| 11924336 |
Cryptographic artifact generation using virtualized security modules |
Deepak Gupta, Petre Eftime, Madalin Razvan Nastase |
2024-03-05 |
| 11805109 |
Data transfer encryption offloading using session pairs |
Ravi Murty, Hassan Sultan |
2023-10-31 |
| 11630687 |
Compacted context state management |
Leena K. Puthiyedath, Asit K. Mallick, Jim Coke, Michael Mishaeli, Gilbert Neiger +2 more |
2023-04-18 |
| 11374745 |
Key usage tracking using TPM |
— |
2022-06-28 |
| 10735190 |
Persistent TPM-based identifier and key pair |
— |
2020-08-04 |
| 10572395 |
Non-enclave access prevention |
Volodymyr Pikhur |
2020-02-25 |
| 10114952 |
System, apparatus and method for performing secure memory training and management in a trusted environment |
Karunakara Kotary, Rajesh Poornachandran, Vincent J. Zimmer, Sudeep Das |
2018-10-30 |
| 9898330 |
Compacted context state management |
Leena K. Puthiyedath, Asit K. Mallick, Jim Coke, Michael Mishaeli, Gilbert Neiger +2 more |
2018-02-20 |
| 9239801 |
Systems and methods for preventing unauthorized stack pivoting |
Baiju V. Patel, Xiaoning Li, H P. ANVIN, Asit K. Mallick, Gilbert Neiger +5 more |
2016-01-19 |
| 9207940 |
Robust and high performance instructions for system call |
Baiju V. Patel, James B. Crossland, Toby Opferman |
2015-12-08 |