$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Digital rights management operating system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-009/44
출원번호 US-0227561 (1999-01-08)
발명자 / 주소
  • England Paul
  • DeTreville John D.
  • Lampson Butler W.
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Lee & Hayes, PLLC
인용정보 피인용 횟수 : 511  인용 특허 : 36

초록

A digital rights management operating system protects rights-managed data, such as downloaded content, from access by untrusted programs while the data is loaded into memory or on a page file as a result of the execution of a trusted application that accesses the memory. To protect the rights-manage

대표청구항

[ We claim:] [1.]1. A computerized method for a digital rights management operating system comprising:assuming a trusted identity;executing a trusted application;loading rights-managed data into memory for access by the trusted application; andprotecting the rights-managed data from access by an unt

이 특허에 인용된 특허 (36)

  1. Campbell Randall B., Apparatus and method for remotely executing commands using distributed computing environment remote procedure calls.
  2. Ohta Kazuo (Fujisawa JPX) Okamoto Tatsuaki (Yokosuka JPX), Authentication system and apparatus therefor.
  3. Deo Vinay ; Seidensticker Robert B. ; Simon Daniel R., Authentication system and method for smart card transactions.
  4. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  5. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  6. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  7. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  8. Johnson Woodrow W. ; Atkins Christine J. ; Yoh Jon, Electronic rights management and authorization system.
  9. Griswold Gary N., Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a.
  10. Guillou Louis C. (Rennes FRX) Quisquater Jean-Jacques (Brussels BEX), Method and apparatus for authenticating accreditations and for authenticating and signing messages.
  11. Fletcher Rick ; Lin Pei-Chen, Method and apparatus for automatically updating software components on end systems over a network.
  12. Helbig ; Sr. Walter A, Method and apparatus for enhancing computer system security.
  13. Hsu Jerry,TWX ; Shen Sidney,TWX, Method and apparatus to protect computer software.
  14. Hennige Hartmut (23 Packman Lane ; Home Green Kirk Ella Hull HU10 7TH N. Humberside GB3), Method and device for simplifying the use of a plurality of credit cards, or the like.
  15. Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
  16. Asai Toshinori,JPX, Program operating apparatus.
  17. Horstmann Cay S., Relicensing of electronically purchased software.
  18. Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
  19. Davis Derek L. (Phoenix AZ), Roving software license for a hardware agent.
  20. McMullan ; Jr. Jay C. (Doraville GA) Burleson David B. (Roswell GA) Borsetti ; Jr. Paul (Alpharetta GA) Filion John T. (Lawrenceville GA), Secure authorization and control method and apparatus for a game delivery service.
  21. Grimonprez Georges (Villeneuve d\Asq FRX) Paradinas Pierre (Villeneuve d\Asq FRX), Secured method for loading a plurality of applications into a microprocessor memory card.
  22. Mandelbaum Richard (Manalapan NJ) Sherman Stephen A. (Hackettstown NJ) Wetherington Diane R. (Bernardsville NJ), Smartcard adapted for a plurality of service providers and for remote installation of same.
  23. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  24. Hasebe Takayuki,JPX ; Akiyama Ryota,JPX ; Yoshioka Makoto,JPX, Storage medium for preventing an irregular use by a third party.
  25. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  26. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  27. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  28. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  29. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  30. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  31. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  32. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  33. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  34. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  35. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  36. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.

이 특허를 인용한 특허 (511)

  1. Hamlin, Christopher, 3-prong security/reliability/real-time distributed architecture of information handling system.
  2. Hamlin, Christopher L., 3-prong security/reliability/real-time distributed architecture of information handling system.
  3. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  4. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  5. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  6. Proudler,Graeme John; Balacheff,Boris; Plaquin,David, Apparatus and method for creating a trusted environment.
  7. Proudler,Graeme John; Balacheff,Boris; Worley,John S.; Hyser,Chris D.; Worley, Jr.,William S, Apparatus and method for creating a trusted environment.
  8. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  9. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  10. Brickell, Ernest F., Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information.
  11. Brickell,Ernest F., Apparatus and method for proving the denial of a direct proof signature.
  12. Kozuch,Michael A.; Sutton, II,James A.; Grawrock,David; Neiger,Gilbert; Uhlig,Richard A.; Burgess,Bradley G.; Poisner,David I.; Hall,Clifford D.; Glew,Andy; Smith, III,Lawrence O.; George,Robert, Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment.
  13. Kamada,Jun; Kotani,Seigo; Ono,Etsuo; Hatanaka,Massayuki; Yoshida,Masatoshi; Nakai,Takahiro, Apparatus, a system and method for controlling access to contents.
  14. Nadarajah, Dinesh, Application services coordinated satellite multicast content delivery.
  15. Murase, Masana; Plouffe, Jr., Wilfred E.; Shimizu, Kanna; Zbarsky, Vladimir, Application-specific secret generation.
  16. Glaum, Jeffery D.; Shell, Scott R.; Rogers, Andrew M.; Markley, Michael E.; Patel, Sachin C.; Tonkelowitz, Mark Scott; Plagge, Mark, Applying custom software image updates to non-volatile storage in a failsafe manner.
  17. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Attestation key memory device and bus.
  18. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Attestation key memory device and bus.
  19. Grawrock,David W., Attestation using both fixed token and portable token.
  20. Glew,Andrew F.; Sutton,James A.; Smith,Lawrence O.; Grawrock,David W.; Neiger,Gilbert; Kozuch,Michael A., Authenticated code module.
  21. Levin, Douglas Andrew; Shah, Ashesh C.; Pedersen, Palle Martin, Authenticating licenses for legally-protectable content based on license profiles and content identifiers.
  22. Etchegoyen, Craig S., Authentication of computing and communications hardware.
  23. Fosback, Jason Robert; Cortes, Ricardo D.; Muller, Max, Automatic transport discovery for media submission.
  24. Peinado, Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  25. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  26. Peinado, Marcus, Binding a digital license to a portable or the like in a digital rights management (DMR) system and checking out/checking in the digital license to/from the portable device or the like.
  27. Robert, Arnaud; Alkove, James M.; Knowlton, Chadd B., Binding content to a domain.
  28. Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding content to a portable storage device or the like in a digital rights management (DRM) system.
  29. Robert, Arnaud; Alkove, James M.; Hofmeyr, Jan M., Binding content to an entity.
  30. Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding digital content to a portable storage device or the like in a digital rights management (DRM) system.
  31. Hug,Joshua D.; Fu,Xiaodong, Certificate based digital rights management.
  32. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  33. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  34. Saremi, Thomas Jefferson, Client device with application state tracking and methods for use therewith.
  35. Proudler,Graeme John; Chan,David, Communications between modules of a computing apparatus.
  36. De Atley, Dallas Blake; de Cesare, Joshua; Smith, Michael; Hauck, Jerry; Bush, Jeffrey, Compatible trust in a computing device.
  37. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  38. Gordon, Bryson P.; Ekle, Thor Ivar, Comprehensive anti-spam system, method, and computer program product for filtering unwanted e-mail messages.
  39. Pearson,Siani Lynne; Chan,David, Computer platforms and their methods of operation.
  40. Gulick,Dale E.; Strongin,Geoffrey S.; Hughes,William A., Computer system employing a trusted execution environment including a memory controller configured to clear memory.
  41. McGrath, Kevin J.; Strongin, Geoffrey S.; Gulick, Dale E.; Hughes, William A.; Christie, David S., Computer system including a secure execution mode-capable CPU and a security services processor connected via a secure communication path.
  42. Griffin,Jonathan, Computer system operable to revert to a trusted state.
  43. Tseng, Yaudeh; Chiou, Shin-Yan, Computerized apparatus and method for version control and management.
  44. Wei, Yusong, Computerized system and method for implementing digital rights management.
  45. Chen,Liqun; Lo,Hoi Kwong; Chan,David, Computing apparatus and methods using secure authentication arrangements.
  46. Grawrock,David W., Connecting a virtual token to a physical token.
  47. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Content rendering apparatus.
  48. Stefik,Mark J., Content rendering device with usage rights.
  49. Stefik, Mark J.; Pirolli, Peter L., Content rendering repository.
  50. Stefik,Mark J.; Pirolli,Peter L., Content rendering repository.
  51. Bennett,Steve; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Zou,Xiang; Kozuch,Michael A., Control over faults occurring during the operation of guest software in the virtual-machine architecture.
  52. Bennett,Steve; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael A., Control register access virtualization performance improvement in the virtual-machine architecture.
  53. Christie,David S.; McGrath,Kevin J., Controlling access to a control register of a microprocessor.
  54. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple memory zones in an isolated execution environment.
  55. Shoda,Yukie; Kozuka,Masayuki; Tokuda,Katsumi; Hirata,Noboru, Copyrighted data processing method and apparatus.
  56. Glaum, Jeffrey D.; Rogers, Andrew M.; Tonkelowitz, Mark Scott, Creating file systems within a file in a storage technology-abstracted manner.
  57. Grawrock,David W., Creation and distribution of a secret value between two devices.
  58. Plouffe, Jr., Wilfred E.; Shimizu, Kanna, Cryptographically-enabled privileged mode execution.
  59. Tsuji, Sadafusa; Kondo, Takashi; Hotomi, Hideo; Hayami, Isao; Nanba, Katsuyuki, Data distributing system and data recording method.
  60. Proudler,Graeme John; Balacheff,Boris; Pearson,Siani Lynne; Chan,David, Data event logging in computing platform.
  61. Proudler,Graeme John; Balacheff,Boris, Data integrity monitoring in trusted computing entity.
  62. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  63. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  64. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  65. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  66. MacKay, Michael K.; Sibert, W. Olin; Landsman, Richard A.; Swenson, Eric J.; Hunt, William, Data protection systems and methods.
  67. MacKay,Michael K.; Sibert,W. Olin; Landsman,Richard A.; Swenson,Eric J.; Hunt,William, Data protection systems and methods.
  68. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Demarcated digital content and method for creating and processing demarcated digital works.
  69. Dalton, Christopher I., Demonstrating integrity of a compartment of a compartmented operating system.
  70. Levy, Kenneth L.; Meyer, Joel R., Deriving multiple fingerprints from audio or video content.
  71. Markley, Michael E.; Shell, Scott R.; Glaum, Jeffrey D., Determining a maximal set of dependent software updates valid for installation.
  72. Etchegoyen, Craig S.; Harjanto, Dono; Davis, Bradley C., Device and method for secured communication.
  73. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  74. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  75. Etchegoyen, Craig S.; Harjanto, Dono, Device-bound certificate authentication.
  76. Suitts, Jason Robert; Makower, David; Cortes, Ricardo D.; Muller, Max; Jimenez, Juan Carlos; Brown, Jeremy; Fosback, Jason, Digital asset validation prior to submission for network-based distribution.
  77. Okamoto,Hiroo; Owashi,Hitoaki; Yoshioka,Atsushi, Digital information recording apparatus and outputting apparatus.
  78. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  79. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  80. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  81. Wang, Xin; Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  82. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  83. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  84. Stefik,Mark J.; Pirolli,Peter L. T.; Merkle,Ralph C., Digital works having usage rights and method for creating the same.
  85. Westerinen, William J.; Carpenter, Todd L., Direct memory access for compliance checking.
  86. Smith,Ned M., Distributed control of integrity measurement using a trusted fixed token.
  87. Tagawa, Kenji; Hirota, Teruto; Matsushima, Hideki; Kozuka, Masayuki; Inoue, Mitsuhiro; Uesaka, Yasushi; Harada, Shunji; Yugawa, Taihei; Miyazaki, Masaya; Nakanishi, Masanori, Distribution system, semiconductor memory card, receiving apparatus, computer-readable recording medium and receiving method.
  88. Tagawa, Kenji; Hirota, Teruto; Matsushima, Hideki; Kozuka, Masayuki; Inoue, Mitsuhiro; Uesaka, Yasushi; Harada, Shunji; Yugawa, Taihei; Miyazaki, Masaya; Nakanishi, Masanori, Distribution system, semiconductor memory card, receiving apparatus, computer-readable recording medium and receiving method.
  89. Tagawa,Kenji; Hirota,Teruto; Matsushima,Hideki; Kozuka,Masayuki; Inoue,Mitsuhiro; Uesaka,Yasushi; Harada,Shunji; Yugawa,Taihei; Miyazaki,Masaya; Nakanishi,Masanori, Distribution system, semiconductor memory card, receiving apparatus, computer-readable recording medium and receiving method.
  90. Raley,Michael Charles, Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine.
  91. Wingert, Christopher R.; Aggarwal, Pooja, Efficient key hierarchy for delivery of multimedia content.
  92. Wingert, Christopher R.; Aggarwal, Pooja, Efficient key hierarchy for delivery of multimedia content.
  93. Chen,Liqun; Balacheff,Boris; du Toit,Roelf; Pearson,Siani Lynne; Chan,David, Electronic commerce system.
  94. Harjanto, Dono, Electronic mail sender verification.
  95. Salmonsen, Daniel R., Emulator-enabled network connectivity to a device.
  96. Salmonsen,Daniel R., Emulator-enabled network connectivity to a device.
  97. Leis,Benjamin A.; Cross,David B.; Bryce,Duncan G.; Gu,Jianrong; Nagar,Rajeev Y.; Field,Scott A., Encryption of system paging file.
  98. Oliveira, Eduardo P.; Dunbar, Geoffrey; Alkove, James M., Encryption scheme for streamed multimedia content protected by rights management system.
  99. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  100. Hata,Tadashi; Ono,Satoshi, Execution on a machine, the start of an auxiliary downloader when storage of new software memory fails during execution of a first downloader.
  101. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  102. Etchegoyen, Craig Stephen, Failover procedure for server system.
  103. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S., File checking using remote signing authority via a network.
  104. Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code from third computer process on behalf of first process.
  105. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  106. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  107. Lelikov, Andrey; Gunyakti, Caglar; Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code on behalf thereof.
  108. Brooks, Cecil Ray; Girotto, Jay Robert; Gunyakti, Caglar; Haugen, Todd, Flexible licensing architecture for licensing digital application.
  109. Brooks, Cecil Ray; Girotto, Jay Robert; Gunyakti, Caglar; Haugen, Todd, Flexible licensing architecture for licensing digital application.
  110. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Generating a key hieararchy for use in an isolated execution environment.
  111. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Generating isolated bus cycles for isolated execution.
  112. Uhlig,Richard; Anderson,Andrew V.; Bennett,Steve; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert, Handling faults associated with operation of guest software in the virtual-machine architecture.
  113. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  114. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  115. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  116. Etchegoyen, Craig Stephen, Identification of embedded system devices.
  117. Proudler, Graeme John, Identifying a trusted computing entity.
  118. Madar, Piero Andreas; Conrad, Sean Phillip, Implementation of multiple clock interfaces.
  119. Proudler, Graeme John, Information security system.
  120. Ishibashi, Yoshihito; Oishi, Tateo; Matsuyama, Shinako; Asano, Tomoyuki; Muto, Akihiro; Kitahara, Jun, Information sending system, information sending device, information receiving device, information distribution system, information receiving system, information sending method, information receiving method, information distribution method, apparatus, sending method of information receiving device, playback method of apparatus, method of using contents and program storing medium.
  121. Proudler, Graeme John; Balacheff, Boris, Information system.
  122. McGrath, Kevin J.; Strongin, Geoffrey S.; Christie, David S.; Hughes, William A.; Gulick, Dale E., Initialization of a computer system including a secure execution mode-capable processor.
  123. Richardson, Ric B., Installing protected software product using unprotected installation image.
  124. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Instance specific digital watermarks.
  125. Guarraci, Brian J., Instrumenting software for enhanced diagnosability.
  126. Guarraci,Brian J., Instrumenting software for enhanced diagnosability.
  127. Lebizay, Gerald; Gish, David W.; Oliver, Neal C., Interconnecting network processors with heterogeneous fabrics.
  128. Lebizay, Gerald; Gish, David W; Oliver, Neal C, Interconnecting network processors with heterogeneous fabrics.
  129. Cota-Robles, Eric C.; Glew, Andy; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael A.; Neiger, Gilbert; Uhlig, Richard, Invalidating translation lookaside buffer entries in a virtual machine (VM) system.
  130. Cota-Robles, Eric C.; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael A.; Neiger, Gilbert; Uhlig, Richard, Invalidating translation lookaside buffer entries in a virtual machine system.
  131. Frank, Alexander; Hall, Martin H.; Phillips, Thomas G., Isolated computing environment anchored into CPU and motherboard.
  132. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  133. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  134. Teal,Daniel M.; Teal,Richard S., Kernel-based network security infrastructure.
  135. Etchegoyen, Craig S., License auditing for distributed applications.
  136. Schlafly, Roger, License tracking system.
  137. Strom, Clifford P.; Siu, Michael Y.; Evans, Brian P., Licensing content for use on portable device.
  138. Ray, Kenneth D.; Kamat, Pankaj M.; Kaufman, Charles W.; Leach, Paul J.; Tipton, William R.; Herron, Andrew; Karamfilov, Krassimir E.; Bryce, Duncan G.; Schwartz, Jonathan D.; Setzer, Matthew C.; McDowell, John, Licensing protected content to application sets.
  139. Dillaway, Blair Brewster; LaMacchia, Brian; Manferdelli, John; Paramasivam, Muthukrishnan, Long-life digital certification for publishing long-life digital content or the like in content rights management system or the like.
  140. Yen, Andrew C.; Erlewine, Daniel D.; Malaer, Dita R.; Finke, Eric C.; Suitts, Jason R.; Kamath, Jaya; Muller, Max M, Managed assessment of submitted digital content.
  141. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  142. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  143. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  144. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  145. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing accesses in a processor for isolated execution.
  146. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  147. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  148. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  149. Kozuch,Michael; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Schoenberg,Sebastian; Uhlig,Richard, Mechanism for providing power management through virtualization.
  150. Hall, Clifford D.; Campbell, Randolph L., Mechanism for remapping post virtual machine memory pages.
  151. Strongin,Geoffrey S.; Christie,David S.; Hughes,William A.; McGrath,Kevin J., Mechanism for selectively blocking peripheral device accesses to system memory.
  152. Bennett,Steven M.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Neiger,Gilbert; Uhlig,Richard, Mechanism to control hardware interrupt acknowledgement in a virtual machine system.
  153. Fish, Andrew J., Mechanism to determine trust of out-of-band management agents.
  154. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  155. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  156. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  157. McKeen,Francis X.; Reneris,Ken; Grawrock,David W., Mechanism to secure computer output from software attack using isolated execution.
  158. Suitts, Jason Robert; Currey, Jonathan James; Muller, III, Max, Media package format for submission to a media distribution system.
  159. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for assigning consequential rights to documents and documents having such rights.
  160. Brickell, Ernest; Graunke, Gary; Stevens, William A.; Vembu, Balaji, Method and apparatus for authenticated, recoverable key distribution with no database secrets.
  161. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for automatically deploying security components in a content distribution system.
  162. Poisner,David I.; Grawrock,David W.; Sutton,James A., Method and apparatus for communicating securely with a token.
  163. Cota Robles,Erik; Chou,Stephen; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Method and apparatus for constructing host processor soft devices independent of the host processor operating system.
  164. Christie,David S.; McGrath,Kevin J.; Strongin,Geoffrey S., Method and apparatus for controlling interrupts in a secure execution mode-capable processor.
  165. McGrath,Kevin J.; Christie,David S.; Strongin,Geoffrey S., Method and apparatus for controlling operation of a secure execution mode-capable processor in system management mode.
  166. Joshi, Vikram; Tsukerman, Alex; Yamaguchi, Shari, Method and apparatus for debugging a software program.
  167. Joshi, Vikram; Tsukerman, Alex; Yamaguchi, Shari, Method and apparatus for debugging a software program using dynamic debug patches and copy on write views.
  168. Wang,Xin; Tadayon,Bijan; DeMartini,Thomas; Raley,Michael; Lao,Guillermo; Chen,Eddie; Gilliam,Charles P., Method and apparatus for distributing enforceable property rights.
  169. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  170. Pence, William E.; Langan, Dik; Healy, Cynthia; Schreiber, Geoff; Penick, Donna, Method and apparatus for dynamic renewability of content.
  171. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Gilliam, Charles P., Method and apparatus for dynamically assigning usage rights to digital works.
  172. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  173. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  174. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for establishing usage rights for digital content to be created in the future.
  175. Stefik, Mark J.; Pirolli, Peter L., Method and apparatus for executing code in accordance with usage rights.
  176. Stefik,Mark J.; Pirolli,Peter L., Method and apparatus for executing code in accordance with usage rights.
  177. Bennett, Steven M.; Anderson, Andrew V.; Cota Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  178. Bennett, Steven M.; Anderson, Andrew V.; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  179. Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T., Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  180. Wang, Xin; Nahidipour, Aram; Raley, Michael C.; Lao, Guillermo; Ta, Thanh T.; Tadayon, Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  181. Wang,Xin; Nahidipour,Aram; Raley,Michael C; Lao,Guillermo; Ta,Thanh T.; Tadayon,Bijan, Method and apparatus for hierarchical assignment of rights to documents and documents having such rights.
  182. Pearson, Siani Lynne, Method and apparatus for identifying a voice caller.
  183. Raley, Michael C; Chen, Daniel C; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  184. Siegel, Jaime A., Method and apparatus for implementing digital rights management.
  185. Siegel, Jaime A., Method and apparatus for implementing digital rights management.
  186. Forrester, Ronald James; Starnes, William Wyatt; Tycksen, Jr., Frank A., Method and apparatus for lifecycle integrity verification of virtual machines.
  187. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  188. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  189. Kozuch, Michael A.; Sutton, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  190. Lao,Guillermo; Jacobs,Rory; Nguyen,Mai; Ham,Manuel; Tieu,Vincent, Method and apparatus for managing digital content usage rights.
  191. Raley, Michael; Chen, Daniel; Wu, Hsi Cheng; Ta, Thanh, Method and apparatus for preserving customer identity in on-line transactions.
  192. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for providing a specific user interface in a system for managing content.
  193. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for repackaging portions of digital works as new digital works.
  194. Anderson, Andrew V.; Kägi, Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  195. Anderson,Andrew V.; K��gi,Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  196. Lao, Guillermo; Wang, Xin; Ta, Thanh; Fung, Joseph Zhung Yee, Method and apparatus for supporting multiple trust zones in a digital rights management system.
  197. Wang,Xin; DeMartini,Thomas; Chen,Eddie J.; Gilliam,Charles P.; Ham,Manuel; Lao,Guillermo; Raley,Michael C.; Ta,Thanh; Tadayon,Bijan, Method and apparatus for tracking status of resource in a system for managing use of the resources.
  198. Tadayon,Bijan; Nahidipour,Aram; Wang,Xin; Raley,Michael C; Lao,Guillermo; Ta,Thanh T; Gilliam,Charles P, Method and apparatus for transferring usage rights and digital work having transferrable usage rights.
  199. Chen, Liqun; Proudler, Graeme John, Method and apparatus for using a secret in a distributed computing system.
  200. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  201. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for variable encryption of data.
  202. Oxford, William V., Method and system for a recursive security protocol for digital copyright control.
  203. Oxford, William V., Method and system for a recursive security protocol for digital copyright control.
  204. Oxford, William V., Method and system for a recursive security protocol for digital copyright control.
  205. Oxford,William V., Method and system for a recursive security protocol for digital copyright control.
  206. Oxford,William V., Method and system for a recursive security protocol for digital copyright control.
  207. Lao, Guillermo; Brenner, Jr., Ralph H.; Chen, Daniel C.; Nahidipour, Aram; Valenzuela, Edgardo; Berchowitz, Mark; Chen, Ivy Y.; Wang, Xin, Method and system for automatically publishing content.
  208. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  209. Stefik,Mark J.; Pirolli,Peter L. T., Method and system for conducting transactions between repositories using a repository transaction protocol.
  210. Oxford, William V., Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol.
  211. Oxford, William V., Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol.
  212. Oxford, William V., Method and system for process working set isolation.
  213. Briceno,Marc A., Method and system for protecting software.
  214. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set.
  215. Kondrk, Robert H.; Martin, Timothy Benjamin; Robbin, Jeffrey L.; Heller, David; Wiese, Mike, Method and system for submitting media for network-based purchase and distribution.
  216. Lao, Guillermo, Method and system for subscription digital rights management.
  217. Lao, Guillermo, Method and system for subscription digital rights management.
  218. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  219. Bajikar, Sundeep M., Method and system to provide a trusted channel within a computer system for a SIM device.
  220. Stefik,Mark J.; Pirolli,Peter L. T., Method for controlling use of database content.
  221. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  222. Stefik,Mark J.; Pirolli,Peter L. T., Method for loaning digital works.
  223. Bullock, Roddy McKee, Method for making money on internet news sites and blogs.
  224. Stefik,Mark J.; Pirolli,Peter L. T., Method for metering and pricing of digital works.
  225. Lee, Seung-Jae, Method for moving rights object and method for managing rights of issuing rights object and system thereof.
  226. Stefik, Mark J.; Pirolli, Peter L. T., Method for printing digital works.
  227. Dotan, Eyal, Method for protecting computer programs and data from hostile code.
  228. Dotan, Eyal, Method for protecting computer programs and data from hostile code.
  229. Dotan, Eyal, Method for protecting computer programs and data from hostile code.
  230. Dotan, Eyal, Method for protecting computer programs and data from hostile code.
  231. Dotan, Eyal, Method for protecting computer programs and data from hostile code.
  232. Hannsmann, Uwe; Stober, Thomas; Jennings, James Scott, Method for providing of content data to a client.
  233. Kuhls, Burkhard, Method for providing software to be used by a control unit of a vehicle.
  234. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jevasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  235. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  236. Ekberg, Jan-Erik; Rantala, Aarne, Method for secure program code execution in an electronic device.
  237. Christie,David S.; Strongin,Geoffrey S.; McGrath,Kevin J., Method for selectively disabling interrupts on a secure execution mode-capable processor.
  238. Koo, Han Seung; Kwon, O Hyung; Lee, Soo In, Method for subscribing service and distributing encryption key based on public-key encryption algorithm in digital CATV system.
  239. Ekberg, Jan-Erik; Paatero, Lauri, Method for the secure storing of program state data in an electronic device.
  240. Vataja,Timo, Method for utilizing intelligent clock controller in digital rights management.
  241. Pearson, Siani Lynne; Proudler, Graeme John, Method of and apparatus for ascertaining the status of a data processing environment.
  242. Hardison, III, Joseph H., Method of and system for capturing interest earned on the monetary value of transferred monetary rights managed on an internet-based monetary rights transfer (MRT) network supported by a real-time gross settlement (RTGS) system.
  243. Brickell,Ernie F., Method of confirming a secure key exchange.
  244. Christie,David S.; Strongin,Geoffrey S.; McGrath,Kevin J., Method of controlling access to an address translation data structure of a computer system.
  245. Christie,David S.; McGrath,Kevin J., Method of controlling access to control registers of a microprocessor.
  246. McGrath,Kevin J., Method of controlling access to model specific registers of a microprocessor.
  247. Rothrock,Lewis V., Method of defending software from debugger attacks.
  248. Lao,Guillermo; Brenner, Jr.,Ralph H; Chen,Daniel C; Nahidipour,Aram; Valenzuela,Edgardo; Berchowitz,Mark; Chen,Ivy Y; Wang,Xin, Method, system, and computer readable medium for automatically publishing content.
  249. Pedersen, Palle Martin; Golombek, David; Levin, Douglas A.; Smith, John J., Methods and apparatus for automated export compliance.
  250. Moran,Douglas R.; Hall,Clifford D.; Piazza,Thomas A.; Jensen,Richard W., Methods and arrangements to interface memory.
  251. Pedersen, Palle Martin, Methods and systems for identifying an area of interest in protectable content.
  252. Pedersen, Palle M., Methods and systems for managing software development.
  253. Pedersen, Palle Martin, Methods and systems for reporting regions of interest in content files.
  254. Dideriksen, Tedd; Feller, Chris; Harris, Geoffrey Howard; Novak, Michael J.; Olson, Kipley J., Methods and systems for synchronizing visualizations with audio streams.
  255. Dideriksen, Tedd; Feller, Chris; Harris, Geoffrey Howard; Novak, Michael J.; Olson, Kipley J., Methods and systems for synchronizing visualizations with audio streams.
  256. Dideriksen, Tedd; Feller, Chris; Harris, Geoffrey Howard; Novak, Michael J.; Olson, Kipley J., Methods and systems for synchronizing visualizations with audio streams.
  257. Dideriksen, Tedd; Feller, Chris; Harris, Geoffrey; Novak, Michael J.; Olson, Kipley J., Methods and systems for synchronizing visualizations with audio streams.
  258. Dideriksen,Tedd; Feller,Chris; Harris,Geoffrey; Novak,Michael J.; Olson,Kipley J., Methods and systems for synchronizing visualizations with audio streams.
  259. Proudler, Graeme John; Burton, William; Kuhlmann, Dirk; Plaquin, David, Methods, devices and data structures for trusted data.
  260. Proudler, Graeme John; Burton, William; Kuhlmann, Dirk; Plaquin, David, Methods, devices and data structures for trusted data.
  261. Dideriksen,Tedd; Feller,Chris; Harris,Geoffrey; Novak,Michael J.; Olson,Kipley J., Methods, system and media players for rendering different media types.
  262. Dideriksen,Tedd; Feller,Chris; Harris,Geoffrey; Novak,Michael J.; Olson,Kipley J., Methods, systems and media players for rendering different media types.
  263. Feller, Chris; Harris, Geoffrey; Olson, Kipley J.; Novak, Michael J.; Dideriksen, Tedd K, Methods, systems and media players for rendering different media types.
  264. Hind,John R.; Peters,Marcia L., Methods, systems, and computer program products for securely transforming an audio stream to encoded text.
  265. Wadycki, Andrew M.; Sharma, Ashish; Walker, Michael H.; Cortes, Ricardo D.; Sahuc, Sebastien P.; Pirnack, Tracy L., Migration of feedback data to equivalent digital assets.
  266. Wadycki, Andrew M.; Sharma, Ashish; Walker, Michael H.; Cortes, Ricardo D.; Sahuc, Sebastien P.; Pirnack, Tracy L., Migration of feedback data to equivalent digital assets.
  267. Etchegoyen, Craig S., Modular software protection.
  268. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  269. Wang, Xin; Okamoto, Steve Atsushi; Lear, Russell Robert; Ishigo, Nancy Lynn, Multi-stage watermarking process and system.
  270. Wang,Xin; Okamoto,Steve Atsushi; Lear,Russell Robert; Ishigo,Nancy Lynn, Multi-stage watermarking process and system.
  271. Grawrock,David W., Multi-token seal and unseal.
  272. Sellars,William; Cochran, Jr.,William K.; Hunt,David C., Multiple party content distribution system and method with rights management features.
  273. Griffin, Jonathan; Dalton, Christopher I.; Child, Michael; Chen, Liqun; Norman, Andrew Patrick, Multiple trusted computing environments.
  274. Griffin,Jonathan; Chen,Liqun, Multiple trusted computing environments with verifiable environment identities.
  275. Terada,Kosei, Musical-score-generating information processing apparatus and method.
  276. Etchegoyen, Craig S., Network access protection.
  277. Gautier, Patrice; Muller, Max; Burkholder, Thomas; Robbin, Jeffrey L.; Heller, Dave; Dowdy, Thomas; Wiese, Mike, Network based purchase and distribution of media.
  278. Linden,Mikael; Immonen,Olli; Lukkaroinen,Mikko; Cofta,Piotr, Network element and method for controlling access to low level computer system services.
  279. Salmonsen, Daniel R., Network interface to a video device.
  280. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Operating system upgrades in a trusted operating system environment.
  281. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  282. Proudler, Graeme John, Performance of a service on a computing platform.
  283. Griffin,Jonathan; Dalton,Christopher I., Performing secure and insecure computing operations in a compartmented operating system.
  284. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  285. Brickell,Ernie F., Platform and method for establishing trust without revealing identity.
  286. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for generating and utilizing a protected audit log.
  287. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for issuing and certifying a hardware-protected attestation key.
  288. Herbert,Howard C.; Grawrock,David W.; Ellison,Carl M.; Golliver,Roger A.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for remote attestation of a platform.
  289. Grawrock,David W., Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations.
  290. Evans, Brian P.; Strom, Clifford P.; Dunbar, Geoffrey; Prologo, Richard D., Playlist burning in rights-management context.
  291. Richardson, Ric B., Post-production preparation of an unprotected installation image for downloading as a protected software product.
  292. Steinberg, Kenneth D, Pre-emptive anti-virus protection of computing systems.
  293. Speare,John Gerard; Davis,Malcolm H.; Waxman,Peter D.; DeMello,Marco A.; Graham,Christopher F.; Cahill,Jason M., Pre-licensing of rights management protected content.
  294. Moran, Douglas R.; Acharya, Satish; Bogin, Zohar; Galloway, Sean G., Prioritized address decoder.
  295. Muller, Max; Cortes, Ricardo, Processing of metadata content and digital content received by a media distribution system.
  296. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard, Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor.
  297. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  298. Poisner, David I., Protected configuration space in a protected environment.
  299. Poisner,David I., Protected configuration space in a protected environment.
  300. Reddy, Karimireddy Hari; Lao, Guillermo; Budo-Marek, Andrej, Protected content distribution system.
  301. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  302. Silverstone, Ariel, Protecting computing devices from unauthorized access.
  303. Oliveira, Eduardo P.; Klemets, Anders E.; Bhatt, Sanjay; Paka, Anand; Alkove, James M., Protecting digital media of various content types.
  304. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Protecting software environment in isolated execution.
  305. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Protecting software environment in isolated execution.
  306. Dillaway, Blair B., Protection of application secrets.
  307. Chen,Liqun; Chan,David, Protection of the configuration of modules in computing apparatus.
  308. Ogilvie, John W., Providing notice of patent and other legal rights.
  309. Ogilvie, John W., Providing notice of patent and other legal rights.
  310. Ogilvie,John W. L., Providing notice of patent rights.
  311. Bennett,Steven M.; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K��gi,Alain; Neiger,Gilbert; Uhlig,Richard; Mondal,Sanjoy K.; Brandt,Jason, Providing support for single stepping a virtual machine in a virtual machine environment.
  312. Molaro, Donald Joseph, Real-time delivery of license for previously stored encrypted content.
  313. Cota Robles,Erik C.; Flautner,Krisztian, Real-time scheduling of virtual machines.
  314. Uhlig,Richard; Neiger,Gilbert; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Bennett,Steven M, Reclaiming existing fields in address translation data structures to extend control over memory accesses.
  315. Pedersen, Palle M, Region based information retrieval system.
  316. Etchegoyen, Craig Stephen, Remote update of computers based on physical device recognition.
  317. Stefik, Mark J.; Pirolli, Peter L. T., Removable content repositories.
  318. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  319. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  320. Stefik, Mark J.; Pirolli, Peter L. T., Repository with security class and method for use thereof.
  321. Stefik,Mark J.; Pirolli,Peter L. T., Repository with security class and method for use thereof.
  322. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind; Reneris, Ken, Resetting a processor in an isolated execution environment.
  323. Levin, Douglas Andrew; Pedersen, Palle Martin; Shah, Ashesh C., Resolving license dependencies for aggregations of legally-protectable content.
  324. Riedy, Dale F.; Sofia, Anthony T.; Stilwell, Brad D., Resource management for untrusted programs.
  325. Davis,Malcolm H.; Waxman,Peter D.; Speare,John Gerard; Williams,Roy, Rights management inter-entity message policies and enforcement.
  326. Davis,Malcolm H.; Waxman,Peter D.; Speare,John Gerard; Williams,Roy, Rights management inter-entity message policies and enforcement.
  327. Evans, Brian P.; Strom, Clifford P.; Rosenstein, Daniel, Rights management system for streamed multimedia content.
  328. Evans, Brian P.; Strom, Clifford P.; Rosenstein, Daniel; Paka, Anand D.; Fang, Nicholas J.; Oliveria, Eduardo, Rights management system for streamed multimedia content.
  329. Van Dyke, Clifford P.; Cheng, David J.; Mohan, Siva, Rights management system for streamed multimedia content.
  330. Wang, Xin; Tadayon, Bijan, Rights offering and granting.
  331. McDermott,John P., Secure attention instruction central processing unit and system architecture.
  332. Smith, Michael; de Cesare, Joshua; De Atley, Dallas Blake; Wright, John Andrew, Secure booting a computing device.
  333. Smith, Michael; de Cesare, Joshua; De Atley, Dallas Blake; Wright, John Andrew, Secure booting a computing device.
  334. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  335. Cochran,William; Gustman,Samuel M.; Sellars,William R., Secure communication and real-time watermarking using mutating identifiers.
  336. Sellars, William; Malina, Richard; Cochran, William, Secure electronic commerce using mutating identifiers.
  337. Gatto, Jean-Marie; Brunet De Courssou, Thierry; Beney, Pierre-Jean, Secure game download.
  338. Gatto, Jean-Marie; Brunet De Courssou, Thierry; Beney, Pierre-Jean, Secure game download.
  339. Doyle, Ronald P.; Hind, John R.; Peters, Marcia L., Secure integrated device with secure, dynamically-selectable capabilities.
  340. Freeman,Joseph Wayne; Gettelfinger,Chad Lee; Goodman,Steven Dale; Keown, Jr.,William Fred; Kern,Eric Richard; Springfield,Randall Scott, Secure method for system attribute modification.
  341. Murase, Masana; Sakamoto, Masaharu; Shimizu, Kanna; Zbarsky, Vladimir, Secure policy differentiation by secure kernel design.
  342. Aingaran, Kathirgamar; Kohn, Leslie D.; Kunz, Robert C.; Tsai, Jenn-Yuan, Secure virtual access for real-time embedded devices.
  343. Aingaran, Kathirgamar; Kohn, Leslie D.; Kunz, Robert C.; Tsai, Jenn-Yuan, Secure virtual access for real-time embedded devices.
  344. De Atley, Dallas Blake; De Cesare, Joshua; Smith, Michael; Reda, Matthew; Sen, Shantonu; Wright, John Andrew, Securely recovering a computing device.
  345. De Atley, Dallas Blake; De Cesare, Joshua; Smith, Michael; Reda, Matthew; Sen, Shantonu; Wright, John Andrew, Securely recovering a computing device.
  346. De Atley, Dallas Blake; de Cesare, Joshua; Smith, Michael; Reda, Matthew; Sen, Shantonu; Wright, John Andrew, Securely recovering a computing device.
  347. De Atley, Dallas; de Cesare, Joshua; Smith, Michael; Reda, Matthew; Sen, Shantonu; Wright, John Andrew, Securely recovering a computing device.
  348. Eliott, Scott, Security system for video game system with hard disk drive and internet access capability.
  349. Elliott, Scott, Security system for video game system with hard disk drive and internet access capability.
  350. Scott Eliott, Security system for video game system with hard disk drive and internet access capability.
  351. Burkhardt, Ryan; Jhanwar, Raj; Jayaseelan, Vijayachandran; Cohen, Jason, Selectively authorizing software functionality after installation of the software.
  352. Burkhardt,Ryan; Jhanwar,Raj; Jayaseelan,Vijayachandran; Cohen,Jason, Selectively authorizing software functionality after installation of the software.
  353. Novak, Mark F.; Thom, Stefan; Tor, Yair; Efron, Alexey; Ortal, Amos, Self regulation of the subject of attestation.
  354. Cross, Brian D.; Markley, Michael E.; McNeill, Lorna Rebecca; Glaum, Jeffrey D.; Shell, Scott R., Self-describing software image update components.
  355. Tarkkala, Lauri, Simple scalable and configurable secure boot for trusted mobile phones.
  356. de Cesare, Joshua; De Atley, Dallas Blake; Andrews, Jonathan Jay; Smith, Michael John, Single security model in booting a computing device.
  357. Grawrock,David W.; Poisner,David I., Sleep protection.
  358. Peinado, Marcus; England, Paul; Manferdelli, John L., Software application protection by way of a digital rights management (DRM) system.
  359. Kyle,Jonathan; Bakar,Majd; Affaki,John, Software installation and configuration with specific role for target computer and identity indicator for authorization for performance of features.
  360. Bahar, Reuben, Software piracy prevention through remote enforcement of an activation threshold.
  361. Etchegoyen, Craig S., Software signature tracking.
  362. Frank, Alexander; Steeb, Curt A.; Ahdout, Isaac P.; Duffus, James S.; Hall, Martin; Temple, Nicholas; Venkatachalam, Rajagopal; Phillips, Thomas; Xu, Zhangwei, Special PC mode entered upon detection of undesired state.
  363. Cortes, Ricardo; Muller, Max, Submission of metadata content and media content to a media distribution system.
  364. Liu, Yeu; Pandya, Ravi; Ivanov, Lazar; Paramasivam, Muthukrishnan; Gunyakti, Caglar; Gui, Dongmei; Hsu, Scott W. P., Supplementary trust model for software licensing/commercial digital distribution policy.
  365. Neiger,Gilbert; Anderson,Andrew V.; Bennett,Steven M.; Brandt,Jason; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K채gi,Alain; Mondal,Sanjoy K.; Parthasarathy,Rajesh; Rodgers,Dion; Smith,Lawrence O.; Uhlig,Richard A., Support for nested fault in a virtual machine environment.
  366. Agrawal, Sunil; Poling, Matthew J., System and method for a single request and single response authentication protocol.
  367. Richardson, Ric B., System and method for adjustable licensing of digital products.
  368. Cota Robles,Erik C.; Campbell,Randolph L.; Hall,Clifford D.; Neiger,Gilbert; Uhlig,Richard A., System and method for binding virtual machines to hardware contexts.
  369. Etchegoyen, Craig Stephen, System and method for content delivery.
  370. Neiger, Gilbert; Bennett, Steven M.; Cota-Robles, Erik; Schoenberg, Sebastian; Hall, Clifford D.; Rodgers, Dion; Smith, Lawrence O.; Anderson, Andrew V.; Uhlig, Richard A.; Kozuch, Michael; Glew, Andy, System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time.
  371. Lockhart, Malcolm W.; Grimes, D. Gordon; Sharma, Ranjiv K.; Musselwhite, Neal A., System and method for data rights management.
  372. Lockhart,Malcolm W.; Grimes,D. Gordon; Sharma,Ranjiv K.; Musselwhite,Neal A., System and method for data rights management.
  373. Raciborski, Bohdan, System and method for delivery of a modular operating system.
  374. Etchegoyen, Craig S., System and method for device authentication with built-in tolerance.
  375. Richardson, Ric B.; Etchegoyen, Craig S.; Harjanto, Dono; Davis, Bradley C., System and method for device bound public key infrastructure.
  376. Nimon, Robert E.; Nimon, Kimmy F.; Espenlaub, David E., System and method for digital rights management of digital media.
  377. Nimon, Robert E.; Nimon, Kimmy F.; Espenlaub, David E., System and method for digital rights management of digital media.
  378. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, System and method for digital rights management using a standard rendering engine.
  379. Wang,Xin, System and method for document distribution.
  380. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  381. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  382. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  383. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  384. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  385. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  386. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  387. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  388. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  389. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  390. Sutton, II,James A.; Grawrock,David W., System and method for execution of a secured environment initialization instruction.
  391. Sutton, James A; Grawrock, David W, System and method for execution of a secured environment initialization instruction.
  392. Narin, Attila, System and method for integrating secure and non-secure software objects.
  393. Narin,Attila, System and method for integrating secure and non-secure software objects.
  394. Etchegoyen, Craig Stephen, System and method for locating network nodes.
  395. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  396. Nguyen, Mai; Wang, Xin; Ta, Thanh; Lao, Guillermo; Chen, Eddie J., System and method for managing transfer of rights using shared state variables.
  397. Darweesh, Michael; Ureche, Tony; Marr, Michael David, System and method for manifest generation.
  398. Etchegoyen, Craig Stephen, System and method for preventing multiple online purchases.
  399. Willman, Bryan Mark; England, Paul; Ray, Kenneth D.; Hunter, Jamie; McMichael, Lonnie Dean; LaSalle, Derek Norman; Jacomet, Pierre; Paley, Mark Eliot; Kurien, Thekkthalackal Varugis; Cross, David B., System and method for protected operating system boot using state validation.
  400. Wang, Xin, System and method for protecting data files by periodically refreshing a decryption key.
  401. Ta,Thanh T.; Ram,Prasad; Schuler,Robert E.; Ramanujapuram,Arun; Lao,Guillermo; Wang,Xin, System and method for protection of digital works.
  402. Wang, Xin, System and method for protection of digital works.
  403. Lahteenmaki, Mika; Heikkinen, Timo, System and method for providing an extended platform for an operating system.
  404. Salmonsen,Daniel R.; Herz,William S., System and method for providing network connectivity to a common embedded interface by stimulating the embedded interface.
  405. Jogand-Coulomb, Fabrice; Qawami, Bahman; Sabet-Sharghi, Farshid, System and method for receiving digital content.
  406. Grawrock,David W.; Sutton, II,James A., System and method for resetting a platform configuration register.
  407. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  408. Etchegoyen, Craig Stephen, System and method for secured mobile communication.
  409. Lieberman, Bruce L.; Davis, Jeffrey A.; Steiner, Alan R., System and method for securely booting from a network.
  410. Etchegoyen, Craig Stephen, System and method for securing an electronic communication.
  411. Gilliam, Charles; Wang, Xin, System and method for supplying and managing usage rights associated with an item repository.
  412. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  413. Etchegoyen, Craig S., System and method for tracking and scoring user activities.
  414. Etchegoyen, Craig Stephen, System and method for traffic information delivery.
  415. Wang,Xin, System and method for transferring the right to decode messages.
  416. Wang, Xin; Ta, Thanh T., System and method for transferring the right to decode messages in a symmetric encoding scheme.
  417. Brown, John R.; Perret-Gentil, John Irwin, System and method for validating components during a booting process.
  418. Brown, John R.; Perret-Gentil, John Irwin, System and method for validating components during a booting process.
  419. Ghose, Kanad, System and method for validating program execution at run-time using control flow signatures.
  420. Yablokov, Victor V.; Filatov, Konstantin M.; Eliseev, Evgeny Y.; Unuchek, Roman S., System and method of limiting the operation of trusted applications in presence of suspicious programs.
  421. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use digital works using digital tickets.
  422. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  423. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works.
  424. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works.
  425. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  426. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  427. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  428. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  429. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  430. Stefik,Mark J; Pirolli,Peter L, System for controlling the distribution and use of digital works using secure components.
  431. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  432. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  433. Stefik,Mark J.; Petrie,Glen W.; Okamoto,Steve A.; Briggs,Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  434. Stefik,Mark J.; Pirolli,Peter L. T., System for controlling the use of digital works using removable content repositories.
  435. Hardison, III, Joseph H., System for implementing a security issuer rights management process over a distributed communications network deployed in a financial marketplace.
  436. Hardison, III, Joseph H., System for implementing a security issuer rights management process over a distributed communications network, deployed in a financial marketplace.
  437. Proudler,Graeme John; Balacheff,Boris; Chen,Liqun; Chan,David, System for providing a trustworthy user interface.
  438. Richardson, Ric B., System of dependant keys across multiple pieces of related scrambled information.
  439. Cha, Inhyok; Guccione, Louis J.; Shah, Yogendra C.; Schmidt, Andreas U.; Pattar, Sudhir B., System of multiple domains and domain ownership.
  440. Suzuki, Noriyuki; Uenishi, Akihiro; Kuriyama, Yukihisa; Niwa, Toshiyuki, System, arrangement and method for providing numerical analysis data, and numerical analysis data utilization device.
  441. Harrington,Bradley Ryan; Locke,Kevin Brian, System, method, and computer program product for prohibiting unauthorized access to protected memory regions.
  442. Odom, Wayne; Gee, Karolyn, System, method, and device for communicating and storing and delivering data.
  443. Odom, Wayne; Gee, Karolyn, System, method, and device for delivering communications and storing and delivering data.
  444. Odom, Wayne; Gee, Karolyn, System, method, and device for delivering communications and storing and delivering data.
  445. Odom, Wayne; Gee, Karolyn, System, method, and device for storing and delivering data.
  446. Etchegoyen, Craig Stephen, Systems and methods for auditing software usage using a covert key.
  447. Hunter,Jamie; England,Paul; Humphries,Russell; Thom,Stefan; Schwartz, Jr.,James Anthony; Ray,Kenneth D.; Schwartz,Jonathan, Systems and methods for boot recovery in a secure boot process on a computer with a hardware security module.
  448. Hunter, Jamie; England, Paul; Humphries, Russell; Thom, Stefan; Schwartz, Jr., James Anthony; Ray, Kenneth D.; Schwartz, Jonathan, Systems and methods for controlling access to data on a computer with a secure boot process.
  449. Yodaiken, Victor J., Systems and methods for detecting a security breach in a computer system.
  450. Yodaiken, Victor J., Systems and methods for detecting a security breach in a computer system.
  451. Yodaiken, Victor J., Systems and methods for detecting a security breach in a computer system.
  452. Yodaiken, Victor J., Systems and methods for detecting a security breach in a computer system.
  453. Etchegoyen, Craig S., Systems and methods for game activation.
  454. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  455. LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  456. LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
  457. Levine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  458. Tempel, Mark; Ivanoff, Alex, Systems and methods for providing a self-maintaining PKI infrastructure among loosely connected entities.
  459. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  460. Hunter, Jamie; England, Paul; Humphries, Russell; Thom, Stefan; Schwartz, Jr., James Anthony; Ray, Kenneth D; Schwartz, Jonathan, Systems and methods for securely booting a computer with a trusted processing module.
  461. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  462. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  463. Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  464. Hunter, Jamie; England, Paul; Humphries, Russell; Thom, Stefan; Schwartz, Jr., James Anthony; Ray, Kenneth D.; Schwartz, Jonathan, Systems and methods for updating a secure boot process on a computer with a hardware security module.
  465. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  466. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  467. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  468. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  469. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  470. Levy, Kenneth L.; Meyer, Joel R.; Andrews, III, Hoyet Harrison, Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities.
  471. Hind,John R.; Peters,Marcia L., Technique for digitally notarizing a collection of data streams.
  472. Hind, John R.; Peters, Marcia L., Technique for establishing provable chain of evidence.
  473. Miller,Wesley G., Three way validation and authentication of boot files transmitted from server to client.
  474. Bennett, Steven M.; Neiger, Gilbert; Anderson, Andrew V., Timer offsetting mechanism in a virtual machine environment.
  475. Cota Robles,Erik; Schoenberg,Sebastian; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor.
  476. Salmonsen,Daniel R.; Cerchio,Gerard J., Transcoding media system.
  477. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  478. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  479. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Transferring application secrets in a trusted operating system environment.
  480. Dubhashi, Kedarnath A; Barde, Sumedh N; Farag, Hany, Translating DRM system requirements.
  481. Brown,Richard; Pearson,Siani Lynne; Dalton,Christopher I., Trusted computing environment.
  482. Proudler,Graeme John; Gupta,Dipankar; Chen,Liqun; Pearson,Siani Lynne; Balacheff,Boris; Van Wilder,Bruno Edgard; Chan,David, Trusted computing platform.
  483. Pearson, Siani Lynne; Chen, Liqun, Trusted computing platform for restricting use of data.
  484. Proudler,Graeme John; Gupta,Dipankar; Chen,Liqun; Pearson,Siani Lynne; Balacheff,Boris; Van Wilder,Bruno Edgard; Chan,David, Trusted computing platform using a trusted device assembly.
  485. Pearson, Siani, Trusted identities on a trusted computing platform.
  486. Grawrock, David, Trusted platform module for generating sealed data.
  487. Poisner,David I., Trusted system clock.
  488. Donovan, Robert J.; Lindsay, Joseph C.; Nelson, Randall S.; Peterson, Christopher A.; Raknerud, Darrel W.; Schreck, Taylor L.; Trousdell, Judith; Wilson, Lee H.; Wingertsman, III, John C.; Wojtowicz, Andrew W.; Adeshiyan, Tokunbo, Trusted system network.
  489. de Cesare, Joshua; Smith, Michael; De Atley, Dallas Blake; Wright, John Andrew, Trusting an unverified code image in a computing device.
  490. de Cesare, Joshua; Smith, Michael; De Atley, Dallas Blake; Wright, John Andrew, Trusting an unverified code image in a computing device.
  491. Thirumalai, Gokul P.; Ahdout, Isaac, Tuning product policy using observed evidence of customer behavior.
  492. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  493. Plouffe, Jr., Wilfred E.; Shimizu, Kanna; Zbarsky, Vladimir, Updateable secure kernel extensions.
  494. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  495. Stefik, Mark J.; Pirolli, Peter L. T., Usage rights grammar and digital works having usage rights created with the grammar.
  496. Stefik, Mark J.; Pirolli, Peter L.T., Usage rights grammar and digital works having usage rights created with the grammar.
  497. Etchegoyen, Craig Stephen, Use of fingerprint with an on-line or networked auction.
  498. Neiger,Gilbert; Bennett,Steven M.; K��gi,Alain; Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Uhlig,Richard; Cota Robles,Erik; Rodgers,Scott; Smith,Lawrence, Use of multiple virtual machine monitors to handle privileged events.
  499. Dotan, Eyal, User transparent virtualization method for protecting computer programs and data from hostile code.
  500. Dotan, Eyal, User transparent virtualization method for protecting computer programs and data from hostile code.
  501. Levy,Kenneth L., User-friendly rights management systems and methods.
  502. Turner, William Bedford; Alsina, Thomas; Kelly, Sean B., Utilizing a secondary application to render invitational content in a separate window above an allocated space of primary content.
  503. Grawrock,David W.; Sutton, II,James A., Validation of inclusion of a platform within a data center.
  504. Bennett,Steven M.; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael; Smith,Lawrence; Rodgers,Scott, Vectoring an interrupt or exception upon resuming operation of a virtual machine.
  505. Cakulev, Violeta; Mizikovsky, Semyon B., Verification of content possession by an announcing peer in a peer-to-peer content distribution system.
  506. Cakulev, Violeta; Mizikovsky, Semyon B., Verification of integrity of peer-received content in a peer-to-peer content distribution system.
  507. Knauerhase, Robert C.; Tewari, Vijay, Virtual machine management using processor state information.
  508. Knauerhase,Robert C.; Tewari,Vijay, Virtual machine management using processor state information.
  509. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard; Schoenberg, Sebastian, Virtual translation lookaside buffer.
  510. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Virtual translation lookaside buffer.
  511. Etchegoyen, Craig S., Web content access using a client device identifier.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로