Issued Patents All Time
Showing 76–100 of 124 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8589302 | Automated modular and secure boot firmware update | Gyan Prakash, Saurabh Dadu, Selim Aissi, Duncan Glendinning, Cris Rhodes | 2013-11-19 |
| 8572692 | Method and system for a platform-based trust verifying service for multi-party verification | Divya Naidu Kolar Sunder, David M. Durham, Dan Dahle, Prashant Dewan | 2013-10-29 |
| 8555348 | Hierarchical trust based posture reporting and policy enforcement | David M. Durham, Karanvir S. Grewal | 2013-10-08 |
| 8510760 | Systems and methods for secure host resource management | David M. Durham, Tisson Mathew, Travis T. Schluessler, Priva Rajagopal | 2013-08-13 |
| 8504693 | Method and apparatus for operating system streaming | Yasser Rasheed | 2013-08-06 |
| 8499151 | Secure platform voucher service for software components within an execution environment | David M. Durham, Uri Blumenthal, Men Long | 2013-07-30 |
| 8490189 | Using chipset-based protected firmware for host software tamper detection and protection | Gyan Prakash, Saurabh Dadu, Mousumi Hazra | 2013-07-16 |
| 8489686 | Method and apparatus allowing scan of data storage device from remote server | David M. Durham, David A. Edwards, Venkat R. Gokulrangan, Men Long, Yasser Rasheed | 2013-07-16 |
| 8468279 | Platform based verification of contents of input-output devices | Venkat R. Gokulrangan, Yasser Rasheed, Men Long | 2013-06-18 |
| 8434067 | Method and system for whitelisting software components | Gayathri Nagabhushan, Ravi L. Sahita, Satyajit Grover | 2013-04-30 |
| 8417945 | Detection and reporting of virtualization malware in computer processor environments | David M. Durham | 2013-04-09 |
| 8375430 | Roaming secure authenticated network access method and apparatus | Karanvir S. Grewal, Kapil Sood, Travis T. Schluessler | 2013-02-12 |
| 8364973 | Dynamic generation of integrity manifest for run-time verification of software program | David M. Durham, Prashant Dewan, Ravi L. Sahita, Uday Savagaonkar, Men Long | 2013-01-29 |
| 8341369 | Providing protected access to critical memory regions | Uday Savagaonkar, Travis T. Schluessler, Ravi L. Sahita, Gayathri Nagabhushan, David M. Durham | 2012-12-25 |
| 8332510 | Proxy detection by service processor | Dominic Fulginiti, Avigdor Eldar, Michael Navon | 2012-12-11 |
| 8332631 | Secure software licensing and provisioning using hardware based security engine | Saurabh Dadu, Rajesh Poornachandran, Gyan Prakash, Selim Aissi | 2012-12-11 |
| 8321501 | Secure out-of-band storage control | David A. Edwards, Yasser Rasheed, Divya Naidu Kolar Sunder, Josephe E. Clark | 2012-11-27 |
| 8307175 | Data recovery and overwrite independent of operating system | Mojtaba Mirashrafi, Duncan Glendinning, Gyan Prakash | 2012-11-06 |
| 8286238 | Method and apparatus for run-time in-memory patching of code from a service processor | David M. Durham, Travis T. Schluessler, Ravi L. Sahita, Uday Savagaonkar | 2012-10-09 |
| 8281387 | Method and apparatus for supporting a virtual private network architecture on a partitioned platform | Ajay Gupta, Jeong-Hyon Yoon, Jesse Walker, Kapil Sood, Karanvir S. Grewal | 2012-10-02 |
| 8281043 | Out-of-band access to storage devices through port-sharing hardware | David A. Edwards, Eng Hun Ooi, Venkat R. Gokulrangan, Chai Huat Gan | 2012-10-02 |
| 8281402 | Network vulnerability assessment of a host platform from an isolated partition in the host platform | Ravi L. Sahita, Uday Savagaonkar, Uri Blumenthal | 2012-10-02 |
| 8214902 | Determination by circuitry of presence of authorized and/or malicious data | Vincent Edward Von Bokern, Men Long | 2012-07-03 |
| 8205238 | Platform posture and policy information exchange method and apparatus | Uri Blumenthal, Karanvir S. Grewal | 2012-06-19 |
| 8195146 | Remote management over a wireless wide-area network using short message service | Gyan Prakash, Farid Adrangi, Selim Aissi, Saurabh Dadu | 2012-06-05 |