$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Adaptable security mechanism for preventing unauthorized access of digital data 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/14
출원번호 US-0468279 (1999-12-20)
발명자 / 주소
  • Ansell, Steven T.
  • Cherenson, Andrew R.
  • Rishniw, Leon
  • Cannon, Susan A.
  • Allard, Edward J.
  • Brownell, Jason S.
  • Stroud, Micah
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Klarquist, Sparkman, LLP
인용정보 피인용 횟수 : 93  인용 특허 : 17

초록

Content such as computer software, data representing audiovisual works, and electronic documents can converted from a machine-bound state to user-bound state without modification to the content data itself. Instead, keys used to access the content are converted from the machine-bound state to the us

대표청구항

1. A method for converting content data from machine-bound to user-bound, the method comprising:(i) binding the content data to one or more hardware devices using one or more binding keys which are related to the one or more hardware devices;(ii) converting the one or more binding keys to form one o

이 특허에 인용된 특허 (17)

  1. Allen Richard, Apparatus and method for an on demand data delivery system for the preview, selection, retrieval and reproduction at a.
  2. Allen Richard (111 E. Myrna La. Tempe AZ 85284), Apparatus and method for an on demand data delivery system for the preview, selection, retrieval and reproduction at a r.
  3. Matyas Stephen M. (Kingston NY) Oseas Jonathan (Hurley NY), Code protection using cryptography.
  4. Brugger Rolf (Keistenweg 1 CH-4310 Rheinfelden CHX), Device for the distribution of music information in digital form.
  5. Tycksen ; Jr. Frank A. ; Jennings Charles W., Digital product dissemination and sale.
  6. Blakley ; III George R. (Austin TX) Rogaway Phillip W. (Davis CA), Method to protect information on a computer storage device.
  7. Philip R. Wiser ; Andrew R. Cherenson ; Steven T. Ansell ; Susan A. Cannon, Secure online music distribution system.
  8. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  9. Hicks Christian Bielefeldt ; Creath Peter Janssen, System and method for remote authorization for unlocking electronic data.
  10. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  11. Michael S. Kupka ; Michael G. Lundgren, System for prepayment of electronic content using removable media and for prevention of unauthorized copying of same.
  12. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  13. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  14. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  15. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  16. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  17. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.

이 특허를 인용한 특허 (93)

  1. Dorwin, David Kimbal; Colwell, Aaron James; Scherkus, Andrew Martin; Galligan, Francis, Allowing degraded play of protected content using scalable codecs when key/license is not obtained.
  2. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  3. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  4. Brickell, Ernest F., Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information.
  5. Nakano, Takehiko, Apparatus, method and computer program for controlling use of a content.
  6. Nakano, Takehiko, Apparatus, method, and computer program for controlling use of a content.
  7. Dorwin, David Kimbal, Application-driven playback of offline encrypted content with unaware DRM module.
  8. Dorwin, David Kimbal, Application-driven playback of offline encrypted content with unaware DRM module.
  9. Winzenried, Oliver; Buchheit, Marcellus, Authorization code recovering method.
  10. Price, Brian L.; Cohen, Scott D.; Zhang, Chenxi, Belief propagation and affinity measures.
  11. Schultz, Roderick, Binding of protected video content to video player with block cipher hash.
  12. Schultz, Roderick, Binding of protected video content to video player with encryption key.
  13. Vannier, Eric; Dorwin, David Kimbal, Browser/web apps access to secure surface.
  14. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  15. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  16. Isaacs, Scott; Moore, George; Thorpe, Danny; Zissimopoulos, Vasileios, Communication across domains.
  17. Nagao, Yutaka, Content providing system, content reproducing device, content reproducing method, and computer program.
  18. Shimada,Muneki; Shimakawa,Keiso; Okada,Toyoshi; Hashimoto,Minoru, Contents distribution system.
  19. Dorwin, David Kimbal, DRM provider interoperability.
  20. Cohen, Scott D.; Price, Brian L.; Somanath, Gowri, Depth map stereo correspondence techniques.
  21. Dorwin, David Kimbal; Scherkus, Andrew Martin, Detecting supported digital rights management configurations on a client device.
  22. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  23. Kontio,Markku; Sipponen,Juha Pekka; Ylitalo,Tapio, Digital rights management in a mobile communications environment.
  24. Gordon,Michael; Raciborski,Nathan, Digital rights management license delivery system and method.
  25. Dorwin, David Kimbal, Dynamically changing stream quality of protected content based on a determined change in a platform trust.
  26. Dorwin, David Kimbal, Dynamically changing stream quality when user is unlikely to notice to conserve resources.
  27. Cho, Sunghyun; Wang, Jue; Zhong, Lin, Edge direction and curve based image de-blurring.
  28. Liu, Zhu; Basso, Andrea; Begeja, Lee; Gibbon, Daivd C.; Renger, Bernard S.; Shahraray, Behzad, Embedded business metadata.
  29. Liu, Zhu; Basso, Andrea; Begeja, Lee; Gibbon, David C.; Renger, Bernard S.; Shahraray, Behzad, Embedded business metadata.
  30. Liu, Zhu; Basso, Andrea; Begeja, Lee; Gibbon, David C.; Renger, Bernard S.; Shahraray, Behzad, Embedded business metadata.
  31. Dorwin, David Kimbal, Extending browser functionality with dynamic on-the-fly downloading of untrusted browser components.
  32. Price, Brian L.; Cohen, Scott D.; Feild, Jacqueline L.; Miller, Gavin Stuart Peter, Image matting and alpha value techniques.
  33. Ishiguro,Ryuji, Information processing apparatus and method for managing grouped devices in an encrypted environment.
  34. Ishiguro,Ryuji, Information processing apparatus for watermarking digital content.
  35. Kuno, Hiroshi; Kobayashi, Yoshiyuki; Hayashi, Takamichi; Muramatsu, Katsumi, Information processing device, information storage device, server, information processing system, information processing method and medium for reproduction of encrypted content.
  36. Shimano, Masato; Fujino, Go; Miki, Masaaki; Tsuzuki, Yoshiyuki; Takeyasu, Isao; Tokita, Eiji, Key change management apparatus and key change management method.
  37. Riddick,Christopher J.; Tran,Lan Huu, Media protection system and method.
  38. Gupte, Aniruddha, Messaging method and apparatus for use in digital distribution systems.
  39. Brickell, Ernest; Graunke, Gary; Stevens, William A.; Vembu, Balaji, Method and apparatus for authenticated, recoverable key distribution with no database secrets.
  40. Ellis, Richard D.; Newcombe, Christopher R.; Siu, Michael Yiu-kwan; Stradley, Michael T.; Oje, Chris, Method and system for collecting and communicating dynamically incorporated advertising information.
  41. Ellis, Richard D.; Newcombe, Christopher R.; Siu, Michael Yiu-kwan; Stradley, Michael T.; Oje, Chris, Method and system for dynamically incorporating advertising content into multimedia environments.
  42. Ellis, Richard D.; Newcombe, Christopher R.; Siu, Michael Yiu-kwan; Stradley, Michael T.; Oje, Chris, Method and system for dynamically incorporating advertising content into multimedia environments.
  43. Ellis, Richard D.; Newcombe, Christopher R.; Siu, Michael Yiu-kwan; Stradley, Michael T.; Oje, Chris, Method and system for dynamically incorporating advertising content into multimedia environments.
  44. Ellis, Richard D.; Newcombe, Christopher R.; Siu, Michael Yiu-kwan; Stradley, Michael T.; Oje, Chris, Method and system for dynamically incorporating advertising content into multimedia environments.
  45. Sims, John B.; Calog, Jeffrey W., Method and system for generating digital fingerprint.
  46. Morten, Glenn A.; Palmer, Tomás E.; MacLean, Charles D., Method and system for providing secure CODECS.
  47. Sitrick, David H.; Fling, Russell T., Method and system for secure distribution of selected content to be protected.
  48. Sitrick, David H.; Fling, Russell T., Method and system for secure distribution of selected content to be protected.
  49. Sitrick, David H.; Fling, Russell T., Method and system for secure distribution of selected content to be protected on an appliance specific basis.
  50. Sitrick, David H.; Fling, Russell T., Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content.
  51. Sitrick, David H.; Fling, Russell T., Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content.
  52. Newcombe, Christopher R., Method and system for secure distribution of subscription-based game software.
  53. Newcombe,Christopher R., Method and system for secure distribution of subscription-based game software.
  54. Chatani,Masayuki; Mallinson,Dominic Saul, Method and system for securely distributing computer software products.
  55. Jogand-Coulomb, Fabrice, Method for program code execution with memory storage controller participation.
  56. Dorwin, David Kimbal; Finnan, Hugh, Method for reducing time to first frame/seek frame of protected digital content streams.
  57. Albanese,Laurent; Patris,Valerie, Method for secure communication between two devices.
  58. Sutton, II, James A.; Brickell, Ernie F.; Hall, Clifford D.; Grawrock, David W., Method of delivering Direct Proof private keys to devices using an on-line service.
  59. Sutton, II, James A.; Brickell, Ernie F.; Hall, Clifford D.; Grawrock, David W., Method of delivering direct proof private keys to devices using an on-line service.
  60. Dorwin, David Kimbal; Scherkus, Andrew; Kaiser, Christian; Lacey, Stephen John, Method, manufacture, and apparatus for configuring multiple content protection systems.
  61. Dorwin, David Kimbal, Method, manufacture, and apparatus for content decryption module.
  62. Dorwin, David Kimbal; Scherkus, Andrew; Lacey, Stephen John; Kaiser, Christian, Method, manufacture, and apparatus for content protection for HTML media elements.
  63. Dorwin, David Kimbal; Scherkus, Andrew; Kaiser, Christian, Method, manufacture, and apparatus for content protection using authentication data.
  64. Dorwin, David Kimbal, Method, manufacture, and apparatus for instantiating plugin from within browser.
  65. Dorwin, David Kimbal; Scherkus, Andrew Martin, Method, manufacture, and apparatus for protection of media objects from the web application environment.
  66. Newcombe, Christopher R, Methods and systems for secure distribution of subscription-based game software.
  67. Newcombe, Christopher R., Methods and systems for secure distribution of subscription-based game software.
  68. Weber, Jochen; Schneider, Klaus; Aue, Axel, Microprocessor system and method for detecting the exchange of modules of the system.
  69. Pendlebury,Ian Malcolm, Network enabled application software system and method.
  70. Park, Keun young; Iyer, Rakesh Narayan; Pelly, Nicholas Julian, Per-device authentication.
  71. Zhuk, Oscar V.; Morten, Glenn A.; Hiar, Edward Charles, Preventing unauthorized modification or skipping of viewing of advertisements within content.
  72. Wang, Jiahe Helen; Fan, Xiaofeng; Jackson, Collin Edward; Howell, Jonathan Ryan; Xu, Zhenbin, Protection and communication abstractions for web browsers.
  73. Lamberg, Samu, Providing content in a communication system.
  74. Hoshino, Norihisa; Kamijoh, Kohichi; Kashiuchi, Takahiro; Miyamoto, Naoko; Takara, Maho; Uramoto, Naohiko; Yamashita, Katsushi, Recording data and using the recorded data.
  75. Loc'H, Julie; Arditi, David; Camus, Sylvie, Recovery of expired decryption keys.
  76. Dorwin, David Kimbal, Reducing time to first encrypted frame in a content stream.
  77. Franco, Roberto A.; Ganjam, Anantha P; Bedworth, John G.; Brundrett, Peter T.; Tokumi, Roland K, Running internet applications with low rights.
  78. Elvanoglu,Ferhan; Dujari,Rajeev, Security settings for markup language elements.
  79. King, Brian John; Mysore, Gautham J.; Smaragdis, Paris, Sound alignment user interface.
  80. King, Brian John; Mysore, Gautham J.; Smaragdis, Paris, Sound alignment using timing information.
  81. King, Brian John; Mysore, Gautham J.; Smaragdis, Paris, Sound rate modification.
  82. Cohen, Scott D.; Price, Brian L.; Zhang, Chenxi, Stereo correspondence model fitting.
  83. Cohen, Scott D.; Price, Brian L.; Zhang, Chenxi, Stereo correspondence smoothness tool.
  84. Gao, Huaxin; Lee, Bilung; Ostler, Paul A., Supporting multiple security mechanisms in a database driver.
  85. Jogand-Coulomb, Fabrice, System for program code execution with memory storage controller participation.
  86. Morten, Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  87. Morten,Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  88. Morten,Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  89. Gabler, Christopher; Yates, Robert; Rauch, Leo; Moninger, Matthias, Technique for enabling nominal flow of an executable file.
  90. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  91. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  92. Akiyama,Ryota, Valid medium management system.
  93. Alabraba,Ferdinand Jay; Hughes,Aidan T.; Gunyakti,Caglar, Verbose hardware identification for binding a software package to a computer system having tolerance for hardware changes.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로