| 9171162 |
Random file request for software attestation |
Mushegh Malkhasyan, Gilbert Wong |
2015-10-27 |
| 9141368 |
Managing boot loaders for virtual hard disks |
Mushegh Malkhasyan, Gilbert Wong, Stewart P. MacLeod |
2015-09-22 |
| 8122361 |
Providing a graphical user interface in a system with a high-assurance execution environment |
Idan Avraham, Christine M. Chew, Bryan Willman |
2012-02-21 |
| 7882566 |
Providing secure input to a system with a high-assurance execution environment |
Idan Avraham, Christine M. Chew, John E. Paff, Hirofumi Yamamoto |
2011-02-01 |
| 7734930 |
Click passwords |
Darko Kirovski, Nebojsa Jojic |
2010-06-08 |
| 7721094 |
Systems and methods for determining if applications executing on a computer system are trusted |
Laura Posey Benofsky, William Gifford Holt, Leslie Helena Johnson, Bryan Willman, Madeline Jinx Bryant |
2010-05-18 |
| 7661126 |
Systems and methods for authenticating a user interface to a computer user |
Laura Posey Benofsky, William Gifford Holt, Leslie Helena Johnson, Madeline Jinx Bryant, Nicholas I. Nussbaum |
2010-02-09 |
| 7574610 |
Security state watcher |
Bryan Willman, Christine M. Chew, David R. Wooten, Jr., John E. Paff |
2009-08-11 |
| 7565535 |
Systems and methods for demonstrating authenticity of a virtual machine using a security image |
Laura Posey Benofsky, William Gifford Holt, Leslie Helena Johnson, Madeline Jinx Bryant, Nicholas I. Nussbaum |
2009-07-21 |
| 7496768 |
Providing secure input and output to a trusted agent in a system with a high-assurance execution environment |
Christine M. Chew, Bryan Willman, Kenneth D. Ray |
2009-02-24 |
| 7464412 |
Providing secure input to a system with a high-assurance execution environment |
Idan Avraham, Christine M. Chew, John E. Paff, Hirofumi Yamamoto |
2008-12-09 |
| 7299349 |
Secure end-to-end notification |
Josh Cohen, Michael Kramer, Bradley M. Hammond, Daniel R. Simon, Lee Butler +1 more |
2007-11-20 |
| 7243239 |
Click passwords |
Darko Kirovski, Nebojsa Jojic |
2007-07-10 |
| 7120249 |
Methods and systems for generating encryption keys using random bit generators |
— |
2006-10-10 |
| 6931128 |
Methods and systems for generating encryption keys using random bit generators |
— |
2005-08-16 |