CE

Carl M. Ellison

Microsoft: 36 patents #611 of 40,388Top 2%
IN Intel: 32 patents #1,134 of 30,777Top 4%
IS Information Systems: 4 patents #2 of 11Top 20%
CY Cybercash: 1 patents #8 of 11Top 75%
ME Metawork: 1 patents #26 of 97Top 30%
SC Stratus Computer: 1 patents #26 of 72Top 40%
📍 Seattle, WA: #126 of 21,776 inventorsTop 1%
🗺 Washington: #491 of 76,902 inventorsTop 1%
Overall (All Time): #25,116 of 4,157,543Top 1%
76
Patents All Time

Issued Patents All Time

Showing 51–75 of 76 patents

Patent #TitleCo-InventorsDate
7082615 Protecting software environment in isolated execution Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more 2006-07-25
7073071 Platform and method for generating and utilizing a protected audit log Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more 2006-07-04
7013481 Attestation key memory device and bus Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more 2006-03-14
7013484 Managing a secure environment using a chipset in isolated execution mode Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more 2006-03-14
6996710 Platform and method for issuing and certifying a hardware-protected attestation key Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more 2006-02-07
6990579 Platform and method for remote attestation of a platform Howard C. Herbert, David W. Grawrock, Roger Golliver, Derrick C. Lin, Francis X. McKeen +5 more 2006-01-24
6976162 Platform and method for establishing provable identities while maintaining privacy James A. Sutton 2005-12-13
6957332 Managing a secure platform using a hierarchical executive architecture in isolated execution mode Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more 2005-10-18
6941458 Managing a secure platform using a hierarchical executive architecture in isolated execution mode Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more 2005-09-06
6934817 Controlling access to multiple memory zones in an isolated execution environment Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more 2005-08-23
6795905 Controlling accesses to isolated memory using a memory controller for isolated execution Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more 2004-09-21
6769058 Resetting a processor in an isolated execution environment Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more 2004-07-27
6760441 Generating a key hieararchy for use in an isolated execution environment Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more 2004-07-06
6754815 Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more 2004-06-22
6748366 System for protecting anonymity of parties involved in a person-to-person electronic commerce transaction Roger Hurwitz, Tim M. Carver 2004-06-08
6678825 Controlling access to multiple isolated memories in an isolated execution environment Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more 2004-01-13
6633963 Controlling access to multiple memory zones in an isolated execution environment Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more 2003-10-14
6507904 Executing isolated mode instructions in a secure system running in privilege rings Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more 2003-01-14
6073237 Tamper resistant method and apparatus 2000-06-06
5991406 System and method for data recovery Steven B. Lipner, David M. Balenson, Stephen T. Walker 1999-11-23
5956403 System and method for access field verification Steven B. Lipner, David M. Balenson, Stephen T. Walker 1999-09-21
5745573 System and method for controlling access to a user secret Steven B. Lipner, David M. Balenson, Stephen T. Walker 1998-04-28
5640454 System and method for access field verification Steven B. Lipner, David M. Balenson, Stephen T. Walker 1997-06-17
5557346 System and method for key escrow encryption Steven B. Lipner, David M. Balenson, Stephen T. Walker 1996-09-17
5557765 System and method for data recovery Steven B. Lipner, David M. Balenson, Stephen T. Walker 1996-09-17