$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Crypto microprocessor for executing enciphered programs 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0044952 (1979-06-04)
발명자 / 주소
  • Best Robert M. (16016 9th Ave. NE. Seattle WA 98155)
인용정보 피인용 횟수 : 470  인용 특허 : 6

초록

A microprocessor for executing computer programs which are stored in cipher to prevent software piracy. Such a crypto-microprocessor deciphers the enciphered program piecemeal as it executes it, so that a large enciphered program can be securely executed without disclosing the deciphered program or

대표청구항

A cryptographic microprocessor apparatus constructed as an integrated circuit chip for executing a computer program of information stored in enciphered form in a storage means as a plurality of portions of enciphered program instructions, the apparatus comprising: means included in said chip for sto

이 특허에 인용된 특허 (6)

  1. Ehrsam William Friedrich (Hurley NY) Meyer Carl H. W. (Kingston NY) Powers Robert Lowell (West Hurley NY) Prentice Paul Norman (Hyde Park NY) Smith John Lynn (Woodstock NY) Tuchman Walter Leonard (Wo, Block cipher system for data security.
  2. Johnstone ; Richard, Computer software security system.
  3. France Rode (880 La Cuesta Los Altos CA 94022), Electronic security apparatus.
  4. Birney Richard Eugene (Boca Raton FL) Davis Michael Ian (Boca Raton FL) Hood Robert Allen (Boca Raton FL) Graybiel Lynn Allan (Boca Raton FL) Kahn Samuel (Mountain View CA) Osborne William Steese (Bo, Key controlled address relocation translation system.
  5. Ehrsam ; William F. ; Meyer ; Carl H. W. ; Smith ; John L. ; Tuchman ; W alter L., Message verification and transmission error detection by block chaining.
  6. Richard Harold S. (Dayton OH) Grillmeier Eugene L. (Centerville OH) Gross Jack R. (Waynesville OH) Myers Robert P. (Kettering OH), Programmable cryptic device for enciphering and deciphering data.

이 특허를 인용한 특허 (470)

  1. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  2. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  3. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  4. Thompson John R. (La Quinta CA) Hunting Curtis J. (Altadena CA) Masson Ronald K. (Topanga CA) Trivelpiece Craig E. (Irvine CA), Addressable subscription television system having multiple scrambling modes.
  5. Haydock, Stephen Nick, Addressing peripherals in an IC.
  6. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  7. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  8. Brickell, Ernest F., Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information.
  9. Henry, G. Glenn; Crispin, Thomas A.; Elliott, Timothy A.; Parks, Terry, Apparatus and method for generating a cryptographic key schedule in a microprocessor.
  10. Crispin, Thomas A.; Henry, G. Glenn; Martin de Nicolas, Arturo; Parks, Terry, Apparatus and method for performing transparent block cipher cryptographic functions.
  11. Henry, G. Glenn; Crispin, Thomas A.; Parks, Terry, Apparatus and method for performing transparent cipher block chaining mode cryptographic functions.
  12. Henry, G. Glenn; Crispin, Thomas A.; Parks, Terry, Apparatus and method for performing transparent cipher feedback mode cryptographic functions.
  13. Henry, G. Glenn; Crispin, Thomas A.; Parks, Terry, Apparatus and method for performing transparent output feedback mode cryptographic functions.
  14. Henry, G. Glenn; Crispin, Thomas A.; Parks, Terry, Apparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine.
  15. Brickell,Ernest F., Apparatus and method for proving the denial of a direct proof signature.
  16. Kozuch,Michael A.; Sutton, II,James A.; Grawrock,David; Neiger,Gilbert; Uhlig,Richard A.; Burgess,Bradley G.; Poisner,David I.; Hall,Clifford D.; Glew,Andy; Smith, III,Lawrence O.; George,Robert, Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment.
  17. Makoto Saito JP, Apparatus for data copyright management system.
  18. Saito, Makoto, Apparatus for data copyright management system.
  19. Oshima,Mitsuaki; Gotoh,Yoshiho; Tanaka,Shinichi; Koishi,Kenji; Moriya,Mitsurou; Takemura,Yoshinari, Apparatus for encrypting and recording received content information on a recording medium using both medium identification information and a cipher key for encryption.
  20. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Attestation key memory device and bus.
  21. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Attestation key memory device and bus.
  22. Grawrock,David W., Attestation using both fixed token and portable token.
  23. Glew,Andrew F.; Sutton,James A.; Smith,Lawrence O.; Grawrock,David W.; Neiger,Gilbert; Kozuch,Michael A., Authenticated code module.
  24. Wiedemer John D. (930 W. Forest Dr. Houston TX 77079), Billing system for computer software.
  25. Rackman Michael I. (1710 Glenwood Rd. Brooklyn NY 11230), Cartridge-controlled system whose use is limited to authorized cartridges.
  26. Hars, Laszlo; Matthews, Jr., Donald P., Cascaded data encryption dependent on attributes of physical memory.
  27. Maliszewski Richard L., Cell array providing non-persistent secret storage through a mutation cycle.
  28. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  29. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  30. Daemen, Joan; Van Assche, Gilles; Bertoni, Guido Marco, Ciphering by blocks of the content of a memory external to a processor.
  31. Crawford Christopher M., Commercial online software distribution systems and methods using encryption for security.
  32. Goetz Rudy ; Afghani Bahram ; Anderson Allan D. ; Godding Patrick N. ; Punt Maarten G., Compact transparent dongle device.
  33. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  34. Ellis, Frampton E., Computer and microprocessor control units that are inaccessible from the internet.
  35. Cruts Melvin L. (Milpitas CA) Westfield Michael J. (Milpitas CA), Computer data encryption system.
  36. Ellis, Frampton E., Computer or microchip controlled by a firewall-protected master controlling microprocessor and firmware.
  37. Ellis, Frampton E., Computer or microchip including a network portion with RAM memory erasable by a firewall-protected master controller.
  38. Ellis, Frampton E., Computer or microchip with a secure control bus connecting a central controller to volatile RAM and the volatile RAM to a network-connected microprocessor.
  39. Ellis, Frampton E., Computer or microchip with a secure system BIOS and a secure control bus connecting a central controller to many network-connected microprocessors and volatile RAM.
  40. Ellis, Frampton E., Computer or microchip with a secure system bios having a separate private network connection to a separate private network.
  41. Ellis, Frampton E., Computer or microchip with an internal hardware firewall and a master controlling device.
  42. Ellis, Frampton E., Computer or microchip with its system bios protected by one or more internal hardware firewalls.
  43. Ross Ron (P.O. Box 175 Princeton Junction NJ 08550), Computer program protection method.
  44. Westheimer Thomas O. (2 Highland Dr. Peterborough NH 03458) Hipson Peter D. (4 S. Shore Dr. Jaffrey NH 03452), Computer software protection system.
  45. Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
  46. Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
  47. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  48. Ellis, Frampton E., Computer with at least one faraday cage and internal flexibility sipes.
  49. Ellis, III, Frampton E., Computers and microchips with a faraday cage, a side protected by an internal hardware firewall and an unprotected side connected to the internet for network operations, and with internal hardware compartments.
  50. Ellis, Frampton E., Computers and microchips with a faraday cage, with a side protected by an internal hardware firewall and unprotected side connected to the internet for network operations, and with internal hardware compartments.
  51. Ellis, III, Frampton E., Computers and microchips with a portion protected by an internal hardware firewall.
  52. Ellis, III, Frampton E., Computers and microchips with a portion protected by an internal hardware firewalls.
  53. Ellis, III, Frampton E., Computers and microchips with a side protected by an internal hardware firewall and an unprotected side connected to a network.
  54. Ellis, III, Frampton Erroll, Computers and microchips with a side protected by an internal hardware firewall and an unprotected side connected to a network.
  55. Ellis, Frampton E., Computers including an undiced semiconductor wafer with Faraday Cages and internal flexibility sipes.
  56. Ellis, III, Frampton E., Computers or microchips with a hardware side protected by a primary internal hardware firewall and an unprotected hardware side connected to a network, and with multiple internal hardware compartments protected by multiple secondary inner hardware firewalls.
  57. Ellis, III, Frampton E., Computers or microchips with a hardware side protected by a primary internal hardware firewall leaving an unprotected hardware side connected to a network, and with multiple internal hardware compartments protected by multiple secondary interior hardware firewalls.
  58. Ellis, Frampton E., Computers or microchips with a primary internal hardware firewall and with multiple internal harware compartments protected by multiple secondary interior hardware firewalls.
  59. Grawrock,David W., Connecting a virtual token to a physical token.
  60. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  61. Stefik,Mark J., Content rendering device with usage rights.
  62. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  63. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  64. Bennett,Steve; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Zou,Xiang; Kozuch,Michael A., Control over faults occurring during the operation of guest software in the virtual-machine architecture.
  65. Bennett,Steve; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael A., Control register access virtualization performance improvement in the virtual-machine architecture.
  66. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple isolated memories in an isolated execution environment.
  67. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple memory zones in an isolated execution environment.
  68. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple memory zones in an isolated execution environment.
  69. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling accesses to isolated memory using a memory controller for isolated execution.
  70. Saito, Makoto, Controlling database copyrights.
  71. Saito, Makoto, Controlling database copyrights.
  72. Saito, Makoto, Controlling database copyrights.
  73. Grawrock,David W., Creation and distribution of a secret value between two devices.
  74. Best Robert M. (16016 Ninth Ave. Northeast Seattle WA 98155), Cryptographic decoder for computer programs.
  75. Kang, Sun; Kim, Soo Hyeon; Kim, Hyo Won; Chang, Tae Joo, Cryptographic device having session memory bus.
  76. Thomas Collins ; John Gregory ; Ralph Bestock, Cryptographic system.
  77. Saito, Makoto, Data copyright management.
  78. Saito, Makoto, Data copyright management.
  79. Saito, Makoto, Data copyright management system.
  80. Saito,Makoto, Data copyright management system.
  81. Saito, Makoto, Data management.
  82. Saito, Makoto, Data management system.
  83. Saito, Makoto, Data management system.
  84. Saito, Makoto, Data management system.
  85. Saito, Makoto, Data management system.
  86. Brown David L. ; Pombo Raul A. ; Polansky Paul J., Data processor with flexible data encryption.
  87. Gercekci Anil (Geneva CHX), Data storage device.
  88. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  89. Liang,Bor Sung, Device and method for data protection by scrambling address lines.
  90. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  91. Hampson Bradford E. (Framingham MA), Digital computer system for executing encrypted programs.
  92. Saito, Makoto, Digital content management system and apparatus.
  93. Saito, Makoto, Digital content management system and apparatus.
  94. Saito, Makoto, Digital content management system and apparatus.
  95. Neki Katsuhiko (Tokyo JPX), Digital data processing circuit equipped with full bit string reverse control circuit and shifter to perform full or par.
  96. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  97. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  98. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  99. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  100. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  101. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  102. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  103. Sethumadhavan, Lakshminarasimhan; Sinha, Kanad; Keromytis, Angelos; Pappas, Vasileios; Kemerlis, Vasileios, Diversified instruction set processing to enhance security.
  104. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  105. Zizzi,Stephen, Encrypting file system.
  106. Kurashima,Shigemi; Endo,Norio, Encryption method, communication system, transmission device, and data input device.
  107. Chizeck, Howard Jay; Bonaci, Tamara; Lendvay, Thomas, Enhanced security and safety in telerobotic systems.
  108. Chizeck, Howard Jay; Bonaci, Tamara; Lendvay, Thomas, Enhanced security and safety in telerobotic systems.
  109. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Executing isolated mode instructions in a secure system running in privilege rings.
  110. Folmsbee, Alan, Execution of instructions using op code lengths longer than standard op code lengths to encode data.
  111. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S., File checking using remote signing authority via a network.
  112. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Generating a key hieararchy for use in an isolated execution environment.
  113. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Generating isolated bus cycles for isolated execution.
  114. Ellis, Frampton E., Global network computers.
  115. Ellis, III,Frampton E., Global network computers.
  116. Ellis,Frampton E, Global network computers.
  117. Uhlig,Richard; Anderson,Andrew V.; Bennett,Steve; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert, Handling faults associated with operation of guest software in the virtual-machine architecture.
  118. Lee Robert D. (Denton TX) Kurkowski Hal (Dallas TX), ID protected memory with a maskable ID template.
  119. Endo, Takashi; Kaminaga, Masahiro; Watanabe, Takashi; Nakada, Kunihiko; Tsukamoto, Takashi, Information processing device.
  120. Endo,Takashi; Kaminaga,Masahiro; Watanabe,Takashi; Nakada,Kunihiko; Tsukamoto,Takashi, Information processing device.
  121. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  122. Ellis, III, Frampton E., Internal hardware firewalls for microchips.
  123. Crawford,Christopher M., Internet download systems and methods providing software to internet computer users for local execution.
  124. Christopher M. Crawford, Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established when signing up for backup services.
  125. Cota-Robles, Eric C.; Glew, Andy; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael A.; Neiger, Gilbert; Uhlig, Richard, Invalidating translation lookaside buffer entries in a virtual machine (VM) system.
  126. Cota-Robles, Eric C.; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael A.; Neiger, Gilbert; Uhlig, Richard, Invalidating translation lookaside buffer entries in a virtual machine system.
  127. Kaplan Michael M. ; Ober Timothy ; Reed Peter, Kernel mode protection.
  128. Kaplan, Michael M.; Ober, Timothy; Reed, Peter, Kernel mode protection.
  129. Best, Robert M., Linked electronic game systems.
  130. Hawkes, Philip Michael; Xiao, Lu; Rose, Gregory Gordon; Millendorf, Steve, Low latency block cipher.
  131. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  132. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  133. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  134. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  135. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing accesses in a processor for isolated execution.
  136. Hall, Clifford D.; Campbell, Randolph L., Mechanism for remapping post virtual machine memory pages.
  137. Bennett,Steven M.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Neiger,Gilbert; Uhlig,Richard, Mechanism to control hardware interrupt acknowledgement in a virtual machine system.
  138. Fish, Andrew J., Mechanism to determine trust of out-of-band management agents.
  139. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  140. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  141. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  142. McKeen,Francis X.; Reneris,Ken; Grawrock,David W., Mechanism to secure computer output from software attack using isolated execution.
  143. Okada Takashi (Yokohama JPX) Mogi Takao (Tokyo JPX), Memory selecting system for scrambled television receiver.
  144. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  145. Brickell, Ernest; Graunke, Gary; Stevens, William A.; Vembu, Balaji, Method and apparatus for authenticated, recoverable key distribution with no database secrets.
  146. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  147. Poisner,David I.; Grawrock,David W.; Sutton,James A., Method and apparatus for communicating securely with a token.
  148. Cota Robles,Erik; Chou,Stephen; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Method and apparatus for constructing host processor soft devices independent of the host processor operating system.
  149. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  150. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  151. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  152. Oshima, Mitsuaki; Gotoh, Yoshiho; Tanaka, Shinichi; Koishi, Kenji; Moriya, Mitsurou; Takemura, Yoshinari, Method and apparatus for encrypting and recording received content information on a recording medium using both medium identification information and a cipher key for encryption.
  153. Hori, Yoshihiro; Kanai, Yuichi; Ohno, Ryoji; Ohishi, Takeo; Tada, Kenichiro; Hirai, Tatsuya; Tsuru, Masafumi; Hasebe, Takayuki, Method and apparatus for encrypting data to be secured and inputting/outputting the same.
  154. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  155. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  156. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  157. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  158. Bennett, Steven M.; Anderson, Andrew V.; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  159. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  160. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  161. Raley, Michael C.; Chen, Daniel C.; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  162. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  163. Wildgrube Frank L. ; Albrecht Mark, Method and apparatus for increasing security against unauthorized write access to a protected memory.
  164. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  165. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  166. Kozuch, Michael A.; Sutton, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  167. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  168. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Method and apparatus for marking the information content of an information carrying signal.
  169. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Method and apparatus for marking the information content of an information carrying signal.
  170. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  171. Saito, Makoto, Method and apparatus for protecting digital data by double re-encryption.
  172. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  173. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  174. Covey Carlin R. (Scottsdale AZ), Method and apparatus for secure execution of untrusted software.
  175. Anderson, Andrew V.; Kägi, Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  176. Anderson,Andrew V.; K��gi,Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  177. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  178. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  179. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  180. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  181. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  182. Mollier Jean (Bougival FRX), Method and device for protecting software delivered to a user by a supplier.
  183. Combs James Lee, Method and system for authentication of a memory unit for a computer system.
  184. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  185. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  186. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  187. Cheung,Francis; Monroe,Jason; Li,Jay Kwok Wa; Patariu,Kevin; Chen,Iue Shuenn, Method and system for data encryption and decryption.
  188. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set.
  189. Lao, Guillermo, Method and system for subscription digital rights management.
  190. Lao, Guillermo, Method and system for subscription digital rights management.
  191. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  192. Bajikar, Sundeep M., Method and system to provide a trusted channel within a computer system for a SIM device.
  193. Schull,Jonathan, Method for adapting a software product to an environment.
  194. Schull,Jonathan, Method for causing a digital product to revert to a demo mode.
  195. Saito, Makoto, Method for controlling database copyrights.
  196. Saito,Makoto, Method for controlling database copyrights.
  197. Saito,Makoto, Method for controlling database copyrights.
  198. Chichierchia, Maria, Method for controlling the execution of an applet for an IC card.
  199. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  200. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  201. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  202. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  203. Sourgen Laurent,FRX ; Wuidart Sylvie,FRX, Method for numerically scrambling data and its application to a programmable circuit.
  204. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  205. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jevasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  206. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  207. Patel Baiju V., Method for securing communications in a pre-boot environment.
  208. Schull,Jonathan, Method for selling, protecting, and redistributing digital goods.
  209. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  210. Schull,Jonathan, Method of altering a software product in response to predetermined events.
  211. Brickell,Ernie F., Method of confirming a secure key exchange.
  212. Houlberg, Christian L.; Borgen, Gary S., Method which uses a non-volatile memory to store a crypto key and a check word for an encryption device.
  213. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  214. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  215. Albrecht Mark ; Wildgrube Frank, Methods and apparatus for preventing unauthorized write access to a protected non-volatile storage.
  216. Schmidt Walter E. (604 W. 115th St. ; Apt. B New York NY 10025), Methods and apparatus for the protection and control of computer programs.
  217. Bennett,Steve M.; Neiger,Gilbert; Cota Robles,Erik C.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael A.; Uhlig,Richard A.; Smith,Larry; Rodgers,Dion; Glew,Andrew; Boleyn,Erich, Methods and systems to control virtual machines.
  218. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  219. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  220. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  221. Pattinson, Neville; Somogyi, Tibor; Pietrzyk, Jean-Marc; Du Castel, Bertrand, Metrology device with programmable smart card.
  222. Ellis, Frampton E., Microchip with faraday cages and internal flexibility sipes.
  223. Ellis, Frampton E, Microchips with an internal hardware firewall.
  224. Ellis, III, Frampton E., Microchips with an internal hardware firewall protected portion and a network portion with microprocessors which execute shared processing operations with the network.
  225. Ellis, III, Frampton E., Microchips with an internal hardware firewall that by its location leaves unprotected microprocessors or processing units which performs processing with a network.
  226. Ellis, Frampton E, Microchips with inner firewalls, faraday cages, and/or photovoltaic cells.
  227. Ellis, Frampton E., Microchips with multiple internal hardware-based firewalls and dies.
  228. Henry, G. Glenn; Crispin, Thomas A.; Parks, Terry, Microprocessor apparatus and method for enabling configurable data block size in a cryptographic engine.
  229. Henry,G. Glenn; Crispin,Thomas A.; Parks,Terry, Microprocessor apparatus and method for optimizing block cipher cryptographic functions.
  230. Crispin, Thomas A.; Henry, G. Glenn; Parks, Terry, Microprocessor apparatus and method for performing block cipher cryptographic functions.
  231. Crispin,Thomas A.; Henry,G. Glenn; Parks,Terry, Microprocessor apparatus and method for performing block cipher cryptographic functions.
  232. Henry,G. Glenn; Crispin,Thomas A.; Parks,Terry, Microprocessor apparatus and method for providing configurable cryptographic block cipher round results.
  233. Henry, G. Glenn; Crispin, Thomas A.; Parks, Terry, Microprocessor apparatus and method for providing configurable cryptographic key size.
  234. Kubota, Satoshi, Microprocessor for providing copy protection.
  235. Blahut Donald E. (Holmdel NJ), Microprocessor having macro-rom and main program queues.
  236. Ugon Michel (Maurepas FRX) Guillou Louis (Bourgbarre FRX), Microprocessor intended particularly for executing the calculation algorithms of a public code encoding system.
  237. Shirakawa, Kenji; Hashimoto, Mikio; Teramoto, Keiichi; Ozaki, Satoshi; Fujimoto, Kensaku, Microprocessor with program and data protection function under multi-task environment.
  238. Shirakawa,Kenji; Hashimoto,Mikio; Teramoto,Keiichi; Ozaki,Satoshi; Fujimoto,Kensaku, Microprocessor with program and data protection function under multi-task environment.
  239. Etchegoyen, Craig S., Modular software protection.
  240. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  241. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  242. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  243. Grawrock,David W., Multi-token seal and unseal.
  244. Hopkins,W. Dale; Collins,Thomas W.; Wierenga,Steven W.; Hines,Larry L., Multiple cryptographic key precompute and store.
  245. Hopkins,W. Dale; Collins,Thomas W.; Wierenga,Steven W.; Wang,Ruth A., Multiple prime number generation using a parallel prime number search algorithm.
  246. Fan,Chen Huang; Du,Ben Chuan; Cheng,Yi Wen, Network lock method and related apparatus with ciphered network lock and inerasable deciphering key.
  247. Chiu Ming-Yee (Mt. Laurel NJ), On-chip microprocessor instruction decoder having hardware for selectively bypassing on-chip circuitry used to decipher.
  248. Crawford Christopher M., Online computer services including help desk, anti-virus and/or application service features.
  249. Mitsuaki Oshima JP; Yoshiho Gotoh JP; Shinichi Tanaka JP; Kenji Koishi JP; Mitsurou Moriya JP; Yoshinari Takemura JP, Optical disk reading device using both a decipher key and disk identification information.
  250. Mitsuaki Oshima JP; Yoshino Gotoh JP; Shinichi Tanaka JP; Kenji Koishi JP; Mitsurou Moriya JP; Yoshinari Takemura JP, Optical disk reading device using both a decipher key and disk identification information for decryption.
  251. Oshima Mitsuaki,JPX ; Gotoh Yoshiro,JPX ; Tanaka Shinichi,JPX ; Koishi Kenji,JPX ; Moriya Mitsurou,JPX ; Takemura Yoshinari,JPX, Optical disk, optical recorder, optical reproducer, cryptocommunication system and program license system.
  252. Ellis, III, Frampton E., Personal and server computers having microchips with multiple processing units and internal firewalls.
  253. Ellis, Frampton E., Personal computer, smartphone, tablet, or server with a buffer zone without circuitry forming a boundary separating zones with circuitry.
  254. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  255. Brickell,Ernie F., Platform and method for establishing trust without revealing identity.
  256. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for generating and utilizing a protected audit log.
  257. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for issuing and certifying a hardware-protected attestation key.
  258. Herbert,Howard C.; Grawrock,David W.; Ellison,Carl M.; Golliver,Roger A.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for remote attestation of a platform.
  259. Grawrock,David W., Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations.
  260. Moran, Douglas R.; Acharya, Satish; Bogin, Zohar; Galloway, Sean G., Prioritized address decoder.
  261. Ugon, Michel, Process and apparatus for authenticating or certifying at least one item of information contained in a memory of a removable and portable electronic carrier, such as a card.
  262. Kawasaki, Yusuke; Sakurai, Hiroshi; Hashimoto, Shigeru; Yamamoto, Koken, Processing apparatus and integrated circuit to prevent illicit access and reverse engineering.
  263. Grabon Robert J., Processor having compression and encryption circuitry.
  264. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard, Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor.
  265. Inoue,Masayuki; Itoh,Shigeyuki; Takami,Yutaka; Matsumoto,Kenji, Program writable IC card and method thereof.
  266. Poisner, David I., Protected configuration space in a protected environment.
  267. Poisner,David I., Protected configuration space in a protected environment.
  268. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  269. Sima, Ronen, Protecting against use of unauthorized electronic hardware devices.
  270. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Protecting software environment in isolated execution.
  271. Grawrock, David W., Protection of boot block data and accurate reporting of boot block contents.
  272. Bennett,Steven M.; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K��gi,Alain; Neiger,Gilbert; Uhlig,Richard; Mondal,Sanjoy K.; Brandt,Jason, Providing support for single stepping a virtual machine in a virtual machine environment.
  273. Crowder, Jr., Robert W.; Cadima, Ronald A.; Green, Anthony E.; Buckeyne, Thomas E.; Patel, Pravinkumar, ROM BIOS based trusted encrypted operating system.
  274. Cota Robles,Erik C.; Flautner,Krisztian, Real-time scheduling of virtual machines.
  275. Uhlig,Richard; Neiger,Gilbert; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Bennett,Steven M, Reclaiming existing fields in address translation data structures to extend control over memory accesses.
  276. Oshima, Mitsuaki; Gotoh, Yoshiho; Tanaka, Shinichi; Koishi, Kenji; Moriya, Mitsurou; Takemura, Yoshinari, Recordable optical disk encrypted with disk identification and multiple keys.
  277. Oshima, Mitsuaki; Gotoh, Yoshiho; Tanaka, Shinichi; Koishi, Kenji; Moriya, Mitsurou; Takemura, Yoshinari, Recording medium reproducer, cryptocommunication system and program license system.
  278. Oshima, Mitsuaki; Gotoh, Yoshiho; Tanaka, Shinichi; Koishi, Kenji; Moriya, Mitsurou; Takemura, Yoshinari, Recording medium, recorder, reproducer, cryptocommunication system and program license system.
  279. Oshima,Mitsuaki; Gotoh,Yoshiho; Tanaka,Shinichi; Koishi,Kenji; Moriya,Mitsurou; Takemura,Yoshinari, Recording medium, recorder, reproducer, cryptocommunication system and program license system.
  280. Bennett Donald B. (Burnsville MN) Esch John W. (Burnsville MN), Reflexive utilization of descriptors to reconstitute computer instructions which are Huffman-like encoded.
  281. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  282. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  283. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  284. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  285. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  286. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind; Reneris, Ken, Resetting a processor in an isolated execution environment.
  287. Raley, Michael C.; Gilliam, Charles P.; Ham, Manual; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  288. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  289. Davis Derek L., Secure boot.
  290. Laczko, Sr., Frank L.; Ferguson, Edward, Secure computing device having boot read only memory verification of program code.
  291. Marino ; Jr. Joseph T. (Fountain Hills AZ) Core Ronald S. (Glendale AZ), Secure cryptographic processor arrangement.
  292. Best,Robert M., Secure distribution of portable game software.
  293. Best,Robert M., Secure execution of downloaded software.
  294. Piosenka Gerald V. (Scottsdale AZ) Mead Barry B. (Mesa AZ), Secure microprocessor.
  295. Guttag Karl M. (Houston TX), Secure microprocessor/microcomputer with secured memory.
  296. Paatero,Lauri, Secure mode controlled memory.
  297. Haider, Amer; Hussain, Muhammad R.; Kessler, Richard E.; Badr, Imran, Secure software and hardware association technique.
  298. Hussain, Muhammad Raghib, Secure software and hardware association technique.
  299. Hussain, Muhammad Raghib, Secure software and hardware association technique.
  300. Abu-Husein, Loay, Secure storage and execution of processor control programs by encryption and a program loader/decryption mechanism.
  301. Guttag Karl M. (Houston TX) Nussrallah Steve (Richardson TX), Security bit for designating the security status of information stored in a nonvolatile memory.
  302. Lafferty Stephen H. (Roswell GA) Lett David B. (Norcross GA), Signal scrambling transmission system.
  303. Grawrock,David W.; Poisner,David I., Sleep protection.
  304. Montgomery, Michael A., Smart card application-selection.
  305. Chernow Fred (360 Kiowa Pl. Boulder CO 80303) Peterson Randy J. (1330 Arapahoe St. Boulder CO 80302), Software distribution system.
  306. Pavlin, Dominique Vincent; Sotoodeh, Mehdi; Tibbetts, Reed H.; Godding, Patrick N.; Spiewek, Alain Raymond; Nixon, Roger Graham, Software protection device and method.
  307. Pavlin,Dominique Vincent; Sotoodeh,Mehdi; Tibbetts,Reed H.; Godding,Patrick N.; Spiewek,Alain Raymond; Nixon,Roger Graham, Software protection device and method.
  308. Levien Raphael L. (Rte. 1 ; Box 19 McDowell VA 24458), Software protection method and apparatus.
  309. Curran Kevin G. (Sudbury MA) Golson Steven E. (Wayland MA) Rode Christian S. (Cambridge MA), Software protection methods and apparatus.
  310. Donald Thomas C. (2651 Rillwood Rd. Birmingham AL 35243) Donald Henry W. (428 Lakewood Dr. Homewood AL 35209), Software protection system.
  311. Chandra Ashileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocess.
  312. Herman Morton B. (Huntington Station NY), Software security method using partial fabrication of proprietary control word decoders and microinstruction memories.
  313. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  314. Mark J. Granger ; Cyrus E. Smith ; Matthew I. Hoffman, Software system and associated methods for controlling the use of computer programs.
  315. Kobus ; Jr. Paul (Phoenix AZ), Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes f.
  316. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  317. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  318. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  319. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  320. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  321. Eperiesi-Beck, Elmar, Storing data in a server computer with deployable encryption/decryption infrastructure.
  322. Eperiesi-Beck, Elmar, Storing data in a server computer with deployable encryption/decryption infrastructure.
  323. Daemen, Joan; Guillemin, Pierre; Anguille, Claude; Bardouillet, Michel; Liardet, Pierre-Yvan; Teglia, Yannick, Stream ciphering of the content of a memory external to a processor.
  324. Neiger,Gilbert; Anderson,Andrew V.; Bennett,Steven M.; Brandt,Jason; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K채gi,Alain; Mondal,Sanjoy K.; Parthasarathy,Rajesh; Rodgers,Dion; Smith,Lawrence O.; Uhlig,Richard A., Support for nested fault in a virtual machine environment.
  325. Richardson, Ric B., System and method for adjustable licensing of digital products.
  326. Montgomery Michael A. ; Guthery Scott B. ; du Castel Bertrand, System and method for an ISO7816 complaint smart card to become master over a terminal.
  327. Cota Robles,Erik C.; Campbell,Randolph L.; Hall,Clifford D.; Neiger,Gilbert; Uhlig,Richard A., System and method for binding virtual machines to hardware contexts.
  328. Boerger, Mark A., System and method for communicating with a key variable loader (KVL) using a standard universal asynchronous receiver transmitter (UART) peripheral.
  329. Schull,Jonathan, System and method for controlling access to protected information.
  330. Neiger, Gilbert; Bennett, Steven M.; Cota-Robles, Erik; Schoenberg, Sebastian; Hall, Clifford D.; Rodgers, Dion; Smith, Lawrence O.; Anderson, Andrew V.; Uhlig, Richard A.; Kozuch, Michael; Glew, Andy, System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time.
  331. Stefik, Mark J.; Pirolli, Peter L. T., System and method for controlling utilization of content.
  332. Schull,Jonathan, System and method for creating and running protected information.
  333. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  334. Schull, Jonathan, System and method for distributing protected information.
  335. Wang,Xin, System and method for document distribution.
  336. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  337. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  338. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  339. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  340. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  341. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  342. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  343. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  344. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  345. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  346. Sutton, II,James A.; Grawrock,David W., System and method for execution of a secured environment initialization instruction.
  347. Sutton, James A; Grawrock, David W, System and method for execution of a secured environment initialization instruction.
  348. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  349. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  350. Schull,Jonathan, System and method for operating a licensing server.
  351. Stefik, Mark J.; Pirolli, Peter L. T., System and method for permitting use of content using transfer rights.
  352. Schull,Jonathan, System and method for processing protected audio information.
  353. Schull, Jonathan, System and method for processing protected text information.
  354. Schull,Jonathan, System and method for processing protected video information.
  355. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  356. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  357. Wang, Xin, System and method for protection of digital works.
  358. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  359. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  360. Grawrock,David W.; Sutton, II,James A., System and method for resetting a platform configuration register.
  361. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  362. Schull, Jonathan, System and method for selectively changing parameter settings based on lineage analysis of digital information.
  363. Schull,Jonathan, System and method for selectively enabling access based on lineage analysis of digital information.
  364. Schull,Jonathan, System and method for selling protected information in an oem context.
  365. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  366. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  367. Milliken, Walter Clark, System and method for thwarting buffer overflow attacks using encrypted process pointers.
  368. Milliken, Walter Clark, System and method for thwarting buffer overflow attacks using encrypted process pointers.
  369. Wang,Xin, System and method for transferring the right to decode messages.
  370. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  371. Danilak, Radoslav, System and method for transparent disk encryption.
  372. Danilak, Radoslav, System and method for transparent disk encryption.
  373. Danilak, Radoslav, System and method for transparent disk encryption.
  374. Danilak, Radoslav, System and method for transparent disk encryption.
  375. Johnson, Harold J.; Chow, Stanley T.; Main, Alexander, System and method of foiling buffer-overflow and alien-code attacks.
  376. Adams, Stephen Robert, System and method of updating programs and data.
  377. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  378. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  379. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  380. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  381. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  382. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  383. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  384. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  385. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  386. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  387. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  388. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  389. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  390. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  391. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  392. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  393. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  394. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  395. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  396. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  397. Odom, Wayne; Gee, Karolyn, System, method, and device for communicating and storing and delivering data.
  398. Odom, Wayne; Gee, Karolyn, System, method, and device for communicating and storing and delivering data.
  399. Odom, Wayne; Gee, Karolyn, System, method, and device for communicating and storing and delivering data.
  400. Odom, Wayne; Gee, Karolyn, System, method, and device for delivering communications and storing and delivering data.
  401. Odom, Wayne; Gee, Karolyn, System, method, and device for delivering communications and storing and delivering data.
  402. Odom, Wayne; Gee, Karolyn, System, method, and device for storing and delivering data.
  403. Odom, Wayne; Gee, Karolyn, System, method, and device for storing and delivering data.
  404. Valenzuela, Edgardo; Chen, Eddie J.; DeMartini, Thomas; Fung, Joseph Zhung Yee; Nguyen, Mai; Tieu, Vincent Hsiang; Tran, Duc, Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates.
  405. Etchegoyen, Craig S., Systems and methods for game activation.
  406. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  407. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  408. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  409. LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  410. LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
  411. Levine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  412. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  413. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  414. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  415. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  416. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  417. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  418. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  419. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  420. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  421. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  422. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  423. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  424. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  425. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  426. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  427. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  428. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  429. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  430. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  431. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  432. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  433. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  434. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  435. Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  436. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  437. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  438. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  439. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  440. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  441. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  442. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  443. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  444. Bennett, Steven M.; Neiger, Gilbert; Anderson, Andrew V., Timer offsetting mechanism in a virtual machine environment.
  445. Cota Robles,Erik; Schoenberg,Sebastian; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor.
  446. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  447. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  448. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  449. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  450. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  451. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  452. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  453. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  454. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  455. Grawrock, David, Trusted platform module for generating sealed data.
  456. Marino ; Jr. Joseph T. (Fountain Hill AZ) Lambert Paul A. (Scottsdale AZ), Uniform interface for cryptographic services.
  457. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  458. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  459. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  460. Granger, Mark J.; Smith, Cyrus E.; Hoffman, Matthew I., Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications.
  461. Guttag Karl M. (Houston TX), Use of implant process for programming ROM type processor for encryption.
  462. Neiger,Gilbert; Bennett,Steven M.; K��gi,Alain; Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Uhlig,Richard; Cota Robles,Erik; Rodgers,Scott; Smith,Lawrence, Use of multiple virtual machine monitors to handle privileged events.
  463. Granger Mark J. ; Smith Cyrus E. ; Hoffman Matthew I., Use of pseudocode to protect software from unauthorized use.
  464. Guthery Scott B., Validating and certifying execution of a software program with a smart card.
  465. Grawrock,David W.; Sutton, II,James A., Validation of inclusion of a platform within a data center.
  466. Bennett,Steven M.; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael; Smith,Lawrence; Rodgers,Scott, Vectoring an interrupt or exception upon resuming operation of a virtual machine.
  467. Knauerhase, Robert C.; Tewari, Vijay, Virtual machine management using processor state information.
  468. Knauerhase,Robert C.; Tewari,Vijay, Virtual machine management using processor state information.
  469. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Virtual translation lookaside buffer.
  470. Ben-David, Shay; Hoory, Ron; Kons, Zvi; Nahamoo, David, Voice transformation with encoded information.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로