| 10764321 |
Identifying and remediating at-risk resources in a computing environment |
Fred Allison Bower, III, Gary D. Cudak, Ajay Dholakia, William G. Holland |
2020-09-01 |
| 10721067 |
Secure processor for multi-tenant cloud workloads |
Fred Allison Bower, III, William G. Holland, Christopher L. Wood |
2020-07-21 |
| 10417433 |
Encryption and decryption of data owned by a guest operating system |
Fred Allison Bower, III |
2019-09-17 |
| 10114653 |
Multiple-stage bootloader and firmware for baseboard manager controller and primary processing subsystem of computing device |
Fred Allison Bower, III, Ajay Dholakia, Gregory B. Pruett |
2018-10-30 |
| 10097571 |
Tracking cloud workloads to isolate security breach exposure |
Fred Allison Bower, III, Gary D. Cudak, Ajay Dholakia, William G. Holland |
2018-10-09 |
| 10063589 |
Microcheckpointing as security breach detection measure |
Gary D. Cudak, Ajay Dholakia, Fred Allison Bower, III |
2018-08-28 |
| 8171523 |
Embedded email receiver authentication |
Arnold S. Weksler, John Carl Mese, Nathan J. Peterson, Rod D. Waltermann |
2012-05-01 |
| 7845008 |
Virus scanner for journaling file system |
Rod D. Waltermann, John Carl Mese, Mark Charles Davis, Arnold S. Weksler, Nathan J. Peterson |
2010-11-30 |
| 7774829 |
Computer access control using password reset |
Rod D. Waltermann, Mark Charles Davis, John Carl Mese, Nathan J. Peterson, Arnold S. Weksler |
2010-08-10 |