| 7036022 |
Verification of trusted-path commands |
Mary Ellen Zurko, Thomas Andrew Casey, Jr., Morrie Gasser, Judith Shelhorse Hall, Clifford E. Kahn +3 more |
2006-04-25 |
| 6871283 |
Processing trusted commands in trusted and untrusted environments |
Mary Ellen Zurko, Thomas Andrew Casey, Jr., Morrie Gasser, Judith Shelhorse Hall, Clifford E. Kahn +3 more |
2005-03-22 |
| 6507909 |
Method for executing trusted-path commands |
Mary Ellen Zurko, Thomas Andrew Casey, Jr., Morrie Gasser, Judith Shelhorse Hall, Clifford E. Kahn +3 more |
2003-01-14 |
| 5991406 |
System and method for data recovery |
David M. Balenson, Carl M. Ellison, Stephen T. Walker |
1999-11-23 |
| 5956403 |
System and method for access field verification |
David M. Balenson, Carl M. Ellison, Stephen T. Walker |
1999-09-21 |
| 5745573 |
System and method for controlling access to a user secret |
David M. Balenson, Carl M. Ellison, Stephen T. Walker |
1998-04-28 |
| 5640454 |
System and method for access field verification |
David M. Balenson, Carl M. Ellison, Stephen T. Walker |
1997-06-17 |
| 5557346 |
System and method for key escrow encryption |
David M. Balenson, Carl M. Ellison, Stephen T. Walker |
1996-09-17 |
| 5557765 |
System and method for data recovery |
David M. Balenson, Carl M. Ellison, Stephen T. Walker |
1996-09-17 |
| 5210795 |
Secure user authentication from personal computer |
Morrie Gasser, Butler W. Lampson |
1993-05-11 |