1
Gregory F Grohoski, Oscar R Mitchell, Tung M Nguyen, Yongjae Rim: Crossbar switch apparatus and protocol. International Business Machines Corporation, Anthony V S England, Keith L Hargrove, Andrew J Dillon, September 10, 1996: US05555543 (50 worldwide citation)

A computer networking system includes a cross bar switch and a protocol for operating the same. The crossbar switch typically connects a plurality of ports one to another and the protocol establishes a connection between a first desired port and a second desired port selected from the plurality of p ...


2
William R Hardell Jr, James D Henson Jr, Oscar R Mitchell: Apparatus and method for booting a multiple processor system having a global/local memory architecture. International Business Machines Corporation, Casimer K Salys, September 5, 1995: US05448716 (32 worldwide citation)

An architecture and method for booting a multi-processor system having processor local memory and shared global memory, with shared global memory access managed by an atomic memory access controller and cache coherence managed by software. Reset circuits are used to synchronize to a master clock a c ...


3
William R Hardell Jr, James D Henson Jr, Oscar R Mitchell: Apparatus and method for steering spare bit in a multiple processor system having a global/local memory architecture. International Business Machines Corporation, Casimer K Salys, July 5, 1994: US05327548 (11 worldwide citation)

A system and method for managing spare bit steering information in a multi-processor system having a global/local memory architecture. During the system boot cycle one of the multiple processors is selected to test global memory and to configure the steering of the spare bits by bank or the like. Ea ...


4
Rick Hall, Oscar R Mitchell: Encrypted packet inspection. nCipher Corporation, John A Fortkort, Fortkort & Houston P C, March 1, 2011: US07900042 (9 worldwide citation)

A method, system, and device for encrypted packet inspection allowing an authorized third party device to monitor cryptographic handshaking information (full- duplex) between two other devices and together with the secret private key then transparently decrypt the bulk encrypted data stream. The sco ...


5
Oscar R Mitchell, Robert Bradford Cohen, Eleanor Coy, Rajat Datta, Randall Findley, James Garrett, Richard Goble, Greg North, Daniel Reents, Leslie Zsohar: Application-specific information-processing method, system, and apparatus. nCipher Corporation, John A Fortkort, Fortkort & Houston P C, March 22, 2011: US07913261 (8 worldwide citation)

An information-processing method for application-specific processing of messages. A message is received. Whether the message is in a selected application format is ascertained. If not, the message is routed to a next location. If so, the message is routed to a selected application processor, process ...


6
George Robert Blakley, Rajat Datta, Oscar R Mitchell, Kyle Stein: Cisponentiation method, software, and device for exponentiation. Thompson & Knight, Patent Prosecution Department, April 17, 2003: US20030072442-A1

A method, software, and device for encrypting data, exchanging keys, and processing data that includes exponentiating by iteratively cisponentiating according to cisponentiator C(G, E, B, R, m)=GEBR mod m, wherein G is a fleeting multiplicand base, E is an enduring cisponent, B is a recurring multip ...


7
Rick Hall, Oscar R Mitchell: Encrypted packet inspection. Thompson & Knight, Patent Prosecution Department, January 23, 2003: US20030018891-A1

A method, system, and device for encrypted packet inspection allowing an authorized third party device to monitor cryptographic handshaking information (full-duplex) between two other devices and together with the secret private key then transparently decrypt the bulk encrypted data stream. The scop ...


8
Oscar R Mitchell, Robert Bradford Cohen, Eleanor Coy, Rajat Datta, Randall Findley, James Garrett, Richard Goble, Greg North, Daniel Reents, Leslie Zsohar: Application-specific information-processing method, system, and apparatus. Thompson & Knight, Patent Prosecution Department, December 19, 2002: US20020191604-A1

An information-processing method for application-specific processing of messages. A message is received. Whether the message is in a selected application format is ascertained. If not, the message is routed to a next location. If so, the message is routed to a selected application processor, process ...