Issued Patents All Time
Showing 26–50 of 62 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9792229 | Protecting a memory | Eugene M. Kishinevsky, Siddhartha Chhabra, Jungju Oh, David M. Durham | 2017-10-17 |
| 9710675 | Providing enhanced replay protection for a memory | David M. Durham, Siddhartha Chhabra, Jungju Oh, Eugene M. Kishinevsky | 2017-07-18 |
| 9654453 | Symmetric key distribution framework for the Internet | Divya Naidu Kolar Sunder, Prashant Dewan | 2017-05-16 |
| 9614666 | Encryption interface | Eugene M. Kishinevsky, Uday Savagaonkar, Alpa T. Narendra Trivedi, Siddhartha Chhabra, Baiju V. Patel +2 more | 2017-04-04 |
| 9547772 | Secure vault service for software components within an execution environment | David M. Durham, Hormuzd M. Khosravi, Uri Blumenthal | 2017-01-17 |
| 9524249 | Memory encryption engine integration | Siddhartha Chhabra, Uday Savagaonkar, Edgar Borrayo, Alpa T. Narendra Trivedi, Carlos Ornelas | 2016-12-20 |
| 9442864 | Bridging circuitry between a memory controller and request agents in a system having multiple system memory protection schemes | Uday Savagaonkar, Siddhartha Chhabra, Alpa T. Narendra Trivedi, Carlos Ornelas, Edgar Borrayo +2 more | 2016-09-13 |
| 9361471 | Secure vault service for software components within an execution environment | David M. Durham, Hormuzd M. Khosravi, Uri Blumenthal | 2016-06-07 |
| 9319220 | Method and apparatus for secure network enclaves | Karanvir S. Grewal, Prashant Dewan | 2016-04-19 |
| 9307409 | Apparatus, system and method of protecting domains of a multimode wireless radio transceiver | Farhana Sheikh, Patrick Koeberl, Jesse Walker, Hossein Alavi, Ram Krishnamurthy +1 more | 2016-04-05 |
| 9276745 | Preserving image privacy when manipulated by cloud services | David M. Durham, Karanvir S. Grewal, Prashant Dewan, Xiaozhu Kang | 2016-03-01 |
| 9213653 | Memory integrity | David M. Durham | 2015-12-15 |
| 9092644 | Method and system for protecting memory information in a platform | Alpa T. Narendra Trivedi, David M. Durham, Siddhartha Chhabra, Uday Savagaonkar, Carlos V. Rozas | 2015-07-28 |
| 9094733 | Methods and systems for cryptographic access control of video | Karanvir S. Grewal, David M. Durham, Xiaozhu Kang, Prashant Dewan | 2015-07-28 |
| 9069961 | Platform based verification of contents of input-output devices | Hormuzd M. Khosravi, Venkat R. Gokulrangan, Yasser Rasheed | 2015-06-30 |
| 9064116 | Techniques for security management provisioning at a data storage device | Nicholas D. Triantafillou, Paritosh Saxena, Robert W. Strong, Richard J. Heiler, Eliezer Tamir +10 more | 2015-06-23 |
| 9053346 | Low-overhead cryptographic method and apparatus for providing memory confidentiality, integrity and replay protection | Siddhartha Chhabra, Uday Savagaonkar, Carlos V. Rozas, Alpa T. Narendra Trivedi, David M. Durham | 2015-06-09 |
| 9015484 | Symmetric key distribution framework for the Internet | Divya Naidu Kolar Sundar, Prashant Dewan | 2015-04-21 |
| 8903084 | Efficient key derivation for end-to-end network security with traffic visibility | Jesse Walker, Karanvir S. Grewal | 2014-12-02 |
| 8873746 | Establishing, at least in part, secure communication channel between nodes so as to permit inspection, at least in part, of encrypted communication carried out, at least in part, between the nodes | Karanvir S. Grewal | 2014-10-28 |
| 8839450 | Secure vault service for software components within an execution environment | David M. Durham, Hormuzd M. Khosravi, Uri Blumenthal | 2014-09-16 |
| 8826035 | Cumulative integrity check value (ICV) processor based memory content protection | David M. Durham, Uday Savagaonkar | 2014-09-02 |
| 8819455 | Parallelized counter tree walk for low overhead memory replay protection | Siddhartha Chhabra, Uday Savagaonkar, David M. Durham, Niranjan L. Cooray, Carlos V. Rozas +1 more | 2014-08-26 |
| 8799673 | Seamlessly encrypting memory regions to protect against hardware-based attacks | Uday Savagaonkar, Ravi L. Sahita, David M. Durham | 2014-08-05 |
| 8752169 | Botnet spam detection and filtration on the source machine | David M. Durham, Hormuzd M. Khosravi | 2014-06-10 |