$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Digital rights management system operating on computing device and having black box tied to computing device 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0526290 (2000-03-15)
발명자 / 주소
  • Peinado, Marcus
  • Liu, Donna
  • Ganesan, Krishnamurthy
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Woodcock Washburn LLP
인용정보 피인용 횟수 : 380  인용 특허 : 32

초록

A digital rights management (DRM) system operates on a computing device when a user requests that an encrypted piece of digital content be rendered by the computer device. The computing device has an identifier. A black box performs decryption and encryption functions in the DRM system. The black bo

대표청구항

1. A digital rights management (DRM) system operating on a computing device when a user requests that an encrypted piece of digital content be rendered by the computer device, the computing device having an identifier, the DRM system comprising a black box for performing decryption and encryption fu

이 특허에 인용된 특허 (32)

  1. Chronister Clyde H. (6115 Bermuda Dunes Houston TX 77069), Ball valve having replaceable seals under full service pressure.
  2. Chelliah Raman ; Cornez Jason S. ; Dellar Carl ; Harrison Stephen ; Hempe John A. ; Hsu Chih-Cheng ; Golin Eric J. ; Price Charles A. ; Rutta Neal S. ; Wood Thomas A. ; Yamamoto Wayne K., Computer system and method for electronic commerce.
  3. Benson Glenn,DEX, Computer system for protecting a file and a method for protecting a file.
  4. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  5. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  6. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  7. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  8. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  9. Makoto Saito JP, Digital content management system and apparatus.
  10. Ryuji Ishiguro JP; Yoshitomo Osawa JP; Yoshio Osakabe JP; Makoto Sato JP; Hisato Shima ; Tomoyuki Asano JP, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING SYSTEM AND RECORDING MEDIUM USING AN APPARATUS ID AND PROVIDED LICENSE KEY FOR AUTHENTICATION OF EACH INFORMATI.
  11. England Paul ; DeTreville John D. ; Lampson Butler W., Loading and identifying a digital rights management operating system.
  12. Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Manipulating rights-to-execute in connection with a software copy protection mechanism.
  13. Sirbu Marvin A. ; Tygar J. D. ; Cox Benjamin T. H. ; Wagner Thomas, Method and apparatus for purchasing and delivering digital goods over a network.
  14. Mollier Jean (Bougival FRX), Method and device for protecting software delivered to a user by a supplier.
  15. Benson Greg,SEX ; Urich Gregory H.,SEX, Method and system for managing a data object so as to comply with predetermined conditions for usage.
  16. Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
  17. Schull Jonathan (Haverford PA), Method for encouraging purchase of executable and non-executable software.
  18. Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Remote access terminal security.
  19. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  20. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  21. Ryder ; Sr. John H. (Durham NC) Smith Susanna R. (Tampa FL), Self-verifying receipt and acceptance system for electronically delivered data objects.
  22. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  23. Erickson John S., System and method for managing copyrighted electronic media.
  24. Misra Pradyumna K. ; Graziadio Bradley J. ; Spies Terence R., System and method for software licensing.
  25. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
  26. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  27. Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
  28. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  29. Freeny ; Jr. Charles C. (Fort Worth TX), System for reproducing information in material objects at a point of sale location.
  30. Mori Ryoichi (Tokyo JPX), System for storing history of use of programs including user credit data and having access by the proprietor.
  31. Guillou Louis C. (Bourgbarre FRX), System for transmitting information provided with means for controlling access to the information transmitted.
  32. Comerford Liam D. (Carmel NY) Ledermann Peter G. (Pleasantville NY) Levy Lawrence I. (Yorktown Heights NY) White Steve R. (New York NY), Tamper resistant packaging for information protection in electronic circuitry.

이 특허를 인용한 특허 (380)

  1. Haney, Richard D., Ad hoc location sharing group between first and second cellular wireless devices.
  2. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  3. Cuff, Michael A.; Gehrke, Todd; Kasad, Farhad, Aggregate location dynometer (ALD).
  4. Cuff, Michael A.; Gehrke, Todd; Kasad, Farhad, Aggregate location dynometer (ALD).
  5. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  6. Marshall, Roger S.; Zhu, Yinjun, Ancillary data support in session initiation protocol (SIP) messaging.
  7. McFarland, Keith; Jain, Vishal, Anonymous voice conversation.
  8. Haney, Richard D., Apparatus and method for obtaining content on a cellular wireless device based on proximity.
  9. Haney, Richard D., Apparatus and method for obtaining content on a cellular wireless device based on proximity to other wireless devices.
  10. Loomis, Stephen; Gondhalekar, Mangesh Madhukar, Apparatus and method for skipping songs without delay.
  11. Haney, Richard D., Apparatus and method to transmit content to a cellular wireless device based on proximity to other wireless devices.
  12. Orthlieb, Carl W.; Pravetz, James P.; Rosenbaum, Sarah, Application rights enabling.
  13. Orthlieb,Carl W.; Pravetz,James P.; Rosenbaum,Sarah, Application rights enabling.
  14. Zhu, Yinjun; Thompson, Paul, Area event handling when current network does not cover target area.
  15. Hines, Gordon John; Tapia, Mario G.; Cousins, Will, Area watcher for wireless network.
  16. Hines, Gordon; Tapia, Mario G.; Cousins, Will, Area watcher for wireless network.
  17. Hildreth, Robert; Davis, Darren R.; Thomas, Myron C., Aspects of digital media content distribution.
  18. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  19. Griffin, John L.; McFarland, Keith A.; Wells, William P., Authenticating cloud computing enabling secure services.
  20. McFarland, Keith A., Authentication via motion of wireless device movement.
  21. McFarland, Keith A., Authentication via motion of wireless device movement.
  22. Yamanaka,Yasuhiro; Yoshitomi,Kazunori; Hisamatsu,Fumiaki; Yoshino,Kenji; Ueno,Shinichi, Authoring system, authoring key generator, authoring device, authoring method, and data supply device, information terminal and information distribution method.
  23. Winzenried, Oliver; Buchheit, Marcellus, Authorization code recovering method.
  24. Hines, John Gordon; Croy, Jonathan; Marshall, Roger Stuart, Automatic location identification (ALI) emergency services pseudo key (ESPK).
  25. Zhu, Yinjun; Conner, Cristine; Hines, Gordon John; Liao, Hsin-Chih; Pelligrini, William, Automatic location identification (ALI) service requests steering, connection sharing and protocol translation.
  26. Cao,Adrean T., Auxiliary program association table.
  27. Silverman, Andrew L.; Gupta, Madhuvan; Olson, Kipley J.; Thomas, Myron C., Background transcoding.
  28. Pedlow, Jr.,Leo M.; Agnihotri,Davender, Batch mode session-based encryption of video on demand content.
  29. Pedlow, Jr., Leo M.; Agnihotri, Davender, Bi-directional indices for trick mode video-on-demand.
  30. Pitt, Lance Douglas; DeLapp, Daniel D.; Lawrence, Sarah Jean, Cellular augmented radar/laser detection using local mobile network within cellular network.
  31. Pitt, Lance Douglas; Lawrence, Sarah Jean; DeLapp, Daniel D., Cellular augmented radar/laser detector.
  32. Pitt,Lance Douglas; Lawrence,Sarah Jean; DeLapp,Daniel D., Cellular augmented radar/laser detector.
  33. Pitt, Lance Douglas, Cellular augmented vehicle alarm notification together with location services for position of an alarming vehicle.
  34. Brennan, Todd, Centralized timed analysis in a network security system.
  35. Hug,Joshua D.; Fu,Xiaodong, Certificate based digital rights management.
  36. Agrawal, Sunil C.; Schultz, Roderick David, Client-side player file and content license verification.
  37. Pedlow, Jr.,Leo M., Composite session-based encryption of video on demand content.
  38. Fiatal, Trevor A.; Boynton, Lee R.; Burke, Scott M; Gustafson, Brian D.; Raj, Binu; Alvarado, William; Benitez, Juan; Duncan, Fred J., Connection architecture for a mobile network.
  39. Hines, Gordon John; Cousins, Will, Consequential location derived information.
  40. Candelore,Brant L., Content distribution for multiple digital rights management.
  41. Matsuyama,Shinako; Ishibashi,Yoshihito; Futamura,Ichiro; Kon,Masashi; Watanabe,Hideaki, Content distribution system authenticating a user based on an identification certificate identified in a secure container.
  42. Brennan, Todd, Content extractor and analysis system.
  43. Candelore, Brant L., Content personalization for digital content.
  44. Yamamoto, Masaya; Nakano, Toshihisa; Ohmori, Motoji; Kozuka, Masayuki, Content playback device.
  45. Nagao, Yutaka, Content providing system, content reproducing device, content reproducing method, and computer program.
  46. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, Jon D., Content replacement by PID mapping.
  47. Bonan,James; Candelore,Brant L.; Eyer,Mark Kenneth, Content scrambling with minimal impact on legacy devices.
  48. Hiratsuka, Satoshi, Contents supplying system.
  49. Risan, Hank; Fitzgerald, Edward Vincent, Controlling interaction of deliverable electronic media.
  50. Unger,Robert Allan; Candelore,Brant L., Critical packet partial encryption.
  51. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information based on limiting a span of an inverted cone for locating satellite in-range determinations.
  52. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  53. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  54. Pitt, Lance Douglas; Lamprecht, Leslie Johann; Martin, Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  55. Pitt,Lance Douglas; Lamprecht,Leslie Johann; Martin,Jeffrey Thomas, Culled satellite ephemeris information for quick, accurate assisted locating satellite location determination for cell site antennas.
  56. Briscoe,Robert John, Data distribution.
  57. Abe,Miki; Hosoi,Takafumi; Matsuda,Hiromi; Tanaka,Masao, Data recording apparatus, data recording method, and data transfer system.
  58. Ferren, Bran; Jung, Edward K. Y., Data recovery systems.
  59. Ferren, Bran; Jung, Edward K. Y., Data retrieval methods.
  60. Ferren, Bran; Jung, Edward K. Y., Data retrieval systems.
  61. Ferren, Bran; Jung, Edward K. Y., Data retrieval systems.
  62. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  63. Kohara,Ryoko; Hamada,Akira, Data storage apparatus.
  64. Unger,Robert Allan; Candelore,Brant L.; Pedlow, Jr.,Leo M., Decoding and decryption of partially encrypted information.
  65. Ryal,Kim Annon, Decryption system.
  66. Candelore, Brant L., Descrambler.
  67. Ginter, Jr., Thomas; Ali, Salman; Pann, Tim, Device independent caller data access for emergency calls.
  68. Enokida,Tomoaki, Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program.
  69. Verosub,Ellis; Tenneti,Sanjeev; Acharya,Kamal; Goldfarb,Solomon D.; Pringle,Todd; Bill,David S.; Prakash,Shailesh; Milligan,Adam, Digital content store system.
  70. Fox, Christopher J.; Strom, Clifford P.; Bordenet, Matthew J.; Siu, Michael Y.; DiAcetis, Stephen P., Digital license migration from first platform to second platform.
  71. Boccon-Gibod, Gilles; Boeuf, Julien G.; Manente, Michael G.; Bradley, William B., Digital rights management engine systems and methods.
  72. Candelore, Brant L., Digital rights management of a digital device.
  73. Shih, Yin, Disk drive with flexible data stream encryption.
  74. Chaudhury, Krish; Pravetz, James D., Document digest allowing selective changes to a document.
  75. Pravetz, James D.; Chaudhury, Krish; Agrawal, Sunil, Document modification detection and prevention.
  76. Pravetz, James D.; Chaudhury, Krish; Agrawal, Sunil, Document modification detection and prevention.
  77. Pravetz, James D.; Chaudhury, Krish; Agrawal, Sunil C., Document modification detection and prevention.
  78. Pravetz, James; Chaudhury, Krish; Agrawal, Sunil, Document modification detection and prevention.
  79. Watson,Scott F., Dual virtual machine architecture for media devices.
  80. Pedlow, Jr.,Leo M.; Agnihotri,Davender, Dynamic composition of pre-encrypted video on demand content.
  81. Chaudhury, Krish; Pravetz, James D., Dynamic enabling of functionality in electronic document readers.
  82. Chaudhury, Krish; Pravetz, James D., Dynamic enabling of functionality in electronic document readers.
  83. Chaudhury,Krish; Pravetz,James D., Dynamic enabling of functionality in electronic document readers.
  84. Thompson, Paul C., Efficient prisoner tracking.
  85. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M.; Mirsky,Gregory; Eyer,Mark Kenneth, Elementary stream partial encryption.
  86. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  87. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  88. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  89. Mitchell, Jr., Donald L.; Zhu, Yinjun; D'Souza, Myron; Marshall, Roger S., Emergency 911 data messaging.
  90. Ray, Kenneth D.; England, Paul; Biddle, Peter Nicholas, Enabling bits sealed to an enforceably-isolated environment.
  91. Yamamoto, Masaya; Nakano, Toshihisa; Motoji, Ohmori; Kozuka, Masayuki, Encrypted-content recording medium, playback apparatus, and playback method.
  92. Wood, Matthew D.; Graunke, Gary L., Encrypting message for secure transmission.
  93. Pedlow, Jr.,Leo M.; Candelore,Brant L.; Derovanessian,Henry, Encryption and content control in a digital broadcast system.
  94. Dickinson, Richard; Hines, Gordon John; Croy, Jonothan, Enhanced E911 network access for a call center using session initiation protocol (SIP) messaging.
  95. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for a call center using session initiation protocol (SIP) messaging.
  96. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  97. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  98. Dickinson, Richard; Hines, John Gordon; Croy, Jonathan, Enhanced E911 network access for call centers.
  99. Homer, Gregg S., Even more subscription media on demand.
  100. Zhu, Yinjun, Extended area event for network based proximity discovery.
  101. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  102. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  103. Geldenbott, Gerhard; Zhu, Yinjun; Hines, John Gordon; Burton, Victor, Extended efficient usage of emergency services keys.
  104. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  105. Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code from third computer process on behalf of first process.
  106. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  107. Lilikov, Andrey; Rule, Donald H.; Hatlelid, Kristjan E.; Zvi, Nir Ben, First computer process and second computer process proxy-executing code on behalf of first process.
  108. Lelikov, Andrey; Gunyakti, Caglar; Hatlelid, Kristjan E., First computer process and second computer process proxy-executing code on behalf thereof.
  109. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Fluid mediated disk activation and deactivation mechanisms.
  110. Haney, Richard D., Formation of wireless device location sharing group.
  111. Pitt, Lance Douglas, GeoNexus proximity detector network.
  112. Neely,Shawn R.; Kesteloot,Lawrence; Novotny,Margaret; Buchenau,Marion; Foley,Sheila A.; O'Neil,Michael, Grid-like guided user interface for video selection and display.
  113. Candelore, Brant L., IP delivery of secure digital content.
  114. Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D., Image anonymization.
  115. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Mangione-Smith, William H.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Implementation of media content alteration.
  116. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Implementing audio substitution options in media works.
  117. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Implementing group content substitution in media works.
  118. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William H.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Implementing group content substitution in media works.
  119. Ehrlich, Robert; Mitchell, Donald L.; Marshall, Roger S.; Hines, Gordon John, Index of suspicion determination for communications request.
  120. Nakano, Takehiko, Information processing apparatus and method.
  121. Nakano, Takehiko, Information processing apparatus and method.
  122. Nakano, Takehiko, Information processing apparatus and method.
  123. Nakano, Takehiko, Information processing apparatus and method.
  124. Nakano, Takehiko, Information processing apparatus and method.
  125. Nakano,Takehiko, Information processing apparatus and method.
  126. Oosawa, Takaharu, Information processor, method for controlling the same, and image forming system.
  127. Carey, W. Knox; Nilsson, Jarl, Information security systems and methods.
  128. Carey, W. Knox; Nilsson, Jarl, Information security systems and methods.
  129. Dublish, Pratul; Lyndersay, Sean; Chase, Jr., Charlie D.; Gunyakti, Caglar, Installation of black box for trusted component for digital rights management (DRM) on computing device.
  130. Latham, Weldon H.; Lorello, Timothy J.; Morin, Drew; White, Bruce, Integrated, detachable ear bud device for a wireless phone.
  131. Ghozati, Kambiz; Thompson, Paul, Intelligent load balancer enhanced routing.
  132. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  133. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  134. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  135. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  136. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  137. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  138. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  139. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  140. Bourne,Steve; Dillaway,Blair Brewster; Jacomet,Pierre; Malaviarachchi,Rushmi U.; Parambir,Kumar B.; Rozenfeld,Yevgeniy (Eugene); Venkatesh,Chandramouli; Rose, III,Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  141. Nakamura,Mie; Sawayanagi,Kazumi; Ozeki,Satoshi; Takano,Masahito; Yamauchi,Kana; Yoshizaki,Yoshihiko, License management apparatus, license management system and license management method.
  142. Ferren, Bran; Jung, Edward K. Y., Limited use data storing device.
  143. Ferren, Bran; Jung, Edward K. Y., Limited use data storing device.
  144. Ferren, Bran; Jung, Edward K. Y., Limited use data storing device.
  145. Ferren, Bran; Jung, Edward K. Y., Limited use memory device with associated information.
  146. Ferren, Bran; Jung, Edward K. Y., Limited use memory device with associated information.
  147. Gehrke, Todd; Wang, Chih; Lawrence, Sarah, Location based geo-reminders.
  148. Gehrke, Todd; Wang, Chih; Lawrence, Sarah, Location based geo-reminders.
  149. Gehrke, Todd; Wang, Chih; Kasad, Farhad, Location based proximity alert.
  150. Hines, Gordon John; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  151. Hines, Gordon John; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  152. Hines, Gordon; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  153. Hines, Gordon; Tapia, Mario G.; Cousins, Will; Carey, Patrick, Location derived presence information.
  154. Hines,Gordon John; Tapia,Mario G.; Cousins,Will; Carey,Patrick, Location derived presence information.
  155. Pitt, Lance Douglas, Location fidelity adjustment based on mobile subscriber privacy profile.
  156. Kasad, Farhad; Lockeby, Camron, Location privacy selector.
  157. Kasad, Farhad; Lockeby, Camron, Location privacy selector.
  158. Zhu, Yinjun; Hines, Gordon John; Burton, Victor; Liao, Hsin-Chih, Location service requests throttling.
  159. Zhu, Yinjun; Hines, Gordon John; Burton, Victor; Liao, Hsin-Chih, Location service requests throttling.
  160. Haney, Richard D., Location sharing and tracking using mobile phones or other wireless devices.
  161. Haney, Richard D., Location sharing and tracking using mobile phones or other wireless devices.
  162. Haney, Richard D., Location sharing group for services provision.
  163. Haney, Richard D., Location sharing group map management.
  164. Haney, Richard D., Location sharing service between GPS-enabled wireless devices, with shared target location exchange.
  165. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, John, Macro-block based content replacement by PID mapping.
  166. Haney, Richard D., Map presentation on cellular device showing positions of multiple other wireless device users.
  167. Candelore, Brant L., Mechanism for protecting the transfer of digital content.
  168. Munetsugu, Toshihiko; Nishitani, Kazuhiro; Kajimoto, Kazuo; Iwata, Yoshiaki; Tanikawa, Kentaro, Media contents distribution system and method.
  169. Munetsugu, Toshihiko; Nishitani, Kazuhiro; Kajimoto, Kazuo; Iwata, Yoshiaki; Tanikawa, Kentaro, Media contents distribution system and method.
  170. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Mangione-Smith, William H.; Malamud, Mark A.; Rinaldo, Jr., John D.; Tegreene, Clarence T., Media markup system for content alteration in derivative works.
  171. Farrugia, Augustin J.; Fasoli, Gianpaolo; Toublet, Bertrand Mollinier; Ciet, Mathieu, Media storage structures for storing content, devices for using such structures, systems for distributing such structures.
  172. Farrugia, Augustin J.; Fasoli, Gianpaolo; Toublet, Bertrand Mollinier; Ciet, Mathieu, Media storage structures for storing content, devices for using such structures, systems for distributing such structures.
  173. Brown, Stephen J., Medical device rights and recall management system.
  174. Ferren, Bran; Jung, Edward K. Y., Memory device activation and deactivation.
  175. Candelore, Brant L.; Eyer, Mark, Method and apparatus for implementing revocation in broadcast networks.
  176. Candelore, Brant L., Method and apparatus for protecting the transfer of data.
  177. Candelore,Brant L., Method and apparatus for securing control words.
  178. Dawson, Thomas Patrick, Method and apparatus for synchronizing dynamic graphics.
  179. Hartung, Frank; Holtmanns, Silke, Method and devices for the control of the usage of content.
  180. Echizen,Isao; Yoshiura,Hiroshi; Miyazaki,Kunihiko; Anzai,Kousuke; Taguchi,Jun'ichi; Nakano,Kazunori; Okeya,Katsuyuki, Method and system for contents control.
  181. Risan,Hank; Fitzgerald,Edward Vincent, Method and system for controlled media sharing in a network.
  182. Risan, Hank; Fitzgerald, Edward Vincent, Method and system for controlling presentation of computer readable media on a media storage device.
  183. Risan, Hank; Fitzgerald, Edward Vincent, Method and system for controlling presentation of computer readable media on a media storage device.
  184. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  185. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  186. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  187. Ferren, Bran; Goodall, Eleanor V.; Jung, Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  188. Ferren,Bran; Goodall,Eleanor V.; Jung,Edward K. Y., Method and system for fluid mediated disk activation and deactivation.
  189. Peled, Ariel; Troyansky, Lidror; Carny, Ofir, Method and system for protecting confidential information.
  190. Peled, Ariel; Troyansky, Lidror; Carny, Ofir, Method and system for protecting confidential information.
  191. Siegal, Jon; Rowell, Simon; Hintz, Thomas, Method and system for providing online authentication utilizing biometric data.
  192. Crawford,C. S. Lee, Method for controlling access within a distributed system containing at least one networked processor-based system and a plurality of non-networked processor-based systems.
  193. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  194. Kiiveri,Antti, Method for processing audiovisual information in an electronic device, a system, and an electronic device.
  195. R��nkk��,Risto; Sormunen,Toni; Kiiveri,Antti; Jauhiainen,Antti, Method for processing information in an electronic device, a system, an electronic device and a processing block.
  196. Risan, Hank; Fitzgerald, Edward Vincent, Method for providing curriculum enhancement using a computer-based media access system.
  197. Candelore, Brant L., Method for simulcrypting scrambled data to a plurality of conditional access devices.
  198. Homer, Gregg S., Method for subscription media on-demand.
  199. Crawford, C. S. Lee, Method of conducting operations for a social network application including activity list generation.
  200. Crawford, C. S. Lee, Method of conducting social network application operations.
  201. Crawford, C. S. Lee, Method of conducting social network application operations.
  202. Crawford, C. S. Lee, Method of conducting social network application operations.
  203. Crawford, C. S. Lee, Method of managing and communicating data pertaining to software applications for processor-based devices comprising wireless communication circuitry.
  204. Ferren, Bran; Jung, Edward K. Y., Method of manufacturing a limited use data storing device.
  205. Ferren, Bran; Jung, Edward K. Y., Method of manufacturing a limited use data storing device.
  206. Ferren, Bran; Jung, Edward K. Y., Method of manufacturing a limited use data storing device including structured data and primary and secondary read-support information.
  207. Medvinsky,Alexander, Method of preventing unauthorized distribution and use of electronic keys using a key seed.
  208. Yuan, Weizhong; Zhang, Renzhou; Huang, Chen; Zhou, Zhipeng; Li, Qingliang, Method, device, and system for issuing license.
  209. Fernández, Alvaro, Methods and apparatus for transmitting multimedia files and advertisements.
  210. Fernández, Alvaro, Methods and apparatus for transmitting multimedia files and advertisements.
  211. Fernández Gutiérrez, Álvaro, Methods and apparatus for transmitting multimedia files in a data network.
  212. Haney, Richard D., Methods and apparatuses for geospatial-based sharing of information by multiple devices.
  213. Neumann, Matthew D.; Smith, Michael W., Methods and apparatuses for reducing or eliminating unauthorized access to tethered data.
  214. Neumann, Matthew D.; Smith, Michael W., Methods and apparatuses for securing tethered data.
  215. Haney, Richard D., Methods and apparatuses for transmission of an alert to multiple devices.
  216. Haney, Richard D., Methods and systems for annotating target locations.
  217. Cooley, Shaun; Newstadt, Keith, Methods and systems for determining a file set.
  218. Haney, Richard D., Methods and systems for sharing position data and tracing paths between mobile-device users.
  219. Haney, Richard D., Methods and systems for sharing position data between subscribers involving multiple wireless providers.
  220. Haney, Richard D., Methods and systems for temporarily sharing position data between mobile-device users.
  221. Haney, Richard D., Methods and systems for temporarily sharing position data between mobile-device users.
  222. Fernández, Alvaro, Methods and transmitting multimedia files and advertisements.
  223. Fernandez, Alvaro, Methods for distributions of digital files.
  224. Fernandez, Alvaro, Methods for transmitting multimedia files and advertisements.
  225. Fernandez, Alvaro, Methods for transmitting multimedia files and advertisements.
  226. Fernandez, Alvaro, Methods for transmitting multimedia files and advertisements.
  227. Fernandez, Alvaro, Methods for transmitting multimedia files and advertisements.
  228. Fernández, Alvaro, Methods for transmitting multimedia files and advertisements.
  229. Fernández, Alvaro, Methods for transmitting multimedia files and advertisements.
  230. Fernández, Alvaro, Methods for transmitting multimedia files and advertisements.
  231. Fernández, Alvaro, Methods for transmitting multimedia files and advertisements.
  232. Haney, Richard D., Methods, systems and apparatuses for the formation and tracking of location sharing groups.
  233. Haney, Richard D., Methods, systems and apparatuses for the formation and tracking of location sharing groups.
  234. Dickinson, Richard, Mobile automatic location identification (ALI) for first responders.
  235. Fiatal, Trevor A.; Boynton, Lee R.; Burke, Scott M; Gustafson, Brian D.; Raj, Binu; Alvarado, William; Benitez, Juan; Duncan, Fred J., Mobile device having power save feature for establishing communications.
  236. Fiatal, Trevor A.; Boynton, Lee R.; Burke, Scott M.; Gustafson, Brian D.; Raj, Binu; Alvarado, William; Benitez, Juan; Duncan, Fred J., Mobile device power management in data synchronization over a mobile network with or without a trigger notification.
  237. Zhu, Yinjun, Mobile internet protocol (IP) location.
  238. Zhu, Yinjun, Mobile internet protocol (IP) location.
  239. Ferren, Bran; Jung, Edward K. Y., Modifiable memory devices having limited expected lifetime.
  240. Homer, Gregg S., More subscription media on demand.
  241. Neely,Shawn R.; Kesteloot,Lawrence; Novotny,Margaret; Buchenau,Marion; Foley,Sheila A.; O'Neil,Michael, Mosaic-like user interface for video selection and display.
  242. Watson, Scott F., Multi virtual machine architecture for media devices.
  243. Candelore,Brant L., Multi-process descrambler.
  244. Gondhalekar,Mangesh Madhukar; Viswanathan,Rajesh; Prakash,Shailesh; Loomis,Stephen; Van Huysse,James Patrick; Carlson,Cameo Dawn, Multimedia scheduler.
  245. Candelore, Brant L., Multiple DRM management.
  246. Zhu, Yinjun, Multiple location retrieval function (LRF) network having location continuity.
  247. Kikuchi,Takeshi; Terada,Kosei, Musical scores distributing system.
  248. Pitt, Lance D.; Ginter, Thomas; Hines, Gordon John; Burton, Victor; Ramberg, Mark, N-dimensional affinity confluencer.
  249. Geldenbott, Gerhard; Hines, Gordon J.; Martin, Jeff; Day, Ed, Nationwide table routing of voice over internet protocol (VOIP) emergency calls.
  250. Rowe, Edward R. W., Nestable skeleton decryption keys for digital rights management.
  251. Rowe,Edward R., Nestable skeleton decryption keys for digital rights management.
  252. Cuff, Michael; Wang, Chih; Kasad, Farhad; Aryana, Firdaus; Hines, Gordon J., No responders online.
  253. Pitt,Lance Douglas; Lamprecht,Leslie Johann; Martin,Jeffrey Thomas, Other cell sites used as reference point to cull satellite ephemeris information for quick, accurate assisted locating satellite location determination.
  254. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  255. Collens, Daniel A.; Watson, Stephen; Malcolm, Michael A., Parallel distribution and fingerprinting of digital content.
  256. Collens,Daniel A.; Watson,Stephen; Malcolm,Michael A., Parallel distribution and fingerprinting of digital content.
  257. Candelore, Brant L., Parental control of displayed content using closed captioning.
  258. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M., Partial encryption and PID mapping.
  259. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M., Partial encryption and PID mapping.
  260. Pitt, Lance Douglas; Hines, Gordon John; Griffin, John, Persona-notitia intellection codifier.
  261. Abu-Amara, Hosame H., Piracy prevention in digital rights management systems.
  262. Pedlow, Jr., Leo M.; Agnihotri, Davender, Preparation of content for multiple conditional access methods in video on demand.
  263. Fernández Gutiérez, Alvaro, Process for the on-line sale of a software product.
  264. Fernández Gutiérrez, Alvaro, Process for the on-line sale of a software product.
  265. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Progressive video refresh slice detection.
  266. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D.; Tegreene, Clarence T., Promotional placement in media works.
  267. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  268. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  269. Kocher, Paul C.; Handschuh, Helena, Protecting media items using a media security controller.
  270. Alkove, James M.; Grigorovitch, Alexandre V.; Barde, Sumedh N.; Schnell, Patrik, Provisioning a computing system for digital rights management.
  271. Alkove, James M.; Grigorovitch, Alexandre V.; Barde, Sumedh N.; Schnell, Patrik, Provisioning a computing system for digital rights management.
  272. Ellison,Carl M.; Traw,Brendan; Ripley,Michael S.; Graunke,Gary L., Public key media key block.
  273. Rhodes, Jeffrey C.; Luo, Tong; Burton, Victor; Conner, Christine, Public safety access point (PSAP) selection for E911 wireless callers in a GSM type system.
  274. Sachdev, Vineet; McFarland, Keith; Griffin, John L., Quality of service to over the top applications used with VPN.
  275. Cuff, Michael; Wang, Chih; Kasad, Farhad; Aryana, Firdaus; Hines, Gordon J., Rapid assignment dynamic ownership queue.
  276. Homer, Gregg S., Rechargeable media distribution and play system.
  277. Sako,Yoichiro; Inokuchi,Tatsuya, Recording medium, recording and/or reproducing method for record medium, and recording and/or reproducing device for recording medium.
  278. Peinado, Marcus; England, Paul; Yerrace, Frank, Releasing decrypted digital content to an authenticated path.
  279. Peinado,Marcus; England,Paul; Yerrace,Frank, Releasing decrypted digital content to an authenticated path.
  280. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  281. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  282. Haney, Richard D., Rendez vous management using mobile phones or other mobile devices.
  283. Gajjala,Vijay K.; Ganesan,Krishnamurthy; McKune,Jeffrey R., Retail transactions involving digital content in a digital rights management (DRM) system.
  284. Jain, Amit; Cutter, Benjamin Brooks; Evans, Brian P.; Strom, Clifford P., Retention of information about digital-media rights in transformed digital media content.
  285. D'Souza, Myron; Hines, Gordon John; Bartnik, David; Hannan, Joseph; Groen, Joel; Wells, William, Roaming gateway enabling location based services (LBS) roaming for user plane in CDMA networks without requiring use of a mobile positioning center (MPC).
  286. Fahrny, James W., Roaming hardware paired encryption key generation.
  287. Ferren, Bran; Jung, Edward K. Y.; Tegreene, Clarence T., Rotation responsive disk activation and deactivation mechanisms.
  288. Ferren, Bran; Jung, Edward K. Y.; Tegreene, Clarence T., Rotation responsive disk activation and deactivation mechanisms.
  289. Thompson, Paul; Hines, Gordon John, SUPL-WiFi access point controller location based services for WiFi enabled mobile devices.
  290. Watson, Stephen, Sales of collections excluding those already purchased.
  291. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  292. Hydrie, Aamer; Miller, John; Klemets, Anders E.; Gkantsidis, Christos; Rodriguez, Pablo Rodriguez; Weiss, Rebecca C., Secure content descriptions.
  293. Mathur, Priyadarshee Deeptarag; Reutiman, Robert J.; Mittal, Samir, Secure content distribution.
  294. Hamilton, Keith, Secure distributed publish/subscribe system.
  295. McFarland, Keith A.; Ghozati, Kambiz; Stevens, John; Wells, Wiliam P., Secure distribution of non-privileged authentication credentials.
  296. Boynton, Lee R.; Fiatal, Trevor A.; Burke, Scott M.; Sikes, Mark, Secure end-to-end transport through intermediary nodes.
  297. Boynton, Lee R.; Fiatal, Trevor A.; Burke, Scott M.; Sikes, Mark, Secure end-to-end transport through intermediary nodes.
  298. Boynton, Lee R.; Fiatal, Trevor A.; Burke, Scott M.; Sikes, Mark, Secure end-to-end transport through intermediary nodes.
  299. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  300. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  301. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  302. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  303. Evans,Glenn F.; Bradstreet,John, Secure media path methods, systems, and architectures.
  304. Malcolm, Michael A.; Collins, Daniel A.; Watson, Stephen; Rechsteiner, Paul; Hui, Kevin, Secure presentation of media streams in response to encrypted content.
  305. Malcolm, Michael A.; Collens, Daniel A.; Watson, Stephen; Rechsteiner, Paul; Hui, Kevin, Secure presentation of media streams in response to encrypted digital content.
  306. Alkove, James M.; Grigorovitch, Alexandre V.; Schnell, Patrik, Secure storage for digital rights management.
  307. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  308. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  309. Fanton, Andrew F.; Gandee, John J.; Lutton, William H.; Harper, Edwin L.; Godwin, Kurt E.; Rozga, Anthony A., Secure system for allowing the execution of authorized computer program code.
  310. Alkove, James M.; Grigorovitch, Alexandre V.; Schnell, Patrik, Secure time source operations for digital rights management.
  311. Candelore,Brant L., Selective encryption for video on demand.
  312. Candelore,Brant L., Selective encryption to enable multiple decryption keys.
  313. Candelore,Brant L.; Poslinski,Tom, Selective encryption to enable trick play.
  314. Candelore, Brant L., Selective encryption with coverage encryption.
  315. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Slice mask and moat pattern partial encryption.
  316. Ronning, Joel A.; Efergan, David; Olson, Pete; Rauf, Amir, Software license server with geographic location validation.
  317. Ben-Menahem, Avi; Ben-Zvi, Nir; Miller, Ronald W., Software licensing using certificate issued by authorized authority.
  318. Ronning, Joel A.; Efergan, David; Olson, Pete; Rauf, Amir, Software wrapper having use limitation within a geographic boundary.
  319. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  320. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  321. Zhu, Yinjun; Dickinson, Richard; Marshall, Roger; Helme, Steven P., Solutions for voice over internet protocol (VoIP) 911 location services.
  322. Poremba, Todd, Special emergency call treatment based on the caller.
  323. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifiying security for an element by assigning a scaled value representative of the relative security thereof.
  324. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  325. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  326. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Star pattern partial encryption.
  327. Shih, Yin Lung, Storage device with traceable watermarked content.
  328. Knauft,Christopher L., System and method for controlling and enforcing access rights to encrypted media.
  329. Nimon, Robert E.; Nimon, Kimmy F.; Espenlaub, David E., System and method for digital rights management of digital media.
  330. Nimon, Robert E.; Nimon, Kimmy F.; Espenlaub, David E., System and method for digital rights management of digital media.
  331. Wakabayashi, Kazuya, System and method for encrypting and rewarding users for sharing streaming media between mobile devices over an ad-hoc network.
  332. Pedlow, Jr.,Leo M.; Derovanessian,Henry; Candelore,Brant, System and method for partially encrypted multimedia stream.
  333. Varadarajan, Sridhar; Rao, Korrapati Kalyana, System and method for protected content rendering.
  334. Nguyen, Mai; Wang, Xin; Chen, Eddie J.; Tadayon, Bijan, System and method for rights offering and granting using shared state variables.
  335. Candelore, Brant L.; Pedlow, Jr., Leo M., System and method for the creation, synchronization and delivery of alternate content.
  336. Candelore, Brant L., System, method and apparatus for secure digital content transmission.
  337. Phadke, Madhav S.; Phadke, Kedar M., System, method and apparatus for securely distributing content.
  338. Crawford,C. S. Lee, Systems and methods for controlling access within a system of networked and non-networked processor-based systems.
  339. Cooley, Shaun; Sobel, William E.; McCorkendale, Bruce, Systems and methods for determining a file set.
  340. McCurdy, Kevin; Pai, Samuel Hong-Yen; Kelleher, John; Maggiotto, Richard, Systems and methods for distributing and viewing electronic documents.
  341. McCurdy,Kevin; Pai,Samuel Hong Yen; Kelleher,John; Maggiotto,Richard, Systems and methods for distributing and viewing electronic documents.
  342. MacKay, Michael K.; Maher, David P., Systems and methods for governing content rendering, protection, and management applications.
  343. MacKay, Michael K.; Maher, David P., Systems and methods for governing content rendering, protection, and management applications.
  344. Messinger, Jason Howard; Domke, Michael Christopher; Theurer, Charles Burton; Sbihli, Scott Leo; Ward, Robert Carroll; De Fromont, Francois Xavier, Systems and methods for licensing non-destructive testing content.
  345. Candelore, Brant L., Targeted advertisement selection from a digital stream.
  346. Haney, Richard D., Techniques for communication within closed groups of mobile devices.
  347. Haney, Richard D., Techniques for sharing position data between first and second devices.
  348. Haney, Richard D., Techniques for sharing relative position between mobile devices.
  349. Wallace, Erik; Morin, Drew; Pitt, Lance D.; Murphy, Sean, Telematics basic mobile device safety interlock.
  350. Candelore, Brant L.; Unger, Robert Allan; Derovanessian, Henry, Time division partial encryption.
  351. Candelore,Brant L.; Unger,Robert Allan; Derovanessian,Henry, Time division partial encryption.
  352. Haney, Richard D., Tracking proximity of services provider to services consumer.
  353. Kiilerich, Dennis A, Transcode matrix.
  354. Dubhashi, Kedarnath A; Barde, Sumedh N; Farag, Hany, Translating DRM system requirements.
  355. Pitt, Lance Douglas; DeLapp, Daniel D.; Lawrence, Sarah Jean, Transmitter augmented radar/laser detection using local mobile network within a wide area network.
  356. Kori,Teruhiko; Fujii,Asako, Transmitter, signal transmitting method, and data distributing system for transferring a content signal or processing copyright protection on a content signal.
  357. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank 911 calls.
  358. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank emergency 911 calls.
  359. Goswami, Bhavesh; Burton, Victor; Geldenbott, Gerhard; Ali, Salman; Saha, Arpita; Chua, Yi-Min Flora; Hazzard, Andy, Unique global identifier header for minimizing prank emergency 911 calls.
  360. Candelore,Brant L.; Derovanessian,Henry, Upgrading of encryption.
  361. Farrugia, Augustin J.; Dowdy, Thomas; Fasoli, Gianpaolo, Use of media storage structure with multiple pieces of content in a content-distribution system.
  362. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  363. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  364. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  365. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  366. Zhu, Yinjun, User plane location based service using message tunneling to support roaming.
  367. Zhu,Yinjun, User plane location based service using message tunneling to support roaming.
  368. Zhu, Yinjun; Hines, Gordon John; Marshall, Roger; Yang, Fei; Burton, Victor, User plane location services over session initiation protocol (SIP).
  369. Zhu, Yinjun; Hines, Gordon John; Marshall, Roger; Yang, Fei; Burton, Victor, User plane location services over session initiation protocol (SIP).
  370. Nguyen, Linda K.; Lin, Jasper S., Verifying that a purchasing request is legitimate.
  371. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Video scene change detection.
  372. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Video slice and active region based multiple partial encryption.
  373. Croy, Jon; Hines, John Gordon, Voice Over Internet Protocol (VoIP) location based conferencing.
  374. Croy, Jon; Hines, John Gordon; Johnson, Darrin; Lendvay, Kathleen, Voice over internet protocol (VoIP) multi-user conferencing.
  375. Rhoads, Geoffrey B., Watermarking to convey auxiliary information, and media embodying same.
  376. Mitchell, Jr., Donald L.; Marshall, Roger S.; Singer, Andrew; Aryana, Firdaus, Wireless emergency caller profile data delivery over a legacy interface.
  377. Havlark, Arlene; Burton, Victor; Ahrens, John, Wireless telecommunications location based services scheme selection.
  378. Havlark, Arlene; Burton, Victor; Ahrens, John, Wireless telecommunications location based services scheme selection.
  379. Pitt, Lance D.; Ginter, Thomas; Aryana, Firdaus; Mitchell, Jr., Donald Le Roy, iALERT enhanced alert manager.
  380. Pitt, Lance D.; Ginter, Thomas; Aryana, Firdaus; Mitchell, Jr., Donald Le Roy, iALERT enhanced alert manager.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로