Issued Patents All Time
Showing 25 most recent of 73 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12147580 | Provisioning secure/encrypted virtual machines in a cloud infrastructure | Guerney D. H. Hunt, Kenneth A. Goldman, Elaine R. Palmer, Ramachandra N. Pai | 2024-11-19 |
| 11907361 | System and method for supporting secure objects using a memory access control monitor | Richard H. Boivie, Kattamuri Ekanadham, Kenneth A. Goldman, William E. Hall, Guerney D. H. Hunt +5 more | 2024-02-20 |
| 11886989 | System for measuring information leakage of deep learning models | Zhongshu Gu, Heqing Huang, Jialong Zhang, Dong Su, Ian M. Molloy | 2024-01-30 |
| 11816575 | Verifiable deep learning training service | Zhongshu Gu, Heqing Huang, Jialong Zhang, Dong Su, Ian M. Molloy | 2023-11-14 |
| 11748480 | Policy-based detection of anomalous control and data flow paths in an application program | Suresh N. Chari, Ashish Kundu, Ian M. Molloy | 2023-09-05 |
| 11669426 | Kernel-based power consumption and isolation and defense against emerging power attacks | Xing Gao, Zhongshu Gu, Mehmet Kayaalp | 2023-06-06 |
| 11503030 | Service processor and system with secure booting and monitoring of service processor integrity | Patrick J. Callaghan, Kenneth A. Goldman, Guerney D. H. Hunt, Elaine R. Palmer, David R. Safford +3 more | 2022-11-15 |
| 11455569 | Device discovery and classification from encrypted network traffic | Enriquillo Valdez, Pau-Chen Cheng, Ian M. Molloy | 2022-09-27 |
| 11443182 | Privacy enhancing deep learning cloud service using a trusted execution environment | Zhongshu Gu, Heqing Huang, Jialong Zhang, Dong Su, Ian M. Molloy | 2022-09-13 |
| 11263333 | Multi-subject device access authorization | Alaa S. Youssef, Giovanni Pacifici | 2022-03-01 |
| 11178237 | Geolocation-based activation and de-activation of hardware and software functionalities in the cloud | Ashish Kundu | 2021-11-16 |
| 11176255 | Securely booting a service processor and monitoring service processor integrity | Patrick J. Callaghan, Kenneth A. Goldman, Guerney D. H. Hunt, Elaine R. Palmer, David R. Safford +3 more | 2021-11-16 |
| 11095454 | Releasing secret information in a computer system | Kenneth A. Goldman | 2021-08-17 |
| 11095635 | Server authentication using multiple authentication chains | Enriquillo Valdez | 2021-08-17 |
| 11068607 | Protecting cognitive code and client data in a public cloud via deployment of data and executables into a secure partition with persistent data | Richard H. Boivie, Jonathan D. Bradbury, William E. Hall, Guerney D. H. Hunt, Jentje Leenstra +3 more | 2021-07-20 |
| 11025640 | Verification of geolocation of devices in a cloud data center | Ashish Kundu, David R. Safford | 2021-06-01 |
| 10904226 | Secure processing environment for protecting sensitive information | Richard H. Boivie, Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman +4 more | 2021-01-26 |
| 10902121 | Policy-based detection of anomalous control and data flow paths in an application program | Suresh N. Chari, Ashish Kundu, Ian M. Molloy | 2021-01-26 |
| 10904246 | Single channel input multi-factor authentication via separate processing pathways | Suresh N. Chari, Zhongshu Gu, Heqing Huang | 2021-01-26 |
| 10685106 | Protecting cognitive code and client data in a public cloud via deployment of data and executables into a stateless secure partition | Richard H. Boivie, Jonathan D. Bradbury, William E. Hall, Guerney D. H. Hunt, Jentje Leenstra +3 more | 2020-06-16 |
| 10671325 | Selective secure deletion of data in distributed systems and cloud | Ashish Kundu | 2020-06-02 |
| 10628579 | System and method for supporting secure objects using a memory access control monitor | Richard H. Boivie, Kattamuri Ekanadham, Kenneth A. Goldman, William E. Hall, Guerney Douglass Holloway Hunt +5 more | 2020-04-21 |
| 10547596 | Secure processing environment for protecting sensitive information | Richard H. Boivie, Alyson Comer, John C. Dayka, Donna N. Dillenberger, Kenneth A. Goldman +4 more | 2020-01-28 |
| 10546121 | Security within a software-defined infrastructure | Brad L. Brech, Scott W. Crowder, Hubertus Franke, Nagui Halim, Matt R. Hogstrom +5 more | 2020-01-28 |
| 10534911 | Security within a software-defined infrastructure | Brad L. Brech, Scott W. Crowder, Hubertus Franke, Nagui Halim, Matt R. Hogstrom +5 more | 2020-01-14 |