$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Key management system for digital content player 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-017/00
출원번호 US-0203307 (1998-12-01)
발명자 / 주소
  • George Gregory Gruse
  • Marco M. Hurtado
  • Kenneth Louis Milsted
  • Jeffrey B. Lotspiech
출원인 / 주소
  • International Business Machines Corporation
대리인 / 주소
    Steven J. Meyers
인용정보 피인용 횟수 : 266  인용 특허 : 62

초록

A method of managing keys used by a digital content player on a computer system. According to the method, digital content data encrypted with a first encrypting key is decrypted using a first decrypting key, and re-encrypted using a second encrypting key. A second decrypting key is encrypted using a

대표청구항

1. A method of managing keys used by a digital content player on a user system, said method comprising the steps of:decrypting encrypted digital content data using a first decrypting key to produce content data, the encrypted content data having been produced by encrypting the content data with a fi

이 특허에 인용된 특허 (62)

  1. Schulhof Nathan (Los Gatos CA) Janky James M. (Los Altos CA), Apparatus for distributing subscription and on-demand audio programming.
  2. Gates Geoffrey W. (Woodridge IL) Kepley Garry D. (Wheaton IL), Arrangement for deleting trailing message portions.
  3. Penn Steven C. (Georgetown TX) Wilkes Michael D. (Austin TX), Audio editor display interface.
  4. Molva Refik (Juan-Les-Pins EPX) Tsudik Gene (Thalwil EPX), Authentication method and system with a smartcard.
  5. Matyas Stephen M. (Kingston NY) Oseas Jonathan (Hurley NY), Code protection using cryptography.
  6. Chelliah Raman ; Cornez Jason S. ; Dellar Carl ; Harrison Stephen ; Hempe John A. ; Hsu Chih-Cheng ; Golin Eric J. ; Price Charles A. ; Rutta Neal S. ; Wood Thomas A. ; Yamamoto Wayne K., Computer system and method for electronic commerce.
  7. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus having program authorization information data structures.
  8. Angelo Michael F. ; Driscoll Daniel J., Copy protection for recorded media.
  9. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  10. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  11. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  12. Horne Donald R. (Don Mills CAX) Jeffers John M. (Downsview CAX), Cryptographic system using interchangeable key blocks and selectable key fragments.
  13. Reeds ; III James A. (New Providence NJ), Cryptosystem for cellular telephony.
  14. Saito Makoto,JPX ; Okazaki Shoichi,JPX, Data copyright management system.
  15. Saito Makoto,JPX, Data management system.
  16. Saito Makoto,JPX, Data management system.
  17. Blatter Harold ; Horlander Thomas Edward ; Bridgewater Kevin Elliott ; Deiss Michael Scott, Decoding system for processing encrypted broadcast, cable or satellite video data.
  18. Shima George T. (Tokyo JPX), Decryption of messages employing unique control words and randomly chosen decryption keys.
  19. Hashimoto Yoshitaka (Chofu JPX) Yamamoto Kaichi (Zama JPX) Shirota Norihisa (Atsugi JPX), Digital video data recording apparatus.
  20. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Efficient digital signature algorithm and use thereof technical field.
  21. Petrie ; Jr. Charles J. (Palo Alto CA) Allen Wayne P. (Leander TX), Electronic proof of receipt.
  22. Shima George T. (Tokyo JPX), Encrtption of messages employing unique control words and randomly chosen encryption keys.
  23. Hellman Martin E. (Stanford CA) Pohlig Stephen C. (Acton MA), Exponentiation cryptographic apparatus and method.
  24. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Fair cryptosystems and methods of use.
  25. McLaughlin Robert (Arlington VA) Bullen M. James (Oakville CAX), Information service control point which retreives information as blocks of data.
  26. McLaughlin Robert (Arlington VA) Bullen M. James (Oakville CAX), Information service control point, which uses different types of storage devices, which retrieves information as blocks.
  27. Garber Sharon R. (Crystal MN) Kozak Darryn J. (New Brighton MN) Kruse John M. (Minneapolis MN) Clare Mark K. (Fort Wayne IN), Intelligent optical navigator dynamic information presentation and navigation system.
  28. Aziz Ashar (Fremont CA), Method and apparatus for a key-management scheme for internet protocols.
  29. Pastor Jose (Westport CT) Barton Maya R. (Ridgefield CT), Method and apparatus for generating encryption/decryption key.
  30. Diffie Whitfield (Mountain View CA) Aziz Ashar (Fremont CA), Method and apparatus for privacy and authentication in wireless networks.
  31. Kaufman Charles W. (Northboro MA) Gasser Morrie (Hopkinton MA) Lampson Butler W. (Cambridge MA) Tardo Joseph J. (Concord MA) Alagappan Kannan (Cambridge MA), Method and apparatus for protecting the confidentiality of passwords in a distributed data processing system.
  32. Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
  33. Leighton Frank T. (965 Dedham St. Newton Center MA 02159) Micali Silvio (224 Upland Rd. Cambridge MA 02140), Method and system for personal identification.
  34. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for certifying public keys in a digital signature scheme.
  35. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for certifying public keys in a digital signature scheme.
  36. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
  37. Leighton Frank T. (459 Chestnut Hill Ave. Newtonville MA) Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for enabling users of a cryptosystem to generate and use a private pair key for enciphering communications betwee.
  38. Mniszewski Susan M. (Los Alamos NM) Springer Edward A. (Los Alamos NM) Brenner David P. (North Collins NY), Method for encryption and transmission of digital keying data.
  39. Schnorr Claus P. (Frankfurterstr. 81 6350 Bad Nauheim DEX), Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system.
  40. Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA), Method for performing group exclusion in hierarchical group structures.
  41. Perlman Radia J. (Acton MA) Kaufman Charles W. (Northborough MA), Method of issuance and revocation of certificates of authenticity used in public key networks and other systems.
  42. Bugajski Joseph M. (Ypsilanti MI), Method of storing compressed data for accelerated interrogation.
  43. Bird Raymond F. (Durham NC) Herzberg Amir (Bronx NY) Janson Philippe A. (Zurich NJ CHX) Kutten Shay (Rockaway NJ) Molva Refik A. (Juan les Pins NY FRX) Yung Marcel M. (New York NY), Multi-party secure session/conference.
  44. Goldwasser Shafi (Cambridge MA) Kilian Joseph (Cambridge MA) Wigderson Avi (Jerusalem ILX) Ben-Or Michael (Jerusalem ILX), Multiprover interactive verification system.
  45. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  46. Fischer Addison M. (60 14th Ave. S. Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  47. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  48. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  49. Brands Stefanus A. (Ina Boudier-Bakkerlaan 143 (iii) XW Utrecht NLX 3582 ), Secret-key certificates.
  50. Citta Richard W. (Oak Park IL) Gosc Paul M. (Buffalo Grove IL) Mutzabaugh Dennis M. (Mt. Prospect IL) Sgrigonoli Gary J. (Mt. Prospect IL), Secure data packet transmission system and method.
  51. Cordery Robert A. ; Lee David K. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A., Secure user certification for electronic commerce employing value metering system.
  52. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Simultaneous electronic transactions.
  53. Tindell Elbert G. (Dallas TX) Crawford Kyle (Grand Prarie TX), Store and forward video system.
  54. Howell William E. (North Richland Hills TX) Reddy Hari N. (Grapevine TX) Wang Diana S. (Trophy Club TX), System for controlling group access to objects using group access control folder and group identification as individual.
  55. Nakashima Kazuo,JPX ; Nakahara Masaru,JPX ; Itami Satoshi,JPX ; Utsumi Kenichi,JPX, System for decrypting encrypted software.
  56. Martin John R. (Rockford IL) Tillery Michael L. (Rockford IL) Zammuto Samuel N. (Rockford IL), System for managing a plurality of computer jukeboxes.
  57. Freeny ; Jr. Charles C. (Fort Worth TX), System for reproducing information in material objects at a point of sale location.
  58. Hartman ; Jr. Robert C. (Woodside CA), System for seamless processing of encrypted and non-encrypted data and instructions.
  59. Hair Arthur R. (Pittsburgh PA), System for transmitting desired digital video or audio signals.
  60. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  61. Takano Shigeru (Ibaraki JPX) Henmi Hidemi (Otsu JPX) Nakahigashi Hideto (Osaka JPX) Sakamoto Ken (Takatsuki JPX), Text broadcast receiver.
  62. Robers Klaas H. J. (Eindhoven NLX), Video translation system for translating a binary coded data signal into a video signal and vice-versa.

이 특허를 인용한 특허 (266)

  1. Tsai, Daniel E., AD-HOC web content player.
  2. Yu, Hong Heather; Gelman, Alexander D.; Fish, Robert S., Active data hiding for secure electronic media distribution.
  3. Hoffberg, Steven M., Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore.
  4. Ushiku, Toyohiko, Apparatus and method of generating document.
  5. Rhoads, Geoffrey B.; Gustafson, Ammon E., Apparatus to process images and video.
  6. Takagi, Satoshi; Yanagita, Noboru; Abe, Keiko, Asset management system and asset management method.
  7. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  8. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  9. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  10. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  11. Plastina, Daniel; Novak, Michael, Associating image files with media content.
  12. Plastina,Daniel; Novak,Michael, Associating image files with media content.
  13. Fischer,Addison M.; Protheroe,Robert L., Audio cassette emulator with cryptographic media distribution control.
  14. Ueda,Eiji; Kawano,Shinji; Nakabe,Futoshi, Broadcast data receiving device and method for receiving a plurality of multimedia data.
  15. Durham, Roderick Harold, Centralized data transformation.
  16. Durham, Roderick Harold, Centralized data transformation.
  17. Durham, Roderick Harold, Centralized data transformation.
  18. Brooks,Roger K.; Molloy,Stephen A.; Feng,Chi Te; Zhang,Qing; Ma,Yanda; Singhal,Dave M., Computer program product for transforming streaming video data.
  19. Stolorz, Paul E.; Salmon, John K.; Warren, Michael S.; Koller, Jeffrey G.; Hagberg, Aric; Yevmenkin, Maksim; Brady, Mark; Pfitzner, David; Middleton, Ted, Configurable adaptive global traffic control and management.
  20. Diamond, Michael B.; White, Jonathan B., Content keys for authorizing access to content.
  21. Ishibashi,Yoshihito, Content management method, and content storage system.
  22. Diamond, Michael B.; White, Jonathan B., Content server and method of providing content therefrom.
  23. Diamond, Michael B.; White, Jonathan B., Content server and method of storing content.
  24. McKibben, Michael T.; Lamb, Jeffrey R., Context instantiated application protocol.
  25. Belenko,Vyacheslav S.; Kuzmich,Vsevolod M., Copy protection method and system for digital media.
  26. Kim, Hyung Sun; Stechkine, Alexandre; Kim, Byung Jin; Um, Soung Hyun, Copy protection method and system for digital media.
  27. Belenko,Vyacheslav S.; Kuzmich,Vsevolod M., Copy protection method for digital media.
  28. Kato, Taku; Kojima, Tadashi; Yamada, Hisashi; Ishihara, Atsushi, Copyright management method, information recording/reproducing method and device, and information recording medium and method of manufacturing the medium.
  29. Nishimura, Takuya; Iitsuka, Hiroyuki; Yamada, Masazumi; Gotoh, Shoichi; Takechi, Hideaki, DATA TRANSMITTING/RECEIVING METHOD, DATA TRANSMITTER, DATA RECEIVER, DATA TRANSMITTING/RECEIVING SYSTEM, AV CONTENT TRANSMITTING METHOD, AV CONTENT RECEIVING METHOD, AV CONTENT TRANSMITTER, AV CONTEN.
  30. Matsuzaki,Natsume; Nakano,Toshihisa; Matsumoto,Tsutomu, Data distribution system.
  31. Clayton, Ray; Mendoza, Eliel J.; Cochran, Ronn Warren, Data encryption system and method.
  32. Kihara, Nobuyuki; Yokota, Teppei, Data processing apparatus, data processing method, terminal unit, and transmission method of data processing apparatus.
  33. Moskowitz, Scott A., Data protection method and device.
  34. Moskowitz, Scott A., Data protection method and device.
  35. Moskowitz, Scott A., Data protection method and device.
  36. Moskowitz, Scott A., Data protection method and device.
  37. Bezilla, Daniel Bailey; Immordino, John Leonard; Le Ogura, James; Ojha, Sachchida Nand, Data structure for policy-based remediation selection.
  38. Bezilla, Daniel Bailey; Immordino, John Leonard; Le Ogura, James; Ojha, Sachchida Nand, Data structure for policy-based remediation selection.
  39. Ramos, Daniel O.; Jones, Kevin C.; Rhoads, Geoffrey B., Decoding a watermark and processing in response thereto.
  40. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Delivering resources to clients in a distributed computing environment.
  41. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Delivering resources to clients in a distributed computing environment.
  42. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Delivering resources to clients in a distributed computing environment with rendezvous based on load balancing and network conditions.
  43. Hoffberg, Steven M., Detection and alert of automobile braking event.
  44. D'Mello, Kurt; Tyree, David Spencer; Gandhe, Sudhir; O'Brien, Eric David, Determining technology-appropriate remediation for vulnerability.
  45. D'Mello, Kurt; Tyree, David Spencer; O'Brien, Eric David; Gandhe, Sudhir, Determining technology-appropriate remediation for vulnerability.
  46. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  47. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  48. Dietl, Josef; Verlaan, Theo, Differentiated proxy digital signatures.
  49. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  50. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  51. Kahn, Raynold M.; Ha, David D.; James, Thomas H.; Klauss, Peter M., Digital media conditional access system for handling digital media content.
  52. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; B. H., Basavaraj; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  53. Padhye, Tushar N.; Roopa, M. S.; Joshi, C. V.; Basavaraj, B. H.; Ray, Arun; Kanungo, Deepanjan; Nahidipour, Aram; Wang, Xin; Ta, Thanh; Raley, Michael; Lao, Guillermo; Chen, Eddie; Tadayon, Bijan; Kansal, Anant, Digital rights management of content when content is a future live event.
  54. Ta, Thanh; Lao, Guillermo, Digital rights management of content when content is a future live event.
  55. Rhoads,Geoffrey B., Digital watermark and steganographic decoding.
  56. Rhoads,Geoffrey B., Digital watermark embedding and decoding using encryption keys.
  57. Levy, Kenneth L., Digital watermarking and fingerprinting applications for copy protection.
  58. Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  59. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  60. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  61. Tewfik,Ahmed, Digital watermarking with content dependent keys and autocorrelation properties for synchronization.
  62. Nakano,Toshihisa; Matsuzaki,Natsume; Tatebayashi,Makoto, Digital work protection system, key management apparatus, and user apparatus.
  63. Ficco, Michael H., Distributed media-aggregation systems and methods to operate the same.
  64. Ficco, Michael H., Distributed media-protection systems and methods to operate the same.
  65. Stolorz, Paul E.; Salmon, John K.; Warren, Michael S.; Koller, Jeffrey G.; Hagberg, Aric; Yevmenkin, Maksim; Brady, Mark; Pfitzner, David; Middleton, Ted, Distributing requests across multiple content delivery networks based on subscriber policy.
  66. Kahn, Raynold M.; Cocchi, Ronald P.; Gagnon, Gregory J., Distribution of broadcast content for remote decryption and viewing.
  67. Kahn, Raynold M.; Gagnon, Gregory J.; Curren, Christopher P.; James, Thomas H., Distribution of video content using a trusted network key for sharing content.
  68. Kahn, Raynold M.; Gagnon, Gregory J.; Curren, Christopher P.; James, Thomas H., Distribution of video content using client to host pairing of integrated receivers/decoders.
  69. Gupta,Dipankar, Document transfer systems.
  70. Rhoads, Geoffrey B.; Gustafson, Ammon E., Documents and methods involving multiple watermarks.
  71. Narin, Attilla; Waxman, Peter David; Lindeman, Thomas K.; Byrum, Frank, Domain-based trust models for rights management of content.
  72. Maloney, Ian, Dynamic processing of streamed content.
  73. Kori, Teruhiko, Electronic transmission device, and signal transmission method.
  74. Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Flaharty,Dennis R., Embedded blacklisting for digital broadcast system security.
  75. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  76. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  77. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  78. Hoffberg, Steven M., Game theoretic prioritization system and method.
  79. Fullagar, David; Newton, Christopher; Lipstone, Laurence, Handling long-tail content in a content delivery network (CDN).
  80. Fullagar, David; Newton, Christopher; Lipstone, Laurence R., Handling long-tail content in a content delivery network (CDN).
  81. Newton, Christopher; Lipstone, Laurence; Fullagar, David, Handling long-tail content in a content delivery network (CDN).
  82. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  83. Reed, Alastair M.; Brundage, Trent J., Hiding information out-of-phase in color channels.
  84. David, Morgan William Amos; Stone, Jonathan James, Identifying material stored using a signature as a retrieval index.
  85. David, Morgan William Amos; Stone, Jonathan James, Identifying material using a watermark and a signature.
  86. Patterson,Phillip R.; Clements,Lorie; Lofgren,Neil A.; Rhoads,Geoffrey B., Image management system and methods using digital watermarks.
  87. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  88. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  89. Rhoads,Geoffrey B.; Gustafson,Ammon E., Inferring object status based on detected watermark data.
  90. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  91. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  92. Seed, Steven L.; Hobbs, Kevin; Glynn, Shane M.; Foraker, Isaac W.; Jones, Peter J.; Chen, Homer H.; Greer, William Patrick, Managed object replication and delivery.
  93. Seed, Steven L.; Hobbs, Kevin; Glynn, Shane M.; Foraker, Isaac W.; Jones, Peter J.; Chen, Homer H.; Greer, William Patrick, Managed object replication and delivery.
  94. Cheng, Ken-Shin; Cheng, Ting; Plachy, Emily; Long, John, Managing electronic documents utilizing a digital seal.
  95. Goldshlag, David Moshe; Kravitz, David William, Manufacturing trusted devices.
  96. Montagut, Frederic; Gomez, Laurent; Hebert, Cedric; Ulmer, Cedric, Method and a system for secure execution of workflow tasks in a distributed workflow management system within a decentralized network system.
  97. Gross, Mark T.; Barth, David M.; Mangold, Richard P., Method and apparatus for authenticating content.
  98. Levy, Kenneth L., Method and apparatus for automatic ID management.
  99. Levy, Kenneth L., Method and apparatus for content management.
  100. Levy, Kenneth L., Method and apparatus for content management.
  101. Levy, Kenneth L., Method and apparatus for content management.
  102. Kahn, Raynold; Levy, Jordan, Method and apparatus for controlling paired operation of a conditional access module and an integrated receiver and decoder.
  103. Deng, Huijie Robert; Wu, Yong Dong, Method and apparatus for digital content copy protection.
  104. Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; Cocchi,Ronald P.; James,Thomas H., Method and apparatus for encrypting media programs for later purchase and viewing.
  105. Klauss,Peter M.; Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D., Method and apparatus for ensuring reception of conditional access information in multi-tuner receivers.
  106. Raley, Michael C.; Valenzuela, Edgardo; Tadayon, Bijan; Nahidipour, Aram; Wang, Xin; Lao, Guillermo; Ta, Thanh, Method and apparatus for establishing usage rights for digital content to be created in the future.
  107. Klauss,Peter M.; Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D., Method and apparatus for minimizing conditional access information overhead while ensuring conditional access information reception in multi-tuner receivers.
  108. Saito, Makoto, Method and apparatus for protecting digital data by double re-encryption.
  109. Kawamoto, Youji, Method and apparatus for providing information for decrypting content, and program executed on information processor.
  110. Duigou,Michael J.; Abdelaziz,Mohamed M.; Traversat,Bernard A.; Saulpaugh,Thomas E.; Slaughter,Gregory L., Method and apparatus for proximity discovery of services.
  111. Kalantar, Sayed Javad; Zimmerman, Carey W.; Adams, Cameron; Blenkhorn, Thomas E., Method and apparatus for work management for facility maintenance.
  112. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  113. Saito,Makoto, Method and device for protecting digital data by double re-encryption.
  114. Oxford, William V., Method and system for a recursive security protocol for digital copyright control.
  115. Oxford, William V., Method and system for a recursive security protocol for digital copyright control.
  116. Oxford, William V., Method and system for a recursive security protocol for digital copyright control.
  117. Diamond, Michael B.; White, Jonathan B., Method and system for accessing content on demand.
  118. Oxford, William V., Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol.
  119. Oxford, William V., Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol.
  120. Risan, Hank; Fitzgerald, Edward Vincent, Method and system for controlling presentation of media on a media storage device.
  121. Barton, Christopher J. Penrose; Inghelbrecht, Philip; Mukherjee, Dheeraj Shankar; Wang, Avery Li-Chun, Method and system for interacting with a user in an experiential environment.
  122. Barton, Christopher Jacques Penrose; Inghelbrecht, Philip; Mukherjee, Dheeraj Shankar; Li-Chun Wang, Avery, Method and system for interacting with a user in an experiential environment.
  123. Barton, Christopher Jacques Penrose; Inghelbrecht, Philip Georges; Mukherjee, Dheeraj Shankar; Wang, Avery Li-Chun, Method and system for interacting with a user in an experimental environment.
  124. Rhoads,Geoffrey B., Method and system for managing and controlling electronic media.
  125. Rhoads,Geoffrey B., Method and system for managing, accessing and paying for the use of copyrighted electronic media.
  126. Oxford, William V., Method and system for process working set isolation.
  127. Diamond, Michael B.; White, Jonathan B., Method and system for registering and activating content.
  128. Lao, Guillermo, Method and system for subscription digital rights management.
  129. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  130. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  131. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  132. Kiiveri,Antti, Method for processing audiovisual information in an electronic device, a system, and an electronic device.
  133. R��nkk��,Risto; Sormunen,Toni; Kiiveri,Antti; Jauhiainen,Antti, Method for processing information in an electronic device, a system, an electronic device and a processing block.
  134. Rhoads,Geoffrey B.; Gustafson,Ammon E., Method for utilizing fragile watermark for enhanced security.
  135. Mayboroda, Alexander Leonidovich; Smolentsev, Sergey V.; Sall, Mikhail A.; Redkov, Viktor V.; Tikhotsky, Anatoli I., Method of embedding watermark into digital image.
  136. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Method of generating a web page.
  137. Hatakeyama, Akiyuki, Methods and apparatus for content control using processor resource management.
  138. Kahn, Raynold M.; Dulac, Stephen P.; Basse, Hanno; Klauss, Peter M.; Kidd, Deanna R.; Popoli, Maria G., Methods and apparatus to conditionally authorize content delivery at broadcast headends in pay delivery systems.
  139. Kahn, Raynold M.; Dulac, Stephen P.; Basse, Hanno; Klauss, Peter M.; Kidd, Deanna R.; Popoli, Maria G., Methods and apparatus to conditionally authorize content delivery at content servers in pay delivery systems.
  140. Kahn, Raynold M.; Dulac, Stephen P.; Basse, Hanno; Klauss, Peter M.; Kidd, Deanna R.; Popoli, Maria G., Methods and apparatus to conditionally authorize content delivery at receivers in pay delivery systems.
  141. Kahn, Raynold M.; Klauss, Peter M.; Dulac, Stephen P., Methods and apparatus to provide content on demand in content broadcast systems.
  142. Kahn, Raynold M.; Klauss, Peter M.; Dulac, Stephen P., Methods and apparatus to provide content on demand in content broadcast systems.
  143. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  144. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  145. Erickson, John S., Methods for playing protected content.
  146. Rhoads,Geoffrey B., Methods for steganographic encoding media.
  147. Brooks,Roger K.; Molloy,Stephen A.; Feng,Chi Te; Zhang,Qing; Ma,Yanda; Singhal,Dave M., Methods for transforming streaming video data.
  148. Rhoads,Geoffrey B.; Gustafson,Ammon E., Methods to evaluate images, video and documents.
  149. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  150. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  151. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  152. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  153. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  154. Hoffberg, Steven M., Mobile communication device.
  155. Hoffberg, Steven Mark, Multifactorial optimization system and method.
  156. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  157. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  158. Rhoads,Geoffrey B.; Gustafson,Ammon E., Multiple watermarks in content.
  159. Inamura, Yu; Egashira, Toru; Takeshita, Atsushi, Multitask execution apparatus and multitask execution method.
  160. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  161. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  162. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  163. Ricciulli, Livio, Overlay network.
  164. Bezilla, Daniel Bailey; Immordina, John Leonard; Le Ogura, James, Policy based selection of remediation.
  165. Brady, Mark; Yevmenkin, Maksim; Stolorz, Paul E.; Salmon, John K.; Warren, Michael S.; Koller, Jeffrey; Hagberg, Aric; Pfitzner, David; Middleton, Ted, Policy-based content delivery network selection.
  166. Stolorz, Paul E.; Salmon, John K.; Warren, Michael S.; Koller, Jeffrey G.; Yevmenkin, Maksim; Brady, Mark; Pfitzner, David; Middleton, Ted; Hagberg, Aric, Policy-based content delivery network selection.
  167. Bezilla, Daniel B.; Immordino, John L.; Le Ogura, James, Policy-based selection of remediation.
  168. Bezilla, Daniel B.; Immordino, John L.; Ogura, James Le, Policy-based selection of remediation.
  169. Bezilla, Daniel B.; Immordino, John L.; Ogura, James Le, Policy-based selection of remediation.
  170. Bezilla, Daniel B.; Immordino, John L.; Ogura, James Le, Policy-based selection of remediation.
  171. Bezilla, Daniel Bailey; Immordino, John Leonard; Ogura, James Le, Policy-based selection of remediation.
  172. Siegel, Jaime A., Portable music player with pay per play usage and method for purchase of credits for usage.
  173. Risan, Hank; Fitzgerald, Edward Vincent, Preventing unauthorized distribution of media content within a global network.
  174. Risan, Hank; Fitzgerald, Edward Vincent, Preventing unauthorized distribution of media content within a global network.
  175. Risan, Hank; Fitzgerald, Edward Vincent, Preventing unauthorized distribution of media content within a global network.
  176. Risan, Hank; Fitzgerald, Edward Vincent, Preventing unauthorized distribution of media content within a global network.
  177. Risan, Hank; Fitzgerald, Edward Vincent, Preventing unauthorized distribution of media content within a global network.
  178. Kuzmich, Vsevolod M.; Ivanov, Igor O., Proprietary watermark system for secure digital media and content distribution.
  179. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  180. Fujii, Yoshihiro; Yoshida, Takuya; Okada, Koji, Re-encrypted data verification program, re-encryption apparatus and re-encryption system.
  181. Bel,Hendrik Jan; Lokhoff,Gerardus Cornelis Petrus; Breugom,Michel Ronald; Engelen,Dirk Valentinus Rene; Van De Poel,Peter, Receiving device for securely storing a content item, and playback device.
  182. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Resource invalidation in a content delivery network.
  183. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  184. Diamond, Michael B.; White, Jonathan B.; Daniell, Piers J., Secure content enabled drive digital rights management system and method.
  185. Diamond, Michael B.; White, Jonathan B.; Daniell, Piers J., Secure content enabled drive system and method.
  186. Kahn, Raynold M.; Klauss, Peter M.; Dulac, Stephen P.; Schlacht, David N.; Basse, Hanno; James, Thomas H., Secure content transfer systems and methods to operate the same.
  187. Wang, Michael Sujue, Secure data storage for protecting digital content.
  188. Kahn, Raynold M.; Siegel, Philip I., Secure delivery of program content via a removable storage medium.
  189. Wuidart,Luc; Balthazar,Pierre, Secure multimedia data transmission method.
  190. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  191. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  192. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  193. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  194. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  195. Kahn, Raynold M.; Gagnon, Gregory J.; Ha, David D.; Klauss, Peter M.; Curren, Christopher P.; James, Thomas H., Secure storage and replay of media programs using a hard-paired receiver and storage device.
  196. Hsu, Michael M.; McMahon, Dennis J., Secure ticketing.
  197. Rhoads,Geoffrey B., Securing media content with steganographic encoding.
  198. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  199. Hayashi, Ryotaro; Matsushita, Tatsuyuki; Fujii, Yoshihiro; Yoshida, Takuya; Okada, Koji, Server apparatus and program to re-encrypt ciphertext data.
  200. Seed, Steven L.; Hobbs, Kevin; Glynn, Shane M.; Foraker, Isaac W.; Jones, Peter J.; Chen, Homer H., Server handoff in content delivery network.
  201. Seed, Steven L.; Hobbs, Kevin; Glynn, Shane M.; Foraker, Isaac W.; Jones, Peter J.; Chen, Homer H.; Greer, William Patrick, Server handoff in content delivery network.
  202. Kahn, Raynold M.; Gagnon, Gregory J.; James, Thomas H.; Dulac, Stephen P.; Carpenter, Jeffrey D.; Arsenault, Robert G.; Jijina, Aspandyar M., Service activation of set-top box functionality using broadcast conditional access system.
  203. Kahn, Raynold M.; Gagnon, Gregory J.; James, Thomas H.; Dulac, Stephen P.; Carpenter, Jeffrey D.; Arsenault, Robert G.; Jijina, Aspandyar M., Service activation of set-top box functionality using broadcast conditional access system.
  204. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Shared content delivery infrastructure.
  205. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Shared content delivery infrastructure.
  206. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Shared content delivery infrastructure and method of generating a web page.
  207. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Shared content delivery infrastructure with rendezvous based on load balancing and network conditions.
  208. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  209. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  210. Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; James,Thomas H., Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device.
  211. Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; James,Thomas H., Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device.
  212. Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; James,Thomas H., Super encrypted storage and retrieval of media programs with modified conditional access functionality.
  213. Kahn, Raynold M.; Gagnon, Gregory J.; Ha, David D.; Klauss, Peter M.; Curren, Christopher P.; James, Thomas H., Super encrypted storage and retrieval of media programs with smartcard generated keys.
  214. Kahn,Raynold M.; Gagnon,Gregory J.; Ha,David D.; Klauss,Peter M.; Curren,Christopher P.; James,Thomas H., Super encrypted storage and retrieval of media programs with smartcard generated keys.
  215. Gupta, Madhuvan; Thomas, Myron Clifford; Saunders, Richard William, Switching of media presentation.
  216. Kasperkiewicz,Tomasz S. M.; Brodie,Alexander S.; Parlin,David R.; Xu,Jingyang; Frigon,Kathleen M.; Dart,Scott E.; Yuan,Po, System and method for automatically grouping items.
  217. Lockhart, Malcolm W.; Grimes, D. Gordon; Sharma, Ranjiv K.; Musselwhite, Neal A., System and method for data rights management.
  218. Lockhart,Malcolm W.; Grimes,D. Gordon; Sharma,Ranjiv K.; Musselwhite,Neal A., System and method for data rights management.
  219. Hoffberg, Steven M., System and method for determining contingent relevance.
  220. Decuir,John David, System and method for determining genre of audio.
  221. Erickson, John S., System and method for managing copyrighted electronic media.
  222. Bergh, Peter L.; Wagner, Raymond L., System and method for presentation integrity.
  223. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  224. Novak, Robert E., System and method for providing conditional access to digital content.
  225. Ghose, Kanad, System and method for validating program execution at run-time using control flow signatures.
  226. Erickson,John S., System and methods for managing digital creative works.
  227. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  228. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  229. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  230. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  231. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  232. Brooks,Roger K.; Molloy,Stephen A.; Feng,Chi Te; Zhang,Qing; Ma,Yanda; Singhal,Dave, System for transforming streaming video data.
  233. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  234. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  235. Owen, Daniel L.; Kusnic, Michael W., System, method and computer program product for a collaborative decision platform.
  236. Watson, Joe; Calahan, Marc; Williams, Jamie Richard; Dong, Thomas Z.; Smith, Damian, Systems and methods for a secure recording environment.
  237. Watson, Joe; Smith, Damian; Calahan, Marc; Williams, Jamie Richard; Dong, Thomas, Systems and methods for a secure recording environment.
  238. Watson, Joe; Smith, Damian; Calahan, Marc; Williams, Jamie Richard; Dong, Thomas, Systems and methods for a secure recording environment.
  239. Watson, Joe; Smith, Damian; Calahan, Marc; Williams, Jamie Richard; Dong, Thomas, Systems and methods for a secure recording environment.
  240. Goldberg, Andrew V.; Hartline, Jason D.; Wright, Andrew K., Systems and methods for pricing and selling digital goods.
  241. Ramos, Daniel O.; Jones, Kevin C.; Rhoads, Geoffrey B., Systems and methods for processing content objects.
  242. Levy, Kenneth L.; Meyer, Joel R.; Andrews, III, Hoyet Harrison, Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities.
  243. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  244. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  245. Elliott, Geoffrey John; Saunders, Richard William; Thomas, Myron Clifford; Gupta, Madhuvan, Taskbar media player.
  246. Elliott, Geoffrey John; Saunders, Richard William; Thomas, Myron Clifford; Gupta, Madhuvan, Taskbar media player.
  247. Elliott, Geoffrey John; Saunders, Richard William; Thomas, Myron Clifford; Gupta, Madhuvan, Taskbar media player.
  248. Linehan,Mark H., Television commerce payments.
  249. Linehan,Mark H., Television commerce payments.
  250. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  251. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Transparent redirection of resource requests.
  252. Farber, David A.; Greer, Richard E.; Swart, Andrew D.; Balter, James A., Transparent redirection of resource requests.
  253. O'Keefe, Kevin, Trusted content server.
  254. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  255. Kumar, Nishit; Auld, David, Unique identifier per chip for digital audio/video data encryption/decryption in personal video recorders.
  256. Maloney, Ian, User authentication in a content delivery network.
  257. Novak,Michael; Cain,Jonathan M.; Dideriksen,Tedd K.; Nadalin,David M.; Nelson,Patrick N., User interface for media player program.
  258. Levy,Kenneth L., User-friendly rights management systems and methods.
  259. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  260. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  261. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  262. Dulac, Stephen P., Video on demand in a broadcast network.
  263. D'Mello, Kurt; Tyree, David Spencer; Gandhe, Sudhir, Vulnerability-based remediation selection.
  264. D'Mello, Kurt; Tyree, David Spencer; Gandhe, Sudhir, Vulnerability-based remediation selection.
  265. Belenko,Vyacheslav S.; Kuzmich,Vsevolod M., Watermark-based copy management system and method for digital media copy protection.
  266. Rodriguez,Ismael, Watermarks for secure distribution of digital data.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로