$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System for tracking end-user electronic content usage 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/30
  • G06F-012/14
  • H04L-009/32
출원번호 US-0177096 (1998-10-22)
발명자 / 주소
  • George Gregory Gruse
  • John J. Dorak, Jr.
  • Kenneth Louis Milsted
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    Steven J. Meyers
인용정보 피인용 횟수 : 586  인용 특허 : 68

초록

A system for tracking usage of digital content on user devices. Electronic stores coupled to a network sell licenses to play digital content data to users. Content players, which receive from the network the licensed content data, are used to play the licensed content data. Additionally, a logging s

대표청구항

1. A digital content data player for playing digital content data stored on a storage device and for providing usage information related to the digital content to a remote site, said data player comprising:an interface for connecting with a storage device; a receiver for receiving previously encrypt

이 특허에 인용된 특허 (68)

  1. Schulhof Nathan (Los Gatos CA) Janky James M. (Los Altos CA), Apparatus for distributing subscription and on-demand audio programming.
  2. Gates Geoffrey W. (Woodridge IL) Kepley Garry D. (Wheaton IL), Arrangement for deleting trailing message portions.
  3. Subler Ronald J. (Charlestown MA) Hastings Thomas Mark (Lexington MA), Assembly, distribution, and use of digital information.
  4. Penn Steven C. (Georgetown TX) Wilkes Michael D. (Austin TX), Audio editor display interface.
  5. Molva Refik (Juan-Les-Pins EPX) Tsudik Gene (Thalwil EPX), Authentication method and system with a smartcard.
  6. Matyas Stephen M. (Kingston NY) Oseas Jonathan (Hurley NY), Code protection using cryptography.
  7. Chelliah Raman ; Cornez Jason S. ; Dellar Carl ; Harrison Stephen ; Hempe John A. ; Hsu Chih-Cheng ; Golin Eric J. ; Price Charles A. ; Rutta Neal S. ; Wood Thomas A. ; Yamamoto Wayne K., Computer system and method for electronic commerce.
  8. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus having program authorization information data structures.
  9. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  10. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  11. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  12. Horne Donald R. (Don Mills CAX) Jeffers John M. (Downsview CAX), Cryptographic system using interchangeable key blocks and selectable key fragments.
  13. Reeds ; III James A. (New Providence NJ), Cryptosystem for cellular telephony.
  14. Starkey James A. (Manchester MA), Database server system with methods for alerting clients of occurrence of database server events of interest to the clie.
  15. Kyojima Masaki,JPX ; Kakehi Rumiko,JPX ; Takeda Koji,JPX ; Terao Taro,JPX, Decryption method and device, and access right authentication method and apparatus.
  16. Shima George T. (Tokyo JPX), Decryption of messages employing unique control words and randomly chosen decryption keys.
  17. Hashimoto Yoshitaka (Chofu JPX) Yamamoto Kaichi (Zama JPX) Shirota Norihisa (Atsugi JPX), Digital video data recording apparatus.
  18. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Efficient digital signature algorithm and use thereof technical field.
  19. Petrie ; Jr. Charles J. (Palo Alto CA) Allen Wayne P. (Leander TX), Electronic proof of receipt.
  20. Shima George T. (Tokyo JPX), Encrtption of messages employing unique control words and randomly chosen encryption keys.
  21. Hellman Martin E. (Stanford CA) Pohlig Stephen C. (Acton MA), Exponentiation cryptographic apparatus and method.
  22. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Fair cryptosystems and methods of use.
  23. McLaughlin Robert (Arlington VA) Bullen M. James (Oakville CAX), Information service control point which retreives information as blocks of data.
  24. McLaughlin Robert (Arlington VA) Bullen M. James (Oakville CAX), Information service control point, which uses different types of storage devices, which retrieves information as blocks.
  25. Garber Sharon R. (Crystal MN) Kozak Darryn J. (New Brighton MN) Kruse John M. (Minneapolis MN) Clare Mark K. (Fort Wayne IN), Intelligent optical navigator dynamic information presentation and navigation system.
  26. Aziz Ashar (Fremont CA), Method and apparatus for a key-management scheme for internet protocols.
  27. Pastor Jose (Westport CT) Barton Maya R. (Ridgefield CT), Method and apparatus for generating encryption/decryption key.
  28. Diffie Whitfield (Mountain View CA) Aziz Ashar (Fremont CA), Method and apparatus for privacy and authentication in wireless networks.
  29. Kaufman Charles W. (Northboro MA) Gasser Morrie (Hopkinton MA) Lampson Butler W. (Cambridge MA) Tardo Joseph J. (Concord MA) Alagappan Kannan (Cambridge MA), Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.
  30. Hornbuckle Gary D. (Pebble Beach CA), Method and apparatus for remotely controlling and monitoring the use of computer software.
  31. Hornbuckle Gary D. (Pebble Beach CA), Method and apparatus for remotely controlling and monitoring the use of computer software.
  32. Ahmad Arshad, Method and system for monitoring the use of rented software.
  33. Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
  34. Leighton Frank T. (965 Dedham St. Newton Center MA 02159) Micali Silvio (224 Upland Rd. Cambridge MA 02140), Method and system for personal identification.
  35. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for certifying public keys in a digital signature scheme.
  36. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for certifying public keys in a digital signature scheme.
  37. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
  38. Leighton Frank T. (459 Chestnut Hill Ave. Newtonville MA) Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for enabling users of a cryptosystem to generate and use a private pair key for enciphering communications betwee.
  39. Mniszewski Susan M. (Los Alamos NM) Springer Edward A. (Los Alamos NM) Brenner David P. (North Collins NY), Method for encryption and transmission of digital keying data.
  40. Schnorr Claus P. (Frankfurterstr. 81 6350 Bad Nauheim DEX), Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system.
  41. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA), Method for performing group exclusion in hierarchical group structures.
  42. Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
  43. Hair Arthur R. (301 Oaklawn Dr. Pittsburgh PA 15241), Method for transmitting a desired digital video or audio signal.
  44. Wolfe Everett W. (Lauderdale Lakes FL), Method of controlling the copying of software.
  45. Perlman Radia J. (Acton MA) Kaufman Charles W. (Northborough MA), Method of issuance and revocation of certificates of authenticity used in public key networks and other systems.
  46. Bird Raymond F. (Durham NC) Herzberg Amir (Bronx NY) Janson Philippe A. (Zurich NJ CHX) Kutten Shay (Rockaway NJ) Molva Refik A. (Juan les Pins NY FRX) Yung Marcel M. (New York NY), Multi-party secure session/conference.
  47. Goldwasser Shafi (Cambridge MA) Kilian Joseph (Cambridge MA) Wigderson Avi (Jerusalem ILX) Ben-Or Michael (Jerusalem ILX), Multiprover interactive verification system.
  48. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  49. Fischer Addison M. (60 14th Ave. S. Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  50. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  51. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  52. Brands Stefanus A. (Ina Boudier-Bakkerlaan 143 (iii) XW Utrecht NLX 3582 ), Secret-key certificates.
  53. Citta Richard W. (Oak Park IL) Gosc Paul M. (Buffalo Grove IL) Mutzabaugh Dennis M. (Mt. Prospect IL) Sgrigonoli Gary J. (Mt. Prospect IL), Secure data packet transmission system and method.
  54. Stambler Leon (7803 Boulder La. Parkland FL 33067), Secure transaction system and method utilized therein.
  55. Cordery Robert A. ; Lee David K. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A., Secure user certification for electronic commerce employing value metering system.
  56. Muftic Sead,SEX, Security infrastructure for electronic transactions.
  57. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Simultaneous electronic transactions.
  58. Tindell Elbert G. (Dallas TX) Crawford Kyle (Grand Prarie TX), Store and forward video system.
  59. Rusnak David J. ; Zientara John T., System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet.
  60. Davis Derek L., System and method for copy-protecting distributed video content.
  61. Howell William E. (North Richland Hills TX) Reddy Hari N. (Grapevine TX) Wang Diana S. (Trophy Club TX), System for controlling group access to objects using group access control folder and group identification as individual.
  62. Martin John R. (Rockford IL) Tillery Michael L. (Rockford IL) Zammuto Samuel N. (Rockford IL), System for managing a plurality of computer jukeboxes.
  63. Freeny ; Jr. Charles C. (Fort Worth TX), System for reproducing information in material objects at a point of sale location.
  64. Hartman ; Jr. Robert C. (Woodside CA), System for seamless processing of encrypted and non-encrypted data and instructions.
  65. Hair Arthur R. (Pittsburgh PA), System for transmitting desired digital video or audio signals.
  66. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  67. Takano Shigeru (Ibaraki JPX) Henmi Hidemi (Otsu JPX) Nakahigashi Hideto (Osaka JPX) Sakamoto Ken (Takatsuki JPX), Text broadcast receiver.
  68. Robers Klaas H. J. (Eindhoven NLX), Video translation system for translating a binary coded data signal into a video signal and vice-versa.

이 특허를 인용한 특허 (586)

  1. Drapeau, Thomas; Hamre, Lasse; Calamera, Pablo; Lockhart, Kevin R.; Wooden, Richard D.; Zigler, Jeffrey D.; Lockhart, Jacqueline J., Adding perishable content to media stream based on user location preference.
  2. Sardera,Esteban, Anonymous aggregated data collection.
  3. Morita, Toshihiro; Hatanaka, Mitsuyuki; Kojima, Kiyonobu; Shiroma, Shin, Apparatus and associated methodology for automatically selecting content using stored criteria.
  4. Malone, Michael F., Apparatus and method for embedding searchable information into a file for transmission, storage and retrieval.
  5. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information into a file for transmission, storage and retrieval.
  6. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information into a file, encryption, transmission, storage and retrieval.
  7. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval.
  8. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval.
  9. Poltorak, Alexander I., Apparatus and method for facilitating a purchase using information provided on a media playing device.
  10. Poltorak, Alexander I., Apparatus and method for facilitating a purchase using information provided on a media playing device.
  11. Poltorak, Alexander I., Apparatus and method for providing information in conjunction with media content.
  12. Ushiku, Toyohiko, Apparatus and method of generating document.
  13. Malone, Michael F.; Murphy, Frederick J., Apparatus and method to embed searchable information into a file, encryption, transmission, storage and retrieval.
  14. Tidwell, Justin; Samame, Eduardo; Engel, Craig; Goldberg, Craig, Apparatus and methods ensuring data privacy in a content distribution network.
  15. Osminer, Matthew, Apparatus and methods for automated highlight reel creation in a content delivery network.
  16. Osminer, Matthew, Apparatus and methods for automated highlight reel creation in a content delivery network.
  17. Cronk, Gary; Putsch, Jonathan; Boutilier, James; Miller, Paul L.; Dillon, Michael, Apparatus and methods for content delivery and message exchange across multiple content delivery networks.
  18. Cronk, Gary; Putsch, Jonathan; Boutilier, James; Miller, Paul L.; Dillon, Michael, Apparatus and methods for content delivery and message exchange across multiple content delivery networks.
  19. Floyd, Brian; Smith, Matt; Trotter, Stephanie, Apparatus and methods for controlled bandwidth reclamation.
  20. Roosenraad, Chris; Harman, Richard; Watson, John W.; Turner, Christopher; Arnhold, Phil; Durham, Brian; Stovall, Barbara, Apparatus and methods for data collection, analysis and service modification based on online activity.
  21. Tidwell, Justin; Samame, Eduardo; Engel, Craig, Apparatus and methods for data collection, analysis and validation including error correction in a content delivery network.
  22. Tidwell, Justin, Apparatus and methods for enabling media options in a content delivery network.
  23. Tidwell, Justin, Apparatus and methods for enabling media options in a content delivery network.
  24. Tidwell, Justin; Samame, Eduardo, Apparatus and methods for enabling presence-based and use-based services.
  25. Tidwell, Justin; Samame, Eduardo; Engel, Craig, Apparatus and methods for identifying and characterizing latency in a content delivery network.
  26. Rieger, Remi; Brooks, Paul D., Apparatus and methods for monitoring and optimizing delivery of content in a network.
  27. Patel, Vipul; Gould, Kenneth; Chen, David, Apparatus and methods for multimedia coordination.
  28. Brooks, Paul D.; Gonder, Tom; Hardin, Glen, Apparatus and methods for packetized content delivery over a bandwidth efficient network.
  29. Malone, Michael F., Apparatus for personal voice assistant, location services, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatag(s)/ contextual tag(s), storage and search retrieval.
  30. Malone, Michael F., Apparatus for voice assistant, location tagging, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatags/contextual tags, storage and search retrieval.
  31. Walker, Jay S.; Ellenthal, Matthew P., Applications for gaming devices in a networked environment.
  32. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Asymmetric watermark embedding/extraction.
  33. Fischer,Addison M.; Protheroe,Robert L., Audio cassette emulator with cryptographic media distribution control.
  34. Juszkiewicz,Henry E., Authorized units music distribution system.
  35. Princen, John; Srinivasan, Pramila; Anderson, Craig Steven, Block-based media content authentication.
  36. Yamamuro, Keisei; Sonoda, Yasuyuki, Broadcast system and method therefor.
  37. Walker, Jay S.; Jorasch, James A.; Tedesco, Robert C., Budget-defined flat rate play contract parameters.
  38. Walker,Jay S.; Jorasch,James A.; Tedesco,Robert C., Budget-defined flat rate play contract parameters.
  39. Sherkin, Alexander; Brown, Michael Stephen, Bundle verification.
  40. Durham, Roderick Harold, Centralized data transformation.
  41. Durham, Roderick Harold, Centralized data transformation.
  42. Durham, Roderick Harold, Centralized data transformation.
  43. Srinivasan, Pramila; Princen, John, Certificate verification.
  44. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Circumvention of watermark analysis in a host content.
  45. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Circumvention of watermark analysis in a host content.
  46. Saremi, Thomas Jefferson, Client device with application state tracking and methods for use therewith.
  47. Nickerson, Rand B.; Treschl, Mark A.; Kidd, Kathryn L.; Crofoot, Matthew J.; Samata, A. Gregory; Mason, David E., Collecting a user response to an explicit question specifically concerning a particular web page of a website.
  48. Juszkiewicz,Henry E., Combination compact disc recorder and player system.
  49. Yamanaka, Hiroshi; Tomari, Yoichiro; Saito, Masashi, Communications apparatus, communication system, plug-in module control method, and computer-readable recording medium where program for executing by computer is recorded.
  50. Nickerson, Rand B.; Treschl, Mark A., Computer-implemented system and method for measuring and reporting business intelligence based on comments collected from web page users using software associated with accessed web pages.
  51. Nickerson, Rand B.; Treschl, Mark A., Computer-implemented system and method for measuring and reporting business intelligence based on comments collected from web page users using software associated with accessed web pages.
  52. Parrott, Gregory H., Concurrent play on multiple gaming machines.
  53. Petrovic, Rade; Zhao, Jian; Winograd, Joseph M., Conditional access using embedded watermarks.
  54. Winograd, Joseph M.; Petrovic, Rade; Zhao, Jian, Content access management using extracted watermark information.
  55. Braitberg,Michael F.; Volk,Steven B., Content distribution method and apparatus.
  56. Maruyama, Hidefumi; Chiba, Tetsuhiro; Hachiya, Yuuki, Content distribution program, content distribution method, server, content utilization apparatus, and content utilization system.
  57. Diamond, Michael B.; White, Jonathan B., Content keys for authorizing access to content.
  58. Zhao, Jian; Winograd, Joseph M., Content management using multiple abstraction layers.
  59. Nagao, Yutaka, Content providing system, content reproducing device, content reproducing method, and computer program.
  60. Diamond, Michael B.; White, Jonathan B., Content server and method of providing content therefrom.
  61. Diamond, Michael B.; White, Jonathan B., Content server and method of storing content.
  62. Ishibashi, Yoshihito, Content usage management system method, and program providing medium therefor.
  63. Futa, Yuichi; Ohmori, Motoji; Kitatora, Hirohito; Matsuzaki, Natsume; Tatebayashi, Makoto; Yokotoa, Kaoru, Content-log analyzing system and data-communication controlling device.
  64. McKibben, Michael T.; Lamb, Jeffrey R., Context instantiated application protocol.
  65. Levy, Kenneth L.; Rhoads, Geoffrey B.; Stager, Reed R.; Rodriguez, Tony F., Context sensitive connected content.
  66. Scott, III, Samuel Thomas; Carle, Kevin T.; Chapman, Ann E., Control-based content pricing.
  67. Petrovic, Rade; Zhao, Jian; Winograd, Joseph M., Coordinated watermarking.
  68. Quatrano,Stephen R.; Cummings,Charles D., Copy server for collaboration and electronic commerce.
  69. Lockhart, Kevin R.; Wooden, Richard D.; Zigler, Jeffrey D.; Lockhart, Jacqueline J., Customizing perishable content of a media channel.
  70. Lockhart, Kevin R.; Wooden, Richard D.; Zigler, Jeffrey D.; Lockhart, Jacqueline J., Customizing perishable content of a media channel.
  71. Moskowitz, Scott A., Data protection method and device.
  72. Moskowitz, Scott A., Data protection method and device.
  73. Moskowitz, Scott A., Data protection method and device.
  74. Moskowitz, Scott A., Data protection method and device.
  75. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  76. Shinichi Fukuda JP, Data storage apparatus and data storage method with quality degrading features.
  77. Bezilla, Daniel Bailey; Immordino, John Leonard; Le Ogura, James; Ojha, Sachchida Nand, Data structure for policy-based remediation selection.
  78. Bezilla, Daniel Bailey; Immordino, John Leonard; Le Ogura, James; Ojha, Sachchida Nand, Data structure for policy-based remediation selection.
  79. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark or derived identifier proxy.
  80. Yen, Wei; Princen, John; Lo, Raymond; Srinivasan, Pramila, Delivery of license information using a short messaging system protocol in a closed content distribution system.
  81. Levi, Shaul; Feitelberg, Rafael; Topaz, Assaf, Detecting corrupted data before transmission to a client.
  82. D'Mello, Kurt; Tyree, David Spencer; Gandhe, Sudhir; O'Brien, Eric David, Determining technology-appropriate remediation for vulnerability.
  83. D'Mello, Kurt; Tyree, David Spencer; O'Brien, Eric David; Gandhe, Sudhir, Determining technology-appropriate remediation for vulnerability.
  84. Agami, Mishael; Mardiks, Eitan, Device and method for controlling usage of a memory card.
  85. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  86. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  87. Ibrahim, Wael; Williamson, Steven B., Devices, systems, and methods for secure download of data.
  88. Probst, Bruce E.; Hixson, Carl; Moroney, Anne, Digital asset data type definitions.
  89. Probst, Bruce E.; Hixson, Carl; Moroney, Anne, Digital asset data type definitions.
  90. Probst,Bruce E.; Hixson,Carl; Moroney,Anne, Digital asset data type definitions.
  91. Jones,Kevin C.; Aggson,Cynthia K.; Rodriguez,Tony F.; Mosher,Brian; Levy,Kenneth L.; Hiatt,R. Stephen; Rhoads,Geoffrey B., Digital asset management and linking media signals with related data using watermarks.
  92. Hardin, Glen, Digital domain content processing and distribution apparatus and methods.
  93. Hardin, Glen, Digital domain content processing and distribution apparatus and methods.
  94. Hardin, Glen, Digital domain content processing and distribution apparatus and methods.
  95. Hardin, Glen, Digital domain content processing and distribution apparatus and methods.
  96. Hardin, Glen, Digital domain content processing and distribution apparatus and methods.
  97. Dunkeld, Bryan; Lambert, Edward, Digital media asset conversion system and method.
  98. Dunkeld, Bryan; Lambert, Edward, Digital media asset identification system and method.
  99. Dunkeld, Bryan; Lambert, Edward, Digital media asset identification system and method.
  100. Vestergaard,Steve; Tsui,Che Wai (William); Kolic,Edward, Digital media distribution method and system.
  101. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  102. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  103. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  104. Apparao, Vidur; Bandhauer, John; Waterson, Christopher Robert, Display of media asset information.
  105. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  106. Vainstein, Klimenty, Document security system that permits external users to gain access to secured files.
  107. Starr, Robert J.; Zellner, Samuel N., Dynamic authentication of mark use.
  108. Ouye, Michael Michio; Crocker, Steven Toye, Dynamic evaluation of access rights.
  109. Petrovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed.
  110. Petriovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed domain.
  111. Petrovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed domain.
  112. Petrovic, Rade; Atti, Venkatraman, Efficient extraction of embedded watermarks in the presence of host content distortions.
  113. Lambert, Paul A.; Huang, Frank, Efficient key establishment for wireless networks.
  114. Yanase, Tsutomu; Umezawa, Satoru, Electronic musical apparatus, music contents distributing site, music contents processing method, music contents distributing method, music contents processing program, and music contents distributing program.
  115. Ohtsu,Shuichi, Electronic publication system.
  116. Zhao, Jian, Enhanced content distribution using advertisements.
  117. Petrovic, Rade, Enhanced content management based on watermark extraction records.
  118. Messer, Stephen D.; Ho, Cheryl; Meng, Jianhao, Enhanced network based promotional tracking system.
  119. Gabryjelski, Henry P.; Miller, Wesley, Enhancement to volume license keys.
  120. Princen, John; Srinivasan, Pramila; Blythe, David; Yen, Wei, Ensuring authenticity in a closed content distribution system.
  121. Princen, John; Srinivasan, Pramila; Blythe, David; Yen, Wei, Ensuring authenticity in a closed content distribution system.
  122. Princen, John; Srinivasan, Pramila; Blythe, David; Yen, Wei, Ensuring authenticity in a closed content distribution system.
  123. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  124. Kohmoto,Hisayuki, Estimation of time within untrusted time device disconnected from trusted time device.
  125. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  126. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  127. Petrovic, Rade; Atti, Venkatraman, Extraction of embedded watermarks from a host content based on extrapolation techniques.
  128. Petrovic, Rade; Atti, Venkatraman, Extraction of embedded watermarks from a host content using a plurality of tentative watermarks.
  129. Bowman, Mark Edward; Harris, Mark T.; Lewter, Sherry Pleasant; Kell, John Alexander, Facilitating presentation of content relating to a financial transaction.
  130. Bowman, Mark Edward; Harris, Mark T.; Sondergaard, Sherry Pleasant; Kell, John Alexander, Facilitating presentation of content relating to a financial transaction.
  131. Rhoads, Geoffrey B.; Rodriguez, Anthony, Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  132. Rhoads, Geoffrey B.; Rodriguez, Tony F., Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  133. Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code from third computer process on behalf of first process.
  134. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  135. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  136. Lelikov, Andrey; Gunyakti, Caglar; Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code on behalf thereof.
  137. Winograd, Joseph M., Forensic marking using a common customization function.
  138. Winograd, Joseph M., Forensic marking using a common customization function.
  139. Mukunthu, Deepak, Funnel analysis of the adoption of an application.
  140. Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M.; Fincham, Magdalena M.; Santisi, Steven M.; Gilman, Norman C.; Sparico, Thomas M., Gaming device for a flat rate blackjack game play session and a method of operating same.
  141. Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M.; Fincham, Magdalena M.; Santisi, Steven M.; Gilman, Norman C.; Sparico, Thomas M., Gaming device for a flat rate play session and method of operating same.
  142. Gilliland, John J.; Laakso, Jeffrey P.; Kaminkow, Joseph E.; Vasquez, James A., Gaming device having multiple display interfaces.
  143. Gilliland, John G.; Laakso, Jeffrey P.; Kaminkow, Joseph E.; Vasquez, James A., Gaming device having multiple selectable display interfaces based on player's wagers.
  144. Gilliland, John G.; Laakso, Jeffrey P.; Kaminkow, Joseph E.; Vasquez, James A., Gaming device having multiple selectable display interfaces based on player's wagers.
  145. Kaminkow, Joseph E.; Jones, Aaron T., Gaming device having touch activated alternating or changing symbol.
  146. SeLegue, Dylan B.; Wenker, Ross D., Gaming system and method employing multi-directional interaction between multiple concurrently played games.
  147. Marston, Daniel W.; Joung, Sek Hwan, Gaming system and method for providing a triggering event based on a collection of units from different games.
  148. Baerlocher, Anthony J.; Cohen, Alexander Casey Naglestad; Bekarian, Arram; De Waal, Daniel, Gaming system and method for providing an additional gaming currency.
  149. Baerlocher, Anthony J.; Cohen, Alexander Casey Naglestad; Bekarian, Arram; De Waal, Daniel, Gaming system and method for providing an additional gaming currency.
  150. Baerlocher, Anthony J.; Cohen, Alexander Casey Naglestad; Bekarian, Arram; DeWaal, Daniel, Gaming system and method for providing an additional gaming currency.
  151. Baerlocher, Anthony J.; Cohen, Alexander Casey Naglestad; Bekarian, Arram; DeWaal, Daniel, Gaming system and method for providing an additional gaming currency.
  152. Graham, Jacob Thomas; Schlottmann, Gregory A., Gaming system and method for providing different bonus awards based on different types of triggered events.
  153. Graham, Jacob Thomas; Schlottmann, Gregory A., Gaming system and method for providing different bonus awards based on different types of triggered events.
  154. Rowe, Richard E., Gaming system and method for providing play of local first game and remote second game.
  155. Rowe, Richard E., Gaming system and method for providing play of local first game and remote second game.
  156. Baerlocher, Anthony J.; Hungate, Yuliya; Evans, Christina; Vasquez, James A.; Ferry, Tonja M.; Ching, Erick T., Gaming system having multiple gaming machines which provide bonus awards.
  157. Baerlocher, Anthony J.; Hungate, Yuliya; Evans, Christina; Vasquez, James A.; Ferry, Tonja M.; Ching, Erick T., Gaming system having multiple gaming machines which provide bonus awards.
  158. Baerlocher, Anthony J.; Hungate, Yuliya; Evans, Christina; Vasquez, James A.; Ferry, Tonja M.; Ching, Erick T., Gaming system having multiple gaming machines which provide bonus awards.
  159. Baerlocher, Anthony J.; Hungate, Yuliya; Evans, Christina; Vasquez, James A.; Peterson, Tonja M.; Ching, Erick T., Gaming system having multiple gaming machines which provide bonus awards.
  160. Muir, David H., Gaming system with linked gaming machines that are configurable to have a same probability of winning a designated award.
  161. Muir, David H., Gaming system with linked gaming machines that are configurable to have a same probability of winning a designated award.
  162. Muir, David H., Gaming system with linked gaming machines that are configurable to have a same probability of winning a designated award.
  163. Walker, Jay S.; Patterson, Michael W.; Palumbo, Nancy; Tulley, Stephen C., Group play of a lottery game.
  164. Supramaniam,Senthilvasan; Huang,Weiqing; Vainstein,Klimenty, Guaranteed delivery of changes to security policies in a distributed system.
  165. Lee,Lane W.; Feldman,Timothy R.; Rayburn,Douglas M.; Kiwimagi,Gary G., Host certification method and system.
  166. Rossmann, Alain, Hybrid systems for securing digital assets.
  167. Jain, Priyanka; Kamath, Durgadatt R.; Nair, Kishore, Indicating unavailability of an uploaded video file that is being bitrate encoded.
  168. Jain, Priyanka; Kamath, Durgadatt R.; Nair, Kishore, Indicating unavailability of an uploaded video file that is being bitrate encoded.
  169. Morishita,Taichiro; Shigemori,Takeshi; Senoo,Seiichi, Information compressing and recording device.
  170. Nakajima, Yasuhisa, Information processing apparatus and method, and recording medium.
  171. Takashima, Yoshikazu, Information processing apparatus and method, information recording medium, and computer program.
  172. Hattori, Shinobu; Takashima, Yoshikazu, Information processing apparatus, information processing method and computer program.
  173. Takashima, Yoshikazu; Oishi, Tateo; Muramatsu, Katsumi; Ueda, Kenjiro; Kato, Motoki, Information processing device, information recording medium, information processing method, and computer program.
  174. Tanabe,Mitsuru; Kawakami,Itaru; Ishiguro,Ryuji; Ezura,Yuichi, Information processing method and apparatus and program storage medium for prohibiting duplication of contents in large quantities.
  175. Tanaka, Koichi; Kawakami, Itaru; Kuroda, Yoshisuke; Ishiguro, Ryuji, Information processing method, information processing apparatus and recording medium.
  176. Tanaka,Koichi; Kawakami,Itaru; Kuroda,Yoshisuke; Ishiguro,Ryuji, Information processing method, information processing apparatus and recording medium.
  177. Kay,Paul S., Intelligent agents used to provide agent community security.
  178. Bushey, Robert R.; Knott, Benjamin A., Intelligently routing customer communications.
  179. Bushey,Robert R.; Knott,Benjamin A., Intelligently routing customer communications.
  180. Winograd, Joseph M.; Zhao, Jian; Petrovic, Rade, Interactive content acquisition using embedded codes.
  181. Koehler, Robert Kevin; Schatzlein, Gregory Scott; Glaspie, Marie Jeanine, Interactive dialog-based training method.
  182. Koehler, Robert Kevin; Schatzlein, Gregory Scott; Glaspie, Marie Jeanine, Interactive dialog-based training method.
  183. Bushey, Robert R.; Liddell, Gregory W.; Martin, John M.; Pasquale, Theodore, Interface and method of designing an interface.
  184. Martin,John M.; Bushey,Robert R.; Pasquale,Theodore B., Interface and method of designing an interface.
  185. Medvinsky, Alexander, Intrusion detection for object security.
  186. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  187. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  188. Poo, Tze Lei; Burd, Gregory; Tran, Phuc Thanh; Azimi, Saeed, Key generation techniques.
  189. Poo, Tze Lei; Burd, Gregory; Tran, Phuc Thanh; Azimi, Saeed, Key generation techniques.
  190. Story, Jr., Guy A.; Kovesdi, Rozsa E.; Rajasekharan, Ajit V.; Jun, Benjamin Che-Ming, License management for digital content.
  191. Chen, Ling Tony; Multerer, Boyd Cannon, Licensing the use of a particular feature of software.
  192. Chen, Ling Tony; Benaloh, Josh, Licensing the use of software on a particular CPU.
  193. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  194. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  195. MacTiernan, Daniel N.; Drapeau, Thomas; Hamre, Lasse; Calamera, Pablo; Lockhart, Kevin R.; Wooden, Richard D.; Zigler, Jeffrey D.; Lockhart, Jacqueline J., Live media stream including personalized notifications.
  196. Kim, Myungque, Loading boot code from multiple memories.
  197. Alain, Rossmann; Zuili, Patrick; Ouye, Michael Michio; Humpich, Serge; Lee, Chang-Ping; Vainstein, Klimenty; Hilderbrand, Hal; Garcia, Denis Jacques Paul; Supramaniam, Senthilvasan; Huang, Weiqing; Ryan, Nicholas Michael, Managing secured files in designated locations.
  198. Nickerson, Rand B.; Treschl, Mark A.; Kidd, Kathryn L.; Crofoot, Matthew J., Measuring a page-specific subjective user reaction concerning each of multiple web pages of a website.
  199. Petrovic, Rade; Tehranchi, Babak; Jemili, Kanaan; Winograd, Joseph M.; Angelico, Dean, Media monitoring, management and information system.
  200. Petrovic, Rade; Tehranchi, Babak; Jemili, Kanaan; Winograd, Joseph M.; Angelico, Dean-Anthony, Media monitoring, management and information system.
  201. Akers, Robyn M.; Ng, Joseph S., Method and apparatus for comparing actual use data with contract data.
  202. Northcutt, J. Duane; Hwang, Seung Ho; Lyle, James D.; Hanko, James G., Method and apparatus for content protection in a personal digital network environment.
  203. Hanko,James G.; Lavelle,Michael G.; Lyle,James D.; Northcutt,J. Duane, Method and apparatus for content protection within an open architecture system.
  204. Oliver,Huw Edward, Method and apparatus for controlling content consumption.
  205. Raley, Michael; Chen, Daniel; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for dynamic protection of static and dynamic content.
  206. Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M.; Tulley, Stephen C.; Santisi, Steven M.; Gilman, Norman C., Method and apparatus for employing flat rate play.
  207. Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M.; Tulley, Stephen C.; Santisi, Steven M.; Gilman, Norman C., Method and apparatus for employing flat rate play.
  208. Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M.; Tulley, Stephen C.; Santisi, Steven M.; Gilman, Norman C., Method and apparatus for employing flat rate play.
  209. Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M.; Tulley, Stephen C.; Santisi, Steven M.; Gilman, Norman C., Method and apparatus for employing flat rate play.
  210. Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M.; Tulley, Stephen C.; Santisi, Steven M.; Gilman, Norman C., Method and apparatus for employing flat rate play.
  211. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  212. Walker, Jay S.; Jorasch, James A.; Tedesco, Daniel E.; Gelman, Geoffrey M.; Tulley, Stephen C.; Santisi, Steven M.; Gilman, Norman C., Method and apparatus for facilitating play of a gaming device.
  213. Raley, Michael C.; Chen, Daniel C.; Wu, Hsi-Cheng; Ta, Thanh, Method and apparatus for identifying installed software and regulating access to content.
  214. Dujari, Vineet; Poo, Tze Lei, Method and apparatus for overwriting an encryption key of a media drive.
  215. Pasieka,Michael S., Method and apparatus for revocation list management.
  216. Garcia, Denis Jacques Paul, Method and apparatus for securing digital assets.
  217. Lee, Chang-Ping; Garcia, Denis Jacques Paul, Method and apparatus for securing electronic data.
  218. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  219. Vainstein, Klimenty; Nath, Satyajit; Ouye, Michael Michio, Method and apparatus for transitioning between states of security policies used to secure electronic documents.
  220. Ansper,Arne; Buidas,Ahto; Roos,Meelis; Villemson,Jan, Method and apparatus for validating a digital signature.
  221. Finseth,Craig A.; Brown,Jeffrey A.; Hsiao,Philip E., Method and apparatus for watermarking received television content.
  222. Kalantar, Sayed Javad; Zimmerman, Carey W.; Adams, Cameron; Blenkhorn, Thomas E., Method and apparatus for work management for facility maintenance.
  223. Cox,Ingemar J.; Miller,Matthew L.; Rayner,Douglas F., Method and device for inserting and authenticating a digital signature in digital data.
  224. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  225. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  226. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  227. Brown, Richard; Harrison, Keith Alexander, Method and product for sharing logged data objects within a distributed storage system.
  228. Diamond, Michael B.; White, Jonathan B., Method and system for accessing content on demand.
  229. Juneau, Rene, Method and system for auditing and correcting authorization inconsistencies for reception equipment in a content delivery network.
  230. Bushey, Robert R.; Pasquale, Theodore B.; Mills, Scott H.; Martin, John M.; Knott, Benjamin A.; Joseph, Kurt M., Method and system for automating the creation of customer-centric interfaces.
  231. Bushey,Robert R.; Pasquale,Theodore B.; Mills,Scott H.; Martin,John M.; Knott,Benjamin A.; Joseph,Kurt M., Method and system for automating the creation of customer-centric interfaces.
  232. Pasieka, Michael S., Method and system for consumer electronic device certificate management.
  233. Risan, Hank; Fitzgerald, Edward Vincent, Method and system for controlled media sharing in a network.
  234. Risan, Hank; Fitzgerald, Edward Vincent, Method and system for controlled media sharing in a network.
  235. Risan, Hank; Fitzgerald, Edward Vincent, Method and system for controlled media sharing in a network.
  236. Wiggins, Greg, Method and system for detecting changes in computer files and settings and automating the migration of settings and files to computers.
  237. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  238. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  239. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  240. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  241. Nath, Satyajit, Method and system for enabling users of a group shared across multiple file security systems to access secured files.
  242. Chao, Ching-Yun, Method and system for establishing a trust framework based on smart key devices.
  243. Kenrich, Michael Frederick; Hildebrand, Hal S.; Supramaniam, Senthilvasan, Method and system for fault-tolerant transfer of files across a network.
  244. Juneau, J. Rene, Method and system for identifying and correcting location discrepancies for reception equipment in a content delivery network.
  245. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  246. Huang, Weiqing; Supramaniam, Senthilvasan; Vainstein, Klimenty, Method and system for implementing changes to security policies in a distributed security system.
  247. Barton, Christopher J. Penrose; Inghelbrecht, Philip; Mukherjee, Dheeraj Shankar; Wang, Avery Li-Chun, Method and system for interacting with a user in an experiential environment.
  248. Barton, Christopher Jacques Penrose; Inghelbrecht, Philip; Mukherjee, Dheeraj Shankar; Li-Chun Wang, Avery, Method and system for interacting with a user in an experiential environment.
  249. Barton, Christopher Jacques Penrose; Inghelbrecht, Philip Georges; Mukherjee, Dheeraj Shankar; Wang, Avery Li-Chun, Method and system for interacting with a user in an experimental environment.
  250. Koenig, Christoph, Method and system for licensing a software product.
  251. Quoc, Michael; Dukes, Derek, Method and system for managing multiple catalogs of files on a network.
  252. Vainstein, Klimenty, Method and system for managing security tiers.
  253. Ellerman, Eloyse M.; Mount, George; Wiley, Sarah Z., Method and system for market research.
  254. Kinghorn, Gary Mark; Garcia, Denis Jacques Paul, Method and system for protecting electronic data in enterprise environment.
  255. Ryan,Nicholas M., Method and system for protecting encrypted files transmitted over a network.
  256. Chao, Ching-Yun, Method and system for protecting master secrets using smart key devices.
  257. Nath, Satyajit, Method and system for providing document retention using cryptography.
  258. Nath, Satyajit, Method and system for providing document retention using cryptography.
  259. Diamond, Michael B.; White, Jonathan B., Method and system for registering and activating content.
  260. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  261. Nath, Satyajit; Vainstein, Klimenty; Ouye, Michael Michio, Method and system for securing digital assets using process-driven security policies.
  262. Lao, Guillermo, Method and system for subscription digital rights management.
  263. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  264. Addington, Timothy H.; Robertson, Mark, Method and system for the management of targeted material insertion using a campaign manager.
  265. Watson, Stuart T., Method and system for tracking multiple information feeds on a communications network.
  266. Dicke, Ronald; Freedman, Gordon, Method and system for upselling to a user of a digital book lending library.
  267. Ryan, Nicholas M., Method and system for using remote headers to secure electronic files.
  268. McCarroll, William M., Method and system for using tamperproof hardware to provide copy protection and online security.
  269. Berstis, Viktors; Van Leeuwen, George Willard; Pritko, Steven Michael; Shaheen, Amal Ahmed, Method and system for verifying control accesses between a device on a non-proprietary bus and a device on a proprietary bus.
  270. Bushey, Robert R.; Mauney, Jennifer M., Method for categorizing, describing and modeling types of system users.
  271. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  272. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  273. Crawford,C. S. Lee, Method for controlling access within a distributed system containing at least one networked processor-based system and a plurality of non-networked processor-based systems.
  274. Ech-Chergui, Ben Youcef; Derouet, Ludovic, Method for downloading at least one software component onto a computing device, and associated computer program product, computing device and computer system.
  275. Bushey, Robert R.; Deelman, Thomas; Mauney, Jennifer M., Method for integrating user models to interface design.
  276. Bushey, Robert R.; Deelman, Thomas; Mauney, Jennifer M., Method for integrating user models to interface design.
  277. Bushey, Robert R.; Deelman, Thomas; Mauney, Jennifer M., Method for integrating user models to interface design.
  278. Bushey,Robert R.; Deelman,Thomas; Mauney,Jennifer M., Method for integrating user models to interface design.
  279. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  280. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  281. Malone, Michael F., Method for multi-media capture, transmission, conversion, metatags creation, storage and search retrieval.
  282. Malone, Michael F., Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval.
  283. Malone, Michael F., Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval.
  284. Malone, Michael F., Method for voice command activation, multi-media capture, transmission, speech conversion, metatags creation, storage and search retrieval.
  285. Crawford, C. S. Lee, Method of conducting operations for a social network application including activity list generation.
  286. Crawford, C. S. Lee, Method of conducting social network application operations.
  287. Crawford, C. S. Lee, Method of conducting social network application operations.
  288. Crawford, C. S. Lee, Method of conducting social network application operations.
  289. Bushey,Robert R.; Liddell,Gregory W.; Martin,John M.; Pasquale,Theodore, Method of designing a telecommunications call center interface.
  290. Nickerson, Rand B.; Treschl, Mark A.; Kidd, Kathryn L.; Crofoot, Matthew J.; Samata, A. Gregory; Mason, David E., Method of incorporating user reaction measurement software into particular web pages of a website.
  291. Crawford, C. S. Lee, Method of managing and communicating data pertaining to software applications for processor-based devices comprising wireless communication circuitry.
  292. Dunkeld, Bryan; Lambert, Edward, Method of providing a digital asset for distribution.
  293. Bushey,Robert R.; Martin,John M.; Mauney,Jennifer M., Method to identify and categorize customer's goals and behaviors within a customer service center environment.
  294. Cronk, Gary; Engel, Craig; Tidwell, Justin; Anaya, Luis Roberto; Herrera, Ramon; Kin, Cory; Patel, Dipan; Saginaw, Johnathan; Sami, Sohil, Methods and apparatus for audience data collection and analysis in a content delivery network.
  295. Tidwell, Justin; Anaya, Luis Roberto, Methods and apparatus for audience data collection and analysis in a content delivery network.
  296. Patel, Vipul; Miller, Scott; Shah, Mehul; Yu, Jian, Methods and apparatus for enabling media functionality in a content delivery network.
  297. Cleasby,Andrew R.; Cummings,Charles D., Methods and apparatus for establishing collaboration using browser state information.
  298. Lajoie, Michael L.; Williamson, Louis; Aissi, Wilfrid; Cholas, Chris; Gaedtke, Jason; Gould, Kenneth; Hardin, Glen; Hasek, Charles; Hegde, Vedavati; Markley, Jeffery P.; Patel, Vipul; Pfeffer, Howard, Methods and apparatus for packetized content delivery over a content delivery network.
  299. Lajoie, Michael L.; Williamson, Louis; Aissi, Wilfrid; Cholas, Chris; Gaedtke, Jason; Gould, Kenneth; Hardin, Glen; Hasek, Charles; Hegde, Vedavati; Markley, Jeffery P.; Patel, Vipul; Pfeffer, Howard, Methods and apparatus for packetized content delivery over a content delivery network.
  300. Lambert, Paul A., Methods and apparatus for selecting a device to perform shared functionality in a deterministic and fair manner in a wireless data communication system.
  301. Lambert, Paul A., Methods and apparatus for synchronizing devices in a wireless data communication system.
  302. Tidwell, Justin; Samame, Edward G.; Santangelo, Bryan, Methods and apparatus for targeted secondary content insertion.
  303. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Methods and apparatus for thwarting watermark detection circumvention.
  304. Rhoads, Geoffrey B., Methods and devices responsive to ambient audio.
  305. Rhoads, Geoffrey B., Methods and devices responsive to ambient audio.
  306. Rhoads, Geoffrey B., Methods and systems employing digital content.
  307. Rhoads, Geoffrey B.; Levy, Kenneth L., Methods and systems employing digital content.
  308. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  309. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  310. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  311. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  312. Garcia, Denis Jacques Paul; Ouye, Michael Michio; Rossmann, Alain; Crocker, Steven Toye; Gilbertson, Eric; Huang, Weiqing; Humpich, Serge; Vainstein, Klimenty; Ryan, Nicholas Michael, Methods and systems for providing access control to secured data.
  313. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  314. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  315. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  316. Scardino, Patricia, Methods of providing software over a network and related systems and computer program products.
  317. Scardino, Patricia, Methods of tracking remote software installations and registrations and related systems and computer program products.
  318. Staddon,Jessica N.; Johnson,Robert T., Methods, apparatus, and program products for inferring service usage.
  319. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  320. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  321. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  322. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  323. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  324. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  325. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  326. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  327. Jakobsson, Bjorn Markus; Juels, Ari, Mixing in small batches.
  328. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  329. Kenrich, Michael Frederick; Gutnik, Yevgeniy, Multi-level file digests.
  330. Goode,Christopher W. B., Multiple content supplier video asset scheduling.
  331. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  332. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  333. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  334. Cooper,Robin Ross; Kulakowski,Robert T., Network-based content distribution system.
  335. Corbett, Richard, Online music and other copyrighted work search and licensing system.
  336. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  337. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  338. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  339. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  340. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  341. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  342. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  343. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  344. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  345. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  346. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  347. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  348. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  349. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  350. Baratam, Vamsi Krishna; Aytek, Tolga Nihat, Parallelizing boot operations.
  351. Martinez-Guerra, Juan Carlos; Timmerman, Tina L.; Hammer, Katherine G.; Marshall, David H., Parser translator system and method.
  352. Brahmavar, Subhash Marutirao, Permanent magnet rotor and methods thereof.
  353. Donoghue, Patrick J.; Thomas, Jay, Personal media channel apparatus and methods.
  354. D'Alo, Salvatore; Di Balsamo, Arcangelo; Donatelli, Alessandro; Marinelli, Claudio, Planning assignment of software licenses.
  355. Davis, Derek L.; Herbert, Howard C., Platform and method for assuring integrity of trusted agent communications.
  356. Bezilla, Daniel Bailey; Immordina, John Leonard; Le Ogura, James, Policy based selection of remediation.
  357. Bezilla, Daniel B.; Immordino, John L.; Le Ogura, James, Policy-based selection of remediation.
  358. Bezilla, Daniel B.; Immordino, John L.; Ogura, James Le, Policy-based selection of remediation.
  359. Bezilla, Daniel B.; Immordino, John L.; Ogura, James Le, Policy-based selection of remediation.
  360. Bezilla, Daniel B.; Immordino, John L.; Ogura, James Le, Policy-based selection of remediation.
  361. Bezilla, Daniel Bailey; Immordino, John Leonard; Ogura, James Le, Policy-based selection of remediation.
  362. Duncan, Bruce, Portable device for storing media content.
  363. Frank, Scott M.; Koch, Robert A.; Kuester, Jeffrey R., Potential realization system with electronic communication processing for conditional resource incrementation.
  364. Frank, Scott M.; Koch, Robert A.; Kuester, Jeffrey R., Potential realization system with electronic communication processing for conditional resource incrementation.
  365. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M; Wong, Douglas, Pre-processed information embedding system.
  366. Wong, Douglas; Lee, Chong, Pre-processed information embedding system.
  367. Chu, Chee Hoe; Zhou, Wei; Zheng, Ping; Chang, Po-Chien, Preloading an application while an operating system loads.
  368. Apparao, Vidur; Bandhauer, John; Waterson, Christopher, Process and system for locating a media asset based on audit trail information incorporated into the asset itself.
  369. Apparao, Vidur; Bandhauer, John; Waterson, Christopher, Processes and system for accessing externally stored metadata associated with a media asset using a unique identifier incorporated into the asset itself.
  370. Srinivasan, Pramila; Princen, John, Programming non-volatile memory in a secure processor.
  371. Srinivasan, Pramila; Princen, John, Programming on-chip non-volatile memory in a secure processor using a sequence number.
  372. Srinivasan, Pramila; Princen, John, Programming on-chip non-volatile memory in a secure processor using a sequence number.
  373. Srinivasan, Pramila; Princen, John, Programming on-chip non-volatile memory in a secure processor using a sequence number.
  374. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  375. Ryan, Nicholas M., Protecting encrypted files transmitted over a network.
  376. Brahmavar, Subhash Marutirao; Manz, Lester Benjamin; Chretien, Ludovic Andre; Rashidzadeh, Changiz; Ionel, Dan Mircea, Radially embedded permanent magnet rotor and methods thereof.
  377. Brahmavar, Subhash Marutirao; Manz, Lester Benjamin; Chretien, Ludovic Andre; Rashidzadeh, Changiz; Ionel, Dan Mircea, Radially embedded permanent magnet rotor and methods thereof.
  378. Kingrey, Harold Clifton; Brahmavar, Subhash Marutirao; Figgins, Daniel Shawn; Kreidler, Jason Jon; Barry, Andrew Craig; Pierre, David Michael; Rashidzadeh, Changiz, Radially embedded permanent magnet rotor and methods thereof.
  379. Manz, Lester Benjamin; Brahmavar, Subhash Marutirao; Rashidzadeh, Changiz; Kreidler, Jason Jon; Kingrey, Harold Clifton, Radially embedded permanent magnet rotor and methods thereof.
  380. Figgins, Daniel Shawn; Marks, Michael Allen, Radially embedded permanent magnet rotor having magnet retention features and methods thereof.
  381. Fujii, Yoshihiro; Yoshida, Takuya; Okada, Koji, Re-encrypted data verification program, re-encryption apparatus and re-encryption system.
  382. Nickerson, Rand B.; Treschl, Mark A.; Rudman, Jay S.; Krebs, Mark D., Receiving and reporting page-specific user feedback concerning one or more particular web pages of a website.
  383. Nickerson,Rand B.; Treschl,Mark A.; Rudman,Jay S., Receiving and reporting page-specific user feedback concerning one or more particular web pages of a website.
  384. Nickerson,Rand B.; Treschl,Mark A.; Rudman,Jay S.; Krebs,Mark D., Receiving and reporting page-specific user feedback concerning one or more particular web pages of a website.
  385. Nickerson, Rand B.; Treschl, Mark A.; Rudman, Jay S., Receiving page-specific user feedback concerning one or more particular web pages of a website.
  386. Kimble, David; Chin, Fee Ling, Recommendation engine apparatus and methods.
  387. Fukuda, Shinichi, Recording and reproducing apparatus, recording and reproducing method, and data processing apparatus.
  388. Morohashi, Akihiro, Recording and/or reproducing apparatus, portable recording and reproducing apparatus, data transfer system, data transfer method, and data recording and reproducing method.
  389. Morohashi, Akihiro, Recording and/or reproducing apparatus, portable recording and reproducing apparatus, data transfer system, data transfer method, and data recording and reproducing method.
  390. Yoshida, Shuichi; Okada, Takanori; Kuno, Yoshiki; Komeno, Jyun-ichi; Koudo, Toshikazu; Shimizu, Ryosuke; Kubo, Noriaki, Recording apparatus, reproduction apparatus, data processing apparatus, recording and reproduction apparatus and data transmission apparatus and corresponding methods.
  391. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  392. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  393. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  394. Shitara, Teruyuki; Mayama, Ichiro; Yamada, Eiichi, Reproducing apparatus and information distribution system.
  395. Shitara,Teruyuki; Mayama,Ichiro; Yamada,Eiichi, Reproducing apparatus and information distribution system.
  396. Chung,Hyun kwon; Heo,Jung kwon, Reproducing apparatus and server system providing additional information therefor.
  397. Chung,Hyun kwon; Heo,Jung kwon, Reproducing apparatus and server system providing additional information therefor.
  398. Lee, Lane W.; Feldman, Timothy R.; Rayburn, Douglas M.; Kiwimagi, Gary G., Revocation method and apparatus for secure content.
  399. Raley, Michael C.; Gilliam, Charles P.; Ham, Manual; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  400. Morita, Toshihiro; Kori, Takayuki; Sakurai, Mikiko, Rights information processing apparatus and method, and program storing medium using a display object for associating with contents.
  401. England, Paul; Peinado, Marcus, Saving and retrieving data based on symmetric key encryption.
  402. Winograd, Joseph M.; Johnson, Peter Russell; Houle, William Carl, Second screen content.
  403. Winograd, Joseph M.; Petrovic, Rade; Zhao, Jian, Secure and efficient content screening in a networked environment.
  404. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  405. Diamond, Michael B.; White, Jonathan B.; Daniell, Piers J., Secure content enabled drive digital rights management system and method.
  406. Diamond, Michael B.; White, Jonathan B.; Daniell, Piers J., Secure content enabled drive system and method.
  407. Johnson,Harold J.; Chow,Stanley T., Secure method and system for handling and distributing digital media.
  408. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  409. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  410. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  411. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  412. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  413. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  414. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  415. Garcia,Denis Jacques Paul, Secured data format for access control.
  416. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  417. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  418. Winkler,Steven Thomas; Friedrich,Michael Andreas; Risch,Armin, Security service for an electronic marketplace.
  419. Hildebrand, Hal S.; Garcia, Denis Jacques Paul, Security system for generating keys from access rules in a decentralized manner and methods therefor.
  420. Gutnik, Yevgeniy, Security system that uses indirect password-based encryption.
  421. Vainstein, Klimenty; Ouye, Michael Michio, Security system with staging capabilities.
  422. Kortum, Philip Ted; Bushey, Robert R., Sequential presentation of long instructions in an interactive voice response system.
  423. Kortum,Philip Ted; Bushey,Robert R., Sequential presentation of long instructions in an interactive voice response system.
  424. Kortum,Philip Ted; Bushey,Robert R., Sequential presentation of long instructions in an interactive voice response system.
  425. Hayashi, Ryotaro; Matsushita, Tatsuyuki; Fujii, Yoshihiro; Yoshida, Takuya; Okada, Koji, Server apparatus and program to re-encrypt ciphertext data.
  426. Baerlocher, Anthony J.; Iddings, Cara L.; Schneider, Richard J., Server based gaming system having multiple progressive awards.
  427. Baerlocher, Anthony J.; Iddings, Cara L.; Schneider, Richard J., Server based gaming system having multiple progressive awards.
  428. Breckner, Robert E.; Benbrahim, Jamal; Vasquez, James A.; Bansemer, Mark W.; Baerlocher, Anthony J., Server based gaming system having multiple progressive awards.
  429. Iddings, Cara L.; Dewaal, Daniel; Bullard, Bryan D.; Little, Chad; Manfredi, Vince; Schneider, Richard J., Server based gaming system having multiple progressive awards.
  430. Iddings, Cara L.; Dewaal, Daniel; Bullard, Bryan; Little, Chad; Manfredi, Vince; Schneider, Richard J., Server based gaming system having multiple progressive awards.
  431. Vasquez, James A.; Baerlocher, Anthony J.; Jones, Aaron T.; Bansemer, Mark W., Server based gaming system having multiple progressive awards.
  432. Baerlocher, Anthony J.; Schneider, Richard J.; Iddings, Cara L., Server based gaming system having system triggered loyalty award sequences.
  433. Baerlocher, Anthony J.; Schneider, Richard J.; Iddings, Cara L., Server based gaming system having system triggered loyalty award sequences.
  434. Baerlocher, Anthony J.; Schneider, Richard J.; Iddings, Cara L., Server based gaming system having system triggered loyalty award sequences.
  435. Graham, Jacob; Schlottmann, Greg; Low, Michael N.; Baerlocher, Anthony J.; Schneider, Richard J.; Iddings, Cara L., Server based gaming system having system triggered loyalty award sequences.
  436. Graham, Jacob; Schlottmann, Greg; Low, Michael N.; Baerlocher, Anthony J.; Schneider, Richard J.; Iddings, Cara L., Server based gaming system having system triggered loyalty award sequences.
  437. Iddings, Cara L.; Baerlocher, Anthony J.; Schneider, Richard J., Server based gaming system having system triggered loyalty award sequences.
  438. Iddings, Cara L.; Baerlocher, Anthony J.; Schneider, Richard J., Server based gaming system having system triggered loyalty award sequences.
  439. Iddings, Cara L.; Baerlocher, Anthony J.; Schneider, Richard J., Server based gaming system having system triggered loyalty award sequences.
  440. Iddings, Cara L.; Baerlocher, Anthony J.; Schneider, Richard J., Server based gaming system having system triggered loyalty award sequences.
  441. Iddings, Cara L.; Baerlocher, Anthony J.; Schneider, Richard J., Server based gaming system having system triggered loyalty award sequences.
  442. Tehranchi, Babak; Petrovic, Rade; Winograd, Joseph M.; Angelico, Dean Anthony, Signal continuity assessment using embedded watermarks.
  443. Winograd, Joseph M., Social media viewing system.
  444. Wilson, Patrick D.; Teixeira, Joao C.; George, Kenneth V.; Workman, Adam C., Software license authorization system.
  445. Nickerson, Rand B.; Treschl, Mark A., Soliciting user feedback regarding one or more web pages of a website without obscuring visual content.
  446. Yen, Wei; Blythe, David; Princen, John; Srinivasan, Pramila, Static-or-dynamic and limited-or-unlimited content rights.
  447. Rhoads, Geoffrey B.; Carr, J. Scott, Steganographic data hiding using a device clock.
  448. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  449. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  450. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  451. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  452. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  453. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  454. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  455. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Bell,Jeffrey R. C., Structure of a digital content package.
  456. Hurtado, Marco M.; Mahlbacher, James C.; Spagna, Richard L., Super-distribution of protected digital content.
  457. Liu, Yeu; Pandya, Ravi; Ivanov, Lazar; Paramasivam, Muthukrishnan; Gunyakti, Caglar; Gui, Dongmei; Hsu, Scott W. P., Supplementary trust model for software licensing/commercial digital distribution policy.
  458. Lockhart, Kevin R.; Wooden, Richard D.; Zigler, Jeffrey D.; Lockhart, Jacqueline J., Synchronization of preferred perishable content.
  459. Doherty, Robert J.; Tierney, Peter L.; Arnaoutoglou-Andreou, Marios, System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files.
  460. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  461. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  462. Borthakur, Dhrubajyoti; Premo, Nur; Pasqua, Joseph, System and method for applying a file system security model to a query system.
  463. Packes, Jr., John M.; Steib, Michael F.; Golden, Andrew P.; Jorasch, James A.; Walker, Jay S.; Sparico, Thomas M., System and method for automated play of lottery games.
  464. Packes, Jr., John M.; Steib, Michael F.; Golden, Andrew P.; Jorasch, James A.; Walker, Jay S.; Sparico, Thomas M., System and method for automated play of lottery games.
  465. Kasperkiewicz,Tomasz S. M.; Brodie,Alexander S.; Parlin,David R.; Xu,Jingyang; Frigon,Kathleen M.; Dart,Scott E.; Yuan,Po, System and method for automatically grouping items.
  466. Smith, Gregory J.; Scott, Robert Paxton, System and method for automatically tracking and enabling the operation of a product.
  467. Borthakur,Dhrubajyoti; Pashenkov,Serge, System and method for chunk-based indexing of file system content.
  468. Borthakur,Dhrubajyoti; Premo,Nur, System and method for communicating file system events using a publish-subscribe model.
  469. Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M.; Fincham, Magdalena M.; Santisi, Steven M.; Gilman, Norman C.; Sparico, Thomas M., System and method for communicating game session information.
  470. Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M.; Fincham, Magdalena M.; Santisi, Steven M.; Gilman, Norman C.; Sparico, Thomas M., System and method for communicating game session information.
  471. Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M.; Fincham, Magdalena M.; Santisi, Steven M.; Gilman, Norman C.; Sparico, Thomas M., System and method for communicating game session information.
  472. Stefik, Mark J.; Pirolli, Peter L. T., System and method for controlling utilization of content.
  473. Borthakur,Dhrubajyoti; Premo,Nur; Pasqua,Joseph, System and method for detecting and storing file content access information within a file system.
  474. Borthakur,Dhrubajyoti; Premo,Nur, System and method for detecting and storing file identity change information within a file system.
  475. Reed,Erik James, System and method for detecting and verifying digitized content over a computer network.
  476. Borthakur, Dhrubajyoti; Premo, Nur; Pasqua, Joseph, System and method for determining file system data integrity.
  477. Decuir,John David, System and method for determining genre of audio.
  478. Frank,Scott M.; Beckham,Carol T.; McLendon,Martin; Short,Shannon M.; Bishop,Michael; Meadows,Vernon; Overcash,Steven, System and method for determining the marketability of intellectual property assets.
  479. Frank, Scott M.; Beckham, Carol T.; McLendon, Martin L.; Short, Shannon M.; Bishop, Michael, System and method for developing and implementing intellectual property marketing.
  480. Frank,Scott M.; Beckham,Carol T.; McLendon,Martin L.; Short,Shannon M.; Bishop,Michael, System and method for developing and implementing intellectual property marketing.
  481. Juszkiewicz,Henry E., System and method for distributing music to customers over the internet using uniquely identified proprietary devices.
  482. Addington, Timothy H., System and method for distributing network-based personal video.
  483. Borthakur, Dhrubajyoti; Premo, Nur; Harmer, Craig K., System and method for efficient file content searching within a file system.
  484. Borthakur, Dhrubajyoti; Premo, Nur; Pasqua, Joseph, System and method for file system content processing.
  485. Borthakur, Dhrubajyoti; Premo, Nur, System and method for generating extensible file system metadata.
  486. Yen,Wei; Blythe,David; Princen,John; Srinivasan,Pramila, System and method for generating new licenses.
  487. Ryan, Nicholas, System and method for imposing security on copies of secured items.
  488. Silverman, Robert M., System and method for issuing, circulating and trading financial instruments with smart features.
  489. Frank, Scott M.; Beckham, Carol T.; Arena, Christopher M.; McLendon, Martin L.; Short, Shannon M.; Sherman, JoAnn M.; Overcash, Steven; Bishop, Michael; Meadows, Vernon; Baker, LaVeria; Sherwood, Amy; Ehrlich, Mary Van; Stevens, Michael Charles; Jaffe, Adam, System and method for managing intellectual property.
  490. Frank, Scott M.; Beckham, Carol T.; Arena, Christopher M.; McLendon, Martin L.; Short, Shannon M.; Sherman, JoAnn M.; Overcash, Steven; Bishop, Michael; Meadows, Vernon; Baker, LaVeria; Sherwood, Amy; Van Ehrlich, Mary; Stevens, Michael Charles; Jaffe, Adam, System and method for managing intellectual property.
  491. Frank, Scott M.; Beckham, Carol T.; Arena, Christopher M.; McLendon, Martin L.; Short, Shannon M.; Sherman, JoAnn M.; Overcash, Steven; Bishop, Michael; Meadows, Vernon; Baker, LaVeria; Sherwood, Amy; Van Ehrlich, Mary; Stevens, Michael Charles; Jaffe, Adam, System and method for managing intellectual property.
  492. Frank,Scott M.; Beckham,Carol T.; Arena,Christopher M.; McLendon,Martin L.; Short,Shannon M.; Sherman,JoAnn M.; Overcash,Steven; Bishop,Michael; Meadows,Vernon; Baker,LaVeria; Sherwood,Amy; Van Ehrlich,Mary; Stevens,Michael Charles; Jaffe,Adam, System and method for managing intellectual property.
  493. Frank, Scott M.; Beckham, Carol T.; McLendon, Martin L.; Short, Shannon M.; Bishop, Michael; Sharpley, Maia Y., System and method for managing intellectual property life cycles.
  494. Frank, Scott M.; Beckham, Carol T.; McLendon, Martin L.; Short, Shannon M.; Bishop, Michael; Sharpley, Maia Y., System and method for managing intellectual property life cycles.
  495. Frank,Scott M.; Beckham,Carol T.; McLendon,Martin L.; Short,Shannon M.; Bishop,Michael; Sharpley,Maia Y., System and method for managing intellectual property life cycles.
  496. Delgado, Marcus; Evans, Sandra J.; Lantz, Harrison P.; Sherwood, Amy L.; Furth, David L., System and method for managing sponsorships.
  497. Delgado, Marcus; Evans, Sandra J.; Lantz, Harrison P.; Sherwood, Amy L.; Furth, David L., System and method for managing sponsorships.
  498. Delgado, Marcus; Evans, Sandra J.; Lantz, Harrison P.; Sherwood, Amy L.; Furth, David L., System and method for managing sponsorships.
  499. Delgado,Marcus; Evans,Sandra J.; Lantz,Harrison P.; Sherwood,Amy L.; Furth,David L., System and method for managing sponsorships.
  500. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, System and method for managing transaction record delivery using an acknowledgement-monitoring process and a failure-recovery process with modifying the predefined fault condition.
  501. Frank, Scott M.; Beckham, Carol T.; McLendon, Martin L.; Short, Shannon M.; Tinker, Frank; Rooks, Monica; Bishop, Michael; Meadows, Vernon; Baker, La Veria; Moffi, Diane; Eason, Wendy; Sherman, JoAnn M., System and method for marketing, managing, and maintaining intellectual property.
  502. Nickerson, Rand B.; Treschl, Mark A.; Williams, Jr., Charles H.; Arnaud, Sebastien J.; Hunter, Kennith G., System and method for measuring and reporting user reactions to advertisements on a web page.
  503. Nickerson, Rand B.; Treschl, Mark A.; Kidd, Kathryn L.; Crofoot, Matthew J.; Samata, A. Gregory; Mason, David E., System and method for measuring and reporting user reactions to particular web pages of a website.
  504. Nickerson, Rand B.; Treschl, Mark A.; Wolfe, Sean E., System and method for mobile interaction.
  505. Shear, Jeffrey A.; Starosta, Dmitry; Scholnick, Iain, System and method for online content licensing and distribution.
  506. Stefik, Mark J.; Pirolli, Peter L. T., System and method for permitting use of content using transfer rights.
  507. Borthakur, Dhrubajyoti; Premo, Nur, System and method for providing a programming-language-independent interface for querying file system content.
  508. Lockhart, Kevin R.; Wooden, Richard D.; Zigler, Jeffrey D.; Lockhart, Jacqueline J., System and method for providing a radio-like experience.
  509. Hildebrand, Hal S., System and method for providing different levels of key security for controlling access to secured items.
  510. Hildebrand, Hal S.; Vainstein, Klimenty, System and method for providing distributed access control to secured documents.
  511. Nickerson, Rand B.; Treschl, Mark A., System and method for providing intelligent support.
  512. Zuili, Patrick; Vainstein, Klimenty, System and method for providing manageability to security information for secured items.
  513. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  514. Vainstein, Klimenty; Hildebrand, Hal, System and method for providing multi-location access management to secured items.
  515. Borthakur,Dhrubajyoti; Premo,Nur, System and method for providing programming-language-independent access to file system content.
  516. Hamilton, Graham, System and method for providing traceable acknowledgement of a digital data distribution license.
  517. Borthakur, Dhrubajyoti; Premo, Nur; Pasqua, Joseph, System and method for querying file system content.
  518. Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M.; Suarez, Jose A.; Sparico, Thomas M., System and method for remote automated play of a gaming device.
  519. Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M.; Suarez, Jose A.; Sparico, Thomas M., System and method for remote automated play of a gaming device.
  520. Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M.; Suarez, Jose A.; Sparico, Thomas M., System and method for remote automated play of a gaming device.
  521. Walker,Jay S.; Jorasch,James A.; Gelman,Geoffrey M.; Suarez,Jose A.; Sparico,Thomas M., System and method for remote automated play of a gaming device.
  522. Nickerson, Rand B.; Treschl, Mark A.; Kidd, Kathryn L.; Crofoot, Matthew J.; Samata, A. Gregory; Mason, David E., System and method for reporting to a website owner user reactions to particular web pages of a website.
  523. Nickerson,Rand B.; Treschl,Mark A.; Kidd,Kathryn L.; Crofoot,Matthew J.; Samata,A. Gregory; Mason,David E., System and method for reporting to a website owner user reactions to particular web pages of a website.
  524. Frank, Scott M.; Beckham, Carol T.; Arena, Christopher M.; Evans, Sandra J.; McLendon, Martin L.; Short, Shannon M.; Bishop, Michael; Meadows, Vernon; Delgado, Marcus; Lantz, Harrison; Sherwood, Amy L., System and method for selecting and protecting intellectual property assets.
  525. Frank, Scott M.; Beckham, Carol T.; Arena, Christopher M.; Evans, Sandra J.; McLendon, Martin L.; Short, Shannon M.; Bishop, Michael; Meadows, Vernon; Delgado, Marcus; Lantz, Harrison; Sherwood, Amy L., System and method for selecting and protecting intellectual property assets.
  526. Frank, Scott M.; Beckham, Carol T.; Arena, Christopher M.; Evans, Sandra J.; McLendon, Martin L.; Short, Shannon M.; Bishop, Michael; Meadows, Vernon; Delgado, Marcus; Lantz, Harrison; Sherwood, Amy L., System and method for selecting and protecting intellectual property assets.
  527. Frank,Scott M.; Beckham,Carol T.; Arena,Christopher M.; Evans,Sandra J.; McLendon,Martin L.; Short,Shannon M.; Bishop,Michael; Meadows,Vernon; Delgado,Marcus; Lantz,Harrison; Sherwood,Amy L., System and method for selecting and protecting intellectual property assets.
  528. Dunkeld, Bryan C.; Lambert, Edward M., System and method for unique digital asset identification and transaction management.
  529. Dunkeld, Bryan; Lambert, Edward, System and method for unique digital asset identification and transaction management.
  530. Kelly, J. Keith; Edmondson, Peter S., System and method of managing registration, sale, distribution and use of regulated agricultural products and the licensing/certification of dealers and applicators of agricultural products.
  531. Duane,William; R철stin,Peter, System and methods for maintaining and distributing personal security devices.
  532. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  533. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  534. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  535. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  536. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  537. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  538. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  539. Negishi, Hirokazu; Nagasawa, Kenichi; Teshima, Yoshisuke; Sugikubo, Toshihiro, System for and method of searching music data, and recording medium for use therewith.
  540. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  541. Malone, Michael F.; Murphy, Frederick J., System for embedding searchable information, encryption, signing operation, transmission, storage and retrieval.
  542. Apparao, Vidur; Bandhauer, John; Waterson, Christopher, System for incorporating information about a source and usage of a media asset into the asset itself.
  543. Apparao,Vidur; Bandhauer,John; Waterson,Christopher, System for incorporating information about a source and usage of a media asset into the asset itself.
  544. Dewing,Shane R.; Woodham,Braxton; Biggs,Wesley W.; Evans, III,Harry C.; Bendar,Scott A., System for supporting production, management and delivery of media content for wireless devices.
  545. Gruse, George Gregory; Dorak, Jr., Jonn J.; Milsted, Kenneth Louis, System for tracking end-user electronic content usage.
  546. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph, System reactions to the detection of embedded watermarks in a digital host content.
  547. Phadke, Madhav S; Phadke, Kedar M, System, method and apparatus for securely distributing content.
  548. Phadke, Madhav S; Phadke, Kedar M, System, method and apparatus for securely distributing content.
  549. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  550. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  551. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  552. Crawford,C. S. Lee, Systems and methods for controlling access within a system of networked and non-networked processor-based systems.
  553. Valenzuela, Edgardo; Chen, Eddie J.; DeMartini, Thomas; Fung, Joseph Zhung Yee; Nguyen, Mai; Tieu, Vincent Hsiang; Tran, Duc, Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates.
  554. Bell,David G.; Liang,Anthony Tao; Garnaat,Mitch; Brun Cottan,Francoise, Systems and methods for distributed administration of public and private electronic markets.
  555. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  556. Lai, William Yanwah; Liffick, Steven M., Systems and methods for sending coordinated notifications.
  557. Lai,William Yanwah; Liffick,Steve M., Systems and methods for sending coordinated notifications.
  558. Guerrieri, David A.; Guerrieri, Mario Antonio, Systems and methods of determining microroyalties.
  559. Walker, Jay S.; Jorasch, James A.; Tedesco, Robert C., Systems, methods and apparatus for facilitating a flat rate play session on a gaming device and example player interfaces to facilitate such.
  560. Walker, Jay S.; Smith, Zachary T.; Fincham, Magdalena M., Systems, methods and devices for providing an indication of an amount of time a wagering game may be expected to be played given a specified bankroll or an estimated bankroll which may be expected to be necessary to fund play of a wagering game for a specified amount of time.
  561. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  562. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  563. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  564. Bushey,Robert R.; Bowen,Yanira Marbella; Lawrence,Ruth Elaine; Martin,John Mills; Quackenbush,Denise; Simon,Rachel Beth, Telephone call processing in an interactive voice response call management system.
  565. Lockhart, Kevin R.; Wooden, Richard D.; Zigler, Jeffrey D.; Lockhart, Jacqueline J., Third party delivery of preferred perishable content.
  566. Petrovic, Rade; Downes, Patrick George, Time varying evaluation of multimedia content.
  567. Apparao, Vidur; Bandhauer, John; Waterson, Christopher Robert, Tracking source and transfer of a media asset.
  568. Apparao, Vidur; Bandhauer, John; Waterson, Christopher Robert, Tracking source and usage of a media asset.
  569. Apparao, Vidur; Bandhauer, John; Waterson, Christopher Robert, Tracking usage of a media asset.
  570. Zhao, Jian; Mercier, Guillaume, Transactional video marking system.
  571. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  572. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  573. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  574. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  575. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  576. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  577. Vadavia, Rajesh; Castravelli, Claudio, Video and multimedia distribution system.
  578. Vadavia, Rajesh; Castravelli, Claudio, Video and multimedia distribution system.
  579. D'Mello, Kurt; Tyree, David Spencer; Gandhe, Sudhir, Vulnerability-based remediation selection.
  580. D'Mello, Kurt; Tyree, David Spencer; Gandhe, Sudhir, Vulnerability-based remediation selection.
  581. Winograd, Joseph M.; Petrovic, Rade; Zhao, Jian, Watermark extraction and content screening in a networked environment.
  582. Petrovic, Rade; Atti, Venkatraman, Watermark extraction based on tentative watermarks.
  583. Petrovic, Rade; Winograd, Joseph M.; Downes, Patrick George, Watermark extractor enhancements based on payload ranking.
  584. Watson,Stephen; Collens,Daniel A.; Hui,Kevin; Malcolm,Michael A., Watermarking and fingerprinting digital content using alternative blocks to embed information.
  585. Watson,Stephen; Collens,Daniel A.; Hui,Kevin; Malcolm,Michael A., Watermarking and fingerprinting digital content using alternative blocks to embed information.
  586. Tehranchi, Babak; Petrovic, Rade, Watermarking in an encrypted domain.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로