$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Computer software security system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-007/02
출원번호 US-0739162 (1985-05-30)
발명자 / 주소
  • Joshi Bhagirath S. (11 Sheffield Rd. Waltham MA 02154)
인용정보 피인용 횟수 : 232  인용 특허 : 4

초록

A computer software security system for restricting execution of a computer program to a particular machine, including means for storing a machine identification code in the program and means for determining the presence of the machine identification code in the means for storing during execution of

대표청구항

A computer software security system for restricting execution of a program to a particular machine comprising: first storage means for storing a machine identification code unique to said machine; second storage means for storing a machine identification code in said program; means, responsive to sa

이 특허에 인용된 특허 (4)

  1. Poland Sydney W. (Arlington TX), Calculator program security system.
  2. Westheimer Thomas O. (2 Highland Dr. Peterborough NH 03458) Hipson Peter D. (4 S. Shore Dr. Jaffrey NH 03452), Computer software protection system.
  3. Johnstone ; Richard, Computer software security system.
  4. Herman Morton B. (Huntington Station NY), Software security method using partial fabrication of proprietary control word decoders and microinstruction memories.

이 특허를 인용한 특허 (232)

  1. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., Accessing protected content in a rights-management architecture.
  2. CP, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  3. Cp, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  4. Heidorn Allen J. (Minnetonka MN) Paulson John W. (Edina MN) Dunn Mark E. (Apple Valley MN), Apparatus and method for analyzing vocal audio data to provide accompaniment to a vocalist.
  5. Bealkowski Richard (Delray Beach FL) Blackledge ; Jr. John W. (Boca Raton FL) Cronk Doyle S. (Boca Raton FL) Dayan Richard A. (Boca Raton FL) Dixon Jerry D. (Boca Raton FL) Kinnear Scott G. (Boca Rat, Apparatus and method for preventing unauthorized access to BIOS in a personal computer system.
  6. Rosenberg Jonathan ; Gandhi Munish ; Werth Andrew, Apparatus and method for tracking world wide web browser requests across distinct domains using persistent client-side state.
  7. Sharma, Rosen; Bhargava, Rishi; Vittal, Chiradeep; Eranky, Shyam, Application change control.
  8. Narin, Attila; DeMello, Marco A.; Yaacovi, Yoram; Alger, Jeffrey A.; Keely, Leroy B.; Silver, David Michael; Madonna, Christopher Robert Richard; Beezer, John; Hughes, Kathryn E., Architecture for an electronic shopping service integratable with a software application.
  9. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Malik,Prashant; Hughes,Kathryn E.; Byrum,Frank D., Asynchronous communication within a server arrangement.
  10. Paulson John W. (Edina MN) Dunn Mark E. (Apple Valley MN) Heidorn Allen J. (Minnetonka MN), Automated accompaniment apparatus and method.
  11. Cromer,Daryl C.; Locker,Howard J.; Springfield,Randall S., Autonomic binding of subsystems to system to prevent theft.
  12. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  13. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  14. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  15. Walker Robin D. (Glasgow GB6), Code operated access control system for electronic data store.
  16. Michael J. Reed ; Michael F. Lavery, Computer software delivery system.
  17. Reed Michael J. (Austin TX) Lavery Michael F. (Austin TX), Computer software delivery system.
  18. Reed Michael J. ; Lavery Michael F., Computer software delivery system.
  19. Reed Michael J. ; Lavery Michael F., Computer software delivery system.
  20. Sebes, E. John; Bhargava, Rishi; Reese, David P., Connectivity-based authorization.
  21. Sebes, E. John; Shah, Bakul; Sharma, Rosen, Containment of network communication.
  22. Sebes, E. John; Shah, Bakul; Sharma, Rosen, Containment of network communication.
  23. Sprong Katherine A. ; Sprong Donald J., Controlled usage software.
  24. Tsumura Tomoki,JPX, Copy preventing system for multi-media equipment.
  25. Kim, Mun Seok, DRM content player and play method for portable terminal.
  26. Shah,Bakul; Sharma,Rosen; Haight,Peter, Damage containment by translation.
  27. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  28. Litterst George F. ; Weinstock Frank M., Device for controlling a musical performance.
  29. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  30. Nobuhiro Yamada JP; Kazuhiko Matsuoka JP, Electronic score tracking musical instrument.
  31. Yanase Kazuya,JPX ; Yamada Nobuhiro,JPX ; Matsuoka Kazuhiko,JPX, Electronic score tracking musical instrument.
  32. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  33. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  34. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  35. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  36. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  37. Bhargava, Rishi; Sebes, E. John, Execution environment file inventory.
  38. Hughes, Aidan T.; Pearce, David Barnaby, Hardware ID to prevent software piracy.
  39. Hughes,Aidan T.; Pearce,David Barnaby, Hardware ID to prevent software piracy.
  40. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  41. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  42. Elks,Carl R.; Bateman,Alec, Idiosyncratic emissions fingerprinting method for identifying electronic devices.
  43. DeMello, Marco A.; Zeman, Pavel; Krishnaswamy, Vinay; Byrum, Frank D., Inter-server communication using request with encrypted parameter.
  44. Zeng, Nianning, Internet-based automated system and a method for software copyright protection and sales.
  45. Bader, James E.; Waters, II, Jack R.; Beaubien, Eric R., Key interface for secure object manipulation.
  46. Chew, Chee; Calligaro, Michael P.; Fortier, Dominique; Peev, Igor Borisov, Keyed-build system for controlling the distribution of software.
  47. Howarth David I. (Middlesex MA), Keyring metaphor for user\s security keys on a distributed multiprocess data system.
  48. Brindze Paul L. ; Tully Geoffrey A., Mass storage element and drive unit therefor.
  49. Watanabe,Momoto; Sano,Hiroaki; Hanawa,Makoto, Method and a device for allowing only a specific kind of hardware to correctly execute software.
  50. Bhargava, Rishi; Vittal, Chiradeep; Saveram, Swaroop, Method and apparatus for process enforced configuration management.
  51. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  52. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  53. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  54. Weinstock Frank M. ; Litterst George F., Method and apparatus for real-time correlation of a performance to a musical score.
  55. Weinstock Frank M. ; Litterst George F., Method and apparatus for real-time correlation of a performance to a musical score.
  56. Maier,Hans Ulrich; Rohde,Joachim, Method and device for non-destructively recovering data in a data processing system.
  57. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  58. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of networked application client software by explicit human input.
  59. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  60. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  61. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  62. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  63. Rackman Michael I. (1710 Glenwood Rd. Brooklyn NY 11230), Method and system for limiting multi-user play of video game cartridges.
  64. DeMello, Marco A.; Yaacovi, Yoram; Zeman, Pavel, Method and system for limiting the use of user-specific software features.
  65. Mohinder, Preet, Method and system for providing user space address protection from writable memory area in a virtual environment.
  66. Colligan Tom ; Ellis Jonathan ; Robertson Hunter, Method and system for supplying a custom software image to a computer system.
  67. Civanlar Mehmet Reha, Method and system of using personal information as a key when distributing information.
  68. Schull,Jonathan, Method for adapting a software product to an environment.
  69. DeMello,Marco A.; Narin,Attila; Yaacovi,Yoram, Method for authenticating and securing integrated bookstore entries.
  70. Schull,Jonathan, Method for causing a digital product to revert to a demo mode.
  71. Wyatt Stuart Alan, Method for defining and verifying user access rights to a computer information.
  72. Larsson Jeffrey E. ; Richardson Alan ; Steckler Paul A., Method for preventing software piracy during installation from a read only storage medium.
  73. Schull,Jonathan, Method for selling, protecting, and redistributing digital goods.
  74. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  75. Weirauch, Charles R; Reid, C Shane, Method for tracking the devices used to load, read, and write removable storage media.
  76. Schull,Jonathan, Method of altering a software product in response to predetermined events.
  77. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for computer system denial-of-service protection.
  78. Bhargava, Rishi; Reese, Jr., David P., Method of and system for computer system state checks.
  79. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for malicious software detection using critical address space protection.
  80. Saraf, Suman; Agrawal, Sharad; Srivastava, Vivek, Method of and system for reverse mapping vnode pointers.
  81. Bates Roger D. (Aloha OR) Ketterer Scott R. (6781 SE. 68th Ct. Hillsboro OR 97123) Bridgman John (Scarborough CAX), Method of cataloging removable media on a computer.
  82. Ketterer Scott R. ; Bates Roger D. ; Bridgman John,CAX, Method of cataloging removable media on a computer.
  83. Wolfe Everett W. (Lauderdale Lakes FL), Method of controlling the copying of software.
  84. Takala, Janne Petteri; Muukka, Olli Pekka Juhani; Tamminen, Rauno Juhani; Jarvinen, Janne Johannes, Method, apparatus, and computer program product for managing software versions.
  85. Jaquette, Glen Alan, Method, system, and program for securely providing keys to encode and decode data in a storage cartridge.
  86. Jaquette, Glen Alan, Method, system, and program for securely providing keys to encode and decode data in a storage cartridge.
  87. Kasahara, Eiji, Methods and apparatus for distributing software applications.
  88. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  89. Shimada, Muneki; Okada, Toyoshi; Kimoto, Yousuke; Kanee, Kazuhiro; Komaki, Kenjiro, Methods and apparatus for secure distribution of program content.
  90. Shimada,Muneki; Okada,Toyoshi; Kimoto,Yousuke; Kanee,Kazuhiro; Komaki,Kenjiro, Methods and apparatus for secure distribution of program content.
  91. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  92. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  93. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  94. Pattinson, Neville; Somogyi, Tibor; Pietrzyk, Jean-Marc; Du Castel, Bertrand, Metrology device with programmable smart card.
  95. Etchegoyen, Craig S., Modular software protection.
  96. Sebes, E. John; Bhargava, Rishi; Naik, Dilip, Piracy prevention using unique module translation.
  97. Sebes, E. John; Bhargava, Rishi; Naik, Dilip, Piracy prevention using unique module translation.
  98. Otsuka, Motoi, Portable terminals, servers, systems, and their program recording mediums.
  99. Sung Chiakang, Program compatibility recognition for a programmable logic device.
  100. Bhargava, Rishi; Sebes, E. John, Program-based authorization.
  101. Bhargava, Rishi; Sebes, E. John, Program-based authorization.
  102. Wang, Jiahe Helen; Fan, Xiaofeng; Jackson, Collin Edward; Howell, Jonathan Ryan; Xu, Zhenbin, Protection and communication abstractions for web browsers.
  103. Perri de Resende, Otavio Marcio, Sales point business method and apparatus.
  104. Edenson, Roy I.; van Kessel, Peter F.; Hewlett, Gregory J.; Breedlove, Paul S.; Werner, William B.; Elliott, Keith H., Secure distribution of digital data.
  105. Holmes Lyndon S. ; King ; III James, Secure electronic publishing system.
  106. Gunyakti, Caglar; Miller, Ronald W.; Tan, Xiaoxi (Michael), Secure machine counting.
  107. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  108. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  109. Bond Barry ; Bharati Sudeep, Security enhancement for untrusted executable code.
  110. Howlette Edward L. (1814 Metzerott Rd. ; Apt. 13 Adelphi MD 20783), Security system for computer software.
  111. Montgomery, Michael A., Smart card application-selection.
  112. Thomas, Andrew James; Skrebels, Mark; Irvine, Stewart, Software configuration of module dependent on history.
  113. Steinberg Henry L. ; Gordon Scott B., Software fingerprinting and branding.
  114. Sebes, E. John; Vaishnav, Jay, Software modification by group to minimize breakage.
  115. Bahar, Reuben, Software piracy prevention through remote enforcement of an activation threshold.
  116. Moore Steven Jerome, Software security system using remove function to restrict unauthorized duplicating and installation of an application program.
  117. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  118. Sebes, E. John, Solidifying the executable software set of a computer.
  119. Sebes, E. John, Solidifying the executable software set of a computer.
  120. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  121. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  122. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  123. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  124. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  125. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  126. DeMello, Marco; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  127. DeMello,Marco A.; Krishnaswamy,Vinay; Manferdelli,John L., System and method for accessing protected content in a rights-management architecture.
  128. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy B.; Yaacovi,Yoram; Alger,Jeffrey H., System and method for activating a rendering device in a multi-level rights-management architecture.
  129. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy Bertrand; Yaacovi,Yoram; Alger,Jeffrey A., System and method for activating a rendering device in a multi-level rights-management architecture.
  130. Richardson, Ric B., System and method for adjustable licensing of digital products.
  131. Montgomery Michael A. ; Guthery Scott B. ; du Castel Bertrand, System and method for an ISO7816 complaint smart card to become master over a terminal.
  132. DeMello, Marco A.; Narin, Attila; Setty, Venkateshaiah, System and method for client interaction in a multi-level rights-management architecture.
  133. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  134. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  135. Schull,Jonathan, System and method for controlling access to protected information.
  136. Schull,Jonathan, System and method for creating and running protected information.
  137. Bhattacharjee, Rajbir; Munjal, Nitin; Singh, Balbir; Singh, Pankaj, System and method for critical address space protection in a hypervisor environment.
  138. Schull, Jonathan, System and method for distributing protected information.
  139. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  140. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  141. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  142. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for host-initiated firewall discovery in a network environment.
  143. Manferdelli,John L.; Marr,Michael David; Krishnaswamy,Vinay; Jakubowski,Mariusz H., System and method for interfacing a software process to secure repositories.
  144. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  145. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  146. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  147. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  148. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  149. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  150. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  151. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  152. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  153. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  154. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  155. Sawhney, Harvinder Singh; Saraf, Suman; Sharma, Rosen, System and method for managing virtual machine configurations.
  156. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  157. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  158. Schull,Jonathan, System and method for operating a licensing server.
  159. Bhargava, Rishi; Reese, Jr., David P., System and method for passive threat detection using virtual memory inspection.
  160. Agarwal, Sonali; Tarbotton, Lee Codel Lawson, System and method for preventing data loss using virtual machine wrapped applications.
  161. Schull,Jonathan, System and method for processing protected audio information.
  162. Schull, Jonathan, System and method for processing protected text information.
  163. Schull,Jonathan, System and method for processing protected video information.
  164. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  165. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  166. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  167. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  168. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  169. Sancho, Enrique David, System and method for secure network purchasing.
  170. Weiler, Jonathan Frederic; Garizas, Charles; Shah, Keyush Dhirajlal, System and method for secure software installation.
  171. Zaitsev, Oleg V.; Grebennikov, Nikolay A.; Monastyrsky, Alexey V.; Pavlyushchik, Mikhail A., System and method for security rating of computer processes.
  172. Schull, Jonathan, System and method for selectively changing parameter settings based on lineage analysis of digital information.
  173. Schull,Jonathan, System and method for selectively enabling access based on lineage analysis of digital information.
  174. Bhargava, Rishi; Reese, Jr., David P., System and method for selectively grouping and managing program files.
  175. Schull,Jonathan, System and method for selling protected information in an oem context.
  176. Weirauch, Charles R.; Nijboer, Jakob Gerrit; Steenbergen, Christiaan, System and method for writing data and a time value to an addressable unit of a removable storage medium.
  177. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  178. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  179. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  180. Nash, Kenneth L., System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection.
  181. Hurley John C., System, method and article of manufacture for product return of software and other information.
  182. Etchegoyen, Craig S., Systems and methods for game activation.
  183. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  184. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  185. LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  186. LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
  187. Levine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  188. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  189. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  190. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  191. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  192. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  193. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  194. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  195. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  196. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  197. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  198. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  199. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  200. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  201. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  202. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  203. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  204. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  205. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  206. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  207. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  208. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  209. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  210. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  211. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  212. Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  213. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  214. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  215. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  216. Miller, Ronald W.; Tan, Xiaoxi, Systems and methods for using machine attributes to deter software piracy in an enterprise environment.
  217. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  218. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  219. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  220. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  221. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  222. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  223. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  224. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  225. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  226. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  227. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  228. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  229. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  230. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  231. Guthery Scott B., Validating and certifying execution of a software program with a smart card.
  232. Alabraba,Ferdinand Jay; Hughes,Aidan T.; Gunyakti,Caglar, Verbose hardware identification for binding a software package to a computer system having tolerance for hardware changes.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로