Issued Patents
  1. 12,373,356 (2025): Fast key ID switching via extended paging for cryptographic intra-process isolation
  2. 12,360,689 (2025): Efficient caching and queueing for per-allocation non-redundant metadata
  3. 12,346,463 (2025): Pointer based data encryption
  4. 12,321,467 (2025): Cryptographic computing isolation for multi-tenancy and secure software components
  5. 12,306,998 (2025): Stateless and low-overhead domain isolation using cryptographic computing
  6. 12,282,567 (2025): Cryptographic computing using encrypted base addresses and used in multi-tenant environments
  7. 12,277,234 (2025): Cryptographic computing in multitenant environments
  8. 12,253,958 (2025): System for address mapping and translation protection
  9. 12,216,922 (2025): Updating encrypted security context in stack pointers for exception handling and tight bounding of on-stack arguments
  10. 12,182,317 (2024): Region-based deterministic memory safety
  11. 12,093,182 (2024): Typed store buffers for hardening store forwarding
  12. 12,050,701 (2024): Cryptographic isolation of memory compartments in a computing environment
  13. 12,045,174 (2024): Tagless implicit integrity with multi-perspective pattern search
  14. 12,032,486 (2024): Transient side-channel aware architecture for cryptographic computing
  15. 12,019,733 (2024): Compartment isolation for load store forwarding
  16. 12,019,562 (2024): Cryptographic computing including enhanced cryptographic addresses
  17. 12,008,374 (2024): Cryptographic enforcement of borrow checking
  18. 11,972,126 (2024): Data relocation for inline metadata
  19. 11,960,375 (2024): Apparatus and method for pausing processor trace for efficient analysis
  20. 11,954,045 (2024): Object and cacheline granularity cryptographic memory integrity
  21. 11,940,927 (2024): Technologies for memory tagging
  22. 11,922,220 (2024): Function as a service (FaaS) system enhancements
  23. 11,841,939 (2023): Technologies for object-oriented memory management with extended segmentation
  24. 11,838,418 (2023): Protection of keys and sensitive data from attack within microprocessor architecture
  25. 11,836,094 (2023): Cryptographic data objects page conversion
  26. 11,829,488 (2023): Pointer based data encryption
  27. 11,829,299 (2023): Technologies for execute only transactional memory
  28. 11,822,644 (2023): Technologies for object-oriented memory management with extended segmentation
  29. 11,797,678 (2023): Memory scanning methods and apparatus
  30. 11,789,737 (2023): Capability-based stack protection for software fault isolation
  31. 11,784,786 (2023): Mitigating security vulnerabilities with memory allocation markers in cryptographic computing systems
  32. 11,782,826 (2023): Security check systems and methods for memory allocations
  33. 11,782,716 (2023): Hardware apparatuses, methods, and systems for individually revocable capabilities for enforcing temporal memory safety
  34. 11,768,931 (2023): Technologies for object-oriented memory management with extended segmentation
  35. 11,741,018 (2023): Apparatus and method for efficient process-based compartmentalization
  36. 11,734,199 (2023): Enforcing memory operand types using protection keys
  37. 11,711,201 (2023): Encoded stack pointers
  38. 11,704,297 (2023): Collision-free hashing for accessing cryptographic computing metadata and for cache expansion
  39. 11,681,793 (2023): Technologies for object-oriented memory management with extended segmentation
  40. 11,669,625 (2023): Data type based cryptographic computing
  41. 11,630,920 (2023): Memory tagging for side-channel defense, memory safety, and sandboxing
  42. 11,620,391 (2023): Data encryption based on immutable pointers
  43. 11,580,035 (2023): Fine-grained stack protection using cryptographic computing
  44. 11,575,504 (2023): Cryptographic computing engine for memory load and store units of a microarchitecture pipeline
  45. 11,562,063 (2023): Encoded inline capabilities
  46. 11,531,750 (2022): Installing and manipulating a secure virtual machine image through an untrusted hypervisor
  47. 11,436,161 (2022): System for address mapping and translation protection
  48. 11,429,580 (2022): Collision-free hashing for accessing cryptographic computing metadata and for cache expansion
  49. 11,416,624 (2022): Cryptographic computing using encrypted base addresses and used in multi-tenant environments
  50. 11,416,414 (2022): Technologies for execute only transactional memory
  51. 11,409,662 (2022): Apparatus and method for efficient process-based compartmentalization
  52. 11,403,234 (2022): Cryptographic computing using encrypted base addresses and used in multi-tenant environments
  53. 11,392,492 (2022): Memory management apparatus and method for compartmentalization using linear address metadata
  54. 11,360,876 (2022): Apparatus and method for pausing processor trace for efficient analysis
  55. 11,354,423 (2022): Cryptographic isolation of memory compartments in a computing environment
  56. 11,321,469 (2022): Microprocessor pipeline circuitry to support cryptographic computing
  57. 11,250,165 (2022): Binding of cryptographic operations to context or speculative execution restrictions
  58. 11,222,127 (2022): Processor hardware and instructions for SHA3 cryptographic operations
  59. 11,216,366 (2022): Security check systems and methods for memory allocations
  60. 11,188,639 (2021): System, method and apparatus for automatic program compartmentalization
  61. 11,171,983 (2021): Techniques to provide function-level isolation with capability-based security
  62. 11,163,569 (2021): Hardware apparatuses, methods, and systems for individually revocable capabilities for enforcing temporal memory safety
  63. 11,144,479 (2021): System for address mapping and translation protection
  64. 11,080,401 (2021): Memory scanning methods and apparatus
  65. 11,036,850 (2021): Technologies for object-oriented memory management with extended segmentation
  66. 11,030,113 (2021): Apparatus and method for efficient process-based compartmentalization
  67. 10,884,952 (2021): Enforcing memory operand types using protection keys
  68. 10,860,709 (2020): Encoded inline capabilities
  69. 10,795,997 (2020): Hardened safe stack for return oriented programming attack mitigation
  70. 10,785,028 (2020): Protection of keys and sensitive data from attack within microprocessor architecture
  71. 10,769,272 (2020): Technology to protect virtual machines from malicious virtual machine managers
  72. 10,706,164 (2020): Crypto-enforced capabilities for isolation
  73. 10,642,752 (2020): Auxiliary processor resources
  74. 10,558,582 (2020): Technologies for execute only transactional memory
  75. 10,515,023 (2019): System for address mapping and translation protection
  76. 10,503,664 (2019): Virtual machine manager for address mapping and translation protection
  77. 10,453,114 (2019): Selective sharing of user information based on contextual relationship information, such as to crowd-source gifts of interest to a recipient
  78. 10,452,848 (2019): Memory scanning methods and apparatus
  79. 10,324,863 (2019): Protected memory view for nested page table access by virtual machine guests
  80. 10,318,733 (2019): Techniques for detecting malware with minimal performance degradation
  81. 10,235,301 (2019): Dynamic page table edit control
  82. 10,216,522 (2019): Technologies for indirect branch target security
  83. 10,157,277 (2018): Technologies for object-oriented memory management with extended segmentation
  84. 10,152,612 (2018): Cryptographic operations for secure page mapping in a virtual machine environment
  85. 10,104,122 (2018): Verified sensor data processing
  86. 10,061,918 (2018): System, apparatus and method for filtering memory access logging in a processor
  87. 10,007,784 (2018): Technologies for control flow exploit mitigation using processor trace
  88. 9,954,950 (2018): Attestable information flow control in computer systems
  89. 9,858,411 (2018): Execution profiling mechanism
  90. 9,830,162 (2017): Technologies for indirect branch target security
  91. 9,817,976 (2017): Techniques for detecting malware with minimal performance degradation
  92. 9,805,194 (2017): Memory scanning methods and apparatus
  93. 9,792,222 (2017): Validating virtual address translation by virtual machine monitor utilizing address validation structure to validate tentative guest physical address and aborting based on flag in extended page table requiring an expected guest physical address in the address validation structure
  94. 9,710,393 (2017): Dynamic page table edit control
  95. 9,703,703 (2017): Control of entry into protected memory views
  96. 9,665,373 (2017): Protecting confidential data with transactional processing in execute-only memory
  97. 9,501,637 (2016): Hardware shadow stack support for legacy guests
  98. 9,335,943 (2016): Method and apparatus for fine grain memory protection
  99. 9,124,635 (2015): Verified sensor data processing
  100. 8,458,791 (2013): Hardware-implemented hypervisor for root-of-trust monitoring and control of computer system
  101. 7,774,411 (2010): Secure electronic message transport protocol
Published Patent Applications
  1. 18/946,869: CAPABILITY-BASED MEMORY ACCESS CONTROL FOR GRAPHICS PROCESSORS AND ACCELERATORS
  2. 18/478,882: MEMORY SAFETY USING TAG CHECKING INSTRUCTIONS AND ISLANDS OF TAGS IN LINE WITH BUCKETED DATA
  3. 18/346,221: INSTRUCTION PREFIX ENCODING FOR CRYPTOGRAPHIC COMPUTING CAPABILITY DATA TYPES
  4. 18/194,553: MULTI-KEY MEMORY ENCRYPTION PROVIDING EFFICIENT ISOLATION FOR MULTITHREADED PROCESSES
  5. 17/936,011: DETERMINISTIC ADJACENT OVERFLOW DETECTION FOR SLOTTED MEMORY POINTERS
  6. 17/953,186: TEMPORAL INFORMATION LEAKAGE PROTECTION MECHANISM FOR CRYPTOGRAPHIC COMPUTING
  7. 17/949,353: USER-LEVEL EXCEPTION-BASED INVOCATION OF SOFTWARE INSTRUMENTATION HANDLERS
  8. 18/499,133: POINTER BASED DATA ENCRYPTION
  9. 17/886,981: SPECULATING OBJECT-GRANULAR KEY IDENTIFIERS FOR MEMORY SAFETY
  10. 17/853,087: REDUCING INSTRUMENTATION CODE BLOAT AND PERFORMANCE OVERHEADS USING A RUNTIME CALL INSTRUCTION
  11. 17/853,087: REDUCING INSTRUMENTATION CODE BLOAT AND PERFORMANCE OVERHEADS USING A RUNTIME CALL INSTRUCTION
  12. 17/849,351: CONTROL FLOW INTEGRITY TO PREVENT POTENTIAL LEAKAGE OF SENSITIVE DATA TO ADVERSARIES
  13. 17/957,814: MEMORY SAFETY WITH SINGLE MEMORY TAG PER ALLOCATION
  14. 17/848,142: IMPLICIT MEMORY CORRUPTION DETECTION FOR CONDITIONAL DATA TYPES
  15. 17/791,000: CRYPTOGRAPHIC COMPUTING IN MULTITENANT ENVIRONMENTS
  16. 17/947,072: UPDATING ENCRYPTED SECURITY CONTEXT IN STACK POINTERS FOR EXCEPTION HANDLING AND TIGHT BOUNDING OF ON-STACK ARGUMENTS
  17. 17/357,951: ZERO-REDUNDANCY TAG STORAGE FOR BUCKETED ALLOCATORS
  18. 17/357,963: REGION-BASED DETERMINISTIC MEMORY SAFETY
  19. 17/696,330: RATCHET POINTERS TO ENFORCE BYTE-GRANULAR BOUNDS CHECKS ON MULTIPLE VIEWS OF AN OBJECT
  20. 17/699,593: CRYPTOGRAPHIC DATA OBJECTS PAGE CONVERSION
  21. 17/693,748: GENERATING ENCRYPTED CAPABILITIES WITHIN BOUNDS
  22. 17/682,997: COMPILER-DIRECTED SELECTION OF OBJECTS FOR CAPABILITY PROTECTION
  23. 17/561,828: PROCESS OBJECT RE-KEYING DURING PROCESS CREATION IN CRYPTOGRAPHIC COMPUTING
  24. 17/559,385: DATA OBLIVIOUS CRYPTOGRAPHIC COMPUTING
  25. 17/314,349: TECHNOLOGY TO CONTROL SYSTEM CALL INVOCATIONS WITHIN A SINGLE ADDRESS SPACE
  26. 16/862,022: MEMORY WRITE FOR OWNERSHIP ACCESS IN A CORE
  27. 15/721,553: Installing and manipulating a secure virtual machine image through an untrusted hypervisor
  28. 15/713,573: Methods and arrangements to determine physical resource assignments
  29. 16/040,193: System, method and apparatus for automatic program compartmentalization
  30. 15/273,286: Access control
  31. 15/201,018: Regulating control transfers for execute-only code execution