| 12118101 |
Technique for providing a trusted execution environment |
Brendan James Moran, Andreas Lars Sandberg |
2024-10-15 |
| 11757717 |
Verifying network elements |
Ludovic Emmanuel Paul Noel Jacquin, Chris I. Dalton |
2023-09-12 |
| 10896267 |
Input/output data encryption |
Geoffrey Ndu, Pratyusa K. Manadhata, Christopher L. Dalton, Stuart Haber |
2021-01-19 |
| 10528752 |
Non-volatile storage of management data |
Dejan S. Milojicic, Chris I. Dalton, Zhikui Wang, Chandrasekar Venkatraman |
2020-01-07 |
| 10425282 |
Verifying a network configuration |
Ludovic Emmanuel Paul Noel Jacquin, Chris I. Dalton |
2019-09-24 |
| 10310990 |
Direct memory access encryption with application provided keys |
Geoffrey Ndu, Fraser John Dickin |
2019-06-04 |
| 10248814 |
Memory integrity monitoring |
Geoffrey Ndu, Brian Quentin Monahan |
2019-04-02 |
| 10242195 |
Integrity values for beginning booting instructions |
Ludovic Emmanuel Paul Noel Jacquin, Thomas M. Laffey |
2019-03-26 |
| 9633231 |
Hardware-protective data processing systems and methods using an application executing in a secure domain |
Maugan Villatel, Boris Balacheff, Chris I. Dalton, David Plaquin, Simon Kai-Ying Shiu |
2017-04-25 |