| 11822675 |
Securing customer data and internal register data during hardware checkstops in a multi-tenant environment |
Sachin Gupta, Santosh Balasubramanian, Sandeep Korrapati |
2023-11-21 |
| 11775694 |
Validating and securing non-volatile memory |
Sandeep Korrapati |
2023-10-03 |
| 11194913 |
Unsecure to secure transition of mutable core root of trust |
Sachin Gupta, Sandeep Korrapati, Santosh Balasubramanian, Shakeeb Pasha B.K. |
2021-12-07 |
| 10915332 |
Choosing optimum nodes to boot in multi-node server |
Venkatesh Sainath, Vishwanatha Subbanna, Dhruvaraj Subhashchandran Pillai |
2021-02-09 |
| 10387165 |
Choosing optimum nodes to boot in multi-node server |
Venkatesh Sainath, Vishwanatha Subbanna, Dhruvaraj Subhashchandran Pillai |
2019-08-20 |
| 10241875 |
Switching initial program load responsibility when components fail |
Manish Chowdhary, Nagendra K. Gurram, Deepak Kodihalli |
2019-03-26 |
| 7895362 |
Multiple message source electronic data interchange (EDI) enveloper with batching support |
Rayne Anderson, Ashutosh Arora, Tuan T. Dang, David W. Hixon, Sreedhar Janaswamy |
2011-02-22 |