$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocess 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0927629 (1986-11-05)
발명자 / 주소
  • Chandra Ashileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY)
출원인 / 주소
  • International Business Machines Corp. (Armonk NY 02)
인용정보 피인용 횟수 : 354  인용 특허 : 31

초록

The invention provides a software asset protection mechanism which is based on the separation of the software to be protected from the right to execute that software. Protected software can only be executed on composite computing systems in which a physically and logically secure coprocessor is asso

대표청구항

A method of restricting use of software to an authorized computer comprising the steps of: providing said software in a form in which at least a portion thereof is encrypted, providing an encrypted decryption key for decrypting said encrypted software portion, providing a physically secure coprocess

이 특허에 인용된 특허 (31)

  1. Uchenick Gordon (Baltimore MD), Apparatus and method for preventing unauthorized use of computer programs.
  2. Yarbrough Charles J. (Kenwood CA) Strachan Alan F. (Santa Rosa CA) Weisman Joe (Kenwood CA), Apparatus for controlling the reception of transmitted programs.
  3. Ross Ron (P.O. Box 175 Princeton Junction NJ 08550), Computer program protection method.
  4. Johnstone ; Richard, Computer software security system.
  5. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  6. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Crypto microprocessor for executing enciphered programs.
  7. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Crypto microprocessor that executes enciphered programs.
  8. Best Robert M. (16016 Ninth Ave. Northeast Seattle WA 98155), Cryptographic decoder for computer programs.
  9. Comerford Liam D. (Carmel NY) White Steve R. (Mt. Kisco NY), Hardware key-on-disk system for copy-protecting magnetic storage media.
  10. Markstein ; Peter Willy ; Tritter ; Alan Levi, Hierarchical security mechanism for dynamically assigning security levels to object programs.
  11. Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Implementing a shared higher level of privilege on personal computers for copy protection of software.
  12. Thomas William J. (6146 Winterbrook Dr. San Jose CA 95129), Method and apparatus for controlling usage of a programmable computing machine.
  13. Chou, Wayne W.; Erett, Richard E., Method and apparatus for protecting computer software utilizing an active coded hardware device.
  14. Thomas David C. (Mesa AZ), Method and apparatus for providing security for computer software.
  15. Dozier Harold W. (Carrollton TX), Microcomputer with severable ROM.
  16. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Microprocessor for executing enciphered programs.
  17. Childs ; Jr. Robert H. E. (Cupertino CA) Klebanoff Jack L. (Sunnyvale CA) Pollack Frederick J. (Aloha OR), Microprocessor memory management and protection mechanism.
  18. Chiu Ming-Yee (Mt. Laurel NJ), On-chip microprocessor instruction decoder having hardware for selectively bypassing on-chip circuitry used to decipher.
  19. Attanasio Clement Richard (Peekskill NY) Belady Laszlo Antal (Yorktown Heights NY), Operating system authenticator.
  20. Garcia John D. (San Francisco CA), Personal identification apparatus.
  21. Pailen William (Derwood MD) Harper Jim L. (Olney MD), Protected software access control apparatus and method.
  22. Roberts David J. (Eastleigh GB2) Simmons John (Chandlers Ford GB2), Protection of data processing system against unauthorized programs.
  23. Boebert William E. (Minneapolis MN) Kain Richard Y. (Minneapolis MN), Secure data processing system architecture.
  24. Gaffney, Jr., John E., Software cryptographic apparatus and method.
  25. Levien Raphael L. (Rte. 1 ; Box 19 McDowell VA 24458), Software protection method and apparatus.
  26. Curran Kevin G. (Sudbury MA) Golson Steven E. (Wayland MA) Rode Christian S. (Cambridge MA), Software protection methods and apparatus.
  27. Donald Thomas C. (2651 Rillwood Rd. Birmingham AL 35243) Donald Henry W. (428 Lakewood Dr. Homewood AL 35209), Software protection system.
  28. Herman Morton B. (Huntington Station NY), Software security method using partial fabrication of proprietary control word decoders and microinstruction memories.
  29. Cargile William P. (Half Moon Bay CA), Solid state key for controlling access to computer software.
  30. Cargile William P. (Half Moon Bay CA), Solid state key for controlling access to computer software.
  31. Herve Robert J. L. (Versailles FRX), System and process for identification of persons requesting access to particular facilities.

이 특허를 인용한 특허 (354)

  1. Bahar, Reuben, Activation code system and method for preventing software piracy.
  2. Bealkowski Richard (Delray Beach FL) Blackledge ; Jr. John W. (Boca Raton FL) Cronk Doyle S. (Boca Raton FL) Dayan Richard A. (Boca Raton FL) Dixon Jerry D. (Boca Raton FL) Kinnear Scott G. (Boca Rat, Apparatus and method for preventing unauthorized access to BIOS in a personal computer system.
  3. Rosen Sholom S., Apparatus and method for secure transacting.
  4. Lampson,Butler W.; DeTreville,John D.; England,Paul, Attesting to a value of a register and/or memory region.
  5. Davis Derek L. ; Smith Lionel, Authentication system based on periodic challenge/response protocol.
  6. Greco, Paul M.; Jaquette, Glen A., Automated data storage library with target of opportunity recognition.
  7. Greco, Paul Merrill; Jaquette, Glen Alan, Automated data storage library with target of opportunity recognition.
  8. Lampson, Butler W.; DeTreville, John D.; England, Paul, Boot blocks for software.
  9. Goetz Rudy ; Afghani Bahram ; Anderson Allan D. ; Godding Patrick N. ; Punt Maarten G., Compact transparent dongle device.
  10. Wallach, Steven J.; Brewer, Tony, Compiler for generating an executable comprising instructions for a plurality of different instruction sets.
  11. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  12. Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
  13. Martinek,Michael G.; Jackson,Mark D.; Yoseloff,Mark L., Computerized gaming system, method and apparatus.
  14. Yoseloff, Mark L.; Jackson, Mark D.; Martinek, Michael G.; Brower, Donald A.; DeJournett, John L., Computerized gaming system, method and apparatus.
  15. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  16. Stefik,Mark J., Content rendering device with usage rights.
  17. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  18. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  19. Braia Kimberly Anne ; Cotner Curt Lee ; Mattos Nelson Mendonca ; Nakagawa Randy M. ; Smith Roy Lorenzo ; Wong Jerome Quan, Context-sensitive authorization in an RDBMS.
  20. Tsukamoto, Junichi; Goto, Koichi; Fukushima, Shinichi, Controlled-access broadcast signal receiving system.
  21. Tsukamoto, Junichi; Goto, Koichi; Fukushima, Shinichi, Controlled-access broadcast signal receiving system.
  22. Tsukamoto, Junichi; Goto, Koichi; Fukushima, Shinichi, Controlled-access broadcast signal receiving system.
  23. Saito, Makoto, Controlling database copyrights.
  24. Saito, Makoto, Controlling database copyrights.
  25. Saito, Makoto, Controlling database copyrights.
  26. Park, Tae Joon, Copy prevention method and apparatus for digital video system.
  27. Park, Tae Joon, Copy prevention method and apparatus for digital video system.
  28. Park, Tae Joon, Copy prevention method and apparatus for digital video system.
  29. Park, Tae Joon, Copy prevention method and apparatus for digital video system.
  30. Park, Tae Joon, Copy prevention method and apparatus for digital video system.
  31. Park, Tae Joon, Copy prevention method and apparatus of a digital recording/reproducing system.
  32. Park, Tae Joon, Copy prevention method and apparatus of a digital recording/reproducing system.
  33. Bramhill,Ian Duncan; Sims,Matthew Robert Charles, Copy protection of data.
  34. Steven T. Ansell ; Andrew R. Cherenson ; Mark E. Paley ; Steven B. Katz ; John Michael Kelsey, Jr. ; Bruce Schneier, Copy security for portable music players.
  35. Diehl, Eric; Eluard, Marc; Prigent, Nicolas, Copy-protected software cartridge.
  36. Nakano, Toshihisa; Harada, Shunji; Matsuzaki, Natsume; Tatebayashi, Makoto, Copyright protection system, recording device, and reproduction device.
  37. Saito, Makoto, Data copyright management.
  38. Saito, Makoto, Data copyright management system.
  39. Saito, Makoto, Data management.
  40. Akiyama Ryota,JPX ; Yoshioka Makoto,JPX, Data management module, data reproduction management device and data reproduction management system.
  41. Saito, Makoto, Data management system.
  42. Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; LeMay, Steven G.; Nelson, Dwayne R.; Palchetti, Johnny; Benbrahim, Jamal, Decoupling of the graphical presentation of a game from the presentation logic.
  43. Yoshida Hideki,JPX ; Segawa Hideo,JPX ; Imai Toru,JPX, Decryption key management scheme for software distribution system.
  44. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  45. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  46. Saito, Makoto, Digital content management system and apparatus.
  47. Rowe, Richard E., Digital identification of unique game characteristics.
  48. Rowe,Richard E., Digital identification of unique game characteristics.
  49. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  50. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  51. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  52. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  53. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  54. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  55. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  56. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  57. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  58. Wallach, Steven J.; Brewer, Tony, Dispatch mechanism for dispatching instructions from a host processor to a co-processor.
  59. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  60. Brewer, Tony; Wallach, Steven J., Dynamically configured coprocessor for different extended instruction set personality specific to application program with shared memory storing instructions invisibly dispatched from host processor.
  61. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  62. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  63. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  64. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  65. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  66. Alcorn,Allan E.; Jenkins,Harry H., Electronic gaming apparatus with authentication.
  67. Rosen Sholom S. (New York NY), Electronic ticket presentation and transfer method.
  68. Rosen,Sholom S., Electronic ticket vending system.
  69. Rosen,Sholom S., Electronic transaction apparatus for electronic commerce.
  70. Torii Naoya,JPX ; Iwayama Noboru,JPX ; Takenaka Masahiko,JPX ; Hasebe Takayuki,JPX ; Matsuda Masahiro,JPX, Encoder and decoder.
  71. Jackson, Mark D.; Martinek, Michael G., Encryption in a secure computerized gaming system.
  72. Jackson,Mark D.; Martinek,Michael G., Encryption in a secure computerized gaming system.
  73. Jackson,Mark D.; Martinek,Michael G., Encryption in a secure computerized gaming system.
  74. Martinek,Michael G.; Jackson,Mark D., Encryption in a secure computerized gaming system.
  75. LeMay, Steven G.; Nelson, Dwayne R.; Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; Palchetti, Johnny; Benbrahim, Jamal, Game development architecture that decouples the game logic from the graphics logic.
  76. LeMay, Steven G.; Nelson, Dwayne R.; Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; Palchetti, Johnny; Benbrahim, Jamal, Game development architecture that decouples the game logic from the graphics logic.
  77. Alcorn,Allan E.; Jenkins,Harry H., Gaming apparatus with portrait-mode display.
  78. England, Paul; Peinado, Marcus, Generating, migrating or exporting bound keys.
  79. Goffman, Sergei; Berenzon, Alex; Lenz, Oron; Devor, Tevi; Zhang, Bo; Zahavi, Yoram; Maor, Moshe, Identification and execution of subsets of a plurality of instructions in a more secure execution environment.
  80. Hatakeyama, Akiyuki; Shimakawa, Keiso; Hakamatani, Tadayasu; Tanaka, Makoto, Information processing device and record medium.
  81. Kambayashi, Toru; Akiyama, Koichiro; Tsujimoto, Shuichi; Sumita, Kazuo; Hirakawa, Hideki; Sugaya, Toshihiro, Information recording apparatus, information reproducing apparatus, and information distribution system.
  82. Kambayashi,Toru; Akiyama,Koichiro; Tsujimoto,Shuichi; Sumita,Kazuo; Hirakawa,Hideki; Sugaya,Toshihiro, Information recording apparatus, information reproducing apparatus, and information distribution system.
  83. Yamada Hisashi,JPX ; Ando Hideo,JPX, Information recording medium, recording apparatus, information transmission system, and decryption apparatus.
  84. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  85. Klemba Keith S. ; Merckling Roger,FRX, International cryptography framework.
  86. Kay, Jeffrey B.; Tribble, Eric D.; Williams, Roy; Freeman, Trevor W.; Pearson, Malcolm E., Key distribution for secure messaging.
  87. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  88. Best, Robert M., Linked electronic game systems.
  89. Kapil, Sanjiv; Radovic, Zoran, Memory bus protocol to enable clustering between nodes of distinct physical domain address spaces.
  90. Radovic, Zoran; Loewenstein, Paul; Johnson, John G., Memory corruption detection support for distributed shared memory applications.
  91. Brewer, Tony M.; Magee, Terrell; Andrewartha, J. Michael, Memory interleave for heterogeneous computing.
  92. Brewer, Tony M.; Magee, Terrell; Andrewartha, J. Michael, Memory interleave for heterogeneous computing.
  93. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  94. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  95. Park, Tae Joon, Method and apparatus for descrambling digital video data and digital audio data using control data.
  96. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  97. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  98. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  99. Jakobsson Hakan ; Chaudhry Atif, Method and apparatus for efficiently evaluating exists and not exists equivalent subqueries.
  100. Helbig ; Sr. Walter A, Method and apparatus for enhancing computer system security.
  101. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  102. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  103. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  104. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  105. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  106. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  107. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  108. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  109. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  110. Chou Wayne W. (25 Hauley Pl. Ridgefield CT 06877) Erett Richard E. (78 White Birch La. Stamford CT 06905), Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded.
  111. Beecher David A. (Kirkland WA), Method and apparatus for protection of software in an electronic system.
  112. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  113. Vandergeest, Ron J.; Simzer, Kevin T.; Skinner, Eric R., Method and apparatus for providing user authentication using a back channel.
  114. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  115. Park, Tae Joon, Method and apparatus for scrambling and/or descrambling digital video data and digital audio data using control data.
  116. Lee, Larry A.; Kilmer, Jr., Robert L.; Menigoz, David R., Method and apparatus for selectively denying access to encoded data.
  117. LeMay, Steven G.; Benbrahim, Jamal; Chen, Xuedong, Method and apparatus for software authentication.
  118. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  119. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  120. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  121. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  122. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  123. Markkanen,Panu S., Method and arrangement for securing a digital data file having financial value, terminal operating in the arrangement, and software application employing the method.
  124. Iwayama Noboru,JPX ; Torii Naoya,JPX ; Hasebe Takayuki,JPX ; Takenaka Masahiko,JPX ; Matsuda Masahiro,JPX, Method and device for utilizing data content.
  125. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  126. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  127. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  128. Allen Jonathon Brandon, Method and system for ensuring royalty payments for data delivered over a network.
  129. Chao, Ching-Yun, Method and system for establishing a trust framework based on smart key devices.
  130. Mithal, Ashish K.; Tayebi, Amad, Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof.
  131. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined condition for usage.
  132. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  133. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  134. Chao, Ching-Yun, Method and system for protecting master secrets using smart key devices.
  135. Lao, Guillermo, Method and system for subscription digital rights management.
  136. Lao, Guillermo, Method and system for subscription digital rights management.
  137. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  138. Bade,Steven A.; Chao,Ching Yun, Method and system for using a compact disk as a smart key device.
  139. Danny Hendler IL; Jonathan Levy IL; Avi Mendelson IL, Method for accelerating java virtual machine bytecode verification, just-in-time compilation and garbage collection by using a dedicated co-processor.
  140. Schull,Jonathan, Method for adapting a software product to an environment.
  141. Tayebi,Amad; Mithal,Ashish K., Method for allowing a customer to preview, acquire and/or pay for information and a system therefor.
  142. Schull,Jonathan, Method for causing a digital product to revert to a demo mode.
  143. Saito, Makoto, Method for controlling database copyrights.
  144. Saito,Makoto, Method for controlling database copyrights.
  145. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  146. Jackson, Mark D., Method for developing gaming programs compatible with a computerized gaming operating system and apparatus.
  147. Rosen Sholom S., Method for electronic merchandise dispute resolution.
  148. Sholom S. Rosen, Method for electronic merchandise dispute resolution.
  149. Rosen Sholom S. (New York NY), Method for establishing secure communications among processing devices.
  150. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  151. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  152. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  153. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  154. Schull,Jonathan, Method for selling, protecting, and redistributing digital goods.
  155. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  156. Bade,Steven A.; Chao,Ching Yun, Method for using a portable computing device as a smart key device.
  157. Schull,Jonathan, Method of altering a software product in response to predetermined events.
  158. Kohiyama, Kiyoshi; Yoshitake, Toshiyuki; Watanabe, Yasuhiro; Morioka, Kiyonori, Method of and apparatus for reproducing information, and security module.
  159. Kohiyama, Kiyoshi; Yoshitake, Toshiyuki; Watanabe, Yasuhiro; Morioka, Kiyonori, Method of and apparatus for reproducing information, and security module.
  160. Kohiyama, Kiyoshi; Yoshitake, Toshiyuki; Watanabe, Yasuhiro; Morioka, Kiyonori, Method of and apparatus for reproducing information, and security module.
  161. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  162. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  163. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  164. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  165. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  166. Wallach, Steven J.; Brewer, Tony, Microprocessor architecture having alternative memory access paths.
  167. Etchegoyen, Craig S., Modular software protection.
  168. Wallach, Steven J.; Brewer, Tony, Multi-processor system having at least one processor that comprises a dynamically reconfigurable instruction set.
  169. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  170. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  171. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  172. Brewer, Tony M.; Andrewartha, J. Michael; O'Leary, William D.; Dugan, Michael K., Multiple data channel memory module architecture.
  173. Brewer, Tony M.; Andrewartha, J. Michael; O'Leary, William D.; Dugan, Michael K., Multiple data channel memory module architecture.
  174. Brewer, Tony M.; Andrewartha, J. Michael; O'Leary, William D.; Dugan, Michael K., Multiple data channel memory module architecture.
  175. Brewer, Tony M.; Andrewartha, J. Michael; O'Leary, William D.; Dugan, Michael K., Multiple data channel memory module architecture.
  176. Nakashima Kazuo,JPX, Optical recording medium to store and access large volumes of data.
  177. Martinek, Michael G.; Jackson, Mark D.; Downs, III, Justin G., Pass-through live validation device and method.
  178. Rowe, Richard E.; Moser, Timothy W.; Schaefer, Craig Michael; Iddings, Cara; Nelson, Dwayne R., Pluggable modular gaming modifiers and configuration templates for gaming environments.
  179. Foss,Jonathan G., Point-of-sale provider evaluation.
  180. Mooney David M. (Eden Prairie MN) Kimlinger Joseph A. (Willernie MN) Wood David E. (Minnetonka MN), Preboot protection for a data security system with anti-intrusion capability.
  181. Cockerille, Warner; LeMay, Steven G.; Breckner, Robert, Process verification.
  182. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  183. Feng Genquan, Protection of software from physical and electronic interrogation by sealing and checking password.
  184. Kapil, Sanjiv; Swart, Garret F.; Aingaran, Aings; Bridge, Jr., William H.; Jairath, Sumti; Johnson, John G., Remote-key based memory buffer access control mechanism.
  185. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  186. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  187. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  188. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  189. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  190. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  191. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  192. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  193. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  194. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  195. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  196. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  197. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  198. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  199. Hait John N. (Missoula MT), Secure architecture and apparatus using an independent computer cartridge.
  200. Gaur, Santosh P.; Hall, William Eric, Secure data transfer over a network.
  201. Best,Robert M., Secure distribution of portable game software.
  202. Goffman, Sergei; Skaletsky, Alexander, Secure execution of a computer program using binary translators.
  203. Best,Robert M., Secure execution of downloaded software.
  204. Philip R. Wiser ; Andrew R. Cherenson ; Steven T. Ansell ; Susan A. Cannon, Secure online music distribution system.
  205. Wiser, Philip R.; Cherenson, Andrew R.; Ansell, Steven T.; Cannon, Susan A., Secure online music distribution system.
  206. Matyas, Jr.,Stephen Michael; Peyravian,Mohammad; Roginsky,Allen Leonid; Zunic,Nevenko, Secure software distribution and installation.
  207. Tuyls, Pim; Vertregt, Maarten; De Jong, Hans; List, Frans; Wagner, Mathias; Zachariasse, Frank; Mels, Arjan, Security storage of electronic keys within volatile memories.
  208. Hasebe Takayuki,JPX ; Torii Naoya,JPX ; Iwayama Noboru,JPX ; Takenaka Masahiko,JPX ; Matsuda Masahiro,JPX, Software charging system and software data utilization permitting device.
  209. Akiyama Ryota (Kawasaki JPX) Yoshioka Makoto (Kawasaki JPX), Software delivery system, center device, relaying device and user terminal device.
  210. Chernow Fred (360 Kiowa Pl. Boulder CO 80303) Peterson Randy J. (1330 Arapahoe St. Boulder CO 80302), Software distribution system.
  211. Takahashi Toshinari,JPX ; Nogami Hiroyasu,JPX, Software distribution system and software utilization scheme for improving security and user convenience.
  212. Akiyama, Ryota; Yoshioka, Makoto, Software encoding using a combination of two types of encoding and encoding type identification information.
  213. Maor, Moshe; Gueron, Shay, Software modification for partial secure memory processing.
  214. Itami Satoshi,JPX ; Nakashima Kazuo,JPX ; Utsumi Kenichi,JPX, Software processing apparatus writing software to a medium only if identification information in the software corresponds to identification information in the medium.
  215. Pavlin, Dominique Vincent; Sotoodeh, Mehdi; Tibbetts, Reed H.; Godding, Patrick N.; Spiewek, Alain Raymond; Nixon, Roger Graham, Software protection device and method.
  216. Pavlin,Dominique Vincent; Sotoodeh,Mehdi; Tibbetts,Reed H.; Godding,Patrick N.; Spiewek,Alain Raymond; Nixon,Roger Graham, Software protection device and method.
  217. Zinger, William H.; Krill, Jerry A., Software protection for single and multiple microprocessor systems.
  218. Akiyama Ryota,JPX ; Yoshioka Makoto,JPX, Software reproduction apparatus.
  219. Akiyama,Ryota; Yoshioka,Makoto, Software reproduction apparatus.
  220. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  221. Mark J. Granger ; Cyrus E. Smith ; Matthew I. Hoffman, Software system and associated methods for controlling the use of computer programs.
  222. Nishio Nobuhiko,JPX, Software usage measurement apparatus for imposing a proper charge in accordance with number of times multimedia unit dat.
  223. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  224. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  225. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  226. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  227. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  228. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  229. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  230. Camiel, Noam, System and method for an autonomous software protection device.
  231. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for authenticating an operating system.
  232. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  233. England,Paul; Lampson,Butler W.; DeTreville,John D., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  234. Schull,Jonathan, System and method for controlling access to protected information.
  235. Stefik, Mark J.; Pirolli, Peter L. T., System and method for controlling the use of a digital work in accordance with usage rights associated with the digital work.
  236. Stefik, Mark J.; Pirolli, Peter L. T., System and method for controlling utilization of content.
  237. Schull,Jonathan, System and method for creating and running protected information.
  238. Kulakowski, Robert T.; Mautner, Craig; Fahy, James B.; Bronte, Jeffrey; Hutchins, Greg, System and method for defining programmable processing steps applied when protecting the data.
  239. Kulakowski, Robert T.; Mautner, Craig; Fahy, James B.; Bronte, Jeffrey; Hutchins, Greg, System and method for defining programmable processing steps applied when protecting the data.
  240. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  241. Stefik, Mark J.; Pirolli, Peter L. T., System and method for distributing digital content to be rendered in accordance with usage rights information.
  242. Schull, Jonathan, System and method for distributing protected information.
  243. Wang,Xin, System and method for document distribution.
  244. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  245. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  246. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  247. Schull,Jonathan, System and method for operating a licensing server.
  248. Gaur, Santosh P.; Hall, William Eric, System and method for performing security operations on network data.
  249. Stefik, Mark J.; Pirolli, Peter L. T., System and method for permitting use of content using transfer rights.
  250. Fontana, Joseph M.; Cronce, Paul A., System and method for preventing unauthorized use of protected software utilizing a portable security device.
  251. Schull,Jonathan, System and method for processing protected audio information.
  252. Schull, Jonathan, System and method for processing protected text information.
  253. Schull,Jonathan, System and method for processing protected video information.
  254. Lockhart Roland T.,CAX ; Wiener Michael J.,CAX, System and method for protecting a multipurpose data string used for both decrypting data and for authenticating a user.
  255. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  256. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  257. Wang, Xin, System and method for protection of digital works.
  258. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  259. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  260. Stefik, Mark J.; Pirolli, Peter L. T., System and method for rendering digital content in accordance with usage rights information.
  261. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  262. Weiler, Jonathan Frederic; Garizas, Charles; Shah, Keyush Dhirajlal, System and method for secure software installation.
  263. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for secure storage data using a key.
  264. Lampson, Butler W.; DeTreville, John D.; England, Paul, System and method for secure storage of data using public and private keys.
  265. Schull, Jonathan, System and method for selectively changing parameter settings based on lineage analysis of digital information.
  266. Schull,Jonathan, System and method for selectively enabling access based on lineage analysis of digital information.
  267. Schull,Jonathan, System and method for selling protected information in an oem context.
  268. Koch, Mark J., System and method for storing and accessing digital media content using smart card technology.
  269. Koch,Mark J., System and method for storing and accessing digital media content using smart card technology.
  270. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  271. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  272. Wang,Xin, System and method for transferring the right to decode messages.
  273. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  274. Pesl, Marek, System and method for using digital strings to provide secure distribution of digital content.
  275. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  276. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  277. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  278. Akiyama Ryota,JPX ; Munakata Akio,JPX ; Koga Yuzuru,JPX ; Ishizaki Masayuki,JPX, System for and method of authenticating a client.
  279. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  280. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  281. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  282. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  283. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  284. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  285. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  286. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  287. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  288. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  289. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  290. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  291. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  292. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  293. Nakashima Kazuo,JPX ; Nakahara Masaru,JPX ; Itami Satoshi,JPX ; Utsumi Kenichi,JPX, System for decrypting encrypted software.
  294. Stefik, Mark J.; Pirolli, Peter L. T., System, apparatus, and media for granting access to and utilizing content.
  295. Hamilton,Dave; Brinkman,John; Longawa,John; Randall,Charles Corris; Rampley,Rob; Ryle,Marcus, System, device, and method for providing secure electronic commerce transactions.
  296. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  297. Okaue, Takumi; Nakanishi, Kenichi; Tashiro, Jun; Okubo, Hideaki, Systems and methods for locking and exporting the locking of a removable memory device.
  298. Okaue, Takumi; Nakanishi, Kenichi; Tashiro, Jun; Okubo, Hideaki, Systems and methods for locking and exporting the locking of a removable memory device.
  299. Brewer, Tony, Systems and methods for mapping a neighborhood of data to general registers of a processing element.
  300. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  301. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  302. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  303. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  304. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  305. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  306. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  307. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  308. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  309. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  310. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  311. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  312. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  313. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  314. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  315. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  316. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  317. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  318. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  319. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  320. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  321. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  322. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  323. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  324. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  325. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  326. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  327. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  328. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  329. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  330. Rosen Sholom S., Tamper-proof devices for unique identification.
  331. Rosen Sholom S., Tamper-proof electronic processing device.
  332. Greco, Paul Merrill; Jaquette, Glen Alan, Target of opportunity recognition during an encryption related process.
  333. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  334. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  335. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  336. Rosen Sholom S., Trusted agents for open distribution of electronic money.
  337. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  338. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  339. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  340. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  341. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  342. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  343. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  344. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  345. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  346. Burke, Jonah S.; Kapadia, Arshish C., Unified authorization for heterogeneous applications.
  347. Kapadia, Arshish C.; Burke, Jonah S.; Crow, Howard M., Uniform access to entities in registered data store services.
  348. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  349. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  350. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  351. Granger, Mark J.; Smith, Cyrus E.; Hoffman, Matthew I., Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications.
  352. Granger Mark J. ; Smith Cyrus E. ; Hoffman Matthew I., Use of pseudocode to protect software from unauthorized use.
  353. Chess,David M.; Dyer,Joan; Itoi,Naomaru; Kravitz,Jeff; Palmer,Elaine Rivette; Perez,Ronald; Smith,Sean William, Used trusted co-servers to enhance security of web interaction.
  354. Bade, Steven A.; Chao, Ching-Yun, Using a portable computing device as a smart key device.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로