Issued Patents All Time
Showing 276–300 of 322 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8281122 | Generation and/or reception, at least in part, of packet including encrypted payload | Men Long, Karanvir S. Grewal | 2012-10-02 |
| 8261065 | Protecting caller function from undesired access by callee function | Uday Savagaonkar, Ravi L. Sahita, Subhash Gutti | 2012-09-04 |
| 8239667 | Switching between multiple operating systems (OSes) using sleep state management and sequestered re-baseable memory | — | 2012-08-07 |
| 8225101 | Cross validation of data using multiple subsystems | Travis T. Schluessler, Raj Yavatkar, Vincent J. Zimmer, Carey Smith | 2012-07-17 |
| 8154987 | Self-isolating and self-healing networked devices | Raj Yavatkar, Alan Crouch | 2012-04-10 |
| 8132003 | Secure platform voucher service for software components within an execution environment | Hormuzd M. Khosravi, Uri Blumenthal, Men Long | 2012-03-06 |
| 8099574 | Providing protected access to critical memory regions | Uday Savagaonkar, Travis T. Schluessler, Hormuzd M. Khosravi, Ravi L. Sahita, Gayathri Nagabhushan | 2012-01-17 |
| 8032660 | Apparatus and method for managing subscription requests for a network interface component | Ravi L. Sahita, Arun Raghunath, Raj K. Ramanujan, Parthasarathy Sarangam | 2011-10-04 |
| 7953980 | Signed manifest for run-time verification of software program identity and integrity | Travis T. Schluessler, George W. Cox, Karanvir Ken S. Grewal | 2011-05-31 |
| 7882318 | Tamper protection of software agents operating in a vitual technology environment methods and apparatuses | Uday Savagaonkar, Ravi L. Sahita, Hormuzd M. Khosravi | 2011-02-01 |
| 7870565 | Systems and methods for secure host resource management | Tisson Mathew, Travis T. Schluessler, Priya Rajagopal, Hormuzd M. Khosravi | 2011-01-11 |
| 7865683 | Identifier associated with memory locations for managing memory accesses | Ravi L. Sahita, Uday Savagaonkar, Priya Rajagopal, Hormuzd M. Khosravi | 2011-01-04 |
| 7802050 | Monitoring a target agent execution pattern on a VT-enabled system | Uday Savagaonkar, Ravi L. Sahita | 2010-09-21 |
| 7797749 | Defending against worm or virus attacks on networks | Priya Rajagopal, Ravi L. Sahita | 2010-09-14 |
| 7761674 | Identifier associated with memory locations for managing memory accesses | Ravi L. Sahita, Uday Savagaonkar, Priya Rajagopal, Hormuzd M. Khosravi | 2010-07-20 |
| 7757035 | Method for optimizing virtualization technology and memory protections using processor-extensions for page table and page directory striping | Hormuzd M. Khosravi, Gayathri Nagabhushan, Uday Savagaonkar | 2010-07-13 |
| 7748037 | Validating a memory type modification attempt | Priya Rajagopal, Uday Savagaonkar, Ravi L. Sahita, Hormuzd M. Khosravi | 2010-06-29 |
| 7739724 | Techniques for authenticated posture reporting and associated enforcement of network access | Ravi L. Sahita, Karanvir S. Grewal, Ned M. Smith, Kapil Sood | 2010-06-15 |
| 7739517 | Hardware-based authentication of a software program | Ravi L. Sahita, Travis T. Schluessler, Amir Zinaty | 2010-06-15 |
| 7703126 | Hierarchical trust based posture reporting and policy enforcement | Hormuzd M. Khosravi, Karanvir S. Grewal | 2010-04-20 |
| 7684400 | Logarithmic time range-based multifield-correlation packet classification | Priya Govindarajan, Chun Chiu | 2010-03-23 |
| 7653727 | Cooperative embedded agents | Vincent J. Zimmer, Carey Smith, Raj Yavatkar, Travis T. Schluessler, Dylan Larson +1 more | 2010-01-26 |
| 7594269 | Platform-based identification of host software circumvention | Ravi L. Sahita, Priya Rajagopal | 2009-09-22 |
| 7594124 | Cross validation of data using multiple subsystems | Travis T. Schluessler, Raj Yavatkar, Vincent J. Zimmer, Carey Smith | 2009-09-22 |
| 7571298 | Systems and methods for host virtual memory reconstitution | Hormuzd M. Khosravi, Travis T. Schluessler, Ravi L. Sahita, Uday Savagaonkar, Priya Rajagopal | 2009-08-04 |