Issued Patents All Time
Showing 176–200 of 241 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9275225 | Linear address mapping protection | Rekha N. Bachwani, David M. Durham | 2016-03-01 |
| 9268707 | Low overhead paged memory runtime protection | Xiaoning Li, Manohar R. Castelino | 2016-02-23 |
| 9270643 | State-transition based network intrusion detection | — | 2016-02-23 |
| 9171146 | Method and system for monitoring calls to an application program interface (API) function | Harshawardhan Vipat | 2015-10-27 |
| 9171159 | Performing security operations using binary translation | Palanivelrajan Rajan Shanmugavelayutham, Koichi Yamada, Arvind Krishnaswamy | 2015-10-27 |
| 9158942 | Securing display output data against malicious software attacks | Vinay Phegade, David J. Cowperthwaite | 2015-10-13 |
| 9141559 | Increasing virtual-memory efficiencies | Ramesh Thomas, Kuo-Lang Tseng, David M. Durham, Madhukar Tallam | 2015-09-22 |
| 9037823 | Protecting IAT/EAT hooks from rootkit attacks using new CPU assists | Harshawardhan Vipat | 2015-05-19 |
| 8862853 | System and method for high performance secure access to a trusted platform module on a hardware virtualization platform | Travis T. Schluessler | 2014-10-14 |
| 8839237 | Method and apparatus for tamper resistant communication in a virtualization enabled platform | Uday Savagaonkar, Subhash Gutti | 2014-09-16 |
| 8826378 | Techniques for authenticated posture reporting and associated enforcement of network access | David M. Durham, Karanvir S. Grewal, Ned M. Smith, Kapil Sood | 2014-09-02 |
| 8799673 | Seamlessly encrypting memory regions to protect against hardware-based attacks | Uday Savagaonkar, David M. Durham, Men Long | 2014-08-05 |
| 8776245 | Executing trusted applications with reduced trusted computing base | Ulhas Warrier, Prashant Dewan, Ranjit S. Narjala | 2014-07-08 |
| 8738889 | Generating multiple address space identifiers per virtual machine to switch between protected micro-contexts | Uday Savagaonkar, Madhavan Parthasarathy, David M. Durham | 2014-05-27 |
| 8726404 | Regulating access to and protecting portions of applications of virtual machines | Harshawardhan Vipat, Roshni Chatterjee, Madhukar Tallam | 2014-05-13 |
| 8689349 | Information flow tracking and protection | Michael J. Covington | 2014-04-01 |
| 8671439 | Techniques for authenticated posture reporting and associated enforcement of network access | David M. Durham, Karanvir S. Grewal, Ned M. Smith, Kapil Sood | 2014-03-11 |
| 8645704 | Protecting caller function from undesired access by callee function | Uday Savagaonkar, David M. Durham, Subhash Gutti | 2014-02-04 |
| 8635705 | Computer system and method with anti-malware | David M. Durham, Steve Orrin, Yasser Rasheed, Prasanna Mulgaonkar, Paul S. Schmitz +1 more | 2014-01-21 |
| 8578080 | Secure handling of interrupted events utilizing a virtual interrupt definition table | Xiaoning Li, Manohar R. Castelino | 2013-11-05 |
| 8560806 | Using a multiple stage memory address translation structure to manage protected micro-contexts | David M. Durham, Uday Savagaonkar | 2013-10-15 |
| 8555380 | Automatic modification of executable code | Vedvyas Shanbhogue, Uday Savagaonkar | 2013-10-08 |
| 8479295 | Method and apparatus for transparently instrumenting an application program | David M. Durham, Prashant Dewan, Manohar R. Castelino | 2013-07-02 |
| 8468356 | Software copy protection via protected execution of applications | Uday Savagaonkar, Vedvyas Shanbhogue, Ernest Brickell | 2013-06-18 |
| 8464251 | Method and apparatus for managing page tables from a non-privileged software domain | Uday Savagaonkar, Paul S. Schmitz | 2013-06-11 |