Issued Patents All Time
Showing 51–75 of 76 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 7082615 | Protecting software environment in isolated execution | Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more | 2006-07-25 |
| 7073071 | Platform and method for generating and utilizing a protected audit log | Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more | 2006-07-04 |
| 7013481 | Attestation key memory device and bus | Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more | 2006-03-14 |
| 7013484 | Managing a secure environment using a chipset in isolated execution mode | Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more | 2006-03-14 |
| 6996710 | Platform and method for issuing and certifying a hardware-protected attestation key | Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more | 2006-02-07 |
| 6990579 | Platform and method for remote attestation of a platform | Howard C. Herbert, David W. Grawrock, Roger Golliver, Derrick C. Lin, Francis X. McKeen +5 more | 2006-01-24 |
| 6976162 | Platform and method for establishing provable identities while maintaining privacy | James A. Sutton | 2005-12-13 |
| 6957332 | Managing a secure platform using a hierarchical executive architecture in isolated execution mode | Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more | 2005-10-18 |
| 6941458 | Managing a secure platform using a hierarchical executive architecture in isolated execution mode | Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more | 2005-09-06 |
| 6934817 | Controlling access to multiple memory zones in an isolated execution environment | Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more | 2005-08-23 |
| 6795905 | Controlling accesses to isolated memory using a memory controller for isolated execution | Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more | 2004-09-21 |
| 6769058 | Resetting a processor in an isolated execution environment | Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more | 2004-07-27 |
| 6760441 | Generating a key hieararchy for use in an isolated execution environment | Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more | 2004-07-06 |
| 6754815 | Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set | Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more | 2004-06-22 |
| 6748366 | System for protecting anonymity of parties involved in a person-to-person electronic commerce transaction | Roger Hurwitz, Tim M. Carver | 2004-06-08 |
| 6678825 | Controlling access to multiple isolated memories in an isolated execution environment | Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more | 2004-01-13 |
| 6633963 | Controlling access to multiple memory zones in an isolated execution environment | Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more | 2003-10-14 |
| 6507904 | Executing isolated mode instructions in a secure system running in privilege rings | Roger Golliver, Howard C. Herbert, Derrick C. Lin, Francis X. McKeen, Gilbert Neiger +4 more | 2003-01-14 |
| 6073237 | Tamper resistant method and apparatus | — | 2000-06-06 |
| 5991406 | System and method for data recovery | Steven B. Lipner, David M. Balenson, Stephen T. Walker | 1999-11-23 |
| 5956403 | System and method for access field verification | Steven B. Lipner, David M. Balenson, Stephen T. Walker | 1999-09-21 |
| 5745573 | System and method for controlling access to a user secret | Steven B. Lipner, David M. Balenson, Stephen T. Walker | 1998-04-28 |
| 5640454 | System and method for access field verification | Steven B. Lipner, David M. Balenson, Stephen T. Walker | 1997-06-17 |
| 5557346 | System and method for key escrow encryption | Steven B. Lipner, David M. Balenson, Stephen T. Walker | 1996-09-17 |
| 5557765 | System and method for data recovery | Steven B. Lipner, David M. Balenson, Stephen T. Walker | 1996-09-17 |