Issued Patents All Time
Showing 51–75 of 90 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10084598 | Authenticating features of virtual server system | Khary J. Alexander, K. Paul Muller, James A. O'Connor, William J. Rooney, Tiberiu Suto +2 more | 2018-09-25 |
| 10083128 | Generating memory dumps | Utz Bacher, Heiko Carstens, Dominik Dingel | 2018-09-25 |
| 10019279 | Transparent secure interception handling | Utz Bacher, Christian Borntraeger, Dominik Dingel | 2018-07-10 |
| 9998459 | End-to end protection for shrouded virtual servers | Khary J. Alexander, Utz Bacher, Patrick J. Callaghan, John C. Dayka, Thomas B. Mathias +9 more | 2018-06-12 |
| 9973496 | Controlled use of a hardware security module | Volker Boenisch, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez-Mencias | 2018-05-15 |
| 9928080 | Hardware security module access management in a cloud computing environment | Volker Boenisch, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias | 2018-03-27 |
| 9912478 | Authenticating features of virtual server system | Khary J. Alexander, K. Paul Muller, James A. O'Connor, William J. Rooney, Tiberiu Suto +1 more | 2018-03-06 |
| 9894051 | Extending shrouding capability of hosting system | Jeffrey A. Frey, Jeb R. Linton, James A. O'Connor, William J. Rooney, George C. Wilson | 2018-02-13 |
| 9894061 | Method for booting and dumping a confidential image on a trusted computer system | James A. O'Connor, William J. Rooney | 2018-02-13 |
| 9886334 | Processing a guest event in a hypervisor-controlled system | Utz Bacher | 2018-02-06 |
| 9882901 | End-to-end protection for shrouded virtual servers | Khary J. Alexander, Utz Bacher, Patrick J. Callaghan, John C. Dayka, Thomas B. Mathias +9 more | 2018-01-30 |
| 9880812 | Extracting entropy from machine vibration | Volker Boenisch, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Budy D. Notohardjono +1 more | 2018-01-30 |
| 9841987 | Transparent secure interception handling | Utz Bacher, Christian Borntraeger, Dominik Dingel | 2017-12-12 |
| 9836308 | Hardware security module access management in a cloud computing environment | Volker Boenisch, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias | 2017-12-05 |
| 9830208 | Processing a guest event in a hypervisor-controlled system | Utz Bacher | 2017-11-28 |
| 9767295 | Content based hardware security module assignment to virtual machines | Volker Boenisch, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias | 2017-09-19 |
| 9767293 | Content based hardware security module assignment to virtual machines | Volker Boenisch, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias | 2017-09-19 |
| 9720721 | Protected guests in a hypervisor controlled system | Utz Bacher, Heiko Carstens, Dominik Dingel | 2017-08-01 |
| 9720723 | Protected guests in a hypervisor controlled system | Utz Bacher, Heiko Carstens, Dominik Dingel | 2017-08-01 |
| 9690947 | Processing a guest event in a hypervisor-controlled system | Utz Bacher, Einar Lueck | 2017-06-27 |
| 9680653 | Cipher message with authentication instruction | Jonathan D. Bradbury, Dan F. Greiner, Christian Jacobi, Volodymyr Paprotski, Aditya N. Puranik +3 more | 2017-06-13 |
| 9563753 | Method for booting and dumping a confidential image on a trusted computer system | James A. O'Connor, William J. Rooney | 2017-02-07 |
| 9542234 | Task grouping by context | Volker Boenisch, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias | 2017-01-10 |
| 9536095 | System for booting and dumping a confidential image on a trusted computer system | James A. O'Connor, William J. Rooney | 2017-01-03 |
| 9471786 | Method for booting and dumping a confidential image on a trusted computer system | James A. O'Connor, William J. Rooney | 2016-10-18 |