US6986052B1
(en)
|
2000-06-30 |
2006-01-10 |
Intel Corporation |
Method and apparatus for secure execution using a secure memory partition
|
ES2249450T3
(en)
*
|
2000-07-05 |
2006-04-01 |
ERNST & YOUNG LLP |
METHOD AND APPLIANCE TO PROVIDE INFORMATIC SERVICES.
|
GB2371125A
(en)
*
|
2001-01-13 |
2002-07-17 |
Secr Defence |
Computer protection system
|
US7925894B2
(en)
|
2001-07-25 |
2011-04-12 |
Seagate Technology Llc |
System and method for delivering versatile security, digital rights management, and privacy services
|
US20060174352A1
(en)
*
|
2001-07-25 |
2006-08-03 |
Seagate Technology Llc |
Method and apparatus for providing versatile services on storage devices
|
FI115257B
(en)
*
|
2001-08-07 |
2005-03-31 |
Nokia Corp |
Procedure for processing information in electronic device, system, electronic device and processor blocks
|
EP1331539B1
(en)
*
|
2002-01-16 |
2016-09-28 |
Texas Instruments France |
Secure mode for processors supporting MMU and interrupts
|
US7069442B2
(en)
*
|
2002-03-29 |
2006-06-27 |
Intel Corporation |
System and method for execution of a secured environment initialization instruction
|
US20030196096A1
(en)
*
|
2002-04-12 |
2003-10-16 |
Sutton James A. |
Microcode patch authentication
|
US8074081B2
(en)
*
|
2002-04-15 |
2011-12-06 |
Infineon Technologies Ag |
Method for replacing contents of a data storage unit
|
JP4564756B2
(en)
*
|
2002-04-18 |
2010-10-20 |
アドバンスト・マイクロ・ディバイシズ・インコーポレイテッド |
Method for initializing a computer system including a processor capable of operating in a secure execution mode
|
US20030226014A1
(en)
*
|
2002-05-31 |
2003-12-04 |
Schmidt Rodney W. |
Trusted client utilizing security kernel under secure execution mode
|
US7266658B2
(en)
*
|
2002-09-12 |
2007-09-04 |
International Business Machines Corporation |
System, method, and computer program product for prohibiting unauthorized access to protected memory regions
|
EP1563388A2
(en)
|
2002-11-18 |
2005-08-17 |
ARM Limited |
Secure memory for protecting against malicious programs
|
US7149862B2
(en)
|
2002-11-18 |
2006-12-12 |
Arm Limited |
Access control in a data processing apparatus
|
US7171539B2
(en)
|
2002-11-18 |
2007-01-30 |
Arm Limited |
Apparatus and method for controlling access to a memory
|
GB2396034B
(en)
|
2002-11-18 |
2006-03-08 |
Advanced Risc Mach Ltd |
Technique for accessing memory in a data processing apparatus
|
US7586855B1
(en)
*
|
2002-12-05 |
2009-09-08 |
Cisco Technology, Inc. |
System and method to detect non-native storage components to manage configuration in a communications network
|
US8892878B2
(en)
*
|
2003-05-09 |
2014-11-18 |
Oracle America, Inc. |
Fine-grained privileges in operating system partitions
|
US7725740B2
(en)
*
|
2003-05-23 |
2010-05-25 |
Nagravision S.A. |
Generating a root key for decryption of a transmission key allowing secure communications
|
US7681046B1
(en)
|
2003-09-26 |
2010-03-16 |
Andrew Morgan |
System with secure cryptographic capabilities using a hardware specific digital secret
|
US7636844B2
(en)
|
2003-11-17 |
2009-12-22 |
Intel Corporation |
Method and system to provide a trusted channel within a computer system for a SIM device
|
US7694151B1
(en)
|
2003-11-20 |
2010-04-06 |
Johnson Richard C |
Architecture, system, and method for operating on encrypted and/or hidden information
|
US8156343B2
(en)
*
|
2003-11-26 |
2012-04-10 |
Intel Corporation |
Accessing private data about the state of a data processing machine from storage that is publicly accessible
|
US7450959B2
(en)
*
|
2003-12-31 |
2008-11-11 |
Qualcomm Incorporated |
Wireless multiprocessor system-on-chip with unified memory and fault inhibitor
|
US20050198461A1
(en)
*
|
2004-01-12 |
2005-09-08 |
Shaw Mark E. |
Security measures in a partitionable computing system
|
US20080270806A1
(en)
*
|
2004-04-02 |
2008-10-30 |
Tomonori Nakamura |
Execution Device
|
EP1870814B1
(en)
|
2006-06-19 |
2014-08-13 |
Texas Instruments France |
Method and apparatus for secure demand paging for processor devices
|
JP2005338942A
(en)
*
|
2004-05-24 |
2005-12-08 |
Freescale Semiconductor Inc |
Register unit
|
US20090055597A1
(en)
*
|
2004-06-09 |
2009-02-26 |
Javier Canis Robles |
Method and Device for Sharing Information Between Memory Parcels In Limited Resource Environments
|
US7475431B2
(en)
*
|
2004-06-10 |
2009-01-06 |
International Business Machines Corporation |
Using security levels to improve permission checking performance and manageability
|
US7549174B1
(en)
*
|
2004-07-27 |
2009-06-16 |
Sun Microsystems, Inc. |
Multi-file cryptographic keystore
|
US8332653B2
(en)
*
|
2004-10-22 |
2012-12-11 |
Broadcom Corporation |
Secure processing environment
|
JP4794269B2
(en)
*
|
2004-11-08 |
2011-10-19 |
パナソニック株式会社 |
Secure device and relay terminal
|
DE112005002949T5
(en)
*
|
2004-11-24 |
2007-12-27 |
Discretix Technologies Ltd. |
System, method and apparatus for securing an operating system
|
US7774596B2
(en)
|
2005-02-02 |
2010-08-10 |
Insyde Software Corporation |
System and method for updating firmware in a secure manner
|
KR100670005B1
(en)
*
|
2005-02-23 |
2007-01-19 |
삼성전자주식회사 |
Verification device, system and integrity verification method for remotely verifying the integrity of memory for mobile platform
|
CN100334519C
(en)
*
|
2005-03-23 |
2007-08-29 |
联想(北京)有限公司 |
Method for establishing credible input-output channels
|
US8619971B2
(en)
|
2005-04-01 |
2013-12-31 |
Microsoft Corporation |
Local secure service partitions for operating system security
|
US7930738B1
(en)
*
|
2005-06-02 |
2011-04-19 |
Adobe Systems Incorporated |
Method and apparatus for secure execution of code
|
US8037474B2
(en)
|
2005-09-27 |
2011-10-11 |
Sony Computer Entertainment Inc. |
Task manager with stored task definition having pointer to a memory address containing required code data related to the task for execution
|
US20070061535A1
(en)
*
|
2005-09-12 |
2007-03-15 |
Microsoft Corporation |
Processing unit enclosed operating system
|
US20070074046A1
(en)
*
|
2005-09-23 |
2007-03-29 |
Czajkowski David R |
Secure microprocessor and method
|
US20100191959A1
(en)
*
|
2005-09-23 |
2010-07-29 |
Space Micro Inc. |
Secure microprocessor and method
|
US7734827B2
(en)
|
2005-09-27 |
2010-06-08 |
Sony Computer Entertainment, Inc. |
Operation of cell processors
|
US8316220B2
(en)
|
2005-09-27 |
2012-11-20 |
Sony Computer Entertainment Inc. |
Operating processors over a network
|
US7975269B2
(en)
|
2005-09-27 |
2011-07-05 |
Sony Computer Entertainment Inc. |
Parallel processor methods and apparatus
|
US8141076B2
(en)
|
2005-09-27 |
2012-03-20 |
Sony Computer Entertainment Inc. |
Cell processor methods and apparatus
|
JPWO2007040228A1
(en)
*
|
2005-10-04 |
2009-04-16 |
日本電気株式会社 |
Information processing apparatus, information processing method, and program
|
US7496727B1
(en)
|
2005-12-06 |
2009-02-24 |
Transmeta Corporation |
Secure memory access system and method
|
US8595747B2
(en)
|
2005-12-29 |
2013-11-26 |
Sony Computer Entertainment Inc. |
Efficient task scheduling by assigning fixed registers to scheduler
|
US7594101B2
(en)
*
|
2006-02-06 |
2009-09-22 |
Stmicroelectronics S.A. |
Secure digital processing unit and method for protecting programs
|
US20070234330A1
(en)
*
|
2006-03-01 |
2007-10-04 |
Microsoft Corporation |
Prevention of executable code modification
|
US8429724B2
(en)
*
|
2006-04-25 |
2013-04-23 |
Seagate Technology Llc |
Versatile access control system
|
US8028166B2
(en)
*
|
2006-04-25 |
2011-09-27 |
Seagate Technology Llc |
Versatile secure and non-secure messaging
|
US7539890B2
(en)
*
|
2006-04-25 |
2009-05-26 |
Seagate Technology Llc |
Hybrid computer security clock
|
EP2013809B1
(en)
*
|
2006-05-01 |
2018-11-21 |
MediaTek Inc. |
Method and apparatus for secure context switching in a system including a processor and cached virtual memory
|
US20070297606A1
(en)
*
|
2006-06-27 |
2007-12-27 |
Tkacik Thomas E |
Multiple key security and method for electronic devices
|
US8108670B2
(en)
*
|
2006-07-13 |
2012-01-31 |
Intel Corporation |
Client apparatus and method with key manager
|
US20080028180A1
(en)
*
|
2006-07-31 |
2008-01-31 |
Newman Alex P |
Inappropriate access detector based on system segmentation faults
|
US7950001B2
(en)
*
|
2006-09-08 |
2011-05-24 |
International Business Machines Corporation |
Method and apparatus for instrumentation in a multiprocessing environment
|
US9860274B2
(en)
|
2006-09-13 |
2018-01-02 |
Sophos Limited |
Policy management
|
KR20080029687A
(en)
*
|
2006-09-29 |
2008-04-03 |
한국전자통신연구원 |
High-speed large-capacity encryption device using memory with built-in encryption function and its implementation method
|
WO2008045824A2
(en)
*
|
2006-10-09 |
2008-04-17 |
Texas Instruments Incorporated |
Monitor mode integrity verification
|
US8185952B2
(en)
*
|
2007-01-03 |
2012-05-22 |
Texas Instruments Incorporated |
Static and dynamic firewalls
|
US8296581B2
(en)
*
|
2007-02-05 |
2012-10-23 |
Infineon Technologies Ag |
Secure processor arrangement having shared memory
|
US8561204B1
(en)
*
|
2007-02-12 |
2013-10-15 |
Gregory William Dalcher |
System, method, and computer program product for utilizing code stored in a protected area of memory for securing an associated system
|
US8069279B2
(en)
|
2007-03-05 |
2011-11-29 |
Apple Inc. |
Data flow control within and between DMA channels
|
US8276201B2
(en)
*
|
2007-03-22 |
2012-09-25 |
International Business Machines Corporation |
Integrity protection in data processing systems
|
US20080240230A1
(en)
*
|
2007-03-29 |
2008-10-02 |
Horizon Semiconductors Ltd. |
Media processor with an integrated TV receiver
|
DE602007012519D1
(en)
*
|
2007-04-05 |
2011-03-31 |
St Microelectronics Res & Dev |
Integrated circuit with limited data access
|
US20080263256A1
(en)
|
2007-04-20 |
2008-10-23 |
Motorola, Inc. |
Logic Device with Write Protected Memory Management Unit Registers
|
US20090328238A1
(en)
*
|
2007-06-29 |
2009-12-31 |
David Duncan Ridewood Glendinning |
Disabling encrypted data
|
US8375449B1
(en)
|
2007-08-10 |
2013-02-12 |
Fortinet, Inc. |
Circuits and methods for operating a virus co-processor
|
US8286246B2
(en)
|
2007-08-10 |
2012-10-09 |
Fortinet, Inc. |
Circuits and methods for efficient data transfer in a virus co-processing system
|
US8079084B1
(en)
|
2007-08-10 |
2011-12-13 |
Fortinet, Inc. |
Virus co-processor instructions and methods for using such
|
US20090119744A1
(en)
*
|
2007-11-01 |
2009-05-07 |
Microsoft Corporation |
Device component roll back protection scheme
|
US8522354B2
(en)
*
|
2008-05-24 |
2013-08-27 |
Via Technologies, Inc. |
Microprocessor apparatus for secure on-die real-time clock
|
US8819839B2
(en)
*
|
2008-05-24 |
2014-08-26 |
Via Technologies, Inc. |
Microprocessor having a secure execution mode with provisions for monitoring, indicating, and managing security levels
|
US8478973B2
(en)
*
|
2008-05-30 |
2013-07-02 |
Infineon Technologies Ag |
System and method for providing a secure application fragmentation environment
|
US8745314B1
(en)
*
|
2008-06-24 |
2014-06-03 |
Virident Systems, Inc. |
Methods for a random read and read/write block accessible memory
|
US9513695B2
(en)
|
2008-06-24 |
2016-12-06 |
Virident Systems, Inc. |
Methods of managing power in network computer systems
|
US9286080B2
(en)
*
|
2008-07-02 |
2016-03-15 |
Hewlett-Packard Development Company, L.P. |
Memory management for hypervisor loading
|
EP2151763A1
(en)
*
|
2008-07-28 |
2010-02-10 |
Nagravision S.A. |
Method and apparatus for obfuscating virtual to physical memory mapping
|
US8484486B2
(en)
*
|
2008-08-06 |
2013-07-09 |
Silver Spring Networks, Inc. |
Integrated cryptographic security module for a network node
|
US8843742B2
(en)
*
|
2008-08-26 |
2014-09-23 |
Hewlett-Packard Company |
Hypervisor security using SMM
|
US8281169B2
(en)
*
|
2008-08-27 |
2012-10-02 |
Wireless Silicon Group, Inc. |
Method and system for power management for a handheld mobile electronic device executing-in-place an application kernel from execute-in-place non-volatile memory (XIP NVM)
|
US20100070776A1
(en)
*
|
2008-09-17 |
2010-03-18 |
Shankar Raman |
Logging system events
|
DE102008048066B4
(en)
*
|
2008-09-19 |
2018-02-01 |
Texas Instruments Deutschland Gmbh |
An access control circuit for use with supervisory logic circuitry in a method of protecting software for embedded applications from unauthorized access
|
US20100083365A1
(en)
*
|
2008-09-30 |
2010-04-01 |
Naga Gurumoorthy |
Apparatus and method to harden computer system
|
US8132267B2
(en)
|
2008-09-30 |
2012-03-06 |
Intel Corporation |
Apparatus and method to harden computer system
|
US8266708B2
(en)
*
|
2008-12-09 |
2012-09-11 |
Broadlands Technologies Llc |
Privacy protection system
|
US8844024B1
(en)
*
|
2009-03-23 |
2014-09-23 |
Symantec Corporation |
Systems and methods for using tiered signing certificates to manage the behavior of executables
|
US8286004B2
(en)
*
|
2009-10-09 |
2012-10-09 |
Lsi Corporation |
Saving encryption keys in one-time programmable memory
|
US9588803B2
(en)
|
2009-05-11 |
2017-03-07 |
Microsoft Technology Licensing, Llc |
Executing native-code applications in a browser
|
US8219772B2
(en)
|
2009-07-02 |
2012-07-10 |
Stmicroelectronics (Research & Development) Limited |
Loading secure code into a memory
|
US9495190B2
(en)
*
|
2009-08-24 |
2016-11-15 |
Microsoft Technology Licensing, Llc |
Entropy pools for virtual machines
|
FR2955189B1
(en)
*
|
2009-11-12 |
2012-03-09 |
St Microelectronics Rousset |
SECURE PROCESS FOR PROCESSING MEMORIZED CONTENT WITHIN A COMPONENT, AND CORRESPONDING COMPONENT
|
US8510569B2
(en)
|
2009-12-16 |
2013-08-13 |
Intel Corporation |
Providing integrity verification and attestation in a hidden execution environment
|
GB2482811B
(en)
*
|
2009-12-16 |
2017-07-05 |
Intel Corp |
Providing integrity verification and attestation in a hidden execution environment
|
WO2011082082A1
(en)
*
|
2009-12-31 |
2011-07-07 |
Psi Systems, Inc. |
System and method for securing data
|
US9323921B2
(en)
|
2010-07-13 |
2016-04-26 |
Microsoft Technology Licensing, Llc |
Ultra-low cost sandboxing for application appliances
|
US8782434B1
(en)
|
2010-07-15 |
2014-07-15 |
The Research Foundation For The State University Of New York |
System and method for validating program execution at run-time
|
US8468365B2
(en)
*
|
2010-09-24 |
2013-06-18 |
Intel Corporation |
Tweakable encryption mode for memory encryption with protection against replay attacks
|
CN101989242B
(en)
*
|
2010-11-12 |
2013-06-12 |
深圳国微技术有限公司 |
Bus monitor for improving safety of SOC (System on a Chip) as well as realizing method thereof
|
US8819225B2
(en)
|
2010-11-15 |
2014-08-26 |
George Mason Research Foundation, Inc. |
Hardware-assisted integrity monitor
|
US8495323B1
(en)
*
|
2010-12-07 |
2013-07-23 |
Symantec Corporation |
Method and system of providing exclusive and secure access to virtual storage objects in a virtual machine cluster
|
US8903705B2
(en)
|
2010-12-17 |
2014-12-02 |
Microsoft Corporation |
Application compatibility shims for minimal client computers
|
CN102541673A
(en)
*
|
2010-12-27 |
2012-07-04 |
北京中电华大电子设计有限责任公司 |
Security processing method and circuit for central processing unit (CPU) fetch instruction abnormity
|
WO2012127266A1
(en)
|
2011-03-23 |
2012-09-27 |
Sandisk Il Ltd. |
Storage device and method for updating data in a partition of the storage device
|
US20120254526A1
(en)
*
|
2011-03-28 |
2012-10-04 |
Advanced Micro Devices, Inc. |
Routing, security and storage of sensitive data in random access memory (ram)
|
US8495386B2
(en)
*
|
2011-04-05 |
2013-07-23 |
Mcafee, Inc. |
Encryption of memory device with wear leveling
|
US8756434B2
(en)
*
|
2011-04-08 |
2014-06-17 |
Apple Inc. |
System and method for executing an encrypted binary from a memory pool
|
US8745408B2
(en)
*
|
2011-04-08 |
2014-06-03 |
Infineon Technologies Ag |
Instruction encryption/decryption arrangement and method with iterative encryption/decryption key update
|
US8914876B2
(en)
|
2011-05-05 |
2014-12-16 |
Ebay Inc. |
System and method for transaction security enhancement
|
US9495183B2
(en)
|
2011-05-16 |
2016-11-15 |
Microsoft Technology Licensing, Llc |
Instruction set emulation for guest operating systems
|
US9298910B2
(en)
|
2011-06-08 |
2016-03-29 |
Mcafee, Inc. |
System and method for virtual partition monitoring
|
JP5287938B2
(en)
*
|
2011-06-24 |
2013-09-11 |
ブラザー工業株式会社 |
Device control system and program
|
US9471373B2
(en)
|
2011-09-24 |
2016-10-18 |
Elwha Llc |
Entitlement vector for library usage in managing resource allocation and scheduling based on usage and priority
|
US9575903B2
(en)
|
2011-08-04 |
2017-02-21 |
Elwha Llc |
Security perimeter
|
US8943313B2
(en)
|
2011-07-19 |
2015-01-27 |
Elwha Llc |
Fine-grained security in federated data sets
|
US9098608B2
(en)
|
2011-10-28 |
2015-08-04 |
Elwha Llc |
Processor configured to allocate resources using an entitlement vector
|
US9558034B2
(en)
|
2011-07-19 |
2017-01-31 |
Elwha Llc |
Entitlement vector for managing resource allocation
|
US9170843B2
(en)
|
2011-09-24 |
2015-10-27 |
Elwha Llc |
Data handling apparatus adapted for scheduling operations according to resource allocation based on entitlement
|
US9443085B2
(en)
|
2011-07-19 |
2016-09-13 |
Elwha Llc |
Intrusion detection using taint accumulation
|
US9465657B2
(en)
|
2011-07-19 |
2016-10-11 |
Elwha Llc |
Entitlement vector for library usage in managing resource allocation and scheduling based on usage and priority
|
US8813085B2
(en)
|
2011-07-19 |
2014-08-19 |
Elwha Llc |
Scheduling threads based on priority utilizing entitlement vectors, weight and usage level
|
US9298918B2
(en)
|
2011-11-30 |
2016-03-29 |
Elwha Llc |
Taint injection and tracking
|
US8955111B2
(en)
|
2011-09-24 |
2015-02-10 |
Elwha Llc |
Instruction set adapted for security risk monitoring
|
US9798873B2
(en)
*
|
2011-08-04 |
2017-10-24 |
Elwha Llc |
Processor operable to ensure code integrity
|
US9460290B2
(en)
|
2011-07-19 |
2016-10-04 |
Elwha Llc |
Conditional security response using taint vector monitoring
|
US20130061328A1
(en)
*
|
2011-09-06 |
2013-03-07 |
Broadcom Corporation |
Integrity checking system
|
US9489541B2
(en)
*
|
2011-09-09 |
2016-11-08 |
Nvidia Corporation |
Content protection via online servers and code execution in a secure operating system
|
JP5796447B2
(en)
*
|
2011-10-07 |
2015-10-21 |
株式会社リコー |
Information processing apparatus, validity verification method, validity verification program
|
CN102521166B
(en)
*
|
2011-12-05 |
2015-02-11 |
晶门科技(深圳)有限公司 |
Information safety coprocessor and method for managing internal storage space in information safety coprocessor
|
US9413538B2
(en)
|
2011-12-12 |
2016-08-09 |
Microsoft Technology Licensing, Llc |
Cryptographic certification of secure hosted execution environments
|
US9389933B2
(en)
*
|
2011-12-12 |
2016-07-12 |
Microsoft Technology Licensing, Llc |
Facilitating system service request interactions for hardware-protected applications
|
US9596082B2
(en)
*
|
2011-12-15 |
2017-03-14 |
Intel Corporation |
Secure debug trace messages for production authenticated code modules
|
US9208319B2
(en)
|
2011-12-15 |
2015-12-08 |
Microsoft Technology Licensing, Llc |
Code base partitioning system
|
JP5908991B2
(en)
*
|
2011-12-21 |
2016-04-26 |
インテル・コーポレーション |
Secure direct memory access
|
WO2013101208A1
(en)
*
|
2011-12-30 |
2013-07-04 |
Intel Corporation |
Hardware enforced memory access permissions
|
US8751830B2
(en)
|
2012-01-23 |
2014-06-10 |
International Business Machines Corporation |
Memory address translation-based data encryption/compression
|
US8954755B2
(en)
*
|
2012-01-23 |
2015-02-10 |
International Business Machines Corporation |
Memory address translation-based data encryption with integrated encryption engine
|
KR101897605B1
(en)
*
|
2012-02-24 |
2018-09-12 |
삼성전자 주식회사 |
Method and apparatus for securing integrity of mobile termninal
|
KR101869059B1
(en)
|
2012-02-28 |
2018-06-20 |
삼성전자주식회사 |
Storage device and memory controller thereof
|
GB2500074B
(en)
*
|
2012-07-09 |
2014-08-20 |
Ultrasoc Technologies Ltd |
Debug architecture
|
US9927486B2
(en)
|
2012-07-09 |
2018-03-27 |
Ultrasoc Technologies Ltd. |
Debug architecture
|
US9378572B2
(en)
|
2012-08-17 |
2016-06-28 |
Intel Corporation |
Shared virtual memory
|
US9122873B2
(en)
|
2012-09-14 |
2015-09-01 |
The Research Foundation For The State University Of New York |
Continuous run-time validation of program execution: a practical approach
|
US9135446B2
(en)
*
|
2012-09-28 |
2015-09-15 |
Intel Corporation |
Systems and methods to provide secure storage
|
JP2014089652A
(en)
|
2012-10-31 |
2014-05-15 |
Toshiba Corp |
Information processing apparatus
|
US9092617B2
(en)
*
|
2012-11-08 |
2015-07-28 |
Intel Corporation |
Protecting systems from unauthorized access to system resources using browser independent web page technology
|
KR102139327B1
(en)
|
2012-11-15 |
2020-07-29 |
삼성전자주식회사 |
Non-volatile memory device and method of operating the same
|
KR20140073384A
(en)
*
|
2012-12-06 |
2014-06-16 |
삼성전자주식회사 |
system on chip for performing secure boot, image forming apparatus comprising it, and methods thereof
|
US9881161B2
(en)
|
2012-12-06 |
2018-01-30 |
S-Printing Solution Co., Ltd. |
System on chip to perform a secure boot, an image forming apparatus using the same, and method thereof
|
US9244840B2
(en)
|
2012-12-12 |
2016-01-26 |
International Business Machines Corporation |
Cache swizzle with inline transposition
|
US20140173392A1
(en)
*
|
2012-12-19 |
2014-06-19 |
Advanced Micro Devices, Inc. |
Hardware enforced protection of software data structures
|
US8935781B1
(en)
|
2013-02-01 |
2015-01-13 |
Google Inc. |
Native code module security for arm 64-bit instruction set architectures
|
US9158942B2
(en)
|
2013-02-11 |
2015-10-13 |
Intel Corporation |
Securing display output data against malicious software attacks
|
US8931108B2
(en)
*
|
2013-02-18 |
2015-01-06 |
Qualcomm Incorporated |
Hardware enforced content protection for graphics processing units
|
TWI498737B
(en)
*
|
2013-03-29 |
2015-09-01 |
Mstar Semiconductor Inc |
Debug authorization determining method for motherboard control module and motherboard control module thereof
|
US9396360B2
(en)
*
|
2013-06-27 |
2016-07-19 |
Advanced Micro Devices, Inc. |
System and method for secure control over performance state
|
US10061940B2
(en)
|
2013-07-09 |
2018-08-28 |
Andes Technology Corporation |
Secure protection processor and method including comparing an instruction security attribute of an instruction and a security attribute of an operational event
|
KR102167393B1
(en)
*
|
2013-08-16 |
2020-10-19 |
삼성전자 주식회사 |
Method and apparatus for monitoring data integrity in shared memory environment
|
JP6117068B2
(en)
*
|
2013-09-20 |
2017-04-19 |
株式会社東芝 |
Information processing apparatus and program
|
KR102183852B1
(en)
*
|
2013-11-22 |
2020-11-30 |
삼성전자주식회사 |
Method for integrity verification of electronic device, machine-readable storage medium and electronic device
|
WO2015094176A1
(en)
*
|
2013-12-17 |
2015-06-25 |
Intel Corporation |
Secure enclaves for use by kernel mode applications
|
US9436823B1
(en)
*
|
2013-12-17 |
2016-09-06 |
Google Inc. |
System and method for detecting malicious code
|
US9448950B2
(en)
*
|
2013-12-24 |
2016-09-20 |
Intel Corporation |
Using authenticated manifests to enable external certification of multi-processor platforms
|
US9389793B2
(en)
*
|
2014-03-06 |
2016-07-12 |
Freescale Semiconductor, Inc. |
Trusted execution and access protection for embedded memory
|
US10615967B2
(en)
|
2014-03-20 |
2020-04-07 |
Microsoft Technology Licensing, Llc |
Rapid data protection for storage devices
|
US9607178B2
(en)
|
2014-03-20 |
2017-03-28 |
Qualcomm Incorporated |
Protection against key tampering
|
US9372996B2
(en)
|
2014-05-15 |
2016-06-21 |
International Business Machines Corporation |
Protecting data owned by an operating system in a multi-operating system mobile environment
|
US9678760B2
(en)
|
2014-08-01 |
2017-06-13 |
Samsung Electronics Co., Ltd. |
Memory card and storage system having authentication program and method for operating thereof
|
CN104268448B
(en)
*
|
2014-10-11 |
2017-06-27 |
中颖电子股份有限公司 |
Using the program code guard method of the microprocessor of flash memory
|
US9767324B2
(en)
|
2014-11-22 |
2017-09-19 |
Intel Corporation |
Transparent execution of secret content
|
US9703720B2
(en)
*
|
2014-12-23 |
2017-07-11 |
Intel Corporation |
Method and apparatus to allow secure guest access to extended page tables
|
US9904803B2
(en)
|
2015-03-25 |
2018-02-27 |
Intel Corporation |
Technologies for hardening data encryption with secure enclaves
|
US9959418B2
(en)
*
|
2015-07-20 |
2018-05-01 |
Intel Corporation |
Supporting configurable security levels for memory address ranges
|
JP2017033149A
(en)
*
|
2015-07-30 |
2017-02-09 |
株式会社東芝 |
Information processing apparatus, controller, and control method of information processing apparatus
|
US10102391B2
(en)
|
2015-08-07 |
2018-10-16 |
Qualcomm Incorporated |
Hardware enforced content protection for graphics processing units
|
US9767320B2
(en)
|
2015-08-07 |
2017-09-19 |
Qualcomm Incorporated |
Hardware enforced content protection for graphics processing units
|
US9578054B1
(en)
*
|
2015-08-31 |
2017-02-21 |
Newman H-R Computer Design, LLC |
Hacking-resistant computer design
|
US10235303B2
(en)
*
|
2015-09-10 |
2019-03-19 |
Qualcomm Incorporated |
Secure entry and exit for software modules protected by controlled encryption key management
|
US9870466B2
(en)
*
|
2015-09-26 |
2018-01-16 |
Mcafee, Inc. |
Hardware-enforced code paths
|
US10546131B2
(en)
*
|
2015-10-22 |
2020-01-28 |
Mcafee, Llc |
End-point visibility
|
DE102016105936A1
(en)
*
|
2015-12-14 |
2017-06-14 |
Lenovo (Beijing) Limited |
Electronic device and method for running applications in different security environments
|
US10102370B2
(en)
*
|
2015-12-21 |
2018-10-16 |
Intel Corporation |
Techniques to enable scalable cryptographically protected memory using on-chip memory
|
WO2017142559A1
(en)
*
|
2016-02-19 |
2017-08-24 |
Hewlett-Packard Development Company, L.P. |
Securely writing data to a secure data storage device during runtime
|
US12248560B2
(en)
*
|
2016-03-07 |
2025-03-11 |
Crowdstrike, Inc. |
Hypervisor-based redirection of system calls and interrupt-based task offloading
|
JP6274623B2
(en)
*
|
2016-03-24 |
2018-02-07 |
インテル・コーポレーション |
Secure direct memory access
|
WO2017181097A1
(en)
*
|
2016-04-14 |
2017-10-19 |
Sequent Software, Inc. |
System and method for generation, storage, administration and use of one or more digital secrets in association with a portable electronic device
|
US20180004946A1
(en)
*
|
2016-07-01 |
2018-01-04 |
Intel Corporation |
Regulating control transfers for execute-only code execution
|
US10261919B2
(en)
*
|
2016-07-08 |
2019-04-16 |
Hewlett Packard Enterprise Development Lp |
Selective memory encryption
|
CN105978913A
(en)
*
|
2016-07-15 |
2016-09-28 |
柳州健科技有限公司 |
Network service system
|
CN106060083A
(en)
*
|
2016-07-16 |
2016-10-26 |
柳州健科技有限公司 |
Network service system with data monitoring function
|
CN106101024A
(en)
*
|
2016-07-16 |
2016-11-09 |
柳州健科技有限公司 |
There is the LAN data system of data monitoring function
|
CN106060082A
(en)
*
|
2016-07-16 |
2016-10-26 |
柳州健科技有限公司 |
Local area network-based network service platform with data monitoring function
|
CN106060081A
(en)
*
|
2016-07-16 |
2016-10-26 |
柳州健科技有限公司 |
Network service platform with data monitor function
|
US10721067B2
(en)
*
|
2016-08-10 |
2020-07-21 |
Lenovo Enterprise Solutions (Singapore) Pte. Ltd. |
Secure processor for multi-tenant cloud workloads
|
US10389693B2
(en)
*
|
2016-08-23 |
2019-08-20 |
Hewlett Packard Enterprise Development Lp |
Keys for encrypted disk partitions
|
US20180081830A1
(en)
*
|
2016-09-20 |
2018-03-22 |
Advanced Micro Devices, Inc. |
Hardware supervision of page tables
|
US10528485B2
(en)
*
|
2016-09-30 |
2020-01-07 |
Intel Corporation |
Method and apparatus for sharing security metadata memory space
|
US11405201B2
(en)
|
2016-11-10 |
2022-08-02 |
Brickell Cryptology Llc |
Secure transfer of protected application storage keys with change of trusted computing base
|
US10855465B2
(en)
|
2016-11-10 |
2020-12-01 |
Ernest Brickell |
Audited use of a cryptographic key
|
US10498712B2
(en)
|
2016-11-10 |
2019-12-03 |
Ernest Brickell |
Balancing public and personal security needs
|
US11398906B2
(en)
|
2016-11-10 |
2022-07-26 |
Brickell Cryptology Llc |
Confirming receipt of audit records for audited use of a cryptographic key
|
US10394711B2
(en)
*
|
2016-11-30 |
2019-08-27 |
International Business Machines Corporation |
Managing lowest point of coherency (LPC) memory using a service layer adapter
|
KR20180066601A
(en)
*
|
2016-12-09 |
2018-06-19 |
삼성전자주식회사 |
Method of driving memory system
|
CN106650499A
(en)
*
|
2016-12-28 |
2017-05-10 |
江苏神州信源系统工程有限公司 |
External data security protection method based on Android system
|
US10223531B2
(en)
|
2016-12-30 |
2019-03-05 |
Google Llc |
Secure device state apparatus and method and lifecycle management
|
US10417433B2
(en)
|
2017-01-24 |
2019-09-17 |
Lenovo Enterprise Solutions (Singapore) Pte. Ltd. |
Encryption and decryption of data owned by a guest operating system
|
SG11201706338WA
(en)
*
|
2017-02-20 |
2018-09-27 |
Newman H R Computer Design Llc |
Hacking-resistant computer design
|
US10652245B2
(en)
|
2017-05-04 |
2020-05-12 |
Ernest Brickell |
External accessibility for network devices
|
US10348706B2
(en)
|
2017-05-04 |
2019-07-09 |
Ernest Brickell |
Assuring external accessibility for devices on a network
|
CN109308163A
(en)
*
|
2017-07-26 |
2019-02-05 |
英业达科技有限公司 |
Non-volatility memory magnetic region planing method
|
US10482289B2
(en)
*
|
2017-08-24 |
2019-11-19 |
Qualcomm Incorporated |
Computing device to provide access control to a hardware resource
|
US10997303B2
(en)
|
2017-09-12 |
2021-05-04 |
Sophos Limited |
Managing untyped network traffic flows
|
KR102416501B1
(en)
|
2017-09-20 |
2022-07-05 |
삼성전자주식회사 |
Electronic device and control method thereof
|
US10116436B1
(en)
*
|
2017-09-26 |
2018-10-30 |
Intel Corporation |
Techniques for preventing memory timing attacks
|
US10754580B2
(en)
*
|
2017-10-23 |
2020-08-25 |
Micron Technology, Inc. |
Virtual partition management in a memory device
|
US10318438B1
(en)
*
|
2017-12-07 |
2019-06-11 |
Nuvoton Technology Corporation |
Secure memory access using memory read restriction
|
US10757087B2
(en)
*
|
2018-01-02 |
2020-08-25 |
Winbond Electronics Corporation |
Secure client authentication based on conditional provisioning of code signature
|
US10970390B2
(en)
*
|
2018-02-15 |
2021-04-06 |
Intel Corporation |
Mechanism to prevent software side channels
|
IL258368B2
(en)
*
|
2018-03-26 |
2024-04-01 |
Kazuar Advanced Tech Ltd |
Secured Computer System
|
US10649911B2
(en)
*
|
2018-03-29 |
2020-05-12 |
Intel Corporation |
Supporting memory paging in virtualized systems using trust domains
|
CN110490008B
(en)
*
|
2018-05-14 |
2021-08-10 |
英韧科技(上海)有限公司 |
Security device and security chip
|
US11030112B2
(en)
|
2018-05-25 |
2021-06-08 |
Red Hat, Inc. |
Enhanced address space layout randomization
|
CN110569205A
(en)
*
|
2018-06-06 |
2019-12-13 |
旭景科技股份有限公司 |
Security system single chip and method of operation thereof
|
DE102018213617A1
(en)
*
|
2018-06-20 |
2019-12-24 |
Robert Bosch Gmbh |
Computing device and operating method therefor
|
EP3811264A4
(en)
|
2018-06-24 |
2022-03-02 |
Hex Five Security, Inc. |
Configuring, enforcing, and monitoring separation of trusted execution environments
|
US11741196B2
(en)
|
2018-11-15 |
2023-08-29 |
The Research Foundation For The State University Of New York |
Detecting and preventing exploits of software vulnerability using instruction tags
|
US11392687B2
(en)
*
|
2019-01-04 |
2022-07-19 |
Baidu Usa Llc |
Method and system for validating kernel objects to be executed by a data processing accelerator of a host system
|
US11063747B2
(en)
*
|
2019-03-25 |
2021-07-13 |
Micron Technology, Inc. |
Secure monitoring using block chain
|
US11948008B2
(en)
|
2019-04-30 |
2024-04-02 |
Hewlett-Packard Development Company, L.P. |
System management memory coherency detection
|
TWI693600B
(en)
*
|
2019-05-08 |
2020-05-11 |
慧榮科技股份有限公司 |
Data storage device and control method for non-volatile memory with security extension
|
US11372780B2
(en)
|
2019-05-30 |
2022-06-28 |
Synaptics Incorporated |
Granular access control for secure memory
|
CN110348204B
(en)
*
|
2019-06-17 |
2023-05-16 |
海光信息技术股份有限公司 |
Code protection system, authentication method, authentication device, chip and electronic equipment
|
US11645425B2
(en)
|
2019-07-03 |
2023-05-09 |
Beyond Semiconductor, d.o.o. |
Systems and methods for data-driven secure and safe computing
|
FR3098613A1
(en)
*
|
2019-07-09 |
2021-01-15 |
STMicroelectronics (Grand Ouest) SAS |
PROCESS FOR MANAGING THE OPERATION OF AT LEAST ONE NUMBER APPLICATION SOFTWARE AND CORRESPONDING INTEGRATED CIRCUIT
|
WO2021040721A1
(en)
|
2019-08-29 |
2021-03-04 |
Google Llc |
Securing external data storage for a secure element integrated on a system-on-chip
|
CN112749397A
(en)
|
2019-10-29 |
2021-05-04 |
阿里巴巴集团控股有限公司 |
System and method
|
KR20210142820A
(en)
|
2020-05-19 |
2021-11-26 |
삼성전자주식회사 |
A non volatile memory device storing a public key and a secret key, an electronic device comprising the same and a service provider
|
US11561907B2
(en)
|
2020-08-18 |
2023-01-24 |
Micron Technology, Inc. |
Access to data stored in quarantined memory media
|
US11880718B2
(en)
*
|
2020-09-15 |
2024-01-23 |
Renesas Electronics Corporation |
System and method for generating secure partition regions in open and secure processor environments
|
CN112380503B
(en)
*
|
2021-01-14 |
2021-04-30 |
北京东方通软件有限公司 |
Method for protecting core program and memory
|
US11720504B2
(en)
*
|
2021-04-15 |
2023-08-08 |
Apple Inc. |
Secure storage of datasets in a thread network device
|
US11709786B2
(en)
*
|
2021-04-29 |
2023-07-25 |
Renesas Electronic Corporation |
Device and method of secure decryption by virtualization and translation of physical encryption keys
|
US12192214B2
(en)
|
2021-05-05 |
2025-01-07 |
Sophos Limited |
Mitigating threats associated with tampering attempts
|
US12197608B2
(en)
|
2021-05-10 |
2025-01-14 |
Beyond Semiconductor, d.o.o. |
Inter system policy federation in a data-driven secure and safe computing environment
|
WO2024043935A1
(en)
*
|
2022-08-25 |
2024-02-29 |
MatterFi |
Crypto currency hardware wallet
|
US11977496B1
(en)
*
|
2022-09-29 |
2024-05-07 |
Amazon Technologies, Inc. |
Security vulnerability mitigation using hardware-supported context-dependent address space hiding
|
US20240126859A1
(en)
*
|
2022-10-17 |
2024-04-18 |
Dell Products L.P. |
Authenticating Usage Data For Processing By Machine Learning Models
|