| 11388008 |
Trusted platform module swarm |
Christoph Vincent Schlameuss, Benno Schuepferling, Dennis Zeisberg, Jakob C. Lang |
2022-07-12 |
| 10936325 |
Resource-based boot sequence |
Reinhard T. Buendgen, Jakob C. Lang, Angel Nunez Mencias |
2021-03-02 |
| 10891170 |
Task grouping by context |
Reinhard T. Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias |
2021-01-12 |
| 10606681 |
Incremental dump with fast reboot |
Reinhard T. Buendgen, Franziska Geisert, Michael Holzheu, Jakob C. Lang, Angel Nunez Mencias |
2020-03-31 |
| 10592255 |
Resource-based boot sequence |
Reinhard T. Buendgen, Jakob C. Lang, Angel Nunez Mencias |
2020-03-17 |
| 10585671 |
Resource-based boot sequence |
Reinhard T. Buendgen, Jakob C. Lang, Angel Nunez Mencias |
2020-03-10 |
| 10585736 |
Incremental dump with fast reboot |
Reinhard T. Buendgen, Franziska Geisert, Michael Holzheu, Jakob C. Lang, Angel Nunez Mencias |
2020-03-10 |
| 10545767 |
Resource-based boot sequence |
Reinhard T. Buendgen, Jakob C. Lang, Angel Nunez Mencias |
2020-01-28 |
| 10416987 |
Updating software in multiple adapter cards |
Gerd Bayer, David G. Chapman, Jakob C. Lang, Angel Nunez Mencias |
2019-09-17 |
| 10168995 |
Extracting entropy from machine vibration |
Reinhard T. Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Budy D. Notohardjono +1 more |
2019-01-01 |
| 10037193 |
Extracting entropy from mobile devices to generate random numbers |
Reinard T. Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Budy D. Notohardjono +1 more |
2018-07-31 |
| 9973496 |
Controlled use of a hardware security module |
Reinhard T. Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez-Mencias |
2018-05-15 |
| 9928080 |
Hardware security module access management in a cloud computing environment |
Reinhard T. Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias |
2018-03-27 |
| 9880812 |
Extracting entropy from machine vibration |
Reinhard T. Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Budy D. Notohardjono +1 more |
2018-01-30 |
| 9836308 |
Hardware security module access management in a cloud computing environment |
Reinhard T. Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias |
2017-12-05 |
| 9767295 |
Content based hardware security module assignment to virtual machines |
Reinhard T. Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias |
2017-09-19 |
| 9767293 |
Content based hardware security module assignment to virtual machines |
Reinhard T. Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias |
2017-09-19 |
| 9542234 |
Task grouping by context |
Reinhard T. Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias |
2017-01-10 |
| 9454346 |
Extracting entropy from the vibration of multiple machines |
Reinhard T. Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Budy D. Notohardjono +1 more |
2016-09-27 |
| 9424102 |
Task grouping by context |
Reinhard T. Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Angel Nunez Mencias |
2016-08-23 |
| 9329836 |
Extracting entropy from the vibration of multiple machines |
Reinhard T. Buendgen, Franziska Geisert, Jakob C. Lang, Mareike Lattermann, Budy D. Notohardjono +1 more |
2016-05-03 |