$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for electronic licensing 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0192166 (1994-02-04)
발명자 / 주소
  • Ross Cliff D. (Pleasant Grove UT) Taylor Neil W. (Springville UT) Kingdon Kevin W. (Orem UT) Davis Howard R. (Salem UT) Major Drew (Orem UT)
출원인 / 주소
  • Novell, Inc. (02)
인용정보 피인용 횟수 : 308  인용 특허 : 0

초록

The present invention allows for the electronic management and enforcement of software licenses. The present invention can be used in a network or non-network environment to facilitate product licensing and upgrades. Further, the present invention accommodates the use of compact disc read-only memor

대표청구항

A method of electronic licensing comprising the steps of: creating, using a first computer system, a plurality of licenses independent of a manufacture of a product, each of said plurality of licenses stored in a license document; storing said plurality of licenses in a database in a second computer

이 특허를 인용한 특허 (308)

  1. Kitaj, Paul Thomas; Paskett, Sherman W.; Hardy, Douglas Allan; Seeker, Frank Edward; Tuggenberg, Steve Robert, Access-control method for software module and programmable electronic device therefor.
  2. Farber, David A.; Lachman, Ronald D., Accessing data in a data processing system.
  3. Glassman,Steven C.; Manasse,Mark S.; Court,John W.; Grohn,Edmund J.; Palka,Andrew M.; Norris,Nigel, Anonymous purchases while allowing verifiable identities for refunds returned along the paths taken to make the purchases.
  4. Katz, Donald R.; Lau, Edwin J.; Mott, Timothy; Brenneman, Scott A.; Jun, Benjamin Che-Ming; Pai, Samuel Hong-Yen, Apparatus and method for authoring and maintaining a library of content and targeting content to a playback device.
  5. Hohlfeld, Matthew W.; Mahan, Michael P.; Mandyam, Giridhar D., Apparatus and method of managing a licensable item.
  6. Rhoads Geoffrey B., Audio- and graphics-based linking to internet.
  7. Messina Kevin M. ; Cohen Todd, Authentication system for driver licenses.
  8. Kevin M. Messina, Authentication system for identification documents.
  9. Messina, Kevin M., Authentication system for identification documents.
  10. Mullins, Leo, Authorising use of a computer program.
  11. Mullins, Leo Joseph, Authorising use of a computer program.
  12. Mullins, Leo Joseph, Authorising use of a computer program.
  13. Mullins, Leo Joseph, Authorising use of a computer program.
  14. Mullins, Leo Joseph, Authorizing use of a computer program.
  15. Herrero,Victor R., Automated entitlement verification for delivery of licensed software.
  16. Martin,Tobias; Schwenk,Joerg, Billing method using SSL/TLS.
  17. Peinado, Marcus, Binding a digital license to a portable or the like in a digital rights management (DMR) system and checking out/checking in the digital license to/from the portable device or the like.
  18. Robinson, Richard L.; Serkowski, Robert J.; Walker, William T., Certificate distribution via license files.
  19. Farber, David A.; Lachman, Ronald D., Computer file system using content-dependent file identifiers.
  20. Geoffrey B. Rhoads, Computer linking methods using encoded graphics.
  21. Clement, Kurt, Computer systems manufacturing method and apparatus.
  22. Rhoads, Geoffrey B., Content containing a steganographically encoded process identifier.
  23. Rhoads, Geoffrey B., Controlling a device based upon steganographically encoded data.
  24. Farber, David A.; Lachman, Ronald D., Controlling access to data in a data processing system.
  25. Thomas Mark Hastings ; Michael E. McNeil ; Todd S. Glassey ; Gerald L. Willett, Controlling access to stored information based on geographical location and date and time.
  26. Onders, Timothy E., Controlling access to technology based upon authorization.
  27. Saito, Makoto, Controlling database copyrights.
  28. Saito, Makoto, Controlling database copyrights.
  29. Saito, Makoto, Controlling database copyrights.
  30. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  31. Burkhart, Michael J.; Eisenhauer, Daniel G.; Schumacher, Daniel M.; Watson, Thomas J., Creating rules for the administration of end-user license agreements.
  32. Saito, Makoto, Data copyright management.
  33. Saito, Makoto, Data copyright management.
  34. Saito, Makoto, Data copyright management system.
  35. Saito, Makoto, Data management.
  36. Saito, Makoto, Data management system.
  37. Pruss, Richard; Katz, Morry; Jena, Somyajit; Wight, Alex; Strickland, Ben, Delegating authority of licenses to use computer products in a disconnected network.
  38. de Vries, Jeffrey; Hitomi, Arthur S., Deriving component statistics for a stream enabled application.
  39. de Vries, Jeffrey; Hitomi, Arthur Shingen, Deriving component statistics for a stream enabled application.
  40. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  41. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  42. Saito, Makoto, Digital content management system and apparatus.
  43. Peinado,Marcus; Abburi,Rajasekhar; England,Paul; Ganesan,Krishnamurthy; Bell,Jeffrey R. C.; Blinn,Arnold N.; Jones,Thomas C., Digital license and method for obtaining/providing a digital license.
  44. Abovitz,Rony A.; Tapia,William F.; Frechette,Robert F., Digital minimally invasive surgery system.
  45. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  46. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  47. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  48. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  49. Lofgren,Neil; Seder,Phillip Andrew; MacIntosh,Brian T., Digital watermarking systems.
  50. Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  51. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  52. Davis, Bruce L.; Rhoads, Geoffrey B., Digitally marked objects and promotional methods.
  53. Carroll, Donald E., Disk boot sector for software contract enforcement.
  54. Peach,Nicholas Anthony John, Electronic contracts.
  55. Sudia Frank W. ; Asay Alan ; Brickell Ernest F. ; Ankney Richard ; Freund Peter C. ; Yung Marcel M. ; Kravitz David W., Electronic cryptographic packing.
  56. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems and methods therefor.
  57. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems and methods therefor.
  58. Wang, Ynjiun P.; Ding, Joshua C.; Grizzard, James A., Electronic transaction systems utilizing a PEAD and a private key.
  59. Davis,Bruce L.; Rhoads,Geoffrey B., Embedding and reading imperceptible codes on objects.
  60. Miller,Marc D.; Hawes,Jonathan L., Embedding watermark components during separate printing stages.
  61. Pride, Edward; Daniel, Vicki; Feduff, Daniel Stephen; Gigliotti, Travis, End-to-end licensing of digital media assets.
  62. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Enforcement architecture and method for digital rights management.
  63. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  64. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  65. Fung, Joseph Zhung Yee; Chancellor, Robert; DeMartini, Thomas; Nguyen, Mai; Ta, Thanh; Tieu, Vincent Hsiang; Tran, Duc; Valenzuela, Edgardo, Extensible rights expression processing system.
  66. Powell, Michael D., Facilitating electronic exchange of proprietary information.
  67. Olsen James E. ; Bringhurst Adam L., Fault tolerant electronic licensing system.
  68. Rose, Anthony, Filter for a distributed network.
  69. Rose, Anthony, Filter for a distributed network.
  70. Rose, Anthony, Filter for a distributed network.
  71. Walker, William T.; Rhodes, James E.; Serkowski, Robert J.; Morgan, Lawrence J.; Gopalakrishna, Mohana Krishnan, Flexible license file feature controls.
  72. Oberberger, Mike, Gaming system license management.
  73. Mazza, Bruce P.; Walker, William T., Generation of enterprise-wide licenses in a customer environment.
  74. Walker,William T., Global positioning system hardware key for software licenses.
  75. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  76. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  77. Jones, Robert L., Identification document with three dimensional image of bearer.
  78. Koritzinsky Ianne Mae Howards ; Reich John Aurthur, Imaging system protocol handling method and apparatus.
  79. Koritzinsky, Ianne Mae Howards; Reich, John Aurthur, Imaging system protocol handling method and apparatus.
  80. Koritzinsky,Ianne Mae Howards; Reich,John Aurthur, Imaging system protocol handling method and apparatus.
  81. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  82. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  83. Nakano, Takehiko, Information processing apparatus and method.
  84. Nakano, Takehiko, Information processing apparatus and method.
  85. Nakano, Takehiko, Information processing apparatus and method.
  86. Nakano, Takehiko, Information processing apparatus and method.
  87. Nakano, Takehiko, Information processing apparatus and method.
  88. Nakano,Takehiko, Information processing apparatus and method.
  89. Kambayashi,Toru; Akiyama,Koichiro; Tsujimoto,Shuichi; Sumita,Kazuo; Hirakawa,Hideki; Sugaya,Toshihiro, Information recording apparatus, information reproducing apparatus, and information distribution system.
  90. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne M.; Shah, Lacky, Intelligent network streaming and execution system for conventionally coded applications.
  91. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne M.; Shah, Lacky, Intelligent network streaming and execution system for conventionally coded applications.
  92. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne Marie; Shah, Lacky Vasant, Intelligent network streaming and execution system for conventionally coded applications.
  93. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne Marie; Shah, Lacky Vasant, Intelligent network streaming and execution system for conventionally coded applications.
  94. Rhoads, Geoffrey B., Internet linking from audio.
  95. Rhoads,Geoffrey B., Internet linking from image content.
  96. O'Donnell, Lawrence; O'Donnell, Michael, Internet system for facilitating human user advisement and licensing of copyrighted works of authorship.
  97. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  98. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  99. Gilman,Robert R.; Robinson,Richard L., Key server for securing IP telephony registration, control, and maintenance.
  100. Etchegoyen, Craig S., License auditing for distributed applications.
  101. Serkowski,Robert J.; Walker,William T., License file serial number tracking.
  102. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  103. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  104. Rhodes, James E.; Serkowski, Robert J.; Walker, William T.; Morgan, Lawrence John; Gopalakrishna, Mohana Krishnan, License modes in call processing.
  105. Dickson, Richard Jesse, License utilization management system license wrapper.
  106. Dickson, Richard Jesse, License utilization management system service suite.
  107. Hawes, Jonathan L., Linking documents through digital watermarking.
  108. Rhoads Geoffrey B., Linking of computers using information steganographically embedded in data objects.
  109. Carter, Stephen R, Maintaining a soft-token private key store in a distributed environment.
  110. Carter, Stephen R., Maintaining a soft-token private key store in a distributed environment.
  111. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Graham, Stanley E.; Rhoads, Geoffrey B., Management of documents and other objects using optical devices.
  112. Ricchetti, Michael; Clark, Christopher J., Management system, method and apparatus for licensed delivery and accounting of electronic circuits.
  113. Landau, Richard B., Manufacturing process for software raid disk sets in a computer system.
  114. Levy, Kenneth L., Method and apparatus for automatic ID management.
  115. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for client customization by executing software parts on plural servers.
  116. Levy, Kenneth L., Method and apparatus for content management.
  117. Levy, Kenneth L., Method and apparatus for content management.
  118. Levy, Kenneth L., Method and apparatus for content management.
  119. Walker,William T., Method and apparatus for controlling data and software access.
  120. Flank,Sharon; Sperer,Ruth; Romer,Donna, Method and apparatus for digital media management, retrieval, and collaboration.
  121. Romer, Donna; Rothey, James, Method and apparatus for digital media management, retrieval, and collaboration.
  122. Wang, Xin; Tadayon, Bijan; DeMartini, Thomas; Raley, Michael; Lao, Guillermo; Chen, Eddie J.; Gilliam, Charles P., Method and apparatus for distributing enforceable property rights.
  123. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  124. Pence, William E.; Langan, Dik; Healy, Cynthia; Schreiber, Geoff; Penick, Donna, Method and apparatus for dynamic renewability of content.
  125. Pence,William E; Langan,Dik; Healy,Cynthia; Schreiber,Geoff; Penick,Donna, Method and apparatus for dynamic renewability of content.
  126. Garst, Blaine; Serlet, Bertrand, Method and apparatus for enforcing software licenses.
  127. Martineau Pierre G.,CAX ; Spackman Stephen P.,CAX, Method and apparatus for establishing the legitimacy of use of a block of digitally represented information.
  128. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  129. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  130. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  131. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  132. Perlman Radia J., Method and apparatus for implementing partial and complete optional key escrow.
  133. Chavez,David L., Method and apparatus for license distribution.
  134. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  135. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  136. Colosso Juan Carlos, Method and apparatus for regulating the use of licensed products.
  137. Cohen Aaron Michael, Method and apparatus for software licensing electronically distributed programs.
  138. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  139. Doll Steinberg,Daniel, Method and apparatus for the distribution of digitised information on demand.
  140. Jeffrey Vinson ; Steig Westerberg ; Jeffrey DeVries, Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching.
  141. Major, Robert Drew; Carter, Stephen R.; Orman, Hilarie, Method and mechanism for vending digital content.
  142. Major,Robert Drew; Carter,Stephen R.; Orman,Hilarie, Method and mechanism for vending digital content.
  143. Major,Robert Drew; Carter,Stephen R.; Orman,Hilarie, Method and mechanism for vending digital content.
  144. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  145. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  146. Steven C. Glassman ; Mark S. Manasse, Method and system for enforcing licenses on an open network.
  147. Bennett, Jim; Oosterhof, Peter; Hughes, Aidan; Nishanova, Anzhelika, Method and system for identifying the controlling license for installed software.
  148. Wyman Robert M., Method and system for managing execution of licensed programs.
  149. Rhoads,Geoffrey B., Method and system for managing, accessing and paying for the use of copyrighted electronic media.
  150. Larose Gordon Edward,CAX ; Allan David Ian,CAX, Method and system for networked installation of uniquely customized, authenticable, and traceable software application.
  151. Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
  152. Lao, Guillermo, Method and system for subscription digital rights management.
  153. Lao, Guillermo, Method and system for subscription digital rights management.
  154. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  155. Herzberg Amir ; Krawczyk Hugo Mario ; Kutten Shay ; Le An Van ; Matyas Stephen Michael ; Yung Marcel Mordechay, Method and system for the secured distribution of multimedia titles.
  156. Herzberg, Amir; Krawczyk, Hugo Mario; Kutten, Shay; Le, An Van; Matyas, Stephen Michael; Yung, Marcel Mordechay, Method and system for the secured distribution of multimedia titles.
  157. Ta, Thanh; Nguyen, Mai; Chen, Eddie J.; Wang, Xin; Demartini, Thomas, Method and system to support dynamic rights and resources sharing.
  158. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Method for authorizing a substitute software license server.
  159. Saito, Makoto, Method for controlling database copyrights.
  160. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  161. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  162. Sonderegger Kelly E., Method for managing globally distributed software components.
  163. Larsson Jeffrey E. ; Richardson Alan ; Steckler Paul A., Method for preventing software piracy during installation from a read only storage medium.
  164. Capek Peter George, Method for providing individually customized content in a network.
  165. Lita Mihai N., Method for supervising software execution in a license restricted environment.
  166. Hill,Keith Ryan; Hayes,Michael Anthony; Harrison,Peter, Method of administering licensing of use of copyright works.
  167. Grumstrup Bruce F. ; Ryan Patrick O., Method of and apparatus for protecting and upgrading software using a removable hardlock.
  168. Rhoads,Geoffrey B.; Seder,Phillip Andrew; Miller,Marc D.; MacIntosh,Brian T.; Hein, III,William C.; Hannigan,Brett T., Method of linking on-line data to printed documents.
  169. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Method of monitoring print data for text associated with a hyperlink.
  170. Zunke, Michael, Method of operating a computer system and computer system.
  171. Mages Kenneth G. ; Feng Jie, Method of secure server control of local media via a trigger through a network for instant local access of encrypted da.
  172. Martin,Christopher Vandeleur; Sch?nleber,Christina Maria, Method of using a computerised administration system to administer licensing of use of copyright material.
  173. Raley, Michael Charles; Chen, Eddie J., Method, system, and device for license-centric content consumption.
  174. Raley, Michael; Chen, Eddie J., Method, system, and device for license-centric content consumption.
  175. Johnson, Jr., H. Bruce; Webber, Joel, Methods and systems for dynamically composing distributed interactive applications from high-level programming languages.
  176. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  177. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  178. Erickson, John S., Methods for playing protected content.
  179. Rhoads,Geoffrey B., Methods for steganographic encoding media.
  180. Indenbom, Eugene, Methods of licensing software programs and protecting them from unauthorized use.
  181. Indenbom, Eugene, Methods of protecting software programs from unauthorized use.
  182. Eyres Kevin W. ; Lee Michael H., Modified license key entry for pre-installation of software.
  183. Eyres, Kevin W.; Lee, Michael H., Modified license key entry for pre-installation of software.
  184. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  185. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  186. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  187. Rhoads, Geoffrey B., Music methods and systems.
  188. Carter Stephen R. ; LaVange ; Jr. Donald H. ; Jensen Delos C., Network license authentication.
  189. Rhoads, Geoffrey B., Network linking method using information embedded in data objects that have inherent noise.
  190. Rhoads,Geoffrey B., Network linking using index modulated on data.
  191. DeVries, Jeffrey; Hitomi, Arthur, Opportunistic block transmission with time constraints.
  192. DeVries, Jeffrey; Hitomi, Arthur S., Opportunistic block transmission with time constraints.
  193. DeVries, Jeffrey; Hitomi, Arthur S., Opportunistic block transmission with time constraints.
  194. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  195. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  196. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  197. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  198. Holler, Anne Marie; Shah, Lacky Vasant; Panwar, Sameer; Patel, Amit, Optimized server for streamed applications.
  199. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  200. Rodriguez, Tony F.; Carr, Jonathan Scott; Rhoads, Geoffrey B., Paper-based control of computer systems.
  201. Messina, Kevin M., Parsing an identification document in accordance with a jurisdictional format.
  202. Messina, Kevin M., Parsing an identification document in accordance with a jurisdictional format.
  203. Wooldridge, James L.; Bozek, James J.; Stephens, Robert E., Permitting utilization of computer system resources in accordance with their licensing.
  204. Story, Guy A.; Rajasekharan, Ajit; Mott, Timothy, Personalized time-shifted programming.
  205. Cole, Mary Katherine; O'Connor, Glen Arthur; Speyer, Peter Christian, Platform for managing media assets for multi-model licensing over multi-level pricing and asset grouping.
  206. Rhoads,Geoffrey B.; Davis,Bruce L.; Evans,Douglas B., Portable devices and methods employing digital watermarking.
  207. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Predictive software license balancing.
  208. Rhoads, Geoffrey B., Printable interfaces and digital linking with embedded codes.
  209. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  210. Merkle Ralph C., Protected shareware.
  211. Matsushima, Hideki; Harada, Shunji; Uesaka, Yasushi; Hirota, Teruto; Kozuka, Masayuki; Nikaido, Masataka, Recording medium, license management apparatus, and recording and playback apparatus.
  212. Horstmann Cay S., Relicensing of electronically purchased software.
  213. Walker, William T.; Serkowski, Robert J., Remote feature activation authentication file system.
  214. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  215. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  216. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  217. Oki Hiroshi,JPX ; Kamata Shinji,JPX ; Hara Takashi,JPX ; Okada Toshiro,JPX ; Yamazaki Toshiya,JPX ; Igarashi Norihiko,JPX, Remote installation system and method.
  218. Evans, Brian P.; Strom, Clifford P.; Parks, Michael Jay, Rendering digital content in a content protection system according to a plurality of chained digital licenses.
  219. Demartini, Thomas M.; Raley, Michael Charles, Rights expression profile system and method.
  220. Raley, Michael C.; Gilliam, Charles P.; Ham, Manual; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  221. Raley, Michael; Gilliam, Charles P.; Ham, Manuel; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  222. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  223. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  224. Rao, Santhpur N.; Trapa, Valerie, Secure download manager.
  225. Holmes Lyndon S. ; King ; III James, Secure electronic publishing system.
  226. Gilman, Robert R.; Robinson, Richard L.; Serkowski, Robert J., Secure installation activation.
  227. Hughes, Aidan; de la Torre, Douglas R., Secure offline activation process for licensed software application programs.
  228. Ananda Mohan (15910 Ventura Blvd. ; Suite 800 Encino CA 91436), Secure software rental system using continuous asynchronous password verification.
  229. Serkowski, Robert J., Securing feature activation in a telecommunication system.
  230. Rhoads,Geoffrey B., Securing media content with steganographic encoding.
  231. Clement, Kurt, Software distribution method and apparatus.
  232. Clement, Kurt, Software distribution method and apparatus.
  233. Clement, Kurt, Software distribution method and apparatus.
  234. Bussey, Mark G.; Zimmerman, Fred C., Software key control for mobile devices.
  235. Bussey, Mark G.; Zimmerman, Fred C., Software key control for mobile devices.
  236. Ashton, Miriam R.; Johnson, Randy S.; Northway, Tedrick N.; Sveda, Jacqueline; Woodruff, Caryn L., Software license and installation process management within an organization.
  237. Park Hyo Joon,KRX, Software license control system based on independent software registration server.
  238. Frison Michael R. ; Kirchberger Bela L., Software pay per use licensing system.
  239. Vinson, Jeffrey; Westerberg, Steig G.; Vries, Jeffrey De, Software streaming system and method.
  240. Vinson, Jeffrey; Westerberg, Steig; DeVries, Jeffrey, Software streaming system and method.
  241. Vinson, Jeffrey; Westerberg, Steig; DeVries, Jeffrey, Software streaming system and method.
  242. Herrero, Victor R.; Vuozzo, Michael L., Solution for locally staged electronic software distribution using secure removable media.
  243. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifiying security for an element by assigning a scaled value representative of the relative security thereof.
  244. Ganesan, Krishnamurthy, Specifying rights in a digital rights license according to events.
  245. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  246. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  247. Otway,David John; Bull,John Albert, Strong mutual authentication of devices.
  248. Russell Robert J., System and mechanism for assigning pre-established electronic addresses to printed circuit boards.
  249. Mandelbaum, Frank; Embry, Russell T., System and method for comparing documents.
  250. Ackerman, Mark D.; Carter, Stephen R, System and method for controlling access to licensed computing processes via a codified electronic license.
  251. Gilliam, Charles P; Chen, Eddie J, System and method for controlling rights expressions by stakeholders of an item.
  252. Stefik, Mark J.; Pirolli, Peter L. T., System and method for controlling utilization of content.
  253. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  254. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  255. Tieu, Vincent; Fung, Joseph Z.; Chen, Eddie; Tadayon, Bijan, System and method for granting access to an item or permission to use an item based on configurable conditions.
  256. Erickson John S., System and method for managing copyrighted electronic media.
  257. Erickson, John S., System and method for managing copyrighted electronic media.
  258. Erickson,John S., System and method for managing copyrighted electronic media.
  259. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  260. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  261. Stefik, Mark J.; Pirolli, Peter L. T., System and method for permitting use of content.
  262. Stefik, Mark J.; Pirolli, Peter L. T., System and method for permitting use of content using transfer rights.
  263. Himmel Maria Azua ; Hoffman Richard Dale ; Mall Michael Gerard, System and method for preventing duplicate transactions in an internet browser/internet server environment.
  264. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  265. Curren, Edward, System and method for software license management for concurrent license management and issuance.
  266. Misra Pradyumna K. ; Graziadio Bradley J. ; Spies Terence R., System and method for software licensing.
  267. Misra, Pradyumna K.; Graziado, Bradley J.; Spies, Terence R., System and method for software licensing.
  268. Misra,Pradyumna K.; Graziadio,Bradley J.; Spies,Terence R., System and method for software licensing.
  269. Gaetano, Jr., Arthur Louis; Gin, Jerry; Durant, John; Merriam, Michael Mathew, System and method for software site licensing.
  270. Wang, Xin, System and method for specifying and processing legality expressions.
  271. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  272. Ananda, Mohan, System and method for transferring items having value.
  273. Powell, Michael D., System and method to facilitate and support electronic communication of ideas.
  274. Powell, Michael D., System and method to facilitate and support electronic communication of ideas.
  275. Powell, Michael D., System and method to facilitate and support electronic communication of request for proposals.
  276. Erickson,John S., System and methods for managing digital creative works.
  277. Bergler,Peter M.; Parsons, Jr.,John E.; Hagan,Breen E.; Brockway,Tad Dennis; Leitman,Robert K., System and related methods for managing and enforcing software licenses.
  278. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  279. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  280. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  281. Kupka,Michael S.; Hawkins,Michael L.; Thomas,Trent M., System for keying protected electronic data to particular media to prevent unauthorized copying using a compound key.
  282. Michael S. Kupka ; Michael G. Lundgren, System for prepayment of electronic content using removable media and for prevention of unauthorized copying of same.
  283. Diersch Hans-Joerg,DEX ; Gruendler Rainer,DEX ; Stefan Kaden,DEX ; Michels Ingo,DEX, System for securing protected software from unauthorized use in computer networks.
  284. Garst, Blaine; Serlet, Bertrand, System method and apparatus for authorizing access.
  285. Stefik, Mark J.; Pirolli, Peter L. T., System, apparatus, and media for granting access to and utilizing content.
  286. Valenzuela, Edgardo; Chen, Eddie J.; DeMartini, Thomas; Fung, Joseph Zhung Yee; Nguyen, Mai; Tieu, Vincent Hsiang; Tran, Duc, Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates.
  287. Valenzuela, Edgardo; Chen, Eddie J.; DeMartini, Thomas; Fung, Joseph Zhung Yee; Nguyen, Mai; Tieu, Vincent Hsiang; Tran, Duc, Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates.
  288. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  289. LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  290. LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
  291. Levine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  292. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  293. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  294. Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  295. Levy, Kenneth L.; Meyer, Joel R.; Andrews, III, Hoyet Harrison, Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities.
  296. Jones, Robert, Systems, compositions, and methods for full color laser engraving of ID documents.
  297. Jones, Robert L.; Bi, Daoshen; Yeh, Tung-Feng, Tamper evident adhesive and identification document including same.
  298. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  299. Millman, Jonathan T.; Rajasekharan, Ajit V.; Sperring, Jr., Foy C.; Story, Jr., Guy A., Time-based digital content authorization.
  300. Mather, Andrew H., Transactional computer system.
  301. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  302. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  303. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  304. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  305. Levy,Kenneth L., User-friendly rights management systems and methods.
  306. Geoffrey B. Rhoads, Watermark enabled video objects.
  307. Rhoads,Geoffrey B.; Levy,Kenneth L.; McKinley,Tyler J., Watermark encoded video, and related methods.
  308. Peterson,Charlotte G.; Reddy,Sada; Demko,Lisa; Pumphrey,Jeannie; Kornish,Douglas R.; Hatti,Harsha; Giancaspro,Kim; Stanard,Christopher L., Web-based system for managing software assets.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로