$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Selective-subscription descrambling 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04N-007/167
  • H04N-007/00
  • H04L-009/00
출원번호 US-0618917 (1984-06-08)
발명자 / 주소
  • Gilhousen Klein S. (San Diego CA) Heller Jerrold A. (San Diego CA) Van Harding Michael (San Diego CA) Blakeney
  • II Robert D. (Del Mar CA)
출원인 / 주소
  • M/A-COM Government Systems, Inc. (San Diego CA 02) Cable/Home Communication Corp. (San Diego CA 02)
인용정보 피인용 횟수 : 224  인용 특허 : 21

초록

A system in a subscriber television network for enabling descrambling of a received scrambled signal on a prepaid basis and/or an impulse-purchase basis. A received mask signal uniquely related to the scrambled signal is compared with a received authorization signal indicating whether the subscriber

대표청구항

In a subscriber communication network a system for verifying charge information furnished to a broadcast company by a given subscriber and purported by the subscriber as having been displayed at the subscriber terminal, comprising means at the subscriber terminal for providing a debit signal indicat

이 특허에 인용된 특허 (21)

  1. Campbell, John G.; Schoeneberger, Carl F.; Bundens, Allan B.; Fogle, Richard M.; Lemburg, John R., Addressable cable television control system with video format data transmission.
  2. Kleykamp Gayheart C. (Ahwatukee AZ) Goldwater Sam (Phoenix AZ) Salsbery Charles L. (Phoenix AZ), Addressable premium channel obfuscation device for cable television systems.
  3. Dumbauld Lewis D. (Phoenix AZ) Tash Gilbert L. (San Clemente CA), Addressable subscriber cable television system.
  4. Barnhart Andrew Wayne (Dresher PA), Bilateral communications system for distributing commerical and premium video signaling on an accountable basis.
  5. Pires H. George (Parlin NJ), Billing method and system for a subscriber of a pay television system.
  6. Okubo Kazutomo (Matsutoh JPX), CATV Pay system.
  7. Matsumoto Katsuaki (Tokyo JPX) Saeki Yoshifumi (Tokyo JPX) Tazawa Osamu (Tokyo JPX) Kosaka Minoru (Tokyo JPX) Saito Masaki (Tokyo JPX) Uemura Hiroki (Tokyo JPX) Kanazashi Tetuo (Tokyo JPX) Hashimoto , Interactive CATV system.
  8. Arn Robert M. (Toronto CAX) Csanky Peter H. (Toronto CAX) Waszek Glen F. (Toronto CAX), Method and apparatus for scrambling and unscrambling data streams using encryption and decryption.
  9. Block Robert S. (Marina Del Ray CA) Lull John M. (Fullerton CA), Method and system for remote reporting, particularly for pay television billing.
  10. Block Robert S. (8620 N. Pelham Pkwy. Milwaukee WI 53217) Martin John R. (3129 W. Mill Rd. Milwaukee WI 53209), Method and system for subscription television billing and access.
  11. Block Robert S. (Marina Del Ray CA) Martin John R. (Milwaukee WI), Method and system for subscription television billing and access.
  12. Block Robert S. (Marina Del Ray CA) Martin John R. (Milwaukee WI), Method and system for subscription television billing and access.
  13. Aminetzah Yehuda J. (Nepean CAX), Method of controlling scrambling and unscrambling in a pay TV system.
  14. Chomet ; Marc, Pay television system.
  15. Pires ; H. George, Pay television system utilizing binary coding.
  16. Ricketts Luther W. (Fort Wayne IN) Dormans Paul M. (Fort Wayne IN), Premium interactive communication system.
  17. Lee Lin-nan (Germantown MD) Fang Russell J. (Brookeville MD), Security system for SSTV encryption.
  18. Pires ; H. George, Telephone billing apparatus for a subscription television system.
  19. den Toonder Pieter (Dordrecht IL NLX) Doles Glenn P. (Wonder Lake IL) Lund John A. (McHenry Shore\s IL) Merrell Richard G. (Hebron IL) Stubbs Graham S. (Poway CA 4), Television coding system with channel level identification.
  20. Anderson Thomas G. (Los Altos CA) Boothroyd William A. (San Jose CA) Frey Richard C. (San Jose CA), Transaction execution system with secure data storage and communications.
  21. Bluestein Leo I. (Rancho Bernardo CA) Crandell Paul E. (San Diego CA) Drake David A. (Escondido CA) Jedynak Leo (San Diego CA) Simpson Larry W. (Poway CA), Two level encripting of RF signals.

이 특허를 인용한 특허 (224)

  1. Bahar, Reuben, Activation code system and method for preventing software piracy.
  2. Arnold Terry Sutton, Apparatus and method for establishing a crytographic link between elements of a system.
  3. Terry Sutton Arnold, Apparatus and method for establishing a crytographic link between elements of a system.
  4. DeFreese, Darryl L.; Seaman, Jeffrey M.; Wasilewski, Anthony J., Authentication of entitlement authorization in conditional access systems.
  5. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Banker, Robert O., Authorization of services in a conditional access system.
  6. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Banker, Robert O., Authorization of services in a conditional access system.
  7. Cao,Adrean T., Auxiliary program association table.
  8. Pedlow, Jr.,Leo M.; Agnihotri,Davender, Batch mode session-based encryption of video on demand content.
  9. Pedlow, Jr., Leo M.; Agnihotri, Davender, Bi-directional indices for trick mode video-on-demand.
  10. Tanaka Hideo (Tokyo JPX), Chargeable program receiving limit setting system in two-way cable television system.
  11. Pedlow, Jr.,Leo M., Composite session-based encryption of video on demand content.
  12. Newby Charles F. ; Harding Michael V., Conditional access system.
  13. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Palgon, Michael S., Conditional access system.
  14. Newby Charles F. ; Harding Michael V., Conditional access system, display of authorization status.
  15. Newby Charles F. ; Harding Michael V., Conditional access system, downloading of cryptographic information.
  16. Kitazato, Naohisa; Dewa, Yoshiharu; Katayama, Yasushi; Shimoji, Tatsuya; Kagemoto, Hideki; Tokuda, Katsumi; Murakami, Hiroki, Content distribution system and distribution method, and content processing device and processing method.
  17. Candelore, Brant L., Content personalization for digital content.
  18. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, Jon D., Content replacement by PID mapping.
  19. Bonan,James; Candelore,Brant L.; Eyer,Mark Kenneth, Content scrambling with minimal impact on legacy devices.
  20. Bennett Christopher J. (San Diego CA), Controlled authorization of descrambling of scrambled programs broadcast between different jurisdictions.
  21. Unger,Robert Allan; Candelore,Brant L., Critical packet partial encryption.
  22. Ryal,Kim Annon, Decryption system.
  23. Candelore, Brant L., Descrambler.
  24. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  25. Candelore, Brant L., Digital rights management of a digital device.
  26. Pedlow, Jr.,Leo M.; Agnihotri,Davender, Dynamic composition of pre-encrypted video on demand content.
  27. Pedlow, Jr.,Leo M.; Candelore,Brant L.; Derovanessian,Henry, Encryption and content control in a digital broadcast system.
  28. Gammie Keith B. (Markham CAX), External security module for a television signal decoder.
  29. Gammie,Keith B., External security module for a television signal decoder.
  30. Tanaka Masakatsu,JPX, Floor panel joint structure and method of making a wooden building with the same.
  31. Candelore, Brant L., IP delivery of secure digital content.
  32. Bennett Christopher J. (San Diego CA), IPPV programming distribution control system.
  33. Itkis,Yevgeny Yakov (Gene), Key management for content protection.
  34. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, John, Macro-block based content replacement by PID mapping.
  35. Wasilewski, Anthony J.; Seaman, Jeffery M.; Defreese, Darryl L., Mechanism and apparatus for encapsulation of entitlement authorization in conditional access system.
  36. Candelore, Brant L., Mechanism for protecting the transfer of digital content.
  37. Katznelson Ron D. (San Diego CA), Metering retrieval of encrypted data stored in customer data retrieval terminal.
  38. Candelore, Brant L.; Eyer, Mark, Method and apparatus for implementing revocation in broadcast networks.
  39. Candelore, Brant L., Method and apparatus for protecting the transfer of data.
  40. Hillier,Stephen William; Solanki,Dineshbhai; Jacksch,Eric C., Method and apparatus for secure communications using third-party key provider.
  41. Candelore,Brant L., Method and apparatus for securing control words.
  42. Dawson, Thomas Patrick, Method and apparatus for synchronizing dynamic graphics.
  43. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  44. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  45. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  46. You, Cheol Woo; Kim, Ki Jun; Yun, Young Woo; Kwon, Soon Yil, Method for scrambling packet data using variable slot length and apparatus thereof.
  47. Candelore, Brant L., Method for simulcrypting scrambled data to a plurality of conditional access devices.
  48. Candelore, Brant L., Method for simulcrypting scrambled data to a plurality of conditional access devices.
  49. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  50. Davies Andrew K. (Purley GB2), Method of and an arrangement for digital signal encryption.
  51. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  52. Pinder, Howard G.; Woodward, Jr., William D.; Evans, Jonathan Bradford; Wasilewski, Anthony J., Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system.
  53. Pinder,Howard G.; Woodward, Jr.,William D.; Evans,Jonathan Bradford; Wasilewski,Anthony J., Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system.
  54. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  55. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  56. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  57. Etchegoyen, Craig S., Modular software protection.
  58. Pitts W. Hampton (Nashville TN) Thomas Ronald G. (Nashville TN), Monitoring and reporting system for remote terminals.
  59. Candelore,Brant L., Multi-process descrambler.
  60. Candelore, Brant L., Multiple DRM management.
  61. Candelore,Brant L., Multiple partial encryption using retuning.
  62. Candelore, Brant L., Parental control of displayed content using closed captioning.
  63. Pinder,Howard; Evans,Jonathan Bradford; Wasilewski,Anthony J.; Woodward, Jr.,William D., Partial dual encrypted stream utilizing program map tables.
  64. Pinder, Howard G.; Evans, Jonathan Bradford; Wasilewski, Anthony J.; Woodward, Jr., William D., Partial dual-encryption using program map tables.
  65. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M., Partial encryption and PID mapping.
  66. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M., Partial encryption and PID mapping.
  67. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M., Partial encryption and PID mapping.
  68. Masuda, Isao; Goto, Yoshimasa; Harada, Takenosuke; Machida, Kazuhiro; Kataoka, Mitsuteru, Pay broadcasting system with enhanced security against illegal access to a down loaded program in a subscriber terminal.
  69. Matsuzaki Natsume,JPX ; Tatebayashi Makoto,JPX ; Ohmori Motoji,JPX, Pay information providing system for descrambling information from plural sources and rescrambling the information before sending to a terminal or terminals.
  70. Bestler Charles B. (Chicago IL) Citta Richard W. (Oak Park IL) Gosc Paul M. (Buffalo Grove IL), Pay per view television signaling method.
  71. Pedlow, Jr., Leo M.; Agnihotri, Davender, Preparation of content for multiple conditional access methods in video on demand.
  72. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Progressive video refresh slice detection.
  73. Takahashi, Richard J.; Zhang, Minda, Protecting information in a system.
  74. Zhang, Minda; Takahashi, Richard J., Protection of information transmitted over communications channels.
  75. Hayashi Toshihide (Tokyo JPX) Kanayama Ikuo (Kanagawa JPX) Kanno Masayoshi (Tokyo JPX), Receiver for pay television.
  76. Akins, III, Glendon L.; Banker, Robert O.; Palgon, Michael S.; Pinder, Howard G.; Wasilewski, Anthony J., Representing entitlements to service in a conditional access system.
  77. Bennett Christopher J. (San Diego CA) Harding Michael V. (San Diego CA) Moroney Paul (Cardiff-by-the-Sea CA), Reproduction of secure keys by using distributed key generation data.
  78. Zhang, Minda; Takahashi, Richard J., Secure communication over a link.
  79. Kim, Dae-youb; Kim, Hwan-joon; Sung, Maeng-hee; Jin, Weon-il, Security device and head end in conditional access system and method for controlling illegal use in the system.
  80. Candelore,Brant L., Selective encryption to enable multiple decryption keys.
  81. Candelore,Brant L.; Poslinski,Tom, Selective encryption to enable trick play.
  82. Candelore, Brant L., Selective encryption with coverage encryption.
  83. Ram, Prasad; Ta, Thanh T.; Wang, Xin, Self-protecting documents.
  84. Wang, Xin; Ta, Thanh T.; Ram, Prasad, Self-protecting documents.
  85. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and method.
  86. Harvey, John C.; Cuddihy, James W., Signal processing apparatus and methods.
  87. Harvey, John C.; Cuddihy, James W., Signal processing apparatus and methods.
  88. Harvey, John Christopher; Ciddihy, James William, Signal processing apparatus and methods.
  89. Harvey, John Christopher; Cuddihy, James Willam, Signal processing apparatus and methods.
  90. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  91. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  92. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  93. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  94. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  95. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  96. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  97. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  98. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  99. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  100. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  101. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  102. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  103. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  104. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  105. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  106. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  107. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  108. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  109. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  110. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  111. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  112. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  113. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  114. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  115. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  116. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  117. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  118. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  119. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  120. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  121. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  122. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  123. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  124. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  125. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  126. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  127. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  128. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  129. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  130. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  131. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  132. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  133. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  134. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  135. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  136. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  137. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  138. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  139. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  140. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  141. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  142. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  143. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  144. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  145. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  146. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  147. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  148. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  149. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  150. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  151. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  152. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  153. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  154. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  155. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  156. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  157. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  158. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  159. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  160. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  161. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  162. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  163. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  164. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  165. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Slice mask and moat pattern partial encryption.
  166. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  167. Akins, III, Glendon L.; Banker, Robert O.; Palgon, Michael S.; Pinder, Howard G.; Wasilewski, Anthony J., Source authentication of download information in a conditional access system.
  168. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Star pattern partial encryption.
  169. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  170. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  171. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  172. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  173. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  174. Richardson, Ric B., System and method for adjustable licensing of digital products.
  175. Oren Joseph Eugene ; Schumann Robert W. ; Walko Lisa S. ; McQueen Kevin S., System and method for movie transaction processing.
  176. Pedlow, Jr.,Leo M.; Derovanessian,Henry; Candelore,Brant, System and method for partially encrypted multimedia stream.
  177. Medvinsky,Alexander; Moroney,Paul; Sprunk,Eric; Peterka,Petr, System and method for providing authorized access to digital content.
  178. Candelore, Brant L.; Pedlow, Jr., Leo M., System and method for the creation, synchronization and delivery of alternate content.
  179. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  180. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  181. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  182. Candelore, Brant L., System, method and apparatus for secure digital content transmission.
  183. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  184. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  185. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  186. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  187. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  188. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  189. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  190. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  191. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  192. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  193. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  194. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  195. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  196. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  197. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  198. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  199. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  200. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  201. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  202. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  203. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  204. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  205. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  206. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  207. Candelore, Brant L., Targeted advertisement selection from a digital stream.
  208. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  209. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  210. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  211. Candelore, Brant L.; Unger, Robert Allan; Derovanessian, Henry, Time division partial encryption.
  212. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  213. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  214. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  215. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  216. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  217. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  218. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  219. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  220. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  221. Candelore,Brant L.; Derovanessian,Henry, Upgrading of encryption.
  222. Pinder Howard G. ; Palgon Michael S. ; Akins ; III Glendon L. ; Banker Robert O., Verification of the source of program information in a conditional access system.
  223. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Video scene change detection.
  224. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Video slice and active region based multiple partial encryption.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로