3,911,419 Controller for cursor positioning on a display medium (with
system including a high-resolution character generator (with
data communication system with collision detection (with
4,079,458 High resolution character generator (with R. Rider).
4,152,697 Parallel run-length decoder.
image processing system (with S. Ornstein,
4,558,413 Software version management
cryptography processor and method for its use in communication networks (with
user authentication from personal computer (with S. Lipner and
5,224,163 Method of
delegating authorization from one entity to another through the use of session
encryption keys (with
control subsystem and method for distributed computer system using locally
cached authentication credentials (with E. Wobber,
5,235,644 Probabilistic cryptographic processing method (with A. Gupta et al.).
network with modified host-to-host encryption keys (with
principals in access control lists (with
5,335,343 Distributed transaction processing using two-phase commit protocol with presumed-commit without log force (with D. Lomet).
5,339,313 Method and apparatus for traffic congestion control in a communication network bridge device (with W. Hawe et al.).
5,475,819 Distributed configuration profile for computing system.
5,488,716 Fault tolerant computer system with shadow virtual processor (with F. Schneider et al.).
5,497,421 Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.
5,594,869 Method and apparatus for
end-to-end encryption of a data packet in a computer network (with W. Hawe and
5,940,619 Dynamic fine-grained dependency analysis for a functional language (with M. Abadi et al.).
6,145,056 Method and
apparatus for caching the results of function applications with dynamic,
fine-grained dependencies (with
6,327,652 Loading and identifying a digital rights management operating system (with P. England and J. DeTreville).
6,330,670 Digital rights management operating system (with P. England and J. DeTreville).
6,651,171 Secure execution of program code (with P. England).
6,775,779 Hierarchical trusted code for content protection in computers (with P. England).
6,788,815 System and method for accepting disparate types of user input (with C. Lui, C. Thacker, J. Mathews, B. Keely, D. Switzer, W. Vong).
6,820,063 Controlling access to content based on certificates and access predicates (with P. England and J. DeTreville).
6,976,175 Hierarchical trusted code for content protection in computers (with P. England).
6,986,059 Hierarchical trusted code for content protection in computers (with P. England).
7,020,772 Secure execution of program code (with P. England).