$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Software protection method and apparatus 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0315050 (1981-10-26)
발명자 / 주소
  • Pickholtz Andrew (Fairfax VA)
출원인 / 주소
  • Telecommunications Associates, Inc. (Fairfax VA 02)
인용정보 피인용 횟수 : 211  인용 특허 : 6

초록

In a method of and apparatus for limiting program execution to only an authorized data processing system, a proprietary program, together with first and second authorization codes, is stored on a magnetic disc or other storage medium. The first and second authorization codes are read. A hardware mod

대표청구항

A software protection apparatus using first and second authorization codes and a pseudorandom number, said software protection apparatus for use with a computer, comprising: an external memory device having computer software and a first authorization code and a second authorization code at selected

이 특허에 인용된 특허 (6)

  1. Johnstone ; Richard, Computer software security system.
  2. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Smith John L. (Woodstock NY) Tuchman Walter L. (Woodstock NY), Cryptographic file security for single domain networks.
  3. Thomas David C. (Mesa AZ), Method and apparatus for providing security for computer software.
  4. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Microprocessor for executing enciphered programs.
  5. Attanasio Clement Richard (Peekskill NY) Belady Laszlo Antal (Yorktown Heights NY), Operating system authenticator.
  6. Casto ; Walter V. ; DeLong ; Lawrence W. ; Markley ; Theodore J. ; Stru ger ; Odo J., Program protection module for programmable controller.

이 특허를 인용한 특허 (211)

  1. Eriksson, Thomas; Wenzel, Jurgen; Karlsson, Tobias, Anti-piracy software protection system and method.
  2. Eriksson, Thomas; Wenzel, Jurgen; Karlsson, Tobias, Anti-piracy software protection system and method.
  3. Tolman J. Leonard (Provo UT) Ekstrom Joseph J. (Lindon UT), Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of compute.
  4. Heidorn Allen J. (Minnetonka MN) Paulson John W. (Edina MN) Dunn Mark E. (Apple Valley MN), Apparatus and method for analyzing vocal audio data to provide accompaniment to a vocalist.
  5. Bealkowski Richard (Delray Beach FL) Blackledge ; Jr. John W. (Boca Raton FL) Cronk Doyle S. (Boca Raton FL) Dayan Richard A. (Boca Raton FL) Dixon Jerry D. (Boca Raton FL) Kinnear Scott G. (Boca Rat, Apparatus and method for preventing unauthorized access to BIOS in a personal computer system.
  6. Nam,Su hyun; Kim,Yun sang; Choi,Yang lim, Audio/video stream processing system and method for data copy protection.
  7. Paulson John W. (Edina MN) Dunn Mark E. (Apple Valley MN) Heidorn Allen J. (Minnetonka MN), Automated accompaniment apparatus and method.
  8. French Catherine Anne ; Reddy Prafulla Bollampali ; Miller Jeffrey Alan, Block address integrity check for storage medium.
  9. Walker Robin D. (Glasgow GB6), Code operated access control system for electronic data store.
  10. Anderson David B. (1600 Hartford St. Ann Arbor MI 48103), Computer software protection, by optical effects.
  11. Mineo Akira (Sagamihara JPX), Data processing security system for automatically transferring software protection data from removable store into intern.
  12. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  13. Litterst George F. ; Weinstock Frank M., Device for controlling a musical performance.
  14. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  15. Nobuhiro Yamada JP; Kazuhiko Matsuoka JP, Electronic score tracking musical instrument.
  16. Yanase Kazuya,JPX ; Yamada Nobuhiro,JPX ; Matsuoka Kazuhiko,JPX, Electronic score tracking musical instrument.
  17. Lisa Fredrickson, Frame synchronization for viterbi detector.
  18. Bernardo Rub ; Hamid R. Shafiee, Full and half-rate signal space detection for channels with a time-varying MTR.
  19. Karp Alan H. (Palo Alto CA), Hardware assist for protecting PC software.
  20. Allbery ; Jr. James D. (Farmington Hills MI) Troisi Peter A. (Westford MA) Johnson Susan J. (Novi MI) Cullen James H. (Bedford MA) Butler Richard L. (Toledo OH) Ferreira James P. (Amherst NH) Ellison, Intelligent process control communication system and method having capability to time align corresponding data sets.
  21. Zeng, Nianning, Internet-based automated system and a method for software copyright protection and sales.
  22. Xu, Xuejun; Nadell, Katherine K., Method and apparatus for facilitating the transfer of a software license between computer systems.
  23. Weinstock Frank M. ; Litterst George F., Method and apparatus for real-time correlation of a performance to a musical score.
  24. Weinstock Frank M. ; Litterst George F., Method and apparatus for real-time correlation of a performance to a musical score.
  25. Hiltunen,Matti; Miettinen,Jarmo; Nordberg,Marko; Liukkonen,Jukka, Method and device for authenticating locally-stored program code.
  26. Harijono,Indra Gunawan; Lee,Ho Jae; Yoon,Uooyeol, Method and system for reassembling packets prior to searching.
  27. Zurko, Mary Ellen; Casey, Jr., Thomas Andrew; Gasser, Morrie; Hall, Judith Shelhorse; Kahn, Clifford Earl; Mason, Andrew Halstead; Sawyer, Paul Douglas; Kendall, Leslie Richard; Lipner, Steven B., Method for executing trusted-path commands.
  28. Larsson Jeffrey E. ; Richardson Alan ; Steckler Paul A., Method for preventing software piracy during installation from a read only storage medium.
  29. Jogand-Coulomb, Fabrice, Method for program code execution with memory storage controller participation.
  30. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  31. Wolfe Everett W. (Lauderdale Lakes FL), Method of controlling the copying of software.
  32. Blakley ; III George R. (Austin TX) Rogaway Phillip W. (Davis CA), Method to protect information on a computer storage device.
  33. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  34. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  35. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  36. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  37. Etchegoyen, Craig S., Modular software protection.
  38. Earnest Lester D. (Los Altos Hills CA), Modular software security.
  39. Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
  40. Wigur Jan (Norsborg SEX), Operator console with paired modules including means for ciphering and deciphering messages therebetween based on a mutu.
  41. Hart, III,John J.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G., Optical storage medium having distortion regions, and a method of modifying an optical storage medium to include distortion regions.
  42. Piry,Frederic Claude Marie, Processing activity masking in a data processing system.
  43. Zurko, Mary Ellen; Casey, Jr., Thomas Andrew; Gasser, Morrie; Hall, Judith Shelhorse; Kahn, Clifford Earl; Mason, Andrew Halstead; Sawyer, Paul Douglas; Kendall, Leslie Richard; Lipner, Steven B., Processing trusted commands in trusted and untrusted environments.
  44. Braithwaite David G. ; Bruderer Clark C. ; Allen Gregory M. ; Thompson David A., Read/write protect scheme for a disk cartridge and drive.
  45. Braithwaite David G. ; Bruderer Clark C. ; Allen Gregory M. ; Thompson David A., Read/write protect scheme for a disk cartridge and drive.
  46. Braithwaite, David G.; Bruderer, Clark C.; Allen, Gregory M.; Thompson, David A., Read/write protect scheme for a disk cartridge and drive.
  47. Edenson, Roy I.; van Kessel, Peter F.; Hewlett, Gregory J.; Breedlove, Paul S.; Werner, William B.; Elliott, Keith H., Secure distribution of digital data.
  48. Edenson,Roy I.; van Kessel,Peter F.; Hewlett,Gregory J.; Breedlove,Paul S.; Werner,William B.; Elliott,Keith H., Secure distribution of digital data.
  49. Matyas, Jr.,Stephen Michael; Peyravian,Mohammad; Roginsky,Allen Leonid; Zunic,Nevenko, Secure software distribution and installation.
  50. Guiter,Olivier; Martel,Thierry; Nicolas,Regis, Security method and apparatus for controlling the data exchange on handheld computers.
  51. Howlette Edward L. (1814 Metzerott Rd. ; Apt. 13 Adelphi MD 20783), Security system for computer software.
  52. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and method.
  53. Harvey John Christopher ; Cuddihy James William, Signal processing apparatus and methods.
  54. Harvey, John C.; Cuddihy, James W., Signal processing apparatus and methods.
  55. Harvey, John C.; Cuddihy, James W., Signal processing apparatus and methods.
  56. Harvey, John Christopher; Ciddihy, James William, Signal processing apparatus and methods.
  57. Harvey, John Christopher; Cuddihy, James Willam, Signal processing apparatus and methods.
  58. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  59. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  60. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  61. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  62. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  63. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  64. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  65. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  66. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  67. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  68. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  69. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  70. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  71. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  72. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  73. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  74. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  75. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  76. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  77. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  78. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  79. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  80. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  81. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  82. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  83. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  84. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  85. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  86. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  87. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  88. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  89. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  90. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  91. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  92. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  93. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  94. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  95. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  96. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  97. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  98. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  99. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  100. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  101. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  102. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  103. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  104. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  105. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  106. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  107. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  108. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  109. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  110. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  111. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  112. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  113. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  114. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  115. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  116. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  117. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  118. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  119. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  120. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  121. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  122. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  123. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  124. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  125. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  126. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  127. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  128. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  129. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  130. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  131. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  132. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  133. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  134. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  135. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  136. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  137. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  138. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  139. Shafiee Hamid R. ; Rub Bernardo, Signal space detector for channels utilizing a code having time varying constraints.
  140. Chernow Fred (360 Kiowa Pl. Boulder CO 80303) Peterson Randy J. (1330 Arapahoe St. Boulder CO 80302), Software distribution system.
  141. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  142. Cargile William P. (Half Moon Bay CA) Freeman Richard D. (Sunnyvale CA) Lyon James M. (San Jose CA), Solid state key for controlling access to computer systems and to computer software and/or for secure communications.
  143. Rub Bernardo ; Shafiee Hamid R., Static viterbi detector for channels utilizing a code having time varying constraints.
  144. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  145. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  146. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  147. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  148. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  149. Richardson, Ric B., System and method for adjustable licensing of digital products.
  150. Wallace David R., System and method for cloaking software.
  151. Oh,Jintae; Kim,Ilsup; Lee,Hojae, System and method for processing a data stream to determine presence of search terms.
  152. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  153. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  154. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  155. Jogand-Coulomb, Fabrice, System for program code execution with memory storage controller participation.
  156. Sion, Jérôme; Lion, Stéphanie, System for protecting software.
  157. Edwards ; Jr. Gordon L. (Easley SC), System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of prote.
  158. Etchegoyen, Craig S., Systems and methods for game activation.
  159. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  160. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  161. Howard, Daniel G.; Pagliarulo, Jeffrey A.; Crowley, John R.; Lee, Andrew R.; Hart, III, John J.; Merkle, Jr., James A.; LeVine, Richard B., Systems and methods for media authentication.
  162. Howard, Daniel G.; Pagliarulo, Jeffrey A.; Crowley, John R.; Lee, Andrew R.; Hart, III, John J.; Merkle, Jr., James A.; Levine, Richard B., Systems and methods for media authentication.
  163. Merkle, Jr., James A.; LeVine, Richard B.; Howard, Daniel G.; Lee, Andrew R., Systems and methods for media authentication.
  164. Hart, III, John J.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G., Systems and methods for optical media modification.
  165. LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  166. LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
  167. Levine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  168. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  169. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  170. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  171. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  172. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  173. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  174. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  175. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  176. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  177. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  178. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  179. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  180. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  181. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  182. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  183. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  184. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  185. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  186. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  187. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  188. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  189. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  190. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  191. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  192. Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  193. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  194. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  195. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  196. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  197. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  198. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  199. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  200. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  201. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  202. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  203. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  204. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  205. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  206. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  207. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  208. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  209. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  210. Carson Mark E. (Rockville MD) Johri Abhai (Gaithersburg MD), Trusted path mechanism for virtual terminal environments.
  211. Zurko,Mary Ellen; Casey, Jr.,Thomas Andrew; Gasser,Morrie; Hall,Judith Shelhorse; Kahn,Clifford Earl; Mason,Andrew Halstead; Sawyer,Paul Douglas; Kendall,Leslie Richard; Lipner,Steven B., Verification of trusted-path commands.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로