Issued Patents All Time
Showing 1–15 of 15 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9747118 | Guest-specific microcode | James P. Held, Daniel Baumberger | 2017-08-29 |
| 9172528 | Method and apparatus for allowing software access to navigational data in a decrypted media stream while protecting stream payloads | Keith L. Shippy, Ajit Joshi | 2015-10-27 |
| 8739307 | Method and apparatus for allowing software access to navigational data in a decrypted media stream while protecting stream payloads | Keith L. Shippy, Ajit Joshi | 2014-05-27 |
| 8363831 | Method and apparatus for allowing software access to navigational data in a decrypted media stream while protecting stream payloads | Keith L. Shippy, Ajit Joshi | 2013-01-29 |
| 7181603 | Method of secure function loading | Lewis V. Rothrock | 2007-02-20 |
| 7140005 | Method and apparatus to test an instruction sequence | — | 2006-11-21 |
| 7073200 | Method of providing secure content-based user experience enhancement within a content protection architecture | — | 2006-07-04 |
| 6662060 | Method and apparatus for multimedia playback with title specific parameters | Brendan Traw, James A. Moorer, Alan McPherson, George Lydecker | 2003-12-09 |
| 6205550 | Tamper resistant methods and apparatus | Joseph M. Nardone, Richard P. Mangold, Jody L. Pfotenhauer, Keith L. Shippy, David W. Aucsmith +1 more | 2001-03-20 |
| 6178509 | Tamper resistant methods and apparatus | Joseph M. Nardone, Richard Mangold, Jody L. Pfotenhauer, Keith L. Shippy, David W. Aucsmith +1 more | 2001-01-23 |
| 6175925 | Tamper resistant player for scrambled contents | Joseph M. Nardone, Richard P. Mangold, Jody L. Pfotenhauer, Keith L. Shippy, David W. Aucsmith +1 more | 2001-01-16 |
| 6049609 | Cell array providing non-persistent secret storage through a mutation cycle | — | 2000-04-11 |
| 6021487 | Method and apparatus for providing a signed integer divide by a power of two | — | 2000-02-01 |
| 5991399 | Method for securely distributing a conditional use private key to a trusted entity on a remote system | Gary L. Graunke, John M. Carbajal, Carlos V. Rozas | 1999-11-23 |
| 5974550 | Method for strongly authenticating another process in a different address space | — | 1999-10-26 |