Issued Patents
  1. 12,321,467 (2025): Cryptographic computing isolation for multi-tenancy and secure software components
  2. 12,306,998 (2025): Stateless and low-overhead domain isolation using cryptographic computing
  3. 12,282,567 (2025): Cryptographic computing using encrypted base addresses and used in multi-tenant environments
  4. 12,277,234 (2025): Cryptographic computing in multitenant environments
  5. 12,253,958 (2025): System for address mapping and translation protection
  6. 12,216,922 (2025): Updating encrypted security context in stack pointers for exception handling and tight bounding of on-stack arguments
  7. 12,182,317 (2024): Region-based deterministic memory safety
  8. 12,093,182 (2024): Typed store buffers for hardening store forwarding
  9. 12,050,701 (2024): Cryptographic isolation of memory compartments in a computing environment
  10. 12,045,174 (2024): Tagless implicit integrity with multi-perspective pattern search
  11. 12,032,486 (2024): Transient side-channel aware architecture for cryptographic computing
  12. 12,019,733 (2024): Compartment isolation for load store forwarding
  13. 12,019,562 (2024): Cryptographic computing including enhanced cryptographic addresses
  14. 12,008,374 (2024): Cryptographic enforcement of borrow checking
  15. 11,972,126 (2024): Data relocation for inline metadata
  16. 11,960,375 (2024): Apparatus and method for pausing processor trace for efficient analysis
  17. 11,954,045 (2024): Object and cacheline granularity cryptographic memory integrity
  18. 11,940,927 (2024): Technologies for memory tagging
  19. 11,922,220 (2024): Function as a service (FaaS) system enhancements
  20. 11,841,939 (2023): Technologies for object-oriented memory management with extended segmentation
  21. 11,838,418 (2023): Protection of keys and sensitive data from attack within microprocessor architecture
  22. 11,836,094 (2023): Cryptographic data objects page conversion
  23. 11,829,488 (2023): Pointer based data encryption
  24. 11,829,299 (2023): Technologies for execute only transactional memory
  25. 11,822,644 (2023): Technologies for object-oriented memory management with extended segmentation
  26. 11,797,678 (2023): Memory scanning methods and apparatus
  27. 11,789,737 (2023): Capability-based stack protection for software fault isolation
  28. 11,784,786 (2023): Mitigating security vulnerabilities with memory allocation markers in cryptographic computing systems
  29. 11,782,826 (2023): Security check systems and methods for memory allocations
  30. 11,782,716 (2023): Hardware apparatuses, methods, and systems for individually revocable capabilities for enforcing temporal memory safety
  31. 11,768,931 (2023): Technologies for object-oriented memory management with extended segmentation
  32. 11,741,018 (2023): Apparatus and method for efficient process-based compartmentalization
  33. 11,734,199 (2023): Enforcing memory operand types using protection keys
  34. 11,711,201 (2023): Encoded stack pointers
  35. 11,704,297 (2023): Collision-free hashing for accessing cryptographic computing metadata and for cache expansion
  36. 11,681,793 (2023): Technologies for object-oriented memory management with extended segmentation
  37. 11,669,625 (2023): Data type based cryptographic computing
  38. 11,630,920 (2023): Memory tagging for side-channel defense, memory safety, and sandboxing
  39. 11,620,391 (2023): Data encryption based on immutable pointers
  40. 11,580,035 (2023): Fine-grained stack protection using cryptographic computing
  41. 11,575,504 (2023): Cryptographic computing engine for memory load and store units of a microarchitecture pipeline
  42. 11,562,063 (2023): Encoded inline capabilities
  43. 11,531,750 (2022): Installing and manipulating a secure virtual machine image through an untrusted hypervisor
  44. 11,436,161 (2022): System for address mapping and translation protection
  45. 11,429,580 (2022): Collision-free hashing for accessing cryptographic computing metadata and for cache expansion
  46. 11,416,624 (2022): Cryptographic computing using encrypted base addresses and used in multi-tenant environments
  47. 11,416,414 (2022): Technologies for execute only transactional memory
  48. 11,409,662 (2022): Apparatus and method for efficient process-based compartmentalization
  49. 11,403,234 (2022): Cryptographic computing using encrypted base addresses and used in multi-tenant environments
  50. 11,392,492 (2022): Memory management apparatus and method for compartmentalization using linear address metadata
  51. 11,360,876 (2022): Apparatus and method for pausing processor trace for efficient analysis
  52. 11,354,423 (2022): Cryptographic isolation of memory compartments in a computing environment
  53. 11,321,469 (2022): Microprocessor pipeline circuitry to support cryptographic computing
  54. 11,250,165 (2022): Binding of cryptographic operations to context or speculative execution restrictions
  55. 11,222,127 (2022): Processor hardware and instructions for SHA3 cryptographic operations
  56. 11,216,366 (2022): Security check systems and methods for memory allocations
  57. 11,188,639 (2021): System, method and apparatus for automatic program compartmentalization
  58. 11,171,983 (2021): Techniques to provide function-level isolation with capability-based security
  59. 11,163,569 (2021): Hardware apparatuses, methods, and systems for individually revocable capabilities for enforcing temporal memory safety
  60. 11,144,479 (2021): System for address mapping and translation protection
  61. 11,080,401 (2021): Memory scanning methods and apparatus
  62. 11,036,850 (2021): Technologies for object-oriented memory management with extended segmentation
  63. 11,030,113 (2021): Apparatus and method for efficient process-based compartmentalization
  64. 10,884,952 (2021): Enforcing memory operand types using protection keys
  65. 10,860,709 (2020): Encoded inline capabilities
  66. 10,795,997 (2020): Hardened safe stack for return oriented programming attack mitigation
  67. 10,785,028 (2020): Protection of keys and sensitive data from attack within microprocessor architecture
  68. 10,769,272 (2020): Technology to protect virtual machines from malicious virtual machine managers
  69. 10,706,164 (2020): Crypto-enforced capabilities for isolation
  70. 10,642,752 (2020): Auxiliary processor resources
  71. 10,558,582 (2020): Technologies for execute only transactional memory
  72. 10,515,023 (2019): System for address mapping and translation protection
  73. 10,503,664 (2019): Virtual machine manager for address mapping and translation protection
  74. 10,453,114 (2019): Selective sharing of user information based on contextual relationship information, such as to crowd-source gifts of interest to a recipient
  75. 10,452,848 (2019): Memory scanning methods and apparatus
  76. 10,324,863 (2019): Protected memory view for nested page table access by virtual machine guests
  77. 10,318,733 (2019): Techniques for detecting malware with minimal performance degradation
  78. 10,235,301 (2019): Dynamic page table edit control
  79. 10,216,522 (2019): Technologies for indirect branch target security
  80. 10,157,277 (2018): Technologies for object-oriented memory management with extended segmentation
  81. 10,152,612 (2018): Cryptographic operations for secure page mapping in a virtual machine environment
  82. 10,104,122 (2018): Verified sensor data processing
  83. 10,061,918 (2018): System, apparatus and method for filtering memory access logging in a processor
  84. 10,007,784 (2018): Technologies for control flow exploit mitigation using processor trace
  85. 9,954,950 (2018): Attestable information flow control in computer systems
  86. 9,858,411 (2018): Execution profiling mechanism
  87. 9,830,162 (2017): Technologies for indirect branch target security
  88. 9,817,976 (2017): Techniques for detecting malware with minimal performance degradation
  89. 9,805,194 (2017): Memory scanning methods and apparatus
  90. 9,792,222 (2017): Validating virtual address translation by virtual machine monitor utilizing address validation structure to validate tentative guest physical address and aborting based on flag in extended page table requiring an expected guest physical address in the address validation structure
  91. 9,710,393 (2017): Dynamic page table edit control
  92. 9,703,703 (2017): Control of entry into protected memory views
  93. 9,665,373 (2017): Protecting confidential data with transactional processing in execute-only memory
  94. 9,501,637 (2016): Hardware shadow stack support for legacy guests
  95. 9,335,943 (2016): Method and apparatus for fine grain memory protection
  96. 9,124,635 (2015): Verified sensor data processing
  97. 8,458,791 (2013): Hardware-implemented hypervisor for root-of-trust monitoring and control of computer system
  98. 7,774,411 (2010): Secure electronic message transport protocol
Published Patent Applications
  1. 18/478,882: MEMORY SAFETY USING TAG CHECKING INSTRUCTIONS AND ISLANDS OF TAGS IN LINE WITH BUCKETED DATA
  2. 18/346,221: INSTRUCTION PREFIX ENCODING FOR CRYPTOGRAPHIC COMPUTING CAPABILITY DATA TYPES
  3. 18/194,553: MULTI-KEY MEMORY ENCRYPTION PROVIDING EFFICIENT ISOLATION FOR MULTITHREADED PROCESSES
  4. 18/129,822: EFFICIENT CACHING AND QUEUEING FOR PER-ALLOCATION NON-REDUNDANT METADATA
  5. 18/147,510: FAST KEY ID SWITCHING VIA EXTENDED PAGING FOR CRYPTOGRAPHIC INTRA-PROCESS ISOLATION
  6. 17/936,011: DETERMINISTIC ADJACENT OVERFLOW DETECTION FOR SLOTTED MEMORY POINTERS
  7. 17/953,186: TEMPORAL INFORMATION LEAKAGE PROTECTION MECHANISM FOR CRYPTOGRAPHIC COMPUTING
  8. 17/949,353: USER-LEVEL EXCEPTION-BASED INVOCATION OF SOFTWARE INSTRUMENTATION HANDLERS
  9. 18/499,133: POINTER BASED DATA ENCRYPTION
  10. 17/886,981: SPECULATING OBJECT-GRANULAR KEY IDENTIFIERS FOR MEMORY SAFETY
  11. 17/853,087: REDUCING INSTRUMENTATION CODE BLOAT AND PERFORMANCE OVERHEADS USING A RUNTIME CALL INSTRUCTION
  12. 17/853,087: REDUCING INSTRUMENTATION CODE BLOAT AND PERFORMANCE OVERHEADS USING A RUNTIME CALL INSTRUCTION
  13. 17/849,351: CONTROL FLOW INTEGRITY TO PREVENT POTENTIAL LEAKAGE OF SENSITIVE DATA TO ADVERSARIES
  14. 17/957,814: MEMORY SAFETY WITH SINGLE MEMORY TAG PER ALLOCATION
  15. 17/848,142: IMPLICIT MEMORY CORRUPTION DETECTION FOR CONDITIONAL DATA TYPES
  16. 17/791,000: CRYPTOGRAPHIC COMPUTING IN MULTITENANT ENVIRONMENTS
  17. 17/947,072: UPDATING ENCRYPTED SECURITY CONTEXT IN STACK POINTERS FOR EXCEPTION HANDLING AND TIGHT BOUNDING OF ON-STACK ARGUMENTS
  18. 17/357,951: ZERO-REDUNDANCY TAG STORAGE FOR BUCKETED ALLOCATORS
  19. 17/357,963: REGION-BASED DETERMINISTIC MEMORY SAFETY
  20. 17/696,330: RATCHET POINTERS TO ENFORCE BYTE-GRANULAR BOUNDS CHECKS ON MULTIPLE VIEWS OF AN OBJECT
  21. 17/699,593: CRYPTOGRAPHIC DATA OBJECTS PAGE CONVERSION
  22. 17/693,748: GENERATING ENCRYPTED CAPABILITIES WITHIN BOUNDS
  23. 17/682,997: COMPILER-DIRECTED SELECTION OF OBJECTS FOR CAPABILITY PROTECTION
  24. 17/561,828: PROCESS OBJECT RE-KEYING DURING PROCESS CREATION IN CRYPTOGRAPHIC COMPUTING
  25. 17/559,385: DATA OBLIVIOUS CRYPTOGRAPHIC COMPUTING
  26. 17/314,349: TECHNOLOGY TO CONTROL SYSTEM CALL INVOCATIONS WITHIN A SINGLE ADDRESS SPACE
  27. 16/862,022: MEMORY WRITE FOR OWNERSHIP ACCESS IN A CORE
  28. 15/721,553: Installing and manipulating a secure virtual machine image through an untrusted hypervisor
  29. 15/713,573: Methods and arrangements to determine physical resource assignments
  30. 16/040,193: System, method and apparatus for automatic program compartmentalization
  31. 15/273,286: Access control
  32. 15/201,018: Regulating control transfers for execute-only code execution