$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for providing a roving software license from one node to another node 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0472951 (1995-06-07)
발명자 / 주소
  • Davis Derek L. (Phoenix AZ)
출원인 / 주소
  • Intel Corporation (Santa Clara CA 02)
인용정보 피인용 횟수 : 422  인용 특허 : 2

초록

An integrated circuit component for enforcing licensing restrictions. Such enforcement is performed through remote transmission of access privileges for executing a licensed program from the integrated circuit component to another similar component. The integrated circuit component comprising a non-

대표청구항

A method for transferring a valid license token between a first and second nodes which allows execution of a licensed software program after the valid license token had been initially provided by a software supplier, the method comprising the steps of: establishing a communication link between a fir

이 특허에 인용된 특허 (2)

  1. Ugon Michel (Maurepas FRX) Guillou Louis (Bourgbarre FRX), Microprocessor intended particularly for executing the calculation algorithms of a public code encoding system.
  2. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.

이 특허를 인용한 특허 (422)

  1. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  2. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  3. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  4. Derek L. Davis ; Jean-Charles Korta, Anonymity server.
  5. Davis Derek L., Anti-theft mechanism for mobile computers.
  6. Davis Derek L., Apparatus and method for cryptographic companion imprinting.
  7. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  8. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  9. Brickell, Ernest F., Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information.
  10. Davis Derek L., Apparatus and method for providing secured communications.
  11. Brickell,Ernest F., Apparatus and method for proving the denial of a direct proof signature.
  12. Rosen Sholom S., Apparatus and method for secure transacting.
  13. Kozuch,Michael A.; Sutton, II,James A.; Grawrock,David; Neiger,Gilbert; Uhlig,Richard A.; Burgess,Bradley G.; Poisner,David I.; Hall,Clifford D.; Glew,Andy; Smith, III,Lawrence O.; George,Robert, Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment.
  14. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Attestation key memory device and bus.
  15. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Attestation key memory device and bus.
  16. Grawrock,David W., Attestation using both fixed token and portable token.
  17. Glew,Andrew F.; Sutton,James A.; Smith,Lawrence O.; Grawrock,David W.; Neiger,Gilbert; Kozuch,Michael A., Authenticated code module.
  18. Wilkinson, Jr., John C.; Jasper, Taryl J.; Kalan, Michael D.; Perrotto, Jr., Nicholas L.; Schulz, Glenn B.; Meeker, James A.; Tambascio, Kevin M.; Visoky, Jack M., Authentication for licensing in an embedded system.
  19. DeFreese, Darryl L.; Seaman, Jeffrey M.; Wasilewski, Anthony J., Authentication of entitlement authorization in conditional access systems.
  20. Davis Derek L. ; Smith Lionel, Authentication system based on periodic challenge/response protocol.
  21. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Banker, Robert O., Authorization of services in a conditional access system.
  22. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Banker, Robert O., Authorization of services in a conditional access system.
  23. Cao,Adrean T., Auxiliary program association table.
  24. Pedlow, Jr.,Leo M.; Agnihotri,Davender, Batch mode session-based encryption of video on demand content.
  25. Pedlow, Jr., Leo M.; Agnihotri, Davender, Bi-directional indices for trick mode video-on-demand.
  26. Peinado, Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  27. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  28. Peinado, Marcus, Binding a digital license to a portable or the like in a digital rights management (DMR) system and checking out/checking in the digital license to/from the portable device or the like.
  29. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  30. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  31. Davis Derek L., Circuit and method for ensuring interconnect security with a multi-chip integrated circuit package.
  32. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  33. Pedlow, Jr.,Leo M., Composite session-based encryption of video on demand content.
  34. Wasilewski Anthony J. ; Pinder Howard G. ; Akins ; III Glendon L. ; Palgon Michael S., Conditional access system.
  35. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Palgon, Michael S., Conditional access system.
  36. Grawrock,David W., Connecting a virtual token to a physical token.
  37. Candelore,Brant L., Content distribution for multiple digital rights management.
  38. Candelore, Brant L., Content personalization for digital content.
  39. Traw, Chandler Brendan Stanton; Aucsmith, David Wayne, Content protection for digital transmission systems.
  40. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  41. Stefik,Mark J., Content rendering device with usage rights.
  42. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  43. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  44. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, Jon D., Content replacement by PID mapping.
  45. Bonan,James; Candelore,Brant L.; Eyer,Mark Kenneth, Content scrambling with minimal impact on legacy devices.
  46. Bennett,Steve; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Zou,Xiang; Kozuch,Michael A., Control over faults occurring during the operation of guest software in the virtual-machine architecture.
  47. Bennett,Steve; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael A., Control register access virtualization performance improvement in the virtual-machine architecture.
  48. Sprong Katherine A. ; Sprong Donald J., Controlled usage software.
  49. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple isolated memories in an isolated execution environment.
  50. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple memory zones in an isolated execution environment.
  51. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple memory zones in an isolated execution environment.
  52. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling accesses to isolated memory using a memory controller for isolated execution.
  53. Candelore, Brant L., Copy-protecting management using a user scrambling key.
  54. Grawrock,David W., Creation and distribution of a secret value between two devices.
  55. Unger,Robert Allan; Candelore,Brant L., Critical packet partial encryption.
  56. Callum Roy, Cryptographic accelerator.
  57. Callum, Roy, Cryptographic accelerator.
  58. Westendorf, Andreas; Fischer, Hans-Juergen, Data transmission method.
  59. Unger,Robert Allan; Candelore,Brant L.; Pedlow, Jr.,Leo M., Decoding and decryption of partially encrypted information.
  60. Ryal,Kim Annon, Decryption system.
  61. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  62. Candelore, Brant L., Descrambler.
  63. Candelore, Brant L., Descrambler.
  64. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  65. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  66. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  67. Candelore, Brant L., Digital rights management of a digital device.
  68. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  69. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  70. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  71. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  72. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  73. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  74. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  75. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  76. Wells, Steven E.; Ward, David A., Duty cycle corrector for a random number generator.
  77. Pedlow, Jr.,Leo M.; Agnihotri,Davender, Dynamic composition of pre-encrypted video on demand content.
  78. Benson Glenn Stuart,DEX, Electronic copy protection mechanism using challenge and response to prevent unauthorized execution of software.
  79. Turner, Christopher Gordon Gervase; Kruger, Johan Dawid, Electronic identification system and method with source authenticity.
  80. Davis, Derek L., Electronic system and method for controlling access through user authentication.
  81. Rosen,Sholom S., Electronic ticket vending system.
  82. Rosen,Sholom S., Electronic transaction apparatus for electronic commerce.
  83. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M.; Mirsky,Gregory; Eyer,Mark Kenneth, Elementary stream partial encryption.
  84. Pedlow, Jr.,Leo M.; Candelore,Brant L.; Derovanessian,Henry, Encryption and content control in a digital broadcast system.
  85. Howard G. Pinder ; Michael S. Palgon, Encryption devices for use in a conditional access system.
  86. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  87. Conceicao, Ladislau; Feliberti, Vanessa; Tischhauser, Paul, Establishing secure data transmission using unsecured E-mail.
  88. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Executing isolated mode instructions in a secure system running in privilege rings.
  89. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  90. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S., File checking using remote signing authority via a network.
  91. Cheswick William Roberts ; Whitten Edward G., Firewall security method and apparatus.
  92. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Generating a key hieararchy for use in an isolated execution environment.
  93. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Generating isolated bus cycles for isolated execution.
  94. Uhlig,Richard; Anderson,Andrew V.; Bennett,Steve; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert, Handling faults associated with operation of guest software in the virtual-machine architecture.
  95. Candelore, Brant L., IP delivery of secure digital content.
  96. William N. Rallis ; Yaacov Behar, Infrared type security system for a computer.
  97. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  98. Wells,Steven E.; Kynett,V. Niles, Integrated circuit chip having firmware and hardware security primitive device(s).
  99. Carbajal, John M.; Dittert, Eric R.; Drews, Paul C., Interface for ensuring system boot image integrity and authenticity.
  100. Cota-Robles, Eric C.; Glew, Andy; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael A.; Neiger, Gilbert; Uhlig, Richard, Invalidating translation lookaside buffer entries in a virtual machine (VM) system.
  101. Cota-Robles, Eric C.; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael A.; Neiger, Gilbert; Uhlig, Richard, Invalidating translation lookaside buffer entries in a virtual machine system.
  102. Frank, Alexander; Hall, Martin H.; Phillips, Thomas G., Isolated computing environment anchored into CPU and motherboard.
  103. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  104. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  105. Lehmann, Martin; Marquardt, Klaus, Licensing system and process for transferring license information.
  106. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, John, Macro-block based content replacement by PID mapping.
  107. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  108. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  109. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  110. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  111. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing accesses in a processor for isolated execution.
  112. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  113. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  114. Wasilewski, Anthony J.; Seaman, Jeffery M.; Defreese, Darryl L., Mechanism and apparatus for encapsulation of entitlement authorization in conditional access system.
  115. Candelore, Brant L., Mechanism for protecting the transfer of digital content.
  116. Hall, Clifford D.; Campbell, Randolph L., Mechanism for remapping post virtual machine memory pages.
  117. Bennett,Steven M.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Neiger,Gilbert; Uhlig,Richard, Mechanism to control hardware interrupt acknowledgement in a virtual machine system.
  118. Fish, Andrew J., Mechanism to determine trust of out-of-band management agents.
  119. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  120. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  121. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  122. McKeen,Francis X.; Reneris,Ken; Grawrock,David W., Mechanism to secure computer output from software attack using isolated execution.
  123. Hohberger, Clive P.; Tsirline, Boris Y., Method and apparatus for article authentication.
  124. Hohberger, Clive P.; Tsirline, Boris Y., Method and apparatus for article authentication.
  125. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  126. Brickell, Ernest; Graunke, Gary; Stevens, William A.; Vembu, Balaji, Method and apparatus for authenticated, recoverable key distribution with no database secrets.
  127. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  128. Poisner,David I.; Grawrock,David W.; Sutton,James A., Method and apparatus for communicating securely with a token.
  129. Cota Robles,Erik; Chou,Stephen; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Method and apparatus for constructing host processor soft devices independent of the host processor operating system.
  130. Fraser Alexander Gibson ; Keshav Srinivasan ; Odlyzko A. M., Method and apparatus for crytographically protecting data.
  131. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  132. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  133. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  134. Schweitzer Peter ; Curry Stephen M. ; Little Wendell L. ; Armstrong Bryan M. ; Fox Christopher W. ; Loomis Donald W., Method and apparatus for encryption key creation.
  135. Garst, Jr., Gerald Blaine; Serlet, Bertrand, Method and apparatus for enforcing software licenses.
  136. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  137. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  138. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  139. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  140. Bennett, Steven M.; Anderson, Andrew V.; Cota Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  141. Bennett, Steven M.; Anderson, Andrew V.; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  142. Akins, III, Glendon L.; Pinder, Howard G.; Wasilewski, Anthony J., Method and apparatus for geographically limiting service in a conditional access system.
  143. Akins, III, Glendon L.; Pinder, Howard G.; Wasilewski, Anthony J., Method and apparatus for geographically limiting service in a conditional access system.
  144. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  145. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  146. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  147. Candelore, Brant L.; Eyer, Mark, Method and apparatus for implementing revocation in broadcast networks.
  148. Candelore,Brant L.; Eyer,Mark, Method and apparatus for implementing revocation in broadcast networks.
  149. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  150. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  151. Kozuch, Michael A.; Sutton, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  152. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  153. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  154. Candelore, Brant L., Method and apparatus for protecting the transfer of data.
  155. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  156. Anthony J. Wasilewski ; Douglas F. Woodhead ; Gary Lee Logston, Method and apparatus for providing conditional access in connection-oriented interactive networks with a multiplicity of service providers.
  157. Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
  158. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  159. Candelore, Brant L., Method and apparatus for securing control words.
  160. Candelore,Brant L., Method and apparatus for securing control words.
  161. Buer, Mark L.; Frank, Edward H., Method and apparatus for security over multiple interfaces.
  162. Buer, Mark L.; Frank, Edward H., Method and apparatus for security over multiple interfaces.
  163. Anderson, Andrew V.; Kägi, Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  164. Anderson,Andrew V.; K��gi,Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  165. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  166. Dawson, Thomas Patrick, Method and apparatus for synchronizing dynamic graphics.
  167. Doll Steinberg,Daniel, Method and apparatus for the distribution of digitised information on demand.
  168. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  169. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  170. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  171. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  172. Leung,Lok Yan; Nadalin,Anthony Joseph; Rich,Bruce Arland; Shrader,Thoedore Jack London, Method and apparatus to mutually authentication software modules.
  173. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  174. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  175. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  176. Pasieka, Michael S., Method and system for consumer electronic device certificate management.
  177. Chao, Ching-Yun, Method and system for establishing a trust framework based on smart key devices.
  178. Chao, Ching-Yun, Method and system for protecting master secrets using smart key devices.
  179. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set.
  180. Boate,Alan; Reed,Brian, Method and system for securing a computer network and personal identification device used therein for controlling access to network components.
  181. Lao, Guillermo, Method and system for subscription digital rights management.
  182. Lao, Guillermo, Method and system for subscription digital rights management.
  183. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  184. Bade,Steven A.; Chao,Ching Yun, Method and system for using a compact disk as a smart key device.
  185. Bajikar, Sundeep M., Method and system to provide a trusted channel within a computer system for a SIM device.
  186. Derek L. Davis ; Pranav Mehta, Method for BIOS authentication prior to BIOS execution.
  187. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  188. Sholom S. Rosen, Method for electronic merchandise dispute resolution.
  189. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  190. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  191. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  192. Oh, Yun-sang; Jung, Kyung-im; Choi, Jae-jin, Method for moving a rights object between devices and a method and device for using a content object based on the moving method and device.
  193. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  194. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  195. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  196. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  197. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jevasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  198. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  199. Candelore, Brant L., Method for simulcrypting scrambled data to a plurality of conditional access devices.
  200. Candelore, Brant L., Method for simulcrypting scrambled data to a plurality of conditional access devices.
  201. Candelore,Brant L., Method for simulcrypting scrambled data to a plurality of conditional access devices.
  202. Lita Mihai N., Method for supervising software execution in a license restricted environment.
  203. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  204. Bade,Steven A.; Chao,Ching Yun, Method for using a portable computing device as a smart key device.
  205. Brickell,Ernie F., Method of confirming a secure key exchange.
  206. Chou Wayne W. ; Kulinets Joseph M. ; Elteto Laszlo, Method of metering and protecting computer software.
  207. Zunke, Michael, Method of operating a computer system and computer system.
  208. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  209. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  210. Albrecht, Mark; Wildgrube, Frank, Methods and apparatus for preventing unauthorized write access to a protected non-volatile storage.
  211. Pinder, Howard G.; Woodward, Jr., William D.; Evans, Jonathan Bradford; Wasilewski, Anthony J., Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system.
  212. Pinder,Howard G.; Woodward, Jr.,William D.; Evans,Jonathan Bradford; Wasilewski,Anthony J., Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system.
  213. Bennett,Steve M.; Neiger,Gilbert; Cota Robles,Erik C.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael A.; Uhlig,Richard A.; Smith,Larry; Rodgers,Dion; Glew,Andrew; Boleyn,Erich, Methods and systems to control virtual machines.
  214. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  215. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  216. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  217. Candelore,Brant L., Multi-process descrambler.
  218. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  219. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  220. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  221. Grawrock,David W., Multi-token seal and unseal.
  222. Candelore, Brant L., Multiple DRM management.
  223. Candelore,Brant L., Multiple partial encryption using retuning.
  224. Rallis William N. ; Behar Yaacov, Notebook security system (NBS).
  225. Rallis William N. ; Behar Yaacov, Notebook security system (NBS).
  226. William N. Rallis ; Yaacov Behar, Notebook security system using infrared key.
  227. Davis Derek L., Optimized security functionality in an electronic system.
  228. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  229. Candelore, Brant L., Parental control of displayed content using closed captioning.
  230. Pinder,Howard; Evans,Jonathan Bradford; Wasilewski,Anthony J.; Woodward, Jr.,William D., Partial dual encrypted stream utilizing program map tables.
  231. Pinder, Howard G.; Evans, Jonathan Bradford; Wasilewski, Anthony J.; Woodward, Jr., William D., Partial dual-encryption using program map tables.
  232. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M., Partial encryption and PID mapping.
  233. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M., Partial encryption and PID mapping.
  234. Davis, Derek L.; Herbert, Howard C., Platform and method for assuring integrity of trusted agent communications.
  235. Derek L. Davis ; Howard C. Herbert, Platform and method for assuring integrity of trusted agent communications.
  236. Huded, Ashok V., Platform and method for creating and using a digital container.
  237. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  238. Brickell,Ernie F., Platform and method for establishing trust without revealing identity.
  239. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for generating and utilizing a protected audit log.
  240. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for issuing and certifying a hardware-protected attestation key.
  241. Herbert,Howard C.; Grawrock,David W.; Ellison,Carl M.; Golliver,Roger A.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for remote attestation of a platform.
  242. Grawrock, David W., Platform and method for securely transmitting an authorization secret.
  243. Grawrock,David W., Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations.
  244. Cronce,Paul Allen; Fontana,Joseph M., Portable authorization device for authorizing use of protected information and associated method.
  245. Pedlow, Jr., Leo M.; Agnihotri, Davender, Preparation of content for multiple conditional access methods in video on demand.
  246. Moran, Douglas R.; Acharya, Satish; Bogin, Zohar; Galloway, Sean G., Prioritized address decoder.
  247. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard, Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor.
  248. Wells, Steven E., Programmable random bit source.
  249. Wells,Steven E., Programmable random bit source.
  250. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Progressive video refresh slice detection.
  251. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  252. Poisner, David I., Protected configuration space in a protected environment.
  253. Poisner,David I., Protected configuration space in a protected environment.
  254. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  255. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  256. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Protecting software environment in isolated execution.
  257. Grawrock, David W., Protection of boot block data and accurate reporting of boot block contents.
  258. Bennett,Steven M.; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K��gi,Alain; Neiger,Gilbert; Uhlig,Richard; Mondal,Sanjoy K.; Brandt,Jason, Providing support for single stepping a virtual machine in a virtual machine environment.
  259. Wells, Steven E.; Ward, David A., Random number generator with entropy accumulation.
  260. Cota Robles,Erik C.; Flautner,Krisztian, Real-time scheduling of virtual machines.
  261. Uhlig,Richard; Neiger,Gilbert; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Bennett,Steven M, Reclaiming existing fields in address translation data structures to extend control over memory accesses.
  262. Epstein,Michael A., Registering copy protected material in a check-out, check-in system.
  263. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  264. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  265. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  266. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  267. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  268. Akins ; III Glendon L. ; Banker Robert O. ; Palgon Michael S. ; Pinder Howard G. ; Wasilewski Anthony J., Representing entitlements to service in a conditional access system.
  269. Akins, III, Glendon L.; Banker, Robert O.; Palgon, Michael S.; Pinder, Howard G.; Wasilewski, Anthony J., Representing entitlements to service in a conditional access system.
  270. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind; Reneris, Ken, Resetting a processor in an isolated execution environment.
  271. Smith Perry,CAX ITX X1A 2N8, Restricted access computer system.
  272. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  273. Buer, Mark Leonard, Secure cache for instruction and data protection.
  274. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  275. Wells, Steven E.; Kynett, V. Niles; Dover, Lance W., Secure hardware random number generator.
  276. Wells,Steven E.; Kynett,V. Niles; Dover,Lance W., Secure hardware random number generator.
  277. Azema, Jerome; Chateau, Alain; Balard, Eric, Secure management of configuration parameters in a computing platform.
  278. Tretter,Daniel R.; Kite,Thomas D.; Lin,Qian; Nguyen,Hugh P.; Wong,Ping Wah, Secure network-based system for the distributed printing of documents.
  279. Davis Derek L., Secure public digital watermark.
  280. Varma, Ankur, Secure storage.
  281. Bertrand Dominique,FRX ; Gatto Jean-Marie,FRX, Securized, multifunction, acquisition and processing terminal usable in the banking sector, in connection with games and in the electronic management of documents.
  282. Candelore,Brant L., Selective encryption for video on demand.
  283. Candelore,Brant L., Selective encryption to enable multiple decryption keys.
  284. Candelore,Brant L.; Poslinski,Tom, Selective encryption to enable trick play.
  285. Candelore, Brant L., Selective encryption with coverage encryption.
  286. Grawrock,David W.; Poisner,David I., Sleep protection.
  287. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Slice mask and moat pattern partial encryption.
  288. Park Hyo Joon,KRX, Software license control system based on independent software registration server.
  289. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  290. Akins, III, Glendon L.; Banker, Robert O.; Palgon, Michael S.; Pinder, Howard G.; Wasilewski, Anthony J., Source authentication of download information in a conditional access system.
  291. Frank, Alexander; Steeb, Curt A.; Ahdout, Isaac P.; Duffus, James S.; Hall, Martin; Temple, Nicholas; Venkatachalam, Rajagopal; Phillips, Thomas; Xu, Zhangwei, Special PC mode entered upon detection of undesired state.
  292. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Star pattern partial encryption.
  293. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  294. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  295. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  296. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  297. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  298. Neiger,Gilbert; Anderson,Andrew V.; Bennett,Steven M.; Brandt,Jason; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K채gi,Alain; Mondal,Sanjoy K.; Parthasarathy,Rajesh; Rodgers,Dion; Smith,Lawrence O.; Uhlig,Richard A., Support for nested fault in a virtual machine environment.
  299. O'Donnell, Amy; Thangadurai, George; Rajan, Anand, System and method for authentication of off-chip processor firmware code.
  300. Cota Robles,Erik C.; Campbell,Randolph L.; Hall,Clifford D.; Neiger,Gilbert; Uhlig,Richard A., System and method for binding virtual machines to hardware contexts.
  301. Drews, Paul, System and method for checking authorization of remote configuration operations.
  302. Rosen Sholom S., System and method for connecting money modules.
  303. Neiger, Gilbert; Bennett, Steven M.; Cota-Robles, Erik; Schoenberg, Sebastian; Hall, Clifford D.; Rodgers, Dion; Smith, Lawrence O.; Anderson, Andrew V.; Uhlig, Richard A.; Kozuch, Michael; Glew, Andy, System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time.
  304. Raciborski, Bohdan, System and method for delivery of a modular operating system.
  305. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  306. Davis Derek L., System and method for digitally signing a digital agreement between remotely located nodes.
  307. Wang,Xin, System and method for document distribution.
  308. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  309. Derek L. Davis, System and method for ensuring integrity throughout post-processing.
  310. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  311. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  312. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  313. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  314. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  315. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  316. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  317. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  318. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  319. Sutton, II,James A.; Grawrock,David W., System and method for execution of a secured environment initialization instruction.
  320. Sutton, James A; Grawrock, David W, System and method for execution of a secured environment initialization instruction.
  321. Demeyer, Michael, System and method for licensing software.
  322. Demeyer, Michael, System and method for licensing software.
  323. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  324. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  325. Pedlow, Jr.,Leo M.; Derovanessian,Henry; Candelore,Brant, System and method for partially encrypted multimedia stream.
  326. Angelo Michael F. ; Olarig Sompong P. ; Wooten David R. ; Driscoll Dan J., System and method for performing secure device communications in a peer-to-peer bus architecture.
  327. Le Saint, Eric F., System and method for privilege delegation and control.
  328. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  329. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  330. Wang, Xin, System and method for protection of digital works.
  331. Grawrock,David W.; Sutton, II,James A., System and method for resetting a platform configuration register.
  332. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  333. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  334. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  335. Candelore, Brant L.; Pedlow, Jr., Leo M., System and method for the creation, synchronization and delivery of alternate content.
  336. Wang,Xin, System and method for transferring the right to decode messages.
  337. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  338. Paul C. Drews, System and method for verifying the integrity and authorization of software before execution in a local platform.
  339. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  340. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  341. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  342. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  343. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  344. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  345. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  346. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  347. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  348. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  349. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  350. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  351. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  352. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  353. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  354. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  355. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  356. Diersch Hans-Joerg,DEX ; Gruendler Rainer,DEX ; Stefan Kaden,DEX ; Michels Ingo,DEX, System for securing protected software from unauthorized use in computer networks.
  357. Garst, Blaine; Serlet, Bertrand, System method and apparatus for authorizing access.
  358. Candelore, Brant L., System, method and apparatus for secure digital content transmission.
  359. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  360. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  361. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  362. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  363. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  364. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  365. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  366. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  367. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  368. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  369. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  370. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  371. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  372. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  373. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  374. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  375. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  376. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  377. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  378. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  379. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  380. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  381. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  382. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  383. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  384. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  385. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  386. Ellison Carl, Tamper resistant method and apparatus.
  387. Rosen Sholom S., Tamper-proof devices for unique identification.
  388. Rosen Sholom S., Tamper-proof electronic processing device.
  389. Candelore, Brant L., Targeted advertisement selection from a digital stream.
  390. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  391. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  392. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  393. Candelore, Brant L.; Unger, Robert Allan; Derovanessian, Henry, Time division partial encryption.
  394. Bennett, Steven M.; Neiger, Gilbert; Anderson, Andrew V., Timer offsetting mechanism in a virtual machine environment.
  395. Cota Robles,Erik; Schoenberg,Sebastian; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor.
  396. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  397. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  398. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  399. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  400. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  401. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  402. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  403. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  404. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  405. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  406. Grawrock, David, Trusted platform module for generating sealed data.
  407. Thirumalai, Gokul P.; Ahdout, Isaac, Tuning product policy using observed evidence of customer behavior.
  408. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  409. Candelore,Brant L.; Derovanessian,Henry, Upgrading of encryption.
  410. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  411. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  412. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  413. Neiger,Gilbert; Bennett,Steven M.; K��gi,Alain; Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Uhlig,Richard; Cota Robles,Erik; Rodgers,Scott; Smith,Lawrence, Use of multiple virtual machine monitors to handle privileged events.
  414. Bade, Steven A.; Chao, Ching-Yun, Using a portable computing device as a smart key device.
  415. Grawrock,David W.; Sutton, II,James A., Validation of inclusion of a platform within a data center.
  416. Bennett,Steven M.; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael; Smith,Lawrence; Rodgers,Scott, Vectoring an interrupt or exception upon resuming operation of a virtual machine.
  417. Pinder Howard G. ; Palgon Michael S. ; Akins ; III Glendon L. ; Banker Robert O., Verification of the source of program information in a conditional access system.
  418. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Video slice and active region based multiple partial encryption.
  419. Knauerhase, Robert C.; Tewari, Vijay, Virtual machine management using processor state information.
  420. Knauerhase,Robert C.; Tewari,Vijay, Virtual machine management using processor state information.
  421. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Virtual translation lookaside buffer.
  422. Davis Derek L., Virus-resistent mechanism for transaction verification to confirming user.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로