G06F2009/45587 - CPC Classification

Classification description:

Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs; Arrangements for executing specific programs; Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines; Hypervisors; Virtual machine monitors; Hypervisor-specific management and integration aspects Isolation or security of virtual machine instances

Recent Application in this class:
#1
20240289452
2024-08-29

KILL CHAIN IDENTIFICATIONS

#2
20240289437
2024-08-29

TECHNIQUES FOR INSPECTING RUNNING VIRTUALIZATIONS FOR CYBERSECURITY RISKS

#3
20240289154
2024-08-29

INVOKING A HOST PROCESS FROM WITHIN A CONTAINER TO OUTLIVE THE CONTAINER LIFESPAN

#4
20240289151
2024-08-29

ADDRESS-SPACE-IDENTIFIER-BASED SECURITY OF DATA TRANSFER REQUESTS

#5
20240283813
2024-08-22

OUT OF BAND THREAT PREVENTION

#6
20240281271
2024-08-22

DATA PROTECTION FOR SHORT-TERM AND LONG-TERM DATA

#7
20240275800
2024-08-15

INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE

#8
20240272925
2024-08-15

SECURE PROCESSING IN A DATA TRANSFORM ACCELERATOR USING A VIRTUAL MACHINE

#9
20240265115
2024-08-08

ARCHITECTURE OF A MULTI-CLOUD INSPECTOR FOR ANY COMPUTE TYPE

#10
20240265072
2024-08-08

UTILIZING VIDEO AND INPUT PIPELINES TO PROTECT VIRTUAL DESKTOP INFRASTRUCTURE SESSIONS

#11
20240265071
2024-08-08

UTILIZING VIDEO AND INPUT PIPELINES TO PROTECT VIRTUAL DESKTOP INFRASTRUCTURE SESSIONS

#12
20240264854
2024-08-08

METHODS, SYSTEMS, AND COMPUTER READABLE MEDIA FOR USING OPTIMIZED TOKEN BUCKET ALGORITHM FOR INGRESS MESSAGE RATE LIMITING ACROSS DISTRIBUTED PRODUCER NETWORK FUNCTION (NF) APPLICATIONS

#13
20240259398
2024-08-01

Zero trust lensing of cloud-based traffic

#14
20240256646
2024-08-01

SYSTEM, DEVICES AND/OR PROCESSES FOR ASSIGNMENT, CONFIGURATION AND/OR MANAGEMENT OF ONE OR MORE HARDWARE COMPONENTS OF A COMPUTING DEVICE

#15
20240256324
2024-08-01

TECHNIQUES FOR SECURING VIRTUAL MACHINES

#16
20240250966
2024-07-25

INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE

#17
20240249017
2024-07-25

METHOD AND SYSTEM FOR IDENTIFYING PRODUCT FEATURES BASED ON METADATA

#18
20240248816
2024-07-25

CONTINUOUS DATA PROTECTION AGAINST RANSOMWARE FOR VIRTUAL VOLUMES

#19
20240248762
2024-07-25

METHOD AND SYSTEM FOR IDENTIFYING A HOLISTIC PROFILE OF A USER BASED ON METADATA

#20
20240248743
2024-07-25

SERVICE GATEWAY FOR SCALING OF VIRTUAL DESKTOP DEPLOYMENTS

#21
20240248742
2024-07-25

INITIATING EXECUTABLE CONTAINERS IN TRUSTED EXECUTION ENVIRONMENTS

#22
20240244034
2024-07-18

COMPUTING SYSTEM WITH DYNAMIC FIREWALL MECHANISM AND ASSOCIATED METHOD

#23
20240241746
2024-07-18

PROVIDING DEVICE ABSTRACTIONS TO APPLICATIONS INSIDE A VIRTUAL MACHINE

#24
20240241743
2024-07-18

REGISTRATION AND DEPLOYMENT OF AN AGENT PLATFORM APPLIANCE IN A HYBRID ENVIRONMENT

#25
20240232375
2024-07-11

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN CONFIGURING AN IHS

#26
20240231874
2024-07-11

PER SERVICE VERSION ROLL BACK IN DISTRIBUTED COMPUTING SYSTEMS

#27
20240231866
2024-07-11

Multi-Layer Kernel with Varied Privilege

#28
20240223569
2024-07-04

Techniques For Automatically Configuring Minimal Cloud Service Access Rights For Container Applications

#29
20240220429
2024-07-04

SECURE DIRECT MEMORY ACCESS

#30
20240220304
2024-07-04

CYBER SECURITY SYSTEM WITH ENHANCED CLOUD-BASED METRICS

#31
20240220303
2024-07-04

CYBER SECURITY SYSTEM FOR CLOUD ENVIRONMENT ANALYTICS

#32
20240220298
2024-07-04

LIFE CYCLE MANAGEMENT FOR DEVICE INPUT/OUTPUT INTERFACES IN VIRTUALIZED ENVIRONMENTS

#33
20240220297
2024-07-04

INTERRUPT CONTROL USING A GUEST OWNED BACKING PAGE

#34
20240220296
2024-07-04

SECURE MEMORY-MAPPED INPUT/OUTPUT

#35
20240220295
2024-07-04

EVENT INTERCEPTION CONTROL BY A TRUSTED LAYER OF A VIRTUAL MACHINE

#36
20240214402
2024-06-27

INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE

#37
20240214285
2024-06-27

APPLICATION MONITORING PRIORITIZATION

#38
20240214220
2024-06-27

Implementation Method and Apparatus for Increasing Number of Certificates Supported by PIV Application

#39
20240211587
2024-06-27

COMPUTER DEVICE AND METHOD FOR SELECTIVE CONTENT ISOLATION

#40
20240211294
2024-06-27

READ-ONLY MODE FOR VIRTUAL TRUSTED PLATFORM MODULE (TPM) DEVICES

#41
20240211289
2024-06-27

NETWORKING OVERHEAD REDUCTION FOR ENCRYPTED VIRTUAL MACHINES

#42
20240205245
2024-06-20

METHOD AND SYSTEM OF FILTERING OUT ALERTS THAT TRIGGER ON LEGITIMATE ACTIVITY

#43
20240205243
2024-06-20

INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE

#44
20240205118
2024-06-20

SYSTEM AND METHOD OF ASSIGNING REPUTATION SCORES TO HOSTS

#45
20240202289
2024-06-20

Using Ownership Identifiers in Metadata in a Memory for Protecting Encrypted Data Stored in the Memory

#46
20240202020
2024-06-20

SYSTEMS AND METHODS FOR MONITORING ASSETS IN A CLOUD COMPUTING ENVIRONMENT

#47
20240193255
2024-06-13

SYSTEMS AND METHODS OF PROTECTING SECRETS IN USE WITH CONTAINERIZED APPLICATIONS

#48
20240193049
2024-06-13

RANSOMWARE RECOVERY SYSTEM

#49
20240193007
2024-06-13

System and Methods Involving Features of Hardware Virtualization, Hypervisors, APIs of Interest and/or Other Features

#50
20240192980
2024-06-13

Methods and Systems for Protecting and Restoring Virtual Machines

#51
20240187424
2024-06-06

INTELLIGENT QUARANTINE ON SWITCH FABRIC FOR PHYSICAL AND VIRTUALIZED INFRASTRUCTURE

#52
20240184717
2024-06-06

PROCESSORS, METHODS, SYSTEMS, AND INSTRUCTIONS TO SUPPORT LIVE MIGRATION OF PROTECTED CONTAINERS

#53
20240184613
2024-06-06

SYSTEMS AND METHODS FOR TRAINING SYSTEMS TO DETECT OFFENSIVE CYBER OPERATIONS

#54
20240184611
2024-06-06

VIRTUAL BASEBOARD MANAGEMENT CONTROLLER CAPABILITY VIA GUEST FIRMWARE LAYER

#55
20240176638
2024-05-30

REGISTER PROTECTION FOR CONFIDENTIAL COMPUTING ENVIRONMENT

#56
20240169099
2024-05-23

METHOD AND APPARATUS FOR TRUST DOMAIN CREATION AND DESTRUCTION

#57
20240169053
2024-05-23

AUTOMATIC DEPLOYMENT OF APPLICATION SECURITY POLICY USING APPLICATION MANIFEST AND DYNAMIC PROCESS ANALYSIS IN A CONTAINERIZATION ENVIRONMENT

#58
20240168793
2024-05-23

Methods and Systems for Checking Container Applications on a Host System for Manipulation

#59
20240168792
2024-05-23

DETECTING SECURITY EXCEPTIONS ACROSS MULTIPLE COMPUTE ENVIRONMENTS

#60
20240168787
2024-05-23

SECURE LIVE MIGRATION OF TRUSTED EXECUTION ENVIRONMENT VIRTUAL MACHINES USING SMART CONTRACTS

#61
20240163188
2024-05-16

ROUND TRIP TIME (RTT) MEASUREMENT BASED UPON SEQUENCE NUMBER

#62
20240160549
2024-05-16

SYSTEMS AND METHODS FOR IDENTIFYING AND MONITORING SOLUTION STACKS

#63
20240160463
2024-05-16

SECURE DRIVE FOR COMPUTER SYSTEMS

#64
20240152488
2024-05-09

LOG DATA EXTRACTION FROM DATA CHUNKS OF AN ISOLATED EXECUTION ENVIRONMENT

#65
20240152379
2024-05-09

MICRO-SEGMENTATION RECOMMENDATIONS FOR MULTI-DATACENTER NETWORK

#66
20240152377
2024-05-09

MULTI-TENANT NETWORK MANAGEMENT SERVICE

#67
20240134998
2024-04-25

SYSTEMS AND METHODS FOR VULNERABILITY PROOFING WHEN CONFIGURING AN IHS

#68
20240134677
2024-04-25

PROTECTED REGIONS MANAGEMENT OF MEMORY

#69
20240134668
2024-04-25

Multi-Layer Kernel with Varied Privilege

#70
20240126882
2024-04-18

INSTRUCTIONS TO PROCESS FILES IN VIRTUAL MACHINES

#71
20240126590
2024-04-18

AUTHORIZATION FRAMEWORK IN A MULTI-CLOUD INFRASTRUCTURE

#72
20240126580
2024-04-18

TRANSPARENTLY PROVIDING VIRTUALIZATION FEATURES TO UNENLIGHTENED GUEST OPERATING SYSTEMS

#73
20240126569
2024-04-18

Cloud Computing Platform That Executes Code in A Distributed Cloud Computing Network

#74
20240119161
2024-04-11

ONE OR MORE DEVICES PROVIDING IMPROVED SECURITY FOR ANY DATABASE INCLUDING DISTRIBUTED APPLICATIONS AND SMART CONTRACTS

#75
20240118916
2024-04-11

METHODS AND APPARATUS FOR CONTAINER DEPLOYMENT IN A NETWORK-CONSTRAINED ENVIRONMENT

#76
20240114020
2024-04-04

SYSTEMS AND METHODS FOR EXECUTING SEQUENTIAL SUBOPERATIONS AT AN AGGREGATED VIRTUAL CONTAINER PROVIDER SYSTEM

#77
20240113998
2024-04-04

DOMAIN NAME SYSTEM OPERATIONS IMPLEMENTED USING SCALABLE VIRTUAL TRAFFIC HUB

#78
20240111563
2024-04-04

SECURITY FOR SIMULTANEOUS MULTITHREADING PROCESSORS

#79
20240111556
2024-04-04

PROVIDING HOST MEDIA PROCESSING FUNCTIONALITY TO A GUEST OPERATING SYSTEM

#80
20240095188
2024-03-21

MEMORY DEDUPLICATION FOR ENCRYPTED VIRTUAL MACHINES

#81
20240095059
2024-03-21

SECURE VIRTUAL MACHINE AND PERIPHERAL DEVICE COMMUNICATION

#82
20240086550
2024-03-14

Zero-Trust Cloud Development

#83
20240086540
2024-03-14

COMPUTER SYSTEM FOR MALWARE DETECTION AND RECOVERY

#84
20240086537
2024-03-14

Novel Apparatus and Application Device for Protection of Security

#85
20240086522
2024-03-14

USING THREAD PATTERNS TO IDENTIFY ANOMALOUS BEHAVIOR

#86
20240086226
2024-03-14

MONITORING SYSTEM, MONITORING METHOD, AND MONITORING DEVICE

#87
20240073243
2024-02-29

TIMEOUT HANDLING FOR VIRTUAL DEVICES

#88
20240072997
2024-02-29

Protecting User Data During Virtual Machine Initialization

#89
20240070260
2024-02-29

Process Credential Protection

#90
20240069949
2024-02-29

APPLYING HYPERVISOR-BASED CONTAINERS TO A CLUSTER OF A CONTAINER ORCHESTRATION SYSTEM

#91
20240064150
2024-02-22

Virtual Browser Application Systems and Methods

#92
20240061943
2024-02-22

POINTER BASED DATA ENCRYPTION

#93
20240061699
2024-02-22

SECURING CONTENT FROM GUEST VIRTUAL MACHINES FROM UNAUTHORIZED ACCESS BY HOST OPERATING SYSTEMS

#94
20240045771
2024-02-08

TECHNIQUES FOR SCALABLE DISTRIBUTED SYSTEM BACKUPS

#95
20240045709
2024-02-08

SCALABLE VIRTUAL MACHINE OPERATION INSIDE TRUST DOMAINS WITHIN THE TRUST DOMAIN ARCHITECTURE

#96
20240039700
2024-02-01

SECURED PERIPHERAL DEVICE COMMUNICATION IN VIRTUALIZED COMPUTER SYSTEM

#97
20240036898
2024-02-01

OFFLOADING STATEFUL SERVICES FROM GUEST MACHINES TO HOST RESOURCES

#98
20240036747
2024-02-01

Optimizing Data Reduction For Data In Encrypted Volumes

#99
20240028382
2024-01-25

Method and Apparatus for Starting Secure Container

#100
20240028377
2024-01-25

GENERATION, ACTUATION, AND ENFORCEMENT OF POLICIES FOR RESOURCES WITHIN A DISTRIBUTED COMPUTING SYSTEM

#101
20240028365
2024-01-25

HITLESS VIRTUAL MACHINE MIGRATION WITH MIDDLEBOX SERVICE RULES APPLIED

#102
20240028359
2024-01-25

REDUCING CPU EXECUTION CONTEXT TRANSITIONS ACROSS PRIVILEGE LEVELS FOR USER LEVEL HYPERVISORS

#103
20240022579
2024-01-18

SYSTEM TO TERMINATE MALICIOUS PROCESS IN A DATA CENTER

#104
20240020362
2024-01-18

Control Channel Architecture

#105
20240020361
2024-01-18

System on Chip Isolation with Address Virtualization Control

#106
20240020146
2024-01-18

CONTAINER VISIBILITY AND OBSERVABILITY

#107
20240015219
2024-01-11

Distributed network security system providing isolation of customer data

#108
20240015184
2024-01-11

METHOD OF APPLYING SECURITY POLICIES TO VIRTUAL COMPUTING INSTANCES

#109
20240015165
2024-01-11

Method for verifying security technology deployment efficacy across a computer network

#110
20240015164
2024-01-11

METHOD FOR VERIFYING SECURITY TECHNOLOGY DEPLOYMENT EFFICACY ACROSS A COMPUTER NETWORK

#111
20240015084
2024-01-11

POLICY UTILIZATION ANALYSIS

#112
20240012666
2024-01-11

PROTECTING CONTAINER IMAGES AND RUNTIME DATA

#113
20240012665
2024-01-11

OPTIMIZED CREATION OF IDENTITY INFORMATION FOR PROVISIONED VIRTUAL MACHINES

#114
20240007353
2024-01-04

SOFTWARE DEFINED ACCESS FABRIC WITHOUT SUBNET RESTRICTION TO A VIRTUAL NETWORK

#115
20240004990
2024-01-04

TECHNIQUES TO ENABLE CO-EXISTENCE AND INTER-OPERATION OF LEGACY DEVICES AND TEE-IO CAPABLE DEVICES FROM CONFIDENTIAL VIRTUAL MACHINES

#116
20240004684
2024-01-04

SYSTEM AND METHOD FOR EXCHANGING MESSAGES BETWEEN CLOUD SERVICES AND SOFTWARE-DEFINED DATA CENTERS

#117
20240004681
2024-01-04

VIRTUALIZATION MANAGEMENT SYSTEM AND/OR OPERATING SYSTEM ATTESTATION FROM WITHIN A VIRTUALIZED COMPUTING INSTANCE

#118
20230421534
2023-12-28

AUTOTUNING A VIRTUAL FIREWALL

#119
20230418645
2023-12-28

SYSTEMS AND METHODS FOR PROCESSING PRIVILEGED INSTRUCTIONS USING USER SPACE MEMORY

#120
20230418637
2023-12-28

CLOUD NATIVE VIRTUAL MACHINE RUNTIME PROTECTION

#121
20230412538
2023-12-21

Automated assistant architecture for preserving privacy of application content

#122
20230409456
2023-12-21

TEST CONTROLLER SECURELY CONTROLLING A TEST PLATFORM TO RUN TEST APPLICATIONS

#123
20230409365
2023-12-21

Direct Mode for Virtualization

#124
20230401083
2023-12-14

INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD

#125
20230393882
2023-12-07

MANAGEMENT OF VIRTUAL MACHINE SHUTDOWNS IN A COMPUTING ENVIRONMENT BASED ON RESOURCE LOCKS

#126
20230388320
2023-11-30

INTRUSION DETECTION WITH ADAPTIVE PATTERN SELECTION

#127
20230385095
2023-11-30

METHOD AND SYSTEM FOR RESOURCE MODIFICATION OF VIRTUAL DEVICES

#128
20230385090
2023-11-30

INHERITANCE CONTAINER SERVICE

#129
20230379353
2023-11-23

Virtualization-Based Controller for Industrial Control System Resiliency

#130
20230376608
2023-11-23

SECURITY RISK ASSESSMENT SYSTEM FOR A DATA MANAGEMENT PLATFORM

#131
20230376341
2023-11-23

EFFICIENT VIRTUAL MACHINE SCANNING

#132
20230376219
2023-11-23

DATA RESYCHRONIZATION METHODS AND SYSTEMS IN CONTINUOUS DATA PROTECTION

#133
20230370453
2023-11-16

Authentication and enforcement of differentiated policies for a bridge mode virtual machine behind a wireless host in a MAC-based authentication network

#134
20230367625
2023-11-16

LANGUAGE AGNOSTIC SMART CONTRACT EXECUTION ON A BLOCKCHAIN

#135
20230362162
2023-11-09

Delegation based access to secure systems

#136
20230350815
2023-11-02

TRUST DOMAINS FOR PERIPHERAL DEVICES

#137
20230350709
2023-11-02

CLOUD SAFETY COMPUTING METHOD, DEVICE AND STORAGE MEDIUM BASED ON CLOUD FAULT-TOLERANT TECHNOLOGY

#138
20230342474
2023-10-26

SMART NETWORK INTERFACE CONTROLLER CERTIFICATE MANAGEMENT

#139
20230342179
2023-10-26

COMPLIANCE ACROSS MULTIPLE CLOUD ENVIRONMENTS

#140
20230342178
2023-10-26

MANAGING VIRTUAL INFRASTRUCTURE WITH SELF-INITIALIZED UPGRADES

#141
20230342172
2023-10-26

SCALABLE ASYNCHRONOUS COMMUNICATION FOR ENCRYPTED VIRTUAL MACHINES

#142
20230342169
2023-10-26

ENCRYPTED MEMORY GUEST/HOST COMMUNICATION

#143
20230336561
2023-10-19

Techniques for automatically configuring minimal cloud service access rights for container applications

#144
20230328115
2023-10-12

POLICY-BASED REMOTE ACCESS SYSTEM WITH SENSOR INPUT EMULATION

#145
20230327948
2023-10-12

Distributed data storage techniques for edge devices

#146
20230325218
2023-10-12

DYNAMIC INFORMATION VIRTUALIZATION

#147
20230325173
2023-10-12

Virtualized file server user views

#148
20230315857
2023-10-05

PROVIDING ISOLATION IN VIRTUALIZED SYSTEMS USING TRUST DOMAINS

#149
20230315838
2023-10-05

MICROPROCESSOR THAT PREVENTS STORE-TO-LOAD FORWARDING BETWEEN DIFFERENT TRANSLATION CONTEXTS

#150
20230315648
2023-10-05

CIRCUITRY AND METHODS FOR IMPLEMENTING MICRO-CONTEXT BASED TRUST DOMAINS

#151
20230315507
2023-10-05

Systems and Methods for Java Virtual Machine Management

#152
20230308452
2023-09-28

METHOD FOR VERIFYING SECURITY TECHNOLOGY DEPLOYMENT EFFICACY ACROSS A COMPUTER NETWORK

#153
20230308434
2023-09-28

Remote secured console over a secured connection for inoperable virtual machine

#154
20230300044
2023-09-21

UNIQUE ID GENERATION FOR SENSORS

#155
20230297696
2023-09-21

CONFIDENTIAL COMPUTING USING PARALLEL PROCESSORS WITH CODE AND DATA PROTECTION

#156
20230297411
2023-09-21

COPY-ON-WRITE FOR VIRTUAL MACHINES WITH ENCRYPTED STORAGE

#157
20230297410
2023-09-21

DEVICE VIRTUALIZATION IN A CONFIDENTIAL COMPUTING ENVIRONMENT

#158
20230297406
2023-09-21

CONFIDENTIAL COMPUTING USING MULTI-INSTANCING OF PARALLEL PROCESSORS

#159
20230291761
2023-09-14

Monitoring and Preventing Remote User Automated Cyber Attacks

#160
20230289210
2023-09-14

EXTRACTION OF SIDE CHANNEL INFORMATION FROM MULTITHREADED PROCESSORS BASED ON PROCESSOR RESOURCE CONTENTION

#161
20230289208
2023-09-14

Cost-Efficient High-Availability Multi-Single-Tenant Services

#162
20230289204
2023-09-14

Zero Trust Endpoint Device

#163
20230289170
2023-09-14

Virtualized file server distribution across clusters

#164
20230283613
2023-09-07

SYSTEMS AND METHODS FOR SECURE DATA ACCESS CONTROL

#165
20230283517
2023-09-07

In-memory workflow management in edge devices

#166
20230281288
2023-09-07

Server that supports security access of terminal device of the user and controlling method thereof

#167
20230281001
2023-09-07

SELF-HEALING VIRTUALIZED FILE SERVER

#168
20230275906
2023-08-31

SYSTEM AND METHOD OF DETERMINING EXISTENCE OF A NETWORK ATTACK

#169
20230273808
2023-08-31

CONFIDENTIAL OFFLOADING OF PERSISTENT STORAGE OPERATIONS IN CONFIDENTIAL COMPUTING ENVIRONMENTS

#170
20230269245
2023-08-24

Methods and Systems for Providing Wake-On-Demand Access to Session Servers

#171
20230269139
2023-08-24

Software defined access fabric without subnet restriction to a virtual network

#172
20230261872
2023-08-17

UNIVERSAL ZERO-KNOWLEDGE SUCCINCT NON-INTERACTIVE ARGUMENT OF KNOWLEDGE PROOF SYSTEM FOR STACK-BASED VIRTUAL MACHINE PROGRAM

#173
20230259386
2023-08-17

DATA PROCESSING METHOD BASED ON CONTAINER ENGINE AND RELATED DEVICE

#174
20230254146
2023-08-10

CYBERSECURITY GUARD FOR CORE NETWORK ELEMENTS

#175
20230252141
2023-08-10

BEHAVIORAL THREAT DETECTION VIRTUAL MACHINE

#176
20230251892
2023-08-10

TENANT SECURITY CONTROL OF DATA FOR APPLICATION SERVICES

#177
20230251886
2023-08-10

THREAT RESISTANT MULTI-COMPUTING ENVIRONMENT

#178
20230246813
2023-08-03

Secure reliable application environments

#179
20230244806
2023-08-03

SECURELY PROCESSING SHAREABLE DATA UTILIZING A VAULT PROXY

#180
20230244778
2023-08-03

PHYSICALLY-TAGGED DATA CACHE MEMORY THAT USES TRANSLATION CONTEXT TO REDUCE LIKELIHOOD THAT ENTRIES ALLOCATED DURING EXECUTION UNDER ONE TRANSLATION CONTEXT ARE ACCESSIBLE DURING EXECUTION UNDER ANOTHER TRANSLATION CONTEXT

#181
20230244557
2023-08-03

SAFE, SECURE, VIRTUALIZED, DOMAIN SPECIFIC HARDWARE ACCELERATOR

#182
20230244517
2023-08-03

USAGE OF CLOUD-LINK ADAPTOR FOR CONSUMPTION OF CLOUD SERVICES

#183
20230237184
2023-07-27

Storage Device For Performing Access Authority Control And Operating Method Thereof

#184
20230237169
2023-07-27

SYSTEMS AND METHODS FOR TRANSPARENTLY DETECTING UNENCRYPTED VIRTUAL MACHINE I/O

#185
20230236870
2023-07-27

SAFE ENTROPY SOURCE FOR ENCRYPTED VIRTUAL MACHINES

#186
20230236868
2023-07-27

Register Caching for Efficient Virtual Machine Introspection

#187
20230231839
2023-07-20

Distributed authentication and authorization for rapid scaling of containerized services

#188
20230231831
2023-07-20

Dynamic traffic prioritization across data centers

#189
20230229757
2023-07-20

HIERARCHICAL HARDWARE-SOFTWARE PARTITIONING AND CONFIGURATION

#190
20230229756
2023-07-20

RAPID LAUNCH OF SECURE EXECUTABLES IN A VIRTUALIZED ENVIRONMENT

#191
20230229602
2023-07-20

Trust domains for peripheral devices

#192
20230229484
2023-07-20

COMMUNICATION BETWEEN CONTROL PLANES IN A VIRTUALIZED COMPUTING SYSTEM HAVING AN AUTONOMOUS CLUSTER

#193
20230229474
2023-07-20

PLUG-IN MANAGEMENT IN VIRTUALIZED COMPUTING ENVIRONMENT

#194
20230224319
2023-07-13

TRANSMISSION APPARATUS, RECEPTION APPARATUS, CONTAINER TRANSMISSION SYSTEM, METHOD, AND PROGRAM

#195
20230222210
2023-07-13

HYPERVISOR ASSISTED VIRTUAL MACHINE CLONE AUTO-REGISTRATION WITH CLOUD

#196
20230221983
2023-07-13

TECHNIQUES FOR PROVIDING THIRD PARTY TRUST TO A CLOUD COMPUTING ENVIRONMENT

#197
20230221951
2023-07-13

Creation and execution of customised code for a data processing platform

#198
20230214248
2023-07-06

Controlling Container Commands Issued In A Distributed Computing Environment

#199
20230214246
2023-07-06

Remediating Vulnerabilities For Application Deployments

#200
20230208884
2023-06-29

Managing communications among virtual machine nodes of a network service provider

#201
20230208863
2023-06-29

Intelligent quarantine on switch fabric for physical and virtualized infrastructure

#202
20230205866
2023-06-29

APPARATUS AND METHOD FOR FORENSIC PASSWORD RESET

#203
20230205713
2023-06-29

COMPUTER DEVICE, EXCEPTION PROCESSING METHOD, AND INTERRUPT PROCESSING METHOD

#204
20230205572
2023-06-29

Secure incident investigation workspace generation and investigation control

#205
20230205571
2023-06-29

RECOVERY OF STATE, CONFIGURATION, AND CONTENT FOR VIRTUALIZED INSTANCES

#206
20230205562
2023-06-29

CIRCUITRY AND METHODS FOR IMPLEMENTING INPUT/OUTPUT EXTENSIONS FOR TRUST DOMAINS

#207
20230199018
2023-06-22

Risk based virtual workspace delivery

#208
20230198973
2023-06-22

SERVICE TO SERVICE AUTHENTICATION IN COMPUTING SYSTEMS

#209
20230195905
2023-06-22

MULTI-TENANT CRYPTOGRAPHY IMPLEMENTATION COMPLIANCE

#210
20230195904
2023-06-22

ARCHITECTURE SWAPPING FOR WORKSPACES

#211
20230195498
2023-06-22

ISOLATING VIRTUAL DESKTOP APPLICATIONS FOR POLICY ENFORCEMENT

#212
20230195494
2023-06-22

HYPERVISOR ASSISTED SECURITY OF DANGLING VOLUMES FOR CONTAINERS

#213
20230195492
2023-06-22

COMMUNICATION ENCRYPTION AND DECRYPTION ON DEVICES

#214
20230195490
2023-06-22

ADJUNCT PROCESSOR (AP) DOMAIN ZEROIZE

#215
20230188338
2023-06-15

LIMITING USE OF ENCRYPTION KEYS IN AN INTEGRATED CIRCUIT DEVICE

#216
20230185929
2023-06-15

ENROLLING A VIRTUAL DEVICE AS AN UNPRIVILEGED USER

#217
20230179576
2023-06-08

SYSTEM AND METHOD FOR PROVIDING A DYNAMICALLY RECONFIGURABLE INTEGRATED VIRTUAL ENVIRONMENT

#218
20230177157
2023-06-08

MALWARE PROTECTION FOR VIRTUAL MACHINES

#219
20230176901
2023-06-08

SCHEDULING A SECURE CODE SEGMENT ON A PROCESSOR CORE OF A PROCESSING UNIT

#220
20230176885
2023-06-08

COMPLIANCE AGGREGATION

#221
20230171234
2023-06-01

Technologies for providing secure utilization of tenant keys

#222
20230169209
2023-06-01

SECURE AND PRIVATE HYPER-PERSONALIZATION SYSTEM AND METHOD

#223
20230169183
2023-06-01

FACILITATING ANALYSIS OF SOFTWARE VULNERABILITIES

#224
20230168933
2023-06-01

MEMORY DEALLOCATION ACROSS A TRUST BOUNDARY

#225
20230168915
2023-06-01

ON-DIE COMPUTER APPARATUS

#226
20230168911
2023-06-01

CUSTOMIZED INITIALIZATION CODE DELIVERY OVER NETWORK FOR ZERO-TRUST VIRTUAL MACHINE

#227
20230164188
2023-05-25

SYSTEM AND METHOD FOR SCHEDULING VIRTUAL MACHINES BASED ON SECURITY POLICY

#228
20230164154
2023-05-25

INSIDER ATTACK RESISTANT SYSTEM AND METHOD FOR CLOUD SERVICES INTEGRITY CHECKING

#229
20230161614
2023-05-25

DETECTING VULNERABILITIES IN CONFIGURATION CODE OF A CLOUD ENVIRONMENT UTILIZING INFRASTRUCTURE AS CODE

#230
20230153270
2023-05-18

Data criticality-based network policy creation and consumption

#231
20230146364
2023-05-11

PROCESS RUNNING METHOD AND APPARATUS

#232
20230145134
2023-05-11

Secure modular devices

#233
20230138346
2023-05-04

MANAGING FILE DEPENDENCY MANAGEMENT IN VIRTUAL MACHINES

#234
20230138161
2023-05-04

Cloud computing platform that executes third-party code in a distributed cloud computing network

#235
20230132905
2023-05-04

BINARY EXECUCTION BY A VIRTUAL DEVICE

#236
20230132141
2023-04-27

Secure operations of cloud landscapes through workflow templates

#237
20230131464
2023-04-27

Efficiently performing intrusion detection

#238
20230131198
2023-04-27

FEATURELESS MACHINE ENHANCEMENT DISCOVERY AND VERIFICATION

#239
20230131132
2023-04-27

SECURING CONTAINERIZED APPLICATIONS

#240
20230130553
2023-04-27

Systems, methods, and apparatus for high availability application migration in a virtualized environment

#241
20230128809
2023-04-27

EFFICIENT FUZZ TESTING OF LOW-LEVEL VIRTUAL DEVICES

#242
20230127956
2023-04-27

Building and deploying an application

#243
20230125755
2023-04-27

Container deployment with visual security profile

#244
20230125719
2023-04-27

SYSTEMS AND METHODS FOR CONTINUOUS DATA PROTECTION COMPRISING STORAGE OF COMPLETED I/O REQUESTS INTERCEPTED FROM AN I/O STREAM USING TOUCH POINTS

#245
20230123258
2023-04-20

Technologies for managing compromised sensors in virtualized environments

#246
20230118880
2023-04-20

COPYING COMPUTING RESOURCES BETWEEN EXECUTION ENVIRONMENTS

#247
20230118187
2023-04-20

Automotive gateway providing secure open platform for guest applications

#248
20230115278
2023-04-13

Providing trusted virtual secure cryptoprocessors for guests

#249
20230115261
2023-04-13

MIGRATING STATEFUL WORKLOADS BETWEEN CONTAINER CLUSTERS WITH DIFFERENT STORAGE BACKENDS

#250
20230103518
2023-04-06

SECURE EXECUTION FOR MULTIPLE PROCESSOR DEVICES USING TRUSTED EXECUTING ENVIRONMENTS

#251
20230102111
2023-03-30

SECURING CUSTOMER SENSITIVE INFORMATION ON PRIVATE CLOUD PLATFORMS

#252
20230101226
2023-03-30

PROCESS-BASED MULTI-KEY TOTAL MEMORY ENCRYPTION

#253
20230099597
2023-03-30

Authentication of virtual machine images using digital certificates

#254
20230097216
2023-03-30

TRANSLATION LOOKASIDE BUFFER (TLB) FLUSH SYSTEMS AND METHODS FOR DEFEATING TLB POISONING ATTACKS

#255
20230096040
2023-03-30

Artificial virtual machine for preventing malware execution by applying virtual machine characteristics in real computing environments

#256
20230094125
2023-03-30

IMPLEMENTING TRUSTED EXECUTING ENVIRONMENTS ACROSS MULTIPLE PROCESSOR DEVICES

#257
20230093527
2023-03-23

Techniques for securing virtual machines by application existence analysis

#258
20230092808
2023-03-23

MODEL PROTECTION SYSTEM

#259
20230092220
2023-03-23

Techniques for securing virtual machines by analyzing data for cyber threats

#260
20230091915
2023-03-23

Automatic application of software updates to container images based on dependencies

#261
20230090251
2023-03-23

SYSTEM FOR APPLICATION PROTECTION AND NON-TRANSITORY MACHINE-READABLE MEDIUM FOR STORING PROGRAM CODE THAT PROVIDES APPLICATION PROTECTION WHEN EXECUTED

#262
20230089313
2023-03-23

Techniques for securing virtual machines by application use analysis

#263
20230089117
2023-03-23

DATA PROCESSING SYSTEM FOR SECURELY PROCESSING SHAREABLE DATA

#264
20230087520
2023-03-23

KERNEL PROTECTION SYSTEM

#265
20230087080
2023-03-23

Techniques for securing a plurality of virtual machines in a cloud computing environment

#266
20230084547
2023-03-16

Transmissions management rules for virtual machine communications

#267
20230079606
2023-03-16

Round trip time (RTT) measurement based upon sequence number

#268
20230078496
2023-03-16

DATA CORRELATION USING FILE OBJECT CACHE

#269
20230074868
2023-03-09

Techniques for scalable distributed system backups

#270
20230074455
2023-03-09

SYSTEM AND METHOD FOR MONITORING DELIVERY OF MESSAGES PASSED BETWEEN PROCESSES FROM DIFFERENT OPERATING SYSTEMS

#271
20230070759
2023-03-09

ELECTRONIC DEVICE FOR PROTECTING USER'S BIOMETRIC INFORMATION

#272
20230070224
2023-03-09

USING A REMOTE POD IN KUBERNETES

#273
20230068880
2023-03-02

Function-based service framework with trusted execution platform

#274
20230068102
2023-03-02

Hash operations in memory for data sharing

#275
20230066447
2023-03-02

Execution of code in system memory

#276
20230065950
2023-03-02

System and Method for Secure Application Domain on Bare Metal Information Handling System

#277
20230065575
2023-03-02

System and method for securing network users in an enterprise network through cybersecurity controls

#278
20230064996
2023-03-02

Sharing Virtual Environment Data

#279
20230058466
2023-02-23

Autotuning a virtual firewall

#280
20230056783
2023-02-23

Verifiable privacy preserving computation

#281
20230056426
2023-02-23

Behavior-Based VM Resource Capture for Forensics

#282
20230052789
2023-02-16

ISOLATING OPERATING SYSTEM ENVIRONMENTS IN EMBEDDED DEVICES

#283
20230051347
2023-02-16

HARDWARE VIRTUALIZED TPM INTO VIRTUAL MACHINES

#284
20230048542
2023-02-16

Electronic apparatus adapted for container and software updating method for running container system

#285
20230048343
2023-02-16

Method and apparatus for managing identification of a virtual machine and a host within a virtual domain

#286
20230048251
2023-02-16

METHODS AND SYSTEMS FOR PROVIDING VIRTUAL DESKTOP INFRASTRUCTURE VIA SECURE CLASSIFIED REMOTE ACCESS AS A SERVICE

#287
20230045123
2023-02-09

Secure Browsing Via A Transparent Network Proxy

#288
20230043503
2023-02-09

Confidential data provided to a secure guest via metadata

#289
20230040556
2023-02-09

SYSTEM AND METHOD FOR NETWORK POLICY SIMULATION

#290
20230040047
2023-02-09

Method and system for performing dynamic patch management in a virtual desktop infrastructure (VDI) platform

#291
20230039894
2023-02-09

DEFERRED RECLAIMING OF SECURE GUEST RESOURCES

#292
20230039602
2023-02-09

Hypervisor level signature checks for encrypted trusted execution environments

#293
20230037746
2023-02-09

Customization of multi-part metadata of a secure guest

#294
20230036165
2023-02-02

SECURITY BROKER WITH POST-PROVISIONED STATES OF THE TEE-PROTECTED SERVICES

#295
20230035594
2023-02-02

MANAGING PERIPHERALS IN A CONTAINERIZED ENVIRONMENT

#296
20230032967
2023-02-02

ESTABLISHING PROCESS CONNECTIONS UTILIZING AN INTERMEDIARY BROKER

#297
20230031775
2023-02-02

Support for encrypted memory in nested virtual machines

#298
20230031297
2023-02-02

BINDING SECURE KEYS OF SECURE GUESTS TO A HARDWARE SECURITY MODULE

#299
20230030961
2023-02-02

VIRTUALIZATION-BASED PLATFORM PROTECTION TECHNOLOGY

#300
20230024628
2023-01-26

ELECTRONIC DEVICE AND OPERATING METHOD