Issued Patents All Time
Showing 1–25 of 76 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12204665 | Secure execution support for A.I. systems (and other heterogeneous systems) | — | 2025-01-21 |
| 12204460 | Safe execution of programs that make out-of-bounds references | Tong Chen, Alper Buyuktosunoglu, Gururaj Saileshwar | 2025-01-21 |
| 11983532 | Optimize bound information accesses in buffer protection | Tong Chen, Alper Buyuktosunoglu | 2024-05-14 |
| 11966382 | Protecting against invalid memory references | Tong Chen, Alper Buyuktosunoglu, Gururaj Saileshwar | 2024-04-23 |
| 11966331 | Dedicated bound information register file for protecting against out-of-bounds memory references | Tong Chen, Alper Buyuktosunoglu | 2024-04-23 |
| 11907361 | System and method for supporting secure objects using a memory access control monitor | Kattamuri Ekanadham, Kenneth A. Goldman, William E. Hall, Guerney D. H. Hunt, Bhushan P. Jain +5 more | 2024-02-20 |
| 11681806 | Protecting against out-of-bounds buffer references | Alper Buyuktosunoglu, Tong Chen | 2023-06-20 |
| 11625171 | Hardware support for memory safety with an overflow table | Tong Chen, Alper Buyuktosunoglu, Benjamin P. Segal | 2023-04-11 |
| 11520913 | Secure execution support for A.I. systems (and other heterogeneous systems) | — | 2022-12-06 |
| 11496285 | Cryptographic side channel resistance using permutation networks | Daniel J. Friedman, Charanjit Singh Jutla, Ghavam G. Shahidi | 2022-11-08 |
| 11429590 | Protecting against invalid memory references | Tong Chen, Alper Buyuktosunoglu, Gururaj Saileshwar | 2022-08-30 |
| 11356275 | Electronically verifying a process flow | Enriquillo Valdez, Venkata Sitaramagiridharganesh Ganapavarapu, Jinwook Jung, Gi-Joon Nam, Roman Vaculin +1 more | 2022-06-07 |
| 11216595 | Encryption engine with an undetectable/tamper-proof private key in late node CMOS technology | Eduard A. Cartier, Daniel J. Friedman, Kohji Hosokawa, Charanjit Singh Jutla, Wanki Kim +10 more | 2022-01-04 |
| 11068607 | Protecting cognitive code and client data in a public cloud via deployment of data and executables into a secure partition with persistent data | Jonathan D. Bradbury, William E. Hall, Guerney D. H. Hunt, Jentje Leenstra, Jeb R. Linton +3 more | 2021-07-20 |
| 10997321 | Encryption engine with an undetectable/tamper proof private key in late node CMOS technology | Eduard A. Cartier, Daniel J. Friedman, Kohji Hosokawa, Charanjit Singh Jutla, Wanki Kim +10 more | 2021-05-04 |
| 10904226 | Secure processing environment for protecting sensitive information | Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more | 2021-01-26 |
| 10901918 | Constructing flexibly-secure systems in a disaggregated environment | HariGovind V. Ramasamy, Eugen Schenfeld, Valentina Salapura, John A. Bivens, Yaoping Ruan +3 more | 2021-01-26 |
| 10785240 | Protecting from unintentional malware download | — | 2020-09-22 |
| 10685106 | Protecting cognitive code and client data in a public cloud via deployment of data and executables into a stateless secure partition | Jonathan D. Bradbury, William E. Hall, Guerney D. H. Hunt, Jentje Leenstra, Jeb R. Linton +3 more | 2020-06-16 |
| 10628579 | System and method for supporting secure objects using a memory access control monitor | Kattamuri Ekanadham, Kenneth A. Goldman, William E. Hall, Guerney Douglass Holloway Hunt, Bhushan P. Jain +5 more | 2020-04-21 |
| 10547596 | Secure processing environment for protecting sensitive information | Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more | 2020-01-28 |
| 10523640 | Secure processing environment for protecting sensitive information | Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more | 2019-12-31 |
| 10423805 | Encryption engine with an undetectable/tamper-proof private key in late node CMOS technology | Eduard A. Cartier, Daniel J. Friedman, Kohji Hosokawa, Charanjit Singh Jutla, Wanki Kim +10 more | 2019-09-24 |
| 10387686 | Hardware based isolation for secure execution of virtual machines | Bradly G. Frey, William E. Hall, Benjamin Herrenschmidt, Guerney D. H. Hunt, Jentje Leenstra +3 more | 2019-08-20 |
| 10362045 | Protecting from unintentional malware download | — | 2019-07-23 |