$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Case secure computer architecture 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-021/31
  • G06F-021/57
  • G06F-021/56
출원번호 US-0026054 (2013-09-13)
등록번호 US-8938796 (2015-01-20)
발명자 / 주소
  • Case, Sr., Paul
출원인 / 주소
  • Case, Sr., Paul
대리인 / 주소
    Vick, Jason H.
인용정보 피인용 횟수 : 1  인용 특허 : 560

초록

Two computing subsystems are disclosed, one a control subsystem, the other a user subsystem, each using engines with augmented conventional instruction sets, together with hardware and/or firmware, to compartmentalize execution of user programs to insure their behavior does not exceed defined bounds

대표청구항

1. A computer system comprising: a first subsystem;a control program that resides and executes in a control subsystem within the first subsystem that includes one or more CPU(s) each with an associated memory, wherein the control subsystem is protected by one or more of hardware and firmware from ac

이 특허에 인용된 특허 (560)

  1. Focke, Michael W.; Knoke, James E.; Barbieri, Paul A.; Wherley, Robert D.; Ata, John G.; Engen, Dwight B., Access control differentiation in trusted computer system.
  2. Tune,Andrew David; Aldworth,Peter James; Watt,Simon Charles; Belnet,Lionel; Mansell,David Hennah, Access control in a data processing apparatus.
  3. Mao, Jianchang; Xu, Zhichen; Walters, Chad; Wang, John; Meltzer, Albert, Access control systems and methods using visibility tokens with automatic propagation.
  4. Prohofsky, Thomas Roy, Account creation method and apparatus.
  5. Murotake,David K; Martin,Antonio, Achieving high assurance connectivity on computing devices and defeating blended hacking attacks.
  6. Rounthwaite, Robert L.; Goodman, Joshua T.; Heckerman, David E.; Platt, John C.; Kadie, Carl M., Adaptive junk message filtering system.
  7. Rounthwaite,Robert L.; Goodman,Joshua T.; Heckerman,David E.; Platt,John C.; Kadie,Carl M., Adaptive junk message filtering system.
  8. Wright, Michael; Boucher, Peter; Nault, Gabe; Smith, Merrill; Jacobson, Sterling K.; Wood, Jonathan; Mims, Robert, Administration of protection of data accessible by a mobile device.
  9. Lindsay, Steven B.; Naylor, Andrew M., Alerting system, architecture and circuitry.
  10. Aguilar, Jr.,Maximino; Johns,Charles Ray; Nutter,Mark Richard; Stafford,James Michael, Analytical generation of software thermal profiles.
  11. Watt,Simon Charles, Apparatus and method for controlling access to a memory unit.
  12. Proudler,Graeme John; Balacheff,Boris; Plaquin,David, Apparatus and method for creating a trusted environment.
  13. Proudler,Graeme John; Balacheff,Boris; Worley,John S.; Hyser,Chris D.; Worley, Jr.,William S, Apparatus and method for creating a trusted environment.
  14. Hill,Richard A.; Penn,Richard; Schoemig,Ewald; Summers,Egil K.; Lace,William H.; Pheil,Louis D., Apparatus and method for gathering and utilizing data.
  15. Olson, Christopher H.; Rarick, Leonard D.; Grohoski, Gregory F., Apparatus and method for implementing a hash algorithm word buffer.
  16. Olson, Christopher H.; Rarick, Leonard D.; Grohoski, Gregory F., Apparatus and method for implementing a unified hash algorithm pipeline.
  17. Belnet,Lionel; Chaussade,Nicolas; Watt,Simon Charles; Middleton,Peter Guy, Apparatus and method for managing access to a memory.
  18. Boland, Simon; Yee-Hang Choy, Jonathan R.; McNamara, Paul Thomas, Apparatus and method for preventing eavesdropping.
  19. Zimmer, Vincent J.; Kumar, Mohan; Natu, Mahesh; Long, Qin; Cui, Liang; Yao, Jiewen, Apparatus and method for secure boot environment.
  20. Robert D. Cassagnol ; Douglas M. Dillon ; David S. Kloper ; Sandra J. Weber ; Brandon E. Bautz, Apparatus for providing a secure processing environment.
  21. Dawson, Colin Scott; Hattrup, Glen; Hochberg, Avishai Haim; Kaczmarski, Michael; Ramke, Jr., Thomas Franklin; Smith, James Patrick, Apparatus, system, and method for establishing an agency relationship to perform delegated computing tasks.
  22. Dror, Amit; Schory, Omer, Application cluster in security gateway for high availability and load sharing.
  23. Cohen, Gabriel A., Application marketplace administrative controls.
  24. Aguilar, Jr., Maximino; Day, Michael Norman; Nutter, Mark Richard; Stafford, James Michael, Asymmetric heterogeneous multi-threaded operating system.
  25. Aguilar, Jr., Maximino; Day, Michael Norman; Nutter, Mark Richard, Asynchronous linked data structure traversal.
  26. Aguilar, Jr.,Maximino; Day,Michael Norman; Nutter,Mark Richard, Asynchronous linked data structure traversal.
  27. Agosta, John Mark; Khosravi, Hormuzd, Authenticated distributed detection and inference.
  28. Hyser, Chris D., Authenticating and verifying an authenticable and verifiable module.
  29. Silverbrook, Kia; Lapstun, Paul, Authentication method for pharmaceutical products having coded packaging.
  30. Silverbrook, Kia; Lapstun, Paul, Authentication method for pharmaceutical products having symmetrically coded packaging.
  31. Silverbrook, Kia; Lapstun, Paul, Authentication of pharmaceutical products.
  32. Zilic, Zeljko; Boulé, Marc, Automata unit, a tool for designing checker circuitry and a method of manufacturing hardware circuitry incorporating checker circuitry.
  33. Sun, Ning; Winkler, Patrick; Chu, Chengyun; Jia, Hong; Geffner, Jason; Lee, Tony; Mody, Jigar; Swiderski, Frank, Automated malware signature generation.
  34. McQuarrie, Michael Scott, Automated registration and licensing tool.
  35. Minor, Barry L; Nutter, Mark Richard; To, VanDung Dang, Balancing computational load across a plurality of processors.
  36. Minor,Barry L; Nutter,Mark Richard; To,VanDung Dang, Balancing computational load across a plurality of processors.
  37. Golan, Gilad; Vayman, Mark; Field, Scott A., Behavior blocking access control.
  38. Tajalli, Homayoon; Graham, Jeffrey J.; Fraser, Timothy J., Behavior-based host-based intrusion prevention system.
  39. Hasbun,Robert N.; Brizek,John P.; Vogt,James R., Biometric-based authentication in a nonvolatile memory device.
  40. Vogt, James R.; Hasbun, Robert N.; Brizek, John P., Biometric-based authentication in a nonvolatile memory device.
  41. Foster,Ward; Oakeson,Kenneth L.; Volkoff,Brian A.; Simpson,Shell S., Branch locking of job tickets to control concurrency.
  42. Carmichael, Richard, Clock encoded pre-fetch to access memory data in clustering network environment.
  43. Denpo, Toshiaki, Communication device.
  44. Comer,Erwin P.; Madine,Mary M., Communication systems automated security detection based on protocol cause codes.
  45. Adelman, Warren; Chadwick, Michael, Community web site for creating and maintaining a web hosting community.
  46. Largman, Kenneth; More, Anthony B.; Blair, Jeffrey, Computer and method for safe usage of documents, email attachments and other content that may contain virus, spy-ware, or malicious code.
  47. Hackborn, Dianne K.; Bort, David P.; Onorato, Joseph M.; Bornstein, Daniel R.; McFadden, Andrew T.; Swetland, Brian J.; Cannings, Richard G., Computer application pre-permissioning.
  48. Thanh A. Diep, Computer network intrusion detection.
  49. Witt Don Earl ; Lynn James T., Computer network protection using cryptographic sealing software agents and objects.
  50. Pearson,Siani Lynne; Chan,David, Computer platforms and their methods of operation.
  51. Spalka, Adrian; Lehnhardt, Jan, Computer readable storage medium for generating a pseudonym, computer implemented method and computing device.
  52. Challener,David Carroll; Safford,David Robert; Van Doorn,Leendert Peter, Computer system apparatus and method for improved assurance of authentication.
  53. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus for creating and using program authorization information data structures.
  54. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus having program authorization information data structures.
  55. Silverbrook, Kia; Lapstun, Paul, Computer system with wireless pen and relay pairing.
  56. Takahashi,Toshinari, Computer virus generation detection apparatus and method.
  57. Takahashi,Toshinari, Computer virus generation detection apparatus and method.
  58. Takahashi,Toshinari, Computer virus generation detection apparatus and method.
  59. Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA), Conditional object creating system having different object pointers for accessing a set of data structure objects.
  60. Smith, Ned; Wiseman, Willard; Kumar, Alok; Brutch, Tasneem; Scarlata, Vincent; Siddiqi, Faraz, Configuration of virtual trusted platform module.
  61. Lamport, Leslie B., Conflict fast consensus.
  62. Kocher, Paul Carl; Jaffe, Joshua Michael; Jun, Benjamin Che-Ming; Carter, Matthew Thomas; Pearson, Peter Kelley, Content security layer providing long-term renewable security.
  63. Watt,Simon Charles; Belnet,Lionel; Mansell,David Hennah; Chaussade,Nicolas; Middleton,Peter Guy, Control of access to a memory by a device.
  64. Smith,Brian L., Control status register access to enable domain reconfiguration.
  65. Frazier,Tiffany M.; Kreidl,O. Patrick, Control systems and methods using a partially-observable markov decision process (PO-MDP).
  66. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple isolated memories in an isolated execution environment.
  67. Zhuge, John; Mu, Paul Yuedong, Controlling access to storage resources by using access pattern based quotas.
  68. Pugh,Roger D., Conveyor apparatus for placing articles in a single file.
  69. Durham, David M.; Zimmer, Vincent J.; Smith, Carey W.; Yavatkar, Raj; Schluessler, Travis T.; Larson, Dylan C.; Rozas, Carlos V., Cooperative embedded agents.
  70. Durham, David; Schluessler, Travis; Yavatkar, Raj; Zimmer, Vincent; Smith, Carey, Cross validation of data using multiple subsystems.
  71. Durham, David; Schluessler, Travis; Yavatkar, Raj; Zimmer, Vincent; Smith, Carey, Cross validation of data using multiple subsystems.
  72. Stáhl, Per; Loreskär, Chris; Smeets, Bernard, Cryptographic protection of usage restrictions in electronic devices.
  73. Murase, Masana; Plouffe, Jr., Wilfred E.; Shimizu, Kanna; Sakamoto, Masaharu; Zbarsky, Vladimir, Cryptographic secure program overlays.
  74. Herbert,Howard C.; Davis,Derek L., Cryptographically protected paging system.
  75. Mu, Paul Yuedong, Customized data generating data storage system filter for data security.
  76. Pagdin,William D.; Harding,Jerry, Data analysis and security system.
  77. Proudler,Graeme John; Balacheff,Boris; Pearson,Siani Lynne; Chan,David, Data event logging in computing platform.
  78. Nallagatla,Purandhar; Doppalapudi,Harikrishna, Data exchange between a runtime environment and a computer firmware in a multi-processor computing system.
  79. Munshi, Aaftab; Sandmel, Jeremy, Data parallel computing on multiple processors.
  80. Levi, Shaul; Feitelberg, Rafael; Topaz, Assaf, Data quality assurance.
  81. Chu, William W. Y., Data security method and device for computer modules.
  82. Redlich, Ron M.; Nemzow, Martin A., Data security system and method.
  83. Redlich, Ron M.; Nemzow, Martin A., Data security system and method.
  84. Redlich, Ron M.; Nemzow, Martin A., Data security system and method.
  85. Redlich,Ron M.; Nemzow,Martin A., Data security system and method.
  86. Redlich,Ron M.; Nemzow,Martin A., Data security system and method associated with data mining.
  87. Redlich,Ron M.; Nemzow,Martin A., Data security system and method for portable device.
  88. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with editor.
  89. Focke, Michael W.; Knoke, James E.; Barbieri, Paul A.; Wherley, Robert D.; Ata, John G.; Engen, Dwight B., Data security verification for data transfers between security levels in trusted operating system.
  90. Kohavi,Ron, Data transfer security.
  91. Gaa-Frost, Bettina; Krimmel, Stefan; Pulkowski, Sebastian, Deploying software based on a calculated deployment risk level.
  92. Levi, Shaul; Feitelberg, Rafael; Topaz, Assaf, Detecting corrupted data before transmission to a client.
  93. Satish, Sourabh; Hernacki, Brian, Detecting reboot events to enable NAC reassessment.
  94. Obrecht, Mark Eric; Bharti, Vijay; Baxter, Barrett, Detection of window replacement by a malicious software program.
  95. Fumery, Benoît; Capdevila, Pierre, Device for despatching a secure output command.
  96. Suresh Jagannathan ; Richard A. Kelsey ; James F. Philbin ; Satoru Fujita JP; Kazuya Koyama JP; Toru Yamanouchi JP, Distributed agent software system and method having enhanced process mobility and communication in a computer network.
  97. Frank, Alexander; Duffus, James S.; Phillips, Thomas G., Distributed network security service.
  98. Bowers, Kevin D.; Juels, Ari; Oprea, Alina, Distributed storage system with enhanced security.
  99. Arankalle, Poorva; Carr, Wesley, Double sand-boxing for flash library.
  100. Strickland, Dennis A., Downhole tool delivery system.
  101. Strickland, Dennis A., Downhole tool delivery system.
  102. Ragner, Gary Dean, Dynamic associative storage security for long-term memory storage devices.
  103. Brock, Ashley Anderson; Kim, Nathaniel Wook; Lingafelt, Charles Steven, Dynamic intrusion detection for computer systems.
  104. Waldspurger, Carl A.; Agesen, Ole; Chen, Xiaoxin; Zedlewski, John R.; Garfinkel, Tal, Dynamic verification of validity of executable code.
  105. Aguilar, Jr., Maximino; Johns, Charles Ray; Nutter, Mark Richard; Stafford, James Michael, Dynamically adapting software for reducing a thermal state of a processor core based on its thermal index.
  106. Brokenshire, Daniel Alan; Hofstee, Harm Peter; Minor, Barry L; Nutter, Mark Richard, Dynamically partitioning processing across a plurality of heterogeneous processors.
  107. Brokenshire,Daniel Alan; Hofstee,Harm Peter; Minor,Barry L; Nutter,Mark Richard, Dynamically partitioning processing across plurality of heterogeneous processors.
  108. Panchamukhi, Prasanna S.; Singh, Balbir, Dynamically patching computer code using breakpoints.
  109. Lorch,Jacob R.; Howell,Jonathan R.; Douceur,John R., Efficient changing of replica sets in distributed fault-tolerant computing system.
  110. Fossum, Gordon Clyde; Hofstee, Harm Peter; Minor, Barry L.; Nutter, Mark Richard, Efficient function interpolation using SIMD vector permute functionality.
  111. Kaniyar, Sanjay; Pinkerton, James T.; Sethi, Bhupinder S., Efficient hash table protection for data transport protocols.
  112. Miyahara Gary K. (Rancho Palos Verdes CA), Efficient security kernel for the 80960 extended architecture.
  113. Brokenshire,Daniel Alan; Johns,Charles Ray; Minor,Barry L.; Nutter,Mark Richard, Efficient triangular shaped meshes.
  114. Harris, Shaun L.; Peterson, Eric C.; Fisk, David, Electronic assembly having a removable power supply.
  115. Harris, Shaun L.; Peterson, Eric C.; Fisk, David, Electronic assembly having a removable power supply.
  116. Timmermans, Peter; Himbeeck, Carl Van; Vanophalvens, Mark, Electronic data processing device with secured memory access.
  117. Shankar, Narendar M.; Paksoy, Erdal, Electronic devices, information products, processes of manufacture and apparatus for enabling code decryption in a secure mode using decryption wrappers and key programming applications, and other structures.
  118. Conti, Gregory R.; Dahan, Franck, Electronic power management system.
  119. Boesch Brian Paul ; Crocker Stephen David ; Eastlake ; III Donald Eggleston ; Hart ; Jr. Alden Sherburne ; Lindenberg Robert A. ; Paredes Denise Marie, Electronic transfer system and method.
  120. Watkins,Daniel R.; Cubiss,Christopher, Embedded sequence checking.
  121. Walmsley, Simon Robert, Embedding data and information related to function with which data is associated into a payload.
  122. Zimmer,Vincent J., Encapsulation of a TCPA trusted platform module functionality within a server management coprocessor subsystem.
  123. Steven C. Glassman ; Mark S. Manasse, Encrypting secrets in a file for an electronic micro-commerce system.
  124. Smith, Ned, Enforcing use of chipset key management services for encrypted storage devices.
  125. Makkinejad, Babak, Error and exception message handling framework.
  126. Roohparvar, Frankie F., Error detection, documentation, and correction in a flash memory device.
  127. Liu, Zhengrong; Purna, Yusuf Wilajati; Shinichi, Takemura; Szeto, Nicholas, Establishing a trusted platform in a digital processing system.
  128. Hunt,Galen C.; Simon,Jeff, Establishing computing trust with a staging area.
  129. Faitelson, Yakov; Korkus, Ohad; Kretzer, Ophir, Evaluating removal of access permissions.
  130. Weber,Daniel; Gopalan,Prem; Poletto,Massimiliano Antonio, Event detection/anomaly correlation heuristics.
  131. Watt, Simon Charles; Dornan, Christopher Bentley; Orion, Luc; Chaussade, Nicolas; Belnet, Lionel; Brochier, Stephane Eric Sebastien, Exception types within a secure processing system.
  132. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Executing isolated mode instructions in a secure system running in privilege rings.
  133. Moran,Douglas B., Extensible intrusion detection system.
  134. Diep, Thanh A.; Botros, Sherif M.; Izenson, Martin D., Features generation for use in computer network intrusion detection.
  135. Rounthwaite, Robert L.; Goodman, Joshua T.; Heckerman, David E.; Mehr, John D.; Howell, Nathan D.; Rupersburg, Micah C.; Slawson, Dean A., Feedback loop for spam prevention.
  136. Rounthwaite,Robert L.; Goodman,Joshua T.; Heckerman,David E.; Mehr,John D.; Howell,Nathan D.; Rupersburg,Micah C.; Slawson,Dean A., Feedback loop for spam prevention.
  137. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S., File checking using remote signing authority via a network.
  138. Salomon, Tavi; Pomerantz, Itzhak; Peri, Eyal, File storage in a computer system with diverse storage media.
  139. Benkley, III, Fred G., Fingerprint sensing assemblies and methods of making.
  140. Chen, Lechong; Xing, Bin; Jin, Feng, Firmware interface runtime environment protection field.
  141. Goodman,Steven Dale; Hoff,James Patrick; Springfield,Randall Scott; Ward,James Peter, Flash update using a trusted platform module.
  142. Watt,Simon Charles; Orion,Luc; Chaussade,Nicolas, Function control for a processor.
  143. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Generating isolated bus cycles for isolated execution.
  144. Aguilar, Jr., Maximino; Johns, Charles Ray; Nutter, Mark Richard; Stafford, James Michael, Generation of hardware thermal profiles for a set of processors.
  145. Aguilar, Jr.,Maximino; Johns,Charles Ray; Nutter,Mark Richard; Stafford,James Michael, Generation of hardware thermal profiles for a set of processors.
  146. Aguilar, Jr., Maximino; Johns, Charles Ray; Nutter, Mark Richard; Stafford, James Michael, Generation of software thermal profiles executed on a set of processors using processor activity.
  147. Aguilar, Jr.,Maximino; Johns,Charles Ray; Nutter,Mark Richard; Stafford,James Michael, Generation of software thermal profiles executed on a set of processors using thermal sampling.
  148. Aguilar, Jr.,Maximino; Johns,Charles Ray; Nutter,Mark Richard; Stafford,James Michael, Generation of software thermal profiles for applications in a simulated environment.
  149. Tang, Yuchun; He, Yuanchen, Granular support vector machine with random granularity.
  150. Aguilar, Jr., Maximino; Day, Michael Norman; Nutter, Mark Richard; Xenidis, James, Grouping processors and assigning shared memory space to a group in a heterogeneous computer environment.
  151. Silverbrook,Kia; Lapstun,Paul, Handheld pharmaceutical product scanner.
  152. Silverbrook, Kia; Lapstun, Paul, Handheld security document scanner.
  153. Sahita, Ravi; Schluessler, Travis T.; Durham, David M.; Zinaty, Amir, Hardware-based authentication of a software program.
  154. Zhou, Aibing, Hardware-based intrusion detection accelerator.
  155. Brokenshire, Daniel Alan; Hofstee, Harm Peter; Minor, Barry L; Nutter, Mark Richard, Hiding memory latency.
  156. Witte Kendall C. (Austin TX), Hierarchical multiple password acceptance system.
  157. England, Paul; Lampson, Butler W., Hierarchical trusted code for content protection in computers.
  158. England, Paul; Lampson, Butler W., Hierarchical trusted code for content protection in computers.
  159. England,Paul; Lampson,Butler W., Hierarchical trusted code for content protection in computers.
  160. Lampson,Butler W.; England,Paul, Hierarchical trusted code for content protection in computers.
  161. LeQuere, Patrick, High speed cryptographic system with modular architecture.
  162. Zimmer, Vincent J; Rasheed, Yasser, Hypervisor runtime integrity support.
  163. Mark E. Millet ; Chi-Shing Ng, IP network for accomodating mobile users with incompatible network addressing.
  164. Bouchard, Gregg A.; Kessler, Richard E.; Hussain, Muhammad R., IPsec performance optimization.
  165. Clift, Neill; Wijeratna, Thushara K., Identifying malware that employs stealth techniques.
  166. Dubrovsky, Opher; Ein-Gil, Boaz; Wang, Jiahe Helen, Immunizing HTML browsers and extensions from known vulnerabilities.
  167. Brawn, Jonathan William; Alphey, James Roy, Integrated circuit configuration.
  168. Bruton, III,David Aro; Jakubik,Patricia; LiVecchi,Patrick Michael; Overby, Jr.,Linwood Hugh, Integrated intrusion detection services.
  169. Scott,Cindy; Law,Gary; Ott,Michael G.; Sherriff,Godfrey, Integrated security in a process plant having a process control system and a safety system.
  170. Kurien, Thekkthalackal Varugis; Ray, Kenneth D.; Peinado, Marcus; England, Paul, Integration of high-assurance features into an application through application factoring.
  171. Billsröm, Leif Olov; Lennartsson, Kurt Uno, Intelligent storage device for backup system.
  172. Botz, Patrick S., Inter-program authentication using dynamically-generated public/private key pairs.
  173. Silverbrook, Kia; Lapstun, Paul, Interactive pharmaceutical product packaging.
  174. Kocher, Paul Carl; Jaffe, Joshua Michael; Jun, Benjamin Che-Ming; Carter, Matthew Thomas; Pearson, Peter Kelley, Interpreter using cryptographic values of a playback device's keys to authorize the playback device.
  175. Goss, Steven; Conti, Gregory, Interrupt morphing and configuration, circuits, systems and processes.
  176. Conti, Gregory; Dahan, Franck, Interrupt-related circuits, systems, and processes.
  177. Brock,Ashley Anderson; Kim,Nathaniel Wook; McClain,Kevin Thomas, Intrusion detection method and signature table.
  178. Boulanger, Marc A.; Jeffries, Clark D.; Kinard, C. Marcel; Kravec, Kerry A.; Sabhikhi, Ravinder K.; Saidi, Ali G.; Slyfield, Jan M.; Tannhof, Pascal R., Intrusion detection using a network processor and a parallel pattern detection engine.
  179. Bruton, III,David Aro; Jakubik,Patricia; LiVecchi,Patrick Michael; Overby, Jr.,Linwood Hugh, Intrusion event filtering.
  180. Murase, Masana; Plouffe, Jr., Wilfred E.; Sakamoto, Masaharu; Shimizu, Kanna; Zbarsky, Vladimir, Invoking externally assisted calls from an isolated environment.
  181. Day, Michael Norman; Nutter, Mark Richard, Light weight context switching.
  182. Bardsley,Jeffrey Scott; Brock,Ashley Anderson; Kim,Nathaniel Wook; Lingafelt,Charles Steven, Limiting the output of alerts generated by an intrusion detection sensor during a denial of service attack.
  183. Meketa, Deneb, Loading applications in non-designated isolation environments.
  184. Aguilar, Jr., Maximino; Chow, Alex Chunghen; Day, Michael Norman; Gowen, Michael Stan; Nutter, Mark Richard; Xenidis, James, Loading software on a plurality of processors.
  185. Aguilar, Jr.,Maximino; Chow,Alex Chunghen; Day,Michael Norman; Gowen,Michael Stan; Nutter,Mark Richard; Xenidis,James, Loading software on a plurality of processors.
  186. Kun Andrew I. (Willowdale CAX) Kolnick Frank C. (Willowdale WA CAX) Mansfield Bruce M. (Kent WA), Logical ring in a virtual single machine.
  187. Matsuoka, Yoshimichi, Login to a computing device based on facial recognition.
  188. Brown, Kerry D.; Pariseau, David K.; Li, Weidong; Williams, Edgar M.; Thompson, Joyce, Magnetic data recording device.
  189. Khosravi,Hormuzd M.; Savagaonkar,Uday; Sahita,Ravi; Rajagopal,Priya, Maintaining shadow page tables in a sequestered memory region.
  190. Schneider, Jerome L., Malware management through kernel detection.
  191. Aguilar, Jr., Maximino; Day, Michael Norman; Nutter, Mark Richard; Stafford, James Michael, Managing a plurality of processors as devices.
  192. Aguilar, Jr., Maximino; Day, Michael Norman; Nutter, Mark Richard; Stafford, James Michael, Managing a plurality of processors as devices.
  193. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  194. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  195. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  196. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  197. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing accesses in a processor for isolated execution.
  198. Gowen, Michael Stan; Minor, Barry L; Nutter, Mark Richard; O'Brien, John Kevin Patrick, Managing position independent code using a software framework.
  199. Gowen,Michael Stan; Minor,Barry L; Nutter,Mark Richard; O'Brien,John Kevin Patrick, Managing position independent code using a software framework.
  200. Challener,David Carroll, Managing private keys in a free seating environment.
  201. John, Peter; Muenkel, Christian, Managing user access to data.
  202. McKeen,Francis X.; Reneris,Ken; Grawrock,David W., Mechanism to secure computer output from software attack using isolated execution.
  203. Zimmer, Vincent J.; Rothman, Michael A., Mechanism to support rights management in a pre-operating system environment.
  204. Kershaw, Daniel; Biles, Stuart David, Memory access security management.
  205. Berenbaum, Alan D.; Weiss, Raphael, Memory protection for embedded controllers.
  206. Hart,Frank P.; Pole,Edward J.; Silvester,Kelan; Zurcher,Paul, Method and apparatus for booting the operating environment of an autonomous subsystem in a computer based system without involvement of the main operating system.
  207. Bosch, Peter; McLellan, Jr., Hubert Rae; Mullender, Sape Jurriën, Method and apparatus for delegation of secure operating mode access privilege from processor to peripheral.
  208. Smith, Ned, Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption.
  209. Cheng, Antonio S.; Brannock, Kirk D., Method and apparatus for establishing processor as core root of trust for measurement.
  210. Fischer, Stephen Anthony; George, Varghese; Jahagirdar, Sanjeev; Gunther, Stephen H., Method and apparatus for establishing safe processor operating points.
  211. Fischer,Stephen; George,Varghese; Jahagirdar,Sanjeev; Gunther,Stephen H., Method and apparatus for establishing safe processor operating points in connection with a secure boot.
  212. Rogers,Paul A.; Nierenberg,Nicolas C., Method and apparatus for generating page-level security in a computer generated report.
  213. Kipping, Debra Ann; Kuo, Wei; Nutter, Mark Richard; Ramsay, III, George F., Method and apparatus for graphics window clipping management in a data processing system.
  214. Kozuch, Michael A.; Sutton, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  215. Nguyen, Truc Duy; Nutter, Mark Richard; Stelzer, Robert Paul, Method and apparatus for managing texture memory in a data processing system.
  216. Hardwood ; III Wallace B. ; Eifert James B. ; Toms Thomas R., Method and apparatus for performing access censorship in a data processing system.
  217. Wallace B. Harwood, III ; James B. Eifert ; Thomas R. Toms, Method and apparatus for performing access censorship in a data processing system.
  218. Fossum, Gordon Clyde; Minor, Barry L.; Nutter, Mark Richard, Method and apparatus for processing graphics perspective transformations.
  219. Ahn, Gaeil; Kim, Ki-Young; Jang, Jong Soo, Method and apparatus for protecting legitimate traffic from DoS and DDoS attacks.
  220. Koelle,Katharina Veronika; Worzel,William P., Method and apparatus for protection of electronic media.
  221. Silvester,Kelan C., Method and apparatus for providing a secure-private partition on a hard disk drive of a computer system via IDE controller.
  222. Graham, Robert David, Method and apparatus for providing network and computer system security.
  223. Blumenau, Steven M.; Hackett, Christopher; Derrico, Matthew, Method and apparatus for providing secure access to a computer system resource.
  224. Blumenau,Steven M.; Hackett,Christopher J.; D'Errico,Matthew J., Method and apparatus for providing secure access to a computer system resource.
  225. Blumenau,Steven M; Hackett,Christopher J.; D'Errico,Matthew J., Method and apparatus for providing secure access to a computer system resource.
  226. Steven M. Blumenau ; Christopher J. Hackett ; Matthew J. D'Errico, Method and apparatus for providing secure access to a computer system resource.
  227. Scarlata, Vincent R.; Rozas, Carlos V., Method and apparatus for providing software-based security coprocessors.
  228. Challener David Carroll ; Desai Dhruv Manmohandas ; Rohatgi Pankaj ; Safford David Robert, Method and apparatus for securing communication utilizing a security processor.
  229. Silverbrook, Kia; Lapstun, Paul, Method and apparatus for security document tracking.
  230. Jauer, Richard Albert, Method and apparatus for simultaneous viewing of two isolated data sources.
  231. Baik, Kwang Ho; Kim, Byoung Koo; Oh, Jin Tae; Jang, Jong Soo; Sohn, Sung Won, Method and apparatus for storing intrusion rule.
  232. Boivie,Richard H., Method and apparatus for tracing a denial-of-service attack back to its source.
  233. Botros, Sherif M.; Diep, Thanh A.; Izenson, Martin D., Method and apparatus for training a neural network model for use in computer network intrusion detection.
  234. Boyum, Kevin; Dobbs, Robert; Duisenberg, Kenneth, Method and apparatus for utilizing a microcontroller to provide an automatic order and timing power and reset sequencer.
  235. Lynch, Liam S.; Seth, Shashi, Method and apparatus to authenticate and authorize user access to a system.
  236. Girard,Luke E., Method and apparatus to improve the protection of information presented by a computer.
  237. Kumar, Alok; Patel, Minal B.; Tseng, Kuo-Lang; Thomas, Ramesh M.; Tallam, Madhukar; Chopra, Aneet; Smith, Ned M.; Grawrock, David W.; Champagne, David, Method and apparatus to re-create trust model after sleep state.
  238. Brokenshire, Daniel Alan; Minor, Barry L.; Nutter, Mark Richard, Method and apparatus using primitive bounding volumes to improve the accuracy of BSP-trees.
  239. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  240. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  241. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  242. Erlingsson,Ulfar, Method and system for assured denotation of application semantics.
  243. Bade, Steven A.; Betz, Linda Nancy; Kegel, Andrew Gregory; Safford, David R.; Van Doorn, Leendert Peter, Method and system for bootstrapping a trusted server having redundant trusted platform modules.
  244. Bade, Steven A.; Betz, Linda Nancy; Kegel, Andrew Gregory; Safford, David R.; Van Doorn, Leendert Peter, Method and system for bootstrapping a trusted server having redundant trusted platform modules.
  245. Jueneman, Robert R.; Linsenbardt, Duane J.; Young, John N.; Carlisle, William Reid, Method and system for deploying advanced cryptographic algorithms.
  246. van Riel, Henri Han; Cox, Alan, Method and system for designating and handling confidential memory allocations.
  247. Beck, Douglas Reed; Johnson, Aaron Roy; Roussev, Roussi A.; Verbowski, Chad E.; Vo, Binh Dou; Wang, Yi Min, Method and system for detecting infection of an operating system.
  248. Fagan, John, Method and system for encryption-based design obfuscation for an integrated circuit.
  249. Zhang, Xinwen; Seifert, Jean-Pierre, Method and system for enforcing trusted computing policies in a hypervisor security module architecture.
  250. Tock Theron D., Method and system for loading classes in read-only memory.
  251. Dobtchev, Hristo I., Method and system for management protocol-based data streaming.
  252. Chojnacki, Robert, Method and system for mass distribution of geographic data for navigation systems.
  253. Adcock,James W., Method and system for relative address translation.
  254. Rodgers, Stephane, Method and system for secure code encryption for PC-slave devices.
  255. Hyser,Chris D., Method and system for securing a computer system.
  256. Ramirez,Nick, Method and system for shutting down and restarting a computer system.
  257. Curie, Jeffrey C.; Mildenberger, Kai; Yeh, Jr., Frank, Method and system for third party resource provisioning management.
  258. Challener, David Carroll; Gettelfinger, Chad Lee; Goodman, Steven Dale; Ovies, Hernando; Springfield, Randall Scott; Ward, James Peter, Method and system for updating a root of trust measurement function in a personal computer.
  259. Fenton, James L.; Thomas, Michael A., Method and system for verifying identification of an electronic message.
  260. Agrawal, Sachin Omprakash; Chenthamarakshan, Vijil Enara; Dlas, Eric Willfred Bruno, Method for an efficient electronic messaging system.
  261. Silverbrook,Kia; Lapstun,Paul, Method for authentication of pharmaceutical products.
  262. Silverbrook,Kia; Lapstun,Paul, Method for identifying a counterfeit security document.
  263. Silverbrook, Kia; Lapstun, Paul, Method for identifying duplicated pharmaceutical product packaging.
  264. Yao, Jiewen; Zimmer, Vincent J.; Long, Qin; Cui, Liang, Method for isolating third party pre-boot firmware from trusted pre-boot firmware.
  265. Trumper, Fabian; Eldar, Avigdor, Method for packet encapsulation and redirection of data packets.
  266. Priel, Michael; Kuzmin, Dan; Zaltzman, Amir, Method for protecting a secured real time clock module and a device having protection capabilities.
  267. Priel, Michael; Smolyansky, Leonid; Kuzmin, Dan, Method for protecting a security real time clock generator and a device having protection capabilities.
  268. Silverbrook, Kia; Lapstun, Paul, Method for remote authentication of pharmaceutical products.
  269. Mangold,Richard P.; Shippy,Keith, Method for securing memory mapped control registers.
  270. Silverbrook,Kia; Lapstun,Paul, Method of authenticating security documents.
  271. Silverbrook, Kia; Lapstun, Paul, Method of counting currency.
  272. Silverbrook, Kia; Lapstun, Paul, Method of dispensing a pharmaceutical product.
  273. Silverbrook, Kia; Lapstun, Paul, Method of dispensing a pharmaceutical product.
  274. Silverbrook, Kia; Lapstun, Paul, Method of dispensing a product.
  275. Silverbrook,Kia; Lapstun,Paul, Method of identifying a copied security document.
  276. Bardsley, Jeffrey Scott; Brock, Ashley Anderson; Kim, Nathaniel Wook; Lingafelt, Charles Steven, Method of operating an intrusion detection system.
  277. Silverbrook, Kia; Lapstun, Paul, Method of printing security documents.
  278. Zisowski,Frank, Method of protecting the integrity of a computer program.
  279. Yarom Yuval,ILX, Method of relocating the stack in a computer system for preventing overrate by an exploit program.
  280. Rothrock,Lewis V.; Maliszewski,Richard L., Method of secure function loading.
  281. Schwarm, Stephen C.; Efroni, Dar, Method of sharing memory in a multi-processor system including a cloning of code and data.
  282. Murase, Masana; Shimizu, Kanna; Plouffe, Jr., Wilfred Edmund, Method to protect secrets against encrypted section attack.
  283. Doran, Mark; Zimmer, Vincent; Rothman, Michael A., Method to qualify access to a block storage device via augmentation of the device'S controller and firmware flow.
  284. Doran, Mark; Zimmer, Vincent; Rothman, Michael A., Method to qualify access to a block storage device via augmentation of the device's controller and firmware flow.
  285. Hardjono, Thomas Parasu; Bleckmann, David Maurits; Starnes, William Wyatt; Andersen, Bradley Douglas, Method to verify the integrity of components on a trusted platform using integrity database services.
  286. Kumar, Mohan J.; Gueron, Shay, Methods and apparatus for authenticating components of processing systems.
  287. Smith, Ned M.; Wiseman, Willard M. (Monty); Siddiqi, Faraz A.; Brutch, Tasneem; Scarlata, Vincent R.; Kumar, Alok; Roge, Kalpana M.; Kumar, Murari, Methods and apparatus for creating an isolated partition for a virtual trusted platform module.
  288. Scarlata, Vincent R.; Wiseman, Willard M., Methods and apparatus for generating endorsement credentials for software-based security coprocessors.
  289. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P., Methods and apparatus for persistent control and protection of content.
  290. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P.; Sibert, W. Olin; Van Wie, David M., Methods and apparatus for persistent control and protection of content.
  291. Sood, Kapil; Schluessler, Travis T.; Lord, Christopher, Methods and apparatus for providing an insertion and integrity protection system associated with a wireless communication platform.
  292. Hatakeyama, Akiyuki, Methods and apparatus for secure programming and storage of data using a multiprocessor in a trusted mode.
  293. Gorobets, Sergey Anatolievich; Bennett, Alan David; Sinclair, Alan Welsh, Methods and apparatus for writing data to non-volatile memory.
  294. Moran,Douglas R.; Hall,Clifford D.; Piazza,Thomas A.; Jensen,Richard W., Methods and arrangements to interface memory.
  295. Raghavan, Serugudi Venkata, Methods and devices for pattern-based user authentication.
  296. Wilson, Perry W.; Pendergrass, J. Aaron; McDonell, III, C. Durward; Loscocco, Peter A.; Heine, David J.; Lewis, Bessie Y., Methods and system for program execution integrity measurement.
  297. Murotake, David K; Martin, Antonio, Methods and systems for achieving high assurance computing using low assurance operating systems and processes.
  298. Noyes, Harold B; Jurenka, Mark; Huggins, Gavin, Methods of indirect register access including automatic modification of a directly accessible address register.
  299. Fernández Gutiérrez, Álvaro, Methods, apparatus and systems to improve security in computer systems.
  300. Henry, G. Glenn; Parks, Terry, Microprocessor apparatus providing for secure interrupts and exceptions.
  301. Lahtinen,Jesse, Monitoring the flow of a data stream.
  302. Focke, Michael W.; Knoke, James E.; Barbieri, Paul A.; Wherley, Robert D.; Ata, John G.; Engen, Dwight B., Multi-domain architecture for process isolation with processor supporting multi-domain architecture.
  303. Cantrell,Craig; Willebeek LeMair,Marc; Cox,Dennis; Kolbly,Donovan; Smith,Brian, Multi-level packet screening with dynamically selected filtering criteria.
  304. Louie Glenn Y. (Mountain View CA), Multi-task digital processor employing a priority.
  305. Sherman Richard H. (Fremont CA) Dinolt George W. (San Jose CA) Hubbard Frank (Los Altos Hills CA), Multilevel secure workstation.
  306. Hamlin, Vernon W.; Saletnik, Mark J.; Shimabukuro, Jorge Luis; Veradej, Anussorn Andy; Wang, Jun, Multiple key failover validation in a wagering game machine.
  307. Zhuge, John; Mu, Paul Yuedong, Multiple node quota filter.
  308. Russell, Richard G.; Tobias, David F., Multiple protected mode execution environments using multiple register sets and meta-protected instructions.
  309. Griffin, Jonathan; Dalton, Christopher I.; Child, Michael; Chen, Liqun; Norman, Andrew Patrick, Multiple trusted computing environments.
  310. Griffin,Jonathan; Chen,Liqun, Multiple trusted computing environments with verifiable environment identities.
  311. Lecourtier Georges,FRX, Multiprocessor system with microprogrammed means for dispatching processes to processors.
  312. Gleichauf, Paul; Bakke, Mark; Kuik, Timothy; Thompson, David; Ma, Xiaoxue, Network context triggers for activating virtualized computer applications.
  313. Phillips, Thomas G.; Schoppa, Christopher A.; Frank, Alexander; Light, Mark Curtis; Westerinen, Wiliam Jefferson, Network security device and method for protecting a computing device in a networked environment.
  314. Sahita, Ravi; Savagaonkar, Uday; Khosravi, Hormuzd; Blumenthal, Uri, Network vulnerability assessment of a host platform from an isolated partition in the host platform.
  315. Szor, Peter; Ferrie, Peter, No-execute processor feature global disabling prevention system and method.
  316. Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA 4), Object container transfer system and method in an object based computer operating system.
  317. Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA), Object transferring system and method in an object based computer operating system.
  318. Bakke, Mark; Kuik, Timothy; Thompson, David; Gleichauf, Paul; Ma, Xiaoxue, Offload stack for network, block and file input and output.
  319. Worley, Jr.,William S., Operating system capable of supporting a customized execution environment.
  320. Erlingsson, Ulfar; Abadi, Martin, Operating system protection against side-channel attacks on secrecy.
  321. Aguilar, Jr., Maximino; Johns, Charles Ray; Nutter, Mark Richard; Stafford, James Michael, Optimizing thermal performance using thermal flow analysis.
  322. Kaniyar, Sanjay N.; Huitema, Christian; Sanders, Henry L., Outgoing connection attempt limiting to slow down spreading of viruses.
  323. Munshi, Aaftab; Sandmel, Jeremy, Parallel runtime execution on multiple processors.
  324. Brokenshire, Daniel Alan; Minor, Barry L; Nutter, Mark Richard, Partitioning processor resources based on memory usage.
  325. Brokenshire,Daniel Alan; Minor,Barry L; Nutter,Mark Richard, Partitioning processor resources based on memory usage.
  326. Chu, William W. Y., Password protected modular computer method and device.
  327. Pawlowski, J. Thomas, Pattern-recognition processor with matching-data reporting module.
  328. Proudler, Graeme John, Performance of a service on a computing platform.
  329. Griffin,Jonathan; Dalton,Christopher I., Performing secure and insecure computing operations in a compartmented operating system.
  330. Johnson Robert Duane ; Springfield Randall Scott ; Freeman Joseph Wayne ; Bonomo Ralph, Personal computer ROM scan startup protection.
  331. Silverbrook, Kia; Lapstun, Paul, Pharmaceutical product tracking.
  332. Hetzler, Christopher J, Physical encryption key system.
  333. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for issuing and certifying a hardware-protected attestation key.
  334. Sahita, Ravi; Smith, Ned, Pre-boot protected memory channel.
  335. Ramaiah,Anantha; Bage,Shrirang; Khare,Amol; Dalal,Mitesh, Preventing network reset denial of service attacks using embedded authentication information.
  336. Silverbrook, Kia; Lapstun, Paul, Printer for printing packaging.
  337. Silverbrook, Kia; Lapstun, Paul, Printing currency documents.
  338. Conti, Gregory R.; Dahan, Franck, Processing system operable in various execution environments.
  339. Kubesh,Blaine; Lathem,Gerald; Jaggi,Mohit; Sinha,Amit; Hall,Michael, Processing system using bitmap array to compress deterministic finite automation state table allowing direct indexing.
  340. Aguilar, Jr., Maximino; Nutter, Mark Richard; Stafford, James Michael, Processor dedicated code handling in a multi-processor environment.
  341. Aguilar, Jr., Maximino; Nutter, Mark Richard; Stafford, James Michael, Processor dedicated code handling in a multi-processor environment.
  342. Conti, Gregory R.; Dahan, Franck, Processor system with an application and a maintenance function.
  343. Silverbrook, Kia; Lapstun, Paul, Product packaging authentication.
  344. Willman, Bryan Mark; England, Paul; Ray, Kenneth D.; Kaplan, Keith; Kurien, Varugis; Marr, Michael David, Projection of trustworthiness from a trusted environment to an untrusted environment.
  345. Kershaw, Daniel; Smith, Lee Douglas; Seal, David James; Grisenthwaite, Richard Roy, Protected function calling.
  346. Dewan, Prashant, Protecting content on client platforms.
  347. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Protecting software environment in isolated execution.
  348. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Protecting software environment in isolated execution.
  349. Fok, Kenny; Hwang, Jihyun; Yip, Eric Chi Chung; Lushin (Misha), Mikhail A., Providing secure inter-application communication for a mobile operating environment.
  350. Bertrand John ; Caprioni Daniel M. ; Friedman Mitchell ; Kwolek Richard Alan, Radio architecture for an advanced digital radio in a digital communication system.
  351. Callon, Ross W.; Kastenholz, Frank, Rate limiting data traffic in a network.
  352. Callon,Ross W.; Kastenholz,Frank, Rate limiting data traffic in a network.
  353. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C.; Laren, Carter C.; Pearson, Peter K.; Lawson, Nathaniel J., Reprogrammable security for controlling piracy and enabling interactive content.
  354. Clifton Daniel B. (Melbourne FL), Resource access security system for controlling access to resources of a data processing system.
  355. Lyle, Michael P., Routing network packets for multi-processor network flow analysis.
  356. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  357. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  358. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  359. Williams, Jeffrey L., Saving encryption keys in one-time programmable memory.
  360. Bade, Steven A.; Kegel, Andrew Gregory; Van Doorn, Leendert Peter, Sealing of data for applications.
  361. Srinivasan,Pramila; Princen,John; Berndt,Frank; Blythe,David; Saperstein,William; Yen,Wei, Secure and backward-compatible processor and secure software execution thereon.
  362. Srinivasan,Pramila; Princen,John; Berndt,Frank; Blythe,David; Saperstein,William; Yen,Wei, Secure and backward-compatible processor and secure software execution thereon.
  363. Hait John N. (Missoula MT), Secure architecture and apparatus using an independent computer cartridge.
  364. Hait John N. (Missoula MT), Secure architecture and apparatus using an independent computer cartridge.
  365. Marino ; Jr. Joseph T. (Fountain Hills AZ) Core Ronald S. (Glendale AZ), Secure cryptographic processor arrangement.
  366. Chevreau, Sylvain; Diehl, Eric; Furon, Teddy, Secure electric anti-theft device, anti-theft system comprising one such electric device and method of matching electric devices.
  367. England, Paul; Lampson, Butler W., Secure execution of program code.
  368. England,Paul; Lampson,Butler W., Secure execution of program code.
  369. Bantz,David Fredrick; Chefalas,Thomas E.; Mastrianni,Steven J.; Pickover,Clifford A., Secure hardware personalization service.
  370. Anastas Mark S. (Auburn WA) Vaughan Russell F. (Enumclaw WA), Secure implementation of transition machine computer.
  371. Renno, Erik K., Secure information processing.
  372. Worely, Jr.,William S.; Worley,John S.; Magenheimer,Daniel J.; Hyser,Chris D.; Christian,Tom; McKee,Bret; Gardner,Robert, Secure machine platform that interfaces to operating systems and customized control programs.
  373. Poo, Tze Lei; Burd, Gregory, Secure memory controlled access.
  374. Bianchi,Jean Pierre, Secure method for communicating and providing services on digital networks and implementing architecture.
  375. Thathapudi, Timothy Noel; Satyanarayana, Srinivasa Dharwad; Tuli, Siddharth Arun, Secure pool memory management.
  376. Ibrahim, Wael M.; Grimme, David J., Secure printing.
  377. Sibert, W. Olin, Secure processing unit systems and methods.
  378. Sibert,W. Olin, Secure processing unit systems and methods.
  379. Challener, David Carroll; Karidis, John Peter, Secure storage tracking for anti-virus speed-up.
  380. Ajit V. Rajasekharan ; Guy A. Story, Jr. ; Andrew J. Huffman, Secure streaming of digital audio/visual content.
  381. Raisch, Christoph, Secure system and method for SAN management in a non-trusted server environment.
  382. Schlafly, Roger, Secure transaction processor.
  383. Wray, Michael John, Security attributes in trusted computing systems.
  384. Silverbrook, Kia; Lapstun, Paul, Security document database.
  385. Silverbrook, Kia; Lapstun, Paul, Security document scanner.
  386. Shaw,Mark Edward; Gandhi,Vipul; Gostin,Gary Belgrave; Powers,Richard Dickert; Kuntz,Guy Lowell; Weaver,Ryan, Security measures in a partitionable computing system.
  387. Shaw,Mark Edward; Gandhi,Vipul; Gostin,Gary Belgrave; Warner,Craig W., Security measures in a partitionable computing system.
  388. Shaw,Mark Edward; Gandhi,Vipul; Hong,Leon; Gostin,Gary Belgrave; Warner,Craig W.; Bouchier,Paul Henry; Kjos,Todd; Kuntz,Guy Lowell; Powers,Richard Dickert; Stephenson,Bryan Craig; Weaver,Ryan; Johnso, Security measures in a partitionable computing system.
  389. Focke, Michael W.; Knoke, James E.; Barbieri, Paul A.; Wherley, Robert D.; Ata, John G.; Engen, Dwight B., Security policies in trusted operating system.
  390. Rabeler, Thorwald, Security processor with bus configuration.
  391. Rodriguez, Herman; Smith, Jr., Newton James; Spinac, Clifford Jay, Security screening of electronic devices by device identifier.
  392. Rodriguez,Herman; Smith, Jr.,Newton James; Spinac,Clifford Jay, Security screening of electronic devices by device identifier.
  393. Rodriguez, Herman; Smith, Jr., Newton James; Spinac, Clifford Jay, Security screening of electronic devices by device-reported data.
  394. Yellepeddy,Krishna Kishore, Security system for replicated storage devices on computer networks.
  395. Aguilar, Jr., Maximino; Johns, Charles Ray; Nutter, Mark Richard; Stafford, James Michael, Selection of processor cores for optimal thermal performance.
  396. Branda, Steven Joseph; Stecher, John Joseph, Selective profiling of program code executing in a runtime environment.
  397. Feldman, Joel, Semiconductor device and method utilizing variable mode control with block ciphers.
  398. East Jeffrey A. (Aptos CA) Walker James J. (Redmond WA) Jenness Steven M. (Redmond WA) Ozur Mark C. (Redmond WA) Kelly ; Jr. James W. (Redmond WA), Server impersonation of client processes in an object based computer operating system.
  399. Day,Michael Norman; Kim,Roy Moonseuk; Nutter,Mark Richard; Okawa,Yasukichi; Truong,Thuong Quang, Shadow register to enhance lock acquisition.
  400. Utagawa, Hiroaki; Fuda, Munehisa, Sheet feeding device and image forming apparatus with different separating and suctioning operational timings.
  401. Szor,Peter, Signature extraction system and method.
  402. Chorley Bernard J. (Hampton GB2) Parkin Graeme I. P. (London GB2) Wichmann Brian A. (Woking GB2) Elsom Simon M. (Feltham GB2), Software protection device.
  403. Wollnik, Matthias; Zvi, Nir Ben; Bostanci, Hakki Tunc; McDowell, John Richard; Goldsmid, Aaron, Software protection injection at load time.
  404. Zorn, Benjamin G.; Berger, Emery D., Software robustness through search for robust runtime implementations.
  405. Zee Benjamin (Glen Ellyn IL), Stack cache with fixed size stack frames.
  406. Challener, David Carroll; Karidis, John Peter, Storage conversion for anti-virus speed-up.
  407. Bowen Donald H. (Lilburn GA) Harney Michael P. (Atlanta GA) Lett David B. (Duluth GA), Subscriber terminal with plug in expansion card.
  408. Murase, Masana; Plouffe, Jr., Wilfred E.; Shimizu, Kanna; Zbarsky, Vladimir, Support for multiple security policies on a unified authentication architecture.
  409. Davis, John M.; Takahashi, Richard, System and method for a secure I/O interface.
  410. Alberi, James L.; Pucci, Marc, System and method for a staggered execution environment.
  411. Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Jr. Frank L. (Redmond WA 4), System and method for adding new waitable object types to object oriented computer operating system.
  412. Johns, Charles R.; Shimizu, Kanna, System and method for an isolated process to control address translation.
  413. Moran, Douglas B., System and method for analyzing filesystems to detect intrusions.
  414. Decime,Jerry, System and method for authenticating digital content.
  415. Mahmoud, Fadi A.; Sridaran, Ganapathy S., System and method for authentication of embedded RAID on a host RAID card.
  416. Betouin, Pierre; Ciet, Mathieu; Farrugia, Augustin J., System and method for authentication using a shared table and sorting exponentiation.
  417. Niles, Ronald S.; Lam, Wai, System and method for backing up data.
  418. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for computer security.
  419. Lyle,Michael P.; Ross,Robert F.; Maricondo,James R., System and method for computer security.
  420. Sorkin, Stephen; Lyle, Michael; Ross, Robert F.; Maricondo, James R., System and method for computer security using multiple cages.
  421. Sorkin,Stephen; Lyle,Michael; Ross,Robert F.; Maricondo,James R., System and method for computer security using multiple cages.
  422. Moran, Douglas B., System and method for detecting buffer overflow attacks.
  423. Moran,Douglas B., System and method for detecting computer intrusions.
  424. Gabriel, Basil; Spiegel, Mark, System and method for detecting malicious applications.
  425. Sadhasivam, Karthikeyan M.; Zhang, Shuguang; Varanasi, Ravi K., System and method for detection and mitigation of network worms.
  426. Tonnesen, Steven D., System and method for detection of aberrant network behavior by clients of a network access gateway.
  427. Tonnesen, Steven D., System and method for detection of aberrant network behavior by clients of a network access gateway.
  428. Shimizu, Kanna, System and method for digital content player with secure processing vault.
  429. Merkow, Mark; Petrone, James F., System and method for dynamic security provisioning of data resources.
  430. Brokenshire, Daniel Alan; Day, Michael Norman; Minor, Barry L; Nutter, Mark Richard, System and method for efficient implementation of software-managed cache.
  431. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for generating fictitious content for a computer.
  432. Lyle,Michael P.; Ross,Robert F.; Maricondo,James R., System and method for generating fictitious content for a computer.
  433. Aguilar, Jr.,Maximino; Day,Michael Norman; Nutter,Mark Richard; Xenidis,James, System and method for grouping processors and assigning shared memory space to a group in heterogeneous computer environment.
  434. Freeman, Robert G., System and method for identification and blocking of malicious code for web browser script engines.
  435. Alan E. Beelitz ; Richard D. Amberg, System and method for initiating operation of a computer system.
  436. Manferdelli,John L.; Marr,Michael David; Krishnaswamy,Vinay; Jakubowski,Mariusz H., System and method for interfacing a software process to secure repositories.
  437. Tahan, Thomas, System and method for limiting exposure of cryptographic keys protected by a trusted platform module.
  438. Aguilar, Jr.,Maximino; Day,Michael Norman; Nutter,Mark Richard; Stafford,James Michael, System and method for message delivery across a plurality of processors.
  439. Lyle,Michael P.; Ross,Robert F.; Maricondo,James R., System and method for preventing detection of a computer connection to an external device.
  440. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for preventing detection of a selected process running on a computer.
  441. Lyle,Michael P.; Ross,Robert F.; Maricondo,James R., System and method for preventing detection of a selected process running on a computer.
  442. Aguilar, Jr.,Maximino; Nutter,Mark Richard; Stafford,James Michael, System and method for processor thread acting as a system service processor.
  443. Aguilar, Jr.,Maximino; Manning,Sidney James; Nutter,Mark Richard; Stafford,James Michael, System and method for processor thread for software debugging.
  444. Varadarajan, Sridhar; Rao, Korrapati Kalyana, System and method for protected content rendering.
  445. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  446. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  447. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  448. Rozman, Allen F.; Cioffi, Alfonso J., System and method for protecting a computer system from malicious software.
  449. Rozman,Allen F; Cioffi,Alfonso J, System and method for protecting a computer system from malicious software.
  450. Phillips, Thomas G; Frank, Alexander, System and method for protecting a computing device from computer exploits delivered over a networked environment in a secured communication.
  451. Johnson, Harold J.; Eisen, Philip A., System and method for protecting computer software from a white box attack.
  452. Day,Michael Norman; Nutter,Mark Richard; To,VanDung Dang, System and method for providing a persistent function server.
  453. MacKinnon, Richard; Looney, Kelly; White, Eric, System and method for providing access control.
  454. Geist, Joshua B., System and method for providing data and application continuity in a computer system.
  455. Gullotta, Tony J.; Bohren, Jeffrey S.; Chen, Liangtong; Curie, Jeffrey C., System and method for provisioning resources to users based on policies, roles, organizational information, and attributes.
  456. Gullotta,Tony J.; Bohren,Jeffrey S.; Chen,Liangtong; Curie,Jeffrey C., System and method for provisioning resources to users based on roles, organizational information, attributes and third-party information or authorizations.
  457. Ciet, Mathieu; Farrugia, Augustin J.; Paun, Filip Toma; Riendeau, Jean-Francois, System and method for revising boolean and arithmetic operations.
  458. Mittra Suvo, System and method for secure group communications via multicast or broadcast.
  459. Nutter, Mark Richard; Shimizu, Kanna, System and method for securely restoring a program context from a shared memory.
  460. Nutter, Mark Richard; Shimizu, Kanna, System and method for securely saving a program context to a shared memory.
  461. Nutter, Mark Richard; Shimizu, Kanna, System and method for securely saving and restoring a context of a secure program loader.
  462. Carmeli, Haim Baruch, System and method for securing a computer communication network.
  463. Phillips, Thomas G; Frank, Alexander; Chandley, Adrian M; Schoppa, Christopher A; Westerinen, William J, System and method for securing a computer system connected to a network from attacks.
  464. Haigh J. Thomas ; Jensen Andrew W., System and method for securing compiled program code.
  465. Anderson, Kay Schwendimann; Cheng, Pau-Chen; Jaeger, Trenton Ray; Liu, Zhen; Riabov, Anton Viktorovich; Rohatgi, Pankaj; Reninger, Angela Schuett; Wagner, Grant, System and method for security planning with soft security constraints.
  466. Nutter,Mark Richard; To,VanDung Dang, System and method for solving a large system of dense linear equations.
  467. Ciet, Mathieu; Farrugia, Augustin J.; Paun, Filip Toma, System and method for stream/block cipher with internal random states.
  468. Fossum,Gordon Clyde; Minor,Barry L; Nutter,Mark Richard, System and method for terrain rendering using a limited memory footprint.
  469. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  470. Datta, Shamanna M.; Zimmer, Vincent J.; Rothman, Michael A., System and method for trusted early boot flow.
  471. Moran,Douglas B., System and method for using login correlations to detect intrusions.
  472. Gassoway, Paul Alan, System and method for using rules to protect against malware.
  473. Moran,Douglas B., System and method for using signatures to detect computer intrusions.
  474. Moran,Douglas B., System and method for using timestamps to detect attacks.
  475. Aguilar, Jr.,Maximino; Day,Michael Norman; Nutter,Mark Richard; Xenidis,James, System and method for virtualization of processor resources.
  476. Ciet, Mathieu; Farrugia, Augustin; Riendeau, Jean-Francois; Sullivan, Nicholas T., System and method of authentication.
  477. Khatri, Mukund P.; Weilnau, Jr., Wayne R.; Holmberg, Jr., Richard L.; Maddukuri, Akkiah C., System and method of delaying power-up of an information handling system.
  478. Oh, HyungGeun; Paek, Seung-Hyun; Lee, Cheolho; Lee, DoHoon, System and method of detecting anomaly malicious code by using process behavior prediction technique.
  479. Kunchipudi, Sridhar; Panambur, Deepak, System and method of enabling access to remote information handling systems.
  480. Johnson, Harold Joseph; Gu, Yuan Xiang; Zhou, Yongxin, System and method of interlocking to protect software—mediated program and device behaviors.
  481. Rangarajan, Madhusudhan; Shutt, Mark W., System and method of obtaining error data within an information handling system.
  482. Ciet, Mathieu; Farrugia, Augustin; Riendeau, Jean-Francois; Sullivan, Nicholas T., System and method of performing authentication.
  483. Honig,Andrew; Howard,Andrew; Eskin,Eleazar; Stolfo,Salvatore J., System and methods for adaptive model generation for detecting intrusions in computer systems.
  484. Kirby, Alan J., System and methods for integration of behavioral and signature based security.
  485. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  486. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  487. Stollon, Neal S.; Edgar, Ernest L., System debug and trace system and method, and applications thereof.
  488. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  489. Edelmann George B. (Wilton CT) Hunter Kevin D. (Redbank NJ) Muller Arno (Westport CT) Schmidt ; Jr. Alfred C. (Wilton CT), System for detecting unaccounted for printing in a value printing system.
  490. East, Jeffrey A.; Walker, James J.; Jenness, Steven M.; Ozur, Mark C.; Kelly, Jr., James W., System for determining the rights of object access for a server process by combining them with the rights of the client process.
  491. Silverbrook, Kia; Lapstun, Paul, System for identifying counterfeit security document.
  492. Durie, Anthony Robert, System for regulating host security configuration.
  493. Elovici, Yuval; Tachan, Gil; Shabtai, Asaf, System that provides early detection, alert, and response to electronic threats.
  494. Hollander,Yona; Horovitz,Oded, System, method and computer program product for detection of unwanted processes.
  495. Bress,Steven; Menz,Mark Joseph, Systems and methods for creating exact copies of computer long-term storage devices.
  496. Kamath, Sandeep; Raja, Murali; Suganthi, Josephine; Shetty, Anil; Verzunov, Sergey, Systems and methods for dynamic decentralized load balancing across multiple sites.
  497. Kamath, Sandeep; Suganthi, Josephine; Shetty, Anil; Verzunov, Sergey; Raja, Murali, Systems and methods for dynamic decentralized load balancing across multiple sites.
  498. McCown, Steven Harvey, Systems and methods for performing wireless financial transactions.
  499. Gossweiler, III, Richard Carl; Baluja, Shumeet; Kamvar, Maryam, Systems and methods for providing image feedback.
  500. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  501. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  502. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  503. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  504. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  505. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  506. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  507. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  508. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  509. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  510. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  511. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  512. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  513. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  514. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  515. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  516. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  517. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  518. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  519. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  520. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  521. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  522. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  523. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  524. Hunter, Jamie; England, Paul; Humphries, Russell; Thom, Stefan; Schwartz, Jr., James Anthony; Ray, Kenneth D; Schwartz, Jonathan, Systems and methods for securely booting a computer with a trusted processing module.
  525. Serenyi, Denis; Witten, Brian, Systems and methods for securely managing access to data.
  526. Balakrishnan, Ganesh; Krishna, Anil; Trombley, Michael R., Systems and methods for selectively closing pages in a memory.
  527. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  528. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  529. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  530. Whalley, David; Tyson, Gary, Systems, methods, and computer program products for packing instructions into register files.
  531. Noyes, Harold B, Systems, methods, and devices for configuring a device.
  532. Herrell, Russ W., TPM device for multi-processor systems.
  533. Brokenshire,Daniel Alan; Day,Michael Norman; Minor,Barry L; Nutter,Mark Richard; To,VanDung Dang, Task queue management of virtual devices using a plurality of processors.
  534. Beinet,Lionel; Mansell,David Hennah; Watt,Simon Charles, Technique for accessing memory in a data processing apparatus.
  535. Durham, David; Sahita, Ravi; Grewal, Karanvir; Smith, Ned; Sood, Kapil, Techniques for authenticated posture reporting and associated enforcement of network access.
  536. Fee, Gregory D.; LaMacchia, Brian A.; Dillaway, Blair, Techniques for managing security contexts.
  537. Perazzoli ; Jr. Frank L. (Redmond WA) Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA), Temporary object handling system and method in an object based computer operating system.
  538. Brokenshire, Daniel Alan; Minor, Barry L.; Nutter, Mark Richard, Tightened bounding volumes for BSP-trees.
  539. Silverbrook, Kia; Lapstun, Paul, Transaction recordal system.
  540. French, Steven Michael; Halcrow, Michael Austin; Potluri, Prasad Venkata, Transparent aware data transformation at file system level for efficient encryption and integrity validation of network files.
  541. Allison, John W., Treatment planning systems and methods for body contouring applications.
  542. Bade,Steven A.; Kegel,Andrew G.; Van Doorn,Leendert P., Trust evaluation.
  543. Focke,Michael W.; Knoke,James E.; Barbieri,Paul A.; Wherley,Robert D.; Ata,John G.; Engen,Dwight B., Trusted computer system.
  544. Willman,Bryan Mark; England,Paul; Kaplan,Keith; Geller,Alan Stuart; LaMacchia,Brian A.; Dillaway,Blair Brewster; Peinado,Marcus; Aday,Michael Alfred; Wilson,Selena, Trusted data store for use in connection with trusted computer operating system.
  545. Comlekoglu, Fatih, Trusted enclave for a computer system.
  546. Wiseman,Willard M.; Grawrock,David W., Trusted platform apparatus, system, and method.
  547. Marino ; Jr. Joseph T. (Fountain Hill AZ) Lambert Paul A. (Scottsdale AZ), Uniform interface for cryptographic services.
  548. Liu, Zhengrong; Ludtke, Harold Aaron; Shinozaki, Ikuo, Use of kernel authorization data to maintain security in a digital processing system.
  549. Trufyn, Nicholas, User controlled dialog resource switching in a multi-tasking word processor.
  550. Richard, Sue M., Vehicle computer.
  551. Brokenshire,Daniel Alan; Day,Michael Norman; Minor,Barry L; Nutter,Mark Richard, Virtual devices using a pluarlity of processors.
  552. Watt,Simon Charles; Dornan,Christopher Bentley; Orion,Luc; Chaussade,Nicolas; Belnet,Lionel; Brochier,Stephane Eric Sebastien; Mansell,David Hennah; Nonweiler,Michael Robert, Virtual to physical memory address mapping within a system having a secure domain and a non-secure domain.
  553. Hamilton, II, Rick A.; Kozloski, James R.; O'Connell, Brian M.; Pickover, Clifford A.; Walker, Keith R., Virtual universe account protection.
  554. England, Paul; Setzer, Matthew C., Virtualization of software configuration registers of the TPM cryptographic processor.
  555. Samman, Ben, Virus protection in an internet environment.
  556. Waltermann, Rod D.; Mese, John C.; Kelso, Scott E.; Davis, Mark Charles; Weksler, Arnold S.; Peterson, Nathan J., Virus scanner for journaling file system.
  557. Kocin, Michael J., Voltage conditioner with embedded battery backup.
  558. Weiss, Jason Robert, Volume mount authentication.
  559. Weiss,Jason Robert, Volume mount authentication.
  560. Cutler David N. (Bellevue WA) Kelly ; Jr. James W. (Redmond WA) Perazzoli ; Sr. Frank L. (Redmond WA 4), Waitable object creation system and method in an object based computer operating system.

이 특허를 인용한 특허 (1)

  1. Case, Sr., Paul, Case secure computer architecture.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로