$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for remotely controlling and monitoring the use of computer software 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/30
  • G06F-015/40
  • G06F-013/12
출원번호 US-0050749 (1993-04-20)
발명자 / 주소
  • Hornbuckle Gary D. (Pebble Beach CA)
출원인 / 주소
  • SofTel, Inc. (San Francisco CA 02)
인용정보 피인용 횟수 : 332  인용 특허 : 0

초록

Remote control of the use of computer data is described in a system for renting computer software which derives use and billing information, prevents unauthorized use, maintains integrity of the software and controls related intercomputer communications. A user at a target computer “downloads”progra

대표청구항

A method of protecting the security of a computer program comprising the steps of: selecting at least one portion of said computer program essential to the correct operation of the computer program, said computer program not operable without said portion; encrypting said portion with a first encrypt

이 특허를 인용한 특허 (332)

  1. Harmon Thomas J., Access control module for a personal computer.
  2. Hassan, Amer A.; Huitema, Christian; Kuehnel, Thomas; Parikh, Vishesh M., Adapting a communication network to varying conditions.
  3. McAuliffe Jon D. ; Marsh Brian D. ; Moraes Mark A., Advertisement authentication system in which advertisements are downloaded for off-line display.
  4. Ronning,Joel A.; Wical,Kelly J., Apparatus and method for adaptive fraud screening for electronic commerce transactions.
  5. Jutzi,Curtis E.; Mangold,Richard P.; Joshi,Ajit P., Apparatus and method for enabling secure content decryption within a set-top box.
  6. Ronning, Joel A.; Wical, Kelly J., Apparatus and method for secure downloading of files.
  7. Goodwin, Margaret; Alcazar, Mark A., Application model that integrates the web experience with the traditional client application experience.
  8. Anderson ; II Micheil M. ; Bangerter Howard K. ; Borup Marlon T. ; Byer James E. ; Cable Darin L. ; Doxey Ross W. ; Graham Richard S. ; Hale Todd D. ; Hawley Britt J. ; Lamplugh Richard W. ; Pray Ric, Automated test harness.
  9. Parthasarathy, Srivatsan; Partovi, Hadi; Slivka, Benjamin W.; Kindel, Charles E., Automatic software downloading from a computer network.
  10. Parthasarathy, Srivatsan; Partovi, Hadi; Slivka, Benjamin W.; Kindel, Jr., Charles E., Automatic software downloading from a computer network.
  11. Srivatsan Parthasarathy ; Hadi Partovi ; Benjamin W. Slivka ; Charles E. Kindel, Jr., Automatic software downloading from a computer network.
  12. Rose, Edward M., Billing management package for internet access and web page utilization.
  13. Toshiya Yoshimune JP; Yoko Asano JP; Kaori Ueno JP; Masayoshi Minei JP; Syuichi Kato JP; Sadami Kurihara JP; Katsuhiko Ogawa JP; Kenichi Hanabe JP, Book data service system with data delivery by broadcasting.
  14. Ronning Joel A., Central database system for automatic software program sales.
  15. Kimura,Miki, Charging process management system.
  16. Ellis, Frampton Erroll, Commercial distributed processing by personal computers over the internet.
  17. Ellis, Frampton E., Computer and microprocessor control units that are inaccessible from the internet.
  18. Fisher Jerald C. ; Nguyen Lien Dai ; Young James ; Seaburg Gunnar P. ; Hedlund Galen W. ; Katz Richard S., Computer manufacturing architecture with two data-loading processes.
  19. Ellis, Frampton E., Computer or microchip controlled by a firewall-protected master controlling microprocessor and firmware.
  20. Ellis, Frampton E., Computer or microchip including a network portion with RAM memory erasable by a firewall-protected master controller.
  21. Ellis, Frampton E., Computer or microchip with a secure control bus connecting a central controller to volatile RAM and the volatile RAM to a network-connected microprocessor.
  22. Ellis, Frampton E., Computer or microchip with a secure system BIOS and a secure control bus connecting a central controller to many network-connected microprocessors and volatile RAM.
  23. Ellis, Frampton E., Computer or microchip with a secure system bios having a separate private network connection to a separate private network.
  24. Ellis, Frampton E., Computer or microchip with an internal hardware firewall and a master controlling device.
  25. Ellis, Frampton E., Computer or microchip with its system bios protected by one or more internal hardware firewalls.
  26. Ellis, Frampton E., Computer with at least one faraday cage and internal flexibility sipes.
  27. Feinberg Michael A. ; Feinberg Matthew A., Computerized system and associated method of optimally controlled storage and transfer of computer programs on a computer network.
  28. Ellis, III, Frampton E., Computers and microchips with a faraday cage, a side protected by an internal hardware firewall and an unprotected side connected to the internet for network operations, and with internal hardware compartments.
  29. Ellis, Frampton E., Computers and microchips with a faraday cage, with a side protected by an internal hardware firewall and unprotected side connected to the internet for network operations, and with internal hardware compartments.
  30. Ellis, III, Frampton E., Computers and microchips with a portion protected by an internal hardware firewall.
  31. Ellis, III, Frampton E., Computers and microchips with a portion protected by an internal hardware firewalls.
  32. Ellis, III, Frampton E., Computers and microchips with a side protected by an internal hardware firewall and an unprotected side connected to a network.
  33. Ellis, III, Frampton Erroll, Computers and microchips with a side protected by an internal hardware firewall and an unprotected side connected to a network.
  34. Ellis, Frampton E., Computers including an undiced semiconductor wafer with Faraday Cages and internal flexibility sipes.
  35. Ellis, III, Frampton E., Computers or microchips with a hardware side protected by a primary internal hardware firewall and an unprotected hardware side connected to a network, and with multiple internal hardware compartments protected by multiple secondary inner hardware firewalls.
  36. Ellis, III, Frampton E., Computers or microchips with a hardware side protected by a primary internal hardware firewall leaving an unprotected hardware side connected to a network, and with multiple internal hardware compartments protected by multiple secondary interior hardware firewalls.
  37. Ellis, Frampton E., Computers or microchips with a primary internal hardware firewall and with multiple internal harware compartments protected by multiple secondary interior hardware firewalls.
  38. Kravitz, David W.; Goldschlag, David M., Conditional access via secure logging with simplified key management.
  39. Blumenau, Trevor, Content display monitor.
  40. Blumenau, Trevor, Content display monitor.
  41. Blumenau, Trevor, Content display monitor.
  42. Blumenau, Trevor, Content display monitor.
  43. Blumenau, Trevor, Content display monitor.
  44. Blumenau, Trevor, Content display monitor.
  45. Blumenau, Trevor, Content display monitor.
  46. Blumenau, Trevor, Content display monitor.
  47. Blumenau, Trevor, Content display monitor.
  48. Blumenau, Trevor, Content display monitor.
  49. Blumenau, Trevor, Content display monitor.
  50. Blumenau, Trevor, Content display monitor.
  51. Blumenau,Trevor, Content display monitoring by a processing system.
  52. Saito, Makoto, Controlling database copyrights.
  53. Smith, Fred Hewitt, Controlling user access to electronic resources without password.
  54. Smith, Fred Hewitt, Controlling user access to electronic resources without password.
  55. Smith, Fred Hewitt, Controlling user access to electronic resources without password.
  56. Kolls Brock, Credit and bank issued debit card operated system and method for controlling a vending machine.
  57. Saito, Makoto, Data copyright management.
  58. Saito, Makoto, Data management system.
  59. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  60. Ozzie, Raymond E.; Ozzie, Jack E.; Moromisato, George P.; Suthar, Paresh S.; Narayanan, Raman; Augustine, Matthew S., Data synchronization and sharing relationships.
  61. Lewis James R., Determining theft of grammar code.
  62. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  63. Hwang Seung-Hwe,KRX, Digital computer system security device.
  64. Saito, Makoto, Digital content management system and apparatus.
  65. Saito, Makoto, Digital content management system and apparatus.
  66. Iwamoto Koji,JPX, Digital information supply and management system.
  67. Slivka,Benjamin W.; Webber,Jeffrey S., Distributing software via distribution files.
  68. Allan, David Ian; Larose, Gordon Edward, Distribution and controlled use of software products.
  69. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  70. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  71. Ronning,Joel A.; Wical,Kelly J., Electronic commerce system and method for detecting fraud.
  72. Horn Douglas, Electronic information lockout system.
  73. Douglas Marvin Benignus ; Kanti Champaklal Shah, Electronic key for a data processing system.
  74. Ebisawa, Kan, Encrypted start signal for game with data substitution in original data and means for limiting execution.
  75. Matsumoto, Noriko; Takiguchi, Kiyotsugu; Ouchi, Tetsuya, Facsimile machine for use in combination with PC.
  76. Matsumoto, Noriko; Takiguchi, Kiyotsugu; Ouchi, Tetsuya, Facsimile machine for use in combination with PC.
  77. Noriko Matsumoto JP; Kiyotsugu Takiguchi JP; Tetsuya Ouchi JP, Facsimile machine for use in combination with PC.
  78. Nakazawa, Kazuhide; Mizuochi, Yuki, Game machine, game control method, program, its distributing device, and information storage medium.
  79. Anka, Marton B., Gateway-assisted file transfer.
  80. Anka, Marton B., Gateway-assisted file transfer.
  81. Ellis, Frampton E., Global network computers.
  82. Ellis, III, Frampton E., Global network computers.
  83. Ellis, III,Frampton E., Global network computers.
  84. Ellis, III,Frampton E., Global network computers.
  85. Ellis,Frampton E, Global network computers.
  86. Sheridan Keith Holden, Image distribution method and system.
  87. Agnihotri Manoj B. ; Tung Chiaohuey (Peter), In-context launch wrapper (ICLW) module and method of automating integration of device management applications into existing enterprise management consoles.
  88. Hughes, Patrick Alan; Elswick, Paul Blair, Inappropriate site management software.
  89. Ono,Makoto, Information transmission method and system.
  90. Luu Linda, Installation of application software through a network from a source computer system on to a target computer system.
  91. Luu Linda, Installation of application software through a network from a source computer system on to a target computer system.
  92. Luu, Linda, Installation of application software through a network from a source computer system on to a target computer system.
  93. Jia,Zheng; Shen,Ji, Instruction/data protection employing derived obscuring instruction/data.
  94. Krishnan Kalyan ; Keyworth ; II George A., Intelligent communication device.
  95. Lu, Daozheng; Harkness, David H.; Bhatia, Manish; Samson, Jerome; Feininger, William A., Interactive service device metering systems.
  96. Lu, Daozheng; Harkness, David H.; Bhatia, Manish; Samson, Jerome; Feininger, William A., Interactive service device metering systems.
  97. Lu, Daozheng; Harkness, David H.; Bhatia, Manish; Samson, Jerome; Feininger, William A., Interactive service device metering systems.
  98. Ellis,Frampton E., Internal firewall for a personal computer to deny access by a network to a user's secure portion.
  99. Ellis, III, Frampton E., Internal hardware firewalls for microchips.
  100. Crawford,Christopher M., Internet download systems and methods providing software to internet computer users for local execution.
  101. Christopher M. Crawford, Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established when signing up for backup services.
  102. Flowers, John S.; Stracener, Thomas C., Interoperability of vulnerability and intrusion detection systems.
  103. Flowers,John S.; Stracener,Thomas C., Interoperability of vulnerability and intrusion detection systems.
  104. Flowers,John S.; Stracener,Thomas C., Interoperability of vulnerability and intrusion detection systems.
  105. Roberts,Jason; Mohammed,Mazhar; Wittel,Walter; Shepard,Marc, Managing software updates and a software distribution service.
  106. Blumenau Trevor, Metering of internet content using a control.
  107. Jutzi,Curtis E., Method and apparatus for determining and displaying the service level of a digital television broadcast signal.
  108. Dawson Bryan J., Method and apparatus for dynamically controlling a remote system's access to shared applications on a host system.
  109. Prakash Alok, Method and apparatus for interfacing with a host computer system sharing tasks with another user on a client computer sy.
  110. Poisner David I., Method and apparatus for preventing unauthorized usage of a computer system.
  111. Kurtzberg Jerome M. ; Levanoni Menachem, Method and apparatus for realizing computer security.
  112. Sanada, Akemi; Tabuchi, Hideo; Nakano, Toshio; Ishizuki, Sajio; Kage, Isamu, Method and apparatus for rental storage system.
  113. Sanada, Akemi; Tabuchi, Hideo; Nakano, Toshio; Ishizuki, Sajio; Kage, Isamu, Method and apparatus for rental storage system.
  114. Sanada, Akemi; Tabuchi, Hideo; Nakano, Toshio; Ishizuki, Sajio; Kage, Isamu, Method and apparatus for rental storage system.
  115. Connelly, Jay H., Method and apparatus to determine broadcast content and scheduling in a broadcast system.
  116. Connelly, Jay H., Method and apparatus to determine broadcast content and scheduling in a broadcast system.
  117. Connelly, Jay H., Method and apparatus to determine broadcast content and scheduling in a broadcast system.
  118. Traw, Brendan; Bridges, Bruce D.; Balogh, Stephen P.; Connelly, Jay H., Method and apparatus to provide a personalized channel.
  119. Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
  120. Lund, Arnaud, Method and system for controlling distant equipment.
  121. Flowers,John S.; Stracener,Thomas C., Method and system for detecting a vulnerability in a network.
  122. Reisman, Richard R., Method and system for distributing updates by presenting directory of software available for user installation that is not already installed on user station.
  123. Moore, Brian J.; Leshinsky, Yan, Method and system for enabling offline detection of software updates.
  124. Ciarlante, John J.; Montalvo-Huhn, Orlando C.; Wang, Koah-Hsing; Rodgers, Alan; Brand, Steven, Method and system for establishing collection of hostable applications.
  125. Gaffney, Tamara; Agarwal, Kanishka, Method and system for generating information about portable device advertising.
  126. Ciarlante, John J.; Montalvo-Huhn, Orlando C.; Wang, Koah-Hsing; Rodgers, Alan; Brand, Steven, Method and system for hosting applications.
  127. Patrick Alan Hughes ; Paul Blair Elswick, Method and system for identifying and locating inappropriate content.
  128. Fawcett Philip E., Method and system for identifying and obtaining computer software from a remote computer.
  129. Fawcett Philip E., Method and system for identifying and obtaining computer software from a remote computer.
  130. Fawcett, Phillip E., Method and system for identifying and obtaining computer software from a remote computer.
  131. Ganapathy Krishnan ; Scott Oyler, Method and system for injecting new code into existing application code.
  132. Nobuya Okayama JP; Hiroshi Koike JP; Taminori Tomita JP; Shigeru Arai JP, Method and system for preventing illegal use of digital contents, processing program thereof, and recording medium for the program.
  133. Forbes,Jonathan A.; Stone,Jeremy D.; Parthasarathy,Srivatsan; Toutonghi,Michael J.; Sliger,Michael V., Method and system for processing software dependencies in management of software packages.
  134. Dwork Cynthia ; Halpern Joseph Y. ; Lotspiech Jeffrey Bruce, Method and system for protection of digital information.
  135. Dwork Cynthia ; Halpern Joseph Y. ; Lotspiech Jeffrey Bruce, Method and system for protection of digital information.
  136. Nielsen Jakob, Method and system for regulating discounts on merchandise distributed through networked computer systems.
  137. Reisman, Richard R., Method and system for selecting a personalized set of information channels.
  138. Trevor Blumenau, Method and system for the discovery of cookies and other client information.
  139. Jia Zheng ; Shen Ji, Method and system of dynamic transformation of encrypted material.
  140. Durbin, Winnie C.; Zhang, Kun; Singh, Karamjeet; Mehring, Dave; Lamoureux, Thomas Leroy; Zettel, Hubert A.; Butler, Timothy D, Method and system to remotely enable software-based options for a trial period.
  141. Zhang, Kun; Singh, Karamjeet; Blair, William G.; Durbin, Winnie C.; Minogue, Michael R., Method and system to remotely grant limited access to software options resident on a device.
  142. Mrva Michel,DEX ; Buchenrieder Klaus,DEX, Method for compiling accounting data for the utilization of programmed services or services available via a program.
  143. Wyatt Stuart Alan, Method for defining and verifying user access rights to a computer information.
  144. Reisman, Richard R., Method for distributing a list of updated content to a user station from a distribution server wherein the user station may defer installing the update.
  145. Reisman, Richard R., Method for distributing content to a user station.
  146. Reisman, Richard R., Method for distributing content to a user station.
  147. Reisman, Richard R., Method for distributing content to a user station.
  148. Fry Shawn C. ; Mahan Gregory L. ; Christopher Christopher D., Method for emulation of terminal-resident GUI application by transmitting macros having information and command instruct.
  149. Brdiczka, Oliver; Su, Norman Makato, Method for estimating task stress factors from temporal work patterns.
  150. Slivka Benjamin W. ; Webber Jeffrey S., Method for identifying and obtaining computer software from a network computer.
  151. Slivka Benjamin W. ; Webber Jeffrey S., Method for identifying and obtaining computer software from a network computer using a tag.
  152. Sanada,Akemi; Tabuchi,Hideo; Nakano,Toshio; Ishizuki,Sajio; Kage,Isamu, Method for rental storage system.
  153. Leroux Jean-Yves (Bouc Bel Air FRX), Method for the acquisition of software and data-processing system to implement the method.
  154. Birkhoelzer, Thomas; Krickhahn, Frank; Vaupel, Juergen, Method for the encryption and decryption of data by various users.
  155. Corrigan Richard J. ; Mannette Michael R. ; Chan Hang ; Grover Naveen, Method for updating a software code in a communication system.
  156. Fukui Toshiyuki,JPX, Method of managing contracts for licensed program use and a management system thereof.
  157. Kies Eduard,DEX ; Braun Heinz-Mathias,DEX, Method of usage-dependent determination of costs in making communication lines.
  158. Donald, James Lawrence; Wright, David Howell, Methods and apparatus for metering computer-based media presentation.
  159. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  160. Mowrer, Samantha M.; Poppie, Molly; Shankar, Balachander; Wong, Ieok Hou; Lee, Choongkoo; Cui, Xiaoqi; Kurzynski, David J.; Peters, Richard; Spoentgen, Remy, Methods and apparatus to assign viewers to media meter data.
  161. Wood, Benjamin; Coughlin, John Charles; Poppie, Molly; Kramer, Marie; Fuhrer, Brian; Borawski, Albert T.; Milavsky, Joseph G.; Donato, Paul; Shankar, Balachander; Kurzynski, David J., Methods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability.
  162. Wood, Benjamin; Coughlin, John Charles; Poppie, Molly; Kramer, Marie; Fuhrer, Brian; Borawski, Albert T.; Milavsky, Joseph G.; Donato, Paul; Shankar, Balachander; Kurzynski, David J., Methods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability.
  163. Wood, Benjamin; Coughlin, John Charles; Poppie, Molly; Kramer, Marie; Fuhrer, Brian; Borawski, Albert T.; Milavsky, Joseph G.; Donato, Paul; Shankar, Balachander; Kurzynski, David J., Methods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability.
  164. Shankar, Balachander; Poppie, Molly; Kurzynski, David J; Garcia, Jarrett; Chmura, Lukasz; You, Huaxin; Doe, Peter; Bourquin, Christine; Dolson, Timothy; Cui, Xiaoqi; Lee, Choongkoo; Spoentgen, Remy, Methods and apparatus to characterize households with media meter data.
  165. Alla, Madhusudhan Reddy; Burbank, John R., Methods and apparatus to collect distributed user information for media impressions.
  166. Splaine, Steven J.; Swift, Adrian, Methods and apparatus to collect distributed user information for media impressions.
  167. Bosworth, Alan N.; Alla, Madhusudhan Reddy; Splaine, Steven J.; Shivampet, Brahmanand Reddy; Gaynor, Kevin K., Methods and apparatus to collect distributed user information for media impressions and search terms.
  168. Bosworth, Alan N.; Alla, Madhusudhan Reddy; Splaine, Steven J.; Shivampet, Brahmanand Reddy; Gaynor, Kevin K., Methods and apparatus to collect distributed user information for media impressions and search terms.
  169. Burbank, John R.; Alla, Madhusudhan Reddy, Methods and apparatus to collect distributed user information for media impressions and search terms.
  170. Burbank, John R.; Alla, Madhusudhan Reddy, Methods and apparatus to collect distributed user information for media impressions and search terms.
  171. Burbank, John R.; Alla, Madhusudhan Reddy, Methods and apparatus to collect distributed user information for media impressions and search terms.
  172. Burbank, John R.; Alla, Madhusudhan Reddy, Methods and apparatus to collect distributed user information for media impressions and search terms.
  173. Srivastava, Seema Varma; Oliver, James R.; Donato, Paul; Mazumdar, Mainak; Aurisset, Juliette; Rao, Kumar Nagaraja; Perez, Albert R.; Gaunt, Josh; Peng, Yutao, Methods and apparatus to determine an adjustment factor for media impressions.
  174. Srivastava, Seema Varma; Oliver, James R.; Donato, Paul; Mazumdar, Mainak; Aurisset, Juliette; Rao, Kumar Nagaraja; Perez, Albert R.; Gaunt, Josh; Peng, Yutao, Methods and apparatus to determine an adjustment factor for media impressions.
  175. Srivastava, Seema Varma; Oliver, James R.; Donato, Paul; Mazumdar, Mainak; Aurisset, Juliette; Rao, Kumar Nagaraja; Perez, Albert R.; Gaunt, Josh; Peng, Yutao, Methods and apparatus to determine an adjustment factor for media impressions.
  176. Heffernan, Ronan; Geraghty, Kevin; Kalus, Mark; Mazumdar, Mainak; Paparo, Ari; Splaine, Steven John, Methods and apparatus to determine impressions using distributed demographic information.
  177. Heffernan, Ronan; Geraghty, Kevin; Kalus, Mark; Mazumdar, Mainak; Paparo, Ari; Splaine, Steven John, Methods and apparatus to determine impressions using distributed demographic information.
  178. Mazumdar, Mainak; Geraghty, Kevin; Heffernan, Ronan; Kalus, Mark; Paparo, Ari; Splaine, Steven J., Methods and apparatus to determine impressions using distributed demographic information.
  179. Mazumdar, Mainak; Geraghty, Kevin; Heffernan, Ronan; Kalus, Mark; Paparo, Ari; Splaine, Steven J., Methods and apparatus to determine impressions using distributed demographic information.
  180. Mazumdar, Mainak; Geraghty, Kevin; Heffernan, Ronan; Kalus, Mark; Paparo, Ari; Splaine, Steven J., Methods and apparatus to determine impressions using distributed demographic information.
  181. Mazumdar, Mainak; Geraghty, Kevin; Heffernan, Ronan; Kalus, Mark; Paparo, Ari; Splaine, Steven J., Methods and apparatus to determine impressions using distributed demographic information.
  182. Kalus, Mark; Paparo, Ari; Geraghty, Kevin, Methods and apparatus to determine media impressions using distributed demographic information.
  183. Kalus, Mark; Paparo, Ari; Geraghty, Kevin, Methods and apparatus to determine media impressions using distributed demographic information.
  184. Kalus, Mark; Paparo, Ari; Geraghty, Kevin, Methods and apparatus to determine media impressions using distributed demographic information.
  185. Sullivan, Jonathan; Lipa, Peter; Sheppard, Michael; Terrazas, Alejandro, Methods and apparatus to estimate demographics of a household.
  186. Duterque, Gilles; Srivastava, Seema Varma; Ion, Cristina, Methods and apparatus to identify session users with cookie information.
  187. Duterque, Gilles; Srivastava, Seema Varma; Ion, Cristina, Methods and apparatus to identify session users with cookie information.
  188. Duterque, Gilles; Srivastava, Seema Varma; Ion, Cristina, Methods and apparatus to identify session users with cookie information.
  189. Duterque, Gilles; Srivastava, Seema Varma; Ion, Cristina, Methods and apparatus to identify session users with cookie information.
  190. Ramaswamy, Arun; Bosworth, Alan N.; Gaynor, Kevin K.; Goli, Narasimha Reddy, Methods and apparatus to measure exposure to streaming media.
  191. Ramaswamy, Arun; Bosworth, Alan N.; Gaynor, Kevin K.; Narasimha, Goli Reddy, Methods and apparatus to measure exposure to streaming media.
  192. Hannan, Kevin Michael; Papakostas, Achilleas; Perez, Albert Ronald; Yonker, Michael Andrew; Albino, Austin William, Methods and apparatus to obtain anonymous audience measurement data from network server data for particular demographic and usage profiles.
  193. Srinivasan, Venugopal; Ramaswamy, Arun, Methods and apparatus to verify presentation of media content.
  194. Allen, Jonathon Brandon, Methods and system for ensuring royalty payments for data delivered over a telephone network utilizing bidirectional communication.
  195. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  196. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  197. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  198. Reisman, Richard R., Methods for transacting electronic commerce.
  199. Ellis, Frampton E., Microchip with faraday cages and internal flexibility sipes.
  200. Ellis, Frampton E, Microchips with an internal hardware firewall.
  201. Ellis, III, Frampton E., Microchips with an internal hardware firewall protected portion and a network portion with microprocessors which execute shared processing operations with the network.
  202. Ellis, III, Frampton E., Microchips with an internal hardware firewall that by its location leaves unprotected microprocessors or processing units which performs processing with a network.
  203. Ellis, Frampton E, Microchips with inner firewalls, faraday cages, and/or photovoltaic cells.
  204. Ellis, Frampton E., Microchips with multiple internal hardware-based firewalls and dies.
  205. Jain, Anand; Stavropoulos, John; Neuhauser, Alan; Lynch, Wendell; Kuznetsov, Vladimir; Crystal, Jack, Monitoring media exposure using wireless communications.
  206. Brand Patrick M., Multiple registered postage meters.
  207. Sim, Lim Or; Cheong, Yee Han; Jarrett, Andrew Lawrence; Bey, Shefik; Eustace, Anthony Roger; Petit, Matthew James, Network resource monitoring and measurement system and method.
  208. Sim, Lim Or; Cheong, Yee Han; Jarrett, Andrew Lawrence; Bey, Shefik; Eustace, Anthony Roger; Petit, Matthew James, Network resource monitoring and measurement system and method.
  209. Sim, Lim Or; Cheong, Yee Han; Jarrett, Andrew Lawrence; Bey, Shefik; Eustace, Anthony Roger; Petit, Matthew James, Network resource monitoring and measurement system and method.
  210. Sim,Lim Or; Cheong,Yee Han; Jarrett,Andrew Lawrence; Bey,Shefik; Eustace,Anthony Roger; Pettit,Matthew James, Network resource monitoring and measurement system and method.
  211. Keanini, Timothy D.; Quiroga, Martin A.; Buchanan, Brian W.; Flowers, John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  212. Keanini,Timothy D.; Quiroga,Martin A.; Buchanan,Brian W.; Flowers,John S., Network security system having a device profiler communicatively coupled to a traffic monitor.
  213. Hassan, Amer A.; Huitema, Christian; Parikh, Vishesh M., Network service for modularly constructing a software defined radio.
  214. Hassan, Amer A.; Huitema, Christian; Parikh, Vishesh M., Network service for modularly constructing a software defined radio.
  215. Montini, Cory A.; Eliahu, Uri; Lieberman, David E.; Gabel, Christopher, Non-invasive metering system for software licenses.
  216. Ronning Joel A., On-line try before you buy software distribution system.
  217. Crawford Christopher M., Online computer services including help desk, anti-virus and/or application service features.
  218. Reeder Anthony Andrew,GBX, Operating apparatus.
  219. Walker, Jay S.; Jorasch, James A.; Carson, Gregory, Parallel data network billing and collection system.
  220. Keanini, Timothy D.; Molitor, Andrew; Gurney, John-Mark; Cooper, Jeremy; Buchanan, Brian, Persistent host determination.
  221. Ellis, III, Frampton E., Personal and server computers having microchips with multiple processing units and internal firewalls.
  222. Ellis, Frampton E., Personal computer, smartphone, tablet, or server with a buffer zone without circuitry forming a boundary separating zones with circuitry.
  223. Little, Mark Cameron, Portable computing device providing operating system for host devices.
  224. Hassan, Amer A.; Wu, Deyun; Huitema, Christian; Parikh, Vishesh M., Predicting degradation of a communication channel below a threshold based on data transmission errors.
  225. Fry Shawn C. ; Mahan Gregory L. ; Christopher Christopher D., Program synchronization on first and second computers by determining whether information transmitted by first computer i.
  226. Reisman, Richard R., Providing and receiving content over a wireless communication system.
  227. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  228. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  229. Butera, Cynthia S.; Butera, Celeste M., Realtime billable timekeeper method, system and apparatus.
  230. Leman,Michael V.; Creese,William M., Remote computer controller and control method.
  231. Anderson Mark D. ; Bigall Evan J. ; Clifford Christine ; Hastings Reed ; Sorensen Jon ; Pan Douglas, Remote monitoring of computer programs.
  232. Anderson Mark D. ; Bigall Evan J. ; Clifford Christine ; Hastings Reed ; Sorensen Jon ; Pan Douglas, Remote monitoring of computer programs.
  233. Anderson,Mark D.; Bigall,Evan J.; Clifford,Christine; Hastings,Reed; Sorensen,Jon; Pan,Douglas, Remote monitoring of computer programs.
  234. Ronning, Joel A.; Wical, Kelly J.; Kukura, Marc A., Scheduling of a file download and search for updates.
  235. Sonobe Masayuki,JPX, Secret information protection system.
  236. Funk, Karsten; Ravula, Sharmila; Schaefer, Jochen, Secure control of wireless sensor network via the internet.
  237. Smith,Fred Hewitt; Smith,Benjamin Hewitt; Smith,Cynthia, Secure detection network system.
  238. Ronning, Joel Alan; Wical, Kelly J., Secure downloading of a file from a network system and method.
  239. Hurtado, Marco M.; Milsted, Kenneth L.; Gruse, George G.; Downs, Edgar; Lehman, Christopher T.; Spagna, Richard L.; Lotspiech, Jeffrey B., Secure electronic content distribution on CDS and DVDs.
  240. Smith, Fred Hewitt, Secure processing module and method for making the same.
  241. McEwan,William Alexander, Security and software testing of pre-release anti-virus updates on client and transmitting the results to the server.
  242. Ronning Joel A., Self-launching encrypted digital information distribution system.
  243. Ronning Joel A., Self-launching encrypted try before you buy software distribution system.
  244. Reisman, Richard R., Software and method for monitoring a data stream and for capturing desired data within the data stream.
  245. Reisman, Richard R., Software and method that enables selection of on-line content from one of a plurality of network content service providers in a single action.
  246. Reisman, Richard R., Software and method that enables selection of one of a plurality of network communications service providers.
  247. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  248. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  249. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  250. Reisman, Richard R., Software distribution over a network.
  251. May Gregory J., Software metering management of remote computing devices.
  252. Jonathan A. Forbes ; Jeremy D. Stone ; Srivatsan Parthasarathy ; Michael J. Toutonghi ; Michael V. Sliger, Software package management.
  253. Bahar, Reuben, Software piracy prevention through remote enforcement of an activation threshold.
  254. Itami Satoshi,JPX ; Nakashima Kazuo,JPX ; Utsumi Kenichi,JPX, Software processing apparatus writing software to a medium only if identification information in the software corresponds to identification information in the medium.
  255. Benson Glenn,DEX, Software rental system and method for renting software.
  256. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  257. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  258. Hurtado, Marco M.; Mahlbacher, James C.; Spagna, Richard L., Super-distribution of protected digital content.
  259. Mechaley, Robert; Miner, Richard A., System and method for activating software operating capabilities based on usage patterns and rules.
  260. Lauckhart, Gregory J.; Horman, Craig B.; Korol, Christa; Bartot, James T., System and method for estimating prevalence of digital content on the world-wide-web.
  261. Lauckhart, Gregory J.; Horman, Craig B.; Korol, Christa; Bartot, James T., System and method for estimating prevalence of digital content on the world-wide-web.
  262. Smith, Benjamin Hewitt; Smith, Fred Hewitt, System and method for installing an auditable secure network.
  263. Smith, Benjamin Hewitt; Smith, Fred Hewitt, System and method for installing an auditable secure network.
  264. Meulemans, Michael Edward; Averbuch, Aaron; Roberts, Jason; Showman, Ken; Mohammed, Mazhar; Dadzie, Joseph G., System and method for managing and communicating software updates.
  265. Zhou, Todd Tao; Batista, Ricardo, System and method for monitoring secure data on a network.
  266. Zhou, Todd Tao; Batista, Ricardo, System and method for monitoring secure data on a network.
  267. Zhou, Todd Tao; Batista, Ricardo, System and method for monitoring secure data on a network.
  268. Davis,Owen; Jain,Vidyut, System and method for monitoring the use of a resource by a client connected to a computer network having one or more servers in communication with one or more clients.
  269. Smith, Benjamin; Sabin, Daniel; Smith, Fred Hewitt, System and method for obtaining keys to access protected information.
  270. Smith, III, Fred Hewitt; Smith, Cynthia; Smith, Benjamin; Sabin, Daniel, System and method for policy driven protection of remote computing environments.
  271. Hecksel David L. ; Duderstadt Russel A., System and method for product registration.
  272. Alcazar,Mark A.; Dunn,Michael; Canter,Adriaan W.; Tammana,Venkata Rama Prasad, System and method for progressively installing a software application.
  273. Zaitsev, Oleg V.; Grebennikov, Nikolay A.; Monastyrsky, Alexey V.; Pavlyushchik, Mikhail A., System and method for security rating of computer processes.
  274. Smith, Fred Hewitt; Smith, Cynthia, System and method for using a separate device to facilitate authentication.
  275. Smith, Fred Hewitt; Smith, Cynthia, System and method for using a separate device to facilitate authentication.
  276. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  277. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  278. Beuk Leonardus G. M.,NLX ; Van Tatenhove Marie L., System for distributing computer programs.
  279. Smith Benjamin Hewitt ; Smith Fred Hewitt, System for installing information related to a software application to a remote computer over a network.
  280. Ronning Joel A., System for preventing unauthorized copying of active software.
  281. Matsumoto,Naoto, System for rewriting control program in vending machine.
  282. Dorenbeck, Claus; Van Essen, Robert Joannes, System for securing data on a data carrier.
  283. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  284. Walker Jay ; Schneier Bruce, Systems and methods for a user to access digital data provided by an on-line server over a data network.
  285. Kolessar, Ronald S.; Jensen, James M.; Lynch, Wendell D., Systems and methods for gathering audience measurement data.
  286. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  287. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  288. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  289. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  290. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  291. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  292. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  293. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  294. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  295. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  296. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  297. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  298. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  299. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  300. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  301. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  302. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  303. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  304. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  305. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  306. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  307. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  308. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  309. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  310. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  311. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  312. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  313. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  314. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  315. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  316. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  317. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  318. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce electronic transactions and rights management.
  319. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  320. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  321. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  322. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  323. Ronning Joel A., Try before you buy software distribution and marketing system.
  324. Amano, Masato, Unauthorized usage prevention system and information processing apparatus.
  325. Nakamura Toshiki,JPX ; Ueda Tatsuya,JPX, Upgrading an application software to be used, by communication.
  326. Nakamura Toshiki,JPX ; Ueda Tatsuya,JPX, Upgrading an application software to be used, by communication.
  327. Coons, Thomas L; Getler, Robert M; Landry, R Kent; Rogers, Steven B, Usage-based billing and management system and method for printers and other assets.
  328. Blumenau, Trevor I.; Harkness, David H.; Bhatia, Manish, Use of browser history file to determine web site reach.
  329. Blumenau, Trevor I.; Harkness, David H.; Bhatia, Manish, Use of browser history file to determine web site reach.
  330. Blumenau, Trevor I.; Harkness, David H.; Bhatia, Manish, Use of browser history file to determine web site reach.
  331. Reisman, Richard R., User station software that controls transport and presentation of content from a remote source.
  332. Reisman, Richard R., User station software that controls transport, storage, and presentation of content from a remote source.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로