Issued Patents All Time
Showing 25 most recent of 28 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8131919 | Techniques for controlling storage device use by performing a storage device location assessment operation based on a current storage device identifier | Jun Zhang | 2012-03-06 |
| 8037243 | Installing data storage system software on disk drive systems | Matthew Ferson | 2011-10-11 |
| 7912995 | Managing SAS topology | Matthew Long, Brian Parry | 2011-03-22 |
| 7890794 | Handling SAS topology problems | — | 2011-02-15 |
| 7881946 | Methods and apparatus for guiding a user through a SAN management process | Hanna Yehuda | 2011-02-01 |
| 7757123 | Managing faults | Mark W. Kulacz | 2010-07-13 |
| 7624206 | RAID data storage system with SAS expansion | Adrianna D. Bailey, John V. Burroughs, John P. Didier, Douglas E. Peeke, Matthew Long | 2009-11-24 |
| 7620720 | Methods and apparatus for deallocation of resources | — | 2009-11-17 |
| 7555719 | Methods and apparatus for displaying data storage management information | Hanna Yehuda | 2009-06-30 |
| 7549002 | Enclosure numbering in RAID data storage systems | Brian Parry | 2009-06-16 |
| 7502669 | Apparatus and method for graphically displaying disk drive enclosures and cabling in a data storage system | T. David Evans, Nancy Welch | 2009-03-10 |
| 7401137 | Methods and apparatus for application of management actions to resources sharing relationships | Jeffrey L. Alexander, Urayoan Irizarry, Subhash Vanga | 2008-07-15 |
| 7377800 | RAID data storage system having keyed SAS expansion cables | — | 2008-05-27 |
| 7315985 | Methods and apparatus for managing network resources using a network topology view | Francois Gauvin, Joshua P. Onffroy, Ketan K. Shah, Hanna Yehuda | 2008-01-01 |
| 7036022 | Verification of trusted-path commands | Mary Ellen Zurko, Thomas Andrew Casey, Jr., Judith Shelhorse Hall, Clifford E. Kahn, Andrew H. Mason +3 more | 2006-04-25 |
| 7032186 | Methods and apparatus for representing resources in a computing system environment | Clifford E. Kahn | 2006-04-18 |
| 6978422 | Methods and apparatus for displaying managed resource information | Michael Patrick Bushe, David Barta | 2005-12-20 |
| 6966033 | Methods and apparatus for graphically managing resources | Hanna Yehuda, Michael Patrick Bushe | 2005-11-15 |
| 6871283 | Processing trusted commands in trusted and untrusted environments | Mary Ellen Zurko, Thomas Andrew Casey, Jr., Judith Shelhorse Hall, Clifford E. Kahn, Andrew H. Mason +3 more | 2005-03-22 |
| 6636250 | Methods and apparatus for presenting information to a user of a computer system | — | 2003-10-21 |
| 6507909 | Method for executing trusted-path commands | Mary Ellen Zurko, Thomas Andrew Casey, Jr., Judith Shelhorse Hall, Clifford E. Kahn, Andrew H. Mason +3 more | 2003-01-14 |
| 5497421 | Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system | Charles W. Kaufman, Butler W. Lampson, Joseph Tardo, Kannan Alagappan | 1996-03-05 |
| 5491752 | System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens | Charles W. Kaufman, Radia J. Pearlman | 1996-02-13 |
| 5418854 | Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system | Charles W. Kaufman, Butler W. Lampson, Joseph Tardo, Kannan Alagappan | 1995-05-23 |
| 5235644 | Probabilistic cryptographic processing method | Amar Gupta, Butler W. Lampson, William Hawe, Joseph Tardo, Charles W. Kaufman +2 more | 1993-08-10 |