Issued Patents All Time
Showing 76–100 of 143 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 7502471 | System and method for protecting data streams in hardware components | Henrique S. Malvar | 2009-03-10 |
| 7496769 | Hierarchical trusted code for content protection in computers | Butler W. Lampson | 2009-02-24 |
| 7493429 | Communication of information via a side-band channel, and use of same to verify positional relationship | John E. Paff, Marcus Peinado, Thekkthalackal Varugis Kurien, Bryan Willman, Andrew Thornton | 2009-02-17 |
| 7490352 | Systems and methods for verifying trust of executable files | Michael Kramer, Kenneth D. Ray, Scott A. Field, Jonathan Schwartz | 2009-02-10 |
| 7487365 | Saving and retrieving data based on symmetric key encryption | Marcus Peinado | 2009-02-03 |
| 7478235 | Methods and systems for protecting data in USB systems | Kenneth D. Ray, Marcus Peinado, John C. Dunn, Glen Slick, Bryan Willman | 2009-01-13 |
| 7457412 | System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party | Butler W. Lampson, John D. DeTreville | 2008-11-25 |
| 7434263 | System and method for secure storage data using a key | Butler W. Lampson, John D. DeTreville | 2008-10-07 |
| 7424606 | System and method for authenticating an operating system | Butler W. Lampson, John D. DeTreville | 2008-09-09 |
| 7424612 | Saving and retrieving data based on symmetric key encryption | Marcus Peinado | 2008-09-09 |
| 7421579 | Multiplexing a secure counter to implement second level secure counters | Marcus Peinado | 2008-09-02 |
| 7418512 | Securely identifying an executable to a trust-determining entity | Anshul Dhir, Thekkthalackal Varugis Kurien, Kenneth D. Ray | 2008-08-26 |
| 7415620 | System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party | John D. DeTreville, Butler W. Lampson | 2008-08-19 |
| 7409719 | Computer security management, such as in a virtual machine or hardened operating system | Benjamin E. Armstrong, Scott A. Field, Jason Garms, Michael Kramer, Kenneth D. Ray | 2008-08-05 |
| 7380130 | Methods and systems for authentication of components in a graphics system | Marcus Peinado, Nicholas Patrick Wilt | 2008-05-27 |
| 7362861 | Methods and apparatus for protecting information content | Yacov Yacobi, Gideon A. Yuval | 2008-04-22 |
| 7360253 | System and method to lock TPM always ‘on’ using a monitor | Alexander Frank | 2008-04-15 |
| 7356682 | Attesting to a value of a register and/or memory region | Butler W. Lampson, John D. DeTreville | 2008-04-08 |
| 7353209 | Releasing decrypted digital content to an authenticated path | Marcus Peinado, Frank Yerrace | 2008-04-01 |
| 7325145 | Verifying the presence of an original data storage medium | — | 2008-01-29 |
| 7305553 | Manifest-based trusted agent management in a trusted operating system environment | Marcus Peinado, Daniel R. Simon, Josh Benaloh | 2007-12-04 |
| 7302709 | Key-based secure storage | John D. DeTreville, Butler W. Lampson | 2007-11-27 |
| 7293178 | Methods and systems for maintaining an encrypted video memory subsystem | Glenn F. Evans | 2007-11-06 |
| 7284135 | Methods and systems for maintaining an encrypted video memory subsystem | Glenn F. Evans, Nicholas Patrick Wilt | 2007-10-16 |
| 7269702 | Trusted data store for use in connection with trusted computer operating system | Bryan Willman, Keith S. Kaplan, Alan S. Geller, Brian A. LaMacchia, Blair B. Dillaway +3 more | 2007-09-11 |