Issued Patents All Time
Showing 51–75 of 143 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 7730318 | Integration of high-assurance features into an application through application factoring | Thekkthalackal Varugis Kurien, Kenneth D. Ray, Marcus Peinado | 2010-06-01 |
| 7725703 | Systems and methods for securely booting a computer with a trusted processing module | Jamie Hunter, Russell Humphries, Stefan Thom, James A. Schwartz, Jr., Kenneth D. Ray +1 more | 2010-05-25 |
| 7721341 | Method and system for allowing code to be securely initialized in a computer | Bryan Willman | 2010-05-18 |
| 7694121 | System and method for protected operating system boot using state validation | Bryan Willman, Kenneth D. Ray, Jamie Hunter, Lonnie Dean McMichael, Derek LaSalle +4 more | 2010-04-06 |
| 7680743 | Software application protection by way of a digital rights management (DRM) system | Marcus Peinado, John L. Manferdelli | 2010-03-16 |
| 7664949 | Certifying and grouping distributed objects | Muthukrishnan Paramasivam, Thekkthalackal Varugis Kurien, Charles F. Rose, III, Ravindra Nath Pandya | 2010-02-16 |
| 7650478 | Using limits on address translation to control access to an addressable entity | Marcus Peinado, Bryan Willman | 2010-01-19 |
| 7644246 | Using limits on address translation to control access to an addressable entity | Marcus Peinado, Bryan Willman | 2010-01-05 |
| 7634661 | Manifest-based trusted agent management in a trusted operating system environment | Marcus Peinado, Daniel R. Simon, Josh Benaloh | 2009-12-15 |
| 7605816 | Implementation of memory access control using optimization | Marcus Peinado | 2009-10-20 |
| 7591014 | Program authentication on environment | Thekkthalackal Varugis Kurien | 2009-09-15 |
| 7587589 | Saving and retrieving data based on symmetric key encryption | Marcus Peinado | 2009-09-08 |
| 7580526 | Methods and apparatus for protecting signals transmitted between a source and destination device over multiple signals lines | Andrew D. Rosen, Yacov Yacobi, Gideon A. Yuval | 2009-08-25 |
| 7577839 | Transferring application secrets in a trusted operating system environment | Marcus Peinado, Daniel R. Simon, Josh Benaloh | 2009-08-18 |
| 7577840 | Transferring application secrets in a trusted operating system environment | Marcus Peinado, Daniel R. Simon, Josh Benaloh | 2009-08-18 |
| 7565509 | Using limits on address translation to control access to an addressable entity | Marcus Peinado, Bryan Willman | 2009-07-21 |
| 7565553 | Systems and methods for controlling access to data on a computer with a secure boot process | Jamie Hunter, Russell Humphries, Stefan Thom, James A. Schwartz, Jr., Kenneth D. Ray +1 more | 2009-07-21 |
| 7543335 | Method and system for allowing code to be securely initialized in a computer | Bryan Willman | 2009-06-02 |
| 7543336 | System and method for secure storage of data using public and private keys | Butler W. Lampson, John D. DeTreville | 2009-06-02 |
| 7529919 | Boot blocks for software | Butler W. Lampson, John D. DeTreville | 2009-05-05 |
| 7529946 | Enabling bits sealed to an enforceably-isolated environment | Kenneth D. Ray, Peter N. Biddle | 2009-05-05 |
| 7530103 | Projection of trustworthiness from a trusted environment to an untrusted environment | Bryan Willman, Kenneth D. Ray, Keith S. Kaplan, Varugis Kurien, Michael David Marr | 2009-05-05 |
| 7516386 | System and method for transparent electronic data transfer using error correction to facilitate bandwidth-efficient data recovery | Cormac Herley | 2009-04-07 |
| 7512786 | Client-side boot domains and boot rules | — | 2009-03-31 |
| 7506380 | Systems and methods for boot recovery in a secure boot process on a computer with a hardware security module | Jamie Hunter, Russell Humphries, Stefan Thom, James A. Schwartz, Jr., Kenneth D. Ray +1 more | 2009-03-17 |