$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Copy security for portable music players

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/30
출원번호 US-0277439 (1999-03-26)
발명자 / 주소
  • Steven T. Ansell
  • Andrew R. Cherenson
  • Mark E. Paley
  • Steven B. Katz
  • John Michael Kelsey, Jr.
  • Bruce Schneier
출원인 / 주소
  • Liquid Audio, Inc.
대리인 / 주소
    James D. Ivey
인용정보 피인용 횟수 : 267  인용 특허 : 21

초록

Data such as a musical track is stored as a secure portable track (SPT) which can be bound to one or more players and can be bound to a particular storage medium, restricting playback of the SPT to the specific players and ensuring that playback is only from the original storage medium. The SPT is b

대표청구항

1. A method for binding subject data to a selected data access device such that the subject data is inaccessible to data access devices other than the selected data access device, the method comprising:encrypting the subject data to form encrypted subject data using data corresponding to the selecte

이 특허에 인용된 특허 (21)

  1. Allen Richard, Apparatus and method for an on demand data delivery system for the preview, selection, retrieval and reproduction at a.
  2. Allen Richard (111 E. Myrna La. Tempe AZ 85284), Apparatus and method for an on demand data delivery system for the preview, selection, retrieval and reproduction at a r.
  3. Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Apparatus and storage medium for decrypting information.
  4. Kaliski ; Jr. Burton S., Client/server protocol for proving authenticity.
  5. Brugger Rolf (Keistenweg 1 CH-4310 Rheinfelden CHX), Device for the distribution of music information in digital form.
  6. Nagano Masakazu,JPX ; Tanaka Kunihiro,JPX ; Hibino Toshiro,JPX ; Sato Hiroshi,JPX, Information processing system which can check disk-like storage medium having prescribed relation therewith and disk-li.
  7. Cooper Thomas Edward ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-d.
  8. Logan Andrew J. (Gladwyne PA), Method and apparatus for protecting software.
  9. Beecher David A. (Kirkland WA), Method and apparatus for protection of software in an electronic system.
  10. Rackman Michael I. (1710 Glenwood Rd. Brooklyn NY 11230), Method and system for limiting multi-user play of video game cartridges.
  11. O'Connor Clint H. ; Pearce John J., Method of securing CD-ROM data for retrieval by one machine.
  12. Kubota, Satoshi, Microprocessor for providing copy protection.
  13. Kataoka Satoshi,JPX ; Yoshioka Makoto,JPX ; Utsumi Kenichi,JPX ; Murakami Keiichi,JPX, Security system for protecting information stored in portable storage media.
  14. Matsuhara Taku (Tokyo JPX), Security system for software.
  15. Chandra Ashileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocess.
  16. Taaffe James L. (74 Appleton St. Arlington MA 02174), Software security method and systems.
  17. Dolphin Janet L. (Milpitas CA), System and method for access control for portable data storage media.
  18. Endoh Kenjiro (Tokyo JPX) Yasuda Osamu (Kawasaki JPX), System for recording/reproducing an information source having an apparatus specific identification signal.
  19. Saigh Michael M. ; Chang Edward H. ; Brockhouse Douglas B. ; Chang Hsiao-Shih, Systems and apparatus for electronic communication and storage of information.
  20. Saigh Michael M., Systems and apparatus for electronic communication and storage of time encoded information.
  21. Ryan John O. ; Morrison E. Fraser ; Copeland Gregory C., Video media security and tracking system.

이 특허를 인용한 특허 (267)

  1. Haney, Richard D., Ad hoc location sharing group between first and second cellular wireless devices.
  2. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  3. Cuff, Michael A.; Gehrke, Todd; Kasad, Farhad, Aggregate location dynometer (ALD).
  4. Cuff, Michael A.; Gehrke, Todd; Kasad, Farhad, Aggregate location dynometer (ALD).
  5. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  6. Marshall, Roger S.; Zhu, Yinjun, Ancillary data support in session initiation protocol (SIP) messaging.
  7. McFarland, Keith; Jain, Vishal, Anonymous voice conversation.
  8. Haney, Richard D., Apparatus and method for obtaining content on a cellular wireless device based on proximity.
  9. Haney, Richard D., Apparatus and method for obtaining content on a cellular wireless device based on proximity to other wireless devices.
  10. Haney, Richard D., Apparatus and method to transmit content to a cellular wireless device based on proximity to other wireless devices.
  11. Harada, Toru, Application executing apparatus and application execution method.
  12. Zhu, Yinjun; Thompson, Paul, Area event handling when current network does not cover target area.
  13. Hines, Gordon John; Tapia, Mario G.; Cousins, Will, Area watcher for wireless network.
  14. Hines, Gordon; Tapia, Mario G.; Cousins, Will, Area watcher for wireless network.
  15. Griffin, John L.; McFarland, Keith A.; Wells, William P., Authenticating cloud computing enabling secure services.
  16. McFarland, Keith A., Authentication via motion of wireless device movement.
  17. McFarland, Keith A., Authentication via motion of wireless device movement.
  18. Hines, John Gordon; Croy, Jonathan; Marshall, Roger Stuart, Automatic location identification (ALI) emergency services pseudo key (ESPK).
  19. Zhu, Yinjun; Conner, Cristine; Hines, Gordon John; Liao, Hsin-Chih; Pelligrini, William, Automatic location identification (ALI) service requests steering, connection sharing and protocol translation.
  20. Giobbi, John J., Biometric personal data key (PDK) authentication.
  21. Giobbi, John J., Biometric personal data key (PDK) authentication.
  22. Giobbi, John J., Biometric personal data key (PDK) authentication.
  23. Perlman,Radia J, Blinded encryption and decryption.
  24. Lee, Lane W.; Hines, Randal C.; Gurkowski, Mark J.; Blankenbeckler, David L., Block-level storage device with content security.
  25. Pitt, Lance Douglas; DeLapp, Daniel D.; Lawrence, Sarah Jean, Cellular augmented radar/laser detection using local mobile network within cellular network.
  26. Pitt, Lance Douglas; Lawrence, Sarah Jean; DeLapp, Daniel D., Cellular augmented radar/laser detector.
  27. Pitt,Lance Douglas; Lawrence,Sarah Jean; DeLapp,Daniel D., Cellular augmented radar/laser detector.
  28. Pitt, Lance Douglas, Cellular augmented vehicle alarm notification together with location services for position of an alarming vehicle.
  29. Tantawy, Ahmed; Marconcini, Franco; Munson, Jonathan P.; Pacifici, Giovanni; Youssef, Aba S., Combining online browsing and on-demand data broadcast for selecting and downloading digital content.
  30. Chebiyyam, Gopi Krishna, Computer program product and method for permanently storing data based on whether a device is protected with an encryption mechanism and whether data in a data structure requires encryption.
  31. Gobbi, John J.; Kelly, Bryan; Brown, David L.; Hirt, Fred S., Configuration of interfaces for a location detection system and application.
  32. Hines, Gordon John; Cousins, Will, Consequential location derived information.
  33. Diamond, Michael B.; White, Jonathan B., Content keys for authorizing access to content.
  34. Diamond, Michael B.; White, Jonathan B., Content server and method of providing content therefrom.
  35. Diamond, Michael B.; White, Jonathan B., Content server and method of storing content.
  36. Ishiguro,Ryuji; Kawakami,Itaru; Tanabe,Mitsuru; Ezura,Yuichi; Sato,Ichiro; Ebihara,Munetake, Contents providing system.
  37. Belenko,Vyacheslav S.; Kuzmich,Vsevolod M., Copy protection method and system for digital media.
  38. Kim, Hyung Sun; Stechkine, Alexandre; Kim, Byung Jin; Um, Soung Hyun, Copy protection method and system for digital media.
  39. Belenko,Vyacheslav S.; Kuzmich,Vsevolod M., Copy protection method for digital media.
  40. Nakano, Toshihisa; Harada, Shunji; Matsuzaki, Natsume; Tatebayashi, Makoto, Copyright protection system, recording device, and reproduction device.
  41. Chen,Jay C., Cryptographic system and method for electronic transactions.
  42. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information based on limiting a span of an inverted cone for locating satellite in-range determinations.
  43. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  44. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  45. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  46. Pitt,Lance Douglas; Lamprecht,Leslie Johann; Martin,Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  47. Shu, Jyh-Haur; Chu, Zenn Tzong, DVD player with card reader.
  48. Saitoh, Masayuki, Data processing system and method with copy protection.
  49. Okaue, Takumi, Data processing system, data processing method, data processing apparatus, license system, and program providing medium.
  50. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  51. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  52. Horiuchi,Keiji; Yoshikawa,Takatoshi; Hioki,Toshiaki; Hori,Yoshihiro, Data terminal device providing backup of uniquely existable content data.
  53. Ginter, Jr., Thomas; Ali, Salman; Pann, Tim, Device independent caller data access for emergency calls.
  54. Collins, Gary; Nielsen, Paul; Harmon, Kevin, Digital audio device.
  55. Giobbi, John J., Digital content security system.
  56. Giobbi,John J., Digital content security system.
  57. Cha, Ghun-Up; Kang, Myeong-Joon; Jung, Han, Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon.
  58. Cha, Ghun-Up; Kang, Myeong-Joon; Jung, Han, Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon.
  59. Cha, Ghun-Up; Kang, Myeong-Joon; Jung, Han, Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon.
  60. Cha,Ghun Up; Kang,Myeong Joon; Jung,Han, Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon.
  61. Wu, Bo, Digital media distribution.
  62. Giobbi,John J., Digital rights management.
  63. Raines, Moshe; Salomon, Tavi; Pomerantz, Itzhak, Digital rights management device and method.
  64. Nakano, Toshihisa; Yamamichi, Masato; Yamamichi, legal representative, Masami; Yamamichi, legal representative, Satomi; Yamamichi, legal representative, Keiko; Futa, Yuichi; Ohmori, Motoji; Tatebayashi, Makoto; Harada, Shunji; Murase, Kaoru, Digital work protection system, recording apparatus, reproduction apparatus, and recording medium.
  65. Akins, III, Glendon L., Downloadable remotely stored device drivers for communication with set-top box peripherals.
  66. Thompson, Paul C., Efficient prisoner tracking.
  67. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  68. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  69. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  70. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  71. Raam, Farbod Michael, Encrypted transport solid-state disk controller.
  72. Dickinson, Richard; Hines, Gordon John; Croy, Jonothan, Enhanced E911 network access for a call center using session initiation protocol (SIP) messaging.
  73. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for a call center using session initiation protocol (SIP) messaging.
  74. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  75. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  76. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  77. Perlman,Radia J., Ephemeral decryption utilizing binding functions.
  78. Zhu, Yinjun, Extended area event for network based proximity discovery.
  79. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  80. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  81. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  82. Haney, Richard D., Formation of wireless device location sharing group.
  83. Shibuya, Noboru; Agata, Kenichi; Miyano, Akihiro, General-purpose computer and copyright management method for use therein.
  84. Pitt, Lance Douglas, GeoNexus proximity detector network.
  85. Brown, David L., Hybrid device having a personal digital key and receiver-decoder circuit and methods of use.
  86. Brown, David L., Hybrid device having a personal digital key and receiver-decoder circuit and methods of use.
  87. Brown, David L., Hybrid device having a personal digital key and receiver-decoder circuit and methods of use.
  88. Ehrlich, Robert; Mitchell, Donald L.; Marshall, Roger S.; Hines, Gordon John, Index of suspicion determination for communications request.
  89. Morita, Toshihiro; Hatanaka, Mitsuyuki; Kojima, Kiyonobu; Tambata, Ippei; Shiroma, Shin, Information processing apparatus and associated method of content exchange.
  90. Takashima, Yoshikazu, Information processing apparatus and method, information recording medium, and computer program.
  91. Takashima, Yoshikazu; Ueda, Kenjiro, Information processing device, information processing method, and computer program.
  92. Hayashi,Junichi, Information processing method and information processing apparatus.
  93. Ishiguro,Ryuji; Osawa,Yoshitomo; Oishi,Tateo; Asano,Tomoyuki; Mitsuzawa,Atsushi, Information processing system and method for distributing encrypted message data.
  94. Latham, Weldon H.; Lorello, Timothy J.; Morin, Drew; White, Bruce, Integrated, detachable ear bud device for a wireless phone.
  95. Ghozati, Kambiz; Thompson, Paul, Intelligent load balancer enhanced routing.
  96. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  97. Gehrke, Todd; Wang, Chih; Lawrence, Sarah, Location based geo-reminders.
  98. Gehrke, Todd; Wang, Chih; Lawrence, Sarah, Location based geo-reminders.
  99. Gehrke, Todd; Wang, Chih; Kasad, Farhad, Location based proximity alert.
  100. Hines, Gordon John; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  101. Hines, Gordon John; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  102. Hines, Gordon; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  103. Hines, Gordon; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  104. Hines,Gordon John; Tapia,Mario G.; Cousins,Will; Carey,Patrick, Location derived presence information.
  105. Pitt, Lance Douglas, Location fidelity adjustment based on mobile subscriber privacy profile.
  106. Kasad, Farhad; Lockeby, Camron, Location privacy selector.
  107. Kasad, Farhad; Lockeby, Camron, Location privacy selector.
  108. Zhu, Yinjun; Hines, Gordon John; Burton, Victor; Liao, Hsin-Chih, Location service requests throttling.
  109. Zhu, Yinjun; Hines, Gordon John; Burton, Victor; Liao, Hsin-Chih, Location service requests throttling.
  110. Haney, Richard D., Location sharing and tracking using mobile phones or other wireless devices.
  111. Haney, Richard D., Location sharing and tracking using mobile phones or other wireless devices.
  112. Haney, Richard D., Location sharing group for services provision.
  113. Haney, Richard D., Location sharing group map management.
  114. Haney, Richard D., Location sharing service between GPS-enabled wireless devices, with shared target location exchange.
  115. Kawamae, Osamu; Takeuchi, Toshifumi; Kimura, Hiroyuki; Arai, Takao; Yoshiura, Hiroshi, METHOD FOR REPRODUCING DATA, APPARATUS FOR REPRODUCING DATA, METHOD FOR CODING DATA, METHOD FOR RECORDING DATA, APPARATUS FOR RECORDING AND REPRODUCING DATA, METHOD FOR AUTHENTICATION, SEMICONDUCTOR .
  116. Haney, Richard D., Map presentation on cellular device showing positions of multiple other wireless device users.
  117. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  118. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  119. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  120. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  121. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  122. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  123. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  124. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  125. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  126. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  127. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  128. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  129. Mikkelsen, John; Freidson, Robert, Media delivery platform.
  130. Calvert, Kerry Wayne, Method and apparatus for acquiring media services available from content aggregators.
  131. Bowman, Roger Paul; Nagarajan, Sivakumar; Bender, Christopher Lyle; Segato, Timothy Lee, Method and apparatus for controlling access to encrypted data.
  132. Deng, Huijie Robert; Wu, Yong Dong, Method and apparatus for digital content copy protection.
  133. Okaue,Takumi, Method and apparatus for recording/playing back information.
  134. Sako, Yoichiro; Inokuchi, Tatsuya; Furukawa, Shunsuke, Method and apparatus for transmitting content data and recording and/or reproducing apparatus.
  135. Sako,Yoichiro; Inokuchi,Tatsuya; Furukawa,Shunsuke, Method and apparatus for transmitting content data and recording and/or reproducing apparatus.
  136. Oxford, William V., Method and system for a recursive security protocol for digital copyright control.
  137. Oxford, William V., Method and system for a recursive security protocol for digital copyright control.
  138. Oxford, William V., Method and system for a recursive security protocol for digital copyright control.
  139. Oxford,William V., Method and system for a recursive security protocol for digital copyright control.
  140. Diamond, Michael B.; White, Jonathan B., Method and system for accessing content on demand.
  141. Oxford, William V., Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol.
  142. Oxford, William V., Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol.
  143. Oxford, William V., Method and system for process working set isolation.
  144. Diamond, Michael B.; White, Jonathan B., Method and system for registering and activating content.
  145. Doumuki, Tohru, Method and system for retrieving content in network system.
  146. Tan, Kaijun; Cochran, Michael L.; Badia, Logan, Method and system for secure distribution and utilization of data over a network.
  147. Han, Hee-chul; Kim, Yun-sang; Choi, Yang-lim; Han, Sung-hyu; You, Yong-kuk, Method of copying and decrypting encrypted digital data and apparatus therefor.
  148. Mayboroda, Alexander Leonidovich; Smolentsev, Sergey V.; Sall, Mikhail A.; Redkov, Viktor V.; Tikhotsky, Anatoli I., Method of embedding watermark into digital image.
  149. Hollstr철m,Magnus; Borgstr철m,Anders, Method of using a communications device together with another communications device, a communications system, a communications device and an accessory device for use in connection with a communicatio.
  150. Haney, Richard D., Methods and apparatuses for geospatial-based sharing of information by multiple devices.
  151. Haney, Richard D., Methods and apparatuses for transmission of an alert to multiple devices.
  152. Rhoads, Geoffrey B., Methods and devices responsive to ambient audio.
  153. Rhoads, Geoffrey B., Methods and systems employing digital content.
  154. Rhoads, Geoffrey B.; Levy, Kenneth L., Methods and systems employing digital content.
  155. Haney, Richard D., Methods and systems for annotating target locations.
  156. Haney, Richard D., Methods and systems for sharing position data and tracing paths between mobile-device users.
  157. Haney, Richard D., Methods and systems for sharing position data between subscribers involving multiple wireless providers.
  158. Haney, Richard D., Methods and systems for temporarily sharing position data between mobile-device users.
  159. Haney, Richard D., Methods and systems for temporarily sharing position data between mobile-device users.
  160. Haney, Richard D., Methods, systems and apparatuses for the formation and tracking of location sharing groups.
  161. Haney, Richard D., Methods, systems and apparatuses for the formation and tracking of location sharing groups.
  162. Dickinson, Richard, Mobile automatic location identification (ALI) for first responders.
  163. Zhu, Yinjun, Mobile internet protocol (IP) location.
  164. Zhu, Yinjun, Mobile internet protocol (IP) location.
  165. Zhu, Yinjun, Multiple location retrieval function (LRF) network having location continuity.
  166. Pitt, Lance D.; Ginter, Thomas; Hines, Gordon John; Burton, Victor; Ramberg, Mark, N-dimensional affinity confluencer.
  167. Geldenbott, Gerhard; Hines, Gordon J.; Martin, Jeff; Day, Ed, Nationwide table routing of voice over internet protocol (VOIP) emergency calls.
  168. Fan,Chen Huang; Du,Ben Chuan; Cheng,Yi Wen, Network lock method and related apparatus with ciphered network lock and inerasable deciphering key.
  169. Geyzel, Zeev; Dorrendorf, Leo, Network security system.
  170. Cuff, Michael; Wang, Chih; Kasad, Farhad; Aryana, Firdaus; Hines, Gordon J., No responders online.
  171. Pitt,Lance Douglas; Lamprecht,Leslie Johann; Martin,Jeffrey Thomas, Other cell sites used as reference point to cull satellite ephemeris information for quick, accurate assisted locating satellite location determination.
  172. Pitt, Lance Douglas; Hines, Gordon John; Griffin, John, Persona-notitia intellection codifier.
  173. Giobbi, John J., Personal digital key and receiver/decoder circuit system and method.
  174. Giobbi, John J., Personal digital key and receiver/decoder circuit system and method.
  175. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  176. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  177. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Personal digital key initialization and registration for secure transactions.
  178. Kroll, Mitchell H.; Squires, Blake R.; Celeste, Christopher A., Personal media player apparatus and method.
  179. Kroll, Mitchell; Spilman, Steven; Squires, Blake; Celeste, Christopher; Spilman, Lauren, Personal media player apparatus and method.
  180. Sparks, Kelly C.; Gust, David A., Physical digital media delivery.
  181. Sparks, Kelly C.; Gust, David A., Physical digital media delivery.
  182. Fujiwara, Makoto; Nemoto, Yusuke; Yasui, Junichi; Maeda, Takuji; Ito, Takayuki; Yamada, Yasushi; Inoue, Shinji, Program development method, program development supporting system, and program installation method.
  183. Fujiwara, Makoto; Nemoto, Yusuke; Yasui, Junichi; Maeda, Takuji; Ito, Takayuki; Yamada, Yasushi; Inoue, Shinji, Program development method, program development supporting system, and program installation method.
  184. Fujiwara, Makoto; Nemoto, Yusuke; Yasui, Junichi; Maeda, Takuji; Ito, Takayuki; Yamada, Yasushi; Inoue, Shinji, Program update method and server.
  185. Fujiwara, Makoto; Nemoto, Yusuke; Yasui, Junichi; Maeda, Takuji; Ito, Takayuki; Yamada, Yasushi; Inoue, Shinji, Program update method and server.
  186. Fujiwara, Makoto; Nemoto, Yusuke; Yasui, Junichi; Maeda, Takuji; Ito, Takayuki; Yamada, Yasushi; Inoue, Shinji, Program update method and server.
  187. Kuzmich, Vsevolod M.; Ivanov, Igor O., Proprietary watermark system for secure digital media and content distribution.
  188. Rhodes, Jeffrey C.; Luo, Tong; Burton, Victor; Conner, Christine, Public safety access point (PSAP) selection for E911 wireless callers in a GSM type system.
  189. Sachdev, Vineet; McFarland, Keith; Griffin, John L., Quality of service to over the top applications used with VPN.
  190. Cuff, Michael; Wang, Chih; Kasad, Farhad; Aryana, Firdaus; Hines, Gordon J., Rapid assignment dynamic ownership queue.
  191. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  192. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  193. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  194. Shitara, Teruyuki; Mayama, Ichiro; Yamada, Eiichi, Reproducing apparatus and information distribution system.
  195. Shitara,Teruyuki; Mayama,Ichiro; Yamada,Eiichi, Reproducing apparatus and information distribution system.
  196. Kawamae, Osamu; Takeuchi, Toshifumi; Kimura, Hiroyuki; Arai, Takao; Yoshiura, Hiroshi, Reproducing apparatus, recording apparatus and display apparatus.
  197. Kawamae, Osamu; Takeuchi, Toshifumi; Kimura, Hiroyuki; Arai, Takao; Yoshiura, Hiroshi, Reproducing apparatus, recording apparatus and display apparatus.
  198. Kawamae,Osamu; Takeuchi,Toshifumi; Kimura,Hiroyuki; Arai,Takao; Yoshiura,Hiroshi, Reproducing apparatus, recording apparatus and display apparatus.
  199. Kawamae,Osamu; Takeuchi,Toshifumi; Kimura,Hiroyuki; Arai,Takao; Yoshiura,Hiroshi, Reproducing apparatus, recording apparatus and display apparatus.
  200. D'Souza, Myron; Hines, Gordon John; Bartnik, David; Hannan, Joseph; Groen, Joel; Wells, William, Roaming gateway enabling location based services (LBS) roaming for user plane in CDMA networks without requiring use of a mobile positioning center (MPC).
  201. Thompson, Paul; Hines, Gordon John, SUPL-WiFi access point controller location based services for WiFi enabled mobile devices.
  202. Feldman,Timothy R.; Lee,Lane W.; Braitberg,Michael F.; Rayburn,Douglas M.; Kiwimagi,Gary G., Secure access method and system.
  203. Hurst,Leon; Tuoriniemi,Samuli, Secure content activation during manufacture of mobile communication devices.
  204. Diamond, Michael B.; White, Jonathan B.; Daniell, Piers J., Secure content enabled drive digital rights management system and method.
  205. Diamond, Michael B.; White, Jonathan B.; Daniell, Piers J., Secure content enabled drive system and method.
  206. McFarland, Keith A.; Ghozati, Kambiz; Stevens, John; Wells, Wiliam P., Secure distribution of non-privileged authentication credentials.
  207. Perlman,Radia J., Secure ephemeral decryptability.
  208. Karaoguz, Jeyhan; Bennett, James, Secure media peripheral association in a media exchange network.
  209. Karaoguz, Jeyhan; Bennett, James, Secure media peripheral association in a media exchange network.
  210. Karaoguz, Jeyhan; Bennett, James, Secure media peripheral association in a media exchange network.
  211. Hsu, Michael M.; McMahon, Dennis J., Secure ticketing.
  212. Zucker, Elad; Werner, Eran; Weidhagen, Mattias, Securing data using integrated host-based data loss agent with encryption detection.
  213. Zucker, Elad; Werner, Eran; Weidhagen, Mattias, Securing data using integrated host-based data loss agent with encryption detection.
  214. Okaue,Takumi; Ishibashi,Yoshihito; Sakamoto,Yukihiro; Mizuno,Asami; Kihara,Nobuyuki; Yokota,Teppei, Security unit for use in memory card.
  215. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Single step transaction authentication using proximity and biometric input.
  216. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  217. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  218. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  219. Poremba, Todd, Special emergency call treatment based on the caller.
  220. Lee, Lane W.; Feldman, Timothy R.; Rayburn, Douglas M.; Kiwimagi, Gary G., System and method for detecting unauthorized copying of encrypted data.
  221. Eto, Seiji, System and method for enabling device dependent rights protection.
  222. Novak, Robert E., System and method for providing conditional access to digital content.
  223. Moskowitz, Paul A.; Boies, Stephen J.; Dinkin, Samuel; Greene, David P.; Grey, William; Yu, Philip Shi-lung; Stern, Edith H., System and method for transferring electronic information.
  224. Ghose, Kanad, System and method for validating program execution at run-time using control flow signatures.
  225. Okamoto, Akiyoshi; Ishida, Masataka, System for preventing unauthorized use of digital content.
  226. Chebiyyam, Gopi Krishna; Basavapatna, Prasanna Ganapathi, System, method and computer program product for maintaining a confidentiality of data on a network.
  227. Chebiyyam, Gopi Krishna, System, method and computer program product for performing an action based on an aspect of an electronic mail message thread.
  228. Chebiyyam, Gopi Krishna, System, method and computer program product for performing an action based on an aspect of an electronic mail message thread.
  229. Sabet-Sharghi, Farshid; Qawami, Bahman; Chang, Robert C., System, method and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks, or other media.
  230. Chebiyyam, Gopi Krishna, System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy.
  231. Chebiyyam, Gopi Krishna, System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy.
  232. Chebiyyam, Gopi Krishna, System, method, and computer program product for determining whether an electronic mail message is compliant with an etiquette policy.
  233. Chebiyyam, Gopi Krishna; Basavapatna, Prasanna, System, method, and computer program product for preventing access to data with respect to a data access attempt associated with a remote data sharing session.
  234. Basavapatna, Prasanna Ganapathi; Chebiyyam, Gopi Krishna, System, method, and computer program product for preventing image-related data loss.
  235. Qawami,Bahman; Sabet Sharghi,Farshid; Chang,Robert C., System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media.
  236. Sabet-Sharghi, Farshid; Qawami, Bahman; Chang, Robert C., System, method, and device for playing back recorded content.
  237. Haney, Richard D., Techniques for communication within closed groups of mobile devices.
  238. Haney, Richard D., Techniques for sharing position data between first and second devices.
  239. Haney, Richard D., Techniques for sharing relative position between mobile devices.
  240. Wallace, Erik; Morin, Drew; Pitt, Lance D.; Murphy, Sean, Telematics basic mobile device safety interlock.
  241. Haney, Richard D., Tracking proximity of services provider to services consumer.
  242. Gobbi, John J.; Kelly, Bryan; Brown, David L.; Hirt, Fred S., Tracking system using personal digital key groups.
  243. Pitt, Lance Douglas; DeLapp, Daniel D.; Lawrence, Sarah Jean, Transmitter augmented radar/laser detection using local mobile network within a wide area network.
  244. Ishiguro,Ryuji; Ebihara,Munetake, Transmitter device, transmitting method, receiver device, receiving method, communication system, and program storage medium.
  245. Giobbi, John J., Two-level authentication for secure transactions.
  246. Giobbi, John J.; Brown, David L.; Hirt, Fred S., Two-level authentication for secure transactions.
  247. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank 911 calls.
  248. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank emergency 911 calls.
  249. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank emergency 911 calls.
  250. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  251. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  252. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  253. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  254. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  255. Zhu,Yinjun, User plane location based service using message tunneling to support roaming.
  256. Zhu, Yinjun; Hines, Gordon John; Marshall, Roger; Yang, Fei; Burton, Victor, User plane location services over session initiation protocol (SIP).
  257. Zhu, Yinjun; Hines, Gordon John; Marshall, Roger; Yang, Fei; Burton, Victor, User plane location services over session initiation protocol (SIP).
  258. Sprigg, Stephen A.; Lundblade, Laurence, Using permissions to allocate device resources to an application.
  259. England,Paul, Verifying the presence of an original data storage medium.
  260. Croy, Jon; Hines, John Gordon, Voice Over Internet Protocol (VoIP) location based conferencing.
  261. Croy, Jon; Hines, John Gordon; Johnson, Darrin; Lendvay, Kathleen, Voice over internet protocol (VoIP) multi-user conferencing.
  262. Belenko,Vyacheslav S.; Kuzmich,Vsevolod M., Watermark-based copy management system and method for digital media copy protection.
  263. Mitchell, Jr., Donald L.; Marshall, Roger S.; Singer, Andrew; Aryana, Firdaus, Wireless emergency caller profile data delivery over a legacy interface.
  264. Havlark, Arlene; Burton, Victor; Ahrens, John, Wireless telecommunications location based services scheme selection.
  265. Havlark, Arlene; Burton, Victor; Ahrens, John, Wireless telecommunications location based services scheme selection.
  266. Pitt, Lance D.; Ginter, Thomas; Aryana, Firdaus; Mitchell, Jr., Donald Le Roy, iALERT enhanced alert manager.
  267. Pitt, Lance D.; Ginter, Thomas; Aryana, Firdaus; Mitchell, Jr., Donald Le Roy, iALERT enhanced alert manager.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트