Encrypted memory

AF Glew, DA Gerrity, CT Tegreene - US Patent 8,930,714, 2015 - Google Patents
A memory device is operable to perform channel encryption wherein for communication
between devices, each includes cryptographic logic and performs cryptographic operations …

Security perimeter

AF Glew, DA Gerrity, CT Tegreene - US Patent 9,575,903, 2017 - Google Patents
Embodiments of memory devices, computer systems, security apparatus, data handling
systems, and the like, and associated methods facilitate security in a system incorporating …

Fine-grained security in federated data sets

AF Glew, DA Gerrity, CT Tegreene - US Patent 8,943,313, 2015 - Google Patents
(57) ABSTRACT A data processing system, a server Such as a federated server, a computer
system, and like devices, and associated operating methods can be configured to Support …

Providing multiple isolated execution environments for securely accessing untrusted content

DJ Walsh - US Patent 9,684,785, 2017 - Google Patents
A sandbox tool can create and maintain multiple isolated execution environments,
simultaneously. The sandbox tool can assign a unique security label to each isolated …

Instruction set adapted for security risk monitoring

AF Glew, DA Gerrity, CT Tegreene - US Patent 8,955,111, 2015 - Google Patents
A processor is adapted to manage security risk by updating and monitoring a taint storage
element in response to receipt of taint indicators, and responding to predetermined taint …

Scheduling threads based on priority utilizing entitlement vectors, weight and usage level

AF Glew, DA Gerrity, CT Tegreene - US Patent 8,813,085, 2014 - Google Patents
An embodiment or embodiments of an information handling apparatus can use an
entitlement vector to simultaneously manage and activate entitlement of objects and …

Systems and methods for providing an isolated execution environment for accessing untrusted content

DJ Walsh, EL Paris - US Patent 8,627,451, 2014 - Google Patents
(57) ABSTRACT A sandbox tool can cooperate with components of a secure operating
system to create an isolated execution environment for accessing untrusted content without …

Processor operable to ensure code integrity

AF Glew, DA Gerrity, CT Tegreene - US Patent 9,798,873, 2017 - Google Patents
(57) ABSTRACT A processor can be used to ensure that program code can only be used for
a designed purpose and not exploited by malware. Embodiments of an illustrative processor …

Intrusion detection using taint accumulation

AF Glew, DA Gerrity, CT Tegreene - US Patent 9,443,085, 2016 - Google Patents
A method operable in a computing device adapted for handling security risk can use taint
accumulation to detect intrusion. The method can comprise receiving a plurality of taint …

Safe self-modifying code

J Ansel, CL Biffle, U Erlingsson, DC Sehr - US Patent 8,850,574, 2014 - Google Patents
Methods, systems, and apparatus, including computer programs encoded on a computer
storage medium, for runtime language-independent sandboxing of software. In one aspect …