| 10749683 |
Technologies for end-to-end biometric-based authentication and platform locality assertion |
Ansuya Negi, Nitin V. Sarangdhar, Ramkumar Venkatachary, Ravi L. Sahita, Scott H. Robinson +1 more |
2020-08-18 |
| 10079684 |
Technologies for end-to-end biometric-based authentication and platform locality assertion |
Ansuya Negi, Nitin V. Sarangdhar, Ramkumar Venkatachary, Ravi L. Sahita, Scott H. Robinson +1 more |
2018-09-18 |
| 9838367 |
Binding a trusted input session to a trusted output session |
Siddhartha Chhabra, Prashant Dewan, Reshma Lal |
2017-12-05 |
| 9525668 |
Face based secure messaging |
Abhilasha Bhargav-Spantzel, Ned M. Smith, Hormuzd M. Khosravi |
2016-12-20 |
| 9430296 |
System partitioning to present software as platform level functionality via inter-partition bridge including reversible mode logic to switch between initialization, configuration, and execution mode |
Stephen J. Tolopka, David A. Koufaty, John I. Garney, Yasser Rasheed, Matthew E. Hoekstra |
2016-08-30 |
| 9092632 |
Platform firmware armoring technology |
Allen R. Wishman, Sergiu D. Ghetie, Michael Neve de Mevergnies, Adil Karrar, Douglas R. Moran +1 more |
2015-07-28 |
| 8776245 |
Executing trusted applications with reduced trusted computing base |
Ravi L. Sahita, Prashant Dewan, Ranjit S. Narjala |
2014-07-08 |
| 8522322 |
Platform firmware armoring technology |
Allen R. Wishman, Sergiu D. Ghetie, Michael Neve de Mevergnies, Adil Karrar, Douglas R. Moran +1 more |
2013-08-27 |
| 8479208 |
System partitioning to present software as platform level functionality including mode logic to maintain and enforce partitioning in first and configure partitioning in second mode |
Stephen J. Tolopka, David A. Koufaty, John I. Garney, Yasser Rasheed, Matthew E. Hoekstra |
2013-07-02 |
| 8041920 |
Partitioning memory mapped device configuration space |
David A. Konfaty, John I. Garney, Kiran S. Panesar |
2011-10-18 |
| 7992151 |
Methods and apparatuses for core allocations |
Omesh Tickoo |
2011-08-02 |
| 7966458 |
Method and apparatus for controlling a primary operating system and an appliance operating system on the same machine |
Ram Chary, Hani Elgebaly |
2011-06-21 |
| 7437474 |
Proxy-less packet routing between private and public address realms |
Prakash Iyer |
2008-10-14 |
| 7406583 |
Autonomic computing utilizing a sequestered processing resource on a host CPU |
Rajesh Madukkarumukumana |
2008-07-29 |
| 7293108 |
Generic external proxy |
Saul Lewites, Rameshkumar G. Illikkal, Ramanan Ganesan |
2007-11-06 |
| 7120701 |
Assigning a source address to a data packet based on the destination of the data packet |
Saul Lewites, Prakash Iyer |
2006-10-10 |
| 7096495 |
Network session management |
Prakash Iyer |
2006-08-22 |
| 7010608 |
System and method for remotely accessing a home server while preserving end-to-end security |
Ajay Garg |
2006-03-07 |
| 6662233 |
System dynamically translates translation information corresponding to a version of a content element having a bandwidth corresponding to bandwidth capability of a recipient |
Mark Skarpness, Ryan R. Manepally, Jeffrey W. Einarson, Holland J. Wood |
2003-12-09 |