$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Protected software access control apparatus and method 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04Q-005/00
  • H04L-009/00
출원번호 US-0546206 (1983-10-27)
발명자 / 주소
  • Pailen William (Derwood MD) Harper Jim L. (Olney MD)
출원인 / 주소
  • Remote Systems, Inc. (Vienna VA 02)
인용정보 피인용 횟수 : 196  인용 특허 : 25

초록

A software access control system is disclosed for controlling access to a protected application program. The software access control system comprises first and second processors, each having a terminal or port adapting its processor to be coupled with the other. The first processor is programmed to

대표청구항

A software access control for limiting access to an executable program to an authorized user, said software access control system comprising: (a) data communication means for transmitting an access request message requesting permission to execute a selected program; (b) processor means comprising me

이 특허에 인용된 특허 (25)

  1. Mueller-Schloer Christian (Voorhees NJ), Apparatus and method for cryptographic identity verification.
  2. Check ; Jr. Frank T. (Orange CT), Computer accessing system.
  3. Konheim Alan G. (Yorktown Heights NY) Tuckerman ; III Louis B. (Briarcliff Manor NY), Cryptographic architecture for use with a high security personal identification system.
  4. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Powers Robert L. (West Hurley NY) Prentice Paul N. (Hyde Park NY) , Cryptographic communication and file security using terminals.
  5. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Hollis Lloyd L. (Cary NC) Lennon Richard E. (Woodstock NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Oseas J, Cryptographic communication security for multiple domain networks.
  6. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Powers Robert L. (West Hurley NY) Prentice Paul N. (Hyde Park NY) , Cryptographic communication security for single domain networks.
  7. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Smith John L. (Woodstock NY) Tuchman Walter L. (Woodstock NY), Cryptographic file security for single domain networks.
  8. Lennon Richard E. (Woodstock NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Oseas Jonathan (Hurley NY) Prentice Paul N. (Hyde Park NY) Tuchman Walter L. (Woodstock NY), Cryptographic verification of operational keys used in communication networks.
  9. Bouricius Willard G. (Katonah NY) Feistel Horst (Lexington MA), High security system for electronic signature verification.
  10. Lancto ; Donald C. ; Shuck ; Robert E., Identity verification method and apparatus.
  11. Atalla Martin M. (Atherton CA), Method and apparatus for securing data transmissions.
  12. Atalla Martin M. (Menlo Park CA), Method and apparatus for securing data transmissions.
  13. Atalla Martin M. (Menlo Park CA), Method and apparatus for securing data transmissions.
  14. Atalla Martin M. (Menlo Park CA), Method and apparatus for securing data transmissions.
  15. Konheim Alan G. (Yorktown Heights NY), Method and apparatus for transaction and identity verification.
  16. Atalla Martin M. (Menlo Park CA), Method and means for securing the distribution of encoding keys.
  17. Matyas Stephen M. (Kingston NY) Meyer Carl H. W. (Kingston NY), Method for authenticating the identity of a user of an information system.
  18. Attanasio Clement Richard (Peekskill NY) Belady Laszlo Antal (Yorktown Heights NY), Operating system authenticator.
  19. Crafton Paul A. (Potomac MD), Personal authority verification system.
  20. Fak Viiveke (Ryttaregngen 24 S-58266 Linkping SEX) Ingemarsson Ingemar B. (Hedborns gata 2 Linkping SEX S-58249) Blom Rolf (Rydsvgen 318C Linkping SEX) Forchheimer Robert (Braxstigen 5 S-13500 TyresS, Personal identification system.
  21. Trenkamp Robert H. (Cleveland Heights OH), Security means for transaction terminal system.
  22. Campbell Carl M. (Newtown Square PA), Security system for electronic funds transfer system.
  23. Donald Thomas C. (2651 Rillwood Rd. Birmingham AL 35243) Donald Henry W. (428 Lakewood Dr. Homewood AL 35209), Software protection system.
  24. Sendrow Marvin (4609 Logsdon Dr. Annandale VA 22003), System for authenticating users and devices in on-line transaction networks.
  25. Anderson Thomas G. (Los Altos CA) Boothroyd William A. (San Jose CA) Frey Richard C. (San Jose CA), Transaction execution system with secure data storage and communications.

이 특허를 인용한 특허 (196)

  1. Ebisawa,Kan, Apparatus and method for executing a game program having advertisements therein.
  2. Dunham Michael D. (Shorewood WI) Dykstra Thomas M. (Mequon WI) Vahlsing Donald W. (Grafton WI) Ehlers Paul L. (Menasha WI), Apparatus for controlling the use of computer software.
  3. Lam, Josiah; McGovern, Mark D., Application access control system.
  4. Lam, Josiah; McGovern, Mark D., Application access control system.
  5. Walker Robin D. (Glasgow GB6), Code operated access control system for electronic data store.
  6. Takeda Harumi,JPX ; Kamijo Akihiko,JPX ; Wada Ayao,JPX, Coding device, decoding device and IC circuit.
  7. Teruyama, Katsuyuki, Communication system and communication method.
  8. Teruyama, Katsuyuki, Communication system and communication method.
  9. Teruyama, Katsuyuki, Communication system and communication method for communication based on encryption capabilities of device.
  10. Miller Phillip R., Computer security key.
  11. Leal Luis T. (938 Noble Pl. Toledo OH 43608), Computer security system.
  12. Etchegoyen, Craig S., Customer notification program alerting customer-specified network address of unauthorized access attempts to customer account.
  13. Liu, Hui, Data encryption and decryption method and apparatus.
  14. Mineo Akira (Sagamihara JPX), Data processing security system for automatically transferring software protection data from removable store into intern.
  15. Umebayashi,Yuu; Den,Etsu; Yamanaka,Yusuke; Sasaki,Takaoki, Data protection program and data protection method.
  16. Nonaka, Akira; Ezaki, Tadashi, Data providing system and method therefor.
  17. Yamakawa, Teruji; Imamura, Kiyomi, Data storage device and control method therefor.
  18. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  19. Etchegoyen, Craig S., Device-specific content delivery.
  20. Etchegoyen, Craig S., Device-specific content delivery.
  21. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  22. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  23. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  24. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  25. Yu Che-Fn (Chelmsford MA), Distributed security procedure for intelligent networks.
  26. Dunn, John P.; Ledford, Stephen; Jackson, Steve H.; Wood, Albert G., Electronic payment clearing and check image exchange systems and methods.
  27. Dunn, John P.; Ledford, Stephen; Jackson, Steve H.; Wood, Albert G., Electronic payment clearing and check image exchange systems and methods.
  28. Boroditsky Marc D. ; Manza Marc B., Generalized user identification and authentication system.
  29. Boroditsky Marc D. ; Manza Marc B., Generalized user identification and authentication system.
  30. Karp Alan H. (Palo Alto CA), Hardware assist for protecting PC software.
  31. Hughes, Patrick Alan; Elswick, Paul Blair, Inappropriate site management software.
  32. Allbery ; Jr. James D. (Farmington Hills MI) Troisi Peter A. (Westford MA) Johnson Susan J. (Novi MI) Cullen James H. (Bedford MA) Butler Richard L. (Toledo OH) Ferreira James P. (Amherst NH) Ellison, Intelligent process control communication system and method having capability to time align corresponding data sets.
  33. Zeng, Nianning, Internet-based automated system and a method for software copyright protection and sales.
  34. Redding, Mark E.; Badia, Logan A.; Handa, Sandeep; Sharma, Hemant; Chopra, Sanjay; Gupta, Rana; Lal, Poonam, License management system and method for commuter licensing.
  35. Redding, Mark E.; Badia, Logan A.; Handa, Sandeep; Sharma, Hemant; Chopra, Sanjay; Duvvoori, Vikram; Ramamoorthy, Shankar; Tripathy, Ajay, License management system and method with license balancing.
  36. Redding,Mark E.; Badia,Logan A.; Handa,Sandeep; Sharma,Hemant; Chopra,Sanjay; Duvvoori,Vikram; Ramamoorthy,Shankar; Tripathy,Ajay, License management system and method with multiple license servers.
  37. Nakagawa Katsuya (Kusatsu JPX) Yukawa Masayuki (Kyoto JPX), Memory cartridge and information processor unit using such cartridge.
  38. Blumenau Steven M., Method and apparatus for authenticating connections to a storage system coupled to a network.
  39. Wang, Xin; Tadayon, Bijan; DeMartini, Thomas; Raley, Michael; Lao, Guillermo; Chen, Eddie J.; Gilliam, Charles P., Method and apparatus for distributing enforceable property rights.
  40. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  41. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  42. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  43. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  44. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for preventing unauthorized access by a network device.
  45. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  46. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  47. Blumenau, Steven M.; Ofer, Erez; Fitzgerald, John T.; McGillis, James M.; Lippitt, Mark C.; Vishlitzsky, Natan, Method and apparatus for providing data management for a storage system coupled to a network.
  48. Hornbuckle Gary D. (Pebble Beach CA), Method and apparatus for remotely controlling and monitoring the use of computer software.
  49. Schmidt Thomas J. ; Huppert Larry ; Ben-Michael Simoni,ILX ; Ben-Nun Michael,ILX, Method and apparatus for secure remote wake-up of a computer over a network.
  50. Lee Sherman ; MacDonald James R. ; Wisor Michael T., Method and apparatus for serializing microprocessor identification numbers.
  51. Lee Sherman ; MacDonald James R. ; Wisor Michael T., Method and apparatus for software access to a microprocessor serial number.
  52. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  53. Patrick Alan Hughes ; Paul Blair Elswick, Method and system for identifying and locating inappropriate content.
  54. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Method and system for implementing zone-restricted behavior of a computing device.
  55. Lao, Guillermo, Method and system for subscription digital rights management.
  56. Lao, Guillermo, Method and system for subscription digital rights management.
  57. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  58. Durbin, Winnie C.; Zhang, Kun; Singh, Karamjeet; Mehring, Dave; Lamoureux, Thomas Leroy; Zettel, Hubert A.; Butler, Timothy D, Method and system to remotely enable software-based options for a trial period.
  59. Reisman, Richard R., Method for distributing a list of updated content to a user station from a distribution server wherein the user station may defer installing the update.
  60. Reisman, Richard R., Method for distributing content to a user station.
  61. Zurko, Mary Ellen; Casey, Jr., Thomas Andrew; Gasser, Morrie; Hall, Judith Shelhorse; Kahn, Clifford Earl; Mason, Andrew Halstead; Sawyer, Paul Douglas; Kendall, Leslie Richard; Lipner, Steven B., Method for executing trusted-path commands.
  62. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  63. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  64. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  65. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  66. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  67. Sudama Ram (Hudson MA) Griffin David M. (Maynard MA) Johnson Brad (Westerly RI) Sealy Dexter (Boston MA) Shelhamer James (Maynard MA) Tallman Owen H. (Lunenburg MA), Method for providing a security facility for a network of management servers utilizing a database of trust relations to.
  68. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  69. Wolfe Everett W. (Lauderdale Lakes FL), Method of controlling the copying of software.
  70. Cina ; Jr. Vincent J. (Spring Valley NY), Method to prevent use of incorrect program version in a computer system.
  71. Raley, Michael Charles; Chen, Eddie J., Method, system, and device for license-centric content consumption.
  72. Raley, Michael; Chen, Eddie J., Method, system, and device for license-centric content consumption.
  73. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  74. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  75. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  76. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  77. Earnest Lester D. (Los Altos Hills CA), Modular software security.
  78. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Near field authentication through communication of enclosed content sound waves.
  79. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Near field authentication through communication of enclosed content sound waves.
  80. Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
  81. Smith Robert D. (Malibu CA), Occurence and value based security system for computer databases.
  82. Hart, III,John J.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G., Optical storage medium having distortion regions, and a method of modifying an optical storage medium to include distortion regions.
  83. Thomas, George F.; Wood, Albert G.; Pawelczyk, Joseph S.; Friedman, Kenneth H.; Palmese, Paul, Payment identification code and payment system using the same.
  84. Cronce, Paul Allen; Fontana, Joseph M., Portable authorization device for authorizing use of protected information and associated method.
  85. Cronce,Paul Allen; Fontana,Joseph M., Portable authorization device for authorizing use of protected information and associated method.
  86. Busch, Michael-Rainer; Miksch, Andreas, Process for detecting defective component exchanges.
  87. Zurko, Mary Ellen; Casey, Jr., Thomas Andrew; Gasser, Morrie; Hall, Judith Shelhorse; Kahn, Clifford Earl; Mason, Andrew Halstead; Sawyer, Paul Douglas; Kendall, Leslie Richard; Lipner, Steven B., Processing trusted commands in trusted and untrusted environments.
  88. Shimomura Eisuke,JPX ; Yoshida Munehiro,JPX, Program-invocation-count measuring system, program-invocation-count measuring method, and medium for storing program-inv.
  89. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  90. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  91. Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Remote access terminal security.
  92. Manduley Flavio M., Remote activation of software features in a data processing device.
  93. Ballard, Claudio R., Remote image capture with centralized processing and storage.
  94. Ballard, Claudio R., Remote image capture with centralized processing and storage.
  95. Raley, Michael; Gilliam, Charles P.; Ham, Manuel; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  96. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  97. Sonobe Masayuki,JPX, Secret information protection system.
  98. Scott Glenn C. ; Stoltz Benjamin J., Secure file system.
  99. Shavit Nir N., Secure software system and related techniques.
  100. Schier, John E., Secure voice communication system.
  101. Wright, Christopher J.; Hufford, Patrick; Rolon, Terry; Robertson, Jonathan K.; Stehnach, Thomas; Jalan, Rajkumar, Securing an access provider.
  102. Barrett, Joseph G.; Wright, Christopher J.; Blake, Victor R.; Stehnach, Thomas; Jalan, Rajkumar, Securing an accessible computer system.
  103. Aoyama Mitsunobu (Oome JPX), Security administrator for automatically updating security levels associated with operator personal identification data.
  104. Howlette Edward L. (1814 Metzerott Rd. ; Apt. 13 Adelphi MD 20783), Security system for computer software.
  105. Hibino Toshiro (Kyoto-fu JPX) Yamato Satoshi (Kyoto-fu JPX), Security systems and methods for a videographics and authentication game/program fabricating device.
  106. Hashimoto,Naotaka; Hoshino,Yutaka; Ikeda,Shuji, Semiconductor integrated circuit device having capacitor element.
  107. Postlewaite William M. ; Vogel Kim J. ; Maynard Jason ; Poole Vincent, Smart card reader having multiple data enabling storage compartments.
  108. Reisman, Richard R., Software and method for monitoring a data stream and for capturing desired data within the data stream.
  109. Reisman, Richard R., Software and method that enables selection of on-line content from one of a plurality of network content service providers in a single action.
  110. Reisman, Richard R., Software and method that enables selection of one of a plurality of network communications service providers.
  111. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  112. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  113. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  114. Chernow Fred (360 Kiowa Pl. Boulder CO 80303) Peterson Randy J. (1330 Arapahoe St. Boulder CO 80302), Software distribution system.
  115. Akiyama, Ryota; Yoshioka, Makoto, Software encoding using a combination of two types of encoding and encoding type identification information.
  116. Steinberg Henry L. ; Gordon Scott B., Software fingerprinting and branding.
  117. Chandra Ashileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocess.
  118. Benson Glenn,DEX, Software rental system and method for renting software.
  119. Moore Steven Jerome, Software security system using remove function to restrict unauthorized duplicating and installation of an application program.
  120. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  121. Kocher, Paul C.; Jun, Benjamin C.; Jaffe, Joshua M., Specialized circuitry for cryptographic authentication and other purposes.
  122. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  123. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  124. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  125. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  126. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  127. Stefik, Mark J.; Pirolli, Peter L. T., System and method for controlling utilization of content.
  128. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  129. Stefik, Mark J.; Pirolli, Peter L. T., System and method for permitting use of content.
  130. Stefik, Mark J.; Pirolli, Peter L. T., System and method for permitting use of content using transfer rights.
  131. Lee Sherman ; MacDonald James R. ; Wisor Michael T., System and method for providing microprocessor serialization using programmable fuses.
  132. Zaitsev, Oleg V.; Grebennikov, Nikolay A.; Monastyrsky, Alexey V.; Pavlyushchik, Mikhail A., System and method for security rating of computer processes.
  133. Redding, Mark E.; Badia, Logan A.; Handa, Sandeep; Sharma, Hemant; Chopra, Sanjay; Duvvoori, Vikram; Ramamoorthy, Shankar; Tripathy, Ajay, System and method for selecting a server in a multiple server license management system.
  134. Wang, Xin, System and method for specifying and processing legality expressions.
  135. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  136. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  137. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  138. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  139. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  140. Kurihara Akira,JPX, System for remotely authenticating access to local software.
  141. Edwards ; Jr. Gordon L. (Easley SC), System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of prote.
  142. Stefik, Mark J.; Pirolli, Peter L. T., System, apparatus, and media for granting access to and utilizing content.
  143. Takeda Genyo,JPX ; Kato Shuhei,JPX ; Nishiumi Satoshi,JPX, Systems and method for providing security in a video game system.
  144. Valenzuela, Edgardo; Chen, Eddie J.; DeMartini, Thomas; Fung, Joseph Zhung Yee; Nguyen, Mai; Tieu, Vincent Hsiang; Tran, Duc, Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates.
  145. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  146. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  147. Howard, Daniel G.; Pagliarulo, Jeffrey A.; Crowley, John R.; Lee, Andrew R.; Hart, III, John J.; Merkle, Jr., James A.; LeVine, Richard B., Systems and methods for media authentication.
  148. Howard, Daniel G.; Pagliarulo, Jeffrey A.; Crowley, John R.; Lee, Andrew R.; Hart, III, John J.; Merkle, Jr., James A.; Levine, Richard B., Systems and methods for media authentication.
  149. Merkle, Jr., James A.; LeVine, Richard B.; Howard, Daniel G.; Lee, Andrew R., Systems and methods for media authentication.
  150. Hart, III, John J.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G., Systems and methods for optical media modification.
  151. Genyo Takeda JP; Shuhei Kato JP; Satoshi Nishiumi JP, Systems and methods for providing security in a video game system.
  152. Takeda Genyo,JPX ; Kato Shuhei,JPX ; Nishiumi Satoshi,JPX, Systems and methods for providing security in a video game system.
  153. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  154. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  155. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  156. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  157. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  158. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  159. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  160. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  161. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  162. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  163. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  164. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  165. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  166. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  167. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  168. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  169. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  170. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  171. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  172. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  173. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  174. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  175. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  176. O'Connor William Y. ; Stanford Donald L. ; Khan Tariq M. ; Hutton Michael A. ; Beason Steve W. ; Angell Robert C., Technique for secure network transactions.
  177. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  178. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  179. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  180. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  181. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  182. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  183. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  184. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  185. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  186. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  187. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  188. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  189. Johri Abhai (Gaithersburg MD) Luckenbaugh Gary L. (Gaithersburg MD), Trusted path mechanism for an operating system.
  190. Miller Arnold ; Neeman Yuval ; Contorer Aaron M. ; Misra Pradyumna K. ; Seaman Michael R. C. ; Rubin Darryl E., Unification of directory service with file system service.
  191. Kocher,Paul C.; Jaffe,Joshua M.; Jun,Benjamin C., Using smartcards or other cryptographic modules for enabling connected devices to access encrypted audio and visual content.
  192. Zurko,Mary Ellen; Casey, Jr.,Thomas Andrew; Gasser,Morrie; Hall,Judith Shelhorse; Kahn,Clifford Earl; Mason,Andrew Halstead; Sawyer,Paul Douglas; Kendall,Leslie Richard; Lipner,Steven B., Verification of trusted-path commands.
  193. Yamato Satoshi,JPX ; Nishiumi Satoshi,JPX ; Suzuki Toshiaki,JPX ; Nakamura Toshiyuki,JPX ; Kimizuka Makoto,JPX, Video game/videographics program editing apparatus with program halt and data transfer features.
  194. Yamato Satoshi (Kyoto-fu JPX) Nishiumi Satoshi (Kyoto-fu JPX) Suzuki Toshiaki (Kyoto-fu JPX) Hotta Takuji (Kyoto-fu JPX) Fujiwara Kazuhiro (Kyoto-fu JPX), Video game/videographics program fabricating system and method with superimpose control.
  195. Suzuki Toshiaki (Kyoto-fu JPX) Yamato Satoshi (Kyoto-fu JPX) Koganezawa Nobuhito (Kyoto-fu JPX) Ozaki Yuichi (Kyoto-fu JPX), Video game/videographics program fabricating system and method with unit based program processing.
  196. Yamato Satoshi (Kyoto-fu JPX) Suzuki Toshiaki (Kyoto-fu JPX), Videographics program/video game fabricating system and method.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로