| 12095796 |
Instruction-level threat assessment |
Patrice Godefroid, Yijou Chen |
2024-09-17 |
| 9875368 |
Remote authorization of usage of protected data in trusted execution environments |
Shawn Willden |
2018-01-23 |
| 9871786 |
Authenticating communications |
— |
2018-01-16 |
| 9736140 |
Secure authorization for accessing content on a shareable device |
Huahui Wu, Nicolas Catania |
2017-08-15 |
| 9710652 |
Verifying boot process of electronic device |
Adrian Ludwig, Colin Cross, Kenneth Root |
2017-07-18 |
| 9697371 |
Remote authorization of usage of protected data in trusted execution environments |
Shawn Willden |
2017-07-04 |
| 9323916 |
Secure authorization for accessing content on a shareable device |
Huahui Wu, Nicolas Catania |
2016-04-26 |
| 9275006 |
Configuration file updater |
Adrian Ludwig, Nicholas Neil Kralevich, IV |
2016-03-01 |
| 9195831 |
Verified boot |
Adrian Ludwig, Colin Cross, Kenneth Root |
2015-11-24 |
| 9117072 |
Software exploit detection |
Adrian Ludwig, Nicholas Neil Kralevich, IV |
2015-08-25 |
| 8613094 |
Using a honeypot workflow for software review |
Nico Falliere, Richard G. Cannings, Joseph Benjamin Gruver, Jonathan Bruce Larimer, Sebastian Johannes Porst +1 more |
2013-12-17 |
| 8505102 |
Detecting undesirable content |
Richard G. Cannings, Kenneth Root, Sebastian Johannes Porst, Nicholas Neil Kralevich, IV, Adrian Ludwig +1 more |
2013-08-06 |