$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Systems and methods for secure transaction management and electronic rights protection 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/30
출원번호 US-0964333 (1997-11-04)
발명자 / 주소
  • Ginter Karl L.
  • Shear Victor H.
  • Spahn Francis J.
  • Van Wie David M.
출원인 / 주소
  • InterTrust Technologies Corp.
대리인 / 주소
    Nixon & Vanderhye P.C.
인용정보 피인용 횟수 : 1081  인용 특허 : 222

초록

The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain

대표청구항

[ We claim:] [1.] A method for using at least one resource processed in a secure operating environment at a first appliance, said method comprising:securely receiving a first entity's control at said first appliance, said first entity being located remotely from said operating environment and said f

이 특허에 인용된 특허 (222)

  1. Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
  2. Fascenda Anthony C. (Pacifica CA), Access control system for transmitting data from a central station to a plurality of receiving stations and method there.
  3. Bloomberg Dan S. (Palo Alto CA) Tow Robert F. (Palo Alto CA), Adaptive scaling for decoding spatially periodic self-clocking glyph shape codes.
  4. Mori Ryuichi (Tokyo JP) Ichikawa Tadao (Fuchu JP) Shiraogawa Yukio (Fuchu JP), Address management system.
  5. Tolman J. Leonard (Provo UT) Ekstrom Joseph J. (Lindon UT), Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of compute.
  6. Davis Derek L. (Phoenix AZ) Smith Lionel (Queen Creek AZ), Apparatus and method for preventing disclosure through user-authentication at a printing node.
  7. Uchenick Gordon (Baltimore MD), Apparatus and method for preventing unauthorized use of computer programs.
  8. Davis Derek L. (Phoenix AZ), Apparatus and method for providing secured communications.
  9. Dunham Michael D. (Shorewood WI) Dykstra Thomas M. (Mequon WI) Vahlsing Donald W. (Grafton WI) Ehlers Paul L. (Menasha WI), Apparatus for controlling the use of computer software.
  10. Griffin David (Maynard MA) Campbell Jonathan (Acton MA) Reilly Michael (Sterling MA) Rosenbaum Richard (Pepperell MA), Arrangement with cooperating management server node and network service node.
  11. Maki Reino A. (Marietta GA) Mukherjee Sujan K. (Roswell GA), Attribute-based classification and retrieval system.
  12. Russell Edward A. (Acton MA), Authorization system for obtaining in single step both identification and access rights of client to server directly fro.
  13. Asija Satya P. (1641 Cumberland St. ; Apt. 21 St. Paul MN 55117), Automated information input, storage, and retrieval system.
  14. Dyer Robert E. (Dunwoody GA) Carney Murray C. (Dunwoody GA), Billing recorder with non-volatile solid state memory.
  15. Wiedemer John D. (930 W. Forest Dr. Houston TX 77079), Billing system for computer software.
  16. Wiedemer John D. (930 W. Forest Dr. Houston TX 77079), Billing system for computer software.
  17. Wiedemer John D. (Houston TX), Billing system for computing software.
  18. Bloomberg Dan S. (Palo Alto CA), Binary image processing for decoding self-clocking glyph shape codes.
  19. Ehrsam William Friedrich (Hurley NY) Meyer Carl H. W. (Kingston NY) Powers Robert Lowell (West Hurley NY) Prentice Paul Norman (Hyde Park NY) Smith John Lynn (Woodstock NY) Tuchman Walter Leonard (Wo, Block cipher system for data security.
  20. Izumi Hideki D. (Saratoga CA) Beravol Devender R. (Santa Clara CA), Cartridge programming system.
  21. Rackman Michael I. (1710 Glenwood Rd. Brooklyn NY 11230), Cartridge-controlled system whose use is limited to authorized cartridges.
  22. Matyas Stephen M. (Kingston NY) Oseas Jonathan (Hurley NY), Code protection using cryptography.
  23. Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
  24. Ross Ron (P.O. Box 175 Princeton Junction NJ 08550), Computer program protection method.
  25. Barnsdale ; Jr. William J. (West Sacramento CA) Ford Frank G. (Sacramento CA), Computer security device.
  26. Johnstone ; Richard, Computer software security system.
  27. Joshi Bhagirath S. (11 Sheffield Rd. Waltham MA 02154), Computer software security system.
  28. Ikeda Kazuhiko (Yokohama JPX) Kawamura Makoto (Tokyo JPX), Computer system capable of interruption using special protection code for write interruption region of memory device.
  29. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus for creating and using program authorization information data structures.
  30. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus having program authorization information data structures.
  31. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  32. Talati Kirit K. (207 Sun Ray La. Sunnyvale TX 75102), Control system and method for direct execution of software application information models without code generation.
  33. Narasimhalu Arcot D. (Singapore SGX) Wang Weiguo (Singapore SGX) Kankanhalli Mohan S. (Singapore SGX), Controlled dissemination of digital information.
  34. Stearns Richard G. (Mountain View CA) Hecht David L. (Palo Alto CA) Bloomberg Dan S. (Palo Alto CA), Convolution filtering for decoding self-clocking glyph shape codes.
  35. Guglielmino Paul (734 Marble Way Boca Raton FL 33432), Copyprotecting system for software protection.
  36. Egendorf, Harris H., Counting computer software cartridge.
  37. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Crypto microprocessor for executing enciphered programs.
  38. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Crypto microprocessor that executes enciphered programs.
  39. Best Robert M. (16016 - 9th Ave. NE. Seattle WA 98155), Crypto microprocessor using block cipher.
  40. Best Robert M. (16016 Ninth Ave. Northeast Seattle WA 98155), Cryptographic decoder for computer programs.
  41. Matyas Stephen M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Prymak Rostislaw (Dumfries VA) Martin William C. (Concord NC) Rohland William S. (Charlotte NC) Wilkins John D. , Cryptographic facility environment backup/restore and replication in a public key cryptosystem.
  42. Kirschner Wallace (Trumbull CT) Haskel Lawrence M. (Danbury CT), Data access system wherein subscriber terminals gain access to a data bank by telephone lines.
  43. Cookson Christopher J. (Los Angeles CA) Ostrover Lewis S. (Los Angeles CA), Data block format for software carrier and player therefor.
  44. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  45. Davida George I. (Whitefish Bay WI) Wells David L. (Milwaukee WI) Kam John B. (New York NY), Database encryption and decryption circuit and method using subkeys.
  46. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  47. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  48. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  49. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  50. Mary Jean (Orsay FRX), Device for insertion of digital packets in a transmission channel.
  51. Best Robert M. (16016 9th N.E. Seattle WA 98155), Dialog between TV movies and human viewers.
  52. Lumley Robert M. (Lawrence Township ; Mercer County NJ), Digital computer having code conversion apparatus for an encrypted program.
  53. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Digital document time-stamping with catenate certificate.
  54. Moskowitz Scott A. (#503 City Fukazawa 3-5-10 Fukazawa Setagaya-ku Tokyo 158 JPX), Digital information commodities exchange.
  55. Moskowitz Scott A. (3-5-10 Fukazawa Setagaya-ku ; Tokyo 158 JPX), Digital information commodities exchange.
  56. Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
  57. Taub Jack R. (Vienna VA) Hills Michael T. (Silver Spring MD), Education utility.
  58. Yamamoto Kenichi (Kawasaki JPX) Kimura Yoshihisa (Oomiya JPX) Yamamoto Yasuhide (Tokyo JPX), Electronic automatic offer matching system for freezer exchange transactions among banks.
  59. Hamano Koichi (Shizuoka JPX) Morimoto Takao (Shizuoka JPX) Watanabe Junko (Shizuoka JPX) Ono Kaoru (Shizuoka JPX) Yagi Norio (Shizuoka JPX), Electronic cash register with removable memory packs for cashier identification.
  60. Daniele Joseph J. (Pittsford NY), Electronic copyright royalty accounting system using glyphs.
  61. Jacoby Edward A. (Santa Clara CA), Electronic data processing security system and method.
  62. Deming Gilbert R. (7853 25th Ave. Kenosha WI 53140), Electronic funds transfer system.
  63. Baldwin Harry L. (Rochester MN) Bergschneider Beryl D. (Rochester MN) Chamoff Martin E. (Austin TX) Miller Irving L. (Pine Island MN) Piller Don W. (Austin TX) Robinett Max J. (Rochester MN) Thorson , Electronic point-of-sale system using direct-access storage.
  64. Rosen Sholom S. (New York NY), Electronic ticket presentation and transfer method.
  65. Rosen Sholom S. (New York NY), Electronic-monetary system.
  66. Rosen Sholom S. (New York NY), Electronic-monetary system.
  67. Kennedy Stanley P. (34 Greenmeadow Dr. Timonium MD 21093), Energy utilization or consumption recording arrangement.
  68. Hecht David L. (Palo Alto CA) Stearns Richard G. (Mountain View CA), Explicit synchronization for self-clocking glyph codes.
  69. Atalla Martin M. (Atherton CA), File access security method and means.
  70. Wyman Robert M. (Kirkland WA), Filters in license management system.
  71. Desai Mahendrakumar D. (Colonia NJ) Henderson Drew (Georgetown CT), Foodstuff vending apparatus employing improved solid-state type control apparatus.
  72. Hecht David L. (Palo Alto CA) Petrie Glen W. (San Jose CA), Global addressability for self-clocking glyph codes.
  73. Rhoads Geoffrey B., Graphics processing system employing embedded code signals.
  74. Comerford Liam D. (Carmel NY) White Steve R. (Mt. Kisco NY), Hardware key-on-disk system for copy-protecting magnetic storage media.
  75. Wiedemer John D. (Houston TX), High security pay television system.
  76. Moore James W. (Potomac MD), Hybrid encryption method and system for protecting reusable software components.
  77. Rhoads Geoffrey B., Identification/authentication system using robust, distributed coding.
  78. Rhoads Geoffrey B., Image steganography system featuring perceptually adaptive and globally scalable signal embedding.
  79. Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Implementing a shared higher level of privilege on personal computers for copy protection of software.
  80. Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Implementing a shared higher level of privilege on personal computers for copy protection of software.
  81. Nolan ; Jr. Thomas J. (Mahopac NY), Implementing privilege on microprocessor systems for use in software asset protection.
  82. Reilly James P. ; Hassett Gregory P., Information and advertising distribution system and method.
  83. Sprague Peter J. (249 Undermountain Rd. Lenox MA 02140) Lipscomb Thomas H. (145 E. 74th St. New York NY 10021), Information distribution system.
  84. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
  85. Shavit Eyal (New York NY) Teichner Lester (Chicago IL), Interactive market management system.
  86. Maher David P. (Windham NH), Key management scheme for use with electronic cards.
  87. Wyman Robert M. (Kirkland WA), License document interchange format for license management system.
  88. Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
  89. Mazur ; Richard A., Machine control system with machine serializing and safety circuits.
  90. Suzuki Hitoshi (Owariasahi JPX) Takahashi Shigekatsu (Ayase JPX) Fujioka Yoshiki (Owariasahi JPX), Memory protection system for effecting alteration of protection information without intervention of control program.
  91. Gerard Roger E. J. (Chelmsford GB2), Message signal scrambling apparatus.
  92. Katznelson Ron D. (San Diego CA), Metering retrieval of encrypted data stored in customer data retrieval terminal.
  93. Jablon David P. (Shrewsbury MA) Hanley Nora E. (Shrewsbury MA), Method and apparatus for assessing integrity of computer system software.
  94. Freeny ; Jr. ; Charles C., Method and apparatus for automatically monitoring objects.
  95. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Method and apparatus for creating, supporting, and using travelling programs.
  96. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Method and apparatus for creating, supporting, and using travelling programs.
  97. Bender Walter (Auburndale MA) Morimoto Norishige (Tokyo JPX) Gruhl Daniel (Cambridge MA), Method and apparatus for data hiding in images.
  98. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Method and apparatus for marking the information content of an information carrying signal.
  99. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Method and apparatus for marking the information content of an information carrying signal.
  100. Anderson David R. (Cupertino CA) Palevich Jack H. (Sunnyvale CA) Schaeffer Arnold (Belmont CA) Rosenstein Larry S. (Santa Clara CA) Watanabe Ryoji (Cupertino CA), Method and apparatus for processing a display document utilizing a system level document framework.
  101. Chou, Wayne W.; Erett, Richard E., Method and apparatus for protecting computer software utilizing an active coded hardware device.
  102. Thomas David C. (Mesa AZ), Method and apparatus for providing security for computer software.
  103. Hornbuckle Gary D. (Pebble Beach CA), Method and apparatus for remotely controlling and monitoring the use of computer software.
  104. Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Method and apparatus for retrieving secure information from mass storage media.
  105. Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Method and apparatus for retrieving selected information from a secure information source.
  106. Rhoads Geoffrey B., Method and apparatus for robust information coding.
  107. Flores Carlos F. (Berkeley CA) Ludlow Juan J. (Lomas de Santa Fe CA MXX) Bell ; III Chauncey F. (San Rafael CA) Mora Raul M. (Tlalpan CA MXX) Winograd Terry A. (Stanford CA) Graves Michael J. (Alamed, Method and apparatus for structuring and managing human communications by explicitly defining the types of communication.
  108. Flores Carlos F. (Berkeley CA) Ludlow Juan J. (Mexico City CA MXX) Bell ; III Chauncey F. (Alameda CA) Mora Raul M. (Tlalpan CA MXX) Winograd Terry A. (Stanford CA) Graves Michael J. (Alameda CA), Method and apparatus for structuring and managing human communications by explicitly defining the types of communication.
  109. LeTourneau Jack J., Method and apparatus for the generation and manipulation of data structures.
  110. Fischer Addison M., Method and apparatus for validating travelling object-oriented programs with digital signatures.
  111. Rhoads Geoffrey B., Method and apparatus responsive to a code signal conveyed through a graphic image.
  112. Heffron Charles B. (Knoxville TN) Lenarduzzi Roberto (Knoxville TN) Haken Jack E. (Danbury CT), Method and apparatus to secure proprietary operation of computer equipment.
  113. Mollier Jean (Bougival FRX), Method and device for protecting software delivered to a user by a supplier.
  114. Jones Gregory A. (Seattle WA) Price Robert M. (Seattle WA) Veghte William L. (Bellevue WA), Method and system for authenticating access to heterogeneous computing services.
  115. Brunner Hans (Denver CO) McCandless Timothy P. (Boulder CO) Sparks Randall B. (Louisville CO) Cuthbertson Robert J. (Boulder CO) Durand Jacques (Louisville CO) Fogel Steven M. (Denver CO), Method and system for generating a user interface adaptable to various database management systems.
  116. Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
  117. van den Hamer Peter (Eindhoven NLX) Treffers Menno A. (Eindhoven NLX), Method and system for organizing data.
  118. Block Robert S. (Marina Del Ray CA) Lull John M. (Fullerton CA), Method and system for remote reporting, particularly for pay television billing.
  119. Janis Frederick L. (Keller TX), Method and system for variable authority level user access control in a distributed data processing system having multip.
  120. Ugon Michel (Maurepas FRX) Oisel Andr (Elancourt FRX), Method for checking the integrity of a program or data, and apparatus for implementing this method.
  121. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
  122. Schull Jonathan (Haverford PA), Method for encouraging purchase of executable and non-executable software.
  123. Crozier Keith (Acton MA), Method for mapping, translating, and dynamically reconciling data between disparate computer platforms.
  124. Freeny ; Jr. Charles C. (Ft. Worth TX), Method for monitoring the location of monitored objects.
  125. Davis Derek L. (Phoenix AZ), Method for providing a roving software license from one node to another node.
  126. Griffeth Nancy D. (Westfield NJ) Velthuijsen Hugo (Den Haag NLX), Method for resolving conflicts among distributed entities through the generation of counter proposals by transversing a.
  127. Lipscomb Thomas H. (New York NY) Nagel Robert H. (New York NY), Method for retrieving secure information from a database.
  128. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Method for secure time-stamping of digital documents.
  129. Cook Sherri E. (Boca Raton FL) McNeill ; Jr. Andrew B. (Deerfield Beach FL), Method for selecting transmission speeds for transmitting data packets over a serial bus.
  130. Ugon Michel (Maurepas FRX), Method for signature of an information processing file, and apparatus for implementing it.
  131. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Method of extending the validity of a cryptographic certificate.
  132. Merkle Ralph C. (Mountain View CA), Method of providing digital signatures.
  133. Cina ; Jr. Vincent J. (Spring Valley NY), Method to prevent use of incorrect program version in a computer system.
  134. Hecht David L. (Palo Alto CA), Methods and means for reducing bit error rates in reading self-clocking glyph codes.
  135. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Microprocessor for executing enciphered programs.
  136. Ugon Michel (Maurepas FRX) Guillou Louis (Bourgbarre FRX), Microprocessor intended particularly for executing the calculation algorithms of a public code encoding system.
  137. Bond, Charles R.; Sturtevant-Stuart, Ronald M., Multiple system disk.
  138. Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
  139. Sprecher Jerry W. (Danville CA) Winters ; Jr. Donald J. (Danville CA) Rajwany Amirali S. (Walnut Creek CA) Dodson Michael W. (Walnut Creek CA) Penning Gene R. (Antioch CA) Harrington Darryl F. (Pitts, Network management system.
  140. Freeny ; Jr. Charles C. (Fort Worth TX), Object monitoring method and apparatus.
  141. Lee Henry (Austin TX), Object-oriented cell directory database for a distributed computing environment.
  142. Goldsmith Amy M. (Los Gatos CA) Goldsmith David B. (Los Gatos CA) Pettus Christopher E. (San Francisco CA), Object-oriented remote procedure call networking system.
  143. Kuhar Eugene (Boca Raton FL) Smith Donald L. (Boca Raton FL), Operator controlled programmable keyboard apparatus.
  144. Yamaki Masayo (Tokyo JPX), Password processing system for computer.
  145. Blandford Robert R. (1809 Paul Spring Rd. Alexandria VA 22307), Personal computer diary.
  146. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Personal date/time notary device.
  147. Brobeck William M. (Orinda CA) Givins ; Jr. John S. (Berkeley CA) Meads ; Jr. Philip F. (Oakland CA) Thomas Robert E. (Walnut Creek CA), Point-of-sale system and apparatus.
  148. Paulini Werner (Salzkotten DEX) Wessel Dietmar (Delbrck DEX), Process for securing and for checking the integrity of the secured programs.
  149. Force Gordon (San Jose CA) Davis Timothy D. (Arlington TX) Duncan Richard L. (Bedford TX) Norcross Thomas M. (Arlington TX) Shay Michael J. (Arlington TX) Short Timothy A. (Duncanville TX), Programmable distributed personal security.
  150. Mayer Robert T. (Rye NY), Protected programmable apparatus.
  151. Pailen William (Derwood MD) Harper Jim L. (Olney MD), Protected software access control apparatus and method.
  152. Alsberg Peter (Urbana IL), Protector system for computer access and use.
  153. Fischer Addison M. (60 14th Ave. S. Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  154. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  155. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  156. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.
  157. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.
  158. Freeny ; Jr. Charles C. (P.O. Box 9811 Ft. Worth TX 76107), Quantized hyperbolic and inverse hyperbolic object location system.
  159. Hecht David L. (Palo Alto CA) Flores L. Noah (Soquel CA) Petrie Glen W. (San Jose CA) Webster Thomas M. (Mountain View CA), Random access techniques for use with self-clocking glyph codes.
  160. Goldberg Robert N. (Redwood City CA) Jirak Gregory A. (La Honda CA), Relational database management system and method for storing, retrieving and modifying directed graph data structures.
  161. Izumi Hideki D. (Saratoga CA) Terrell Paul J. (Saratoga CA), Reprogrammable cartridge memory with built-in identification circuitry and programming method.
  162. Davis Derek L. (Phoenix AZ), Roving software license for a hardware agent.
  163. Forman Aubry S. (Toledo OH) Schultz ; Jr. Charles A. (Gainesville FL) Schultz John F. (Gainesville FL), Secure SCA broadcasting system including subscriber actuated portable receiving terminals.
  164. Maher David P. (Windham NH), Secure communication method and apparatus.
  165. Boebert William E. (Minneapolis MN) Kain Richard Y. (Minneapolis MN), Secure data processing system architecture with format control.
  166. Shurts Scott A. (Walnut Creek CA), Secure multi-level system for executing stored procedures.
  167. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  168. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  169. Faucher David W. (Salem NH) Heer Daniel N. (Salem NH) Kaplan Michael M. (Rockport MA) Maher David P. (Windham NH), Secure telecommunications.
  170. Forman ; Jr. Aubry S. (Toledo OH) Schultz ; Jr. Charles A. (Gainsville FL) Vice William E. (Gainsville FL), Secure two channel SCA broadcasting system.
  171. Kleijne Theodoor A. (Dreumel NLX) Goossens Jan B. (De Bilt NLX), Security device for stored sensitive data.
  172. Bright Herbert S. (Bethesda MD) Enison Richard L. (San Pablo CA), Security system for data processing.
  173. Allen Michael J. (St. Charles IL) Langlois John (Cary IL), Security system for microcomputers.
  174. Kadison Eric M. (Mission Viejo CA) Batra Subhash C. (Mission Viejo CA) Meir Gad E. (San Jose CA), Selectable format computer disk copier machine.
  175. Gilhousen Klein S. (San Diego CA) Heller Jerrold A. (San Diego CA) Van Harding Michael (San Diego CA) Blakeney ; II Robert D. (Del Mar CA), Selective-subscription descrambling.
  176. Zhang Xiao B. (Foster City CA), Self-clocking glyph code for encoding dual bit digital values robustly.
  177. Dyer Landon M. ; Welland Robert V., Self-describing object providing dynamic manipulation of heterogeneous data values and semantic identity between memory.
  178. Harvey George A. (Maynard MA) Koning Gerard (Brookline NH) Hawe William (Pepperell MA) Lauck Anthony (Wellesley MA) Oran David (Bloomington IN) Harper John (Basingstoke GB2) Miles Kevin (Reading GB2), Session control in network for digital data processing system which supports multiple transfer protocols.
  179. Chernow Fred (360 Kiowa Pl. Boulder CO 80303) Peterson Randy J. (1330 Arapahoe St. Boulder CO 80302), Software distribution system.
  180. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  181. Parrish Jeff W. (Los Altos CA) Maghoul Farzin (Hayward CA) Thyagarajan P. (Campbell CA), Software project history database and method of operation.
  182. Chorley Bernard J. (Hampton GB2) Parkin Graeme I. P. (London GB2) Wichmann Brian A. (Woking GB2) Elsom Simon M. (Feltham GB2), Software protection device.
  183. Pickholtz Andrew (Fairfax VA), Software protection method and apparatus.
  184. Donald Thomas C. (2651 Rillwood Rd. Birmingham AL 35243) Donald Henry W. (428 Lakewood Dr. Homewood AL 35209), Software protection system.
  185. Chandra Ashileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocess.
  186. William Tobin (Stamford CT), Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storag.
  187. Taaffe James L. (74 Appleton St. Arlington MA 02174), Software security method and systems.
  188. Herman Morton B. (Huntington Station NY), Software security method using partial fabrication of proprietary control word decoders and microinstruction memories.
  189. Ketcham Larry R. (Laguna Niguel CA), Software security system for maintaining integrity of compiled object code by restricting users ability to define compil.
  190. Kobus ; Jr. Paul (Phoenix AZ), Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes f.
  191. Schmidt, Eric E.; Lampson, Butler W., Software version management system.
  192. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  193. Moskowitz Scott A. (Tokyo JPX) Cooperman Marc (Palo Alto CA), Steganographic method and device.
  194. Rhoads Geoffrey B. (West Linn OR), Steganography methods employing embedded calibration data.
  195. Dolphin Janet L. (Milpitas CA), System and method for access control for portable data storage media.
  196. Mitchell Herman (Lithonia GA) Rich William L. (Charlotte NC) Shackelford Floyd W. (Beauford GA), System and method for importing and exporting data between an object oriented computing environment and an external comp.
  197. Erickson John S., System and method for managing copyrighted electronic media.
  198. McManis Charles E., System and method for protecting use of dynamically linked executable modules.
  199. Scott Kirk M. (San Francisco CA) Dickinson Robert D. (Hayward CA) Nguyen Frank T. (Campbell CA) Watanabe Ryoji (Cupertino CA), System and method of processing documents with document proxies.
  200. Chiba Takashi (Kawasaki JPX) Koga Satoru (Kawasaki JPX) Senda Minji (Yokohama JPX), System for controlling key storage unit which controls access to main storage.
  201. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
  202. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  203. Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
  204. Thuraisngham Bhavani M. (209 Katardin Rd. Lexington MA 02173) Ford William R. B. (13 Coach Rd. Billerica MA 01862) Collins Marie S. (4452 Wordsworth Rd. Plano TX 75093) O\Keeffe Jonathan P. (70 JFK B, System for multilevel secure database management using a knowledge base with release-based and other security constraint.
  205. Janis Frederick L. (Keller TX) Williams Marvin L. (Lewisville TX) Wang Diana S. (Trophy Club TX), System for recording at least one selected activity from a selected resource object within a distributed data processing.
  206. Freeny ; Jr. Charles C. (Fort Worth TX), System for reproducing information in material objects at a point of sale location.
  207. Mori Ryoichi (Tokyo JPX), System for storing history of use of programs including user credit data and having access by the proprietor.
  208. Guillou Louis C. (Bourgbarre FRX), System for transmitting information provided with means for controlling access to the information transmitted.
  209. Volk Larry N. (3320 Royce Ct. Las Vegas NV), System for vending program cartridges which have circuitry for inhibiting program usage after preset time interval expir.
  210. Michener John R. (Princeton NJ) Samit Benjamin (Princeton NJ), System method and apparatus for authenticating an encrypted signal.
  211. Rubin Robert J. (Richardson TX), Systems and methods for protecting software from unlicensed copying and use.
  212. Mori Ryoichi (24-12 ; Hakusan 1-chome Bunkyo-ku ; Tokyo JPX), Tamper resistant module having logical elements arranged in multiple layers on the outer surface of a substrate to prote.
  213. Guillou Louis C. (Bourgbarre-Saint Erblon FRX), Text video-transmission system provided with means for controlling access to the information.
  214. Anderson Thomas G. (Los Altos CA) Boothroyd William A. (San Jose CA) Frey Richard C. (San Jose CA), Transaction execution system with secure data storage and communications.
  215. Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC), Transaction system security method and apparatus.
  216. Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC), Transaction system security method and apparatus.
  217. Boothroyd William A. (San Jose CA) Sorensen Boyd W. (San Jose CA), Transaction terminal with unlimited range of functions.
  218. Stringer John W. (Santa Cruz CA) Richards Theodore S. (Los Gatos CA), Transformation of ephemeral material.
  219. Rosen Sholom S. (New York NY), Trusted agents for open electronic commerce.
  220. Abraham Dennis G. (Concord NC) Henningsmeyer Daniela (Stuttgart VA DEX) Hudson John M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Stevens Jam, User defined function facility.
  221. Cohen Jason M. (20 Skookwams Ct. West Islip NY 11795), Video communications system having a remotely controlled central source of video and audio data.
  222. Smith ; III Jay (Pacific Palisades CA), Video game cartridge recognition and security system.

이 특허를 인용한 특허 (1081)

  1. Shimmitsu, Masaru; Okayasu, Naoaki, Access control method, server device, and storage device.
  2. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., Accessing protected content in a rights-management architecture.
  3. Gruber, Thomas R.; Sabatelli, Alessandro F.; Aybes, Alexandre A.; Pitschel, Donald W.; Voas, Edward D.; Anzures, Freddy A.; Marcos, Paul D., Actionable reminder entries.
  4. Gruber, Thomas Robert; Cheyer, Adam John; Guzzoni, Didier Rene; Brigham, Christopher Dean; Giuli, Richard Donald; Bastea-Forte, Marcello; Saddler, Harry Joseph, Active input elicitation by intelligent automated assistant.
  5. Gruber, Thomas Robert; Sabatelli, Alessandro F.; Aybes, Alexandre A.; Pitschel, Donald W.; Voas, Edward D.; Anzures, Freddy A.; Marcos, Paul D., Active transport based notifications.
  6. Harris,Adam P.; Schneider,Steve C., Active validation of network devices.
  7. Ansell, Steven T.; Cherenson, Andrew R.; Rishniw, Leon; Cannon, Susan A.; Allard, Edward J.; Brownell, Jason S.; Stroud, Micah, Adaptable security mechanism for preventing unauthorized access of digital data.
  8. Ansell, Steven T.; Cherenson, Andrew R.; Rishniw, Leon; Cannon, Susan A.; Allard, Edward J.; Brownell, Jason S.; Stroud, Micah, Adaptable security mechanism for preventing unauthorized access of digital data.
  9. Rottler, Benjamin A.; Lindahl, Aram M.; Haughay, Jr., Allen Paul; Ellis, Shawn A.; Wood, Jr., Policarpo Bonilla, Adaptive audio feedback system and method.
  10. Steven M. Hoffberg ; Linda I. Hoffberg-Borghesani, Adaptive pattern recognition based control system and method.
  11. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  12. Hodge, Stephen L.; Darring-Collins, Catherine Rose; Marino, Dominick, Alarm control for inmate call monitoring.
  13. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  14. Dorwin, David Kimbal; Colwell, Aaron James; Scherkus, Andrew Martin; Galligan, Francis, Allowing degraded play of protected content using scalable codecs when key/license is not obtained.
  15. Mason, Henry, Analyzing audio input for efficient speech and music recognition.
  16. Ronning,Joel A.; Wical,Kelly J., Apparatus and method for adaptive fraud screening for electronic commerce transactions.
  17. Katz, Donald R.; Lau, Edwin J.; Mott, Timothy; Brenneman, Scott A.; Jun, Benjamin Che-Ming; Pai, Samuel Hong-Yen, Apparatus and method for authoring and maintaining a library of content and targeting content to a playback device.
  18. Candelore, Brant L.; Zustak, Frederick J., Apparatus and method for replacing a broadcasted advertisement based on both heuristic information and attempts in altering the playback of the advertisement.
  19. Ronning, Joel A.; Wical, Kelly J., Apparatus and method for secure downloading of files.
  20. Loomis, Stephen; Gondhalekar, Mangesh Madhukar, Apparatus and method for skipping songs without delay.
  21. Elazar, Gidon; Harkabi, Dan; Weingarten, Nehemiah, Apparatus for transferring licensed digital content between users.
  22. Isozaki, Hiroshi; Ishihara, Atsushi; Kato, Taku; Kambayashi, Toru; Matsukawa, Shinichi, Apparatus, method, and computer program product for recording content.
  23. Isozaki, Hiroshi; Ishihara, Atsushi; Kato, Taku; Kambayashi, Toru; Matsukawa, Shinichi, Apparatus, method, and computer program product for recording content.
  24. Elazar, Gidon; Harkabi, Dan; Weingarten, Nehemiah, Apparatus, system and method for securing digital documents in a digital appliance.
  25. Elazar, Gidon; Harkabi, Dan; Weingarten, Nehemiah, Apparatus, system and method for securing digital documents in a digital appliance.
  26. Kollmyer,Brad; Baker,Brian; Shapiro,Eric; Kollmyer,Aric; Rutman,Mike; MacLean,Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Apparatus, system and method for selectively encrypting different portions of data sent over a network.
  27. Jogand-Coulomb, Fabrice; Sharghi, Farshid Sabet; Qawami, Bahman, Apparatuses for binding content to a separate memory device.
  28. Jerram, Andrew Peter Nelson; McMahon, Frederick Francis, Apparatuses, methods and systems for a digital conversation management platform.
  29. Jerram, Andrew Peter Nelson; McMahon, Frederick Francis, Apparatuses, methods and systems for a digital conversation management platform.
  30. Jerram, Andrew Peter Nelson; McMahon, Frederick Francis, Apparatuses, methods and systems for a digital conversation management platform.
  31. Jerram, Andrew Peter Nelson; McMahon, Frederick Francis, Apparatuses, methods and systems for a digital conversation management platform.
  32. Ben-Itzhak, Yuval, Application layer security method and system.
  33. Dorwin, David Kimbal, Application-driven playback of offline encrypted content with unaware DRM module.
  34. Dorwin, David Kimbal, Application-driven playback of offline encrypted content with unaware DRM module.
  35. Ben Itzhak,Yuval, Application-layer security method and system.
  36. Huang, Rongqing; Oparin, Ilya, Applying neural network language models to weighted finite state transducers for automatic speech recognition.
  37. Tolson, Michael; Arnulfo, Jean-Christophe; Rive, Brice, Architecture for a system of portable information agents.
  38. Tolson, Michael; Arnulfo, Jean-Christophe; Rive, Brice, Architecture for a system of portable information agents.
  39. Tolson,Michael; Arnulfo,Jean Christophe; Rive,Brice, Architecture for a system of portable information agents.
  40. Narin, Attila; DeMello, Marco A.; Yaacovi, Yoram; Alger, Jeffrey A.; Keely, Leroy B.; Silver, David Michael; Madonna, Christopher Robert Richard; Beezer, John; Hughes, Kathryn E., Architecture for an electronic shopping service integratable with a software application.
  41. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Malik,Prashant; Hughes,Kathryn E.; Byrum,Frank D., Asynchronous communication within a server arrangement.
  42. Lampson,Butler W.; DeTreville,John D.; England,Paul, Attesting to a value of a register and/or memory region.
  43. Bull, William; Rottler, Ben; Schiller, Jonathan A., Audio user interface.
  44. Rottler, Benjamin; Rogers, Matthew; James, Bryan J.; Wood, Policarpo; Hannon, Timothy, Audio user interface for displayless electronic device.
  45. Ahlberg, Axel H.; Becar, Allyn P.; Brand, Gregory L.; Fenley, Douglas B.; Jones, Chester L.; Wyrick, Robert E., Authentication and entitlement for users of web based data management programs.
  46. Kitamura, Yoshiharu, Authored data providing method, system and computer-readable recording medium for performing said method.
  47. Hahn-Carlson, Dean W.; Beck, Elizabeth A.; Suits, David A., Automated transaction accounting processing engine and approach.
  48. Hahn Carlson, Dean W., Automated transaction processing system and approach.
  49. Hahn-Carlson, Dean W., Automated transaction processing system and approach.
  50. Hahn-Carlson, Dean W.; Bailey, William H.; Pogue, James B., Automated transaction processing system and approach with currency conversion.
  51. Nallasamy, Udhyakumar; Kajarekar, Sachin S.; Paulik, Matthias; Seigel, Matthew, Automatic accent detection using acoustic models.
  52. Edwards, Eric; Fisher, Clay Harvey, Automatic color adjustment of a template design.
  53. Edwards, Eric; Fisher, Clay Harvey, Automatic color adjustment of a template design.
  54. Edwards, Eric; Fisher, Clay Harvey, Automatic color adjustment of a template design.
  55. Edwards, Eric; Fisher, Clay Harvey, Automatic color adjustment of a template design.
  56. Edwards,Eric; Fisher,Clay Harvey, Automatic color adjustment of a template design.
  57. Fisher, Clay Harvey; Edwards, Eric, Automatic color adjustment of a template design.
  58. Fisher, Clay Harvey; Edwards, Eric, Automatic color adjustment of template design.
  59. Davidson, Douglas R.; Ozer, Ali, Automatic language identification for dynamic text processing.
  60. Winer, Morgan, Automatic supplementation of word correction dictionaries.
  61. Giuli, Richard D.; Treadgold, Nicholas K., Better resolution when referencing to concepts.
  62. Giuli, Richard D.; Treadgold, Nicholas K., Better resolution when referencing to concepts.
  63. Igarashi,Yoichiro; Hamasaki,Chizu; Taniguchi,Hiroyuki; Takase,Masaaki; Kakemizu,Mitsuaki; Wakamoto,Masaaki, Billing system, and device constituting same.
  64. Peinado, Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  65. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  66. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  67. Peinado, Marcus, Binding a digital license to a portable or the like in a digital rights management (DMR) system and checking out/checking in the digital license to/from the portable device or the like.
  68. Lampson, Butler W.; DeTreville, John D.; England, Paul, Boot blocks for software.
  69. Vannier, Eric; Dorwin, David Kimbal, Browser/web apps access to secure surface.
  70. Naik, Devang K.; Mohamed, Ali S.; Chen, Hong M., Caching apparatus for serving phonetic pronunciations.
  71. Wheeler, Thomas T., Calling a second functionality by a first functionality.
  72. Case, Sr., Paul, Case secure computer architecture.
  73. Case, Sr., Paul, Case secure computer architecture.
  74. Satyavolu, Ramakrishna, Categorization of summarized information.
  75. England, Paul, Client-side boot domains and boot rules.
  76. England, Paul, Client-side boot domains and boot rules.
  77. England,Paul, Client-side boot domains and boot rules.
  78. Bellegarda, Jerome R., Combined statistical and rule-based part-of-speech tagging for text-to-speech synthesis.
  79. Newendorp, Brandon J.; Dibiase, Evan S., Competing devices responding to voice triggers.
  80. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  81. Hauser, Robert R., Constructing an agent in a first execution environment using canonical rules.
  82. Hauser, Robert R., Constructing an agent that utilizes a compiled set of canonical rules.
  83. Hauser, Robert R., Constructing an agent that utilizes supplied rules and rules resident in an execution environment.
  84. Patoskie, John P., Construction of an agent that utilizes as-needed canonical rules.
  85. Hatano,Kouji; Terasaki,Satoshi, Content distributing system, content distributing service server, and community site server.
  86. Fransdonk, Robert W., Content distribution using set of session keys.
  87. Pestoni,Florian; Naor,Dalit, Content insurance.
  88. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  89. Stefik,Mark J., Content rendering device with usage rights.
  90. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  91. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  92. Williams, Shaun E.; Mason, Henry G.; Krishnamoorthy, Mahesh; Paulik, Matthias; Agrawal, Neha; Kajarekar, Sachin S.; Uguroglu, Selen; Mohamed, Ali S., Context-based endpoint detection.
  93. Gruber, Thomas R.; Pitschel, Donald W., Context-sensitive handling of interruptions.
  94. Larson, Anthony L.; Dave, Swapnil R.; Varoglu, Devrim, Context-sensitive handling of interruptions.
  95. van Os, Marcel, Context-sensitive handling of interruptions by intelligent digital assistant.
  96. Goger,Karl, Controlling access to electronic documents.
  97. Saito, Makoto, Controlling database copyrights.
  98. Saito, Makoto, Controlling database copyrights.
  99. Saito, Makoto, Controlling database copyrights.
  100. Michiels, Wilhelmus Petrus Adrianus Johannes; Gorissen, Paulus Mathias Hubertus Mechtildis Antonius, Controlling distribution of digital content.
  101. Cianciarulo, Krys; Cardot, Stephen C.; Weiseth, Thomas, Coverage for transmission of data apparatus and method.
  102. Wheeler, Thomas T., Creating a proxy object and providing information related to a proxy object.
  103. Gruber, Thomas R.; Cheyer, Adam J.; Pitschel, Donald W., Crowd sourcing information to fulfill user requests.
  104. Gruber, Thomas R.; Cheyer, Adam John; Pitschel, Donald W., Crowd sourcing information to fulfill user requests.
  105. Sherman LaCost ; Kenneth Presser ; Charles Edward Jones, Jr., Customer information storage and delivery system.
  106. Devine,Carol Y.; Shoulberg,Richard W.; Shifrin,Gerald A.; Pfister,Robert A.; Fenley,Douglas B.; Suscheck,Charles A.; Delano,P. Alex; Kennington,W. Russell; Brandt,Andre R.; Pillai,Sajan J.; Schwarz,Edward; Shamash,Arieh, Customer interface system for managing communications services including toll free services.
  107. Dorwin, David Kimbal, DRM provider interoperability.
  108. Bunney, William; Tetsuya, Kozo, Data communication system that transmits the selected contents and menu onto the network for delivery to the client computer.
  109. Saito, Makoto, Data copyright management.
  110. Saito, Makoto, Data copyright management.
  111. Saito, Makoto, Data copyright management system.
  112. Saito,Makoto, Data copyright management system.
  113. Saito, Makoto, Data management.
  114. Saito, Makoto, Data management system.
  115. Saito, Makoto, Data management system.
  116. Saito, Makoto, Data management system.
  117. Nonaka, Akira; Ezaki, Tadashi, Data processing apparatus, data processing system, and data processing method therefor.
  118. Nonaka, Akira; Ezaki, Tadashi, Data providing system and apparatus and methods of same.
  119. Nonaka,Akira; Ezaki,Tadashi, Data providing system, device, and method.
  120. Black, Gerald R, Data security system.
  121. Black, Gerald R., Data security system.
  122. Black, Gerald R., Data security system.
  123. Black, Gerald R., Data security system.
  124. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  125. Paley, Sasha; Boshover, Arik; Bychkov, Eyal; Ziv, Aran, Data storage device with multi-access capabilities.
  126. Brandt, Andre R.; Frueh, Barbara; Pillai, Sajan J.; Rehder, Karl; Shearer, Donald J., Data warehousing infrastructure for web based reporting tool.
  127. Harris, Adam P.; Schneider, Steve C., Defining new rules for validation of network devices.
  128. Harris, Adam P.; Schneider, Steve C., Defining new rules for validation of network devices.
  129. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  130. Dalton, Christopher I., Demonstrating integrity of a compartment of a compartmented operating system.
  131. Tandon, Vinod; Devore, Jake, Detecting lag switch cheating in game.
  132. Tandon, Vinod; Devore, Jake, Detecting lag switch cheating in game.
  133. Dorwin, David Kimbal; Scherkus, Andrew Martin, Detecting supported digital rights management configurations on a client device.
  134. Rhoten, George; Treadgold, Nicholas K., Determining domain salience ranking from ambiguous words in natural speech.
  135. Cheyer, Adam John; Brigham, Christopher Dean; Guzzoni, Didier Rene, Determining user intent based on ontologies of domains.
  136. Cheyer, Adam J., Device access using voice authentication.
  137. Cheyer, Adam John, Device access using voice authentication.
  138. Onno, Stephane; Heen, Olivier, Device and method for digital processing management of content so as to enable an imposed work flow.
  139. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  140. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  141. Piernot, Philippe P.; Binder, Justin G., Device voice control for selecting a displayed affordance.
  142. Carson, David A.; Keen, Daniel; Dibiase, Evan; Saddler, Harry J.; Iacono, Marco; Lemay, Stephen O.; Pitschel, Donald W.; Gruber, Thomas R., Device, method, and graphical user interface for enabling conversation persistence across two or more instances of a digital assistant.
  143. Fleizach, Christopher Brian; Gruber, Thomas Robert, Device, method, and user interface for voice-activated navigation and browsing of a document.
  144. Farrugia, Augustin J.; Fasoli, Gianpaolo; Riendeau, Jean-Francois, Device-independent management of cryptographic information.
  145. Lindahl, Aram; Wood, Policarpo, Devices and methods for identifying a prompt corresponding to a voice input in a sequence of prompts.
  146. Wallin, Lars, Digital asset authentication system and method.
  147. Raitio, Tuomo J.; Hunt, Melvyn J.; Richards, Hywel B.; Chinthakunta, Madhusudan, Digital assistant providing whispered speech.
  148. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  149. Saito, Makoto, Digital content management system and apparatus.
  150. Saito, Makoto, Digital content management system and apparatus.
  151. Saito, Makoto, Digital content management system and apparatus.
  152. Medina, Cesar; Gong, Qing; Milsted, Kenneth Louis, Digital content preparation system.
  153. Verosub,Ellis; Tenneti,Sanjeev; Acharya,Kamal; Goldfarb,Solomon D.; Pringle,Todd; Bill,David S.; Prakash,Shailesh; Milligan,Adam, Digital content store system.
  154. Vaidyanathan, Vijay; Kitze, Christopher Allin, Digital file marketplace.
  155. Corless, Peter P., Digital identifiers and digital identifier control systems for intellectual properties.
  156. James,Arthur; Brent,Michelle; Corless,Peter; Khera,Sanjay; Park,Soyoung, Digital license agreement.
  157. Dunkeld, Bryan; Lambert, Edward, Digital media asset conversion system and method.
  158. Dunkeld, Bryan; Lambert, Edward, Digital media asset identification system and method.
  159. Dunkeld, Bryan; Lambert, Edward, Digital media asset identification system and method.
  160. Rolf, Devon A., Digital media distribution system and method.
  161. James, Arthur; Brent, Michelle; Corless, Peter P.; Khera, Sanjay; Park, Soyoung, Digital rights framework.
  162. Lambert, Martin Richard, Digital rights management.
  163. Lambert,Martin R., Digital rights management.
  164. Boccon-Gibod, Gilles; Boeuf, Julien G., Digital rights management engine systems and methods.
  165. Boccon-Gibod, Gilles; Boeuf, Julien G., Digital rights management engine systems and methods.
  166. Boccon-Gibod, Gilles; Boeuf, Julien G.; Manente, Michael G.; Bradley, William B., Digital rights management engine systems and methods.
  167. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  168. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  169. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  170. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  171. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  172. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  173. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  174. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  175. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  176. England Paul ; DeTreville John D. ; Lampson Butler W., Digital rights management operating system.
  177. Koyata, Tomohiro; Konno, Taro, Digital signal processing apparatus, digital signal processing method, information center, and data delivery system.
  178. Koyata, Tomohiro; Konno, Taro, Digital signal processing apparatus, digital signal processing method, information center, and data delivery system.
  179. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  180. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  181. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  182. Henton, Caroline; Naik, Devang, Disambiguating heteronyms in speech synthesis.
  183. Guzzoni, Didier Rene; Cheyer, Adam John; Gruber, Thomas Robert; Brigham, Christopher Dean; Saddler, Harry Joseph, Disambiguation based on active input elicitation by intelligent automated assistant.
  184. Naito, Kikuo; Seto, Kunio; Ohshima, Hideaki; Mitani, Shigeyuki; Noguchi, Toshiyuki, Display and control of permitted data processing based on control information extracted from the data.
  185. Naito,Kikuo; Seto,Kunio; Ohshima,Hideaki; Mitani,Shigeyuki; Noguchi,Toshiyuki, Display and control of permitted data processing based on control information extracted from the data.
  186. Rinaldo DiGiorgio ; Michael S. Bender ; Anders Holm DK; Diana Neiman, Distributed budgeting and accounting system with secure token device access.
  187. Tsai, Daniel E., Distributed database schema.
  188. Wang, Feng Chi; Poulidis, Philip, Distributed digital rights management node module and methods for use therewith.
  189. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  190. Ionescu, Alexandru Catalin; Sreenivas, Giridhar, Dynamic binding of service on bearer.
  191. Hauser, Robert R., Dynamic determination of needed agent rules.
  192. Graham, Todd D.; Hudson, Jonathan C., Dynamic file access control and management.
  193. Boccon-Gibod, Gilles, Dynamic media zones systems and methods.
  194. Dorwin, David Kimbal, Dynamically changing stream quality of protected content based on a determined change in a platform trust.
  195. Dorwin, David Kimbal, Dynamically changing stream quality when user is unlikely to notice to conserve resources.
  196. Norman Ken Ouchi, E-mail based workflow systems and methods of distributing e-mail.
  197. Thompson Mitchell D. ; Gilson Jonathan C. ; Josephson Stanley M., Electronic check presentment systems and methods employing volatile memory datastore access techniques.
  198. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  199. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  200. Ronning,Joel A.; Wical,Kelly J., Electronic commerce system and method for detecting fraud.
  201. Wagner, Oliver P., Electronic device with text error correction based on voice recognition data.
  202. Wagner, Oliver P., Electronic device with text error correction based on voice recognition data.
  203. Lindahl, Aram M., Electronic devices with voice command and contextual data processing capabilities.
  204. Lindahl, Aram M., Electronic devices with voice command and contextual data processing capabilities.
  205. Lindahl, Aram M., Electronic devices with voice command and contextual data processing capabilities.
  206. Lindahl, Aram M., Electronic devices with voice command and contextual data processing capabilities.
  207. Katsurabayashi Hiroshi,JPX ; Tamaru Eriko,JPX ; Ohsawa Takashi,JPX ; Sasaki Shigehiko,JPX, Electronic information utilization promotion system.
  208. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution system.
  209. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution system.
  210. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution system.
  211. Manning,Damian Franken; Lowy,Jon Walter, Electronic media distribution system.
  212. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution systems.
  213. Galuten, Albhy; Radbel, Dmitry; Williams, Peter, Electronic music/media distribution system.
  214. Sullivan, Alan John, Electronic rental service system and method for digital content.
  215. Geoffrey B. Rhoads, Emulsion film media employing steganography.
  216. Rhoads, Geoffrey B., Emulsion products and imagery employing steganography.
  217. Peinado, Marcus; Venkatesan, Ramarathnam, Encrypting a digital object based on a key ID selected therefor.
  218. Peinado,Marcus; Venkatesan,Ramarathnam, Encrypting a digital object on a key ID selected therefor.
  219. Rush, Gary W.; Kiefus, Herman J.; Clapp, Christopher; Follett, Helen; Griffith, David, End-to-end transaction processing and statusing system and method.
  220. Janky, James M.; Schulhof, Nathan, Enhanced delivery of audio data for portable playback.
  221. Bellegarda, Jerome R., Entropy-guided text prediction using combined word and character n-gram language models.
  222. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda Irene, Ergonomic man-machine interface incorporating adaptive pattern recognition based control system.
  223. Pinkas, Binyamin; Haber, Stuart A.; Tarjan, Robert E.; Sander, Tomas, Establishing a secure channel with a human user.
  224. Pinkas, Binyamin; Haber, Stuart A.; Tarjan, Robert E.; Sander, Tomas, Establishing a secure channel with a human user.
  225. Pinkas,Binyamin; Haber,Stuart A.; Tarjan,Robert E.; Sander,Tomas, Establishing a secure channel with a human user.
  226. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  227. Homer, Gregg S., Even more subscription media on demand.
  228. Hauser, Robert R., Execution of a canonical rules based agent.
  229. Bellegarda, Jerome, Exemplar-based latent perceptual modeling for automatic speech recognition.
  230. Futrell, Richard L.; Gruber, Thomas R., Exemplar-based natural language processing.
  231. Futrell, Richard L.; Gruber, Thomas R., Exemplar-based natural language processing.
  232. Edwards, Warren K.; Dourish, James P.; Lamarca, Anthony G.; Lamping, John O.; Petersen, Karin; Salisbury, Michael F.; Terry, Douglas B.; Thornton, James D., Extending application behavior through active properties attached to a document in a document management system.
  233. Dorwin, David Kimbal, Extending browser functionality with dynamic on-the-fly downloading of untrusted browser components.
  234. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  235. Fung, Joseph Zhung Yee; Chancellor, Robert; DeMartini, Thomas; Nguyen, Mai; Ta, Thanh; Tieu, Vincent Hsiang; Tran, Duc; Valenzuela, Edgardo, Extensible rights expression processing system.
  236. Bellegarda, Jerome R.; Silverman, Kim E. A., Fast, language-independent method for user authentication by voice.
  237. Kortum, Philip Ted; Sullivan, Marc Andrew, Feedback for unavailable content.
  238. Haff, Maurice W.; Clarke, Christopher D., File transfer system.
  239. Haff,Maurice W.; Clarke,Christopher D., File transfer system.
  240. Haff, Maurice W.; Clarke, Christopher D., File transfer system for direct transfer between computers.
  241. Haff, Maurice W.; Clarke, Christopher D., File transfer system for direct transfer between computers.
  242. Hahn-Carlson, Dean W., Financial institution-based transaction processing system and approach.
  243. Hahn-Carlson, Dean W., Financial institution-based transaction processing system and approach.
  244. Neble, Rhyan; Anderson, Michael W., Flash memory distribution of digital content.
  245. Neble, Rhyan; Anderson, Michael W., Flash memory distribution of digital content.
  246. Neble, Rhyan; Anderson, Michael W., Flash memory distribution of digital content.
  247. Brooks, Cecil Ray; Girotto, Jay Robert; Gunyakti, Caglar; Haugen, Todd, Flexible licensing architecture for licensing digital application.
  248. Wille Thomas,DEX, Forgery prevention microcontroller circuit.
  249. Ouchi, Norman Ken, Form route manager for workflow systems and methods.
  250. Dupray, Dennis J.; Karr, Charles L., Gateway and hybrid solutions for wireless location.
  251. Gruber, Thomas R.; Sabatelli, Alessandro F.; Pitschel, Donald W., Generating and processing task items that represent tasks to perform.
  252. Hyypp��,Timo; Miettinen,Kari, Generating asymmetric keys in a telecommunications system.
  253. Harris, Adam P.; Schneider, Steve C., Generating rules for maintaining community integrity.
  254. England, Paul; Peinado, Marcus, Generating, migrating or exporting bound keys.
  255. Jon Scott Helmer ; Terry Lee Oehrke ; Steven Frank Davis ; Scott Christopher Wells, Geographic data replication system and method for a network.
  256. Dupray,Dennis J.; Karr,Charles L., Geographic location using multiple location estimators.
  257. Dupray, Dennis J.; Goldberg, Sheldon F., Geographically constrained network services.
  258. Dupray, Dennis J.; Goldberg, Sheldon F., Geographically constrained network services.
  259. Bae,Seongho, Green ice printout sorting and delivery program.
  260. Fleizach, Christopher Brian; Minifie, Darren C., Handling speech synthesis of content for multiple languages.
  261. Foo, Edwin W.; Hughes, Gregory F., Hearing assistance system for providing consistent human speech.
  262. Hazlehurst, Peter Alexander; Alvarez, Cindy, Host exchange in bill paying services.
  263. Lee, Walter W.; Milana, Joseph P.; Wilhelm, Wesley K.; Shao, Min, Identification and management of fraudulent credit/debit card purchases at merchant ecommerce sites.
  264. Lee,Walter W.; Milana,Joseph P.; Wilhelm,Wesley K.; Shao,Min, Identification and management of fraudulent credit/debit card purchases at merchant ecommerce sites.
  265. Black, Gerald R., Identify authentication device.
  266. Cahill,Conor P.; Wexelblat,David Eli; Aoki,Norihiro Edwin; Carriere,Jeromy; Roskind,James; Toomey,Christopher Newell, Identity based service system.
  267. Jonach,Kurt; Sato,Robert Jay; Tree,John, Image database jog/shuttle search.
  268. Edwards, Eric; Jonach, Kurt; Tree, John, Imaging service for automating the display of images.
  269. Peinado, Marcus; England, Paul, Implementation of memory access control using optimization.
  270. Peinado,Marcus; England,Paul, Implementation of memory access control using optimizations.
  271. Collins, Jeffrey M.; Martin, Margaret A., Individually deployable managed objects and system and method for managing the same.
  272. Deas, David A.; Suryanarayana, Lalitha; Stuckman, Bruce Edward; Wolter, David Randall; Muhamed, Rias; White, Russell William; Grannan, Michael, Information filling station facilitating wireless transfer of data content to a portable device or other pre-defined locations.
  273. Kamada,Tomihisa; Tanaka,Shun; Narukawa,Ryusuke, Information home electric appliance.
  274. Iwamura, Keiichi, Information processing apparatus, method therefor, computer program, and computer-readable storage medium.
  275. Kitaya, Yoshimichi; Kuriya, Shinobu, Information processing device, information processing method, and computer program.
  276. Kujirai, Yasuhiro, Information processing system, information processing device, control method therof, memory media having stored programs thereof and program thereof.
  277. Felsher, David Paul, Information record infrastructure, system and method.
  278. Carey, W. Knox; Nilsson, Jarl, Information security systems and methods.
  279. Carey, W. Knox; Nilsson, Jarl, Information security systems and methods.
  280. Ishibashi, Yoshihito; Oishi, Tateo; Matsuyama, Shinako; Asano, Tomoyuki; Muto, Akihiro; Kitahara, Jun, Information sending system, information sending device, information receiving device, information distribution system, information receiving system, information sending method, information receiving method, information distribution method, apparatus, sending method of information receiving device, playback method of apparatus, method of using contents and program storing medium.
  281. Ishibashi, Yoshihito; Oishi, Tateo; Matsuyama, Shinako; Asano, Tomoyuki; Muto, Akihiro; Kitahara, Jun, Information sending system, information sending device, information receiving device, information distribution system, information receiving system, information sending method, information receiving method, information distribution method, apparatus, sending method of information receiving device, playback method of apparatus, method of using contents and program storing medium.
  282. Sato, Jun; Watanabe, Keiko; Terauchi, Toru, Information terminal.
  283. Ishibashi,Yoshihito; Oishi,Tateo; Matsuyama,Shinako; Asano,Tomoyuki; Muto,Akihiro; Kitahara,Jun, Information transmission system, transmitter, and transmission method as well as information reception system, receiver and reception method.
  284. Hauser, Robert R, Initiating construction of an agent in a first execution environment.
  285. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  286. Jia,Zheng; Shen,Ji, Instruction/data protection employing derived obscuring instruction/data.
  287. Barry, B. Reilly; Chodoronek, Mark A.; DeRose, Eric; Devine, Carol Y.; Studness, Mark N.; James, Angela R.; Levy, Lynne; Tusa, Michael, Integrated business system for web based telecommunications management.
  288. Barry, B. Reilly; Chodoronek, Mark A.; DeRose, Eric; Gonzales, Mark N.; James, Angela R.; Levy, Lynne; Tusa, Michael, Integrated customer interface for web based data management.
  289. Devine, Carol Y.; Shoulberg, Richard W.; Shifrin, Gerald A.; Pfister, Robert A.; Fenley, Douglas B.; Suscheck, Charles A.; Delano, P. Alex; Kennington, W. Russell; Brandt, Andre R.; Pillai, Sajan J.;, Integrated customer interface system for communications network management.
  290. Baker, Thomas E.; Chaffee, Susan L.; Chen, Yuchien; Gruber, Charles J.; Fishman, Howard P., Integrated customer web station for web based call management.
  291. Baker, Thomas E.; Chaffee, Susan L.; Chen, Yuchien; Gruber, Charles J.; Fishman, Howard P., Integrated customer web station for web based call management.
  292. Baker,Thomas E.; Chaffee,Susan L.; Chen,Yuchien; Gruber,Charles J.; Fishman,Howard P., Integrated customer web station for web based call management.
  293. Combar, Curtis T.; Devine, Carol Y.; Pfister, Robert A., Integrated interface for real time web based viewing of telecommunications network call traffic.
  294. Christine M. Ditmer ; James DeGraf-Johnson ; Paul Glenn Franklin ; William C. Holford ; Randall W. King ; Patrick W. Pirtle ; Kenneth Joseph Qualls ; Diane J. Wells ; Edward Ronald Zack, Jr., Integrated proxy interface for web based alarm management tools.
  295. Christine M. Ditmer ; Randall W. King ; W. Russell Kennington ; Patrick W. Pirtle ; Diane J. Wells, Integrated proxy interface for web based broadband telecommunications management.
  296. Andre R. Brandt ; Sajan J. Pillai, Integrated proxy interface for web based data management reports.
  297. Devine, Carol Y.; Dollar, Tammy E.; Munguia, Wayne J.; Schwarz, Edward, Integrated proxy interface for web based report requester tool set.
  298. Delano, P. Alex; Devine, Carol Y.; Hall, Robert W.; Pfister, Robert A.; Venn, Garrison M., Integrated proxy interface for web based telecommunication toll-free network management using a network manager for downloading a call routing tree to client.
  299. Curtis T. Combar ; Robert A. Pfister, Integrated proxy interface for web based telecommunications management tools.
  300. Wayne J. Munguia ; Robert A. Pfister ; Charles A. Suscheck, Integrated proxy interface for web based telecommunications network management.
  301. Barry,B. Reilly; Chodoronek,Mark A.; DeRose,Eric; Gonzales,Mark N.; James,Angela R.; Levy,Lynne; Tusa,Michael, Integrated systems for providing communications network management services and interactive generating invoice documents.
  302. Dubagunta, Saikumar V., Integrating applications in multiple languages.
  303. Liu, Xian Jun; Chang, Robert C.; Yuan, Po; Wang, Junzhi; Barzilai, Ron; Qawami, Bahman; Sabet-Sharghi, Farshid, Integration of secure data transfer applications for generic IO devices.
  304. Corless, Peter P., Intellectual property over non-internet protocol systems and networks.
  305. Orr, Ryan M.; Nell, Garett R.; Brumbaugh, Benjamin L., Intelligent assistant for home automation.
  306. Gruber, Thomas Robert; Cheyer, Adam John; Kittlaus, Dag; Guzzoni, Didier Rene; Brigham, Christopher Dean; Giuli, Richard Donald; Bastea-Forte, Marcello; Saddler, Harry Joseph, Intelligent automated assistant.
  307. Gruber, Thomas Robert; Cheyer, Adam John; Kittlaus, Dag; Guzzoni, Didier Rene; Brigham, Christopher Dean; Giuli, Richard Donald; Bastea-Forte, Marcello; Saddler, Harry Joseph, Intelligent automated assistant.
  308. Os, Marcel Van; Saddler, Harry J.; Napolitano, Lia T.; Russell, Jonathan H.; Lister, Patrick M.; Dasari, Rohit, Intelligent automated assistant for TV user interactions.
  309. Van Os, Marcel; Saddler, Harry J.; Napolitano, Lia T.; Russell, Jonathan H.; Lister, Patrick M.; Dasari, Rohit, Intelligent automated assistant for TV user interactions.
  310. Orr, Ryan M.; Bernardo, Matthew P.; Mandel, Daniel J., Intelligent automated assistant for media exploration.
  311. Piersol, Kurt W.; Orr, Ryan M.; Mandel, Daniel J., Intelligent device arbitration and control.
  312. Hoffberg, Steven Mark, Intelligent electronic appliance system and method.
  313. Booker, Susan L.; Krishnan, Murali; Weinberg, Garrett L.; Piercy, Aimee, Intelligent list reading.
  314. McCaleb, Jed; Rive, Russel, Intelligent patch checker.
  315. McCaleb, Jed; Rive, Russel, Intelligent patch checker.
  316. McCaleb, Jed; Rive, Russel, Intelligent patch checker.
  317. McCaleb,Jed; Rive,Russel, Intelligent patch checker.
  318. Fleizach, Christopher Brian; Hudson, Reginald Dean, Intelligent text-to-speech conversion.
  319. Fleizach, Christopher Brian; Hudson, Reginald Dean, Intelligent text-to-speech conversion.
  320. Fleizach, Christopher Brian; Hudson, Reginald Dean, Intelligent text-to-speech conversion.
  321. Cheyer, Adam John; Guzzoni, Didier Rene; Gruber, Thomas Robert; Brigham, Christopher Dean, Intent deduction based on previous user interactions with voice assistant.
  322. DeMello, Marco A.; Zeman, Pavel; Krishnaswamy, Vinay; Byrum, Frank D., Inter-server communication using request with encrypted parameter.
  323. Kumar, Srihari; Desai, Satyen; Kelley, John; Hayward, Blake Earl; Scott, Jenny; Pandurangan, Senthil Kumar, Interactive activity interface for managing personal data and performing transactions over a data packet network.
  324. Golden, Steven M.; Levin, Hillel; Anderson, Bradley A.; Gentry, Gary D.; Barbour, James A.; Schornberg, Albert, Interactive marketing network and process using electronic certificates.
  325. Golden, Steven M.; Levin, Hillel; Anderson, Bradley A.; Gentry, Gary D.; Barbour, James A.; Schornberg, Albert, Interactive marketing network and process using electronic certificates.
  326. Lemay, Stephen O.; Sabatelli, Alessandro Francesco; Anzures, Freddy Allen; Chaudhri, Imran; Forstall, Scott; Novick, Gregory, Interface for a virtual digital assistant.
  327. Romansky,Brian M., Internet advertisement metering system and method.
  328. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  329. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  330. Alvin, Robert S., Internet business transaction processor.
  331. Alvin, Robert S., Internet business transaction processor.
  332. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Internet server access control and monitoring systems.
  333. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Internet server access control and monitoring systems.
  334. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  335. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  336. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  337. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  338. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  339. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  340. Cash, Jesse R.; Dave, Swapnil R.; Varoglu, Devrim, Interpreting and acting upon commands that involve sharing information with remote devices.
  341. Medvinsky, Alexander, Intrusion detection for object security.
  342. Harris, Adam P.; Schneider, Steve C., Invalidating network devices with illicit peripherals.
  343. Harris, Adam P.; Schneider, Steve C., Invalidating network devices with illicit peripherals.
  344. Harris, Adam P.; Schneider, Steve C., Invalidating network devices with illicit peripherals.
  345. Hahn-Carlson, Dean W., Inventory-based payment processing system and approach.
  346. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  347. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  348. Cargille, Jon; Verma, Surendra; Zbikowski, Mark J.; Bradshaw, Dexter P.; Johnson, James E.; Sivapragasam, Muhunthan; Malan, Steven J., Kernel-level transactions.
  349. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  350. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  351. Bellegarda, Jerome R.; Barman, Bishal, Language identification from short strings.
  352. Hatori, Jun; Yu, Dominic, Language input correction.
  353. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  354. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  355. England Paul ; DeTreville John D. ; Lampson Butler W., Loading and identifying a digital rights management operating system.
  356. Dupray, Dennis J.; Goldberg, Sheldon F.; Leblanc, Frederick W.; Karr, Charles L., Locating a mobile station and applications therefor.
  357. Dupray, Dennis J; LeBlanc, Frederick W; Karr, Charles L; Goldberg, Sheldon F, Locating a mobile station and applications therefor.
  358. Leblanc, Frederick W.; Dupray, Dennis J.; Karr, Charles L., Locating a mobile station and applications therefor.
  359. Karr, Charles L; LeBlanc, Frederick W.; Dupray, Dennis J., Locating a mobile station using a plurality of wireless networks and applications therefor.
  360. LeBlanc Frederick W. ; Dupray Dennis J. ; Karr Charles L., Location of a mobile station using a plurality of commercial wireless infrastructures.
  361. Harris, Adam P.; Schneider, Steve C., Maintaining community integrity.
  362. Cheyer, Adam John; Guzzoni, Didier Rene; Gruber, Thomas Robert; Brigham, Christopher Dean; Kittlaus, Dag, Maintaining context information between user interactions with a voice assistant.
  363. Hans,Mathieu C.; Sasaki,Gary D., Managing access to digital content.
  364. Sherwood, David; Walker, James William; Walton, Travis, Managing encryption keys in a computer system.
  365. Harris, Adam P.; Schneider, Steve C., Managing game metrics and authorizations.
  366. Harris, Adam P.; Schneider, Steve C., Managing game metrics and authorizations.
  367. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  368. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  369. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  370. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  371. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  372. Roskind, James A., Master key trust grants and revocations for minor keys.
  373. Roskind, James A., Master key trust grants and revocations for minor keys.
  374. Chang, Robert Chin-Tse; Hutton, Henry Ricardo; Sabet-Sharghi, Farshid; Tanik, Haluk Kent; Barzilai, Ron; Soffer, Meytal; Yan, Mei; Dwyer, Patricia; Yuan, Po; Qawami, Bahman, Media card command pass through methods.
  375. Chang, Robert Chin-Tse; Hutton, Henry Ricardo; Sabet-Sharghi, Farshid; Tanik, Haluk Kent; Barzilai, Ron; Soffer, Meytal; Yan, Mei; Dwyer, Patricia; Yuan, Po; Qawami, Bahman, Media card command pass through methods.
  376. Farrugia, Augustin J.; Fasoli, Gianpaolo; Toublet, Bertrand Mollinier; Ciet, Mathieu, Media storage structures for storing content, devices for using such structures, systems for distributing such structures.
  377. Farrugia, Augustin J.; Fasoli, Gianpaolo; Toublet, Bertrand Mollinier; Ciet, Mathieu, Media storage structures for storing content, devices for using such structures, systems for distributing such structures.
  378. Rassool,Reza; Worzel,William P.; Baker,Brian, Media tracking system and method.
  379. Skatter, Sondre; Tolson, Michael, Method and apparatus for a distributable globe graphical object.
  380. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  381. DeTreville, John, Method and apparatus for authenticating an open system application to a portable IC device.
  382. DeTreville,John, Method and apparatus for authenticating an open system application to a portable IC device.
  383. DeTreville,John D., Method and apparatus for authenticating an open system application to a portable IC device.
  384. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  385. Cheyer, Adam; Guzzoni, Didier, Method and apparatus for building an intelligent automated assistant.
  386. Cheyer, Adam; Guzzoni, Didier, Method and apparatus for building an intelligent automated assistant.
  387. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for client customization by executing software parts on plural servers.
  388. Ling,Marvin T, Method and apparatus for conducting electronic commerce transactions using electronic tokens.
  389. Ling,Marvin T, Method and apparatus for conducting electronic commerce transactions using electronic tokens.
  390. Ling,Marvin T., Method and apparatus for conducting electronic commerce transactions using electronic tokens.
  391. Rive Russell, Method and apparatus for configuring a hard disk and for providing support for a computer system.
  392. Ellenby, John; Ellenby, Peter Malcolm; Ellenby, Thomas William, Method and apparatus for controlling the operational mode of electronic devices in response to sensed conditions.
  393. Ellenby, John; Ellenby, Peter Malcolm; Ellenby, Thomas William, Method and apparatus for controlling the operational mode of electronic devices in response to sensed conditions.
  394. Haff, Maurice W.; Clarke, Christopher D., Method and apparatus for data file transfer using destination linked directories.
  395. Haff, Maurice W.; Clarke, Christopher D., Method and apparatus for data file transfer using destination linked directories.
  396. Armandpour, Tim; Malik, Masroor, Method and apparatus for detecting changes in websites and reporting results to web developers for navigation template repair purposes.
  397. Paulik, Matthias; Evermann, Gunnar; Gillick, Laurence S., Method and apparatus for discovering trending terms in speech requests.
  398. Wang, Xin; Tadayon, Bijan; DeMartini, Thomas; Raley, Michael; Lao, Guillermo; Chen, Eddie J.; Gilliam, Charles P., Method and apparatus for distributing enforceable property rights.
  399. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  400. Klebe, Skott C., Method and apparatus for distributing secure digital content that can be indexed by third party search engines.
  401. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  402. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  403. Wesinger, Jr., Ralph E.; Coley, Christopher D., Method and apparatus for electronically publishing information on a computer network.
  404. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  405. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  406. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  407. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  408. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  409. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  410. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  411. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  412. Banaugh, Michelle; Fry, Peggy J.; Potter, David; Wood, George Luis, Method and apparatus for integrated payments processing and decisioning for internet transactions.
  413. Montulli, Lou, Method and apparatus for maintaining state information on an HTTP client system in relation to server domain and path attributes.
  414. Nordman,Ian; Alam��ki,Tero; V��nsk��,Marko; Tarkiainen,Mikko; Gyorb��r��,Norbert; Gripenberg,Casper, Method and apparatus for managing and enforcing user privacy.
  415. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  416. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  417. Schmidt, Andreas; Hett, Christian; Shah, Yogendra C.; Cha, Inhyok, Method and apparatus for protecting time values in wireless communications.
  418. Koelle,Katharina Veronika; Worzel,William P., Method and apparatus for protection of electronic media.
  419. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  420. Cianciarulo, Krys; Cardot, Stephen C.; Weiseth, Thomas, Method and apparatus for providing coverage for transmission of data.
  421. Vandergeest Ron J.,CAX, Method and apparatus for providing off-line secure communications.
  422. Rive Russell, Method and apparatus for remotely enabling a preinstalled and previously disabled application on a computer system.
  423. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  424. Levy,Kenneth Lee, Method and apparatus for robust embedded data.
  425. Deaver,John; Klebe,Skott C.; Johnson,Woodrow W., Method and apparatus for secure delivery and rights management of digital content.
  426. Klebe,Skott C.; Boyea,John, Method and apparatus for secure delivery and rights management of digital content at an unsecure site.
  427. Deaver, John; Johnson, Woodrow W.; Klebe, Skott C., Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site.
  428. Deaver, John; Klebe, Skott C.; Johnson, Woodrow W., Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site.
  429. Deaver,John; Klebe,Skott C.; Johnson,Woodrow W., Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site.
  430. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  431. Labaton, Isaac J, Method and apparatus for the secure authentication of a web site.
  432. Labaton, Isaac J., Method and apparatus for the secure authentication of a web-site.
  433. Labaton, Isaac J, Method and apparatus for the secure identification of the owner of a portable device.
  434. Labaton, Isaac J., Method and apparatus for the secure identification of the owner of a portable device.
  435. Labaton, Isaac J., Method and apparatus for the secure identification of the owner of a portable device.
  436. Klebe,Skott C., Method and apparatus for tracking and controlling e-mail forwarding of encrypted documents.
  437. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  438. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  439. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  440. Szucs, Paul, Method and device for determining a unique content instance identifier, unique content instance identifier and method and device for managing content licenses.
  441. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  442. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  443. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  444. Krislov, Clinton A., Method and system for automated document registration.
  445. Krislov, Clinton A., Method and system for automated document registration with cloud computing.
  446. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  447. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  448. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  449. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  450. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  451. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen Jeffrey; Payne, Andrew C.; Treese, George Winfield, Method and system for counting web access requests.
  452. Yu, Chee; Gardner, Greg; Vaidyanathan, Vijay; Dias, Antonio; Kitze, Christopher A., Method and system for delivering files in digital file marketplace.
  453. Morten,Glenn A.; Rassool,Reza P.; Claeys,Tom E.; Baker,Brian Andrew, Method and system for end to end securing of content for video on demand.
  454. Raanan Gil,ILX ; Moran Tal,ILX ; Galant Yoron ; El-Hanani Yuval,ILX ; Reshef Eran, Method and system for extracting application protocol characteristics.
  455. Raanan, Gil; Moran, Tal; Galant, Yaron; El-Hanani, Yuval; Reshef, Eran, Method and system for extracting application protocol characteristics.
  456. Galuten, Albhy; Williams, Peter, Method and system for handling errors in a distributed computer system.
  457. DeMello, Marco A.; Yaacovi, Yoram; Zeman, Pavel, Method and system for limiting the use of user-specific software features.
  458. DeMello,Marco A.; Yaacovi,Yoram; Zeman,Pavel; Hughes,Kathryn E.; Byrum,Frank D., Method and system for limiting the use of user-specific software features.
  459. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined condition for usage.
  460. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  461. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  462. Meyers, Stephan, Method and system for managing rights in digital information over a network.
  463. Meyers,Stephan, Method and system for managing rights in digital information over a network.
  464. Smith,Jonathan M.; Stolfo,Salvatore J.; Sherwin,Jeffrey C.; Chung,Jeffrey D.; Prodromidis,Andreas L., Method and system for obscuring user access patterns using a buffer memory.
  465. Freeman, Daniel; Barrentine, Derek B., Method and system for operating a multi-function portable electronic device using voice-activation.
  466. Rhoads, Geoffrey B., Method and system for preventing reproduction of professional photographs.
  467. Reshef Eran,ILX ; Raanan Gil,ILX ; Solan Eilon,ILX, Method and system for protecting operations of trusted internal networks.
  468. Morten, Glenn A.; Palmer, Tomás E.; MacLean, Charles D., Method and system for providing secure CODECS.
  469. Zhuk, Oscar V.; Rohr, Vince M., Method and system for real-time tamper evidence gathering for software.
  470. Krislov, Clinton A., Method and system for secure automated document registration from social media networks.
  471. Nataraj, Pruthvi Panyam; Tomar, Bipin; Anbalagan, Arun Prasath; Reyes, Eduardo Lazaro, Method and system for software installation.
  472. Lao, Guillermo, Method and system for subscription digital rights management.
  473. Lao, Guillermo, Method and system for subscription digital rights management.
  474. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  475. Fransdonk, Robert W., Method and system to digitally sign and deliver content in a geographically controlled manner via a network.
  476. Fransdonk,Robert W., Method and system to digitally sign and deliver content in a geographically controlled manner via a network.
  477. Fransdonk,Robert W., Method and system to dynamically present a payment gateway for content distributed via a network.
  478. Fransdonk,Robert W., Method and system to dynamically present a payment gateway for content distributed via a network.
  479. Fransdonk,Robert, Method and system to provide secure key selection using a secure device in a watercrypting environment.
  480. Fransdonk, Robert W., Method and system to secure content for distribution via a network.
  481. Fransdonk,Robert W., Method and system to securely distribute content via a network.
  482. Fransdonk, Robert W., Method and system to securely store and distribute content encryption keys.
  483. Fransdonk,Robert W., Method and system to store and distribute encryption keys.
  484. Ta, Thanh; Nguyen, Mai; Chen, Eddie J.; Wang, Xin; Demartini, Thomas, Method and system to support dynamic rights and resources sharing.
  485. White,Mark Andrew George; Wajs,Andrew Augustine, Method and system to uniquely associate multicast content with each of multiple recipients.
  486. Jogand-Coulomb, Fabrice; Rasizade, Oktay S.; Tanik, Haluk K., Method for allowing multiple users to access preview content.
  487. Coley,Christopher D.; Wesinger, Jr.,Ralph E., Method for authenticating a user access request.
  488. DeMello,Marco A.; Narin,Attila; Yaacovi,Yoram, Method for authenticating and securing integrated bookstore entries.
  489. N. Muralidhran ; John Torkelson, Method for communicating and controlling transactions between unsecured parties.
  490. Lord William P. ; Abdel-Mottaleb Mohamed ; Epstein Michael, Method for confirming the integrity of an image transmitted with a loss.
  491. Saito, Makoto, Method for controlling database copyrights.
  492. Saito,Makoto, Method for controlling database copyrights.
  493. Saito,Makoto, Method for controlling database copyrights.
  494. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  495. Spagna, Richard; Milsted, Kenneth Louis; Lybrand, David P.; Downs, Edgar, Method for delivering electronic content from an online store.
  496. Ramerth, Brent D.; Naik, Devang K.; Davidson, Douglas R.; Dolfing, Jannes G. A.; Pu, Jia, Method for disambiguating multiple readings in language conversion.
  497. Reisman, Richard R., Method for distributing a list of updated content to a user station from a distribution server wherein the user station may defer installing the update.
  498. Reisman, Richard R., Method for distributing content to a user station.
  499. Reisman, Richard R., Method for distributing content to a user station.
  500. Reisman, Richard R., Method for distributing content to a user station.
  501. Gu,Xue; Sun,Tong; Cot��,Alan Thomas; Shepherd,Michael David, Method for dynamic knowledge capturing in production printing workflow domain.
  502. Koelle, Katharina Veronika; Midwinter, Wendy, Method for evolving detectors to detect malign behavior in an artificial immune system.
  503. Koelle, Katharina Veronika; Midwinter, Wendy, Method for evolving detectors to detect malign behavior in an artificial immune system.
  504. Wenjun Zeng, Method for extracting multiresolution watermark images to determine rightful ownership.
  505. Black, Gerald R., Method for identity verification.
  506. Black, Gerald R., Method for identity verification.
  507. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  508. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  509. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  510. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  511. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system.
  512. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  513. Dorwin, David Kimbal; Finnan, Hugh, Method for reducing time to first frame/seek frame of protected digital content streams.
  514. Homer, Gregg S., Method for subscription media on-demand.
  515. Paulik, Matthias; Huang, Rongqing, Method for supporting dynamic grammars in WFST-based ASR.
  516. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  517. Ben Itzhak, Yuval, Method for the automatic setting and updating of a security policy.
  518. Dunkeld, Bryan; Lambert, Edward, Method of providing a digital asset for distribution.
  519. Dietmar Nusch DE; Monika Banzhaf DE; Uwe Knebel DE, Method of saving operating data of a network element, and controller for a network element.
  520. Kim, Yeo-Jin; Oh, Yun-Sang; Sim, Sang-Gyoo; Jung, Kyung-im; Kim, Ji-Soo, Method of transferring rights object and electronic device.
  521. Benayoun,Alain; LePennec,Jean Francois; Michel,Patrick, Method of updating encryption keys in a data communication system.
  522. Dorwin, David Kimbal; Scherkus, Andrew; Kaiser, Christian; Lacey, Stephen John, Method, manufacture, and apparatus for configuring multiple content protection systems.
  523. Dorwin, David Kimbal, Method, manufacture, and apparatus for content decryption module.
  524. Dorwin, David Kimbal; Scherkus, Andrew; Lacey, Stephen John; Kaiser, Christian, Method, manufacture, and apparatus for content protection for HTML media elements.
  525. Dorwin, David Kimbal; Scherkus, Andrew; Kaiser, Christian, Method, manufacture, and apparatus for content protection using authentication data.
  526. Dorwin, David Kimbal, Method, manufacture, and apparatus for instantiating plugin from within browser.
  527. Dorwin, David Kimbal; Scherkus, Andrew Martin, Method, manufacture, and apparatus for protection of media objects from the web application environment.
  528. Fung, Daniel Y.; Evans, Stephen C., Method, system and computer readable medium for web site account and e-commerce management from a central location.
  529. Fung, Daniel Y.; Hood, Brandon C., Method, system and computer readable medium for web site account and e-commerce management from a central location.
  530. Fitzpatrick, Gregory P.; Cheng, Tsz, Method, system, and apparatus for dynamically creating electronic contracts.
  531. Fitzpatrick,Gregory P.; Cheng,Tsz, Method, system, and apparatus for dynamically creating electronic contracts.
  532. Nordman, Ian; Alamaki, Tero; Vanska, Marko; Gyorbiro, Norbert; Gripenberg, Casper; Tarkiainen, Mikko, Method, system, and apparatus for providing services in a privacy enabled mobile and Ubicom environment.
  533. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  534. Raley, Michael Charles; Chen, Eddie J., Method, system, and device for license-centric content consumption.
  535. Raley, Michael; Chen, Eddie J., Method, system, and device for license-centric content consumption.
  536. Lee, Michael M., Methods and apparatus for altering audio output signals.
  537. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P.; Sibert, W. Olin; Van Wie, David M., Methods and apparatus for persistent control and protection of content.
  538. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  539. Cianciarulo, Krys; Cardot, Stephen C.; Weiseth, Thomas, Methods and apparatus for providing coverage for receiver of transmission data.
  540. Levy, Kenneth L., Methods and apparatus for robust embedded data.
  541. Maurice W. Haff ; Christopher D. Clarke, Methods and apparatus for secure electronic, certified, restricted delivery mail systems.
  542. Cianciarulo, Krys; Cardot, Stephen C.; Weiseth, Thomas, Methods and apparatus for securing and providing coverage for transmission data.
  543. Ling, Marvin T., Methods and apparatus for transacting electronic commerce using account hierarchy and locking of accounts.
  544. Bellegarda, Jerome R., Methods and apparatuses for automatic speech recognition.
  545. North, Gregory Allen; Perry, Matthew Richard; Kircher, Brian Christopher, Methods and circuits for securing encached information.
  546. Daemke,Valery; Horsfield,John; Nason,Bonnie; Simuni,Ilya; Sood,Sachindra, Methods and systems for managing user access to computer software application programs.
  547. Jogand-Coulomb, Fabrice; Tanik, Haluk Kent; Rasizade, Oktay, Methods for accessing content based on a session ticket.
  548. Jogand-Coulomb, Fabrice; Tanik, Haluk Kent; Rasizade, Oktay, Methods for accessing content based on a session ticket.
  549. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  550. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  551. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  552. May, R. Raymond, Methods for risk portfolio management within an electronic trading system.
  553. Reisman, Richard R., Methods for transacting electronic commerce.
  554. Ouchi Norman Ken, Methods of performing an interdependent task on a document.
  555. Terauchi, Toru; Sato, Jun; Watanabe, Keiko, Mobile communication terminal.
  556. Lee, Michael M.; Gregg, Justin; Seguin, Chad G., Mobile device having human language translation capability with positional feedback.
  557. Lee, Michael M.; Gregg, Justin; Seguin, Chad G., Mobile device having human language translation capability with positional feedback.
  558. Patoskie, John P.; Hauser, Robert R., Mobile device tracking using mobile agent location breadcrumbs.
  559. Rolf, Devon A., Mobile payment systems and methods.
  560. Homer, Gregg S., More subscription media on demand.
  561. Hauser, Robert R., Movement of an agent that utilizes a compiled set of canonical rules.
  562. Patoskie, John P., Moving an agent from a first execution environment to a second execution environment.
  563. Hauser, Robert R., Moving an agent from a first execution environment to a second execution environment using supplied and resident rules.
  564. Hauser, Robert R., Moving and agent with a canonical rule from one device to a second device.
  565. Gruber, Thomas R.; Saddler, Harry J.; Bellegarda, Jerome Rene; Nyeggen, Bryce H.; Sabatelli, Alessandro, Multi-command single utterance input method.
  566. Alvin,Robert S., Multi-level fraud check with dynamic feedback for internet business transaction processor.
  567. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  568. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  569. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  570. Hahn-Carlson, Dean W., Multi-supplier transaction and payment programmed processing approach with at least one supplier.
  571. Carol Y. Devine ; Tammy E. Dollar ; Wayne J. Munguia, Multi-threaded web based user inbox for report management.
  572. Mason, James Eric; Boettcher, Jesse, Multi-tiered voice feedback in an electronic device.
  573. Mason, James Eric; Boettcher, Jesse, Multi-tiered voice feedback in an electronic device.
  574. Hoffberg, Steven M., Multifactorial optimization system and method.
  575. Bellegarda, Jerome R.; Davidson, Douglas R., Multilingual word prediction.
  576. Lee, Kyung-Tak; Park, Joon-Goo; Sung, Sang-Kyung; Seshadri, Thirumalai Echampadi, Multimedia message service method and system.
  577. Drope, Philip, Multimedia network system with content importation, content exportation, and integrated content management.
  578. Gondhalekar,Mangesh Madhukar; Viswanathan,Rajesh; Prakash,Shailesh; Loomis,Stephen; Van Huysse,James Patrick; Carlson,Cameo Dawn, Multimedia scheduler.
  579. Dupray,Dennis J., Multiple evaluators for evaluation of a purality of conditions.
  580. Dupray, Dennis J.; Karr, Charles L., Multiple location estimators for wireless location.
  581. Sellars,William; Cochran, Jr.,William K.; Hunt,David C., Multiple party content distribution system and method with rights management features.
  582. Naik, Devang K., Name recognition system.
  583. Naik, Devang K., Name recognition system.
  584. Hsu,Cheng; Boonjing,Veera, Natural language interface using constrained intermediate dictionary of results.
  585. Janes,Sherman M., Network communications security agent.
  586. Janes,Sherman M., Network communications security agent.
  587. Baugher,Mark J.; Farnham,Stu; Hemminger,Stephen C.; Marshall,Robert A.; Tait,Mark, Network content management.
  588. Dupray, Dennis J.; Goldberg, Sheldon F., Network services dependent upon geographical constraints.
  589. Wu, Jonathan; Rajan, Sreeranga P., Network-based bookmark management and web-summary system.
  590. Tinker, Jeffrey Lee; MacLean, Charles Duncan; Ali, Hamid Shaheed; Hiar, Edward Charles; Rutman, Michael; Morten, Glenn A., Non-blocking of head end initiated revocation and delivery of entitlements non-addressable digital media network.
  591. Wagner, Richard Hiers, OPEN NETWORK SYSTEM FOR I/O OPERATION INCLUDING A COMMON GATEWAY INTERFACE AND AN EXTENDED OPEN NETWORK PROTOCOL WITH NON-STANDARD I/O DEVICES UTILIZING DEVICE AND IDENTIFIER FOR OPERATION TO BE PERF.
  592. Sprunk, Eric J., Object and resource security system.
  593. Nilsson, Jarl A., Object rendering systems and methods.
  594. Nilsson, Jarl A., Object rendering systems and methods.
  595. Burfield Evan G. ; Chang Chia Chen ; Drissel Mark ; Eichler Matthew ; Garrett Richard ; Groat Robert ; Kipp Neill ; Rapp Perry Russell, Object-based numeric-analysis engine.
  596. Kortum, Philip Ted; Sullivan, Marc Andrew, Obtaining user feedback for unavailable content.
  597. Edwards, Eric; Fisher, Clay Harvey; Jonach, Kurt; Manowitz, Neal Jacob, Online story collaboration.
  598. Edwards, Eric; Fisher, Clay Harvey; Jonach, Kurt; Manowitz, Neal Jacob, Online story collaboration.
  599. Wagner, Richard Hiers, Open network system and method for I/O operations with non-standard I/O devices using an extended open network protocol.
  600. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Operating system upgrades in a trusted operating system environment.
  601. Hahn-Carlson, Dean W.; Suits, David A.; Kanathur, Raghunandan N., Order-resource fulfillment and management system and approach.
  602. Hahn-Carlson, Dean W.; Suits, David A.; Kanathur, Raghunandan N., Order-resource fulfillment and management system and approach.
  603. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  604. Gruber, Thomas Robert; Saddler, Harry Joseph; Cheyer, Adam John; Kittlaus, Dag; Brigham, Christopher Dean; Giuli, Richard Donald; Guzzoni, Didier Rene; Bastea-Forte, Marcello, Paraphrasing of user requests and results by automated digital assistant.
  605. Bellegarda, Jerome R., Parsimonious continuous-space phrase representations for natural language processing.
  606. Bellegarda, Jerome R.; Yaman, Sibel, Parsimonious handling of word inflection via categorical stem + suffix N-gram language models.
  607. Bellegarda, Jerome, Part-of-speech tagging using latent analogy.
  608. Black, Gerald R., Pen-based transponder identity verification system.
  609. Black,Gerald R., Pen-based transponder identity verification system.
  610. Wheeler, Thomas T., Performing operations by a first functionality within a second functionality in a same or in a different programming language.
  611. Story, Guy A.; Rajasekharan, Ajit; Mott, Timothy, Personalized time-shifted programming.
  612. Chen, Lik Harry; Cheyer, Adam John; Guzzoni, Didier Rene; Gruber, Thomas Robert, Personalized vocabulary for digital assistant.
  613. Dupray, Dennis J., Platform and applications for wireless location and other complex services.
  614. Wang, Xin; Ramerth, Brent D., Predictive conversion of language input.
  615. Dolfing, Jannes; Ramerth, Brent; Davidson, Douglas; Bellegarda, Jerome; Moore, Jennifer; Eminidis, Andreas; Shaffer, Joshua, Predictive text input.
  616. Zhuk, Oscar V.; Morten, Glenn A.; Hiar, Edward Charles, Preventing unauthorized modification or skipping of viewing of advertisements within content.
  617. Gruber, Thomas Robert; Cheyer, Adam John; Guzzoni, Didier Rene; Brigham, Christopher Dean; Saddler, Harry Joseph, Prioritizing selection criteria by automated assistant.
  618. Paulik, Matthias; Mason, Henry G.; Seigel, Matthew S., Privacy preserving distributed evaluation framework for embedded personalized systems.
  619. Baker, Stuart D.; Strassburger, Philip C., Privileged communication system with routing controls.
  620. Martel, Mathieu Jean; Deniau, Thomas, Proactive assistance based on dialog communication between devices.
  621. Lecomte, Daniel; Lamtouni, Mohammed, Process and device for securing the transmission, recording and viewing of digital audiovisual packetized streams.
  622. Lecomte, Daniel; Lamtouni, Mohammed, Process and device for securing the transmission, recording and viewing of digital, audiovisual packetized streams.
  623. Baker, Brian, Process and streaming server for encrypting a data stream.
  624. Baker,Brian, Process and streaming server for encrypting a data stream.
  625. Morten,Glenn A.; Baker,Brian, Process and streaming server for encrypting a data stream to a virtual smart card client system.
  626. Baker, Brian A.; Morten, Glenn A.; MacLean, Charles Duncan; Tinker, Jeffrey Lee, Process and streaming server for encrypting a data stream with bandwidth based variation.
  627. Baker, Brian A.; Morten, Glenn A.; MacLean, Charles Duncan; Tinker, Jeffrey Lee, Process and streaming server for encrypting a data stream with bandwidth based variation.
  628. Golden,Steven M.; Levin,Hillel; Gentry,Gary D.; Barbour,James A.; Schornberg,Albert; Anderson,Bradley A., Process for the distribution and redemption of coupons.
  629. Knudson, Edward B.; Rudnick, David M.; Ellis, Michael D.; Hagenbuch, Daniel C.; Hassell, Joel G.; Knee, Robert A.; Reynolds, Steven J., Program guide system with real-time data sources.
  630. Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
  631. Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
  632. Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
  633. Ouchi, Norman Ken, Project and role based workflow systems and methods.
  634. Terry Douglas B. ; Dourish James P. ; Edwards Warren K. ; LaMarca Anthony G. ; Lamping John O. ; Petersen Karin ; Salisbury Michael P. ; Thornton James D., Property based mechanism for flexibility supporting front-end and back-end components having different communication protocols.
  635. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  636. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  637. Strom,Clifford P.; Sahasrabudhe,Sandeep; Parks,M. Jay; Paddleford,John, Protecting content on medium from unfettered distribution.
  638. Elazar, Gidon; Harkabi, Dan; Weingarten, Nehemiah; Halachmi, Aviraham; Camiel, Noam; Fuchs, Eran, Protection of digital data content.
  639. Kim, Yoon, Providing an indication of the suitability of speech recognition.
  640. Reisman, Richard R., Providing and receiving content over a wireless communication system.
  641. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  642. Reisman, Richard R., Providing services from a remote computer system to a user station over a communications network.
  643. Yanagihara, Kazuhisa, Providing text input using speech data and non-speech data.
  644. Yanagihara, Kazuhisa, Providing text input using speech data and non-speech data.
  645. Wheeler, Thomas T, Proxy object creation and use.
  646. Wheeler, Thomas T, Proxy object creation and use.
  647. Dupray, Dennis J., Real estate transaction system.
  648. Homer, Gregg S., Rechargeable media distribution and play system.
  649. Hahn-Carlson, Dean W.; Armstrong, Kevin M., Recurring transaction processing system and approach.
  650. Piernot, Philippe P.; Binder, Justin G., Reducing the need for manual start/end-pointing and trigger phrases.
  651. Dorwin, David Kimbal, Reducing time to first encrypted frame in a content stream.
  652. Earnest, Jerry Brett, Redundant email address detection and capture system.
  653. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  654. Peinado, Marcus; Manferdelli, John L.; Bell, Jeffrey R. C., Rendering digital content in an encrypted rights-protected form.
  655. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  656. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  657. Demartini, Thomas M.; Raley, Michael Charles, Rights expression profile system and method.
  658. Raley, Michael C.; Gilliam, Charles P.; Ham, Manual; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  659. Raley, Michael; Gilliam, Charles P.; Ham, Manuel; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  660. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  661. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  662. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  663. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  664. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  665. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  666. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  667. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  668. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  669. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  670. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  671. Ronning, Joel A.; Wical, Kelly J.; Kukura, Marc A., Scheduling of a file download and search for updates.
  672. Lee,Walter W.; Shoham,Daniel; Wilhelm,Wesley K.; Milana,Joseph P.; Jost,Alan P., Score based decisioning.
  673. Pinkas,Binyamin; Sander,Tomas, Secure authentication systems and methods.
  674. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  675. Cochran,William; Gustman,Samuel M.; Sellars,William R., Secure communication and real-time watermarking using mutating identifiers.
  676. Christie, William; Beliveau, Jeffery; Lellouche, Henri, Secure coupon distribution.
  677. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for Web based data management.
  678. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  679. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  680. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure customer interface for web based data management.
  681. Stahl, Noah Z.; Bartlett, Wendy S.; Brooks, Randall S., Secure document management.
  682. Ronning, Joel Alan; Wical, Kelly J., Secure downloading of a file from a network system and method.
  683. Sellars, William; Malina, Richard; Cochran, William, Secure electronic commerce using mutating identifiers.
  684. England,Paul; Lampson,Butler W., Secure execution of program code.
  685. Cargille, Jon; Verma, Surendra; Zbikowski, Mark J.; Tipton, William R., Secure kernel transactions.
  686. Philip R. Wiser ; Andrew R. Cherenson ; Steven T. Ansell ; Susan A. Cannon, Secure online music distribution system.
  687. Wiser, Philip R.; Cherenson, Andrew R.; Ansell, Steven T.; Cannon, Susan A., Secure online music distribution system.
  688. Buer, Mark, Secure processing environment.
  689. Boccon-Gibod, Gilles; Ellison, Gary, Secure processing systems and methods.
  690. Boccon-Gibod, Gilles; Ellison, Gary F., Secure processing systems and methods.
  691. Boccon-Gibod, Gilles; Ellison, Gary F., Secure processing systems and methods.
  692. Sibert, W. Olin, Secure processing unit systems and methods.
  693. Sibert,W. Olin, Secure processing unit systems and methods.
  694. Sibert,W. Olin, Secure processing unit systems and methods.
  695. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for Web based data management.
  696. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for web based data management.
  697. Devine, Carol Y.; Shifrin, Gerald A.; Shoulberg, Richard W., Secure server architecture for web based data management.
  698. Devine,Carol Y; Shifrin,Gerald A; Shoulberg,Richard W, Secure server architecture for web based data management.
  699. Casper,Andrew, Secure transaction processing system and method.
  700. Hoffstein, Jeffrey; Silverman, Joseph H.; Lieman, Daniel, Secure user identification based on ring homomorphisms.
  701. Lecomte, Daniel; Hosny, Reda; Lamtouni, Mohammed, Secured distributed method and system for the distribution of audiovisual flows.
  702. Black,Gerald R., Security authentication method and system.
  703. Maruyama, Hidefumi, Security chip used in a contents data playing device, update management method, and update management program.
  704. Haff, Maurice W.; Clarke, Christopher D., Selective acceptance of electronic messages in communication systems.
  705. MacLean, Charles Duncan; Inskip, Thomas, Selective and persistent application level encryption for video provided to a client.
  706. Kollmyer,Brad; Baker,Brian A.; Shapiro,Eric Bradley; Kollmyer,Aric; Rutman,Mike; MacLean,Charles Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Selectively encrypting different portions of data sent over a network.
  707. Moore, Jennifer Lauren; Naik, Devang K.; Bellegarda, Jerome R.; Aitken, Kevin Bartlett; Silverman, Kim E., Semantic search using a single-source semantic model.
  708. Alvin, Robert S., Sending targeted product offerings based on personal information.
  709. Bellegarda, Jerome, Sentiment prediction from textual data.
  710. Fransdonk,Robert W., Separate authentication processes to secure content.
  711. DeMello,Marco A.; Narin,Attila; Madonna,Christopher Robert Richard, Server controlled branding of client software deployed over computer networks.
  712. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Byrum,Frank D., Server for an electronic distribution system and method of operating same.
  713. Cheyer, Adam John; Guzzoni, Didier Rene; Gruber, Thomas Robert; Brigham, Christopher Dean, Service orchestration for intelligent automated assistant.
  714. Naik, Devang K.; Piernot, Philippe P., Social reminders.
  715. Naik, Devang K.; Piernot, Philippe P., Social reminders.
  716. Reisman, Richard R., Software and method for monitoring a data stream and for capturing desired data within the data stream.
  717. Reisman, Richard R., Software and method that enables selection of on-line content from one of a plurality of network content service providers in a single action.
  718. Reisman, Richard R., Software and method that enables selection of one of a plurality of network communications service providers.
  719. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  720. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  721. Reisman, Richard R., Software and method that enables selection of one of a plurality of online service providers.
  722. Peinado, Marcus; England, Paul; Manferdelli, John L., Software application protection by way of a digital rights management (DRM) system.
  723. Reisman, Richard R., Software distribution over a network.
  724. Home, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  725. Home, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  726. Horne, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  727. Horne, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  728. Horne, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  729. Horne, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  730. Homing, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Home, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  731. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  732. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  733. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  734. Kim, Yoon; Kajarekar, Sachin S., Speaker identification and unsupervised speaker adaptation techniques.
  735. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  736. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  737. Hunt, Melvyn; Bridle, John, Speech recognition involving a mobile device.
  738. Chen, Lik Harry, Speech recognition repair using contextual information.
  739. Rhoads, Geoffrey B.; Carr, J. Scott, Steganographic data hiding using a device clock.
  740. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  741. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  742. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  743. Sumner, Michael R.; Newendorp, Brandon J.; Orr, Ryan M., Structured dictation using intelligent automated assistants.
  744. Homer, Gregg S., Subscription media on demand VII.
  745. Homer, Gregg S., Subscription media on demand VIII (offline mode).
  746. Liu, Yeu; Pandya, Ravi; Ivanov, Lazar; Paramasivam, Muthukrishnan; Gunyakti, Caglar; Gui, Dongmei; Hsu, Scott W. P., Supplementary trust model for software licensing/commercial digital distribution policy.
  747. Oehrke,Terry Lee; O'Brien,Michael Allen; Wells,Scott Christopher, Survivable and scalable data system and method for computer networks.
  748. Wheeler, Thomas T.; Patoskie, John P., Survival rule usage by software agents.
  749. May, R. Raymond, Switch engine for risk position discovery in an electronic trading system.
  750. Palmer, Tomas Earl, System and method for N-dimensional encryption.
  751. Bisbee, Stephen F.; Moskowitz, Jack J.; Becker, Keith F.; Hilton, Walter J.; Szebenyi, Joshua, System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components.
  752. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  753. DeMello, Marco; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  754. DeMello,Marco A.; Krishnaswamy,Vinay; Manferdelli,John L., System and method for accessing protected content in a rights-management architecture.
  755. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy B.; Yaacovi,Yoram; Alger,Jeffrey H., System and method for activating a rendering device in a multi-level rights-management architecture.
  756. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy Bertrand; Yaacovi,Yoram; Alger,Jeffrey A., System and method for activating a rendering device in a multi-level rights-management architecture.
  757. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for authenticating an operating system.
  758. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  759. England,Paul; Lampson,Butler W.; DeTreville,John D., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  760. Freishtat, Gregg; Rajan, Palaniswamy, System and method for automated electronic notification and transaction execution.
  761. DeMello, Marco A.; Narin, Attila; Setty, Venkateshaiah, System and method for client interaction in a multi-level rights-management architecture.
  762. Gilliam, Charles P; Chen, Eddie J, System and method for controlling rights expressions by stakeholders of an item.
  763. Hughes, David, System and method for controlling the use and duplication of digital content distributed on removable media.
  764. Hughes, David, System and method for controlling the use and duplication of digital content distributed on removable media.
  765. Lockhart, Malcolm W.; Grimes, D. Gordon; Sharma, Ranjiv K.; Musselwhite, Neal A., System and method for data rights management.
  766. Lockhart,Malcolm W.; Grimes,D. Gordon; Sharma,Ranjiv K.; Musselwhite,Neal A., System and method for data rights management.
  767. Keil,Dean S., System and method for debit account transactions.
  768. Kulakowski, Robert T.; Mautner, Craig; Fahy, James B.; Bronte, Jeffrey; Hutchins, Greg, System and method for defining programmable processing steps applied when protecting the data.
  769. Sinha, Anoop K., System and method for detecting errors in interactions with a voice-based digital assistant.
  770. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  771. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  772. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  773. Hoffberg, Steven M., System and method for determining contingent relevance.
  774. Freishtat, Gregg; Rajan, Palaniswamy, System and method for determining revenue from an intermediary derived from servicing data requests.
  775. Shimizu, Kanna, System and method for digital content player with secure processing vault.
  776. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  777. Alvin Pivowar ; Steve Hanrahan ; Pete Grillo, System and method for displaying and manipulating multiple calendars on a personal digital assistant.
  778. Rajan, Palaniswamy; Freishtat, Gregg, System and method for distributed storage and retrieval of personal information.
  779. Scroggie, Michael C.; Rochon, David A.; Banker, David W.; Gardenswartz, Will, System and method for distributing information through cooperative communication network sites.
  780. Wang,Xin, System and method for document distribution.
  781. Edwards,Eric; Fisher,Clay Harvey; Jonach,Kurt; Manowitz,Neal Jacob, System and method for editing digital images.
  782. Gehrmann, Christian, System and method for efficient security domain translation and data transfer.
  783. Bisbee,Stephen F.; Moskowitz,Jack J.; Becker,Keith F.; Peterson,Ellis K., System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents.
  784. Roberts, Andrew J.; Martin, David L.; Saddler, Harry J., System and method for emergency calls initiated by voice command.
  785. Wagner, Richard Hiers, System and method for enabling transactions between a web server and a smart card, telephone, or personal digital assistant over the internet.
  786. Wagner, Richard Hiers, System and method for enabling transactions between a web server and an automated teller machine over the internet.
  787. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  788. Colin McCartney, System and method for freeing shared resources in a computer system.
  789. Tieu, Vincent; Fung, Joseph Z.; Chen, Eddie; Tadayon, Bijan, System and method for granting access to an item or permission to use an item based on configurable conditions.
  790. Doddi, Srinivas; Jakatdar, Nickhil; Niu, Xinhui, System and method for grating profile classification.
  791. Karr, Charles L.; Dupray, Dennis J., System and method for hybriding wireless location techniques.
  792. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  793. Evermann, Gunnar, System and method for inferring user intent from speech inputs.
  794. Manferdelli,John L.; Marr,Michael David; Krishnaswamy,Vinay; Jakubowski,Mariusz H., System and method for interfacing a software process to secure repositories.
  795. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  796. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  797. Lejeune, Stephane, System and method for merging network-based content with broadcasted programming content.
  798. Wells,John R.; Felt,Edward P., System and method for message encryption and signing in a transaction processing system.
  799. Olligschlaeger, Andreas M.; Rokosky, James P., System and method for multi-modal audio mining of telephone conversations.
  800. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  801. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  802. Palmer,Tom��s Earl, System and method for n-dimensional encryption.
  803. Nagel,Robert H., System and method for production and authentication of original documents.
  804. Nagel,Robert H., System and method for production and authentication of original documents.
  805. Willman, Bryan Mark; England, Paul; Ray, Kenneth D.; Hunter, Jamie; McMichael, Lonnie Dean; LaSalle, Derek Norman; Jacomet, Pierre; Paley, Mark Eliot; Kurien, Thekkthalackal Varugis; Cross, David B., System and method for protected operating system boot using state validation.
  806. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  807. Lin, Gen, System and method for protecting numerical control codes.
  808. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  809. Wang, Xin, System and method for protection of digital works.
  810. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  811. Rickelton-Abdi, Cyril, System and method for providing a secure content with revocable access.
  812. Scroggie, Michael C.; Kacaba, Michael E.; Rochon, David A.; Diamond, David M., System and method for providing shopping aids and incentives to customer through a computer network.
  813. Scroggie, Michael C.; Kacaba, Michael E.; Rochon, David A.; Diamond, David M., System and method for providing shopping aids and incentives to customers through a computer network.
  814. Scroggie,Michael C.; Kacaba,Michael E.; Rochon,David A.; Diamond,David M., System and method for providing shopping aids and incentives to customers through a computer network.
  815. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  816. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  817. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  818. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  819. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  820. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  821. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  822. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  823. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  824. Jennings, Charles A.; Bate, Donald H., System and method for routing media.
  825. Jennings, Chuck; Bate, Donald, System and method for routing media.
  826. Jennings, Chuck; Bate, Donald, System and method for routing media.
  827. Jennings,Chuck; Bate,Donald, System and method for routing media.
  828. Kaib, Paul; Freishtat, Gregg, System and method for scheduling harvesting of personal information.
  829. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for secure storage data using a key.
  830. Lampson, Butler W.; DeTreville, John D.; England, Paul, System and method for secure storage of data using public and private keys.
  831. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  832. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  833. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  834. Nutter, Mark Richard; Shimizu, Kanna, System and method for securely saving a program context to a shared memory.
  835. Nutter, Mark Richard; Shimizu, Kanna, System and method for securely saving and restoring a context of a secure program loader.
  836. Wang, Xin, System and method for specifying and processing legality expressions.
  837. Jennings, Charles A., System and method for streaming media.
  838. Jennings, Charles A., System and method for streaming media.
  839. Jennings, Charles A., System and method for streaming media.
  840. Jennings,Charles A., System and method for streaming media.
  841. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  842. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  843. Pivowar, Alvin; Hanrahan, Steve; Grillo, Pete, System and method for synchronizing data among a plurality of users via an intermittently accessed network.
  844. Alvin Pivowar ; Steve Hanrahan ; Peter Grillo, System and method for synchronizing multiple calendars over wide area network.
  845. Hodge, Stephen Lee, System and method for third party monitoring of voice and video calls.
  846. Olligschlaeger, Andreas M., System and method for three-way call detection.
  847. Olligschlaeger, Andreas M., System and method for three-way call detection.
  848. Olligschlaeger, Andreas M., System and method for three-way call detection.
  849. Olligschlaeger, Andreas M., System and method for three-way call detection.
  850. Wagner, Richard Hiers, System and method for transacting communication over an open network.
  851. Wang,Xin, System and method for transferring the right to decode messages.
  852. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  853. Dunkeld, Bryan C.; Lambert, Edward M., System and method for unique digital asset identification and transaction management.
  854. Dunkeld, Bryan; Lambert, Edward, System and method for unique digital asset identification and transaction management.
  855. Naik, Devang K.; Tackin, Onur E., System and method for updating an adaptive speech recognition model.
  856. Naik, Devang K.; Gruber, Thomas R.; Weiner, Liam; Binder, Justin G.; Srisuwananukorn, Charles; Evermann, Gunnar; Williams, Shaun Eric; Chen, Hong; Napolitano, Lia T., System and method for user-specified pronunciation of words for speech synthesis and recognition.
  857. Naik, Devang K.; Gruber, Thomas R.; Weiner, Liam; Binder, Justin G.; Srisuwananukorn, Charles; Evermann, Gunnar; Williams, Shaun Eric; Chen, Hong; Napolitano, Lia T., System and method for user-specified pronunciation of words for speech synthesis and recognition.
  858. Sauerwald, Conrad; Bhavsar, Vrajesh Rajesh; McNeil, Kenneth Buffalo; Duffy, Jr., Thomas Brogan; Brouwer, Michael Lambertus Hubertus; Byom, Matthew John; Adler, Mitchell David; Tamura, Eric Brandon, System and method for wireless data protection.
  859. Sauerwald, Conrad; Bhavsar, Vrajesh Rajesh; McNeil, Kenneth Buffalo; Duffy, Thomas Brogan; Brouwer, Michael Lambertus Hubertus; Byom, Matthew John; Adler, Mitchell David; Tamura, Eric Brandon, System and method for wireless data protection.
  860. Kohl, Ulrich; Lotspiech, Jeffrey Bruce; Nusser, Stefan, System and method to securely store information in a recoverable manner on an untrusted system.
  861. Manohar, Pradheesh; Nalwaya, Prashant; Agrawal, Prashant Kumar, System and methods for automatically accessing a web site on behalf of a client.
  862. Rudd, James M., System and methods for managing the distribution of electronic content.
  863. Cartwright,Shawn D., System and methods for obtaining advantages and transacting the same in a computer gaming environment.
  864. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  865. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  866. Fernandez, Dennis S.; Hu, Irene Y., System design rights management.
  867. Corless, Peter P., System for controlling and regulating distribution of intellectual properties using internet protocol framework.
  868. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  869. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  870. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  871. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  872. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  873. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  874. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  875. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  876. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  877. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  878. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  879. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  880. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  881. Birkestrand, Daniel Charles; Grimm, Randall Lane; Lewis, David Otto; Schardt, Terry Lyle, System for determining unreturned standby resource usage.
  882. Birkestrand,Daniel Charles; Grimm,Randall Lane; Lewis,David Otto; Schardt,Terry Lyle, System for determining unreturned standby resource usage.
  883. Reshef, Eran; El-Hanany, Yuval; Raanan, Gil; Tsarfati, Tom, System for determining web application vulnerabilities.
  884. Reshef,Eran; El Hanany,Yuval; Raanan,Gil; Tsarfati,Tom, System for determining web application vulnerabilities.
  885. La Mar Donald R. ; Owens David S. ; Nelligan Michael L. ; Kleier Mark A., System for dispensing gift certificates.
  886. Wagner, Richard Hiers, System for enabling smart card transactions to occur over the internet and associated method.
  887. Hazlehurst, Peter; Aman, Matthew; Diego, Doug, System for performing web authentication of a user by proxy.
  888. Bayer,Leonard; Mathias,Nelson; Frost,David, System for protecting information over the internet.
  889. Mooij,Wilhelmus Gerardus Petrus; Wajs,Andrew Augustine, System for providing encrypted data, system for decrypting encrypted data and method for providing a communication interface in such a decrypting system.
  890. Yeung,Herbert K.; Houle Gillard,Yvonne M.; Kilfoyl,Troy J., System for third party management of product manufacture ordering by a franchisee upon approved products of franchisor.
  891. Chien, Shih Wei; Zhao, Shi Ming, System security approaches using multiple processing units.
  892. Zhao, Shi-Ming; Chien, Shih-Wei, System security approaches using sub-expression automata.
  893. Chen, Meng-Hong; Chien, Shih-Wei; Zhao, Shi-Ming, System security approaches utilizing a hierarchical memory system.
  894. Uchida, Yuki; Hyakutake, Shogo; Aoshima, Minoru, System, computer program product and method for managing documents.
  895. Uchida,Yuki; Hyakutake,Shogo; Aoshima,Minoru, System, computer program product and method for managing documents.
  896. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  897. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  898. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  899. Morten, Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  900. Morten,Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  901. Morten,Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  902. Lee, John; Levy, Nir, System, method, and computer program for validating receipt of digital content by a client device.
  903. Lee, John; Levy, Nir, System, method, and computer program for validating receipt of digital content by a client device.
  904. Dubagunta, Saikumar V., System, method, and computer readable medium for integrating an original application with a remote application.
  905. Dubagunta, Saikumar V., System, method, and computer readable medium for integrating an original language application with a target language application.
  906. Lipari, Paul A.; Wheeler, Thomas T.; Patoskie, John P., System, method, and computer readable medium for processing a message in a transport.
  907. Cowin, Gregory L., System, method, and computer readable medium for processing a message queue.
  908. Serret Avila,Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  909. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  910. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  911. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  912. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  913. May, Richard Raymond, Systems and methods for conducting derivative trades electronically.
  914. Pinkas, Binyamin; Sander, Tomas; Home, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  915. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  916. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  917. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  918. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  919. Pinkas,Binyamin; Sander,Tomas; Horne,William G., Systems and methods for conducting transactions and communications using a trusted third party.
  920. Ishibashi,Yoshihito; Oishi,Tateo; Muto,Akihiro; Kitahara,Jun; Shirai,Taizou, Systems and methods for content distribution using one or more distribution keys.
  921. Valenzuela, Edgardo; Chen, Eddie J.; DeMartini, Thomas; Fung, Joseph Zhung Yee; Nguyen, Mai; Tieu, Vincent Hsiang; Tran, Duc, Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates.
  922. Valenzuela, Edgardo; Chen, Eddie J.; DeMartini, Thomas; Fung, Joseph Zhung Yee; Nguyen, Mai; Tieu, Vincent Hsiang; Tran, Duc, Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates.
  923. James, Bryan; Herman, Kenneth; Rogers, Matthew L., Systems and methods for determining the language to use for speech generated by a text to speech engine.
  924. Ling,Marvin T., Systems and methods for distributing on-line content.
  925. MacKay, Michael K.; Maher, David P., Systems and methods for governing content rendering, protection, and management applications.
  926. MacKay, Michael K.; Maher, David P., Systems and methods for governing content rendering, protection, and management applications.
  927. MacKay, Michael K.; Maher, David P., Systems and methods for governing content rendering, protection, and management applications.
  928. MacKay,Michael K.; Maher,David P., Systems and methods for governing content rendering, protection, and management applications.
  929. Cianciarulo, Krys; Cardot, Stephen; Weiseth, Thomas, Systems and methods for insuring data over the internet.
  930. Cianciarulo,Krys; Cardot,Stephen; Weiseth,Thomas, Systems and methods for insuring data transmissions.
  931. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  932. Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
  933. Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
  934. Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
  935. Maher,David P.; Rudd,James M.; Swenson,Eric J.; Landsman,Richard A., Systems and methods for managing and protecting electronic content and applications.
  936. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  937. Naik, Devang K., Systems and methods for name pronunciation.
  938. LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  939. LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
  940. Levine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  941. Sibert, W. Olin, Systems and methods for protecting data secrecy and integrity.
  942. Sibert,W. Olin, Systems and methods for protecting data secrecy and integrity.
  943. Warner, Shannon L.; Black, Marc R.; Mellas, Lisa; Mazour, James L.; Viswanathan, Rajkumar; Salters, Michael D.; Berg, Glenda L.; Bailey, Ann Elizabeth; Greeder, Michael T., Systems and methods for providing a user incentive program using circuit chip technology.
  944. Warner, Shannon L; Black, Marc R; Mellas, Lisa; Mazour, James L; Viswanathan, Rajkumar; Salters, Michael D; Berg, Glenda L; Bailey, Ann Elizabeth; Greeder, Michael T, Systems and methods for providing a user incentive program using smart card technology.
  945. Keen, Daniel, Systems and methods for recognizing textual identifiers within a plurality of words.
  946. Cianciarulo,Krys; Cardot,Stephen C.; Weiseth,Thomas, Systems and methods for reports based on transmission-failure claims.
  947. Shamoon, Talal G., Systems and methods for retrofitting electronic appliances to accept different content formats.
  948. Shamoon,Talal G., Systems and methods for retrofitting electronic appliances to accept different content formats.
  949. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  950. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  951. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  952. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  953. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  954. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  955. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  956. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  957. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  958. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  959. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  960. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  961. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  962. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  963. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  964. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  965. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  966. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  967. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  968. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  969. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  970. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  971. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  972. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  973. Bellegarda, Jerome; Naik, Devang; Silverman, Kim, Systems and methods for selective text to speech synthesis.
  974. Bellegarda, Jerome R.; Yaman, Sibel, Systems and methods for structured stem and suffix language models.
  975. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  976. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  977. Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  978. Cianciarulo,Krys; Cardot,Stephen; Weiseth,Thomas, Systems and methods for underwriting coverage for data transmissions.
  979. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  980. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  981. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  982. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  983. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  984. LaMarca, Anthony G.; Dourish, James P.; Edwards, Warren K.; Salisbury, Michael P., Tagging related files in a document management system.
  985. Morten, Glenn A.; Hiar, Edward Charles; Jacobs, Andre; Veres, James E.; Zhuk, Oscar V.; Tinker, Jeffrey Lee, Tamper prevention and detection for video provided over a network to a client.
  986. Gillen,Robert Joseph; Grimes,Todd Scott, Tamper resistant circuit boards.
  987. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  988. Neels, Alice E.; Jong, Nicholas K., Text correction processing.
  989. Willmore, Christopher P.; Jong, Nicholas K.; Hogg, Justin S., Text prediction using combined word N-gram and unigram language models.
  990. Vieri, Riccardo; Vieri, Flavio, Text to speech conversion of text messages from mobile communication devices.
  991. Hodge, Stephen Lee, Third party monitoring of a activity within a monitoring platform.
  992. Martin, Thomas J., Three-way call detection using steganography.
  993. Martin,Thomas J., Three-way call detection using steganography.
  994. Millman, Jonathan T.; Rajasekharan, Ajit V.; Sperring, Jr., Foy C.; Story, Jr., Guy A., Time-based digital content authorization.
  995. Pitschel, Donald W.; Cheyer, Adam J.; Brigham, Christopher D.; Gruber, Thomas R., Training an at least partial voice command system.
  996. Banaugh, Michelle; Knowlton, Timothy R.; Wood, George L., Transaction ID system and process.
  997. Banaugh, Michelle; Knowlton, Timothy R.; Wood, George L., Transaction ID system and process.
  998. Hahn Carlson, Dean W.; Beck, Elizabeth A.; Suits, David A., Transaction accounting auditing approach and system therefor.
  999. Hahn-Carlson, Dean W.; Beck, Elizabeth A.; Suits, David A., Transaction accounting auditing approach and system therefor.
  1000. Hahn-Carlson, Dean W.; Beck, Elizabeth A.; Suits, David A., Transaction accounting payment and classification system and approach.
  1001. Hahn Carlson,Dean W.; Beck,Elizabeth A.; Suits,David A., Transaction accounting processing system and approach.
  1002. Hahn-Carlson, Dean W., Transaction finance processing system and approach.
  1003. Hahn-Carlson, Dean W., Transaction processing with core and distributor processor implementations.
  1004. Hahn-Carlson, Dean W., Transaction processing with core and distributor processor implementations.
  1005. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  1006. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  1007. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Transferring application secrets in a trusted operating system environment.
  1008. Rassool, Reza P.; Morten, Glenn A.; Baker, Brian A., Transitioning to secure IP communications for encoding, encapsulating, and encrypting data.
  1009. Rassool, Reza P.; Morten, Glenn A.; Baker, Brian A., Transitioning to secure IP communications for encoding, encapsulating, and encrypting data.
  1010. Kalb, Aaron S.; Perry, Ryan P.; Alsina, Thomas Matthieu, Translating phrases from one language into another using an order-based set of declarative rules.
  1011. Kagle, Jonathan C., Trial usage for encrypted subscription-based data.
  1012. Roskind,James A., Trust grant and revocation from a master key to secondary keys.
  1013. Weeks, Stephen P.; Serret-Avila, Xavier, Trust management systems and methods.
  1014. Weeks, Stephen P.; Serret-Avila, Xavier, Trust management systems and methods.
  1015. Weeks, Stephen P.; Serret-Avila, Xavier, Trust management systems and methods.
  1016. Weeks,Stephen P.; Serret Avila,Xavier, Trust management systems and methods.
  1017. Weeks,Stephen P.; Serret Avila,Xavier, Trust management systems and methods.
  1018. Weeks, Stephen P.; Serret-Avila, Xavier, Trust-management systems and methods.
  1019. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  1020. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  1021. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  1022. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  1023. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  1024. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  1025. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  1026. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  1027. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  1028. Bellegarda, Jerome R., Unified ranking with entropy-weighted information for phrase-based semantic auto-completion.
  1029. Raitio, Tuomo J.; Prahallad, Kishore Sunkeswari; Conkie, Alistair D.; Golipour, Ladan; Winarsky, David A., Unit-selection text-to-speech synthesis based on predicted concatenation parameters.
  1030. Jeon, Woojay, Unit-selection text-to-speech synthesis using concatenation-sensitive neural networks.
  1031. Mahlbacher, James C., Universal DRM support for devices.
  1032. Bellegarda, Jerome R., Unsupervised document clustering using latent semantic density analysis.
  1033. Epstein, Michael A., Usage dependent ticket to protect copy-protected material.
  1034. Epstein, Michael A., Usage dependent ticket to protect copy-protected material.
  1035. Epstein, Michael A., Usage dependent ticket to protect copy-protected material.
  1036. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  1037. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  1038. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  1039. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  1040. Farrugia, Augustin J.; Dowdy, Thomas; Fasoli, Gianpaolo, Use of media storage structure with multiple pieces of content in a content-distribution system.
  1041. Haughay, Allen P., User profiling for selecting user specific voice input processing information.
  1042. Haughay, Allen P., User profiling for voice input processing.
  1043. Haughay, Allen P., User profiling for voice input processing.
  1044. Haughay, Allen P., User profiling for voice input processing.
  1045. Gruber, Thomas Robert; Brigham, Christopher Dean; Keen, Daniel S.; Novick, Gregory; Phipps, Benjamin S., Using context information to facilitate processing of commands in a virtual assistant.
  1046. Hauser, Robert R., Using data narrowing rule for data packaging requirement of an agent.
  1047. Gruber, Thomas Robert; Cheyer, Adam John; Guzzoni, Didier Rene, Using event alert text as input to an automated assistant.
  1048. Hodge, Stephen, Utilizing VoIP codec negotiation during a controlled environment call.
  1049. Hahn-Carlson, Dean W., Validation approach for auditing a vendor-based transaction.
  1050. Harris, Adam P.; Schneider, Steve C., Validation of network devices.
  1051. Lemay, Stephen O.; Newendorp, Brandon J.; Dascola, Jonathan R., Virtual assistant activation.
  1052. Schneebeli, Scot L.; Oehrke, Terry Lee; Wells, Scott Christopher, Virtual content publishing system.
  1053. Corless,Peter P., Virtual packing list.
  1054. Wiechers, Alejandro, Virtual publishing system and method.
  1055. Hay, Brian Robert; Hibberd, Timothy Winston; Leenders, Ronald George; Kinder, Richard David, Virtual token.
  1056. Fleizach, Christopher B., Voice control to diagnose inadvertent activation of accessibility features.
  1057. Binder, Justin; Post, Samuel D.; Tackin, Onur; Gruber, Thomas R., Voice trigger for a digital assistant.
  1058. Badaskar, Sameer, Voice-based media searching.
  1059. Badaskar, Sameer, Voice-based media searching.
  1060. Levergood, Thomas Mark; Stewart, Lawrence C.; Morris, Stephen J.; Payne, Andrew C.; Treese, George W., Web advertising method.
  1061. Gobin, Parmeshwar; Hall, Henry Huntington; Hauryluck, Carla Reale; Kanze, Daniel Robert; Liburd, Steven William; Sandt, Kirk Van; Swei, Jia Huei, Web based integrated customer interface for invoice reporting.
  1062. DeAnna, Robert, Web service interface for mobile agents.
  1063. Dupray, Dennis J., Wireless location gateway and applications therefor.
  1064. Dupray, Dennis J.; Karr, Charles L., Wireless location using location estimators.
  1065. Dupray Dennis J., Wireless location using multiple location estimators.
  1066. Karr, Charles L.; Dupray, Dennis J., Wireless location using multiple mobile station location techniques.
  1067. Dupray, Dennis J.; Karr, Charles L.; Goldberg, Sheldon F., Wireless location using network centric location estimators.
  1068. Karr, Charles L.; Dupray, Dennis J., Wireless location using signal fingerprinting and other location estimators.
  1069. Myers, Joan; Garrison, Sara; Carlson, Mark, Wireless payment method and systems.
  1070. Myers, Joan; Garrison, Sara; Carlson, Mark, Wireless payment method and systems.
  1071. Myers, Joan; Garrison, Sara; Carlson, Mark, Wireless payment method and systems.
  1072. Myers, Joan; Garrison, Sara; Carlson, Mark S., Wireless payment method and systems.
  1073. Myers,Joan; Garrison,Sara; Carlson,Mark Steven, Wireless payment method and systems.
  1074. Myers, Joan; Garrison, Sara, Wireless portable consumer electronics device facilitating multi-range transactions.
  1075. Norman Ken Ouchi, Workflow systems and methods.
  1076. Ouchi Norman Ken, Workflow systems and methods.
  1077. Ouchi, Norman Ken, Workflow systems and methods for project management and information management.
  1078. Ouchi, Norman Ken, Workflow systems and methods for project management and information management.
  1079. Ouchi, Norman Ken, Workflow systems and methods for project management and information management.
  1080. Ouchi, Norman Ken, Workflow systems and methods for project management and information management.
  1081. Ouchi, Norman Ken, Workflow systems and methods for project management and information management.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로