1
Fischer Addison M: Method and apparatus for creating, supporting, and using travelling programs.. Fischer Addison M, October 13, 1993: EP0565314-A2 (120 worldwide citation)

A method and apparatus for creating, supporting and using a travelling program is disclosed. A "travelling program" is a digital data structure which includes a sequence of instructions and associated data and which has the capability of determining at least one next destination or recipient for rec ...


2
Fischer Addison M: Computer system security method and apparatus having program authorization information data structures.. Fischer Addison M, November 18, 1993: EP0570123-A1 (56 worldwide citation)

Method and apparatus are disclosed including a system monitor which limits the ability of a program about to be executed to the use of predefined resources (e.g., data files, disk writing capabilities, etc.). The system monitor processes a data structure including a set of authorities defining that ...


3
Fischer Addison M: Public/key date-time notary facility.. Fischer Addison M, April 17, 1991: EP0422757-A2 (30 worldwide citation)

A time notarization apparatus and method is disclosed which uses a secure, microprocessor based hardware platform which performs public kay cryptographic operations to obtain trusted time stamping with a minimum of intervention by third parties. The hardware platform is encapsulated in a secure fash ...


4
Fischer Addison M: Public key/signature cryptosystem with enhanced digital signature certification.. Fischer Addison M, August 16, 1989: EP0328232-A2 (28 worldwide citation)

A public key cryptographic system is disclosed with enhanced digital signature certification which authenticates the identity of the public key holder. A hierarchy of nested certifications and signatures are employed which indicate the authority and responsibility levels of the individual whose sign ...


5
Fischer Addison M: Improved public key/signature cryptosystem with enhanced digital signature certification.. Fischer Addison M, September 12, 1990: EP0386867-A2 (22 worldwide citation)

A public key cryptographic system is disclosed with enhanced digital signature certification which authenticates the identity of the public key holder. A hierarchy of nested certifications and signatures are employed which indicate the authority and responsibility levels of the individual whose sign ...


6
Fischer Addison M: Personal date/time notary device.. Fischer Addison M, November 9, 1994: EP0624014-A2 (15 worldwide citation)

A personal date/time notary device is embodied in a token device such as a "smart card" (1). The portable notary device includes an input/output (I/O) port (2), which is coupled to a single integrated circuit chip (3). The I/O port may be coupled to a conventional smart card reading device which in ...


7
Fischer Addison M: Method for the efficient updating of the hash value of a data file.. Fischer Addison M, May 24, 1995: EP0654920-A2 (13 worldwide citation)

The disclosed methodology permits an insecure computing system to safely perform high security electronic financial transactions. The present invention permits the hash of a file to be taken on an incremental basis. It permits any part of the file to be changed while allowing a new aggregate hash to ...


8
Fischer Addison M: Improved public key/signature cryptosystem with enhanced digital signature certification field.. Fischer Addison M, March 9, 1994: EP0586022-A1 (12 worldwide citation)

A public key cryptographic system is disclosed with enhanced digital signature certification which authenticates the identity of the public key holder. A hierarchy of nested certifications and signatures are employed which indicate the authority and responsibility levels of the individual whose sign ...


9
Fischer Addison M: Personal date/time notary device. Fischer Addison M, May 2, 1997: EP0770953-A2 (10 worldwide citation)

A personal date/time notary device is embodied in a token device such as a "smart card" (1). The portable notary device includes an input/output (I/O) port (2), which is coupled to a single integrated circuit chip (3). The I/O port may be coupled to a conventional smart card reading device which in ...


10
Fischer Addison M: Method for preventing inadvertent betrayal of stored digital secrets by a trustee.. Fischer Addison M, April 12, 1995: EP0647895-A1 (6 worldwide citation)

The invention employs a voluntary identification/definition phase performed, for example, shortly after a computer is purchased, and a secret information retrieval phase. In the definition phase, the true owner/customer defines an escrow record which provides self-identification data together with e ...