Issued Patents All Time
Showing 51–75 of 76 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10785028 | Protection of keys and sensitive data from attack within microprocessor architecture | Milind B. Girkar, Jason W. Brandt | 2020-09-22 |
| 10769272 | Technology to protect virtual machines from malicious virtual machine managers | David M. Durham, Karanvir S. Grewal, Sergej Deutsch | 2020-09-08 |
| 10706164 | Crypto-enforced capabilities for isolation | David D. Durham, Mingwei Zhang, Vedvyas Shanbhogue | 2020-07-07 |
| 10642711 | Apparatus and method for pausing processor trace for efficient analysis | Beeman C. Strong | 2020-05-05 |
| 10628613 | Cryptographic operations for secure page mapping in a virtual machine environment | — | 2020-04-21 |
| 10558582 | Technologies for execute only transactional memory | David M. Durham, Men Long | 2020-02-11 |
| 10515023 | System for address mapping and translation protection | Ravi L. Sahita, Gilbert Neiger, Vedvyas Shanbhogue, David M. Durham, Andrew V. Anderson +7 more | 2019-12-24 |
| 10452848 | Memory scanning methods and apparatus | David M. Durham, Men Long | 2019-10-22 |
| 10453114 | Selective sharing of user information based on contextual relationship information, such as to crowd-source gifts of interest to a recipient | Rita H. Wouhaybi, Timothy G. COPPERNOLL, Jose K. Sia, JR., Richard T. Beckwith, Maria Bezaitis +2 more | 2019-10-22 |
| 10324863 | Protected memory view for nested page table access by virtual machine guests | David M. Durham, Ravi L. Sahita, Andrew V. Anderson | 2019-06-18 |
| 10216522 | Technologies for indirect branch target security | — | 2019-02-26 |
| 10157277 | Technologies for object-oriented memory management with extended segmentation | Barry E. Huntley, Ravi L. Sahita | 2018-12-18 |
| 10152612 | Cryptographic operations for secure page mapping in a virtual machine environment | — | 2018-12-11 |
| 10104122 | Verified sensor data processing | Scott H. Robinson, Jason Martin, Howard C. Herbert, Karanvir Ken S. Grewal, Keith L. Shippy +1 more | 2018-10-16 |
| 10061918 | System, apparatus and method for filtering memory access logging in a processor | Salmin Sultana, David M. Durham, Karanvir S. Grewal, Ravi L. Sahita | 2018-08-28 |
| 10007784 | Technologies for control flow exploit mitigation using processor trace | Ravi L. Sahita, Beeman C. Strong, Thilo Schmitt, Yuriy Bulygin, Markus T. Metzger | 2018-06-26 |
| 9954950 | Attestable information flow control in computer systems | Scott H. Robinson | 2018-04-24 |
| 9830162 | Technologies for indirect branch target security | — | 2017-11-28 |
| 9805194 | Memory scanning methods and apparatus | David M. Durham, Men Long | 2017-10-31 |
| 9792222 | Validating virtual address translation by virtual machine monitor utilizing address validation structure to validate tentative guest physical address and aborting based on flag in extended page table requiring an expected guest physical address in the address validation structure | Ravi L. Sahita, Gilbert Neiger, David M. Durham, Vedvyas Shanbhogue, Ido Ouziel +3 more | 2017-10-17 |
| 9710393 | Dynamic page table edit control | David M. Durham, Andrew V. Anderson, Gilbert Neiger, Ravi L. Sahita | 2017-07-18 |
| 9703703 | Control of entry into protected memory views | Ravi L. Sahita, Barry E. Huntley, David M. Durham, Vedvyas Shanbhogue | 2017-07-11 |
| 9665373 | Protecting confidential data with transactional processing in execute-only memory | David M. Durham, Barry E. Huntley, Vedvyas Shanbhogue, Ravi L. Sahita, Ravi Rajwar | 2017-05-30 |
| 9501637 | Hardware shadow stack support for legacy guests | Barry E. Huntley | 2016-11-22 |
| 9124635 | Verified sensor data processing | Scott H. Robinson, Jason Martin, Howard C. Herbert, Karanvir Ken S. Grewal, Keith L. Shippy +1 more | 2015-09-01 |