Issued Patents All Time
Showing 1–25 of 37 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12413424 | Systems and methods for assigning a cryptographic identity to node-based systems | Kenneth J. Geer, Christopher Anthony Grant Hillier, Thomas M. Laffey | 2025-09-09 |
| 12393691 | Securing node groups | Nigel Edwards, Michael R. Krause, Melvin K. Benedict, Ludovic Emmanuel Paul Noel Jacquin, Luis E. Luciani, Jr. +2 more | 2025-08-19 |
| 12204628 | Management controller-based verification of platform certificates | Dilip Kumar Ramakrishna Reddy, Kenneth J. Geer | 2025-01-21 |
| 12105859 | Managing storage of secrets in memories of baseboard management controllers | Theodore F. Emerson, Luis E. Luciani, Jr., Kevin Boyum, Naysen J. Robertson, Robert L. Noonan +2 more | 2024-10-01 |
| 12072990 | Multiple physical request interfaces for security processors | Ludovic Emmanuel Paul Noel Jacquin, Nigel Edwards, Thomas M. Laffey | 2024-08-27 |
| 11868474 | Securing node groups | Nigel Edwards, Michael R. Krause, Melvin K. Benedict, Ludovic Emmanuel Paul Noel Jacquin, Luis E. Luciani, Jr. +2 more | 2024-01-09 |
| 11601473 | Information technology stack security control configuration | Suhas Shivanna, Sridhar Bandi, Yelaka Surya Prakash | 2023-03-07 |
| 11544382 | Regulating messages warning about impacts of firmware changes | Terry Ping-Chung Lee, Kenneth J. Geer | 2023-01-03 |
| 11455396 | Using trusted platform module (TPM) emulator engines to measure firmware images | Suhas Shivanna | 2022-09-27 |
| 11226908 | Securing transactions involving protected memory regions having different permission levels | Dwight D. Riley | 2022-01-18 |
| 10740468 | Multiple roots of trust to verify integrity | Suhas Shivanna, Patrick L. Gibbons, Luis E. Luciani, Jr., Kevin G. Depew | 2020-08-11 |
| 10318736 | Validating operating firmware of a periperhal device | William Norwood Scherer, III | 2019-06-11 |
| 10303883 | Firmware verification through data ports | Nicholas A. Ramirez, Fraser John Dickin | 2019-05-28 |
| 10114747 | Systems and methods for performing operations on memory of a computing device | Scott N. Dunham, Sumeet Kochar | 2018-10-30 |
| 9992205 | Systems and methods for performing operations on a computing device | William Laurence Jaeger, Sumeet Kochar, Doug Oliver, William B. Schwartz | 2018-06-05 |
| 9916476 | Maintaining cryptoprocessor types in a multinode environment | Douglas R. Oliver, Wen Wei Tang | 2018-03-13 |
| 9766900 | Booting a multi-node computer system from a primary node dynamically selected based on security setting criteria | Raghuswamyreddy Gundam | 2017-09-19 |
| 9563497 | Correcting a failure associated with a current firmware image | Scott N. Dunham, Edward J. Klodnicki | 2017-02-07 |
| 9538690 | Data center cooling method with critical device prioritization | Raghuswamyreddy Gundam, Newton P. Liu, Douglas W. Oliver, Wingcheung Tam | 2017-01-03 |
| 9448888 | Preventing a rollback attack in a computing system that includes a primary memory bank and a backup memory bank | Raghuswamyreddy Gundam | 2016-09-20 |
| 9411695 | Provisioning memory in a memory system for mirroring | Raghuswamyreddy Gundam, Newton P. Liu, Douglas W. Oliver, Mehul M. Shah, Wingcheung Tam | 2016-08-09 |
| 9280355 | System with manual actuator for asserting physical presence across multiple compute nodes | Raghuswamyreddy Gundam, Karthik Kolavasi, Newton P. Liu, Douglas W. Oliver, Nicholas A. Ramirez +2 more | 2016-03-08 |
| 9251346 | Preventing propagation of hardware viruses in a computing system | Sudhir Dhawan, Raghuswamyreddy Gundam, Joshua H. Israel, Karthik Kolavasi, Newton P. Liu +3 more | 2016-02-02 |
| 9160542 | Authorizing use of a test key signed build | Lee H. Wilson | 2015-10-13 |
| 9135029 | Securely reconfiguring a multi-node system to prevent firmware rollback | Raghuswamyreddy Gundam | 2015-09-15 |