Patents
3,911,419 Controller for cursor positioning on a display medium (with R. Bates).
3,911,420 Display system including a high-resolution character generator (with R. Bates).
4,063,220 Multipoint data communication system with collision detection (with R. Metcalfe, D. Boggs, C. Thacker) [Ethernet].
4,079,458 High resolution character generator (with R. Rider).
4,152,697 Parallel run-length decoder (with R. Rider).
4,203,054 Electronic image processing system (with S. Ornstein, R. Sproull and J. Leung).
4,558,413 Software version management system (with E. Schmidt).
5,161,193 Pipelined cryptography processor and method for its use in communication networks (with W. Hawe, A. Gupta, and B. Spinney).
5,210,795 Secure user authentication from personal computer (with S. Lipner and M. Gasser).
5,224,163 Method of delegating authorization from one entity to another through the use of session encryption keys (with M. Gasser, A. Goldstein, and C. Kaufman).
5,235,642 Access control subsystem and method for distributed computer system using locally cached authentication credentials (with E. Wobber, M. Abadi, and A. Birrell).
5,235,644 Probabilistic cryptographic processing method (with A. Gupta et al.).
5,268,962 Computer network with modified host-to-host encryption keys (with M. Abadi and M. Burrows).
5,315,657 Compound principals in access control lists (with M. Abadi and A. Goldstein).
5,335,343 Distributed transaction processing using two-phase commit protocol with presumed-commit without log force (with D. Lomet).
5,339,313 Method and apparatus for traffic congestion control in a communication network bridge device (with W. Hawe et al.).
5,418,854 Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system (with C. Kaufman et al.).
5,475,819 Distributed configuration profile for computing system (with S. Miller).
5,488,716 Fault tolerant computer system with shadow virtual processor (with F. Schneider et al.).
5,497,421 Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system (with C. Kaufman et al.).
5,594,869 Method and apparatus for end-to-end encryption of a data packet in a computer network (with W. Hawe and A. Gupta).
5,940,619 Dynamic fine-grained dependency analysis for a functional language (with M. Abadi et al.).
6,145,056 Method and apparatus for caching the results of function applications with dynamic, fine-grained dependencies (with C. Heydon and R. Levin).
6,327,652 Loading and identifying a digital rights management operating system (with P. England and J. DeTreville).
6,330,670 Digital rights management operating system (with P. England and J. DeTreville).
6,651,171 Secure execution of program code (with P. England).
6,775,779 Hierarchical trusted code for content protection in computers (with P. England).
6,788,815 System and method for accepting disparate types of user input (C. Lui, C. Thacker, J. Mathews, L. Keely, D. Switzer, and W. Vong).
6,820,063 Controlling access to content based on certificates and access predicates (with P. England and J. DeTreville).
6,976,175 Hierarchical trusted code for content protection in computers (with P. England).
6,986,059 Hierarchical trusted code for content protection in computers (with P. England).
7,020,772 Secure execution of program code (with P. England).
7,174,457 System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party (with J. DeTreville, P. England).
7,194,092 Key-based secure storage (with J. DeTreville, P. England).
7,248,248 Pointing system for pen-based computer.
7,302,709 Key-based secure storage (with J. DeTreville, P. England).
7,319,454 Two-button mouse input using a stylus (with C Thacker, J. Mathews, L Huapaya).
7,356,682 Attesting to a value of a register and/or memory region (with J. DeTreville, P. England).
7,415,620 System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party (with J. DeTreville, P. England).
7,418,137 System and method for accepting disparate types of user input (with C. Lui et al).
7,424,606 System and method for authenticating an operating system (with J. DeTreville, P. England).
7,434,263 System and method for secure storage data using a key (with J. DeTreville, P. England).
7,457,412 System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party (with J. DeTreville, P. England).
7,496,769 Hierarchical trusted code for content protection in computers (with P. England).
7,529,919 Boot blocks for software (with J. DeTreville, P. England).
7,543,336 System and method for secure storage of data using public and private keys (with J. DeTreville, P. England).
7,752,431 Virtual distributed security system (with G. Della-Libera et al).
7,809,938 Virtual distributed security system (with G. Della-Libera et al).
7,900,248 Access control negation using negative groups (with C. Ellison et al).
8,006,295 Domain ID service (with C. Ellison et al).
8,302,149 Virtual distributed security system (with G. Della-Libera et al).
9,253,195 Transformation of sequential access control lists utilizing certificates (with Carl M. Ellison, Paul J. Leach, Melissa W. Dunn, Ravindra Nath Pandya, Charles William Kaufman).
9,940,106 Generating programs using context-free compositions and probability of determined transformation rules (with Adam Kalai, Sumit Gulwani, Aditya Krishna Menon, Omer Tamuz).