Issued Patents All Time
Showing 201–225 of 241 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8448222 | Method and apparatus for registering agents onto a virtual machine monitor | Uday Savagankar, Prashant Dewan | 2013-05-21 |
| 8434067 | Method and system for whitelisting software components | Gayathri Nagabhushan, Hormuzd M. Khosravi, Satyajit Grover | 2013-04-30 |
| 8434155 | Pre-boot protected memory channel | Ned M. Smith | 2013-04-30 |
| 8381288 | Restricted component access to application memory | Uday Savagaonkar, Divya Naidu Kolar Sunder | 2013-02-19 |
| 8364973 | Dynamic generation of integrity manifest for run-time verification of software program | Hormuzd M. Khosravi, David M. Durham, Prashant Dewan, Uday Savagaonkar, Men Long | 2013-01-29 |
| 8341369 | Providing protected access to critical memory regions | Uday Savagaonkar, Travis T. Schluessler, Hormuzd M. Khosravi, Gayathri Nagabhushan, David M. Durham | 2012-12-25 |
| 8327359 | Method and apparatus for adaptive integrity measurement of computer software | Uday Savagaonkar | 2012-12-04 |
| 8316211 | Generating multiple address space identifiers per virtual machine to switch between protected micro-contexts | Uday Savagaonkar, Madhavan Parthasarathy, David M. Durham | 2012-11-20 |
| 8286238 | Method and apparatus for run-time in-memory patching of code from a service processor | David M. Durham, Hormuzd M. Khosravi, Travis T. Schluessler, Uday Savagaonkar | 2012-10-09 |
| 8281402 | Network vulnerability assessment of a host platform from an isolated partition in the host platform | Uday Savagaonkar, Hormuzd M. Khosravi, Uri Blumenthal | 2012-10-02 |
| 8261065 | Protecting caller function from undesired access by callee function | Uday Savagaonkar, David M. Durham, Subhash Gutti | 2012-09-04 |
| 8244945 | Efficient handling of interrupts in a computing environment | Vedvyas Shanbhogue, Uday Savagaonkar | 2012-08-14 |
| 8181025 | Method and apparatus for registering agents onto a virtual machine monitor | Uday Savagaonkar, Prashant Dewan | 2012-05-15 |
| 8108856 | Method and apparatus for adaptive integrity measurement of computer software | Uday Savagaonkar | 2012-01-31 |
| 8099574 | Providing protected access to critical memory regions | Uday Savagaonkar, Travis T. Schluessler, Hormuzd M. Khosravi, Gayathri Nagabhushan, David M. Durham | 2012-01-17 |
| 8099718 | Method and system for whitelisting software components | Gayathri Nagabhushan, Hormuzd M. Khosravi, Satyajit Grover | 2012-01-17 |
| 8090919 | System and method for high performance secure access to a trusted platform module on a hardware virtualization platform | Travis T. Schluessler | 2012-01-03 |
| 8042190 | Pre-boot protected memory channel | Ned M. Smith | 2011-10-18 |
| 8032660 | Apparatus and method for managing subscription requests for a network interface component | David M. Durham, Arun Raghunath, Raj K. Ramanujan, Parthasarathy Sarangam | 2011-10-04 |
| 8024797 | Method, apparatus and system for performing access control and intrusion detection on encrypted data | Tobias M. Kohlenberg | 2011-09-20 |
| 7882318 | Tamper protection of software agents operating in a vitual technology environment methods and apparatuses | Uday Savagaonkar, David M. Durham, Hormuzd M. Khosravi | 2011-02-01 |
| 7865683 | Identifier associated with memory locations for managing memory accesses | David M. Durham, Uday Savagaonkar, Priya Rajagopal, Hormuzd M. Khosravi | 2011-01-04 |
| 7802050 | Monitoring a target agent execution pattern on a VT-enabled system | Uday Savagaonkar, David M. Durham | 2010-09-21 |
| 7797749 | Defending against worm or virus attacks on networks | Priya Rajagopal, David M. Durham | 2010-09-14 |
| 7761674 | Identifier associated with memory locations for managing memory accesses | David M. Durham, Uday Savagaonkar, Priya Rajagopal, Hormuzd M. Khosravi | 2010-07-20 |