RP

Ronald Perez

IBM: 25 patents #4,217 of 70,183Top 7%
IN Intel: 4 patents #8,473 of 30,777Top 30%
AM AMD: 3 patents #3,141 of 9,279Top 35%
CR Cryptography Research: 3 patents #30 of 64Top 50%
AC Applied Micro Circuits: 2 patents #123 of 311Top 40%
RA Rambus: 2 patents #324 of 549Top 60%
Overall (All Time): #82,110 of 4,157,543Top 2%
39
Patents All Time

Issued Patents All Time

Showing 25 most recent of 39 patents

Patent #TitleCo-InventorsDate
12079341 Composable trusted execution environments Kapil Sood, Ioannis T. Schoinas, Yu-Yuan Chen, Raghunandan Makaram, David J. Harriman +3 more 2024-09-03
12050719 Preemption of a container in a secure computation environment Ambuj Kumar, William Craig Rawlings, Denis Alexandrovich Pochuev, Michael Alexander Hamburg, Paul C. Kocher 2024-07-30
11582033 Cryptographic management of lifecycle states Ambuj Kumar 2023-02-14
11520611 Secure public cloud using extended paging and memory integrity David M. Durham, Siddhartha Chhabra, Geoffrey S. Strongin 2022-12-06
11301325 Memory in integrity performance enhancement systems and methods Siddhartha Chhabra, Hsing-Min Chen, Manjula Peddireddy 2022-04-12
11048800 Composable trustworthy execution environments Kapil Sood, Ioannis T. Schoinas, Yu-Yuan Chen, Raghunandan Makaram, David J. Harriman +3 more 2021-06-29
11010494 Preemption of a container in a secure computation environment Ambuj Kumar, William Craig Rawlings, Denis Alexandrovich Pochuev, Michael Alexander Hamburg, Paul C. Kocher 2021-05-18
10897352 Cryptographic management of lifecycle states Ambuj Kumar 2021-01-19
10417453 Preemption of a container in a secure computation environment Ambuj Kumar, William Craig Rawlings, Denis Alexandrovich Pochuev, Michael Alexander Hamburg, Paul C. Kocher 2019-09-17
10242192 Method, system, and program product for remotely attesting to a state of a computer system Stefan Berger, Kenneth A. Goldman, Trent R. Jaeger, Reiner Sailer, Enriquillo Valdez 2019-03-26
9836607 Method, system, and program product for remotely attesting to a state of a computer system Stefan Berger, Kenneth A. Goldman, Trent R. Jaeger, Reiner Sailer, Enriquillo Valdez 2017-12-05
9792448 Cryptographic protection of information in a processing system David A. Kaplan, Thomas R. Woller 2017-10-17
9536092 Method, system, and program product for remotely attesting to a state of a computer system Stefan Berger, Kenneth A. Goldman, Trent R. Jaeger, Reiner Sailer, Enriquillo Valdez 2017-01-03
9298922 Method, system, and program product for remotely attesting to a state of a computer system Stefan Berger, Kenneth A. Goldman, Trenton R. Jaeger, Reiner Sailer, Enriquillo Valdez 2016-03-29
9182999 Reintialization of a processing system from volatile memory upon resuming from a low-power state Andrew W. Lueck, Krishna Sai Bernucho, Alexander J. Branover, Paul Kitchin, Sonu Arora 2015-11-10
8839345 Method for discovering a security policy John L. Griffin, Dimitrios Pendarakis, Reiner Sailer, Enriquillo Valdez 2014-09-16
8707383 Computer workload management with security policy enforcement Steven A. Bade, Andrew G. Kegel, Brian You 2014-04-22
8631212 Input/output memory management unit with protection mode for preventing memory access by I/O devices Andrew G. Kegel, Wei Huang 2014-01-14
8615788 Method and apparatus for scalable integrity attestation in virtualization environments Stefan Berger, Ramon Caceres, Kenneth A. Goldman, Reiner Sailer, Deepa Srinivasan 2013-12-24
8549288 Dynamic creation and hierarchical organization of trusted platform modules Steven A. Bade, Stefan Berger, Kenneth A. Goldman, Reiner Sailer, Leendert Peter Van Doorn 2013-10-01
8374343 DES hardware throughput for short operations Mark Lindemann, Sean William Smith 2013-02-12
8327451 Secure system and method for enforcement of privacy policy and protection of confidentiality Sastry S. Duri, Marco Gruteser, Xuan Liu, Paul A. Moskowitz, Edith Schonberg +3 more 2012-12-04
8185750 Method for extending the CRTM in a trusted platform Steven A. Bade, Leendert Peter Van Doorn, Helmut H. Weber 2012-05-22
8099781 Method of managing and mitigating security risks through planning Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi +9 more 2012-01-17
8087090 Fuzzy multi-level security Pau-Chen Cheng, Shai Halevi, Trent R. Jaeger, Paul A. Karger, Pankaj Rohatgi +3 more 2011-12-27