Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
 
 
Inventor:
Safford; David Robert
Address:
Brewster, NY
No. of patents:
15
Patents:












Patent Number Title Of Patent Date Issued
7893830 System and method of dynamically weighted analysis for intrusion decision-making February 22, 2011
An intrusion detection mechanism is provided for flexible, automatic, thorough, and consistent security checking and vulnerability resolution in a heterogeneous environment. The mechanism may provide a predefined number of default intrusion analysis approaches, such as signature-based,
7450005 System and method of dynamically weighted analysis for intrusion decision-making November 11, 2008
An intrusion detection mechanism is provided for flexible, automatic, thorough, and consistent security checking and vulnerability resolution in a heterogeneous environment. The mechanism may provide a predefined number of default intrusion analysis approaches, such as signature-based,
7343493 Encrypted file system using TCPA March 11, 2008
A method for restricting access to an encryption key of an encrypted file system (EFS), whereby access is provided only when a computer system is booted in a trusted state. The EFS encrypts the files within a TPM chip according to TCPA specifications and simultaneously creates the en
7281125 Securing sensitive configuration data remotely October 9, 2007
A method, computer program product and computer system for securing alterable data. A computer that is remotely managed may be equipped with a protected storage that is accessible only by BIOS code. The protected storage may have the capacity to store a symmetrical encryption key. An
7085933 Computer system apparatus and method for improved assurance of authentication August 1, 2006
A computer system, method of operation, and program product which gives a clear indication to a user when a computer system has transitioned to a trusted state.
6311270 Method and apparatus for securing communication utilizing a security processor October 30, 2001
A method is provided for communicating digital content between a content provider and a data processing system which is under the control of a content consumer, utilizing an insecure communication channel, such as the internet. A security processor is provided. The security processor is
6243470 Method and apparatus for advanced symmetric key block cipher with variable length key and block June 5, 2001
A method and apparatus for an advanced symmetric key cipher for encryption and decryption, using a block cipher algorithm. Different block sizes and key sizes are supported, and a different sub-key is used in each round. Encryption is computed using a variable number of rounds of mixing,
6192129 Method and apparatus for advanced byte-oriented symmetric key block cipher with variable length February 20, 2001
A method and apparatus for an advanced byte-oriented symmetric key cipher for encryption and decryption, using a block cipher algorithm. Different block sizes and key sizes are supported, and a different sub-key is used in each round. Encryption is computed using a variable number of rou
6189095 Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks February 13, 2001
The present invention provides a technique, system, and computer program for a symmetric key block cipher. This cipher uses multiple stages with a modified Type-3 Feistel network, and a modified Unbalanced Type-1 Feistel network in an expansion box forward function. The cipher allows the
6185679 Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 f February 6, 2001
The present invention provides a technique, system, and computer program for a symmetric key block cipher. Variable block sizes and key sizes are supported, as well as a variable number of rounds. The cipher uses multiple stages of processing, where the stages have different structures
6185304 Method and apparatus for a symmetric block cipher using multiple stages February 6, 2001
The present invention provides a technique, system, and computer program for a symmetric key block cipher. Variable block sizes and key sizes are supported, as well as a variable number of rounds. The cipher uses multiple stages of processing, where the stages have different structures
6052469 Interoperable cryptographic key recovery system with verification by comparison April 18, 2000
A cryptographic key recovery system that is interoperable with existing systems for establishing keys between communicating parties. The sender uses a reversible key inversion function to generate key recovery values P, Q and (optionally) R as a function of a session key and public i
5937066 Two-phase cryptographic key recovery system August 10, 1999
A cryptographic key recovery system that operates in two phases. In the first phase, the sender establishes a secret value with the receiver. For each key recovery agent, the sender generates a key-generating value as a one-way function of the secret value and encrypts the key-generating
5907618 Method and apparatus for verifiably providing key recovery information in a cryptographic system May 25, 1999
A method and apparatus for verifiably providing key recovery information to one or more trustees in a cryptographic communication system having a sender and a receiver Each communicating party has its own Diffie-Hellman key pair comprising a secret value and corresponding public value, a
5796830 Interoperable cryptographic key recovery system August 18, 1998
A cryptographic key recovery system that is interoperable with existing systems for establishing keys between communicating parties. The sender uses a reversible key inversion function to generate key recovery values P, Q and (optionally) R as a function of a session key and public i










 
 
  Recently Added Patents
Rotor hub and controls for multi-bladed rotor system
Machining apparatus and method of making endodontic instruments
Memory bus write prioritization
Micro-plasma field effect transistors
Method and apparatus for overwriting an encryption key of a media drive
System and method for finding potential trading partners in both two-party and multi-party scenarios
Data acquisition system
  Randomly Featured Patents
Network device bezel
String packaging apparatus and method
Method and system for preventing leaving a child in an unattended vehicle
Stethoscope chestpiece
High-risk human papillomavirus detection
Smooth muscle mitogen
Method and apparatus for fast processing of selected packetized data requests
Crosslinked polymer, electrolyte using the polymer, and nonaqueous secondary battery using the electrolyte
Planar microwave receive and/or transmit array antenna and application thereof to reception from geostationary television satellites
Portable vibrating concrete screed