1
William E Boebert, Thomas R Markham, Robert A Olmsted: Data enclave and trusted path system. Secure Computing Corporation, Merchant Gould Smith Edell Welter and Schmidt, January 4, 1994: US05276735 (394 worldwide citation)

A data communication system providing for the secure transfer and sharing of data via a local area network and/or a wide area network. The system includes a secure processing unit which communicates with a personal keying device and a crypto media controller attached to a user's Workstation. The com ...


2
William E Boebert, Thomas R Markham, Robert A Olmsted: Data enclave and trusted path system. Secure Computing Corporation, Schwegman Lundberg & Woessner, March 26, 1996: US05502766 (271 worldwide citation)

A data communication system providing for the secure transfer and sharing of data via a local area network and/or a wide area network. The system includes a secure processing unit which communicates with a personal keying device and a crypto media controller attached to a user's Workstation. The com ...


3
William E Boebert, Mark H Hanson, Thomas R Markham: Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local workstation user I/O devices without utilizing workstation processor. Secure Computing Corporation, Schwegman Lundberg Woessner & Kluth P A, January 21, 1997: US05596718 (128 worldwide citation)

A method and apparatus for ensuring secure communication over an unsecured communications medium between a user working on an unsecured workstation or computer and a host computer. A secure user interface is created by inserting a trusted path subsystem between input/output devices to the workstatio ...


4
Alan Dowd, Thomas R Markham, Tomo Foote Lennox, David Apostal, Raymond Lu: Network security modeling system and method. Secure Computing Corporation, Schwegman Lundberg & Woessner P A, January 1, 2008: US07315801 (111 worldwide citation)

A network security modeling system which simulates a network and analyzes security vulnerabilities of the network. The system includes a simulator which includes a network vulnerabilities database and a network configuration module having network configuration data. The simulator determines vulnerab ...


5
William E Boebert, Mark H Hanson, Thomas R Markham: Trusted path subsystem for workstations. Secure Computing Corporation, Schwegman Lundberg Woessner and Kluth P A, October 13, 1998: US05822435 (74 worldwide citation)

A method and apparatus for ensuring secure communication over an unsecured communications medium between a user working on an unsecured workstation or computer and a host computer. A secure user interface is created by inserting a trusted path subsystem between input/output devices to the workstatio ...


6
Thomas R Markham: Scalable key agile cryptography. Secure Computing Corporation, Schwegman Lundberg Woessner & Kluth P A, August 18, 1998: US05796836 (68 worldwide citation)

A system and method for encrypting blocks of plain text. Output FIFO memories are provided for decoupling pseudorandom vector generation from plain text encryption. The output FIFOs produce the effect of multiplexing several cryptographic devices together and can be combined with feedback FIFO memor ...


7
Thomas R Markham: Distributed firewall system and method. Secure Computing Corporation, Schwegman Lundberg & Woessner P A, May 19, 2009: US07536715 (54 worldwide citation)

A system and method for restricting packet transfer to a computer across a network, wherein the computer includes a network interface device coupled to the network and wherein the network interface device includes a packet filter. A security server is connected to the network. A packet is received a ...


8
Robert Otto Hanzlik, Geoffrey A Lowe, Thomas R Markham, Lynn Marquette Meredith: System and method for secure group communications. Secure Computing Corporation, Schwegman Lundberg & Woessner P A, September 22, 2009: US07594262 (42 worldwide citation)

A system and method for secure group communications is provided. One embodiment provides a method for implementing a virtual private group network. The method includes creating a virtual private group definition on a policy server, establishing a plurality of secure connections between the policy se ...


9
Thomas R Markham, Jessica J Bogle, Charles N Payne Jr: Associative policy model. Secure Computing Corporation, Schwegman Lundberg & Woessner P A, December 11, 2007: US07308706 (33 worldwide citation)

Systems and methods for an associative policy model are provided. One embodiment of the present invention provides a method for implementing an associative policy. In this embodiment, the method includes providing a policy on a policy server, the policy having a service definition that contains firs ...


10
Thomas R Markham, Walter Heimerdinger: Physical security management system. Honeywell International, Seager Tufte & Wickhem, September 18, 2012: US08272053 (23 worldwide citation)

A physical security system having a plurality of sensors and a sensor report aggregator. The sensors may detect a large number of physical activities. The aggregator may cluster a large number of detected reports to a small number of sets of reports. The sets of reports may be reduced to hypotheses. ...