| 11861053 |
Techniques for tamper detection and protection of a memory module |
Shamanna M. Datta, John K. Grooms, Mohamed Arafa |
2024-01-02 |
| 11354415 |
Warm boot attack mitigations for non-volatile memory modules |
Anna Trikalinou, Daniel S. Lake, Sham M. Datta, John K. Grooms |
2022-06-07 |
| 10885202 |
Method and apparatus to provide secure application execution |
Francis X. McKeen, Carlos V. Rozas, Uday Savagaonkar, Simon P. Johnson, Vincent R. Scarlata +16 more |
2021-01-05 |
| 10235526 |
Secure resume from a low power state |
Mark A. Schmisseur |
2019-03-19 |
| 10102380 |
Method and apparatus to provide secure application execution |
Francis X. McKeen, Carlos V. Rozas, Uday Savagaonkar, Simon P. Johnson, Vincent R. Scarlata +16 more |
2018-10-16 |
| 9667628 |
System for establishing ownership of a secure workspace |
Simon P. Johnson, Abhishek Das, Vincent R. Scarlata |
2017-05-30 |
| 9268712 |
Method, system and apparatus for region access control |
Mark A. Schmisseur, Robert C. Swanson, Thomas M. Slaight |
2016-02-23 |
| 9087200 |
Method and apparatus to provide secure application execution |
Francis X. McKeen, Carlos V. Rozas, Uday Savagaonkar, Simon P. Johnson, Vincent R. Scarlata +16 more |
2015-07-21 |
| 7668139 |
Mobile handover utilizing multicast in a multi-protocol label switching (MPLS)-based network |
Henry Mitchel, James Tsai, Gerald Lebizay, Prakash Iyer, Farid Adrangi +1 more |
2010-02-23 |