| 9477832 |
Digital identity management |
David B. Cross, Philip J. Hallin, Thomas C. Jones |
2016-10-25 |
| 8819797 |
Digital identity management |
David B. Cross, Philip J. Hallin, Thomas C. Jones |
2014-08-26 |
| 8745703 |
Identifying exploitation of vulnerabilities using error report |
John J. Lambert, Alexander R. G. Lucas, James P. Kelly, David S. Carter, Matthew I. Diver +1 more |
2014-06-03 |
| 8196178 |
Expert system analysis and graphical display of privilege elevation pathways in a computing environment |
John Lambert |
2012-06-05 |
| 8151332 |
Digital identity management |
David B. Cross, Philip J. Hallin, Thomas C. Jones |
2012-04-03 |
| 8020194 |
Analyzing cross-machine privilege elevation pathways in a networked computing environment |
John Lambert |
2011-09-13 |
| 7996682 |
Secure prompting |
Klaus Schutz, Scott A. Field |
2011-08-09 |
| 7890643 |
System and method for providing program credentials |
Dean Justus, Josh Benaloh, Nathan Fink, Michael W. Howard, Daniel R. Simon |
2011-02-15 |
| 7876902 |
Distribution of encrypted software update to reduce attack window |
Christian Walker |
2011-01-25 |
| 7703128 |
Digital identity management |
David B. Cross, Philip J. Hallin, Thomas C. Jones |
2010-04-20 |
| 7478428 |
Adapting input to find integer overflows |
— |
2009-01-13 |
| 6560581 |
System and method for secure electronic commerce transaction |
Barbara L. Fox, Lester L. Waters, Jeffrey F. Spelman, Robert B. Seidensticker, Jr. |
2003-05-06 |
| 6532542 |
Protected storage of core data secrets |
Scott A. Field |
2003-03-11 |
| 6389535 |
Cryptographic protection of core data secrets |
Scott A. Field, Allan Cooper |
2002-05-14 |
| 6272631 |
Protected storage of core data secrets |
Scott A. Field, Allan Cooper |
2001-08-07 |
| 6253324 |
Server verification of requesting clients |
Scott A. Field, Allan Cooper |
2001-06-26 |
| 6044155 |
Method and system for securely archiving core data secrets |
Scott A. Field, Allan Cooper |
2000-03-28 |
| 6021203 |
Coercion resistant one-time-pad cryptosystem that facilitates transmission of messages having different levels of security |
John R. Douceur, Michael P. Calligaro |
2000-02-01 |
| 5790677 |
System and method for secure electronic commerce transactions |
Barbara L. Fox, Lester L. Waters, Jeffrey F. Spelman, Robert B. Seidensticker, Jr. |
1998-08-04 |
| 5778069 |
Non-biased pseudo random number generator |
Daniel R. Simon, Bennet S. Yee |
1998-07-07 |
| 5764768 |
Blind encryption |
Jeffrey F. Spelman |
1998-06-09 |
| 5761311 |
Blind encryption |
Jeffrey F. Spelman |
1998-06-02 |
| 5680458 |
Root key compromise recovery |
Jeffrey F. Spelman |
1997-10-21 |
| 5638445 |
Blind encryption |
Jeffrey F. Spelman |
1997-06-10 |