$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Process and streaming server for encrypting a data stream 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
출원번호 US-0109963 (2002-03-29)
발명자 / 주소
  • Baker, Brian
출원인 / 주소
  • Widevine Technologies, Inc.
대리인 / 주소
    Darby Darby P.C.
인용정보 피인용 횟수 : 88  인용 특허 : 87

초록

There is disclosed a process for encrypting a data stream to secure the data stream for single viewing and to protect copyrights of the data stream. Specifically, there is disclosed a process for protecting streaming multimedia, entertainment and communications in an Internet-type transmission. Ther

대표청구항

1. A system for providing a data stream for a predetermined number of viewings, comprising:a client component that is arranged to communicate user verification information, a URI, and a token associated with the URI, request a data stream, and to receive the data stream, wherein the received data st

이 특허에 인용된 특허 (87)

  1. Horstmann Cay, Advertising-subsidized and advertising-enabled software.
  2. Pinder Howard George (Atlanta GA) Palgon Michael Steven (Atlanta GA), Apparatus and method for cipher stealing when encrypting MPEG transport packets.
  3. Nachman Jacob B. (Ramat Modiim ILX) Tsuria Yossef (Jerusalem ILX), Apparatus and method for securing communication systems.
  4. Weidong Mao ; David Chen, Apparatus and method for web-casting over digital broadcast TV network.
  5. Gopinath Bhaskarpillai (Watchung NJ) Kurshan David (Sea Bright NJ), Composition of systems of objects by interlocking coordination, projection, and distribution.
  6. Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantation FL), Data stream protocol for multimedia data streaming data processing system.
  7. Gledhill Jeff,GBX ; Anikhindi Santosh,GBX, Decoding carriers encoded using orthogonal frequency division multiplexing.
  8. Tycksen ; Jr. Frank A. ; Jennings Charles W., Digital Certificate.
  9. Zeng, Wenjun; Lei, Shaw-Min, Digital image scrambling for image coding systems.
  10. Sesma Jimmy L., Digital product execution control.
  11. Neville Eugene A. ; Sesma Jimmy L., Digital product execution control and security.
  12. Tsuria Yossef,ILX, Digital recording protection system.
  13. Kudelski, Stefan; Schlup, Jean-Claude; Rosselet, Ernest, Error prevention in a recording and reproducing device with at least one rotating head.
  14. Demmers Petrus Adrianus Cornelis Maria,NLX, Filter device.
  15. Bednarek Robert A. ; Rubin Philip A., GPS TV set top box with regional restrictions.
  16. Rix, Simon Paul Ashley, Integrated circuit and smart card comprising such a circuit.
  17. Handelman Doron,ILX ; Colb Sanford T.,ILX, Integrated telephone and cable communication networks.
  18. Sered, Yishai; Dallard, Nigel Stephen, Key delivery in a secure broadcasting system.
  19. Li Weijun, Merging of separate executable computer programs to form a single executable computer program.
  20. von Willich Manfred,ZAX ; Rix Simon Paul Ashley,ZAX, Method and apparatus for controlling the operation of a signal decoder in a broadcasting system.
  21. LaRocca Tobie ; Johnson Michael D., Method and apparatus for providing subscription-on-demand services, dependent services and contingent services for an interactive information distribution system.
  22. Davies Donald Watts,GBX, Method and apparatus for transmitting and receiving encrypted signals.
  23. Vegt Arjen Van Der,NLX, Method for automatically searching a frequency range for signal channels in a receiver for digitally modulated signals, and receiver for applying such a method.
  24. Slivka Benjamin W. ; Webber Jeffrey S., Method for identifying and obtaining computer software from a network computer.
  25. Slivka Benjamin W. ; Webber Jeffrey S., Method for identifying and obtaining computer software from a network computer using a tag.
  26. Ahmet Mursit Eskicioglu, Method for protecting the audio/visual data across the NRSS interface.
  27. Kudelski Andre (Crissier CHX), Method for scrambling and unscrambling a video signal.
  28. Kudelski Andr (Crissier CHX) Laffely Laurent (Le Mont-sur-Lausanne CHX) Sasselli Marco (Chardonne CHX), Method of interactive communication between a subscriber and a decoder of a system of pay-television and decoder thereof.
  29. Moline William A. ; Putnam Frederick A., Methods and apparatus for encrypting and decrypting MIDI files.
  30. Handelman Doron (Givataim ILX), Methods and systems for non-program applications for subscriber television.
  31. Handelman Doron (Givataim ILX), Methods and systems for providing additional service applications in pay television.
  32. Horstmann Cay S., Multi-tier electronic software distribution.
  33. Collberg, Christian Sven; Thomborson, Clark David; Low, Douglas Wai Kok, Obfuscation techniques for enhancing software security.
  34. Jeong, Soo Gil; Kim, See Hyun; Kim, Kyu Seok; Kim, Chang Kyu; Oh, Jin Hong, PID/section filter in digital television system.
  35. Dinallo Chris A. (Boca Raton FL) Koval Michael J. (Boca Raton FL) Lawton William W. (Boca Raton FL) Paulat ; Jr. Martin J. (Delray Beach FL) Tyler John G. (Boynton Beach FL) Winters Scott L. (Plantat, Personal computer with generalized data streaming apparatus for multimedia devices.
  36. Toshiyuki Kawagishi JP, Portable electronic device and loyalty point system.
  37. Kudelski Andre (Crissier CHX), Pre-payment television system using a memory card associated with a decoder.
  38. Brian Baker, Process and streaming server for encrypting a data stream.
  39. Horstmann Cay S., Relicensing of electronically purchased software.
  40. Katta Noboru (Itami JPX) Murakami Hiroki (Osaka JPX) Ibaraki Susumu (Toyonaka JPX) Nakamura Seiji (Toyonaka JPX), Scrambled transmission system.
  41. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-on Gerson,ILX, Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of secu.
  42. Handelman Doron (Givataim ILX) Kranc Moshe (Jerusalem ILX) Fink David (Jerusalem ILX) Zucker Arnold (Ramat Modiim ILX) Smith Perry (Jerusalem ILX) Bar-On Gerson (Kohav Hashahar ILX), Secure access systems and methods utilizing two access cards.
  43. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure access systems utilizing more than one IC card.
  44. Kleinman, Amit; Kipnis, Shlomo, Secure communications system.
  45. Handelman Doron,ILX ; Kranc Moshe,ILX ; Fink David,ILX ; Zucker Arnold,ILX ; Smith Perry,ILX ; Bar-On Gerson,ILX, Secure document access system.
  46. Philip R. Wiser ; Andrew R. Cherenson ; Steven T. Ansell ; Susan A. Cannon, Secure online music distribution system.
  47. Hallam Toby,GBX ; Siegel Philip I., Secure smart card and tool for removing same.
  48. Anderson ; Jr. Bruce J. ; Lamont Nadine ; Drasner Sharyn L. ; Greenberg Arthur L., Set top terminal for an interactive information distribution system.
  49. Yossef Tsuria IL, Smart card chaining in pay television systems.
  50. Horstmann Cay S., Software program self-modification.
  51. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  52. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  53. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  54. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  55. Raz Uri ; Volk Yehuda,ILX ; Melamed Shmuel,ILX, Streaming modules.
  56. Gray James P. ; Onvural Raif O. ; Peyravian Mohammad, Synchronization of encryption/decryption keys in a data communication network.
  57. Kuhn Gideon Jacobus,ZAX ; Davies Donald Watts,GB3 ; Rix Simon Paul Ashley,ZAX, System and apparatus for blockwise encryption/decryption of data.
  58. Agarwal, Rahul; Ayars, Jeffrey M.; Hefta-Gaub, Bradley D.; Greenbaum, Gary S.; Lippman, Alan F.; Patel, Sujal M.; Stammen, Dale R.; Rosedale, Philip; Vergato, Bryan, System and method for providing random access to a multimedia object over a network.
  59. Herz Frederick ; Ungar Lyle ; Zhang Jian ; Wachob David ; Salganicoff Marcos, System and method for scheduling broadcast of and access to video programs and other data using customer profiles.
  60. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  61. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  62. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  63. Yossef Tsuria IL; Yishai Sered IL, System for preventing playback of unauthorized digital video recordings.
  64. Chaney John William, System for processing a video signal via series-connected high speed signal processing smart cards.
  65. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  66. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  67. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  68. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  69. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  70. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  71. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  72. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  73. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  74. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  75. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  76. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  77. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  78. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  79. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  80. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  81. Handelman, Doron, Television system communicating individually addressed information.
  82. Mori Toshiya,JPX ; Takao Naoya,JPX ; Shimoji Tatsuya,JPX ; Okamura Kazuo,JPX ; Hirai Junichi,JPX ; Oashi Masahiro,JPX ; Kakiuchi Takashi,JPX ; Kusumi Yuki,JPX ; Miyabe Yoshiyuki,JPX ; Minakata Ikuo,J, Terminal apparatus and method for achieving interactive operations by displaying a desired piece of image information at high speed using cache memories, out of a large amount of image information se.
  83. Tsuria Yossef,ILX ; Handelman Doron,ILX, Theft prevention system and method.
  84. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  85. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  86. Snook, Daniel, Video encoding-method.
  87. Frederiksen Jeffrey E. (603 W. Haven Dr. Arlington Heights IL 60005), Video transmission system.

이 특허를 인용한 특허 (88)

  1. Laurich, Lawrence A.; Sample, Stephen Paul; Wang, Michael H.; Kandimalla, Babu Rao; Orsini, Rick L.; O'Hare, Mark S.; Martin, Don; Casselman, Steven Mark, Accelerator system for use with secure data storage.
  2. O'Hare, Mark S.; Orsini, Rick L.; Laurich, Lawrence A.; Sample, Stephen Paul; Wang, Michael H.; Kandimalla, Babu Rao; Martin, Don; Casselman, Steven Mark, Accelerator system for use with secure data storage.
  3. Priyadarshi, Shaiwal; Soroushian, Kourosh; Osborne, Roland; Braness, Jason; Kelley, John, Application enhancement tracks.
  4. Bauer, William D.; White, Donovan Steve; Eder, David W., Cable television secure communication system for one way restricted.
  5. Shivadas, Abhishek; Bramwell, Stephen R., Content streaming with client device trick play index.
  6. Laertz, Stephan; Fischer, Peter; Leue, Carsten; Schaeck, Thomas, Controlling access of a client system to an access protected remote resource.
  7. Patterson, Patrick E., Delivering electronic content.
  8. Hart, Michael Andrew; Ganesh, Anantharaman, Determining a recommended control point for a file system.
  9. Chan, Francis Yee-Dug; Soroushian, Kourosh; Wood, Andrew Jeffrey, Elementary bitstream cryptographic material transport systems and methods.
  10. Chan, Francis Yee-Dug; Soroushian, Kourosh; Wood, Andrew Jeffrey, Elementary bitstream cryptographic material transport systems and methods.
  11. Chan, Francis Yee-Dug; Soroushian, Kourosh; Wood, Andrew Jeffrey, Elementary bitstream cryptographic material transport systems and methods.
  12. Muth, John A.; Lanzatella, Thomas W., Expiration of access tokens for quiescing a distributed system.
  13. Grab, Eric William; Russell, Chris; Chan, Francis Yee-Dug; Kiefer, Michael George, Federated digital rights management scheme including trusted systems.
  14. Grab, Eric William; Russell, Chris; Chan, Francis Yee-Dug; Kiefer, Michael George, Federated digital rights management scheme including trusted systems.
  15. Grab, Eric William; Russell, Chris; Chan, Francis Yee-Dug; Kiefer, Michael George, Federated digital rights management scheme including trusted systems.
  16. England,Paul; Peinado,Marcus; Wilt,Nicholas P., Methods and systems for authentication of components in a graphics system.
  17. England,Paul; Peinado,Marcus; Wilt,Nicholas P., Methods and systems for cryptographically protecting secure content.
  18. Shivadas, Abhishek; Bramwell, Stephen R., Network video streaming with trick play based on separate trick play files.
  19. Shivadas, Abhishek; Bramwell, Stephen R., Network video streaming with trick play based on separate trick play files.
  20. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Playback devices and methods for playing back alternative streams of content protected using a common set of cryptographic keys.
  21. Baker, Brian A.; Morten, Glenn A.; MacLean, Charles Duncan; Tinker, Jeffrey Lee, Process and streaming server for encrypting a data stream with bandwidth based variation.
  22. Baker, Brian A.; Morten, Glenn A.; MacLean, Charles Duncan; Tinker, Jeffrey Lee, Process and streaming server for encrypting a data stream with bandwidth based variation.
  23. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Secure data parser method and system.
  24. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  25. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  26. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  27. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  28. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  29. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  30. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  31. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  32. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  33. O'Hare, Mark S.; Orsini, Rick L.; Van Zandt, John; Davenport, Roger S., Secure data parser method and system.
  34. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  35. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  36. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S.; Winick, Steven, Secure data parser method and system.
  37. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  38. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  39. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger; Winick, Steven, Secure data parser method and system.
  40. Orsini, Rick L.; VanZandt, John; O'Hare, Mark S.; Davenport, Roger S., Secure data parser method and system.
  41. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  42. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  43. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  44. Venters, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  45. Venters, III,Carl Vernon; Phillips, II,Eugene B.; Ornstein,Seth, Secure streaming container.
  46. Ventors, III, Carl Vernon; Phillips, II, Eugene B.; Ornstein, Seth, Secure streaming container.
  47. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  48. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  49. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  50. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  51. Phillips, II, Eugene B.; Ornstein, Seth, Securing digital content system and method.
  52. Phillips, II,Eugene B.; Ornstein,Seth, Securing digital content system and method.
  53. Cohen,Nimrod; Arieli,Guy, System and a method for testing network communication devices.
  54. Blumenschein, Steven; Young, IV, Philip F., System and method for monitoring video data.
  55. Xiong, True; Pedlow, Leo; Mehta, Viral; Holcomb, Eric, System, method, and infrastructure for real-time live streaming content.
  56. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S.; Winick, Steven, Systems and methods for cryptographically splitting and storing data.
  57. van der Schaar, Auke Sjoerd; Funnell, John, Systems and methods for encoding and playing back video at different frame rates using enhancement layers.
  58. Braness, Jason; van der Schaar, Auke Sjoerd; Soroushian, Kourosh, Systems and methods for encoding source media in matroska container files for adaptive bitrate streaming using hypertext transfer protocol.
  59. O'Hare, Mark S.; Orsini, Rick L.; Davenport, Roger S., Systems and methods for managing cryptographic keys.
  60. Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for managing cryptographic keys.
  61. Braness, Jason; Soroushian, Kourosh; van der Schaar, Auke Sjoerd, Systems and methods for performing smooth visual search of media encoded for adaptive bitrate streaming via hypertext transfer protocol using trick play streams.
  62. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
  63. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
  64. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
  65. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for playing back alternative streams of protected content protected using common cryptographic information.
  66. Kiefer, Michael George; Grab, Eric William; Braness, Jason, Systems and methods for protecting alternative streams in adaptive bitrate streaming systems.
  67. Braness, Jason; Amidei, William David; Srinivasan, Mayur, Systems and methods for protecting elementary bitstreams incorporating independently encoded tiles.
  68. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger, Systems and methods for secure workgroup management and communication.
  69. Bono, Stephen C.; Green, Matthew D.; Landau, Gabriel D.; Orsini, Rick L.; O'Hare, Mark S.; Davenport, Roger S., Systems and methods for secure workgroup management and communication.
  70. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  71. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  72. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  73. O'Hare, Mark S.; Orsini, Rick L., Systems and methods for securing data in motion.
  74. O'Hare, Mark S.; Orsini, Rick L.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  75. Orsini, Rick L.; O'Hare, Mark S., Systems and methods for securing data in motion.
  76. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  77. Orsini, Rick L.; O'Hare, Mark S.; Bono, Stephen C.; Landau, Gabriel D.; Nielson, Seth James, Systems and methods for securing data in motion.
  78. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Systems and methods for securing data in the cloud.
  79. Orsini, Rick L; O'Hare, Mark S.; Martin, Don, Systems and methods for securing data in the cloud.
  80. Orsini, Rick L.; O'Hare, Mark S.; Bellare, Mihir; Rogaway, Phillip, Systems and methods for securing data using multi-factor or keyed dispersal.
  81. van der Schaar, Auke Sjoerd; Shivadas, Abhishek, Systems, methods, and media for controlling delivery of content.
  82. Braness, Jason A, Systems, methods, and media for streaming media content.
  83. Naletov, Ivan Vladimirovich; Zurpal, Sergey, Systems, methods, and media for transcoding video data.
  84. Naletov, Ivan Vladimirovich; Zurpal, Sergey, Systems, methods, and media for transcoding video data according to encoding parameters indicated by received metadata.
  85. Martin, Don; Orsini, Rick L.; O'Hare, Mark S., Tape backup method.
  86. O'Hare, Mark S.; Orsini, Rick L.; Martin, Don, Tape backup method.
  87. Patterson, Patrick E., Tracking electronic content.
  88. Patterson, Patrick E., Tracking electronic content.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로