Encrypted memory
AF Glew, DA Gerrity, CT Tegreene - US Patent 8,930,714, 2015 - Google Patents
A memory device is operable to perform channel encryption wherein for communication
between devices, each includes cryptographic logic and performs cryptographic operations …
between devices, each includes cryptographic logic and performs cryptographic operations …
Security perimeter
AF Glew, DA Gerrity, CT Tegreene - US Patent 9,575,903, 2017 - Google Patents
Embodiments of memory devices, computer systems, security apparatus, data handling
systems, and the like, and associated methods facilitate security in a system incorporating …
systems, and the like, and associated methods facilitate security in a system incorporating …
Fine-grained security in federated data sets
AF Glew, DA Gerrity, CT Tegreene - US Patent 8,943,313, 2015 - Google Patents
(57) ABSTRACT A data processing system, a server Such as a federated server, a computer
system, and like devices, and associated operating methods can be configured to Support …
system, and like devices, and associated operating methods can be configured to Support …
Providing multiple isolated execution environments for securely accessing untrusted content
DJ Walsh - US Patent 9,684,785, 2017 - Google Patents
A sandbox tool can create and maintain multiple isolated execution environments,
simultaneously. The sandbox tool can assign a unique security label to each isolated …
simultaneously. The sandbox tool can assign a unique security label to each isolated …
Instruction set adapted for security risk monitoring
AF Glew, DA Gerrity, CT Tegreene - US Patent 8,955,111, 2015 - Google Patents
A processor is adapted to manage security risk by updating and monitoring a taint storage
element in response to receipt of taint indicators, and responding to predetermined taint …
element in response to receipt of taint indicators, and responding to predetermined taint …
Scheduling threads based on priority utilizing entitlement vectors, weight and usage level
AF Glew, DA Gerrity, CT Tegreene - US Patent 8,813,085, 2014 - Google Patents
An embodiment or embodiments of an information handling apparatus can use an
entitlement vector to simultaneously manage and activate entitlement of objects and …
entitlement vector to simultaneously manage and activate entitlement of objects and …
Systems and methods for providing an isolated execution environment for accessing untrusted content
DJ Walsh, EL Paris - US Patent 8,627,451, 2014 - Google Patents
(57) ABSTRACT A sandbox tool can cooperate with components of a secure operating
system to create an isolated execution environment for accessing untrusted content without …
system to create an isolated execution environment for accessing untrusted content without …
Processor operable to ensure code integrity
AF Glew, DA Gerrity, CT Tegreene - US Patent 9,798,873, 2017 - Google Patents
(57) ABSTRACT A processor can be used to ensure that program code can only be used for
a designed purpose and not exploited by malware. Embodiments of an illustrative processor …
a designed purpose and not exploited by malware. Embodiments of an illustrative processor …
Intrusion detection using taint accumulation
AF Glew, DA Gerrity, CT Tegreene - US Patent 9,443,085, 2016 - Google Patents
A method operable in a computing device adapted for handling security risk can use taint
accumulation to detect intrusion. The method can comprise receiving a plurality of taint …
accumulation to detect intrusion. The method can comprise receiving a plurality of taint …
Safe self-modifying code
Methods, systems, and apparatus, including computer programs encoded on a computer
storage medium, for runtime language-independent sandboxing of software. In one aspect …
storage medium, for runtime language-independent sandboxing of software. In one aspect …