$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for encouraging purchase of executable and non-executable software 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-004/00
출원번호 US-0990455 (1992-12-15)
발명자 / 주소
  • Schull Jonathan (Haverford PA)
출원인 / 주소
  • SoftLock Services Inc. (Rochester NY 02)
인용정보 피인용 횟수 : 578  인용 특허 : 0

초록

A method and apparatus of encouraging distribution, registration, and purchase of free copyable software and other digital information which is accessed on a User\s System via a Programmer\s Program. Software tools which can be incorporated into a Programmer\s Program allow the User to access Advanc

대표청구항

A method of generating, and encouraging the purchase of passwords to protected software, said protected software containing advanced features which are desired by the programmer to be accessible only in the presence of a password which unlocks said advanced features only in the context of a specific

이 특허를 인용한 특허 (578)

  1. Walker Jay ; Schneier Bruce, 900 number billing and collection system and method for on-line computer services.
  2. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., Accessing protected content in a rights-management architecture.
  3. Onyon, Richard; Stannard, Liam; Ridgard, Leighton, Advanced contact identification system.
  4. Ronning,Joel A.; Wical,Kelly J., Apparatus and method for adaptive fraud screening for electronic commerce transactions.
  5. Tu, Edgar Allan; Pang, Eric, Apparatus and method for operational support of remote network systems.
  6. Ronning, Joel A.; Wical, Kelly J., Apparatus and method for secure downloading of files.
  7. Johnson, Anders, Apparatus and method for secure field upgradability with unpredictable ciphertext.
  8. Jogand-Coulomb, Fabrice; Sharghi, Farshid Sabet; Qawami, Bahman, Apparatuses for binding content to a separate memory device.
  9. Priyadarshi, Shaiwal; Soroushian, Kourosh; Osborne, Roland; Braness, Jason; Kelley, John, Application enhancement tracks.
  10. Orthlieb, Carl W.; Pravetz, James P.; Rosenbaum, Sarah, Application rights enabling.
  11. Orthlieb,Carl W.; Pravetz,James P.; Rosenbaum,Sarah, Application rights enabling.
  12. Narin, Attila; DeMello, Marco A.; Yaacovi, Yoram; Alger, Jeffrey A.; Keely, Leroy B.; Silver, David Michael; Madonna, Christopher Robert Richard; Beezer, John; Hughes, Kathryn E., Architecture for an electronic shopping service integratable with a software application.
  13. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Malik,Prashant; Hughes,Kathryn E.; Byrum,Frank D., Asynchronous communication within a server arrangement.
  14. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Automatically reconnecting a client across reliable and persistent communication sessions.
  15. Peinado, Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  16. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  17. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  18. Peinado, Marcus, Binding a digital license to a portable or the like in a digital rights management (DMR) system and checking out/checking in the digital license to/from the portable device or the like.
  19. Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding content to a portable storage device or the like in a digital rights management (DRM) system.
  20. Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding digital content to a portable storage device or the like in a digital rights management (DRM) system.
  21. Subbiah Subramanian ; Li Yang ; Rao D. Ramesh K., Biometric based method for software distribution.
  22. Dirie, Herzi, Bios based method to disable and re-enable computers.
  23. Ronning Joel A., Central database system for automatic software program sales.
  24. Crawford Christopher M., Commercial online software distribution systems and methods using encryption for security.
  25. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  26. Colvin, David S., Computer readable storage medium for providing repeated contact with software end-user.
  27. David S. Colvin, Computer readable storage medium for providing repeated contact with software end-user.
  28. Colvin, David S., Computer readable storage medium for securing software to reduce unauthorized use.
  29. Kravitz, David W.; Goldschlag, David M., Conditional access via secure logging with simplified key management.
  30. Braitberg,Michael F.; Volk,Steven B., Content distribution method and apparatus.
  31. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  32. Stefik,Mark J., Content rendering device with usage rights.
  33. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  34. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  35. Shivadas, Abhishek; Bramwell, Stephen R., Content streaming with client device trick play index.
  36. Smith, Fred Hewitt, Controlling user access to electronic resources without password.
  37. Smith, Fred Hewitt, Controlling user access to electronic resources without password.
  38. Smith, Fred Hewitt, Controlling user access to electronic resources without password.
  39. Daniel Schreiber IL; Andrew Goldman IL, Copy protection of digital images transmitted over networks.
  40. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  41. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  42. Francfort, Stanislas; Gadacha, Haythem; Benadjila, Ryad; Nochimowski, Alain, Coupling of a computer program or of data to a reference system and associated verification.
  43. Keswani, Ravi Kant; Muthu, Manickababu; Guan, Qingcai; Weitzman, Jeffrey, Coupon copy protection.
  44. Keswani, Ravi Kant; Muthugopalakrishna, Manicka; Guan, Qingcai; Weitzman, Jeffrey, Coupon copy protection.
  45. Keswani, Ravi Kant; Muthugopalakrishna, Manicka; Guan, Qingcai; Weitzman, Jeffrey, Coupon copy protection.
  46. Keswani, Ravi Kant; Muthugopalakrishnan, Manicka; Guan, Qingcai; Weitzman, Jeffrey, Coupon copy protection.
  47. Gardner Gary Allen, Data encryption for product information and access.
  48. Ito Takeshi,JPX, Data processing system, apparatus and method.
  49. Patterson, Patrick E., Delivering electronic content.
  50. Patterson, Patrick E., Delivering electronic content.
  51. Patterson, Patrick E., Delivering electronic content.
  52. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  53. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  54. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  55. Onyon, Richard; Stannard, Liam; Ridgard, Leighton, Device message management system.
  56. Onyon, Richard; Stannard, Liam; Ridgard, Leighton, Device message management system.
  57. Onyon, Richard; Stannard, Liam; Ridgard, Leighton, Device message management system.
  58. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  59. Peinado,Marcus; Abburi,Rajasekhar; England,Paul; Ganesan,Krishnamurthy; Bell,Jeffrey R. C.; Blinn,Arnold N.; Jones,Thomas C., Digital license and method for obtaining/providing a digital license.
  60. Sesma Jimmy L., Digital product execution control.
  61. Neville Eugene A. ; Sesma Jimmy L., Digital product execution control and security.
  62. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  63. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  64. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  65. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  66. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  67. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  68. Peinado, Marcus; Liu, Donna; Ganesan, Krishnamurthy, Digital rights management system operating on computing device and having black box tied to computing device.
  69. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  70. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  71. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  72. Muthu, Manickababu; Nayak, Gayathri Uday; Reihaneh, Nahrin; Gudelj, Tino; Keswani, Ravi Kant; Boal, Steven R., Distributing coupon content and transactional advertisements.
  73. Chaudhury, Krish; Pravetz, James D., Document digest allowing selective changes to a document.
  74. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  75. Pravetz, James D.; Chaudhury, Krish; Agrawal, Sunil, Document modification detection and prevention.
  76. Pravetz, James D.; Chaudhury, Krish; Agrawal, Sunil, Document modification detection and prevention.
  77. Pravetz, James D.; Chaudhury, Krish; Agrawal, Sunil C., Document modification detection and prevention.
  78. Pravetz, James; Chaudhury, Krish; Agrawal, Sunil, Document modification detection and prevention.
  79. Starr, Robert J.; Zellner, Samuel N., Dynamic authentication of mark use.
  80. Chaudhury, Krish; Pravetz, James D., Dynamic enabling of functionality in electronic document readers.
  81. Chaudhury, Krish; Pravetz, James D., Dynamic enabling of functionality in electronic document readers.
  82. Chaudhury,Krish; Pravetz,James D., Dynamic enabling of functionality in electronic document readers.
  83. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  84. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  85. Ronning,Joel A.; Wical,Kelly J., Electronic commerce system and method for detecting fraud.
  86. Matsumoto Tatsuro,JPX ; Isomichi Kousei,JPX ; Hiraga Masahiro,JPX ; Itoh Chiaki,JPX, Electronic information distribution method and recording medium.
  87. Chan, Francis Yee-Dug; Soroushian, Kourosh; Wood, Andrew Jeffrey, Elementary bitstream cryptographic material transport systems and methods.
  88. Chan, Francis Yee-Dug; Soroushian, Kourosh; Wood, Andrew Jeffrey, Elementary bitstream cryptographic material transport systems and methods.
  89. Chan, Francis Yee-Dug; Soroushian, Kourosh; Wood, Andrew Jeffrey, Elementary bitstream cryptographic material transport systems and methods.
  90. Panasyuk, Anatoliy; Pedersen, Bradley J.; Stone, David; Treder, Terry, Encapsulating protocol for session persistence and reliability.
  91. Peinado, Marcus; Venkatesan, Ramarathnam, Encrypting a digital object based on a key ID selected therefor.
  92. Peinado,Marcus; Venkatesan,Ramarathnam, Encrypting a digital object on a key ID selected therefor.
  93. Oliveira, Eduardo P.; Dunbar, Geoffrey; Alkove, James M., Encryption scheme for streamed multimedia content protected by rights management system.
  94. Eller Marlin J. ; Mills Brent R., Encryption system with transaction coded decryption key.
  95. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Enforcement architecture and method for digital rights management.
  96. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  97. Homer, Gregg S., Even more subscription media on demand.
  98. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  99. Akiyama Ryota,JPX ; Yoshioka Makoto,JPX, False statement detection system.
  100. Grab, Eric W.; Russell, Chris; Chan, Francis; Kiefer, Mike, Federated digital rights management scheme including trusted systems.
  101. Grab, Eric W.; Russell, Chris; Chan, Francis; Kiefer, Mike, Federated digital rights management scheme including trusted systems.
  102. Grab, Eric William; Russell, Chris; Chan, Francis Yee-Dug; Kiefer, Michael George, Federated digital rights management scheme including trusted systems.
  103. Grab, Eric William; Russell, Chris; Chan, Francis Yee-Dug; Kiefer, Michael George, Federated digital rights management scheme including trusted systems.
  104. Grab, Eric William; Russell, Chris; Chan, Francis Yee-Dug; Kiefer, Michael George, Federated digital rights management scheme including trusted systems.
  105. Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code from third computer process on behalf of first process.
  106. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  107. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  108. Lelikov, Andrey; Gunyakti, Caglar; Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code on behalf thereof.
  109. Brooks, Cecil Ray; Girotto, Jay Robert; Gunyakti, Caglar; Haugen, Todd, Flexible licensing architecture for licensing digital application.
  110. Brooks, Cecil Ray; Girotto, Jay Robert; Gunyakti, Caglar; Haugen, Todd, Flexible licensing architecture for licensing digital application.
  111. Reay, C. Phillip; Coco, Geoffrey P., Generating revenue for the use of softgoods that are freely distributed over a network.
  112. Hughes, Aidan T.; Pearce, David Barnaby, Hardware ID to prevent software piracy.
  113. Hughes,Aidan T.; Pearce,David Barnaby, Hardware ID to prevent software piracy.
  114. Halpern, Eric M.; Peddada, Prasad; Messinger, Adam; Jacobs, Dean Bernard; Pullara, Sam, Hardware load-balancing apparatus for session replication.
  115. Sato, Akihiko, Image processing apparatus, data processing method, and storage medium.
  116. Sato,Akihiko, Image processing apparatus, data processing method, and storage medium.
  117. Koritzinsky Ianne Mae Howards ; Reich John Aurthur, Imaging system protocol handling method and apparatus.
  118. Koritzinsky, Ianne Mae Howards; Reich, John Aurthur, Imaging system protocol handling method and apparatus.
  119. Koritzinsky,Ianne Mae Howards; Reich,John Aurthur, Imaging system protocol handling method and apparatus.
  120. Chan, Hark, Information distribution and processing system.
  121. Chan, Hark C., Information distribution and processing system.
  122. Chan, Hark C., Information distribution and processing system.
  123. Chan, Hark C., Information distribution and processing system.
  124. Chan, Hark C., Information distribution and processing system.
  125. Chan, Hark C., Information distribution and processing system.
  126. Chan, Hark C., Information distribution and processing system.
  127. Chan,Hark C., Information distribution and processing system.
  128. Chan,Hark C., Information distribution and processing system.
  129. Kurihara Akira,JPX, Information providing system.
  130. Rogers,Allen; Hadden,Allen Douglas; Norman,Timothy Neil, Information security architecture for remote access control using non-bidirectional protocols.
  131. Richardson, Ric B., Installing protected software product using unprotected installation image.
  132. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  133. DeMello, Marco A.; Zeman, Pavel; Krishnaswamy, Vinay; Byrum, Frank D., Inter-server communication using request with encrypted parameter.
  134. Crawford,Christopher M., Internet download systems and methods providing software to internet computer users for local execution.
  135. Christopher M. Crawford, Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established when signing up for backup services.
  136. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  137. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  138. Etchegoyen, Craig S., License auditing for distributed applications.
  139. Utsumi,Kenichi; Hirano,Hideyuki; Kotani,Seigo, License devolution apparatus.
  140. Strom, Clifford P.; Siu, Michael Y.; Evans, Brian P., Licensing content for use on portable device.
  141. Dillaway, Blair Brewster; LaMacchia, Brian; Manferdelli, John; Paramasivam, Muthukrishnan, Long-life digital certification for publishing long-life digital content or the like in content rights management system or the like.
  142. Skelton Brian J. ; Milani Dean L. ; Garrett Michael C. ; Smirles William J. ; Bender Raymond ; Scheidt Robert A., Medical treatment device with functions, operated under passcode control.
  143. Freeman, Thomas D.; Pedersen, Bradley Jay; Woodbury, Daniel Nicholes; Ungerman, Anthony, Method and apparatus for administering a server having a subsystem in communication with an event channel.
  144. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  145. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  146. Freeman, Thomas D.; Pedersen, Bradley Jay, Method and apparatus for communicating among a network of servers.
  147. Freeman, Thomas D.; Pedersen, Bradley Jay, Method and apparatus for communicating among a network of servers.
  148. Freeman, Thomas D.; Pedersen, Bradley Jay, Method and apparatus for delivering local and remote server events in a similar fashion.
  149. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  150. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  151. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  152. Williams Brett L. ; Baldwin Donald D. ; Farrell Todd, Method and apparatus for enabling access to computer system resources.
  153. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  154. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  155. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  156. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  157. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  158. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  159. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  160. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  161. Freeman, Thomas D.; Gulkis, Daniel Alec; Pedersen, Bradley Jay, Method and apparatus for managing server load.
  162. David Colvin, Method and apparatus for monitoring software using encryption.
  163. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  164. Schreiber,Daniel; Guedaliah,David, Method and apparatus for preventing reuse of text, images and software transmitted via networks.
  165. Schreiber, Daniel; Guedaliah, David, Method and apparatus for preventing reuse of text, images, and software transmitted via networks.
  166. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  167. Foth,Thomas J.; Romansky,Brian M., Method and apparatus for providing electronic refunds in an online payment system.
  168. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  169. Colvin, David S., Method and apparatus for repeated contact of software end-user.
  170. David S. Colvin, Method and apparatus for repeated contact software end-user.
  171. Torrubia Saez,Andres, Method and apparatus for secure distribution of software.
  172. Paolini, Michael A.; Dutta, Rabindranath, Method and apparatus for secure distribution of software/data.
  173. Colvin David S., Method and apparatus for securing software to reduce unauthorized use.
  174. Pedersen Bradley J. ; Bloomfield Marc A., Method and apparatus for simultaneously providing anonymous user login for multiple users.
  175. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  176. Hurst,Leon; Chiu,Peter K., Method and apparatus for the superdistribution of content in a network including stationary and mobile stations.
  177. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  178. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  179. Pope,David E.; Treder,Terry N.; Pedersen,Bradley J., Method and apparatus for transmitting authentication credentials of a user across communication sessions.
  180. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  181. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  182. Mages Kenneth G. ; Feng Jie, Method and apparatus of secure server control of local media via a trigger through a network for instant local access o.
  183. Kenneth G. Mages ; Jie Feng, Method and apparatus of secure server control of local media via a trigger through a network for instant local access of encrypted data on an internet webpage.
  184. Dutta, Rabindranath, Method and apparatus to restrict free hyperlinking by internet content distributors to web sites of original content producers.
  185. Walker Jay S. ; Schneier Bruce ; Jindal Sanjay K. ; Tedesco Daniel E., Method and device for generating a single-use financial account number.
  186. Walker, Jay S.; Schneier, Bruce; Jindal, Sanjay K.; Tedesco, Daniel E., Method and device for generating a single-use financial account number.
  187. Walker, Jay S.; Schneier, Bruce; Jindal, Sanjay K.; Tedesco, Daniel E., Method and device for generating a single-use financial account number.
  188. Walker, Jay S.; Schneier, Bruce; Jindal, Sanjay K.; Tedesco, Daniel E., Method and device for generating a single-use financial account number.
  189. Walker,Jay S.; Schneier,Bruce; Jindal,Sanjay K.; Tedesco,Daniel E., Method and device for generating a single-use financial account number.
  190. Berry, Robert Francis; Hussain, Riaz Y.; Levine, Frank Eliot; Urquhart, Robert J., Method and system for SMP profiling using synchronized or nonsynchronized metric variables with support across multiple systems.
  191. Berry, Robert Francis; Howard, John Day; Levine, Frank Eliot; Urquhart, Robert J., Method and system for apportioning changes in metric variables in an symmetric multiprocessor (SMP) environment.
  192. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  193. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  194. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  195. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  196. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  197. Rubin, Moshe; Schreiber, Daniel, Method and system for copy protection of displayed data content.
  198. Rubin,Moshe; Schreiber,Daniel, Method and system for copy protection of displayed data content.
  199. Rubin, Moshe B.; Halibard, Moishe, Method and system for copy protection of images displayed on a computer monitor.
  200. Rubin,Moshe; Goldman,Andrew; Schreiber,Daniel A., Method and system for copyright protection of digital images.
  201. Schreiber Daniel,ILX ; Goldman Andrew,ILX, Method and system for copyright protection of digital images transmitted over networks.
  202. Reisman, Richard R., Method and system for distributing updates by presenting directory of software available for user installation that is not already installed on user station.
  203. Mithal, Ashish K.; Tayebi, Amad, Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof.
  204. Mithal, Ashish K; Tayebi, Amad, Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof.
  205. DeMello, Marco A.; Yaacovi, Yoram; Zeman, Pavel, Method and system for limiting the use of user-specific software features.
  206. DeMello,Marco A.; Yaacovi,Yoram; Zeman,Pavel; Hughes,Kathryn E.; Byrum,Frank D., Method and system for limiting the use of user-specific software features.
  207. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined condition for usage.
  208. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  209. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  210. Larose Gordon Edward,CAX ; Allan David Ian,CAX, Method and system for networked installation of uniquely customized, authenticable, and traceable software application.
  211. Stannard, Liam; Huff, Brandon; Burns, Jason; Taketa, Bryan; Onyon, Jr., Richard, Method and system for promoting and transferring licensed content and applications.
  212. Goodman, Daniel I., Method and system for real-time control of document printing.
  213. Goodman, Daniel I., Method and system for real-time control of document printing.
  214. Reisman, Richard R., Method and system for selecting a personalized set of information channels.
  215. Alexander, III, William Preston; Levine, Frank Eliot; Reynolds, William Robert; Urquhart, Robert J., Method and system for shadow heap memory leak detection and other heap analysis in an object-oriented environment during real-time trace processing.
  216. Lao, Guillermo, Method and system for subscription digital rights management.
  217. Lao, Guillermo, Method and system for subscription digital rights management.
  218. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  219. Edmark,Ronald O'Neal; Levine,Frank Eliot; Urquhart,Robert J., Method and system for tracing profiling information using per thread metric variables with reused kernel threads.
  220. Bourdev, Lubomir D., Method and system to monitor installation of a software program.
  221. Moeller, Bruce; Simonis, Roland; Chubin, Mandy; Jenks, Alan; Mersereau, Alan; Hodson, Price, Method and system to remotely configure business office devices to user defined parameters.
  222. Durbin, Winnie C.; Zhang, Kun; Singh, Karamjeet; Mehring, Dave; Lamoureux, Thomas Leroy; Zettel, Hubert A.; Butler, Timothy D, Method and system to remotely enable software-based options for a trial period.
  223. Schull,Jonathan, Method for adapting a software product to an environment.
  224. Tayebi,Amad; Mithal,Ashish K., Method for allowing a customer to preview, acquire and/or pay for information and a system therefor.
  225. Jogand-Coulomb, Fabrice; Rasizade, Oktay S.; Tanik, Haluk K., Method for allowing multiple users to access preview content.
  226. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  227. DeMello,Marco A.; Narin,Attila; Yaacovi,Yoram, Method for authenticating and securing integrated bookstore entries.
  228. Schull,Jonathan, Method for causing a digital product to revert to a demo mode.
  229. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  230. Lohse, Jesper, Method for developing a flexible and efficient educational system.
  231. Reisman, Richard R., Method for distributing a list of updated content to a user station from a distribution server wherein the user station may defer installing the update.
  232. Reisman, Richard R., Method for distributing content to a user station.
  233. Reisman, Richard R., Method for distributing content to a user station.
  234. Reisman, Richard R., Method for distributing content to a user station.
  235. Foth, Thomas J.; Romansky, Brian M., Method for facilitating a transaction between a merchant and a buyer.
  236. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  237. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  238. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  239. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  240. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  241. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  242. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  243. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  244. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  245. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  246. Colvin,David S., Method for monitoring software using encryption including digital signatures/certificates.
  247. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system.
  248. Chou Wayne W., Method for preventing copying of digital video disks.
  249. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  250. Colvin, David S., Method for providing repeated contact with software end-user using authorized administrator.
  251. David S. Colvin, Method for providing repeated contact with software end-user using authorized administrator.
  252. Colvin, David S., Method for securing software to decrease software piracy.
  253. Colvin, David S., Method for securing software to increase license compliance.
  254. Colvin, David S., Method for securing software to reduce unauthorized use.
  255. Schull,Jonathan, Method for selling, protecting, and redistributing digital goods.
  256. Homer, Gregg S., Method for subscription media on-demand.
  257. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  258. Schull Jonathan, Method for tracking software lineage.
  259. Schulze,Karsten, Method for transmitting encrypted information for registering an application program.
  260. Bjorn Vance ; Righi Fabio, Method for using fingerprints to distribute information over a network.
  261. Schull,Jonathan, Method of altering a software product in response to predetermined events.
  262. Borza, Stephen J., Method of distributing piracy protected computer software.
  263. Borza, Stephen J., Method of distributing piracy protected computer software.
  264. Cristy, John J.; Pensak, David A.; Singles, Steven J., Method of encrypting information for remote access while maintaining access control.
  265. David A. Pensak ; John J. Cristy ; Steven J. Singles, Method of encrypting information for remote access while maintaining access control.
  266. David A. Pensak ; John J. Cristy ; Steven J. Singles, Method of encrypting information for remote access while maintaining access control.
  267. Pensak, David A.; Cristy, John J.; Singles, Steven J., Method of encrypting information for remote access while maintaining access control.
  268. Mages Kenneth G. ; Feng Jie, Method of secure server control of local media via a trigger through a network for instant local access of encrypted da.
  269. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  270. Magoshi,Hidetaka, Methods and apparatus for customizing a rewritable storage medium.
  271. Magoshi,Hidetaka, Methods and apparatus for customizing a rewritable storage medium.
  272. Muir, Jeff; Stergiades, Andrew, Methods and apparatus for making a hypermedium interactive.
  273. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  274. Schreiber Daniel,ILX ; Guedaliah David,ILX, Methods and apparatus for preventing reuse of text, images and software transmitted via networks.
  275. Torrubia-Saez, Andres, Methods and apparatus for secure distribution of software.
  276. McAnaney, Brian T.; Bandon, III, William E.; Kahn, Stephen D.; Mattson, Todd L.; Patnode, Patrick Kennedy; Testa, Jean Kelly; NcNamara, Mary McCrea, Methods and systems for managing invention disclosures.
  277. Jogand-Coulomb, Fabrice; Tanik, Haluk Kent; Rasizade, Oktay, Methods for accessing content based on a session ticket.
  278. Crandell, Jeffrey L., Methods for authentication.
  279. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  280. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  281. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  282. Reisman, Richard R., Methods for transacting electronic commerce.
  283. Lau,James Sheung, Methods, systems, signals and media for encouraging users of computer readable content to register.
  284. Pattinson, Neville; Somogyi, Tibor; Pietrzyk, Jean-Marc; Du Castel, Bertrand, Metrology device with programmable smart card.
  285. Ridgard, Leighton A.; Garner, Robert E.; Multer, David L.; Stannard, Liam J.; Cash, Donald W.; Onyon, Richard M.; Huff, Brandon; Burns, Jason; Taketa, Bryan, Mobile data transfer and synchronization system.
  286. Etchegoyen, Craig S., Modular software protection.
  287. Homer, Gregg S., More subscription media on demand.
  288. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  289. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  290. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  291. Horstmann Cay S., Multi-tier electronic software distribution.
  292. Shivadas, Abhishek; Bramwell, Stephen R., Network video streaming with trick play based on separate trick play files.
  293. Shivadas, Abhishek; Bramwell, Stephen R., Network video streaming with trick play based on separate trick play files.
  294. Cooper,Robin Ross; Kulakowski,Robert T., Network-based content distribution system.
  295. Ronning Joel A., On-line try before you buy software distribution system.
  296. Crawford Christopher M., Online computer services including help desk, anti-virus and/or application service features.
  297. Nakashima Kazuo,JPX, Optical recording medium to store and access large volumes of data.
  298. Grab,Eric William, Optimized secure media playback control.
  299. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  300. Walker Jay S. ; Jorasch James A. ; Carson Gregory G., Parallel data network billing and collection system.
  301. Walker, Jay S.; Jorasch, James A.; Carson, Gregory, Parallel data network billing and collection system.
  302. Walker, Jay S.; Jorasch, James A.; Carson, Gregory G., Parallel data network billing and collection system.
  303. Walker, Jay S.; Jorasch, James A.; Carson, Gregory G., Parallel data network billing and collection system.
  304. Jakobsson, Bjorn Markus, Password check by decomposing password.
  305. Jakobsson, Bjorn Markus, Password check by decomposing password.
  306. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Persistent and reliable session securely traversing network components using an encapsulating protocol.
  307. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Playback devices and methods for playing back alternative streams of content protected using a common set of cryptographic keys.
  308. Evans, Brian P.; Strom, Clifford P.; Dunbar, Geoffrey; Prologo, Richard D., Playlist burning in rights-management context.
  309. Foss,Jonathan G., Point-of-sale provider evaluation.
  310. Cronce,Paul Allen; Fontana,Joseph M., Portable authorization device for authorizing use of protected information and associated method.
  311. Peinado,Marcus; Venkatesan,Ramarathnam; Davis,Malcolm, Producing a new black box for a digital rights management (DRM) system.
  312. Ellis, Michael D; Knudson, Edward B; Thomas, William L; Davis, Bruce L, Program guide system for recording television programs.
  313. Knudson, Edward B.; Ellis, Michael D.; Thomas, William L.; Davis, Bruce L., Program guide system for recording television programs.
  314. Knudson, Edward B.; Ellis, Michael D.; Thomas, William L.; Davis, Bruce L., Program guide system for recording television programs.
  315. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  316. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  317. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  318. England, Paul; Peinado, Marcus; Sankaranarayan, Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  319. England,Paul; Peinado,Marcus; Sankaranarayan,Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  320. England,Paul; Peinado,Marcus; Sankaranarayan,Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  321. England,Paul; Peinado,Marcus; Sankaranarayan,Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  322. Oliveira, Eduardo P.; Klemets, Anders E.; Bhatt, Sanjay; Paka, Anand; Alkove, James M., Protecting digital media of various content types.
  323. Reisman, Richard R., Providing and receiving content over a wireless communication system.
  324. Lamberg, Samu, Providing content in a communication system.
  325. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  326. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  327. Homer, Gregg S., Rechargeable media distribution and play system.
  328. Terasaka,Isamu; Yamamoto,Hiroshi; Ohdaira,Toshimitsu, Recording medium having encrypted sound data recorded therein and information processor.
  329. Oshima, Mitsuaki; Gotoh, Yoshiho; Tanaka, Shinichi; Koishi, Kenji; Moriya, Mitsurou; Takemura, Yoshinari, Recording medium reproducer, cryptocommunication system and program license system.
  330. Peinado, Marcus; England, Paul; Yerrace, Frank, Releasing decrypted digital content to an authenticated path.
  331. Peinado,Marcus; England,Paul; Yerrace,Frank, Releasing decrypted digital content to an authenticated path.
  332. Chan,Man, Remote access authorization of local content.
  333. Weller, Scott Wayne, Remote feature delivery for output devices.
  334. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  335. Peinado, Marcus; Manferdelli, John L.; Bell, Jeffrey R. C., Rendering digital content in an encrypted rights-protected form.
  336. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  337. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  338. Gajjala,Vijay K.; Ganesan,Krishnamurthy; McKune,Jeffrey R., Retail transactions involving digital content in a digital rights management (DRM) system.
  339. Abburi,Rajasekhar, Retail transactions involving distributed and super-distributed digital content in a digital rights management (DRM) system.
  340. Evans, Brian P.; Strom, Clifford P.; Rosenstein, Daniel, Rights management system for streamed multimedia content.
  341. Evans, Brian P.; Strom, Clifford P.; Rosenstein, Daniel; Paka, Anand D.; Fang, Nicholas J.; Oliveria, Eduardo, Rights management system for streamed multimedia content.
  342. Van Dyke, Clifford P.; Cheng, David J.; Mohan, Siva, Rights management system for streamed multimedia content.
  343. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  344. Ronning, Joel A.; Wical, Kelly J.; Kukura, Marc A., Scheduling of a file download and search for updates.
  345. Weitzman, Jeffrey; Boal, Steven R., Searching a database including prioritizing results based on historical data.
  346. Weitzman, Jeffrey; Boal, Steven R., Searching a database including prioritizing results based on historical data.
  347. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  348. Smith,Fred Hewitt; Smith,Benjamin Hewitt; Smith,Cynthia, Secure detection network system.
  349. Ronning, Joel Alan; Wical, Kelly J., Secure downloading of a file from a network system and method.
  350. Holmes Lyndon S. ; King ; III James, Secure electronic publishing system.
  351. Ferguson, John G.; Pikus, Fedor G.; Sakajiri, Kyohei; Grodd, Laurence W., Secure exchange of information in electronic design automation.
  352. Ferguson, John G.; Pikus, Fedor G.; Sakajiri, Kyohei; Grodd, Laurence W., Secure exchange of information in electronic design automation.
  353. Gunyakti, Caglar; Miller, Ronald W.; Tan, Xiaoxi (Michael), Secure machine counting.
  354. Smith, Fred Hewitt, Secure processing module and method for making the same.
  355. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  356. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  357. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  358. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  359. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay, Secure traversal of network components.
  360. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  361. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  362. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  363. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  364. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  365. Ronning Joel A., Self-launching encrypted digital information distribution system.
  366. Ronning Joel A., Self-launching encrypted try before you buy software distribution system.
  367. DeMello,Marco A.; Narin,Attila; Madonna,Christopher Robert Richard, Server controlled branding of client software deployed over computer networks.
  368. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Byrum,Frank D., Server for an electronic distribution system and method of operating same.
  369. Montgomery, Michael A., Smart card application-selection.
  370. Reisman, Richard R., Software and method for monitoring a data stream and for capturing desired data within the data stream.
  371. Reisman, Richard R., Software and method that enables selection of on-line content from one of a plurality of network content service providers in a single action.
  372. Reisman, Richard R., Software and method that enables selection of one of a plurality of network communications service providers.
  373. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  374. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  375. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  376. Pearce David B. ; Hughes Aidan, Software anti-piracy system that adapts to hardware upgrades.
  377. Peinado, Marcus; England, Paul; Manferdelli, John L., Software application protection by way of a digital rights management (DRM) system.
  378. Richard Bean ; Young Harvill, Software authorization system and method.
  379. Reisman, Richard R., Software distribution over a network.
  380. Bahar, Reuben, Software piracy prevention through remote enforcement of an activation threshold.
  381. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  382. Wecker,David Brian, Software-generated machine identifier.
  383. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifiying security for an element by assigning a scaled value representative of the relative security thereof.
  384. Ganesan, Krishnamurthy, Specifying rights in a digital rights license according to events.
  385. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  386. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  387. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  388. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  389. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  390. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  391. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  392. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  393. Otway,David John; Bull,John Albert, Strong mutual authentication of devices.
  394. Otway,David; Bull,John, Strong mutual authentication of devices.
  395. Peinado,Marcus; Abburi,Rajasekhar; Bell,Jeffrey R. C., Structural of digital rights management (DRM) system.
  396. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Bell,Jeffrey R. C., Structure of a digital content package.
  397. Liu, Yeu; Pandya, Ravi; Ivanov, Lazar; Paramasivam, Muthukrishnan; Gunyakti, Caglar; Gui, Dongmei; Hsu, Scott W. P., Supplementary trust model for software licensing/commercial digital distribution policy.
  398. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  399. DeMello, Marco; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  400. DeMello,Marco A.; Krishnaswamy,Vinay; Manferdelli,John L., System and method for accessing protected content in a rights-management architecture.
  401. Chan, Hark C., System and method for accessing set of digital data at a remote site.
  402. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy B.; Yaacovi,Yoram; Alger,Jeffrey H., System and method for activating a rendering device in a multi-level rights-management architecture.
  403. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy Bertrand; Yaacovi,Yoram; Alger,Jeffrey A., System and method for activating a rendering device in a multi-level rights-management architecture.
  404. Mechaley, Robert; Miner, Richard A., System and method for activating software operating capabilities based on usage patterns and rules.
  405. Richardson, Ric B., System and method for adjustable licensing of digital products.
  406. Montgomery Michael A. ; Guthery Scott B. ; du Castel Bertrand, System and method for an ISO7816 complaint smart card to become master over a terminal.
  407. Boal, Steven R; Walsh, Michael, System and method for augmenting content in electronic documents with links to contextually relevant information.
  408. Boal, Steven; Walsh, Michael, System and method for augmenting content in electronic documents with links to contextually relevant information.
  409. DeMello, Marco A.; Narin, Attila; Setty, Venkateshaiah, System and method for client interaction in a multi-level rights-management architecture.
  410. Schull,Jonathan, System and method for controlling access to protected information.
  411. Walsh, Michael; Keswani, Ravi; Babu, Manicka; Reihaneh, Nahrin; Li, Bingwu, System and method for controlling use of a network resource.
  412. Schull,Jonathan, System and method for creating and running protected information.
  413. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  414. Schull, Jonathan, System and method for distributing protected information.
  415. Wang,Xin, System and method for document distribution.
  416. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  417. Berry, Robert Francis; Howard, John Day; Hussain, Riaz Y.; Levine, Frank Eliot; Urquhart, Robert John, System and method for injecting hooks into Java classes to handle exception and finalization processing.
  418. Smith, Benjamin Hewitt; Smith, Fred Hewitt, System and method for installing an auditable secure network.
  419. Smith, Benjamin Hewitt; Smith, Fred Hewitt, System and method for installing an auditable secure network.
  420. Berry, Robert Francis; Gu, Weiming; Hussain, Riaz Y.; Levine, Frank Eliot; Wong, Wai Yee Peter, System and method for instrumenting application class files with correlation information to the instrumentation.
  421. Manferdelli,John L.; Marr,Michael David; Krishnaswamy,Vinay; Jakubowski,Mariusz H., System and method for interfacing a software process to secure repositories.
  422. Delgado, Marcus; Evans, Sandra J.; Lantz, Harrison P.; Sherwood, Amy L.; Furth, David L., System and method for managing sponsorships.
  423. Delgado, Marcus; Evans, Sandra J.; Lantz, Harrison P.; Sherwood, Amy L.; Furth, David L., System and method for managing sponsorships.
  424. Delgado, Marcus; Evans, Sandra J.; Lantz, Harrison P.; Sherwood, Amy L.; Furth, David L., System and method for managing sponsorships.
  425. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  426. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  427. Colvin, David S., System and method for monitoring software.
  428. Smith, Benjamin; Sabin, Daniel; Smith, Fred Hewitt, System and method for obtaining keys to access protected information.
  429. Schull,Jonathan, System and method for operating a licensing server.
  430. D'Agostino, John, System and method for performing secure credit card transactions.
  431. Smith, III, Fred Hewitt; Smith, Cynthia; Smith, Benjamin; Sabin, Daniel, System and method for policy driven protection of remote computing environments.
  432. Schull,Jonathan, System and method for processing protected audio information.
  433. Schull, Jonathan, System and method for processing protected text information.
  434. Schull,Jonathan, System and method for processing protected video information.
  435. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  436. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  437. Wang, Xin, System and method for protection of digital works.
  438. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  439. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  440. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  441. Lynne Kenton Jerome ; Richards Dianne Elaine, System and method for securing computer-executable program code using task gates.
  442. Schull, Jonathan, System and method for selectively changing parameter settings based on lineage analysis of digital information.
  443. Schull,Jonathan, System and method for selectively enabling access based on lineage analysis of digital information.
  444. Schull,Jonathan, System and method for selling protected information in an oem context.
  445. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  446. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  447. Wang,Xin, System and method for transferring the right to decode messages.
  448. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  449. Smith, Fred Hewitt; Smith, Cynthia, System and method for using a separate device to facilitate authentication.
  450. Smith, Fred Hewitt; Smith, Cynthia, System and method for using a separate device to facilitate authentication.
  451. Kramer,Andre; Harwood,Will, System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel.
  452. Singh, Sumeet Sohan, System and method of verifying a number of a mobile terminal.
  453. Cartwright,Shawn D., System and methods for obtaining advantages and transacting the same in a computer gaming environment.
  454. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  455. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  456. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  457. Onyon, Richard; Stannard, Liam; Ridgard, Leighton; Garner, Robert E., System for and method of backing up content for use on a mobile device.
  458. Ranganath, Panduranga, System for and method of field mapping.
  459. Onyon, Richard; Stannard, Liam; Ridgard, Leighton, System for and method of updating a personal profile.
  460. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  461. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  462. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  463. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  464. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  465. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  466. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  467. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  468. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  469. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  470. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  471. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  472. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  473. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  474. Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software.
  475. Byrne,Shannon; Muecke,Innes; Patterson,Andrew; Slik,David, System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software.
  476. Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  477. Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  478. Byrne,Shannon; Muecke,Innes; Patterson,Andrew; Silk,David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  479. Byrne,Shannon; Muecke,Innes; Patterson,Andrew; Slik,David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  480. Smith Benjamin Hewitt ; Smith Fred Hewitt, System for installing information related to a software application to a remote computer over a network.
  481. Weller, Scott Wayne, System for installing programmable features on output devices.
  482. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  483. Nash, Kenneth L., System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection.
  484. Byrne Shannon,CAX, System for persistently encrypting critical software file to prevent installation of software program on unauthorized computers.
  485. Ronning Joel A., System for preventing unauthorized copying of active software.
  486. Walker Jay ; Schneier Bruce, Systems and methods for a user to access digital data provided by an on-line server over a data network.
  487. Cheloff, Brett Alan; Goetschius, Chris, Systems and methods for an online marketplace for accessories of a remote monitoring and management product.
  488. Cheloff, Brett Alan; Goetschius, Chris, Systems and methods for an online marketplace for accessories of a remote monitoring and management product.
  489. Etchegoyen, Craig Stephen, Systems and methods for auditing software usage using a covert key.
  490. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for continuing an operation interrupted from a reconnection between a client and server.
  491. McKune,Jeffrey R.; Chu,Chengyun; Alkove,James M.; Barde,Sumedh; Grigorovitch,Alexandre, Systems and methods for disabling software components to protect digital media.
  492. van der Schaar, Auke Sjoerd; Funnell, John, Systems and methods for encoding and playing back video at different frame rates using enhancement layers.
  493. Braness, Jason; van der Schaar, Auke Sjoerd; Soroushian, Kourosh, Systems and methods for encoding source media in matroska container files for adaptive bitrate streaming using hypertext transfer protocol.
  494. Etchegoyen, Craig S., Systems and methods for game activation.
  495. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  496. Panasyuk, Anatoliy; Kramer, Andre; Pedersen, Bradley Jay; Stone, David Sean; Treder, Terry, Systems and methods for maintaining a client's network connection thru a change in network identifier.
  497. Panasyuk,Anatoliy; Kramer,Andre; Pedersen,Bradley Jay; Stone,David Sean; Treder,Terry, Systems and methods for maintaining a session between a client and host service.
  498. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  499. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  500. Braness, Jason; Soroushian, Kourosh; van der Schaar, Auke Sjoerd, Systems and methods for performing smooth visual search of media encoded for adaptive bitrate streaming via hypertext transfer protocol using trick play streams.
  501. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
  502. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
  503. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
  504. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
  505. LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  506. LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
  507. Levine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  508. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for protecting alternative streams in adaptive bitrate streaming systems.
  509. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  510. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  511. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  512. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  513. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  514. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  515. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  516. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  517. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  518. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  519. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  520. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  521. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  522. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  523. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  524. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  525. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  526. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  527. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  528. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  529. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  530. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  531. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  532. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  533. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  534. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  535. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  536. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  537. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  538. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  539. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  540. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  541. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  542. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  543. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  544. Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  545. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  546. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  547. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  548. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  549. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  550. van der Schaar, Auke Sjoerd; Shivadas, Abhishek, Systems, methods, and media for controlling delivery of content.
  551. Braness, Jason A, Systems, methods, and media for streaming media content.
  552. Naletov, Ivan Vladimirovich; Zurpal, Sergey, Systems, methods, and media for transcoding video data.
  553. Naletov, Ivan Vladimirovich; Zurpal, Sergey, Systems, methods, and media for transcoding video data according to encoding parameters indicated by received metadata.
  554. Chow, Stanley T.; Johnson, Harold J.; Gu, Yuan, Tamper resistant software encoding.
  555. Chow, Stanley T.; Johnson, Harold J.; Gu, Yuan, Tamper resistant software encoding.
  556. Yasuna,Jules A.; Keklak,John A.; Kurzweil,Raymond C., Technique for distributing software.
  557. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  558. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  559. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  560. Edmark, Ronald O'Neal; Levine, Frank Eliot; Urouhart, Robert J., Tracing profiling information using per thread metric variables with reused kernel threads.
  561. Patterson, Patrick E., Tracking electronic content.
  562. Patterson, Patrick E., Tracking electronic content.
  563. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  564. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  565. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  566. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  567. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  568. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  569. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  570. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  571. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  572. Ronning Joel A., Try before you buy software distribution and marketing system.
  573. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  574. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  575. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  576. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  577. Reisman, Richard R., User station software that controls transport, storage, and presentation of content from a remote source.
  578. Guthery Scott B., Validating and certifying execution of a software program with a smart card.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로