| 5432849 |
Secure cryptographic operations using control vectors generated inside a cryptographic facility |
Donald B. Johnson, An V. Le, Stephen M. Matyas, Rostislaw Prymak |
1995-07-11 |
| 5414833 |
Network security system and method using a parallel finite state machine adaptive active monitor and responder |
Paul C. Hershey, Donald B. Johnson, An V. Le, Stephen M. Matyas, John G. Waclawsky |
1995-05-09 |
| 5319705 |
Method and system for multimedia access control enablement |
Bernard J. Halter, Alphonse M. Bracco, Donald B. Johnson, An V. Le, Stephen M. Matyas +2 more |
1994-06-07 |
| 5265164 |
Cryptographic facility environment backup/restore and replication in a public key cryptosystem |
Stephen M. Matyas, Donald B. Johnson, An V. Le, Rostislaw Prymak, William C. Martin +1 more |
1993-11-23 |
| 5214698 |
Method and apparatus for validating entry of cryptographic keys |
Ronald M. Smith, Sr., Phil C. Yeh, Randall J. Easter, Donald B. Johnson, An Van Le +2 more |
1993-05-25 |
| 5200999 |
Public key cryptosystem key management based on control vectors |
Stephen M. Matyas, Donald B. Johnson, An V. Le, Rostislaw Prymak, William C. Martin +1 more |
1993-04-06 |
| 5201000 |
Method for generating public and private key pairs without using a passphrase |
Stephen M. Matyas, Donald B. Johnson, An V. Le, Rostislaw Prymak |
1993-04-06 |
| 5177791 |
Secure translation of usage-control values for cryptographic keys |
Phil C. Yeh, Dennis G. Abraham, Donald B. Johnson, An Van Le, Stephen M. Matyas +2 more |
1993-01-05 |
| 5164988 |
Method to establish and enforce a network cryptographic security policy in a public key cryptosystem |
Stephen M. Matyas, Donald B. Johnson, An V. Le, Rostislaw Prymak, William C. Martin +1 more |
1992-11-17 |
| 5142578 |
Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors |
Stephen M. Matyas, Donald B. Johnson, An V. Le, Rostislaw Prymak, William C. Martin +1 more |
1992-08-25 |
| 5103478 |
Secure management of keys using control vectors with multi-path checking |
Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, Ramesh K. Karne, An V. Le +2 more |
1992-04-07 |
| 5073934 |
Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key |
Stephen M. Matyas, Donald B. Johnson, An V. Le, William C. Martin, Rostislaw Prymak +1 more |
1991-12-17 |
| 5007089 |
Secure key management using programable control vector checking |
Stephen M. Matyas, Donald B. Johnson, An V. Le, William C. Martin, Rostislaw Prymak |
1991-04-09 |
| 4993069 |
Secure key management using control vector translation |
Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, An V. Le, Rostislaw Prymak +1 more |
1991-02-12 |
| 4941176 |
Secure management of keys using control vectors |
Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, Ramesh K. Karne, An V. Le +3 more |
1990-07-10 |
| 4927200 |
Storage container and fastener assembly for cars |
— |
1990-05-22 |
| 4924514 |
Personal identification number processing using control vectors |
Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, Ramesh K. Karne, An V. Le +4 more |
1990-05-08 |
| 4924515 |
Secure management of keys using extended control vectors |
Stephen M. Matyas, Dennis G. Abraham, William Arnold, Donald B. Johnson, Ramesh K. Karne +3 more |
1990-05-08 |
| 4918728 |
Data cryptography operations using control vectors |
Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, Ramesh K. Karne, An V. Le +3 more |
1990-04-17 |