RB

Richard H. Boivie

IBM: 73 patents #977 of 70,183Top 2%
AT AT&T: 2 patents #7,280 of 18,772Top 40%
BL Bell Telephone Laboratories: 1 patents #567 of 1,445Top 40%
📍 Monroe, CT: #3 of 413 inventorsTop 1%
🗺 Connecticut: #199 of 34,797 inventorsTop 1%
Overall (All Time): #24,645 of 4,157,543Top 1%
76
Patents All Time

Issued Patents All Time

Showing 1–25 of 76 patents

Patent #TitleCo-InventorsDate
12204665 Secure execution support for A.I. systems (and other heterogeneous systems) 2025-01-21
12204460 Safe execution of programs that make out-of-bounds references Tong Chen, Alper Buyuktosunoglu, Gururaj Saileshwar 2025-01-21
11983532 Optimize bound information accesses in buffer protection Tong Chen, Alper Buyuktosunoglu 2024-05-14
11966382 Protecting against invalid memory references Tong Chen, Alper Buyuktosunoglu, Gururaj Saileshwar 2024-04-23
11966331 Dedicated bound information register file for protecting against out-of-bounds memory references Tong Chen, Alper Buyuktosunoglu 2024-04-23
11907361 System and method for supporting secure objects using a memory access control monitor Kattamuri Ekanadham, Kenneth A. Goldman, William E. Hall, Guerney D. H. Hunt, Bhushan P. Jain +5 more 2024-02-20
11681806 Protecting against out-of-bounds buffer references Alper Buyuktosunoglu, Tong Chen 2023-06-20
11625171 Hardware support for memory safety with an overflow table Tong Chen, Alper Buyuktosunoglu, Benjamin P. Segal 2023-04-11
11520913 Secure execution support for A.I. systems (and other heterogeneous systems) 2022-12-06
11496285 Cryptographic side channel resistance using permutation networks Daniel J. Friedman, Charanjit Singh Jutla, Ghavam G. Shahidi 2022-11-08
11429590 Protecting against invalid memory references Tong Chen, Alper Buyuktosunoglu, Gururaj Saileshwar 2022-08-30
11356275 Electronically verifying a process flow Enriquillo Valdez, Venkata Sitaramagiridharganesh Ganapavarapu, Jinwook Jung, Gi-Joon Nam, Roman Vaculin +1 more 2022-06-07
11216595 Encryption engine with an undetectable/tamper-proof private key in late node CMOS technology Eduard A. Cartier, Daniel J. Friedman, Kohji Hosokawa, Charanjit Singh Jutla, Wanki Kim +10 more 2022-01-04
11068607 Protecting cognitive code and client data in a public cloud via deployment of data and executables into a secure partition with persistent data Jonathan D. Bradbury, William E. Hall, Guerney D. H. Hunt, Jentje Leenstra, Jeb R. Linton +3 more 2021-07-20
10997321 Encryption engine with an undetectable/tamper proof private key in late node CMOS technology Eduard A. Cartier, Daniel J. Friedman, Kohji Hosokawa, Charanjit Singh Jutla, Wanki Kim +10 more 2021-05-04
10904226 Secure processing environment for protecting sensitive information Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more 2021-01-26
10901918 Constructing flexibly-secure systems in a disaggregated environment HariGovind V. Ramasamy, Eugen Schenfeld, Valentina Salapura, John A. Bivens, Yaoping Ruan +3 more 2021-01-26
10785240 Protecting from unintentional malware download 2020-09-22
10685106 Protecting cognitive code and client data in a public cloud via deployment of data and executables into a stateless secure partition Jonathan D. Bradbury, William E. Hall, Guerney D. H. Hunt, Jentje Leenstra, Jeb R. Linton +3 more 2020-06-16
10628579 System and method for supporting secure objects using a memory access control monitor Kattamuri Ekanadham, Kenneth A. Goldman, William E. Hall, Guerney Douglass Holloway Hunt, Bhushan P. Jain +5 more 2020-04-21
10547596 Secure processing environment for protecting sensitive information Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more 2020-01-28
10523640 Secure processing environment for protecting sensitive information Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more 2019-12-31
10423805 Encryption engine with an undetectable/tamper-proof private key in late node CMOS technology Eduard A. Cartier, Daniel J. Friedman, Kohji Hosokawa, Charanjit Singh Jutla, Wanki Kim +10 more 2019-09-24
10387686 Hardware based isolation for secure execution of virtual machines Bradly G. Frey, William E. Hall, Benjamin Herrenschmidt, Guerney D. H. Hunt, Jentje Leenstra +3 more 2019-08-20
10362045 Protecting from unintentional malware download 2019-07-23