Issued Patents All Time
Showing 1–25 of 65 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12301631 | Security zone policy enforcement in a cloud infrastructure system | Igor Dozorets, Thoulfekar Alrahem, Jun Tong, Leonid Kuperman, Bala Ganesh Chandran +4 more | 2025-05-13 |
| 12238210 | Keystore service for encryption in a secure service enclave | Kranthi Kumar Bathula, Rakesh Basanta Parida, Ricky Alan Mangus | 2025-02-25 |
| 12231558 | Mechanism to provide customer VCN network encryption using customer-managed keys in network virtualization device | Pradeep Vincent, Jagwinder Singh Brar | 2025-02-18 |
| 12182599 | Mechanism to implement VCN network virtualization in a rack-based switch | Pradeep Vincent, Jagwinder Singh Brar | 2024-12-31 |
| 11856097 | Mechanism to provide customer VCN network encryption using customer-managed keys in network virtualization device | Pradeep Vincent, Jagwinder Singh Brar | 2023-12-26 |
| 11848918 | End-to-end network encryption from customer on-premise network to customer virtual cloud network using customer-managed keys | Pradeep Vincent, Jagwinder Singh Brar | 2023-12-19 |
| 11706260 | Security zone policy enforcement in a cloud infrastructure system | Igor Dozorets, Thoulfekar Alrahem, Jun Tong, Leonid Kuperman, Bala Ganesh Chandran +4 more | 2023-07-18 |
| 11621996 | Computing infrastructure for configurable-quality random data | Andrew Paul Mikulski, Donald L. Bailey, Robert Eric Fitzgerald | 2023-04-04 |
| 11258769 | Provisioning network keys to devices to allow them to provide their identity | Matthew John Campagna, Derek Del Miller, Gregory Branchek Roth | 2022-02-22 |
| 10810015 | Remote attestation of host devices | Rachit Chawla, Jeremy Ryan Volkman, Michael David Marr | 2020-10-20 |
| 10705904 | Detecting anomalous behavior in an electronic environment using hardware-based information | Donald L. Bailey, Richard Weatherly | 2020-07-07 |
| 10579405 | Parallel virtual machine managers | Michael David Marr | 2020-03-03 |
| 10429921 | Datacenter power management optimizations | James R. Hamilton | 2019-10-01 |
| 10409985 | Trusted computing host | Michael David Marr, Eric Jason Brandwine, Donald L. Bailey | 2019-09-10 |
| 10389709 | Securing client-specified credentials at cryptographically attested resources | Andrew J. Doane, Eric Jason Brandwine, Robert Eric Fitzgerald | 2019-08-20 |
| 10348759 | Threat detection and mitigation through run-time introspection and instrumentation | Hassan Sultan, John Schweitzer, Donald L. Bailey, Gregory Branchek Roth | 2019-07-09 |
| 10333903 | Provisioning network keys to devices to allow them to provide their identity | Matthew John Campagna, Derek Del Miller, Gregory Branchek Roth | 2019-06-25 |
| 10303879 | Multi-tenant trusted platform modules | Uwe Dannowski, Derek Del Miller, David Borland, Rahul G. Patel, William Earl | 2019-05-28 |
| 10241804 | Remote attestation of host devices | Rachit Chawla, Jeremy Ryan Volkman, Michael David Marr | 2019-03-26 |
| 10154013 | Updating encrypted cryptographic key | Derek Del Miller | 2018-12-11 |
| 10146935 | Noise injected virtual timer | Rahul G. Patel, William Earl | 2018-12-04 |
| 10116645 | Controlling use of encryption keys | Derek Del Miller, Rahul G. Patel | 2018-10-30 |
| 10104008 | Allocating processor resources based on a task identifier | Rahul G. Patel, William Earl | 2018-10-16 |
| 10055593 | Updating processor microcode | Michael David Marr | 2018-08-21 |
| 10038558 | Cryptographically verified repeatable virtualized computing | Eric Jason Brandwine, Deepak Singh | 2018-07-31 |