Issued Patents All Time
Showing 1–25 of 62 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12361118 | Efficient launching of trusted execution environments | Michael Tsirkin, Nathaniel McCallum | 2025-07-15 |
| 12236221 | Software provisioning agent residing in trusted execution environment | — | 2025-02-25 |
| 12229267 | Management of local signing of software packages using a trusted execution environment | Axel Simon | 2025-02-18 |
| 12199959 | Network bound encryption for orchestrating workloads with sensitive data | Nathaniel McCallum | 2025-01-14 |
| 12169552 | Implementing trusted clients using secure execution environments | Axel Simon, Benjamin Fischer | 2024-12-17 |
| 12169553 | Security broker for consumers of tee-protected services | Lilian Sturmann | 2024-12-17 |
| 12158979 | Security broker with post-provisioned states of the tee-protected services | Lilian Sturmann | 2024-12-03 |
| 12093371 | Data distribution using a trusted execution environment in an untrusted device | — | 2024-09-17 |
| 12069188 | Detection and prevention of unauthorized execution of serverless functions | Huamin Chen | 2024-08-20 |
| 11971980 | Using trusted execution environments to perform a communal operation for mutually-untrusted devices | — | 2024-04-30 |
| 11949775 | Network bound encryption for recovery of trusted execution environments | Nathaniel McCallum | 2024-04-02 |
| 11947659 | Data distribution across multiple devices using a trusted execution environment in a mobile device | — | 2024-04-02 |
| 11886899 | Privacy preserving introspection for trusted execution environments | Michael Tsirkin | 2024-01-30 |
| 11886574 | Using a trusted execution environment for a cryptographic key wrapping scheme that verifies remote device capabilities | Nathaniel McCallum, Peter M. Jones | 2024-01-30 |
| 11856002 | Security broker with consumer proxying for tee-protected services | Lilian Sturmann | 2023-12-26 |
| 11847253 | Efficient launching of trusted execution environments | Michael Tsirkin, Nathaniel McCallum | 2023-12-19 |
| 11848924 | Multi-factor system-to-system authentication using secure execution environments | — | 2023-12-19 |
| 11822641 | Establishing controlled remote access to debug logs | Michael Tsirkin, Andrea Arcangeli | 2023-11-21 |
| 11816205 | Detecting and handling attacks on processes executing within a trusted execution environment | Nathaniel McCallum | 2023-11-14 |
| 11792070 | Dynamic configuration in cloud computing environments | — | 2023-10-17 |
| 11789763 | Adaptive and secure bytecode injection based on comparison with previously stored bytecode | Huamin Chen | 2023-10-17 |
| 11783070 | Managing sensitive information using a trusted platform module | Ricardo Noriega De Soto, Huamin Chen | 2023-10-10 |
| 11741221 | Using a trusted execution environment to enable network booting | Dmitri Pal | 2023-08-29 |
| 11698968 | Management of building of software packages using a trusted execution environment | Axel Simon | 2023-07-11 |
| 11671412 | Network bound encryption for orchestrating workloads with sensitive data | Nathaniel McCallum | 2023-06-06 |