Issued Patents All Time
Showing 51–75 of 77 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 5815573 | Cryptographic key recovery system | Donald B. Johnson, Paul A. Karger, Stephen M. Matyas, Marcel Mordechay Yung, Nevenko Zunic | 1998-09-29 |
| 5796740 | Router using multiple hop redirect messages to enable bridge like data forwarding | Radia J. Perlman, Alan J. Kirby, Floyd Backes | 1998-08-18 |
| 5796830 | Interoperable cryptographic key recovery system | Donald B. Johnson, Paul A. Karger, Stephen M. Matyas, David R. Safford, Marcel Mordechay Yung +1 more | 1998-08-18 |
| 5787169 | Method and apparatus for controlling access to encrypted data files in a computer system | Alan D. Eldridge | 1998-07-28 |
| 5764772 | Differential work factor cryptography method and system | Stephen M. Matyas | 1998-06-09 |
| 5666415 | Method and apparatus for cryptographic authentication | — | 1997-09-09 |
| 5664099 | Method and apparatus for establishing a protected channel between a user and a computer system | Raymond E. Ozzie, Eric M. Patey, Steven Beckhardt | 1997-09-02 |
| 5574860 | Method of neighbor discovery over a multiaccess nonbroadcast medium | Radia J. Perlman, Christopher W. Gunner | 1996-11-12 |
| 5500860 | Router using multiple hop redirect messages to enable bridge like data forwarding | Radia J. Perlman, Alan J. Kirby, Floyd Backes | 1996-03-19 |
| 5497421 | Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system | Morrie Gasser, Butler W. Lampson, Joseph Tardo, Kannan Alagappan | 1996-03-05 |
| 5491752 | System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens | Radia J. Pearlman, Morrie Gasser | 1996-02-13 |
| 5483598 | Message encryption using a hash function | Radia J. Perlman | 1996-01-09 |
| 5475763 | Method of deriving a per-message signature for a DSS or El Gamal encryption system | Radia J. Perlman | 1995-12-12 |
| 5434855 | Method and apparatus for selective interleaving in a cell-switched network | Radia J. Perlman, Robert E. Thomas, William Hawe | 1995-07-18 |
| 5418781 | Architecture for maintaining the sequence of packet cells transmitted over a multicast, cell-switched network | Radia J. Perlman | 1995-05-23 |
| 5418854 | Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system | Morrie Gasser, Butler W. Lampson, Joseph Tardo, Kannan Alagappan | 1995-05-23 |
| 5351295 | Secure method of neighbor discovery over a multiaccess medium | Radia J. Perlman | 1994-09-27 |
| 5261002 | Method of issuance and revocation of certificates of authenticity used in public key networks and other systems | Radia J. Perlman | 1993-11-09 |
| 5235644 | Probabilistic cryptographic processing method | Amar Gupta, Butler W. Lampson, William Hawe, Joseph Tardo, Mark F. Kempf +2 more | 1993-08-10 |
| 5224163 | Method for delegating authorization from one entity to another through the use of session encryption keys | Morrie Gasser, Andrew C. Goldstein, Butler W. Lampson | 1993-06-29 |
| 5220604 | Method for performing group exclusion in hierarchical group structures | Morrie Gasser, Andrew C. Goldstein | 1993-06-15 |
| 5128926 | Updating link state information in networks | Radia J. Perlman, Ross W. Callon | 1992-07-07 |
| 5086469 | Encryption with selective disclosure of protocol identifiers | Amar Gupta, Mark F. Kempf, G. Paul Koning | 1992-02-04 |
| 5081678 | Method for utilizing an encrypted key as a key identifier in a data packet in a computer network | B. J. Herbison | 1992-01-14 |
| 5070528 | Generic encryption technique for communication networks | William Hawe, Joseph Tardo, Amar Gupta, Barry A. Spinney, Gregory M. Waters | 1991-12-03 |