PK

Paul A. Karger

IBM: 22 patents #4,909 of 70,183Top 7%
DE Digital Equipment: 6 patents #178 of 2,100Top 9%
Overall (All Time): #138,430 of 4,157,543Top 4%
28
Patents All Time

Issued Patents All Time

Showing 25 most recent of 28 patents

Patent #TitleCo-InventorsDate
10802990 Hardware based mandatory access control William E. Hall, Guerney D. H. Hunt, Mark F. Mergen, David R. Safford, David C. Toll 2020-10-13
10255463 Secure computer architecture William E. Hall, Guerney D. H. Hunt, Mark F. Mergen, David R. Safford, David C. Toll 2019-04-09
9996709 Secure computer architecture William E. Hall, Guerney D. H. Hunt, Mark F. Mergen, David R. Safford, David C. Toll 2018-06-12
9075644 Secure recursive virtualization William E. Hall, Guerney D. H. Hunt, Suzanne K. McIntosh, Mark F. Mergen, David R. Safford +1 more 2015-07-07
8850557 Processor and data processing method with non-hierarchical computer security enhancements for context states Richard H. Boivie, William E. Hall, Guerney D. H. Hunt, Suzanne K. McIntosh, Mark F. Mergen +3 more 2014-09-30
8301863 Recursive logical partition real memory map William E. Hall, Guerney D. H. Hunt, Mark F. Mergen, David R. Safford 2012-10-30
8286164 Secure recursive virtualization William E. Hall, Guerney D. H. Hunt, Suzanne K. McIntosh, Mark F. Mergen, David R. Safford +1 more 2012-10-09
8276192 System and method for security planning with hard security constraints Kay S. Anderson, Pau-Chen Cheng, Genady Grabarnik, Marc Lelarge, Zhen Liu +4 more 2012-09-25
8135937 Logical partition memory William E. Hall, Guerney D. H. Hunt, Mark F. Mergen, David R. Safford, David C. Toll 2012-03-13
8135766 Method, apparatus and system for resistance to side channel attacks on random number generators Suresh N. Chari, Vincenzo V. Diluoffo, Elaine R. Palmer, Tal Rabin, Josyula R. Rao +4 more 2012-03-13
8099781 Method of managing and mitigating security risks through planning Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi +9 more 2012-01-17
8087090 Fuzzy multi-level security Pau-Chen Cheng, Shai Halevi, Trent R. Jaeger, Ronald Perez, Pankaj Rohatgi +3 more 2011-12-27
7861305 Method and system for hardware based program flow monitor for embedded software Suzanne K. McIntosh, Daniel Brand, Matthew Kaplan, Michael McIntosh, Elaine R. Palmer +3 more 2010-12-28
7832007 Method of managing and mitigating security risks through planning Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi +9 more 2010-11-09
7530110 System and method for fuzzy multi-level security Pau-Chen Cheng, Shai Halevi, Trent R. Jaeger, Ronald Perez, Pankaj Rohatgi +3 more 2009-05-05
7496616 Method, apparatus and system for resistance to side channel attacks on random number generators Suresh N. Chari, Vincenzo V. Diluoffo, Elaine R. Palmer, Tal Rabin, Josyula R. Rao +4 more 2009-02-24
6430561 Security policy for protection of files on a storage device Vernon Ralph Austel, David C. Toll 2002-08-06
6052469 Interoperable cryptographic key recovery system with verification by comparison Donald B. Johnson, Charles W. Kaufman, Stephen M. Matyas, David R. Safford, Marcel Mordechay Yung +1 more 2000-04-18
5937066 Two-phase cryptographic key recovery system Rosario Gennaro, Donald B. Johnson, Stephen M. Matyas, Mohammad Peyravian, David R. Safford +2 more 1999-08-10
5907618 Method and apparatus for verifiably providing key recovery information in a cryptographic system Rosario Gennaro, Stephen M. Matyas, Mohammad Peyravian, David R. Safford, Nevenko Zunic 1999-05-25
5815573 Cryptographic key recovery system Donald B. Johnson, Charles W. Kaufman, Stephen M. Matyas, Marcel Mordechay Yung, Nevenko Zunic 1998-09-29
5796830 Interoperable cryptographic key recovery system Donald B. Johnson, Charles W. Kaufman, Stephen M. Matyas, David R. Safford, Marcel Mordechay Yung +1 more 1998-08-18
5339449 System and method for reducing storage channels in disk systems Andrew H. Mason, John Clay Richard Wray, Paul T. Robinson, Anthony L. Priborsky, Clifford E. Kahn +1 more 1994-08-16
5220661 System and method for reducing timing channels in digital data processing systems Wei-Ming Hu, Clifford E. Kahn, Andrew H. Mason, Paul T. Robinson, John Clay Richard Wray 1993-06-15
5210874 Cross-domain call system in a capability based digital data processing system 1993-05-11