Issued Patents All Time
Showing 25 most recent of 28 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12346674 | Attestation of operations by tool chains | Vincent R. Scarlata, Alpa Trivedi, Reshma Lal, Marcela S. Melara, Anjo Lucas Vahldiek-Oberwagner | 2025-07-01 |
| 11687292 | Data update management in a cloud computing environment | Ryan James Goss, David Scott Ebsen, Mark Allen Gaertner, Antoine Khoueir | 2023-06-27 |
| 11650800 | Attestation of operations by tool chains | Vincent R. Scarlata, Alpa Trivedi, Reshma Lal, Marcela S. Melara, Anjo Lucas Vahldiek-Oberwagner | 2023-05-16 |
| 10922088 | Processor instruction support to defeat side-channel attacks | Fangfei Liu, Bin Xing, Mona Vij, Carlos V. Rozas, Francis X. McKeen +4 more | 2021-02-16 |
| 10430084 | Multi-tiered memory with different metadata levels | Ryan James Goss, Mark Allen Gaertner | 2019-10-01 |
| 10089487 | Masking query data access pattern in encrypted data | Charles D. Cash, Stanislaw Jarecki, Charanjit Singh Jutla, Hugo M. Krawczyk, Marcel-Catalin Rosu | 2018-10-02 |
| 9892798 | Data protection for unexpected power loss | Jon D. Trantham, Antoine Khoueir | 2018-02-13 |
| 9852306 | Conjunctive search in encrypted data | Charles D. Cash, Stanislaw Jarecki, Charanjit Singh Jutla, Hugo M. Krawczyk, Marcel-Catalin Rosu | 2017-12-26 |
| 9807060 | Governed routing of enterprise data in hybrid mobile applications | Palanivel A. Kodeswaran, Prasad G. Naldurg, Venkatraman Ramakrishna, Arvind Seshadri | 2017-10-31 |
| 9646166 | Masking query data access pattern in encrypted data | Charles D. Cash, Stanislaw Jarecki, Charanjit Singh Jutla, Hugo M. Krawczyk, Marcel-Catalin Rosu | 2017-05-09 |
| 9552288 | Multi-tiered memory with different metadata levels | Ryan James Goss, Mark Allen Gaertner | 2017-01-24 |
| 9424946 | Non-volatile buffering to enable sloppy writes and fast write verification | Kevin A. Gomez, Mark Allen Gaertner, Ryan James Goss | 2016-08-23 |
| 9367262 | Assigning a weighting to host quality of service indicators | Ryan James Goss, Mark Allen Gaertner, David Scott Ebsen | 2016-06-14 |
| 9299402 | Mobile personalized boot data | David Scott Ebsen, Ara Patapoutian, Kevin A. Gomez | 2016-03-29 |
| 8135766 | Method, apparatus and system for resistance to side channel attacks on random number generators | Suresh N. Chari, Vincenzo V. Diluoffo, Paul A. Karger, Elaine R. Palmer, Tal Rabin +4 more | 2012-03-13 |
| 8108683 | Mitigating dictionary attacks on password-protected local storage | Ran Canetti, Shai Halevi | 2012-01-31 |
| 8108940 | Method for protecting data from unauthorised access | Daniel Manuel Dias, Matthias Schunter | 2012-01-31 |
| 8099781 | Method of managing and mitigating security risks through planning | Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi +9 more | 2012-01-17 |
| 8087090 | Fuzzy multi-level security | Pau-Chen Cheng, Shai Halevi, Trent R. Jaeger, Paul A. Karger, Ronald Perez +3 more | 2011-12-27 |
| 8020193 | Systems and methods for protecting web based applications from cross site request forgery attacks | Sumeer Kumar Bhola, Todd E. Kaplinger | 2011-09-13 |
| 7832007 | Method of managing and mitigating security risks through planning | Kay S. Anderson, Pau-Chen Cheng, Mark D. Feblowitz, Genady Grabarnik, Shai Halevi +9 more | 2010-11-09 |
| 7530110 | System and method for fuzzy multi-level security | Pau-Chen Cheng, Shai Halevi, Trent R. Jaeger, Paul A. Karger, Ronald Perez +3 more | 2009-05-05 |
| 7496616 | Method, apparatus and system for resistance to side channel attacks on random number generators | Suresh N. Chari, Vincenzo V. Diluoffo, Paul A. Karger, Elaine R. Palmer, Tal Rabin +4 more | 2009-02-24 |
| 7149895 | Personal device, terminal, server and methods for establishing a trustworthy connection between a user and a terminal | Nadarajah Asokan, Herve Debar, Michael Waidner | 2006-12-12 |
| 7039946 | Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a client requests a server to propose a message encoding scheme | Carl Binding, Stefan Georg Hild, Yen-Min Huang, Luke O'Connor, Sandeep K. Singhal +1 more | 2006-05-02 |