Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
 
 
Inventor:
Safford; David Robert
Address:
Brewster, NY
No. of patents:
15
Patents:












Patent Number Title Of Patent Date Issued
7893830 System and method of dynamically weighted analysis for intrusion decision-making February 22, 2011
An intrusion detection mechanism is provided for flexible, automatic, thorough, and consistent security checking and vulnerability resolution in a heterogeneous environment. The mechanism may provide a predefined number of default intrusion analysis approaches, such as signature-based,
7450005 System and method of dynamically weighted analysis for intrusion decision-making November 11, 2008
An intrusion detection mechanism is provided for flexible, automatic, thorough, and consistent security checking and vulnerability resolution in a heterogeneous environment. The mechanism may provide a predefined number of default intrusion analysis approaches, such as signature-based,
7343493 Encrypted file system using TCPA March 11, 2008
A method for restricting access to an encryption key of an encrypted file system (EFS), whereby access is provided only when a computer system is booted in a trusted state. The EFS encrypts the files within a TPM chip according to TCPA specifications and simultaneously creates the en
7281125 Securing sensitive configuration data remotely October 9, 2007
A method, computer program product and computer system for securing alterable data. A computer that is remotely managed may be equipped with a protected storage that is accessible only by BIOS code. The protected storage may have the capacity to store a symmetrical encryption key. An
7085933 Computer system apparatus and method for improved assurance of authentication August 1, 2006
A computer system, method of operation, and program product which gives a clear indication to a user when a computer system has transitioned to a trusted state.
6311270 Method and apparatus for securing communication utilizing a security processor October 30, 2001
A method is provided for communicating digital content between a content provider and a data processing system which is under the control of a content consumer, utilizing an insecure communication channel, such as the internet. A security processor is provided. The security processor is
6243470 Method and apparatus for advanced symmetric key block cipher with variable length key and block June 5, 2001
A method and apparatus for an advanced symmetric key cipher for encryption and decryption, using a block cipher algorithm. Different block sizes and key sizes are supported, and a different sub-key is used in each round. Encryption is computed using a variable number of rounds of mixing,
6192129 Method and apparatus for advanced byte-oriented symmetric key block cipher with variable length February 20, 2001
A method and apparatus for an advanced byte-oriented symmetric key cipher for encryption and decryption, using a block cipher algorithm. Different block sizes and key sizes are supported, and a different sub-key is used in each round. Encryption is computed using a variable number of rou
6189095 Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks February 13, 2001
The present invention provides a technique, system, and computer program for a symmetric key block cipher. This cipher uses multiple stages with a modified Type-3 Feistel network, and a modified Unbalanced Type-1 Feistel network in an expansion box forward function. The cipher allows the
6185679 Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 f February 6, 2001
The present invention provides a technique, system, and computer program for a symmetric key block cipher. Variable block sizes and key sizes are supported, as well as a variable number of rounds. The cipher uses multiple stages of processing, where the stages have different structures
6185304 Method and apparatus for a symmetric block cipher using multiple stages February 6, 2001
The present invention provides a technique, system, and computer program for a symmetric key block cipher. Variable block sizes and key sizes are supported, as well as a variable number of rounds. The cipher uses multiple stages of processing, where the stages have different structures
6052469 Interoperable cryptographic key recovery system with verification by comparison April 18, 2000
A cryptographic key recovery system that is interoperable with existing systems for establishing keys between communicating parties. The sender uses a reversible key inversion function to generate key recovery values P, Q and (optionally) R as a function of a session key and public i
5937066 Two-phase cryptographic key recovery system August 10, 1999
A cryptographic key recovery system that operates in two phases. In the first phase, the sender establishes a secret value with the receiver. For each key recovery agent, the sender generates a key-generating value as a one-way function of the secret value and encrypts the key-generating
5907618 Method and apparatus for verifiably providing key recovery information in a cryptographic system May 25, 1999
A method and apparatus for verifiably providing key recovery information to one or more trustees in a cryptographic communication system having a sender and a receiver Each communicating party has its own Diffie-Hellman key pair comprising a secret value and corresponding public value, a
5796830 Interoperable cryptographic key recovery system August 18, 1998
A cryptographic key recovery system that is interoperable with existing systems for establishing keys between communicating parties. The sender uses a reversible key inversion function to generate key recovery values P, Q and (optionally) R as a function of a session key and public i










 
 
  Recently Added Patents
Circuit design approximation
Method of inspecting wafer
Head shield
Image processing apparatus and image processing method
Elastic polypropylene-based film compositions
Semiconductor device comprising a Fin and method for manufacturing the same
Re-establishing push notification channels via user identifiers
  Randomly Featured Patents
Manufacturing method for ink jet printer head
Method of creating user-defined call processing procedures
Suction system for the laser processing of work pieces in dental technology
Programmatic auto-convergent method for "physical layout power hot-spot" risk aware ASIP architecture customization for performance optimization
Cathode structure for electrolytic apparatus employing impellers
Integrated circuit
Method and process for synthesis of 2',3'-didehydro-2',3'-dideoxynucleosides
Encapsulation of a device
Method of manufacturing a vehicle body
Crimped sealed adapter bushing assembly for a double diaphragm spring brake actuator