Issued Patents All Time
Showing 101–116 of 116 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8458480 | Method and apparatus for binding TPM keys to execution entities | Alexander Iliev, Vincent R. Scarlata | 2013-06-04 |
| 8108668 | Associating a multi-context trusted platform module with distributed platforms | — | 2012-01-31 |
| 7908483 | Method and apparatus for binding TPM keys to execution entities | Alexander Iliev, Vincent R. Scarlata | 2011-03-15 |
| 7827550 | Method and system for measuring a program using a measurement agent | Burzin Daruwala, Mona Vij | 2010-11-02 |
| 7739466 | Method and apparatus for supporting immutable memory | Mona Vij, David Bowler, Christopher J. Clark | 2010-06-15 |
| 7653727 | Cooperative embedded agents | David M. Durham, Vincent J. Zimmer, Carey Smith, Raj Yavatkar, Travis T. Schluessler +1 more | 2010-01-26 |
| 7640543 | Memory isolation and virtualization among virtual machines | Mona Vij, Kumar Ranganathan | 2009-12-29 |
| 7636442 | Method and apparatus for migrating software-based security coprocessors | Vincent R. Scarlata | 2009-12-22 |
| 7590867 | Method and apparatus for providing secure virtualization of a trusted platform module | Vincent R. Scarlata | 2009-09-15 |
| 7587595 | Method and apparatus for providing software-based security coprocessors | Vincent R. Scarlata | 2009-09-08 |
| 7472285 | Apparatus and method for memory encryption with reduced decryption latency | Gary L. Graunke | 2008-12-30 |
| 7380049 | Memory protection within a virtual partition | Priya Rajagopal | 2008-05-27 |
| 7062650 | System and method for verifying integrity of system with multiple components | Virginia Robbins, Lewis V. Rothrock | 2006-06-13 |
| 6725373 | Method and apparatus for verifying the integrity of digital objects using signed manifests | John M. Carbajal, Gary L. Graunke | 2004-04-20 |
| 6105137 | Method and apparatus for integrity verification, authentication, and secure linkage of software modules | Gary L. Graunke | 2000-08-15 |
| 5991399 | Method for securely distributing a conditional use private key to a trusted entity on a remote system | Gary L. Graunke, John M. Carbajal, Richard L. Maliszewski | 1999-11-23 |