Issued Patents All Time
Showing 26–42 of 42 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 7716734 | Systems and methods for pattern matching on principal names to control access to computing resources | Andrew Birrell, Edward P. Wobber | 2010-05-11 |
| 7600232 | Inter-process communications employing bi-directional message conduits | Galen C. Hunt, James R. Larus, Manuel A. Fahndrich, Edward P. Wobber, John D. DeTreville | 2009-10-06 |
| 7577992 | Software security based on control flow integrity | Mihai Budiu, Ulfar Erlingsson, Jay Ligatti | 2009-08-18 |
| 7337291 | Software memory access control | Ulfar Erlingsson, Jay Ligatti, Mihai Budiu | 2008-02-26 |
| 7203833 | History based rights computation for managed code | Cedric Fournet | 2007-04-10 |
| 7149801 | Memory bound functions for spam deterrence and the like | Michael Burrows, Mark Manasse, Edward P. Wobber, Daniel R. Simon | 2006-12-12 |
| 6480502 | Method for avoiding broadcast deadlocks in a mesh-connected network | Thomas L. Rodeheffer | 2002-11-12 |
| 6253370 | Method and apparatus for annotating a computer program to facilitate subsequent processing of the program | Sanjay Ghemawat, Raymond Stata | 2001-06-26 |
| 6195698 | Method for selectively restricting access to computer systems | Mark David Lillibridge, Krishna Bharat, Andrei Broder | 2001-02-27 |
| 6141760 | System and method for generating unique passwords | Krishna Bharat, Johannes Leon Marais | 2000-10-31 |
| 6079021 | Method and apparatus for strengthening passwords for protection of computer systems | Roger M. Needham, Thomas Mark Angus Lomas | 2000-06-20 |
| 5940619 | Dynamic fine-grained dependency analysis for a functional language | James J. Horning, Butler W. Lampson, Roy Levin, Jean-Jacques Levy, Yuan Yu | 1999-08-17 |
| 5805803 | Secure web tunnel | Andrew Birrell, Edward P. Wobber, Raymond Stata | 1998-09-08 |
| 5315657 | Compound principals in access control lists | Andrew C. Goldstein, Butler W. Lampson | 1994-05-24 |
| 5268962 | Computer network with modified host-to-host encryption keys | Michael Burrows, Butler W. Lampson | 1993-12-07 |
| 5235642 | Access control subsystem and method for distributed computer system using locally cached authentication credentials | Edward P. Wobber, Andrew Birrell, Butler W. Lampson | 1993-08-10 |
| 5173939 | Access control subsystem and method for distributed computer system using compound principals | Michael Burrows, Edward P. Wobber | 1992-12-22 |