$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure system for activating personal computer software at remote locations 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
출원번호 US-0682456 (1991-04-09)
발명자 / 주소
  • Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA)
출원인 / 주소
  • Tau Systems Corporation (Falls Church VA 02)
인용정보 피인용 횟수 : 550  인용 특허 : 0

초록

A process and system for activating various programs are provided in a personal computer. The computer is initially provided with a registration shell. A data link is established between the personal computer and a registration computer. By providing the registration computer with various informatio

대표청구항

A method of controlling the use of a program file, comprising the steps of: providing a program file including a loader segment and a registration shell portion to a remote computer having a display, said program file containing a first executive control program representing a limited version of sai

이 특허를 인용한 특허 (550)

  1. Farber, David A.; Lachman, Ronald D., Accessing data in a data processing system.
  2. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., Accessing protected content in a rights-management architecture.
  3. CP, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  4. Cp, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  5. Cook, John; Otten, Martin, Anti-piracy measures for a video game using hidden secrets.
  6. Ronning,Joel A.; Wical,Kelly J., Apparatus and method for adaptive fraud screening for electronic commerce transactions.
  7. Capps ; Jr. Louis Bennie ; Iachetta ; Jr. Richard Nicholas ; Judice Darryl Edmond, Apparatus and method for protecting system serial number while allowing motherboard replacement.
  8. Ronning, Joel A.; Wical, Kelly J., Apparatus and method for secure downloading of files.
  9. Sharma, Rosen; Bhargava, Rishi; Vittal, Chiradeep; Eranky, Shyam, Application change control.
  10. Narin, Attila; DeMello, Marco A.; Yaacovi, Yoram; Alger, Jeffrey A.; Keely, Leroy B.; Silver, David Michael; Madonna, Christopher Robert Richard; Beezer, John; Hughes, Kathryn E., Architecture for an electronic shopping service integratable with a software application.
  11. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Malik,Prashant; Hughes,Kathryn E.; Byrum,Frank D., Asynchronous communication within a server arrangement.
  12. Capio, Oliver R., Audience-condition based media selection.
  13. Nathan, Guy; Mastronardi, Tony, Audiovisual distribution system for playing an audiovisual piece among a plurality of audiovisual devices connected to a central server through a network.
  14. Nathan, Guy; Mastronardi, Tony, Audiovisual distribution system for playing an audiovisual piece among a plurality of audiovisual devices connected to a central server through a network.
  15. Nathan, Guy, Audiovisual reproduction system.
  16. Nathan, Guy, Audiovisual reproduction system.
  17. Nathan, Guy, Audiovisual reproduction system.
  18. Nathan, Guy, Audiovisual reproduction system.
  19. Nathan, Guy, Audiovisual reproduction system.
  20. Nathan, Guy, Audiovisual reproduction system.
  21. Peinado, Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  22. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  23. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  24. Peinado, Marcus, Binding a digital license to a portable or the like in a digital rights management (DMR) system and checking out/checking in the digital license to/from the portable device or the like.
  25. Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding content to a portable storage device or the like in a digital rights management (DRM) system.
  26. Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding digital content to a portable storage device or the like in a digital rights management (DRM) system.
  27. Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, Business method and system for serving third party software applications.
  28. Ronning Joel A., Central database system for automatic software program sales.
  29. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  30. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  31. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  32. Dion, Dominique; Fedesna, Kenneth J.; Loffredo, Mark D.; Suchocki, Edward J.; Pellegrini, Edward E.; Pellegrini, Frank J.; Hicks, Edward F.; Mednick, Cary M., Coin operated entertainment system.
  33. Dion, Dominique; Fedesna, Kenneth J.; Loffredo, Mark D.; Suchocki, Edward J.; Pellegrini, Edward E.; Pellegrini, Frank J.; Hicks, Edward F.; Mednick, Cary M., Coin operated entertainment system.
  34. Carlson, Jay A.; Chopra, Vivek, Collection of telemetry data by a telemetry library within a client device.
  35. Crawford Christopher M., Commercial online software distribution systems and methods using encryption for security.
  36. Nathan, Guy; Mastronardi, Tony; Choquet, Alain, Communication device and method between an audiovisual information playback system and an electronic game machine.
  37. Nathan, Guy; Mastronardi, Tony; Choquet, Alain, Communication device and method between an audiovisual information playback system and an electronic game machine.
  38. Nathan, Guy; Mastronardi, Tony; Choquet, Alain, Communication device and method between an audiovisual information playback system and an electronic game machine.
  39. Nathan, Guy; Mastronardi, Tony; Choquet, Alain, Communication device and method between an audiovisual information playback system and an electronic game machine.
  40. Nathan, Guy; Mastronardi, Tony; Choquet, Alain, Communication device and method between an audiovisual information playback system and an electronic game machine.
  41. Nathan, Guy; Mastronardi, Tony, Communications techniques for an intelligent digital audiovisual reproduction system.
  42. Nathan, Guy; Mastronardi, Tony, Communications techniques for an intelligent digital audiovisual reproduction system.
  43. Nathan, Guy; Mastronardi, Tony, Communications techniques for an intelligent digital audiovisual reproduction system.
  44. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  45. Darago, Vincent S; Jenkins, Christopher, Computer architecture for managing courseware in a shared use operating environment.
  46. Farber, David A.; Lachman, Ronald D., Computer file system using content-dependent file identifiers.
  47. Plum Thomas (Kamuela HI), Computer software licensing authentication method and apparatus.
  48. Sebes, E. John; Bhargava, Rishi; Reese, David P., Connectivity-based authorization.
  49. Sebes, E. John; Shah, Bakul; Sharma, Rosen, Containment of network communication.
  50. Sebes, E. John; Shah, Bakul; Sharma, Rosen, Containment of network communication.
  51. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  52. Stefik,Mark J., Content rendering device with usage rights.
  53. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  54. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  55. Shah,Bakul; Sharma,Rosen; Haight,Peter, Damage containment by translation.
  56. Akiyama Ryota,JPX ; Yoshioka Makoto,JPX, Data management module, data reproduction management device and data reproduction management system.
  57. Asoh,Junichi; Hatori,Masahiko; Tadokoro,Muzuho; Yomo,Takashi, Data protection system for removable recording medium.
  58. Corson, Greg, Delivery of digital content.
  59. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  60. Weising, George, Developing a knowledge base associated with a user that facilitates evolution of an intelligent user interface.
  61. Mastronardi, Tony; Nathan, Goy; Clement, Hugues, Device and process for remote management of a network of audiovisual information reproduction systems.
  62. Mastronardi, Tony; Nathan, Guy; Clement, Hugues, Device and process for remote management of a network of audiovisual information reproduction systems.
  63. Mastronardi, Tony; Nathan, Guy; Clement, Hugues, Device and process for remote management of a network of audiovisual information reproduction systems.
  64. Mastronardi, Tony; Nathan, Guy; Clement, Hugues, Device and process for remote management of a network of audiovisual information reproduction systems.
  65. Mastronardi, Tony; Nathan, Guy; Clement, Hugues, Device and process for remote management of a network of audiovisual information reproductions systems.
  66. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  67. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  68. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  69. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with central and local music servers.
  70. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with central and local music servers.
  71. Nathan, Guy; Mastronardi, Tony; Dion, Dominique; Khenfir, Mounir, Digital downloading jukebox system with central and local music servers.
  72. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with user-tailored music management, communications, and other tools.
  73. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with user-tailored music management, communications, and other tools.
  74. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with user-tailored music management, communications, and other tools.
  75. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with user-tailored music management, communications, and other tools.
  76. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with user-tailored music management, communications, and other tools.
  77. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with user-tailored music management, communications, and other tools.
  78. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with user-tailored music management, communications, and other tools.
  79. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with user-tailored music management, communications, and other tools.
  80. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with user-tailored music management, communications, and other tools.
  81. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with user-tailored music management, communications, and other tools.
  82. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with user-tailored music management, communications, and other tools.
  83. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with user-tailored music management, communications, and other tools.
  84. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with user-tailored music management, communications, and other tools.
  85. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with user-tailored music management, communications, and other tools.
  86. Nathan, Guy; Dion, Dominique, Digital downloading jukebox system with user-tailored music management, communications, and other tools.
  87. Dion, Dominique; Khenfir, Mounir; Panagiotopoulos, Billy; Pompidor, Christian; Beaumier, Francois; Baril, Frederic; Hebert, Sebastien, Digital downloading jukebox with revenue-enhancing features.
  88. Rivera, Ed; Tooker, Michael; Battle, Charles; Beaumier, Francois; Khenfir, Mounir; Curinga, Giovanni; Hebert, Sebastien, Digital jukebox device with improved karaoke-related user interfaces, and associated methods.
  89. Rivera, Ed; Tooker, Michael; Battle, Charles; Beaumier, Francois; Khenfir, Mounir; Curinga, Giovanni; Hebert, Sebastien, Digital jukebox device with improved karaoke-related user interfaces, and associated methods.
  90. Beaumier, Francois; Desmarais, Remi; Hebert, Sebastien; Gratton, Loic; Khenfir, Mounir; Rivera, Ed; Tooker, Michael; Pompidor, Christian, Digital jukebox device with improved user interfaces, and associated methods.
  91. Beaumier, Francois; Desmarais, Remi; Hebert, Sebastien; Gratton, Loic; Khenfir, Mounir; Rivera, Ed; Tooker, Michael; Pompidor, Christian, Digital jukebox device with improved user interfaces, and associated methods.
  92. Rivera, Ed; Tooker, Michael; Guy, Francois; Beaumier, Francois; Battle, Charles; Khenfir, Mounir; Garneau, Charles, Digital jukebox device with karaoke and/or photo booth features, and associated methods.
  93. Rivera, Ed; Tooker, Michael; Guy, Francois; Beaumier, Francois; Battle, Charles; Khenfir, Mounir; Garneau, Charles, Digital jukebox device with karaoke and/or photo booth features, and associated methods.
  94. Rivera, Ed; Tooker, Michael; Guy, Francois; Beaumier, Francois; Battle, Charles; Khenfir, Mounir; Garneau, Charles, Digital jukebox device with karaoke and/or photo booth features, and associated methods.
  95. Rivera, Ed; Tooker, Michael; Guy, Francois; Beaumier, Francois; Battle, Charles; Khenfir, Mounir; Garneau, Charles, Digital jukebox device with karaoke and/or photo booth features, and associated methods.
  96. Rivera, Ed; Tooker, Michael; Guy, Francois; Beaumier, Francois; Battle, Charles; Khenfir, Mounir; Garneau, Charles, Digital jukebox device with karaoke and/or photo booth features, and associated methods.
  97. Rivera, Ed; Tooker, Michael; Guy, Francois; Beaumier, Francois; Battle, Charles; Khenfir, Mounir; Garneau, Charles, Digital jukebox device with karaoke and/or photo booth features, and associated methods.
  98. Peinado,Marcus; Abburi,Rajasekhar; England,Paul; Ganesan,Krishnamurthy; Bell,Jeffrey R. C.; Blinn,Arnold N.; Jones,Thomas C., Digital license and method for obtaining/providing a digital license.
  99. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  100. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  101. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  102. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  103. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  104. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  105. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  106. Shen Orr,Chaim; Hibshoosh,Eliphaz; Benedek,Gyora; Solow,Hillel; Belenky,Yaacov; Tsuria,Yossi; Shkedy,Zvi, Digital rights management system and method.
  107. Peinado, Marcus; Liu, Donna; Ganesan, Krishnamurthy, Digital rights management system operating on computing device and having black box tied to computing device.
  108. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  109. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  110. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  111. Styles, Andrew G.; Phillips, Christian G., Direction-conscious information sharing.
  112. Allan, David Ian; Larose, Gordon Edward, Distribution and controlled use of software products.
  113. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  114. Nathan, Guy; Phillips, Ken; Dion, Dominique; Khenfir, Mounir, Downloading file reception process.
  115. Nathan, Guy; Phillips, Ken; Dion, Dominique; Khenfir, Mounir, Downloading file reception process.
  116. Nathan, Guy; Phillips, Ken; Dion, Dominique; Khenfir, Mounir, Downloading file reception process.
  117. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  118. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  119. Ronning,Joel A.; Wical,Kelly J., Electronic commerce system and method for detecting fraud.
  120. Torii Naoya,JPX ; Iwayama Noboru,JPX ; Takenaka Masahiko,JPX ; Hasebe Takayuki,JPX ; Matsuda Masahiro,JPX, Encoder and decoder.
  121. Peinado, Marcus; Venkatesan, Ramarathnam, Encrypting a digital object based on a key ID selected therefor.
  122. Peinado,Marcus; Venkatesan,Ramarathnam, Encrypting a digital object on a key ID selected therefor.
  123. Oliveira, Eduardo P.; Dunbar, Geoffrey; Alkove, James M., Encryption scheme for streamed multimedia content protected by rights management system.
  124. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Enforcement architecture and method for digital rights management.
  125. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  126. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  127. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  128. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  129. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  130. Dion, Dominique; Tooker, Michael; Guy, Francois; Beaumier, Francois; Khenfir, Mounir; Gratton, Loic; Bureau, Dominique; Yayli, Harun Tunc, Entertainment server and associated social networking services.
  131. Dion, Dominique; Tooker, Michael; Guy, Francois; Beaumier, Francois; Khenfir, Mounir; Gratton, Loic; Bureau, Dominique; Yayli, Harun Tunc, Entertainment server and associated social networking services.
  132. Homer, Gregg S., Even more subscription media on demand.
  133. Weising, George, Evolution of a user interface based on learned idiosyncrasies and collected data of a user.
  134. Weising, George, Evolution of a user interface based on learned idiosyncrasies and collected data of a user.
  135. Bhargava, Rishi; Sebes, E. John, Execution environment file inventory.
  136. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  137. Olsen James E. ; Bringhurst Adam L., Fault tolerant electronic licensing system.
  138. Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code from third computer process on behalf of first process.
  139. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  140. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  141. Lelikov, Andrey; Gunyakti, Caglar; Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code on behalf thereof.
  142. Brooks, Cecil Ray; Girotto, Jay Robert; Gunyakti, Caglar; Haugen, Todd, Flexible licensing architecture for licensing digital application.
  143. Brooks, Cecil Ray; Girotto, Jay Robert; Gunyakti, Caglar; Haugen, Todd, Flexible licensing architecture for licensing digital application.
  144. Fedesna, Kenneth J.; Loffredo, Mark D.; Suchocki, Edward J.; Pellegrini, Edward E.; Pellegrini, Frank J., Game terminal configured for interaction with jukebox device systems including same, and/or associated methods.
  145. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  146. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  147. Nathan, Guy; Mastronardi, Tony, Home digital audiovisual information recording and playback system.
  148. McCorkendale, Bruce; Sobel, William E., Hypervisor enabled secure inter-container communications.
  149. Chatani,Masayuki, Incentivizing software sharing thru incentive points.
  150. Chan, Hark C., Information distribution and processing system.
  151. Chan, Hark C., Information distribution and processing system.
  152. Chan, Hark C., Information distribution and processing system.
  153. Chan, Hark C., Information distribution and processing system.
  154. Chan, Hark C., Information distribution and processing system.
  155. Chan,Hark C., Information distribution and processing system.
  156. Chan,Hark C., Information distribution and processing system.
  157. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  158. Nathan, Guy; Mastronardi, Tony, Intelligent digital audiovisual playback system.
  159. Nathan, Guy; Mastronardi, Tony, Intelligent digital audiovisual playback system.
  160. Nathan, Guy; Mastronardi, Tony, Intelligent digital audiovisual reproduction system.
  161. Nathan, Guy; Mastronardi, Tony, Intelligent digital audiovisual reproduction system.
  162. DeMello, Marco A.; Zeman, Pavel; Krishnaswamy, Vinay; Byrum, Frank D., Inter-server communication using request with encrypted parameter.
  163. Crawford,Christopher M., Internet download systems and methods providing software to internet computer users for local execution.
  164. Christopher M. Crawford, Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established when signing up for backup services.
  165. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  166. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  167. Nathan, Guy; Mastronardi, Tony, Jukebox entertainment system having multiple choice games relating to music.
  168. Tooker, Michael; Dion, Dominique; Nathan, Guy, Jukebox with associated video server.
  169. Dion, Dominique; Tooker, Michael; Guy, Francois; Beaumier, Francois; Khenfir, Mounir; Gratton, Loic; Bureau, Dominique; Yayli, Harun Tune, Jukebox with connection to external social networking services and associated systems and methods.
  170. Brillon, Francois; Dion, Dominique; Gratton, Loic, Jukebox with customizable avatar.
  171. Utsumi,Kenichi; Hirano,Hideyuki; Kotani,Seigo, License devolution apparatus.
  172. Strom, Clifford P.; Siu, Michael Y.; Evans, Brian P., Licensing content for use on portable device.
  173. Dillaway, Blair Brewster; LaMacchia, Brian; Manferdelli, John; Paramasivam, Muthukrishnan, Long-life digital certification for publishing long-life digital content or the like in content rights management system or the like.
  174. Chopra, Vivek; Gaxiola, David; Szeto, Nicholas; Maegawa, Hirotoshi; Iima, Shin, Management of online trading services using mediated communications.
  175. Nakamura, Kenji; Iwamura, Keiichi, Management system and terminal apparatus to manage and control distribution and use of software and the like.
  176. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  177. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  178. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
  179. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  180. DeMont Jason Paul, Method and apparatus for distributing information products.
  181. DeMont Jason Paul, Method and apparatus for distributing information products.
  182. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  183. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  184. Ross Cliff D. ; Taylor Neil W., Method and apparatus for electronic license distribution.
  185. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  186. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  187. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  188. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  189. Xu, Xuejun; Nadell, Katherine K., Method and apparatus for facilitating the transfer of a software license between computer systems.
  190. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  191. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  192. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  193. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  194. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  195. Bhargava, Rishi; Vittal, Chiradeep; Saveram, Swaroop, Method and apparatus for process enforced configuration management.
  196. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  197. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  198. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  199. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  200. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  201. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for secure content delivery over broadband access networks.
  202. Torrubia Saez,Andres, Method and apparatus for secure distribution of software.
  203. Cohen Aaron Michael, Method and apparatus for software licensing electronically distributed programs.
  204. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  205. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  206. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  207. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  208. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  209. Mages Kenneth G. ; Feng Jie, Method and apparatus of secure server control of local media via a trigger through a network for instant local access o.
  210. Kenneth G. Mages ; Jie Feng, Method and apparatus of secure server control of local media via a trigger through a network for instant local access of encrypted data on an internet webpage.
  211. Berstis Viktors, Method and apparatus to remotely configure a data processing system.
  212. Iwayama Noboru,JPX ; Torii Naoya,JPX ; Hasebe Takayuki,JPX ; Takenaka Masahiko,JPX ; Matsuda Masahiro,JPX, Method and device for utilizing data content.
  213. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  214. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  215. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  216. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  217. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  218. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of networked application client software by explicit human input.
  219. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  220. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  221. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  222. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  223. Pettitt John Philip, Method and system for controlling distribution of software in a multitiered distribution chain.
  224. Ganapathy Krishnan ; Scott Oyler, Method and system for injecting new code into existing application code.
  225. DeMello, Marco A.; Yaacovi, Yoram; Zeman, Pavel, Method and system for limiting the use of user-specific software features.
  226. DeMello,Marco A.; Yaacovi,Yoram; Zeman,Pavel; Hughes,Kathryn E.; Byrum,Frank D., Method and system for limiting the use of user-specific software features.
  227. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined condition for usage.
  228. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  229. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  230. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  231. Larose Gordon Edward,CAX ; Allan David Ian,CAX, Method and system for networked installation of uniquely customized, authenticable, and traceable software application.
  232. Mohinder, Preet, Method and system for providing user space address protection from writable memory area in a virtual environment.
  233. Chatani,Masayuki; Mallinson,Dominic Saul, Method and system for securely distributing computer software products.
  234. Lao, Guillermo, Method and system for subscription digital rights management.
  235. Lao, Guillermo, Method and system for subscription digital rights management.
  236. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  237. Schull,Jonathan, Method for adapting a software product to an environment.
  238. DeMello,Marco A.; Narin,Attila; Yaacovi,Yoram, Method for authenticating and securing integrated bookstore entries.
  239. Schull,Jonathan, Method for causing a digital product to revert to a demo mode.
  240. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  241. Asoh,Junichi; Hatori,Masahiko; Tadokoro,Muzuho; Yomo,Takashi, Method for data protection for removable recording medium.
  242. Wyatt Stuart Alan, Method for defining and verifying user access rights to a computer information.
  243. Waldman Benjamin ; Hobson Samuel David, Method for installing a file on demand using a preview.
  244. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  245. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  246. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  247. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  248. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  249. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  250. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  251. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  252. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  253. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  254. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system.
  255. Berson, William; Zeller, Claude, Method for preventing counterfeiting of articles of manufacture.
  256. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  257. Schull,Jonathan, Method for selling, protecting, and redistributing digital goods.
  258. Homer, Gregg S., Method for subscription media on-demand.
  259. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  260. Nathan, Guy, Method for the distribution of audio-visual information and a system for the distribution of audio-visual information.
  261. Nathan, Guy, Method for the distribution of audio-visual information and a system for the distribution of audio-visual information.
  262. Nathan, Guy, Method for the distribution of audio-visual information and a system for the distribution of audio-visual information.
  263. Nathan, Guy, Method for the distribution of audio-visual information and a system for the distribution of audio-visual information.
  264. Nathan, Guy, Method for the distribution of audio-visual information and a system for the distribution of audio-visual information.
  265. Schull,Jonathan, Method of altering a software product in response to predetermined events.
  266. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for computer system denial-of-service protection.
  267. Bhargava, Rishi; Reese, Jr., David P., Method of and system for computer system state checks.
  268. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for malicious software detection using critical address space protection.
  269. Saraf, Suman; Agrawal, Sharad; Srivastava, Vivek, Method of and system for reverse mapping vnode pointers.
  270. Felger, David, Method of billing a purchase made over a computer network.
  271. Felger, David, Method of billing a purchase made over a computer network.
  272. Felger, David, Method of billing a purchase made over a computer network.
  273. Nathan, Guy; Mastronardi, Tony, Method of communications for an intelligent digital audiovisual playback system.
  274. Chou Wayne W. ; Kulinets Joseph M. ; Elteto Laszlo, Method of metering and protecting computer software.
  275. Zunke, Michael, Method of operating a computer system and computer system.
  276. Mages Kenneth G. ; Feng Jie, Method of secure server control of local media via a trigger through a network for instant local access of encrypted da.
  277. Peters Laurent Marie L.,BEX ; Peeters Johan,BEX ; Swinnen Philippe Fran.cedilla.ois Marie Octave Ghislain,BEX ; Gheur Vincent Christophe Marc Marie,BEX, Method to provide a software package and a provider station and a user station realizing the method and a basis software package.
  278. Chatani, Masayuki, Method, medium, and system for managing transfer of content.
  279. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  280. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  281. Torrubia-Saez, Andres, Methods and apparatus for secure distribution of software.
  282. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  283. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  284. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  285. Etchegoyen, Craig S., Modular software protection.
  286. Homer, Gregg S., More subscription media on demand.
  287. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  288. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  289. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  290. Pendlebury,Ian Malcolm, Network enabled application software system and method.
  291. Haselden, J. Kirk; Ivanov, Sergei, Object model document for obfuscating object model therein.
  292. Ronning Joel A., On-line try before you buy software distribution system.
  293. Crawford Christopher M., Online computer services including help desk, anti-virus and/or application service features.
  294. Nakashima Kazuo,JPX, Optical recording medium to store and access large volumes of data.
  295. Asipov, Boris; Hughes, Aidan Thomas Joseph, Optimizing amount of data passed during software license activation.
  296. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  297. Nathan, Guy; Mastronardi, Tony, Pay-per-play audiovisual system with touch screen interface.
  298. Nathan, Guy; Mastronardi, Tony, Pay-per-play audiovisual system with touch screen interface.
  299. Sebes, E. John; Bhargava, Rishi; Naik, Dilip, Piracy prevention using unique module translation.
  300. Sebes, E. John; Bhargava, Rishi; Naik, Dilip, Piracy prevention using unique module translation.
  301. Evans, Brian P.; Strom, Clifford P.; Dunbar, Geoffrey; Prologo, Richard D., Playlist burning in rights-management context.
  302. Schaefer, Stuart; Schmeidler, Yonah; Levin, Ilya, Policy based composite file system and method.
  303. Nathan, Guy; Dion, Dominique, Process for adjusting the sound volume of a digital sound recording.
  304. Nathan, Guy; Dion, Dominique; Mastronardi, Tony, Process for ordering a selection in advance, digital system and jukebox for embodiment of the process.
  305. Nathan, Guy; Dion, Dominique; Mastronardi, Tony, Process for ordering a selection in advance, digital system and jukebox for embodiment of the process.
  306. Nathan, Guy; Dion, Dominique; Mastronardi, Tony, Process for ordering a selection in advance, digital system and jukebox for embodiment of the process.
  307. Mastronardi, Tony, Process for selecting a recording on a digital audiovisual reproduction system, and system for implementing the process.
  308. Peinado,Marcus; Venkatesan,Ramarathnam; Davis,Malcolm, Producing a new black box for a digital rights management (DRM) system.
  309. Bhargava, Rishi; Sebes, E. John, Program-based authorization.
  310. Bhargava, Rishi; Sebes, E. John, Program-based authorization.
  311. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  312. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  313. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  314. Merkle Ralph C., Protected shareware.
  315. England, Paul; Peinado, Marcus; Sankaranarayan, Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  316. England,Paul; Peinado,Marcus; Sankaranarayan,Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  317. England,Paul; Peinado,Marcus; Sankaranarayan,Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  318. England,Paul; Peinado,Marcus; Sankaranarayan,Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  319. Oliveira, Eduardo P.; Klemets, Anders E.; Bhatt, Sanjay; Paka, Anand; Alkove, James M., Protecting digital media of various content types.
  320. Wang, Jiahe Helen; Fan, Xiaofeng; Jackson, Collin Edward; Howell, Jonathan Ryan; Xu, Zhenbin, Protection and communication abstractions for web browsers.
  321. Homer, Gregg S., Rechargeable media distribution and play system.
  322. Peinado, Marcus; England, Paul; Yerrace, Frank, Releasing decrypted digital content to an authenticated path.
  323. Peinado,Marcus; England,Paul; Yerrace,Frank, Releasing decrypted digital content to an authenticated path.
  324. Chan,Man, Remote access authorization of local content.
  325. Nathan, Guy, Remote control unit for activating and deactivating means for payment and for displaying payment status.
  326. Nathan, Guy, Remote control unit for activating and deactivating means for payment and for displaying payment status.
  327. Nathan, Guy, Remote control unit for activating and deactivating means for payment and for displaying payment status.
  328. Nathan, Guy, Remote control unit for intelligent digital audiovisual reproduction systems.
  329. Carlson, Jay A.; Chopra, Vivek, Remote dynamic configuration of telemetry reporting through regular expressions.
  330. Nathan, Guy; Mastronardi, Tony; Bourdelais, Jean-Marc, Remote management system for at least one audiovisual information reproduction device.
  331. Nathan, Guy; Mastronardi, Tony; Bourdelais, Jean-Marc, Remote management system for at least one audiovisual information reproduction device.
  332. Nathan, Guy; Mastronardi, Tony; Bourdelais, Jean-Marc, Remote management system for at least one audiovisual information reproduction device.
  333. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  334. Peinado, Marcus; Manferdelli, John L.; Bell, Jeffrey R. C., Rendering digital content in an encrypted rights-protected form.
  335. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  336. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  337. Gajjala,Vijay K.; Ganesan,Krishnamurthy; McKune,Jeffrey R., Retail transactions involving digital content in a digital rights management (DRM) system.
  338. Abburi,Rajasekhar, Retail transactions involving distributed and super-distributed digital content in a digital rights management (DRM) system.
  339. Evans, Brian P.; Strom, Clifford P.; Rosenstein, Daniel, Rights management system for streamed multimedia content.
  340. Evans, Brian P.; Strom, Clifford P.; Rosenstein, Daniel; Paka, Anand D.; Fang, Nicholas J.; Oliveria, Eduardo, Rights management system for streamed multimedia content.
  341. Van Dyke, Clifford P.; Cheng, David J.; Mohan, Siva, Rights management system for streamed multimedia content.
  342. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  343. Williams,Matthew, Saw blade case.
  344. Ronning, Joel A.; Wical, Kelly J.; Kukura, Marc A., Scheduling of a file download and search for updates.
  345. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  346. Ronning, Joel Alan; Wical, Kelly J., Secure downloading of a file from a network system and method.
  347. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  348. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  349. Shavit Nir N., Secure software system and related techniques.
  350. Shavit Nir N., Secure software system and related techniques.
  351. Bond Barry ; Bharati Sudeep, Security enhancement for untrusted executable code.
  352. Ronning Joel A., Self-launching encrypted digital information distribution system.
  353. Ronning Joel A., Self-launching encrypted try before you buy software distribution system.
  354. DeMello,Marco A.; Narin,Attila; Madonna,Christopher Robert Richard, Server controlled branding of client software deployed over computer networks.
  355. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Byrum,Frank D., Server for an electronic distribution system and method of operating same.
  356. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers for client computers.
  357. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers to client computers.
  358. Harris, Adam, Sharing and lending of digital content.
  359. Miura, Victor O. S.; Sargaison, Stewart, Simplified run-time program translation for emulating complex processor pipelines.
  360. Moriyasu Kenji (Tokyo JPX) Kanai Atsusi (Kanagawaken JPX) Miyake Nobuhisa (Tokyo JPX) Terauchi Atsusi (Tokyo JPX) Okuyama Hironobu (Saitamaken JPX), Software analysis protection method for changing the software pattern on the memory of a user terminal.
  361. Peinado, Marcus; England, Paul; Manferdelli, John L., Software application protection by way of a digital rights management (DRM) system.
  362. Hasebe Takayuki,JPX ; Torii Naoya,JPX ; Iwayama Noboru,JPX ; Takenaka Masahiko,JPX ; Matsuda Masahiro,JPX, Software charging system and software data utilization permitting device.
  363. Akiyama Ryota (Kawasaki JPX) Yoshioka Makoto (Kawasaki JPX), Software delivery system, center device, relaying device and user terminal device.
  364. Akiyama, Ryota; Yoshioka, Makoto, Software encoding using a combination of two types of encoding and encoding type identification information.
  365. Sebes, E. John; Vaishnav, Jay, Software modification by group to minimize breakage.
  366. Bahar, Reuben, Software piracy prevention through remote enforcement of an activation threshold.
  367. Itami Satoshi,JPX ; Nakashima Kazuo,JPX ; Utsumi Kenichi,JPX, Software processing apparatus writing software to a medium only if identification information in the software corresponds to identification information in the medium.
  368. Akiyama Ryota,JPX ; Yoshioka Makoto,JPX, Software reproduction apparatus.
  369. Akiyama,Ryota; Yoshioka,Makoto, Software reproduction apparatus.
  370. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  371. Mark J. Granger ; Cyrus E. Smith ; Matthew I. Hoffman, Software system and associated methods for controlling the use of computer programs.
  372. Nishio Nobuhiko,JPX, Software usage measurement apparatus for imposing a proper charge in accordance with number of times multimedia unit dat.
  373. Sebes, E. John, Solidifying the executable software set of a computer.
  374. Sebes, E. John, Solidifying the executable software set of a computer.
  375. Nathan, Guy, Sound control circuit for a digital audiovisual reproduction system.
  376. Nathan, Guy, Sound control circuit for a digital audiovisual reproduction system.
  377. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifiying security for an element by assigning a scaled value representative of the relative security thereof.
  378. Ganesan, Krishnamurthy, Specifying rights in a digital rights license according to events.
  379. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  380. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  381. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  382. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  383. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  384. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  385. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  386. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  387. Peinado,Marcus; Abburi,Rajasekhar; Bell,Jeffrey R. C., Structural of digital rights management (DRM) system.
  388. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Bell,Jeffrey R. C., Structure of a digital content package.
  389. Homer, Gregg S., Subscription media on demand VII.
  390. Homer, Gregg S., Subscription media on demand VIII (offline mode).
  391. Liu, Yeu; Pandya, Ravi; Ivanov, Lazar; Paramasivam, Muthukrishnan; Gunyakti, Caglar; Gui, Dongmei; Hsu, Scott W. P., Supplementary trust model for software licensing/commercial digital distribution policy.
  392. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  393. DeMello, Marco; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  394. DeMello,Marco A.; Krishnaswamy,Vinay; Manferdelli,John L., System and method for accessing protected content in a rights-management architecture.
  395. Chan, Hark C., System and method for accessing set of digital data at a remote site.
  396. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy B.; Yaacovi,Yoram; Alger,Jeffrey H., System and method for activating a rendering device in a multi-level rights-management architecture.
  397. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy Bertrand; Yaacovi,Yoram; Alger,Jeffrey A., System and method for activating a rendering device in a multi-level rights-management architecture.
  398. Richardson, Ric B., System and method for adjustable licensing of digital products.
  399. Benson, Greg; Franklin, Martin; Knauft, Christopher L., System and method for authenticating peer components.
  400. DeMello, Marco A.; Narin, Attila; Setty, Venkateshaiah, System and method for client interaction in a multi-level rights-management architecture.
  401. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  402. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  403. Schull,Jonathan, System and method for controlling access to protected information.
  404. Schull,Jonathan, System and method for creating and running protected information.
  405. Bhattacharjee, Rajbir; Munjal, Nitin; Singh, Balbir; Singh, Pankaj, System and method for critical address space protection in a hypervisor environment.
  406. Lockhart, Malcolm W.; Grimes, D. Gordon; Sharma, Ranjiv K.; Musselwhite, Neal A., System and method for data rights management.
  407. Lockhart,Malcolm W.; Grimes,D. Gordon; Sharma,Ranjiv K.; Musselwhite,Neal A., System and method for data rights management.
  408. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  409. Schull, Jonathan, System and method for distributing protected information.
  410. Wang,Xin, System and method for document distribution.
  411. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  412. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  413. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  414. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  415. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for host-initiated firewall discovery in a network environment.
  416. Manferdelli,John L.; Marr,Michael David; Krishnaswamy,Vinay; Jakubowski,Mariusz H., System and method for interfacing a software process to secure repositories.
  417. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  418. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  419. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  420. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  421. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  422. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  423. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  424. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  425. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  426. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  427. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  428. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  429. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  430. Sawhney, Harvinder Singh; Saraf, Suman; Sharma, Rosen, System and method for managing virtual machine configurations.
  431. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  432. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  433. Schull,Jonathan, System and method for operating a licensing server.
  434. Bhargava, Rishi; Reese, Jr., David P., System and method for passive threat detection using virtual memory inspection.
  435. Agarwal, Sonali; Tarbotton, Lee Codel Lawson, System and method for preventing data loss using virtual machine wrapped applications.
  436. Schull,Jonathan, System and method for processing protected audio information.
  437. Schull, Jonathan, System and method for processing protected text information.
  438. Schull,Jonathan, System and method for processing protected video information.
  439. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  440. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  441. Wang, Xin, System and method for protection of digital works.
  442. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  443. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  444. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  445. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  446. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  447. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  448. Schull, Jonathan, System and method for selectively changing parameter settings based on lineage analysis of digital information.
  449. Schull,Jonathan, System and method for selectively enabling access based on lineage analysis of digital information.
  450. Bhargava, Rishi; Reese, Jr., David P., System and method for selectively grouping and managing program files.
  451. Schull,Jonathan, System and method for selling protected information in an oem context.
  452. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  453. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  454. Wang,Xin, System and method for transferring the right to decode messages.
  455. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  456. Bodrov, Dmitry, System and method of verifying the authenticity of dynamically connectable executable images.
  457. Bodrov, Dmitry, System and method of verifying the authenticity of dynamically connectable executable images.
  458. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  459. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  460. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  461. Dion, Dominique; Tooker, Michael; Guy, Francois; Khenfir, Mounir, System and/or methods for distributing advertisements from a central advertisement network to a peripheral device via a local advertisement server.
  462. Akiyama Ryota,JPX ; Munakata Akio,JPX ; Koga Yuzuru,JPX ; Ishizaki Masayuki,JPX, System for and method of authenticating a client.
  463. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  464. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  465. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  466. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  467. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  468. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  469. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  470. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  471. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  472. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  473. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  474. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  475. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  476. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  477. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  478. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  479. Steven Karl Schoch ; Paul Swart, System for controlling the use of licensed software.
  480. Nakashima Kazuo,JPX ; Nakahara Masaru,JPX ; Itami Satoshi,JPX ; Utsumi Kenichi,JPX, System for decrypting encrypted software.
  481. Nathan, Guy; Mastronardi, Tony, System for distributing and selecting audio and video information and method implemented by said system.
  482. Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software.
  483. Byrne,Shannon; Muecke,Innes; Patterson,Andrew; Slik,David, System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software.
  484. Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  485. Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  486. Byrne,Shannon; Muecke,Innes; Patterson,Andrew; Silk,David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  487. Byrne,Shannon; Muecke,Innes; Patterson,Andrew; Slik,David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  488. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  489. Ronning Joel A., System for preventing unauthorized copying of active software.
  490. Nathan, Guy; Dion, Dominique, System for remote loading of objects or files in order to update software.
  491. Kahn Robert E. ; Ely David K., System for uniquely and persistently identifying, managing, and tracking digital objects.
  492. Chatani,Masayuki, System for utilizing an incentive point system based on disc and user identification.
  493. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  494. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  495. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  496. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  497. Etchegoyen, Craig S., Systems and methods for game activation.
  498. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  499. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  500. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  501. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  502. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  503. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  504. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  505. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  506. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  507. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  508. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  509. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  510. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  511. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  512. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  513. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  514. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  515. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  516. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  517. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  518. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  519. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  520. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  521. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  522. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  523. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  524. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  525. Dion, Dominique; Tooker, Michael; Guy, Francois; Khenfir, Mounir, Systems and/or methods for distributing advertisements from a central advertisement network to a peripheral device via a local advertisement server.
  526. Dion, Dominique; Tooker, Michael; Guy, Francois; Khenfir, Mounir, Systems and/or methods for distributing advertisements from a central advertisement network to a peripheral device via a local advertisement server.
  527. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  528. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  529. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  530. Fang, Yu; Dykes, Robert R., Techniques for generating electronic menu graphical user interface layouts for use in connection with electronic devices.
  531. Capio, Oliver R., Traffic-based media selection.
  532. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  533. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  534. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  535. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  536. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  537. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  538. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  539. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  540. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  541. Ronning Joel A., Try before you buy software distribution and marketing system.
  542. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  543. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  544. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  545. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  546. Granger, Mark J.; Smith, Cyrus E.; Hoffman, Matthew I., Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications.
  547. Granger Mark J. ; Smith Cyrus E. ; Hoffman Matthew I., Use of pseudocode to protect software from unauthorized use.
  548. Chatani, Masayuki, Utilizing an incentive point system based on disc and user identification.
  549. Nathan, Guy, Wireless digital transmission system for loudspeakers.
  550. Nathan, Guy, Wireless digital transmission system for loudspeakers.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로