$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System for controlling access and distribution of digital property 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0968887 (1997-11-05)
발명자 / 주소
  • Schneck Paul B.
  • Abrams Marshall D.
출원인 / 주소
  • MRJ, Inc.
대리인 / 주소
    Pillsbury Madison & Sutro LLP
인용정보 피인용 횟수 : 870  인용 특허 : 90

초록

A method and device are provided for controlling access to data. Portions of the data are protected and rules concerning access rights to the data are determined. Access to the protected portions of the data is prevented, other than in a non-useable form; and users are provided access to the data on

대표청구항

[ What is claimed is:] [49.] A device for distributing data for subsequent controlled use of the data by a user, the device comprising:means for protecting portions of the data;means for protecting rules defining access rights to the data; andmeans providing the protected portions of the data and th

이 특허에 인용된 특허 (90)

  1. Fahn Paul N. (Redwood City CA) Kaliski ; Jr. Burton S. (San Carlos CA) Robshaw Matthew J. B. (San Francisco CA) Fahn Paul N. (Redwood City CA), Abuse-resistant object distribution system and method.
  2. Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
  3. Tolman J. Leonard (Provo UT) Ekstrom Joseph J. (Lindon UT), Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of compute.
  4. Uchenick Gordon (Baltimore MD), Apparatus and method for preventing unauthorized use of computer programs.
  5. Subler Ronald J. (Charlestown MA) Hastings Thomas Mark (Lexington MA), Assembly, distribution, and use of digital information.
  6. Wiedemer John D. (930 W. Forest Dr. Houston TX 77079), Billing system for computer software.
  7. Wiedemer John D. (930 W. Forest Dr. Houston TX 77079), Billing system for computer software.
  8. Ehrsam William Friedrich (Hurley NY) Meyer Carl H. W. (Kingston NY) Powers Robert Lowell (West Hurley NY) Prentice Paul Norman (Hyde Park NY) Smith John Lynn (Woodstock NY) Tuchman Walter Leonard (Wo, Block cipher system for data security.
  9. Johnstone ; Richard, Computer software security system.
  10. Duxbury Paul (Sandbach GB2), Computer system security.
  11. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  12. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  13. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Crypto microprocessor for executing enciphered programs.
  14. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Crypto microprocessor that executes enciphered programs.
  15. Best Robert M. (16016 - 9th Ave. NE. Seattle WA 98155), Crypto microprocessor using block cipher.
  16. Best Robert M. (16016 Ninth Ave. Northeast Seattle WA 98155), Cryptographic decoder for computer programs.
  17. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Smith John L. (Woodstock NY) Tuchman Walter L. (Woodstock NY), Cryptographic file security for single domain networks.
  18. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Cryptographic identification, financial transaction, and credential device.
  19. Lennon Richard E. (Woodstock NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Oseas Jonathan (Hurley NY) Prentice Paul N. (Hyde Park NY) Tuchman Walter L. (Woodstock NY), Cryptographic verification of operational keys used in communication networks.
  20. Mita Makoto (Saitama JPX), Data management method and system with management table indicating right of use.
  21. Geffrotin Bernard (Meudon FRX), Data processing system comprising authentification means viz a viz a smart card, an electronic circuit for use in such s.
  22. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  23. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  24. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  25. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  26. Lumley Robert M. (Lawrence Township ; Mercer County NJ), Digital computer having code conversion apparatus for an encrypted program.
  27. Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Tuchman Walter L. (Woodstock NY), Digital signature system and apparatus.
  28. Shanton M. Greg (Fairfax VA), Distributed cryptographic object method.
  29. Miyahara Gary K. (Rancho Palos Verdes CA), Efficient security kernel for the 80960 extended architecture.
  30. Hasebe Takayuki (Kawasaki JPX) Akiyama Ryota (Kawasaki JPX) Yoshioka Makoto (Kawasaki JPX), Electronic data protection system.
  31. France Rode (880 La Cuesta Los Altos CA 94022), Electronic security apparatus.
  32. Hube Randall R. (Rochester NY) Cardinale Louis J. (Webster NY) Auclair Christopher J. (Fairport NY) Thomas Theodore W. (Olympia WA), Enabling features over common communication channel.
  33. Kazmierczak Gregory J. (Plainsboro NJ) Michener John R. (Neshanic Station NJ) Smith Kathryn M. (Somerville NJ), Encrypted data package record for use in remote transaction metered data system.
  34. Elmer Thomas I. (Sunnyvale CA) Nguyen Tuan T. (Milpitas CA) Lin Rung-Pan (San Jose CA), Encryption of streams of addressed information to be used for program code protection.
  35. Platteter Dale T. (Fairport NY) Westfall Robert S. (Rochester NY) Carter Jeff C. (Fairport NY), Execution protection for floppy disks.
  36. Wyman Robert M. (Kirkland WA), Filters in license management system.
  37. Yearsley Gyle (Boise ID) Richards Grant (Meridian ID), Firmware encryption for microprocessor/microcomputer.
  38. Rebec Mohammed S. (Bristol IN) Rebec Mihailo V. (Bristol IN), Global digital video news distribution system.
  39. Sprague Peter J. (249 Undermountain Rd. Lenox MA 02140) Lipscomb Thomas H. (145 E. 74th St. New York NY 10021), Information distribution system.
  40. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
  41. Birney Richard Eugene (Boca Raton FL) Davis Michael Ian (Boca Raton FL) Hood Robert Allen (Boca Raton FL) Graybiel Lynn Allan (Boca Raton FL) Kahn Samuel (Mountain View CA) Osborne William Steese (Bo, Key controlled address relocation translation system.
  42. Wyman Robert M. (Kirkland WA), License document interchange format for license management system.
  43. Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
  44. Attanasio ; Clement Richard, Location dependence for assuring the security of system-control operations.
  45. Johnson Donavon W. (Georgetown TX) Morgan Stephen P. (Mahopac NY) Smith Todd A. (Austin TX), Maintenance of file attributes in a distributed data processing system.
  46. Wyman Robert M. (Kirkland WA), Management interface for license management system.
  47. Moran John Christian (Broomfield CO), Memory patching circuit.
  48. Ehrsam ; William F. ; Meyer ; Carl H. W. ; Smith ; John L. ; Tuchman ; W alter L., Message verification and transmission error detection by block chaining.
  49. Katznelson Ron D. (San Diego CA), Metering retrieval of encrypted data stored in customer data retrieval terminal.
  50. Thomas William J. (6146 Winterbrook Dr. San Jose CA 95129), Method and apparatus for controlling usage of a programmable computing machine.
  51. Chou Wayne W. (25 Hauley Pl. Ridgefield CT 06877) Erett Richard E. (78 White Birch La. Stamford CT 06905), Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded.
  52. Thomas David C. (Mesa AZ), Method and apparatus for providing security for computer software.
  53. Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Method and apparatus for retrieving secure information from mass storage media.
  54. Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Method and apparatus for retrieving selected information from a secure information source.
  55. Bianco Mark E. (Pomona CA), Method and apparatus for securely conveying network control data across a cryptographic boundary.
  56. Atalla Martin M. (Menlo Park CA), Method and apparatus for securing data transmissions.
  57. Konheim Alan G. (Yorktown Heights NY), Method and apparatus for transaction and identity verification.
  58. Heffron Charles B. (Knoxville TN) Lenarduzzi Roberto (Knoxville TN) Haken Jack E. (Danbury CT), Method and apparatus to secure proprietary operation of computer equipment.
  59. Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
  60. Janis Frederick L. (Keller TX), Method and system for providing user access control within a distributed data processing system by the exchange of acces.
  61. Janis Frederick L. (Keller TX), Method and system for variable authority level user access control in a distributed data processing system having multip.
  62. Lipscomb Thomas H. (New York NY) Nagel Robert H. (New York NY), Method for retrieving secure information from a database.
  63. Santon John C. (Johnstown CO) Nielsen Kenneth R. (Loveland CO) Armbrust Christen M. (Boulder Creek CA) Shah Pankaj B. (Santa Clara CA) Hand Steven J. (San Jose CA), Method of distributing computer data files.
  64. Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT) Elteto Laszlo (Stamford CT) Engel Frederik (Wilton CT), Method of software distribution protection.
  65. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Microprocessor for executing enciphered programs.
  66. Elliott John C. (Summit NJ) O\Connell James A. (Short Hills NJ) Ladouceur Lawrence (Scarsdale NY) Altman William (Lower Paxton PA) Jarett Keith (Oakland CA), Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer.
  67. Hodge Winston W. (Yorba Linda CA) Taylor Lawrence E. (Anaheim CA), Near-video-on-demand digital video distribution system utilizing asymmetric digital subscriber lines.
  68. Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
  69. Attanasio Clement Richard (Peekskill NY) Belady Laszlo Antal (Yorktown Heights NY), Operating system authenticator.
  70. Yamazaki Shunpei (Tokyo JPX) Hamatani Toshiji (Atsugi JPX), Paperless portable book.
  71. Blackledge ; Jr. John W. (Boca Raton FL) Clarke ; Jr. Grant L. (Boca Raton FL) Dayan Richard A. (Boca Raton FL) Le Kimthanh D. (Boynton Beach FL) McCourt Patrick E. (Delray Beach FL) Mittelstedt Matt, Personal computer system with security features and method.
  72. Richard Harold S. (Dayton OH) Grillmeier Eugene L. (Centerville OH) Gross Jack R. (Waynesville OH) Myers Robert P. (Kettering OH), Programmable cryptic device for enciphering and deciphering data.
  73. Roberts David J. (Eastleigh GB2) Simmons John (Chandlers Ford GB2), Protection of data processing system against unauthorized programs.
  74. Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak Rostislaw (Dumfries VA) Wilkins John D. (Somerville VA), Secure cryptographic operations using control vectors generated inside a cryptographic facility.
  75. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  76. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  77. Allen Michael J. (St. Charles IL) Langlois John (Cary IL), Security system for microcomputers.
  78. Ryder ; Sr. John H. (Durham NC) Smith Susanna R. (Tampa FL), Self-verifying receipt and acceptance system for electronically delivered data objects.
  79. Eisele Raymund H. (Idstein DEX), Smart data storage device.
  80. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  81. Robert Gregory (Nashua NH) Chase David (Wellesley MA) Schaefer Ronald (Acton MA), Software licensing management system.
  82. Donald Thomas C. (2651 Rillwood Rd. Birmingham AL 35243) Donald Henry W. (428 Lakewood Dr. Homewood AL 35209), Software protection system.
  83. Ostrover Lewis S. (Los Angeles CA) Cookson Christopher J. (Los Angeles CA), System and method for authenticating software carriers.
  84. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
  85. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  86. Guillou Louis C. (Bourgbarre FRX), System for transmitting information provided with means for controlling access to the information transmitted.
  87. Le Roux Jean-Yves (Bouc Bel Air FRX), System of payment or information transfer by money card with electronic memory.
  88. Edwards ; Jr. Gordon L. (Easley SC), System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of prote.
  89. Greenwood Stephen R. (Merrimack NH) Peterson R. Kim (Seattle WA) Schreiber Benn L. (Issaquah WA), Thread private memory storage of multi-thread digital data processors using access descriptors for uniquely identifying.
  90. Abraham Dennis G. (Concord NC) Henningsmeyer Daniela (Stuttgart VA DEX) Hudson John M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Stevens Jam, User defined function facility.

이 특허를 인용한 특허 (870)

  1. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., Accessing protected content in a rights-management architecture.
  2. Barrus, John W.; Savitzky, Stephen R.; Piersol, Kurt Wesley, Action stickers for identifying and processing stored documents.
  3. Barrus,John; Piersol,Kurt Wesley, Action stickers for nested collections.
  4. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  5. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  6. Heller, Toby; Hoffberg, Steven M., Agent training sensitive call routing system.
  7. Hoffberg, Steven, Agent training sensitive call routing system.
  8. Hoffberg, Steven M., Agent training sensitive call routing system.
  9. Dorwin, David Kimbal; Colwell, Aaron James; Scherkus, Andrew Martin; Galligan, Francis, Allowing degraded play of protected content using scalable codecs when key/license is not obtained.
  10. Jones,Brian; Sawicki,Marcin; Little,Robert; Snyder,Daniel; Treacy,Ambrose, Anti-virus security information in an extensible markup language document.
  11. Katz, Donald R.; Lau, Edwin J.; Mott, Timothy; Brenneman, Scott A.; Jun, Benjamin Che-Ming; Pai, Samuel Hong-Yen, Apparatus and method for authoring and maintaining a library of content and targeting content to a playback device.
  12. Jenkins, IV, Jesse H., Apparatus and method for automatic self-erasing of programmable logic devices.
  13. Proudler,Graeme John; Balacheff,Boris; Plaquin,David, Apparatus and method for creating a trusted environment.
  14. Proudler,Graeme John; Balacheff,Boris; Worley,John S.; Hyser,Chris D.; Worley, Jr.,William S, Apparatus and method for creating a trusted environment.
  15. Mattox,Mark D.; Wasilewski,Anthony J., Apparatus for encryption key management.
  16. Kollmyer,Brad; Baker,Brian; Shapiro,Eric; Kollmyer,Aric; Rutman,Mike; MacLean,Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Apparatus, system and method for selectively encrypting different portions of data sent over a network.
  17. Ben-Itzhak, Yuval, Application layer security method and system.
  18. Reynar, Jeff; Wang, Ziyi; Wolff, Roger; Huynh, Tuan; Higashiyama, Nobuya; Ammerlaan, Michael, Application program interfaces for semantically labeling strings and providing actions based on semantically labeled strings.
  19. Dorwin, David Kimbal, Application-driven playback of offline encrypted content with unaware DRM module.
  20. Dorwin, David Kimbal, Application-driven playback of offline encrypted content with unaware DRM module.
  21. Ben Itzhak,Yuval, Application-layer security method and system.
  22. Narin, Attila; DeMello, Marco A.; Yaacovi, Yoram; Alger, Jeffrey A.; Keely, Leroy B.; Silver, David Michael; Madonna, Christopher Robert Richard; Beezer, John; Hughes, Kathryn E., Architecture for an electronic shopping service integratable with a software application.
  23. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Malik,Prashant; Hughes,Kathryn E.; Byrum,Frank D., Asynchronous communication within a server arrangement.
  24. Lampson,Butler W.; DeTreville,John D.; England,Paul, Attesting to a value of a register and/or memory region.
  25. Walter, Edward, Audio receiver modular card and method thereof.
  26. Mazzagatte, Craig; Slick, Royce E.; Iwamoto, Neil, Authenticated secure printing.
  27. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Mangione-Smith, William H.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Authorization for media content alteration.
  28. Chang, Lawrence Wen-Hao; Subramanian, Ananthan, Authorizing administrative operations using a split knowledge protocol.
  29. Williams, Brian R; Rubens, Matthew J; Bibireata, Daniel; Narang, Varun; Siegel, Hilliard B, Automated monitoring and control of access to content from a source.
  30. Kao, Anne S-W; Poteet, Stephen R.; Multari, Nicholas J., Automated rule generation for a secure downgrader.
  31. John W. L. Ogilvie, Automatic broker tools and techniques.
  32. Ogilvie, John W. L., Automatic broker tools and techniques.
  33. Kortum, Philip Ted; Sullivan, Marc Andrew, Automatic switching between high definition and standard definition IP television signals.
  34. Chang, Steven, Background encryption of disks in a large cluster.
  35. Musgrave Clyde, Biometric watermarks.
  36. Princen, John; Srinivasan, Pramila; Anderson, Craig Steven, Block-based media content authentication.
  37. Lampson, Butler W.; DeTreville, John D.; England, Paul, Boot blocks for software.
  38. Vannier, Eric; Dorwin, David Kimbal, Browser/web apps access to secure surface.
  39. Mai Chao C. ; Scherpenberg Francis A. ; Hui Titkuan ; Mendenhall Wayne, Card cradle system and method.
  40. Chowdhary, Yousuf; Brunet, Jeffrey; Collins, Ian, Centralized rules repository for smart phone customer care.
  41. Srinivasan, Pramila; Princen, John, Certificate verification.
  42. England, Paul, Client-side boot domains and boot rules.
  43. England, Paul, Client-side boot domains and boot rules.
  44. England,Paul, Client-side boot domains and boot rules.
  45. Ishii, Hiroshi; Bojinov, Hristo; Subramanian, Ananthan, Cluster key synchronization.
  46. Abrutyn, Scott D.; Bernardi, Linda; Douglas, David C.; Hatanaka, Iwao; Traub, Kenneth R., Communicating data from a data producer to a data receiver.
  47. Chang, William Ho; Viswanathan, Vinaynathan, Communication device or media device for providing phone calling service, internet access service, or digital content service.
  48. Baena-Arnaiz Marco T. ; Church Benjamin T. ; Kirchoff Michael J. ; Seshadri Harish, Computer implemented method and a computer system for enforcing software licenses.
  49. Witt Don Earl ; Lynn James T., Computer network protection using cryptographic sealing software agents and objects.
  50. Alisuag,Cora, Computer oriented record administration system.
  51. Pearson,Siani Lynne; Chan,David, Computer platforms and their methods of operation.
  52. Birger, Chet; Douglas, David C.; Rosenthal, Steven; Traub, Kenneth R., Computer system for authenticating a computing device.
  53. Benson Glenn,DEX, Computer system for protecting a file and a method for protecting a file.
  54. Genevois, Christophe, Conditional access network.
  55. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Conditionally intercepting data indicating one or more aspects of a communiqué to obfuscate the one or more aspects of the communiqué.
  56. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiqués addressed to the one or more secret entities.
  57. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects.
  58. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects.
  59. Hannigan, Brett T.; McKinley, Tyler J., Content identification and electronic tickets, coupons and credits.
  60. Hannigan, Brett T.; McKinley, Tyler J., Content identification and electronic tickets, coupons and credits.
  61. Pestoni,Florian; Naor,Dalit, Content insurance.
  62. Saxena, Ashutosh; Ponnapalli, Harigopal K. B., Content licensing and conditional access using a mobile device.
  63. Wang, Frank; Evins, Richard A.; Kelly, Dennis, Content management and sharing.
  64. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, Jon D., Content replacement by PID mapping.
  65. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, Jon D., Content replacement by PID mapping.
  66. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, Jon D., Content replacement by PID mapping.
  67. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, Jon D., Content replacement by PID mapping.
  68. Bonan, James; Candelore, Brant L.; Eyer, Mark Kenneth, Content scrambling with minimal impact on legacy devices.
  69. Hamada,Shinichiro; Seki,Toshibumi, Contents distribution system for handling secondary products utilizing raw material contents.
  70. Hamada,Shinichiro; Seki,Toshibumi, Contents distribution system for handling secondary products utilizing raw material contents.
  71. Wasilewski, Anthony J., Control of enhanced application features via a conditional access system.
  72. England, Paul; DeTreville, John D.; Lampson, Butler W., Controlling access to content based on certificates and access predicates.
  73. Goger,Karl, Controlling access to electronic documents.
  74. Baird,Roger T.; Baird,Jeffrey C.; Blair,Timothy P., Controlling the distribution of information.
  75. Drew,Jeffrey M.; Selinfreund,Richard H.; Goyette,Donald R.; Vig,Rakesh, Copy-protected optical media and method of manufacture thereof.
  76. Selinfreund, Richard H.; Drew, Jeffrey M.; Vig, Rakesh, Copy-protected optical media and method of manufacture thereof.
  77. Selinfreund, Richard H.; Drew, Jeffrey M.; Vig, Rakesh; Goyette, Donald R., Copy-protected optical media and method of manufacture thereof.
  78. Dorwin, David Kimbal, DRM provider interoperability.
  79. Sturtevant, Daniel Joseph; Lalancette, Christopher, Data access control systems and methods.
  80. Sturtevant, Daniel Joseph; Lalancette, Christopher; Lack, Michael Nathan; Schneck, Paul B., Data access control systems and methods.
  81. Sturtevant, Daniel Joseph; Lalancette, Christopher; Lack, Michael Nathan; Schneck, Paul B., Data access control systems and methods.
  82. Sturtevant, Daniel Joseph; Lalancette, Christopher; Lack, Michael Nathan; Schneck, Paul B., Data access control systems and methods.
  83. Yanagi,Masae, Data managing method, data managing system, data managing apparatus, data handling apparatus, computer program, and recording medium.
  84. Yanagi,Masae, Data managing method, data managing system, data managing apparatus, data handling apparatus, computer program, and recording medium.
  85. Tanaka, Hirotomo, Data processing apparatus for producing print job data whose authority is managed by external server, and image processing apparatus for printing a print job whose authority is managed by external server.
  86. Ito Seigo,JPX ; Ishibashi Yasuhiro,JPX ; Sato Fumitaka,JPX, Data recording/reproducing apparatus, data recording/reproducing method applied to the apparatus, and computer program product used in data processing apparatus.
  87. Seigo Ito JP; Yasuhiro Ishibashi JP; Fumitaka Sato JP, Data recording/reproducing apparatus, data recording/reproducing method applied to the apparatus, and computer program product used in data processing apparatus.
  88. Redlich, Ron M.; Nemzow, Martin A., Data security system and method.
  89. Redlich, Ron M.; Nemzow, Martin A., Data security system and method.
  90. Redlich, Ron M.; Nemzow, Martin A., Data security system and method.
  91. Redlich,Ron M.; Nemzow,Martin A., Data security system and method.
  92. Redlich,Ron M.; Nemzow,Martin A., Data security system and method adjunct to e-mail, browser or telecom program.
  93. Redlich,Ron M.; Nemzow,Martin A., Data security system and method associated with data mining.
  94. Redlich,Ron M.; Nemzow,Martin A., Data security system and method for portable device.
  95. Redlich,Ron M.; Nemzow,Martin A., Data security system and method for separation of user communities.
  96. Redlich,Ron M.; Nemzow,Martin A., Data security system and method responsive to electronic attacks.
  97. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with adaptive filter.
  98. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with editor.
  99. Redlich, Ron M.; Nemzow, Martin A., Data security system and method with multiple independent levels of security.
  100. Redlich,Ron M.; Nemzow,Martin A., Data security system and method with parsing and dispersion techniques.
  101. Redlich, Ron M.; Nemzow, Martin A., Data security system and with territorial, geographic and triggering event protocol.
  102. Dahl, Ulf, Data security system for a database.
  103. Dahl Ulf, Data security system for a database having multiple encryption levels applicable on a data element value level.
  104. Hulst, Hermen-ard; Racz, Patrick, Data storage and access systems.
  105. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  106. Racz, Patrick; Hulst, Hermen-ard, Data storage and access systems.
  107. Racz, Patrick; Hulst, Hermen-ard, Data storage and access systems.
  108. Racz, Patrick; Hulst, Hermen-ard, Data storage and access systems.
  109. Ryal, Kim Annon, Decryption system.
  110. Yen, Wei; Princen, John; Lo, Raymond; Srinivasan, Pramila, Delivery of license information using a short messaging system protocol in a closed content distribution system.
  111. Dalton, Christopher I., Demonstrating integrity of a compartment of a compartmented operating system.
  112. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  113. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  114. Dorwin, David Kimbal; Scherkus, Andrew Martin, Detecting supported digital rights management configurations on a client device.
  115. Rabin,Michael O.; Shasha,Dennis E.; Bosley,Carleton J.; Caceres,Ramon; Ingram,Aaron; Karia,Timir; Molnar,David; Beinart,Yossi, Detection and identification methods for software.
  116. Kapadekar, Vivek; Rao, Bindu Rama, Device management in a network.
  117. Kortum, Philip Ted; Sullivan, Marc Andrew; Brandt, Jeffrey Lewis, Device, system, and method for managing television tuners.
  118. Kortum, Philip Ted; Sullivan, Marc Andrew; Brandt, Jeffrey Lewis, Device, system, and method for managing television tuners.
  119. Cho, Young Soon; Kang, Myeong Joon; Kim, Jae Young; Jung, Han, Digital content decrypting apparatus and operating method thereof.
  120. Cho, Young Soon; Kang, Myeong Joon; Kim, Jae Young; Jung, Han, Digital content decrypting apparatus and operating method thereof.
  121. Cho, Young Soon; Kang, Myeong Joon; Kim, Jae Young; Jung, Han, Digital content decrypting apparatus and operating method thereof.
  122. Cho, Young-Soon; Kang, Myeong-Joon; Kim, Jae-Young; Jung, Han, Digital content decrypting apparatus and operating method thereof.
  123. Cho, Young Soon; Kang, Myeong Joon; Kim, Jae Young; Jung, Han, Digital content encrypting apparatus and operating method thereof.
  124. Cho, Young Soon; Kang, Myeong Joon; Kim, Jae Young; Jung, Han, Digital content encrypting apparatus and operating method thereof.
  125. Cho, Young Soon; Kang, Myeong Joon; Kim, Jae Young; Jung, Han, Digital content encrypting apparatus and operating method thereof.
  126. Cho, Young-Soon; Kang, Myeong-Joon; Kim, Jae-Young; Jung, Han, Digital content encrypting apparatus and operating method thereof.
  127. Chang, William Ho; Liu, Christina Ying, Digital content services or stores over the internet that transmit or stream protected or encrypted digital content to connected devices and applications that access the digital content services or stores.
  128. Cho, Young-Soon; Kang, Myeong-Joon; Kim, Jae-Young; Jung, Han, Digital data file encryption apparatus and method.
  129. Cho, Young-Soon; Kang, Myeong-Joon; Kim, Jae-Young; Jung, Han, Digital data file encryption apparatus and method.
  130. Cho,Young Soon; Kang,Myeong Joon; Kim,Jae Young; Jung,Han, Digital data file encryption apparatus and method.
  131. Cho, Young-Soon; Kim, Jae-Young; Jung, Han, Digital data file management method and recording medium for recording digital data file management program thereon.
  132. Redlich, Ron M.; Nemzow, Martin A., Digital information infrastructure and method for security designated data and with granular data stores.
  133. Redlich, Ron M.; Nemzow, Martin A., Digital information infrastructure and method for security designated data and with granular data stores.
  134. Koppen, Eckhart; Vataja, Timo; Kivimaki, Simo, Digital rights management (DRM) license manager.
  135. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  136. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  137. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  138. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  139. England Paul ; DeTreville John D. ; Lampson Butler W., Digital rights management operating system.
  140. Brundage,Trent J.; Rodriguez,Tony F.; Hannigan,Brett T., Digital watermarking apparatus and methods.
  141. Rhoads,Geoffrey B.; Brundage,Trent J.; Rodreguez,Tony F.; Hannigan,Brett T.; Ellingson,Eric E., Digital watermarking apparatus and methods.
  142. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  143. Carter,Stephen R, Distributed dynamic security for document collaboration.
  144. Sussland, Robert J.; Silberman, Joshua Oran; Subramanian, Ananthan; Chang, Lawrence Wen-Hao, Distributed management of crypto module white lists.
  145. Barrus, John W.; Wolff, Gregory J.; Piersol, Kurt Wesley; Rhodes, Bradly; Savitzky, Stephen R., Document collection manipulation.
  146. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  147. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  148. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  149. Dozier, Linda T.; Fish, Edmund J.; Gilburne, Miles R.; Zolt, Nina, Dynamic characterization of nodes in a semantic network for desired functions such as search, discovery, matching, content delivery, and synchronization of activity and information.
  150. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  151. Dorwin, David Kimbal, Dynamically changing stream quality of protected content based on a determined change in a platform trust.
  152. Dorwin, David Kimbal, Dynamically changing stream quality when user is unlikely to notice to conserve resources.
  153. Redlich, Ron M.; Nemzow, Martin A., Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor.
  154. Hendricks,John S.; Asmussen,Michael L.; McCoskey,John S., Electronic Book having electronic commerce features.
  155. Hendricks, John S.; Asmussen, Michael L.; McCoskey, John S., Electronic book alternative delivery systems.
  156. Hendricks, John S.; McCoskey, John S.; Asmussen, Michael L., Electronic book connection to world watch live.
  157. Hendricks,John S.; Asmussen,Michael L., Electronic book electronic links.
  158. Hendricks, John S.; Asmussen, Michael L.; McCoskey, John S., Electronic book having electronic commerce features.
  159. Hendricks, John S., Electronic book library/bookstore system.
  160. Hendricks,John S., Electronic book secure communication with home subsystem.
  161. Hendricks,John S., Electronic book selection and delivery system having encryption and security features.
  162. Hendricks, John S.; Asmussen, Michael L., Electronic book with restricted access features.
  163. Hendricks, John S.; Asmussen, Michael L., Electronic book with voice emulation features.
  164. Hendricks, John S.; Asmussen, Michael L., Electronic book with voice emulation features.
  165. Geoffrey, Mohammed Alawi, Electronic certification and authentication system.
  166. Dube,Roger R., Electronic file protection using location.
  167. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution system.
  168. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution system.
  169. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution system.
  170. Manning,Damian Franken; Lowy,Jon Walter, Electronic media distribution system.
  171. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution systems.
  172. Wong,Eric; Nishanova,Anzhelika Y., Electronic software license with software product installer identifier.
  173. Plotkin, Serge; Avida, Dan, Encryption based security system for network storage.
  174. Plotkin, Serge; Avida, Dan, Encryption based security system for network storage.
  175. Pride, Edward; Daniel, Vicki; Feduff, Daniel Stephen; Gigliotti, Travis, End-to-end licensing of digital media assets.
  176. Janky, James M.; Schulhof, Nathan, Enhanced delivery of audio data for portable playback.
  177. Harris, Scott C., Enhancing touch and feel on the Internet.
  178. Harris, Scott C, Enhancing touch and feel on the internet.
  179. Harris, Scott C, Enhancing touch and feel on the internet.
  180. Harris, Scott C, Enhancing touch and feel on the internet.
  181. Harris, Scott C., Enhancing touch and feel on the internet.
  182. Harris,Scott C., Enhancing touch and feel on the internet.
  183. Princen, John; Srinivasan, Pramila; Blythe, David; Yen, Wei, Ensuring authenticity in a closed content distribution system.
  184. Princen, John; Srinivasan, Pramila; Blythe, David; Yen, Wei, Ensuring authenticity in a closed content distribution system.
  185. Princen, John; Srinivasan, Pramila; Blythe, David; Yen, Wei, Ensuring authenticity in a closed content distribution system.
  186. Grim, III, Clifton E.; Schmidt, Christopher I.; Wilson, John D., Escrowing digital property in a secure information vault.
  187. Grim, III, Clifton E.; Schmidt, Christopher I.; Wilson, John D., Escrowing digital property in a secure information vault.
  188. Chang, William Ho; Liu, Christina Ying, Essential components for enabling a pervasive wireless digital ecosystem and wireless devices that support the wireless digital ecosystem.
  189. Dorwin, David Kimbal, Extending browser functionality with dynamic on-the-fly downloading of untrusted browser components.
  190. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  191. Fung, Joseph Zhung Yee; Chancellor, Robert; DeMartini, Thomas; Nguyen, Mai; Ta, Thanh; Tieu, Vincent Hsiang; Tran, Duc; Valenzuela, Edgardo, Extensible rights expression processing system.
  192. Paulsen, Craig A.; Nguyen, Binh T., Gaming system and gaming method.
  193. England, Paul; Peinado, Marcus, Generating, migrating or exporting bound keys.
  194. Tang, Yuchun; He, Yuanchen, Granular support vector machine with random granularity.
  195. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  196. Chang,Hoi; Atallah,Mikhail J.; Rice,John R., Guards for application in software tamperproofing.
  197. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  198. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  199. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  200. Gandhasri, Rajamohan, Host based rekeying.
  201. Rossmann, Alain, Hybrid systems for securing digital assets.
  202. Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D., Image anonymization.
  203. Oshima, Keita, Image forming apparatus for permitting image formation in accordance with image attribute, and control method therefor.
  204. Oishi,Kazuomi, Image input apparatus, image input method, recording medium, and encryption processing program stored in computer-readable medium.
  205. Sitrick, David H., Image integration, mapping and linking system and methodology.
  206. Sitrick, David H., Image integration, mapping and linking system and methodology.
  207. Sitrick, David H., Image integration, mapping and linking system and methodology.
  208. Brundage, Trent J.; Rodriguez, Tony F.; Hannigan, Brett T., Image or video display devices.
  209. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Mangione-Smith, William H.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Implementation of media content alteration.
  210. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Implementing audio substitution options in media works.
  211. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Implementing group content substitution in media works.
  212. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Implementing group content substitution in media works.
  213. Nakamura, Hideo; Ono, Shoji; Furuhata, Tadashi, Information distribution system, service-providing method for an information distribution system, and a program for the same.
  214. Nakamura, Hideo; Ono, Shoji; Furuhata, Tadashi, Information distribution system, service-providing method for an information distribution system, and a program for the same.
  215. Nakamura, Hideo; Ono, Shoji; Furuhata, Tadashi; Nishimura, Nobuhiko, Information distribution system, service-providing method for an information distribution system, and a program for the same.
  216. Redlich, Ron M.; Nemzow, Martin A., Information infrastructure management tools with extractor, secure storage, content analysis and classification and method therefor.
  217. Furuya, Tomoyuki, Information processing apparatus and data management system.
  218. Kuriya, Shinobu; Kurihara, Akira, Information providing apparatus and method, information processing apparatus and method, program storage medium, program, and information providing system.
  219. Kuriya, Shinobu; Kurihara, Akira, Information providing apparatus and method, information processing apparatus and method, program storage medium, program, and information providing system.
  220. Kuriya,Shinobu; Kurihara,Akira, Information providing apparatus and method, information processing apparatus and method, program storage medium, program, and information providing system.
  221. Felsher, David Paul, Information record infrastructure, system and method.
  222. Kuroda,Kazuo; Moriyama,Yoshiaki, Information recording medium having reproduction control program recorded thereon and reproduction control program.
  223. Giroux, David; Sharko, John, Information security architecture for encrypting documents for remote access while maintaining access control.
  224. Pensak David A. ; Cristy John J. ; Singles Steven J., Information security architecture for encrypting documents for remote access while maintaining access control.
  225. Rogers,Allen; Hadden,Allen Douglas; Norman,Timothy Neil, Information security architecture for remote access control using non-bidirectional protocols.
  226. Proudler, Graeme John, Information security system.
  227. Proudler, Graeme John; Balacheff, Boris, Information system.
  228. Ogino, Akira; Kimura, Yuji; Ezaki, Tadashi; Kori, Teruhiko, Information-signal playback system, information-signal reading apparatus, information-signal processing apparatus, information-signal playback method, information-signal reading method and information-signal processing apparatus.
  229. Chen, Shao-Chun; O'Neill, Patrick; Sotos, Peter L.; Lim, Jeong M.; Jacobi, Sidney Andrew, Initialization and update of software and/or firmware in electronic devices.
  230. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  231. Dey, Aparna, Intellectual property library management system.
  232. Wu, Wai; Heller, Toby; Hoffberg, Steven M., Intelligent communication routing.
  233. Wu, Wai; Heller, Toby; Hoffberg, Steven M., Intelligent communication routing.
  234. Wu, Wai; Hoffberg, Steven M., Intelligent communication routing system and method.
  235. Wu, Wai; Hoffberg, Steven M., Intelligent communication routing system and method.
  236. DeMello, Marco A.; Zeman, Pavel; Krishnaswamy, Vinay; Byrum, Frank D., Inter-server communication using request with encrypted parameter.
  237. Hendricks, John S.; Asmussen, Michael L., Interactive electronic book.
  238. Chang, William Ho; Liu, Christina Ying, Internet applications and services for rendering digital content.
  239. Chang, William Ho; Liu, Christina Ying, Internet based digital content services that provide content upload, content storage, content sharing, content playlist selection, content editing, or content download; and smart phones, information pads, smart televisions and printers with access to the internet based digital content services.
  240. Chen,Paul; Purpura,Don Francis; Page,Martin Ervin; Shoa,Katayoun; Lee,Hye Sook Kim; Tanaka,Yokichi Joe, Internet printing by hotel guests.
  241. Chang, William Ho; Liu, Christina Ying, Internet-pad specification, the internet-pad specification may include a touch sensitive screen, a digital camera, a document application, an e-mail application, icons over the touch sensitive screen for user selection, a wireless communication unit for wireless connectivity, a digital content application for playing digital content, and an operating system supporting application programming interface (API).
  242. Chang, William Ho; Liu, Christina Ying, Internet-pads that include a digital camera, a touch sensitive screen interface, and support for voice activated commands.
  243. Chang, William Ho; Liu, Christina Ying, Internet-phone or smart phone with applications for managing and playing digital content, and a mobile device operating system supporting application programming interface.
  244. Magdych,James S.; Rahmanovic,Tarik; McDonald,John R.; Tellier,Brock E., Intrusion detection and vulnerability assessment system, method and computer program product.
  245. Medvinsky, Alexander, Intrusion detection for object security.
  246. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  247. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  248. Epstein,Michael A., Key distribution via a memory device.
  249. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  250. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  251. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  252. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  253. Hillegass,James C.; Deng,Yaobing; Eastom,Mark; Fritz,Richard R.; Gateley,John C.; Grinsfelder,James A.; Grove,Stephen A.; Hockett,Eric Steven; Sokratov,Nikolay G.; Swanson,James G.; Thompson,John S.;, Licensed digital material distribution system and method.
  254. Taboada, Roberto C.; Bailey, Eric D., Lightweight reference user interface.
  255. Wang-Aryattanwanich, Thiti; Bailey, Eric D.; Burukhin, Anatoliy; Pratley, Christopher; Taboada, Roberto C.; Voora, Srinivas, Lightweight reference user interface.
  256. Jones, Brian; Sawicki, Marcin, Linking elements of a document to corresponding fields, queries and/or procedures in a database.
  257. England Paul ; DeTreville John D. ; Lampson Butler W., Loading and identifying a digital rights management operating system.
  258. Plotkin, Serge; Bojinov, Hristo Iankov; Brown, Kevin, Management of the retention and/or discarding of stored data.
  259. Kim, Hyung Sun; Kim, Byuong Jin, Managing copy protecting information of encrypted data.
  260. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  261. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  262. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  263. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  264. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  265. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  266. Astigarraga, Tara L.; Baran, Evren O.; Browne, Michael E.; DeRobertis, Christopher V.; Venkatraman, Ashwin, Mapping encrypted and decrypted data via key management system.
  267. Jones, Brian; Little, Robert; Reynar, Jeff; Broman, Paul, Mechanism for downloading software components from a remote source for use by a local software application.
  268. Reynar,Jeff; Broman,Paul; Jones,Brian; Little,Robert, Mechanism for downloading software components from a remote source for use by a local software application.
  269. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Mangione-Smith, William H.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Media markup system for content alteration in derivative works.
  270. Rassool,Reza; Worzel,William P.; Baker,Brian, Media tracking system and method.
  271. Chang, William Ho; Viswanathan, Vinaynathan, Memory controller that includes support for autorun of software or data.
  272. Judge, Paul; Rajan, Guru; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Message profiling systems and methods.
  273. Hind, John R.; Peters, Marcia L., Method and an apparatus for detecting a need for security and invoking a secured presentation of data.
  274. DeTreville, John, Method and apparatus for authenticating an open system application to a portable IC device.
  275. DeTreville,John, Method and apparatus for authenticating an open system application to a portable IC device.
  276. DeTreville,John D., Method and apparatus for authenticating an open system application to a portable IC device.
  277. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  278. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for client customization by executing software parts on plural servers.
  279. Barrus, John; Wolff, Gregory; Elliott, Ame; McCall, Kim; Rhodes, Bradley; Savitzky, Stephen, Method and apparatus for composing multimedia documents.
  280. Selinfreund, Richard H.; Goyette, Donald Roland; Drew, Jeffrey M.; Vig, Rakesh, Method and apparatus for controlling access to storage media.
  281. Selinfreund,Richard H.; Goyette,Donald Roland; Drew,Jeffrey M.; Vig,Rakesh, Method and apparatus for controlling access to storage media.
  282. Gilchrist, Gary; Viswanathan, Sangameswaran, Method and apparatus for digital rights management policies.
  283. Wang, Xin; Tadayon, Bijan; DeMartini, Thomas; Raley, Michael; Lao, Guillermo; Chen, Eddie J.; Gilliam, Charles P., Method and apparatus for distributing enforceable property rights.
  284. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  285. Gollapudi, Sreenivas, Method and apparatus for document clustering and document sketching.
  286. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  287. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  288. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  289. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  290. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  291. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  292. Warnock, Christopher M; Holzgrafe, Richard M; Santos, Tom J; Nolan, Jay C, Method and apparatus for improved information transactions.
  293. Warnock, Christopher M; Holzgrafe, Richard M; Santos, Tom J; Nolan, Jay C; Abrams, Ken, Method and apparatus for improved information transactions.
  294. Warnock, Christopher; Abrams, Ken; Holzgrafe, Rick, Method and apparatus for improved information transactions.
  295. Greaves Thomas W. ; Milewski Richard A. ; Schade Fred B. ; Moore David R. ; Law Timothy G., Method and apparatus for master-slave control in a educational classroom communication network.
  296. Sussland, Robert; Chang, Lawrence; Subramanian, Ananthan; Silberman, Joshua, Method and apparatus for offline cryptographic key establishment.
  297. Farrugia, Augustin J.; Robbin, Jeffrey; Mitsuji, Hiro; Despotovic, Mihailo; Meldrum, Colin, Method and apparatus for on demand video and other content rental.
  298. Herley, Cormac; Xu, Yihong, Method and apparatus for partial encryption of content.
  299. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  300. Mattison, Phillip E., Method and apparatus for protecting flash memory.
  301. Rabin, Michael O.; Shasha, Dennis E., Method and apparatus for protecting information and privacy.
  302. Rabin, Michael O.; Shasha, Dennis E.; Beinart, Yossi; Caceres, Ramon; Karia, Timir; Molnar, David; Rolinson, Sean, Method and apparatus for protecting information and privacy.
  303. Rabin, Michael O.; Shasha, Dennis E.; Beinart, Yossi; Caceres, Ramon; Karia, Timir; Molnar, David; Rolinson, Sean, Method and apparatus for protecting information and privacy.
  304. Rabin,Michael O.; Shasha,Dennis E.; Beinart,Yossi; Caceres,Ramon; Karia,Timir; Molnar,David; Rolinson,Sean, Method and apparatus for protecting information and privacy.
  305. Koelle,Katharina Veronika; Worzel,William P., Method and apparatus for protection of electronic media.
  306. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  307. Lerner, Solomon Z., Method and apparatus for responding to a query at a dialog system.
  308. Peter Wheeler CA, Method and apparatus for restricting privilege access to distributed content information.
  309. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  310. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  311. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  312. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  313. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  314. Dinwiddie, Aaron Hal; Lynch, David Johnston, Method and apparatus for using a single password set in an integrated television system.
  315. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  316. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  317. Mori Robert F., Method and apparatus for visually indicating status of a dataset when presenting portions of the dataset.
  318. Rossmann,Alain; Zuili,Patrick; Ouya,Michael Michio; Humpich,Serge; Lee,Chang Ping; Vainstein,Klimenty; Hilderbrand,Hal; Garcia,Denis Jacques Paul; Supramaniam,Senthilvasan; Huang,Weiqing; Ryan,Nicholas Michael, Method and architecture for providing pervasive security to digital assets.
  319. Kortum, Philip Ted; Sullivan, Marc Andrew; Cansler, Jr., James L.; Williams, Alyssa Lenorah Noll, Method and interface for video content acquisition security on a set-top box.
  320. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  321. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  322. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  323. Reynar, Jeff, Method and system for applying input mode bias.
  324. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  325. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  326. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  327. Morrison,Michael C., Method and system for conducting a transaction over a network.
  328. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  329. Reynar, Jeff; Hunt, Lee C.; Ammerlaan, Michael, Method and system for defining semantic categories and actions.
  330. Dozier, Linda; Fish, Edmund J.; Gilburne, Miles R.; Zolt, Nina, Method and system for developing process, project or problem-based learning systems within a semantic collaborative social network.
  331. Roegner, Michael W., Method and system for dynamically implementing an enterprise resource policy.
  332. Vacanti,Daniel S.; Geddes,Martin; Conley,Todd M.; Anderson,David J.; Lowrey,Neil E., Method and system for dynamically varying intermediation functions in a communication path between a content server and a client station.
  333. Vacanti, Daniel S.; Conley, Todd M.; Geddes, Martin; Anderson, David J., Method and system for embellishing web content during transmission between a content server and a client station.
  334. Nath, Satyajit, Method and system for enabling users of a group shared across multiple file security systems to access secured files.
  335. Morten,Glenn A.; Rassool,Reza P.; Claeys,Tom E.; Baker,Brian Andrew, Method and system for end to end securing of content for video on demand.
  336. Raanan Gil,ILX ; Moran Tal,ILX ; Galant Yoron ; El-Hanani Yuval,ILX ; Reshef Eran, Method and system for extracting application protocol characteristics.
  337. Raanan, Gil; Moran, Tal; Galant, Yaron; El-Hanani, Yuval; Reshef, Eran, Method and system for extracting application protocol characteristics.
  338. Mithal, Ashish K.; Tayebi, Amad, Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof.
  339. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  340. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  341. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  342. Geddes, Martin; Vacanti, Daniel S.; Conley, Todd M.; Anderson, David J.; Lowrey, Neil E., Method and system for inserting web content through intermediation between a content server and a client station.
  343. Irving, John; Bursztein, Marcello; Mulligan, Steve; Lajeunesse, Patrick; Killeen, Pierre, Method and system for interactive, multi-user electronic data transmission in a multi-level monitored and filtered system.
  344. Shuster, Gary Stephen, Method and system for licensing a copy of a copyright protected work.
  345. Hillegass,James C.; Deng,Yaobing; Eastom,Mark; Fritz,Richard R.; Gateley,John C.; Grinsfelder,James A.; Grove,Stephen A.; Hockett,Eric Steven; Sokratov,Nikolay G.; Swanson,James G.; Thomson,John S.; , Method and system for licensing digital works.
  346. DeMello, Marco A.; Yaacovi, Yoram; Zeman, Pavel, Method and system for limiting the use of user-specific software features.
  347. DeMello,Marco A.; Yaacovi,Yoram; Zeman,Pavel; Hughes,Kathryn E.; Byrum,Frank D., Method and system for limiting the use of user-specific software features.
  348. Ulvenes, Randy, Method and system for managing payment for web content based on size of the web content.
  349. Meyers, Stephan, Method and system for managing rights in digital information over a network.
  350. Meyers,Stephan, Method and system for managing rights in digital information over a network.
  351. Vainstein, Klimenty, Method and system for managing security tiers.
  352. Wu, Wai; Heller, Toby; Hoffberg, Steven M., Method and system for matching entities in an auction.
  353. Wu, Wai; Hoffberg, Steven M., Method and system for matching entities in an auction.
  354. Wu, Wai; Hoffberg, Steven M., Method and system for matching entities in an auction.
  355. Irving, John; Bursztein, Marcello; Mulligan, Steve; Lajeunesse, Patrick, Method and system for monitoring and filtering data transmission.
  356. Tran, Dang; Gava, Fabio; Zhu, Yingnan; Shelansky, Andrew; Lovelace, Michael; Zheng, Esther, Method and system for multi-user, multi-device login and content access control and metering and blocking.
  357. Cromer,Daryl Carvis; Jankowsky,Joshua James; Locker,Howard Jeffrey; Trotte,Andy Lloyd; Ward,James Peter, Method and system for preboot user authentication.
  358. Mattsson, Ulf, Method and system for preventing impersonation of a computer system user.
  359. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  360. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  361. Reshef Eran,ILX ; Raanan Gil,ILX ; Solan Eilon,ILX, Method and system for protecting operations of trusted internal networks.
  362. Nath, Satyajit, Method and system for providing document retention using cryptography.
  363. Nath, Satyajit, Method and system for providing document retention using cryptography.
  364. Reynar,Jeff, Method and system for providing electronic commerce actions based on semantically labeled strings.
  365. Reynar, Jeff; Wang, Ziyi; Ammerlaan, Michael, Method and system for providing restricted actions for recognized semantic categories.
  366. Morten, Glenn A.; Palmer, Tomás E.; MacLean, Charles D., Method and system for providing secure CODECS.
  367. Shelansky, Andrew R.; Tran, Dang Van; Gava, Fabio, Method and system for providing users login access to multiple devices via a communication system.
  368. Zhuk, Oscar V.; Rohr, Vince M., Method and system for real-time tamper evidence gathering for software.
  369. Nagai,Riko; Maeda,Yoshiaki; Inomata,Toshihiro; Kondo,Takashi, Method and system for restricting content redistribution.
  370. Rice, John R.; Atallah, Mikhail J., Method and system for secure computational outsourcing and disguise.
  371. Rice, John R.; Atallah, Mikhail J., Method and system for secure computational outsourcing and disguise.
  372. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  373. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  374. Roegner, Michael W., Method and system for selecting advertisements to be presented to a viewer.
  375. Roegner, Michael W., Method and system for selecting content items to be presented to a viewer.
  376. Wolff, Roger; Huynh, Tuan; Higashiyama, Nobuya; Wang, Ziyi; Reynar, Jeff; Ammerlaan, Michael, Method and system for semantically labeling strings and providing actions based on semantically labeled strings.
  377. Rosenberg,Greg, Method and system for signing and authenticating electronic documents.
  378. Lao, Guillermo, Method and system for subscription digital rights management.
  379. Lao, Guillermo, Method and system for subscription digital rights management.
  380. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  381. Atallah, Mikhail J.; Chang, Hoi, Method and system for tamperproofing software.
  382. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  383. Redlich, Ron M.; Nemzow, Martin A., Method and system of quantifying risk.
  384. Ta, Thanh; Nguyen, Mai; Chen, Eddie J.; Wang, Xin; Demartini, Thomas, Method and system to support dynamic rights and resources sharing.
  385. Tayebi,Amad; Mithal,Ashish K., Method for allowing a customer to preview, acquire and/or pay for information and a system therefor.
  386. DeMello,Marco A.; Narin,Attila; Yaacovi,Yoram, Method for authenticating and securing integrated bookstore entries.
  387. Gunter, Carl A.; Remaley, Thomas J.; Ruggieri, David J., Method for automatically generating list of meeting participants and delegation permission.
  388. Gorman, Michael; Iaquinto, Jr., Gregory, Method for building and maintaining trusted supplier records.
  389. Gorman, Michael; Iaquinto, Jr., Gregory, Method for building and maintaining trusted supplier records.
  390. Fulton, Nicholas; Butler, James Matthew; Curtis, Mark Anthony; Parrott, David; Whitehead, Miles Jonathan; Wu, Hui, Method for certifying and verifying digital web content using public cryptography.
  391. Koelle, Katharina Veronika; Midwinter, Wendy, Method for evolving detectors to detect malign behavior in an artificial immune system.
  392. Koelle, Katharina Veronika; Midwinter, Wendy, Method for evolving detectors to detect malign behavior in an artificial immune system.
  393. Wettergren,Christian, Method for executing a security critical activity.
  394. Foth, Thomas J.; Romansky, Brian M., Method for facilitating a transaction between a merchant and a buyer.
  395. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  396. Chang, William Ho, Method for internet access and for communication.
  397. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  398. Naccache,David; Rousseau,Ludovic; Girard,Pierre, Method for monitoring program flow to verify execution of proper instructions by a processor.
  399. Farrugia, Augustin J.; Robbin, Jeffrey; Mitsuji, Hiro; Despotovic, Mihailo; Meldrum, Colin, Method for on demand video and other content rental.
  400. Forlenza, Randolph Michael; Berstis, Viktors, Method for permanent decryption of selected sections of an encrypted document.
  401. Srinivasan, Pramila; Princen, John, Method for programming on-chip non-volatile memory in a secure processor, and a device so programmed.
  402. Dorwin, David Kimbal; Finnan, Hugh, Method for reducing time to first frame/seek frame of protected digital content streams.
  403. Forlenza, Randolph Michael; Berstis, Viktors, Method for selective encryption within documents.
  404. Forlenza,Randolph Michael; Berstis,Viktors, Method for selective encryption within documents.
  405. Ben Itzhak, Yuval, Method for the automatic setting and updating of a security policy.
  406. Pearson, Siani Lynne; Proudler, Graeme John, Method of and apparatus for ascertaining the status of a data processing environment.
  407. Borza, Stephen J., Method of distributing piracy protected computer software.
  408. Borza, Stephen J., Method of distributing piracy protected computer software.
  409. Cristy, John J.; Pensak, David A.; Singles, Steven J., Method of encrypting information for remote access while maintaining access control.
  410. David A. Pensak ; John J. Cristy ; Steven J. Singles, Method of encrypting information for remote access while maintaining access control.
  411. David A. Pensak ; John J. Cristy ; Steven J. Singles, Method of encrypting information for remote access while maintaining access control.
  412. Pensak, David A.; Cristy, John J.; Singles, Steven J., Method of encrypting information for remote access while maintaining access control.
  413. Kelley, Edward E.; Sammons, George P., Method of ensuring that the PC is not used to make unauthorized and surreptitious telephone calls.
  414. Edward Blaine Eytchison, Method of managing resources within a network of consumer electronic devices.
  415. DiStefano, III,Thomas L., Method of moderating external access to an electronic document authoring development and distribution system.
  416. Kim, Hyung Sun; Kim, Byung Jin, Method of recording and reproducing sample data to/from a recording medium and sample data containing recording medium.
  417. Kim, Hyung Sun; Kim, Byung Jin, Method of recording and reproducing sample data to/from a recording medium and sample data containing recording medium.
  418. Chang, Robert C.; Yuan, Po; Qawami, Bahman; Sabet-sharghi, Farshid; Wang, Junzhi; Liu, Xian Jun; Yang, Chieh-Hao; Li, June; Yan, Mei; Jogand-Coulomb, Fabrice, Method of storing and accessing header data from memory.
  419. Iwamura,Keiichi, Method, apparatus, and system for processing information by attaching information to digital data, and storage medium storing computer-readable program codes to carry out the method.
  420. Watanabe Yoshiaki,JPX ; Iino Shigeyo,JPX ; Morita Yasuaki,JPX ; Nishimori Kazuhiro,JPX ; Kijima Ichiro,JPX, Method, apparatus, system, and program storage device for distributing intellectual property.
  421. Dorwin, David Kimbal; Scherkus, Andrew; Kaiser, Christian; Lacey, Stephen John, Method, manufacture, and apparatus for configuring multiple content protection systems.
  422. Dorwin, David Kimbal, Method, manufacture, and apparatus for content decryption module.
  423. Dorwin, David Kimbal; Scherkus, Andrew; Lacey, Stephen John; Kaiser, Christian, Method, manufacture, and apparatus for content protection for HTML media elements.
  424. Dorwin, David Kimbal; Scherkus, Andrew; Kaiser, Christian, Method, manufacture, and apparatus for content protection using authentication data.
  425. Dorwin, David Kimbal, Method, manufacture, and apparatus for instantiating plugin from within browser.
  426. Dorwin, David Kimbal; Scherkus, Andrew Martin, Method, manufacture, and apparatus for protection of media objects from the web application environment.
  427. Arayasantiparb, Athapan; Vanko, Martin; Abbar, Mohamed A.; Moore, Thomas G., Method, system, and apparatus for converting currency values based upon semantically labeled strings.
  428. Moore, Thomas G.; Abbar, Mohamed A., Method, system, and apparatus for converting dates between calendars and languages based upon semantically labeled strings.
  429. Moore, Thomas G.; Abbar, Mohamed A.; Issa, Nader G., Method, system, and apparatus for converting numbers based upon semantically labeled strings.
  430. Moore,Thomas G.; Abbar,Mohamed A.; Arayasantiparb,Athapan, Method, system, and apparatus for converting numbers between measurement systems based upon semantically labeled strings.
  431. Taboada, Roberto C.; Bailey, Eric D., Method, system, and apparatus for routing a query to one or more providers.
  432. Taboada, Roberto C.; Bailey, Eric D.; Helfrich, James N., Method, system, and computer-readable medium for communicating results to a data query in a computer network.
  433. Raley, Michael Charles; Chen, Eddie J., Method, system, and device for license-centric content consumption.
  434. Raley, Michael; Chen, Eddie J., Method, system, and device for license-centric content consumption.
  435. Rabin,Michael O.; Shasha,Dennis E., Methods and apparatus for protecting information.
  436. Rabin,Michael O.; Shasha,Dennis E., Methods and apparatus for protecting information.
  437. North, Gregory Allen; Perry, Matthew Richard; Kircher, Brian Christopher, Methods and circuits for securing encached information.
  438. Feinberg, Yaniv; Arayasantiparb, Athapan; Wang-Aryattawanich, Thiti; Abbar, Mohamed A., Methods and system for recognizing names in a computer-generated document and for providing helpful actions associated with recognized names.
  439. Judge, Paul; Alperovitch, Dmitri; Caracciolo, Joel Joseph; Hernandez, Alejandro Manuel; Krasser, Sven; Schneck, Phyllis Adele, Methods and systems for exposing messaging reputation to an end user.
  440. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  441. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  442. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  443. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  444. Nagpal, Abhinay R.; Patil, Sandeep R.; Ramanathan, Sri; Shukla, Divyank; Trevathan, Matthew B., Methods and systems for selective encryption and secured extent quota management for storage servers in cloud computing.
  445. Proudler, Graeme John; Burton, William; Kuhlmann, Dirk; Plaquin, David, Methods, devices and data structures for trusted data.
  446. Hicks, John; Zimler, Randy, Methods, systems, and products for providing electronic media.
  447. Hicks, John; Zimler, Randy, Methods, systems, and products for providing electronic media.
  448. Hicks, John; Zimler, Randy, Methods, systems, and products for providing electronic media.
  449. Cho, Young Soon; Kim, Jae Young; Jung, Han, Mobile device for preventing illegal distribution of digital data contents and operating method thereof.
  450. Chang, William Ho; Liu, Christina Ying, Mobile device methods for enabling pervasive wireless digital media.
  451. Chang, William Ho; Liu, Christina Ying, Mobile devices supporting wireless synchronization over a wireless Network compatible, at least partly, with IEEE 802.11 standard(s).
  452. Chang, William Ho; Liu, Christina Ying, Mobile information apparatus for wireless search and data transfer.
  453. Chang, William Ho; Liu, Christina Ying, Mobile information apparatus that are configurable to include applications for playing audio digital content received over the internet from subscribed audio digital content service(s).
  454. Chang, William Ho; Liu, Christina Ying, Mobile information apparatus that include support for receiving video digital content over the internet from a service, and for wireless displaying or playing over air at least part of the received video digital content from the mobile information apparatus to televisions, television controllers, display devices, or projection devices.
  455. Chang, William Ho; Liu, Christina Ying, Mobile information apparatus that includes intelligent wireless display, wireless direct display, or transfer of digital content for playing over air the digital content at smart televisions, television controllers, or audio output devices.
  456. Chang, William Ho; Liu, Christina Ying, Mobile information apparatus that includes voice commands for playing digital content that is received from a digital content service provided over the internet.
  457. Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Rinaldo, Jr., John D., Modifying restricted images.
  458. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  459. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  460. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  461. Alperovitch, Dmitri; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele, Multi-dimensional reputation scoring.
  462. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  463. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  464. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  465. Hoffberg, Steven M., Multifactorial optimization system and method.
  466. Walter, Edward, Multimedia-based video game distribution.
  467. Walter, Edward, Multimedia-based video game distribution.
  468. Candelore, Brant L., Multiple DRM management.
  469. Griffin, Jonathan; Dalton, Christopher I.; Child, Michael; Chen, Liqun; Norman, Andrew Patrick, Multiple trusted computing environments.
  470. Griffin,Jonathan; Chen,Liqun, Multiple trusted computing environments with verifiable environment identities.
  471. Arunan, Thenmozhi; Won, Eun-Tae, Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message.
  472. Arunan, Thenmozhi; Won, Eun-Tae, Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message.
  473. Arunan, Thenmozhi; Won, Eun-Tae, Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message.
  474. Arunan, Thenmozhi; Won, Eun-Tae, Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message.
  475. Arunan, Thenmozhi; Won, Eun-Tae, Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message.
  476. Outten,Todd Avery; Spaulding,Bryan Gentry; Sherr,Scott Jeffrey; Rubenstein,Ira Steven; Landau,Yair; Chey,Douglas Daiseung; Arrieta,Michael R.; Mandyam,Harish; Rodriguez,Thomas M., Network configured for delivery of content for download to a recipient.
  477. Chia, Teck; Dinh, John D. V.; Gustafson, James P., Network for updating electronic devices.
  478. Walter, Edward; Diroo, Yolius; Wollmershauser, Steven M., Networked television and method thereof.
  479. Walter, Edward; Diroo, Yolius; Wollmershauser, Steven M., Networked television and method thereof.
  480. Tinker, Jeffrey Lee; MacLean, Charles Duncan; Ali, Hamid Shaheed; Hiar, Edward Charles; Rutman, Michael; Morten, Glenn A., Non-blocking of head end initiated revocation and delivery of entitlements non-addressable digital media network.
  481. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Obfuscating identity of a source entity affiliated with a communique in accordance with conditional directive provided by a receiving entity.
  482. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving use.
  483. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Obfuscating identity of a source entity affiliated with a communiqué in accordance with conditional directive provided by a receiving entity.
  484. Sprunk, Eric J., Object and resource security system.
  485. Bulman, Richard L.; Dahl, Brad; Gravitz, Steve, Object customization and presentation system.
  486. Dozier, Linda T.; Fish, Edmund J.; Zolt, Nina; Gilburne, Miles R., Object-based system and language for dynamic data or network interaction including learning management.
  487. Matsubayashi,Don Hideyasu; Mazzagatte,Craig; Slick,Royce E, Obtaining temporary exclusive control of a device.
  488. Mazzagatte,Craig; Matsubayashi,Don Hideyasu; Slick,Royce E., Obtaining temporary exclusive control of a printing device.
  489. Graveline, Marc; Roy, Patrick; Viney, Ulf, Opaque cryptographic web application data protection.
  490. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Operating system upgrades in a trusted operating system environment.
  491. Chang, William Ho; Liu, Christina Ying, Output device and method for output without an output driver.
  492. Chang, William Ho; Liu, Christine Ying, Output device and method for output without an output driver.
  493. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  494. Chang, William Ho; Liu, Christina Ying, Output systems, information apparatus, or internet appliances supporting voice commands for receiving and for playing selected digital content from a service over a network.
  495. Candelore, Brant L.; Unger, Robert Allan; Pedlow, Jr., Leo M., Partial multiple encryption.
  496. Munje, Arun; Plestid, Trevor, Password methods and systems for use on a mobile device.
  497. Chen, Shao-Chun; O'Neill, Patrick; Rao, Bindu Rama; Lilley, Patrick, Pattern detection preprocessor in an electronic device update generation system.
  498. Ishii, Hiroshi; Bojinov, Hristo; Subramanian, Ananthan, Peer to peer key synchronization.
  499. Proudler, Graeme John, Performance of a service on a computing platform.
  500. Griffin,Jonathan; Dalton,Christopher I., Performing secure and insecure computing operations in a compartmented operating system.
  501. Brew, Glenn E.; Hurtado, Marco M.; Medina, David; Munson, Jonathan P.; Nusser, Stefan; Pacifici, Giovanni; You{grave over (s)}sef, Alaa S., Persistent access control of protected content.
  502. Manber, Udi; Siegel, Hilliard B.; Gordon, Charles, Personalized searchable library with highlighting capabilities.
  503. Story, Guy A.; Rajasekharan, Ajit; Mott, Timothy, Personalized time-shifted programming.
  504. Carter, Stephen R; Burch, Lloyd Leon, Policy and attribute based access to a resource.
  505. Chang, William Ho, Portable communication USB device for providing mobile internet access service or for providing other communication services.
  506. Chang, William Ho, Portable communication device for providing phone calling service.
  507. Chang, William Ho; Liu, Christina Ying, Portable electronic device configured to receive voice activated commands and to wirelessly manage or drive an output device.
  508. Chang, William Ho; Liu, Christine Ying, Portable information apparatus that includes touch sensitive screen interface and wireless communication circuitry for selecting an output device on the touch sensitive screen and for wireless transmitting output stream to the selected output device.
  509. Knox,David, Prepaid broadband internet and software service method and apparatus.
  510. Moritzen, Klaus, Prepaid licensing system and method.
  511. Zhuk, Oscar V.; Morten, Glenn A.; Hiar, Edward Charles, Preventing unauthorized modification or skipping of viewing of advertisements within content.
  512. Chang, William Ho; Liu, Christina Ying, Printers, printer controllers, printer software, or printer firmware for supporting wireless printing or printing over air.
  513. Tanaka, Hirotomo, Printing apparatus which restricts printing of print job data.
  514. Suzuki,Stephanie Ann; Giridharagopal,Rajini Bala; Iwamoto,Neil Y.; Sevastyanov,Vladimir; Slick,Royce E.; Page,Martin Ervin; Shoa,Katayoun; Tanaka,Yokichi Joe; Chen,Paul; Keung,Stephen, Printing with credit card as identification.
  515. Alperovitch, Dmitri; Greve, Paula; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele, Prioritizing network traffic.
  516. Alperovitch, Dmitri; Krasser, Sven; Greve, Paula; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  517. Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  518. Baker, Brian, Process and streaming server for encrypting a data stream.
  519. Baker,Brian, Process and streaming server for encrypting a data stream.
  520. Morten,Glenn A.; Baker,Brian, Process and streaming server for encrypting a data stream to a virtual smart card client system.
  521. Baker, Brian A.; Morten, Glenn A.; MacLean, Charles Duncan; Tinker, Jeffrey Lee, Process and streaming server for encrypting a data stream with bandwidth based variation.
  522. Baker, Brian A.; Morten, Glenn A.; MacLean, Charles Duncan; Tinker, Jeffrey Lee, Process and streaming server for encrypting a data stream with bandwidth based variation.
  523. Selinfreund,Richard H.; Vig,Rakesh, Product packaging including digital data.
  524. Kanamaru, Tomokazu; Oashi, Masahiro, Program execution device and program execution method.
  525. Carlucci, John B.; Williamson, Louis D.; Callahan, John W.; Urdang, Erik G.; Kimble, David M.; Gonder, Thomas L.; Buehl, Joseph, Program storage, retrieval and management based on segmentation messages.
  526. Carlucci, John B.; Williamson, Louis D.; Callahan, John W.; Urdang, Erik G.; Kimble, David M.; Gonder, Thomas; Buehl, Joseph, Program storage, retrieval and management based on segmentation messages.
  527. Carlucci, John B.; Williamson, Louis D.; Callahan, John W.; Urdang, Erik G.; Kimble, David M.; Gonder, Thomas; Buehl, Joseph, Program storage, retrieval and management based on segmentation messages.
  528. Carlucci, John B.; Williamson, Louis D.; Callahan, John W.; Urdang, Erik G.; Kimble, David M.; Gonder, Thomas; Buehl, Joseph, Program storage, retrieval and management based on segmentation messages.
  529. Carlucci, John B.; Williamson, Louis D.; Callahan, John W.; Urdang, Erik G.; Kimble, David M.; Gonder, Thomas; Buehl, Joseph, Program storage, retrieval and management based on segmentation messages.
  530. Carlucci, John B.; Williamson, Louis D.; Callahan, John W.; Urdang, Erik G.; Kimble, David M.; Gonder, Thomas; Buehl, Joseph, Program storage, retrieval and management based on segmentation messages.
  531. Carlucci, John B.; Williamson, Louis D.; Callahan, John W.; Urdang, Erik G.; Kimble, David M.; Gonder, Thomas; Buehl, Joseph, Program storage, retrieval and management based on segmentation messages.
  532. Carlucci, John B.; Williamson, Louis D.; Callahan, John W.; Urdang, Erik G.; Kimble, David M.; Gonder, Thomas; Buehl, Joseph, Program storage, retrieval and management based on segmentation messages.
  533. Sawicki,Marcin; Jones,Brian; Little,Robert; Sunderland,Mark, Programmable object model for extensible markup language markup in an application.
  534. Jones,Brian; Sawicki,Marcin; Little,Robert; Sunderland,Mark, Programmable object model for extensible markup language schema validation.
  535. Little,Robert; Jones,Brian; Sawicki,Marcin; Sunderland,Mark; Tharp,Edward W., Programmable object model for namespace or schema library support in a software application.
  536. Carlucci, John B.; Williamson, Louis D.; Honhart, Jon C., Programming content processing and management system and method.
  537. Carlucci, John B.; Williamson, Louis D.; Honhart, Jon C., Programming content processing and management system and method.
  538. Srinivasan, Pramila; Princen, John, Programming non-volatile memory in a secure processor.
  539. Srinivasan, Pramila; Princen, John, Programming on-chip non-volatile memory in a secure processor using a sequence number.
  540. Srinivasan, Pramila; Princen, John, Programming on-chip non-volatile memory in a secure processor using a sequence number.
  541. Srinivasan, Pramila; Princen, John, Programming on-chip non-volatile memory in a secure processor using a sequence number.
  542. Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
  543. Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
  544. Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
  545. Tian, Jun; Stach, John, Progressive image quality control using watermarking.
  546. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D.; Tegreene, Clarence T., Promotional placement in media works.
  547. McBrearty, Gerald Francis; Mullen, Shawn Patrick; Shieh, Johnny Meng-Han; Wortman, Michael William, Protecting contents of computer data files from suspected intruders by renaming and hiding data files subjected to intrusion.
  548. Jakubowski,Mariusz H.; Venkatesan,Ramarathnam, Protecting digital goods using oblivious checking.
  549. Jakubowski,Mariusz H.; Venkatesan,Ramarathnam, Protecting digital goods using oblivious checking.
  550. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  551. Plotkin, Serge; Bojinov, Hristo; Frandzel, Yuval; Narver, Andrew; Yang, Zi-Bin, Protocol translation.
  552. Lamberg, Samu, Providing content in a communication system.
  553. Reynar, Jeff; Broman, Paul; Yap, Joe Keng, Providing contextually sensitive tools and help content in computer-generated documents.
  554. Reynar,Jeff; Broman,Paul; Yap,Joe Keng, Providing contextually sensitive tools and help content in computer-generated documents.
  555. Agarwal, Vaibhave; Gandhasri, Rajamohan, Re-keying based on pre-generated keys.
  556. Agarwal, Vaibhave; Ganhasri, Rajamohan, Re-keying based on pre-generated keys.
  557. Kim, Hyung Sun; Kim, Byung Jin, Read-only recording medium containing sample data and reproducing method thereof.
  558. Kim,Hyung Sun; Kim,Byung Jin, Read-only recording medium containing sample data and reproducing method thereof.
  559. Sasamoto, Manabu; Noguchi, Takaharu; Aikawa, Makoto; Hirahata, Shigeru, Recording apparatus for recording digital information.
  560. Kim, Hyung Sun; Kim, Byung Jin, Recording medium containing sample data and reproducing thereof.
  561. Dorwin, David Kimbal, Reducing time to first encrypted frame in a content stream.
  562. Kortum,Philip Ted; Sullivan,Marc Andrew; Brandt,Jeffrey Lewis, Remote control, apparatus, system and methods of using the same.
  563. Challener, David C.; Locker, Howard J.; Davis, Mark C.; Cromer, Daryl C.; Springfield, Randall S., Remote registration of biometric data into a computer.
  564. Jones,Brian; Sawicki,Marcin; Little,Robert; Wang,Ziyi, Representing latent data in an extensible markup language document.
  565. Alperovitch, Dmitri; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Trivedi, Aarjav Jyotindra Neeta; Yang, Weilai, Reputation based connection throttling.
  566. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  567. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  568. Alperovitch, Dmitri; Krasser, Sven, Reputation based message processing.
  569. Hendricks, John S., Resizing document pages to fit available hardware screens.
  570. Demartini, Thomas M.; Raley, Michael Charles, Rights expression profile system and method.
  571. Raley, Michael C.; Gilliam, Charles P.; Ham, Manual; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  572. Raley, Michael; Gilliam, Charles P.; Ham, Manuel; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  573. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  574. Oyler, Benjamin J.; Chahine, Kenneth G.; Ball, Catherine Ann; Gaeta, Federico C. A., Sample collection device.
  575. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  576. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  577. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  578. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  579. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  580. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  581. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  582. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  583. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  584. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  585. Kley, Victor B., Scalable transaction system for a network environment.
  586. Srinivasan,Pramila; Princen,John; Berndt,Frank; Blythe,David; Saperstein,William; Yen,Wei, Secure and backward-compatible processor and secure software execution thereon.
  587. Srinivasan,Pramila; Princen,John; Berndt,Frank; Blythe,David; Saperstein,William; Yen,Wei, Secure and backward-compatible processor and secure software execution thereon.
  588. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  589. Atallah, Mikhail J.; Rice, John R.; Spafford, Eugene H.; Pantazopoulos, Kostas N., Secure computational outsourcing techniques.
  590. Princen, John; Srinivasan, Pramila; Anderson, Craig Steven, Secure device authentication system and method.
  591. Russell,Chris; Outten,Todd Avery; Spaulding,Bryan Gentry; Sherr,Scott Jeffrey; Rubenstein,Ira Steven; Landau,Yair; Lakamp,Brian David; Barnett,Jeremy Eli; Chey,Douglas Daiseug; Arrieta,Michael R.; Ko, Secure digital content licensing system and method.
  592. England,Paul; Lampson,Butler W., Secure execution of program code.
  593. Nguyen, Julien T., Secure graphical objects in web documents.
  594. Geddes, Martin, Secure intermediation system and method.
  595. Geddes, Martin, Secure intermediation system and method.
  596. Kilian-Kehr, Roger; Kuemmerle, Jan, Secure license management.
  597. Slick,Royce E.; Zhang,William; Purpura,Don Francis; Iwamoto,Neil Y.; Mazzagatte,Craig, Secure printing with authenticated printer key.
  598. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  599. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  600. Duri, Sastry S.; Gruteser, Marco O.; Liu, Xuan; Moskowitz, Paul A.; Perez, Ronald; Schonberg, Edith G.; Singh, Moninder; Tang, Jung-Mu; Tresser, Charles P., Secure system and method for enforcement of privacy policy and protection of confidentiality.
  601. Duri,Sastry S.; Gruteser,Marco O.; Liu,Xuan; Moskowitz,Paul A.; Perez,Ronald; Schonberg,Edith G.; Singh,Moninder; Tang,Jung Mu; Tresser,Charles P., Secure system and method for enforcement of privacy policy and protection of confidentiality.
  602. Duri,Sastry S.; Liu,Xuan; Moskowitz,Paul A.; Perez,Ronald; Schonberg,Edith G.; Singh,Moninder; Tresser,Charles P., Secure system and method for enforcement of privacy policy and protection of confidentiality.
  603. Garcia,Denis Jacques Paul, Secured data format for access control.
  604. Srinivasan, Pramila; Princen, John; Chan, Andy; Mielke, Paul; Wheeler, Rob, Securing a flash memory block in a secure device system and method.
  605. Doyle, Ronald P.; Hind, John R.; Stockton, Marcia L., Security containers for document components.
  606. Doyle, Ronald P.; Hind, John R.; Stockton, Marcia L., Security containers for document components.
  607. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  608. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  609. Redlich, Ron M.; Nemzow, Martin A., Security system with extraction, reconstruction and secure recovery and storage of data.
  610. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  611. MacLean, Charles Duncan; Inskip, Thomas, Selective and persistent application level encryption for video provided to a client.
  612. Davis, Mark C.; Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing.
  613. Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a client proxy.
  614. Davis, Mark C.; Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a group clerk.
  615. Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a key recovery agent.
  616. Candelore, Brant L., Selective encryption with coverage encryption.
  617. Forlenza, Randolph M.; Berstis, Viktors, Selective encryption within documents.
  618. Kollmyer,Brad; Baker,Brian A.; Shapiro,Eric Bradley; Kollmyer,Aric; Rutman,Mike; MacLean,Charles Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Selectively encrypting different portions of data sent over a network.
  619. DeMello,Marco A.; Narin,Attila; Madonna,Christopher Robert Richard, Server controlled branding of client software deployed over computer networks.
  620. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Byrum,Frank D., Server for an electronic distribution system and method of operating same.
  621. Maes, Stephane H., Service level digital rights management support in a multi-content aggregation and delivery system.
  622. Candelore, Brant L.; Derovanessian, Henry; Pedlow, Jr., Leo M., Slice mask and moat pattern partial encryption.
  623. Chang, William Ho; Liu, Christina Ying, Smart phone that includes a wireless communication unit compatible with at least one protocol within bluetooth and/or IEEE802.11 standards for wireless transmission of audio digital content from the smart phone to a wireless audio output device for voice output or music playing.
  624. Chang, William Ho; Liu, Christina Ying, Smart phones that include a digital camera, a touch sensitive screen, support for voice activated commands, and support to at least part of a protocol within IEEE 802.11 standards.
  625. Chang, William Ho; Liu, Christina Ying, Smart phones that include touch sensitive screen and supporting voice activated commands for managing or replying to E-mails.
  626. Chang, William Ho; Liu, Christina Ying, Smart phones that support wireless printing of emails over air to a wireless printer in a wireless local area network.
  627. Chang, William Ho; Liu, Christina Ying, Smart television system having methods or means for accessing paid or subscribed digital content from the internet.
  628. Thomas, Andrew James; Skrebels, Mark; Irvine, Stewart, Software configuration of module dependent on history.
  629. Grala, Darius A., Software development system for editable executables.
  630. Seeley, E. Addison, Software licensing and distribution systems and methods employing biometric sample authentication.
  631. Homing, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Home, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  632. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Home, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan S., Software self-defense systems and methods.
  633. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  634. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  635. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan S., Software self-defense systems and methods.
  636. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan S., Software self-defense systems and methods.
  637. Chang, William Ho; Liu, Christina Ying, Sound output system or internet appliance that supports voice activated commands, and that plays audio data received from a service over a network.
  638. Chang, William Ho; Liu, Christina Ying, Specification of smart wireless television for rendering digital content.
  639. Yen, Wei; Blythe, David; Princen, John; Srinivasan, Pramila, Static-or-dynamic and limited-or-unlimited content rights.
  640. Dietl,Josef; Arend,Thomas, Storing and synchronizing data on a removable storage medium.
  641. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  642. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  643. Palmer, Tomas Earl, System and method for N-dimensional encryption.
  644. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  645. DeMello, Marco; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  646. DeMello,Marco A.; Krishnaswamy,Vinay; Manferdelli,John L., System and method for accessing protected content in a rights-management architecture.
  647. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy B.; Yaacovi,Yoram; Alger,Jeffrey H., System and method for activating a rendering device in a multi-level rights-management architecture.
  648. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy Bertrand; Yaacovi,Yoram; Alger,Jeffrey A., System and method for activating a rendering device in a multi-level rights-management architecture.
  649. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for authenticating an operating system.
  650. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  651. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  652. England,Paul; Lampson,Butler W.; DeTreville,John D., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  653. Holzgrafe, Richard; Santos, Tom; Warnock, Christopher, System and method for automatic anthology creation using document aspects.
  654. Holzgrafe, Richard; Santos, Tom; Warnock, Christopher, System and method for automatic anthology creation using document aspects.
  655. Holzgrafe, Richard; Santos, Tom; Warnock, Christopher, System and method for automatic anthology creation using document aspects.
  656. DeMello, Marco A.; Narin, Attila; Setty, Venkateshaiah, System and method for client interaction in a multi-level rights-management architecture.
  657. Remer, Eric B.; King, David A.; Remer, David L., System and method for connecting to a device on a protected network.
  658. Knauft,Christopher L., System and method for controlling and enforcing access rights to encrypted media.
  659. Gilliam, Charles P; Chen, Eddie J, System and method for controlling rights expressions by stakeholders of an item.
  660. Bantz, David F.; Caceres, Ramon; Chefalas, Thomas E.; Jalan, Srikant; Mastrianni, Steven J.; Pickover, Clifford A., System and method for controlling the disposition of computer-based objects.
  661. Hughes, David, System and method for controlling the use and duplication of digital content distributed on removable media.
  662. Hughes, David, System and method for controlling the use and duplication of digital content distributed on removable media.
  663. Hoffberg, Steven M., System and method for determining contingent relevance.
  664. Nadathur, Gokul; Mohammed, Samiullah; Vaid, Aseem, System and method for differentiated cross-licensing for services across heterogeneous systems using transient keys.
  665. Iinuma,Satoshi, System and method for digital content distribution.
  666. Villoria, Stephen; Bergner, Kevin; Block, James P, System and method for digital media content creation and distribution.
  667. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  668. Baumert, David W.; Goldthwaite, Flora P.; Hendrickson, Gregory L.; Cluts, Jonathan C.; Heath, Pamela J., System and method for distributing digital content over a network.
  669. Sussland, Robert Jan; Chang, Lawrence Wen-Hao; Subramanian, Ananthan, System and method for efficiently deleting a file from secure storage served by a storage system.
  670. Geoffrey, Mohammed Alawi, System and method for electronic certification and authentication of data.
  671. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  672. Woodward, Ernest E., System and method for enhanced piracy protection in a wireless personal communication device.
  673. Woodward, Ernest E., System and method for enhanced piracy protection in a wireless personal communication device.
  674. Woodward, Ernest E., System and method for enhanced piracy protection in a wireless personal communication device.
  675. Chang, Lawrence Wen-Hao; Subramanian, Ananthan, System and method for generating a single use password based on a challenge/response protocol.
  676. Yen,Wei; Blythe,David; Princen,John; Srinivasan,Pramila, System and method for generating new licenses.
  677. Tieu, Vincent; Fung, Joseph Z.; Chen, Eddie; Tadayon, Bijan, System and method for granting access to an item or permission to use an item based on configurable conditions.
  678. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  679. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  680. Subramanian, Ananthan; Chang, Lawrence Wen-Hao, System and method for initial key establishment using a split knowledge protocol.
  681. Chang, Hoi; Kerschbaum, Florian; Faulkner, Kyle; M'Raïhi, David; Mehlberg, Michael Joseph, System and method for inserting security mechanisms into a software program.
  682. Manferdelli,John L.; Marr,Michael David; Krishnaswamy,Vinay; Jakubowski,Mariusz H., System and method for interfacing a software process to secure repositories.
  683. Sawicki, Marcin; Jones, Brian M.; Reynar, Jeffrey C.; Tharp, Edward W., System and method for issuing a message to a program.
  684. Pearson,Larry B.; Bridges,J. Bradley, System and method for local video distribution.
  685. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  686. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  687. Troyansky, Lidror; Carny, Ofir; Peled, Ariel, System and method for monitoring unauthorized dissemination of documents and portable media.
  688. Troyansky,Lidror; Carny,Ofir; Peled,Ariel, System and method for monitoring unauthorized dissemination of documents and portable media.
  689. Palmer,Tom��s Earl, System and method for n-dimensional encryption.
  690. Tolfmans, Joakim Bengt Lennart, System and method for parallel compression of a single data stream.
  691. Kortum, Philip Ted; Sullivan, Marc Andrew, System and method for pre-caching a first portion of a video file on a media device.
  692. Kortum, Philip Ted; Sullivan, Marc Andrew, System and method for pre-caching a first portion of a video file on a set-top box.
  693. Edelman, Martin S., System and method for preventing unauthorized access to electronic data.
  694. Nagel,Robert H., System and method for production and authentication of original documents.
  695. Nagel,Robert H., System and method for production and authentication of original documents.
  696. Jakubowski,Mariusz H.; Venkatesan,Ramarathnam; Sinha,Saurabh, System and method for protecting digital goods using random and automatic code obfuscation.
  697. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  698. Friedman,George; Starek,Robert Phillip; Murdock,Carlos A., System and method for providing data security.
  699. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  700. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  701. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  702. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  703. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  704. Jones,Brian Michael; Sawicki,Marcin; Little,Robert Andrew; Broman,Paul Alexander; Reynar,Jeffrey C., System and method for providing namespace related information.
  705. Kortum, Philip Ted; Sullivan, Marc Andrew, System and method for recording television content at a set top box.
  706. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  707. Nagel, Robert H.; Felsher, David P.; Hoffberg, Steven M., System and method for secure communications involving an intermediary.
  708. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for secure storage data using a key.
  709. Lampson, Butler W.; DeTreville, John D.; England, Paul, System and method for secure storage of data using public and private keys.
  710. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  711. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  712. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  713. Nussbaum, Lawrence Edward; Thompson, Stephen, System and method for securing data.
  714. Desai, Nimesh; Udani, Sanjay; Kimble, Jr., James David; Werges, Thomas P.; Richardson, David Dean; Gustafson, Jeffrey A., System and method for selective information exchange.
  715. Shelton, Robert, System and method for selectively redacting information in electronic documents.
  716. Silberman, Joshua; Subramanian, Ananthan; Okushi, Fumiaki, System and method for signing a message to provide one-time approval to a plurality of parties.
  717. Wang, Xin, System and method for specifying and processing legality expressions.
  718. Hillmer,James M., System and method for storing and accessing secure data.
  719. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  720. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  721. Candelore, Brant L.; Pedlow, Jr., Leo M., System and method for the creation, synchronization and delivery of alternate content.
  722. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., System and method for transmitting illusory identification characteristics.
  723. Ellingson, John F., System and method for verification of identity.
  724. Sullivan, Marc A.; Kortum, Philip T.; Brandt, Jeff, System and method of displaying a video stream.
  725. Sullivan, Marc Andrew; Kortum, Philip Ted; Brandt, Jeffrey Lewis, System and method of displaying a video stream.
  726. Sullivan,Marc Andrew; Kortum,Philip Ted; Brandt,Jeffrey Lewis, System and method of displaying a video stream.
  727. Grannan, Michael, System and method of managing digital rights.
  728. Grannan, Michael F.; Suryanarayana, Lalitha, System and method of managing video content delivery.
  729. Nadarajah, Dinesh, System and method of managing video content streams.
  730. Kortum, Philip Ted; Sullivan, Marc Andrew; Cansler, Jr., James L.; Williams, Alyssa Lenorah Noll, System and method of transmitting photographs from a set top box.
  731. Kortum, Philip Ted; Sullivan, Marc Andrew; Brandt, Jeffrey Lewis, System and method of using a remote control and apparatus.
  732. Powell, Michael D., System and method to facilitate and support electronic communication of ideas.
  733. Powell, Michael D., System and method to facilitate and support electronic communication of request for proposals.
  734. Ansari, Ahmad C.; Nadarajah, Dinesh; Hartman, David Bruce, System and method to provide a unified video signal for diverse receiving platforms.
  735. Ansari, Ahmad C.; Nadarajah, Dinesh; Hartman, David Bruce, System and method to provide a unified video signal for diverse receiving platforms.
  736. Ansari, Ahmad C.; Nadarajah, Dinesh; Hartman, David Bruce, System and method to provide a unified video signal for diverse receiving platforms.
  737. Rudd, James M., System and methods for managing the distribution of electronic content.
  738. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  739. Chang, William Ho; Liu, Christina Ying, System for capturing and outputting digital content over a network that includes the internet.
  740. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  741. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  742. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  743. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  744. Reshef, Eran; El-Hanany, Yuval; Raanan, Gil; Tsarfati, Tom, System for determining web application vulnerabilities.
  745. Reshef,Eran; El Hanany,Yuval; Raanan,Gil; Tsarfati,Tom, System for determining web application vulnerabilities.
  746. Rhoads,Geoffrey B.; Davis,Bruce L.; Hein, III,William C.; Rosenthol,Joshua A.; MacIntosh,Brian T.; Levy,Kenneth L., System for linking from object to remote resource.
  747. Rhoads, Geoffrey B.; Davis, Bruce L.; Hein, III, William C.; Rosenthol, Joshua A.; MacIntosh, Brian T.; Levy, Kenneth L., System for linking from objects to remote resources.
  748. Roegner, Michael W., System for managing access to protected resources.
  749. Roegner, Michael W., System for managing access to protected resources.
  750. Riebe,Heinrich Henning; Aldis,David, System for persistently encrypting critical software data to control the operation of an executable software program.
  751. Forlenza, Randolph Michael; Berstis, Viktors, System for selective encryption within documents.
  752. Hudson, Jr., James Thomas, System security for network resource access using cross firewall coded requests.
  753. Hudson, Jr., James Thomas, System security for network resource access using cross-firewall coded requests.
  754. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  755. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  756. Bianco, Peter Garrett; Boon, William Taylor; Rochon, Anthony C.; Sherman, Marc A.; Sterling, Robert Brewster; Ware, Karl Roger, System, method and computer program product for an authentication management infrastructure.
  757. Bianco,Peter Garrett; Boon,William Taylor; Rochon,Anthony C.; Sherman,Marc A.; Sterling,Robert Brewster; Ware,Karl Roger, System, method and computer program product for an authentication management infrastructure.
  758. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E., System, method and computer program product for improving computer network intrusion detection by risk prioritization.
  759. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  760. Bakshi, Bikram S.; Helms, David W.; Rochon, Anthony C.; Walker, Trevor J., System, method and computer program product for providing unified authentication services for online applications.
  761. Bakshi,Bikram S; Helms,David W; Rochon,Anthony C; Walker,Trevor J, System, method and computer program product for providing unified authentication services for online applications.
  762. Walter,Edward; Diroo,Yolius, System, method and interface for controlling multiple electronic devices of a home entertainment system via a single control device.
  763. Morten, Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  764. Morten,Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  765. Morten,Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  766. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  767. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  768. Judge,Paul; Rajan,Guru, Systems and methods for adaptive message interrogation through multiple queues.
  769. Judge, Paul; Rajan, Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  770. Judge,Paul; Rajan,Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  771. Judge, Paul; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Systems and methods for classification of messaging entities.
  772. Judge, Paul; Moyer, Matt; Rajan, Guru; Alperovitch, Dmitri, Systems and methods for classification of messaging entities.
  773. Valenzuela, Edgardo; Chen, Eddie J.; DeMartini, Thomas; Fung, Joseph Zhung Yee; Nguyen, Mai; Tieu, Vincent Hsiang; Tran, Duc, Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates.
  774. Valenzuela, Edgardo; Chen, Eddie J.; DeMartini, Thomas; Fung, Joseph Zhung Yee; Nguyen, Mai; Tieu, Vincent Hsiang; Tran, Duc, Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates.
  775. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  776. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Sellakannu, Arasendran; Willis, Lamar Lorenzo, Systems and methods for graphically displaying messaging traffic.
  777. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Zdziarski, Jonathan Alexander, Systems and methods for identifying potentially malicious messages.
  778. Wawda, Abubakar; Spertus, Michael, Systems and methods for managing rights of data via dynamic taint analysis.
  779. Judge, Paul, Systems and methods for message threat management.
  780. Judge, Paul, Systems and methods for message threat management.
  781. Judge, Paul, Systems and methods for message threat management.
  782. Judge, Paul, Systems and methods for message threat management.
  783. Judge,Paul, Systems and methods for message threat management.
  784. Judge,Paul, Systems and methods for message threat management.
  785. LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  786. LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
  787. Levine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  788. Judge, Paul; Rajan, Guru, Systems and methods for secure communication delivery.
  789. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  790. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  791. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  792. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  793. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  794. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  795. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  796. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  797. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  798. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  799. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  800. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  801. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  802. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  803. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  804. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  805. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  806. Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  807. Judge,Paul, Systems and methods for upstream threat pushback.
  808. Morten, Glenn A.; Hiar, Edward Charles; Jacobs, Andre; Veres, James E.; Zhuk, Oscar V.; Tinker, Jeffrey Lee, Tamper prevention and detection for video provided over a network to a client.
  809. Chaudhary, Anant; Narver, Andrew, Tape failover across a cluster.
  810. Chaudhary, Anant; Narver, Andrew, Tape failover across a cluster.
  811. Slick,Royce E.; Mazzagatte,Craig; Iwamoto,Neil Y., Targeted secure printing.
  812. Carlucci, John B.; Williamson, Louis D., Technique for effectively providing various entertainment services through a communications network.
  813. Burch, Lloyd Leon; Earl, Douglas G.; Carter, Stephen R; Ward, Robert Mark, Techniques for dynamically establishing and managing authentication and trust relationships.
  814. Wu,Wai; Heller,Toby; Hoffberg,Steven M., Telephony control system with intelligent call routing.
  815. Wu,Wai; Heller,Toby; Hoffberg,Steven M., Telephony control system with intelligent call routing.
  816. Chang, William Ho; Liu, Christina Ying, Televisions, output controllers, or speakers that are setup to wirelessly connect to a network and to receive digital content from a digital content service over the network.
  817. Millman, Jonathan T.; Rajasekharan, Ajit V.; Sperring, Jr., Foy C.; Story, Jr., Guy A., Time-based digital content authorization.
  818. Chang, William Ho; Liu, Christina Ying, Touch sensitive screen information apparatus that includes close proximity or near distance radio frequency field communication.
  819. Chang, William Ho; Liu, Christina Ying, Touch sensitive screen information apparatus that includes close proximity or near distance radio frequency field communication.
  820. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  821. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  822. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Transferring application secrets in a trusted operating system environment.
  823. Rassool, Reza P.; Morten, Glenn A.; Baker, Brian A., Transitioning to secure IP communications for encoding, encapsulating, and encrypting data.
  824. Rassool, Reza P.; Morten, Glenn A.; Baker, Brian A., Transitioning to secure IP communications for encoding, encapsulating, and encrypting data.
  825. Ginsberg,Michael, Trust level based platform access regulation application.
  826. Pearson, Siani Lynne; Chen, Liqun, Trusted computing platform for restricting use of data.
  827. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce electronic transactions and rights management.
  828. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  829. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, and rights management.
  830. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  831. Cassapakis, Chris; Rao, Bindu Rama, Updating an electronic device with update agent code.
  832. Kamada, Tomihisa; Murakami, Atsushi; Ejima, Masaaki, Usage period management system for applications.
  833. Kamada, Tomihisa; Murakami, Atsushi; Ejima, Masaaki, Usage period management system for applications.
  834. Urbanek, Robert, Use of a domain name server to direct web communications to an intermediation platform.
  835. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  836. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  837. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  838. Carlucci, John B.; DeHart, Michael L., Use of messages in or associated with program signal streams by set-top terminals.
  839. Carlucci, John B.; DeHart, Michael L., Use of messages in or associated with program signal streams by set-top terminals.
  840. Carlucci, John B.; DeHart, Michael L., Use of messages in or associated with program signal streams by set-top terminals.
  841. Carlucci, John B.; DeHart, Michael L., Use of messages in program signal streams by set-top terminals.
  842. Chess,David M.; Dyer,Joan; Itoi,Naomaru; Kravitz,Jeff; Palmer,Elaine Rivette; Perez,Ronald; Smith,Sean William, Used trusted co-servers to enhance security of web interaction.
  843. Motta, Giovanni; Marolia, Sunil; O'Neill, Brian; Slyz, Marko, User experience and dependency management in a mobile device.
  844. Motta, Giovanni; Marolia, Sunil; O'Neill, Brian; Slyz, Marko, User experience and dependency management in a mobile device.
  845. Birger, Chet; Douglas, David C.; Rosenthal, Steven; Traub, Kenneth R., Using an identity-based communication layer for computing device communication.
  846. Berke, Stuart Allen; Khatri, Mukund Purshottam, Verifying OEM components within an information handling system using original equipment manufacturer (OEM) identifier.
  847. Pearson, Larry B.; Bridges, J. Bradley, Video distribution systems and methods for multiple users.
  848. Van Vleck, Paul; Kortum, Philip T.; Sullivan, Marc A., Video quality testing by encoding aggregated clips.
  849. Van Vleck, Paul; Kortum, Philip T.; Sullivan, Marc A., Video quality testing by encoding aggregated clips.
  850. Candelore, Brant L.; Derovanessian, Henry; Pedlow, Jr., Leo M., Video slice and active region based multiple partial encryption.
  851. Candelore, Brant L.; Derovanessian, Henry; Pedlow, Jr., Leo M., Video slice and active region based multiple partial encryption.
  852. Hendricks, John S.; McCoskey, John S., Virtual on-demand electronic book.
  853. Friedman, David; Wu, Wai, Voice over internet call center integration.
  854. Friedman, David; Wu, Wai, Voice over internet call center integration.
  855. Friedman,David; Wu,Wai, Voice over internet call center integration.
  856. Friedman, David; Wu, Wai, Voice over internet integration.
  857. Friedman, David; Wu, Wai, Voice over internet integration.
  858. McKinley, Tyler J.; Seder, Phillip Andrew; Rodriguez, Tony F., Watermark systems and methods.
  859. Itoh,Fumiaki, Web browser apparatus and web browsing method.
  860. Alperovitch, Dmitri; Foote-Lennox, Tomo; Greve, Paula; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Zdziarski, Jonathan Alexander, Web reputation scoring.
  861. Chang, William Ho; Liu, Christina Ying, Wireless controller wire connectable to output devices such as televisions for accessing digital content and for wireless communication with mobile information apparatus.
  862. Chang, William Ho; Liu, Christina Ying, Wireless data output method for rendering digital content accessed from a mobile information apparatus.
  863. Chang, William Ho; Liu, Christina Ying, Wireless devices that communicate, via short range wireless communication, with a mobile client device for establishing services of the wireless device with a server over the internet.
  864. Chang, William Ho; Liu, Christina Ying, Wireless devices that establish a wireless connection with a mobile information apparatus by wirelessly detecting, within physical proximity, the mobile information apparatus.
  865. Chang, William Ho; Liu, Christina Ying, Wireless output devices or wireless controllers that support wireless device discovery for establishing wireless connectivity.
  866. Chang, William Ho; Liu, Christina Ying, Wireless printing device for printing digital content received via wireless communication compatible, at least partly, with IEEE 802.11 or Bluetooth.
  867. Seger,Paul Joseph, Wireless security access management for a portable data storage cartridge.
  868. Chang, William Ho; Liu, Christina Ying, Wireless television or controller wire connectable to a television for receiving and rendering digital content.
  869. Chan,Wone Hoe; Mukadam,Shabbir; Roka,Pujan, Wireless-access-provider intermediation to facilliate digital rights management for third party hosted content.
  870. Chang, Ian, iSCSI name forwarding technique.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로