| 12189966 |
Storage I/O management unit for solid-state drives |
Sujay Yadalam Sudarshan |
2025-01-07 |
| 9619401 |
Efficient memory management system for computers supporting virtual machines |
Jayneel Gandhi, Mark D. Hill |
2017-04-11 |
| 9547603 |
I/O memory management unit providing self invalidated mapping |
Arkaprava Basu, Mark D. Hill |
2017-01-17 |
| 9158704 |
Virtual memory management system with reduced latency |
Arkaprava Basu, Mark D. Hill |
2015-10-13 |
| 9128739 |
Determining instances to maintain on at least one cloud responsive to an evaluation of performance characteristics |
Ari Juels, Kevin D. Bowers, Benjamin Tillman Farley, Venkatanathan Varadarajan, Thomas Ristenpart |
2015-09-08 |
| 8510597 |
Providing restartable file systems within computing devices |
Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Swaminathan Sundararaman, Sriram Subramanian, Abhishek Rajimwale |
2013-08-13 |
| 8239633 |
Non-broadcast signature-based transactional memory |
David A. Wood, Mark D. Hill, Michael Marty, Luke Yen, Kevin Moore +2 more |
2012-08-07 |
| 7716722 |
System and method of proxy authentication in a secured network |
Neta Amit, Richard B. Ward |
2010-05-11 |
| 7308709 |
System and method for managing and authenticating services via service principal names |
John Brezak, Richard B. Ward, Paul J. Leach |
2007-12-11 |
| 7113994 |
System and method of proxy authentication in a secured network |
Neta Amit, Richard B. Ward |
2006-09-26 |
| 6625603 |
Object type specific access control |
Praerit Garg, Clifford P. Van Dyke, Richard B. Ward, Peter T. Brundrett |
2003-09-23 |
| 6505300 |
Method and system for secure running of untrusted content |
Shannon J. Chan, Gregory Jensenworth, Mario C. Goertzel, Bharat Shah, Richard B. Ward |
2003-01-07 |
| 6427209 |
System and method of user logon in combination with user authentication for network access |
John Brezak, Richard B. Ward, Paul J. Leach |
2002-07-30 |
| 6412070 |
Extensible security system and method for controlling access to objects in a computing environment |
Clifford P. Van Dyke, Peter T. Brundrett, Praerit Garg, Richard B. Ward |
2002-06-25 |
| 6401211 |
System and method of user logon in combination with user authentication for network access |
John Brezak, Richard B. Ward, Paul J. Leach |
2002-06-04 |
| 6377691 |
Challenge-response authentication and key exchange for a connectionless security protocol |
Bharat Shah |
2002-04-23 |
| 6308274 |
Least privilege via restricted tokens |
— |
2001-10-23 |
| 6289458 |
Per property access control mechanism |
Praerit Garg, Clifford P. Van Dyke, Richard B. Ward, Peter T. Brundrett |
2001-09-11 |
| 6279111 |
Security model using restricted tokens |
Gregory Jensenworth, Praerit Garg, Mario C. Goertzel, Shannon J. Chan |
2001-08-21 |
| 6189100 |
Ensuring the integrity of remote boot client data |
Adam Barr, Charles T. Lenzmeier |
2001-02-13 |
| 5768519 |
Method and apparatus for merging user accounts from a source security domain into a target security domain |
Robert P. Reichel, Pradyumna K. Misra, Michael R. C. Seaman, James W. Kelly, Jr. |
1998-06-16 |
| 5761669 |
Controlling access to objects on multiple operating systems |
David S. Montague, Pradyumna K. Misra, Robert P. Reichel |
1998-06-02 |
| 5719941 |
Method for changing passwords on a remote computer |
Clifford P. Van Dyke, Pradyumna K. Misra |
1998-02-17 |
| 5708812 |
Method and apparatus for Migrating from a source domain network controller to a target domain network controller |
Clifford P. Van Dyke, Keith W. Logan, Pradyumna K. Misra |
1998-01-13 |
| 5675782 |
Controlling access to objects on multiple operating systems |
David S. Montague, Pradyumna K. Misra |
1997-10-07 |