$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Roving software license for a hardware agent 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0303084 (1994-09-07)
발명자 / 주소
  • Davis Derek L. (Phoenix AZ)
출원인 / 주소
  • Intel Corporation (Santa Clara CA 02)
인용정보 피인용 횟수 : 565  인용 특허 : 0

초록

An integrated circuit component for enforcing licensing restrictions. Such enforcement is performed through remote transmission of access privileges for executing a licensed program from the integrated circuit component to another similar component. The integrated circuit component comprising a non-

대표청구항

A first integrated circuit component adapted for exchanging a license token, necessary for executing a licensed software program, with a second integrated circuit component, the first integrated circuit component comprising: processing means for processing information completely within said first in

이 특허를 인용한 특허 (565)

  1. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  2. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  3. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  4. Triantafillou, Nicholas D.; Bradfield, Terry Ryun; Saxena, Paritosh; Thadikaran, Paul J.; Novick, David Owen, Activation and monetization of features built into storage subsystems using a trusted connect service back end infrastructure.
  5. Derek L. Davis ; Jean-Charles Korta, Anonymity server.
  6. Davis Derek L., Anti-theft mechanism for mobile computers.
  7. Proudler,Graeme John; Balacheff,Boris; Plaquin,David, Apparatus and method for creating a trusted environment.
  8. Proudler,Graeme John; Balacheff,Boris; Worley,John S.; Hyser,Chris D.; Worley, Jr.,William S, Apparatus and method for creating a trusted environment.
  9. Davis Derek L., Apparatus and method for cryptographic companion imprinting.
  10. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  11. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  12. Arnold Terry Sutton, Apparatus and method for establishing a crytographic link between elements of a system.
  13. Terry Sutton Arnold, Apparatus and method for establishing a crytographic link between elements of a system.
  14. Brickell, Ernest F., Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information.
  15. Davis Derek L., Apparatus and method for providing secured communications.
  16. Brickell,Ernest F., Apparatus and method for proving the denial of a direct proof signature.
  17. Rosen Sholom S., Apparatus and method for secure transacting.
  18. Kozuch,Michael A.; Sutton, II,James A.; Grawrock,David; Neiger,Gilbert; Uhlig,Richard A.; Burgess,Bradley G.; Poisner,David I.; Hall,Clifford D.; Glew,Andy; Smith, III,Lawrence O.; George,Robert, Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment.
  19. Asperger, Karl; Kiemes, Jochen; Lange, Roland; Lindinger, Andreas; Rombach, Gerhard, Arrangement comprising an integrated circuit.
  20. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Attestation key memory device and bus.
  21. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Attestation key memory device and bus.
  22. Grawrock,David W., Attestation using both fixed token and portable token.
  23. Lampson,Butler W.; DeTreville,John D.; England,Paul, Attesting to a value of a register and/or memory region.
  24. Glew,Andrew F.; Sutton,James A.; Smith,Lawrence O.; Grawrock,David W.; Neiger,Gilbert; Kozuch,Michael A., Authenticated code module.
  25. Matyas Stephen M. ; Smith Sean William, Authentication for secure devices with limited cryptography.
  26. DeFreese, Darryl L.; Seaman, Jeffrey M.; Wasilewski, Anthony J., Authentication of entitlement authorization in conditional access systems.
  27. Davis Derek L. ; Smith Lionel, Authentication system based on periodic challenge/response protocol.
  28. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Banker, Robert O., Authorization of services in a conditional access system.
  29. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Banker, Robert O., Authorization of services in a conditional access system.
  30. Cao,Adrean T., Auxiliary program association table.
  31. Pedlow, Jr.,Leo M.; Agnihotri,Davender, Batch mode session-based encryption of video on demand content.
  32. Pedlow, Jr., Leo M.; Agnihotri, Davender, Bi-directional indices for trick mode video-on-demand.
  33. Peinado, Marcus, Binding a digital license to a portable or the like in a digital rights management (DMR) system and checking out/checking in the digital license to/from the portable device or the like.
  34. Lampson, Butler W.; DeTreville, John D.; England, Paul, Boot blocks for software.
  35. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  36. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  37. Davis Derek L., Circuit and method for ensuring interconnect security with a multi-chip integrated circuit package.
  38. England, Paul, Client-side boot domains and boot rules.
  39. England, Paul, Client-side boot domains and boot rules.
  40. England,Paul, Client-side boot domains and boot rules.
  41. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  42. Pedlow, Jr.,Leo M., Composite session-based encryption of video on demand content.
  43. Gold, Stephen, Computer apparatus, method and memory including license key.
  44. Pearson,Siani Lynne; Chan,David, Computer platforms and their methods of operation.
  45. Wasilewski Anthony J. ; Pinder Howard G. ; Akins ; III Glendon L. ; Palgon Michael S., Conditional access system.
  46. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Palgon, Michael S., Conditional access system.
  47. Grawrock,David W., Connecting a virtual token to a physical token.
  48. Holtzman, Michael; Barzilai, Ron; Sela, Rotem; Jogand-Coulomb, Fabrice, Content control method using certificate chains.
  49. Holtzman, Michael; Barzilai, Ron; Sela, Rotem; Jogand-Coulomb, Fabrice, Content control method using certificate revocation lists.
  50. Holtzman, Michael; Barzilai, Ron; Jogand-Coulomb, Fabrice, Content control method using versatile control structure.
  51. Candelore,Brant L., Content distribution for multiple digital rights management.
  52. Candelore, Brant L., Content personalization for digital content.
  53. Traw, Chandler Brendan Stanton; Aucsmith, David Wayne, Content protection for digital transmission systems.
  54. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  55. Stefik,Mark J., Content rendering device with usage rights.
  56. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  57. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  58. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, Jon D., Content replacement by PID mapping.
  59. Bonan,James; Candelore,Brant L.; Eyer,Mark Kenneth, Content scrambling with minimal impact on legacy devices.
  60. Holtzman, Michael; Barzilai, Ron; Jogand-Coulomb, Fabrice, Control method using identity objects.
  61. Bennett,Steve; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Zou,Xiang; Kozuch,Michael A., Control over faults occurring during the operation of guest software in the virtual-machine architecture.
  62. Bennett,Steve; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael A., Control register access virtualization performance improvement in the virtual-machine architecture.
  63. England, Paul; DeTreville, John D.; Lampson, Butler W., Controlling access to content based on certificates and access predicates.
  64. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple isolated memories in an isolated execution environment.
  65. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple memory zones in an isolated execution environment.
  66. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple memory zones in an isolated execution environment.
  67. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling accesses to isolated memory using a memory controller for isolated execution.
  68. Candelore, Brant L., Copy-protecting management using a user scrambling key.
  69. Grawrock,David W., Creation and distribution of a secret value between two devices.
  70. Unger,Robert Allan; Candelore,Brant L., Critical packet partial encryption.
  71. Callum Roy, Cryptographic accelerator.
  72. Callum, Roy, Cryptographic accelerator.
  73. Unger,Robert Allan; Candelore,Brant L.; Pedlow, Jr.,Leo M., Decoding and decryption of partially encrypted information.
  74. Ryal,Kim Annon, Decryption system.
  75. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  76. Dalton, Christopher I., Demonstrating integrity of a compartment of a compartmented operating system.
  77. Candelore, Brant L., Descrambler.
  78. Candelore, Brant L., Descrambler.
  79. Rick,Ralf, Device and method of preventing pirated copies of computer programs.
  80. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  81. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  82. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  83. Tan, Jr., Aureliano, Digital identity device.
  84. Tan, Jr.,Aureliano, Digital identity device.
  85. Candelore, Brant L., Digital rights management of a digital device.
  86. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  87. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  88. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  89. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  90. England Paul ; DeTreville John D. ; Lampson Butler W., Digital rights management operating system.
  91. Levy, Kenneth L., Digital watermarking and fingerprinting applications for copy protection.
  92. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  93. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  94. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  95. Westerinen, William J.; Carpenter, Todd L., Direct memory access for compliance checking.
  96. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  97. Wells, Steven E.; Ward, David A., Duty cycle corrector for a random number generator.
  98. Pedlow, Jr.,Leo M.; Agnihotri,Davender, Dynamic composition of pre-encrypted video on demand content.
  99. Halmstad, Richard Zachary; Anderson, Matthew John; Hengels, Bryan Christopher; Yohnk, Ryan Brent, Dynamic grouping of managed devices.
  100. Kawamura Harumi,JPX, Electronic equipment, method of controlling operation thereof and controlling method.
  101. Davis, Derek L., Electronic system and method for controlling access through user authentication.
  102. Rosen Sholom S. (New York NY), Electronic ticket presentation and transfer method.
  103. Rosen,Sholom S., Electronic ticket vending system.
  104. Rosen,Sholom S., Electronic transaction apparatus for electronic commerce.
  105. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M.; Mirsky,Gregory; Eyer,Mark Kenneth, Elementary stream partial encryption.
  106. Doumen, Jeroen Mathias, Enabling a software application to be executed on a hardware device.
  107. Pedlow, Jr.,Leo M.; Candelore,Brant L.; Derovanessian,Henry, Encryption and content control in a digital broadcast system.
  108. Howard G. Pinder ; Michael S. Palgon, Encryption devices for use in a conditional access system.
  109. Schwartzman Nikolai L., Encryption key system and method.
  110. Oliveira, Eduardo P.; Dunbar, Geoffrey; Alkove, James M., Encryption scheme for streamed multimedia content protected by rights management system.
  111. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  112. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Executing isolated mode instructions in a secure system running in privilege rings.
  113. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  114. Forehand, Monty A.; DeMattio, Christopher J; Offenberg, Manuel A, Feature activation using near field communication.
  115. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S., File checking using remote signing authority via a network.
  116. Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code from third computer process on behalf of first process.
  117. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  118. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  119. Lelikov, Andrey; Gunyakti, Caglar; Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code on behalf thereof.
  120. Brooks, Cecil Ray; Girotto, Jay Robert; Gunyakti, Caglar; Haugen, Todd, Flexible licensing architecture for licensing digital application.
  121. Brooks, Cecil Ray; Girotto, Jay Robert; Gunyakti, Caglar; Haugen, Todd, Flexible licensing architecture for licensing digital application.
  122. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Generating a key hieararchy for use in an isolated execution environment.
  123. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Generating isolated bus cycles for isolated execution.
  124. England, Paul; Peinado, Marcus, Generating, migrating or exporting bound keys.
  125. Uhlig,Richard; Anderson,Andrew V.; Bennett,Steve; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert, Handling faults associated with operation of guest software in the virtual-machine architecture.
  126. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  127. Candelore, Brant L., IP delivery of secure digital content.
  128. Proudler, Graeme John, Identifying a trusted computing entity.
  129. Koritzinsky Ianne Mae Howards ; Reich John Aurthur, Imaging system protocol handling method and apparatus.
  130. Koritzinsky, Ianne Mae Howards; Reich, John Aurthur, Imaging system protocol handling method and apparatus.
  131. Koritzinsky,Ianne Mae Howards; Reich,John Aurthur, Imaging system protocol handling method and apparatus.
  132. Proudler, Graeme John, Information security system.
  133. Proudler, Graeme John; Balacheff, Boris, Information system.
  134. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  135. Wells,Steven E.; Kynett,V. Niles, Integrated circuit chip having firmware and hardware security primitive device(s).
  136. Dariel, Dani, Integrated circuit for digital rights management.
  137. Cota-Robles, Eric C.; Glew, Andy; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael A.; Neiger, Gilbert; Uhlig, Richard, Invalidating translation lookaside buffer entries in a virtual machine (VM) system.
  138. Cota-Robles, Eric C.; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael A.; Neiger, Gilbert; Uhlig, Richard, Invalidating translation lookaside buffer entries in a virtual machine system.
  139. Frank, Alexander; Hall, Martin H.; Phillips, Thomas G., Isolated computing environment anchored into CPU and motherboard.
  140. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  141. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  142. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  143. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  144. Ali, Wajahat, Late stage SKU assignment.
  145. Nakamura,Mie; Sawayanagi,Kazumi; Ozeki,Satoshi; Takano,Masahito; Yamauchi,Kana; Yoshizaki,Yoshihiko, License management apparatus, license management system and license management method.
  146. Strom, Clifford P.; Siu, Michael Y.; Evans, Brian P., Licensing content for use on portable device.
  147. England Paul ; DeTreville John D. ; Lampson Butler W., Loading and identifying a digital rights management operating system.
  148. Dillaway, Blair Brewster; LaMacchia, Brian; Manferdelli, John; Paramasivam, Muthukrishnan, Long-life digital certification for publishing long-life digital content or the like in content rights management system or the like.
  149. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, John, Macro-block based content replacement by PID mapping.
  150. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  151. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  152. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  153. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  154. Sela, Rotem; Holtzman, Michael; Barzilai, Ron; Bryant-Rich, Donald Ray, Managing access to an address range in a storage device.
  155. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing accesses in a processor for isolated execution.
  156. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  157. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  158. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  159. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  160. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  161. Gonzalez, Carlos J.; Ferchau, Joerg; Jogand-Coulomb, Fabrice, Mass storage device with automated credentials loading.
  162. Gonzalez, Carlos J.; Ferchau, Joerg; Jogand-Coulomb, Fabrice, Mass storage device with automated credentials loading.
  163. Wasilewski, Anthony J.; Seaman, Jeffery M.; Defreese, Darryl L., Mechanism and apparatus for encapsulation of entitlement authorization in conditional access system.
  164. Candelore, Brant L., Mechanism for protecting the transfer of digital content.
  165. Hall, Clifford D.; Campbell, Randolph L., Mechanism for remapping post virtual machine memory pages.
  166. Bennett,Steven M.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Neiger,Gilbert; Uhlig,Richard, Mechanism to control hardware interrupt acknowledgement in a virtual machine system.
  167. Fish, Andrew J., Mechanism to determine trust of out-of-band management agents.
  168. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  169. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  170. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  171. McKeen,Francis X.; Reneris,Ken; Grawrock,David W., Mechanism to secure computer output from software attack using isolated execution.
  172. Alloul Albert,CAX ; Brown Allan,CAX, Message status display.
  173. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  174. Brickell, Ernest; Graunke, Gary; Stevens, William A.; Vembu, Balaji, Method and apparatus for authenticated, recoverable key distribution with no database secrets.
  175. DeTreville, John, Method and apparatus for authenticating an open system application to a portable IC device.
  176. DeTreville,John, Method and apparatus for authenticating an open system application to a portable IC device.
  177. DeTreville,John D., Method and apparatus for authenticating an open system application to a portable IC device.
  178. Levy, Kenneth L., Method and apparatus for automatic ID management.
  179. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  180. Poisner,David I.; Grawrock,David W.; Sutton,James A., Method and apparatus for communicating securely with a token.
  181. Cota Robles,Erik; Chou,Stephen; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Method and apparatus for constructing host processor soft devices independent of the host processor operating system.
  182. Levy, Kenneth L., Method and apparatus for content management.
  183. Levy, Kenneth L., Method and apparatus for content management.
  184. Levy, Kenneth L., Method and apparatus for content management.
  185. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  186. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  187. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  188. Hind, John Raithel; Peters, Marcia Lambert, Method and apparatus for efficiently initializing secure communications among wireless devices.
  189. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  190. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  191. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  192. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  193. Bennett, Steven M.; Anderson, Andrew V.; Cota Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  194. Bennett, Steven M.; Anderson, Andrew V.; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  195. Akins, III, Glendon L.; Pinder, Howard G.; Wasilewski, Anthony J., Method and apparatus for geographically limiting service in a conditional access system.
  196. Akins, III, Glendon L.; Pinder, Howard G.; Wasilewski, Anthony J., Method and apparatus for geographically limiting service in a conditional access system.
  197. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  198. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  199. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  200. Candelore, Brant L.; Eyer, Mark, Method and apparatus for implementing revocation in broadcast networks.
  201. Candelore,Brant L.; Eyer,Mark, Method and apparatus for implementing revocation in broadcast networks.
  202. Bakhle Ashutosh ; Davis Derek L., Method and apparatus for integrated ciphering and hashing.
  203. Bakhle, Ashutosh; Davis, Derek L., Method and apparatus for integrated ciphering and hashing.
  204. Graunke Gary L. ; Rozas Carlos V., Method and apparatus for integrity verification, authentication, and secure linkage of software modules.
  205. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  206. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  207. Kozuch, Michael A.; Sutton, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  208. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  209. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  210. Candelore, Brant L., Method and apparatus for protecting the transfer of data.
  211. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  212. Anthony J. Wasilewski ; Douglas F. Woodhead ; Gary Lee Logston, Method and apparatus for providing conditional access in connection-oriented interactive networks with a multiplicity of service providers.
  213. Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
  214. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  215. Candelore, Brant L., Method and apparatus for securing control words.
  216. Candelore,Brant L., Method and apparatus for securing control words.
  217. Anderson, Andrew V.; Kägi, Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  218. Anderson,Andrew V.; K��gi,Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  219. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  220. Dawson, Thomas Patrick, Method and apparatus for synchronizing dynamic graphics.
  221. Doll Steinberg,Daniel, Method and apparatus for the distribution of digitised information on demand.
  222. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  223. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  224. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  225. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  226. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  227. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  228. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  229. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  230. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  231. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  232. Rhoads,Geoffrey B., Method and system for managing, accessing and paying for the use of copyrighted electronic media.
  233. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set.
  234. Lao, Guillermo, Method and system for subscription digital rights management.
  235. Lao, Guillermo, Method and system for subscription digital rights management.
  236. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  237. Bajikar, Sundeep M., Method and system to provide a trusted channel within a computer system for a SIM device.
  238. Durbin, Winnie C.; Zhang, Kun; Singh, Karamjeet; Mehring, Dave; Lamoureux, Thomas Leroy; Zettel, Hubert A.; Butler, Timothy D, Method and system to remotely enable software-based options for a trial period.
  239. Derek L. Davis ; Pranav Mehta, Method for BIOS authentication prior to BIOS execution.
  240. N. Muralidhran ; John Torkelson, Method for communicating and controlling transactions between unsecured parties.
  241. Holtzman, Michael; Barzilai, Ron; Jogand-Coulomb, Fabrice, Method for controlling information supplied from memory device.
  242. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  243. Jogand-Coulomb, Fabrice; Holtzman, Michael; Qawami, Bahman; Barzilai, Ron, Method for creating control structure for versatile content control.
  244. Rosen Sholom S., Method for electronic merchandise dispute resolution.
  245. Sholom S. Rosen, Method for electronic merchandise dispute resolution.
  246. Rosen Sholom S. (New York NY), Method for establishing secure communications among processing devices.
  247. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  248. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  249. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  250. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  251. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  252. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  253. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  254. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  255. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jevasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  256. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  257. Candelore, Brant L., Method for simulcrypting scrambled data to a plurality of conditional access devices.
  258. Candelore, Brant L., Method for simulcrypting scrambled data to a plurality of conditional access devices.
  259. Candelore,Brant L., Method for simulcrypting scrambled data to a plurality of conditional access devices.
  260. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  261. Burnett,Rodney Carl, Method for transferring privilege access to a resource manager with subsequent loss of privilege by the initiating identity.
  262. Jogand-Coulomb, Fabrice; Holtzman, Michael; Qawami, Bahman; Barzilai, Ron; Bar-El, Hagai, Method for versatile content control.
  263. Jogand-Coulomb, Fabrice; Holtzman, Michael; Qawami, Bahman; Barzilai, Ron, Method for versatile content control with partitioning.
  264. Pearson, Siani Lynne; Proudler, Graeme John, Method of and apparatus for ascertaining the status of a data processing environment.
  265. Grumstrup Bruce F. ; Ryan Patrick O., Method of and apparatus for protecting and upgrading software using a removable hardlock.
  266. Brickell,Ernie F., Method of confirming a secure key exchange.
  267. Zunke, Michael, Method of operating a computer system and computer system.
  268. Stern, Michael; Stehle, Nicolas; Stehle, Jean-Luc, Method, server system and device for making safe a communication network.
  269. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  270. Shackelford,David Michael, Method, system, and program for distributing software between computer systems.
  271. Shackelford,David Michael, Method, system, and program for distributing software between computer systems.
  272. Maetz, Yves; Diehl, Eric; Durand, Alain; Morvan, Michel, Methods and a device for secure software installation.
  273. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  274. Pinder, Howard G.; Woodward, Jr., William D.; Evans, Jonathan Bradford; Wasilewski, Anthony J., Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system.
  275. Pinder,Howard G.; Woodward, Jr.,William D.; Evans,Jonathan Bradford; Wasilewski,Anthony J., Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system.
  276. Bennett,Steve M.; Neiger,Gilbert; Cota Robles,Erik C.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael A.; Uhlig,Richard A.; Smith,Larry; Rodgers,Dion; Glew,Andrew; Boleyn,Erich, Methods and systems to control virtual machines.
  277. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  278. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  279. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  280. Erickson, John S., Methods for playing protected content.
  281. Holden, James M; Levin, Stephen E; Nickel, James O; Wrench, Edwin H, Methods for providing security over untrusted networks.
  282. Abdallah, David S.; Johnson, Barry W., Methods for secure backup of personal identity credentials into electronic devices.
  283. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  284. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  285. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  286. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  287. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment and backup of personal identity credentials into electronic devices.
  288. Abdallah, David S.; Johnson, Barry W., Methods for secure enrollment of personal identity credentials into electronic devices.
  289. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  290. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  291. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  292. Abdallah, David S.; Johnson, Barry W., Methods for secure restoration of personal identity credentials into electronic devices.
  293. Rhoads,Geoffrey B., Methods for steganographic encoding media.
  294. Gonzalez, Carlos J.; Ferchau, Joerg; Jogand-Coulomb, Fabrice, Methods used in a mass storage device with automated credentials loading.
  295. Proudler, Graeme John; Burton, William; Kuhlmann, Dirk; Plaquin, David, Methods, devices and data structures for trusted data.
  296. Tan, Jr., Aureliano, Microprocessor identity device.
  297. Bialick William P. ; Sutherland Mark J. ; Dolphin-Peterson Janet L. ; Rowland Thomas K. ; Skeba Kirk W. ; Housley Russell D., Modular security device.
  298. Candelore,Brant L., Multi-process descrambler.
  299. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  300. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  301. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  302. Grawrock,David W., Multi-token seal and unseal.
  303. Candelore, Brant L., Multiple DRM management.
  304. Candelore,Brant L., Multiple partial encryption using retuning.
  305. Griffin, Jonathan; Dalton, Christopher I.; Child, Michael; Chen, Liqun; Norman, Andrew Patrick, Multiple trusted computing environments.
  306. Griffin,Jonathan; Chen,Liqun, Multiple trusted computing environments with verifiable environment identities.
  307. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Operating system upgrades in a trusted operating system environment.
  308. Proudler,Graeme John; Chan,David, Operation of trusted state in computing platform.
  309. Davis Derek L., Optimized security functionality in an electronic system.
  310. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  311. Collens, Daniel A.; Watson, Stephen; Malcolm, Michael A., Parallel distribution and fingerprinting of digital content.
  312. Collens,Daniel A.; Watson,Stephen; Malcolm,Michael A., Parallel distribution and fingerprinting of digital content.
  313. Candelore, Brant L., Parental control of displayed content using closed captioning.
  314. Pinder,Howard; Evans,Jonathan Bradford; Wasilewski,Anthony J.; Woodward, Jr.,William D., Partial dual encrypted stream utilizing program map tables.
  315. Pinder, Howard G.; Evans, Jonathan Bradford; Wasilewski, Anthony J.; Woodward, Jr., William D., Partial dual-encryption using program map tables.
  316. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M., Partial encryption and PID mapping.
  317. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M., Partial encryption and PID mapping.
  318. Proudler, Graeme John, Performance of a service on a computing platform.
  319. Griffin,Jonathan; Dalton,Christopher I., Performing secure and insecure computing operations in a compartmented operating system.
  320. Bialick William P. ; Sutherland Mark J. ; Dolphin-Peterson Janet L. ; Rowland Thomas K. ; Skeba Kirk W. ; Housley Russell D., Peripheral device with integrated security functionality.
  321. Davis, Derek L.; Herbert, Howard C., Platform and method for assuring integrity of trusted agent communications.
  322. Derek L. Davis ; Howard C. Herbert, Platform and method for assuring integrity of trusted agent communications.
  323. Huded, Ashok V., Platform and method for creating and using a digital container.
  324. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  325. Brickell,Ernie F., Platform and method for establishing trust without revealing identity.
  326. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for generating and utilizing a protected audit log.
  327. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for issuing and certifying a hardware-protected attestation key.
  328. Herbert,Howard C.; Grawrock,David W.; Ellison,Carl M.; Golliver,Roger A.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for remote attestation of a platform.
  329. Grawrock, David W., Platform and method for securely transmitting an authorization secret.
  330. Grawrock,David W., Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations.
  331. Evans, Brian P.; Strom, Clifford P.; Dunbar, Geoffrey; Prologo, Richard D., Playlist burning in rights-management context.
  332. Pedlow, Jr., Leo M.; Agnihotri, Davender, Preparation of content for multiple conditional access methods in video on demand.
  333. Olson,Erik B.; Zinda,Eric K., Prevention of software tampering.
  334. Moran, Douglas R.; Acharya, Satish; Bogin, Zohar; Galloway, Sean G., Prioritized address decoder.
  335. Buchheit,Marcellus; Winzenried,Oliver, Procedure for the protection of computer software and/or computer-readable data as well as protective equipment.
  336. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard, Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor.
  337. Wells, Steven E., Programmable random bit source.
  338. Wells,Steven E., Programmable random bit source.
  339. Srinivasan, Pramila; Princen, John, Programming on-chip non-volatile memory in a secure processor using a sequence number.
  340. Srinivasan, Pramila; Princen, John, Programming on-chip non-volatile memory in a secure processor using a sequence number.
  341. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  342. Poisner, David I., Protected configuration space in a protected environment.
  343. Poisner,David I., Protected configuration space in a protected environment.
  344. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  345. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  346. Oliveira, Eduardo P.; Klemets, Anders E.; Bhatt, Sanjay; Paka, Anand; Alkove, James M., Protecting digital media of various content types.
  347. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Protecting software environment in isolated execution.
  348. Bennett,Steven M.; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K��gi,Alain; Neiger,Gilbert; Uhlig,Richard; Mondal,Sanjoy K.; Brandt,Jason, Providing support for single stepping a virtual machine in a virtual machine environment.
  349. Wells, Steven E.; Ward, David A., Random number generator with entropy accumulation.
  350. Cota Robles,Erik C.; Flautner,Krisztian, Real-time scheduling of virtual machines.
  351. Ali, Wajahat, Recipient-specific feature activation.
  352. Uhlig,Richard; Neiger,Gilbert; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Bennett,Steven M, Reclaiming existing fields in address translation data structures to extend control over memory accesses.
  353. Forehand, Monty A; Offenberg, Manuel A.; Duran, Anthony R; Wicaksono, Nino; Kaiser, David R, Remote feature activation.
  354. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  355. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  356. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  357. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  358. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  359. Akins ; III Glendon L. ; Banker Robert O. ; Palgon Michael S. ; Pinder Howard G. ; Wasilewski Anthony J., Representing entitlements to service in a conditional access system.
  360. Akins, III, Glendon L.; Banker, Robert O.; Palgon, Michael S.; Pinder, Howard G.; Wasilewski, Anthony J., Representing entitlements to service in a conditional access system.
  361. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind; Reneris, Ken, Resetting a processor in an isolated execution environment.
  362. Evans, Brian P.; Strom, Clifford P.; Rosenstein, Daniel, Rights management system for streamed multimedia content.
  363. Evans, Brian P.; Strom, Clifford P.; Rosenstein, Daniel; Paka, Anand D.; Fang, Nicholas J.; Oliveria, Eduardo, Rights management system for streamed multimedia content.
  364. Van Dyke, Clifford P.; Cheng, David J.; Mohan, Siva, Rights management system for streamed multimedia content.
  365. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  366. Mensch, James; Hauck, Jerry; Misra, Ronnie, Run-time code injection to perform checks.
  367. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  368. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  369. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  370. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  371. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  372. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  373. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  374. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  375. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  376. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  377. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  378. Debry, Roger K., Secure configuration of a digital certificate for a printer or other network device.
  379. Saunders Keith A.,GBX, Secure data processing method and system.
  380. England,Paul; Lampson,Butler W., Secure execution of program code.
  381. Wells, Steven E.; Kynett, V. Niles; Dover, Lance W., Secure hardware random number generator.
  382. Wells,Steven E.; Kynett,V. Niles; Dover,Lance W., Secure hardware random number generator.
  383. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  384. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  385. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  386. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  387. Evans,Glenn F.; Bradstreet,John, Secure media path methods, systems, and architectures.
  388. Rhoads,Geoffrey B., Securing media content with steganographic encoding.
  389. Candelore,Brant L., Selective encryption for video on demand.
  390. Candelore,Brant L., Selective encryption to enable multiple decryption keys.
  391. Candelore,Brant L.; Poslinski,Tom, Selective encryption to enable trick play.
  392. Candelore, Brant L., Selective encryption with coverage encryption.
  393. Yamagata, Akihiko; Arisawa, Shigeru; Nakada, Kenji; Fukada, Akira; Morita, Tadashi, Service providing method and integrated circuit.
  394. Grawrock,David W.; Poisner,David I., Sleep protection.
  395. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Slice mask and moat pattern partial encryption.
  396. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  397. Akins, III, Glendon L.; Banker, Robert O.; Palgon, Michael S.; Pinder, Howard G.; Wasilewski, Anthony J., Source authentication of download information in a conditional access system.
  398. Frank, Alexander; Steeb, Curt A.; Ahdout, Isaac P.; Duffus, James S.; Hall, Martin; Temple, Nicholas; Venkatachalam, Rajagopal; Phillips, Thomas; Xu, Zhangwei, Special PC mode entered upon detection of undesired state.
  399. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Star pattern partial encryption.
  400. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  401. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  402. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  403. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  404. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  405. Liu, Yeu; Pandya, Ravi; Ivanov, Lazar; Paramasivam, Muthukrishnan; Gunyakti, Caglar; Gui, Dongmei; Hsu, Scott W. P., Supplementary trust model for software licensing/commercial digital distribution policy.
  406. Neiger,Gilbert; Anderson,Andrew V.; Bennett,Steven M.; Brandt,Jason; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K채gi,Alain; Mondal,Sanjoy K.; Parthasarathy,Rajesh; Rodgers,Dion; Smith,Lawrence O.; Uhlig,Richard A., Support for nested fault in a virtual machine environment.
  407. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for authenticating an operating system.
  408. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  409. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  410. England,Paul; Lampson,Butler W.; DeTreville,John D., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  411. O'Donnell, Amy; Thangadurai, George; Rajan, Anand, System and method for authentication of off-chip processor firmware code.
  412. Cota Robles,Erik C.; Campbell,Randolph L.; Hall,Clifford D.; Neiger,Gilbert; Uhlig,Richard A., System and method for binding virtual machines to hardware contexts.
  413. Drews, Paul, System and method for checking authorization of remote configuration operations.
  414. Rosen Sholom S., System and method for connecting money modules.
  415. Neiger, Gilbert; Bennett, Steven M.; Cota-Robles, Erik; Schoenberg, Sebastian; Hall, Clifford D.; Rodgers, Dion; Smith, Lawrence O.; Anderson, Andrew V.; Uhlig, Richard A.; Kozuch, Michael; Glew, Andy, System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time.
  416. Raciborski, Bohdan, System and method for delivery of a modular operating system.
  417. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  418. Davis Derek L., System and method for digitally signing a digital agreement between remotely located nodes.
  419. Wang,Xin, System and method for document distribution.
  420. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  421. Derek L. Davis, System and method for ensuring integrity throughout post-processing.
  422. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  423. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  424. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  425. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  426. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  427. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  428. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  429. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  430. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  431. Sutton, II,James A.; Grawrock,David W., System and method for execution of a secured environment initialization instruction.
  432. Sutton, James A; Grawrock, David W, System and method for execution of a secured environment initialization instruction.
  433. Sahota, Harvinder; Sahota, Neil, System and method for identity verification.
  434. Demeyer, Michael, System and method for licensing software.
  435. Demeyer, Michael, System and method for licensing software.
  436. Erickson, John S., System and method for managing copyrighted electronic media.
  437. Jaber, Muhammed K.; Khatri, Mukund P.; Webb, III, Theodore S., System and method for managing feature enablement in an information handling system.
  438. Jaber, Muhammed K.; Khatri, Mukund P.; Webb, Theodore S., System and method for managing feature enablement in an information handling system.
  439. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  440. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  441. Pedlow, Jr.,Leo M.; Derovanessian,Henry; Candelore,Brant, System and method for partially encrypted multimedia stream.
  442. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  443. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  444. Wang, Xin, System and method for protection of digital works.
  445. Grawrock,David W.; Sutton, II,James A., System and method for resetting a platform configuration register.
  446. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  447. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for secure storage data using a key.
  448. Lampson, Butler W.; DeTreville, John D.; England, Paul, System and method for secure storage of data using public and private keys.
  449. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  450. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  451. Candelore, Brant L.; Pedlow, Jr., Leo M., System and method for the creation, synchronization and delivery of alternate content.
  452. Wang,Xin, System and method for transferring the right to decode messages.
  453. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  454. Paul C. Drews, System and method for verifying the integrity and authorization of software before execution in a local platform.
  455. Erickson,John S., System and methods for managing digital creative works.
  456. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  457. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  458. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  459. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  460. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  461. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  462. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  463. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  464. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  465. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  466. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  467. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  468. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  469. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  470. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  471. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  472. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  473. Proudler,Graeme John; Balacheff,Boris; Chen,Liqun; Chan,David, System for providing a trustworthy user interface.
  474. Candelore, Brant L., System, method and apparatus for secure digital content transmission.
  475. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  476. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  477. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  478. LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  479. LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
  480. Levine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  481. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  482. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  483. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  484. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  485. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  486. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  487. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  488. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  489. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  490. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  491. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  492. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  493. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  494. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  495. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  496. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  497. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  498. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  499. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  500. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  501. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  502. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  503. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  504. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  505. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  506. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  507. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  508. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  509. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  510. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  511. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  512. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  513. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  514. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  515. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  516. Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  517. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  518. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  519. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  520. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  521. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  522. Levy, Kenneth L.; Meyer, Joel R.; Andrews, III, Hoyet Harrison, Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities.
  523. Rawson ; Sr. Andrew Radcliffe ; Tuten Wallace Gilbert, Tamper evident labelling system with embedded storage device.
  524. Rosen Sholom S., Tamper-proof devices for unique identification.
  525. Rosen Sholom S., Tamper-proof electronic processing device.
  526. Candelore, Brant L., Targeted advertisement selection from a digital stream.
  527. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  528. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  529. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  530. Pearson Mark P., Three tier financial transaction system with cache memory.
  531. Candelore, Brant L.; Unger, Robert Allan; Derovanessian, Henry, Time division partial encryption.
  532. Bennett, Steven M.; Neiger, Gilbert; Anderson, Andrew V., Timer offsetting mechanism in a virtual machine environment.
  533. Cota Robles,Erik; Schoenberg,Sebastian; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor.
  534. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  535. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  536. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Transferring application secrets in a trusted operating system environment.
  537. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  538. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  539. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  540. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  541. Pearson, Siani Lynne; Chen, Liqun, Trusted computing platform for restricting use of data.
  542. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  543. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  544. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  545. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  546. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  547. Grawrock, David, Trusted platform module for generating sealed data.
  548. Thirumalai, Gokul P.; Ahdout, Isaac, Tuning product policy using observed evidence of customer behavior.
  549. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  550. Candelore,Brant L.; Derovanessian,Henry, Upgrading of encryption.
  551. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  552. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  553. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  554. Neiger,Gilbert; Bennett,Steven M.; K��gi,Alain; Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Uhlig,Richard; Cota Robles,Erik; Rodgers,Scott; Smith,Lawrence, Use of multiple virtual machine monitors to handle privileged events.
  555. Chess,David M.; Dyer,Joan; Itoi,Naomaru; Kravitz,Jeff; Palmer,Elaine Rivette; Perez,Ronald; Smith,Sean William, Used trusted co-servers to enhance security of web interaction.
  556. Levy,Kenneth L., User-friendly rights management systems and methods.
  557. Halmstad, Richard Zachary; Amundsen, Nicholas William, Using a mobile device to restrict focus and perform operations at another mobile device.
  558. Grawrock,David W.; Sutton, II,James A., Validation of inclusion of a platform within a data center.
  559. Bennett,Steven M.; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael; Smith,Lawrence; Rodgers,Scott, Vectoring an interrupt or exception upon resuming operation of a virtual machine.
  560. Pinder Howard G. ; Palgon Michael S. ; Akins ; III Glendon L. ; Banker Robert O., Verification of the source of program information in a conditional access system.
  561. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Video slice and active region based multiple partial encryption.
  562. Knauerhase, Robert C.; Tewari, Vijay, Virtual machine management using processor state information.
  563. Knauerhase,Robert C.; Tewari,Vijay, Virtual machine management using processor state information.
  564. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Virtual translation lookaside buffer.
  565. Davis Derek L., Virus-resistent mechanism for transaction verification to confirming user.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로