$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for managing copyrighted electronic media 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/30
출원번호 US-0543161 (1995-10-13)
발명자 / 주소
  • Erickson John S.
출원인 / 주소
  • Trustees of Dartmouth College
대리인 / 주소
    Vock
인용정보 피인용 횟수 : 1124  인용 특허 : 16

초록

Copyrighted electronic media are packaged in a secure electronic format, and registered on associated registration server, which serves to provide on-line licensing and copyright management for that media. Users are connected to the server, e.g., through a computer network or the Internet, to enable

대표청구항

[ Having described the invention, what is claimed as new and secured by Letters Patent is:] [1.] A method for managing copyrighted electronic media, comprising the steps of:formatting media into a secure electronic container, the container including a digital representation of the media and a minimu

이 특허에 인용된 특허 (16)

  1. Corbin John R. (Sunnyvale CA), Apparatus and method for licensing software on a network of computers.
  2. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  3. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  4. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  5. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  6. Ross Cliff D. (Pleasant Grove UT) Taylor Neil W. (Springville UT) Kingdon Kevin W. (Orem UT) Davis Howard R. (Salem UT) Major Drew (Orem UT), Method and apparatus for electronic licensing.
  7. Durst ; Jr. Robert T. (212 Shelton Rd. Monroe CT 06468) Hunter Kevin D. (440 Allyndale Dr. Stratford CT 06497), Method and system for preventing unauthorized use of software.
  8. Matyas Stephen M. (Kingston NY) Meyer Carl H. W. (Kingston NY), Method for authenticating the identity of a user of an information system.
  9. Earnest Lester D. (Los Altos Hills CA), Modular software security.
  10. Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
  11. Ananda Mohan (15910 Ventura Blvd. ; Ste. 800 Encino CA 91436), Secure software rental system using continuous asynchronous password verification.
  12. Ananda Mohan (15910 Ventura Blvd. ; Suite 800 Eucino CA 91436), Secure software rental system using distributed software.
  13. Chernow Fred (360 Kiowa Pl. Boulder CO 80303) Peterson Randy J. (1330 Arapahoe St. Boulder CO 80302), Software distribution system.
  14. Medveczky Geza (5395 Greenrich Rd. Castro Valley CA 94552) Lunsford Kelvin (36156 Bayonne Dr. Newark CA 94560) ..UC: 380/4 380/25 380/49 340/82534, System and apparatus for protecting computer software.
  15. Freeny ; Jr. Charles C. (Fort Worth TX), System for reproducing information in material objects at a point of sale location.
  16. Enescu Michael A. (Sunnyvale CA) Lum James (Redwood City CA), Tamper-resistant method for authorizing access to data between a host and a predetermined number of attached workstation.

이 특허를 인용한 특허 (1124)

  1. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., Accessing protected content in a rights-management architecture.
  2. Haney, Richard D., Ad hoc location sharing group between first and second cellular wireless devices.
  3. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  4. Cuff, Michael A.; Gehrke, Todd; Kasad, Farhad, Aggregate location dynometer (ALD).
  5. Cuff, Michael A.; Gehrke, Todd; Kasad, Farhad, Aggregate location dynometer (ALD).
  6. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  7. Cope, Rod, Analyzing content using abstractable interchangeable elements.
  8. Marshall, Roger S.; Zhu, Yinjun, Ancillary data support in session initiation protocol (SIP) messaging.
  9. McFarland, Keith; Jain, Vishal, Anonymous voice conversation.
  10. Koji Takeda JP; Kazuo Saito JP; Kenichiro Kigo JP, Apparatus and method for data capsule generation.
  11. Soung-Hyun Um KR; Kang-Soo Seo KR; Sung-Wan Park KR, Apparatus and method for determining ID information recorded on an information-stored medium.
  12. Ito, Satoshi; Aisu, Hideyuki; Kamibayashi, Tooru; Akiyama, Koichiro; Hamada, Shinichiro, Apparatus and method for digital content editing.
  13. Malone, Michael F., Apparatus and method for embedding searchable information into a file for transmission, storage and retrieval.
  14. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information into a file for transmission, storage and retrieval.
  15. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information into a file, encryption, transmission, storage and retrieval.
  16. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval.
  17. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval.
  18. Kuroda, Yasutsugu; Yoshioka, Takashi; Ono, Etsuo, Apparatus and method for managing electronic original data.
  19. Haney, Richard D., Apparatus and method for obtaining content on a cellular wireless device based on proximity.
  20. Haney, Richard D., Apparatus and method for obtaining content on a cellular wireless device based on proximity to other wireless devices.
  21. Aisu, Hideyuki; Ito, Satoshi, Apparatus and method for playback of digital content.
  22. Brown,Michael Wayne; Hamzy,Mark Joseph; Jones,Scott Thomas, Apparatus and method for providing a user interface based on access rights information.
  23. Brown, Michael Wayne; Hamzy, Mark Joseph; Jones, Scott Thomas, Apparatus and method for providing access rights information in a portion of a file.
  24. Malone, Michael F.; Murphy, Frederick J., Apparatus and method to embed searchable information into a file, encryption, transmission, storage and retrieval.
  25. Haney, Richard D., Apparatus and method to transmit content to a cellular wireless device based on proximity to other wireless devices.
  26. Rhoads, Geoffrey B., Apparatus and methods to process video or audio.
  27. Csaszar Andras ; Friedman Stephen ; Ligeti Gabor,HUX, Apparatus for bleaching a de-activated link in a web page of any distinguishing color or feature representing an activ.
  28. Saito, Makoto, Apparatus for data copyright management system.
  29. Malone, Michael F., Apparatus for personal voice assistant, location services, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatag(s)/ contextual tag(s), storage and search retrieval.
  30. Malone, Michael F., Apparatus for voice assistant, location tagging, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatags/contextual tags, storage and search retrieval.
  31. Orthlieb, Carl W.; Pravetz, James P.; Rosenbaum, Sarah, Application rights enabling.
  32. Orthlieb,Carl W.; Pravetz,James P.; Rosenbaum,Sarah, Application rights enabling.
  33. Narin, Attila; DeMello, Marco A.; Yaacovi, Yoram; Alger, Jeffrey A.; Keely, Leroy B.; Silver, David Michael; Madonna, Christopher Robert Richard; Beezer, John; Hughes, Kathryn E., Architecture for an electronic shopping service integratable with a software application.
  34. Margolus,Norman H., Archive with timestamps and deletion management.
  35. Zhu, Yinjun; Thompson, Paul, Area event handling when current network does not cover target area.
  36. Hines, Gordon John; Tapia, Mario G.; Cousins, Will, Area watcher for wireless network.
  37. Hines, Gordon; Tapia, Mario G.; Cousins, Will, Area watcher for wireless network.
  38. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  39. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  40. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  41. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  42. Rhoads, Geoffrey B.; Rodriguez, Tony F.; McKinley, Tyler J.; Miller, Marc D.; Hierholzer, Kirstin, Associating objects with corresponding behaviors.
  43. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Malik,Prashant; Hughes,Kathryn E.; Byrum,Frank D., Asynchronous communication within a server arrangement.
  44. Rhoads, Geoffrey B., Audio and video signal processing.
  45. Rhoads Geoffrey B., Audio- and graphics-based linking to internet.
  46. Griffin, John L.; McFarland, Keith A.; Wells, William P., Authenticating cloud computing enabling secure services.
  47. Levin, Douglas Andrew; Shah, Ashesh C.; Pedersen, Palle Martin, Authenticating licenses for legally-protectable content based on license profiles and content identifiers.
  48. Kelly, Sean B.; Cranfill, Elizabeth Caroline Furches; Alsina, Thomas, Authentication and notification heuristics.
  49. Kelly, Sean B.; Cranfill, Elizabeth Caroline Furches; Alsina, Thomas, Authentication and notification heuristics.
  50. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Authentication mechanisms to enable sharing personal information via a networked computer system.
  51. McFarland, Keith A., Authentication via motion of wireless device movement.
  52. McFarland, Keith A., Authentication via motion of wireless device movement.
  53. Kitamura, Yoshiharu, Authored data providing method, system and computer-readable recording medium for performing said method.
  54. Lapstun, Paul; Silverbrook, Kia, Authorization protocol for network publishing.
  55. Ben-Yaacov, Yaacov; Ben-Yaacov, Boaz, Automatic digital music library builder.
  56. Hines, John Gordon; Croy, Jonathan; Marshall, Roger Stuart, Automatic location identification (ALI) emergency services pseudo key (ESPK).
  57. Zhu, Yinjun; Conner, Cristine; Hines, Gordon John; Liao, Hsin-Chih; Pelligrini, William, Automatic location identification (ALI) service requests steering, connection sharing and protocol translation.
  58. Okamoto,Tetsuo, Automatic performance data editing and reproducing apparatus, control method therefor, and program for implementing the control method.
  59. Fosback, Jason Robert; Cortes, Ricardo D.; Muller, Max, Automatic transport discovery for media submission.
  60. Rhoads, Geoffrey B., Background watermark processing.
  61. Aydar, Ali; Mendelson, Jordan; Fanning, Shawn, Batch loading and self-registration of digital media files.
  62. Peinado, Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  63. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  64. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  65. Peinado, Marcus, Binding a digital license to a portable or the like in a digital rights management (DMR) system and checking out/checking in the digital license to/from the portable device or the like.
  66. Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding content to a portable storage device or the like in a digital rights management (DRM) system.
  67. Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding digital content to a portable storage device or the like in a digital rights management (DRM) system.
  68. Princen, John; Srinivasan, Pramila; Anderson, Craig Steven, Block-based media content authentication.
  69. Scherpbier Andrew W., Browser controller.
  70. Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, Business method and system for serving third party software applications.
  71. Roberts Pasha ; Bhathena Firdaus ; Honore Francis A., Call center system where users and representatives conduct simultaneous voice and joint browsing sessions.
  72. Pitt, Lance Douglas; DeLapp, Daniel D.; Lawrence, Sarah Jean, Cellular augmented radar/laser detection using local mobile network within cellular network.
  73. Pitt, Lance Douglas; Lawrence, Sarah Jean; DeLapp, Daniel D., Cellular augmented radar/laser detector.
  74. Pitt,Lance Douglas; Lawrence,Sarah Jean; DeLapp,Daniel D., Cellular augmented radar/laser detector.
  75. Pitt, Lance Douglas, Cellular augmented vehicle alarm notification together with location services for position of an alarming vehicle.
  76. Srinivasan, Pramila; Princen, John, Certificate verification.
  77. Scherpbier Andrew W., Collaborative web browser.
  78. Braitberg, Michael F.; Volk, Steven B.; Zaharris, Daniel R.; Davies, David H., Combination mastered and writeable medium and use in electronic internet appliance.
  79. Margolus, Norman H., Communicating information between clients of a data repository that have deposited identical data items.
  80. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  81. Darago, Vincent S; Jenkins, Christopher, Computer architecture for managing courseware in a shared use operating environment.
  82. Geoffrey B. Rhoads, Computer linking methods using encoded graphics.
  83. Benson Glenn,DEX, Computer system for protecting a file and a method for protecting a file.
  84. Rhoads Geoffrey B., Computer system linked by using information in data objects.
  85. Rhoads, Geoffrey, Computer system linked by using information in data objects.
  86. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  87. Hoffman, James; Friskel, James, Computerized method, program, and apparatus for limited sharing of digital content.
  88. Levy,Kenneth L.; Rhoads,Geoffrey B., Connected audio and other media objects.
  89. Levy, Kenneth L.; Rhoads, Geoffrey B., Connected audio content.
  90. Hines, Gordon John; Cousins, Will, Consequential location derived information.
  91. Stebbings, David W., Content authorization system over networks including searching and reporting for unauthorized content locations.
  92. Stebbings, David W., Content authorization system over networks including searching and reporting for unauthorized use.
  93. Stebbings,David W., Content authorization system over networks including the Internet and method for transmitting same.
  94. Rasizade, Oktay; Tanik, Haluk Kent; Jogand-Coulomb, Fabrice, Content binding at first access.
  95. Rhoads, Geoffrey B., Content containing a steganographically encoded process identifier.
  96. Braitberg,Michael F.; Volk,Steven B., Content distribution method and apparatus.
  97. Heaven, John; Hoch, Wojtek; Hunt, Cliff, Content distribution system and method.
  98. Hannigan, Brett T.; McKinley, Tyler J., Content identification and electronic tickets, coupons and credits.
  99. Hannigan, Brett T.; McKinley, Tyler J., Content identification and electronic tickets, coupons and credits.
  100. Levy, Kenneth L., Content identification and management in content distribution networks.
  101. Rhoads, Geoffrey B., Content identification through deriving identifiers from video, images and audio.
  102. Conwell, William Y.; Bradley, Brett A.; Rhoads, Geoffrey B., Content identifiers.
  103. Conwell,William Y.; Bradley,Brett A.; Rhoads,Geoffrey B., Content identifiers triggering corresponding responses through collaborative processing.
  104. Brock, James L.; Pitkow, James E., Content monitoring and compliance enforcement.
  105. Brock, James L.; Pitkow, James E., Content monitoring and compliance enforcement.
  106. Brock, James L.; Pitkow, James E., Content monitoring and host compliance evaluation.
  107. Ishibashi, Yoshihito; Oishi, Tateo; Asano, Tomoyuki; Osawa, Yoshitomo, Content processing system.
  108. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  109. Stefik,Mark J., Content rendering device with usage rights.
  110. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  111. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  112. Graham, Chris; Cahill, Jason; Brown, Kevin, Content rights management for document contents and systems, structures, and methods therefor.
  113. Levy, Kenneth L.; Stager, Reed R.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Content sensitive connected content.
  114. Ishibashi,Yoshihito; Oishi,Tateo; Asano,Tomoyuki; Osawa,Yoshitomo, Contents processing system.
  115. Levy, Kenneth L.; Rhoads, Geoffrey B.; Stager, Reed R.; Rodriguez, Tony F., Context sensitive connected content.
  116. Rhoads, Geoffrey B.; Levy, Kenneth L.; McKinley, Tyler J., Control signals in streaming audio or video indicating a watermark.
  117. Tsukamoto, Junichi; Goto, Koichi; Fukushima, Shinichi, Controlled-access broadcast signal receiving system.
  118. Tsukamoto, Junichi; Goto, Koichi; Fukushima, Shinichi, Controlled-access broadcast signal receiving system.
  119. Tsukamoto, Junichi; Goto, Koichi; Fukushima, Shinichi, Controlled-access broadcast signal receiving system.
  120. Rhoads, Geoffrey B., Controlling a device based upon steganographically encoded data.
  121. Saito, Makoto, Controlling database copyrights.
  122. Saito, Makoto, Controlling database copyrights.
  123. Saito, Makoto, Controlling database copyrights.
  124. Rhoads, Geoffrey B., Controlling use of audio or image content.
  125. Rhoads, Geoffrey B., Controlling use of audio or image content.
  126. DeTreville,John D., Copy detection for digitally-formatted works.
  127. DeTreville,John D., Copy detection for digitally-formatted works.
  128. Daniel Schreiber IL; Andrew Goldman IL, Copy protection of digital images transmitted over networks.
  129. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  130. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  131. Bi, Daoshen; Jones, Robert L., Covert variable information on ID documents and methods of making same.
  132. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information based on limiting a span of an inverted cone for locating satellite in-range determinations.
  133. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  134. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  135. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  136. Pitt,Lance Douglas; Lamprecht,Leslie Johann; Martin,Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  137. Saito, Makoto, Data copyright management.
  138. Saito, Makoto, Data copyright management.
  139. Saito, Makoto, Data copyright management system.
  140. Saito,Makoto, Data copyright management system.
  141. Saito, Makoto, Data management.
  142. Saito, Makoto, Data management system.
  143. Saito, Makoto, Data management system.
  144. Saito, Makoto, Data management system.
  145. Saito, Makoto, Data management system.
  146. Moskowitz, Scott A., Data protection method and device.
  147. Moskowitz, Scott A., Data protection method and device.
  148. Moskowitz, Scott A., Data protection method and device.
  149. Moskowitz, Scott A., Data protection method and device.
  150. Hasebe, Takayuki; Torii, Naoya; Takenaka, Masahiko; Okada, Souichi; Kijima, Yuji, Data protection system, data preparation device, and data working device.
  151. Margolus, Norman H.; Floyd, Jered J., Data repository and method for promoting network storage of data.
  152. Margolus, Norman H.; Knight, Jr., Thomas F., Data repository and method for promoting network storage of data.
  153. Margolus, Norman H.; Knight, Jr., Thomas F., Data repository and method for promoting network storage of data.
  154. Margolus, Norman H.; Knight, Jr., Thomas F., Data repository and method for promoting network storage of data.
  155. Margolus, Norman H.; Knight, Jr., Thomas F.; Floyd, Jered J.; Homsy, II, George E., Data repository and method for promoting network storage of data.
  156. Margolus,Norman H.; Knight, Jr.,Thomas F., Data repository and method for promoting network storage of data.
  157. Margolus,Norman H.; Knight, Jr.,Thomas F., Data repository and method for promoting network storage of data.
  158. Margolus,Norman H.; Knight, Jr.,Thomas F.; Floyd,Jered J.; Hartman,Sam; Homsy, II,George E., Data repository and method for promoting network storage of data.
  159. Margolus,Norman H.; Knight, Jr.,Thomas F.; Floyd,Jered J.; Hartman,Sam; Homsy, II,George E., Data repository and method for promoting network storage of data.
  160. Margolus,Norman H.; Knight, Jr.,Thomas F.; Pratt,Gill A., Data repository and method for promoting network storage of data.
  161. Margolus,Norman H.; Knight, Jr.,Thomas F.; Pratt,Gill A., Data repository and method for promoting network storage of data.
  162. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  163. Abe,Miki; Yoshida,Tadao, Data transfer system, data transfer apparatus, data recording apparatus, data transfer method, and recording medium.
  164. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark or derived identifier proxy.
  165. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark proxy.
  166. Patterson, Patrick E., Delivering electronic content.
  167. Patterson, Patrick E., Delivering electronic content.
  168. Patterson, Patrick E., Delivering electronic content.
  169. Patterson,Patrick E., Delivering electronic content.
  170. Yen, Wei; Princen, John; Lo, Raymond; Srinivasan, Pramila, Delivery of license information using a short messaging system protocol in a closed content distribution system.
  171. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  172. Levy, Kenneth L.; Rhoads, Geoffrey B., Deriving attributes from images, audio or video to obtain metadata.
  173. de Vries, Jeffrey; Hitomi, Arthur S., Deriving component statistics for a stream enabled application.
  174. de Vries, Jeffrey; Hitomi, Arthur Shingen, Deriving component statistics for a stream enabled application.
  175. Rhoads, Geoffrey B., Deriving identifying data from video and audio.
  176. Levy, Kenneth L.; Meyer, Joel R., Deriving multiple fingerprints from audio or video content.
  177. Levy, Kenneth L.; Hannigan, Brett T.; Bradley, Brett A.; Rhoads, Geoffrey B., Deriving multiple identifiers from multimedia content.
  178. Brock, James L.; Pitkow, James E., Determination of originality of content.
  179. Satoh Kenji,JPX ; Okumura Akitoshi,JPX ; Ikeda Takahiro,JPX, Determining copyright information based on overlapping information between portions of two documents.
  180. Geoffrey B. Rhoads ; Ravi K. Sharma, Determining transformations of media signals with embedded code signals.
  181. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  182. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  183. Ginter, Jr., Thomas; Ali, Salman; Pann, Tim, Device independent caller data access for emergency calls.
  184. Jones,Kevin C.; Aggson,Cynthia K.; Rodriguez,Tony F.; Mosher,Brian; Levy,Kenneth L.; Hiatt,R. Stephen; Rhoads,Geoffrey B., Digital asset management and linking media signals with related data using watermarks.
  185. Suitts, Jason Robert; Makower, David; Cortes, Ricardo D.; Muller, Max; Jimenez, Juan Carlos; Brown, Jeremy; Fosback, Jason, Digital asset validation prior to submission for network-based distribution.
  186. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  187. Makoto Saito JP, Digital content management system and apparatus.
  188. Saito, Makoto, Digital content management system and apparatus.
  189. Saito, Makoto, Digital content management system and apparatus.
  190. Saito, Makoto, Digital content management system and apparatus.
  191. Saito Makoto,JPX, Digital content management system using electronic watermark.
  192. Headings, Kevin P.; Schein, Steven M., Digital entertainment service platform.
  193. Borrowman,Colin D., Digital file management and imaging system and method including secure file marking.
  194. Corless, Peter P., Digital identifiers and digital identifier control systems for intellectual properties.
  195. James,Arthur; Brent,Michelle; Corless,Peter; Khera,Sanjay; Park,Soyoung, Digital license agreement.
  196. Peinado,Marcus; Abburi,Rajasekhar; England,Paul; Ganesan,Krishnamurthy; Bell,Jeffrey R. C.; Blinn,Arnold N.; Jones,Thomas C., Digital license and method for obtaining/providing a digital license.
  197. Vestergaard,Steve; Tsui,Che Wai (William); Kolic,Edward, Digital media distribution method and system.
  198. Ross, Robert Paul, Digital rights content services architecture.
  199. Ross, Robert Paul, Digital rights content services architecture.
  200. James, Arthur; Brent, Michelle; Corless, Peter P.; Khera, Sanjay; Park, Soyoung, Digital rights framework.
  201. Koppen, Eckhart; Vataja, Timo; Kivimaki, Simo, Digital rights management (DRM) license manager.
  202. Boccon-Gibod, Gilles; Boeuf, Julien G., Digital rights management engine systems and methods.
  203. Boccon-Gibod, Gilles; Boeuf, Julien G., Digital rights management engine systems and methods.
  204. Boccon-Gibod, Gilles; Boeuf, Julien G.; Manente, Michael G.; Bradley, William B., Digital rights management engine systems and methods.
  205. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  206. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  207. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  208. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  209. Peinado, Marcus; Liu, Donna; Ganesan, Krishnamurthy, Digital rights management system operating on computing device and having black box tied to computing device.
  210. Barton, James M.; McInnis, Roderick James; Moskowitz, Alan S.; Goodman, Andrew Martin; Chow, Ching Tong; Kao, Jean Swey, Digital security surveillance system.
  211. Barton, James M.; McInnis, Roderick James; Moskowitz, Alan S.; Goodman, Andrew Martin; Chow, Ching Tong; Kao, Jean Swey, Digital security surveillance system.
  212. Rhoads,Geoffrey B., Digital watermark and steganographic decoding.
  213. Rhoads,Geoffrey B., Digital watermark embedding and decoding using encryption keys.
  214. Levy, Kenneth L., Digital watermarking and fingerprinting applications for copy protection.
  215. Brundage,Trent J.; Rodriguez,Tony F.; Hannigan,Brett T., Digital watermarking apparatus and methods.
  216. Rhoads,Geoffrey B.; Brundage,Trent J.; Rodreguez,Tony F.; Hannigan,Brett T.; Ellingson,Eric E., Digital watermarking apparatus and methods.
  217. Levy, Kenneth L.; Stager, Reed R., Digital watermarking applications.
  218. Lofgren,Neil; Seder,Phillip Andrew; MacIntosh,Brian T., Digital watermarking systems.
  219. Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  220. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  221. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  222. Tewfik,Ahmed, Digital watermarking with content dependent keys and autocorrelation properties for synchronization.
  223. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  224. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  225. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  226. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  227. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  228. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  229. Davis, Bruce L.; Rhoads, Geoffrey B., Digitally marked objects and promotional methods.
  230. Beach, Brian; Platt, David C., Distributed database management system.
  231. Chaudhury, Krish; Pravetz, James D., Document digest allowing selective changes to a document.
  232. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  233. Pravetz, James D.; Chaudhury, Krish; Agrawal, Sunil, Document modification detection and prevention.
  234. Pravetz, James D.; Chaudhury, Krish; Agrawal, Sunil, Document modification detection and prevention.
  235. Pravetz, James D.; Chaudhury, Krish; Agrawal, Sunil C., Document modification detection and prevention.
  236. Pravetz, James; Chaudhury, Krish; Agrawal, Sunil, Document modification detection and prevention.
  237. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  238. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  239. Chen,Ling Tony; Krishnamoorthy,Shyam; Caiafa,Daniel M. C.; Hook,Jerry Paul; Walther,Dan E., Dynamic digital content licensing.
  240. Chaudhury, Krish; Pravetz, James D., Dynamic enabling of functionality in electronic document readers.
  241. Chaudhury, Krish; Pravetz, James D., Dynamic enabling of functionality in electronic document readers.
  242. Chaudhury,Krish; Pravetz,James D., Dynamic enabling of functionality in electronic document readers.
  243. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  244. Graham, Todd D.; Hudson, Jonathan C., Dynamic file access control and management.
  245. Rich,Marvin J.; Mellors,William K.; Joe,Soon I.; Checca,Ronald P., Dynamically transferring license administrative responsibilities from a license server to one or more other license servers.
  246. Thompson, Paul C., Efficient prisoner tracking.
  247. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  248. Barton, James M., Electronic content distribution and exchange system.
  249. Yasutsugu Kuroda JP; Jun Kamada JP; Etsuo Ono JP, Electronic data storage apparatus, system and method.
  250. Kurokawa Takeshi,JPX, Electronic document management system.
  251. Thorne John ; Davis Marie L. ; Strauss Michael J., Electronic mail security.
  252. Akahori, Shigeki; Oguri, Shigenori, Electronic musical apparatus with authorized modification of protected contents.
  253. Fosback, Jason Robert; Cortes, Ricardo D.; Muller, Max, Electronic submission of application programs for network-based distribution.
  254. Davis,Bruce L.; Rhoads,Geoffrey B., Embedding and reading imperceptible codes on objects.
  255. Rhoads, Geoffrey B., Embedding hidden auxiliary information in media.
  256. Miller,Marc D.; Hawes,Jonathan L., Embedding watermark components during separate printing stages.
  257. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  258. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  259. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  260. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  261. Sharma, Ravi K.; Stach, John, Encoding and decoding auxiliary signals.
  262. Sharma, Ravi K.; Stach, John, Encoding and decoding auxiliary signals.
  263. Sharma,Ravi K.; Stach,John, Encoding and decoding signals for digital watermarking.
  264. Peinado, Marcus; Venkatesan, Ramarathnam, Encrypting a digital object based on a key ID selected therefor.
  265. Peinado,Marcus; Venkatesan,Ramarathnam, Encrypting a digital object on a key ID selected therefor.
  266. Peinado,Marcus; Venkatesan,Ramarathnam, Encrypting a digital object on a key ID selected therefor.
  267. Oliveira, Eduardo P.; Dunbar, Geoffrey; Alkove, James M., Encryption scheme for streamed multimedia content protected by rights management system.
  268. Pride, Edward; Daniel, Vicki; Feduff, Daniel Stephen; Gigliotti, Travis, End-to-end licensing of digital media assets.
  269. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Enforcement architecture and method for digital rights management.
  270. Dickinson, Richard; Hines, Gordon John; Croy, Jonothan, Enhanced E911 network access for a call center using session initiation protocol (SIP) messaging.
  271. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for a call center using session initiation protocol (SIP) messaging.
  272. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  273. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  274. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  275. Gupte, Aniruddha, Enhanced media method and apparatus for use in digital distribution system.
  276. Princen, John; Srinivasan, Pramila; Blythe, David; Yen, Wei, Ensuring authenticity in a closed content distribution system.
  277. Princen, John; Srinivasan, Pramila; Blythe, David; Yen, Wei, Ensuring authenticity in a closed content distribution system.
  278. Princen, John; Srinivasan, Pramila; Blythe, David; Yen, Wei, Ensuring authenticity in a closed content distribution system.
  279. Meyer, Joel R.; Rhoads, Geoffrey B., Establishing and interacting with on-line media collections using identifiers in media signals.
  280. Homer, Gregg S., Even more subscription media on demand.
  281. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  282. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  283. Zhu, Yinjun, Extended area event for network based proximity discovery.
  284. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  285. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  286. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  287. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  288. Fung, Joseph Zhung Yee; Chancellor, Robert; DeMartini, Thomas; Nguyen, Mai; Ta, Thanh; Tieu, Vincent Hsiang; Tran, Duc; Valenzuela, Edgardo, Extensible rights expression processing system.
  289. Haff, Maurice W.; Clarke, Christopher D., File transfer system.
  290. Haff,Maurice W.; Clarke,Christopher D., File transfer system.
  291. Haff, Maurice W.; Clarke, Christopher D., File transfer system for direct transfer between computers.
  292. Haff, Maurice W.; Clarke, Christopher D., File transfer system for direct transfer between computers.
  293. Rhoads, Geoffrey B.; Rodriguez, Anthony, Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  294. Rhoads, Geoffrey B.; Rodriguez, Tony F., Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  295. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Firewall providing enhanced network security and user transparency.
  296. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Firewall providing enhanced network security and user transparency.
  297. Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code from third computer process on behalf of first process.
  298. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  299. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  300. Lelikov, Andrey; Gunyakti, Caglar; Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code on behalf thereof.
  301. Brooks, Cecil Ray; Girotto, Jay Robert; Gunyakti, Caglar; Haugen, Todd, Flexible licensing architecture for licensing digital application.
  302. Brooks, Cecil Ray; Girotto, Jay Robert; Gunyakti, Caglar; Haugen, Todd, Flexible licensing architecture for licensing digital application.
  303. Haney, Richard D., Formation of wireless device location sharing group.
  304. Pitt, Lance Douglas, GeoNexus proximity detector network.
  305. Young, Hadley Rasch, Group based complete and incremental computer file backup system, process and apparatus.
  306. Young, Hadley Rasch, Group based complete and incremental computer file backup system, process and apparatus.
  307. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  308. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  309. Margolus, Norman H., History preservation in a computer storage system.
  310. Margolus, Norman H.; Floyd, Jered J.; Homsy, II, George E.; Keller, Jeffrey M., History preservation in a computer storage system.
  311. Margolus, Norman H.; Floyd, Jered J.; Homsy, II, George E.; Keller, Jeffrey M., History preservation in a computer storage system.
  312. Margolus, Norman H.; Floyd, Jered J.; Homsy, II, George E.; Keller, Jeffrey M., History preservation in a computer storage system.
  313. Margolus, Norman H.; Floyd, Jered J.; Homsy, II, George E.; Keller, Jeffrey M., History preservation in a computer storage system.
  314. Margolus, Norman H.; Floyd, Jered J.; Homsy, II, George E.; Keller, Jeffrey M., History preservation in a computer storage system.
  315. Margolus,Norman H., History preservation in a computer storage system.
  316. Margolus,Norman H., History preservation in a computer storage system.
  317. Margolus,Norman H.; Floyd,Jered J.; Homsy, II,George E.; Keller,Jeffrey M., History preservation in a computer storage system.
  318. Margolus,Norman H.; Floyd,Jered J.; Homsy, II,George E.; Keller,Jeffrey M., History preservation in a computer storage system.
  319. Rossmann, Alain, Hybrid systems for securing digital assets.
  320. Dutta, Rabindranath, Hyperlink filter for "pirated" and "disputed" copyright material on the internet in a method, system and program.
  321. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  322. Brundage, Trent J.; Sher-Jan, Mahmood; Hannigan, Brett T.; Durst, Jr., Robert T., Identification document and related methods.
  323. Jones, Robert L., Identification document with three dimensional image of bearer.
  324. Okano, Hirokazu, Image encryption method and device.
  325. Patterson,Phillip R.; Clements,Lorie; Lofgren,Neil A.; Rhoads,Geoffrey B., Image management system and methods using digital watermarks.
  326. Brundage, Trent J.; Rodriguez, Tony F.; Hannigan, Brett T., Image or video display devices.
  327. Sato, Hajime, Image processing apparatus, image processing method and storage.
  328. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  329. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  330. Ehrlich, Robert; Mitchell, Donald L.; Marshall, Roger S.; Hines, Gordon John, Index of suspicion determination for communications request.
  331. Kotani Seigo,JPX ; Yoshioka Makoto,JPX ; Murakami Keiichi,JPX ; Hirano Hideyuki,JPX ; Hayashi Takehiko,JPX ; Yoshimoto Shinichi,JPX, Information management method and recording medium.
  332. Ebihara, Munetake; Tanabe, Mitsuru; Sato, Ichiro, Information processing apparatus.
  333. Ishiguro,Ryuji; Okaue,Takumi; Ooishi,Tateo, Information processing apparatus, information processing method, and program storage medium.
  334. Felsher, David Paul, Information record infrastructure, system and method.
  335. Giroux, David; Sharko, John, Information security architecture for encrypting documents for remote access while maintaining access control.
  336. Pensak David A. ; Cristy John J. ; Singles Steven J., Information security architecture for encrypting documents for remote access while maintaining access control.
  337. Rogers,Allen; Hadden,Allen Douglas; Norman,Timothy Neil, Information security architecture for remote access control using non-bidirectional protocols.
  338. Carey, W. Knox; Nilsson, Jarl, Information security systems and methods.
  339. Carey, W. Knox; Nilsson, Jarl, Information security systems and methods.
  340. Kazami, Shinichi, Information-processing system and method, information-transmission-processing apparatus, and information-reception-processing apparatus.
  341. Cope, Rod; Weidner, Eric, Installation of software stacks including uncoordinated projects.
  342. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  343. Choy David M., Integrated method and system for controlling information access and distribution.
  344. Bova, G. Steven, Integrated multidimensional database.
  345. Latham, Weldon H.; Lorello, Timothy J.; Morin, Drew; White, Bruce, Integrated, detachable ear bud device for a wireless phone.
  346. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  347. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  348. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  349. Levy,Kenneth L.; Hannigan,Brett T.; Bradley,Brett A.; Rhoads,Geoffrey B., Integrating steganographic encoding in multimedia content.
  350. Rivette, Kevin G.; Rappaport, Irving S.; Hohmann, Luke; Puglia, David; DeWolfe, Andrew S.; Goretsky, David; Jackson, Adam; Kurowski, Scott; Park, Brian; Rabb, Jr., Charles; Rosenquist, Brent; Schnitz, Matthew; Smith, David W.; Paradan, Thierry, Intellectual property asset manager (IPAM) for context processing of data objects.
  351. Ghozati, Kambiz; Thompson, Paul, Intelligent load balancer enhanced routing.
  352. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne M.; Shah, Lacky, Intelligent network streaming and execution system for conventionally coded applications.
  353. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne M.; Shah, Lacky, Intelligent network streaming and execution system for conventionally coded applications.
  354. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne Marie; Shah, Lacky Vasant, Intelligent network streaming and execution system for conventionally coded applications.
  355. Arai, Daniel T.; Panwar, Sameer; Benitez, Manuel E.; Holler, Anne Marie; Shah, Lacky Vasant, Intelligent network streaming and execution system for conventionally coded applications.
  356. DeMello, Marco A.; Zeman, Pavel; Krishnaswamy, Vinay; Byrum, Frank D., Inter-server communication using request with encrypted parameter.
  357. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  358. Singh Jitendra K., Internet enabled computer system management.
  359. Rhoads, Geoffrey B., Internet linking from audio.
  360. Rhoads,Geoffrey B., Internet linking from image content.
  361. O'Donnell, Lawrence; O'Donnell, Michael, Internet system for facilitating human user advisement and licensing of copyrighted works of authorship.
  362. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  363. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  364. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  365. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  366. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  367. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  368. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  369. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  370. Dean, Loren; Cotter, Linda; Mehrez, Leslie; McElhinney, Gerard; Little, John N., License activation and management.
  371. Utsumi,Kenichi; Hirano,Hideyuki; Kotani,Seigo, License devolution apparatus.
  372. Hillegass,James C.; Deng,Yaobing; Eastom,Mark; Fritz,Richard R.; Gateley,John C.; Grinsfelder,James A.; Grove,Stephen A.; Hockett,Eric Steven; Sokratov,Nikolay G.; Swanson,James G.; Thompson,John S.;, Licensed digital material distribution system and method.
  373. Strom, Clifford P.; Siu, Michael Y.; Evans, Brian P., Licensing content for use on portable device.
  374. Howard, Christopher J.; Levy, Peter S.; de la Cuesta, Joshue D., Limited-use browser and security system.
  375. Howard, Christopher J.; Levy, Peter S.; de la Cuesta, Joshue D., Limited-use browser and security system.
  376. Howard,Christopher J.; Levy,Peter S.; de la Cuesta,Joshue D., Limited-use browser and security system.
  377. Howard,Christopher J.; Levy,Peter S.; de la Cuesta,Joshue D., Limited-use browser and security system.
  378. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  379. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  380. Hawes, Jonathan L., Linking documents through digital watermarking.
  381. Rhoads Geoffrey B., Linking of computers using information steganographically embedded in data objects.
  382. Gehrke, Todd; Wang, Chih; Lawrence, Sarah, Location based geo-reminders.
  383. Gehrke, Todd; Wang, Chih; Lawrence, Sarah, Location based geo-reminders.
  384. Gehrke, Todd; Wang, Chih; Kasad, Farhad, Location based proximity alert.
  385. Hines, Gordon John; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  386. Hines, Gordon John; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  387. Hines, Gordon; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  388. Hines, Gordon; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  389. Hines,Gordon John; Tapia,Mario G.; Cousins,Will; Carey,Patrick, Location derived presence information.
  390. Pitt, Lance Douglas, Location fidelity adjustment based on mobile subscriber privacy profile.
  391. Kasad, Farhad; Lockeby, Camron, Location privacy selector.
  392. Kasad, Farhad; Lockeby, Camron, Location privacy selector.
  393. Zhu, Yinjun; Hines, Gordon John; Burton, Victor; Liao, Hsin-Chih, Location service requests throttling.
  394. Zhu, Yinjun; Hines, Gordon John; Burton, Victor; Liao, Hsin-Chih, Location service requests throttling.
  395. Haney, Richard D., Location sharing and tracking using mobile phones or other wireless devices.
  396. Haney, Richard D., Location sharing and tracking using mobile phones or other wireless devices.
  397. Haney, Richard D., Location sharing group for services provision.
  398. Haney, Richard D., Location sharing group map management.
  399. Haney, Richard D., Location sharing service between GPS-enabled wireless devices, with shared target location exchange.
  400. Dillaway, Blair Brewster; LaMacchia, Brian; Manferdelli, John; Paramasivam, Muthukrishnan, Long-life digital certification for publishing long-life digital content or the like in content rights management system or the like.
  401. Redmond, Ian; Bell, Bernard; Blankenbeckler, David L.; Braitberg, Michael F.; Freeman, Robert D., Low profile optical head.
  402. Redmond,Ian; Bell,Bernard; Blankenbeckler,David L.; Braitberg,Michael F.; Freeman,Robert D., Low profile optical head.
  403. Yen, Andrew C.; Erlewine, Daniel D.; Malaer, Dita R.; Finke, Eric C.; Suitts, Jason R.; Kamath, Jaya; Muller, Max M, Managed assessment of submitted digital content.
  404. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Graham, Stanley E.; Rhoads, Geoffrey B., Management of documents and other objects using optical devices.
  405. Hans,Mathieu C.; Sasaki,Gary D., Managing access to digital content.
  406. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  407. Haney, Richard D., Map presentation on cellular device showing positions of multiple other wireless device users.
  408. Wood, Lisa T.; Lewis, Scott M.; Fried, Robin, Media acquisition, processing and distribution system for the internet.
  409. Wood, Lisa T.; Lewis, Scott M.; Fried, Robin T., Media acquisition, processing and distribution system for the internet.
  410. Wood, Lisa T.; Lewis, Scott M.; Fried, Robin T., Media acquisition, processing and distribution system for the internet.
  411. Wood, Lisa T.; Lewis, Scott M.; Fried, Robin T., Media acquisition, processing and distribution system for the internet.
  412. Weiss,David, Media bridge method and apparatus.
  413. Klug, John R., Media content notification via communications network.
  414. Klug, John R.; Peterson, Thad D., Media content notification via communications network.
  415. Klug, John R.; Peterson, Thad D., Media content notification via communications network.
  416. Suitts, Jason Robert; Currey, Jonathan James; Muller, III, Max, Media package format for submission to a media distribution system.
  417. McGloughlin,Stephen D., Method and apparatus for accessing and displaying multimedia content.
  418. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  419. Levy, Kenneth L., Method and apparatus for automatic ID management.
  420. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  421. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for client customization by executing software parts on plural servers.
  422. Levy, Kenneth L., Method and apparatus for content management.
  423. Levy, Kenneth L., Method and apparatus for content management.
  424. Levy, Kenneth L., Method and apparatus for content management.
  425. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
  426. Haff, Maurice W.; Clarke, Christopher D., Method and apparatus for data file transfer using destination linked directories.
  427. Haff, Maurice W.; Clarke, Christopher D., Method and apparatus for data file transfer using destination linked directories.
  428. Flank,Sharon; Sperer,Ruth; Romer,Donna, Method and apparatus for digital media management, retrieval, and collaboration.
  429. Romer, Donna; Rothey, James, Method and apparatus for digital media management, retrieval, and collaboration.
  430. Wang, Xin; Tadayon, Bijan; DeMartini, Thomas; Raley, Michael; Lao, Guillermo; Chen, Eddie J.; Gilliam, Charles P., Method and apparatus for distributing enforceable property rights.
  431. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  432. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  433. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  434. Shapiro, Bill, Method and apparatus for dynamically providing privacy-policy information to a user.
  435. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  436. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  437. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  438. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  439. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  440. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  441. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  442. Sullivan, Patrick L., Method and apparatus for in-line serial data encryption.
  443. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  444. Vignisson, Vidar; Von Reis, Will, Method and apparatus for navigation and use of a computer network.
  445. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  446. Schreiber,Daniel; Guedaliah,David, Method and apparatus for preventing reuse of text, images and software transmitted via networks.
  447. Schreiber, Daniel; Guedaliah, David, Method and apparatus for preventing reuse of text, images, and software transmitted via networks.
  448. Saito, Makoto, Method and apparatus for protecting digital data by double re-encryption.
  449. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  450. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  451. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for secure content delivery over broadband access networks.
  452. Schmeidler,Yonah; Atkins,Derek; Eichin,Mark W.; Rostcheck,David J., Method and apparatus for secure content delivery over broadband access networks.
  453. Van Hoff, Arthur; Barton, James, Method and apparatus for secure transfer and playback of multimedia content.
  454. Van Hoff, Arthur; Barton, James, Method and apparatus for secure transfer and playback of multimedia content.
  455. Van Hoff, Arthur; Barton, James, Method and apparatus for secure transfer and playback of multimedia content.
  456. van Hoff, Arthur; Barton, James, Method and apparatus for secure transfer and playback of multimedia content.
  457. van Stam, Wijnand, Method and apparatus for secure transfer of previously broadcasted content.
  458. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  459. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  460. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  461. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  462. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  463. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  464. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  465. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  466. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  467. Mages Kenneth G. ; Feng Jie, Method and apparatus of secure server control of local media via a trigger through a network for instant local access o.
  468. Roberts, Pasha; Bhathena, Firdaus; Honoré, Francis A., Method and apparatus to allow users and representatives to conduct simultaneous voice and joint browsing sessions.
  469. Prakash, Vipul Ved, Method and apparatus to enable mass message publications to reach a client equipped with a filter.
  470. Levy,Kenneth L, Method and apparatus to protect media existing in an insecure format.
  471. Rump,Niels; Koller,Juergen; Brandenburg,Karlheinz, Method and device for generating a data stream and method and device for playing back a data stream.
  472. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  473. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  474. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  475. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  476. Henry, Félix; Moreau, Jean-Jacques, Method and device for recording and searching for a document on a communication network.
  477. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  478. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  479. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  480. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  481. Braun, Michael; Dichtl, Markus; Meyer, Bernd, Method and system for confidentially providing software components.
  482. Gregg,Richard L.; Giri,Sandeep; Goeke,Timothy C., Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network.
  483. Rubin, Moshe; Schreiber, Daniel, Method and system for copy protection of displayed data content.
  484. Rubin,Moshe; Schreiber,Daniel, Method and system for copy protection of displayed data content.
  485. Rubin, Moshe B.; Halibard, Moishe, Method and system for copy protection of images displayed on a computer monitor.
  486. Rubin,Moshe; Goldman,Andrew; Schreiber,Daniel A., Method and system for copyright protection of digital images.
  487. Schreiber Daniel,ILX ; Goldman Andrew,ILX, Method and system for copyright protection of digital images transmitted over networks.
  488. Hart, III, John J.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G., Method and system for data delivery and reproduction.
  489. Judd, Steven G., Method and system for detecting object inconsistency in a loosely consistent replicated directory service.
  490. Judd,Steven G., Method and system for detecting object inconsistency in a loosely consistent replicated directory service.
  491. DeTreville,John D., Method and system for detecting pirated content.
  492. Davis, Bruce L; Conwell, William Y, Method and system for determining content treatment.
  493. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  494. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  495. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  496. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  497. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  498. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  499. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  500. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  501. Hillegass,James C.; Deng,Yaobing; Eastom,Mark; Fritz,Richard R.; Gateley,John C.; Grinsfelder,James A.; Grove,Stephen A.; Hockett,Eric Steven; Sokratov,Nikolay G.; Swanson,James G.; Thomson,John S.; , Method and system for licensing digital works.
  502. DeMello, Marco A.; Yaacovi, Yoram; Zeman, Pavel, Method and system for limiting the use of user-specific software features.
  503. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method and system for managing access to protected computer resources provided via an internet protocol network.
  504. Rhoads,Geoffrey B., Method and system for managing and controlling electronic media.
  505. Vainstein, Klimenty, Method and system for managing security tiers.
  506. Rhoads,Geoffrey B., Method and system for managing, accessing and paying for the use of copyrighted electronic media.
  507. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Method and system for online document collaboration.
  508. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  509. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  510. De Bonet, Jeremy S.; Viola, Paul, Method and system for providing an audio element cache in a customized personal radio broadcast.
  511. Nath, Satyajit, Method and system for providing document retention using cryptography.
  512. Nath, Satyajit, Method and system for providing document retention using cryptography.
  513. Goodman, Daniel I., Method and system for real-time control of document printing.
  514. Goodman, Daniel I., Method and system for real-time control of document printing.
  515. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Method and system for recording and using a traveler's travel preferences.
  516. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  517. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  518. Kondrk, Robert H.; Martin, Timothy Benjamin; Robbin, Jeffrey L.; Heller, David; Wiese, Mike, Method and system for submitting media for network-based purchase and distribution.
  519. Lao, Guillermo, Method and system for subscription digital rights management.
  520. Lao, Guillermo, Method and system for subscription digital rights management.
  521. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  522. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  523. Ta, Thanh; Nguyen, Mai; Chen, Eddie J.; Wang, Xin; Demartini, Thomas, Method and system to support dynamic rights and resources sharing.
  524. Schull,Jonathan, Method for adapting a software product to an environment.
  525. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  526. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  527. DeMello,Marco A.; Narin,Attila; Yaacovi,Yoram, Method for authenticating and securing integrated bookstore entries.
  528. Schull,Jonathan, Method for causing a digital product to revert to a demo mode.
  529. Fulton, Nicholas; Butler, James Matthew; Curtis, Mark Anthony; Parrott, David; Whitehead, Miles Jonathan; Wu, Hui, Method for certifying and verifying digital web content using public cryptography.
  530. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  531. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  532. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  533. Nuttall,Fran챌ois Xavier, Method for computer network operation basis for usage fees.
  534. Nuttall Fran.cedilla.ois-Xavier,FRX, Method for computer network operation providing basis for usage fees.
  535. Nuttall, François Xavier, Method for computer network operation providing basis for usage fees.
  536. Nuttall,Fran챌ois Xavier, Method for computer network operation providing basis for usage fees.
  537. Saito, Makoto, Method for controlling database copyrights.
  538. Saito,Makoto, Method for controlling database copyrights.
  539. Saito,Makoto, Method for controlling database copyrights.
  540. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  541. Rhoads, Geoffrey B., Method for increasing the functionality of a media player/recorder device or an application program.
  542. Burrows Michael, Method for indexing duplicate records of information of a database.
  543. Hudson, Ron J.; Coles, Terrence T.; Berry, Craig D.; Easty, Allen D., Method for interactive video content programming.
  544. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  545. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  546. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  547. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  548. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  549. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  550. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  551. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  552. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Method for managing access to protected computer resources.
  553. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  554. Barritz, Robert; Kassan, Peter, Method for migrating from one computer to another.
  555. Colvin,David S., Method for monitoring software using encryption including digital signatures/certificates.
  556. Malone, Michael F., Method for multi-media capture, transmission, conversion, metatags creation, storage and search retrieval.
  557. Malone, Michael F., Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval.
  558. Malone, Michael F., Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval.
  559. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system.
  560. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  561. Srinivasan, Pramila; Princen, John, Method for programming on-chip non-volatile memory in a secure processor, and a device so programmed.
  562. Margolus,Norman H., Method for protecting history in a file system.
  563. Margolus,Norman H.; Knight, Jr.,Thomas F.; Floyd,Jered J.; Homsy, II,George E., Method for providing access control for data items in a data repository in which storage space used by identical content is shared.
  564. Klug, John R.; Klug, Noah H., Method for providing node targeted content in an addressable network.
  565. Klug, John R.; Klug, Noah H.; Peterson, Thad D., Method for providing node targeted content in an addressable network.
  566. Klug,John R.; Klug,Noah H.; Peterson,Thad D., Method for providing node targeted content in an addressable network.
  567. Schull,Jonathan, Method for selling, protecting, and redistributing digital goods.
  568. Homer, Gregg S., Method for subscription media on-demand.
  569. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  570. Malone, Michael F., Method for voice command activation, multi-media capture, transmission, speech conversion, metatags creation, storage and search retrieval.
  571. Hill,Keith Ryan; Hayes,Michael Anthony; Harrison,Peter, Method of administering licensing of use of copyright works.
  572. Schull,Jonathan, Method of altering a software product in response to predetermined events.
  573. Lapstun, Paul; Silverbrook, Kia, Method of authorizing network publishing.
  574. Cristy, John J.; Pensak, David A.; Singles, Steven J., Method of encrypting information for remote access while maintaining access control.
  575. David A. Pensak ; John J. Cristy ; Steven J. Singles, Method of encrypting information for remote access while maintaining access control.
  576. David A. Pensak ; John J. Cristy ; Steven J. Singles, Method of encrypting information for remote access while maintaining access control.
  577. Pensak, David A.; Cristy, John J.; Singles, Steven J., Method of encrypting information for remote access while maintaining access control.
  578. Rhoads,Geoffrey B.; Seder,Phillip Andrew; Miller,Marc D.; MacIntosh,Brian T.; Hein, III,William C.; Hannigan,Brett T., Method of linking on-line data to printed documents.
  579. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Method of monitoring print data for text associated with a hyperlink.
  580. Fanning, Shawn; Mendelson, Jordan; Aydar, Ali, Method of processing song claims involving songs including, but not limited to musical works, compositions, etc.
  581. Dunkeld, Bryan; Lambert, Edward, Method of providing a digital asset for distribution.
  582. Arnold, Matt; Barton, James M., Method of sharing personal media using a digital recorder.
  583. Arnold, Matt; Barton, Jim, Method of sharing personal media using a digital recorder.
  584. Martin,Christopher Vandeleur; Sch?nleber,Christina Maria, Method of using a computerised administration system to administer licensing of use of copyright material.
  585. Brunk,Hugh L.; Levy,Kenneth L., Method, apparatus and programs for generating and utilizing content signatures.
  586. Foster, Eric M.; Lotspiech, Jeffrey B.; Naor, Dalit; Nin, Sigfredo I.; Pestoni, Florian; Plouffe, Jr., Wilfred E.; Schaffa, Frank A., Method, system and program product for modifying content usage conditions during content distribution.
  587. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  588. Raley, Michael Charles; Chen, Eddie J., Method, system, and device for license-centric content consumption.
  589. Raley, Michael; Chen, Eddie J., Method, system, and device for license-centric content consumption.
  590. Edwards, Jermaine Charles, Method, system, and program for logging statements to monitor execution of a program.
  591. Pedersen, Palle Martin; Golombek, David; Levin, Douglas A.; Smith, John J., Methods and apparatus for automated export compliance.
  592. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  593. Schreiber Daniel,ILX ; Guedaliah David,ILX, Methods and apparatus for preventing reuse of text, images and software transmitted via networks.
  594. Epstein, Michael A.; Rosner, Martin; Staring, Toine A. M., Methods and apparatus for secure content distribution.
  595. Haney, Richard D., Methods and apparatuses for geospatial-based sharing of information by multiple devices.
  596. Haney, Richard D., Methods and apparatuses for transmission of an alert to multiple devices.
  597. Rhoads, Geoffrey B., Methods and arrangements employing digital content items.
  598. Rhoads, Geoffrey B.; Rodriguez, Tony F., Methods and devices employing content identifiers.
  599. Rhoads, Geoffrey B., Methods and devices responsive to ambient audio.
  600. Rhoads, Geoffrey B., Methods and devices responsive to ambient audio.
  601. Rhoads, Geoffrey B., Methods and systems employing digital content.
  602. Rhoads, Geoffrey B.; Levy, Kenneth L., Methods and systems employing digital content.
  603. Rhoads, Geoffrey B.; Levy, Kenneth L., Methods and systems employing digital content.
  604. Haney, Richard D., Methods and systems for annotating target locations.
  605. Pedersen, Palle Martin, Methods and systems for identifying an area of interest in protectable content.
  606. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  607. Pedersen, Palle M., Methods and systems for managing software development.
  608. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  609. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  610. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  611. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  612. Pedersen, Palle Martin, Methods and systems for reporting regions of interest in content files.
  613. Haney, Richard D., Methods and systems for sharing position data and tracing paths between mobile-device users.
  614. Haney, Richard D., Methods and systems for sharing position data between subscribers involving multiple wireless providers.
  615. Rhoads, Geoffrey B., Methods and systems for steganographic processing.
  616. Rhoads, Geoffrey B., Methods and systems for steganographic processing.
  617. Haney, Richard D., Methods and systems for temporarily sharing position data between mobile-device users.
  618. Haney, Richard D., Methods and systems for temporarily sharing position data between mobile-device users.
  619. Rhoads, Geoffrey B., Methods and systems useful in linking from objects to remote resources.
  620. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  621. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  622. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  623. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  624. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  625. Conwell, William Y., Methods for identifying audio or video content.
  626. Rhoads, Geoffrey B.; Hein, III, William C.; Levy, Kenneth L., Methods for linking from objects to remote resources.
  627. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  628. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  629. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  630. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  631. Erickson, John S., Methods for playing protected content.
  632. Rhoads,Geoffrey B., Methods for steganographic encoding media.
  633. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  634. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  635. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  636. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  637. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  638. Haney, Richard D., Methods, systems and apparatuses for the formation and tracking of location sharing groups.
  639. Haney, Richard D., Methods, systems and apparatuses for the formation and tracking of location sharing groups.
  640. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  641. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  642. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  643. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  644. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  645. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  646. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  647. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  648. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  649. Wadycki, Andrew M.; Sharma, Ashish; Walker, Michael H.; Cortes, Ricardo D.; Sahuc, Sebastien P.; Pirnack, Tracy L., Migration of feedback data to equivalent digital assets.
  650. Wadycki, Andrew M.; Sharma, Ashish; Walker, Michael H.; Cortes, Ricardo D.; Sahuc, Sebastien P.; Pirnack, Tracy L., Migration of feedback data to equivalent digital assets.
  651. Dickinson, Richard, Mobile automatic location identification (ALI) for first responders.
  652. Zhu, Yinjun, Mobile internet protocol (IP) location.
  653. Zhu, Yinjun, Mobile internet protocol (IP) location.
  654. Wesinger, Jr., Ralph E.; Coley, Christopher D., Modular multi-homed web server with animation player.
  655. Wesinger, Jr., Ralph E.; Coley, Christopher D., Modular multi-homed web server with compiled animation server.
  656. Rhoads,Geoffrey B., Monitoring of video or audio based on in-band and out-of-band data.
  657. Homer, Gregg S., More subscription media on demand.
  658. Wesinger, Jr., Ralph E.; Coley, Christopher D., Multi-homed web server with animation player.
  659. Wesinger, Jr., Ralph E.; Coley, Christopher D., Multi-homed web server with animation player and programmable functionality.
  660. Wesinger, Jr., Ralph E.; Coley, Christopher D., Multi-homed web server with compiled animation server.
  661. Wesinger, Jr., Ralph E.; Coley, Christopher D., Multi-homed web server with compiled animation server and programmable functionality.
  662. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  663. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  664. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  665. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  666. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  667. Gruse,George Gregory; Dorak, Jr.,John J.; Milsted,Kenneth Louis, Multimedia player toolkit for electronic content delivery.
  668. Barton, James M.; Kao, Jean Swey; Chow, Ching Tong; McInnis, Roderick James; Goodman, Andrew Martin; Moskowitz, Alan S., Multimedia stream processing system.
  669. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  670. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  671. Zhu, Yinjun, Multiple location retrieval function (LRF) network having location continuity.
  672. Barton, James M.; McInnis, Roderick James; Moskowitz, Alan S.; Goodman, Andrew Martin; Chow, Ching Tong; Kao, Jean Sway, Multiple outlet digital video recording system.
  673. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  674. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  675. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  676. Redman, Michael; Sims, Greg, Music integration for use with video editing systems and method for automatically licensing the same.
  677. Rhoads, Geoffrey B., Music methods and systems.
  678. Ito Shinichi,JPX, Music player acquiring control information from auxiliary text data.
  679. Pitt, Lance D.; Ginter, Thomas; Hines, Gordon John; Burton, Victor; Ramberg, Mark, N-dimensional affinity confluencer.
  680. Geldenbott, Gerhard; Hines, Gordon J.; Martin, Jeff; Day, Ed, Nationwide table routing of voice over internet protocol (VOIP) emergency calls.
  681. Gautier, Patrice; Muller, Max; Burkholder, Thomas; Robbin, Jeffrey L.; Heller, Dave; Dowdy, Thomas; Wiese, Mike, Network based purchase and distribution of media.
  682. Carter Stephen R. ; LaVange ; Jr. Donald H. ; Jensen Delos C., Network license authentication.
  683. Rhoads, Geoffrey B., Network linking method using information embedded in data objects that have inherent noise.
  684. Rhoads, Geoffrey B., Network linking methods and apparatus.
  685. Rhoads,Geoffrey B., Network linking using index modulated on data.
  686. Lapstun, Paul; Silverbrook, Kia, Network publishing authorization protocol.
  687. Cuff, Michael; Wang, Chih; Kasad, Farhad; Aryana, Firdaus; Hines, Gordon J., No responders online.
  688. Cope, Rod, Noise reduction for content matching analysis results for protectable content.
  689. Ferris, James Michael; Riveros, Gerry Edward, Offering additional license terms during conversion of standard software licenses for use in cloud computing environments.
  690. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online electronic health record.
  691. Chaganti, Naren; Chaganti, Damayanti; Chaganti, Sitapati Rao, Online personal library.
  692. Chaganti, Naren; Chaganti, Damayanti; Chaganti, Sitapati Rao, Online personal library.
  693. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online personal library.
  694. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online repository for personal information.
  695. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Online repository for personal information and access of information stored therein.
  696. DeVries, Jeffrey; Hitomi, Arthur, Opportunistic block transmission with time constraints.
  697. DeVries, Jeffrey; Hitomi, Arthur S., Opportunistic block transmission with time constraints.
  698. DeVries, Jeffrey; Hitomi, Arthur S., Opportunistic block transmission with time constraints.
  699. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  700. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  701. de Vries, Jeffrey; Hitomi, Arthur Shingen, Opportunistic block transmission with time constraints.
  702. Braitberg, Michael F.; Volk, Steven B.; Zaharris, Daniel R.; Davies, David H., Optical recording medium having a master data area and a writeable data area.
  703. Jones, Robert; Bi, Daoshen; Duggan, Charles F.; Schneck, Nelson T., Optically variable personalized indicia for identification documents.
  704. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  705. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  706. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  707. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  708. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  709. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  710. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  711. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  712. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  713. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  714. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  715. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  716. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  717. Holler, Anne Marie; Shah, Lacky Vasant; Panwar, Sameer; Patel, Amit, Optimized server for streamed applications.
  718. Pitt,Lance Douglas; Lamprecht,Leslie Johann; Martin,Jeffrey Thomas, Other cell sites used as reference point to cull satellite ephemeris information for quick, accurate assisted locating satellite location determination.
  719. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  720. Rodriguez, Tony F.; Carr, Jonathan Scott; Rhoads, Geoffrey B., Paper-based control of computer systems.
  721. Germeraad, Paul B.; Heaton, Sheryl A.; Hohmann, Luke; Rappaport, Irving S.; Rivette, Kevin G., Patent-related tools and methodology for use in the merger and acquisition process.
  722. Pitt, Lance Douglas; Hines, Gordon John; Griffin, John, Persona-notitia intellection codifier.
  723. De Bonet, Jeremy S.; Viola, Paul, Personal broadcast server system for providing a customized broadcast.
  724. De Bonet, Jeremy S.; Viola, Paul A., Personal broadcast server system for providing a customized broadcast.
  725. Hoffman, James; Friskel, James, Personal digital server (PDS).
  726. Cole, Mary Katherine; O'Connor, Glen Arthur; Speyer, Peter Christian, Platform for managing media assets for multi-model licensing over multi-level pricing and asset grouping.
  727. Kenyon, Jeremy A.; St. John, Alex K., Player-centric method and apparatus for creating, distributing, and consuming content.
  728. Evans, Brian P.; Strom, Clifford P.; Dunbar, Geoffrey; Prologo, Richard D., Playlist burning in rights-management context.
  729. Schaefer, Stuart; Schmeidler, Yonah; Levin, Ilya, Policy based composite file system and method.
  730. Rhoads, Geoffrey B.; Conwell, William Y., Portable audio appliance.
  731. Rhoads,Geoffrey B.; Davis,Bruce L.; Evans,Douglas B., Portable devices and methods employing digital watermarking.
  732. Abhyankar,Vishwas G.; Wong,Victor C.; Reisch,Robert V.; Breslawski,Robert; Jones,Robert S.; Williams,Donald R.; Bayley,Robert B.; Narayan,Badhri; Horvath,Louis S., Preservation system for digitally created and digitally signed documents.
  733. Rhoads, Geoffrey B., Printable interfaces and digital linking with embedded codes.
  734. Hollander,Josef; Schlesinger,Mor, Printing a custom online book and creating groups of annotations made by various users using annotation identifiers before the printing.
  735. Kazunori Horikiri JP, Procedure execution device and procedure execution method.
  736. Levy, Kenneth L.; Hiatt, R. Stephen; Rhoads, Geoffrey B., Processing audio or video content with multiple watermark layers.
  737. Rhoads, Geoffrey B., Processing data representing video and audio and methods and apparatus related thereto.
  738. Muller, Max; Cortes, Ricardo, Processing of metadata content and digital content received by a media distribution system.
  739. Peinado,Marcus; Venkatesan,Ramarathnam; Davis,Malcolm, Producing a new black box for a digital rights management (DRM) system.
  740. Shimizu, Yusuke; Uchida, Yoichi; Adachi, Seiji; Hammond, Eric Rayburn; Noguchi, Yasuhiro; Heilman, III, Paul Mitchell; Poling, Jr., Daniel Luke, Program data distribution via open network.
  741. Srinivasan, Pramila; Princen, John, Programming non-volatile memory in a secure processor.
  742. Srinivasan, Pramila; Princen, John, Programming on-chip non-volatile memory in a secure processor using a sequence number.
  743. Srinivasan, Pramila; Princen, John, Programming on-chip non-volatile memory in a secure processor using a sequence number.
  744. Srinivasan, Pramila; Princen, John, Programming on-chip non-volatile memory in a secure processor using a sequence number.
  745. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  746. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  747. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  748. England, Paul; Peinado, Marcus; Sankaranarayan, Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  749. England,Paul; Peinado,Marcus; Sankaranarayan,Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  750. England,Paul; Peinado,Marcus; Sankaranarayan,Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  751. England,Paul; Peinado,Marcus; Sankaranarayan,Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  752. Oliveira, Eduardo P.; Klemets, Anders E.; Bhatt, Sanjay; Paka, Anand; Alkove, James M., Protecting digital media of various content types.
  753. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  754. Cope, Rod; Weidner, Eric, Providing documentation for assembling, installing, and supporting of software stacks.
  755. Rhoads,Geoffrey B., Providing reports associated with video and audio content.
  756. Rhodes, Jeffrey C.; Luo, Tong; Burton, Victor; Conner, Christine, Public safety access point (PSAP) selection for E911 wireless callers in a GSM type system.
  757. Sachdev, Vineet; McFarland, Keith; Griffin, John L., Quality of service to over the top applications used with VPN.
  758. Cuff, Michael; Wang, Chih; Kasad, Farhad; Aryana, Firdaus; Hines, Gordon J., Rapid assignment dynamic ownership queue.
  759. Homer, Gregg S., Rechargeable media distribution and play system.
  760. Hori,Yoshihiro; Hioki,Toshiaki; Kanamori,Miwa; Kotani,Seigou; Hasebe,Takayuki; Hatakeyama,Takahisa; Tonegawa,Tadaaki; Anazawa,Takeaki, Recorder.
  761. Ronald P. Sansone ; Meredith B. Fischer, Recording graphical information on the face of a mail piece and placing information about the graphical information in an information-based indicia.
  762. Pedersen, Palle M, Region based information retrieval system.
  763. Rhoads,Geoffrey B.; MacIntosh,Brian T., Registering with computer systems.
  764. Peinado, Marcus; England, Paul; Yerrace, Frank, Releasing decrypted digital content to an authenticated path.
  765. Peinado,Marcus; England,Paul; Yerrace,Frank, Releasing decrypted digital content to an authenticated path.
  766. Chan,Man, Remote access authorization of local content.
  767. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  768. Peinado, Marcus; Manferdelli, John L.; Bell, Jeffrey R. C., Rendering digital content in an encrypted rights-protected form.
  769. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  770. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  771. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  772. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  773. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  774. Levin, Douglas Andrew; Pedersen, Palle Martin; Shah, Ashesh C., Resolving license dependencies for aggregations of legally-protectable content.
  775. Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Restricting use of a digital item stored in a client computer by sending an instruction from a server computer via a network.
  776. Gajjala,Vijay K.; Ganesan,Krishnamurthy; McKune,Jeffrey R., Retail transactions involving digital content in a digital rights management (DRM) system.
  777. Abburi,Rajasekhar, Retail transactions involving distributed and super-distributed digital content in a digital rights management (DRM) system.
  778. Demartini, Thomas M.; Raley, Michael Charles, Rights expression profile system and method.
  779. Raley, Michael C.; Gilliam, Charles P.; Ham, Manual; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  780. Raley, Michael; Gilliam, Charles P.; Ham, Manuel; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  781. Levy, Kenneth L.; Rhoads, Geoffrey B.; Hiatt, R. Stephen, Rights management system and methods.
  782. Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
  783. Evans, Brian P.; Strom, Clifford P.; Rosenstein, Daniel, Rights management system for streamed multimedia content.
  784. Evans, Brian P.; Strom, Clifford P.; Rosenstein, Daniel; Paka, Anand D.; Fang, Nicholas J.; Oliveria, Eduardo, Rights management system for streamed multimedia content.
  785. Van Dyke, Clifford P.; Cheng, David J.; Mohan, Siva, Rights management system for streamed multimedia content.
  786. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  787. D'Souza, Myron; Hines, Gordon John; Bartnik, David; Hannan, Joseph; Groen, Joel; Wells, William, Roaming gateway enabling location based services (LBS) roaming for user plane in CDMA networks without requiring use of a mobile positioning center (MPC).
  788. Hitomi, Arthur S.; Tran, Robert; Kammer, Peter J.; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  789. Hitomi, Arthur S.; Tran, Robert; Kammer, Peter J.; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  790. Hitomi, Arthur S.; Tran, Robert; Kammer, Peter J.; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  791. Hitomi, Arthur S.; Tran, Robert; Kammer, Peter J.; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  792. Hitomi, Arthur S.; Tran, Robert; Kammer, Peter J.; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  793. Hitomi, Arthur S.; Tran, Robert; Kammer, Peter J.; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  794. Hitomi, Arthur S.; Tran, Robert; Kammer, Peter; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  795. Hitomi, Arthur Shingen; Tran, Robert; Kammer, Peter Joseph; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  796. Hitomi, Arthur Shingen; Tran, Robert; Kammer, Peter Joseph; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  797. Hitomi, Arthur Shingen; Tran, Robert; Kammer, Peter Joseph; Pfiffner, Doug; Nguyen, Huy, Rule-based application access management.
  798. Thompson, Paul; Hines, Gordon John, SUPL-WiFi access point controller location based services for WiFi enabled mobile devices.
  799. Ryan, John O., Scaling independent technique for watermarking images with recorder shut-off.
  800. Srinivasan,Pramila; Princen,John; Berndt,Frank; Blythe,David; Saperstein,William; Yen,Wei, Secure and backward-compatible processor and secure software execution thereon.
  801. Srinivasan,Pramila; Princen,John; Berndt,Frank; Blythe,David; Saperstein,William; Yen,Wei, Secure and backward-compatible processor and secure software execution thereon.
  802. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  803. Princen, John; Srinivasan, Pramila; Anderson, Craig Steven, Secure device authentication system and method.
  804. McFarland, Keith A.; Ghozati, Kambiz; Stevens, John; Wells, Wiliam P., Secure distribution of non-privileged authentication credentials.
  805. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  806. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  807. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  808. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  809. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  810. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  811. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  812. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  813. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  814. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  815. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  816. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  817. Venters, III,Carl Vernon; Phillips, II,Eugene B.; Ornstein,Seth, Secure streaming container.
  818. Ventors, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  819. Garcia,Denis Jacques Paul, Secured data format for access control.
  820. Mark E. Peters, Securing Web server source documents and executables.
  821. Srinivasan, Pramila; Princen, John; Chan, Andy; Mielke, Paul; Wheeler, Rob, Securing a flash memory block in a secure device system and method.
  822. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  823. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  824. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  825. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  826. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  827. Phillips, II,Eugene B.; Ornstein,Seth, Securing digital content system and method.
  828. Rhoads,Geoffrey B., Securing media content with steganographic encoding.
  829. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  830. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  831. Alcazar, Mark A.; Tammana, Venkata Rama Prasad, Security critical data containers.
  832. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  833. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  834. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  835. Haff, Maurice W.; Clarke, Christopher D., Selective acceptance of electronic messages in communication systems.
  836. DeMello,Marco A.; Narin,Attila; Madonna,Christopher Robert Richard, Server controlled branding of client software deployed over computer networks.
  837. Maes, Stephane H., Service level digital rights management support in a multi-content aggregation and delivery system.
  838. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers for client computers.
  839. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers to client computers.
  840. Peinado, Marcus; England, Paul; Manferdelli, John L., Software application protection by way of a digital rights management (DRM) system.
  841. Thomas, Andrew James; Skrebels, Mark; Irvine, Stewart, Software configuration of module dependent on history.
  842. Wilson, Patrick D.; Teixeira, Joao C.; George, Kenneth V.; Workman, Adam C., Software license authorization system.
  843. Ronning, Joel A.; Efergan, David; Olson, Pete; Rauf, Amir, Software license server with geographic location validation.
  844. Barritz, Robert; Kassan, Peter; Hellberg, Per, Software product inventory and usage information correlated with license agreement information.
  845. Cope, Rod; Weidner, Eric, Software project filter.
  846. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  847. Vinson, Jeffrey; Westerberg, Steig G.; Vries, Jeffrey De, Software streaming system and method.
  848. Vinson, Jeffrey; Westerberg, Steig; DeVries, Jeffrey, Software streaming system and method.
  849. Vinson, Jeffrey; Westerberg, Steig; DeVries, Jeffrey, Software streaming system and method.
  850. Vinson, Jeffrey; Westerberg, Steig; DeVries, Jeffrey, Software streaming system and method.
  851. Ronning, Joel A.; Efergan, David; Olson, Pete; Rauf, Amir, Software wrapper having use limitation within a geographic boundary.
  852. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  853. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  854. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  855. Poremba, Todd, Special emergency call treatment based on the caller.
  856. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifiying security for an element by assigning a scaled value representative of the relative security thereof.
  857. Ganesan, Krishnamurthy, Specifying rights in a digital rights license according to events.
  858. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  859. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  860. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  861. Yen, Wei; Blythe, David; Princen, John; Srinivasan, Pramila, Static-or-dynamic and limited-or-unlimited content rights.
  862. Rhoads, Geoffrey B.; Carr, J. Scott, Steganographic data hiding using a device clock.
  863. Rhoads, Geoffrey B., Steganographic encoding and detecting for video signals.
  864. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  865. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  866. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  867. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  868. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  869. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  870. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  871. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  872. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  873. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  874. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  875. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  876. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  877. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  878. Rhoads, Geoffrey B.; Levy, Kenneth L.; McKinley, Tyler J., Steganographically encoded video, deriving or calculating identifiers from video, and related methods.
  879. Fujii, Tetsuhiko; Murotani, Akira, Storage system and storage device archive control method.
  880. de Vries, Jeffrey; Zavertnik, Greg; Hubbell, Ann, Streaming from a media device.
  881. de Vries, Jeffrey; Zavertnik, Greg; Hubbell, Ann, Streaming from a media device.
  882. Peinado,Marcus; Abburi,Rajasekhar; Bell,Jeffrey R. C., Structural of digital rights management (DRM) system.
  883. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Bell,Jeffrey R. C., Structure of a digital content package.
  884. Cortes, Ricardo; Muller, Max, Submission of metadata content and media content to a media distribution system.
  885. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., Subscription access system for use with an untrusted network.
  886. Homer, Gregg S., Subscription media on demand VII.
  887. Homer, Gregg S., Subscription media on demand VIII (offline mode).
  888. Evans,Douglas B.; Conwell,William Y., Substituting images in copies based on digital watermarks.
  889. Evans,Douglas B.; Conwell,William Y., Substituting objects based on steganographic encoding.
  890. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in media objects based on steganographic encoding.
  891. Hurtado, Marco M.; Mahlbacher, James C.; Spagna, Richard L., Super-distribution of protected digital content.
  892. Liu, Yeu; Pandya, Ravi; Ivanov, Lazar; Paramasivam, Muthukrishnan; Gunyakti, Caglar; Gui, Dongmei; Hsu, Scott W. P., Supplementary trust model for software licensing/commercial digital distribution policy.
  893. Clapper, Edward O., Syllabic search engines and related methods.
  894. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Synchronizing rendering of multimedia content.
  895. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  896. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  897. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  898. DeMello, Marco; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  899. DeMello,Marco A.; Krishnaswamy,Vinay; Manferdelli,John L., System and method for accessing protected content in a rights-management architecture.
  900. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy B.; Yaacovi,Yoram; Alger,Jeffrey H., System and method for activating a rendering device in a multi-level rights-management architecture.
  901. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy Bertrand; Yaacovi,Yoram; Alger,Jeffrey A., System and method for activating a rendering device in a multi-level rights-management architecture.
  902. DeMello, Marco A.; Narin, Attila; Setty, Venkateshaiah, System and method for client interaction in a multi-level rights-management architecture.
  903. Schull,Jonathan, System and method for controlling access to protected information.
  904. Gilliam, Charles P; Chen, Eddie J, System and method for controlling rights expressions by stakeholders of an item.
  905. Schull,Jonathan, System and method for creating and running protected information.
  906. Smith, Timothy R., System and method for data validation and life cycle management.
  907. Hoffberg, Steven M., System and method for determining contingent relevance.
  908. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  909. Schull, Jonathan, System and method for distributing protected information.
  910. Wang,Xin, System and method for document distribution.
  911. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  912. Yen,Wei; Blythe,David; Princen,John; Srinivasan,Pramila, System and method for generating new licenses.
  913. Tieu, Vincent; Fung, Joseph Z.; Chen, Eddie; Tadayon, Bijan, System and method for granting access to an item or permission to use an item based on configurable conditions.
  914. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  915. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  916. Hudson, Ron J.; Coles, Terrence T.; Berry, Craig D.; Easty, Allen D., System and method for interactive video content programming.
  917. Manferdelli,John L.; Marr,Michael David; Krishnaswamy,Vinay; Jakubowski,Mariusz H., System and method for interfacing a software process to secure repositories.
  918. Erickson, John S., System and method for managing copyrighted electronic media.
  919. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  920. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  921. Schull,Jonathan, System and method for operating a licensing server.
  922. Schull,Jonathan, System and method for processing protected audio information.
  923. Schull, Jonathan, System and method for processing protected text information.
  924. Schull,Jonathan, System and method for processing protected video information.
  925. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  926. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  927. Wang, Xin, System and method for protection of digital works.
  928. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  929. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  930. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  931. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  932. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  933. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  934. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  935. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  936. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  937. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  938. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  939. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  940. Schull, Jonathan, System and method for selectively changing parameter settings based on lineage analysis of digital information.
  941. Schull,Jonathan, System and method for selectively enabling access based on lineage analysis of digital information.
  942. Schull,Jonathan, System and method for selling protected information in an oem context.
  943. Wang, Xin, System and method for specifying and processing legality expressions.
  944. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  945. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  946. Pandolfi, Alfred, System and method for the centralized management of a document ordering and delivery program.
  947. Weaver, Richard H.; Pandolfi, Fred; Hayes, Steve, System and method for the centralized management of a document ordering and delivery program.
  948. de Vries, Jeffrey, System and method for tracking changes to files in streaming applications.
  949. Wang,Xin, System and method for transferring the right to decode messages.
  950. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  951. Dunkeld, Bryan; Lambert, Edward, System and method for unique digital asset identification and transaction management.
  952. Pesl, Marek, System and method for using digital strings to provide secure distribution of digital content.
  953. Wang, Ping, System and method of authentication, monitoring, and advertisement distribution.
  954. Erickson,John S., System and methods for managing digital creative works.
  955. Rudd, James M., System and methods for managing the distribution of electronic content.
  956. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  957. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  958. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  959. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  960. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  961. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  962. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  963. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  964. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  965. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  966. Nuttall, Francois-Xavier; Collier, David Charles; Fenney, Robert J.; Capitant, Patrice J., System and methods providing secure delivery of licenses and content.
  967. Nuttall,Francois Xavier; Collier,David Charles; Fenney,Robert J.; Capitant,Patrice J., System and methods providing secure delivery of licenses and content.
  968. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  969. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  970. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  971. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  972. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  973. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  974. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  975. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  976. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  977. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  978. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  979. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  980. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  981. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  982. Byrne, Shannon Lee; Muecke, Innes; Patterson, Andrew; Slik, David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  983. Malone, Michael F.; Murphy, Frederick J., System for embedding searchable information, encryption, signing operation, transmission, storage and retrieval.
  984. Iwamura Keiichi,JPX, System for enabling access to a body of information based on a credit value, and system for allocating fees.
  985. Rhoads,Geoffrey B.; Davis,Bruce L.; Hein, III,William C.; Rosenthol,Joshua A.; MacIntosh,Brian T.; Levy,Kenneth L., System for linking from object to remote resource.
  986. Rhoads, Geoffrey B.; Davis, Bruce L.; Hein, III, William C.; Rosenthol, Joshua A.; MacIntosh, Brian T.; Levy, Kenneth L., System for linking from objects to remote resources.
  987. Gregg, Richard L.; Giri, Sandeep; Goeke, Timothy C., System for managing access to protected computer resources.
  988. Homer, Gregg S., System for tracking digital information over a communications network.
  989. Homer,Gregg, System for tracking files transmitted over the internet.
  990. Wood, Lisa T.; Lewis, Scott M.; Fried, Robin, System, method and apparatus for media submission.
  991. Wood, Lisa T.; Lewis, Scott M.; Fried, Robin T., System, method and apparatus for media submission.
  992. Wood, Lisa T.; Lewis, Scott M.; Fried, Robin T., System, method and apparatus for media submission.
  993. Blair, Tim W; DeWolfe, Andrew S; Germeraad, Paul B; Rappaport, Irving S; Rivette, Kevin G; Rosenquist, Brent, System, method, and computer program product for knowledge management.
  994. Lofgren, Neil E.; Seder, Phillip Andrew; MacIntosh, Brian T., Systems and methods facilitating communication with remote computers.
  995. Valenzuela, Edgardo; Chen, Eddie J.; DeMartini, Thomas; Fung, Joseph Zhung Yee; Nguyen, Mai; Tieu, Vincent Hsiang; Tran, Duc, Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates.
  996. Valenzuela, Edgardo; Chen, Eddie J.; DeMartini, Thomas; Fung, Joseph Zhung Yee; Nguyen, Mai; Tieu, Vincent Hsiang; Tran, Duc, Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates.
  997. McCurdy, Kevin; Pai, Samuel Hong-Yen; Kelleher, John; Maggiotto, Richard, Systems and methods for distributing and viewing electronic documents.
  998. McCurdy,Kevin; Pai,Samuel Hong Yen; Kelleher,John; Maggiotto,Richard, Systems and methods for distributing and viewing electronic documents.
  999. Prakash, Vipul Ved, Systems and methods for filtering contents of a publication.
  1000. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  1001. Howard, James V.; Frazier, Francis; Siamak, Parviz, Systems and methods for managing and detecting fraud in image databases used with identification documents.
  1002. Wawda, Abubakar; Spertus, Michael, Systems and methods for managing rights of data via dynamic taint analysis.
  1003. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  1004. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  1005. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  1006. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  1007. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  1008. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  1009. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  1010. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  1011. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1012. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1013. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1014. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1015. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1016. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1017. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1018. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1019. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1020. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1021. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  1022. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  1023. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  1024. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  1025. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  1026. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  1027. Meyer, Joel R.; Rhoads, Geoffrey B., Systems and methods of managing audio and other media.
  1028. Meyer, Joel R.; Rhoads, Geoffrey B., Systems and methods of managing audio and other media.
  1029. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  1030. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  1031. Levy, Kenneth L.; Meyer, Joel R.; Andrews, III, Hoyet Harrison, Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities.
  1032. Rhoads, Geoffrey B.; Lofgren, Neil E.; Patterson, Philip R., Systems and methods using identifying data derived or extracted from video, audio or images.
  1033. Jones, Robert, Systems, compositions, and methods for full color laser engraving of ID documents.
  1034. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  1035. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  1036. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  1037. Barton, James M.; Smith, Kevin P.; Chamberlin, David; Look, Howard D., Tag-based menus in video streams.
  1038. Jones, Robert L.; Bi, Daoshen; Yeh, Tung-Feng, Tamper evident adhesive and identification document including same.
  1039. Robbin, Gregory; Heller, David; Muller, Max, Techniques and systems for electronic submission of media for network-based distribution.
  1040. Haney, Richard D., Techniques for communication within closed groups of mobile devices.
  1041. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  1042. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  1043. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  1044. Haney, Richard D., Techniques for sharing position data between first and second devices.
  1045. Haney, Richard D., Techniques for sharing relative position between mobile devices.
  1046. Wallace, Erik; Morin, Drew; Pitt, Lance D.; Murphy, Sean, Telematics basic mobile device safety interlock.
  1047. Haff, Maurice W.; Clarke, Christopher D., Third party authentication of files in digital systems.
  1048. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  1049. Cope, Rod; Weidner, Eric, Tools for software stacks.
  1050. Cope, Rod; Weidner, Eric, Tools for stacking uncoordinated software projects.
  1051. Patterson, Patrick E., Tracking electronic content.
  1052. Patterson, Patrick E., Tracking electronic content.
  1053. Haney, Richard D., Tracking proximity of services provider to services consumer.
  1054. Tewfik, Ahmed; Swanson, Mitchell D.; Zhu, Bin, Transactional watermarking.
  1055. Pitt, Lance Douglas; DeLapp, Daniel D.; Lawrence, Sarah Jean, Transmitter augmented radar/laser detection using local mobile network within a wide area network.
  1056. Asadu, Hideki, Transmitting second content data with reference for use with first content data.
  1057. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  1058. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  1059. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  1060. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  1061. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  1062. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  1063. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  1064. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  1065. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  1066. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  1067. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank 911 calls.
  1068. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank emergency 911 calls.
  1069. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank emergency 911 calls.
  1070. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  1071. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  1072. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  1073. Rhoads,Geoffrey B.; Rodriguez,Tony F.; McKinley,Tyler J.; Miller,Marc D.; Hierholzer,Kirstin, User control and activation of watermark enabled objects.
  1074. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  1075. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  1076. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  1077. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  1078. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  1079. Zhu,Yinjun, User plane location based service using message tunneling to support roaming.
  1080. Zhu, Yinjun; Hines, Gordon John; Marshall, Roger; Yang, Fei; Burton, Victor, User plane location services over session initiation protocol (SIP).
  1081. Zhu, Yinjun; Hines, Gordon John; Marshall, Roger; Yang, Fei; Burton, Victor, User plane location services over session initiation protocol (SIP).
  1082. Levy,Kenneth L., User-friendly rights management systems and methods.
  1083. Levy, Kenneth L., Using embedded data with file sharing.
  1084. Levy, Kenneth L., Using embedded data with file sharing.
  1085. Levy, Kenneth L., Using embedded data with file sharing.
  1086. Kevin G. Rivette ; Irving S. Rappaport ; Luke Hohmann ; David Puglia ; David Goretsky ; Adam Jackson ; Charles Rabb, Jr. ; David W. Smith ; Brian Park ; Warren Thornthwaite ; Jorge A. Navar, Using hyperbolic trees to visualize data generated by patent-centric and group-oriented data processing.
  1087. Kevin G. Rivette ; Irving S. Rappaport ; Luke Hohmann ; David Puglia ; David Goretsky ; Adam Jackson ; Charles Rabb, Jr. ; David W. Smith ; Brian Park ; Warren Thornthwaite ; Jorge A. Navar, Using hyperbolic trees to visualize data generated by patent-centric and group-oriented data processing.
  1088. Rivette, Kevin G.; Rappaport, Irving S.; Hohmann, Luke; Puglia, David; Goretsky, David; Jackson, Adam; Rabb, Jr., Charles; Smith, David W.; Park, Brian; Thornthwaite, Warren; Navarrete, Jorge A., Using hyperbolic trees to visualize data generated by patent-centric and group-oriented data processing.
  1089. Levy, Kenneth L., Using object identifiers with content distribution.
  1090. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  1091. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  1092. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  1093. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  1094. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  1095. Joao, Raymond Anthony, Vehicle operator and/or occupant information apparatus and method.
  1096. Rhoads,Geoffrey B., Video steganography.
  1097. Rhoads,Geoffrey B., Video steganography.
  1098. Rhoads, Geoffrey B., Video steganography or encoding.
  1099. Wesinger, Jr.,Ralph E.; Coley,Christopher D., Virtual host for protocol transforming traffic traversing between an IP-compliant source and non-IP compliant destination.
  1100. Croy, Jon; Hines, John Gordon, Voice Over Internet Protocol (VoIP) location based conferencing.
  1101. Croy, Jon; Hines, John Gordon; Johnson, Darrin; Lendvay, Kathleen, Voice over internet protocol (VoIP) multi-user conferencing.
  1102. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
  1103. Geoffrey B. Rhoads, Watermark enabled video objects.
  1104. Rhoads,Geoffrey B.; Levy,Kenneth L.; McKinley,Tyler J., Watermark encoded video, and related methods.
  1105. McKinley, Tyler J.; Seder, Phillip Andrew; Rodriguez, Tony F., Watermark systems and methods.
  1106. Evans, Douglas B.; Conwell, William Y., Watermark-based object linking and embedding.
  1107. Rodriguez, Tony F.; Rhoads, Geoffrey B.; Davis, Bruce L.; Carr, J. Scott, Watermarked business cards and methods.
  1108. Werner,Oliver Hartwig; Mason,Andrew James; Salmon,Richard Aubrey, Watermarking.
  1109. Rhoads, Geoffrey B., Watermarking to convey auxiliary information, and media embodying same.
  1110. Wesinger, Jr., Ralph E.; Coley, Christopher D., Web server with animation player.
  1111. Glogau Jordan J., Web site copyright registration system and method.
  1112. Wood, Lisa T.; Lewis, Scott M.; Fried, Robin T., Web-based media submission tool.
  1113. Mitchell, Jr., Donald L.; Marshall, Roger S.; Singer, Andrew; Aryana, Firdaus, Wireless emergency caller profile data delivery over a legacy interface.
  1114. Havlark, Arlene; Burton, Victor; Ahrens, John, Wireless telecommunications location based services scheme selection.
  1115. Havlark, Arlene; Burton, Victor; Ahrens, John, Wireless telecommunications location based services scheme selection.
  1116. Klug, John R.; Peterson, Thad D., World wide web registration information processing system.
  1117. Klug, John R.; Peterson, Thad D., World wide web registration information processing system.
  1118. Klug,John R.; Peterson,Thad D., World wide web registration information processing system.
  1119. Klug,John R.; Peterson,Thad D., World wide web registration information processing system.
  1120. Klug, John R.; Peterson, Thad D., Worldwide web registration information processing system.
  1121. Klug, John R.; Peterson, Thad D., Worldwide web registration information processing system.
  1122. Braitberg, Michael F.; Volk, Steven B., Writeable medium access control using a medium writeable area.
  1123. Pitt, Lance D.; Ginter, Thomas; Aryana, Firdaus; Mitchell, Jr., Donald Le Roy, iALERT enhanced alert manager.
  1124. Pitt, Lance D.; Ginter, Thomas; Aryana, Firdaus; Mitchell, Jr., Donald Le Roy, iALERT enhanced alert manager.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로