DD

David M. Durham

IN Intel: 312 patents #19 of 30,777Top 1%
MC Mcafee: 8 patents #131 of 1,127Top 15%
HP HP: 1 patents #8,774 of 16,619Top 55%
📍 Beaverton, OR: #6 of 3,140 inventorsTop 1%
🗺 Oregon: #22 of 28,073 inventorsTop 1%
Overall (All Time): #1,081 of 4,157,543Top 1%
322
Patents All Time

Issued Patents All Time

Showing 276–300 of 322 patents

Patent #TitleCo-InventorsDate
8281122 Generation and/or reception, at least in part, of packet including encrypted payload Men Long, Karanvir S. Grewal 2012-10-02
8261065 Protecting caller function from undesired access by callee function Uday Savagaonkar, Ravi L. Sahita, Subhash Gutti 2012-09-04
8239667 Switching between multiple operating systems (OSes) using sleep state management and sequestered re-baseable memory 2012-08-07
8225101 Cross validation of data using multiple subsystems Travis T. Schluessler, Raj Yavatkar, Vincent J. Zimmer, Carey Smith 2012-07-17
8154987 Self-isolating and self-healing networked devices Raj Yavatkar, Alan Crouch 2012-04-10
8132003 Secure platform voucher service for software components within an execution environment Hormuzd M. Khosravi, Uri Blumenthal, Men Long 2012-03-06
8099574 Providing protected access to critical memory regions Uday Savagaonkar, Travis T. Schluessler, Hormuzd M. Khosravi, Ravi L. Sahita, Gayathri Nagabhushan 2012-01-17
8032660 Apparatus and method for managing subscription requests for a network interface component Ravi L. Sahita, Arun Raghunath, Raj K. Ramanujan, Parthasarathy Sarangam 2011-10-04
7953980 Signed manifest for run-time verification of software program identity and integrity Travis T. Schluessler, George W. Cox, Karanvir Ken S. Grewal 2011-05-31
7882318 Tamper protection of software agents operating in a vitual technology environment methods and apparatuses Uday Savagaonkar, Ravi L. Sahita, Hormuzd M. Khosravi 2011-02-01
7870565 Systems and methods for secure host resource management Tisson Mathew, Travis T. Schluessler, Priya Rajagopal, Hormuzd M. Khosravi 2011-01-11
7865683 Identifier associated with memory locations for managing memory accesses Ravi L. Sahita, Uday Savagaonkar, Priya Rajagopal, Hormuzd M. Khosravi 2011-01-04
7802050 Monitoring a target agent execution pattern on a VT-enabled system Uday Savagaonkar, Ravi L. Sahita 2010-09-21
7797749 Defending against worm or virus attacks on networks Priya Rajagopal, Ravi L. Sahita 2010-09-14
7761674 Identifier associated with memory locations for managing memory accesses Ravi L. Sahita, Uday Savagaonkar, Priya Rajagopal, Hormuzd M. Khosravi 2010-07-20
7757035 Method for optimizing virtualization technology and memory protections using processor-extensions for page table and page directory striping Hormuzd M. Khosravi, Gayathri Nagabhushan, Uday Savagaonkar 2010-07-13
7748037 Validating a memory type modification attempt Priya Rajagopal, Uday Savagaonkar, Ravi L. Sahita, Hormuzd M. Khosravi 2010-06-29
7739724 Techniques for authenticated posture reporting and associated enforcement of network access Ravi L. Sahita, Karanvir S. Grewal, Ned M. Smith, Kapil Sood 2010-06-15
7739517 Hardware-based authentication of a software program Ravi L. Sahita, Travis T. Schluessler, Amir Zinaty 2010-06-15
7703126 Hierarchical trust based posture reporting and policy enforcement Hormuzd M. Khosravi, Karanvir S. Grewal 2010-04-20
7684400 Logarithmic time range-based multifield-correlation packet classification Priya Govindarajan, Chun Chiu 2010-03-23
7653727 Cooperative embedded agents Vincent J. Zimmer, Carey Smith, Raj Yavatkar, Travis T. Schluessler, Dylan Larson +1 more 2010-01-26
7594269 Platform-based identification of host software circumvention Ravi L. Sahita, Priya Rajagopal 2009-09-22
7594124 Cross validation of data using multiple subsystems Travis T. Schluessler, Raj Yavatkar, Vincent J. Zimmer, Carey Smith 2009-09-22
7571298 Systems and methods for host virtual memory reconstitution Hormuzd M. Khosravi, Travis T. Schluessler, Ravi L. Sahita, Uday Savagaonkar, Priya Rajagopal 2009-08-04