1
Addison M Fischer: Public key/signature cryptosystem with enhanced digital signature certification. Nixon & Vanderhye, September 19, 1989: US04868877 (415 worldwide citation)

A public key cryptographic system is disclosed with enhanced digital signature certification which authenticates the identity of the public key holder. A hierarchy of nested certifications and signatures are employed which indicate the authority and responsibility levels of the individual whose sign ...


2
Addison M Fischer: Public key/signature cryptosystem with enhanced digital signature certification. Nixon & Vanderhye, April 2, 1991: US05005200 (342 worldwide citation)

A public key cryptographic system is disclosed with enhanced digital signature certification which authenticates the identity of the public key holder. A hierarchy of nested certifications and signatures are employed which indicate the authority and responsibility levels of the individual whose sign ...


3
Addison M Fischer: Computer system security method and apparatus having program authorization information data structures. Nixon & Vanderhye, May 2, 1995: US05412717 (302 worldwide citation)

Method and apparatus are disclosed including a system monitor which limits the ability of a program about to be executed to the use of predefined resources (e.g., data files, disk writing capabilities, etc.). The system monitor processes a data structure including a set of authorities defining that ...


4
Addison M Fischer: Public key/signature cryptosystem with enhanced digital signature certification. Nixon & Vanderhye, May 25, 1993: US05214702 (301 worldwide citation)

A public key cryptographic system is disclosed with enhanced digital signature certification which authenticates the identity of the public key holder. A hierarchy of nested certifications and signatures are employed which indicate the authority and responsibility levels of the individual whose sign ...


5
Addison M Fischer: Computer system security method and apparatus for creating and using program authorization information data structures. Nixon & Vanderhye, May 10, 1994: US05311591 (300 worldwide citation)

Method and apparatus are disclosed including a system monitor which limits the ability of a program about to be executed to the use of predefined resources (e.g., data files, disk writing capabilities, etc.). The system monitor processes a data structure including a set of authorities defining that ...


6
Addison M Fischer: Public/key date-time notary facility. Nixon & Vanderhye, August 4, 1992: US05136643 (207 worldwide citation)

A time notarization apparatus and method is disclosed which uses a secure, microprocessor based hardware platform which performs public key crytographic operations to obtain trusted time stamping with a minimum of intervention by third parties. The hardware platform is encapsulated in a secure fashi ...


7
Addison M Fischer: Public/key date-time notary facility. Nixon & Vanderhye, March 19, 1991: US05001752 (202 worldwide citation)

A time notarization apparatus and method is disclosed which uses a secure, microprocessor based hardware platform which performs public key cryptographic operations to obtain trusted time stamping with a minimum of intervention by third parties. The hardware platform is encapsulated in a secure fash ...


8
Addison M Fischer: Method and apparatus for creating, supporting, and using travelling programs. Nixon & Vanderhye, February 14, 1995: US05390247 (161 worldwide citation)

A method and apparatus for creating, supporting and using a "travelling program" is disclosed. A "travelling program" is a digital data structure which includes a sequence of instructions and associated data and which has the capability of determining at least one next destination or recipient for r ...


9
Addison M Fischer: Method and apparatus for creating, supporting, and using travelling programs. Nixon and Vanderhye, August 9, 1994: US05337360 (156 worldwide citation)

A method and apparatus for creating, supporting and using a "travelling program" is disclosed. A "travelling program" is a digital data structure which includes a sequence of instructions and associated data and which has the capability of determining at least one next destination or recipient for r ...


10
Addison M Fischer: Personal date/time notary device. Nixon & Vanderhye, June 6, 1995: US05422953 (149 worldwide citation)

A personal data/time notary device is embodied in a token device such as a "smart card". The portable notary device includes an input/output (I/O) port, which is coupled to a single integrated circuit chip. The I/O port may be coupled to a conventional smart card reading device which in turn is coup ...