$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System for controlling access and distribution of digital property 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0178606 (1998-10-26)
발명자 / 주소
  • Schneck Paul B.
  • Abrams Marshall D.
출원인 / 주소
  • Veridian Information Solutions
대리인 / 주소
    Pillsbury Winthrop
인용정보 피인용 횟수 : 608  인용 특허 : 101

초록

A method and device are provided for controlling access to data. Portions of the data are protected and rules concerning access rights to the data are determined. Access to the protected portions of the data is prevented, other than in a non-useable form; and users are provided access to the data on

대표청구항

[ What is claimed is:] [35.]35. A device for distributing data for subsequent controlled use of the data by a user, some of the data having access rules already associated therewith, the access rules defining access rights to the data, the device comprising:means for protecting portions of the data;

이 특허에 인용된 특허 (101)

  1. Fahn Paul N. (Redwood City CA) Kaliski ; Jr. Burton S. (San Carlos CA) Robshaw Matthew J. B. (San Francisco CA) Fahn Paul N. (Redwood City CA), Abuse-resistant object distribution system and method.
  2. Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
  3. Pilley Harold R. (R.F.D. #1 ; Box 204 Deering NH 03244), Airport control/management system using GNSS-based methods and equipment for the control of surface and airborne traffic.
  4. Tolman J. Leonard (Provo UT) Ekstrom Joseph J. (Lindon UT), Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of compute.
  5. Arnold Terry Sutton, Apparatus and method for establishing a cryptographic link between elements of a system.
  6. Uchenick Gordon (Baltimore MD), Apparatus and method for preventing unauthorized use of computer programs.
  7. Subler Ronald J. (Charlestown MA) Hastings Thomas Mark (Lexington MA), Assembly, distribution, and use of digital information.
  8. Wiedemer John D. (930 W. Forest Dr. Houston TX 77079), Billing system for computer software.
  9. Wiedemer John D. (930 W. Forest Dr. Houston TX 77079), Billing system for computer software.
  10. Ehrsam William Friedrich (Hurley NY) Meyer Carl H. W. (Kingston NY) Powers Robert Lowell (West Hurley NY) Prentice Paul Norman (Hyde Park NY) Smith John Lynn (Woodstock NY) Tuchman Walter Leonard (Wo, Block cipher system for data security.
  11. Johnstone ; Richard, Computer software security system.
  12. Duxbury Paul (Sandbach GB2), Computer system security.
  13. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  14. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  15. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Crypto microprocessor for executing enciphered programs.
  16. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Crypto microprocessor that executes enciphered programs.
  17. Best Robert M. (16016 - 9th Ave. NE. Seattle WA 98155), Crypto microprocessor using block cipher.
  18. Best Robert M. (16016 Ninth Ave. Northeast Seattle WA 98155), Cryptographic decoder for computer programs.
  19. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Smith John L. (Woodstock NY) Tuchman Walter L. (Woodstock NY), Cryptographic file security for single domain networks.
  20. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Cryptographic identification, financial transaction, and credential device.
  21. Lennon Richard E. (Woodstock NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Oseas Jonathan (Hurley NY) Prentice Paul N. (Hyde Park NY) Tuchman Walter L. (Woodstock NY), Cryptographic verification of operational keys used in communication networks.
  22. Mita Makoto (Saitama JPX), Data management method and system with management table indicating right of use.
  23. Geffrotin Bernard (Meudon FRX), Data processing system comprising authentification means viz a viz a smart card, an electronic circuit for use in such s.
  24. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  25. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  26. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  27. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  28. Lumley Robert M. (Lawrence Township ; Mercer County NJ), Digital computer having code conversion apparatus for an encrypted program.
  29. Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Tuchman Walter L. (Woodstock NY), Digital signature system and apparatus.
  30. Shanton M. Greg (Fairfax VA), Distributed cryptographic object method.
  31. Miyahara Gary K. (Rancho Palos Verdes CA), Efficient security kernel for the 80960 extended architecture.
  32. Hasebe Takayuki (Kawasaki JPX) Akiyama Ryota (Kawasaki JPX) Yoshioka Makoto (Kawasaki JPX), Electronic data protection system.
  33. France Rode (880 La Cuesta Los Altos CA 94022), Electronic security apparatus.
  34. Hube Randall R. (Rochester NY) Cardinale Louis J. (Webster NY) Auclair Christopher J. (Fairport NY) Thomas Theodore W. (Olympia WA), Enabling features over common communication channel.
  35. Kazmierczak Gregory J. (Plainsboro NJ) Michener John R. (Neshanic Station NJ) Smith Kathryn M. (Somerville NJ), Encrypted data package record for use in remote transaction metered data system.
  36. Ishiguro Ryuji,JPX, Encryption method, encryption apparatus, recording method, decoding method, decoding apparatus and recording medium.
  37. Elmer Thomas I. (Sunnyvale CA) Nguyen Tuan T. (Milpitas CA) Lin Rung-Pan (San Jose CA), Encryption of streams of addressed information to be used for program code protection.
  38. Platteter Dale T. (Fairport NY) Westfall Robert S. (Rochester NY) Carter Jeff C. (Fairport NY), Execution protection for floppy disks.
  39. Wyman Robert M. (Kirkland WA), Filters in license management system.
  40. Yearsley Gyle (Boise ID) Richards Grant (Meridian ID), Firmware encryption for microprocessor/microcomputer.
  41. Rebec Mohammed S. (Bristol IN) Rebec Mihailo V. (Bristol IN), Global digital video news distribution system.
  42. Sprague Peter J. (249 Undermountain Rd. Lenox MA 02140) Lipscomb Thomas H. (145 E. 74th St. New York NY 10021), Information distribution system.
  43. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
  44. Birney Richard Eugene (Boca Raton FL) Davis Michael Ian (Boca Raton FL) Hood Robert Allen (Boca Raton FL) Graybiel Lynn Allan (Boca Raton FL) Kahn Samuel (Mountain View CA) Osborne William Steese (Bo, Key controlled address relocation translation system.
  45. Wyman Robert M. (Kirkland WA), License document interchange format for license management system.
  46. Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
  47. Attanasio ; Clement Richard, Location dependence for assuring the security of system-control operations.
  48. Johnson Donavon W. (Georgetown TX) Morgan Stephen P. (Mahopac NY) Smith Todd A. (Austin TX), Maintenance of file attributes in a distributed data processing system.
  49. Wyman Robert M. (Kirkland WA), Management interface for license management system.
  50. Moran John Christian (Broomfield CO), Memory patching circuit.
  51. Ehrsam ; William F. ; Meyer ; Carl H. W. ; Smith ; John L. ; Tuchman ; W alter L., Message verification and transmission error detection by block chaining.
  52. Katznelson Ron D. (San Diego CA), Metering retrieval of encrypted data stored in customer data retrieval terminal.
  53. Thomas William J. (6146 Winterbrook Dr. San Jose CA 95129), Method and apparatus for controlling usage of a programmable computing machine.
  54. Eyer Mark K. (San Diego CA) Shumate Allen (Poway CA), Method and apparatus for impulse purchasing of packaged information services.
  55. Chou Wayne W. (25 Hauley Pl. Ridgefield CT 06877) Erett Richard E. (78 White Birch La. Stamford CT 06905), Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded.
  56. Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
  57. Thomas David C. (Mesa AZ), Method and apparatus for providing security for computer software.
  58. Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Method and apparatus for retrieving secure information from mass storage media.
  59. Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Method and apparatus for retrieving selected information from a secure information source.
  60. Bianco Mark E. (Pomona CA), Method and apparatus for securely conveying network control data across a cryptographic boundary.
  61. Atalla Martin M. (Menlo Park CA), Method and apparatus for securing data transmissions.
  62. Konheim Alan G. (Yorktown Heights NY), Method and apparatus for transaction and identity verification.
  63. Heffron Charles B. (Knoxville TN) Lenarduzzi Roberto (Knoxville TN) Haken Jack E. (Danbury CT), Method and apparatus to secure proprietary operation of computer equipment.
  64. Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
  65. Janis Frederick L. (Keller TX), Method and system for providing user access control within a distributed data processing system by the exchange of acces.
  66. Janis Frederick L. (Keller TX), Method and system for variable authority level user access control in a distributed data processing system having multip.
  67. Lipscomb Thomas H. (New York NY) Nagel Robert H. (New York NY), Method for retrieving secure information from a database.
  68. Santon John C. (Johnstown CO) Nielsen Kenneth R. (Loveland CO) Armbrust Christen M. (Boulder Creek CA) Shah Pankaj B. (Santa Clara CA) Hand Steven J. (San Jose CA), Method of distributing computer data files.
  69. Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT) Elteto Laszlo (Stamford CT) Engel Frederik (Wilton CT), Method of software distribution protection.
  70. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Microprocessor for executing enciphered programs.
  71. Elliott John C. (Summit NJ) O\Connell James A. (Short Hills NJ) Ladouceur Lawrence (Scarsdale NY) Altman William (Lower Paxton PA) Jarett Keith (Oakland CA), Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer.
  72. Hodge Winston W. (Yorba Linda CA) Taylor Lawrence E. (Anaheim CA), Near-video-on-demand digital video distribution system utilizing asymmetric digital subscriber lines.
  73. Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
  74. Attanasio Clement Richard (Peekskill NY) Belady Laszlo Antal (Yorktown Heights NY), Operating system authenticator.
  75. Yamazaki Shunpei (Tokyo JPX) Hamatani Toshiji (Atsugi JPX), Paperless portable book.
  76. Blackledge ; Jr. John W. (Boca Raton FL) Clarke ; Jr. Grant L. (Boca Raton FL) Dayan Richard A. (Boca Raton FL) Le Kimthanh D. (Boynton Beach FL) McCourt Patrick E. (Delray Beach FL) Mittelstedt Matt, Personal computer system with security features and method.
  77. Richard Harold S. (Dayton OH) Grillmeier Eugene L. (Centerville OH) Gross Jack R. (Waynesville OH) Myers Robert P. (Kettering OH), Programmable cryptic device for enciphering and deciphering data.
  78. Roberts David J. (Eastleigh GB2) Simmons John (Chandlers Ford GB2), Protection of data processing system against unauthorized programs.
  79. Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak Rostislaw (Dumfries VA) Wilkins John D. (Somerville VA), Secure cryptographic operations using control vectors generated inside a cryptographic facility.
  80. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  81. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  82. Allen Michael J. (St. Charles IL) Langlois John (Cary IL), Security system for microcomputers.
  83. Ryder ; Sr. John H. (Durham NC) Smith Susanna R. (Tampa FL), Self-verifying receipt and acceptance system for electronically delivered data objects.
  84. Eisele Raymund H. (Idstein DEX), Smart data storage device.
  85. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  86. Robert Gregory (Nashua NH) Chase David (Wellesley MA) Schaefer Ronald (Acton MA), Software licensing management system.
  87. Donald Thomas C. (2651 Rillwood Rd. Birmingham AL 35243) Donald Henry W. (428 Lakewood Dr. Homewood AL 35209), Software protection system.
  88. Dolphin Janet L. (Milpitas CA), System and method for access control for portable data storage media.
  89. Dolphin Janet L. (Milpitas CA), System and method for access control for portable data storage media.
  90. Dolphin Janet L. (Milpitas CA), System and method for access data control.
  91. Ostrover Lewis S. (Los Angeles CA) Cookson Christopher J. (Los Angeles CA), System and method for authenticating software carriers.
  92. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
  93. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  94. Guillou Louis C. (Bourgbarre FRX), System for transmitting information provided with means for controlling access to the information transmitted.
  95. Le Roux Jean-Yves (Bouc Bel Air FRX), System of payment or information transfer by money card with electronic memory.
  96. Edwards ; Jr. Gordon L. (Easley SC), System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of prote.
  97. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  98. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  99. Greenwood Stephen R. (Merrimack NH) Peterson R. Kim (Seattle WA) Schreiber Benn L. (Issaquah WA), Thread private memory storage of multi-thread digital data processors using access descriptors for uniquely identifying.
  100. Abraham Dennis G. (Concord NC) Henningsmeyer Daniela (Stuttgart VA DEX) Hudson John M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Stevens Jam, User defined function facility.
  101. Ryan John O. ; Morrison E. Fraser ; Copeland Gregory C., Video media security and tracking system.

이 특허를 인용한 특허 (608)

  1. Laurich, Lawrence A.; Sample, Stephen Paul; Wang, Michael H.; Kandimalla, Babu Rao; Orsini, Rick L.; O'Hare, Mark S.; Martin, Don; Casselman, Steven Mark, Accelerator system for use with secure data storage.
  2. O'Hare, Mark S.; Orsini, Rick L.; Laurich, Lawrence A.; Sample, Stephen Paul; Wang, Michael H.; Kandimalla, Babu Rao; Martin, Don; Casselman, Steven Mark, Accelerator system for use with secure data storage.
  3. Yamagata,Junichi; Kunieda,Takayuki; Wakita,Yuki, Access usage data storing and transmitting program and storage medium.
  4. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  5. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  6. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  7. Cornelius, Richard D.; Stepniczka, Andreas; Chu, Kevin, Account settlement and financing in an e-commerce environment.
  8. Dorwin, David Kimbal; Colwell, Aaron James; Scherkus, Andrew Martin; Galligan, Francis, Allowing degraded play of protected content using scalable codecs when key/license is not obtained.
  9. Frenkel, Marvin A., Anonymous on-line cash management system.
  10. Valeria,Brandon, Apparatus and method for content entry management.
  11. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  12. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  13. Brickell, Ernest F., Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information.
  14. Brickell,Ernest F., Apparatus and method for proving the denial of a direct proof signature.
  15. Kozuch,Michael A.; Sutton, II,James A.; Grawrock,David; Neiger,Gilbert; Uhlig,Richard A.; Burgess,Bradley G.; Poisner,David I.; Hall,Clifford D.; Glew,Andy; Smith, III,Lawrence O.; George,Robert, Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment.
  16. Elazar, Gidon; Harkabi, Dan; Weingarten, Nehemiah, Apparatus for transferring licensed digital content between users.
  17. Elazar, Gidon; Harkabi, Dan; Weingarten, Nehemiah, Apparatus, system and method for securing digital documents in a digital appliance.
  18. Elazar, Gidon; Harkabi, Dan; Weingarten, Nehemiah, Apparatus, system and method for securing digital documents in a digital appliance.
  19. Kollmyer,Brad; Baker,Brian; Shapiro,Eric; Kollmyer,Aric; Rutman,Mike; MacLean,Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Apparatus, system and method for selectively encrypting different portions of data sent over a network.
  20. Birk, Peter Daniel; Chao, Ching-Yun; Chung, Hyen Vui; Mason, Carlton Keith; Reddy, Ajaykumar Karkala; Venkataramappa, Vishwanath, Application server object-level security for distributed computing domains.
  21. Birk,Peter Daniel; Chao,Ching Yun; Chung,Hyen Vui; Mason,Carlton Keith; Reddy,Ajaykumar Karkala; Venkataramappa,Vishwanath, Application server object-level security for distributed computing domains.
  22. Dorwin, David Kimbal, Application-driven playback of offline encrypted content with unaware DRM module.
  23. Dorwin, David Kimbal, Application-driven playback of offline encrypted content with unaware DRM module.
  24. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Attestation key memory device and bus.
  25. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Attestation key memory device and bus.
  26. Walter, Edward, Audio receiver modular card and method thereof.
  27. Glew,Andrew F.; Sutton,James A.; Smith,Lawrence O.; Grawrock,David W.; Neiger,Gilbert; Kozuch,Michael A., Authenticated code module.
  28. Fraser, Jay; Weber, Lawrence, Authentication method and system.
  29. Cowburn, Russell Paul, Authenticity verification methods, products and apparatuses.
  30. Cowburn, Russell Paul, Authenticity verification of articles using a database.
  31. Kitamura, Yoshiharu, Authored data providing method, system and computer-readable recording medium for performing said method.
  32. Wen, Xin, Authorizing the production of visual images from digital images.
  33. Williams, Brian R; Rubens, Matthew J; Bibireata, Daniel; Narang, Varun; Siegel, Hilliard B, Automated monitoring and control of access to content from a source.
  34. Kortum, Philip Ted; Sullivan, Marc Andrew, Automatic switching between high definition and standard definition IP television signals.
  35. Yeo, Matthew, Automatic tracking cookie detection.
  36. Bromwich, Adam, Automatic training of a database intrusion detection system.
  37. Pedlow, Jr., Leo M.; Agnihotri, Davender, Bi-directional indices for trick mode video-on-demand.
  38. Vannier, Eric; Dorwin, David Kimbal, Browser/web apps access to secure surface.
  39. Luke Anthony Weinstein, Cancellation method for an automatic ticket system.
  40. Case, Sr., Paul, Case secure computer architecture.
  41. Case, Sr., Paul, Case secure computer architecture.
  42. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  43. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  44. Heard,Robert W.; Mann,Dwayne R.; Burchett,Christopher D.; Gordon,Ian R., Client architecture for portable device with security policies.
  45. Braitberg, Michael F.; Volk, Steven B.; Zaharris, Daniel R.; Davies, David H., Combination mastered and writeable medium and use in electronic internet appliance.
  46. Kolls, H. Brock, Communicating interactive digital content between vehicles and internet based data processing resources for the purpose of transacting e-commerce or conducting e-business.
  47. Washio, Satoshi; Kawabata, Hiroshi; Yamaguchi, Tomoo, Communication device for controlling the use of content.
  48. Kolls,H. Brock, Communication interface device for managing wireless data transmission between a vehicle and the internet.
  49. Manca, Mark; Woolsey, Les G., Communication with an external source application.
  50. Nachenberg,Carey, Computer code intrusion detection system based on acceptable retrievals.
  51. Karadimitriou,Kosmas; Stern,Jonathan; Decary,Michel; Rothman Shore,Jeremy W., Computer method and apparatus for determining content types of web pages.
  52. Decary,Michel; Stern,Jonathan; Karadimitriou,Kosmas; Rothman Shore,Jeremy W., Computer method and apparatus for extracting data from web pages.
  53. Chojnacki, Robert, Computing system with decryption functions and secure data product.
  54. Kravitz, David W.; Goldschlag, David M., Conditional access via secure logging with simplified key management.
  55. Grawrock,David W., Connecting a virtual token to a physical token.
  56. Diamond, Michael B.; White, Jonathan B., Content keys for authorizing access to content.
  57. Saxena, Ashutosh; Ponnapalli, Harigopal K. B., Content licensing and conditional access using a mobile device.
  58. Rhoads, Geoffrey B., Content protection arrangements.
  59. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, Jon D., Content replacement by PID mapping.
  60. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, Jon D., Content replacement by PID mapping.
  61. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, Jon D., Content replacement by PID mapping.
  62. Bonan, James; Candelore, Brant L.; Eyer, Mark Kenneth, Content scrambling with minimal impact on legacy devices.
  63. Diamond, Michael B.; White, Jonathan B., Content server and method of providing content therefrom.
  64. Diamond, Michael B.; White, Jonathan B., Content server and method of storing content.
  65. Zhu, Kevin, Context-based card selection device.
  66. Zhu, Kevin, Context-based card selection device.
  67. Zhu,Kevin, Context-based card selection device.
  68. Bennett,Steve; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Zou,Xiang; Kozuch,Michael A., Control over faults occurring during the operation of guest software in the virtual-machine architecture.
  69. Bennett,Steve; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael A., Control register access virtualization performance improvement in the virtual-machine architecture.
  70. Ross,David Justin; Love,Jack; Billester,Stephen E. M.; Smith,Brent R., Controlled-access database system and method.
  71. Goger,Karl, Controlling access to electronic documents.
  72. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple memory zones in an isolated execution environment.
  73. Gartside, Paul Nicholas; Harris, Mark, Controlling use of a computer program installed on a computer.
  74. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  75. Cowburn, Russell Paul, Creating authenticatable printed articles and subsequently verifying them based on scattered light caused by surface structure.
  76. Grawrock,David W., Creation and distribution of a secret value between two devices.
  77. Gustafsson,Patrik, Creation of local usage rights voucher.
  78. Katta, Noboru; Ibaraki, Susumu; Inoue, Shinji; Tatebayashi, Makoto, Cryptographic apparatus for performing cryptography on a specified area of content data.
  79. Kimmel, Gerald D.; Adamouski, Francis J.; Domangue, Ersin L.; Kimmel, Wayne R.; Lightburn, James G.; Viola, Leonard R., Cryptographic key management.
  80. Nachenberg, Carey; Cole, David, Customized alerting of users to probable data theft.
  81. Dorwin, David Kimbal, DRM provider interoperability.
  82. Goh, Cheh; Chen, Liqun; Crane, Stephen James; Mont, Marco Casassa; Harrison, Keith Alexander, Data output method, system and apparatus.
  83. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  84. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  85. Paley, Sasha; Boshover, Arik; Bychkov, Eyal; Ziv, Aran, Data storage device with multi-access capabilities.
  86. Hirayama,Tomoshi, Data-providing system, transmission server, data terminal apparatus and data-providing method.
  87. Ryal, Kim Annon, Decryption system.
  88. Dalton, Christopher I., Demonstrating integrity of a compartment of a compartmented operating system.
  89. Nachenberg,Carey S.; Yung,Pak Wai, Detecting code injection attacks against databases.
  90. McCorkendale, Bruce; Sobel, William E., Detecting entry-portal-only network connections.
  91. Dorwin, David Kimbal; Scherkus, Andrew Martin, Detecting supported digital rights management configurations on a client device.
  92. Bromwich, Adam; Wilhelm, Jeffrey, Determining origins of queries for a database intrusion detection system.
  93. Yamada, Kazuhiro; Wakabayashi, Tatsuaki; Eguchi, Hisatoshi; Miura, Fumiaki, Device and method for restricting content access and storage.
  94. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  95. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  96. Kortum, Philip Ted; Sullivan, Marc Andrew; Brandt, Jeffrey Lewis, Device, system, and method for managing television tuners.
  97. Kortum, Philip Ted; Sullivan, Marc Andrew; Brandt, Jeffrey Lewis, Device, system, and method for managing television tuners.
  98. Nishimura,Takuya; Iitsuka,Hiroyuki; Yamada,Masazumi; Gotoh,Shoichi; Takechi,Hideaki; Usuki,Naoshi, Digital AV data transmitting unit, digital AV data receiving unit, digital AV data transmitting/receiving unit, and medium.
  99. Saw,Chit Wei; Ilnicki,Slawomir K.; van den Branden Lambrecht,Christian J.; Farrell,Joyce E; Herley,Cormac; Ribes,Joan Maria Mas, Digital content distribution systems.
  100. Sasamoto Manabu JP; Noguchi Takaharu JP; Aikawa Makoto JP; Hirahata Shigeru JP, Digital information recording apparatus for recording digital information.
  101. Gimenez, Galo, Digital rights management printing system.
  102. Carter,Stephen R, Distributed dynamic security for document collaboration.
  103. Matsumoto, Naoyuki, Document control apparatus, document control system, document control method and storage medium.
  104. Matsumoto, Naoyuki, Document control apparatus, document control system, document control method and storage medium.
  105. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  106. Saito, Kazumi; Suzuki, Toshimitsu; Yashiro, Sadao; Muramoto, Takahide; Goto, Masatomo, Document management apparatus and document management program storage medium.
  107. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  108. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  109. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  110. Zhu, Kevin, Dynamic smart card application loading.
  111. Dorwin, David Kimbal, Dynamically changing stream quality of protected content based on a determined change in a platform trust.
  112. Dorwin, David Kimbal, Dynamically changing stream quality when user is unlikely to notice to conserve resources.
  113. Nachenberg, Carey; Wawda, Abu; Bromwich, Adam; Lee, On; Sanders, Darren, Effective aggregation and presentation of database intrusion incidents.
  114. Miliefsky, Gary S., Effectively preventing data leakage, spying and eavesdropping through a networked computing device by controlling access to a plurality of its device interfaces.
  115. Geoffrey, Mohammed Alawi, Electronic certification and authentication system.
  116. Dickinson, Alexander G.; Ohare, Mark S.; Rohrbach, Mark D.; Zoccoli, James G.; Orsini, Rick L.; Brooks, Aaron A.; Davenport, Roger S.; Clough, Philip W.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle; Berger, Brian; Dobson, Jr., Robert T., Electronic commerce with cryptographic authentication.
  117. Blumenfeld,Steven M.; Raduchel,William J., Electronic loose-leaf remote control for enabling access to content from a media player.
  118. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution system.
  119. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution system.
  120. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution system.
  121. Manning,Damian Franken; Lowy,Jon Walter, Electronic media distribution system.
  122. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution systems.
  123. Galuten, Albhy; Radbel, Dmitry; Williams, Peter, Electronic music/media distribution system.
  124. Galuten,Albhy; Radbel,Dmitry; Williams,Peter, Electronic music/media distribution system.
  125. Bierbaum, Christopher J.; Cope, Warren B.; Katzer, Robin D.; Paczkowski, Lyle W., Electronic payment using a proxy account number stored in a secure element.
  126. Cope, Warren B.; Paczkowski, Lyle W., Electronic purchase transaction trust infrastructure.
  127. Cordery, Robert A.; Campagna, Matthew J.; Haas, Bertrand, Electronic voting system and associated method.
  128. Constantinof, Cristian, Emergency services for packet networks.
  129. Seymour, Harlan; Satish, Sourabh; Yeh, Anne; Yeung, Benjamin, Empirical database access adjustment.
  130. Newcombe, Christopher Richard; Jones, Paul David; Ellis, Richard Donald; Birum, Derrick Jason, Enabling content security in a distributed system.
  131. Chojnacki, Robert, Encryption method for distribution of data.
  132. Feng,An; Minjarez,Frank, Enforcing data protection legislation in Web data services.
  133. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  134. Dorwin, David Kimbal, Extending browser functionality with dynamic on-the-fly downloading of untrusted browser components.
  135. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  136. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S., File checking using remote signing authority via a network.
  137. Hartmann, Alfred C., Filtering training data for machine learning.
  138. Rhoads, Geoffrey B.; Rodriguez, Anthony, Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  139. O'Hare, Mark S.; Orsini, Rick L., Gateway for cloud-based secure storage.
  140. O'Hare, Mark S.; Orsini, Rick L., Gateway for cloud-based secure storage.
  141. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Generating a key hieararchy for use in an isolated execution environment.
  142. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Generating isolated bus cycles for isolated execution.
  143. Kolls, H. Brock, Global network based vehicle safety and security telematics.
  144. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  145. Uhlig,Richard; Anderson,Andrew V.; Bennett,Steve; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert, Handling faults associated with operation of guest software in the virtual-machine architecture.
  146. Rossmann, Alain, Hybrid systems for securing digital assets.
  147. Cahill,Conor P.; Wexelblat,David Eli; Aoki,Norihiro Edwin; Carriere,Jeromy; Roskind,James; Toomey,Christopher Newell, Identity based service system.
  148. Oki, Mitsuo, Image processing apparatus, image processing method and a computer program product.
  149. Kolls, H. Brock, In-vehicle device for wirelessly connecting a vehicle to the internet and for transacting e-commerce and e-business.
  150. Ishiguro,Ryuji; Okaue,Takumi; Ooishi,Tateo, Information processing apparatus, information processing method, and program storage medium.
  151. Kitano, Hiroaki, Information processing apparatus, information processing system, and program.
  152. Kimmel, Gerald D.; Domangue, Ersin L.; Adamouski, Francis J., Information-centric security.
  153. Ogino, Akira; Kimura, Yuji; Ezaki, Tadashi; Kori, Teruhiko, Information-signal playback system, information-signal reading apparatus, information-signal processing apparatus, information-signal playback method, information-signal reading method and information-signal processing apparatus.
  154. Cornelius,Richard D.; Stepniczka,Andreas; Chu,Kevin, Initiating an agreement in an e-commerce environment.
  155. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  156. Liu, Xian Jun; Chang, Robert C.; Yuan, Po; Wang, Junzhi; Barzilai, Ron; Qawami, Bahman; Sabet-Sharghi, Farshid, Integration of secure data transfer applications for generic IO devices.
  157. Corless, Peter P., Intellectual property over non-internet protocol systems and networks.
  158. Hughes, David A.; Smith, Allen J., Interface for presenting downloadable digital data content format options.
  159. Medvinsky, Alexander, Intrusion detection for object security.
  160. Cota-Robles, Eric C.; Glew, Andy; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael A.; Neiger, Gilbert; Uhlig, Richard, Invalidating translation lookaside buffer entries in a virtual machine (VM) system.
  161. Cota-Robles, Eric C.; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael A.; Neiger, Gilbert; Uhlig, Richard, Invalidating translation lookaside buffer entries in a virtual machine system.
  162. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  163. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  164. Sites, Richard L., Low-fidelity document rendering.
  165. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, John, Macro-block based content replacement by PID mapping.
  166. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  167. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  168. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  169. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  170. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing accesses in a processor for isolated execution.
  171. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  172. Icken, Donald A.; Keller, Neal M.; Ungar, Lisa M., Mechanism for building access control structures for authoring systems.
  173. Icken, Donald A.; Keller, Neal M.; Ungar, Lisa M., Mechanism for displaying content using control structure for authoring systems.
  174. Kozuch,Michael; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Schoenberg,Sebastian; Uhlig,Richard, Mechanism for providing power management through virtualization.
  175. Hall, Clifford D.; Campbell, Randolph L., Mechanism for remapping post virtual machine memory pages.
  176. Icken, Donald A.; Keller, Neal M.; Ungar, Lisa M., Mechanism for selection using access control structures for authoring systems.
  177. Bennett,Steven M.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Neiger,Gilbert; Uhlig,Richard, Mechanism to control hardware interrupt acknowledgement in a virtual machine system.
  178. Fish, Andrew J., Mechanism to determine trust of out-of-band management agents.
  179. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  180. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  181. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  182. McKeen,Francis X.; Reneris,Ken; Grawrock,David W., Mechanism to secure computer output from software attack using isolated execution.
  183. Chang, Robert Chin-Tse; Hutton, Henry Ricardo; Sabet-Sharghi, Farshid; Tanik, Haluk Kent; Barzilai, Ron; Soffer, Meytal; Yan, Mei; Dwyer, Patricia; Yuan, Po; Qawami, Bahman, Media card command pass through methods.
  184. Chang, Robert Chin-Tse; Hutton, Henry Ricardo; Sabet-Sharghi, Farshid; Tanik, Haluk Kent; Barzilai, Ron; Soffer, Meytal; Yan, Mei; Dwyer, Patricia; Yuan, Po; Qawami, Bahman, Media card command pass through methods.
  185. Rassool,Reza; Worzel,William P.; Baker,Brian, Media tracking system and method.
  186. Johnson,Bruce E.; Demsey,Seth M.; Zintel,William Michael, Metered execution of code.
  187. Brickell, Ernest; Graunke, Gary; Stevens, William A.; Vembu, Balaji, Method and apparatus for authenticated, recoverable key distribution with no database secrets.
  188. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  189. Poisner,David I.; Grawrock,David W.; Sutton,James A., Method and apparatus for communicating securely with a token.
  190. Kanevsky, Dimitri; Sabath, Mariusz; Zlatsin, Alexander, Method and apparatus for controlling e-mail access.
  191. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  192. Bennett, Steven M.; Anderson, Andrew V.; Cota Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  193. Bennett, Steven M.; Anderson, Andrew V.; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  194. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  195. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  196. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  197. Kozuch, Michael A.; Sutton, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  198. O'Toole, Jr., James W., Method and apparatus for managing secure communications.
  199. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  200. Koelle,Katharina Veronika; Worzel,William P., Method and apparatus for protection of electronic media.
  201. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  202. Keene, Catherine M.; Lin, Raymond; Sadhureddy, Rao, Method and apparatus for providing controlled access to software objects and associated documents.
  203. Keene,Catherine M.; Lin,Raymond; Sadhureddly,Rao, Method and apparatus for providing controlled access to software objects and associated documents.
  204. Trapp,Martin; Zwissler,Sonja, Method and apparatus for secure processing of sensitive data.
  205. Youn, Paul; Wong, Daniel ManHung, Method and apparatus for securely executing a background process.
  206. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  207. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  208. Lee, Larry A.; Kilmer, Jr., Robert L.; Menigoz, David R., Method and apparatus for selectively denying access to encoded data.
  209. Constantinof, Cristian, Method and apparatus for session control.
  210. Anderson, Andrew V.; Kägi, Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  211. Anderson,Andrew V.; K��gi,Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  212. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  213. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  214. Glew,Andy; Kozuch,Michael A.; Boleyn,Erich S.; Smith, III,Lawrence O.; Neiger,Gilbert; Uhlig,Richard, Method and apparatus for translating guest physical addresses in a virtual machine environment.
  215. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  216. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  217. Cocchi, Ronald P.; Curren, Christopher P.; Collier, Kevin T., Method and apparatus for verifying memory contents.
  218. Rossmann,Alain; Zuili,Patrick; Ouya,Michael Michio; Humpich,Serge; Lee,Chang Ping; Vainstein,Klimenty; Hilderbrand,Hal; Garcia,Denis Jacques Paul; Supramaniam,Senthilvasan; Huang,Weiqing; Ryan,Nicholas Michael, Method and architecture for providing pervasive security to digital assets.
  219. Slama, Jeffery E., Method and computer software code for providing security for a computer software program.
  220. Kortum, Philip Ted; Sullivan, Marc Andrew; Cansler, Jr., James L.; Williams, Alyssa Lenorah Noll, Method and interface for video content acquisition security on a set-top box.
  221. Diamond, Michael B.; White, Jonathan B., Method and system for accessing content on demand.
  222. Newcombe,Christopher Richard, Method and system for binding kerberos-style authenticators to single clients.
  223. Cheah, Chris, Method and system for controlled distribution of information over a network.
  224. Cheah, Chris, Method and system for controlled distribution of information over a network.
  225. Jones, Paul David; Newcombe, Christopher Richard; Ellis, Richard Donald; Birum, Derrick Jason, Method and system for controlling bandwidth on client and server.
  226. Rubin, Moshe; Schreiber, Daniel, Method and system for copy protection of displayed data content.
  227. Jones,Paul David; Newcombe,Christopher Richard; Ellis,Richard Donald; Birum,Derrick Jason; Thompson,Mikel Howard, Method and system for effectively communicating file properties and directory structures in a distributed file system.
  228. Newcombe,Christopher Richard; Jones,Paul David; Ellis,Richard Donald; Birum,Derrick Jason, Method and system for enabling content security in a distributed system.
  229. Nath, Satyajit, Method and system for enabling users of a group shared across multiple file security systems to access secured files.
  230. Morten,Glenn A.; Rassool,Reza P.; Claeys,Tom E.; Baker,Brian Andrew, Method and system for end to end securing of content for video on demand.
  231. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  232. Ellis, Richard Donald; Newcombe, Christopher Richard; Jones, Paul David; Birum, Derrick Jason; Dunkle, Harold Michael; Thompson, Mikel Howard, Method and system for granting access to system and content.
  233. Ellis, Richard Donald; Newcombe, Christopher Richard; Jones, Paul David; Birum, Derrick Jason; Dunkle, Harold Michael; Thompson, Mikel Howard, Method and system for granting access to system and content.
  234. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  235. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  236. Newcombe,Christopher Richard; Jones,Paul David, Method and system for load balancing an authentication system.
  237. Vainstein, Klimenty, Method and system for managing security tiers.
  238. Chojnacki, Robert, Method and system for mass distribution of geographic data for navigation systems.
  239. Jones, Paul David; Newcombe, Christopher Richard; Ellis, Richard Donald; Birum, Derrick Jason; Thompson, Mikel Howard, Method and system for preloading resources.
  240. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  241. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  242. Nath, Satyajit, Method and system for providing document retention using cryptography.
  243. Nath, Satyajit, Method and system for providing document retention using cryptography.
  244. Morten, Glenn A.; Palmer, Tomás E.; MacLean, Charles D., Method and system for providing secure CODECS.
  245. Goodman, Daniel I., Method and system for real-time control of document printing.
  246. Goodman, Daniel I., Method and system for real-time control of document printing.
  247. Zhuk, Oscar V.; Rohr, Vince M., Method and system for real-time tamper evidence gathering for software.
  248. Diamond, Michael B.; White, Jonathan B., Method and system for registering and activating content.
  249. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set.
  250. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C.; Laren, Carter C.; Pearson, Peter K.; Lawson, Nathaniel J., Method and system for secure access to non-volatile memory.
  251. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  252. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  253. Murphy, Shaun; Murphy, Charles; Johnson, Richard, Method and system for sender-controlled messaging and content sharing.
  254. Murphy, Shaun; Murphy, Charles; Johnson, Richard, Method and system for sender-controlled messaging and content sharing.
  255. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  256. Bajikar, Sundeep M., Method and system to provide a trusted channel within a computer system for a SIM device.
  257. Schneider, Klaus; Angerbauer, Ralf; Heindl, Alexander, Method for activating or deactivating data stored in a memory arrangement of a microcomputer system.
  258. Wiehler, Gerhard, Method for controlling distribution and use of software products with net-work-connected computers.
  259. Koelle, Katharina Veronika; Midwinter, Wendy, Method for evolving detectors to detect malign behavior in an artificial immune system.
  260. Koelle, Katharina Veronika; Midwinter, Wendy, Method for evolving detectors to detect malign behavior in an artificial immune system.
  261. Hughes,David A.; Smith,Allen J., Method for facilitating a transaction for purchasable content over an electronic network.
  262. Trapp,Martin, Method for guaranteeing freshness of results for queries against a non-secure data store.
  263. Stern,Jonathan; Rothman Shore,Jeremy W.; Karadimitriou,Kosmas; Decary,Michel, Method for maintaining people and organization information.
  264. Goubin,Louis; Patarin,Jacques, Method for making secure one or several computer installations using a common secret key algorithm, use of the method and a computer system utilizing the method.
  265. Naccache,David; Rousseau,Ludovic; Girard,Pierre, Method for monitoring program flow to verify execution of proper instructions by a processor.
  266. Dotan, Eyal, Method for protecting computer programs and data from hostile code.
  267. Dotan, Eyal, Method for protecting computer programs and data from hostile code.
  268. Dotan, Eyal, Method for protecting computer programs and data from hostile code.
  269. Dotan, Eyal, Method for protecting computer programs and data from hostile code.
  270. Dotan,Eyal, Method for protecting computer programs and data from hostile code.
  271. Dorwin, David Kimbal; Finnan, Hugh, Method for reducing time to first frame/seek frame of protected digital content streams.
  272. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jevasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  273. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  274. Romansky, Brian M.; Foth, Thomas J., Method for searching a digital rights management package.
  275. Brickell,Ernie F., Method of confirming a secure key exchange.
  276. Borza, Stephen J., Method of distributing piracy protected computer software.
  277. Borza, Stephen J., Method of distributing piracy protected computer software.
  278. DiStefano, III,Thomas L., Method of moderating external access to an electronic document authoring development and distribution system.
  279. Cope, Warren B.; Paczkowski, Lyle W., Method of transaction processing to support proxy financial card.
  280. Cuenod,Jean Christophe; Sgro,Gilles, Method to protect software against unwanted use with a "conditional branch" principle.
  281. Cuenod,Jean Christophe; Sgro,Gilles, Method to protect software against unwanted use with a "elementary functions" principle.
  282. Cuenod,Jean Christophe; Sgro,Gilles, Method to protect software against unwanted use with a "renaming" principle.
  283. Cuenod,Jean Christophe; Sgro,Gilles, Method to protect software against unwanted use with a "temporal dissociation" principle.
  284. Cuenod,Jean Christophe; Sgro,Gilles, Method to protect software against unwanted use with a "variable principle".
  285. Dorwin, David Kimbal; Scherkus, Andrew; Kaiser, Christian; Lacey, Stephen John, Method, manufacture, and apparatus for configuring multiple content protection systems.
  286. Dorwin, David Kimbal, Method, manufacture, and apparatus for content decryption module.
  287. Dorwin, David Kimbal; Scherkus, Andrew; Lacey, Stephen John; Kaiser, Christian, Method, manufacture, and apparatus for content protection for HTML media elements.
  288. Dorwin, David Kimbal; Scherkus, Andrew; Kaiser, Christian, Method, manufacture, and apparatus for content protection using authentication data.
  289. Dorwin, David Kimbal, Method, manufacture, and apparatus for instantiating plugin from within browser.
  290. Dorwin, David Kimbal; Scherkus, Andrew Martin, Method, manufacture, and apparatus for protection of media objects from the web application environment.
  291. O'Toole, Jr., James W., Methods and apparatus for securing communications of a user operated device.
  292. Odgers, Chris R.; Bell, Alan, Methods and apparatus for uniquely identifying a large number of film prints.
  293. Odgers,Chris R.; Bell,Alan, Methods and apparatus for uniquely identifying a large number of film prints.
  294. Moran,Douglas R.; Hall,Clifford D.; Piazza,Thomas A.; Jensen,Richard W., Methods and arrangements to interface memory.
  295. Amidon, Christopher; Walsh, Richard; Issa, Alfredo, Methods and systems for automated content distribution.
  296. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  297. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  298. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  299. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  300. Bennett,Steve M.; Neiger,Gilbert; Cota Robles,Erik C.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael A.; Uhlig,Richard A.; Smith,Larry; Rodgers,Dion; Glew,Andrew; Boleyn,Erich, Methods and systems to control virtual machines.
  301. Bradbury, Jonathan; Stelung, Daniel, Methods of playing video games.
  302. Walsh, Richard J.; Issa, Alfredo C.; Amidon, Christopher M., Methods, systems, and products for characterizing target systems.
  303. Issa, Alfredo C; Walsh, Richard J., Methods, systems, and products for classifying peer systems.
  304. Zhu, Kevin, Mobile device-based control of smart card operation.
  305. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  306. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  307. Grawrock,David W., Multi-token seal and unseal.
  308. Baker, Stephen M., Multilayered intrusion detection system and method.
  309. Walter, Edward, Multimedia-based video game distribution.
  310. Walter, Edward, Multimedia-based video game distribution.
  311. Candelore, Brant L., Multiple DRM management.
  312. Pendlebury,Ian Malcolm, Network enabled application software system and method.
  313. Walter, Edward; Diroo, Yolius; Wollmershauser, Steven M., Networked television and method thereof.
  314. Walter, Edward; Diroo, Yolius; Wollmershauser, Steven M., Networked television and method thereof.
  315. Tinker, Jeffrey Lee; MacLean, Charles Duncan; Ali, Hamid Shaheed; Hiar, Edward Charles; Rutman, Michael; Morten, Glenn A., Non-blocking of head end initiated revocation and delivery of entitlements non-addressable digital media network.
  316. Sprunk, Eric J., Object and resource security system.
  317. Cowburn, Russell Paul; Buchanan, James David Ralph; Seem, Peter Robert, Optical authentication.
  318. Cowburn, Russell Paul; Buchanan, James David Ralph; Seem, Peter Robert, Optical authentication.
  319. Blumenfeld, Steven M.; Raduchel, William J., Out-of band tokens for rights access.
  320. Blumenfeld, Steven M.; Raduchel, William J., Out-of-band tokens for rights access.
  321. Blumenfeld, Steven M.; Raduchel, William J., Out-of-band tokens for rights access.
  322. Blumenfeld, Steven M.; Raduchel, William J., Out-of-band tokens for rights access.
  323. Blumenfeld,Steven M.; Raduchel,William J., Out-of-band tokens for rights access.
  324. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  325. Candelore, Brant L.; Unger, Robert Allan; Pedlow, Jr., Leo M., Partial encryption.
  326. Candelore, Brant L.; Unger, Robert Allan; Pedlow, Jr., Leo M., Partial encryption storage medium.
  327. Candelore, Brant L.; Unger, Robert Allan; Pedlow, Jr., Leo M., Partial multiple encryption.
  328. Munje, Arun; Plestid, Trevor, Password methods and systems for use on a mobile device.
  329. Brew, Glenn E.; Hurtado, Marco M.; Medina, David; Munson, Jonathan P.; Nusser, Stefan; Pacifici, Giovanni; You{grave over (s)}sef, Alaa S., Persistent access control of protected content.
  330. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  331. Brickell,Ernie F., Platform and method for establishing trust without revealing identity.
  332. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for generating and utilizing a protected audit log.
  333. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for issuing and certifying a hardware-protected attestation key.
  334. Herbert,Howard C.; Grawrock,David W.; Ellison,Carl M.; Golliver,Roger A.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for remote attestation of a platform.
  335. Grawrock,David W., Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations.
  336. Carter, Stephen R; Burch, Lloyd Leon, Policy and attribute based access to a resource.
  337. Nilsson, Jarl A., Policy determined accuracy of transmitted information.
  338. Nilsson, Jarl A., Policy determined accuracy of transmitted information.
  339. McCorkendale, Bruce; Sobel, William E., Presentation of network source and executable characteristics.
  340. Satish, Sourabh; Hernacki, Brian, Preventing fraudulent misdirection of affiliate program cookie tracking.
  341. Zhuk, Oscar V.; Morten, Glenn A.; Hiar, Edward Charles, Preventing unauthorized modification or skipping of viewing of advertisements within content.
  342. Moran, Douglas R.; Acharya, Satish; Bogin, Zohar; Galloway, Sean G., Prioritized address decoder.
  343. Baker, Stuart D.; Strassburger, Philip C., Privileged communication system with routing controls.
  344. Baker, Brian, Process and streaming server for encrypting a data stream.
  345. Baker,Brian, Process and streaming server for encrypting a data stream.
  346. Morten,Glenn A.; Baker,Brian, Process and streaming server for encrypting a data stream to a virtual smart card client system.
  347. Baker, Brian A.; Morten, Glenn A.; MacLean, Charles Duncan; Tinker, Jeffrey Lee, Process and streaming server for encrypting a data stream with bandwidth based variation.
  348. Baker, Brian A.; Morten, Glenn A.; MacLean, Charles Duncan; Tinker, Jeffrey Lee, Process and streaming server for encrypting a data stream with bandwidth based variation.
  349. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard, Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor.
  350. Okada, Takayuki, Processor with a function to prevent illegal execution of a program, an instruction executed by a processor and a method of preventing illegal execution of a program.
  351. Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
  352. Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
  353. Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
  354. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  355. Poisner, David I., Protected configuration space in a protected environment.
  356. Poisner,David I., Protected configuration space in a protected environment.
  357. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  358. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  359. Keene, David P.; Donley, Daryl E., Protecting sensitive information from a secure data store.
  360. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Protecting software environment in isolated execution.
  361. Elazar, Gidon; Harkabi, Dan; Weingarten, Nehemiah; Halachmi, Aviraham; Camiel, Noam; Fuchs, Eran, Protection of digital data content.
  362. Qureshi, Waheed, Providing a managed browser.
  363. Qureshi, Waheed, Providing mobile device management functionalities.
  364. Katzer, Robin Dale; Koellner, Todd N.; Zhu, Kevin, Providing secure access to smart card applications.
  365. Bennett,Steven M.; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K��gi,Alain; Neiger,Gilbert; Uhlig,Richard; Mondal,Sanjoy K.; Brandt,Jason, Providing support for single stepping a virtual machine in a virtual machine environment.
  366. Barton, Gary; Lang, Zhongmin; Desai, Nitin; Walker, James Robert, Providing virtualized private network tunnels.
  367. Cota Robles,Erik C.; Flautner,Krisztian, Real-time scheduling of virtual machines.
  368. Nachenberg, Carey; Barajas, Frank, Real-time training for a computer code intrusion detection system.
  369. Uhlig,Richard; Neiger,Gilbert; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Bennett,Steven M, Reclaiming existing fields in address translation data structures to extend control over memory accesses.
  370. Sasamoto, Manabu; Noguchi, Takaharu; Aikawa, Makoto; Hirahata, Shigeru, Recording apparatus for recording digital information.
  371. Lal, Amrish, Reducing false positives generated by a database intrusion detection system.
  372. Dorwin, David Kimbal, Reducing time to first encrypted frame in a content stream.
  373. Blumenfeld, Steven M.; Raduchel, William J., Regulating access to content using a multitiered rule base.
  374. Kortum,Philip Ted; Sullivan,Marc Andrew; Brandt,Jeffrey Lewis, Remote control, apparatus, system and methods of using the same.
  375. Annan, Brandon C.; Belser, John E.; Parsel, William Michael; Shipley, Trevor D., Remote deactivation of near field communication functionality.
  376. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  377. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  378. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C.; Laren, Carter C.; Pearson, Peter K.; Lawson, Nathaniel J., Reprogrammable security for controlling piracy and enabling interactive content.
  379. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C.; Laren, Carter C.; Pearson, Peter K.; Lawson, Nathaniel J., Reprogrammable security for controlling piracy and enabling interactive content.
  380. Kocher, Paul Carl; Jaffe, Joshua Michael; Jun, Benjamin Che-Ming; Laren, Carter Cyrus; Pearson, Peter Kelley; Lawson, Nathaniel James, Reprogrammable security for controlling piracy and enabling interactive content using revocation status.
  381. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind; Reneris, Ken, Resetting a processor in an isolated execution environment.
  382. Hasegawa,Yutaka, Restriction canceling apparatus.
  383. Zurko, Mary Ellen; Blakley, III, George R., Retrospective policy safety net.
  384. Zurko, Mary Ellen; Blakley, III, George R., Retrospective policy safety net.
  385. Zurko, Mary Ellen; Blakley, III, George R., Retrospective policy safety net.
  386. Zurko, Mary Ellen; Blakley, III, George R., Retrospective policy safety net.
  387. Rajan, Archana S.; Bonver, Edward; Kennedy, Mark, Secure browser.
  388. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  389. Diamond, Michael B.; White, Jonathan B.; Daniell, Piers J., Secure content enabled drive digital rights management system and method.
  390. Diamond, Michael B.; White, Jonathan B.; Daniell, Piers J., Secure content enabled drive system and method.
  391. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Secure data parser method and system.
  392. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  393. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  394. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  395. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  396. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  397. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  398. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  399. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  400. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  401. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  402. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  403. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  404. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  405. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  406. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  407. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  408. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  409. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  410. Orsini, Rick L.; VanZandt, John; O'Hare, Mark S.; Davenport, Roger S., Secure data parser method and system.
  411. Orsini,Rick L.; VanZandt,John; O'Hare,Mark S.; Davenport,Roger S., Secure data parser method and system.
  412. Gaebel,Gary Lin; Leslie,Sara Lynn, Secure document-data-handling system and methodology.
  413. Qureshi, Waheed; DeBenning, Thomas H.; Datoo, Ahmed; Andre, Olivier; Abdullah, Shafaq, Secure execution of enterprise applications on mobile devices.
  414. Qureshi, Waheed; DeBenning, Thomas H.; Datoo, Ahmed; Andre, Olivier; Abdullah, Shafaq; McGinty, John M.; Roach, Kelly Brian, Secure execution of enterprise applications on mobile devices.
  415. Albornoz, Jordi A., Secure initialization of intrusion detection system.
  416. Albornoz,Jordi A., Secure initialization of intrusion detection system.
  417. Katzer, Robin Dale; Tiwari, Hemant V., Secure online credit card transactions.
  418. Duri, Sastry S.; Gruteser, Marco O.; Liu, Xuan; Moskowitz, Paul A.; Perez, Ronald; Schonberg, Edith G.; Singh, Moninder; Tang, Jung-Mu; Tresser, Charles P., Secure system and method for enforcement of privacy policy and protection of confidentiality.
  419. Duri,Sastry S.; Gruteser,Marco O.; Liu,Xuan; Moskowitz,Paul A.; Perez,Ronald; Schonberg,Edith G.; Singh,Moninder; Tang,Jung Mu; Tresser,Charles P., Secure system and method for enforcement of privacy policy and protection of confidentiality.
  420. Duri,Sastry S.; Liu,Xuan; Moskowitz,Paul A.; Perez,Ronald; Schonberg,Edith G.; Singh,Moninder; Tresser,Charles P., Secure system and method for enforcement of privacy policy and protection of confidentiality.
  421. Garcia,Denis Jacques Paul, Secured data format for access control.
  422. Miliefsky, Gary S.; Lichtenberger, Ken; Gauthier, Christopher P., Securing data gathering devices of a personal computing device while performing sensitive data gathering activities to prevent the misappropriation of personal user data gathered therewith.
  423. Dimenstein, Zachary David, Securing encrypted files in a PC and PC peripheral environment.
  424. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  425. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  426. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  427. Bregman, Mark; Sobel, William E., Security threat reporting in light of local security tools.
  428. Sloo, David; Barrett, Peter, Segment based digital content protection.
  429. MacLean, Charles Duncan; Inskip, Thomas, Selective and persistent application level encryption for video provided to a client.
  430. Candelore, Brant L.; Derovanessian, Henry; Pedlow, Jr., Leo M., Selective encryption encoding.
  431. Candelore, Brant L., Selective encryption with coverage encryption.
  432. Kollmyer,Brad; Baker,Brian A.; Shapiro,Eric Bradley; Kollmyer,Aric; Rutman,Mike; MacLean,Charles Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Selectively encrypting different portions of data sent over a network.
  433. Cowburn, Russell Paul, Self-calibration.
  434. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C.; Laren, Carter C.; Pearson, Peter K.; Lawson, Nathaniel J., Self-protecting digital content.
  435. Kocher, Paul Carl; Jaffe, Joshua Michael; Jun, Benjamin Che-Ming; Laren, Carter Cyrus; Pearson, Peter Kelley; Lawson, Nathaniel James, Self-protecting digital content.
  436. Mann, Dwayne R.; Heard, Robert W.; Burchett, Christopher D.; Gordon, Ian R., Server, computer memory, and method to support security policy maintenance and distribution.
  437. Cowburn, Russell Paul; Seem, Peter, Signature generation for use in authentication and verification using a non-coherent radiation source.
  438. Grawrock,David W.; Poisner,David I., Sleep protection.
  439. Candelore, Brant L.; Derovanessian, Henry; Pedlow, Jr., Leo M., Slice mask and moat pattern partial encryption.
  440. Candelore, Brant L.; Derovanessian, Henry; Pedlow, Jr., Leo M., Slice mask and moat pattern partial encryption.
  441. Kanevsky, Dimitri; Sabath, Mariusz; Sedivy, Jan; Zlatsin, Alexander, Smart book.
  442. Kanevsky,Dimitri; Sabath,Mariusz; Sedivy,Jan; Zlatsin,Alexander, Smart book.
  443. Qin,Johnson Jiahui, Software distribution system and method.
  444. Frank, Alexander; Steeb, Curt A.; Ahdout, Isaac P.; Duffus, James S.; Hall, Martin; Temple, Nicholas; Venkatachalam, Rajagopal; Phillips, Thomas; Xu, Zhangwei, Special PC mode entered upon detection of undesired state.
  445. Candelore, Brant L.; Derovanessian, Henry; Pedlow, Jr., Leo M., Star pattern partial encryption method.
  446. Neiger,Gilbert; Anderson,Andrew V.; Bennett,Steven M.; Brandt,Jason; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K채gi,Alain; Mondal,Sanjoy K.; Parthasarathy,Rajesh; Rodgers,Dion; Smith,Lawrence O.; Uhlig,Richard A., Support for nested fault in a virtual machine environment.
  447. Moffat, Darren J.; Belgaied, Kais; Sangster, Paul, System and computer readable medium for verifying access to signed ELF objects.
  448. Palmer, Tomas Earl, System and method for N-dimensional encryption.
  449. Kline, Paul A.; Weinstein, Allan M.; Weinstein, David J.; Roberts, Jon L.; Nitin, Sawant, System and method for a commercial multimedia rental and distribution system.
  450. Weinstein,David J.; Weinstein,Allan M.; Kline,Paul A; Roberts,Jon L., System and method for a commercial multimedia rental and distribution system.
  451. Cowburn, Russell Paul, System and method for article authentication using blanket illumination.
  452. Cowburn, Russell Paul, System and method for article authentication using encoded signatures.
  453. Cowburn, Russell Paul, System and method for article authentication using signatures.
  454. Cowburn, Russell Paul, System and method for article authentication using thumbnail signatures.
  455. Cota Robles,Erik C.; Campbell,Randolph L.; Hall,Clifford D.; Neiger,Gilbert; Uhlig,Richard A., System and method for binding virtual machines to hardware contexts.
  456. Amidon, Christopher; Issa, Alfredo; Walsh, Richard; Stafford, Sid, System and method for controlled viral distribution of digital content in a social network.
  457. Neiger, Gilbert; Bennett, Steven M.; Cota-Robles, Erik; Schoenberg, Sebastian; Hall, Clifford D.; Rodgers, Dion; Smith, Lawrence O.; Anderson, Andrew V.; Uhlig, Richard A.; Kozuch, Michael; Glew, Andy, System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time.
  458. Bantz, David F.; Caceres, Ramon; Chefalas, Thomas E.; Jalan, Srikant; Mastrianni, Steven J.; Pickover, Clifford A., System and method for controlling the disposition of computer-based objects.
  459. Benson, Greg; Hackbarth, Edward, System and method for controlling the editing by user action of digital objects created in a document server application.
  460. Benson, Greg; Hackbarth, Edward, System and method for controlling the usage of digital objects.
  461. Raciborski, Bohdan, System and method for delivery of a modular operating system.
  462. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  463. Heard, Robert W.; Mann, Dwayne R.; Burchett, Christopher D.; Gordon, Ian R., System and method for distribution of security policies for mobile devices.
  464. Geoffrey, Mohammed Alawi, System and method for electronic certification and authentication of data.
  465. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  466. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  467. Farahat, Ayman Omar; Golle, Philippe Jean-Paul; Korolova, Aleksandra, System and method for exchanging a transformed message with enhanced privacy.
  468. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  469. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  470. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  471. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  472. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  473. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  474. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  475. Sutton, II,James A.; Grawrock,David W., System and method for execution of a secured environment initialization instruction.
  476. Sutton, James A; Grawrock, David W, System and method for execution of a secured environment initialization instruction.
  477. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  478. Pearson,Larry B.; Bridges,J. Bradley, System and method for local video distribution.
  479. Troyansky, Lidror; Carny, Ofir; Peled, Ariel, System and method for monitoring unauthorized dissemination of documents and portable media.
  480. Troyansky,Lidror; Carny,Ofir; Peled,Ariel, System and method for monitoring unauthorized dissemination of documents and portable media.
  481. Palmer,Tom��s Earl, System and method for n-dimensional encryption.
  482. Fowler,Stephan; Rodgers,James; Green,Colin, System and method for network operation.
  483. Kortum, Philip Ted; Sullivan, Marc Andrew, System and method for pre-caching a first portion of a video file on a media device.
  484. Kortum, Philip Ted; Sullivan, Marc Andrew, System and method for pre-caching a first portion of a video file on a set-top box.
  485. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  486. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  487. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  488. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  489. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  490. Kortum, Philip Ted; Sullivan, Marc Andrew, System and method for recording television content at a set top box.
  491. Grawrock,David W.; Sutton, II,James A., System and method for resetting a platform configuration register.
  492. Issa, Alfredo; Amidon, Christopher; Walsh, Richard, System and method for rights propagation and license management in conjunction with distribution of digital content in a social network.
  493. Kline, Paul A.; Nitin, Sawant; Weinstein, Allan M.; Weinstein, David J.; Roberts, Jon L., System and method for secure commercial multimedia rental and distribution over secure connections.
  494. Nussbaum, Lawrence Edward; Thompson, Stephen, System and method for securing data.
  495. Jackson, Steven Edward, System and method for self-publication.
  496. Walsh, Richard; Amidon, Christopher; Issa, Alfredo, System and method for social network trust assessment.
  497. Walsh, Richard; Amidon, Christopher; Issa, Alfredo, System and method for social network trust assessment.
  498. Candelore, Brant L.; Pedlow, Jr., Leo M., System and method for the creation, synchronization and delivery of alternate content.
  499. Sullivan, Marc A.; Kortum, Philip T.; Brandt, Jeff, System and method of displaying a video stream.
  500. Sullivan, Marc Andrew; Kortum, Philip Ted; Brandt, Jeffrey Lewis, System and method of displaying a video stream.
  501. Sullivan,Marc Andrew; Kortum,Philip Ted; Brandt,Jeffrey Lewis, System and method of displaying a video stream.
  502. Grannan, Michael F.; Suryanarayana, Lalitha, System and method of managing video content delivery.
  503. Nadarajah, Dinesh, System and method of managing video content streams.
  504. Amidon, Christopher; Walsh, Richard; Issa, Alfredo, System and method of optimizing social networks and user levels based on prior network interactions.
  505. Issa, Alfredo; Walsh, Richard; Amidon, Christopher, System and method of sharing content among multiple social network nodes using an aggregation node.
  506. Kortum, Philip Ted; Sullivan, Marc Andrew; Cansler, Jr., James L.; Williams, Alyssa Lenorah Noll, System and method of transmitting photographs from a set top box.
  507. Kortum, Philip Ted; Sullivan, Marc Andrew; Brandt, Jeffrey Lewis, System and method of using a remote control and apparatus.
  508. Ansari, Ahmad C.; Nadarajah, Dinesh; Hartman, David Bruce, System and method to provide a unified video signal for diverse receiving platforms.
  509. Ansari, Ahmad C.; Nadarajah, Dinesh; Hartman, David Bruce, System and method to provide a unified video signal for diverse receiving platforms.
  510. Ansari, Ahmad C.; Nadarajah, Dinesh; Hartman, David Bruce, System and method to provide a unified video signal for diverse receiving platforms.
  511. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  512. Corless, Peter P., System for controlling and regulating distribution of intellectual properties using internet protocol framework.
  513. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  514. Olkin,Terry M.; Olkin,Jeffrey C.; Moreh,Jahanshah, System for detecting authentic e-mail messages.
  515. Olkin,Terry M.; Olkin,Jeffrey C.; Moreh,Jahanshah, System for detecting spoofed hyperlinks.
  516. Bacha, Hamid; Carroll, Robert Bruce; Mirlas, Lev; Tchao, Sung Wei, System for electronic repository of data enforcing access control on data search and retrieval.
  517. Riebe,Heinrich Henning; Aldis,David, System for persistently encrypting critical software data to control the operation of an executable software program.
  518. Yamada, Kazuhiro; Wakabayashi, Tatsuaki; Eguchi, Hisatoshi; Miura, Fumiaki, System for restricting content access and storage.
  519. Russell, Ryan S.; Levine, David D., System, method and computer program product for applying electronic policies.
  520. Walter,Edward; Diroo,Yolius, System, method and interface for controlling multiple electronic devices of a home entertainment system via a single control device.
  521. Morten, Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  522. Morten,Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  523. Morten,Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  524. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Systems and methods for a cryptographic file system layer.
  525. Carow, Michael D.; James, Vicki L., Systems and methods for authorization of information access.
  526. James, Vicki L., Systems and methods for authorization of information access.
  527. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Systems and methods for cryptographically splitting and storing data.
  528. Amidon, Christopher; Issa, Alfredo; Walsh, Richard, Systems and methods for discovering, creating, using, and managing social network circuits.
  529. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  530. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  531. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  532. Bellare, Mihir; Rogaway, Phillip, Systems and methods for distributing and securing data.
  533. Bonalle, David; Bliman, Michal; Saunders, Peter D.; Williamson, John Robert, Systems and methods for managing account information lifecycles.
  534. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Systems and methods for managing cryptographic keys.
  535. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for managing cryptographic keys.
  536. O'Hare, Mark S.; Orsini, Rick L.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  537. O'Hare, Mark S.; Orsini, Rick L.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  538. Orsini, Rick L.; O'Hare, Mark S.; Landau, Gabriel D.; Staker, Matthew; Yakamovich, William, Systems and methods for secure data sharing.
  539. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  540. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  541. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  542. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  543. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  544. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  545. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  546. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  547. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  548. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  549. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  550. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  551. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  552. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  553. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  554. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for secure workgroup management and communication.
  555. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S., Systems and methods for secure workgroup management and communication.
  556. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  557. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  558. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  559. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  560. O'Hare, Mark S.; Orsini, Rick L.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  561. Orsini, Rick L.; O'Hare, Mark S., Systems and methods for securing data in motion.
  562. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  563. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  564. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Systems and methods for securing data in the cloud.
  565. Orsini, Rick L; O'Hare, Mark S.; Martin, Don, Systems and methods for securing data in the cloud.
  566. Orsini, Rick L.; O'Hare, Mark S.; Bellare, Mihir; Rogaway, Phillip, Systems and methods for securing data using multi-factor or keyed dispersal.
  567. Sarkissian, Shaunt Mark; Sarkissian, Vahe Andre, Systems, methods and apparatuses for secure digital transactions.
  568. Morten, Glenn A.; Hiar, Edward Charles; Jacobs, Andre; Veres, James E.; Zhuk, Oscar V.; Tinker, Jeffrey Lee, Tamper prevention and detection for video provided over a network to a client.
  569. Martin, Don; Orsini, Rick L.; O'Hare, Mark S., Tape backup method.
  570. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Tape backup method.
  571. Burch, Lloyd Leon; Earl, Douglas G.; Carter, Stephen R; Ward, Robert Mark, Techniques for dynamically establishing and managing authentication and trust relationships.
  572. Candelore, Brant L.; Unger, Robert Allan; Derovanessian, Henry, Time division partial encryption.
  573. Bennett, Steven M.; Neiger, Gilbert; Anderson, Andrew V., Timer offsetting mechanism in a virtual machine environment.
  574. Cota Robles,Erik; Schoenberg,Sebastian; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor.
  575. Rassool, Reza P.; Morten, Glenn A.; Baker, Brian A., Transitioning to secure IP communications for encoding, encapsulating, and encrypting data.
  576. Rassool, Reza P.; Morten, Glenn A.; Baker, Brian A., Transitioning to secure IP communications for encoding, encapsulating, and encrypting data.
  577. Thirumalai, Gokul P.; Ahdout, Isaac, Tuning product policy using observed evidence of customer behavior.
  578. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  579. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  580. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  581. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  582. Sobel,William E; McCorkendale,Bruce, Use of geo-location data for spam detection.
  583. Neiger,Gilbert; Bennett,Steven M.; K��gi,Alain; Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Uhlig,Richard; Cota Robles,Erik; Rodgers,Scott; Smith,Lawrence, Use of multiple virtual machine monitors to handle privileged events.
  584. Dotan, Eyal, User transparent virtualization method for protecting computer programs and data from hostile code.
  585. Dotan, Eyal, User transparent virtualization method for protecting computer programs and data from hostile code.
  586. Satish, Sourabh; Hernacki, Brian, Using domain name service resolution queries to combat spyware.
  587. Chen, Ling Tony, Using hardware based secure isolated region to prevent piracy and cheating on electronic devices.
  588. McCorkendale, Bruce; Sobel, William E.; Nachenberg, Carey; Kennedy, Mark, Using inserted e-mail headers to enforce a security policy.
  589. Grawrock,David W.; Sutton, II,James A., Validation of inclusion of a platform within a data center.
  590. Kienzle, Darrell; Elder, Matthew, Validation of secure sockets layer communications.
  591. Bennett,Steven M.; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael; Smith,Lawrence; Rodgers,Scott, Vectoring an interrupt or exception upon resuming operation of a virtual machine.
  592. Kolls, H. Brock, Vehicle related wireless scientific instrumentation telematics.
  593. Cowburn, Russell Paul; Buchanan, James David Ralph, Verification of authenticity.
  594. Inoue,Hiroshi; Nakagawa,Toshiyuki, Verification of image data.
  595. Pearson, Larry B.; Bridges, J. Bradley, Video distribution systems and methods for multiple users.
  596. Bradbury, Jonathan; Lister, Stephen; Stelung, Daniel, Video game system and methods of operating a video game.
  597. Bradbury, Jonathan; Lister, Stephen; Stelung, Daniel, Video game systems.
  598. Van Vleck, Paul; Kortum, Philip T.; Sullivan, Marc A., Video quality testing by encoding aggregated clips.
  599. Van Vleck, Paul; Kortum, Philip T.; Sullivan, Marc A., Video quality testing by encoding aggregated clips.
  600. Candelore, Brant L.; Derovanessian, Henry; Pedlow, Jr., Leo M., Video slice and active region based multiple partial encryption.
  601. Candelore, Brant L.; Derovanessian, Henry; Pedlow, Jr., Leo M., Video slice and active region based multiple partial encryption.
  602. Knauerhase, Robert C.; Tewari, Vijay, Virtual machine management using processor state information.
  603. Knauerhase,Robert C.; Tewari,Vijay, Virtual machine management using processor state information.
  604. Walsh, Richard J.; Issa, Alfredo C.; Amidon, Christopher M.; Evans, James, Virtual peer for a content sharing system.
  605. Walsh, Richard J.; Issa, Alfredo C.; Amidon, Christopher M.; Evans, James; Hillen, Jens, Virtual peer in a peer-to-peer network.
  606. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Virtual translation lookaside buffer.
  607. Kolls,H. Brock, Wireless vehicle diagnostics with service and part determination capabilities.
  608. Walker, James; Lang, Zhongmin; Barton, Gary; Aravindakshan, Vipin, Wrapping unmanaged applications on a mobile device.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로