$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure system for activating personal computer software at remote locations 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
출원번호 US-0610037 (1990-11-07)
발명자 / 주소
  • Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA)
인용정보 피인용 횟수 : 452  인용 특허 : 0

초록

A process and system for activating various programs are provided in a personal computer. The computer is initially provided with a portion of a main program. A data link is established between the personal computer and a registration computer. By providing the registration computer with various inf

대표청구항

A system for activating a program file for a limited or unlimited period of time comprising; at least one remote computer, initially provided with a program file containing an overlay loader segment but lacking at least one critical program segment, preventing operation of the program file, said ove

이 특허를 인용한 특허 (452)

  1. Hoffberg, Steven M., Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore.
  2. Eriksson, Thomas; Wenzel, Jurgen; Karlsson, Tobias, Anti-piracy software protection system and method.
  3. Ronning,Joel A.; Wical,Kelly J., Apparatus and method for adaptive fraud screening for electronic commerce transactions.
  4. Arnold Terry Sutton, Apparatus and method for establishing a crytographic link between elements of a system.
  5. Terry Sutton Arnold, Apparatus and method for establishing a crytographic link between elements of a system.
  6. Arnold Todd Weston, Apparatus and method for secure distribution of data.
  7. Ronning, Joel A.; Wical, Kelly J., Apparatus and method for secure downloading of files.
  8. Tsou, I-Wen; Araki, Hirokatsu; Hirao, Tsuyoshi; Takahashi, Tadashi; Kido, Toshiharu, Automatic tracking system and method for distributable software.
  9. Peinado, Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  10. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  11. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  12. Peinado, Marcus, Binding a digital license to a portable or the like in a digital rights management (DMR) system and checking out/checking in the digital license to/from the portable device or the like.
  13. Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding content to a portable storage device or the like in a digital rights management (DRM) system.
  14. Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding digital content to a portable storage device or the like in a digital rights management (DRM) system.
  15. Ronning Joel A., Central database system for automatic software program sales.
  16. Zhou, Xu; Huang, Lin; Xie, Michael, Circuits and methods for efficient data transfer in a virus co-processing system.
  17. Zhou, Xu; Huang, Lin; Xie, Michael, Circuits and methods for operating a virus co-processor.
  18. Braitberg, Michael F.; Volk, Steven B.; Zaharris, Daniel R.; Davies, David H., Combination mastered and writeable medium and use in electronic internet appliance.
  19. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  20. Millard John, Computer file integrity verification.
  21. Braitberg,Michael F.; Volk,Steven B., Content distribution method and apparatus.
  22. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  23. Stefik,Mark J., Content rendering device with usage rights.
  24. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  25. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  26. Saito, Makoto, Controlling database copyrights.
  27. Saito, Makoto, Controlling database copyrights.
  28. Saito, Makoto, Controlling database copyrights.
  29. Gartside, Paul Nicholas; Harris, Mark, Controlling use of a computer program installed on a computer.
  30. Saito, Makoto, Data copyright management.
  31. Saito, Makoto, Data copyright management.
  32. Saito, Makoto, Data copyright management system.
  33. Saito, Makoto, Data management.
  34. Akiyama Ryota,JPX ; Yoshioka Makoto,JPX, Data management module, data reproduction management device and data reproduction management system.
  35. Saito, Makoto, Data management system.
  36. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  37. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  38. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  39. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  40. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  41. MacKay,Michael K.; Sibert,W. Olin; Landsman,Richard A.; Swenson,Eric J.; Hunt,William, Data protection systems and methods.
  42. Hellst?n,Harri; Kivisto,Kari, Dedicated applications for user stations and methods for downloading dedicated applications to user stations.
  43. Patterson, Patrick E., Delivering electronic content.
  44. Patterson, Patrick E., Delivering electronic content.
  45. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  46. Sallam,Ahmed, Detecting computer worms as they arrive at local computers through open network shares.
  47. Hoffberg, Steven M., Detection and alert of automobile braking event.
  48. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  49. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  50. Farrugia, Augustin J.; Fasoli, Gianpaolo; Riendeau, Jean-Francois, Device-independent management of cryptographic information.
  51. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  52. Saito, Makoto, Digital content management system and apparatus.
  53. Peinado,Marcus; Abburi,Rajasekhar; England,Paul; Ganesan,Krishnamurthy; Bell,Jeffrey R. C.; Blinn,Arnold N.; Jones,Thomas C., Digital license and method for obtaining/providing a digital license.
  54. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  55. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  56. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  57. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  58. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  59. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  60. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  61. Peinado, Marcus; Liu, Donna; Ganesan, Krishnamurthy, Digital rights management system operating on computing device and having black box tied to computing device.
  62. Levy, Kenneth L., Digital watermarking and fingerprinting applications for copy protection.
  63. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  64. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  65. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  66. Carroll, Donald E., Disk boot sector for software contract enforcement.
  67. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  68. Sallam,Ahmed, Duplicating handles of target processes without having debug privileges.
  69. Zhou, Xu; Huang, Lin; Xie, Michael, Efficient data transfer in a virus co-processing system.
  70. Zhou, Xu; Huang, Lin; Xie, Michael, Efficient data transfer in a virus co-processing system.
  71. Zhou, Xu; Huang, Lin; Xie, Michael, Efficient data transfer in a virus co-processing system.
  72. Zhou, Xu; Huang, Lin; Xie, Michael, Efficient data transfer in a virus co-processing system.
  73. Hill Charles E., Electronic catalog system and method.
  74. Hill Charles E., Electronic catalog system and method.
  75. Hill,Charles E., Electronic catalog system and method.
  76. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  77. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  78. Ronning,Joel A.; Wical,Kelly J., Electronic commerce system and method for detecting fraud.
  79. Torii Naoya,JPX ; Iwayama Noboru,JPX ; Takenaka Masahiko,JPX ; Hasebe Takayuki,JPX ; Matsuda Masahiro,JPX, Encoder and decoder.
  80. Peinado, Marcus; Venkatesan, Ramarathnam, Encrypting a digital object based on a key ID selected therefor.
  81. Peinado,Marcus; Venkatesan,Ramarathnam, Encrypting a digital object on a key ID selected therefor.
  82. Oliveira, Eduardo P.; Dunbar, Geoffrey; Alkove, James M., Encryption scheme for streamed multimedia content protected by rights management system.
  83. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Enforcement architecture and method for digital rights management.
  84. Homer, Gregg S., Even more subscription media on demand.
  85. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  86. Olsen James E. ; Bringhurst Adam L., Fault tolerant electronic licensing system.
  87. Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code from third computer process on behalf of first process.
  88. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  89. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  90. Lelikov, Andrey; Gunyakti, Caglar; Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code on behalf thereof.
  91. Brooks, Cecil Ray; Girotto, Jay Robert; Gunyakti, Caglar; Haugen, Todd, Flexible licensing architecture for licensing digital application.
  92. Brooks, Cecil Ray; Girotto, Jay Robert; Gunyakti, Caglar; Haugen, Todd, Flexible licensing architecture for licensing digital application.
  93. Hoffberg, Steven M., Game theoretic prioritization system and method.
  94. Reay, C. Phillip; Coco, Geoffrey P., Generating revenue for the use of softgoods that are freely distributed over a network.
  95. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  96. Okada Toshiro,JPX ; Igarashi Norihiko,JPX ; Oki Hiroshi,JPX ; Kamata Shinji,JPX ; Hara Takashi,JPX ; Yamazaki Toshiya,JPX, Identifier managing device and method in software distribution system.
  97. Chan, Hark C., Information distribution and processing system.
  98. Chan, Hark C., Information distribution and processing system.
  99. Chan, Hark C., Information distribution and processing system.
  100. Chan, Hark C., Information distribution and processing system.
  101. Chan, Hark C., Information distribution and processing system.
  102. Chan,Hark C., Information distribution and processing system.
  103. Chan,Hark C., Information distribution and processing system.
  104. Ono,Makoto, Information transmission method and system.
  105. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  106. Filepp Robert ; Gordon Michael L. ; Bidwell Alexander W. ; Young Francis C. ; Wolf Allan M. ; Meo Sam ; Tiemann Duane ; Abrahams Lawrence ; Silfen Michael J. ; Dalsass Aldo R. ; Lee Florence M. ; App, Interactive computer network and method of operation.
  107. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  108. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  109. Hasebe Takayuki,JPX ; Torii Naoya,JPX, Licensee notification system.
  110. Strom, Clifford P.; Siu, Michael Y.; Evans, Brian P., Licensing content for use on portable device.
  111. Sallam, Ahmed S., Lightweight hooking mechanism for kernel level operations.
  112. Dillaway, Blair Brewster; LaMacchia, Brian; Manferdelli, John; Paramasivam, Muthukrishnan, Long-life digital certification for publishing long-life digital content or the like in content rights management system or the like.
  113. Redmond, Ian; Bell, Bernard; Blankenbeckler, David L.; Braitberg, Michael F.; Freeman, Robert D., Low profile optical head.
  114. Redmond,Ian; Bell,Bernard; Blankenbeckler,David L.; Braitberg,Michael F.; Freeman,Robert D., Low profile optical head.
  115. Landau, Richard B., Manufacturing process for software raid disk sets in a computer system.
  116. Farrugia, Augustin J.; Fasoli, Gianpaolo; Toublet, Bertrand Mollinier; Ciet, Mathieu, Media storage structures for storing content, devices for using such structures, systems for distributing such structures.
  117. Farrugia, Augustin J.; Fasoli, Gianpaolo; Toublet, Bertrand Mollinier; Ciet, Mathieu, Media storage structures for storing content, devices for using such structures, systems for distributing such structures.
  118. Wallace, Colleen; Friman, Harry; Chou, Gee Kin; Devin, Beth; Chapman, Janet, Method and apparatus for a new accounts program.
  119. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  120. Levy, Kenneth L., Method and apparatus for automatic ID management.
  121. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  122. Levy, Kenneth L., Method and apparatus for content management.
  123. Levy, Kenneth L., Method and apparatus for content management.
  124. Levy, Kenneth L., Method and apparatus for content management.
  125. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  126. DeMont Jason Paul, Method and apparatus for distributing information products.
  127. DeMont Jason Paul, Method and apparatus for distributing information products.
  128. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  129. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  130. Ross Cliff D. ; Taylor Neil W., Method and apparatus for electronic license distribution.
  131. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  132. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  133. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  134. Stefik, Mark J.; Pirolli, Peter L., Method and apparatus for executing code in accordance with usage rights.
  135. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  136. Xu, Xuejun; Nadell, Katherine K., Method and apparatus for facilitating the transfer of a software license between computer systems.
  137. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  138. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  139. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  140. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  141. Wallace, Colleen; Friman, Harry; Chou, Gee Kin; Devin, Beth; Chapman, Janet, Method and apparatus for new accounts program.
  142. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  143. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  144. Grantz Jeffrey A. (Boca Raton FL) Ure J. Robert (Coral Springs FL), Method and apparatus for providing a trial period for a software license product using a date stamp and designated test.
  145. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  146. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  147. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  148. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  149. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  150. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  151. Mages Kenneth G. ; Feng Jie, Method and apparatus of secure server control of local media via a trigger through a network for instant local access o.
  152. Kenneth G. Mages ; Jie Feng, Method and apparatus of secure server control of local media via a trigger through a network for instant local access of encrypted data on an internet webpage.
  153. Iwayama Noboru,JPX ; Torii Naoya,JPX ; Hasebe Takayuki,JPX ; Takenaka Masahiko,JPX ; Matsuda Masahiro,JPX, Method and device for utilizing data content.
  154. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  155. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  156. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  157. Pettitt John Philip, Method and system for controlling distribution of software in a multitiered distribution chain.
  158. Krishnan Ganapathy ; Oyler Scott, Method and system for injecting new code into existing application code.
  159. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined condition for usage.
  160. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  161. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  162. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  163. Wyman Robert M., Method and system for managing execution of licensed programs.
  164. Rhoads,Geoffrey B., Method and system for managing, accessing and paying for the use of copyrighted electronic media.
  165. Larose Gordon Edward,CAX ; Allan David Ian,CAX, Method and system for networked installation of uniquely customized, authenticable, and traceable software application.
  166. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  167. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  168. Lao, Guillermo, Method and system for subscription digital rights management.
  169. Lao, Guillermo, Method and system for subscription digital rights management.
  170. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  171. Civanlar Mehmet Reha, Method and system of using personal information as a key when distributing information.
  172. Schull,Jonathan, Method for adapting a software product to an environment.
  173. Schull,Jonathan, Method for causing a digital product to revert to a demo mode.
  174. Stelling,Desi; Schulze,Timothy; Walker,Vance, Method for controlling customer-implemented data updates.
  175. Saito, Makoto, Method for controlling database copyrights.
  176. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  177. Lakamp, Brian D.; Singer, Mitchell F., Method for generating a secure copy of media data.
  178. Lakamp, Brian D.; Singer, Mitchell F., Method for generating a secure copy of media data.
  179. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  180. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  181. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  182. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  183. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  184. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  185. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  186. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  187. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  188. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  189. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system.
  190. Dawkins,George John; McIntosh,Gordon D., Method for preventing loading and execution of rogue operating systems in a logical partitioned data processing system.
  191. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  192. Schull,Jonathan, Method for selling, protecting, and redistributing digital goods.
  193. Homer, Gregg S., Method for subscription media on-demand.
  194. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  195. Hill Charles E., Method for updating a remote computer.
  196. Schull,Jonathan, Method of altering a software product in response to predetermined events.
  197. Felger, David, Method of billing a purchase made over a computer network.
  198. Felger, David, Method of billing a purchase made over a computer network.
  199. Felger, David, Method of billing a purchase made over a computer network.
  200. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  201. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  202. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  203. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  204. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  205. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  206. Kessler, Saul; Quinlan, Sean Michael; Somani, Haniff; Thompson, Nigel; Satmarel, Adrian, Methods for activation of an application on a user device.
  207. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  208. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  209. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  210. Erickson, John S., Methods for playing protected content.
  211. Rhoads,Geoffrey B., Methods for steganographic encoding media.
  212. Lau,James Sheung, Methods, systems, signals and media for encouraging users of computer readable content to register.
  213. Hoffberg, Steven M., Mobile communication device.
  214. Etchegoyen, Craig S., Modular software protection.
  215. Sallam, Ahmed, Monitoring and controlling services.
  216. Homer, Gregg S., More subscription media on demand.
  217. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  218. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  219. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  220. Hoffberg, Steven Mark, Multifactorial optimization system and method.
  221. Pendlebury,Ian Malcolm, Network enabled application software system and method.
  222. Ronning Joel A., On-line try before you buy software distribution system.
  223. Reeder Anthony Andrew,GBX, Operating apparatus.
  224. Zhou, Xu; Huang, Lin; Xie, Michael, Operation of a dual instruction pipe virus co-processor.
  225. Zhou, Xu; Huang, Lin; Xie, Michael, Operation of a dual instruction pipe virus co-processor.
  226. Zhou, Xu; Huang, Lin; Xie, Michael, Operation of a dual instruction pipe virus co-processor.
  227. Zhou, Xu; Huang, Lin; Xie, Michael, Operation of a dual instruction pipe virus co-processor.
  228. Zhou, Xu; Huang, Lin; Xie, Michael, Operation of a dual instruction pipe virus co-processor.
  229. Zhou, Xu; Huang, Lin; Xie, Michael, Operation of a dual instruction pipe virus co-processor.
  230. Braitberg, Michael F.; Volk, Steven B.; Zaharris, Daniel R.; Davies, David H., Optical recording medium having a master data area and a writeable data area.
  231. Nakashima Kazuo,JPX, Optical recording medium to store and access large volumes of data.
  232. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  233. Evans, Brian P.; Strom, Clifford P.; Dunbar, Geoffrey; Prologo, Richard D., Playlist burning in rights-management context.
  234. Peinado,Marcus; Venkatesan,Ramarathnam; Davis,Malcolm, Producing a new black box for a digital rights management (DRM) system.
  235. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  236. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  237. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  238. England, Paul; Peinado, Marcus; Sankaranarayan, Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  239. England,Paul; Peinado,Marcus; Sankaranarayan,Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  240. England,Paul; Peinado,Marcus; Sankaranarayan,Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  241. England,Paul; Peinado,Marcus; Sankaranarayan,Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  242. Oliveira, Eduardo P.; Klemets, Anders E.; Bhatt, Sanjay; Paka, Anand; Alkove, James M., Protecting digital media of various content types.
  243. Homer, Gregg S., Rechargeable media distribution and play system.
  244. Sallam, Ahmed, Regulating remote registry access over a computer network.
  245. Peinado, Marcus; England, Paul; Yerrace, Frank, Releasing decrypted digital content to an authenticated path.
  246. Peinado,Marcus; England,Paul; Yerrace,Frank, Releasing decrypted digital content to an authenticated path.
  247. Chan,Man, Remote access authorization of local content.
  248. Manduley Flavio M. ; Hofer John A., Remote activation of rating capabilities in a computerized parcel manifest system.
  249. Manduley Flavio M., Remote activation of software features in a data processing device.
  250. Marbach, Alain; Baker, Richard A., Remote monitoring of factory automation users.
  251. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  252. Peinado, Marcus; Manferdelli, John L.; Bell, Jeffrey R. C., Rendering digital content in an encrypted rights-protected form.
  253. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  254. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  255. Gajjala,Vijay K.; Ganesan,Krishnamurthy; McKune,Jeffrey R., Retail transactions involving digital content in a digital rights management (DRM) system.
  256. Abburi,Rajasekhar, Retail transactions involving distributed and super-distributed digital content in a digital rights management (DRM) system.
  257. Evans, Brian P.; Strom, Clifford P.; Rosenstein, Daniel, Rights management system for streamed multimedia content.
  258. Evans, Brian P.; Strom, Clifford P.; Rosenstein, Daniel; Paka, Anand D.; Fang, Nicholas J.; Oliveria, Eduardo, Rights management system for streamed multimedia content.
  259. Van Dyke, Clifford P.; Cheng, David J.; Mohan, Siva, Rights management system for streamed multimedia content.
  260. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  261. Sallam, Ahmed, Robustly regulating access to executable class registry entries.
  262. Williams,Matthew, Saw blade case.
  263. Hartmann,Al, Scan-on-read.
  264. Ronning, Joel A.; Wical, Kelly J.; Kukura, Marc A., Scheduling of a file download and search for updates.
  265. Millard John, Secure access to software modules.
  266. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  267. Ronning, Joel Alan; Wical, Kelly J., Secure downloading of a file from a network system and method.
  268. Holmes Lyndon S. ; King ; III James, Secure electronic publishing system.
  269. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  270. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  271. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  272. Rhoads,Geoffrey B., Securing media content with steganographic encoding.
  273. Allen, David L; Savage, David E; Loving, Kent; Pollock, Bruce; Cloutier, John M; Smith, Denise M, Security certificate management.
  274. Ronning Joel A., Self-launching encrypted digital information distribution system.
  275. Ronning Joel A., Self-launching encrypted try before you buy software distribution system.
  276. Moriyasu Kenji (Tokyo JPX) Kanai Atsusi (Kanagawaken JPX) Miyake Nobuhisa (Tokyo JPX) Terauchi Atsusi (Tokyo JPX) Okuyama Hironobu (Saitamaken JPX), Software analysis protection method for changing the software pattern on the memory of a user terminal.
  277. Peinado, Marcus; England, Paul; Manferdelli, John L., Software application protection by way of a digital rights management (DRM) system.
  278. Hasebe Takayuki,JPX ; Torii Naoya,JPX ; Iwayama Noboru,JPX ; Takenaka Masahiko,JPX ; Matsuda Masahiro,JPX, Software charging system and software data utilization permitting device.
  279. Akiyama Ryota (Kawasaki JPX) Yoshioka Makoto (Kawasaki JPX), Software delivery system, center device, relaying device and user terminal device.
  280. Akiyama, Ryota; Yoshioka, Makoto, Software encoding using a combination of two types of encoding and encoding type identification information.
  281. Michel Alan D. (Fishers IN) Reinke Robert E. (Indianapolis IN), Software pay per use system.
  282. Bahar, Reuben, Software piracy prevention through remote enforcement of an activation threshold.
  283. Itami Satoshi,JPX ; Nakashima Kazuo,JPX ; Utsumi Kenichi,JPX, Software processing apparatus writing software to a medium only if identification information in the software corresponds to identification information in the medium.
  284. Akiyama Ryota,JPX ; Yoshioka Makoto,JPX, Software reproduction apparatus.
  285. Akiyama,Ryota; Yoshioka,Makoto, Software reproduction apparatus.
  286. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  287. Nishio Nobuhiko,JPX, Software usage measurement apparatus for imposing a proper charge in accordance with number of times multimedia unit dat.
  288. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifiying security for an element by assigning a scaled value representative of the relative security thereof.
  289. Ganesan, Krishnamurthy, Specifying rights in a digital rights license according to events.
  290. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  291. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  292. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  293. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  294. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  295. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  296. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  297. Peinado,Marcus; Abburi,Rajasekhar; Bell,Jeffrey R. C., Structural of digital rights management (DRM) system.
  298. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Bell,Jeffrey R. C., Structure of a digital content package.
  299. Liu, Yeu; Pandya, Ravi; Ivanov, Lazar; Paramasivam, Muthukrishnan; Gunyakti, Caglar; Gui, Dongmei; Hsu, Scott W. P., Supplementary trust model for software licensing/commercial digital distribution policy.
  300. Chan, Hark C., System and method for accessing set of digital data at a remote site.
  301. Mechaley, Robert; Miner, Richard A., System and method for activating software operating capabilities based on usage patterns and rules.
  302. Richardson, Ric B., System and method for adjustable licensing of digital products.
  303. Benson, Greg; Franklin, Martin; Knauft, Christopher L., System and method for authenticating peer components.
  304. Schull,Jonathan, System and method for controlling access to protected information.
  305. Schull,Jonathan, System and method for creating and running protected information.
  306. Lockhart, Malcolm W.; Grimes, D. Gordon; Sharma, Ranjiv K.; Musselwhite, Neal A., System and method for data rights management.
  307. Lockhart,Malcolm W.; Grimes,D. Gordon; Sharma,Ranjiv K.; Musselwhite,Neal A., System and method for data rights management.
  308. Hoffberg, Steven M., System and method for determining contingent relevance.
  309. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  310. Schull, Jonathan, System and method for distributing protected information.
  311. Wang,Xin, System and method for document distribution.
  312. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  313. Erickson, John S., System and method for managing copyrighted electronic media.
  314. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, System and method for managing transaction record delivery using an acknowledgement-monitoring process and a failure-recovery process with modifying the predefined fault condition.
  315. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  316. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  317. Schull,Jonathan, System and method for operating a licensing server.
  318. Schull,Jonathan, System and method for processing protected audio information.
  319. Schull, Jonathan, System and method for processing protected text information.
  320. Schull,Jonathan, System and method for processing protected video information.
  321. Hecksel David L. ; Duderstadt Russel A., System and method for product registration.
  322. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  323. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  324. Wang, Xin, System and method for protection of digital works.
  325. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  326. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  327. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  328. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  329. Schull, Jonathan, System and method for selectively changing parameter settings based on lineage analysis of digital information.
  330. Schull,Jonathan, System and method for selectively enabling access based on lineage analysis of digital information.
  331. Schull,Jonathan, System and method for selling protected information in an oem context.
  332. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  333. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  334. Wang,Xin, System and method for transferring the right to decode messages.
  335. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  336. Bodrov, Dmitry, System and method of verifying the authenticity of dynamically connectable executable images.
  337. Bodrov, Dmitry, System and method of verifying the authenticity of dynamically connectable executable images.
  338. Erickson,John S., System and methods for managing digital creative works.
  339. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  340. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  341. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  342. Akiyama Ryota,JPX ; Munakata Akio,JPX ; Koga Yuzuru,JPX ; Ishizaki Masayuki,JPX, System for and method of authenticating a client.
  343. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  344. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  345. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  346. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
  347. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  348. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  349. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  350. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  351. Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
  352. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  353. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  354. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  355. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  356. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  357. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  358. Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
  359. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  360. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  361. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  362. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  363. Steven Karl Schoch ; Paul Swart, System for controlling the use of licensed software.
  364. Nakashima Kazuo,JPX ; Nakahara Masaru,JPX ; Itami Satoshi,JPX ; Utsumi Kenichi,JPX, System for decrypting encrypted software.
  365. Iwamura Keiichi,JPX, System for enabling access to a body of information based on a credit value, and system for allocating fees.
  366. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  367. Ronning Joel A., System for preventing unauthorized copying of active software.
  368. Jernbacker Lars (Vaxjo SEX), System for reading encrypted information, and unit for use in such a system.
  369. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  370. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  371. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  372. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  373. Etchegoyen, Craig S., Systems and methods for game activation.
  374. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  375. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  376. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  377. Goldberg, Andrew V.; Hartline, Jason D.; Wright, Andrew K., Systems and methods for pricing and selling digital goods.
  378. Goldberg,Andrew V.; Hartline,Jason D.; Wright,Andrew K., Systems and methods for pricing and selling digital goods.
  379. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  380. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  381. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  382. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  383. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  384. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  385. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  386. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  387. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  388. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  389. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  390. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  391. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  392. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  393. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  394. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  395. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  396. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  397. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  398. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  399. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  400. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  401. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  402. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  403. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  404. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  405. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  406. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  407. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  408. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  409. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  410. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  411. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  412. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  413. Sibert, W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  414. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  415. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  416. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  417. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  418. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  419. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  420. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  421. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  422. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  423. Levy, Kenneth L.; Meyer, Joel R.; Andrews, III, Hoyet Harrison, Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities.
  424. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  425. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  426. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  427. Patterson, Patrick E., Tracking electronic content.
  428. Patterson, Patrick E., Tracking electronic content.
  429. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  430. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  431. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  432. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  433. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  434. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  435. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  436. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  437. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  438. Ronning Joel A., Try before you buy software distribution and marketing system.
  439. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  440. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  441. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  442. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  443. Farrugia, Augustin J.; Dowdy, Thomas; Fasoli, Gianpaolo, Use of media storage structure with multiple pieces of content in a content-distribution system.
  444. Levy,Kenneth L., User-friendly rights management systems and methods.
  445. Sallam, Ahmed, Using behavior blocking mobility tokens to facilitate distributed worm detection.
  446. Sallam,Ahmed, Using mobility tokens to observe malicious mobile code.
  447. Hruska Jan,GBX ; Lammer Peter,GBX, Validity checking.
  448. Hill Charles E., Virtual catalog and product presentation method and apparatus.
  449. Huang, Lin; Zhou, Xu; Xie, Michael, Virus co-processor instructions and methods for using such.
  450. Huang, Lin; Zhou, Xu; Xie, Michael, Virus co-processor instructions and methods for using such.
  451. Huang, Lin; Zhou, Xu; Xie, Michael, Virus co-processor instructions and methods for using such.
  452. Braitberg, Michael F.; Volk, Steven B., Writeable medium access control using a medium writeable area.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로