1
Eric E Schmidt, Butler W Lampson: Software version management system. Xerox Corporation, W Douglas Carothers Jr, December 10, 1985: US04558413 (935 worldwide citation)

A software version management system, also called system modeller, provides for automatically collecting and recompiling updated versions of component software objects comprising a software program for operation on a plurality of personal computers coupled together in a distributed software environm ...


2
Paul England, John D DeTreville, Butler W Lampson: Digital rights management operating system. Microsoft Corporation, Lee & Hayes PLLC, December 11, 2001: US06330670 (502 worldwide citation)

A digital rights management operating system protects rights-managed data, such as downloaded content, from access by untrusted programs while the data is loaded into memory or on a page file as a result of the execution of a trusted application that accesses the memory. To protect the rights-manage ...


3
Paul England, John D DeTreville, Butler W Lampson: Loading and identifying a digital rights management operating system. Microsoft Corporation, Lee & Hayes PLLC, December 4, 2001: US06327652 (452 worldwide citation)

The identity of an operating system running on a computer is determined from an identity associated with an initial component for the operating system, combined with identities of additional components that are loaded afterwards. Loading of a digital rights management operating system on a subscribe ...


4
Robert M Metcalfe, David R Boggs, Charles P Thacker, Butler W Lampson: Multipoint data communication system with collision detection. Xerox Corporation, J E Beck, T J Anderson, B P Smith, December 13, 1977: US04063220 (336 worldwide citation)

Apparatus for enabling communications between two or more data processing stations comprising a communication cable arranged in branched segments including taps distributed thereover. Tied to each tap is a transceiver which on the other side connects to an associated interface stage. Each transceive ...


5
Steven P Miller, Butler W Lampson: Distributed configuration profile for computing system. Digital Equipment Corporation, Ronald C Hudgens, Arthur W Fisher, December 12, 1995: US05475819 (301 worldwide citation)

A distributed computing system using a data communications network may have a number of service providers for a given service or remote procedure call. A client on the network makes reference to a name service to obtain the network address of one of these service providers. The name service maintain ...


6
Morrie Gasser, Andrew C Goldstein, Charles W Kaufman, Butler W Lampson: Method for delegating authorization from one entity to another through the use of session encryption keys. Digital Equipment Corporation, Arnold White & Durkee, June 29, 1993: US05224163 (289 worldwide citation)

A method for delegating authorization from one entity in a distributed computing system to another for a computing session is disclosed wherein a session public/private encryption key pair is utilized for each computing session. The private encryption key is erased to terminate the computing session ...


7
Paul England, Butler W Lampson: Secure execution of program code. Microsoft Corporation, Lee & Hayes PLLC, November 18, 2003: US06651171 (182 worldwide citation)

Curtained operation provides trusted execution of code and secrecy of data in a secure memory. Curtained code can only be executed from within certain address ranges of a curtained memory region secure against access by code from without the region. Code entry points are restricted, and atomic execu ...


8
Martin Abadi, Andrew C Goldstein, Butler W Lampson: Compound principals in access control lists. Digital Equipment Corporation, Arnold White & Durkee, May 24, 1994: US05315657 (174 worldwide citation)

An access control list for determining the access rights of principals in a distributed system to a system resource is disclosed wherein the access rights of a specified principal are based on the access rights delegated to that principal.


9
Charles W Kaufman, Morrie Gasser, Butler W Lampson, Joseph J Tardo, Kannan Alagappan: Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system. Digital Equipment Corporation, Cesari and McKenna, May 23, 1995: US05418854 (135 worldwide citation)

Apparatus for protecting the confidentiality of a user's password during a remote login authentication exchange between a user node and a directory service node of a distributed, public key cryptography system includes a specialized server application functioning as an intermediary agent for the log ...


10
Paul England, Butler W Lampson: Hierarchical trusted code for content protection in computers. Microsoft Corporation, Lee & Hayes PLLC, August 10, 2004: US06775779 (134 worldwide citation)

An architecture for protecting premium content in a nonsecure computer environment executes only a small number of code modules in a secure memory. The modules are arranged in a hierarchy of trust, where a module names other modules that it is willing to trust, and those modules in turn name other m ...