Issued Patents All Time
Showing 76–100 of 113 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9786205 | Techniques for enforcing a depth order policy for graphics in a display scene | Uttam Sengupta, Uday Savagaonkar, Siddhartha Chhabra, David M. Durham, Xiaozhu Kang | 2017-10-10 |
| 9781118 | Differentiated containerization and execution of web content based on trust level and other attributes | Hong Li, John B. Vicente | 2017-10-03 |
| 9690928 | Computing platform security methods and apparatus | Paritosh Saxena, Adrian M. M. T. Dunbar, Michael S. Hughes, John Teddy, David M. Durham +4 more | 2017-06-27 |
| 9654453 | Symmetric key distribution framework for the Internet | Divya Naidu Kolar Sunder, Men Long | 2017-05-16 |
| 9652609 | Entry/exit architecture for protected device modules | Xiaozhu Kang, Alpa T. Narendra Trivedi, Siddhartha Chhabra, Uday Savagaonkar, David M. Durham | 2017-05-16 |
| 9525555 | Partitioning access to system resources | Kapil Sood, Kumar N. Dwarakanath, Ioannis T. Schoinas, William A. Stevens, Ned M. Smith | 2016-12-20 |
| 9519803 | Secure environment for graphics processing units | Uday Savagaonkar, David M. Durham, Paul S. Schmitz, Jason Martin, Michael A. Goldsmith +10 more | 2016-12-13 |
| 9501668 | Secure video ouput path | Siddhartha Chhabra, Uday Savagaonkar, David M. Durham, Balaji Vembu, Xiaozhu Kang +3 more | 2016-11-22 |
| 9356969 | Technologies for multi-factor security analysis and runtime control | Hong Li | 2016-05-31 |
| 9342704 | Allocating memory access control policies | Jason Martin, Uday Savagaonkar, Carlos V. Rozas | 2016-05-17 |
| 9319220 | Method and apparatus for secure network enclaves | Karanvir S. Grewal, Men Long | 2016-04-19 |
| 9286245 | Hardware enforced memory access permissions | David M. Durham, Ravi L. Sahita | 2016-03-15 |
| 9286235 | Virtual memory address range register | Gur Hildesheim, Shlomo Raikin, Ittai Anati, Gideon Gerzon, Uday Savagaonkar +3 more | 2016-03-15 |
| 9276745 | Preserving image privacy when manipulated by cloud services | David M. Durham, Men Long, Karanvir S. Grewal, Xiaozhu Kang | 2016-03-01 |
| 9189620 | Protecting a software component using a transition point wrapper | Vedvyas Shanbhogue | 2015-11-17 |
| 9177353 | Secure rendering of display surfaces | Siddhartha Chhabra, Uday Savagaonkar, Michael A. Goldsmith, David M. Durham | 2015-11-03 |
| 9134878 | Device and method for secure user interface gesture processing using processor graphics | Siddhartha Chhabra, Xiaozhu Kang, Xiaoning Li, Uday Savagaonkar, David M. Durham +3 more | 2015-09-15 |
| 9094733 | Methods and systems for cryptographic access control of video | Karanvir S. Grewal, David M. Durham, Xiaozhu Kang, Men Long | 2015-07-28 |
| 9087200 | Method and apparatus to provide secure application execution | Francis X. McKeen, Carlos V. Rozas, Uday Savagaonkar, Simon P. Johnson, Vincent R. Scarlata +16 more | 2015-07-21 |
| 9087202 | Entry/exit architecture for protected device modules | Xiaozhu Kang, Alpa T. Narendra Trivedi, Siddhartha Chhabra, Uday Savagaonkar, David M. Durham | 2015-07-21 |
| 9081947 | Turing test based user authentication and user presence verification system, device, and method | David M. Durham, Ling Huang, Karanvir S. Grewal, Xiaozhu Kang | 2015-07-14 |
| 9015484 | Symmetric key distribution framework for the Internet | Divya Naidu Kolar Sundar, Men Long | 2015-04-21 |
| 8918837 | Web application container for client-level runtime control | Hong Li | 2014-12-23 |
| 8909898 | Copy equivalent protection using secure page flipping for software components within an execution environment | David M. Durham | 2014-12-09 |
| 8776245 | Executing trusted applications with reduced trusted computing base | Ravi L. Sahita, Ulhas Warrier, Ranjit S. Narjala | 2014-07-08 |