$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure streaming of digital audio/visual content 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/30
출원번호 US-0261055 (1999-03-02)
발명자 / 주소
  • Ajit V. Rajasekharan
  • Guy A. Story, Jr.
  • Andrew J. Huffman
출원인 / 주소
  • Audible, Inc.
대리인 / 주소
    Blakely Sokoloff Taylor & Zafman LLP
인용정보 피인용 횟수 : 87  인용 특허 : 52

초록

A method and apparatus for secure streaming of digital audio/visual content is disclosed. Secure streaming provides protection against unauthorized use of the digital content. Authorization and integrity checks are performed by a client or playback device on a set of data associated with digital con

대표청구항

1. A method comprising:receiving authorization data corresponding to streamed digital content; determining whether a playback device is authorized to play the streamed digital content based, at least in part, on the authorization data; playing a portion of the streamed digital content, if authorized

이 특허에 인용된 특허 (52)

  1. Yurt Paul ; Browne H. Lee, Audio and video transmission and receiving system.
  2. Davis Derek L. ; Smith Lionel, Authentication system based on periodic challenge/response protocol.
  3. Hon David C. (1450 NW. Woodbine Way Seattle WA 98177), Automated instruction, game and data retrieval system.
  4. Hawkins Jeff C. (Redwood City CA) Daly John J. (San Carlos CA), Combination laptop and pad computer.
  5. Lockwood Lawrence B. (5935 Folsom La Jolla CA 92037), Combined automatic information terminal and vending machine.
  6. Kane Daniel S. (Haverford PA), Combined electronic equipment cabinet and controls.
  7. Thomas Leron (North Canton OH), Credit card actuated terminal for controlling the dispense of motor fuel or similar article.
  8. Ma Hsi K. (4F. ; No. 48 ; Sec. 2 ; Chung Cherng Rd. Taipei TWX), Detachable portable personal computer.
  9. Brugger Rolf (Keistenweg 1 CH-4310 Rheinfelden CHX), Device for the distribution of music information in digital form.
  10. Tsevdos James T. ; Cook Ross L. ; Ring Nancy Lee ; Barnhill Robert S. ; Hamblin Glen E. ; Milsted Kenneth L. ; Kindell Craig N. ; Waefler Susan Elizabeth ; Portela Carlos ; Anderson Brent C., Digital information accessing, delivery and production system.
  11. Katz Donald R. ; Lau Edwin J. ; Mott Timothy ; Brenneman Scott A. ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen, Digital information library and delivery system with logic for generating files targeted to the playback device.
  12. Rubincam David P. (6303 20th Ave. West Hyattsville MD 20782), Electronic book.
  13. Coughlin Bernard J. (Crawley GB2) Penna David E. (Redhill GB2) Turner Simon R. (Redhill GB2), Electronic information display systems.
  14. Gutman Jose (Boynton Beach FL) Wright Jim (Coral Springs FL) Finkelstein Louis D. (Wheeling IL) Puhl Larry (Sleepy Hollow IL), Electronic wallet.
  15. Schulhof Nathan ; Janky James M. ; Jasmin Grant, Enhanced delivery of audio data.
  16. Hawkins Jeff C. (Redwood City CA) Dulaney Ken L. (Redwood City CA) Daly John J. (San Carlos CA) McNamara James H. (Santa Cruz CA) Cole James F. (Palo Alto CA), Hand held computer.
  17. Mizzi, Pierre M. A., Hand-held computer.
  18. Pajak Henry G. (Ontario NY) Byrne Kenneth C. (Henrietta NY), Hierarchical shared books with database.
  19. Dornbush Donald H. (Okemos MI) Bowersox Donald J. (Okemos MI), Information recording and retrieval system.
  20. Knowles Lance (San Francisco CA) Crane Douglas (Portola Valley CA), Interactive audiovisual control mechanism.
  21. Perlman Stephen ; Goldman Phil, Method and apparatus for extracting digital data from a video stream and using the digital data to configure the video stream for display on a television set.
  22. Cole James F. (Palo Alto CA) Keeran Jerald J. (San Jose CA), Method and apparatus for password protection of a computer.
  23. Cole James F. (Palo Alto CA) Keeran Jerald J. (San Jose CA), Method and apparatus for password protection of a computer.
  24. Sirbu Marvin A. ; Tygar J. D. ; Cox Benjamin T. H. ; Wagner Thomas, Method and apparatus for purchasing and delivering digital goods over a network.
  25. Colvin David S., Method and apparatus for securing software to reduce unauthorized use.
  26. Cook David Philip, Method and system for custom manufacture and delivery of a data product.
  27. Hair Arthur R. (301 Oaklawn Dr. Pittsburgh PA 15241), Method for transmitting a desired digital video or audio signal.
  28. Fernandez Emilio A. (1019 Salt Meadow La. McLean VA 22101), Microprocessor based simulated book.
  29. Looney Brian M. ; McMullin Dale R. ; Pasciuto Joseph ; Doyle Edward T., Music organizer and entertainment center.
  30. Kaplan Joshua D., Network apparatus and method for preview of music products and compilation of market data.
  31. Hatta Koichi (Yamatokoriyama JPX), Password system utilizing two password types, the first being changeable after entry, the second being unchangeable unti.
  32. Yanagiuchi Shigenobu (Tenri JPX) Takano Yasuhiko (Nara JPX), Portable computer having an updatable table of starting addresses for accessing those stored programs having been previo.
  33. Dreifus Henry N. (Narberth PA), Portable electronic transaction device and system therefor.
  34. Gombrich Peter P. (Boulder CO), Portable handheld terminal.
  35. McCalley Karl W. (South Barrington IL) Wilson Steven D. (Chicago IL) Fischer James L. (Barrington IL) Belau Kenneth P. (Chicago IL), Presentation player for an interactive digital communication system.
  36. Banker Robert O. ; Akins ; III Glendon L., Preventing replay attacks on digital information distributed by network service providers.
  37. Wolfe Robert L. ; Pinals Jeffrey, Programmed music on demand from the internet.
  38. Lacko Mark (Garrison NY), Public information access terminal.
  39. Goldman Robert J., Selection and retrieval of music from a digital database.
  40. Bernard Warren E. ; Jacobson Philip A., System and method for automated remote previewing and purchasing of music, video, software, and other multimedia product.
  41. Goldman Robert J., System and method for downloading music selections.
  42. Baker Robert G. (Delray Beach FL) Eduartez Jose A. (Miami Beach FL) Huynh Duy Q. (Boca Raton FL) Swingle Paul R. (Delray Beach FL) Yong Suksoon (Boca Raton FL), System and method for efficiently loading and removing selected functions on digital signal processors without interrupt.
  43. Sheldrick Wayne S. (Scarborough CAX) Gammie Keith B. (Markham CAX) Woo Arthur S. (Scarborough CAX) Chan Gary W. C. (Scarborough CAX), System and method for transmitting and receiving variable length authorization control for digital services.
  44. Hair Arthur R., System and method for transmitting desired digital video or digital audio signals.
  45. Zamiska James C.,CAX ; Mercer Jeremy E. ; Nadas Thomas P.,CAX, System apparatus and method for managing the use and storage of digital information.
  46. Saville ; III Winthrop L. (Carlsbad CA) Klein Raymond (Ramona CA) Meyer Frederick P. (Santa Cruz CA) Prussian Michael P. (Aptos CA), System for simulating access times of a CD ROM on a hard disk by slowing the operation of the hard disk.
  47. Montagna John A. (Trenton NJ) Irving Gary (Skillman NJ) Farrell Lee (Lawrenceville NJ) Cross Gerald (Philadelphia PA) Miller Stephen A. (Upper Black Eddy PA), System for storing and retrieving text and associated graphics.
  48. Hair Arthur R. (Pittsburgh PA), System for transmitting desired digital video or audio signals.
  49. Saigh Michael M. ; Chang Edward H. ; Brockhouse Douglas B. ; Chang Hsiao-Shih, Systems and apparatus for electronic communication and storage of information.
  50. Saigh Michael M., Systems and apparatus for electronic communication and storage of time encoded information.
  51. Grynberg Avigdor (23 Hagderoth Street Savyon ILX), User authorization verification apparatus for computer systems including a central device and a plurality of pocket size.
  52. Peters Steven A., Vending system.

이 특허를 인용한 특허 (87)

  1. Lampson,Butler W.; DeTreville,John D.; England,Paul, Attesting to a value of a register and/or memory region.
  2. Vilcauskas, Andy; Hunter, Bryan, Audio ownership system.
  3. Kime,Gregory C.; Menon,Rama R.; Sloss,Reed J., Automated content source validation for streaming data.
  4. Lampson, Butler W.; DeTreville, John D.; England, Paul, Boot blocks for software.
  5. Case, Sr., Paul, Case secure computer architecture.
  6. Case, Sr., Paul, Case secure computer architecture.
  7. England, Paul, Client-side boot domains and boot rules.
  8. England, Paul, Client-side boot domains and boot rules.
  9. England,Paul, Client-side boot domains and boot rules.
  10. Chang, Jack H.; Sheu, William H.; Tuan, Sherman, Content delivery technology.
  11. Story, Guy; Wolfish, Howard; Field-Elliot, Bryan; Rogers, Glenn; Galkin, Alexander; Grebnev, Igor; Federico, John; Hatch, Steven; Muralikrishnan, Deepa; Meyer, Arik, Customized content delivery.
  12. Story, Guy; Wolfish, Howard; Field-Elliot, Bryan; Rogers, Glenn; Galkin, Alexander; Grebnev, Igor; Federico, John; Hatch, Steven; Muralikrishnan, Deepa; Meyer, Arik, Customized content delivery.
  13. Saw,Chit Wei; Ilnicki,Slawomir K.; van den Branden Lambrecht,Christian J.; Farrell,Joyce E; Herley,Cormac; Ribes,Joan Maria Mas, Digital content distribution systems.
  14. Rolf, Devon A., Digital media distribution system and method.
  15. Williams, Jim C.; Russell, John Christopher Park, Digital rights management using a triangulating geographic locating device.
  16. Williams,Jim C.; Russell,John Christopher Park, Digital rights management using a triangulating geographic locating device.
  17. Stewart, Russell; Insepov, Timur, Disc unlock code distribution control via remote physical action and location.
  18. England, Paul; Lampson, Butler W., Hierarchical trusted code for content protection in computers.
  19. England, Paul; Lampson, Butler W., Hierarchical trusted code for content protection in computers.
  20. England,Paul; Lampson,Butler W., Hierarchical trusted code for content protection in computers.
  21. Lampson,Butler W.; England,Paul, Hierarchical trusted code for content protection in computers.
  22. Prohel, Andrew M.; McKay, Philip; Wibisono, Himgan; Hoch, Michael; Liu, Jeff; Gauba, Ravi; Wang, Sidney; Tambata, Ippei; Coppinger, Elizabeth; Harwayne, Michael S.; Lea, Rodger, Initializing relationships between devices in a network.
  23. Prohel,Andrew M.; McKay,Philip; Wibisono,Himgan; Hoch,Michael; Liu,Jeff; Gauba,Ravi; Wang,Sidney; Tambata,Ippei; Coppinger,Elizabeth; Harwayne,Michael S.; Lea,Rodger, Initializing relationships between devices in a network.
  24. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  25. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  26. Prohel, Andrew M.; McKay, Philip; Wibisono, Himgan; Hoch, Michael; Liu, Jeff; Gauba, Ravi; Wang, Sidney; Tambata, Ippei; Coppinger, Elizabeth; Harwayne, Michael S.; Lea, Rodger, Managing and sharing identities on a network.
  27. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  28. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  29. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  30. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  31. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Manifest-based trusted agent management in a trusted operating system environment.
  32. DeTreville,John, Method and apparatus for authenticating an open system application to a portable IC device.
  33. DeTreville,John D., Method and apparatus for authenticating an open system application to a portable IC device.
  34. McCarthy, Tom; Parekh, Jateen; Goodwin, Mark, Method and apparatus for distributing media in a pay per play architecture with remote playback within an enterprise.
  35. Story, Guy, Method and apparatus for targeted content delivery.
  36. Coulombe,Stephane; Grassel,Guido, Method and apparatus for transcoding content with permissible operations authorized by content creator.
  37. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  38. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  39. England, Paul; Willman, Bryan, Method and system for allowing code to be securely initialized in a computer.
  40. Ramaley, Alan; Sodt, Andrew; Sonnad, Rahul; Blaine, Ian; Olson, Andrew, Method and system for managing and distributing digital media.
  41. Ramaley, Alan; Sodt, Andrew; Sonnad, Rahul; Blaine, Ian; Olson, Andrew, Method and system for managing and distributing digital media.
  42. Ramaley,Alan; Sodt,Andrew; Sonnad,Rahul; Blaine,Ian; Olson,Andrew, Method and system for managing and distributing digital media.
  43. Roberts, Phillip; Hanson, Ronald J. J.; Rawlins, Rudy Eugene, Method of customizing a standardized IT policy.
  44. Roberts, Phillip; Hanson, Ronald J.J.; Rawlins, Rudy Eugene, Method of customizing a standardized IT policy.
  45. Story, Guy; Wolfish, Howard; Field-Elliot, Bryan; Rogers, Glenn; Galkin, Alexander; Grebnev, Igor; Federico, John; Hatch, Steven; Muralikrishnan, Deepa; Meyer, Arik, Methods and apparatus for customized content delivery.
  46. McKinney, David Uel; Panpaliya, Monika Kishor, Mobile device playback and control of media content from a personal media host device.
  47. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Operating system upgrades in a trusted operating system environment.
  48. Goldstein, Steven Wayne, Personal audio assistant device and method.
  49. Goldstein, Steven Wayne, Personal audio assistant device and method.
  50. Goldstein, Steven Wayne, Personal audio assistant device and method.
  51. Herz,William S.; Polatnick,Michael A., Personal spectrum recorder.
  52. Langdon, Warren E., Portable wireless player and associated method.
  53. Aciicmez, Onur; Seifert, Jean-Pierre; Zhang, Xinwen; Latifi, Afshin, Representation and verification of data for safe computing environments and systems.
  54. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  55. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  56. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  57. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  58. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  59. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  60. England,Paul; Peinado,Marcus, Saving and retrieving data based on symmetric key encryption.
  61. Wang, Michael Sujue, Secure data storage for protecting digital content.
  62. England, Paul; Lampson, Butler W., Secure execution of program code.
  63. England,Paul; Lampson,Butler W., Secure execution of program code.
  64. Anttila, Akseli; Jung, Younghee, Synchronous media playback and messaging system.
  65. Kahandaliyanage, Shawn, System and method for application program operation on a wireless device.
  66. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for authenticating an operating system.
  67. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  68. England,Paul; Lampson,Butler W.; DeTreville,John D., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  69. McNabb, James; Battle, Ben, System and method for managing and provisioning streamed data.
  70. Azar, Cyrus; Brostoff, George, System and method for providing secure access to an electronic device using facial biometrics.
  71. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for secure storage data using a key.
  72. Lampson, Butler W.; DeTreville, John D.; England, Paul, System and method for secure storage of data using public and private keys.
  73. Little, Herbert Anthony; Clark, David; Owen, Russell Norman; Totzke, Scott William; Adams, Neil Patrick; Brown, Michael Stephen, System and method of installing software applications on electronic devices.
  74. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Owen, Russell N., System and method of owner application control of electronic devices.
  75. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Owen, Russell N., System and method of owner application control of electronic devices.
  76. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Owen, Russell N., System and method of owner application control of electronic devices.
  77. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Owen, Russell N., System and method of owner application control of electronic devices.
  78. Little, Herbert A.; Clark, David R., System and method of owner control of electronic devices.
  79. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  80. England, Paul; Peinado, Marcus; Simon, Daniel R.; Benaloh, Josh D., Transferring application secrets in a trusted operating system environment.
  81. England,Paul; Peinado,Marcus; Simon,Daniel R.; Benaloh,Josh D., Transferring application secrets in a trusted operating system environment.
  82. Nonaka, Masao; Futa, Yuichi; Nakano, Toshihisa; Yokota, Kaoru; Ohmori, Motoji; Miyazaki, Masaya; Yamamoto, Masaya; Murase, Kaoru; Onoda, Senichi, Unauthorized contents detection system.
  83. Nonaka, Masao; Futa, Yuichi; Nakano, Toshihisa; Yokota, Kaoru; Ohmori, Motoji; Miyazaki, Masaya; Yamamoto, Masaya; Murase, Kaoru; Onoda, Senichi, Unauthorized contents detection system.
  84. Nonaka, Masao; Futa, Yuichi; Nakano, Toshihisa; Yokota, Kaoru; Ohmori, Motoji; Miyazaki, Masaya; Yamamoto, Masaya; Murase, Kaoru; Onoda, Senichi, Unauthorized contents detection system.
  85. Nonaka, Masao; Futa, Yuichi; Nakano, Toshihisa; Yokota, Kaoru; Ohmori, Motoji; Miyazaki, Masaya; Yamamoto, Masaya; Murase, Kaoru; Onoda, Senichi, Unauthorized contents detection system.
  86. Nonaka, Masao; Futa, Yuichi; Nakano, Toshihisa; Yokota, Kaoru; Ohmori, Motoji; Miyazaki, Masaya; Yamamoto, Masaya; Murase, Kaoru; Onoda, Senichi, Unauthorized contents detection system.
  87. Nonaka, Masao; Futa, Yuichi; Nakano, Toshihisa; Yokota, Kaoru; Ohmori, Motoji; Miyazaki, Masaya; Yamamoto, Masaya; Murase, Kaoru; Onoda, Senichi, Unauthorized contents detection system.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로