3,911,419 Controller for cursor positioning on a display medium (with
3,911,420 Display
system including a high-resolution character generator (with
4,063,220 Multipoint
data communication system with collision detection (with
4,079,458 High resolution character generator (with R. Rider).
4,152,697 Parallel run-length decoder.
4,203,054 Electronic
image processing system (with S. Ornstein,
4,558,413 Software version management
system (with
5,161,193 Pipelined
cryptography processor and method for its use in communication networks (with
W. Hawe,
5,210,795 Secure
user authentication from personal computer (with S. Lipner and
5,224,163 Method of
delegating authorization from one entity to another through the use of session
encryption keys (with
5,235,642 Access
control subsystem and method for distributed computer system using locally
cached authentication credentials (with E. Wobber,
5,235,644 Probabilistic cryptographic processing method (with A. Gupta et al.).
5,268,962 Computer
network with modified host-to-host encryption keys (with
5,315,657 Compound
principals in access control lists (with
5,335,343 Distributed transaction processing using two-phase commit protocol with presumed-commit without log force (with D. Lomet).
5,339,313 Method and apparatus for traffic congestion control in a communication network bridge device (with W. Hawe et al.).
5,418,854 Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.
5,475,819 Distributed configuration profile for computing system.
5,488,716 Fault tolerant computer system with shadow virtual processor (with F. Schneider et al.).
5,497,421 Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.
5,594,869 Method and apparatus for
end-to-end encryption of a data packet in a computer network (with W. Hawe and
5,940,619 Dynamic fine-grained dependency analysis for a functional language (with M. Abadi et al.).
6,145,056 Method and
apparatus for caching the results of function applications with dynamic,
fine-grained dependencies (with
6,327,652 Loading and identifying a digital rights management operating system (with P. England and J. DeTreville).
6,330,670 Digital rights management operating system (with P. England and J. DeTreville).
6,651,171 Secure execution of program code (with P. England).
6,775,779 Hierarchical trusted code for content protection in computers (with P. England).
6,788,815 System and method for accepting disparate types of user input (with C. Lui, C. Thacker, J. Mathews, B. Keely, D. Switzer, W. Vong).
6,820,063 Controlling access to content based on certificates and access predicates (with P. England and J. DeTreville).
6,976,175 Hierarchical trusted code for content protection in computers (with P. England).
6,986,059 Hierarchical trusted code for content protection in computers (with P. England).
7,020,772 Secure execution of program code (with P. England).