Issued Patents All Time
Showing 1–24 of 24 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9477832 | Digital identity management | David B. Cross, Philip J. Hallin, Thomas C. Jones | 2016-10-25 |
| 8819797 | Digital identity management | David B. Cross, Philip J. Hallin, Thomas C. Jones | 2014-08-26 |
| 8745703 | Identifying exploitation of vulnerabilities using error report | John J. Lambert, Alexander R. G. Lucas, James P. Kelly, David S. Carter, Matthew I. Diver +1 more | 2014-06-03 |
| 8196178 | Expert system analysis and graphical display of privilege elevation pathways in a computing environment | John Lambert | 2012-06-05 |
| 8151332 | Digital identity management | David B. Cross, Philip J. Hallin, Thomas C. Jones | 2012-04-03 |
| 8020194 | Analyzing cross-machine privilege elevation pathways in a networked computing environment | John Lambert | 2011-09-13 |
| 7996682 | Secure prompting | Klaus Schutz, Scott A. Field | 2011-08-09 |
| 7890643 | System and method for providing program credentials | Dean Justus, Josh Benaloh, Nathan Fink, Michael W. Howard, Daniel R. Simon | 2011-02-15 |
| 7876902 | Distribution of encrypted software update to reduce attack window | Christian Walker | 2011-01-25 |
| 7703128 | Digital identity management | David B. Cross, Philip J. Hallin, Thomas C. Jones | 2010-04-20 |
| 7478428 | Adapting input to find integer overflows | — | 2009-01-13 |
| 6560581 | System and method for secure electronic commerce transaction | Barbara L. Fox, Lester L. Waters, Jeffrey F. Spelman, Robert B. Seidensticker, Jr. | 2003-05-06 |
| 6532542 | Protected storage of core data secrets | Scott A. Field | 2003-03-11 |
| 6389535 | Cryptographic protection of core data secrets | Scott A. Field, Allan Cooper | 2002-05-14 |
| 6272631 | Protected storage of core data secrets | Scott A. Field, Allan Cooper | 2001-08-07 |
| 6253324 | Server verification of requesting clients | Scott A. Field, Allan Cooper | 2001-06-26 |
| 6044155 | Method and system for securely archiving core data secrets | Scott A. Field, Allan Cooper | 2000-03-28 |
| 6021203 | Coercion resistant one-time-pad cryptosystem that facilitates transmission of messages having different levels of security | John R. Douceur, Michael P. Calligaro | 2000-02-01 |
| 5790677 | System and method for secure electronic commerce transactions | Barbara L. Fox, Lester L. Waters, Jeffrey F. Spelman, Robert B. Seidensticker, Jr. | 1998-08-04 |
| 5778069 | Non-biased pseudo random number generator | Daniel R. Simon, Bennet S. Yee | 1998-07-07 |
| 5764768 | Blind encryption | Jeffrey F. Spelman | 1998-06-09 |
| 5761311 | Blind encryption | Jeffrey F. Spelman | 1998-06-02 |
| 5680458 | Root key compromise recovery | Jeffrey F. Spelman | 1997-10-21 |
| 5638445 | Blind encryption | Jeffrey F. Spelman | 1997-06-10 |