$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Copyprotecting system for software protection 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-001/00
출원번호 US-0533132 (1983-08-29)
발명자 / 주소
  • Guglielmino Paul (734 Marble Way Boca Raton FL 33432)
인용정보 피인용 횟수 : 205  인용 특허 : 1

초록

A means for copyprotecting disks. The present invention may be utilized with both blank and programmed disks. Permanent random input/output errors such as an absence of magnetic material are placed on a disk by removal of material or by other methods and an input/output error trap routine or program

대표청구항

A target disk that is not copyable, comprising: magnetic material; at least one input/output error means untransferable for copying purposes by machine readable computers; a physical magnetic readable signal; said physical magnetic readable signal inducing a signal means for allowing bypassing said

이 특허에 인용된 특허 (1)

  1. Cook ; Emory G., Method and apparatus for preparing recorded program material to prevent unauthorized duplication by magnetic tape recor.

이 특허를 인용한 특허 (205)

  1. Tolman J. Leonard (Provo UT) Ekstrom Joseph J. (Lindon UT), Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of compute.
  2. Motoyama, Tetsuro, Approach for deleting electronic documents on network devices using document retention policies.
  3. Motoyama, Tetsuro, Approach for managing access to electronic documents on network devices using document retention policies and document security policies.
  4. Cheng William ; Hwang Kenneth ; Kannan Ravi ; Katchapalayam Babu ; Liu Bing ; Narasimhan Balaji ; Ramanujam Gopal ; Tran Jonathan, Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer.
  5. Kikinis Dan (Saratoga CA), CD-PROM.
  6. Walker Robin D. (Glasgow GB6), Code operated access control system for electronic data store.
  7. Anderson David B. (1600 Hartford St. Ann Arbor MI 48103), Computer software protection, by optical effects.
  8. Bond Charles R. (Milpitas CA), Copy protected disk.
  9. Kachikian Kevin R. (Fountain Valley CA), Copy protection for computer discs.
  10. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  11. Reckless, Jonny Boyd; Heylen, Richard A. A., Defeat of the copy protection of optical discs.
  12. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  13. Bakos, Yannis; Brynjolfsson, Erik, Directory read inhibitor for optical storage media.
  14. Platteter Dale T. (Fairport NY) Westfall Robert S. (Rochester NY) Carter Jeff C. (Fairport NY), Execution protection for floppy disks.
  15. Karp Alan H. (Palo Alto CA), Hardware assist for protecting PC software.
  16. Dutta, Rabindranath, Hyperlink filter for "pirated" and "disputed" copyright material on the internet in a method, system and program.
  17. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Information processing apparatus, and system having preview control, and method thereof, and storage medium storing program for implementing the method.
  18. Asano, Tomoyuki; Osawa, Yoshitomo, Information recording/playback system.
  19. Asano,Tomoyuki; Osawa,Yoshitomo, Information recording/reproducing system.
  20. Thompson, Robert F.; Exter, Neil; Bakos, Yannis; Minns, Richard A.; Takiff, Larry, Limited play optical devices with interstitial reactive layer and methods of making same.
  21. Philip E. Rollhaus ; John R. Powell ; Eric J. Carlson ; Daniel J. Ehntholt ; Irwin C. Winkler ; Christopher J. Marmo ; James R. Valentine, Machine-readable optical disc with reading-inhibit agent.
  22. Motoyama Tetsuro ; Yachida Masuyoshi,JPX, Method and apparatus for erasing data after expiration.
  23. Motoyama, Tetsuro; Yachida, Masuyoshi, Method and apparatus for erasing data after tampering.
  24. Motoyama,Tetsuro; Yachida,Masuyoshi, Method and apparatus for erasing data after tampering.
  25. Yoshida Tadao (Kanagawa JPX), Method and apparatus for preventing copying of an optical disk.
  26. Reisman, Richard R., Method and system for distributing updates by presenting directory of software available for user installation that is not already installed on user station.
  27. Mithal, Ashish K.; Tayebi, Amad, Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof.
  28. Reisman, Richard R., Method and system for selecting a personalized set of information channels.
  29. Motoyama,Tetsuro, Method and system to erase data after expiration or other condition.
  30. Motoyama, Tetsuro, Method and system to erase data by overwriting after expiration or other condition.
  31. Tayebi,Amad; Mithal,Ashish K., Method for allowing a customer to preview, acquire and/or pay for information and a system therefor.
  32. Reisman, Richard R., Method for distributing a list of updated content to a user station from a distribution server wherein the user station may defer installing the update.
  33. Reisman, Richard R., Method for distributing content to a user station.
  34. Reisman, Richard R., Method for distributing content to a user station.
  35. Reisman, Richard R., Method for distributing content to a user station.
  36. Krieg Kowald,Marianne, Method for rendering surface layer of limited play disk lightfast.
  37. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  38. Singh Jitendra K. (San Jose CA), Method for unlocking software files locked to a specific storage device.
  39. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  40. Lawandy, Nabil M.; Zepp, Charles M.; Norland, Kenneth S., Methods and apparatus for rendering an optically encoded medium unreadable.
  41. Nabil M. Lawandy ; Charles M. Zepp ; Kenneth S. Norland, Methods and apparatus for rendering an optically encoded medium unreadable.
  42. Lawandy, Nabil M.; Zepp, Charles M.; Smuk, Andrei; Krieg-Kowald, Marianne, Methods and apparatus for rendering an optically encoded medium unreadable and tamper-resistant.
  43. Taylor, Neil W., Methods for detecting executable code which has been altered.
  44. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  45. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  46. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  47. Reisman, Richard R., Methods for transacting electronic commerce.
  48. Hart, III,John J.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G., Optical storage medium having distortion regions, and a method of modifying an optical storage medium to include distortion regions.
  49. Foss,Jonathan G., Point-of-sale provider evaluation.
  50. Reisman, Richard R., Providing and receiving content over a wireless communication system.
  51. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  52. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  53. Fred C. Thomas, III ; Refael Bar ; Daniel Alfonsi ; Dai Feng ; Jeff G. Carter ; Charlie M. Monroe, Jr. ; Ronald F. Hales ; George T. Krieger, Readable indelible mark on storage media.
  54. Thomas ; III Fred C., Readable indelible mark on storage media.
  55. Thomas ; III Fred C. ; Bar Refael ; Alfonsi Daniel ; Feng Dai ; Carter Jeff G. ; Monroe ; Jr. Charlie M. ; Hales Ronald F. ; Krieger George T., Readable indelible mark on storage media.
  56. Basile, Carmen Laura; Reckless, Jonny Boyd; Avery, Lee; Siebert, Glenn Allen; Kurowski, Kordian Jacek, Relating to the copy protection of optical discs.
  57. Li, Minfu; Yen, Min Nan, Security memory device and method for making same.
  58. Li,Minfu; Yen,Min Nan, Security memory device and method for making same.
  59. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and method.
  60. Harvey, John C.; Cuddihy, James W., Signal processing apparatus and methods.
  61. Harvey, John C.; Cuddihy, James W., Signal processing apparatus and methods.
  62. Harvey, John Christopher; Ciddihy, James William, Signal processing apparatus and methods.
  63. Harvey, John Christopher; Cuddihy, James Willam, Signal processing apparatus and methods.
  64. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  65. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  66. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  67. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  68. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  69. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  70. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  71. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  72. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  73. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  74. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  75. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  76. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  77. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  78. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  79. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  80. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  81. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  82. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  83. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  84. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  85. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  86. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  87. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  88. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  89. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  90. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  91. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  92. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  93. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  94. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  95. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  96. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  97. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  98. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  99. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  100. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  101. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  102. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  103. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  104. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  105. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  106. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  107. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  108. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  109. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  110. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  111. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  112. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  113. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  114. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  115. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  116. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  117. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  118. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  119. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  120. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  121. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  122. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  123. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  124. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  125. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  126. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  127. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  128. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  129. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  130. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  131. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  132. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  133. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  134. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  135. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  136. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  137. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  138. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  139. Reisman, Richard R., Software and method for monitoring a data stream and for capturing desired data within the data stream.
  140. Reisman, Richard R., Software and method that enables selection of on-line content from one of a plurality of network content service providers in a single action.
  141. Reisman, Richard R., Software and method that enables selection of one of a plurality of network communications service providers.
  142. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  143. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  144. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  145. Reisman, Richard R., Software distribution over a network.
  146. Ginkel Peter (1275 Northcliff Trace Roswell GA 30076), Software protection and identification system.
  147. Ginkel Peter (1275 Northcliff Trace Roswell GA 30076), Software protection and identification system.
  148. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  149. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  150. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  151. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  152. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  153. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  154. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  155. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  156. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  157. Wallace David R., System and method for cloaking software.
  158. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  159. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  160. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  161. Cheng,William; Hwang,Kenneth; Kannan,Ravi; Katchapalayam,Babu; Liu,Bing; Narasimhan,Balaji; Ramanujam,Gopal; Tran,Jonathan, System, method, and computer program product for uninstalling computer software.
  162. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  163. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  164. Howard, Daniel G.; Pagliarulo, Jeffrey A.; Crowley, John R.; Lee, Andrew R.; Hart, III, John J.; Merkle, Jr., James A.; LeVine, Richard B., Systems and methods for media authentication.
  165. Howard, Daniel G.; Pagliarulo, Jeffrey A.; Crowley, John R.; Lee, Andrew R.; Hart, III, John J.; Merkle, Jr., James A.; Levine, Richard B., Systems and methods for media authentication.
  166. Merkle, Jr., James A.; LeVine, Richard B.; Howard, Daniel G.; Lee, Andrew R., Systems and methods for media authentication.
  167. Hart, III, John J.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G., Systems and methods for optical media modification.
  168. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  169. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  170. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  171. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  172. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  173. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  174. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  175. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  176. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  177. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  178. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  179. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  180. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  181. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  182. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  183. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  184. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  185. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  186. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  187. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  188. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  189. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  190. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  191. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  192. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  193. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  194. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  195. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  196. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  197. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  198. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  199. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  200. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  201. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  202. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  203. Itami Satoshi,JPX ; Utsumi Kenichi,JPX ; Nakada Masahiro,JPX ; Suzuki Hiroshi,JPX ; Naito Kazunori,JPX ; Nakashima Kazuo,JPX ; Narumi Toshikatsu,JPX ; Nakahara Masaru,JPX, Unauthorized use preventing method for optical disks, optical disk having unauthorized use prevention function, and opt.
  204. Reisman, Richard R., User station software that controls transport and presentation of content from a remote source.
  205. Reisman, Richard R., User station software that controls transport, storage, and presentation of content from a remote source.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로