WH

William E. Hall

IBM: 51 patents #1,671 of 70,183Top 3%
TO Tellabs Operations: 2 patents #95 of 307Top 35%
CR Cray Research: 1 patents #105 of 208Top 55%
NG Northrop Grumman: 1 patents #859 of 2,250Top 40%
US United States Steel: 1 patents #107 of 309Top 35%
Microsoft: 1 patents #24,826 of 40,388Top 65%
Overall (All Time): #33,655 of 4,157,543Top 1%
65
Patents All Time

Issued Patents All Time

Showing 25 most recent of 65 patents

Patent #TitleCo-InventorsDate
11907361 System and method for supporting secure objects using a memory access control monitor Richard H. Boivie, Kattamuri Ekanadham, Kenneth A. Goldman, Guerney D. H. Hunt, Bhushan P. Jain +5 more 2024-02-20
11206141 Merging multiple compute nodes with trusted platform modules utilizing provisioned node certificates Timothy R. Block, Elaine R. Palmer, Kenneth A. Goldman, Christopher J. Engel 2021-12-21
11165766 Implementing authentication protocol for merging multiple server nodes with trusted platform modules utilizing provisioned node certificates to support concurrent node add and remove Timothy R. Block, Elaine R. Palmer, Kenneth A. Goldman, Hugo M. Krawczyk, David D. Sanner +3 more 2021-11-02
11068607 Protecting cognitive code and client data in a public cloud via deployment of data and executables into a secure partition with persistent data Richard H. Boivie, Jonathan D. Bradbury, Guerney D. H. Hunt, Jentje Leenstra, Jeb R. Linton +3 more 2021-07-20
10885197 Merging multiple compute nodes with trusted platform modules utilizing authentication protocol with active trusted platform module provisioning Timothy R. Block, Elaine R. Palmer, Kenneth A. Goldman, Christopher J. Engel 2021-01-05
10831889 Secure memory implementation for secure execution of virtual machines Guerney D. H. Hunt, Ronald Nick Kalla, Jentje Leenstra, Paul Mackerras, William J. Starke +1 more 2020-11-10
10802990 Hardware based mandatory access control Guerney D. H. Hunt, Paul A. Karger, Mark F. Mergen, David R. Safford, David C. Toll 2020-10-13
10685106 Protecting cognitive code and client data in a public cloud via deployment of data and executables into a stateless secure partition Richard H. Boivie, Jonathan D. Bradbury, Guerney D. H. Hunt, Jentje Leenstra, Jeb R. Linton +3 more 2020-06-16
10628579 System and method for supporting secure objects using a memory access control monitor Richard H. Boivie, Kattamuri Ekanadham, Kenneth A. Goldman, Guerney Douglass Holloway Hunt, Bhushan P. Jain +5 more 2020-04-21
10474816 Secure memory implementation for secure execution of Virtual Machines Guerney D. H. Hunt, Ronald Nick Kalla, Jentje Leenstra, Paul Mackerras, William J. Starke +1 more 2019-11-12
10452844 Protecting isolated secret data of integrated circuit devices Stefan P. Jackowski 2019-10-22
10387686 Hardware based isolation for secure execution of virtual machines Richard H. Boivie, Bradly G. Frey, Benjamin Herrenschmidt, Guerney D. H. Hunt, Jentje Leenstra +3 more 2019-08-20
10296741 Secure memory implementation for secure execution of virtual machines Guerney D. H. Hunt, Ronald Nick Kalla, Jentje Leenstra, Paul Mackerras, William J. Starke +1 more 2019-05-21
10255463 Secure computer architecture Guerney D. H. Hunt, Paul A. Karger, Mark F. Mergen, David R. Safford, David C. Toll 2019-04-09
10170178 Secure off-chip MRAM John K. DeBrosse, Hillery C. Hunter, Jeffrey A. Stuecheli, Daniel C. Worledge 2019-01-01
9996709 Secure computer architecture Guerney D. H. Hunt, Paul A. Karger, Mark F. Mergen, David R. Safford, David C. Toll 2018-06-12
9779258 Confidential extraction of system internal data Andreas C. Koenig, Cedric Lichtenau, Elaine R. Palmer, Thomas Pflueger, Peter A. Sandon 2017-10-03
9141558 Secure memory control parameters in table look aside buffer data fields and support memory array 2015-09-22
9075644 Secure recursive virtualization Guerney D. H. Hunt, Paul A. Karger, Suzanne K. McIntosh, Mark F. Mergen, David R. Safford +1 more 2015-07-07
8954751 Secure memory control parameters in table look aside buffer data fields and support memory array 2015-02-10
8844718 Bottle shipment packaging and method 2014-09-30
8850557 Processor and data processing method with non-hierarchical computer security enhancements for context states Richard H. Boivie, Guerney D. H. Hunt, Paul A. Karger, Suzanne K. McIntosh, Mark F. Mergen +3 more 2014-09-30
8619979 Physically unclonable function implemented through threshold voltage comparison Joel T. Ficke, Terence B. Hook, Michael A. Sperling, Larry Wissel 2013-12-31
8468337 Secure data transfer over a network Santosh P. Gaur 2013-06-18
8434620 Bottle shipment packaging and method 2013-05-07