| 8549592 |
Establishing virtual endorsement credentials for dynamically generated endorsement keys in a trusted computing platform |
Steven A. Bade, James Hoff, James Peter Ward, Helmut H. Weber |
2013-10-01 |
| 8532288 |
Selectively isolating processor elements into subsets of processor elements |
Camil Fayad, John K. Li, Phil C. Yeh |
2013-09-10 |
| 7996687 |
Product for providing a scalable trusted platform module in a hypervisor environment |
Richard Louis Arndt, Steven A. Bade, Thomas J. Dewkett, Charles W. Gainey, Jr., Nia Letise Kelley +1 more |
2011-08-09 |
| 7890559 |
Forward shifting of processor element processing for load balancing |
Camil Fayad, John K. Li, Tamas Visegrady |
2011-02-15 |
| 7873830 |
Methods for coordinating access to memory from at least two cryptography secure processing units |
Camil Fayad, John K. Li |
2011-01-18 |
| 7870395 |
Load balancing for a system of cryptographic processors |
Thomas J. Dewkett, Camil Fayad, John K. Li, Phil C. Yeh |
2011-01-11 |
| 7818574 |
System and method for providing dynamically authorized access to functionality present on an integrated circuit chip |
Camil Fayad, John K. Li |
2010-10-19 |
| 7783864 |
Vertical and horizontal pipelining in a system for performing modular multiplication |
Camil Fayad, John K. Li, Tamas Visegrady |
2010-08-24 |
| 7624283 |
Protocol for trusted platform module recovery through context checkpointing |
Steven A. Bade, Thomas J. Dewkett, Nia Letise Kelley, Helmut H. Weber |
2009-11-24 |
| 7478246 |
Method for providing a scalable trusted platform module in a hypervisor environment |
Richard Louis Arndt, Steven A. Bade, Thomas J. Dewkett, Charles W. Gainey, Jr., Nia Letise Kelley +1 more |
2009-01-13 |