$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Apparatus and method for authenticating transmitting applications in an interactive TV system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
출원번호 US-0499280 (1995-07-07)
발명자 / 주소
  • Rohatgi Pankaj (Sunnyvale CA) Dureau Vincent (Vemas CA)
출원인 / 주소
  • Thomson Consumer Electronics, Inc. (Indianapolis IN 02)
인용정보 피인용 횟수 : 206  인용 특허 : 18

초록

An executable interactive program is combined with audio/video data for transmission. The program is divided into modules, similar to computer files, and a Directory Module is created which links program modules. Security for the executable application is provided by attaching a signed certificate t

대표청구항

Apparatus for receiving an executable application transmitted in modules including a Directory Module containing information about further modules, said Directory Module having at least an encrypted hash value over the Directory Module and an encrypted certificate appended, which certificate include

이 특허에 인용된 특허 (18)

  1. Kawamura Shinichi (Kanagawa JPX) Shimbo Atsushi (Tiba JPX), Cryptographic communication method and cryptographic communication device.
  2. Kravitz David W. (Owings Mills MD), Digital signature algorithm.
  3. Shanton M. Greg (Fairfax VA), Distributed cryptographic object method.
  4. Morales Fernando (Reston VA), Interactive satellite broadcast network.
  5. Matsumoto Hiroshi (Sagamihara JPX) Takaragi Kazuo (Ebina JPX) Fukuzawa Yasuko (Sagamihara JPX), Limited broadcast system.
  6. Guillou Louis C. (Rennes FRX) Quisquater Jean-Jacques (Brussels BEX), Method and apparatus for authenticating accreditations and for authenticating and signing messages.
  7. Kingdon Kevin (Orem UT), Method and apparatus for authentication of client server communication.
  8. Massey James L. (Zurich CA CHX) Omura Jimmy K. (Culver City CA), Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission.
  9. Austin Jeffrey R. (Hindhead GB2), Method and system for authentication.
  10. Schnorr Claus P. (Frankfurterstr. 81 6350 Bad Nauheim DEX), Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system.
  11. Wasilewski Anthony J. (Alpharetta GA), Methods for providing conditional access information to decoders in a packet-based multiplexed communications system.
  12. Attanasio Clement Richard (Peekskill NY) Belady Laszlo Antal (Yorktown Heights NY), Operating system authenticator.
  13. Fischer Addison M. (60 14th Ave. S. Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  14. Pastor Jose (Westport CT), Reliable document authentication system.
  15. Khurana Subash (31727 Mulholland Hwy. Granada Hills CA) Semler Ronald H. (31727 Mulholland Hwy. Malibu CA 90265), Secure communication system.
  16. Follendore ; III Roy D. (Manassas VA), Secure network method and apparatus.
  17. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  18. Broder Andrei Z. (Mountain View CA) Karlin Anna R. (Stanford CA), System with a plurality of hash tables each using different adaptive hashing functions.

이 특허를 인용한 특허 (206)

  1. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., Accessing protected content in a rights-management architecture.
  2. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  3. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  4. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  5. Paul Carl Kocher, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  6. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  7. Kocher,Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  8. Lee, Jung Hye, Apparatus for processing data of program guide.
  9. Pathakis Scott W. ; Lowry Dale A. ; Fletcher Samuel F., Application-level, persistent packeting apparatus and method.
  10. Glaum, Jeffery D.; Shell, Scott R.; Rogers, Andrew M.; Markley, Michael E.; Patel, Sachin C.; Tonkelowitz, Mark Scott; Plagge, Mark, Applying custom software image updates to non-volatile storage in a failsafe manner.
  11. Narin, Attila; DeMello, Marco A.; Yaacovi, Yoram; Alger, Jeffrey A.; Keely, Leroy B.; Silver, David Michael; Madonna, Christopher Robert Richard; Beezer, John; Hughes, Kathryn E., Architecture for an electronic shopping service integratable with a software application.
  12. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Malik,Prashant; Hughes,Kathryn E.; Byrum,Frank D., Asynchronous communication within a server arrangement.
  13. Kusudo, Tadao; Shiomi, Takakazu, Authenticated program execution method.
  14. Kusudo, Tadao; Shiomi, Takakazu, Authenticated program execution method.
  15. Asano, Tomoyuki; Ishibashi, Yoshihito; Shirai, Taizo; Akishita, Toru; Yoshimori, Masaharu; Tanaka, Makoto, Authentication and encryption utilizing command identifiers.
  16. Asano, Tomoyuki; Ishibashi, Yoshihito; Shirai, Taizo; Akishita, Toru; Yoshimori, Masaharu; Tanaka, Makoto, Authentication and encryption utilizing command identifiers.
  17. Parthasarathy,Srivatsan; Pratschner,Steven J.; Sinclair,Craig T., Binding by hash.
  18. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Client-server based interactive guide with server recording.
  19. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Client-server based interactive guide with server recording.
  20. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Client-server based interactive guide with server recording.
  21. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Client-server based interactive guide with server recording.
  22. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Client-server based interactive guide with server storage.
  23. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Client-server based interactive television guide with server recording.
  24. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Client-server based interactive television guide with server recording.
  25. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Client-server based interactive television guide with server recording.
  26. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Client-server based interactive television program guide system with remote server recording.
  27. Ellis, Michael D.; Lemmons, Thomas R.; Thomas, William L., Client-server electronic program guide.
  28. Kaliski ; Jr. Burton S., Client/server protocol for proving authenticity.
  29. Kaliski ; Jr. Burton S., Client/server protocol for proving authenticity.
  30. Rohatgi, Pankaj, Commitments in signatures.
  31. Miyano, Michio, Communication controlling method, communication controlling system and communication controlling apparatus.
  32. Millard John, Computer file integrity verification.
  33. Eskicioglu,Ahmet Mursit; Wehmeyer,Keith Reynolds; Virag,David Emery, Conditional access system for set-top boxes.
  34. Glaum, Jeffrey D.; Rogers, Andrew M.; Tonkelowitz, Mark Scott, Creating file systems within a file in a storage technology-abstracted manner.
  35. Asano,Tomoyuki; Ishibashi,Yoshihito; Shirai,Taizo; Akishita,Toru, Data authentication system.
  36. Perlman,Radia J.; Hanna,Stephen R., Data authentication system employing encrypted integrity blocks.
  37. Rix, Simon Paul Ashley, Data communication system.
  38. Sallam,Ahmed, Detecting computer worms as they arrive at local computers through open network shares.
  39. Markley, Michael E.; Shell, Scott R.; Glaum, Jeffrey D., Determining a maximal set of dependent software updates valid for installation.
  40. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  41. Renaud Benjamin J., Digital signatures for data streams and data archives.
  42. Sallam,Ahmed, Duplicating handles of target processes without having debug privileges.
  43. Rohatgi, Pankaj, Efficient hybrid public key signature scheme.
  44. Patel,Sarvar; Ramzan,Zulfikar Amin, Efficient universal hashing method.
  45. Turner, Christopher Gordon Gervase; Kruger, Johan Dawid, Electronic identification system and method with source authenticity.
  46. Turner, Christopher Gordon Gervase; Kruger, Johan Dawid, Electronic identification system and method with source authenticity.
  47. Turner,Christopher Gordon Gervase; Kruger,Johan Dawid, Electronic identification system and method with source authenticity.
  48. Turner, Christopher Gordon Gervase; Kruger, Johan Dawid, Electronic identification system and method with source authenticity verification.
  49. Boyer, Frankin E; Demers, Timothy B; Blackwell, Bruce A, Electronic mail reminder for an internet television program guide.
  50. Herrington, W. Benjamin; Ellis, Michael D., Electronic program guide with related-program search feature.
  51. Knee, Robert Alan; Favia, Anthony R.; Davis, Bruce; Miller, Larry, Electronic television program guide schedule system and method with data feed access.
  52. Takura, Akira; Ono, Satoshi, Folder type time stamping system and distributed time stamping system.
  53. Madoukh,Ashraf; Vasic,Ognjen; Ansari,Suhail; Khulusi,Bassam; Hu,Jinhui, Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data.
  54. Vasic, Ognjen; Ansari, Suhail; Gan, Ping; Hu, Jinhui; Khulusi, Bassam; Madoukh, Adam A.; Tyshlek, Alexander, Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data.
  55. Iwamura, Keiichi; Murakami, Tomochika; Wakao, Satoru, Information processing apparatus, information processing system, information processing method, storage medium and program.
  56. Iwamura,Keiichi; Murakami,Tomochika; Wakao,Satoru, Information processing apparatus, information processing system, information processing method, storage medium and program.
  57. DeMello, Marco A.; Zeman, Pavel; Krishnaswamy, Vinay; Byrum, Frank D., Inter-server communication using request with encrypted parameter.
  58. Schein, Steven M.; O'Brien, Sean A.; Klosterman, Brian L.; Milnes, Kenneth A., Interactive computer system for providing television schedule information.
  59. Schein, Steven M.; O'Brien, Sean A.; Klosterman, Brian L.; Milnes, Kenneth A., Interactive computer system for providing television schedule information.
  60. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Interactive guide with recording.
  61. Ellis, Michael D.; Thomas, William L.; Hassell, Joel G.; Lemmons, Thomas R.; Berezowski, David M.; Knee, Robert A.; McCoy, Robert H., Interactive television program guide with remote access.
  62. Ellis, Michael D.; Thomas, William L.; Hassell, Joel G.; Lemmons, Thomas R.; Berezowski, David M.; Knee, Robert A.; McCoy, Robert H., Interactive television program guide with remote access.
  63. Ellis, Michael D.; Thomas, William L.; Hassell, Joel G.; Lemmons, Thomas R.; Berezowski, David M.; Knee, Robert A.; McCoy, Robert H., Interactive television program guide with remote access.
  64. Ellis, Michael D., Interactive television systems with digital video recording and adjustable reminders.
  65. Ellis, Michael D., Interactive television systems with digital video recording and adjustable reminders.
  66. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  67. Boyer, Franklin E.; Demers, Timothy B.; Allison, Donald W.; Regouby, Mark A.; Williamson, Steven C.; Hensley, Joanna L.; Herrington, W. Benjamin; Reddy, Paul N., Internet television program guide system.
  68. Sallam, Ahmed S., Lightweight hooking mechanism for kernel level operations.
  69. Edery, Yigal Mordechai; Vered, Nimrod Itzhak; Kroll, David R.; Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  70. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  71. Touboul, Shlomo, Malicious mobile code runtime monitoring system and methods.
  72. Rao, Pradhan S.; Sloo, David H., Media content search results ranked by popularity.
  73. Hohberger, Clive P.; Tsirline, Boris Y., Method and apparatus for article authentication.
  74. Hohberger, Clive P.; Tsirline, Boris Y., Method and apparatus for article authentication.
  75. von Willich Manfred,ZAX ; Rix Simon Paul Ashley,ZAX, Method and apparatus for controlling the operation of a signal decoder in a broadcasting system.
  76. Arsenault,Robert G.; Rothaus,Robert J., Method and apparatus for determining a direct-to-home satellite receiver multi-switch type.
  77. Arsenault, Robert G., Method and apparatus for determining the configuration of connections associated with a satellite receiver/decoder.
  78. Kiehtreiber, Perry; Brouwer, Michael, Method and apparatus for incremental code signing.
  79. Kiehtreiber, Peter; Brouwer, Michael, Method and apparatus for incremental code signing.
  80. Graunke Gary L. ; Rozas Carlos V., Method and apparatus for integrity verification, authentication, and secure linkage of software modules.
  81. Finseth, Craig A.; Hsiao, Philip E.; Brown, Jeffrey A.; Arsenault, Robert G.; Leminh, Tam T., Method and apparatus for transmission receipt and display of advertisements.
  82. Finseth, Craig A.; Hsiao, Philip E.; Brown, Jeffrey A.; Arsenault, Robert G.; Leminh, Tam T., Method and apparatus for transmission, receipt and display of advertisements.
  83. Hill, Michael John; Sasselli, Marco; Nicolas, Christophe, Method and device for guaranteeing the integrity and authenticity of a set of data.
  84. Rodgers, Stephane; Dellow, Andrew; Chen, Iue-Shuenn; Chen, Xuemin; Walker, Carolyn, Method and system for allowing customer or third party testing of secure programmable code.
  85. Khader, Aslam; Harper, Jeffrey Todd; York, Halstead Winship, Method and system for authoring multiple application versions based on audience qualifiers.
  86. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  87. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  88. Klosterman, Brian Lee; Schein, Steven, Method and system for displaying advertisements in an electronic program guide.
  89. Klosterman, Brian Lee; Schein, Steven, Method and system for displaying advertisements in an electronic program guide.
  90. Daugaard, Kim, Method and system for ensuring connection of a module to an electronic apparatus.
  91. Kim Daugaard DK, Method and system for ensuring connection of a module to an electronic apparatus.
  92. DeMello, Marco A.; Yaacovi, Yoram; Zeman, Pavel, Method and system for limiting the use of user-specific software features.
  93. DeMello,Marco A.; Yaacovi,Yoram; Zeman,Pavel; Hughes,Kathryn E.; Byrum,Frank D., Method and system for limiting the use of user-specific software features.
  94. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  95. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  96. Delpuch, Alain; D'Orso, Gregory; Menand, Jean-Rene; Pierre, Ludovic; Szymanski, Steven, Method and system for suspending playing of media content while interacting with an associated interactive application.
  97. Khader, Aslam; Harper, Jeffrey Todd; York, Halstead Winship, Method for application authoring employing a child application template derived from a master application template.
  98. Khader, Aslam; Harper, Jeffrey Todd; York, Halstead Winship, Method for application authoring employing a pre-certified master application template.
  99. Kusudo, Tadao; Kawakami, Yoshio, Method for authenticating and executing a program.
  100. Kusudo, Tadao; Kawakami, Yoshio, Method for authenticating and executing a program.
  101. DeMello,Marco A.; Narin,Attila; Yaacovi,Yoram, Method for authenticating and securing integrated bookstore entries.
  102. Khader, Aslam; Harper, Jeffery Todd; York, Halstead Winship, Method for distributing a certified application employing a pre-certified master application template.
  103. Khader, Aslam; Harper, Jeffrey Todd; York, Halstead Winship, Method for distributing a certified application employing a pre-certified master application template.
  104. Rix,Simon Paul Ashley; Glasspool,Andrew; Davies,Donald Watts, Method for providing a secure communication between two devices and application of this method.
  105. Simon Paul Ashley Rix ZA; Andrew Glasspool GB; Donald Watts Davies GB, Method for providing a secure communication between two devices and application of this method.
  106. Tiernan James C. ; Bennett Christopher J., Method for universal messaging and multiplexing of video, audio, and data streams.
  107. Van Woerdekom, Antonie, Method for verifying the certification of a recording apparatus.
  108. Barve, Rakesh; Krishna, Ravi; Aravamudan, Murali, Method of and system for presenting enriched video viewing analytics.
  109. Sarfati, Jean-Claude; Meric, Jerome, Method of downloading of data to an MPEG receiver/decoder and MPEG transmission system for implementing the same.
  110. Ichiro Kohno JP; Junji Shiota JP; Hideki Kamada JP; Satoshi Kanemitsu JP; Yoshihiro Kawamura JP, Method of manufacturing ink-jet printer head.
  111. Rowse, Graham, Method of providing a radio service at a remote terminal.
  112. Newton, Philip Steven; Kelly, Declan Patrick; Tan, Jingwei; Shi, Jun; Gan, Liang, Method of transmitting interactive television.
  113. Pitsos,Errikos, Methods and system for providing a public key fingerprint list in a PK system.
  114. Nichols, Michael R., Methods and systems for performing actions based on location-based rules.
  115. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  116. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  117. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  118. Andrew Goodman ; Jean Rene Menand, Module manager for interactive television system.
  119. Goodman, Andrew; Menand, Jean Rene, Module manager for interactive television system.
  120. Sallam, Ahmed, Monitoring and controlling services.
  121. Wray, John C.; Miller, David J., Name transformation for a public key infrastructure (PKI).
  122. Farrugia, Augustin J.; Riendeau, Jean-Francois, Optimized integrity verification procedures.
  123. Farrugia, Augustin J.; Riendeau, Melanie, Optimized integrity verification procedures.
  124. Dureau, Vincent, Optional verification of interactive television content.
  125. Pierre, Ludovic; Dureau, Vincent; Delpuch, Alain, Playback of interactive programs.
  126. Pierre, Ludovic; Dureau, Vincent; Delpuch, Alain, Playback of interactive programs.
  127. Pierre, Ludovic; Dureau, Vincent; Delpuch, Alain, Playback of interactive programs.
  128. Nardone Joseph M. ; Shippy Keith L. ; Aucsmith David W., Policy based selective encryption of compressed video data.
  129. Marr, Michael David; Brender, Scott A., Portion-level in-memory module authentication.
  130. Oerting, Timothy J.; Lafornara, Philip J.; Oliver, Robert Ian; Brender, Scott A.; Marr, Michael David, Portion-level in-memory module authentication.
  131. Beun, Frédéric; Boudier, Laurence; Roque, Pierre; Tronel, Bruno, Process for matching a number N of reception terminals with a number M of conditional access control cards.
  132. Jurgen Zeller DE; Heinz Gerhauser DE, Process for sensing manipulations of digital information.
  133. Staring, Antonius A. M.; Epstein, Michael A.; Rosner, Martin, Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections.
  134. Staring,Antonius A. M.; Epstein,Michael A.; Rosner,Martin, Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections.
  135. Guo, Terry Qing; Neufeld, Nadav M.; Lau, Edwin K.; Wu, Haoyun, Reducing unicast session duration with restart TV.
  136. Sallam, Ahmed, Regulating remote registry access over a computer network.
  137. Hirata, Shinichi, Remote control of VCR with electronic mail.
  138. Hirata,Shinichi, Remote control of VCR with electronic mail.
  139. Sallam, Ahmed, Robustly regulating access to executable class registry entries.
  140. Hartmann,Al, Scan-on-read.
  141. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  142. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  143. Szymanski Steven ; Menand Jean Rene ; Dureau Vincent ; Chari Suresh N., Security model for interactive television applications.
  144. Chari Suresh N., Security model for sharing in interactive television applications.
  145. Cross, Brian D.; Markley, Michael E.; McNeill, Lorna Rebecca; Glaum, Jeffrey D.; Shell, Scott R., Self-describing software image update components.
  146. DeMello,Marco A.; Narin,Attila; Madonna,Christopher Robert Richard, Server controlled branding of client software deployed over computer networks.
  147. Field Scott ; Thomlinson Matthew W. ; Cooper Allan, Server verification of requesting clients.
  148. Prus, Bohdand; Lett, David B., Settop cable television control device and method including bootloader software and code version table for maintaining and updating settop receiver operating system software.
  149. Prus,Bohdan; Lett,David B., Settop cable television control device and method including bootloader software and code version table for maintaining and updating settop receiver operating system software.
  150. Parthasarathy,Srivatsan; Pratschner,Steven J.; Sinclair,Craig T., Shared names.
  151. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  152. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  153. Schneider, James P., String hashing using a number generator.
  154. Schneider, James P., String hashing using a random number generator.
  155. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  156. DeMello, Marco; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  157. DeMello,Marco A.; Krishnaswamy,Vinay; Manferdelli,John L., System and method for accessing protected content in a rights-management architecture.
  158. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy B.; Yaacovi,Yoram; Alger,Jeffrey H., System and method for activating a rendering device in a multi-level rights-management architecture.
  159. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy Bertrand; Yaacovi,Yoram; Alger,Jeffrey A., System and method for activating a rendering device in a multi-level rights-management architecture.
  160. DeMello, Marco A.; Narin, Attila; Setty, Venkateshaiah, System and method for client interaction in a multi-level rights-management architecture.
  161. Khulusi, Bassam; Vasic, Ognjen, System and method for dis-identifying sensitive information and associated records.
  162. Manferdelli,John L.; Marr,Michael David; Krishnaswamy,Vinay; Jakubowski,Mariusz H., System and method for interfacing a software process to secure repositories.
  163. Alexander, Ronald; Dias, Stephen; Hancock, Kenneth S.; Leung, Elsie Y.; Macrae, Douglas B.; Ng, Arthur Y.; O'Neil, Shawn P.; Shoaff, P. Christopher; Sutton, Jonathon; Ward, Thomas E.; Westberg, Thomas E.; Yuen, Henry C., System and method for modifying advertisement responsive to EPG information.
  164. Sheehan,Patrick M.; Cristofalo,Michael G., System and method for providing private in-band data to digital set-top boxes in a broadcast environment.
  165. Khandelwal,Rajesh B.; Li,Luyang; Chang,Chieh Chung, System and method for reducing fraud in a digital cable network.
  166. Arsenault, Robert G.; Leminh, Tam T., System and method for transmitting, receiving and displaying advertisements.
  167. Morad, Amir; Yavits, Leonid; Oxman, Gadi; Spektor, Evgeny; Khrapkovsky, Michael; Chernov, Gregory, System and method for video and audio encoding on a single chip.
  168. Schein, Steven M.; O'Brien, Sean A.; Leftwich, James Jay; Broughton, Susan, System and methods for linking television viewers with advertisers and broadcasters.
  169. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  170. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  171. Simon Paul Ashley Rix ZA; Andrew Augustine Wajs NL, System for broadcasting data signals in a secure manner.
  172. Willard, Pierre; Delpuch, Alain; Szymanski, Steven J., System for managing data in a distributed computing system.
  173. Rasanen, Kirsten; Bryant, Jay S., Systems and methods for acquiring, categorizing and delivering media in interactive media guidance applications.
  174. Schein, Steven M.; O'Brien, Sean A.; Leftwich, James Jay; Broughton, Susan, Systems and methods for linking television viewers with advertisers and broadcasters.
  175. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  176. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Systems and methods for multi-tuner recording.
  177. Westberg, Thomas E., Systems and methods for providing program suggestions in an interactive television program guide.
  178. Westberg, Thomas E., Systems and methods for providing program suggestions in an interactive television program guide.
  179. Thomas, William L.; Ellis, Michael D.; Easterbrook, Kevin B.; Reichardt, M. Scott; Knee, Robert A., Systems and methods for providing storage of data on servers in an on-demand media delivery system.
  180. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  181. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  182. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  183. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  184. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  185. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  186. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  187. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  188. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  189. Reynolds, Laurie, Systems and methods for updating media asset data based on pause point in the media asset.
  190. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  191. Howett, Paul, Systems and methods for variable video production, distribution and presentation.
  192. Howett, Paul, Systems and methods for variable video production, distribution and presentation.
  193. Howett, Paul, Systems and methods for variable video production, distribution and presentation.
  194. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  195. Salomaki Ari,FIX, Transmission of multimedia objects in a digital broadcasting system.
  196. Hirata,Shinichi, Transmitting/receiving apparatus and a transmitting/receiving method.
  197. Hirata,Shinichi, Transmitting/receiving apparatus and a transmitting/receiving method.
  198. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  199. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  200. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  201. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  202. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  203. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  204. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  205. Sallam, Ahmed, Using behavior blocking mobility tokens to facilitate distributed worm detection.
  206. Sallam,Ahmed, Using mobility tokens to observe malicious mobile code.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로