1
William E Boebert, Thomas R Markham, Robert A Olmsted: Data enclave and trusted path system. Secure Computing Corporation, Merchant Gould Smith Edell Welter and Schmidt, January 4, 1994: US05276735 (385 worldwide citation)

A data communication system providing for the secure transfer and sharing of data via a local area network and/or a wide area network. The system includes a secure processing unit which communicates with a personal keying device and a crypto media controller attached to a user's Workstation. The com ...


2
William E Boebert, Thomas R Markham, Robert A Olmsted: Data enclave and trusted path system. Secure Computing Corporation, Schwegman Lundberg & Woessner, March 26, 1996: US05502766 (265 worldwide citation)

A data communication system providing for the secure transfer and sharing of data via a local area network and/or a wide area network. The system includes a secure processing unit which communicates with a personal keying device and a crypto media controller attached to a user's Workstation. The com ...


3
William E Boebert, Mark H Hanson, Thomas R Markham: Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local workstation user I/O devices without utilizing workstation processor. Secure Computing Corporation, Schwegman Lundberg Woessner & Kluth P A, January 21, 1997: US05596718 (126 worldwide citation)

A method and apparatus for ensuring secure communication over an unsecured communications medium between a user working on an unsecured workstation or computer and a host computer. A secure user interface is created by inserting a trusted path subsystem between input/output devices to the workstatio ...


4
Alan Dowd, Thomas R Markham, Tomo Foote Lennox, David Apostal, Raymond Lu: Network security modeling system and method. Secure Computing Corporation, Schwegman Lundberg & Woessner P A, January 1, 2008: US07315801 (107 worldwide citation)

A network security modeling system which simulates a network and analyzes security vulnerabilities of the network. The system includes a simulator which includes a network vulnerabilities database and a network configuration module having network configuration data. The simulator determines vulnerab ...


5
William E Boebert, Mark H Hanson, Thomas R Markham: Trusted path subsystem for workstations. Secure Computing Corporation, Schwegman Lundberg Woessner and Kluth P A, October 13, 1998: US05822435 (72 worldwide citation)

A method and apparatus for ensuring secure communication over an unsecured communications medium between a user working on an unsecured workstation or computer and a host computer. A secure user interface is created by inserting a trusted path subsystem between input/output devices to the workstatio ...


6
Thomas R Markham: Scalable key agile cryptography. Secure Computing Corporation, Schwegman Lundberg Woessner & Kluth P A, August 18, 1998: US05796836 (66 worldwide citation)

A system and method for encrypting blocks of plain text. Output FIFO memories are provided for decoupling pseudorandom vector generation from plain text encryption. The output FIFOs produce the effect of multiplexing several cryptographic devices together and can be combined with feedback FIFO memor ...


7
Thomas R Markham: Distributed firewall system and method. Secure Computing Corporation, Schwegman Lundberg & Woessner P A, May 19, 2009: US07536715 (52 worldwide citation)

A system and method for restricting packet transfer to a computer across a network, wherein the computer includes a network interface device coupled to the network and wherein the network interface device includes a packet filter. A security server is connected to the network. A packet is received a ...


8
Robert Otto Hanzlik, Geoffrey A Lowe, Thomas R Markham, Lynn Marquette Meredith: System and method for secure group communications. Secure Computing Corporation, Schwegman Lundberg & Woessner P A, September 22, 2009: US07594262 (40 worldwide citation)

A system and method for secure group communications is provided. One embodiment provides a method for implementing a virtual private group network. The method includes creating a virtual private group definition on a policy server, establishing a plurality of secure connections between the policy se ...


9
Thomas R Markham, Jessica J Bogle, Charles N Payne Jr: Associative policy model. Secure Computing Corporation, Schwegman Lundberg & Woessner P A, December 11, 2007: US07308706 (31 worldwide citation)

Systems and methods for an associative policy model are provided. One embodiment of the present invention provides a method for implementing an associative policy. In this embodiment, the method includes providing a policy on a policy server, the policy having a service definition that contains firs ...


10
Edward L Cochran, Jeffrey M Rye, Bruce W Anderson, Thomas R Markham: Real-time screening interface for a vehicle screening system. Honeywell International, Luis M Ortiz, Kermit D Lopez, Melissa L Asfahani, January 3, 2012: US08089340 (20 worldwide citation)

A vehicle screening system for screening vehicles and occupants for entrance to a secured facility is disclosed. The system can include a processor and an interface that communicates with the processor, wherein the interface displays identification information extracted from a vehicle occupant assoc ...



Click the thumbnails below to visualize the patent trend.