Issued Patents All Time
Showing 26–45 of 45 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 7103913 | Method and apparatus for determination of the non-replicative behavior of a malicious program | William C. Arnold, David M. Chess, John Morar, Alla Segal, Ian N. Whalley | 2006-09-05 |
| 7069585 | Physical key security management method and apparatus for information systems | David M. Chess, Ian N. Whalley, John Morar | 2006-06-27 |
| 7051277 | Automated assistant for organizing electronic documents | Jeffrey O. Kephart, Richard B. Segal | 2006-05-23 |
| 6990590 | Strategic internet persona assumption | James E. Hanson, Sophia Krasikov, John Morar | 2006-01-24 |
| 6981279 | Method and apparatus for replicating and analyzing worm programs | William C. Arnold, David M. Chess, John Morar, Alla Segal, Morton Gregory Swimmer +1 more | 2005-12-27 |
| 6772346 | System and method for managing files in a distributed system using filtering | David M. Chess, Jeffrey O. Kephart, John Morar, Edward J. Pring | 2004-08-03 |
| 6678822 | Method and apparatus for securely transporting an information container from a trusted environment to an unrestricted environment | John Morar, David M. Chess, Jeffrey O. Kephart, Morton Gregory Swimmer | 2004-01-13 |
| 6560632 | System and method for managing files in a distributed system using prioritization | David M. Chess, Jeffrey O. Kephart, John Morar, Edward J. Pring | 2003-05-06 |
| 6279128 | Autonomous system for recognition of patterns formed by stored data during computer memory scrubbing | William C. Arnold, Jehoshua Bruck, Jeffrey O. Kephart, Gregory Bret Sorkin, David M. Chess +2 more | 2001-08-21 |
| 6275937 | Collaborative server processing of content and meta-information with application to virus checking in a server network | Brent Tzion Hailpern, Peter K. Malkin, Robert Jeffrey Schloss, Philip Yu, Charles Campbell Palmer | 2001-08-14 |
| 5802592 | System and method for protecting integrity of alterable ROM using digital signatures | David M. Chess, Gregory Bret Sorkin | 1998-09-01 |
| 5442699 | Searching for patterns in encrypted data | William C. Arnold, David M. Chess, Jeffrey O. Kephart, Gregory Bret Sorkin | 1995-08-15 |
| 5117457 | Tamper resistant packaging for information protection in electronic circuitry | Liam D. Comerford, Peter G. Ledermann, Lawrence I. Levy | 1992-05-26 |
| 5109413 | Manipulating rights-to-execute in connection with a software copy protection mechanism | Liam D. Comerford | 1992-04-28 |
| 4924515 | Secure management of keys using extended control vectors | Stephen M. Matyas, Dennis G. Abraham, William Arnold, Donald B. Johnson, Ramesh K. Karne +3 more | 1990-05-08 |
| 4916738 | Remote access terminal security | Akhileshwari N. Chandra, Liam D. Comerford | 1990-04-10 |
| 4903296 | Implementing a shared higher level of privilege on personal computers for copy protection of software | Akhileshwari N. Chandra, Liam D. Comerford | 1990-02-20 |
| 4817140 | Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor | Ashileshwari N. Chandra, Liam D. Comerford | 1989-03-28 |
| 4644493 | Implementing a shared higher level of privilege on personal computers for copy protection of software | Akhileshwari N. Chandra, Liam D. Comerford | 1987-02-17 |
| 4577289 | Hardware key-on-disk system for copy-protecting magnetic storage media | Liam D. Comerford | 1986-03-18 |