Issued Patents All Time
Showing 25 most recent of 65 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11907361 | System and method for supporting secure objects using a memory access control monitor | Richard H. Boivie, Kattamuri Ekanadham, Kenneth A. Goldman, Guerney D. H. Hunt, Bhushan P. Jain +5 more | 2024-02-20 |
| 11206141 | Merging multiple compute nodes with trusted platform modules utilizing provisioned node certificates | Timothy R. Block, Elaine R. Palmer, Kenneth A. Goldman, Christopher J. Engel | 2021-12-21 |
| 11165766 | Implementing authentication protocol for merging multiple server nodes with trusted platform modules utilizing provisioned node certificates to support concurrent node add and remove | Timothy R. Block, Elaine R. Palmer, Kenneth A. Goldman, Hugo M. Krawczyk, David D. Sanner +3 more | 2021-11-02 |
| 11068607 | Protecting cognitive code and client data in a public cloud via deployment of data and executables into a secure partition with persistent data | Richard H. Boivie, Jonathan D. Bradbury, Guerney D. H. Hunt, Jentje Leenstra, Jeb R. Linton +3 more | 2021-07-20 |
| 10885197 | Merging multiple compute nodes with trusted platform modules utilizing authentication protocol with active trusted platform module provisioning | Timothy R. Block, Elaine R. Palmer, Kenneth A. Goldman, Christopher J. Engel | 2021-01-05 |
| 10831889 | Secure memory implementation for secure execution of virtual machines | Guerney D. H. Hunt, Ronald Nick Kalla, Jentje Leenstra, Paul Mackerras, William J. Starke +1 more | 2020-11-10 |
| 10802990 | Hardware based mandatory access control | Guerney D. H. Hunt, Paul A. Karger, Mark F. Mergen, David R. Safford, David C. Toll | 2020-10-13 |
| 10685106 | Protecting cognitive code and client data in a public cloud via deployment of data and executables into a stateless secure partition | Richard H. Boivie, Jonathan D. Bradbury, Guerney D. H. Hunt, Jentje Leenstra, Jeb R. Linton +3 more | 2020-06-16 |
| 10628579 | System and method for supporting secure objects using a memory access control monitor | Richard H. Boivie, Kattamuri Ekanadham, Kenneth A. Goldman, Guerney Douglass Holloway Hunt, Bhushan P. Jain +5 more | 2020-04-21 |
| 10474816 | Secure memory implementation for secure execution of Virtual Machines | Guerney D. H. Hunt, Ronald Nick Kalla, Jentje Leenstra, Paul Mackerras, William J. Starke +1 more | 2019-11-12 |
| 10452844 | Protecting isolated secret data of integrated circuit devices | Stefan P. Jackowski | 2019-10-22 |
| 10387686 | Hardware based isolation for secure execution of virtual machines | Richard H. Boivie, Bradly G. Frey, Benjamin Herrenschmidt, Guerney D. H. Hunt, Jentje Leenstra +3 more | 2019-08-20 |
| 10296741 | Secure memory implementation for secure execution of virtual machines | Guerney D. H. Hunt, Ronald Nick Kalla, Jentje Leenstra, Paul Mackerras, William J. Starke +1 more | 2019-05-21 |
| 10255463 | Secure computer architecture | Guerney D. H. Hunt, Paul A. Karger, Mark F. Mergen, David R. Safford, David C. Toll | 2019-04-09 |
| 10170178 | Secure off-chip MRAM | John K. DeBrosse, Hillery C. Hunter, Jeffrey A. Stuecheli, Daniel C. Worledge | 2019-01-01 |
| 9996709 | Secure computer architecture | Guerney D. H. Hunt, Paul A. Karger, Mark F. Mergen, David R. Safford, David C. Toll | 2018-06-12 |
| 9779258 | Confidential extraction of system internal data | Andreas C. Koenig, Cedric Lichtenau, Elaine R. Palmer, Thomas Pflueger, Peter A. Sandon | 2017-10-03 |
| 9141558 | Secure memory control parameters in table look aside buffer data fields and support memory array | — | 2015-09-22 |
| 9075644 | Secure recursive virtualization | Guerney D. H. Hunt, Paul A. Karger, Suzanne K. McIntosh, Mark F. Mergen, David R. Safford +1 more | 2015-07-07 |
| 8954751 | Secure memory control parameters in table look aside buffer data fields and support memory array | — | 2015-02-10 |
| 8844718 | Bottle shipment packaging and method | — | 2014-09-30 |
| 8850557 | Processor and data processing method with non-hierarchical computer security enhancements for context states | Richard H. Boivie, Guerney D. H. Hunt, Paul A. Karger, Suzanne K. McIntosh, Mark F. Mergen +3 more | 2014-09-30 |
| 8619979 | Physically unclonable function implemented through threshold voltage comparison | Joel T. Ficke, Terence B. Hook, Michael A. Sperling, Larry Wissel | 2013-12-31 |
| 8468337 | Secure data transfer over a network | Santosh P. Gaur | 2013-06-18 |
| 8434620 | Bottle shipment packaging and method | — | 2013-05-07 |