1
Michael Brownlie, Stephen Hillier, Paul C Van Oorschot: Computer network security system and method having unilateral enforceable security policy provision. Entrust Technologies, Markison & Reckamp P C, March 13, 2001: US06202157 (197 worldwide citation)

A computer network security system and method utilizes digitally signed and centrally assigned policy data, such as password length rules, that is unilaterally enforced at network nodes by node policy enforcement engines. The policy data may be variable on a per client or network node basis through ...


2
Paul C Van Oorschot, Michael J Wiener, Ian Curry: Method and apparatus for use in determining validity of a certificate in a communication system employing trusted paths. Entrust Technologies, Markison & Reckamp P C, October 17, 2000: US06134550 (149 worldwide citation)

A method and apparatus constructs a preferred certificate chain, such as a list of all certificate authorities in a shortest trusted path, based on generated certificate chain data, such as a table of trust relationships among certificate issuing units in a community of interest, to facilitate rapid ...


3
Allen J C Porter: Method and apparatus for displaying multiple graphics images in a mixed video graphics display. ATI International, Markison & Reckamp P C, March 27, 2001: US06208354 (107 worldwide citation)

A method and apparatus for storing and displaying multiple graphical images in a mixed video and graphics display is accomplished by determining an amount of memory sufficient to display a single graphics image in a subset of the display. Once the amount of memory required for a single image is dete ...


4
Jason CK Chan, Milivoje Aleksic, Antonio Asaro, James Doyle, Indra Laksono: Method and apparatus for co-processing video graphics data. ATI Technologies, Markison & Reckamp P C, February 6, 2001: US06184908 (102 worldwide citation)

To minimize CPU processing requirements for preparing and transferring data to a graphics processor, a graphics command processor is provided that supports application-level commands and references to the data associated with these commands. The graphics command processor parses the application comm ...


5
Ian Curry, Paul C Van Oorschot: Computer security system and method with on demand publishing of certificate revocation lists. Entrust Technologies, Markison & Reckamp P C, October 3, 2000: US06128740 (101 worldwide citation)

A computer network security system provides generation of a certificate revocation list (CRL) upon each revocation. The entire certificate revocation list may be published on demand, or only the portion that has changed. The computer network security system provides on-demand publishing of data iden ...


6
Josanne Otway: Information security subscriber trust authority transfer system with private key history transfer. Entrust Technologies, Markison & Reckamp P C, February 20, 2001: US06192130 (98 worldwide citation)

A first trusted authority, such as an originating certification authority, that stores key history data, such as private decryption keys for one or more subscribers, includes a key history exportation engine operative to generate a security key history exportation packet. The security key history ex ...


7
Timothy Moses, Ronald Vandergeest: Certificate management system and method for a communication security system. Entrust Technologies, Markison & Reckamp P C, August 22, 2000: US06108788 (97 worldwide citation)

A certificate management system and method allows a requester, such as a subscriber using a software application, to customize certificates by selecting variable certificate content specification data. A certificate issuing unit, such as a certification authority issues a variable content based cert ...


8
Paul C Van Oorschot: Method and apparatus for creating communities of trust in a secure communication system. Entrust Technologies, Markison & Reckamp P C, October 17, 2000: US06134327 (86 worldwide citation)

A method and apparatus for creating communities of trust within a secure communications system is accomplished by allowing end-users to obtain arbitrary lists of trusted public keys from other end-users and from associated authorities. Once an arbitrary list has been obtained by an end-user, the end ...


9
John S Kitamura: Method and system for channel balancing and room tuning for a multichannel audio surround sound speaker system. ATI Technologies, Markison & Reckamp P C, February 27, 2001: US06195435 (85 worldwide citation)

A system and method for providing channel balancing and room tuning for a multi-channel audio surround sound speaker system passes source audio to automatically configured multi-channel compensation filters to provide equalization on a per channel basis for speakers having differing response charact ...


10
Philip L Swan: System and method for reconstructing noninterlaced captured content for display on a progressive screen. ATI Technologies, Markison & Reckamp P C, April 25, 2000: US06055018 (85 worldwide citation)

An image reconstruction system adaptively de-interlaces video stream content using image data comparison techniques when the interlaced input video stream does not contain pre-coded non-interlaced to interlaced conversion status data. In one embodiment, the system uses a signature generator which ge ...