GW

George C. Wilson

IBM: 32 patents #3,111 of 70,183Top 5%
Overall (All Time): #111,424 of 4,157,543Top 3%
32
Patents All Time

Issued Patents All Time

Showing 25 most recent of 32 patents

Patent #TitleCo-InventorsDate
11909770 Ongoing and on-demand secure verification of audit compliance Michael T. Strosaker, Sandra P. Nava, Eric Richter, Jon P. Weiser, Matt Hartenbower 2024-02-20
11503030 Service processor and system with secure booting and monitoring of service processor integrity Patrick J. Callaghan, Kenneth A. Goldman, Guerney D. H. Hunt, Elaine R. Palmer, Dimitrios Pendarakis +3 more 2022-11-15
11379349 Verifiable testcase workflow Ann Barnette Umberhocker, Ariba Siddiqui, Sowmya Janakiraman 2022-07-05
11265348 Ongoing and on-demand secure verification of audit compliance Michael T. Strosaker, Sandra P. Nava, Eric Richter, Jon P. Weiser, Matt Hartenbower 2022-03-01
11176255 Securely booting a service processor and monitoring service processor integrity Patrick J. Callaghan, Kenneth A. Goldman, Guerney D. H. Hunt, Elaine R. Palmer, Dimitrios Pendarakis +3 more 2021-11-16
10764613 Video media content analysis Mike Strosaker, Sandra P. Nava, Eric Richter, Jon P. Weiser, Matt Hartenbower 2020-09-01
10754630 Build-time code section-specific compiler selection Michael T. Strosaker, Nathan D. Fontenot, Christy L. Norman 2020-08-25
10733080 Automatically establishing significance of static analysis results Fionnuala G. Gunter, Christy L. Norman Perez, Michael T. Strosaker 2020-08-04
10733081 Automatically establishing significance of static analysis results Fionnuala G. Gunter, Christy L. Norman Perez, Michael T. Strosaker 2020-08-04
10540350 Source code search engine Nathan D. Fontenot, Fionnuala G. Gunter, Michael T. Strosaker 2020-01-21
10528740 Securely booting a service processor and monitoring service processor integrity Patrick J. Callaghan, Kenneth A. Goldman, Guerney D. H. Hunt, Elaine R. Palmer, Dimitrios Pendarakis +3 more 2020-01-07
10397230 Service processor and system with secure booting and monitoring of service processor integrity Patrick J. Callaghan, Kenneth A. Goldman, Guerney D. H. Hunt, Elaine R. Palmer, Dimitrios Pendarakis +3 more 2019-08-27
10262134 Detection of key logging activity Fionnuala G. Gunter, Christy L. Norman Perez, Michael T. Strosaker 2019-04-16
10218689 Extending shrouding capability of hosting system Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney 2019-02-26
10212147 Extending shrouding capability of hosting system Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney 2019-02-19
10095734 Source code search engine Nathan D. Fontenot, Fionnuala G. Gunter, Michael T. Strosaker 2018-10-09
9934270 Source code search engine Nathan D. Fontenot, Fionnuala G. Gunter, Michael T. Strosaker 2018-04-03
9894051 Extending shrouding capability of hosting system Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney 2018-02-13
9811556 Source code search engine Nathan D. Fontenot, Fionnuala G. Gunter, Michael T. Strosaker 2017-11-07
9594559 Binary file for computer program having multiple executable code variants for a function that are executable on a same processor architecture Nathan D. Fontenot, Fionnuala G. Gunter, Michael T. Strosaker 2017-03-14
9552223 Post-return asynchronous code execution Nathan D. Fontenot, Robert C. Jennings, Jr., Joel H. Schopp, Michael T. Strosaker 2017-01-24
9450974 Intrusion management Philip F. Estes 2016-09-20
9378242 Source code search engine Nathan D. Fontenot, Fionnuala G. Gunter, Michael T. Strosaker 2016-06-28
9201642 Extending platform trust during program updates Nathan D. Fontenot, Joel H. Schopp, Michael T. Strosaker 2015-12-01
9172719 Intermediate trust state Nathan D. Fontenot, Jeffrey George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker 2015-10-27