| 12411858 |
Management of connector services and connected artificial intelligence agents for message senders and recipients |
William DeWeese, John Marshall, Spencer Reagan, Erich Stuntebeck |
2025-09-09 |
| 12393676 |
Secure code execution for artificial intelligence agents |
— |
2025-08-19 |
| 12386994 |
Management of connector services and connected artificial intelligence agents for message senders |
William DeWeese, John Marshall, Spencer Reagan, Erich Stuntebeck |
2025-08-12 |
| 12330997 |
Concrete formulations, structures, and inlays and methods therefore |
— |
2025-06-17 |
| 12277245 |
Dynamic enforcement of management rules associated with artificial intelligence pipeline object providers |
Spencer Reagan, Erich Stuntebeck |
2025-04-15 |
| 12242651 |
Dynamic enforcement of management rules associated with artificial intelligence pipeline object selections |
John Joseph Manton, John Marshall, Spencer Reagan, Erich Stuntebeck |
2025-03-04 |
| 11551379 |
Learning template representation libraries |
Victor Puchkarev |
2023-01-10 |
| 11189050 |
Learning template representation libraries |
Victor Puchkarev |
2021-11-30 |
| 10452469 |
Server performance correction using remote server actions |
Ido Carmel, Abhijit Sawant, Raghvendra Singh, Takashi Arai, Bhaskar Sunkara |
2019-10-22 |
| 10158541 |
Group server performance correction via actions to server subset |
Ido Carmel, Abhijit Sawant, Raghvendra Singh, Sastry Konduri, Takashi Arai |
2018-12-18 |
| 9658917 |
Server performance correction using remote server actions |
Ido Carmel, Abhijit Sawant, Raghvendra Singh, Takashi Arai, Bhaskar Sunkara |
2017-05-23 |
| 9384114 |
Group server performance correction via actions to server subset |
Ido Carmel, Abhi Sawant, Raghvendra Singh, Sastry Konduri, Takashi Arai |
2016-07-05 |
| 8601229 |
Secure memory access system and method |
Christian Ludloff, Kurt Daverman |
2013-12-03 |
| 8359443 |
Secure memory access system and method |
Christian Ludloff, Kurt Daverman |
2013-01-22 |
| 8335930 |
Architecture, system, and method for operating on encrypted and/or hidden information |
Richard C. Johnson, H. Peter Anvin, Linus Torvalds |
2012-12-18 |
| 7966467 |
Secure memory access system and method |
Christian Ludloff, Kurt Daverman |
2011-06-21 |
| 7694151 |
Architecture, system, and method for operating on encrypted and/or hidden information |
Richard C. Johnson, H. Peter Anvin, Linus Torvalds |
2010-04-06 |
| 7681046 |
System with secure cryptographic capabilities using a hardware specific digital secret |
H. Peter Anvin |
2010-03-16 |
| 7634701 |
Method and system for protecting processors from unauthorized debug access |
David Dunn |
2009-12-15 |
| 7496727 |
Secure memory access system and method |
Christian Ludloff, Kurt Daverman |
2009-02-24 |
| 7334173 |
Method and system for protecting processors from unauthorized debug access |
David Dunn |
2008-02-19 |
| 6285869 |
Method for performing replacement of a subscriber identity module (SIM) in a mobile communications network |
John P. Shannon |
2001-09-04 |
| 5679007 |
Portable interface for an electronic smart card |
Jean Marc Potdevin, Bruno Bizet |
1997-10-21 |