$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method for securely distributing a conditional use private key to a trusted entity on a remote system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • H04L-009/08
  • H04L-009/30
  • H04L-009/32
출원번호 US-0993597 (1997-12-18)
발명자 / 주소
  • Graunke Gary L.
  • Carbajal John
  • Maliszewski Richard L.
  • Rozas Carlos V.
출원인 / 주소
  • Intel Corporation
대리인 / 주소
    Skabrat
인용정보 피인용 횟수 : 541  인용 특허 : 3

초록

Secure distribution of a private key to a user's application program (also called a "trusted player" such as a DVD player or CD-ROM player) with conditional access based on verification of the trusted player's integrity and authenticity is provided. Once validated, the trusted player uses the privat

대표청구항

[ What is claimed is:] [31.] A system for secure distribution of data comprising:a first system comprising a first processor for executing a first set of programming instructions, and a first storage medium having stored thereon the first set of programming instructions for execution by the first pr

이 특허에 인용된 특허 (3)

  1. Rackman Michael I. (1710 Glenwood Rd. Brooklyn NY 11230), Cartridge-controlled system whose use is limited to authorized cartridges.
  2. Chorley Bernard J. (Hampton GB2) Parkin Graeme I. P. (London GB2) Wichmann Brian A. (Woking GB2) Elsom Simon M. (Feltham GB2), Software protection device.
  3. Ostrover Lewis S. (Los Angeles CA) Cookson Christopher J. (Los Angeles CA), System and method for authenticating software carriers.

이 특허를 인용한 특허 (541)

  1. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., Accessing protected content in a rights-management architecture.
  2. Dorwin, David Kimbal; Colwell, Aaron James; Scherkus, Andrew Martin; Galligan, Francis, Allowing degraded play of protected content using scalable codecs when key/license is not obtained.
  3. Elazar, Gidon; Harkabi, Dan; Weingarten, Nehemiah, Apparatus for transferring licensed digital content between users.
  4. Elazar, Gidon; Harkabi, Dan; Weingarten, Nehemiah, Apparatus, system and method for securing digital documents in a digital appliance.
  5. Elazar, Gidon; Harkabi, Dan; Weingarten, Nehemiah, Apparatus, system and method for securing digital documents in a digital appliance.
  6. Kollmyer,Brad; Baker,Brian; Shapiro,Eric; Kollmyer,Aric; Rutman,Mike; MacLean,Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Apparatus, system and method for selectively encrypting different portions of data sent over a network.
  7. Dorwin, David Kimbal, Application-driven playback of offline encrypted content with unaware DRM module.
  8. Dorwin, David Kimbal, Application-driven playback of offline encrypted content with unaware DRM module.
  9. Armstrong,Alan; Heindel,Justin; Sutardja,Sehat; Azimi,Saeed; Sheredy,Joseph, Architecture for a data storage device.
  10. Narin, Attila; DeMello, Marco A.; Yaacovi, Yoram; Alger, Jeffrey A.; Keely, Leroy B.; Silver, David Michael; Madonna, Christopher Robert Richard; Beezer, John; Hughes, Kathryn E., Architecture for an electronic shopping service integratable with a software application.
  11. Johnson, Richard C.; Morgan, Andrew; Anvin, H. Peter; Torvalds, Linus, Architecture, system, and method for operating on encrypted and/or hidden information.
  12. Johnson, Richard C.; Morgan, Andrew; Anvin, H. Peter; Torvalds, Linus, Architecture, system, and method for operating on encrypted and/or hidden information.
  13. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Malik,Prashant; Hughes,Kathryn E.; Byrum,Frank D., Asynchronous communication within a server arrangement.
  14. Lampson,Butler W.; DeTreville,John D.; England,Paul, Attesting to a value of a register and/or memory region.
  15. Rassool, Reza P., Audio/video identification watermarking.
  16. Rassool, Reza P., Audio/video identification watermarking.
  17. Durst, David I.; Kaish, Norman; Fraser, Jay, Authentication method and system.
  18. Durst, David I.; Kaish, Norman; Fraser, Jay, Authentication method and system.
  19. Durst, David I.; Kaish, Norman; Fraser, Jay; Hoffberg, Michael; Rodricks, Brian, Authentication method and system.
  20. Durst,David I.; Kaish,Norman; Fraser,Jay, Authentication method and system.
  21. Durst,David I.; Kaish,Norman; Fraser,Jay; Hoffberg,Michael; Rodricks,Brian, Authentication method and system.
  22. Fraser, Jay, Authentication method and system.
  23. Fraser, Jay, Authentication method and system.
  24. Fraser, Jay; Weber, Larry, Authentication method and system.
  25. Fraser, Jay; Weber, Larry, Authentication method and system.
  26. Fraser, Jay; Weber, Lawrence, Authentication method and system.
  27. Bräutigam, Thomas; Johne, Andreas, Authentication-secured access to a data carrier comprising a mass storage device and chip.
  28. Parthasarathy,Srivatsan; Pratschner,Steven J.; Sinclair,Craig T., Binding by hash.
  29. Giobbi, John J., Biometric personal data key (PDK) authentication.
  30. Giobbi, John J., Biometric personal data key (PDK) authentication.
  31. Giobbi, John J., Biometric personal data key (PDK) authentication.
  32. Lampson, Butler W.; DeTreville, John D.; England, Paul, Boot blocks for software.
  33. Vannier, Eric; Dorwin, David Kimbal, Browser/web apps access to secure surface.
  34. Greschler, David M.; Mysliwy, Owen; Schaefer, Stuart, Business method and system for serving third party software applications.
  35. Howard, James Alexander; Turner, William Bedford; Blumenberg, Christopher; Williamson, Richard, Caching multiple views corresponding to multiple aspect ratios.
  36. Boyer, John M.; Trakhtenberg, Vladimir, Capturing user interface switch states.
  37. Little, Herbert A.; Adams, Neil P.; Tapuska, David F.; Brown, Michael S.; Kirkup, Michael G.; Godfrey, James A., Certificate management and transfer system and method.
  38. Little, Herbert Anthony; Adams, Neil Patrick; Tapuska, David Francis; Brown, Michael Stephen; Godfrey, James Andrew; Kirkup, Michael Grant, Certificate management and transfer system and method.
  39. Little, Herbert Anthony; Adams, Neil Patrick; Tapuska, David Francis; Brown, Michael Stephen; Kirkup, Michael Grant; Godfrey, James Andrew, Certificate management and transfer system and method.
  40. England, Paul, Client-side boot domains and boot rules.
  41. England, Paul, Client-side boot domains and boot rules.
  42. England,Paul, Client-side boot domains and boot rules.
  43. Pearson,Siani Lynne; Chan,David, Computer platforms and their methods of operation.
  44. Harris, Steven M., Computer program for securely viewing a file.
  45. Martinek,Michael G.; Jackson,Mark D.; Yoseloff,Mark L., Computerized gaming system, method and apparatus.
  46. Yoseloff, Mark L.; Jackson, Mark D.; Martinek, Michael G.; Brower, Donald A.; DeJournett, John L., Computerized gaming system, method and apparatus.
  47. Kravitz, David W.; Goldschlag, David M., Conditional access via secure logging with simplified key management.
  48. Gobbi, John J.; Kelly, Bryan; Brown, David L.; Hirt, Fred S., Configuration of interfaces for a location detection system and application.
  49. Louis C. Cornick, Jr., Container contents verification.
  50. Kocher, Paul Carl; Jaffe, Joshua Michael; Jun, Benjamin Che-Ming; Carter, Matthew Thomas; Pearson, Peter Kelley, Content security layer providing long-term renewable security.
  51. Kocher, Paul Carl; Jaffe, Joshua Michael; Jun, Benjamin Che-Ming; Carter, Matthew Thomas; Pearson, Peter Kelley, Content security layer providing long-term renewable security.
  52. Ji, Eun-Mook; Jhee, Eun-Mi, Contents consignment sale system and method for networking broadcasting.
  53. Shiragami,Naomi; Hatoh,Kazumi, Contents management system.
  54. Lipkin Efrem ; Goldstein Theodore C., Controlling access to services between modular applications.
  55. Collart,Todd, Controlling playback of content stored on a portable storage medium.
  56. Meissner, Klaus; Nerz, Bernd; Yeh, Phil C.; Sutton, Peter G.; Kelly, Michael J., Conversion of cryptographic key protection.
  57. Daniel Schreiber IL; Andrew Goldman IL, Copy protection of digital images transmitted over networks.
  58. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  59. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  60. Dorwin, David Kimbal, DRM provider interoperability.
  61. Kamiya,Shigeki; Yamashita,Masami, Data delivery method and data delivery system using sets of passkeys generated by dividing an encryption key.
  62. Challener, David Carroll; Cromer, Daryl Carvis; Davis, Mark Charles; Elliott, Scott Thomas; Locker, Howard Jeffrey; Trotter, Andy Lloyd; Ward, James Peter, Data processing system and method for maintaining secure user private keys in non-secure storage.
  63. Riordan, James F., Data processing systems.
  64. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  65. Paley, Sasha; Boshover, Arik; Bychkov, Eyal; Ziv, Aran, Data storage device with multi-access capabilities.
  66. Chitkara, Rajnish K.; Banks, Barbara J.; Patel, Anita R., Database system providing SQL extensions for automated encryption and decryption of column data.
  67. Banks, Barbara J.; Chitkara, Rajnish Kumar; Chen, Shiping, Database system providing encrypted column support for applications.
  68. Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; LeMay, Steven G.; Nelson, Dwayne R.; Palchetti, Johnny; Benbrahim, Jamal, Decoupling of the graphical presentation of a game from the presentation logic.
  69. Dorwin, David Kimbal; Scherkus, Andrew Martin, Detecting supported digital rights management configurations on a client device.
  70. Howard, James Alexander; Turner, William Bedford; Kinnis, Tony F.; Sun, Kenley, Digital content bundle.
  71. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  72. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  73. Giobbi, John J., Digital content security system.
  74. Giobbi,John J., Digital content security system.
  75. Giobbi,John J., Digital content security system.
  76. Cha, Ghun-Up; Kang, Myeong-Joon; Jung, Han, Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon.
  77. Cha, Ghun-Up; Kang, Myeong-Joon; Jung, Han, Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon.
  78. Cha, Ghun-Up; Kang, Myeong-Joon; Jung, Han, Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon.
  79. Cha,Ghun Up; Kang,Myeong Joon; Jung,Han, Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon.
  80. Rowe, Richard E., Digital identification of unique game characteristics.
  81. Rowe,Richard E., Digital identification of unique game characteristics.
  82. Vestergaard,Steve; Tsui,Che Wai (William); Kolic,Edward, Digital media distribution method and system.
  83. Giobbi,John J., Digital rights management.
  84. Boccon-Gibod, Gilles; Boeuf, Julien G., Digital rights management engine systems and methods.
  85. Boccon-Gibod, Gilles; Boeuf, Julien G., Digital rights management engine systems and methods.
  86. Boccon-Gibod, Gilles; Boeuf, Julien G.; Manente, Michael G.; Bradley, William B., Digital rights management engine systems and methods.
  87. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  88. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  89. Shen Orr,Chaim; Hibshoosh,Eliphaz; Benedek,Gyora; Solow,Hillel; Belenky,Yaacov; Tsuria,Yossi; Shkedy,Zvi, Digital rights management system and method.
  90. von Behren, Rob; Wall, Jonathan, Digital wallet.
  91. von Behren, Rob; Wall, Jonathan, Digital wallet.
  92. Ortiz, Luis M., Displaying broadcasts of multiple camera perspective recordings from live activities at entertainment venues on remote video monitors.
  93. Fritsch Bernhard, Distribution of musical products by a web site vendor over the internet.
  94. Dorwin, David Kimbal, Dynamically changing stream quality of protected content based on a determined change in a platform trust.
  95. Dorwin, David Kimbal, Dynamically changing stream quality when user is unlikely to notice to conserve resources.
  96. Rajasekaran,Sanguthevar, Efficient techniques for sharing a secret.
  97. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  98. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  99. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  100. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  101. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  102. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  103. Palaniappan, Murugappan, Electronic fulfillment system for distributing digital goods.
  104. Alcorn,Allan E.; Jenkins,Harry H., Electronic gaming apparatus with authentication.
  105. Chatfield, Keith Marshall; Brittner, Rod, Electronic system for the protection and control of license transactions associated with the alteration of replicated read only media and its bound licensed content.
  106. Chatfield, Keith Marshall; Brittner, Rod, Electronic system for the protection and control of license transactions associated with the alteration of replicated read only media and its bound licensed content.
  107. Chatfield, Keith Marshall, Electronic system for the protection and control of license transactions associated with the disablement of replicated read only media and its bound licensed content.
  108. Ortiz, Luis M.; Lopez, Kermit D., Electronic wireless hand held multimedia device.
  109. Rassool, Reza P.; Morten, Glenn A., Enabling transferable entitlements between networked devices.
  110. Rassool, Reza P.; Morten, Glenn A., Enabling transferable entitlements between networked devices.
  111. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a central trusted service manager.
  112. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a central trusted service manager.
  113. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a central trusted service manager.
  114. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a key escrow service.
  115. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a key escrow service.
  116. Pelly, Nicholas Julian; Hamilton, Jeffrey William, Enabling users to select between secure service providers using a key escrow service.
  117. Carter, Ernst B.; Zolotov, Vasily, Encrypting operating system.
  118. Carter, Ernst B.; Zolotov, Vasily, Encrypting operating system.
  119. Carter, Ernst B.; Zolotov, Vasily, Encrypting operating system.
  120. Jackson, Mark D.; Martinek, Michael G., Encryption in a secure computerized gaming system.
  121. Jackson,Mark D.; Martinek,Michael G., Encryption in a secure computerized gaming system.
  122. Jackson,Mark D.; Martinek,Michael G., Encryption in a secure computerized gaming system.
  123. Martinek,Michael G.; Jackson,Mark D., Encryption in a secure computerized gaming system.
  124. Mitchell, Christopher E.; Kunins, Jeff C.; Metral, Max E., Encryption key updating for multiple site automated login.
  125. Mitchell, Christopher E.; Kunins, Jeff C.; Metral, Max E., Encryption key updating for multiple site automated login.
  126. Uranaka, Sachiko; Kiyono, Masaki; Tatebayashi, Makoto, Encryption system for distributing a common crypt key.
  127. Dorwin, David Kimbal, Extending browser functionality with dynamic on-the-fly downloading of untrusted browser components.
  128. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  129. Bueche, Charles L., Factory-installed software purchase verification key.
  130. LeMay, Steven G.; Nelson, Dwayne R.; Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; Palchetti, Johnny; Benbrahim, Jamal, Game development architecture that decouples the game logic from the graphics logic.
  131. LeMay, Steven G.; Nelson, Dwayne R.; Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; Palchetti, Johnny; Benbrahim, Jamal, Game development architecture that decouples the game logic from the graphics logic.
  132. Alcorn,Allan E.; Jenkins,Harry H., Gaming apparatus with portrait-mode display.
  133. Eldridge, Alan D.; Kern, David S., Generating a secret key from an asymmetric private key.
  134. England, Paul; Peinado, Marcus, Generating, migrating or exporting bound keys.
  135. England, Paul; Lampson, Butler W., Hierarchical trusted code for content protection in computers.
  136. England, Paul; Lampson, Butler W., Hierarchical trusted code for content protection in computers.
  137. England,Paul; Lampson,Butler W., Hierarchical trusted code for content protection in computers.
  138. Lampson,Butler W.; England,Paul, Hierarchical trusted code for content protection in computers.
  139. Lee,Lane W.; Feldman,Timothy R.; Rayburn,Douglas M.; Kiwimagi,Gary G., Host certification method and system.
  140. Brown, David L., Hybrid device having a personal digital key and receiver-decoder circuit and methods of use.
  141. Brown, David L., Hybrid device having a personal digital key and receiver-decoder circuit and methods of use.
  142. Brown, David L., Hybrid device having a personal digital key and receiver-decoder circuit and methods of use.
  143. Graunke, Gary L., Implementing portable content protection to secure secrets.
  144. Howard, James Alexander; Turner, William Bedford; Blumenberg, Christopher; Williamson, Richard, In application purchasing.
  145. Ortiz, Luis M., In-play camera associated with headgear used in sporting events and configured to provide wireless transmission of captured video for broadcast to and display at remote video monitors.
  146. Brouwer, Michael Lambertus Hubertus; Adler, Mitchell D.; Freedman, Gordon J., Incremental secure backup and restore of user settings and data.
  147. Brouwer, Michael Lambertus Hubertus; Adler, Mitchell D.; Freedman, Gordon J., Incremental secure backup and restore of user settings and data.
  148. Takashima, Yoshikazu, Information processing apparatus and method, information recording medium manufacturing apparatus and method, and information recording medium.
  149. Takashima, Yoshikazu, Information processing apparatus and method, information recording medium, and computer program.
  150. Hattori, Shinobu; Takashima, Yoshikazu, Information processing apparatus, information processing method and computer program.
  151. Tanaka, Koichi; Kawakami, Itaru; Kuroda, Yoshisuke; Ishiguro, Ryuji, Information processing method, information processing apparatus and recording medium.
  152. Go,Naomi; Kurihara,Akira, Information providing apparatus and method, information processing apparatus and method, and program storage medium.
  153. Go,Naomi; Kurihara,Akira, Information providing apparatus and method, information processing apparatus and method, and program storage medium.
  154. Kurihara, Shinichi, Information provision system, content information copying device, user terminal device and user management device.
  155. Kurihara, Shinichi, Information provision system, provision information copying device, user terminal device and user management device.
  156. Felsher, David Paul, Information record infrastructure, system and method.
  157. Proudler, Graeme John, Information security system.
  158. Carey, W. Knox; Nilsson, Jarl, Information security systems and methods.
  159. Carey, W. Knox; Nilsson, Jarl, Information security systems and methods.
  160. Jia,Zheng; Shen,Ji, Instruction/data protection employing derived obscuring instruction/data.
  161. Liu, Xian Jun; Chang, Robert C.; Yuan, Po; Wang, Junzhi; Barzilai, Ron; Qawami, Bahman; Sabet-Sharghi, Farshid, Integration of secure data transfer applications for generic IO devices.
  162. Fetkovich, John Edward; Wilhelm, Jr., George William, Integrity checking an executable module and associated protected service provider module.
  163. DeMello, Marco A.; Zeman, Pavel; Krishnaswamy, Vinay; Byrum, Frank D., Inter-server communication using request with encrypted parameter.
  164. Hashimoto,Mikio; Yamaguchi,Kensaku; Shirakawa,Kenji; Fujimoto,Kensaku, Internal memory type tamper resistant microprocessor with secret protection function.
  165. Zeng, Nianning, Internet-based automated system and a method for software copyright protection and sales.
  166. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  167. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  168. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  169. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  170. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  171. Kocher, Paul Carl; Jaffe, Joshua Michael; Jun, Benjamin Che-Ming; Carter, Matthew Thomas; Pearson, Peter Kelley, Interpreter using cryptographic values of a playback device's keys to authorize the playback device.
  172. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  173. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  174. Bader, James E.; Waters, II, Jack R.; Beaubien, Eric R., Key interface for secure object manipulation.
  175. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  176. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  177. Eye,Randal; Siner,Thomas; Segal,Jeffrey; Goldschlag,David Moshe; Schumann,Robert Wilhelm, Local content security system.
  178. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem, Local trusted services manager for a contactless smart card.
  179. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem, Local trusted services manager for a contactless smart card.
  180. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem, Local trusted services manager for a contactless smart card.
  181. Kim, Hyung Sun; Kim, Byuong Jin, Managing copy protecting information of encrypted data.
  182. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  183. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  184. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  185. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  186. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  187. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  188. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  189. Chang, Robert Chin-Tse; Hutton, Henry Ricardo; Sabet-Sharghi, Farshid; Tanik, Haluk Kent; Barzilai, Ron; Soffer, Meytal; Yan, Mei; Dwyer, Patricia; Yuan, Po; Qawami, Bahman, Media card command pass through methods.
  190. Chang, Robert Chin-Tse; Hutton, Henry Ricardo; Sabet-Sharghi, Farshid; Tanik, Haluk Kent; Barzilai, Ron; Soffer, Meytal; Yan, Mei; Dwyer, Patricia; Yuan, Po; Qawami, Bahman, Media card command pass through methods.
  191. J. Robert Sims, III, Media content protection utilizing public key cryptography.
  192. Sims, III, J Robert, Media content protection utilizing public key cryptography.
  193. Tanaka, Yoshiyuki; Nakamura, Hiroshi; Sukegawa, Hiroshi; Nakabayashi, Mikito; Kawamoto, Kazuya, Memory device storing identifying information and memory card including the same.
  194. Yoshiyuki Tanaka JP; Hiroshi Nakamura JP; Hiroshi Sukegawa JP; Mikito Nakabayashi JP; Kazuya Kawamoto JP, Memory system.
  195. DeTreville,John, Method and apparatus for authenticating an open system application to a portable IC device.
  196. DeTreville,John D., Method and apparatus for authenticating an open system application to a portable IC device.
  197. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
  198. Mobini, Amir M.; Dinallo, Chris A., Method and apparatus for enabling internet access with DVD bitstream content.
  199. Ignaszewski, Michael, Method and apparatus for generating and using a tamper-resistant encryption key.
  200. Ignaszewski,Michael, Method and apparatus for generating and using a tamper-resistant encryption key.
  201. Raley, Michael C.; Chen, Daniel C.; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  202. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  203. Schreiber,Daniel; Guedaliah,David, Method and apparatus for preventing reuse of text, images and software transmitted via networks.
  204. Schreiber, Daniel; Guedaliah, David, Method and apparatus for preventing reuse of text, images, and software transmitted via networks.
  205. Gewickey,Greg; Collart,Todd, Method and apparatus for providing content-owner control in a networked device.
  206. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for secure content delivery over broadband access networks.
  207. Deaver,John; Klebe,Skott C.; Johnson,Woodrow W., Method and apparatus for secure delivery and rights management of digital content.
  208. Mittal, Millind, Method and apparatus for secure execution using a secure memory partition.
  209. Mittal, Millind, Method and apparatus for secure execution using a secure memory partition.
  210. Mittal, Millind, Method and apparatus for secure execution using a secure memory partition.
  211. Mittal, Millind, Method and apparatus for secure execution using a secure memory partition.
  212. Mittal, Millind, Method and apparatus for secure execution using a secure memory partition.
  213. Mittal, Millind, Method and apparatus for secure execution using a secure memory partition.
  214. Mittal, Millind, Method and apparatus for secure execution using a secure memory partition.
  215. Mittal, Millind, Method and apparatus for secure execution using a secure memory partition.
  216. Mittal,Millind, Method and apparatus for secure execution using a secure memory partition.
  217. Deaver, John; Johnson, Woodrow W.; Klebe, Skott C., Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site.
  218. Deaver, John; Klebe, Skott C.; Johnson, Woodrow W., Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site.
  219. Deaver,John; Klebe,Skott C.; Johnson,Woodrow W., Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site.
  220. Patrick A. Lyson CA; Ron J. Vandergeest CA, Method and apparatus for securing and accessing data elements within a database.
  221. LeMay, Steven G.; Benbrahim, Jamal; Chen, Xuedong, Method and apparatus for software authentication.
  222. Jacobs, Stuart J.; Mannix, Jr., Francis Leo; Christoffel, Thomas William; Belgard, Scott Andrew, Method and apparatus for supporting cryptographic-related activities in a public key infrastructure.
  223. Jacobs,Stuart J.; Mannix, Jr.,Francis Leo; Christoffel,Thomas William; Belgard,Scott Andrew, Method and apparatus for supporting cryptographic-related activities in a public key infrastructure.
  224. Sundararajan, Arvind; Chan, Chi Bun; Shirazi, Nabeel, Method and circuit for secure definition and integration of cores.
  225. Michael Baentsch CH; Peter Buhler CH; Thomas Eirich CH; Frank Hoering CH; Marcus Oestreicher CH, Method and device for loading instruction codes to a memory and linking said instruction codes.
  226. Barton, Colleen A.; Moos, Daniel, Method and logic for capturing and analyzing conduit data.
  227. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  228. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  229. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  230. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  231. Morrison,Michael C., Method and system for conducting a transaction over a network.
  232. Risan, Hank; Fitzgerald, Edward Vincent, Method and system for controlling presentation of media on a media storage device.
  233. Rubin, Moshe; Schreiber, Daniel, Method and system for copy protection of displayed data content.
  234. Rubin,Moshe; Schreiber,Daniel, Method and system for copy protection of displayed data content.
  235. Rubin, Moshe B.; Halibard, Moishe, Method and system for copy protection of images displayed on a computer monitor.
  236. Rubin,Moshe; Goldman,Andrew; Schreiber,Daniel A., Method and system for copyright protection of digital images.
  237. Schreiber Daniel,ILX ; Goldman Andrew,ILX, Method and system for copyright protection of digital images transmitted over networks.
  238. O'Toole, Jr., James W., Method and system for digital rights management brokering and digital asset security transcoding.
  239. Morten,Glenn A.; Rassool,Reza P.; Claeys,Tom E.; Baker,Brian Andrew, Method and system for end to end securing of content for video on demand.
  240. DeMello, Marco A.; Yaacovi, Yoram; Zeman, Pavel, Method and system for limiting the use of user-specific software features.
  241. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Method and system for music distribution.
  242. Morten, Glenn A.; Palmer, Tomás E.; MacLean, Charles D., Method and system for providing secure CODECS.
  243. Ziese, Kevin J., Method and system for providing tamper-resistant executable software.
  244. Goodman, Daniel I., Method and system for real-time control of document printing.
  245. Goodman, Daniel I., Method and system for real-time control of document printing.
  246. Zhuk, Oscar V.; Rohr, Vince M., Method and system for real-time tamper evidence gathering for software.
  247. Grandcolas, Michael; Guzman, Marc; Yee, Thomas; Parekh, Dilip; Chen, Yongqiang, Method and system for secure authentication of a user by a host system.
  248. Grandcolas, Michael; Guzman, Marc; Yee, Thomas; Parekh, Dilip; Chen, Yongqiang, Method and system for secure authentication of a user by a host system.
  249. McCarroll, William M., Method and system for using tamperproof hardware to provide copy protection and online security.
  250. Couillard,Bruno, Method and system providing improved security for the transfer of root keys.
  251. Vincent, Christophe; Eluard, Marc; Maetz, Yves, Method for acquisition of software applications.
  252. DeMello,Marco A.; Narin,Attila; Yaacovi,Yoram, Method for authenticating and securing integrated bookstore entries.
  253. Fulton, Nicholas; Butler, James Matthew; Curtis, Mark Anthony; Parrott, David; Whitehead, Miles Jonathan; Wu, Hui, Method for certifying and verifying digital web content using public cryptography.
  254. Jackson, Mark D., Method for developing gaming programs compatible with a computerized gaming operating system and apparatus.
  255. Koelle, Katharina Veronika; Midwinter, Wendy, Method for evolving detectors to detect malign behavior in an artificial immune system.
  256. Koelle, Katharina Veronika; Midwinter, Wendy, Method for evolving detectors to detect malign behavior in an artificial immune system.
  257. Kiiveri, Antti, Method for protecting electronic device, and electronic device.
  258. Dorwin, David Kimbal; Finnan, Hugh, Method for reducing time to first frame/seek frame of protected digital content streams.
  259. Herbert, Howard C.; Davis, Derek L., Method for secure distribution and configuration of asymmetric keying material into semiconductor devices.
  260. Kohiyama, Kiyoshi; Yoshitake, Toshiyuki; Watanabe, Yasuhiro; Morioka, Kiyonori, Method of and apparatus for reproducing information, and security module.
  261. Kohiyama, Kiyoshi; Yoshitake, Toshiyuki; Watanabe, Yasuhiro; Morioka, Kiyonori, Method of and apparatus for reproducing information, and security module.
  262. Kohiyama, Kiyoshi; Yoshitake, Toshiyuki; Watanabe, Yasuhiro; Morioka, Kiyonori, Method of and apparatus for reproducing information, and security module.
  263. Shuster, Gary Stephen, Method of distributing a decryption key in fixed-content data.
  264. Shuster, Gary Stephen, Method of distributing a decryption key in fixed-content data.
  265. Kim, Hyung Sun; Kim, Byung Jin, Method of recording and reproducing sample data to/from a recording medium and sample data containing recording medium.
  266. Kim, Hyung Sun; Kim, Byung Jin, Method of recording and reproducing sample data to/from a recording medium and sample data containing recording medium.
  267. Dorwin, David Kimbal; Scherkus, Andrew; Kaiser, Christian; Lacey, Stephen John, Method, manufacture, and apparatus for configuring multiple content protection systems.
  268. Dorwin, David Kimbal, Method, manufacture, and apparatus for content decryption module.
  269. Dorwin, David Kimbal; Scherkus, Andrew; Lacey, Stephen John; Kaiser, Christian, Method, manufacture, and apparatus for content protection for HTML media elements.
  270. Dorwin, David Kimbal; Scherkus, Andrew; Kaiser, Christian, Method, manufacture, and apparatus for content protection using authentication data.
  271. Dorwin, David Kimbal, Method, manufacture, and apparatus for instantiating plugin from within browser.
  272. Dorwin, David Kimbal; Scherkus, Andrew Martin, Method, manufacture, and apparatus for protection of media objects from the web application environment.
  273. Ortiz, Luis M.; Lopez, Kermit D., Method, system and server for authorizing computing devices for receipt of venue-based data based on the geographic location of a user.
  274. Jaquette, Glen Alan, Method, system, and program for securely providing keys to encode and decode data in a storage cartridge.
  275. Jaquette, Glen Alan, Method, system, and program for securely providing keys to encode and decode data in a storage cartridge.
  276. Boyer, John M.; Trakhtenberg, Vladimir, Method, system, and program product for generating and validating digital signatures.
  277. Boyer, John M.; Trakhtenberg, Vladimir, Method, system, and program product for preventing unauthorized changes to an electronic document.
  278. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P.; Sibert, W. Olin; Van Wie, David M., Methods and apparatus for persistent control and protection of content.
  279. Schreiber Daniel,ILX ; Guedaliah David,ILX, Methods and apparatus for preventing reuse of text, images and software transmitted via networks.
  280. North, Gregory Allen; Perry, Matthew Richard; Kircher, Brian Christopher, Methods and circuits for securing encached information.
  281. Lamkin, Allan B.; Gewickey, Gregory I.; Collart, Todd R., Methods and system for use in network management of content.
  282. Ortiz, Luis M.; Lopez, Kermit D., Methods and systems for authorizing computing devices for receipt of venue-based data based on the location of a user.
  283. Grandcolas, Michael; Guzman, Marc; Yee, Thomas; Parekh, Dilip; Chen, Yonggiang, Methods and systems for secure authentication of a user by a host system.
  284. Lamkin, Allan B.; Gewickey, Gregory I.; Collart, Todd R., Methods and systems for use in network management of content.
  285. Proudler, Graeme John; Burton, William; Kuhlmann, Dirk; Plaquin, David, Methods, devices and data structures for trusted data.
  286. Noble, Gary Paul, Methods, systems and computer program products for controlling the disclosure time of information.
  287. Lau,James Sheung, Methods, systems, signals and media for encouraging users of computer readable content to register.
  288. Hoffberg, Steven M., Multifactorial optimization system and method.
  289. Marco M. Hurtado ; George Gregory Gruse ; Edgar Downs ; Kenneth Louis Milsted, Multimedia player for an electronic content delivery system.
  290. Sellars,William; Cochran, Jr.,William K.; Hunt,David C., Multiple party content distribution system and method with rights management features.
  291. Hunter, Charles E.; Hebrank, John H.; Sparks, Kelly C., Music distribution system and associated antipiracy protections.
  292. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Music distribution systems.
  293. Hunter, Charles Eric; Hebrank, John H., Music distribution systems.
  294. Hunter, Charles Eric; Sparks, Kelly C.; Hebrank, John H., Music distribution systems.
  295. Hunter,Charles Eric; Ballou, Jr.,Bernard L.; Sparks,Kelly C.; Hebrank,John H., Music distribution systems.
  296. Lee,Michael G., Network communication authentication.
  297. Tinker, Jeffrey Lee; MacLean, Charles Duncan; Ali, Hamid Shaheed; Hiar, Edward Charles; Rutman, Michael; Morten, Glenn A., Non-blocking of head end initiated revocation and delivery of entitlements non-addressable digital media network.
  298. Zagni, Renzo, Online password management.
  299. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Operating system upgrades in a trusted operating system environment.
  300. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  301. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem; Muehlberg, Alexej; Meyn, Hauke, Partitioning the namespace of a contactless smart card.
  302. Martinek, Michael G.; Jackson, Mark D.; Downs, III, Justin G., Pass-through live validation device and method.
  303. von Behren, Rob; Wall, Jonathan; Muehlberg, Alexej; Meyn, Hauke, Payment application lifecycle management in a contactless smart card.
  304. Giobbi, John J., Personal digital key and receiver/decoder circuit system and method.
  305. Giobbi, John J., Personal digital key and receiver/decoder circuit system and method.
  306. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  307. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  308. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  309. Tanaka, Keiichi; Ohto, Hidetaka; Oashi, Masahiro, Playback apparatus for performing application-synchronized playback.
  310. Tanaka, Keiichi; Ohto, Hidetaka; Oashi, Masahiro, Playback apparatus for performing application-synchronized playback.
  311. Tanaka, Keiichi; Oto, Hidetaka; Oashi, Masahiro, Playback apparatus for performing application-synchronized playback.
  312. Rowe, Richard E.; Moser, Timothy W.; Schaefer, Craig Michael; Iddings, Cara; Nelson, Dwayne R., Pluggable modular gaming modifiers and configuration templates for gaming environments.
  313. Schaefer, Stuart; Schmeidler, Yonah; Levin, Ilya, Policy based composite file system and method.
  314. Siegel, Jaime A., Portable music player with pay per play usage and method for purchase of credits for usage.
  315. Jooste, Sarel Kobus; Joseph, John; Farmer, Shane Alexander, Portable secure element.
  316. Jooste, Sarel Kobus; Joseph, John; Farmer, Shane Alexander, Portable secure element.
  317. Morten, Glenn A., Pre-binding and tight binding of an on-line identity to a digital signature.
  318. Lamkin,Allan B.; Collart,Todd R.; Gewickey,Greg, Presentation of media content.
  319. Lamkin,Allan B.; Collart,Todd R.; Gewickey,Greg, Presentation of media content.
  320. Lamkin,Allan B.; Collart,Todd R.; Gewickey,Greg, Presentation of media content from multiple media sources.
  321. Zhuk, Oscar V.; Morten, Glenn A.; Hiar, Edward Charles, Preventing unauthorized modification or skipping of viewing of advertisements within content.
  322. Olson,Erik B.; Zinda,Eric K., Prevention of software tampering.
  323. Tye, Bee June; Chai, Song Poh, Printer consumable ordering direct from printer.
  324. Baker,Brian, Process and streaming server for encrypting a data stream.
  325. Baker, Brian A.; Morten, Glenn A.; MacLean, Charles Duncan; Tinker, Jeffrey Lee, Process and streaming server for encrypting a data stream with bandwidth based variation.
  326. Baker, Brian A.; Morten, Glenn A.; MacLean, Charles Duncan; Tinker, Jeffrey Lee, Process and streaming server for encrypting a data stream with bandwidth based variation.
  327. Cockerille, Warner; LeMay, Steven G.; Breckner, Robert, Process verification.
  328. Matsushima, Hideki; Hirota, Teruto; Shoda, Yukie; Harada, Shunji, Program execution device.
  329. Matsushima, Hideki; Hirota, Teruto; Shoda, Yukie; Harada, Shunji, Program execution device.
  330. Matsushima, Hideki; Hirota, Teruto; Shoda, Yukie; Harada, Shunji, Program execution device.
  331. Matsushima, Hideki; Hirota, Teruto; Shoda, Yukie; Harada, Shunji, Program execution device.
  332. Matsushima, Hideki; Hirota, Teruto; Shoda, Yukie; Harada, Shunji, Program execution device.
  333. Matsushima, Hideki; Hirota, Teruto; Shoda, Yukie; Harada, Shunji, Program execution device.
  334. Matsushima, Hideki; Hirota, Teruto; Shoda, Yukie; Harada, Shunji, Program execution device.
  335. Matsushima, Hideki; Hirota, Teruto; Shoda, Yukie; Harada, Shunji, Program execution device.
  336. Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
  337. Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
  338. Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
  339. Wray, John C., Protected data replication.
  340. Kodukula, Narasimham; Dancer, Andrew John; Chandrasekhar, Bharath Kumar, Protection of customer data in cloud virtual machines using a central management server.
  341. Elazar, Gidon; Harkabi, Dan; Weingarten, Nehemiah; Halachmi, Aviraham; Camiel, Noam; Fuchs, Eran, Protection of digital data content.
  342. Banks, Barbara Jane; Chitkara, Rajnish Kumar; Chen, Shiping, Protection of encryption keys in a database.
  343. Adams, Neil P.; Brown, Michael S.; Little, Herbert A., Providing certificate matching in a system and method for searching and retrieving certificates.
  344. Adams, Neil Patrick; Brown, Michael Stephen; Little, Herbert Anthony, Providing certificate matching in a system and method for searching and retrieving certificates.
  345. Ortiz, Luis M., Providing multiple video perspectives of activities through a data network to a remote multimedia server for selective display by remote viewing audiences.
  346. Ortiz, Luis M., Providing multiple video perspectives of activities through a data network to a remote multimedia server for selective display by remote viewing audiences.
  347. Ellison,Carl M.; Traw,Brendan; Ripley,Michael S.; Graunke,Gary L., Public key media key block.
  348. Kim, Hyung Sun; Kim, Byung Jin, Read-only recording medium containing sample data and reproducing method thereof.
  349. Molaro, Donald Joseph, Real-time delivery of license for previously stored encrypted content.
  350. Hori,Yoshihiro; Hioki,Toshiaki; Kanamori,Miwa; Kotani,Seigou; Hasebe,Takayuki; Hatakeyama,Takahisa; Tonegawa,Tadaaki; Anazawa,Takeaki, Recorder.
  351. Kissei Matsumoto JP; Han Min-Jae JP; Takuya Kaeriyama JP; Tsutomu Imai JP; Seiichi Jinbo JP, Recording and reproducing apparatus and terminal apparatus.
  352. Matsumoto, Kissei; Han, Min-Jae; Kaeriyama, Takuya; Imai, Tsutomu; Jinbo, Seiichi, Recording and reproducing apparatus and terminal apparatus.
  353. Matsumoto, Kissei; Min-Jae, Han; Kaeriyama, Takuya; Imai, Tsutomu; Jinbo, Seiichi, Recording and reproducing apparatus and terminal apparatus.
  354. Matsumoto, Kissei; Min-Jae, Han; Kaeriyama, Takuya; Imai, Tsutomu; Jinbo, Seiichi, Recording and reproducing apparatus and terminal apparatus.
  355. Kim, Hyung Sun; Kim, Byung Jin, Recording medium containing sample data and reproducing thereof.
  356. Dorwin, David Kimbal, Reducing time to first encrypted frame in a content stream.
  357. Um, Soung-Hyun; Seo, Kang-Soo; Park, Sung-Wan, Reproduction apparatus for remote rental system and control method of said apparatus.
  358. Lee, Lane W.; Feldman, Timothy R.; Rayburn, Douglas M.; Kiwimagi, Gary G., Revocation method and apparatus for secure content.
  359. von Behren, Rob; Wall, Jonathan; Muehlberg, Alexej; Meyn, Hauke, Routing secure element payment requests to an alternate application.
  360. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  361. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  362. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  363. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  364. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  365. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  366. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  367. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  368. Ayars, Jeffrey M.; Agarwal, Rahul; Hamel, Alain; Schack, Darren P., Scalable and extensible secure rendering of digital content.
  369. Ayars, Jeffrey M.; Agarwal, Rahul; Hamel, Alain; Schack, Darren P., Scalable and extensible secure rendering of digital content.
  370. Feldman,Timothy R.; Lee,Lane W.; Braitberg,Michael F.; Rayburn,Douglas M.; Kiwimagi,Gary G., Secure access method and system.
  371. Wakerly, Michael John; Wall, Jonathan, Secure application directory.
  372. Wakerly, Michael John; Wall, Jonathan, Secure application directory.
  373. Wakerly, Michael John; Wall, Jonathan, Secure application directory.
  374. Smith, Michael; de Cesare, Joshua; De Atley, Dallas Blake; Wright, John Andrew, Secure booting a computing device.
  375. Cochran,William; Gustman,Samuel M.; Sellars,William R., Secure communication and real-time watermarking using mutating identifiers.
  376. Curry, Ian, Secure communication apparatus and method.
  377. Jordan, Michael J.; Nunez Mencias, Angel; Schmidbauer, Joerg; Werner, Klaus, Secure data handling in a computer system.
  378. Sellars, William; Malina, Richard; Cochran, William, Secure electronic commerce using mutating identifiers.
  379. England, Paul; Lampson, Butler W., Secure execution of program code.
  380. England,Paul; Lampson,Butler W., Secure execution of program code.
  381. Ludloff, Christian; Daverman, Kurt; Morgan, Andrew, Secure memory access system and method.
  382. Ludloff,Christian; Daverman,Kurt; Morgan,Andrew, Secure memory access system and method.
  383. Morgan, Andrew; Ludloff, Christian; Daverman, Kurt, Secure memory access system and method.
  384. Peinado, Marcus; England, Paul, Secure processor architecture for use with a digital rights management (DRM) system on a computing device.
  385. Peinado,Marcus; England,Paul, Secure processor architecture for use with a digital rights management (DRM) system on a computing device.
  386. Smith, David; Eigler, Frank Ch., Secure remote kernel module signing.
  387. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  388. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  389. Wall, Jonathan; von Behren, Rob, Secure reset of personal and service provider information on mobile devices.
  390. Wall, Jonathan; von Behren, Rob, Secure reset of personal and service provider information on mobile devices.
  391. Boogert, Kevin Marinus; Carter, Stephen R., Secure synchronization and sharing of secrets.
  392. England,Paul; Dhir,Anshul; Kurien,Thekkthalackal Varugis; Ray,Kenneth D., Securely identifying an executable to a trust-determining entity.
  393. De Atley, Dallas Blake; De Cesare, Joshua; Smith, Michael; Reda, Matthew; Sen, Shantonu; Wright, John Andrew, Securely recovering a computing device.
  394. Morten,Glenn A.; Rassool,Reza P., Securely relaying content using key chains.
  395. Brownell, Jason S.; Ansell, Steven T.; Devine, Perry T.; Levine, Earl, Security mechanism for computer processing.
  396. Brownell, Jason S.; Ansell, Steven T.; Devine, Perry T.; Levine, Earl, Security mechanism for computer processing modules.
  397. Brownell,Jason S.; Ansell,Steven T.; Devine,Perry T.; Levine,Earl, Security mechanism for computer processing modules.
  398. Chandrasekhar, Bharath Kumar; Zhang, Yusong; Koh, Liang-seng, Security system for cloud-based emails.
  399. Chandrasekhar, Bharath Kumar; Hubble, Jeremy, Security system for data stored in the cloud.
  400. Chandrasekhar, Bharath Kumar; Hubble, Jeremy; Zhang, Yusong, Security system for data stored in the cloud.
  401. MacLean, Charles Duncan; Inskip, Thomas, Selective and persistent application level encryption for video provided to a client.
  402. Kollmyer,Brad; Baker,Brian A.; Shapiro,Eric Bradley; Kollmyer,Aric; Rutman,Mike; MacLean,Charles Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Selectively encrypting different portions of data sent over a network.
  403. DeMello,Marco A.; Narin,Attila; Madonna,Christopher Robert Richard, Server controlled branding of client software deployed over computer networks.
  404. Brown, Michael K.; Brown, Michael S.; Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A., Server verification of secure electronic messages.
  405. Brown, Michael K.; Brown, Michael S.; Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A., Server verification of secure electronic messages.
  406. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers for client computers.
  407. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers to client computers.
  408. Parthasarathy,Srivatsan; Pratschner,Steven J.; Sinclair,Craig T., Shared names.
  409. de Cesare, Joshua; De Atley, Dallas Blake; Andrews, Jonathan Jay; Smith, Michael John, Single security model in booting a computing device.
  410. de Cesare, Joshua; De Atley, Dallas Blake; Andrews, Jonathan Jay; Smith, Michael John, Single security model in booting a computing device.
  411. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Single step transaction authentication using proximity and biometric input.
  412. Swix, Scott; Watson, P. Thomas; Zimler, Randy S., Software conditional access system for a media delivery network.
  413. Thomas, Andrew James; Skrebels, Mark; Irvine, Stewart, Software configuration of module dependent on history.
  414. Lamkin,Allan; Collart,Todd; Blair,Jeff, Software engine for combining video or audio content with programmatic content.
  415. Maeda, Manabu; Futa, Yuichi; Matsuzaki, Natsume; Yokota, Kaoru; Nonaka, Masao; Unagami, Yuji; Shizuya, Hiroki; Sakai, Masao; Isobe, Shuji; Koizumi, Eisuke; Hasegawa, Shingo; Minagawa, Marika, Software updating apparatus, software updating system, alteration verification method and alteration verification program.
  416. Maeda, Manabu; Futa, Yuichi; Matsuzaki, Natsume; Yokota, Kaoru; Nonaka, Masao; Unagami, Yuji; Shizuya, Hiroki; Sakai, Masao; Isobe, Shuji; Koizumi, Eisuke; Hasegawa, Shingo; Minagawa, Marika, Software updating apparatus, software updating system, invalidation method, and invalidation program.
  417. Maeda, Manabu; Futa, Yuichi; Matsuzaki, Natsume; Yokota, Kaoru; Nonaka, Masao; Unagami, Yuji; Shizuya, Hiroki; Sakai, Masao; Isobe, Shuji; Koizumi, Eisuke; Hasegawa, Shingo; Minagawa, Marika, Software updating apparatus, software updating system, invalidation method, and invalidation program.
  418. Hurtado, Marco M.; Mahlbacher, James C.; Spagna, Richard L., Super-distribution of protected digital content.
  419. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  420. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  421. Palmer, Tomas Earl, System and method for N-dimensional encryption.
  422. Kline, Paul A.; Weinstein, Allan M.; Weinstein, David J.; Roberts, Jon L.; Nitin, Sawant, System and method for a commercial multimedia rental and distribution system.
  423. Weinstein,David J.; Weinstein,Allan M.; Kline,Paul A; Roberts,Jon L., System and method for a commercial multimedia rental and distribution system.
  424. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  425. DeMello, Marco; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  426. DeMello,Marco A.; Krishnaswamy,Vinay; Manferdelli,John L., System and method for accessing protected content in a rights-management architecture.
  427. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy B.; Yaacovi,Yoram; Alger,Jeffrey H., System and method for activating a rendering device in a multi-level rights-management architecture.
  428. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy Bertrand; Yaacovi,Yoram; Alger,Jeffrey A., System and method for activating a rendering device in a multi-level rights-management architecture.
  429. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for authenticating an operating system.
  430. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  431. DeMello, Marco A.; Narin, Attila; Setty, Venkateshaiah, System and method for client interaction in a multi-level rights-management architecture.
  432. Godfrey, James A.; Little, Herbert A.; Brown, Michael K.; Adams, Neil P.; Cherry, Carl L.; Tyhurst, Timothy R.; Brown, Michael S., System and method for compressing secure E-mail for exchange with a mobile data communication device.
  433. Godfrey, James A.; Little, Herbert A.; Brown, Michael K.; Adams, Neil P.; Cherry, Carl L.; Tyhurst, Timothy R.; Brown, Michael S., System and method for compressing secure E-mail for exchange with a mobile data communication device.
  434. Hoffberg, Steven M., System and method for determining contingent relevance.
  435. Woodward, Ernest E., System and method for enhanced piracy protection in a wireless personal communication device.
  436. Woodward, Ernest E., System and method for enhanced piracy protection in a wireless personal communication device.
  437. Woodward, Ernest E., System and method for enhanced piracy protection in a wireless personal communication device.
  438. Woodward,Ernest E., System and method for enhanced piracy protection in a wireless personal communication device.
  439. Brown, Michael K.; Brown, Michael S.; Segato, Timothy, System and method for handling electronic mail mismatches.
  440. Brown, Michael Kenneth; Brown, Michael Stephen; Segato, Timothy Lee, System and method for handling electronic mail mismatches.
  441. Brown, Michael Kenneth; Brown, Michael Stephen; Segato, Timothy Lee, System and method for handling electronic mail mismatches.
  442. Brown, Michael Kenneth; Brown, Michael Stephen; Segato, Timothy Lee, System and method for handling electronic mail mismatches.
  443. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  444. Kanchwala, Rukaiya; Tolliver, Reva, System and method for information handling system software registration code management.
  445. Challener, David Carroll, System and method for installing a remote credit card authorization on a system with a TCPA complaint chipset.
  446. Manferdelli,John L.; Marr,Michael David; Krishnaswamy,Vinay; Jakubowski,Mariusz H., System and method for interfacing a software process to secure repositories.
  447. Palmer,Tom��s Earl, System and method for n-dimensional encryption.
  448. Smith, Benjamin; Sabin, Daniel; Smith, Fred Hewitt, System and method for obtaining keys to access protected information.
  449. Little, Herbert A.; Brown, Michael S., System and method for processing encoded messages.
  450. Little, Herbert Anthony; Brown, Michael Stephen, System and method for processing encoded messages.
  451. Brown, Michael S.; Adams, Neil P.; Brown, Michael K.; Kirkup, Michael G.; Little, Herbert A., System and method for processing encoded messages for exchange with a mobile data communication device.
  452. Brown, Michael Stephen; Adams, Neil Patrick; Brown, Michael Kenneth; Kirkup, Michael Grant; Little, Herbert Anthony, System and method for processing encoded messages for exchange with a mobile data communication device.
  453. Brown, Michael Stephen; Adams, Neil Patrick; Brown, Michael Kenneth; Kirkup, Michael Grant; Little, Herbert Anthony, System and method for processing encoded messages for exchange with a mobile data communication device.
  454. Godfrey, James A.; Little, Herbert A., System and method for processing encoded messages for exchange with a mobile data communication device.
  455. Godfrey, James A.; Little, Herbert A., System and method for processing encoded messages for exchange with a mobile data communication device.
  456. Nagel,Robert H., System and method for production and authentication of original documents.
  457. Nagel,Robert H., System and method for production and authentication of original documents.
  458. Little, Herbert A., System and method for protecting master encryption keys.
  459. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  460. Naguib, Nayer, System and method for providing transaction verification.
  461. Brown, Michael Stephen; Little, Herbert Anthony; Adams, Neil Patrick; Kirkup, Michael Grant; Brown, Michael Kenneth, System and method for retrieving related certificates.
  462. Adams, Neil P.; Brown, Michael S.; Little, Herbert A., System and method for searching and retrieving certificates.
  463. Adams, Neil Patrick; Brown, Michael Stephen; Little, Herbert Anthony, System and method for searching and retrieving certificates.
  464. Kline, Paul A.; Nitin, Sawant; Weinstein, Allan M.; Weinstein, David J.; Roberts, Jon L., System and method for secure commercial multimedia rental and distribution over secure connections.
  465. Fetkovich,John E., System and method for secure distribution and evaluation of compressed digital information.
  466. Little, Herbert A.; Kirkup, Michael G., System and method for secure message key caching in a mobile communication device.
  467. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for secure storage data using a key.
  468. Lampson, Butler W.; DeTreville, John D.; England, Paul, System and method for secure storage of data using public and private keys.
  469. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  470. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  471. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  472. Smith, Walt E.; Fisher, Jr., Larry F.; Vargese, Bavan, System and method for securing a base derivation key for use in injection of derived unique key per transaction devices.
  473. Sherkin, Alexander; Goring, Bryan; Doktorova, Laura, System and method for shared resource owner based access control.
  474. Koch, Mark J., System and method for storing and accessing digital media content using smart card technology.
  475. Koch,Mark J., System and method for storing and accessing digital media content using smart card technology.
  476. Herz,Frederick S. M.; Gertner,Yael; Martell,Craig H.; Kannan,Sampath, System and method which employs a multi user secure scheme utilizing shared keys.
  477. Carter, Ernst B., System for and method of managing access to a system using combinations of user information.
  478. Carter, Ernst B., System for and method of managing access to a system using combinations of user information.
  479. Warner, Craig; Stone, Luke; Fenenbock, Elysa Wesley; Kassis, Ronit; O'Connor, Timothy Wong, System for managing extension modifications to web pages.
  480. Mooij,Wilhelmus Gerardus Petrus; Wajs,Andrew Augustine, System for providing encrypted data, system for decrypting encrypted data and method for providing a communication interface in such a decrypting system.
  481. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  482. Morgan, Andrew; Anvin, H. Peter, System with secure cryptographic capabilities using a hardware specific digital secret.
  483. Carter, Frederick H., System, apparatus and method for characterizing messages to discover dependencies of service-oriented architectures.
  484. Carter, Frederick H., System, apparatus and method for characterizing messages to discover dependencies of services in service-oriented architectures.
  485. Getsin,Evgeniy M; Lewis,Michael J; Collart,Todd R, System, method and article of manufacture for a business layer component in a multimedia synchronization framework.
  486. Lamkin,Allan B.; Collart,Todd R., System, method and article of manufacture for a common cross platform framework for development of DVD-Video content integrated with ROM content.
  487. Berson, Thomas A.; Dean, R. Drews; Franklin, Matthew K.; Lunt, Teresa F.; Smetters, Diana K., System, method and article of manufacture for a cryptographic key infrastructure for networked devices.
  488. Getsin,Evgeniy M; Lewis,Michael J; Collart,Todd R, System, method and article of manufacture for a synchronizer component in a multimedia synchronization framework.
  489. Berson,Thomas A.; Dean,R. Drews; Franklin,Matthew K.; Lunt,Teresa F; Smetters,Diana K., System, method and article of manufacture for cryptoserver-based auction.
  490. Berson,Thomas A; Dean,R Drews; Franklin,Matthew K; Lunt,Teresa F; Smetters,Diana K, System, method and article of manufacture for determining a price of cryptograph IC services based on a computational burden thereof.
  491. Getsin, Evgeniy M.; Lewis, Michael J.; Collart, Todd R., System, method and article of manufacture for java/javascript component in a multimedia synchronization framework.
  492. Getsin, Evgeniy M.; Lewis, Michael J.; Collart, Todd R., System, method and article of manufacture for late synchronization during the execution of a multimedia event on a plurality of client computers.
  493. Berson,Thomas A.; Dean,R. Drews; Franklin,Matthew K.; Smetters,Diana K., System, method and article of manufacture for providing cryptographic services utilizing a network.
  494. Getsin, Evgeniy M.; Lamkin, Allan B.; Collart, Todd R.; Lewis, Michael J., System, method and article of manufacture for remote control and navigation of local content.
  495. Getsin,Evgeniy M.; Lamkin,Allan B.; Collart,Todd R.; Lewis,Michael J., System, method and article of manufacture for remote control and navigation of local content.
  496. Getsin, Evgeniy M.; Lamkin, Allan B.; Collart, Todd R., System, method and article of manufacture for remote unlocking of local content located on a client device.
  497. Berson, Thomas A.; Dean, R. Drews; Franklin, Matthew K.; Lunt, Teresa F.; Smetters, Diana K., System, method and article of manufacture for transition state-based cryptography.
  498. Collart, Todd, System, method and article of manufacture for updating content stored on a portable storage medium.
  499. Collart, Todd R., System, method and article of manufacture for updating content stored on a portable storage medium.
  500. Collart,Todd R., System, method and article of manufacture for updating content stored on a portable storage medium.
  501. Morten, Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  502. Morten,Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  503. Knight, Anthony David; Lewis, Ian Michael; Devitt, Andrew Maurice, Systems and methods for converting interactive multimedia content authored for distribution via a physical medium for electronic distribution.
  504. Knight, Anthony David; Lewis, Ian Michael; Devitt, Andrew Maurice, Systems and methods for converting interactive multimedia content authored for distribution via a physical medium for electronic distribution.
  505. Hunter, Charles E.; Ballou, Jr., Bernard L.; Hebrank, John H., Systems and methods for distribution of entertainment and advertising content.
  506. LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  507. LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
  508. Levine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  509. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  510. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  511. Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  512. Sibert, W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  513. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  514. Morten, Glenn A.; Hiar, Edward Charles; Jacobs, Andre; Veres, James E.; Zhuk, Oscar V.; Tinker, Jeffrey Lee, Tamper prevention and detection for video provided over a network to a client.
  515. Kreft, Heinz, Tamper-protected hardware and method for using same.
  516. Nagahara, Atsushi, Text information browsing aid apparatus, digital content creation system, digital content distribution system, and storage medium.
  517. Nagahara,Atsushi, Text information browsing aid apparatus, digital content creation system, digital content distribution system, and storage medium.
  518. Gobbi, John J.; Kelly, Bryan; Brown, David L.; Hirt, Fred S., Tracking system using personal digital key groups.
  519. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  520. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  521. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Transferring application secrets in a trusted operating system environment.
  522. Rassool, Reza P.; Morten, Glenn A.; Baker, Brian A., Transitioning to secure IP communications for encoding, encapsulating, and encrypting data.
  523. Rassool, Reza P.; Morten, Glenn A.; Baker, Brian A., Transitioning to secure IP communications for encoding, encapsulating, and encrypting data.
  524. Asadu, Hideki, Transmitting second content data with reference for use with first content data.
  525. Ortiz, Luis M.; Lopez, Kermit D., Transmitting sports and entertainment data to wireless hand held devices over a telecommunications network.
  526. Ortiz, Luis M.; Lopez, Kermit D., Transmitting sports and entertainment data to wireless hand held devices over a telecommunications network.
  527. Ortiz, Luis M.; Lopez, Kermit D., Transmitting sports and entertainment data to wireless hand held devices over a telecommunications network.
  528. Mourad,Magda M.; Munson,Jonathan P.; Nadeem,Tamer; Pacifici,Giovanni; Pistoia,Marco; Youssef,Alaa S., Transparent digital rights management for extendible content viewers.
  529. Pearson, Siani Lynne; Chen, Liqun, Trusted computing platform for restricting use of data.
  530. Giobbi, John J., Two-level authentication for secure transactions.
  531. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Two-level authentication for secure transactions.
  532. Amano, Masato, Unauthorized usage prevention system and information processing apparatus.
  533. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  534. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  535. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Video distribution system.
  536. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Video distribution system.
  537. Hunter, Charles Eric; Ballou, Jr., Bernard L.; Sparks, Kelly C.; Hebrank, John H., Video distribution system.
  538. von Behren, Rob; Wall, Jonathan; Muehlberg, Alexej; Meyn, Hauke, Wallet application for interacting with a secure element application without a trusted server for authentication.
  539. Ortiz, Luis M.; Lopez, Kermit D., Wireless transmission of sports venue-based data including video to hand held devices.
  540. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem; Muehlberg, Alexej; Meyn, Hauke, Writing application data to a secure element.
  541. von Behren, Rob; Wall, Jonathan; Paya, Ismail Cem; Muehlberg, Alexej; Meyn, Hauke, Writing application data to a secure element.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로