Patents

3,911,419        Controller for cursor positioning on a display medium (with R. Bates).

3,911,420        Display system including a high-resolution character generator (with R. Bates).

4,063,220        Multipoint data communication system with collision detection (with R. Metcalfe, D. Boggs, C. Thacker) [Ethernet].

4,079,458        High resolution character generator (with R. Rider).

4,152,697        Parallel run-length decoder (with R. Rider).

4,203,054        Electronic image processing system (with S. Ornstein, R. Sproull and J. Leung).

4,558,413        Software version management system (with E. Schmidt).

5,161,193        Pipelined cryptography processor and method for its use in communication networks (with W. Hawe, A. Gupta, and B. Spinney).

5,210,795        Secure user authentication from personal computer (with S. Lipner and M. Gasser).

5,224,163        Method of delegating authorization from one entity to another through the use of session encryption keys (with M. Gasser, A. Goldstein, and C. Kaufman).

5,235,642        Access control subsystem and method for distributed computer system using locally cached authentication credentials (with E. Wobber, M. Abadi, and A. Birrell).

5,235,644        Probabilistic cryptographic processing method (with A. Gupta et al.).

5,268,962        Computer network with modified host-to-host encryption keys (with M. Abadi and M. Burrows).

5,315,657        Compound principals in access control lists (with M. Abadi and A. Goldstein).

5,335,343        Distributed transaction processing using two-phase commit protocol with presumed-commit without log force (with D. Lomet).

5,339,313        Method and apparatus for traffic congestion control in a communication network bridge device (with W. Hawe et al.).

5,418,854        Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system (with C. Kaufman et al.).

5,475,819        Distributed configuration profile for computing system (with S. Miller).

5,488,716        Fault tolerant computer system with shadow virtual processor (with F. Schneider et al.).

5,497,421        Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system (with C. Kaufman et al.).

5,594,869        Method and apparatus for end-to-end encryption of a data packet in a computer network (with W. Hawe and A. Gupta).

5,940,619        Dynamic fine-grained dependency analysis for a functional language (with M. Abadi et al.).

6,145,056        Method and apparatus for caching the results of function applications with dynamic, fine-grained dependencies (with C. Heydon and R. Levin).

6,327,652        Loading and identifying a digital rights management operating system (with P. England and J. DeTreville).

6,330,670        Digital rights management operating system (with P. England and J. DeTreville).

6,651,171        Secure execution of program code (with P. England).

6,775,779        Hierarchical trusted code for content protection in computers (with P. England).

6,788,815        System and method for accepting disparate types of user input (C.  Lui, C. Thacker, J.  Mathews, L. Keely, D. Switzer, and W. Vong).

6,820,063        Controlling access to content based on certificates and access predicates (with P. England and J. DeTreville).

6,976,175        Hierarchical trusted code for content protection in computers (with P. England).

6,986,059        Hierarchical trusted code for content protection in computers (with P. England).

7,020,772        Secure execution of program code (with P. England).

7,174,457        System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party (with J. DeTreville, P. England).

7,194,092        Key-based secure storage (with J. DeTreville, P. England).

7,248,248        Pointing system for pen-based computer.

7,302,709        Key-based secure storage (with J. DeTreville, P. England).

7,319,454        Two-button mouse input using a stylus (with C Thacker, J. Mathews, L Huapaya).

7,356,682        Attesting to a value of a register and/or memory region (with J. DeTreville, P. England).

7,415,620        System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party (with J. DeTreville, P. England).

7,418,137        System and method for accepting disparate types of user input (with C. Lui et al).

7,424,606        System and method for authenticating an operating system (with J. DeTreville, P. England).

7,434,263        System and method for secure storage data using a key (with J. DeTreville, P. England).

7,457,412        System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party (with J. DeTreville, P. England).

7,496,769        Hierarchical trusted code for content protection in computers (with P. England).

7,529,919        Boot blocks for software (with J. DeTreville, P. England).

7,543,336        System and method for secure storage of data using public and private keys (with J. DeTreville, P. England).

7,752,431        Virtual distributed security system (with G. Della-Libera et al).

7,809,938        Virtual distributed security system (with G. Della-Libera et al).

7,900,248        Access control negation using negative groups (with C. Ellison et al).

8,006,295        Domain ID service (with C. Ellison et al).

8,302,149        Virtual distributed security system (with G. Della-Libera et al).

9,253,195        Transformation of sequential access control lists utilizing certificates (with Carl M. Ellison, Paul J. Leach, Melissa W. Dunn, Ravindra Nath Pandya, Charles William Kaufman).

9,940,106        Generating programs using context-free compositions and probability of determined transformation rules (with Adam Kalai, Sumit Gulwani, Aditya Krishna Menon, Omer Tamuz).