$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Network license server 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0252556 (1988-09-30)
발명자 / 주소
  • Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA)
출원인 / 주소
  • Apollo Computer, Inc. (Chelmsford MA 02)
인용정보 피인용 횟수 : 597  인용 특허 : 10

초록

A system for the management of computer programs in a computer network environment is presented. A network license server comprises a license server daemon which provides access to a computer program based on information stored in user and license databases. To track software usage, the daemon also

대표청구항

A network license server comprising: a license database; a user database; means for generating a digital signal in response to a user\s request for access to selected software, said signal being transmitted via a network to which said license server is connected; a license server daemon having acces

이 특허에 인용된 특허 (10)

  1. Uchenick Gordon (Baltimore MD), Apparatus and method for preventing unauthorized use of computer programs.
  2. Dunham Michael D. (Shorewood WI) Dykstra Thomas M. (Mequon WI) Vahlsing Donald W. (Grafton WI) Ehlers Paul L. (Menasha WI), Apparatus for controlling the use of computer software.
  3. Wiedemer John D. (930 W. Forest Dr. Houston TX 77079), Billing system for computer software.
  4. Faber Lawrence M. (Sunnyvale CA), Computer accessing system.
  5. Westheimer Thomas O. (2 Highland Dr. Peterborough NH 03458) Hipson Peter D. (4 S. Shore Dr. Jaffrey NH 03452), Computer software protection system.
  6. Karp Alan H. (Palo Alto CA), Hardware assist for protecting PC software.
  7. Pailen William (Derwood MD) Harper Jim L. (Olney MD), Protected software access control apparatus and method.
  8. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  9. Pickholtz Andrew (Fairfax VA), Software protection method and apparatus.
  10. William Tobin (Stamford CT), Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storag.

이 특허를 인용한 특허 (597)

  1. Bahar, Reuben, Activation code system and method for preventing software piracy.
  2. Erickson, John S., Apparatus for rendering content.
  3. Sweeney Christopher Lee ; Stodghill Scott A. ; DeShazer Kurt A. ; Marimuthu Aravindan, Application and database security and integrity system and method.
  4. Chang, Shean-Guang; Wells, John R.; Felts, Stephen, Application messaging system with flexible message header structure.
  5. Lampson,Butler W.; DeTreville,John D.; England,Paul, Attesting to a value of a register and/or memory region.
  6. Rhoads Geoffrey B., Audio- and graphics-based linking to internet.
  7. Carr, J. Scott; Perry, Burt W., Authenticating objects using embedded data.
  8. Perry, Burt W., Authentication watermarks for printed objects and related applications.
  9. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Automated system for management of licensed software.
  10. Ka Chong I. ; Glass Andrew C., Automatic logging of application program launches.
  11. Lamkin,Allan B.; Blair,Jeff G.; Collart,Todd R., BCA writer serialization management.
  12. Lampson, Butler W.; DeTreville, John D.; England, Paul, Boot blocks for software.
  13. Brandenburg Barbara B., Broadcast software distribution.
  14. Guheen, Michael F.; Mitchell, James D.; Barrese, James J., Business alliance identification in a web architecture framework.
  15. Robinson, Richard L.; Serkowski, Robert J.; Walker, William T., Certificate distribution via license files.
  16. Kemery, Michael; Wang, Winston; Wickman, Marianna, Chore and rewards tracker.
  17. England, Paul, Client-side boot domains and boot rules.
  18. England, Paul, Client-side boot domains and boot rules.
  19. England,Paul, Client-side boot domains and boot rules.
  20. Reed, Alastair M.; Rhoads, Geoffrey B., Color adaptive watermarking.
  21. Guheen,Michael F.; Mitchell,James D.; Barrese,James J., Comparatively analyzing vendors of components required for a web-based architecture.
  22. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  23. Darago, Vincent S; Jenkins, Christopher, Computer architecture for managing courseware in a shared use operating environment.
  24. Geoffrey B. Rhoads, Computer linking methods using encoded graphics.
  25. Plum Thomas (Kamuela HI), Computer software licensing authentication method and apparatus.
  26. Kutaragi, Ken; Okamoto, Shinichi; Miura, Kazuo, Computer system and usage method thereof.
  27. Coffee Steven R. ; Pinsley David B. ; Poloniewicz Karen A. ; Costello Stephen J. ; Stanziani Steven N., Computer use meter and analyzer.
  28. Coffey Steven R. (East Hampton NY) Pinsley David B. (Great Neck NY) Poloniewicz Karen A. (East Setauket NY), Computer use meter and analyzer.
  29. Hess, Gary M.; Strong, Robert W.; Brown, Jeffrey T.; Derr, Michael N., Configurable feature selection mechanism.
  30. Levy,Kenneth L.; Rhoads,Geoffrey B., Connected audio and other media objects.
  31. Levy,Kenneth L.; Rhoads,Geoffrey B., Connected audio and other media objects.
  32. Rhoads, Geoffrey B., Content containing a steganographically encoded process identifier.
  33. Blumenau, Trevor, Content display monitor.
  34. Blumenau, Trevor, Content display monitor.
  35. Blumenau, Trevor, Content display monitor.
  36. Blumenau, Trevor, Content display monitor.
  37. Blumenau, Trevor, Content display monitor.
  38. Blumenau, Trevor, Content display monitor.
  39. Blumenau, Trevor, Content display monitor.
  40. Blumenau, Trevor, Content display monitor.
  41. Blumenau, Trevor, Content display monitor.
  42. Blumenau, Trevor, Content display monitor.
  43. Blumenau, Trevor, Content display monitor.
  44. Blumenau, Trevor, Content display monitor.
  45. Blumenau,Trevor, Content display monitoring by a processing system.
  46. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  47. Stefik,Mark J., Content rendering device with usage rights.
  48. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  49. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  50. Yoshioka,Makoto; Tsunoda,Haruhiko; Hasegawa,Kazuharu; Aoe,Hidefumi, Content sales period verifying system and content decryption key effective period verifying system.
  51. Rhoads, Geoffrey B., Controlling a device based upon steganographically encoded data.
  52. Chandra, Tushar Deepak; Fakhouri, Sameh Afif; Fong, Liana Liyow; Jerome, William Francis; Krishnakumar, Srirama Mandyam; Naik, Vijay Krishnarao; Pershing, Jr., John Arthur; Turek, John Joseph Edward, Controlling a number of instances of an application running in a computing environment.
  53. England, Paul; DeTreville, John D.; Lampson, Butler W., Controlling access to content based on certificates and access predicates.
  54. Collart,Todd, Controlling playback of content stored on a portable storage medium.
  55. Rhoads, Geoffrey B., Controlling use of audio or image content.
  56. Rhoads, Geoffrey B., Controlling use of audio or image content.
  57. Smith, Fred Hewitt, Controlling user access to electronic resources without password.
  58. Smith, Fred Hewitt, Controlling user access to electronic resources without password.
  59. Smith, Fred Hewitt, Controlling user access to electronic resources without password.
  60. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  61. Rhoads,Geoffrey B.; Gustafson,Ammon E., Data encoding using frail watermarks.
  62. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark proxy.
  63. Patterson, Patrick E., Delivering electronic content.
  64. Patterson, Patrick E., Delivering electronic content.
  65. Patterson,Patrick E., Delivering electronic content.
  66. Patterson,Patrick E., Delivering electronic content.
  67. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  68. Reed, Alastair M.; Brundage, Trent J.; Cattone, Jeremy, Detecting information hidden out-of-phase in color channels.
  69. Rabin,Michael O.; Shasha,Dennis E.; Bosley,Carleton J.; Caceres,Ramon; Ingram,Aaron; Karia,Timir; Molnar,David; Beinart,Yossi, Detection and identification methods for software.
  70. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  71. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  72. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  73. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  74. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  75. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  76. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  77. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  78. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  79. Rhoads, Geoffrey B.; Gustafson, Ammon E., Digital watermarking employing both frail and robust watermarks.
  80. Lofgren,Neil; Seder,Phillip Andrew; MacIntosh,Brian T., Digital watermarking systems.
  81. Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  82. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  83. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  84. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  85. Davis, Bruce L.; Rhoads, Geoffrey B., Digitally marked objects and promotional methods.
  86. Eng, May D., Distributed run-time licensing.
  87. Eng,May D., Distributed run-time licensing.
  88. Sowell, Timothy Charles, Distributing and billing software according to customer use of program modules.
  89. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  90. Guheen, Michael F.; Mitchell, James D.; Barrese, James J., Dynamic customer profile management.
  91. Dasgupta Ranjan (Naperville IL), Dynamic hashing method for optimal distribution of locks within a clustered system.
  92. Hill Charles E., Electronic catalog system and method.
  93. Hill Charles E., Electronic catalog system and method.
  94. Hill,Charles E., Electronic catalog system and method.
  95. Leong,Cheah Wee; Ng,William, Electronic menu document creator in a virtual financial environment.
  96. Donaldson, Stuart G., Embedded building conroller with stored software license information.
  97. Davis,Bruce L.; Rhoads,Geoffrey B., Embedding and reading imperceptible codes on objects.
  98. Miller,Marc D.; Hawes,Jonathan L., Embedding watermark components during separate printing stages.
  99. Sharma, Ravi K.; Stach, John, Encoding and decoding auxiliary signals.
  100. Sharma, Ravi K.; Stach, John, Encoding and decoding auxiliary signals.
  101. Sharma,Ravi K.; Stach,John, Encoding and decoding signals for digital watermarking.
  102. Mikurak, Michael G., Enhanced visibility during installation management in a network-based supply chain environment.
  103. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  104. Meyer, Joel R.; Rhoads, Geoffrey B., Establishing and interacting with on-line media collections using identifiers in media signals.
  105. Hartwell, Aaron; Pell, Mike, Expanded search and find user interface.
  106. Olsen James E. ; Bringhurst Adam L., Fault tolerant electronic licensing system.
  107. Wesinger, Jr., Ralph E.; Coley, Christopher D., Firewall providing enhanced network security and user transparency.
  108. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Firewall providing enhanced network security and user transparency.
  109. England, Paul; Peinado, Marcus, Generating, migrating or exporting bound keys.
  110. Mazza, Bruce P.; Walker, William T., Generation of enterprise-wide licenses in a customer environment.
  111. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  112. Reed,Alastair M., Hiding information to reduce or offset perceptible artifacts.
  113. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  114. Jones, Robert L., Identification document with three dimensional image of bearer.
  115. Guheen, Michael F; Mitchell, James D.; Barrese, James J., Identification of redundancies and omissions among components of a web based architecture.
  116. Koritzinsky Ianne Mae Howards ; Reich John Aurthur, Imaging system protocol handling method and apparatus.
  117. Koritzinsky, Ianne Mae Howards; Reich, John Aurthur, Imaging system protocol handling method and apparatus.
  118. Koritzinsky,Ianne Mae Howards; Reich,John Aurthur, Imaging system protocol handling method and apparatus.
  119. Mikurak, Michael G., Increased visibility during order management in a network-based supply chain environment.
  120. Mikurak, Michael G., Increased visibility during order management in a network-based supply chain environment.
  121. Mikurak, Michael G., Increased visibility during order management in a network-based supply chain environment.
  122. Mikurak, Michael G., Increased visibility during order management in a network-based supply chain environment.
  123. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  124. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  125. Ono,Makoto, Information transmission method and system.
  126. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  127. Filepp Robert ; Gordon Michael L. ; Bidwell Alexander W. ; Young Francis C. ; Wolf Allan M. ; Meo Sam ; Tiemann Duane ; Abrahams Lawrence ; Silfen Michael J. ; Dalsass Aldo R. ; Lee Florence M. ; App, Interactive computer network and method of operation.
  128. Lu, Daozheng; Harkness, David H.; Bhatia, Manish; Samson, Jerome; Feininger, William A., Interactive service device metering systems.
  129. Lu, Daozheng; Harkness, David H.; Bhatia, Manish; Samson, Jerome; Feininger, William A., Interactive service device metering systems.
  130. Lu, Daozheng; Harkness, David H.; Bhatia, Manish; Samson, Jerome; Feininger, William A., Interactive service device metering systems.
  131. Rhoads, Geoffrey B., Internet linking from audio.
  132. Rhoads,Geoffrey B., Internet linking from image content.
  133. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  134. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  135. Nakamura,Mie; Sawayanagi,Kazumi; Ozeki,Satoshi; Takano,Masahito; Yamauchi,Kana; Yoshizaki,Yoshihiko, License management apparatus, license management system and license management method.
  136. Duvvoori Vikram ; Sahai Vikram ; Parthasarathy Balaji ; Waldhauer Neil, License management system using daemons and aliasing.
  137. Kemery, Michael, Licensed content purchasing and delivering.
  138. Griswold Gary N., Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a.
  139. Hawes, Jonathan L., Linking documents through digital watermarking.
  140. Rhoads Geoffrey B., Linking of computers using information steganographically embedded in data objects.
  141. Goldick,Jonathan S, Locking multiple resources in a distributed environment.
  142. Dircks, Charles E.; Osmann, Eric E., Logon authentication and security system and method.
  143. Reed, Alastair M.; Bradley, Brett A., Low visibility watermarks using an out-of-phase color.
  144. Hartman, Robert Charles; Dietrich, II, John Elton; Finn, Jeffrey James; Holm, Rodney Dean, Managed services platform.
  145. Hartman, Robert Charles; Dietrich, II, John Elton; Finn, Jeffrey James; Holm, Rodney Dean, Managed services platform.
  146. Hartman, Robert Charles; Dietrich, II, John Elton; Finn, Jeffrey James; Holm, Rodney Dean, Managed services platform.
  147. Hartman, Robert Charles; Dietrich, II, John Elton; Finn, Jeffrey James; Holm, Rodney Dean, Managed services platform.
  148. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Graham, Stanley E.; Rhoads, Geoffrey B., Management of documents and other objects using optical devices.
  149. Nakamura Kenji,JPX ; Iwamura Keiichi,JPX, Management system and terminal apparatus to manage and control distribution and use of software and the like.
  150. Nakamura, Kenji; Iwamura, Keiichi, Management system and terminal apparatus to manage and control distribution and use of software and the like.
  151. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  152. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  153. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  154. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  155. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  156. Blumenau Trevor, Metering of internet content using a control.
  157. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  158. DeTreville, John, Method and apparatus for authenticating an open system application to a portable IC device.
  159. DeTreville,John, Method and apparatus for authenticating an open system application to a portable IC device.
  160. DeTreville,John D., Method and apparatus for authenticating an open system application to a portable IC device.
  161. Levy, Kenneth L., Method and apparatus for automatic ID management.
  162. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  163. Levy, Kenneth L., Method and apparatus for content management.
  164. Levy, Kenneth L., Method and apparatus for content management.
  165. Levy, Kenneth L., Method and apparatus for content management.
  166. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  167. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  168. Pence, William E.; Langan, Dik; Healy, Cynthia; Schreiber, Geoff; Penick, Donna, Method and apparatus for dynamic renewability of content.
  169. Pence,William E; Langan,Dik; Healy,Cynthia; Schreiber,Geoff; Penick,Donna, Method and apparatus for dynamic renewability of content.
  170. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  171. Ross Cliff D. ; Taylor Neil W., Method and apparatus for electronic license distribution.
  172. Alattar, Adnan M., Method and apparatus for encoding paper with information.
  173. Alattar,Adnan M., Method and apparatus for encoding paper with information.
  174. Garst Blaine ; Serlet Bertrand, Method and apparatus for enforcing software licenses.
  175. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  176. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  177. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  178. Stefik, Mark J.; Pirolli, Peter L., Method and apparatus for executing code in accordance with usage rights.
  179. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  180. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  181. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  182. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  183. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  184. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  185. Rabin, Michael O.; Shasha, Dennis E., Method and apparatus for protecting information and privacy.
  186. Rabin, Michael O.; Shasha, Dennis E.; Beinart, Yossi; Caceres, Ramon; Karia, Timir; Molnar, David; Rolinson, Sean, Method and apparatus for protecting information and privacy.
  187. Rabin, Michael O.; Shasha, Dennis E.; Beinart, Yossi; Caceres, Ramon; Karia, Timir; Molnar, David; Rolinson, Sean, Method and apparatus for protecting information and privacy.
  188. Rabin,Michael O.; Shasha,Dennis E.; Beinart,Yossi; Caceres,Ramon; Karia,Timir; Molnar,David; Rolinson,Sean, Method and apparatus for protecting information and privacy.
  189. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  190. Gewickey,Greg; Collart,Todd, Method and apparatus for providing content-owner control in a networked device.
  191. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  192. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  193. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi; Yoshiura, Hiroshi, Method and apparatus for recording and reproducing electronic watermark information, and recording medium.
  194. Breslau Franklin C. ; Greenstein Paul G. ; Rodell John T., Method and apparatus for remote object code inclusion.
  195. Breslau Franklin C. ; Greenstein Paul G. ; Rodell John T., Method and apparatus for remote source code inclusion.
  196. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  197. Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Method and apparatus for retrieving selected information from a secure information source.
  198. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  199. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  200. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  201. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  202. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  203. Dingsor,Andrew Dwight; Fontes,Stephen Manuel, Method and apparatus load balancing server daemons within a server.
  204. Anderson Mark Stephen,AUX ; Griffin John Edmund,AUX ; North Christopher James Guildford,AUX ; Yesberg John Desborough,AUX ; Yiu Kenneth Kwok-Hei,AUX ; Milner Robert Brunyee,AUX, Method and means for interconnecting different security level networks.
  205. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  206. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  207. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  208. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  209. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  210. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  211. Pettitt John Philip, Method and system for controlling distribution of software in a multitiered distribution chain.
  212. Goldick,Jonathan S., Method and system for locking resources in a distributed environment.
  213. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined condition for usage.
  214. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  215. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  216. Rhoads,Geoffrey B., Method and system for managing and controlling electronic media.
  217. Wyman Robert M., Method and system for managing execution of licensed programs.
  218. Goldick,Jonathan S., Method and system for managing resources in a distributed environment that has an associated object.
  219. Rhoads,Geoffrey B., Method and system for managing, accessing and paying for the use of copyrighted electronic media.
  220. Lao, Guillermo, Method and system for subscription digital rights management.
  221. Lao, Guillermo, Method and system for subscription digital rights management.
  222. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  223. Trevor Blumenau, Method and system for the discovery of cookies and other client information.
  224. Schull,Jonathan, Method for adapting a software product to an environment.
  225. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  226. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  227. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Method for authorizing a substitute software license server.
  228. Hsu Shih-Pin,TWX, Method for automatically activating a control procedure at a user's game system through a broadcast network when said us.
  229. Schull,Jonathan, Method for causing a digital product to revert to a demo mode.
  230. Korenshtein Roni (Los Gatos CA), Method for controlling access to a computer resource based on a timing policy.
  231. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  232. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  233. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  234. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  235. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  236. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  237. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  238. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  239. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  240. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  241. Schull,Jonathan, Method for selling, protecting, and redistributing digital goods.
  242. Lita Mihai N., Method for supervising software execution in a license restricted environment.
  243. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  244. Hill Charles E., Method for updating a remote computer.
  245. Schull,Jonathan, Method of altering a software product in response to predetermined events.
  246. Felger, David, Method of billing a purchase made over a computer network.
  247. Felger, David, Method of billing a purchase made over a computer network.
  248. Felger, David, Method of billing a purchase made over a computer network.
  249. Cognigni,Giorgio; Presciutti,Alessio, Method of controlling use of digitally encoded products.
  250. Rhoads,Geoffrey B.; Seder,Phillip Andrew; Miller,Marc D.; MacIntosh,Brian T.; Hein, III,William C.; Hannigan,Brett T., Method of linking on-line data to printed documents.
  251. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Method of monitoring print data for text associated with a hyperlink.
  252. Sch채fer,Manfred, Method, array and set of several arrays for protecting several programs and/or files from unauthorized access by a process.
  253. Rauma, Tapio; Koutaniemi, Jukka; Parkkila, Ari, Method, data transfer arrangement, server and terminal device for updating information in a terminal device.
  254. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  255. Edwards, Jermaine Charles, Method, system, and program for logging statements to monitor execution of a program.
  256. Jaquette, Glen Alan, Method, system, and program for securely providing keys to encode and decode data in a storage cartridge.
  257. Jaquette, Glen Alan, Method, system, and program for securely providing keys to encode and decode data in a storage cartridge.
  258. Donald, James Lawrence; Wright, David Howell, Methods and apparatus for metering computer-based media presentation.
  259. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  260. Rabin, Michael O.; Shasha, Dennis E., Methods and apparatus for protecting information.
  261. Rabin,Michael O.; Shasha,Dennis E., Methods and apparatus for protecting information.
  262. Rabin,Michael O.; Shasha,Dennis E., Methods and apparatus for protecting information.
  263. Mowrer, Samantha M.; Poppie, Molly; Shankar, Balachander; Wong, Ieok Hou; Lee, Choongkoo; Cui, Xiaoqi; Kurzynski, David J.; Peters, Richard; Spoentgen, Remy, Methods and apparatus to assign viewers to media meter data.
  264. Wood, Benjamin; Coughlin, John Charles; Poppie, Molly; Kramer, Marie; Fuhrer, Brian; Borawski, Albert T.; Milavsky, Joseph G.; Donato, Paul; Shankar, Balachander; Kurzynski, David J., Methods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability.
  265. Wood, Benjamin; Coughlin, John Charles; Poppie, Molly; Kramer, Marie; Fuhrer, Brian; Borawski, Albert T.; Milavsky, Joseph G.; Donato, Paul; Shankar, Balachander; Kurzynski, David J., Methods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability.
  266. Wood, Benjamin; Coughlin, John Charles; Poppie, Molly; Kramer, Marie; Fuhrer, Brian; Borawski, Albert T.; Milavsky, Joseph G.; Donato, Paul; Shankar, Balachander; Kurzynski, David J., Methods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability.
  267. Shankar, Balachander; Poppie, Molly; Kurzynski, David J; Garcia, Jarrett; Chmura, Lukasz; You, Huaxin; Doe, Peter; Bourquin, Christine; Dolson, Timothy; Cui, Xiaoqi; Lee, Choongkoo; Spoentgen, Remy, Methods and apparatus to characterize households with media meter data.
  268. Alla, Madhusudhan Reddy; Burbank, John R., Methods and apparatus to collect distributed user information for media impressions.
  269. Splaine, Steven J.; Swift, Adrian, Methods and apparatus to collect distributed user information for media impressions.
  270. Bosworth, Alan N.; Alla, Madhusudhan Reddy; Splaine, Steven J.; Shivampet, Brahmanand Reddy; Gaynor, Kevin K., Methods and apparatus to collect distributed user information for media impressions and search terms.
  271. Bosworth, Alan N.; Alla, Madhusudhan Reddy; Splaine, Steven J.; Shivampet, Brahmanand Reddy; Gaynor, Kevin K., Methods and apparatus to collect distributed user information for media impressions and search terms.
  272. Burbank, John R.; Alla, Madhusudhan Reddy, Methods and apparatus to collect distributed user information for media impressions and search terms.
  273. Burbank, John R.; Alla, Madhusudhan Reddy, Methods and apparatus to collect distributed user information for media impressions and search terms.
  274. Burbank, John R.; Alla, Madhusudhan Reddy, Methods and apparatus to collect distributed user information for media impressions and search terms.
  275. Burbank, John R.; Alla, Madhusudhan Reddy, Methods and apparatus to collect distributed user information for media impressions and search terms.
  276. Srivastava, Seema Varma; Oliver, James R.; Donato, Paul; Mazumdar, Mainak; Aurisset, Juliette; Rao, Kumar Nagaraja; Perez, Albert R.; Gaunt, Josh; Peng, Yutao, Methods and apparatus to determine an adjustment factor for media impressions.
  277. Srivastava, Seema Varma; Oliver, James R.; Donato, Paul; Mazumdar, Mainak; Aurisset, Juliette; Rao, Kumar Nagaraja; Perez, Albert R.; Gaunt, Josh; Peng, Yutao, Methods and apparatus to determine an adjustment factor for media impressions.
  278. Srivastava, Seema Varma; Oliver, James R.; Donato, Paul; Mazumdar, Mainak; Aurisset, Juliette; Rao, Kumar Nagaraja; Perez, Albert R.; Gaunt, Josh; Peng, Yutao, Methods and apparatus to determine an adjustment factor for media impressions.
  279. Heffernan, Ronan; Geraghty, Kevin; Kalus, Mark; Mazumdar, Mainak; Paparo, Ari; Splaine, Steven John, Methods and apparatus to determine impressions using distributed demographic information.
  280. Heffernan, Ronan; Geraghty, Kevin; Kalus, Mark; Mazumdar, Mainak; Paparo, Ari; Splaine, Steven John, Methods and apparatus to determine impressions using distributed demographic information.
  281. Mazumdar, Mainak; Geraghty, Kevin; Heffernan, Ronan; Kalus, Mark; Paparo, Ari; Splaine, Steven J., Methods and apparatus to determine impressions using distributed demographic information.
  282. Mazumdar, Mainak; Geraghty, Kevin; Heffernan, Ronan; Kalus, Mark; Paparo, Ari; Splaine, Steven J., Methods and apparatus to determine impressions using distributed demographic information.
  283. Mazumdar, Mainak; Geraghty, Kevin; Heffernan, Ronan; Kalus, Mark; Paparo, Ari; Splaine, Steven J., Methods and apparatus to determine impressions using distributed demographic information.
  284. Mazumdar, Mainak; Geraghty, Kevin; Heffernan, Ronan; Kalus, Mark; Paparo, Ari; Splaine, Steven J., Methods and apparatus to determine impressions using distributed demographic information.
  285. Kalus, Mark; Paparo, Ari; Geraghty, Kevin, Methods and apparatus to determine media impressions using distributed demographic information.
  286. Kalus, Mark; Paparo, Ari; Geraghty, Kevin, Methods and apparatus to determine media impressions using distributed demographic information.
  287. Kalus, Mark; Paparo, Ari; Geraghty, Kevin, Methods and apparatus to determine media impressions using distributed demographic information.
  288. Sullivan, Jonathan; Lipa, Peter; Sheppard, Michael; Terrazas, Alejandro, Methods and apparatus to estimate demographics of a household.
  289. Duterque, Gilles; Srivastava, Seema Varma; Ion, Cristina, Methods and apparatus to identify session users with cookie information.
  290. Duterque, Gilles; Srivastava, Seema Varma; Ion, Cristina, Methods and apparatus to identify session users with cookie information.
  291. Duterque, Gilles; Srivastava, Seema Varma; Ion, Cristina, Methods and apparatus to identify session users with cookie information.
  292. Duterque, Gilles; Srivastava, Seema Varma; Ion, Cristina, Methods and apparatus to identify session users with cookie information.
  293. Ramaswamy, Arun; Bosworth, Alan N.; Gaynor, Kevin K.; Goli, Narasimha Reddy, Methods and apparatus to measure exposure to streaming media.
  294. Ramaswamy, Arun; Bosworth, Alan N.; Gaynor, Kevin K.; Narasimha, Goli Reddy, Methods and apparatus to measure exposure to streaming media.
  295. Hannan, Kevin Michael; Papakostas, Achilleas; Perez, Albert Ronald; Yonker, Michael Andrew; Albino, Austin William, Methods and apparatus to obtain anonymous audience measurement data from network server data for particular demographic and usage profiles.
  296. Lamkin, Allan B.; Gewickey, Gregory I.; Collart, Todd R., Methods and system for use in network management of content.
  297. Randall, Bruce W.; Taylor, James H.; Ely, Mark N.; Oetzel, Kenneth G., Methods and systems for use in maintaining media data quality upon conversion to a different data format.
  298. Randall, Bruce W.; Taylor, James H.; Ely, Mark N.; Oetzel, Kenneth G., Methods and systems for use in maintaining media data quality upon conversion to a different data format.
  299. Lamkin, Allan B.; Gewickey, Gregory I.; Collart, Todd R., Methods and systems for use in network management of content.
  300. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  301. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  302. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  303. Saxena, Ashutosh; Ponnapalli, Harigopal K. B.; Gorantla, Malakondayya Choudary; Jain, Ina, Methods for controlling software usage.
  304. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  305. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  306. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  307. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  308. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  309. Erickson, John S., Methods for playing protected content.
  310. Rhoads,Geoffrey B., Methods for steganographic encoding media.
  311. Etchegoyen, Craig S., Modular software protection.
  312. Jain, Anand; Stavropoulos, John; Neuhauser, Alan; Lynch, Wendell; Kuznetsov, Vladimir; Crystal, Jack, Monitoring media exposure using wireless communications.
  313. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Multi-site software license balancing.
  314. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  315. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  316. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  317. Horstmann Cay S., Multi-tier electronic software distribution.
  318. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  319. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  320. Rhoads, Geoffrey B., Music methods and systems.
  321. Dircks Charles E. ; Osmann Eric E., Network desktop management security system and method.
  322. Rhoads, Geoffrey B., Network linking method using information embedded in data objects that have inherent noise.
  323. Rhoads,Geoffrey B., Network linking using index modulated on data.
  324. Wiggins Christopher, Network monitoring system for tracking, billing and recovering licenses.
  325. Dircks, Charles E.; Osmann, Eric E., Network provider loop security system and method.
  326. Sim, Lim Or; Cheong, Yee Han; Jarrett, Andrew Lawrence; Bey, Shefik; Eustace, Anthony Roger; Petit, Matthew James, Network resource monitoring and measurement system and method.
  327. Sim, Lim Or; Cheong, Yee Han; Jarrett, Andrew Lawrence; Bey, Shefik; Eustace, Anthony Roger; Petit, Matthew James, Network resource monitoring and measurement system and method.
  328. Sim, Lim Or; Cheong, Yee Han; Jarrett, Andrew Lawrence; Bey, Shefik; Eustace, Anthony Roger; Petit, Matthew James, Network resource monitoring and measurement system and method.
  329. Sim,Lim Or; Cheong,Yee Han; Jarrett,Andrew Lawrence; Bey,Shefik; Eustace,Anthony Roger; Pettit,Matthew James, Network resource monitoring and measurement system and method.
  330. Hirasawa, Hajime, Network system and network management method.
  331. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Operating system upgrades in a trusted operating system environment.
  332. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  333. Bramnick Arnold H. ; Calvert Nathaniel ; McBride Thomas Marcus ; Snyder ; III Arthur Frank ; Ure John Robert, PC product registration and tracking.
  334. Rodriguez, Tony F.; Carr, Jonathan Scott; Rhoads, Geoffrey B., Paper-based control of computer systems.
  335. Kemery, Michael, Parent telecommunication device configuration of activity-based child telecommunication device.
  336. Wickman, Marianna; Kemery, Michael; Wang, Winston, Parent-controlled episodic content on a child telecommunication device.
  337. Guheen, Michael F.; Mitchell, James D.; Barrese, James J., Phase delivery of components of a system required for implementation technology.
  338. Rhoads,Geoffrey B.; Davis,Bruce L.; Evans,Douglas B., Portable devices and methods employing digital watermarking.
  339. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Predictive software license balancing.
  340. Lamkin,Allan B.; Collart,Todd R.; Gewickey,Greg, Presentation of media content.
  341. Lamkin,Allan B.; Collart,Todd R.; Gewickey,Greg, Presentation of media content.
  342. Lamkin,Allan B.; Collart,Todd R.; Gewickey,Greg, Presentation of media content from multiple media sources.
  343. Rhoads, Geoffrey B., Printable interfaces and digital linking with embedded codes.
  344. Guheen, Michael F.; Mitchell, James D.; Barrese, James J., Prioritizing components of a network framework required for implementation of technology.
  345. Alattar, Adnan M., Process for marking substrates with information using a texture pattern and related substrates.
  346. Sitbon Gerard,FRX ; Bassier Jean-Fran.cedilla.ois,FRX ; Aydin Alev,FRX ; Freund Hubert,FRX, Process for simulating a server architecture from a client architecture.
  347. Shimomura Eisuke,JPX ; Yoshida Munehiro,JPX, Program-invocation-count measuring system, program-invocation-count measuring method, and medium for storing program-inv.
  348. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  349. Patrick E. Patterson, Regulating access to digital content.
  350. Dasgupta Ranjan (Naperville IL), Reliable datagram service provider for fast messaging in a clustered environment.
  351. Walker, William T.; Serkowski, Robert J., Remote feature activation authentication file system.
  352. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  353. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  354. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  355. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  356. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  357. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  358. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  359. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  360. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  361. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  362. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  363. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  364. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  365. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  366. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  367. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  368. Williams,Matthew, Saw blade case.
  369. Mikurak, Michael G., Scheduling and planning maintenance and service in a network-based supply chain environment.
  370. Smith,Fred Hewitt; Smith,Benjamin Hewitt; Smith,Cynthia, Secure detection network system.
  371. Floyd Michel ; Horstmann Cay S., Secure electronic software packaging using setup-external unlocking module.
  372. England,Paul; Lampson,Butler W., Secure execution of program code.
  373. Smith, Fred Hewitt, Secure processing module and method for making the same.
  374. Shavit Nir N., Secure software system and related techniques.
  375. Shavit Nir N., Secure software system and related techniques.
  376. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  377. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  378. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  379. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  380. Venters, III,Carl Vernon; Phillips, II,Eugene B.; Ornstein,Seth, Secure streaming container.
  381. Ventors, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  382. Gore ; Jr. Robert Cecil ; Haugh ; II John Frederick, Secured gateway interface.
  383. Westerinen, William J.; Yadav, Hanumant Kumar; Duffus, James S.; Carpenter, Todd L., Securely providing advertising subsidized computer usage.
  384. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  385. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  386. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  387. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  388. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  389. Phillips, II,Eugene B.; Ornstein,Seth, Securing digital content system and method.
  390. Rhoads,Geoffrey B., Securing media content with steganographic encoding.
  391. Bradley, Brett A., Self-orienting watermarks.
  392. Bradley,Brett A., Self-orienting watermarks.
  393. Wang, Winston; Holt, Adam; Bouthemy, Jean-Luc; Kemery, Michael, Shareable applications on telecommunications devices.
  394. Wang, Winston; Holt, Adam; Bouthemy, Jean-Luc; Kemery, Michael, Shareable applications on telecommunications devices.
  395. Wang, Winston; Holt, Adam; Bouthemy, Jean-Luc; Kemery, Michael, Shareable applications on telecommunications devices.
  396. Wang, Winston; Kemery, Michael; Wickman, Marianna, Shared book reading.
  397. Thomas, Andrew James; Skrebels, Mark; Irvine, Stewart, Software configuration of module dependent on history.
  398. Lamkin,Allan; Collart,Todd; Blair,Jeff, Software engine for combining video or audio content with programmatic content.
  399. Bahar, Reuben, Software piracy prevention through remote enforcement of an activation threshold.
  400. Benson Glenn,DEX, Software rental system and method for renting software.
  401. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  402. Agarwal, Sameet; Xiao, Wei; Zwilling, Michael, Software server usage governor.
  403. Nishio Nobuhiko,JPX, Software usage measurement apparatus for imposing a proper charge in accordance with number of times multimedia unit dat.
  404. Morishita Akira,JPX ; Doi Miwako,JPX ; Miike Seiji,JPX ; Muratani Hirofumi,JPX, Software use method control system.
  405. Rhoads, Geoffrey B., Steganographic encoding and detecting for video signals.
  406. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  407. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  408. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  409. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  410. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  411. Koseki, Kazumasa, Storage medium, method of producing transfer file data, and data signal.
  412. Evans, Douglas B.; Conwell, William Y., Substituting information based on watermark-enable linking.
  413. Evans,Douglas B.; Conwell,William Y., Substituting objects based on steganographic encoding.
  414. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in media objects based on steganographic encoding.
  415. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for authenticating an operating system.
  416. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  417. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  418. England,Paul; Lampson,Butler W.; DeTreville,John D., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  419. Benson, Greg; Franklin, Martin; Knauft, Christopher L., System and method for authenticating peer components.
  420. Schull,Jonathan, System and method for controlling access to protected information.
  421. Schull,Jonathan, System and method for creating and running protected information.
  422. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  423. Schull, Jonathan, System and method for distributing protected information.
  424. Wang,Xin, System and method for document distribution.
  425. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  426. Lauckhart, Gregory J.; Horman, Craig B.; Korol, Christa; Bartot, James T., System and method for estimating prevalence of digital content on the world-wide-web.
  427. Lauckhart, Gregory J.; Horman, Craig B.; Korol, Christa; Bartot, James T., System and method for estimating prevalence of digital content on the world-wide-web.
  428. Smith, Benjamin Hewitt; Smith, Fred Hewitt, System and method for installing an auditable secure network.
  429. Smith, Benjamin Hewitt; Smith, Fred Hewitt, System and method for installing an auditable secure network.
  430. Erickson John S., System and method for managing copyrighted electronic media.
  431. Erickson, John S., System and method for managing copyrighted electronic media.
  432. Erickson, John S., System and method for managing copyrighted electronic media.
  433. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  434. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  435. Wells,John R.; Felt,Edward P., System and method for message encryption and signing in a transaction processing system.
  436. Smith,David Wesley, System and method for monitoring computer application and resource utilization.
  437. Zhou, Todd Tao; Batista, Ricardo, System and method for monitoring secure data on a network.
  438. Zhou, Todd Tao; Batista, Ricardo, System and method for monitoring secure data on a network.
  439. Zhou, Todd Tao; Batista, Ricardo, System and method for monitoring secure data on a network.
  440. Davis,Owen; Jain,Vidyut, System and method for monitoring the use of a resource by a client connected to a computer network having one or more servers in communication with one or more clients.
  441. Smith, Benjamin; Sabin, Daniel; Smith, Fred Hewitt, System and method for obtaining keys to access protected information.
  442. Schull,Jonathan, System and method for operating a licensing server.
  443. Smith, III, Fred Hewitt; Smith, Cynthia; Smith, Benjamin; Sabin, Daniel, System and method for policy driven protection of remote computing environments.
  444. Schull,Jonathan, System and method for processing protected audio information.
  445. Schull, Jonathan, System and method for processing protected text information.
  446. Schull,Jonathan, System and method for processing protected video information.
  447. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  448. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  449. Wang, Xin, System and method for protection of digital works.
  450. Gatherer, Alan; Bhattacharya, Debashis; Soong, Anthony C. K., System and method for real time virtualization.
  451. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  452. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  453. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  454. Sancho, Enrique David, System and method for secure network purchasing.
  455. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for secure storage data using a key.
  456. Lampson, Butler W.; DeTreville, John D.; England, Paul, System and method for secure storage of data using public and private keys.
  457. Schull, Jonathan, System and method for selectively changing parameter settings based on lineage analysis of digital information.
  458. Schull,Jonathan, System and method for selectively enabling access based on lineage analysis of digital information.
  459. Schull,Jonathan, System and method for selling protected information in an oem context.
  460. Enscoe, Christopher J.; Newman, Gary H., System and method for software usage discovery.
  461. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  462. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  463. Wang,Xin, System and method for transferring the right to decode messages.
  464. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  465. Smith, Fred Hewitt; Smith, Cynthia, System and method for using a separate device to facilitate authentication.
  466. Smith, Fred Hewitt; Smith, Cynthia, System and method for using a separate device to facilitate authentication.
  467. Kelly, J. Keith; Edmondson, Peter S., System and method of managing registration, sale, distribution and use of regulated agricultural products and the licensing/certification of dealers and applicators of agricultural products.
  468. Bodrov, Dmitry, System and method of verifying the authenticity of dynamically connectable executable images.
  469. Bodrov, Dmitry, System and method of verifying the authenticity of dynamically connectable executable images.
  470. Erickson,John S., System and methods for managing digital creative works.
  471. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  472. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  473. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  474. Geihs Kurt,DEX ; Hollberg Ulf,DEX ; Eberle Herbert,DEX ; Heite Reinhard,DEX, System for automatically transferring access authorization of third node to first node even through first node is not pr.
  475. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  476. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  477. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  478. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
  479. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  480. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  481. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  482. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  483. Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
  484. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  485. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  486. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  487. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  488. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  489. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  490. Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
  491. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  492. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  493. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  494. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  495. Michael F. Guheen ; James D. Mitchell ; James J. Barrese, System for establishing plan to test components of web based framework by displaying pictorial representation and conveying indicia coded components of existing network framework.
  496. Smith Benjamin Hewitt ; Smith Fred Hewitt, System for installing information related to a software application to a remote computer over a network.
  497. Myerson Terry J., System for log record and log expansion with inserted log records representing object request for specified object corr.
  498. Akiyama Ryota,JPX ; Torii Naoya,JPX, System for management of software employing memory for processing unit with regulatory information, for limiting amount of use and number of backup copies of software.
  499. Marquis Eduardo Omar ; Pickering James Randolph ; Spelce Douglas Cooper ; Young Russell Arthur, System for prompting parameters required by a network application and using data structure to establish connections bet.
  500. Kurihara Akira,JPX, System for remotely authenticating access to local software.
  501. Guheen, Michael F.; Mitchell, James D.; Barrese, James J., System method and article of manufacture for building, managing, and supporting various components of a system.
  502. Motoyama,Tetsuro, System using internet application for monitoring image-forming device and sharing device information among departments.
  503. Getsin,Evgeniy M; Lewis,Michael J; Collart,Todd R, System, method and article of manufacture for a business layer component in a multimedia synchronization framework.
  504. Lamkin,Allan B.; Collart,Todd R., System, method and article of manufacture for a common cross platform framework for development of DVD-Video content integrated with ROM content.
  505. Getsin,Evgeniy M; Lewis,Michael J; Collart,Todd R, System, method and article of manufacture for a synchronizer component in a multimedia synchronization framework.
  506. Leong, Cheah Wee; Ng, William, System, method and article of manufacture for initiation of bidding in a virtual trade financial environment.
  507. Getsin, Evgeniy M.; Lewis, Michael J.; Collart, Todd R., System, method and article of manufacture for java/javascript component in a multimedia synchronization framework.
  508. Getsin, Evgeniy M.; Lewis, Michael J.; Collart, Todd R., System, method and article of manufacture for late synchronization during the execution of a multimedia event on a plurality of client computers.
  509. Getsin, Evgeniy M.; Lamkin, Allan B.; Collart, Todd R.; Lewis, Michael J., System, method and article of manufacture for remote control and navigation of local content.
  510. Getsin,Evgeniy M.; Lamkin,Allan B.; Collart,Todd R.; Lewis,Michael J., System, method and article of manufacture for remote control and navigation of local content.
  511. Lamkin, Allan B.; Collart, Todd R., System, method and article of manufacture for tracking and supporting the distribution of content electronically.
  512. Collart, Todd, System, method and article of manufacture for updating content stored on a portable storage medium.
  513. Collart, Todd R., System, method and article of manufacture for updating content stored on a portable storage medium.
  514. Collart,Todd R., System, method and article of manufacture for updating content stored on a portable storage medium.
  515. Collart, Todd R., System, method and article of manufacturing for authorizing the use of electronic content utilizing a laser-centric medium and a network server.
  516. Lofgren, Neil E.; Seder, Phillip Andrew; MacIntosh, Brian T., Systems and methods facilitating communication with remote computers.
  517. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  518. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  519. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  520. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  521. Kolessar, Ronald S.; Jensen, James M.; Lynch, Wendell D., Systems and methods for gathering audience measurement data.
  522. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  523. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  524. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  525. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  526. LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  527. LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
  528. Levine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  529. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  530. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  531. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  532. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  533. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  534. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  535. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  536. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  537. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  538. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  539. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  540. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  541. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  542. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  543. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  544. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  545. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  546. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  547. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  548. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  549. Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  550. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  551. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  552. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  553. Meyer, Joel R.; Rhoads, Geoffrey B., Systems and methods of managing audio and other media.
  554. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  555. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  556. Levy, Kenneth L.; Meyer, Joel R.; Andrews, III, Hoyet Harrison, Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities.
  557. Jones, Robert, Systems, compositions, and methods for full color laser engraving of ID documents.
  558. Jones, Robert L.; Bi, Daoshen; Yeh, Tung-Feng, Tamper evident adhesive and identification document including same.
  559. Rivera Angel ; Ruby Samuel Anthony, Technique for monitoring for license compliance for client-server software.
  560. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  561. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  562. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  563. Margel, Shiri; Mantin, Itsik; Shulman, Amichai, Techniques for preventing large-scale data breaches utilizing differentiated protection layers.
  564. Mikurak, Michael G., Technology sharing during demand and supply planning in a network-based supply chain environment.
  565. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  566. Linnermark Nils O. A. (Trngsund SEX) Carlsson Karl U. (Skarpnack SEX), Tracing with keys and locks.
  567. Patterson, Patrick E., Tracking electronic content.
  568. Patterson, Patrick E., Tracking electronic content.
  569. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  570. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  571. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Transferring application secrets in a trusted operating system environment.
  572. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  573. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  574. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  575. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  576. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  577. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  578. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  579. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  580. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  581. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  582. Margel, Shiri; Mantin, Itsik; Shulman, Amichai, Unobtrusive protection for large-scale data breaches utilizing user-specific data object access budgets.
  583. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  584. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  585. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  586. Blumenau, Trevor I.; Harkness, David H.; Bhatia, Manish, Use of browser history file to determine web site reach.
  587. Blumenau, Trevor I.; Harkness, David H.; Bhatia, Manish, Use of browser history file to determine web site reach.
  588. Blumenau, Trevor I.; Harkness, David H.; Bhatia, Manish, Use of browser history file to determine web site reach.
  589. Levy,Kenneth L., User-friendly rights management systems and methods.
  590. Bannister, Vincent; Born, Bryan; Fung, Brahmnes TF; Downing, Joe; Ben-Menahem, Avi; Jenson, Devin, Validation of user entitlement to game play.
  591. Hill Charles E., Virtual catalog and product presentation method and apparatus.
  592. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Virtual host for protocol transforming traffic traversing between an IP-compliant source and non-IP compliant destination.
  593. Geoffrey B. Rhoads, Watermark enabled video objects.
  594. Rhoads,Geoffrey B.; Levy,Kenneth L.; McKinley,Tyler J., Watermark encoded video, and related methods.
  595. Evans, Douglas B.; Conwell, William Y., Watermark-based object linking and embedding.
  596. Guheen,Michael F.; Mitchell,James D.; Barrese,James J., Web-based architecture sales tool.
  597. Carroll, Jr., Thomas J., XML-based graphical user interface application development toolkit.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로