| 11909770 |
Ongoing and on-demand secure verification of audit compliance |
Michael T. Strosaker, Sandra P. Nava, Eric Richter, Jon P. Weiser, Matt Hartenbower |
2024-02-20 |
| 11503030 |
Service processor and system with secure booting and monitoring of service processor integrity |
Patrick J. Callaghan, Kenneth A. Goldman, Guerney D. H. Hunt, Elaine R. Palmer, Dimitrios Pendarakis +3 more |
2022-11-15 |
| 11379349 |
Verifiable testcase workflow |
Ann Barnette Umberhocker, Ariba Siddiqui, Sowmya Janakiraman |
2022-07-05 |
| 11265348 |
Ongoing and on-demand secure verification of audit compliance |
Michael T. Strosaker, Sandra P. Nava, Eric Richter, Jon P. Weiser, Matt Hartenbower |
2022-03-01 |
| 11176255 |
Securely booting a service processor and monitoring service processor integrity |
Patrick J. Callaghan, Kenneth A. Goldman, Guerney D. H. Hunt, Elaine R. Palmer, Dimitrios Pendarakis +3 more |
2021-11-16 |
| 10764613 |
Video media content analysis |
Mike Strosaker, Sandra P. Nava, Eric Richter, Jon P. Weiser, Matt Hartenbower |
2020-09-01 |
| 10754630 |
Build-time code section-specific compiler selection |
Michael T. Strosaker, Nathan D. Fontenot, Christy L. Norman |
2020-08-25 |
| 10733080 |
Automatically establishing significance of static analysis results |
Fionnuala G. Gunter, Christy L. Norman Perez, Michael T. Strosaker |
2020-08-04 |
| 10733081 |
Automatically establishing significance of static analysis results |
Fionnuala G. Gunter, Christy L. Norman Perez, Michael T. Strosaker |
2020-08-04 |
| 10540350 |
Source code search engine |
Nathan D. Fontenot, Fionnuala G. Gunter, Michael T. Strosaker |
2020-01-21 |
| 10528740 |
Securely booting a service processor and monitoring service processor integrity |
Patrick J. Callaghan, Kenneth A. Goldman, Guerney D. H. Hunt, Elaine R. Palmer, Dimitrios Pendarakis +3 more |
2020-01-07 |
| 10397230 |
Service processor and system with secure booting and monitoring of service processor integrity |
Patrick J. Callaghan, Kenneth A. Goldman, Guerney D. H. Hunt, Elaine R. Palmer, Dimitrios Pendarakis +3 more |
2019-08-27 |
| 10262134 |
Detection of key logging activity |
Fionnuala G. Gunter, Christy L. Norman Perez, Michael T. Strosaker |
2019-04-16 |
| 10218689 |
Extending shrouding capability of hosting system |
Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney |
2019-02-26 |
| 10212147 |
Extending shrouding capability of hosting system |
Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney |
2019-02-19 |
| 10095734 |
Source code search engine |
Nathan D. Fontenot, Fionnuala G. Gunter, Michael T. Strosaker |
2018-10-09 |
| 9934270 |
Source code search engine |
Nathan D. Fontenot, Fionnuala G. Gunter, Michael T. Strosaker |
2018-04-03 |
| 9894051 |
Extending shrouding capability of hosting system |
Reinhard T. Buendgen, Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney |
2018-02-13 |
| 9811556 |
Source code search engine |
Nathan D. Fontenot, Fionnuala G. Gunter, Michael T. Strosaker |
2017-11-07 |
| 9594559 |
Binary file for computer program having multiple executable code variants for a function that are executable on a same processor architecture |
Nathan D. Fontenot, Fionnuala G. Gunter, Michael T. Strosaker |
2017-03-14 |
| 9552223 |
Post-return asynchronous code execution |
Nathan D. Fontenot, Robert C. Jennings, Jr., Joel H. Schopp, Michael T. Strosaker |
2017-01-24 |
| 9450974 |
Intrusion management |
Philip F. Estes |
2016-09-20 |
| 9378242 |
Source code search engine |
Nathan D. Fontenot, Fionnuala G. Gunter, Michael T. Strosaker |
2016-06-28 |
| 9201642 |
Extending platform trust during program updates |
Nathan D. Fontenot, Joel H. Schopp, Michael T. Strosaker |
2015-12-01 |
| 9172719 |
Intermediate trust state |
Nathan D. Fontenot, Jeffrey George, Ryan P. Grimm, Joel H. Schopp, Michael T. Strosaker |
2015-10-27 |