$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System for controlling the distribution and use of digital works

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0344042 (1994-11-23)
발명자 / 주소
  • Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA)
출원인 / 주소
  • Xerox Corporation (Stamford CT 02)
인용정보 피인용 횟수 : 1326  인용 특허 : 30

초록

A system for controlling use and distribution of digital works. In the present invention, the owner of a digital work attaches usage rights to that work. Usage rights are granted by the “owner”of a digital work to “buyers”of the digital work. The usage rights define how a digital work may be used an

대표청구항

A system for secure distribution and control of digital works between repositories comprising: means for creating usage rights, each instance of a usage right representing a specific instance of how a digital work may be used or distributed; means for attaching a created set of usage rights to a dig

이 특허에 인용된 특허 (30)

  1. Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
  2. Wiedemer John D. (930 W. Forest Dr. Houston TX 77079), Billing system for computer software.
  3. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Cryptographic identification, financial transaction, and credential device.
  4. Mita Makoto (Saitama JPX), Data management method and system with management table indicating right of use.
  5. Geffrotin Bernard (Meudon FRX), Data processing system comprising authentification means viz a viz a smart card, an electronic circuit for use in such s.
  6. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  7. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  8. Miyahara Gary K. (Rancho Palos Verdes CA), Efficient security kernel for the 80960 extended architecture.
  9. Elmer Thomas I. (Sunnyvale CA) Nguyen Tuan T. (Milpitas CA) Lin Rung-Pan (San Jose CA), Encryption of streams of addressed information to be used for program code protection.
  10. Wyman Robert M. (Kirkland WA), Filters in license management system.
  11. Sprague Peter J. (249 Undermountain Rd. Lenox MA 02140) Lipscomb Thomas H. (145 E. 74th St. New York NY 10021), Information distribution system.
  12. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
  13. Wyman Robert M. (Kirkland WA), License document interchange format for license management system.
  14. Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
  15. Johnson Donavon W. (Georgetown TX) Morgan Stephen P. (Mahopac NY) Smith Todd A. (Austin TX), Maintenance of file attributes in a distributed data processing system.
  16. Wyman Robert M. (Kirkland WA), Management interface for license management system.
  17. Katznelson Ron D. (San Diego CA), Metering retrieval of encrypted data stored in customer data retrieval terminal.
  18. Chou Wayne W. (25 Hauley Pl. Ridgefield CT 06877) Erett Richard E. (78 White Birch La. Stamford CT 06905), Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded.
  19. Janis Frederick L. (Keller TX), Method and system for providing user access control within a distributed data processing system by the exchange of acces.
  20. Elliott John C. (Summit NJ) O\Connell James A. (Short Hills NJ) Ladouceur Lawrence (Scarsdale NY) Altman William (Lower Paxton PA) Jarett Keith (Oakland CA), Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer.
  21. Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
  22. Yamazaki Shunpei (Tokyo JPX) Hamatani Toshiji (Atsugi JPX), Paperless portable book.
  23. Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak Rostislaw (Dumfries VA) Wilkins John D. (Somerville VA), Secure cryptographic operations using control vectors generated inside a cryptographic facility.
  24. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  25. Ryder ; Sr. John H. (Durham NC) Smith Susanna R. (Tampa FL), Self-verifying receipt and acceptance system for electronically delivered data objects.
  26. Eisele Raymund H. (Idstein DEX), Smart data storage device.
  27. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  28. Robert Gregory (Nashua NH) Chase David (Wellesley MA) Schaefer Ronald (Acton MA), Software licensing management system.
  29. Le Roux Jean-Yves (Bouc Bel Air FRX), System of payment or information transfer by money card with electronic memory.
  30. Edwards ; Jr. Gordon L. (Easley SC), System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of prote.

이 특허를 인용한 특허 (1326)

  1. Biswas, Sanjeev Kumar; Ekka, Pradeep Cyril; Ranjan, Suraj; Kamate, Vikas, Access to protected content based on license hierarchy.
  2. Yamagata,Junichi; Kunieda,Takayuki; Wakita,Yuki, Access usage data storing and transmitting program and storage medium.
  3. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., Accessing protected content in a rights-management architecture.
  4. Stringer, Mark; Soutloglou, Elisabeth; Smetters, Diana K., Ad hoc secure access to documents and services.
  5. Hoffberg, Steven M., Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore.
  6. Lim, Keng, Analyzing activity data of an information management system.
  7. Lim, Keng, Analyzing activity data of an information management system.
  8. Lim, Keng, Analyzing usage information of an information management system.
  9. Lim, Keng, Analyzing usage information of an information management system.
  10. Lim, Keng, Analyzing usage information of an information management system.
  11. Ronning,Joel A.; Wical,Kelly J., Apparatus and method for adaptive fraud screening for electronic commerce transactions.
  12. Katz, Donald R.; Lau, Edwin J.; Mott, Timothy; Brenneman, Scott A.; Jun, Benjamin Che-Ming; Pai, Samuel Hong-Yen, Apparatus and method for authoring and maintaining a library of content and targeting content to a playback device.
  13. Ito, Satoshi; Aisu, Hideyuki; Kamibayashi, Tooru; Akiyama, Koichiro; Hamada, Shinichiro, Apparatus and method for digital content editing.
  14. Nagano,Tomoaki; Yoshii,Junichi, Apparatus and method for editing and selling creature data.
  15. Malone, Michael F., Apparatus and method for embedding searchable information into a file for transmission, storage and retrieval.
  16. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information into a file for transmission, storage and retrieval.
  17. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information into a file, encryption, transmission, storage and retrieval.
  18. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval.
  19. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval.
  20. Poltorak, Alexander I., Apparatus and method for facilitating a purchase using information provided on a media playing device.
  21. Poltorak, Alexander I., Apparatus and method for facilitating a purchase using information provided on a media playing device.
  22. Jeong, Jae Yoon, Apparatus and method for moving contents after mutual authentication.
  23. Jeong, Jae Yoon, Apparatus and method for moving contents having a restricted number of copies between storage media.
  24. Jeong, Jae Yoon, Apparatus and method for moving contents having a restricted number of copies between storage media.
  25. Aisu, Hideyuki; Ito, Satoshi, Apparatus and method for playback of digital content.
  26. Poltorak, Alexander I., Apparatus and method for providing information in conjunction with media content.
  27. Ronning, Joel A.; Wical, Kelly J., Apparatus and method for secure downloading of files.
  28. Malone, Michael F.; Murphy, Frederick J., Apparatus and method to embed searchable information into a file, encryption, transmission, storage and retrieval.
  29. Rhoads, Geoffrey B., Apparatus and methods to process video or audio.
  30. Oshima,Mitsuaki; Gotoh,Yoshiho; Tanaka,Shinichi; Koishi,Kenji; Moriya,Mitsurou; Takemura,Yoshinari, Apparatus for encrypting and recording received content information on a recording medium using both medium identification information and a cipher key for encryption.
  31. Malone, Michael F., Apparatus for personal voice assistant, location services, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatag(s)/ contextual tag(s), storage and search retrieval.
  32. Malone, Michael F., Apparatus for voice assistant, location tagging, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatags/contextual tags, storage and search retrieval.
  33. Ishii, Kenji, Apparatus with electronic information transfer function or the like, program for electronic information transfer, and method for electronic information transfer.
  34. Tolson, Michael; Arnulfo, Jean-Christophe; Rive, Brice, Architecture for a system of portable information agents.
  35. Tolson, Michael; Arnulfo, Jean-Christophe; Rive, Brice, Architecture for a system of portable information agents.
  36. Tolson,Michael; Arnulfo,Jean Christophe; Rive,Brice, Architecture for a system of portable information agents.
  37. Narin, Attila; DeMello, Marco A.; Yaacovi, Yoram; Alger, Jeffrey A.; Keely, Leroy B.; Silver, David Michael; Madonna, Christopher Robert Richard; Beezer, John; Hughes, Kathryn E., Architecture for an electronic shopping service integratable with a software application.
  38. Lim, Keng, Associating code to a target through code inspection.
  39. Rhoads, Geoffrey B., Associating data with media signals in media signal systems through auxiliary data steganographically embedded in the media signals.
  40. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  41. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  42. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  43. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Malik,Prashant; Hughes,Kathryn E.; Byrum,Frank D., Asynchronous communication within a server arrangement.
  44. Siegel, Jaime A.; Mitomo, Toshimoto, Audio and video digital content delivery.
  45. Rhoads, Geoffrey B., Audio and video signal processing.
  46. Rhoads, Geoffrey B., Audio appliance and monitoring device responsive to watermark data.
  47. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  48. Rhoads Geoffrey B., Audio or video steganography.
  49. Rhoads Geoffrey B., Audio steganography.
  50. Rhoads, Geoffrey B., Audio steganography.
  51. Rhoads, Geoffrey B., Audio watermarking to convey auxiliary control information, and media embodying same.
  52. Rhoads,Geoffrey B., Audio watermarking to convey auxiliary information, and media embodying same.
  53. Rhoads, Geoffrey B., Audio with hidden in-band digital data.
  54. Rhoads Geoffrey B., Audio- and graphics-based linking to internet.
  55. Carr, J. Scott; Perry, Burt W., Authenticating objects using embedded data.
  56. Novicov Aleksey ; Rivlin John Michael ; Conboy Garth ; Sachs James, Authentication for information exchange over a communication network.
  57. Perry, Burt W., Authentication watermarks for printed objects and related applications.
  58. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Mangione-Smith, William H.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Authorization for media content alteration.
  59. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Automated system for management of licensed software.
  60. Ben-Yaacov, Yaacov; Ben-Yaacov, Boaz, Automatic digital music library builder.
  61. Su, Chung-Tsai; Tsao, Wen-Kwang; Wu, Chung-Chi; Chang, Ming-Tai; Cheng, Yun-Chian, Automatic local detection of computer security threats.
  62. Lawler Frank A., Automatically associating archived multimedia content with current textual content.
  63. Lawler Frank A., Automatically associating archived multimedia content with current textual content.
  64. Aydar, Ali; Mendelson, Jordan; Fanning, Shawn, Batch loading and self-registration of digital media files.
  65. Martin,Tobias; Schwenk,Joerg, Billing method using SSL/TLS.
  66. Peinado, Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  67. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  68. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  69. Peinado, Marcus, Binding a digital license to a portable or the like in a digital rights management (DMR) system and checking out/checking in the digital license to/from the portable device or the like.
  70. Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding content to a portable storage device or the like in a digital rights management (DRM) system.
  71. Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding digital content to a portable storage device or the like in a digital rights management (DRM) system.
  72. Giobbi, John J., Biometric personal data key (PDK) authentication.
  73. Giobbi, John J., Biometric personal data key (PDK) authentication.
  74. Giobbi, John J., Biometric personal data key (PDK) authentication.
  75. Walker, Jay S.; Jorasch, James A.; Tedesco, Robert C., Budget-defined flat rate play contract parameters.
  76. Johnson, Jerry Alan; Fowler, J. Clinton Paul; Hook, Jerry P.; Krishnamoorthy, Shyam, Buy once play anywhere.
  77. Tarpenning, Marc; Kavanah, Ben; Slesinsky, Brian, Certificate handling for digital rights management system.
  78. Geer ; Jr. Daniel E. ; Tumblin Henry R., Certifying authorization in computer networks.
  79. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Client-server based interactive guide with server recording.
  80. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Client-server based interactive guide with server recording.
  81. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Client-server based interactive guide with server recording.
  82. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Client-server based interactive guide with server recording.
  83. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Client-server based interactive guide with server storage.
  84. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Client-server based interactive television guide with server recording.
  85. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Client-server based interactive television guide with server recording.
  86. Hitchen, Stephen M.; Battersby, Paul, Collaborative file access management system.
  87. Braitberg, Michael F.; Volk, Steven B.; Zaharris, Daniel R.; Davies, David H., Combination mastered and writeable medium and use in electronic internet appliance.
  88. Gauthier, Patrick; Hammad, Ayman; Merckling, Roger, Compact protocol and solution for substantially offline messaging between portable consumer device and base device.
  89. Gauthier, Patrick; Hammad, Ayman; Merckling, Roger, Compact protocol and solution for substantially offline messaging between portable consumer device and base device.
  90. Gauthier, Patrick; Hammad, Ayman; Merckling, Roger, Compact protocol and solution for substantially offline messaging between portable consumer device and base device.
  91. Gauthier, Patrick; Hammad, Ayman; Merckling, Roger, Compact protocol and solution for substantially offline messaging between portable consumer device and base device.
  92. Gauthier, Patrick; Hammad, Ayman; Merckling, Roger, Compact protocol and solution for substantially offline messaging between portable consumer device and base device.
  93. Gauthier,Patrick; Hammad,Ayman; Merckling,Roger, Compact protocol and solution for substantially offline messaging between portable consumer device and base device.
  94. Gauthier, Patrick; Hammad, Ayman; Merckling, Roger, Compact protocol and solution for substantially offline messaging between portable consumer device and based device.
  95. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  96. Geoffrey B. Rhoads, Computer linking methods using encoded graphics.
  97. Leser, Norbert; Kyne, Fajen; Morgan, Robert; Barclay, Christopher B.; Gaudet, Edward J.; Schoonmaker, James; Epstein, Arnold S.; Smith, Michael D., Computer method and apparatus for managing data objects in a distributed context.
  98. Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
  99. Rhoads Geoffrey B., Computer system linked by using information in data objects.
  100. Rhoads, Geoffrey, Computer system linked by using information in data objects.
  101. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  102. Gobbi, John J.; Kelly, Bryan; Brown, David L.; Hirt, Fred S., Configuration of interfaces for a location detection system and application.
  103. Levy,Kenneth L.; Rhoads,Geoffrey B., Connected audio and other media objects.
  104. Levy, Kenneth L.; Rhoads, Geoffrey B., Connected audio content.
  105. Geoffrey B. Rhoads, Consumer audio appliance responsive to watermark data.
  106. Stebbings, David W., Content authorization system over networks including searching and reporting for unauthorized content locations.
  107. Stebbings, David W., Content authorization system over networks including searching and reporting for unauthorized use.
  108. Stebbings,David W., Content authorization system over networks including the Internet and method for transmitting same.
  109. Rhoads, Geoffrey B., Content containing a steganographically encoded process identifier.
  110. Blumenau, Trevor, Content display monitor.
  111. Blumenau, Trevor, Content display monitor.
  112. Blumenau, Trevor, Content display monitor.
  113. Blumenau, Trevor, Content display monitor.
  114. Blumenau, Trevor, Content display monitor.
  115. Blumenau, Trevor, Content display monitor.
  116. Blumenau, Trevor, Content display monitor.
  117. Blumenau, Trevor, Content display monitor.
  118. Blumenau, Trevor, Content display monitor.
  119. Blumenau, Trevor, Content display monitor.
  120. Blumenau, Trevor, Content display monitor.
  121. Blumenau, Trevor, Content display monitor.
  122. Braitberg,Michael F.; Volk,Steven B., Content distribution method and apparatus.
  123. Shimoji, Tatsuya; Kagemoto, Hideki; Dewa, Yoshiharu; Kitazato, Naohisa; Katayama, Yasushi, Content distribution system and content license management method.
  124. Matsuyama,Shinako; Ishibashi,Yoshihito; Futamura,Ichiro; Kon,Masashi; Watanabe,Hideaki, Content distribution system authenticating a user based on an identification certificate identified in a secure container.
  125. Hannigan, Brett T.; McKinley, Tyler J., Content identification and electronic tickets, coupons and credits.
  126. Hannigan, Brett T.; McKinley, Tyler J., Content identification and electronic tickets, coupons and credits.
  127. Levy, Kenneth L., Content identification, personal domain, copyright notification, metadata and e-Commerce.
  128. Diamond, Michael B.; White, Jonathan B., Content keys for authorizing access to content.
  129. Miura,Koji; Walter,Stefan; Yamamoto,Masaya, Content management system, content management terminal, usage rule management server, content management method, and content management program.
  130. Brock, James L.; Pitkow, James E., Content monitoring and host compliance evaluation.
  131. Brock, James L.; Pitkow, James E., Content monitoring and host compliance evaluation.
  132. Schnell, Patrik; Strom, Clifford P.; Oney, Adrian J; Beaubien, Mark L.; Dubhashi, Kedarnath A.; Grigorovitch, Alexandre V.; Paka, Anand; Randhawa, Satvir, Content preview.
  133. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  134. Stefik,Mark J., Content rendering device with usage rights.
  135. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  136. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  137. Yoshioka Makoto,JPX ; Tsunoda Haruhiko,JPX ; Hasegawa Kazuharu,JPX ; Aoe Hidefumi,JPX, Content sales price accounting system and accounting method thereof.
  138. Levy, Kenneth L.; Stager, Reed R.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Content sensitive connected content.
  139. Diamond, Michael B.; White, Jonathan B., Content server and method of providing content therefrom.
  140. Diamond, Michael B.; White, Jonathan B., Content server and method of storing content.
  141. Tohgi,Yutaka; Sadakata,Toshihisa; Gregson,Gary, Content supply method and apparatus.
  142. Ishibashi,Yoshihito; Matsuyama,Shinako; Watanabe,Hideaki; Futamura,Ichiro; Kon,Masashi, Content transaction system and method, and program providing medium therefor.
  143. Matsufune, Isao, Content transmission apparatus.
  144. Hatakeyama, Takahisa; Yoshioka, Makoto; Miyazawa, Yuji, Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method.
  145. Kugai,Masami, Content utilizing method.
  146. Kimura, Tomoko; Okayama, Nobuya; Koike, Hiroshi; Namioka, Miyoko, Contents sales method and cyber mall system using such method and storage medium storing therein its contents sales program.
  147. Kimura,Tomoko; Okayama,Nobuya; Koike,Hiroshi; Namioka,Miyoko, Contents sales method and cyber mall system using such method and storage medium storing therein its contents sales program.
  148. Levy, Kenneth L.; Rhoads, Geoffrey B.; Stager, Reed R.; Rodriguez, Tony F., Context sensitive connected content.
  149. Rhoads, Geoffrey B., Controlling a device based upon steganographically encoded data.
  150. Geoffrey B. Rhoads ; Bruce L. Davis ; J. Scott Carr, Controlling operation of a device using a re-configurable watermark detector.
  151. Newman, Peter Alfred, Controlling the downloading and recording of digital data.
  152. Newman,Peter Alfred, Controlling the downloading and recording of digital data.
  153. Rhoads, Geoffrey B., Controlling use of audio or image content.
  154. Rhoads, Geoffrey B., Controlling use of audio or image content.
  155. Park, Tae Joon, Copy prevention method and apparatus for digital video system.
  156. Park, Tae Joon, Copy prevention method and apparatus for digital video system.
  157. Park, Tae Joon, Copy prevention method and apparatus for digital video system.
  158. Park, Tae Joon, Copy prevention method and apparatus for digital video system.
  159. Park, Tae Joon, Copy prevention method and apparatus for digital video system.
  160. Park, Tae Joon, Copy prevention method and apparatus of a digital recording/reproducing system.
  161. Park, Tae Joon, Copy prevention method and apparatus of a digital recording/reproducing system.
  162. Nguyen Thu N., Copy-protection for laptop PC by disabling TV-out while viewing protected video on PC display.
  163. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  164. Brock, James L.; Pitkow, James E., Customized handling of copied content based on owner-specified similarity thresholds.
  165. Susumu Ibaraki JP; Noboru Katta JP, Data control method, for embedding data control information, method for detecting data control information, device for embedding data control information and device for recording data.
  166. Makoto Saito JP; Shoichi Okazaki JP, Data copyright management system.
  167. Nonaka, Akira, Data distribution system and method of same, data processing apparatus and method of same, and data recording medium.
  168. Rhoads,Geoffrey B.; Gustafson,Ammon E., Data encoding using frail watermarks.
  169. Smeets,Ben, Data integrity mechanisms for static and dynamic data.
  170. Nonaka, Akira; Ezaki, Tadashi, Data processing apparatus, data processing system, and data processing method therefor.
  171. Moskowitz, Scott A., Data protection method and device.
  172. Moskowitz, Scott A., Data protection method and device.
  173. Moskowitz, Scott A., Data protection method and device.
  174. Moskowitz, Scott A., Data protection method and device.
  175. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  176. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  177. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  178. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  179. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  180. MacKay,Michael K.; Sibert,W. Olin; Landsman,Richard A.; Swenson,Eric J.; Hunt,William, Data protection systems and methods.
  181. Mattsson, Ulf, Data security in a disconnected environment.
  182. Mattsson, Ulf, Data security in a disconnected environment.
  183. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  184. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  185. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark proxy.
  186. Patterson, Patrick E., Delivering electronic content.
  187. Patterson, Patrick E., Delivering electronic content.
  188. Patterson, Patrick E., Delivering electronic content.
  189. Patterson,Patrick E., Delivering electronic content.
  190. Patterson,Patrick E., Delivering electronic content.
  191. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  192. Lim, Keng, Deploying policies and allowing off-line policy evaluations.
  193. Lim, Keng, Deploying policies and allowing off-line policy evaluations.
  194. Lim, Keng, Deploying policies and allowing offline policy evaluation.
  195. de Vries, Jeffrey; Hitomi, Arthur S., Deriving component statistics for a stream enabled application.
  196. de Vries, Jeffrey; Hitomi, Arthur Shingen, Deriving component statistics for a stream enabled application.
  197. Levy, Kenneth L.; Meyer, Joel R., Deriving multiple fingerprints from audio or video content.
  198. Lim, Keng, Detecting behavioral patterns and anomalies using activity data.
  199. Lim, Keng, Detecting behavioral patterns and anomalies using activity data.
  200. Lim, Keng, Detecting behavioral patterns and anomalies using activity data.
  201. Lim, Keng, Detecting behavioral patterns and anomalies using activity profiles.
  202. Lim, Keng, Detecting behavioral patterns and anomalies using activity profiles.
  203. Lim, Keng, Detecting behavioral patterns and anomalies using information usage data.
  204. Rhoads, Geoffrey B., Detecting embedded signals in media content using coincidence metrics.
  205. Reed, Alastair M.; Brundage, Trent J.; Cattone, Jeremy, Detecting information hidden out-of-phase in color channels.
  206. Hoffberg, Steven M., Detection and alert of automobile braking event.
  207. Brock, James L.; Pitkow, James E., Determination of copied content, including attribution.
  208. Brock, James L.; Pitkow, James E., Determination of originality of content.
  209. Geoffrey B. Rhoads ; Ravi K. Sharma, Determining transformations of media signals with embedded code signals.
  210. Takehisa Kato JP, Device and method for preventing fraudulent copies of data containing encrypted copy-management information and recording medium.
  211. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  212. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  213. Jones,Kevin C.; Aggson,Cynthia K.; Rodriguez,Tony F.; Mosher,Brian; Levy,Kenneth L.; Hiatt,R. Stephen; Rhoads,Geoffrey B., Digital asset management and linking media signals with related data using watermarks.
  214. Yamada,Masahiro; Sakamoto,Noriya; Hirota,Atsushi, Digital broadcast transmitter, receiver and method of receiving thereof.
  215. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  216. Saw, Chit Wei; Ilnicki, Slawomir K.; van den Branden Lambrecht, Christian J.; Farrell, Joyce E; Herley, Cormac; Mas Ribes, Joan Maria, Digital content distribution systems.
  217. Jones, Thomas C.; Brackenridge, Billy, Digital content distribution, transmission and protection system and method, and portable device for use therewith.
  218. Schnell, Patrik; Grigorovitch, Alexandre V.; Alkove, James M., Digital content packaging, licensing and consumption.
  219. Giobbi, John J., Digital content security system.
  220. Giobbi,John J., Digital content security system.
  221. Giobbi,John J., Digital content security system.
  222. Miyazaki, Kazuya; Nakajima, Harumitsu; Nakakawaji, Tetsuo, Digital contents distribution system capable of flexibly changing using conditions.
  223. Aoki, Masakatsu; Tsutsuguchi, Ken; Watanabe, Yasuhiko; Sonehara, Noboru, Digital contents editing method and apparatus thereof.
  224. Borrowman,Colin D., Digital file management and imaging system and method including secure file marking.
  225. Katz, Donald R.; Lau, Edwin J.; Mott, Timothy; Brenneman, Scott A.; Jun, Benjamin Che-Ming; Pai, Samuel Hong-Yen, Digital information library and delivery system with logic for generating files targeting a playback device.
  226. Okamoto, Hiroo; Owashi, Hitoaki; Yoshioka, Atsushi, Digital information recording apparatus, reproducing apparatus and transmitting apparatus.
  227. Okamoto, Hiroo; Owashi, Hitoaki; Yoshioka, Atsushi, Digital information recording apparatus, reproducing apparatus and transmitting apparatus.
  228. Peinado,Marcus; Abburi,Rajasekhar; England,Paul; Ganesan,Krishnamurthy; Bell,Jeffrey R. C.; Blinn,Arnold N.; Jones,Thomas C., Digital license and method for obtaining/providing a digital license.
  229. Atkinson, Bob; LaMacchia, Brian A.; DeTreville, John; Paramasivam, Muthukrishnan; Wang, Xin; DeMartini, Thomas, Digital licenses that include universally quantified variables.
  230. Rolf, Devon A., Digital media distribution system.
  231. Rolf, Devon A., Digital media distribution system and method.
  232. Sesma Jimmy L., Digital product execution control.
  233. Neville Eugene A. ; Sesma Jimmy L., Digital product execution control and security.
  234. Giobbi,John J., Digital rights management.
  235. Lambert, Martin Richard, Digital rights management.
  236. Lambert,Martin R., Digital rights management.
  237. Read, Christopher Jensen, Digital rights management dongle.
  238. Boccon-Gibod, Gilles; Boeuf, Julien G., Digital rights management engine systems and methods.
  239. Boccon-Gibod, Gilles; Boeuf, Julien G., Digital rights management engine systems and methods.
  240. Boccon-Gibod, Gilles; Boeuf, Julien G.; Manente, Michael G.; Bradley, William B., Digital rights management engine systems and methods.
  241. Hug, Joshua D.; Hefta-Gaub, Bradley D., Digital rights management for content rendering on playback devices.
  242. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  243. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  244. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  245. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  246. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  247. Cho, Hyun Wook; Park, Dae Gyue, Digital rights management method and digital rights management-enabled mobile device.
  248. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  249. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  250. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  251. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  252. Gimenez, Galo, Digital rights management printing system.
  253. Yun, Dai; Masue, Toshiyuki; Hirai, Tatsuya, Digital rights management system.
  254. Yun, Dai; Masue, Toshiyuki; Hirai, Tatsuya, Digital rights management system.
  255. Peinado, Marcus; Liu, Donna; Ganesan, Krishnamurthy, Digital rights management system operating on computing device and having black box tied to computing device.
  256. Houston, John, Digital rights management systems and methods for audience measurement.
  257. Rhoads, Geoffrey B., Digital watermark decoding method.
  258. Rhoads, Geoffrey B.; Sharma, Ravi K., Digital watermark screening and detection strategies.
  259. Levy, Kenneth L., Digital watermarking and fingerprinting applications for copy protection.
  260. Brundage,Trent J.; Rodriguez,Tony F.; Hannigan,Brett T., Digital watermarking apparatus and methods.
  261. Rhoads,Geoffrey B.; Brundage,Trent J.; Rodreguez,Tony F.; Hannigan,Brett T.; Ellingson,Eric E., Digital watermarking apparatus and methods.
  262. Lofgren,Neil; Seder,Phillip Andrew; MacIntosh,Brian T., Digital watermarking systems.
  263. Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  264. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  265. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  266. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  267. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  268. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  269. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  270. Davis, Bruce L.; Rhoads, Geoffrey B., Digitally marked objects and promotional methods.
  271. Ripley, Michael S.; Lotspiech, Jeffrey B., Discouraging unauthorized redistribution of protected content by cryptographically binding the content to individual authorized recipients.
  272. Kawell, Jr., Leonard M.; Diaz, Thomas R.; Heinen, Mary Ellen; Heinen, Jr., Roger J., Distributing access to a data item.
  273. Kawell, Jr., Leonard M.; Diaz, Thomas R.; Heinen, Mary Ellen; Heinen, Jr., Roger J., Distributing access to a data item.
  274. Kawell, Jr.,Leonard M.; Diaz,Thomas R.; Heinen,Mary Ellen; Heinen, Jr.,Roger J., Distributing access to a data item.
  275. Allaire, Jeremy; Mason, Robert, Distribution of content.
  276. Allaire, Jeremy; Mason, Robert, Distribution of content.
  277. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  278. Gupta,Dipankar, Document transfer systems.
  279. Brady Duga ; Andrew Marder ; Garth Conboy, Dynamic conversion of byte ordering for use on different processor platforms.
  280. Steinder, Malgorzata; Whalley, Ian Nicholas, Dynamic placement of heterogeneous workloads.
  281. Walter Erik ; Wotiz Richard ; Conboy Garth ; Sachs James, Efficient information exchange between an electronic book and a cartridge.
  282. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  283. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  284. Ronning,Joel A.; Wical,Kelly J., Electronic commerce system and method for detecting fraud.
  285. Palaniappan, Murugappan, Electronic fulfillment system for distributing digital goods.
  286. Shaw David E. ; Ardai Charles E. ; Marsh Brian D. ; Moraes Mark A. ; Rudolph Dana B. ; Mc Auliffe Jon D., Electronic mail system with advertising.
  287. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution system.
  288. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution system.
  289. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution system.
  290. Manning,Damian Franken; Lowy,Jon Walter, Electronic media distribution system.
  291. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution systems.
  292. Galuten, Albhy; Radbel, Dmitry; Williams, Peter, Electronic music/media distribution system.
  293. Galuten,Albhy; Radbel,Dmitry; Williams,Peter, Electronic music/media distribution system.
  294. Johnson Woodrow W. ; Atkins Christine J. ; Yoh Jon, Electronic rights management and authorization system.
  295. Johnson, Woodrow W.; Atkins, Christine J.; Yoh, Jon A.; Parece, Thomas M., Electronic rights management and authorization system.
  296. Johnson, Woodrow W.; Atkins, Christine J.; Yoh, Jon A.; Parece, Thomas M., Electronic rights management and authorization system.
  297. Prakken, Randy L.; Corrigan, John; Widener, Glenn F., Embedded license data file distribution and processing system.
  298. Davis,Bruce L.; Rhoads,Geoffrey B., Embedding and reading imperceptible codes on objects.
  299. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  300. Miller,Marc D.; Hawes,Jonathan L., Embedding watermark components during separate printing stages.
  301. Geoffrey B. Rhoads, Emulsion film media employing steganography.
  302. Rhoads, Geoffrey B., Emulsion products and imagery employing steganography.
  303. Daniel E. Geer, Jr. ; Henry R. Tumblin, Enabling business transactions in computer networks.
  304. Geer ; Jr. Daniel E. ; Tumblin Henry R. ; Solomon Eliot M., Enabling business transactions in computer networks.
  305. Sharma, Ravi K.; Stach, John, Encoding and decoding auxiliary signals.
  306. Sharma, Ravi K.; Stach, John, Encoding and decoding auxiliary signals.
  307. Rhoads, Geoffrey B., Encoding and decoding media signals.
  308. Sharma,Ravi K.; Stach,John, Encoding and decoding signals for digital watermarking.
  309. Peinado, Marcus; Venkatesan, Ramarathnam, Encrypting a digital object based on a key ID selected therefor.
  310. Peinado,Marcus; Venkatesan,Ramarathnam, Encrypting a digital object on a key ID selected therefor.
  311. Parisien, Brian R.; Lee, Michael C. G., Encryption key exchange protocol.
  312. Oliveira, Eduardo P.; Dunbar, Geoffrey; Alkove, James M., Encryption scheme for streamed multimedia content protected by rights management system.
  313. Pride, Edward; Daniel, Vicki; Feduff, Daniel Stephen; Gigliotti, Travis, End-to-end licensing of digital media assets.
  314. Pride, Edward; Daniel, Vicki; Feduff, Daniel Stephen; Gigliotti, Travis, End-to-end licensing of digital media assets.
  315. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Enforcement architecture and method for digital rights management.
  316. Lim, Keng, Enforcing access control policies on servers in an information management system.
  317. Lim, Keng, Enforcing application and access control policies in an information management system with two or more interactive enforcement points.
  318. Lim, Keng, Enforcing application and access control policies in an information management system with two or more interactive enforcement points.
  319. Lim, Keng, Enforcing control policies in an information management system.
  320. Lim, Keng, Enforcing control policies in an information management system with two or more interactive enforcement points.
  321. Lim, Keng, Enforcing document control in an information management system.
  322. Lim, Keng, Enforcing policy-based application and access control in an information management system.
  323. Lim, Keng, Enforcing policy-based application and access control in an information management system.
  324. Lim, Keng, Enforcing policy-based application and access control in an information management system.
  325. Lim, Keng, Enforcing policy-based application and access control in an information management system.
  326. Lim, Keng, Enforcing universal access control in an information management system.
  327. Lim, Keng, Enforcing universal access control in an information management system.
  328. Lim, Keng, Enforcing universal access control in an information management system.
  329. Lim, Keng, Enforcing universal access control in an information management system.
  330. Janky, James M.; Schulhof, Nathan, Enhanced delivery of audio data for portable playback.
  331. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  332. Pinkas, Binyamin; Haber, Stuart A.; Tarjan, Robert E.; Sander, Tomas, Establishing a secure channel with a human user.
  333. Pinkas, Binyamin; Haber, Stuart A.; Tarjan, Robert E.; Sander, Tomas, Establishing a secure channel with a human user.
  334. Pinkas,Binyamin; Haber,Stuart A.; Tarjan,Robert E.; Sander,Tomas, Establishing a secure channel with a human user.
  335. Meyer, Joel R.; Rhoads, Geoffrey B., Establishing and interacting with on-line media collections using identifiers in media signals.
  336. Homer, Gregg S., Even more subscription media on demand.
  337. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  338. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  339. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  340. Fung, Joseph Zhung Yee; Chancellor, Robert; DeMartini, Thomas; Nguyen, Mai; Ta, Thanh; Tieu, Vincent Hsiang; Tran, Duc; Valenzuela, Edgardo, Extensible rights expression processing system.
  341. Yang, Zhang; Hongming, Wang; Hirai, Tatsuya, File management system.
  342. Rhoads, Geoffrey B.; Rodriguez, Anthony, Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  343. Rhoads, Geoffrey B.; Rodriguez, Tony F., Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  344. Wesinger, Jr., Ralph E.; Coley, Christopher D., Firewall providing enhanced network security and user transparency.
  345. Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code from third computer process on behalf of first process.
  346. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  347. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  348. Lelikov, Andrey; Gunyakti, Caglar; Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code on behalf thereof.
  349. Brooks, Cecil Ray; Girotto, Jay Robert; Gunyakti, Caglar; Haugen, Todd, Flexible licensing architecture for licensing digital application.
  350. Brooks, Cecil Ray; Girotto, Jay Robert; Gunyakti, Caglar; Haugen, Todd, Flexible licensing architecture for licensing digital application.
  351. Nakano, Toshihisa; Futa, Yuichi; Yokota, Kaoru; Ohmori, Motoji, Game system, game execution apparatus, and portable storage medium.
  352. Hoffberg, Steven M., Game theoretic prioritization system and method.
  353. Reay, C. Phillip; Coco, Geoffrey P., Generating revenue for the use of softgoods that are freely distributed over a network.
  354. Mazza, Bruce P.; Walker, William T., Generation of enterprise-wide licenses in a customer environment.
  355. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  356. Reed,Alastair M., Hiding information to reduce or offset perceptible artifacts.
  357. Brown, David L., Hybrid device having a personal digital key and receiver-decoder circuit and methods of use.
  358. Brown, David L., Hybrid device having a personal digital key and receiver-decoder circuit and methods of use.
  359. Brown, David L., Hybrid device having a personal digital key and receiver-decoder circuit and methods of use.
  360. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  361. Jones, Robert L., Identification document with three dimensional image of bearer.
  362. Rhoads Geoffrey B., Identification/authentication system using robust, distributed coding.
  363. Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D., Image anonymization.
  364. Brundage, Trent J.; Rodriguez, Tony F.; Hannigan, Brett T., Image or video display devices.
  365. Takamine, Kouichi, Image output time management method and the record media.
  366. Jinnai Shigeru,JPX, Image processing apparatus having image filing function.
  367. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Mangione-Smith, William H.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Implementation of media content alteration.
  368. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Implementing audio substitution options in media works.
  369. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Implementing group content substitution in media works.
  370. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Implementing group content substitution in media works.
  371. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  372. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  373. Lim, Keng, Information management system with two or more interactive enforcement points.
  374. Arai,Toshiyuki, Information processing apparatus and information processing method.
  375. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Information processing apparatus, and system having preview control, and method thereof, and storage medium storing program for implementing the method.
  376. Okada, Sumio; Nakayama, Hiroshi; Sakamoto, Ryota; Miura, Chika; Kawachi, Tsutomu; Chatani, Masayuki; Miyakawa, Eiji, Information processing device, control method, and storage medium.
  377. Abe, Makoto; Sekiya, Shuichi; Fukuzawa, Yuji, Information processing system, information communication terminal and method, information processing apparatus and method, recording medium, and program for internet transaction.
  378. Felsher, David Paul, Information record infrastructure, system and method.
  379. Nakayama, Tsuyoshi; Mori, Chikako; Kitaya, Yoshimichi; Kouno, Yoshikazu, Information recording medium and information processing method for accessing content with license or copyright protection.
  380. Kuroda,Kazuo; Moriyama,Yoshiaki, Information recording medium having reproduction control program recorded thereon and reproduction control program.
  381. Nakayama, Tsuyoshi; Mori, Chikako; Kitaya, Yoshimichi; Kouno, Yoshikazu, Information recording medium, information processing device, information processing method, and computer program.
  382. Giroux, David; Sharko, John, Information security architecture for encrypting documents for remote access while maintaining access control.
  383. Pensak David A. ; Cristy John J. ; Singles Steven J., Information security architecture for encrypting documents for remote access while maintaining access control.
  384. Rogers,Allen; Hadden,Allen Douglas; Norman,Timothy Neil, Information security architecture for remote access control using non-bidirectional protocols.
  385. Carey, W. Knox; Nilsson, Jarl, Information security systems and methods.
  386. Carey, W. Knox; Nilsson, Jarl, Information security systems and methods.
  387. Ebihara, Munetake; Kawakami, Itaru; Ishiguro, Ryuji; Tanabe, Mitsuru; Ezura, Yuichi; Sato, Ichiro, Information-processing device, information-processing method, recording medium, and program.
  388. Ebihara, Munetake; Kawakami, Itaru; Ishiguro, Ryuji; Tanabe, Mitsuru; Ezura, Yuichi; Sato, Ichiro, Information-processing device, information-processing method, recording medium, and program.
  389. Lim, Keng, Inspecting code and reducing code size associated to a target.
  390. Lim, Keng, Inspecting code and reducing code size associated to a target.
  391. Lim, Keng, Inspecting code and reducing code size associated to a target.
  392. Lim, Keng, Inspecting code and reducing code size associated to a target.
  393. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  394. Choy David M., Integrated method and system for controlling information access and distribution.
  395. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  396. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  397. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  398. Hoke, Jr., Clare L., Intellectual property archive.
  399. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne M.; Shah, Lacky, Intelligent network streaming and execution system for conventionally coded applications.
  400. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne M.; Shah, Lacky, Intelligent network streaming and execution system for conventionally coded applications.
  401. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne Marie; Shah, Lacky Vasant, Intelligent network streaming and execution system for conventionally coded applications.
  402. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne Marie; Shah, Lacky Vasant, Intelligent network streaming and execution system for conventionally coded applications.
  403. Lim, Keng, Intelligent policy deployment.
  404. DeMello, Marco A.; Zeman, Pavel; Krishnaswamy, Vinay; Byrum, Frank D., Inter-server communication using request with encrypted parameter.
  405. Ellis, Michael D.; Thomas, William L.; Lemmons, Thomas R., Interactive guide with recording.
  406. Walker, Todd A., Interactive media guidance system having multiple devices.
  407. Ellis, Michael D., Interactive television systems with digital video recording and adjustable reminders.
  408. Ellis, Michael D., Interactive television systems with digital video recording and adjustable reminders.
  409. Reynolds Brian,JMX ; Goldhor Richard Scott, Interactive web book system.
  410. Reynolds,Brian; Goldhor,Richard S, Interactive web book system.
  411. Reynolds, Brian; Goldhor, Richard Scott, Interactive web book system for contributing and viewing material with attribution and derivation features.
  412. Brian Reynolds JM; Richard Scott Goldhor, Interactive web book system with attribution and derivation features.
  413. Hughes, David A.; Smith, Allen J., Interface for presenting downloadable digital data content format options.
  414. Rhoads, Geoffrey B., Internet linking from audio.
  415. Rhoads,Geoffrey B., Internet linking from image content.
  416. O'Donnell, Lawrence; O'Donnell, Michael, Internet system for facilitating human user advisement and licensing of copyrighted works of authorship.
  417. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  418. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  419. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  420. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  421. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  422. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  423. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  424. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  425. Xu, Emily Hong; Cheng, Qingwen; Angal, Rajeev; Lue, Xuerbin, Liberty discovery service enhancements.
  426. Dean, Loren; Cotter, Linda; Mehrez, Leslie; McElhinney, Gerard; Little, John N., License activation and management.
  427. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  428. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  429. Ebihara, Munetake; Kuno, Hiroshi; Saeki, Keiko, License source component, license destination component, and method thereof.
  430. Strom, Clifford P.; Siu, Michael Y.; Evans, Brian P., Licensing content for use on portable device.
  431. Howard, Christopher J.; Levy, Peter S.; de la Cuesta, Joshue D., Limited-use browser and security system.
  432. Howard, Christopher J.; Levy, Peter S.; de la Cuesta, Joshue D., Limited-use browser and security system.
  433. Howard,Christopher J.; Levy,Peter S.; de la Cuesta,Joshue D., Limited-use browser and security system.
  434. Howard,Christopher J.; Levy,Peter S.; de la Cuesta,Joshue D., Limited-use browser and security system.
  435. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  436. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  437. Hawes, Jonathan L., Linking documents through digital watermarking.
  438. Rhoads Geoffrey B., Linking of computers using information steganographically embedded in data objects.
  439. Dillaway, Blair Brewster; LaMacchia, Brian; Manferdelli, John; Paramasivam, Muthukrishnan, Long-life digital certification for publishing long-life digital content or the like in content rights management system or the like.
  440. Redmond, Ian; Bell, Bernard; Blankenbeckler, David L.; Braitberg, Michael F.; Freeman, Robert D., Low profile optical head.
  441. Redmond,Ian; Bell,Bernard; Blankenbeckler,David L.; Braitberg,Michael F.; Freeman,Robert D., Low profile optical head.
  442. Reed, Alastair M.; Bradley, Brett A., Low visibility watermarks using an out-of-phase color.
  443. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Graham, Stanley E.; Rhoads, Geoffrey B., Management of documents and other objects using optical devices.
  444. Chess, David Michael; Steinder, Malgorzata; Whalley, Ian Nicholas, Management of heterogeneous workloads.
  445. Willard,Michael Joseph; Manu,Mitica, Managing a distributed computing system.
  446. Lim, Keng, Managing access of information using policies.
  447. Hans,Mathieu C.; Sasaki,Gary D., Managing access to digital content.
  448. Killalea, Tom; Rosalez, Alex T.; Scott, Sean M., Managing content access data in a communication network.
  449. Schnell, Patrik; Strom, Clifford P.; Dubhashi, Kedarnath A.; Rosenstein, Daniel; Beaubien, Mark L; McKelvey, Alex; Grigorovitch, Alexandre V.; Paka, Anand; Randhawa, Satvir, Managing digital rights for multiple assets in an envelope.
  450. Endoh, Tomoaki, Managing the allowed usage amount of a program using license information.
  451. Chatani, Masayuki, Managing transfer of content.
  452. Hippeläinen, Lassi, Marking of electronic documents in order to expose unauthorized publication.
  453. Lee, Woo Beum; Walsh, Jeffrey M., Matched content use restriction system.
  454. Stone, Jonathan James; Pelly, Jason Charles; Keating, Stephen Mark; Collins, Andrew; Tapson, Daniel, Material distribution apparatus.
  455. Sims, III, J Robert, Media content protection utilizing public key cryptography.
  456. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Mangione-Smith, William H.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Media markup system for content alteration in derivative works.
  457. Brown, Stephen J., Medical device rights and recall management system.
  458. Skatter, Sondre; Tolson, Michael, Method and apparatus for a distributable globe graphical object.
  459. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  460. Wang, Xin; Chen, Eddie J.; DeMartini, Thomas; Gilliam, Charles P.; Lao, Guillermo; Nahidipour, Aram; Raley, Michael; Ta, Thanh; Tadayon, Bijan, Method and apparatus for assigning consequential rights to documents and documents having such rights.
  461. Levy, Kenneth L., Method and apparatus for automatic ID management.
  462. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  463. Sako,Yoichiro; Osawa,Yoshitomo; Kurihara,Akira; Kawashima,Isao; Yoneyama,Shigeyuki, Method and apparatus for ciphering playback mode information for recording on record medium.
  464. Sako,Yoichiro; Osawa,Yoshitomo; Kurihara,Akira; Kawashima,Isao; Yoneyama,Shigeyuki, Method and apparatus for ciphering playback mode information for recording on record medium.
  465. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for client customization by executing software parts on plural servers.
  466. Levy, Kenneth L., Method and apparatus for content management.
  467. Levy, Kenneth L., Method and apparatus for content management.
  468. Levy, Kenneth L., Method and apparatus for content management.
  469. Park, Tae Joon, Method and apparatus for descrambling digital video data and digital audio data using control data.
  470. Flank,Sharon; Sperer,Ruth; Romer,Donna, Method and apparatus for digital media management, retrieval, and collaboration.
  471. Romer, Donna; Rothey, James, Method and apparatus for digital media management, retrieval, and collaboration.
  472. Rhoads, Geoffrey B., Method and apparatus for discerning image distortion by reference to encoded marker signals.
  473. Wang, Xin; Tadayon, Bijan; DeMartini, Thomas; Raley, Michael; Lao, Guillermo; Chen, Eddie J.; Gilliam, Charles P., Method and apparatus for distributing enforceable property rights.
  474. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  475. Gollapudi, Sreenivas, Method and apparatus for document clustering and document sketching.
  476. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  477. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  478. Oshima, Mitsuaki; Gotoh, Yoshiho; Tanaka, Shinichi; Koishi, Kenji; Moriya, Mitsurou; Takemura, Yoshinari, Method and apparatus for encrypting and recording received content information on a recording medium using both medium identification information and a cipher key for encryption.
  479. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  480. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  481. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  482. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  483. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  484. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  485. Raley, Michael C.; Chen, Daniel C.; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  486. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  487. Yoon, Young-sun; Kim, Bong-seon, Method and apparatus for importing content having plurality of parts.
  488. Yoon, Young-sun; Kim, Bong-seon, Method and apparatus for importing content having plurality of parts.
  489. Yoon, Young-sun; Kim, Bong-seon, Method and apparatus for importing content having plurality of parts.
  490. Yoon, Young-sun; Kim, Bong-seon, Method and apparatus for importing content having plurality of parts.
  491. Warnock, Christopher M; Holzgrafe, Richard M; Santos, Tom J; Nolan, Jay C, Method and apparatus for improved information transactions.
  492. Warnock, Christopher M; Holzgrafe, Richard M; Santos, Tom J; Nolan, Jay C; Abrams, Ken, Method and apparatus for improved information transactions.
  493. Warnock, Christopher; Abrams, Ken; Holzgrafe, Rick, Method and apparatus for improved information transactions.
  494. Morita,Toshihiro; Hatanaka,Mitsuyuki; Kojima,Kiyonobu; Tambata,Ippei; Shiroma,Shin, Method and apparatus for information processing, and medium for storing program.
  495. Huang, Chitai Kenny, Method and apparatus for managing digital assets.
  496. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  497. Farrugia, Augustin J.; Robbin, Jeffrey; Mitsuji, Hiro; Despotovic, Mihailo; Meldrum, Colin, Method and apparatus for on demand video and other content rental.
  498. Mindrum,Gordon Scott, Method and apparatus for presenting linked life stories.
  499. Alda,Anthony Arthur J.; Bysouth,Brent Richard; Rosado,Ricardo J.; Balsara,Zubin Adi; Ulrich,Carla Maureen; Bell,Lloyd Clayton Dwayne; Christiansen,Ryan Michael; Poystila,Andrew Viewkko; Rudd,David Brett; Abdullah,Shazron, Method and apparatus for presenting multimedia content and for facilitating third party representation of an object.
  500. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  501. Ta,Thanh; Lao,Guillermo; Wang,Xin; Raley,Michael C.; Gilliam,Charles P.; Ham,Manuel; Tadayon,Bijan, Method and apparatus for processing usage rights expressions.
  502. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  503. Gordon Scott Mindrum, Method and apparatus for recording and presenting life stories.
  504. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  505. Park, Tae Joon, Method and apparatus for scrambling and/or descrambling digital video data and digital audio data using control data.
  506. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for secure document timestamping.
  507. Bantz, David Frederick; Chefalas, Thomas E.; Karve, Alexei A.; Mastrianni, Steven J., Method and apparatus for selective and quantitative rights management.
  508. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  509. Lydecker George ; McPherson Alan J., Method and apparatus for testing the quality of recorded information.
  510. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  511. Hsu, Jimmy Ming-Der; Hsu, Peter Y., Method and apparatus for trading digital items in a network data processing system.
  512. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  513. Klemba,Keith S.; Leyrat,Gilles, Method and apparatus for uniquely and securely loading software to an individual computer.
  514. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  515. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  516. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for verifying secure document timestamping.
  517. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for verifying secure document timestamping.
  518. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for verifying secure document timestamping.
  519. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for verifying secure document timestamping.
  520. Sachs James ; Pomeroy Thomas W., Method and apparatus for viewing electronic reading materials.
  521. Kelley, Brian H., Method and apparatus to create a secure web-browsing environment with privilege signing.
  522. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  523. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  524. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  525. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  526. Diamond, Michael B.; White, Jonathan B., Method and system for accessing content on demand.
  527. Kugai, Masami, Method and system for authenticating user and providing service.
  528. Krislov, Clinton A., Method and system for automated document registration.
  529. Krislov, Clinton A., Method and system for automated document registration with cloud computing.
  530. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  531. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  532. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  533. Hauser Ralf,CHX ; Janson Philippe,CHX ; Molva Refik,FRX ; Tsudik Gene,CHX ; Van Herreweghen Elsie,CHX, Method and system for changing an authorization password or key in a distributed communication network.
  534. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  535. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  536. Gregg,Richard L.; Giri,Sandeep; Goeke,Timothy C., Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network.
  537. Mindrum, Gordon Scott; Sefton, Steven Craig; Johnson, Jeffrey Jon, Method and system for creating a commemorative presentation.
  538. Mindrum, Gordon Scott; Sefton, Steven Craig; Johnson, Jeffrey Jon, Method and system for creating a video presentation.
  539. O'Toole, Jr., James W., Method and system for digital rights management brokering and digital asset security transcoding.
  540. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  541. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  542. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  543. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  544. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  545. Roegner, Michael W., Method and system for dynamically implementing an enterprise resource policy.
  546. Huffman James R. ; Jambhekar Shrirang Nikanth, Method and system for encoding a book for reading using an electronic book.
  547. Geoffrey B. Rhoads, Method and system for encoding image and audio content.
  548. Mithal, Ashish K.; Tayebi, Amad, Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof.
  549. DeMello, Marco A.; Yaacovi, Yoram; Zeman, Pavel, Method and system for limiting the use of user-specific software features.
  550. DeMello,Marco A.; Yaacovi,Yoram; Zeman,Pavel; Hughes,Kathryn E.; Byrum,Frank D., Method and system for limiting the use of user-specific software features.
  551. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined condition for usage.
  552. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  553. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  554. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  555. Meyers, Stephan, Method and system for managing rights in digital information over a network.
  556. Meyers,Stephan, Method and system for managing rights in digital information over a network.
  557. Rhoads,Geoffrey B., Method and system for managing, accessing and paying for the use of copyrighted electronic media.
  558. Dharmapurikar, Sarang; Krishnamurthy, Praveen; Taylor, David Edward, Method and system for performing longest prefix matching for network address lookup using bloom filters.
  559. Rhoads, Geoffrey B., Method and system for preventing reproduction of professional photographs.
  560. Ta,Thanh; Chen,Eddie; Lao,Guillermo; Valenzuela,Edgardo, Method and system for processing grammar-based legality expressions.
  561. Diamond, Michael B.; White, Jonathan B., Method and system for registering and activating content.
  562. Krislov, Clinton A., Method and system for secure automated document registration from social media networks.
  563. Newcombe, Christopher R., Method and system for secure distribution of subscription-based game software.
  564. Roegner, Michael W., Method and system for selecting advertisements to be presented to a viewer.
  565. Roegner, Michael W., Method and system for selecting content items to be presented to a viewer.
  566. Roegner, Michael W., Method and system for selecting content items to be presented to a viewer.
  567. Yamamoto,Hideki; Taniguchi,Masayuki; Sato,Masaki; Kondo,Norio; Ikeno,Atsushi, Method and system for selling content.
  568. Lao, Guillermo, Method and system for subscription digital rights management.
  569. Lao, Guillermo, Method and system for subscription digital rights management.
  570. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  571. Lakshminarayanan, Gopi; Nurmukhanov, Dossym; Martinez, Sergio, Method and system for synchronizing multiple secure clocks using an average adjusted time of the secure clocks if the average adjusted time is within the limit intersection and using a substitute average adjusted time if the averaged adjusted time is outside the limit intersection.
  572. Ta, Thanh; Nguyen, Mai; Chen, Eddie J.; Wang, Xin; Demartini, Thomas, Method and system to support dynamic rights and resources sharing.
  573. Schull,Jonathan, Method for adapting a software product to an environment.
  574. Tayebi,Amad; Mithal,Ashish K., Method for allowing a customer to preview, acquire and/or pay for information and a system therefor.
  575. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  576. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  577. DeMello,Marco A.; Narin,Attila; Yaacovi,Yoram, Method for authenticating and securing integrated bookstore entries.
  578. Barber, Timothy P., Method for billing for services delivered over a computer network.
  579. Schull,Jonathan, Method for causing a digital product to revert to a demo mode.
  580. Fulton, Nicholas; Butler, James Matthew; Curtis, Mark Anthony; Parrott, David; Whitehead, Miles Jonathan; Wu, Hui, Method for certifying and verifying digital web content using public cryptography.
  581. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  582. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  583. Nuttall,Fran챌ois Xavier, Method for computer network operation basis for usage fees.
  584. Nuttall, François Xavier, Method for computer network operation providing basis for usage fees.
  585. Nuttall,Fran챌ois Xavier, Method for computer network operation providing basis for usage fees.
  586. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  587. Capek Peter George, Method for distributing advertising in a distributed web modification system.
  588. Manchala, Daniel W.; Harrington, Steven J., Method for document processing.
  589. Rhoads, Geoffrey B., Method for increasing the functionality of a media player/recorder device or an application program.
  590. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  591. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  592. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  593. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  594. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  595. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  596. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  597. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  598. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  599. Tanaka Hiroshi,JPX, Method for managing security for card-type storage medium and a transaction apparatus therefor.
  600. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  601. Rhoads,Geoffrey B., Method for monitoring internet dissemination of image, video and/or audio files.
  602. Malone, Michael F., Method for multi-media capture, transmission, conversion, metatags creation, storage and search retrieval.
  603. Malone, Michael F., Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval.
  604. Malone, Michael F., Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval.
  605. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system.
  606. Farrugia, Augustin J.; Robbin, Jeffrey; Mitsuji, Hiro; Despotovic, Mihailo; Meldrum, Colin, Method for on demand video and other content rental.
  607. Chou Wayne W., Method for preventing copying of digital video disks.
  608. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  609. Kim, Jea-Un, Method for processing rights object in digital rights management system and method and system for processing rights object using the same.
  610. Nii,Naoaki, Method for providing multimedia files and terminal therefor.
  611. Manchala, Daniel W.; Harrington, Steven J., Method for secure production printing.
  612. Schull,Jonathan, Method for selling, protecting, and redistributing digital goods.
  613. Homer, Gregg S., Method for subscription media on-demand.
  614. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  615. Yadav-Ranjan, Rani K., Method for transferring an amount to be paid.
  616. Kim, Myung-sun; Han, Sung-hyu; You, Yong-kuk; Yoon, Young-sun; Kim, Bong-seon; Lee, Jae-heung, Method for transmitting content in home network using user-binding.
  617. Malone, Michael F., Method for voice command activation, multi-media capture, transmission, speech conversion, metatags creation, storage and search retrieval.
  618. Schull,Jonathan, Method of altering a software product in response to predetermined events.
  619. Maari, Koichi, Method of controlling digital content distribution, a method of reproducing digital content, and an apparatus using the same.
  620. Maari,Koichi, Method of controlling digital content distribution, a method of reproducing digital content, and an apparatus using the same.
  621. Pang,Hwee Hwa; Ngair,Teow Hin, Method of detaching and re-attaching components of a computing process.
  622. Cristy, John J.; Pensak, David A.; Singles, Steven J., Method of encrypting information for remote access while maintaining access control.
  623. David A. Pensak ; John J. Cristy ; Steven J. Singles, Method of encrypting information for remote access while maintaining access control.
  624. David A. Pensak ; John J. Cristy ; Steven J. Singles, Method of encrypting information for remote access while maintaining access control.
  625. Pensak, David A.; Cristy, John J.; Singles, Steven J., Method of encrypting information for remote access while maintaining access control.
  626. Rhoads,Geoffrey B.; Seder,Phillip Andrew; Miller,Marc D.; MacIntosh,Brian T.; Hein, III,William C.; Hannigan,Brett T., Method of linking on-line data to printed documents.
  627. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Method of monitoring print data for text associated with a hyperlink.
  628. Wouters,Marc Henri J. M. A.; Spaey,Fr?d?ric A. J.; Meinrath,Ernst W.; West,Stuart J., Method of personalizing and identifying communications.
  629. Fanning, Shawn; Mendelson, Jordan; Aydar, Ali, Method of processing song claims involving songs including, but not limited to musical works, compositions, etc.
  630. Dunkeld, Bryan; Lambert, Edward, Method of providing a digital asset for distribution.
  631. Mages Kenneth G. ; Feng Jie, Method of secure server control of local media via a trigger through a network for instant local access of encrypted da.
  632. Iwamura,Keiichi, Method, apparatus, and system for processing information by attaching information to digital data, and storage medium storing computer-readable program codes to carry out the method.
  633. Chatani, Masayuki, Method, medium, and system for managing transfer of content.
  634. Lipka, Martin; Dubov, Alexander, Method, system and software product for transferring content to a remote device.
  635. DeTreville,John D., Method, system, and apparatus for providing secure access to a digital work.
  636. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  637. Raley, Michael Charles; Chen, Eddie J., Method, system, and device for license-centric content consumption.
  638. Raley, Michael; Chen, Eddie J., Method, system, and device for license-centric content consumption.
  639. Tham, Terry K.; Lai, Errol, Methods and apparatus for implementing a cryptography engine.
  640. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P.; Sibert, W. Olin; Van Wie, David M., Methods and apparatus for persistent control and protection of content.
  641. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  642. Someshwar, Ravi, Methods and apparatus for secure document printing.
  643. Someshwar, Ravi, Methods and apparatus for secure document printing.
  644. Someshwar, Ravi, Methods and apparatus for secure document printing.
  645. Roever, Stefan; Collins, Kevin; Ding, Josh C.; Clark, Alex F.; Bruce, James, Methods and apparatus for title protocol, authentication, and sharing.
  646. Roever, Stefan; Collins, Kevin; Ding, Josh C.; Clark, Alex F.; Bruce, James, Methods and apparatus for title structure and management.
  647. Roever, Stefan; Collins, Kevin; Ding, Josh C.; Clark, Alex F.; Bruce, James, Methods and apparatus for title structure and management.
  648. Fernández, Alvaro, Methods and apparatus for transmitting multimedia files and advertisements.
  649. Fernández, Alvaro, Methods and apparatus for transmitting multimedia files and advertisements.
  650. Fernández Gutiérrez, Álvaro, Methods and apparatus for transmitting multimedia files in a data network.
  651. Williamson, Ralph K.; Hannaoui, Mohamad, Methods and apparatus to associate a mobile device with a panelist profile.
  652. Williamson, Ralph K.; Hannaoui, Mohamad, Methods and apparatus to associate a mobile device with a panelist profile.
  653. Amidon, Christopher; Walsh, Richard; Issa, Alfredo, Methods and systems for automated content distribution.
  654. Lee, Jianda; Liu, Shuosen Robert, Methods and systems for classifying computer documents into confidential levels using log information.
  655. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  656. Rhoads, Geoffrey B., Methods and systems for marking printed documents.
  657. Nichols, Michael R., Methods and systems for performing actions based on location-based rules.
  658. Newcombe, Christopher R., Methods and systems for secure distribution of subscription-based game software.
  659. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  660. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  661. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  662. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  663. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  664. Fernández, Alvaro, Methods and transmitting multimedia files and advertisements.
  665. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  666. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  667. Rhoads,Geoffrey B., Methods for audio watermarking and decoding.
  668. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  669. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  670. Rhoads Geoffrey B., Methods for controlling systems using control signals embedded in empirical data.
  671. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  672. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  673. Rhoads, Geoffrey B., Methods for encoding security documents.
  674. Geoffrey B. Rhoads, Methods for hiding in-band digital data in images and video.
  675. Conwell, William Y., Methods for identifying audio or video content.
  676. Rhoads, Geoffrey B., Methods for marking images.
  677. Rhoads,Geoffrey B., Methods for marking images.
  678. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  679. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  680. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  681. Rhoads,Geoffrey B., Methods for monitoring audio and images on the internet.
  682. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  683. Erickson, John S., Methods for playing protected content.
  684. Rhoads,Geoffrey B., Methods for steganographic encoding media.
  685. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  686. Rhoads, Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  687. Fernandez, Alvaro, Methods for transmitting multimedia files and advertisements.
  688. Fernandez, Alvaro, Methods for transmitting multimedia files and advertisements.
  689. Fernandez, Alvaro, Methods for transmitting multimedia files and advertisements.
  690. Fernandez, Alvaro, Methods for transmitting multimedia files and advertisements.
  691. Fernández, Alvaro, Methods for transmitting multimedia files and advertisements.
  692. Fernández, Alvaro, Methods for transmitting multimedia files and advertisements.
  693. Fernández, Alvaro, Methods for transmitting multimedia files and advertisements.
  694. Roever, Stefan; Collins, Kevin; Ding, Josh C.; Clark, Alex F.; Bruce, James, Methods of facilitating merchant transactions using a computerized system including a set of titles.
  695. Roever, Stefan; Collins, Kevin; Ding, Josh C.; Clark, Alex F.; Bruce, James, Methods of facilitating merchant transactions using a computerized system including a set of titles.
  696. Rhoads, Geoffrey B., Methods of producing security documents having digitally encoded data and documents employing same.
  697. Mindrum,G. Scott, Methods of providing a registry service and a registry service.
  698. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  699. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  700. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  701. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  702. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  703. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  704. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  705. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  706. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  707. Walsh, Richard J.; Issa, Alfredo C.; Amidon, Christopher M., Methods, systems, and products for characterizing target systems.
  708. Issa, Alfredo C; Walsh, Richard J., Methods, systems, and products for classifying peer systems.
  709. Koneru, Raj Kumar; Dasari, Pattabhi Rama Rao; Deshpande, Prajakt; Iyer, Vivek; Komandur, Rajendra; Perumal, Aravind; Ramanathan, Sriram; Terry, Matthew; Vagvala, Vamsi Krishna; Vennapusala, Sathyanarayana, Mobile application management systems and methods thereof.
  710. Hoffberg, Steven M., Mobile communication device.
  711. Kamada, Tomihisa, Mobile information terminal device, storage, server, and method for providing storage region.
  712. Barrs, II, John W.; Brown, Michael W.; Williamson, Paul S.; Winters, Scott L., Modifying a digital media product.
  713. Barrs, II, John W.; Brown, Michael W.; Williamson, Paul S.; Winters, Scott L., Modifying a digital media product.
  714. Boyer, Jason; MacLennan, Lawrence; Mathews, Robert, Modifying digital rights.
  715. Boyer, Jason; MacLennan, Lawrence; Mathews, Robert, Modifying digital rights.
  716. Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D., Modifying restricted images.
  717. Rhoads,Geoffrey B., Monitoring of video or audio based on in-band and out-of-band data.
  718. Homer, Gregg S., More subscription media on demand.
  719. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  720. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  721. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  722. Hoffberg, Steven M., Multifactorial optimization system and method.
  723. Hoffberg, Steven Mark, Multifactorial optimization system and method.
  724. Kobayashi,Sumitake; Ishiguro,Keiji; Murata,Ken; Kawasaki,Takashi; Abe,Fumitake, Multifunction machine, server, multifunction machine/server system and program recording medium.
  725. Lim, Keng, Multilayer policy language structure.
  726. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  727. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  728. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  729. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  730. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  731. Rhoads, Geoffrey B., Music methods and systems.
  732. Janes,Sherman M., Network communications security agent.
  733. Janes,Sherman M., Network communications security agent.
  734. Baugher,Mark J.; Farnham,Stu; Hemminger,Stephen C.; Marshall,Robert A.; Tait,Mark, Network content management.
  735. Kelly, Bryan M., Network gaming system.
  736. Kelly, Bryan M., Network gaming system.
  737. Kelly, Bryan M., Network gaming system.
  738. Rhoads, Geoffrey B., Network linking method using information embedded in data objects that have inherent noise.
  739. Rhoads,Geoffrey B., Network linking using index modulated on data.
  740. Bulman, Richard L.; Dahl, Brad; Gravitz, Steve, Object customization and presentation system.
  741. Ferris, James Michael; Riveros, Gerry Edward, Offering additional license terms during conversion of standard software licenses for use in cloud computing environments.
  742. Garth Conboy ; Brady Duga ; William S. Leshner ; Aleksey Novicov ; James Sachs, On-line image caching control for efficient image display.
  743. Duga Brady ; Novicov Aleksey ; Leshner William S. ; Conboy Garth ; Sachs James, On-line menu updating for an electronic book.
  744. Corbett, Richard, Online music and other copyrighted work search and licensing system.
  745. DeVries, Jeffrey; Hitomi, Arthur, Opportunistic block transmission with time constraints.
  746. DeVries, Jeffrey; Hitomi, Arthur S., Opportunistic block transmission with time constraints.
  747. DeVries, Jeffrey; Hitomi, Arthur S., Opportunistic block transmission with time constraints.
  748. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  749. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  750. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  751. Braitberg, Michael F.; Volk, Steven B.; Zaharris, Daniel R.; Davies, David H., Optical recording medium having a master data area and a writeable data area.
  752. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  753. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  754. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  755. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  756. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  757. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  758. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  759. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  760. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  761. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  762. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  763. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  764. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  765. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  766. Holler, Anne Marie; Shah, Lacky Vasant; Panwar, Sameer; Patel, Amit, Optimized server for streamed applications.
  767. Liang, Tao; Zhu, Xianing; Ragnet, Francois; Gastaldo, Michel; Monet, Nicolas, Optimizing the performance of duplicate identification by content.
  768. Abbosh, Oday; Mann, Gavin, Ordering items of playable content or other works.
  769. Liu, Shuosen Robert; Li, Jianda, Origination-based content protection for computer systems.
  770. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  771. Rodriguez, Tony F.; Carr, Jonathan Scott; Rhoads, Geoffrey B., Paper-based control of computer systems.
  772. Giobbi, John J., Personal digital key and receiver/decoder circuit system and method.
  773. Giobbi, John J., Personal digital key and receiver/decoder circuit system and method.
  774. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  775. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  776. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  777. Story, Guy A.; Rajasekharan, Ajit; Mott, Timothy, Personalized time-shifted programming.
  778. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  779. Cole, Mary Katherine; O'Connor, Glen Arthur; Speyer, Peter Christian, Platform for managing media assets for multi-model licensing over multi-level pricing and asset grouping.
  780. Evans, Brian P.; Strom, Clifford P.; Dunbar, Geoffrey; Prologo, Richard D., Playlist burning in rights-management context.
  781. Bank, Bryna L., Playlist compilation system and method.
  782. Lim, Keng, Policy performance in an information management system.
  783. Rhoads, Geoffrey B.; Conwell, William Y., Portable audio appliance.
  784. Rhoads,Geoffrey B.; Davis,Bruce L.; Evans,Douglas B., Portable devices and methods employing digital watermarking.
  785. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Predictive software license balancing.
  786. Lim, Keng, Preventing conflicts of interests between two or more groups.
  787. Lim, Keng, Preventing conflicts of interests between two or more groups.
  788. Lim, Keng, Preventing conflicts of interests between two or more groups.
  789. Lim, Keng, Preventing conflicts of interests between two or more groups using applications.
  790. Lim, Keng, Preventing conflicts of interests between two or more groups using applications.
  791. Lim, Keng, Preventing conflicts of interests between two or more groups using applications.
  792. Rhoads, Geoffrey B., Printable interfaces and digital linking with embedded codes.
  793. Rhoads, Geoffrey B., Printer driver separately applying watermark and information.
  794. Choi, Myoung-soon; Jeon, Yu-seong; Yun, Hee-chul, Printing method and apparatus, print control method, and multimedia apparatus.
  795. Aoki, Satoshi, Printing system using a portable terminal and printing charge collecting method.
  796. Yadav-Ranjan, Rani K., Process and device for conducting electronic transactions using wireless and cellular devices.
  797. Tota, Michael J.; Tote, Kenneth T.; Tota, Mark S.; Cohen, Ian D., Process for creating media content based upon submissions received on an electronic multi-media exchange.
  798. Tota,Michael J.; Tota,Kenneth T.; Tota,Mark S.; Cohen,Ian D., Process for creating media content based upon submissions received on an electronic multi-media exchange.
  799. Johnson, Woodrow W.; Atkins, Christine J.; Yoh, Jon A.; Parece, Thomas M., Process for managing and authorizing rights in a computer system.
  800. Johnson,Woodrow W.; Atkins,Christine J.; Yoh,Jon A.; Parece,Thomas M., Process for managing and authorizing rights in a computer system.
  801. Fernández Gutiérez, Alvaro, Process for the on-line sale of a software product.
  802. Fernández Gutiérrez, Alvaro, Process for the on-line sale of a software product.
  803. Peinado,Marcus; Venkatesan,Ramarathnam; Davis,Malcolm, Producing a new black box for a digital rights management (DRM) system.
  804. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D.; Tegreene, Clarence T., Promotional placement in media works.
  805. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  806. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  807. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  808. He, Juan; Tang, Dibin; Zhu, Jialai; Ding, Laiqiang, Protecting computers against data loss involving screen captures.
  809. Strom,Clifford P.; Sahasrabudhe,Sandeep; Parks,M. Jay; Paddleford,John, Protecting content on medium from unfettered distribution.
  810. England, Paul; Peinado, Marcus; Sankaranarayan, Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  811. England,Paul; Peinado,Marcus; Sankaranarayan,Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  812. England,Paul; Peinado,Marcus; Sankaranarayan,Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  813. England,Paul; Peinado,Marcus; Sankaranarayan,Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  814. Oliveira, Eduardo P.; Klemets, Anders E.; Bhatt, Sanjay; Paka, Anand; Alkove, James M., Protecting digital media of various content types.
  815. Rhoads,Geoffrey B., Providing reports associated with video and audio content.
  816. Turner, Stephen; Kelley, Scott, Provisioning of applications deployed on client devices.
  817. Homer, Gregg S., Rechargeable media distribution and play system.
  818. Rhoads, Geoffrey B.; Davis, Bruce L.; Carr, J. Scott, Reconfiguring a watermark detector.
  819. Staring, Antonius Adriaan Maria, Record carrier for storing a digital work.
  820. Morohashi, Akihiro, Recording and/or reproducing apparatus, portable recording and reproducing apparatus, data transfer system, data transfer method, and data recording and reproducing method.
  821. Morohashi, Akihiro, Recording and/or reproducing apparatus, portable recording and reproducing apparatus, data transfer system, data transfer method, and data recording and reproducing method.
  822. Ohgake,Mitsuru, Recording medium having a plurality of sections storing root directory information.
  823. Oshima, Mitsuaki; Gotoh, Yoshiho; Tanaka, Shinichi; Koishi, Kenji; Moriya, Mitsurou; Takemura, Yoshinari, Recording medium reproducer, cryptocommunication system and program license system.
  824. Oshima, Mitsuaki; Gotoh, Yoshiho; Tanaka, Shinichi; Koishi, Kenji; Moriya, Mitsurou; Takemura, Yoshinari, Recording medium, recorder, reproducer, cryptocommunication system and program license system.
  825. Oshima,Mitsuaki; Gotoh,Yoshiho; Tanaka,Shinichi; Koishi,Kenji; Moriya,Mitsurou; Takemura,Yoshinari, Recording medium, recorder, reproducer, cryptocommunication system and program license system.
  826. Okiyama, Toshiki; Akiyama, Akira; Miyawaki, Tadamitsu; Oshino, Hiroshi; Akahira, Shinji; Anraku, Hiroaki, Recording system, fee calculation device, and content distribution method.
  827. Lindeman, Thomas K.; Hanan, Scott M.; Beezer, John, Redistribution of rights-managed content and technique for encouraging same.
  828. Lindeman, Thomas K.; Hanan, Scott M.; Beezer, John, Redistribution of rights-managed content and technique for encouraging same.
  829. Lindeman,Thomas K.; Hanan,Scott M.; Beezer,John, Redistribution of rights-managed content and technique for encouraging same.
  830. Guo, Terry Qing; Neufeld, Nadav M.; Lau, Edwin K.; Wu, Haoyun, Reducing unicast session duration with restart TV.
  831. Peinado, Marcus; England, Paul; Yerrace, Frank, Releasing decrypted digital content to an authenticated path.
  832. Peinado,Marcus; England,Paul; Yerrace,Frank, Releasing decrypted digital content to an authenticated path.
  833. Chan,Man, Remote access authorization of local content.
  834. Walker, William T.; Serkowski, Robert J., Remote feature activation authentication file system.
  835. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  836. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  837. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  838. Peinado, Marcus; Manferdelli, John L.; Bell, Jeffrey R. C., Rendering digital content in an encrypted rights-protected form.
  839. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  840. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  841. Begen, Geoffrey C., Restricted printing of postage with layout constraints in a browser.
  842. Gajjala,Vijay K.; Ganesan,Krishnamurthy; McKune,Jeffrey R., Retail transactions involving digital content in a digital rights management (DRM) system.
  843. Abburi,Rajasekhar, Retail transactions involving distributed and super-distributed digital content in a digital rights management (DRM) system.
  844. Tota, Michael J.; Tota, Kenneth T.; Tota, Mark S.; Cohen, Ian D., Revenue-generating electronic multi-media exchange and process of operating same.
  845. Tota, Michael J.; Tota, Kenneth T.; Tota, Mark S.; Cohen, Ian D., Revenue-generating electronic multi-media exchange and process of operating same.
  846. Oho, Masahiro; Yamamoto, Masaya, Right management device, terminal device, and right management system.
  847. Roever, Stefan; Watson, David, Rights based system.
  848. Demartini, Thomas M.; Raley, Michael Charles, Rights expression profile system and method.
  849. Raley, Michael C.; Gilliam, Charles P.; Ham, Manual; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  850. Raley, Michael; Gilliam, Charles P.; Ham, Manuel; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  851. Nguyen,Mai; Fung,Joseph Zhung Yee; Tran,Duc, Rights expression system.
  852. Morita, Toshihiro; Kori, Takayuki; Sakurai, Mikiko, Rights information processing apparatus and method, and program storing medium using a display object for associating with contents.
  853. Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
  854. Evans, Brian P.; Strom, Clifford P.; Rosenstein, Daniel, Rights management system for streamed multimedia content.
  855. Evans, Brian P.; Strom, Clifford P.; Rosenstein, Daniel; Paka, Anand D.; Fang, Nicholas J.; Oliveria, Eduardo, Rights management system for streamed multimedia content.
  856. Van Dyke, Clifford P.; Cheng, David J.; Mohan, Siva, Rights management system for streamed multimedia content.
  857. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  858. Roever, Stefan; Watson, David, Rights-based system.
  859. Sincaglia, Nicolas W.; Lester, James P.; Rebaud, Sylvain P., Scheduled retrieval, storage and access of media data.
  860. Ronning, Joel A.; Wical, Kelly J.; Kukura, Marc A., Scheduling of a file download and search for updates.
  861. Arbaugh William A. ; Farber David J. ; Keromytis Angelos D. ; Smith Jonathan M., Secure and reliable bootstrap architecture.
  862. Pinkas,Binyamin; Sander,Tomas, Secure authentication systems and methods.
  863. Cammack,William E.; Kridner,Jason Douglas, Secure bootloader for securing digital devices.
  864. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  865. Carroll, Robert B.; Bacha, Hamid; Briggs, Robert, Secure communication system and method of operation for conducting electronic commerce using remote vault agents interacting with a vault controller.
  866. Diamond, Michael B.; White, Jonathan B.; Daniell, Piers J., Secure content enabled drive digital rights management system and method.
  867. Diamond, Michael B.; White, Jonathan B.; Daniell, Piers J., Secure content enabled drive system and method.
  868. Ronning, Joel Alan; Wical, Kelly J., Secure downloading of a file from a network system and method.
  869. Gatto, Jean-Marie; Brunet De Courssou, Thierry; Beney, Pierre-Jean, Secure game download.
  870. Gatto, Jean-Marie; Brunet De Courssou, Thierry; Beney, Pierre-Jean, Secure game download.
  871. Nguyen, Julien T., Secure graphical objects in web documents.
  872. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  873. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  874. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  875. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  876. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  877. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  878. Sibert, W. Olin, Secure processing unit systems and methods.
  879. Sibert,W. Olin, Secure processing unit systems and methods.
  880. Sibert,W. Olin, Secure processing unit systems and methods.
  881. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  882. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  883. Carroll Robert B., Secure server and method of operation for a distributed information system.
  884. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  885. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  886. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  887. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  888. Venters, III,Carl Vernon; Phillips, II,Eugene B.; Ornstein,Seth, Secure streaming container.
  889. Ventors, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  890. Whitfield, Henry, Secure system for the issuance, acquisition, and redemption of certificates in a transaction network.
  891. Whitfield,Henry, Secure system for the issuance, acquisition, and redemption of certificates in a transaction network.
  892. Hsu, Michael M.; McMahon, Dennis J., Secure ticketing.
  893. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  894. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  895. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  896. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  897. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  898. Phillips, II,Eugene B.; Ornstein,Seth, Securing digital content system and method.
  899. Rhoads,Geoffrey B., Securing media content with steganographic encoding.
  900. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  901. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  902. Geoffrey B. Rhoads, Security documents with hidden digital data.
  903. Sloo, David; Barrett, Peter, Segment based digital content protection.
  904. Bradley, Brett A., Self-orienting watermarks.
  905. Bradley,Brett A., Self-orienting watermarks.
  906. DeMello,Marco A.; Narin,Attila; Madonna,Christopher Robert Richard, Server controlled branding of client software deployed over computer networks.
  907. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Byrum,Frank D., Server for an electronic distribution system and method of operating same.
  908. Maes, Stephane H., Service level digital rights management support in a multi-content aggregation and delivery system.
  909. Corda, Alexandre; Azoulai, Jonathan; Lemonnier, Vincent, Sharing or reselling NFC applications among mobile communications devices.
  910. Rhoads Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  911. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  912. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Single step transaction authentication using proximity and biometric input.
  913. Kanevsky, Dimitri; Sabath, Mariusz; Sedivy, Jan; Zlatsin, Alexander, Smart book.
  914. Kanevsky,Dimitri; Sabath,Mariusz; Sedivy,Jan; Zlatsin,Alexander, Smart book.
  915. Peinado, Marcus; England, Paul; Manferdelli, John L., Software application protection by way of a digital rights management (DRM) system.
  916. Thomas, Andrew James; Skrebels, Mark; Irvine, Stewart, Software configuration of module dependent on history.
  917. Clark, Jack Robert Arron, Software distribution via a computer network connection.
  918. Hahn, Timothy J.; Palmer, Jr., Bernard P.; Waidner, Michael P.; Whitmore, James J., Software protection using an installation product having an entitlement file.
  919. Hahn, Timothy J.; Palmer, Jr., Bernard P.; Waidner, Michael P.; Whitmore, James J., Software protection using an installation product having an entitlement file.
  920. Hahn, Timothy J.; Palmer, Jr., Bernard P.; Waidner, Michael P.; Whitmore, James J., Software protection using an installation product having an entitlement file.
  921. Home, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  922. Home, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  923. Horne, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  924. Horne, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  925. Horne, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  926. Horne, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  927. Homing, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Home, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  928. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Home, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan S., Software self-defense systems and methods.
  929. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  930. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  931. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan S., Software self-defense systems and methods.
  932. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan S., Software self-defense systems and methods.
  933. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  934. Vinson, Jeffrey; Westerberg, Steig G.; Vries, Jeffrey De, Software streaming system and method.
  935. Vinson, Jeffrey; Westerberg, Steig; DeVries, Jeffrey, Software streaming system and method.
  936. Vinson, Jeffrey; Westerberg, Steig; DeVries, Jeffrey, Software streaming system and method.
  937. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  938. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  939. Cheng, William; Hwang, Kenneth; Kannan, Ravi; Katchapalayam, Babu; Liu, Bing; Narasimhan, Balaji; Ramanujam, Gopal; Tran, Jonathan, Software uninstallation system, method and computer program product.
  940. Collins, Kevin; Haven, Richard C.; Kintzer, Eric; Olsen, Jeremy; Roever, Stefan; Thrasher, Shannon; Leano, Rhandee; OKelley, Brian, Software, systems, and methods for processing digital bearer instruments.
  941. Collins, Kevin; Haven, Richard; Kintzer, Eric; Olsen, Jeremy; Roever, Stefan; Thrasher, Shannon; Leano, Rhandee; O'Kelly, Brian, Software, systems, and methods for processing digital bearer instruments.
  942. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifiying security for an element by assigning a scaled value representative of the relative security thereof.
  943. Ganesan, Krishnamurthy, Specifying rights in a digital rights license according to events.
  944. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  945. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  946. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  947. DeTreville, John, State reference.
  948. Rhoads, Geoffrey B.; Carr, J. Scott, Steganographic data hiding using a device clock.
  949. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  950. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  951. Rhoads, Geoffrey B., Steganographic encoding and detecting for video signals.
  952. Rhoads, Geoffrey B., Steganographic image processing.
  953. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  954. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  955. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  956. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  957. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  958. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  959. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  960. Rhoads Geoffrey B., Steganographic methods and media for photography.
  961. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  962. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  963. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  964. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  965. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  966. Geoffrey B. Rhoads, Steganographically encoding a first image in accordance with a second image.
  967. Ohmori,Motoji; Minami,Masataka; Yamamoto,Masaya, Storage-medium rental system.
  968. Peinado,Marcus; Abburi,Rajasekhar; Bell,Jeffrey R. C., Structural of digital rights management (DRM) system.
  969. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Bell,Jeffrey R. C., Structure of a digital content package.
  970. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Subscription access system for use with an untrusted network.
  971. Evans, Douglas B.; Conwell, William Y., Substituting information based on watermark-enable linking.
  972. Evans,Douglas B.; Conwell,William Y., Substituting objects based on steganographic encoding.
  973. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in media objects based on steganographic encoding.
  974. Atkinson, Bob; DeTreville, John; LaMacchia, Brian A., Substitution groups/inheritance for extensibility in authorization policy.
  975. Liu, Yeu; Pandya, Ravi; Ivanov, Lazar; Paramasivam, Muthukrishnan; Gunyakti, Caglar; Gui, Dongmei; Hsu, Scott W. P., Supplementary trust model for software licensing/commercial digital distribution policy.
  976. Lee, Victor S., Synchronizing contents of removable storage devices with a multimedia network.
  977. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Synchronizing rendering of multimedia content.
  978. Kline, Paul A.; Weinstein, Allan M.; Weinstein, David J.; Roberts, Jon L.; Nitin, Sawant, System and method for a commercial multimedia rental and distribution system.
  979. Weinstein,David J.; Weinstein,Allan M.; Kline,Paul A; Roberts,Jon L., System and method for a commercial multimedia rental and distribution system.
  980. Mindrum, Gordon Scott, System and method for a multimedia timeline.
  981. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  982. DeMello, Marco; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  983. DeMello,Marco A.; Krishnaswamy,Vinay; Manferdelli,John L., System and method for accessing protected content in a rights-management architecture.
  984. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy Bertrand; Yaacovi,Yoram; Alger,Jeffrey A., System and method for activating a rendering device in a multi-level rights-management architecture.
  985. Mindrum, Gordon Scott, System and method for archiving records.
  986. Holzgrafe, Richard; Santos, Tom; Warnock, Christopher, System and method for automatic anthology creation using document aspects.
  987. Holzgrafe, Richard; Santos, Tom; Warnock, Christopher, System and method for automatic anthology creation using document aspects.
  988. Von Wolfsheild, Baron R. K., System and method for brokering information between a plurality of commercially distinct clients.
  989. Von Wolfsheild, Baron R. K., System and method for brokering information between a plurality of commercially distinct clients.
  990. Von Wolfsheild, Baron R. K., System and method for brokering information between a plurality of commercially distinct clients.
  991. Hug, Joshua D., System and method for caching data.
  992. Hug, Joshua D., System and method for caching data.
  993. Hug, Joshua D., System and method for caching data.
  994. Hug, Joshua D., System and method for caching data.
  995. DeMello, Marco A.; Narin, Attila; Setty, Venkateshaiah, System and method for client interaction in a multi-level rights-management architecture.
  996. Franciosa,Alain; Dance,Christopher R, System and method for computing a measure of similarity between documents.
  997. Amidon, Christopher; Issa, Alfredo; Walsh, Richard; Stafford, Sid, System and method for controlled viral distribution of digital content in a social network.
  998. Rusnak David J. ; Zientara John T., System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet.
  999. Schull,Jonathan, System and method for controlling access to protected information.
  1000. Gilliam, Charles P; Chen, Eddie J, System and method for controlling rights expressions by stakeholders of an item.
  1001. Hughes, David, System and method for controlling the use and duplication of digital content distributed on removable media.
  1002. Hughes, David, System and method for controlling the use and duplication of digital content distributed on removable media.
  1003. Stefik, Mark J.; Pirolli, Peter L. T., System and method for controlling the use of a digital work in accordance with usage rights associated with the digital work.
  1004. Kulig, Matthew P.; Brooks, Timmy L.; Lockwood, John W.; Reddick, David Kyle, System and method for controlling transmission of data packets over an information network.
  1005. Stefik, Mark J.; Pirolli, Peter L. T., System and method for controlling utilization of content.
  1006. Schull,Jonathan, System and method for creating and running protected information.
  1007. Lockhart, Malcolm W.; Grimes, D. Gordon; Sharma, Ranjiv K.; Musselwhite, Neal A., System and method for data rights management.
  1008. Lockhart,Malcolm W.; Grimes,D. Gordon; Sharma,Ranjiv K.; Musselwhite,Neal A., System and method for data rights management.
  1009. Kobayashi,Noriya; Yee,Bennet, System and method for delivering and examining digital tickets.
  1010. Rose Sandra T. ; Elstrod John ; Andrews Patricia C. ; Forbes Charles G. ; Donovan Joseph M. ; Klinger Lynn M., System and method for deriving financial responsibility identification.
  1011. Hoffberg, Steven M., System and method for determining contingent relevance.
  1012. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  1013. Gaynor,Michael G.; Waterbury,Scott, System and method for distributing electronic information.
  1014. Schull, Jonathan, System and method for distributing protected information.
  1015. Wang,Xin, System and method for document distribution.
  1016. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  1017. Grim, III, Clifton E.; Schmidt, Christopher I.; Wilson, John D., System and method for exposing internal search indices to internet search engines.
  1018. Grim, III, Clifton E.; Schmidt, Christopher I.; Wilson, John D., System and method for exposing internal search indices to internet search engines.
  1019. Tieu, Vincent; Fung, Joseph Z.; Chen, Eddie; Tadayon, Bijan, System and method for granting access to an item or permission to use an item based on configurable conditions.
  1020. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  1021. Manferdelli,John L.; Marr,Michael David; Krishnaswamy,Vinay; Jakubowski,Mariusz H., System and method for interfacing a software process to secure repositories.
  1022. Horlander,Karl Francis; Kvintus, Jr.,Michael Francis; Wehmeyer,Keith Reynolds; Miller,Robert Howard, System and method for interfacing multiple electronic devices.
  1023. Erickson, John S., System and method for managing copyrighted electronic media.
  1024. Sabet, Mona, System and method for managing software development.
  1025. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, System and method for managing transaction record delivery using an acknowledgement-monitoring process and a failure-recovery process with modifying the predefined fault condition.
  1026. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  1027. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  1028. Siegel, Hilliard Bruce, System and method for marking content.
  1029. Oren Joseph Eugene ; Schumann Robert W. ; Walko Lisa S. ; McQueen Kevin S., System and method for movie transaction processing.
  1030. Hug, Joshua D., System and method for obtaining and sharing media content.
  1031. Schull,Jonathan, System and method for operating a licensing server.
  1032. Franciosa,Alain; Dance,Christopher R, System and method for performing electronic information retrieval using keywords.
  1033. Stefik, Mark J.; Pirolli, Peter L. T., System and method for permitting use of content.
  1034. Stefik, Mark J.; Pirolli, Peter L. T., System and method for permitting use of content using transfer rights.
  1035. Kortemeyer, Gerd; Bauer, Wolfgang, System and method for preparing and delivering informational content.
  1036. Schull,Jonathan, System and method for processing protected audio information.
  1037. Schull, Jonathan, System and method for processing protected text information.
  1038. Schull,Jonathan, System and method for processing protected video information.
  1039. Nagel,Robert H., System and method for production and authentication of original documents.
  1040. Nagel,Robert H., System and method for production and authentication of original documents.
  1041. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  1042. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  1043. Wang, Xin, System and method for protection of digital works.
  1044. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  1045. Grim, III, Clifton E.; Schmidt, Christopher I.; Wilson, John D., System and method for providing a secure intellectual property marketplace.
  1046. Alexander T. van Zoest ; Matthew John DiMeo ; Brian Mason Degenhardt ; Charles Lawrence Sismondo ; Brian Callahan ; John William DeRose ; George Matthew Costello ; Tristan Anne Barnum ; James, System and method for providing access to electronic works.
  1047. DeRose,John William; Van Zoest,Alexander T.; Dimeo,Matthew John; Degenhardt,Brian Mason; Sismondo,Charles Lawrence; Callahan,Brian; Costello,George Matthew; Barnum,Tristan Anne; Park,James; Stephens,Joshua; Oliphant,Michael; Story,David M; Knott,John P.; Moore,James Martin, System and method for providing access to electronic works.
  1048. Van Zoest, Alexander T.; Dimeo, Matthew John; Degenhardt, Brian Mason; Sismondo, Charles Lawerence; Callahan, Brian; DeRose, John William; Costello, George Matthew; Barnum, Tristan Anne; Park, James;, System and method for providing access to electronic works.
  1049. Novak, Robert E., System and method for providing conditional access to digital content.
  1050. Morimoto,Nobuyoshi, System and method for providing temporary access to content during shipping.
  1051. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  1052. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  1053. Sohail B. Mohammed ; Kipley J. Olson, System and method for regulating a network service provider's ability to host distributed applications in a distributed processing environment.
  1054. Hug, Joshua D., System and method for relicensing content.
  1055. Hug, Joshua D., System and method for relicensing content.
  1056. Hug, Joshua D., System and method for relicensing content.
  1057. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  1058. Issa, Alfredo; Amidon, Christopher; Walsh, Richard, System and method for rights propagation and license management in conjunction with distribution of digital content in a social network.
  1059. Kline, Paul A.; Nitin, Sawant; Weinstein, Allan M.; Weinstein, David J.; Roberts, Jon L., System and method for secure commercial multimedia rental and distribution over secure connections.
  1060. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  1061. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  1062. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  1063. Schull, Jonathan, System and method for selectively changing parameter settings based on lineage analysis of digital information.
  1064. Schull,Jonathan, System and method for selectively enabling access based on lineage analysis of digital information.
  1065. Schull,Jonathan, System and method for selling protected information in an oem context.
  1066. Walsh, Richard; Amidon, Christopher; Issa, Alfredo, System and method for social network trust assessment.
  1067. Walsh, Richard; Amidon, Christopher; Issa, Alfredo, System and method for social network trust assessment.
  1068. Wang, Xin, System and method for specifying and processing legality expressions.
  1069. Mindrum, Gordon Scott; Sefton, Steven Craig; Johnson, Jeffrey Jon, System and method for submitting and receiving images.
  1070. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  1071. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  1072. Polan,Michael G.; Yeung,Alice T., System and method for synchronizing data repositories.
  1073. Wang,Xin, System and method for transferring the right to decode messages.
  1074. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  1075. Dunkeld, Bryan; Lambert, Edward, System and method for unique digital asset identification and transaction management.
  1076. Butler, Jeffrey; Rappaport, Rosie; McPherson, Darrin, System and method for user creation of digital objects.
  1077. Amidon, Christopher; Walsh, Richard; Issa, Alfredo, System and method of optimizing social networks and user levels based on prior network interactions.
  1078. Hamilton,Dave; Brinkman,John; Longawa,John; Randall,Charles Corris; Rampley,Rob; Ryle,Marcus, System and method of secure electronic commerce transactions including tracking and recording the distribution and usage of assets.
  1079. Issa, Alfredo; Walsh, Richard; Amidon, Christopher, System and method of sharing content among multiple social network nodes using an aggregation node.
  1080. Erickson,John S., System and methods for managing digital creative works.
  1081. Rudd, James M., System and methods for managing the distribution of electronic content.
  1082. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  1083. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  1084. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  1085. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  1086. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  1087. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  1088. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  1089. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  1090. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  1091. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  1092. Ishibashi, Yasuhiro; Kamibayashi, Toru; Tamura, Masafumi, System capable of recording a content onto a recording medium which does not have a medium ID.
  1093. Yoshioka Makoto,JPX ; Tsunoda Haruhiko,JPX ; Hasegawa Kazuharu,JPX ; Aoe Hidefumi,JPX, System for and method of distributing proceeds from contents.
  1094. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  1095. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  1096. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  1097. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  1098. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  1099. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  1100. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  1101. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  1102. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  1103. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  1104. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  1105. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  1106. Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
  1107. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  1108. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  1109. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  1110. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  1111. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  1112. Malone, Michael F.; Murphy, Frederick J., System for embedding searchable information, encryption, signing operation, transmission, storage and retrieval.
  1113. Kupka,Michael S.; Hawkins,Michael L.; Thomas,Trent M., System for keying protected electronic data to particular media to prevent unauthorized copying using a compound key.
  1114. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  1115. Roegner, Michael W., System for managing access to protected resources.
  1116. Roegner, Michael W., System for managing access to protected resources.
  1117. Michael S. Kupka ; Michael G. Lundgren, System for prepayment of electronic content using removable media and for prevention of unauthorized copying of same.
  1118. Bayer,Leonard; Mathias,Nelson; Frost,David, System for protecting information over the internet.
  1119. Watson, Scott F.; Haseltine, Eric C.; Freeman, Eric; Freeman, Elisabeth M.; LaBerge, Aaron P.; Fritz, Adam T., System for the delivery and dynamic presentation of large media assets over bandwidth constrained networks.
  1120. Stefik, Mark J.; Pirolli, Peter L. T., System, apparatus, and media for granting access to and utilizing content.
  1121. Cheng,William; Hwang,Kenneth; Kannan,Ravi; Katchapalayam,Babu; Liu,Bing; Narasimhan,Balaji; Ramanujam,Gopal; Tran,Jonathan, System, method, and computer program product for uninstalling computer software.
  1122. Lofgren, Neil E.; Seder, Phillip Andrew; MacIntosh, Brian T., Systems and methods facilitating communication with remote computers.
  1123. Serret Avila,Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  1124. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  1125. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  1126. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  1127. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  1128. Pinkas, Binyamin; Sander, Tomas; Home, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  1129. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  1130. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  1131. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  1132. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  1133. Pinkas,Binyamin; Sander,Tomas; Horne,William G., Systems and methods for conducting transactions and communications using a trusted third party.
  1134. Clifford, Thomas, Systems and methods for creating a rights management system (RMS) with superior layers and subordinate layers.
  1135. Valenzuela, Edgardo; Chen, Eddie J.; DeMartini, Thomas; Fung, Joseph Zhung Yee; Nguyen, Mai; Tieu, Vincent Hsiang; Tran, Duc, Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates.
  1136. Valenzuela, Edgardo; Chen, Eddie J.; DeMartini, Thomas; Fung, Joseph Zhung Yee; Nguyen, Mai; Tieu, Vincent Hsiang; Tran, Duc, Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates.
  1137. Amidon, Christopher; Issa, Alfredo; Walsh, Richard, Systems and methods for discovering, creating, using, and managing social network circuits.
  1138. Bell,David G.; Liang,Anthony Tao; Garnaat,Mitch; Brun Cottan,Francoise, Systems and methods for distributed administration of public and private electronic markets.
  1139. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  1140. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  1141. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  1142. Chasen, Jeffrey M.; Elman, Joshua E., Systems and methods for dynamic access to program features.
  1143. Yuen,Henry; Conboy,Garth; Duga,Brady; Fishkin,Ken; Gujar,Anuj; Leschner,Will; Rivlin,John; Tao,Zhen, Systems and methods for electronic off-line catalog.
  1144. MacKay, Michael K.; Maher, David P., Systems and methods for governing content rendering, protection, and management applications.
  1145. MacKay, Michael K.; Maher, David P., Systems and methods for governing content rendering, protection, and management applications.
  1146. MacKay, Michael K.; Maher, David P., Systems and methods for governing content rendering, protection, and management applications.
  1147. MacKay,Michael K.; Maher,David P., Systems and methods for governing content rendering, protection, and management applications.
  1148. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  1149. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  1150. Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
  1151. Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
  1152. Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
  1153. Maher,David P.; Rudd,James M.; Swenson,Eric J.; Landsman,Richard A., Systems and methods for managing and protecting electronic content and applications.
  1154. Wawda, Abubakar; Spertus, Michael, Systems and methods for managing rights of data via dynamic taint analysis.
  1155. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  1156. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  1157. Grasset, Jean-Francois Benjamin, Systems and methods for mirroring and transcoding media content.
  1158. Walker, Jay S.; Patterson, Michael W.; Walker, Evan R.; Ellenthal, Matthew P., Systems and methods for operating lottery games including player-designated beneficiaries and conditional payout distribution.
  1159. Walker, Jay S.; Patterson, Michael W.; Walker, Evan; Ellenthal, Matthew P., Systems and methods for operating lottery games including player-designated beneficiaries and conditional payout distribution.
  1160. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  1161. Lunt,Teresa F.; Franklin,Matthew K., Systems and methods for policy based printing.
  1162. Goldberg, Andrew V.; Hartline, Jason D.; Wright, Andrew K., Systems and methods for pricing and selling digital goods.
  1163. Goldberg,Andrew V.; Hartline,Jason D.; Wright,Andrew K., Systems and methods for pricing and selling digital goods.
  1164. Begen, Geoffrey C., Systems and methods for protecting content when using a general purpose user interface application.
  1165. Sibert, W. Olin, Systems and methods for protecting data secrecy and integrity.
  1166. Sibert,W. Olin, Systems and methods for protecting data secrecy and integrity.
  1167. Thomas, William L.; Ellis, Michael D.; Easterbrook, Kevin B.; Reichardt, M. Scott; Knee, Robert A., Systems and methods for providing storage of data on servers in an on-demand media delivery system.
  1168. Shamoon, Talal G., Systems and methods for retrofitting electronic appliances to accept different content formats.
  1169. Shamoon,Talal G., Systems and methods for retrofitting electronic appliances to accept different content formats.
  1170. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  1171. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  1172. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  1173. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  1174. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  1175. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  1176. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1177. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1178. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1179. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1180. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1181. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1182. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1183. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1184. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1185. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1186. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1187. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1188. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1189. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1190. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1191. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1192. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1193. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1194. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1195. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1196. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1197. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1198. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1199. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1200. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1201. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1202. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1203. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1204. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  1205. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  1206. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  1207. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  1208. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  1209. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  1210. Butler, Jon F.; Nakada, Mark W., Systems and methods monitoring devices, systems, users and user activity at remote locations.
  1211. Meyer, Joel R.; Rhoads, Geoffrey B., Systems and methods of managing audio and other media.
  1212. Saberi, Amin; Borgs, Christian H.; Chayes, Jennifer T.; Mahdian, Mohammad; Immorlica, Nicole S., Systems and methods that facilitate maximizing revenue for multi-unit auctions with private budgets.
  1213. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  1214. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  1215. Levy, Kenneth L.; Meyer, Joel R.; Andrews, III, Hoyet Harrison, Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities.
  1216. Jones, Robert, Systems, compositions, and methods for full color laser engraving of ID documents.
  1217. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  1218. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  1219. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  1220. Austin Pamela Sue, Systems, methods, and computer program products for delivering information in a preferred medium.
  1221. Austin, Pamela Sue, Systems, methods, and computer program products for delivering information in a preferred medium.
  1222. Schuehler, David V.; Lockwood, John W., TCP-splitter: reliable packet monitoring methods and apparatus for high speed networks.
  1223. Jones, Robert L.; Bi, Daoshen; Yeh, Tung-Feng, Tamper evident adhesive and identification document including same.
  1224. Lim, Keng, Techniques and system for specifying policies using abstractions.
  1225. Lim, Keng, Techniques and system to deploy policies intelligently.
  1226. Lim, Keng, Techniques and system to deploy policies intelligently.
  1227. Lim, Keng, Techniques and system to manage access of information using policies.
  1228. Lim, Keng, Techniques and system to monitor and log access of information based on system and user context using policies.
  1229. Lim, Keng, Techniques and system to monitor and log access of information based on system and user context using policies.
  1230. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  1231. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  1232. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  1233. Lim, Keng, Techniques of optimizing policies in an information management system.
  1234. Lim, Keng, Techniques of transforming policies to enforce control in an information management system.
  1235. Lim, Keng, Techniques of transforming policies to enforce control in an information management system.
  1236. Lim, Keng, Techniques of transforming policies to enforce control in an information management system.
  1237. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  1238. Millman, Jonathan T.; Rajasekharan, Ajit V.; Sperring, Jr., Foy C.; Story, Jr., Guy A., Time-based digital content authorization.
  1239. Sy,Bon K., Time-based software licensing approach.
  1240. Collins, Kevin; Roever, Stefan; Wray, Kevin; Clark, Alex F.; Ginter, Karl, Title materials embedded within media formats and related applications.
  1241. Roever, Stefan; Ginter, Karl, Title-enabled networking.
  1242. Eldridge, Marge; Flynn, Michael J.; Jones, Chris; Kleyn, Michael; Lamming, Michael G.; Pendlebury, David, Token-based document transactions.
  1243. Manchala, Daniel W., Tools for accessing digital works.
  1244. Patterson, Patrick E., Tracking electronic content.
  1245. Patterson, Patrick E., Tracking electronic content.
  1246. Gobbi, John J.; Kelly, Bryan; Brown, David L.; Hirt, Fred S., Tracking system using personal digital key groups.
  1247. Currans, Kevin G.; Sang, Jr., Henry W., Transaction payment system.
  1248. Lim, Keng, Transforming policies to enforce control in an information management system.
  1249. Weeks, Stephen P.; Serret-Avila, Xavier, Trust management systems and methods.
  1250. Weeks, Stephen P.; Serret-Avila, Xavier, Trust management systems and methods.
  1251. Weeks, Stephen P.; Serret-Avila, Xavier, Trust management systems and methods.
  1252. Weeks,Stephen P.; Serret Avila,Xavier, Trust management systems and methods.
  1253. Weeks,Stephen P.; Serret Avila,Xavier, Trust management systems and methods.
  1254. Weeks, Stephen P.; Serret-Avila, Xavier, Trust-management systems and methods.
  1255. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  1256. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  1257. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  1258. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  1259. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  1260. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  1261. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  1262. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  1263. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  1264. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce electronic transactions and rights management.
  1265. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  1266. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  1267. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, and rights management.
  1268. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  1269. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  1270. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  1271. Giobbi, John J., Two-level authentication for secure transactions.
  1272. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Two-level authentication for secure transactions.
  1273. DeMello,Marco A.; Krishnaswamy,Vinay; Malaviarachchi,Rushmi U.; Manferdelli,John L.; Serbus,Bradley; Narin,Attila; Bourne,Steve, Tying a digital license to a user and tying the user to multiple computing devices in a digital rights management (DRM) system.
  1274. Oho, Masahiro; Higashi, Akio; Inoue, Mitsuhiro, Unit-to-unit data exchange system, and unit, exchange completion data keeping device and program for use in the same.
  1275. Mahlbacher, James C., Universal DRM support for devices.
  1276. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  1277. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  1278. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  1279. Chess,David M.; Dyer,Joan; Itoi,Naomaru; Kravitz,Jeff; Palmer,Elaine Rivette; Perez,Ronald; Smith,Sean William, Used trusted co-servers to enhance security of web interaction.
  1280. Katz, Neil; Semple, Bruce P.; Stern, Edith H.; Willner, Barry E., User controlled multi-device media-on-demand system.
  1281. Katz, Neil; Semple, Bruce P.; Stern, Edith H.; Willner, Barry E., User controlled multi-device media-on-demand system.
  1282. Katz, Neil; Semple, Bruce P.; Stern, Edith H.; Willner, Barry E., User controlled multi-device media-on-demand system.
  1283. Tijerino, Manuel Ignacio, User defined internet jukebox kiosks set top box.
  1284. Zhang,Guobiao, User-configurable pre-recorded memory.
  1285. Levy,Kenneth L., User-friendly rights management systems and methods.
  1286. Narin, Attila; DeMello, Marco A., Using a first device to engage in a digital rights management transaction on behalf of a second device.
  1287. Narin,Attila; DeMello,Marco A., Using a first device to engage in a digital rights management transaction on behalf of a second device.
  1288. Levy, Kenneth L., Using embedded data with file sharing.
  1289. Levy, Kenneth L., Using embedded data with file sharing.
  1290. Levy, Kenneth L., Using embedded data with file sharing.
  1291. Lim, Keng, Using information usage data to detect behavioral patterns and anomalies.
  1292. Levy, Kenneth L., Using object identifiers with content distribution.
  1293. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  1294. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  1295. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  1296. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  1297. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  1298. Paresh Patel GB; Ku Lee ; Roger Reider ; Drew Kittel ; Lolo Lasida, Vault controller based registration application serving web based registration authorities and end users for conducting electronic commerce in secure end-to-end distributed information system.
  1299. Fisk,Mark; Carroll,Robert; Maruyama,Hirosi; Ghafir,Hatem, Vault controller context manager and methods of operation for securely maintaining state information between successive browser connections in an electronic business system.
  1300. Ghafir Hatem ; Poetzschke Dieter, Vault controller dispatcher and methods of operation for handling interaction between browser sessions and vault processes in electronic business systems.
  1301. Bacha, Hamid; Carroll, Robert B., Vault controller secure depositor for managing secure communication.
  1302. Bacha, Hamid; Burns, Robert; Carroll, Robert B.; Fisk, Mark, Vault controller supervisor and method of operation for managing multiple independent vault processes and browser sessions for users in an electronic business system.
  1303. Joao, Raymond Anthony, Vehicle operator and/or occupant information apparatus and method.
  1304. Inoue, Hiroshi; Nakagawa, Toshiyuki, Verification of image data.
  1305. Inoue,Hiroshi; Nakagawa,Toshiyuki, Verification of image data.
  1306. Geoffrey B. Rhoads, Video copy-control with plural embedded signals.
  1307. Rhoads,Geoffrey B., Video steganography.
  1308. Rhoads,Geoffrey B., Video steganography.
  1309. Rhoads, Geoffrey B., Video steganography or encoding.
  1310. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Virtual host for protocol transforming traffic traversing between an IP-compliant source and non-IP compliant destination.
  1311. Walsh, Richard J.; Issa, Alfredo C.; Amidon, Christopher M.; Evans, James, Virtual peer for a content sharing system.
  1312. Walsh, Richard J.; Issa, Alfredo C.; Amidon, Christopher M.; Evans, James; Hillen, Jens, Virtual peer in a peer-to-peer network.
  1313. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
  1314. Rhoads, Geoffrey B., Watermark embedder and reader.
  1315. Rhoads, Geoffrey B.; Gustafson, Ammon E., Watermark embedder and reader.
  1316. Geoffrey B. Rhoads, Watermark enabled video objects.
  1317. Rhoads,Geoffrey B.; Levy,Kenneth L.; McKinley,Tyler J., Watermark encoded video, and related methods.
  1318. Davidson, Clayton L.; Kumar, Aruna B., Watermark encoding and decoding in imaging devices and imaging device interfaces.
  1319. Geoffrey B. Rhoads, Watermark encoding method exploiting biases inherent in original signal.
  1320. McKinley, Tyler J.; Seder, Phillip Andrew; Rodriguez, Tony F., Watermark systems and methods.
  1321. Rhoads, Geoffrey B., Watermarking methods and media.
  1322. Hurtado, Marco M.; Milsted, Kenneth L.; Nguyen, Kha D., Watermarking system that executes received watermarking instructions to embed a watermark.
  1323. Rhoads, Geoffrey B., Watermarking to convey auxiliary information, and media embodying same.
  1324. Vogel, Joseph Henry, Web-based system and method to capture and distribute royalties for access to copyrighted academic texts by preventing unauthorized access to discussion boards associated with copyrighted academic texts.
  1325. Rhoads, Geoffrey B., Wireless methods using signature codes.
  1326. Braitberg, Michael F.; Volk, Steven B., Writeable medium access control using a medium writeable area.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트