Hillsboro, OR, United States of America

Scott T Durrant


Average Co-Inventor Count = 3.2

ph-index = 2

Forward Citations = 23(Granted Patents)


Company Filing History:


Years Active: 2014-2019

Loading Chart...
4 patents (USPTO):Explore Patents

Title: Scott T Durrant: Innovator in Virtual Machine Monitor Protection

Introduction

Scott T Durrant is a notable inventor based in Hillsboro, OR (US). He has made significant contributions to the field of technology, particularly in the area of virtual machine monitors. With a total of 4 patents to his name, Durrant has established himself as a key figure in innovation.

Latest Patents

One of Durrant's latest patents is focused on the hardware protection of a virtual machine monitor (VMM) runtime integrity watcher. This invention describes an apparatus and method that utilizes a set of one or more hardware range registers. These registers are designed to protect a contiguous memory space that stores the VMM runtime integrity watcher. The primary function of this system is to prevent modifications to the VMM runtime integrity watcher when it is loaded into the memory space. When executed, the VMM runtime integrity watcher performs an integrity check on the VMM during its runtime, ensuring the system's security and reliability.

Career Highlights

Scott T Durrant is currently employed at Intel Corporation, a leading technology company known for its innovations in computing. His work at Intel has allowed him to develop and refine his inventions, contributing to advancements in virtual machine technology.

Collaborations

Durrant has collaborated with several talented individuals in his field, including Shamanna M Datta and Mahesh S Natu. These collaborations have fostered a creative environment that encourages innovation and the development of cutting-edge technologies.

Conclusion

Scott T Durrant is a prominent inventor whose work in virtual machine monitor protection has made a significant impact in the technology sector. His contributions continue to shape the future of computing and security.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…