Encrypted memory

AF Glew, DA Gerrity, CT Tegreene - US Patent 8,930,714, 2015 - Google Patents
A memory device is operable to perform channel encryption wherein for communication
between devices, each includes cryptographic logic and performs cryptographic operations …

Security perimeter

AF Glew, DA Gerrity, CT Tegreene - US Patent 9,575,903, 2017 - Google Patents
Embodiments of memory devices, computer systems, security apparatus, data handling
systems, and the like, and associated methods facilitate security in a system incorporating …

Fine-grained security in federated data sets

AF Glew, DA Gerrity, CT Tegreene - US Patent 8,943,313, 2015 - Google Patents
(57) ABSTRACT A data processing system, a server Such as a federated server, a computer
system, and like devices, and associated operating methods can be configured to Support …

Instruction set adapted for security risk monitoring

AF Glew, DA Gerrity, CT Tegreene - US Patent 8,955,111, 2015 - Google Patents
A processor is adapted to manage security risk by updating and monitoring a taint storage
element in response to receipt of taint indicators, and responding to predetermined taint …

Scheduling threads based on priority utilizing entitlement vectors, weight and usage level

AF Glew, DA Gerrity, CT Tegreene - US Patent 8,813,085, 2014 - Google Patents
An embodiment or embodiments of an information handling apparatus can use an
entitlement vector to simultaneously manage and activate entitlement of objects and …

Method and apparatus for protecting digital contents stored in usb mass storage device

CS Ahn, J Shin, B Kim - US Patent App. 11/872,161, 2008 - Google Patents
SUMMARY OF THE INVENTION 0007 Exemplary embodiments of the present invention
overcome the above disadvantages and other disadvantages not described above. In …

Processor operable to ensure code integrity

AF Glew, DA Gerrity, CT Tegreene - US Patent 9,798,873, 2017 - Google Patents
(57) ABSTRACT A processor can be used to ensure that program code can only be used for
a designed purpose and not exploited by malware. Embodiments of an illustrative processor …

Intrusion detection using taint accumulation

AF Glew, DA Gerrity, CT Tegreene - US Patent 9,443,085, 2016 - Google Patents
A method operable in a computing device adapted for handling security risk can use taint
accumulation to detect intrusion. The method can comprise receiving a plurality of taint …

Data handling apparatus adapted for scheduling operations according to resource allocation based on entitlement

AF Glew, DA Gerrity, CT Tegreene - US Patent 9,170,843, 2015 - Google Patents
4,525,599 A 6, 1985 Curranet al. 5.437, 032 A* 7/1995 Wolfetal.................... T18, 103
5,623,637 A 4/1997 Jones et al. 6,006,328 A 12, 1999 Drake 6,057,598 A 5/2000 Payne et …

Systems and methods for providing network security using a secure digital device

ON Ely - US Patent 9,762,614, 2017 - Google Patents
(57) ABSTRACT A system may include a traffic interception module config ured to intercept
network traffic of a host device. A traffic virtualization module may be configured to generate …