1
Mark Stephen Anderson, Dean Crawford Engelhardt, Damian Andrew Marriott, Suneel Singh Randhawa: Data view of a modelling system. The Commonwealth of Australia, Beyer Weaver & Thomas, April 11, 2006: US07027055 (193 worldwide citation)

An observation sub-system is described wherein in three-dimensional (3D) views of objects and their interactions over time are provided. Each different view is based on a fundamental visualization paradigm. Heavily interacting objects can be depicted as being located “close together”. Rules are crea ...


2
Mark Stephen Anderson, Dean Crawford Engelhardt, Damian Andrew Marriott, Suneel Singh Randhawa: Data processing and observation system. The Commonwealth of Australia, Beyer Weaver & Thomas, August 1, 2006: US07085683 (74 worldwide citation)

An observation paradigm that works with a collection of the abovementioned elements, to provide a way of observing information infrastructures and data movement in a chosen time frame. The user (human observer) is provided sophisticated controls and interaction mechanisms that will make it easier fo ...


3
Mark Stephen Anderson: Secure computer architecture. The Commonwealth of Australia, Baker & Maxham, September 5, 2000: US06115819 (65 worldwide citation)

A secure computer architecture having a central processing unit, zero or more memories, at least one input, at least one output and a bus to communicate signals between the components which are all untrusted elements. The computer architecture also includes a trusted access monitor device, a trusted ...


4
Mark Stephen Anderson, John Edmund Griffin, Christopher James Guildford North, John Desborough Yesberg, Kenneth Kwok Hei Yiu, Robert Brunyee Milner: Method and means for interconnecting different security level networks. The Commonwealth of Australia, Baker & Maxham, August 22, 2000: US06108787 (55 worldwide citation)

An information flow control means for location between a first and second computer network where the first network has a higher security classification than the second network. The information flow control means comprises an information switch having an information input, a first output connected to ...


5
Mark Stephen Anderson, John Desborough Yesberg, Michael Pope, Lisa Nayda, Ken Hayman, Brendan Beahan: Method for providing message document security by deleting predetermined header portions and attaching predetermined header portions when seal is validly associated with message or document. The Commonwealth of Australia of Anzak Park, Baker & Maxham, November 3, 1998: US05832227 (51 worldwide citation)

The disclosure of the current invention describes a method of handling a message or a document to be released external of a secure computer environment. The message or the document is first directed to a trusted sealing device which displays the message or the document to a human user for visual che ...


6
Mark Stephen Anderson, Dean Crawford Engelhardt, Damian Andrew Marriott, Suneel Singh Randhawa: Geographic view of a modelling system. The Commonweath of Australia, Beyer Weaver, July 31, 2007: US07250944 (41 worldwide citation)

Geo View is a three-dimensional virtual universe in which a real-world or virtual object may be represented by one or more virtual objects whose attributes are derived from attributes of the real-world object via a flexible user-specifiable mapping. Typically a two-dimensional plane located in three ...


7
Mark Stephen Anderson, John Desborough Yesberg, Michael Pope, Lisa Nayda, Ken Hayman, Brendan Beahan: Complex document security. The Commonwealth of Australia of Anzac Park, Baker Maxham Jester & Meador, December 23, 1997: US05701342 (39 worldwide citation)

A method and means to control the degree to which the presence of covert information may be reduced, eliminated or corrupted in documents created on a computer device (particularly complex documents) before the document is transmitted outside a secure environment in which the document is created. Th ...


8
Mark Stephen Anderson, John Desborough Yesberg, Damian Marriott, Lisa Nayda, Ken Hayman, Malcolm Stevens, Brendan Beahan: Communications security and trusted path method and means. The Commonwealth of Australia, Oblon Spivak McClelland Maier & Neustadt P C, December 28, 2004: US06836548 (14 worldwide citation)

A trusted path device is described which may be used stand alone or may be retrofitted to a users untrusted computer console or workstation so that an untrusted data input may be displayed on an untrusted display and verified by the user, following which the trusted data can be output to an untruste ...


9
Mark Stephen Anderson, Dean Crawford Engelhardt, Damian Andrew Marriott, Suneel Singh Randhawa: Event handling system. The Commonwealth of Australia, Beyer Law Group, February 21, 2012: US08121973 (11 worldwide citation)

An event handling system to schedule and translate semantic deductions form Intelligent Agents and sensors into events capable of being made observable by a Recipient system such as monitor that provides a particular view of virtual objects and events is disclosed. The event handling system also enc ...


10
Mark Stephen Anderson, Dean Crawford Engelhardt, Damian Andrew Marriott, Suneel Singh Randhawa: Data processing architecture. Morrison & Foerster, March 25, 2004: US20040059436-A1 (1 worldwide citation)

Data processing architecture comprises one or more data processing components associated with a logical level such that a data processing component associated with a logical level only accepts input from one or more data processing components in a logically higher or lower logical level or an extern ...