Issued Patents All Time
Showing 451–475 of 490 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8844021 | Providing a multi-phase lockstep integrity reporting mechanism | Vedvyas Shanbhogue, Geoffrey S. Strongin, Willard M. Wiseman, David W. Grawrock | 2014-09-23 |
| 8826378 | Techniques for authenticated posture reporting and associated enforcement of network access | David M. Durham, Ravi L. Sahita, Karanvir S. Grewal, Kapil Sood | 2014-09-02 |
| 8762698 | Virtual bus device using management engine | Hormuzd M. Khosravi, Ajith K. Illendula, Yasser Rasheed, Tracie L. Zenti, Bryan K. Jorgensen | 2014-06-24 |
| 8752132 | Methods, apparatuses, and systems for the dynamic evaluation and delegation of network access control | Howard C. Herbert, Karanvir S. Grewal | 2014-06-10 |
| 8745224 | Method and apparatus for dynamic provisioning of an access control policy in a controller hub | — | 2014-06-03 |
| 8726364 | Authentication and access protection of computer boot modules in run-time environments | — | 2014-05-13 |
| 8671439 | Techniques for authenticated posture reporting and associated enforcement of network access | David M. Durham, Ravi L. Sahita, Karanvir S. Grewal, Kapil Sood | 2014-03-11 |
| 8661521 | Controlling a network connection using dual-switching | Howard C. Herbert | 2014-02-25 |
| 8584229 | Methods and apparatus supporting access to physical and virtual trusted platform modules | Tasneem Brutch, Alok Kumar, Murari Kumar, Kalpana M. Roge, Vincent R. Scarlata +2 more | 2013-11-12 |
| 8578161 | Protocol for authenticating functionality in a peripheral device | Steven Wells, Robert W. Strong | 2013-11-05 |
| 8516551 | Providing a multi-phase lockstep integrity reporting mechanism | Vedvyas Shanbhogue, Geoffrey S. Strongin, Willard M. Wiseman, David W. Grawrock | 2013-08-20 |
| 8510569 | Providing integrity verification and attestation in a hidden execution environment | Vedvyas Shanbhogue, Arvind Kumar, Purushottam Goel | 2013-08-13 |
| 8434155 | Pre-boot protected memory channel | Ravi L. Sahita | 2013-04-30 |
| 8422678 | Method, apparatus and system for protecting security keys on a wireless platform | Kapil Sood | 2013-04-16 |
| 8356175 | Methods and apparatus to perform associated security protocol extensions | Rajan Palanivel | 2013-01-15 |
| RE43934 | Method and apparatus to assign trust to a key | — | 2013-01-15 |
| 8300825 | Data encryption and/or decryption by integrated circuit | Nitin V. Sarangdhar, Vincent Edward Von Bokern | 2012-10-30 |
| 8281135 | Enforcing use of chipset key management services for encrypted storage devices | — | 2012-10-02 |
| 8259948 | Virtual TPM key migration using hardware keys | Willard M. Wiseman, Alok Kumar, Tasneem Brutch, Vincent R. Scarlata, Faraz A. Siddiqi | 2012-09-04 |
| 8261054 | Method and apparatus for virtualization of a multi-context hardware trusted platform module (TPM) | — | 2012-09-04 |
| 8249257 | Virtual TPM keys rooted in a hardware TPM | Tasneem Brutch, Alok Kumar, Vincent R. Scarlata, Faraz A. Siddiqi, Willard M. Wiseman | 2012-08-21 |
| 8201239 | Extensible pre-boot authentication | Vincent J. Zimmer | 2012-06-12 |
| 8180923 | Network access control for many-core systems | Jesse Walker, Kapil Sood | 2012-05-15 |
| 8103883 | Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption | — | 2012-01-24 |
| 8086839 | Authentication for resume boot path | Jiewen Yao, Vincent J. Zimmer, Qin Long | 2011-12-27 |