defensive techniques to increase computer security |
— |
2016-02-02 |
| 9195827 |
Defensive techniques to increase computer security |
— |
2015-11-24 |
| 9015838 |
Defensive techniques to increase computer security |
— |
2015-04-21 |
| 8826440 |
Defensive techniques to increase computer security |
— |
2014-09-02 |
| 8813240 |
Defensive techniques to increase computer security |
— |
2014-08-19 |