$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Systems and methods for secure transaction management and electronic rights protection

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
  • G06F-011/34
출원번호 US-0106742 (2002-03-25)
발명자 / 주소
  • Ginter, Karl L.
  • Shear, Victor H.
  • Spahn, Francis J.
  • Van Wie, David M.
출원인 / 주소
  • Intertrust Technologies Corporation
대리인 / 주소
    Finnegan, Henderson, Farabow, Garrett & Dunner L.L.P.
인용정보 피인용 횟수 : 310  인용 특허 : 9

초록

The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain

대표청구항

The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain

이 특허에 인용된 특허 (9)

  1. Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
  2. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
  3. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  4. White James E. (San Carlos CA) Helgeson Christopher S. (Mountain View CA) Steedman Douglas A. (Mountain View CA), System and method for distributed computation based upon the movement, execution, and interaction of processes in a netw.
  5. White James E. ; Helgeson Christopher S. ; Steedman Douglas A., System and method for distributed computation based upon the movement, execution, and interaction of processes in a network.
  6. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
  7. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  8. Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
  9. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.

이 특허를 인용한 특허 (310)

  1. Harris,Adam P.; Schneider,Steve C., Active validation of network devices.
  2. Ramchandran, Amit, Adaptable datapath for a digital processing system.
  3. Ramchandran, Amit, Adaptable datapath for a digital processing system.
  4. Ramchandran, Amit, Adaptable datapath for a digital processing system.
  5. Ramchandran, Amit, Adaptable datapath for a digital processing system.
  6. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter J., Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
  7. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter J., Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
  8. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter James, Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
  9. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter James, Adaptive integrated circuitry with heterogenous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements.
  10. Master, Paul L.; Hogenauer, Eugene; Scheuermann, Walter James, Adaptive processor for performing an operation with simple and complex units each comprising configurably interconnected heterogeneous elements.
  11. Dorwin, David Kimbal; Colwell, Aaron James; Scherkus, Andrew Martin; Galligan, Francis, Allowing degraded play of protected content using scalable codecs when key/license is not obtained.
  12. Master, Paul L.; Uvacek, Bohumir, Apparatus and method for adaptive multimedia reception and transmission in communication environments.
  13. Kittilingal, Sudeep; Mandayam, Jayanth; Keidar, Ron, Apparatus and method for hardware-based secure data processing using buffer memory address range rules.
  14. Kottilingal, Sudeep Ravi; Mandayam, Jayanth; Keidar, Ron, Apparatus and method for hardware-based secure data processing using buffer memory address range rules.
  15. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements.
  16. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements.
  17. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements.
  18. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, system and method for configuration of adaptive integrated circuitry having fixed, application specific computational elements.
  19. Master, Paul L.; Smith, Stephen J.; Watson, John, Apparatus, system and method for configuration of adaptive integrated circuitry having heterogeneous computational elements.
  20. Hirayama, Tomoshi, Apparatus, system and method for secure information dissemination.
  21. Kollmyer,Brad; Baker,Brian; Shapiro,Eric; Kollmyer,Aric; Rutman,Mike; MacLean,Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Apparatus, system and method for selectively encrypting different portions of data sent over a network.
  22. Dorwin, David Kimbal, Application-driven playback of offline encrypted content with unaware DRM module.
  23. Dorwin, David Kimbal, Application-driven playback of offline encrypted content with unaware DRM module.
  24. Tolson, Michael; Arnulfo, Jean-Christophe; Rive, Brice, Architecture for a system of portable information agents.
  25. Tolson, Michael; Arnulfo, Jean-Christophe; Rive, Brice, Architecture for a system of portable information agents.
  26. Tolson,Michael; Arnulfo,Jean Christophe; Rive,Brice, Architecture for a system of portable information agents.
  27. Lampson,Butler W.; DeTreville,John D.; England,Paul, Attesting to a value of a register and/or memory region.
  28. Lampson, Butler W.; DeTreville, John D.; England, Paul, Boot blocks for software.
  29. Vannier, Eric; Dorwin, David Kimbal, Browser/web apps access to secure surface.
  30. England, Paul, Client-side boot domains and boot rules.
  31. England,Paul, Client-side boot domains and boot rules.
  32. Heidari, Ghobad; Chang, Kuor Hsin; Master, Paul L.; Hogenauer, Eugene B.; Scheuermann, Walter James, Communications module, device, and method for implementing a system acquisition function.
  33. Master, Paul L.; Watson, John, Configurable hardware based digital imaging apparatus.
  34. Rubin, Owen Robert; Murray, Eric; Uhrig, Nalini Praba, Consumer product distribution in the embedded system market.
  35. Scheuermann, W. James; Hogenauer, Eugene B., Control node for multi-core system.
  36. Dorwin, David Kimbal, DRM provider interoperability.
  37. Calhoon, Sean; Carr, J. Scott; Rodriguez, Tony F., Data processing systems and methods.
  38. Harris, Adam P.; Schneider, Steve C., Defining new rules for validation of network devices.
  39. Harris, Adam P.; Schneider, Steve C., Defining new rules for validation of network devices.
  40. Tandon, Vinod; Devore, Jake, Detecting lag switch cheating in game.
  41. Tandon, Vinod; Devore, Jake, Detecting lag switch cheating in game.
  42. Dorwin, David Kimbal; Scherkus, Andrew Martin, Detecting supported digital rights management configurations on a client device.
  43. Jesensky, James; Huynh, Steve, Determining similar phrases.
  44. Kurzweil, Raymond C.; Albrecht, Paul; Gashel, James; Gibson, Lucy, Device and method to assist user in conducting a transaction with a machine.
  45. Kurzweil, Raymond C.; Albrecht, Paul; Gashel, James; Gibson, Lucy, Device and method to assist user in conducting a transaction with a machine.
  46. Enokida, Tomoaki, Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program.
  47. Enokida,Tomoaki, Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program.
  48. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  49. Okamoto, Ryuichi; Kobayashi, Susumu; Tokuda, Katsumi, Digital content reproducing apparatus and method thereof.
  50. Boccon-Gibod, Gilles; Boeuf, Julien G., Digital rights management engine systems and methods.
  51. Boccon-Gibod, Gilles; Boeuf, Julien G., Digital rights management engine systems and methods.
  52. Boccon-Gibod, Gilles; Boeuf, Julien G.; Manente, Michael G.; Bradley, William B., Digital rights management engine systems and methods.
  53. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  54. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  55. Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Sheeran, Daniel, Digital rights management handler and related methods.
  56. Ionescu, Alexandru Catalin; Sreenivas, Giridhar, Dynamic binding of service on bearer.
  57. Dorwin, David Kimbal, Dynamically changing stream quality of protected content based on a determined change in a platform trust.
  58. Dorwin, David Kimbal, Dynamically changing stream quality when user is unlikely to notice to conserve resources.
  59. Shankar, Narendar M.; Paksoy, Erdal, Electronic devices, information products, processes of manufacture and apparatus for enabling code decryption in a secure mode using decryption wrappers and key programming applications, and other structures.
  60. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution system.
  61. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution system.
  62. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution system.
  63. Manning,Damian Franken; Lowy,Jon Walter, Electronic media distribution system.
  64. Manning, Damian Franken; Lowy, Jon Walter, Electronic media distribution systems.
  65. Williams, Matthew T.; Gefen, Howard B.; Vaidya, Vinay P., Enforcing user-specified rules.
  66. Pinkas, Binyamin; Haber, Stuart A.; Tarjan, Robert E.; Sander, Tomas, Establishing a secure channel with a human user.
  67. Pinkas, Binyamin; Haber, Stuart A.; Tarjan, Robert E.; Sander, Tomas, Establishing a secure channel with a human user.
  68. Pinkas,Binyamin; Haber,Stuart A.; Tarjan,Robert E.; Sander,Tomas, Establishing a secure channel with a human user.
  69. Dorwin, David Kimbal, Extending browser functionality with dynamic on-the-fly downloading of untrusted browser components.
  70. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  71. Furtek, Frederick Curtis; Master, Paul L., External memory controller.
  72. Furtek, Frederick Curtis; Master, Paul L., External memory controller node.
  73. Furtek, Fredrick Curtis; Master, Paul L., External memory controller node.
  74. Furtek, Fredrick Curtis; Master, Paul L., External memory controller node.
  75. Hyypp��,Timo; Miettinen,Kari, Generating asymmetric keys in a telecommunications system.
  76. Jesensky, James; Oates, Isaac; Huynh, Steve; Vaidya, Vinay, Generating constructed phrases.
  77. Harris, Adam P.; Schneider, Steve C., Generating rules for maintaining community integrity.
  78. Scheuermann,Walter James, Hardware implementation of the secure hash standard.
  79. Scheuermann, W. James; Hogenauer, Eugene B., Hardware task manager.
  80. Scheuermann, W. James; Hogenauer, Eugene B., Hardware task manager.
  81. Scheuermann, W. James; Hogenauer, Eugene B., Hardware task manager.
  82. Scheuermann, W. James; Hogenauer, Eugene B., Hardware task manager.
  83. Madoukh,Ashraf; Vasic,Ognjen; Ansari,Suhail; Khulusi,Bassam; Hu,Jinhui, Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data.
  84. Yemeni,Yechiam; Florissi,Danilo; Dailianas,Apostolos, Identification of an attacker in an electronic system.
  85. Kichikawa, Kazutoshi; Yano, Yoshihiro; Chikada, Takayuki; Handa, Fukio; Niwata, Syouzou, Information processing apparatus, and method for retaining security.
  86. Felsher, David Paul, Information record infrastructure, system and method.
  87. Carey, W. Knox; Nilsson, Jarl, Information security systems and methods.
  88. Carey, W. Knox; Nilsson, Jarl, Information security systems and methods.
  89. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  90. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  91. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  92. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  93. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  94. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  95. Harris, Adam P.; Schneider, Steve C., Invalidating network devices with illicit peripherals.
  96. Harris, Adam P.; Schneider, Steve C., Invalidating network devices with illicit peripherals.
  97. Harris, Adam P.; Schneider, Steve C., Invalidating network devices with illicit peripherals.
  98. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  99. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  100. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  101. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  102. Sambhwani, Sharad; Heidari, Ghobad, Low I/O bandwidth method and system for implementing detection and identification of scrambling codes.
  103. Sambhwani, Sharad; Heidari, Ghobad, Low I/O bandwidth method and system for implementing detection and identification of scrambling codes.
  104. Sambhwani,Sharad; Heidari,Ghobad, Low I/O bandwidth method and system for implementing detection and identification of scrambling codes.
  105. Harris, Adam P.; Schneider, Steve C., Maintaining community integrity.
  106. Harris, Adam P.; Schneider, Steve C., Managing game metrics and authorizations.
  107. Harris, Adam P.; Schneider, Steve C., Managing game metrics and authorizations.
  108. Novack, Brian M; Dunmire, David; Hicks, Jason; Rakers, Matthew A, Media services with access control.
  109. Novack, Brian M; Dunmire, David; Hicks, Jason; Rakers, Matthew A, Media services with access control.
  110. Novack, Brian M; Dunmire, David; Hicks, Jason; Rakers, Matthew A, Media services with access control.
  111. Novack, Brian M; Dunmire, David; Hicks, Jason; Rakers, Matthew A, Media services with access control.
  112. Rassool,Reza; Worzel,William P.; Baker,Brian, Media tracking system and method.
  113. Sakata,Kazuhiro, Message reception device, message reception method, and program for receiving message is recorded.
  114. Skatter, Sondre; Tolson, Michael, Method and apparatus for a distributable globe graphical object.
  115. DeTreville,John D., Method and apparatus for authenticating an open system application to a portable IC device.
  116. Banaugh, Michelle; Fry, Peggy J.; Potter, David; Wood, George Luis, Method and apparatus for integrated payments processing and decisioning for internet transactions.
  117. Croak, Marian; Eslambolchi, Hossein, Method and apparatus for monitoring client software usage in end user device.
  118. Croak, Marian; Eslambolchi, Hossein, Method and apparatus for monitoring client software usage in end user device.
  119. Koelle,Katharina Veronika; Worzel,William P., Method and apparatus for protection of electronic media.
  120. Master, Paul L., Method and system for achieving individualized protected space in an operating system.
  121. Krislov, Clinton A., Method and system for automated document registration.
  122. Krislov, Clinton A., Method and system for automated document registration with cloud computing.
  123. Master, Paul L., Method and system for creating and programming an adaptive computing engine.
  124. Morten,Glenn A.; Rassool,Reza P.; Claeys,Tom E.; Baker,Brian Andrew, Method and system for end to end securing of content for video on demand.
  125. Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
  126. Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
  127. Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
  128. Plunkett, Robert T.; Heidari, Ghobad; Master, Paul L., Method and system for managing hardware resources to implement system functions using an adaptive computing architecture.
  129. Morten, Glenn A.; Palmer, Tomás E.; MacLean, Charles D., Method and system for providing secure CODECS.
  130. Zhuk, Oscar V.; Rohr, Vince M., Method and system for real-time tamper evidence gathering for software.
  131. Scheuermann, W. James, Method and system for reconfigurable channel coding.
  132. Scheuermann, W. James, Method and system for reconfigurable channel coding.
  133. Scheuermann, W. James, Method and system for reconfigurable channel coding.
  134. Scheuermann, W. James, Method and system for reconfigurable channel coding.
  135. Krislov, Clinton A., Method and system for secure automated document registration from social media networks.
  136. Yamamoto,Hideki; Taniguchi,Masayuki; Sato,Masaki; Kondo,Norio; Ikeno,Atsushi, Method and system for selling content.
  137. Speare,John Gerard; Waxman,Peter David; DeMello,Marco A., Method for dynamic application of rights management policy.
  138. Gu,Xue; Sun,Tong; Cot��,Alan Thomas; Shepherd,Michael David, Method for dynamic knowledge capturing in production printing workflow domain.
  139. Koelle, Katharina Veronika; Midwinter, Wendy, Method for evolving detectors to detect malign behavior in an artificial immune system.
  140. Koelle, Katharina Veronika; Midwinter, Wendy, Method for evolving detectors to detect malign behavior in an artificial immune system.
  141. Dorwin, David Kimbal; Finnan, Hugh, Method for reducing time to first frame/seek frame of protected digital content streams.
  142. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  143. Speare, John Gerard; Graham, Christopher Frederick; Waxman, Peter David, Method for updating data in accordance with rights management policy.
  144. Hamatake, Masafumi; Sugiura, Yoko, Method, apparatus, and computer product for embedding an electronic watermark into image data.
  145. Dorwin, David Kimbal; Scherkus, Andrew; Kaiser, Christian; Lacey, Stephen John, Method, manufacture, and apparatus for configuring multiple content protection systems.
  146. Dorwin, David Kimbal, Method, manufacture, and apparatus for content decryption module.
  147. Dorwin, David Kimbal; Scherkus, Andrew; Lacey, Stephen John; Kaiser, Christian, Method, manufacture, and apparatus for content protection for HTML media elements.
  148. Dorwin, David Kimbal; Scherkus, Andrew; Kaiser, Christian, Method, manufacture, and apparatus for content protection using authentication data.
  149. Dorwin, David Kimbal, Method, manufacture, and apparatus for instantiating plugin from within browser.
  150. Dorwin, David Kimbal; Scherkus, Andrew Martin, Method, manufacture, and apparatus for protection of media objects from the web application environment.
  151. Master,Paul L.; Hogenauer,Eugene; Wu,Bicheng William; Chuang,Dan MingLun; Freeman Benson,Bjorn, Method, system and program for developing and scheduling adaptive integrated circuity and corresponding control or configuration information.
  152. Foster, Eric M.; Lotspiech, Jeffrey B.; Pestoni, Florian; Plouffe, Jr., Wilfred E.; Schaffa, Frank A., Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient.
  153. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P.; Sibert, W. Olin; Van Wie, David M., Methods and apparatus for persistent control and protection of content.
  154. Malat,Scott; Dussel,David; Black,Cheryl; Priolo,James; Murphy,Sharon; Marfleet,Jackie; Ross,Douglas W.; Herzog,Susan, Methods and systems for managing call reports for the financial services industry.
  155. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  156. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  157. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  158. Strohwig, Marc E.; McGinty, John M.; Sibert, W. Olin, Methods and systems for transaction record delivery using thresholds and multi-stage protocol.
  159. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  160. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  161. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  162. Kurzweil,Raymond C.; Albrecht,Paul; Gashel,James; Gibson,Lucy, Mode processing in portable reading machine.
  163. Drope, Philip, Multimedia network system with content importation, content exportation, and integrated content management.
  164. Janes,Sherman M., Network communications security agent.
  165. Janes,Sherman M., Network communications security agent.
  166. Baugher,Mark J.; Farnham,Stu; Hemminger,Stephen C.; Marshall,Robert A.; Tait,Mark, Network content management.
  167. Tinker, Jeffrey Lee; MacLean, Charles Duncan; Ali, Hamid Shaheed; Hiar, Edward Charles; Rutman, Michael; Morten, Glenn A., Non-blocking of head end initiated revocation and delivery of entitlements non-addressable digital media network.
  168. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  169. Francisco, Paul A.; Petschauer, Frederick J., Point of sale tax reporting and automatic collection system with tax register.
  170. Francisco, Paul A.; Petschauer, Frederick J., Point of tax reporting and automatic collection system with tax register.
  171. Zhuk, Oscar V.; Morten, Glenn A.; Hiar, Edward Charles, Preventing unauthorized modification or skipping of viewing of advertisements within content.
  172. Choi, In-sung, Printing device capable of authorizing printing limitedly according to user level, printing system using the same and printing method thereof.
  173. Choi, In-sung, Printing device capable of authorizing printing limitedly according to user level, printing system using the same and printing method thereof.
  174. Baker, Brian, Process and streaming server for encrypting a data stream.
  175. Baker,Brian, Process and streaming server for encrypting a data stream.
  176. Morten,Glenn A.; Baker,Brian, Process and streaming server for encrypting a data stream to a virtual smart card client system.
  177. Baker, Brian A.; Morten, Glenn A.; MacLean, Charles Duncan; Tinker, Jeffrey Lee, Process and streaming server for encrypting a data stream with bandwidth based variation.
  178. Baker, Brian A.; Morten, Glenn A.; MacLean, Charles Duncan; Tinker, Jeffrey Lee, Process and streaming server for encrypting a data stream with bandwidth based variation.
  179. Paksoy, Erdal; Shankar, Narendar; Redin, Sven-Inge, Process of manufacturing a handheld device, involving keys.
  180. Paksoy, Erdal; Shankar, Narendar; Redin, Sven-Inge, Processor system.
  181. Peinado,Marcus; Venkatesan,Ramarathnam; Davis,Malcolm, Producing a new black box for a digital rights management (DRM) system.
  182. Master, Paul L., Profiling of software and circuit designs utilizing data operation analyses.
  183. Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
  184. Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
  185. Chen, Hao-Nong; Rutman, Michael; MacLean, Charles Duncan; Hiar, Edward Charles; Morten, Glenn A., Progressive download or streaming of digital media securely through a localized container and communication protocol proxy.
  186. Dorwin, David Kimbal, Reducing time to first encrypted frame in a content stream.
  187. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  188. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  189. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  190. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  191. England, Paul; Peinado, Marcus, Saving and retrieving data based on public key encryption.
  192. Pinkas,Binyamin; Sander,Tomas, Secure authentication systems and methods.
  193. Master, Paul L.; Murray, Eric; Mehegan, Joseph; Plunkett, Robert Thomas, Secure storage of program code for an embedded system.
  194. MacLean, Charles Duncan; Inskip, Thomas, Selective and persistent application level encryption for video provided to a client.
  195. Kollmyer,Brad; Baker,Brian A.; Shapiro,Eric Bradley; Kollmyer,Aric; Rutman,Mike; MacLean,Charles Duncan; Robertson,Dan; Taylor,Neal; Hunsche,Dick; Walker,Amanda, Selectively encrypting different portions of data sent over a network.
  196. Sellier, Laurent E.; Gayles, Edward James; Lynch-Freshner, Lawrence Arnold; Rachabathuni, Sailesh; Berbessou, David; Zhou, Xuejin, Sharing media items with pass phrases.
  197. Yuval, Gideon A., Software anti-piracy systems and methods utilizing certificates with digital content.
  198. Yuval,Gideon A., Software anti-piracy systems and methods utilizing certificates with digital content.
  199. Home, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  200. Home, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  201. Horne, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  202. Horne, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  203. Horne, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  204. Horne, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  205. Homing, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Home, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  206. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  207. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  208. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  209. Wecker,David Brian, Software-generated machine identifier.
  210. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifiying security for an element by assigning a scaled value representative of the relative security thereof.
  211. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  212. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  213. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  214. Master,Paul L.; Watson,John, Storage and delivery of device features.
  215. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for authenticating an operating system.
  216. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  217. England,Paul; Lampson,Butler W.; DeTreville,John D., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  218. Gehrmann, Christian, System and method for efficient security domain translation and data transfer.
  219. Benson, Glenn, System and method for end to end encryption.
  220. Nagle, John, System and method for improving integrity of internet search.
  221. Nagle, John, System and method for improving integrity of internet search.
  222. Nagle, John, System and method for improving integrity of internet search.
  223. Land, Michael Z.; McConnell, Peter N.; McMahon, Michael J., System and method for multimedia authoring and playback.
  224. Land,Michael Z.; McConnell,Peter N.; McMahon,Michael J., System and method for multimedia authoring and playback.
  225. Varadarajan, Sridhar; Rao, Korrapati Kalyana, System and method for protected content rendering.
  226. Willman, Bryan Mark; England, Paul; Ray, Kenneth D.; Hunter, Jamie; McMichael, Lonnie Dean; LaSalle, Derek Norman; Jacomet, Pierre; Paley, Mark Eliot; Kurien, Thekkthalackal Varugis; Cross, David B., System and method for protected operating system boot using state validation.
  227. Gokturk, Salih Burak; Anguelov, Dragomir; Vanhoucke, Vincent O.; Lee, Kuang-chih; Vu, Diem Thanh; Yang, Danny; Shah, Munjal; Khan, Azhar, System and method for providing objectified image renderings using recognition information from images.
  228. Gokturk, Salih Burak; Anguelov, Dragomir; Vanhoucke, Vincent; Lee, Kuang-Chih; Vu, Diem; Yang, Danny; Shah, Munjal; Khan, Azhar, System and method for providing objectified image renderings using recognition information from images.
  229. Gokturk, Salih Burak; Anguelov, Dragomir; Vanhoucke, Vincent; Lee, Kuang-chih; Vu, Diem; Yang, Danny; Shah, Munjal; Khan, Azhar, System and method for providing objectified image renderings using recognition information from images.
  230. Lampson,Butler W.; DeTreville,John D.; England,Paul, System and method for secure storage data using a key.
  231. Lampson, Butler W.; DeTreville, John D.; England, Paul, System and method for secure storage of data using public and private keys.
  232. Kivimaki, Tommi; Karkkainen, Tero, System and method for secured configuration data for programmable logic devices.
  233. Rudd, James M., System and methods for managing the distribution of electronic content.
  234. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  235. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  236. Master, Paul L.; Watson, John, System for adapting device standards after manufacture.
  237. Master, Paul L.; Watson, John, System for authorizing functionality in adaptable hardware devices.
  238. Morten, Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  239. Morten,Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  240. Morten,Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  241. Serret Avila,Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  242. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  243. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  244. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  245. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  246. Carow, Michael D.; James, Vicki L., Systems and methods for authorization of information access.
  247. James, Vicki L., Systems and methods for authorization of information access.
  248. Pinkas, Binyamin; Sander, Tomas; Home, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  249. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  250. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  251. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  252. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  253. Pinkas,Binyamin; Sander,Tomas; Horne,William G., Systems and methods for conducting transactions and communications using a trusted third party.
  254. MacKay, Michael K.; Maher, David P., Systems and methods for governing content rendering, protection, and management applications.
  255. MacKay, Michael K.; Maher, David P., Systems and methods for governing content rendering, protection, and management applications.
  256. MacKay, Michael K.; Maher, David P., Systems and methods for governing content rendering, protection, and management applications.
  257. MacKay,Michael K.; Maher,David P., Systems and methods for governing content rendering, protection, and management applications.
  258. Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
  259. Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
  260. Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
  261. Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
  262. Maher,David P.; Rudd,James M.; Swenson,Eric J.; Landsman,Richard A., Systems and methods for managing and protecting electronic content and applications.
  263. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  264. Sibert, W. Olin, Systems and methods for protecting data secrecy and integrity.
  265. Sibert,W. Olin, Systems and methods for protecting data secrecy and integrity.
  266. Shamoon, Talal G., Systems and methods for retrofitting electronic appliances to accept different content formats.
  267. Shamoon,Talal G., Systems and methods for retrofitting electronic appliances to accept different content formats.
  268. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  269. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  270. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  271. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  272. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  273. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  274. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  275. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  276. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  277. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  278. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  279. Morten, Glenn A.; Hiar, Edward Charles; Jacobs, Andre; Veres, James E.; Zhuk, Oscar V.; Tinker, Jeffrey Lee, Tamper prevention and detection for video provided over a network to a client.
  280. Katragadda, Ramana; Spoltore, Paul; Howard, Ric, Task definition for specifying resource requirements.
  281. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  282. Banaugh, Michelle; Knowlton, Timothy R.; Wood, George L., Transaction ID system and process.
  283. Banaugh, Michelle; Knowlton, Timothy R.; Wood, George L., Transaction ID system and process.
  284. Rassool, Reza P.; Morten, Glenn A.; Baker, Brian A., Transitioning to secure IP communications for encoding, encapsulating, and encrypting data.
  285. Rassool, Reza P.; Morten, Glenn A.; Baker, Brian A., Transitioning to secure IP communications for encoding, encapsulating, and encrypting data.
  286. Nishio,Toshiroh, Transmitting device, reconstruction device, transmitting method and reconstruction method for broadcasts with hidden subtitles.
  287. Weeks, Stephen P.; Serret-Avila, Xavier, Trust management systems and methods.
  288. Weeks, Stephen P.; Serret-Avila, Xavier, Trust management systems and methods.
  289. Weeks, Stephen P.; Serret-Avila, Xavier, Trust management systems and methods.
  290. Weeks,Stephen P.; Serret Avila,Xavier, Trust management systems and methods.
  291. Weeks,Stephen P.; Serret Avila,Xavier, Trust management systems and methods.
  292. Weeks, Stephen P.; Serret-Avila, Xavier, Trust-management systems and methods.
  293. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  294. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  295. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  296. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  297. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  298. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  299. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  300. Yemeni,Yechiam; Florissi,Danilo; Dailianas,Apostolos, Unified monitoring and detection of intrusion attacks in an electronic system.
  301. Raju, Ramalinga Reddiar Shanmuga; Jayawanth, Tumkur Vajramsetty; Sabarish, Manavasi Santhanam, Unique versatile executor engine which can interpret and execute transaction structures and information views to build information systems.
  302. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  303. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  304. Maehiro,Kazutoyo, User name and profile information management.
  305. Matsuno, Yasumi; Maehiro, Kazutoyo, User-name switching method on network game.
  306. Yemini,Yechiam; Florissi,Danilo; Dailianas,Apostolos, Using electronic security value units to control access to a resource.
  307. Agarwal, Amit D.; George, Michael M.; Freed, Ian W.; Bezos, Jeffrey P.; Vosshall, Peter S., Utilizing phrase tokens in transactions.
  308. Agarwal, Amit D.; George, Michael M.; Freed, Ian W.; Bezos, Jeffrey P.; Vosshall, Peter S., Utilizing phrase tokens in transactions.
  309. Harris, Adam P.; Schneider, Steve C., Validation of network devices.
  310. Paksoy, Erdal; Shankar, Narendar; Redin, Sven-Inge, Wireless communications system communicating secyre SIM and IMEI between processors.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트