$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Apparatus and method for providing secured communications 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0251486 (1994-05-31)
발명자 / 주소
  • Davis Derek L. (Phoenix AZ)
출원인 / 주소
  • Intel Corporation (Santa Clara CA 02)
인용정보 피인용 횟수 : 246  인용 특허 : 0

초록

A semiconductor device for storing encryption/decryption keys at manufacture in combination with digital certificates to ensure secured communications between the semiconductor device and another device. The semiconductor device comprising a non-volatile memory for storing the encryption/decryption

대표청구항

A system comprising: a memory element for storing at least one encryption and decryption program; a host processor for executing said encryption and decryption programs; a bus for coupling said host processor and said memory element; and a hardware agent, being coupled to said bus, for internally de

이 특허를 인용한 특허 (246)

  1. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  2. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  3. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  4. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  5. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  6. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  7. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  8. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  9. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  10. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  11. Derek L. Davis ; Jean-Charles Korta, Anonymity server.
  12. K철mmerling,Oliver; K철mmerling,Fritz, Anti tamper encapsulation for an integrated circuit.
  13. Davis Derek L., Anti-theft mechanism for mobile computers.
  14. Davis Derek L., Apparatus and method for cryptographic companion imprinting.
  15. Arnold Terry Sutton, Apparatus and method for establishing a crytographic link between elements of a system.
  16. Terry Sutton Arnold, Apparatus and method for establishing a crytographic link between elements of a system.
  17. Rosen Sholom S., Apparatus and method for secure transacting.
  18. Davis Derek L., Apparatus and method for securely processing biometric information to control access to a node.
  19. Matyas Stephen M. ; Smith Sean William, Authentication for secure devices with limited cryptography.
  20. Matyas Stephen M. ; Smith Sean William, Authentication for secure devices with limited cryptography.
  21. Matyas, Stephen M.; Smith, Sean William, Authentication for secure devices with limited cryptography.
  22. Matyas, Stephen M.; Smith, Sean William, Authentication for secure devices with limited cryptography.
  23. Davis Derek L. ; Smith Lionel, Authentication system based on periodic challenge/response protocol.
  24. Zajkowski, Timothy; Doland, Anne; Smith, Mark D., Automated banking machine remote key load system and method.
  25. Zajkowski, Timothy; Doland, Anne; Smith, Mark D., Automated banking machine system and method.
  26. Zajkowski,Timothy; Doland,Anne; Smith,Mark D., Automated banking machine system and method.
  27. Zajkowski,Timothy; Doland,Anne; Smith,Mark D., Automated banking machine system and method.
  28. Aull,Kenneth W.; McCullough,Vincent J., Automated tracking of certificate pedigree.
  29. Cao,Adrean T., Auxiliary program association table.
  30. Pedlow, Jr.,Leo M.; Agnihotri,Davender, Batch mode session-based encryption of video on demand content.
  31. Pedlow, Jr., Leo M.; Agnihotri, Davender, Bi-directional indices for trick mode video-on-demand.
  32. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  33. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  34. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timoth T.; Goldman, Phillip Y., Centralized behavioral information system.
  35. Davis Derek L., Circuit and method for ensuring interconnect security with a multi-chip integrated circuit package.
  36. Landsman, Richard A., Community messaging lists for authorization to deliver electronic messages.
  37. Pedlow, Jr.,Leo M., Composite session-based encryption of video on demand content.
  38. Miller Phillip R., Computer security key.
  39. Candelore,Brant L., Content distribution for multiple digital rights management.
  40. Candelore, Brant L., Content personalization for digital content.
  41. Traw, Chandler Brendan Stanton; Aucsmith, David Wayne, Content protection for digital transmission systems.
  42. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, Jon D., Content replacement by PID mapping.
  43. Bonan,James; Candelore,Brant L.; Eyer,Mark Kenneth, Content scrambling with minimal impact on legacy devices.
  44. Candelore, Brant L., Copy-protecting management using a user scrambling key.
  45. Unger,Robert Allan; Candelore,Brant L., Critical packet partial encryption.
  46. Callum Roy, Cryptographic accelerator.
  47. Callum, Roy, Cryptographic accelerator.
  48. Unger,Robert Allan; Candelore,Brant L.; Pedlow, Jr.,Leo M., Decoding and decryption of partially encrypted information.
  49. Ryal,Kim Annon, Decryption system.
  50. Candelore, Brant L., Descrambler.
  51. Candelore, Brant L., Descrambler.
  52. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  53. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  54. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  55. Candelore, Brant L., Digital rights management of a digital device.
  56. Wells, Steven E.; Ward, David A., Duty cycle corrector for a random number generator.
  57. Pedlow, Jr.,Leo M.; Agnihotri,Davender, Dynamic composition of pre-encrypted video on demand content.
  58. Logue, Jay D.; Sullivan, Timothy T.; Landsman, Richard; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Electronic message system with federation of trusted senders.
  59. Logue, Jay D.; Sullivan, Timothy T.; Landsman, Richard; Goldman, Susan Rayl, Electronic message system with federation of trusted senders.
  60. Davis, Derek L., Electronic system and method for controlling access through user authentication.
  61. Rosen Sholom S. (New York NY), Electronic ticket presentation and transfer method.
  62. Rosen,Sholom S., Electronic ticket vending system.
  63. Rosen,Sholom S., Electronic transaction apparatus for electronic commerce.
  64. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M.; Mirsky,Gregory; Eyer,Mark Kenneth, Elementary stream partial encryption.
  65. Pedlow, Jr.,Leo M.; Candelore,Brant L.; Derovanessian,Henry, Encryption and content control in a digital broadcast system.
  66. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  67. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  68. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  69. Beeson,Curtis Linn, Facilitating digital signature based on ephemeral private key.
  70. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timothy T.; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Federated challenge credit system.
  71. Logue, Jay D.; Landsman, Richard A.; Sullivan, Timothy T.; Goldman, Phillip Y.; Goldman, legal representative, Susan Rayl, Federated challenge credit system.
  72. Heiner, Jeffrey Nelson, Filter-in method for reducing junk e-mail.
  73. Goldman, Phillip Y.; Landsman, Richard A.; Migliore, Michael R.; Heiner, Jeffrey N.; Logue, Jay, Filtering electronic messages while permitting delivery of solicited electronics messages.
  74. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  75. Beeson, Curtis Linn, Generating digital signatures using ephemeral cryptographic key.
  76. Candelore, Brant L., IP delivery of secure digital content.
  77. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  78. Wells,Steven E.; Kynett,V. Niles, Integrated circuit chip having firmware and hardware security primitive device(s).
  79. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  80. Wuidart, Luc; Marinet, Fabrice, Locking of an integrated circuit.
  81. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, John, Macro-block based content replacement by PID mapping.
  82. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  83. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  84. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  85. Goldman, Phillip York; Landsman, Richard A.; Logue, Jay; Heiner, Jeffrey N.; Evans, John S.; Migliore, Michael R., Managing electronic messages.
  86. Landsman, Richard A.; Logue, Jay; Heiner, Jeffrey N.; Evans, John S.; Migliore, Michael R.; Goldman, Phillip York; Goldman, legal representative, Susan Rayl, Managing electronic messages.
  87. Landsman,Richard A.; Sullivan,Timothy Thomas; Logue,Jay Dare, Managing electronic messages using contact information.
  88. Logue, Jay; Heiner, Jeffrey N.; Goldman, Phillip York; Goldman, legal representative, Susan Rayl, Managing self-addressed electronic messages.
  89. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  90. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  91. Candelore, Brant L., Mechanism for protecting the transfer of digital content.
  92. Kudelski, André; Sasselli, Marco, Mechanism of matching between a receiver and a security module.
  93. Landsman, Richard A., Messaging systems and methods.
  94. Landsman, Richard A., Messaging systems and methods.
  95. Candelore, Brant L.; Eyer, Mark, Method and apparatus for implementing revocation in broadcast networks.
  96. Candelore,Brant L.; Eyer,Mark, Method and apparatus for implementing revocation in broadcast networks.
  97. Bakhle Ashutosh ; Davis Derek L., Method and apparatus for integrated ciphering and hashing.
  98. Bakhle, Ashutosh; Davis, Derek L., Method and apparatus for integrated ciphering and hashing.
  99. Candelore, Brant L., Method and apparatus for protecting the transfer of data.
  100. Candelore, Brant L., Method and apparatus for securing control words.
  101. Candelore,Brant L., Method and apparatus for securing control words.
  102. Dawson, Thomas Patrick, Method and apparatus for synchronizing dynamic graphics.
  103. Gregg,Richard L.; Giri,Sandeep; Goeke,Timothy C., Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network.
  104. Chao, Ching-Yun, Method and system for establishing a trust framework based on smart key devices.
  105. Cobb, Christopher Alan, Method and system for filtering electronic messages.
  106. Cobb, Christopher Alan, Method and system for filtering electronic messages.
  107. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  108. Chao, Ching-Yun, Method and system for protecting master secrets using smart key devices.
  109. Douglas, Daniel Graham, Method and system for the exchange of digitally signed objects over an insecure network.
  110. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  111. Derek L. Davis ; Pranav Mehta, Method for BIOS authentication prior to BIOS execution.
  112. Rosen Sholom S., Method for electronic merchandise dispute resolution.
  113. Sholom S. Rosen, Method for electronic merchandise dispute resolution.
  114. Rosen Sholom S. (New York NY), Method for establishing secure communications among processing devices.
  115. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  116. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  117. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  118. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  119. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  120. Candelore, Brant L., Method for simulcrypting scrambled data to a plurality of conditional access devices.
  121. Candelore, Brant L., Method for simulcrypting scrambled data to a plurality of conditional access devices.
  122. Candelore,Brant L., Method for simulcrypting scrambled data to a plurality of conditional access devices.
  123. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  124. Ober Timothy ; Reed Peter, Method of implementing a key recovery system.
  125. Ober, Timothy; Reed, Peter, Method of implementing a key recovery system.
  126. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  127. Grace, David; Turgeon, Paul, Methods and systems for secure transmission of identification information over public networks.
  128. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  129. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  130. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  131. Candelore,Brant L., Multi-process descrambler.
  132. Candelore, Brant L., Multiple DRM management.
  133. Candelore,Brant L., Multiple partial encryption using retuning.
  134. Grace,David, Non-algorithmic vectored steganography.
  135. Davis Derek L., Optimized security functionality in an electronic system.
  136. Candelore, Brant L., Parental control of displayed content using closed captioning.
  137. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M., Partial encryption and PID mapping.
  138. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M., Partial encryption and PID mapping.
  139. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  140. Davis, Derek L.; Herbert, Howard C., Platform and method for assuring integrity of trusted agent communications.
  141. Derek L. Davis ; Howard C. Herbert, Platform and method for assuring integrity of trusted agent communications.
  142. Grawrock, David W., Platform and method for securely transmitting an authorization secret.
  143. Goldman, Phillip Y., Practical techniques for reducing unsolicited electronic messages by identifying sender's addresses.
  144. Pedlow, Jr., Leo M.; Agnihotri, Davender, Preparation of content for multiple conditional access methods in video on demand.
  145. Wells, Steven E., Programmable random bit source.
  146. Wells,Steven E., Programmable random bit source.
  147. Srinivasan, Pramila; Princen, John, Programming on-chip non-volatile memory in a secure processor using a sequence number.
  148. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Progressive video refresh slice detection.
  149. Beeson, Curtis Linn, Providing digital signature and public key based on shared knowledge.
  150. Wilber, Scott A., Random number generator and generation method.
  151. Wells, Steven E.; Ward, David A., Random number generator with entropy accumulation.
  152. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  153. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  154. Debry, Roger K., Secure configuration of a digital certificate for a printer or other network device.
  155. Bush,Ronald Roscoe, Secure encryption of data packets for transmission over unsecured networks.
  156. Wells, Steven E.; Kynett, V. Niles; Dover, Lance W., Secure hardware random number generator.
  157. Wells,Steven E.; Kynett,V. Niles; Dover,Lance W., Secure hardware random number generator.
  158. Bertrand Dominique,FRX ; Gatto Jean-Marie,FRX, Securized, multifunction, acquisition and processing terminal usable in the banking sector, in connection with games and in the electronic management of documents.
  159. Candelore,Brant L., Selective encryption for video on demand.
  160. Candelore,Brant L., Selective encryption to enable multiple decryption keys.
  161. Candelore,Brant L.; Poslinski,Tom, Selective encryption to enable trick play.
  162. Candelore, Brant L., Selective encryption with coverage encryption.
  163. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  164. Wheeler, Henry Lynn; Wheeler, Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  165. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Slice mask and moat pattern partial encryption.
  166. Beeson, Curtis Linn, Software for providing based on shared knowledge public keys having same private key.
  167. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  168. Bond, Eugene Thomas, Software verification and authentication.
  169. Bond, Eugene Thomas, Software verification and authentication.
  170. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  171. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  172. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  173. Goldman, Phillip Y.; Landsman, Richard A., Sorting electronic messages using attributes of the sender address.
  174. Goldman, Phillip Y; Landsman, Richard A, Sorting electronic messages using attributes of the sender address.
  175. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Star pattern partial encryption.
  176. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  177. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  178. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  179. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  180. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  181. Togawa, Yoshifusa; Miyamoto, Takayuki; Ando, Kuriko, Storage device having function for coping with computer virus.
  182. O'Donnell, Amy; Thangadurai, George; Rajan, Anand, System and method for authentication of off-chip processor firmware code.
  183. Drews, Paul, System and method for checking authorization of remote configuration operations.
  184. Feng, Andrew; Bhandari, Atul; Kucharewski, Valerie, System and method for community centric resource sharing based on a publishing subscription model.
  185. Davis Derek L., System and method for configuring and registering a cryptographic device.
  186. Rosen Sholom S., System and method for connecting money modules.
  187. Davis Derek L., System and method for digitally signing a digital agreement between remotely located nodes.
  188. Derek L. Davis, System and method for ensuring integrity throughout post-processing.
  189. Pedlow, Jr.,Leo M.; Derovanessian,Henry; Candelore,Brant, System and method for partially encrypted multimedia stream.
  190. Turgeon,Paul Charles, System and method for providing secure services over public and private networks using a removable portable computer-readable storage.
  191. Ichikawa Bryan K., System and method for providing security in data communication systems.
  192. Spies Terence R. ; Simon Daniel R., System and method for secure purchase and delivery of video content programs.
  193. Candelore, Brant L.; Pedlow, Jr., Leo M., System and method for the creation, synchronization and delivery of alternate content.
  194. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  195. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  196. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  197. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  198. Candelore, Brant L., System, method and apparatus for secure digital content transmission.
  199. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  200. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  201. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  202. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  203. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  204. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  205. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  206. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  207. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  208. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  209. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  210. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  211. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  212. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  213. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  214. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  215. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  216. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  217. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  218. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  219. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  220. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  221. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  222. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  223. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  224. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  225. Rosen Sholom S., Tamper-proof devices for unique identification.
  226. Rosen Sholom S., Tamper-proof electronic processing device.
  227. Candelore, Brant L., Targeted advertisement selection from a digital stream.
  228. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  229. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  230. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  231. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  232. Candelore, Brant L.; Unger, Robert Allan; Derovanessian, Henry, Time division partial encryption.
  233. Curry Stephen M. ; Loomis Donald W. ; Bolan Michael L., Transfer of valuable information between a secure module and another module.
  234. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  235. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  236. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  237. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  238. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  239. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  240. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  241. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  242. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  243. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  244. Candelore,Brant L.; Derovanessian,Henry, Upgrading of encryption.
  245. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Video slice and active region based multiple partial encryption.
  246. Davis Derek L., Virus-resistent mechanism for transaction verification to confirming user.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로