Patents

3,911,419        Controller for cursor positioning on a display medium (with R. Bates).

3,911,420        Display system including a high-resolution character generator (with R. Bates).

4,063,220        Multipoint data communication system with collision detection (with R. Metcalfe, D. Boggs, C. Thacker) [Ethernet].

4,079,458        High resolution character generator (with R. Rider).

4,152,697        Parallel run-length decoder.

4,203,054        Electronic image processing system (with S. Ornstein, R. Sproull and J. Leung).

4,558,413        Software version management system (with E. Schmidt).

5,161,193        Pipelined cryptography processor and method for its use in communication networks (with W. Hawe, A. Gupta, and B. Spinney).

5,210,795        Secure user authentication from personal computer (with S. Lipner and M. Gasser).

5,224,163        Method of delegating authorization from one entity to another through the use of session encryption keys (with M. Gasser, A. Goldstein, and C. Kaufman).

5,235,642        Access control subsystem and method for distributed computer system using locally cached authentication credentials (with E. Wobber, M. Abadi, and A. Birrell).

5,235,644        Probabilistic cryptographic processing method (with A. Gupta et al.).

5,268,962        Computer network with modified host-to-host encryption keys (with M. Abadi and M. Burrows).

5,315,657        Compound principals in access control lists (with M. Abadi and A. Goldstein).

5,335,343        Distributed transaction processing using two-phase commit protocol with presumed-commit without log force (with D. Lomet).

5,339,313        Method and apparatus for traffic congestion control in a communication network bridge device (with W. Hawe et al.).

5,418,854        Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.

5,475,819        Distributed configuration profile for computing system.

5,488,716        Fault tolerant computer system with shadow virtual processor (with F. Schneider et al.).

5,497,421        Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.

5,594,869        Method and apparatus for end-to-end encryption of a data packet in a computer network (with W. Hawe and A. Gupta).

5,940,619        Dynamic fine-grained dependency analysis for a functional language (with M. Abadi et al.).

6,145,056        Method and apparatus for caching the results of function applications with dynamic, fine-grained dependencies (with C. Heydon and R. Levin).

6,327,652        Loading and identifying a digital rights management operating system (with P. England and J. DeTreville).

6,330,670        Digital rights management operating system (with P. England and J. DeTreville).

6,651,171        Secure execution of program code (with P. England).

6,775,779        Hierarchical trusted code for content protection in computers (with P. England).

6,788,815        System and method for accepting disparate types of user input (with C. Lui, C. Thacker, J. Mathews, B. Keely, D. Switzer, W. Vong).

6,820,063        Controlling access to content based on certificates and access predicates (with P. England and J. DeTreville).

6,976,175        Hierarchical trusted code for content protection in computers (with P. England).

6,986,059        Hierarchical trusted code for content protection in computers (with P. England).

7,020,772        Secure execution of program code (with P. England).