Issued Patents All Time
Showing 26–50 of 103 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8589888 | Demand-driven analysis of pointers for software program analysis and debugging | Weidong Cui, Zhilei Xu | 2013-11-19 |
| 8589701 | Saving and retrieving data based on public key encryption | Paul England | 2013-11-19 |
| 8584254 | Data access reporting platform for secure active monitoring | Weidong Cui, Martim Carbone | 2013-11-12 |
| 8566944 | Malware investigation by analyzing computer memory | Weidong Cui | 2013-10-22 |
| 8352797 | Software fault isolation using byte-granularity memory protection | Richard John Black, Paul Barham, Manuel Costa, Jean-Philippe Martin, Periklis Akritidis +2 more | 2013-01-08 |
| 8316448 | Automatic filter generation and generalization | Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Zhang | 2012-11-20 |
| 8146138 | Access unit switching through physical mediation | Yuqun Chen | 2012-03-27 |
| 8074281 | Malware detection with taint tracking | Luis Irun-Briz, Laurent Visconti, Mark L. Niehaus, Nikola Livic | 2011-12-06 |
| 8065521 | Secure processor architecture for use with a digital rights management (DRM) system on a computing device | Paul England | 2011-11-22 |
| 8005757 | Specifiying security for an element by assigning a scaled value representative of the relative security thereof | Rajasekhar Abburi, Jeffrey R. C. Bell | 2011-08-23 |
| 7975117 | Enforcing isolation among plural operating systems | Paul England, Bryan Willman, Yuqun Chen, Andrew Thornton | 2011-07-05 |
| 7890771 | Saving and retrieving data based on public key encryption | Paul England | 2011-02-15 |
| 7797544 | Attesting to establish trust between computer entities | Blair B. Dillaway, Paul England | 2010-09-14 |
| 7788669 | System for isolating first computing environment from second execution environment while sharing resources by copying data from first portion to second portion of memory | Paul England, Bryan Willman | 2010-08-31 |
| 7765397 | Generating, migrating or exporting bound keys | Paul England | 2010-07-27 |
| 7757077 | Specifying security for an element by assigning a scaled value representative of the relative security thereof | Rajasekhar Abburi, Jeffrey R. C. Bell | 2010-07-13 |
| 7752456 | Saving and retrieving data based on symmetric key encryption | Paul England | 2010-07-06 |
| 7730318 | Integration of high-assurance features into an application through application factoring | Thekkthalackal Varugis Kurien, Kenneth D. Ray, Paul England | 2010-06-01 |
| 7716745 | Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like | — | 2010-05-11 |
| 7689791 | Protection of content stored on portable memory from unauthorized usage | — | 2010-03-30 |
| 7680743 | Software application protection by way of a digital rights management (DRM) system | Paul England, John L. Manferdelli | 2010-03-16 |
| 7650478 | Using limits on address translation to control access to an addressable entity | Paul England, Bryan Willman | 2010-01-19 |
| 7644246 | Using limits on address translation to control access to an addressable entity | Paul England, Bryan Willman | 2010-01-05 |
| 7634661 | Manifest-based trusted agent management in a trusted operating system environment | Paul England, Daniel R. Simon, Josh Benaloh | 2009-12-15 |
| 7624451 | Binding a digital license to a portable or the like in a digital rights management (DMR) system and checking out/checking in the digital license to/from the portable device or the like | — | 2009-11-24 |