Method and system for conducting transactions between repositories using a repository transaction protocol
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-017/60
H04K-001/00
H04L-009/00
출원번호
US-0413287
(2003-04-15)
발명자
/ 주소
Stefik,Mark J.
Pirolli,Peter L. T.
출원인 / 주소
ContentGuard Holdings, Inc.
대리인 / 주소
Nixon Peabody, LLP
인용정보
피인용 횟수 :
89인용 특허 :
139
초록▼
A method and apparatus for establishing a secure communications channel between a first repository and a second repository using a repository transaction protocol. A registration identifier and registration message including an identification certificate, and an identifier of a master repository tha
A method and apparatus for establishing a secure communications channel between a first repository and a second repository using a repository transaction protocol. A registration identifier and registration message including an identification certificate, and an identifier of a master repository that encrypted the identification certificate are generated by the first repository. The registration identifier and message are sent to the second repository and the identity of the first repository by is verified by verifying the identification certificate. Messages containing at least one session key are exchanged between the first and second repositories and a usage transactions related to a digital work are conducted between the first repository and the second repository using the session keys.
대표청구항▼
What is claimed: 1. A method for establishing a secure communications channel between a first repository and a second repository using a repository transaction protocol for use in a system for conducting transactions, said method comprising: generating from the first repository a registration ident
What is claimed: 1. A method for establishing a secure communications channel between a first repository and a second repository using a repository transaction protocol for use in a system for conducting transactions, said method comprising: generating from the first repository a registration identifier and registration message including an identification certificate, and an identifier of a master repository that encrypted the identification certificate; receiving the registration message at a second repository and verifying the identity of the first repository by verifying the identification certificate; validating the authenticity of the first repository, including, generating at the second repository a message to test the authenticity of the first repository, sending the generated message to the first repository, and verifying at the second repository if the first repository upon receiving the generated message to test the authenticity correctly process the generated message; exchanging messages including at least one session key between the first and second repositories, said session key to be used in communications during a session between the first and second repository; and conducting a transaction between the first repository and the second repository using the session, keys, wherein said step of conducting usage transactions comprises generating a request for a digital work specifying usage rights information and determining if the specified usage rights correspond to usage rights associated with the digital work, said step of conducting usage rights transactions further comprises granting access to the digital work in accordance with the usage rights associated with the digital work if the specified usage rights corresponds to usage rights associated with the digital work, and said step of conducting usage transactions further comprises determining if conditions in the usage rights associated with the digital work are satisfied. 2. The method as recited in claim 1, wherein said step of validating comprises generating an encrypted performance message as the generated message at the second repository based on the registration identifier and comparing a decrypted performance message returned by the first repository. 3. The method as recited in claim 2, wherein the performance message is encrypted using a public key specified in the registration message. 4. The method as recited in claim 1, wherein said step of verifying comprises decrypting the identification certificate with a key of the master repository. 5. The method as recited in claim 1, further comprising conducting a login transaction for checking the authenticity of a user requesting a transaction. 6. The method as recited in claim 5, wherein said step of conducting a login transaction comprises accepting user identification information through a user interface of the first repository and identifying the user at the second repository based on the identification information. 7. The method as recited in claim 1, further comprising conducting a billing transaction related to the usage transaction between the first repository or the second repository and a credit server. 8. The method as recited in claim 7, wherein said step of conducting a billing transaction comprises assigning a fee to digital content. 9. The method as recited in claim 8, wherein the fee is a time based fee and wherein said step of conducting a billing transaction comprises metering time usage of the digital content. 10. The method as recited in claim 9, wherein said step of conducting a billing transaction comprises ending charges for metered time usage of the digital work. 11. The method as recited in claim 8, wherein said step of conducting a billing transaction comprises reporting charges for use of the digital work. 12. The method as recited in claim 1, wherein said step of conducting usage transactions comprises granting access to the digital work in accordance with the usage rights associated with the digital work if the specified usage rights correspond to usage rights associated with the digital work and if conditions in the usage rights associated with the digital work are satisfied. 13. The method as recited in claim 1, wherein said step of requesting comprises requesting to make a copy of the digital work. 14. The method as recited in claim 1, wherein said step of requesting comprises requesting to transfer the digital work from one repository to another repository. 15. The method as recited in claim 1, wherein said step of requesting comprises requesting a loan of a copy of the digital work. 16. The method as recited in claim 1, wherein said step of requesting comprises requesting to play the digital work. 17. The method as recited in claim 16, said step of requesting to play comprises requesting to render the digital work. 18. The method as recited in claim 16, wherein the digital work comprises a computer program and said step of requesting to play the content comprises requesting to execute the computer program. 19. The method as recited in claim 1, wherein said step of requesting comprises requesting to print the digital work. 20. The method as recited in claim 1, wherein said step of requesting comprises requesting to make a backup copy of the digital work. 21. The method as recited in claim 1, wherein said step of requesting comprises requesting to restore a backup copy of the digital work. 22. The method as recited in claim 1, wherein said step of requesting comprises requesting to delete the digital work. 23. The method as recited in claim 1, wherein said step of requesting comprises requesting information about the digital work. 24. The method as recited in claim 23, wherein said step of requesting information comprises requesting a filename associated with the digital work. 25. The method as recited in claim 23, wherein said step of requesting information comprises requesting descriptive information related to the usage rights associated with the digital work. 26. The method as recited in claim 1, wherein said step of requesting comprises requesting to extract a portion of the digital work and make a new digital work with the extracted portion. 27. The method as recited in claim 1, wherein said step of requesting comprises requesting to edit the digital work. 28. The method as recited in claim 1, wherein the digital work includes a computer program and said step of requesting comprises requesting to install the computer program. 29. The method as recited in claim 1, wherein the digital work includes a computer program and said step of requesting comprises requesting to uninstall the computer program. 30. An apparatus for establishing a secure communications channel between a first repository and a second repository using a repository transaction protocol for use in a system for conducting transactions, said apparatus comprising: means for generating from the first repository a registration identifier and registration message including an identification certificate, and an identifier of a master repository that encrypted the identification certificate; means for receiving the registration message at a second repository and verifying the identity of the first repository by verifying the identification certificate; means for validating the authenticity of the first repository, including, means for generating at the second repository a message to test the authenticity of the first repository, means for sending the generated message to the first repository, and means for verifying at the second repository if the first repository upon receiving the generated message to test the authenticity correctly process the generated message; means for exchanging messages including at least one session key between the first and second repositories, said session key to be used in communications during a session between the first and second repository; and means for conducting a transaction between the first repository and the second repository using the session keys, wherein said means for conducting usage transactions comprise means for generating a request for a digital work specifying usage rights information and means for determining if the specified usage rights correspond to usage rights associated with the digital work, said means for conducting usage rights transactions further comprises means for granting access to the digital work in accordance with the usage rights associated with the digital work if the specified usage rights corresponds to usage rights associated with the digital work, and said means for conducting usage transactions further comprises means for determining if conditions in the usage rights associated with the digital work are satisfied. 31. The apparatus as recited in claim 30, wherein said means for validating comprises means for generating an encrypted performance message as the generated message at the second repository based on the registration identifier and comparing a decrypted performance message returned by the first repository. 32. The apparatus as recited in claim 31, wherein the performance message is encrypted using a public key specified in the registration message. 33. The apparatus as recited in claim 30 wherein said means for verifying comprises means for decrypting the identification certificate with a key of the master repository. 34. The apparatus as recited in claim 30, further comprising means for conducting a login transaction for checking the authenticity of a user requesting a transaction. 35. The apparatus as recited in claim 34, wherein said means for conducting a login transaction comprises means for accepting user identification information through a user interface of the first repository and means for identifying the user at the second repository based on the identification information. 36. The apparatus as recited in claim 30, further comprising means for conducting a billing transaction related to the usage transaction between the first repository or the second repository and a credit server. 37. The apparatus as recited in claim 36, wherein said means for conducting a billing transaction comprises means for assigning a fee to digital content. 38. The apparatus as recited in claim 37, wherein the fee is a time based fee and wherein said means for conducting a billing transaction comprises means for metering time usage of the digital content. 39. The apparatus as recited in claim 38, wherein said means for conducting a billing transaction comprises means for ending charges for metered time usage of the digital work. 40. The apparatus as recited in claim 37, wherein said means for conducting a billing transaction comprises means for reporting charges for use of the digital work. 41. The apparatus as recited in claim 30, wherein said means for conducting usage transactions comprises means for granting access to the digital work in accordance with the usage rights associated with the digital work if the specified usage rights correspond to usage rights associated with the digital work and if conditions in the usage rights associated with the digital work are satisfied. 42. The apparatus as recited in claim 30, wherein said means for requesting comprises means for requesting to make a copy of the digital work. 43. The apparatus as recited in claim 30, wherein said means for requesting comprises means for requesting to transfer the digital work from one repository to another repository. 44. The apparatus as recited in claim 30, wherein said means for requesting comprises means for requesting a loan of a copy of the digital work. 45. The apparatus as recited in claim 30, wherein said means for requesting comprises means for requesting to play the digital work. 46. The apparatus as recited in claim 45, said means for requesting to play comprises means for requesting to render the digital work. 47. The apparatus as recited in claim 45, wherein the digital work comprises a computer program and said means for requesting to play the content comprises means for requesting to execute the computer program. 48. The apparatus as recited in claim 30, wherein said means for requesting comprises means for requesting to print the digital work. 49. The apparatus as recited in claim 30, said means for requesting comprises means for requesting to make a backup copy of the digital work. 50. The apparatus as recited in claim 30, wherein said means for requesting comprises means for requesting to restore a backup copy of the digital work. 51. The apparatus as recited in claim 30, wherein said means for requesting comprises means for requesting to delete the digital work. 52. The apparatus as recited in claim 30, wherein said means for requesting comprises means for requesting information about the digital work. 53. The apparatus as recited in claim 52, wherein said means for requesting information comprises means for requesting a filename associated with the digital work. 54. The apparatus as recited in claim 52, wherein said means for requesting information means for comprises requesting descriptive information related to the usage rights associated with the digital work. 55. The apparatus as recited in claim 30, wherein said means for requesting comprises means for requesting to extract a portion of the digital work and make a new digital work with the extracted portion. 56. The apparatus as recited in claim 30, wherein said means for requesting comprises means for requesting to edit the digital work. 57. The apparatus as recited in claim 30, wherein the digital work includes a computer program and said means for requesting comprises means for requesting to install the computer program. 58. The apparatus as recited in claim 30, wherein the digital work includes a computer program and means for requesting comprises means for requesting to uninstall the computer program. 59. The method as recited in claim 1, wherein the method is for use in a system for controlling use of digital works in accordance with usage rights associated with the digital works. 60. The apparatus as recited in claim 30, wherein the apparatus is for use in a system for controlling use of digital works in accordance with usage rights associated with the digital works. 61. The method as recited in claim 1, wherein the transaction can be one of a usage transaction, and a financial transaction. 62. The apparatus as recited in claim 30, wherein the transaction can be one of a usage transaction, and a financial transaction. 63. The method as recited in claim 1, wherein the method is for use in a system for controlling financial repository transactions between a repository and a credit server. 64. The apparatus as recited in claim 30, wherein the apparatus is for use in a system for controlling financial repository transactions between a repository and a credit server. 65. The method as recited in claim 1, wherein the conducted transaction is a usage transaction related to a digital work between the first repository and the second repository using the session keys. 66. The apparatus as recited in claim 30, wherein the conducted transaction is a usage transaction related to a digital work between the first repository and the second repository using the session keys. 67. The method as recited in claim 1, wherein the verifying step comprises: generating at the first repository a response for the generated message using an identification of the first repository; sending the response to the second repository; and verifying the response against the generated message at the second repository. 68. The apparatus as recited in claim 30, wherein the verifying means comprises: means for generating at the first repository a response for the generated message using an identification of the first repository; means for sending the response to the second repository; and means for verifying the response against the generated message at the second repository. 69. The method as recited in claim 67, wherein the identification of the first repository is private. 70. The apparatus as recited in claim 68, wherein the identification of the first repository is private. 71. The method as recited in claim 1, wherein the validating step comprises: sending via a sending repository a performance message encrypted by the sending repository using an encryption key to a receiving repository; and correctly decrypting the received performance message using a decryption key at the receiving repository, wherein said encryption and decryption keys are corresponding cryptographic keys of the sending and receiving repositories. 72. The apparatus as recited in claim 30, wherein the validating means comprises: means for sending via a sending repository a performance message encrypted by the sending repository using an encryption key to a receiving repository; and means for correctly decrypting the received performance message using a decryption key at the receiving repository, wherein said encryption and decryption keys are corresponding cryptographic keys of the sending and receiving repositories. 73. The method as recited in claim 1, wherein the step of receiving the registration message includes determining based on the identity of the first repository if the first repository is on a list of compromised repositories and if so terminating transactions with the first repository. 74. The apparatus as recited in claim 30, wherein the means for receiving the registration message includes means for determining based on the identity of the first repository if the first repository is on a list of compromised repositories and if so means for terminating transactions with the first repository. 75. The method as recited in claim 1, wherein the generated message comprises a performance message including a nonce message, the names of the respective repositories, a timestamp, and the registration identifier received from the first repository. 76. The method as recited in claim 75, further comprising generating the nonce message based on at least one of random and variable information. 77. The apparatus as recited in claim 30, wherein the generated message comprises a performance message including a nonce message, the names of the respective repositories, a timestamp, and the registration identifier received from the first repository. 78. The apparatus as recited in claim 77, further comprising means for generating the nonce message based on at least one of random and variable information. 79. The apparatus as recited in claim 30, wherein said apparatus is implemented with one or more hardware and/or software components. 80. The method of claim 1, wherein said method is implemented with one or more hardware and/or software components configured to perform the steps of the method. 81. The method of claim 1, wherein said method is implemented with one or more computer readable instructions embedded on a computer readable medium and configured to cause one or more computer processors to perform the steps of the method.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (139)
Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
Davis Derek L. (Phoenix AZ) Smith Lionel (Queen Creek AZ), Apparatus and method for preventing disclosure through user-authentication at a printing node.
Russell Edward A. (Acton MA), Authorization system for obtaining in single step both identification and access rights of client to server directly fro.
Kenneth Louis Milsted ; Craig Kindell ; Qing Gong, Automated method and apparatus to package digital content for electronic distribution using the identity of the source content.
Barnes Vera L. (Wayne PA) Dodds ; Jr. Thomas J. (Drexel Hill PA) Gibson Harold F. (Downington PA) Campbell ; Jr. Carl M. (Newtown Square PA), Communications line authentication device.
Lindman Richard S. (3708 17th Ave. South Minneapolis MN 55407) Lindman Richard P. (7625 18th Ave. South Richfield MN 55423) Myers Edward D. (4440 Denton Way Inver Grove Heights MN 55075), Computer security system.
Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus for creating and using program authorization information data structures.
Fischer Addison M. (60 14th Ave. South Naples FL 33942), Computer system security method and apparatus having program authorization information data structures.
Narasimhalu Arcot D. (Singapore SGX) Wang Weiguo (Singapore SGX) Kankanhalli Mohan S. (Singapore SGX), Controlled dissemination of digital information.
Downer Robert R. (Medfield MA) Noonan Richard C. (Belmont MA) Dalke David M. (Marlborough MA), Controlling machine operation with respect to consumable accessory units.
Hartrick Thomas V. (Gaithersburg MD) Stevens Jeffrey N. (Gaithersburg MD) Sabia Nicholas J. (Silver Spring MD), Data processing system and method to enforce payment of royalties when copying softcopy books.
Geffrotin Bernard (Meudon FRX), Data processing system comprising authentification means viz a viz a smart card, an electronic circuit for use in such s.
Stefik Mark J. (Woodside CA) Russell Daniel M. (Palo Alto CA) Bobrow Daniel G. (Palo Alto CA) Henderson ; Jr. D. Austin (La Honda CA), Document processing system utilizing document service cards to provide document processing services.
Elmer Thomas I. (Sunnyvale CA) Nguyen Tuan T. (Milpitas CA) Lin Rung-Pan (San Jose CA), Encryption of streams of addressed information to be used for program code protection.
Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Implementing a shared higher level of privilege on personal computers for copy protection of software.
Akiyama Ryota,JPX ; Hasebe Takayuki,JPX ; Yoshioka Makoto,JPX, Information distribution system wherein storage medium storing ciphered information is distributed.
Okano Hirokazu (1-8-6 ; Kurakake Asakita-Ku ; Hiroshima-shi ; Hiroshima JPX), Information processing system using error-correcting codes and cryptography.
Lessin Arlen R. (New York NY) Gruppuso Frank M. (Commack NY) Harrison Shelley A. (Dix Hills NY), Intelligent portable interactive personal data system.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
Hershey Antoinette F. (Acton MA) French Andrew H. (Lexington MA) Boire Christopher P. (Westborough MA), License mangagement system and license storage key.
Johnson Donavon W. (Georgetown TX) Morgan Stephen P. (Mahopac NY) Smith Todd A. (Austin TX), Maintenance of file attributes in a distributed data processing system.
Cooper Thomas Edward ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-d.
Cooper Thomas E. (Louisville CO) Nagda Jagdish (Boulder CO) Pryor Robert F. (Longmont CO), Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted file.
Cooper Thomas Edward ; Phillips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption.
Chou Wayne W. (25 Hauley Pl. Ridgefield CT 06877) Erett Richard E. (78 White Birch La. Stamford CT 06905), Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded.
Jones Gregory A. (Seattle WA) Price Robert M. (Seattle WA) Veghte William L. (Bellevue WA), Method and system for authenticating access to heterogeneous computing services.
Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
Janis Frederick L. (Keller TX), Method and system for providing user access control within a distributed data processing system by the exchange of acces.
Janis Frederick L. (Keller TX), Method and system for variable authority level user access control in a distributed data processing system having multip.
Ye Shin-Ju,FRX ; Rabiller Philippe,FRX ; Keskes Naamen,FRX, Method for automatic detection of planar heterogeneities crossing the stratification of an environment.
Gasser Morrie (Saugus MA) Goldstein Andrew C. (Hudson MA) Kaufman Charles W. (Northborough MA) Lampson Butler W. (Cambridge MA), Method for delegating authorization from one entity to another through the use of session encryption keys.
Griffeth Nancy D. (Westfield NJ) Velthuijsen Hugo (Den Haag NLX), Method for resolving conflicts among distributed entities through the generation of counter proposals by transversing a.
Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT) Elteto Laszlo (Stamford CT) Engel Frederik (Wilton CT), Method of software distribution protection.
Elliott John C. (Summit NJ) O\Connell James A. (Short Hills NJ) Ladouceur Lawrence (Scarsdale NY) Altman William (Lower Paxton PA) Jarett Keith (Oakland CA), Multi-issuer transaction device with individual identification verification plug-in application modules for each issuer.
Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak Rostislaw (Dumfries VA) Wilkins John D. (Somerville VA), Secure cryptographic operations using control vectors generated inside a cryptographic facility.
Chandra Ashileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocess.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
Volk Larry N. (3320 Royce Ct. Las Vegas NV), System for vending program cartridges which have circuitry for inhibiting program usage after preset time interval expir.
Edwards ; Jr. Gordon L. (Easley SC), System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of prote.
Saigh Michael M. ; Chang Edward H. ; Brockhouse Douglas B. ; Chang Hsiao-Shih, Systems and apparatus for electronic communication and storage of information.
Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Aldous Stephen C. (Salt Lake City UT) Dake Guy M. (Sandy UT), Systems for connection of physical/electrical media connectors to computer communications cards.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC), Transaction system security method and apparatus.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
Pavlov Leonidas P. (Colorado Springs CO) Aba-Jbara Nabil M. (Colorado Springs CO), Unitary, self-contained card verification and validation system and method.
Abraham Dennis G. (Concord NC) Henningsmeyer Daniela (Stuttgart VA DEX) Hudson John M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Stevens Jam, User defined function facility.
Cohen Jason M. (20 Skookwams Ct. West Islip NY 11795), Video communications system having a remotely controlled central source of video and audio data.
Swenson, Eric John; Ishiguro, Ryuji; Nagano, Motohiko; Chavanne, Pierre, Article of manufacture for controlling the use of content by providing for the delegation of rendering rights.
Borzycki, Andrew; Deva, Mallikharjuna Reddy; Gajendar, Uday Nandigam; Roychoudhry, Anil, Coordinating a computing activity across applications and devices having multiple operation modes in an orchestration framework for connected devices.
Borzycki, Andrew; Deva, Mallikharjuna Reddy; Gajendar, Uday Nandigam; Roychoudhry, Anil, Enterprise application store for an orchestration framework for connected devices.
Borzycki, Andrew; Deva, Mallikharjuna Reddy; Gajendar, Uday Nandigam; Roychoudhry, Anil, Enterprise application store for an orchestration framework for connected devices.
Qureshi, Waheed; McGinty, John M.; Andre, Olivier; Abdullah, Shafaq; DeBenning, Thomas H.; Datoo, Ahmed; Roach, Kelly Brian, Secure container for protecting enterprise data on a mobile device.
Qureshi, Waheed; DeBenning, Thomas H.; Datoo, Ahmed; Andre, Olivier; Abdullah, Shafaq; McGinty, John M.; Roach, Kelly Brian, Secure execution of enterprise applications on mobile devices.
Qureshi, Waheed; Roach, Kelly Brian; McGinty, John M.; Andre, Olivier; Abdullah, Shafaq; DeBenning, Thomas H.; Datoo, Ahmed, Secure mobile browser for protecting enterprise data.
Borzycki, Andrew; Deva, Mallikharjuna Reddy; Gajendar, Uday Nandigam; Roychoudhry, Anil, Sharing content across applications and devices having multiple operation modes in an orchestration framework for connected devices.
Borzycki, Andrew; Deva, Mallikharjuna Reddy; Gajendar, Uday Nandigam; Roychoudhry, Anil, Single sign-on access in an orchestration framework for connected devices.
Hahn, Timothy J.; Palmer, Jr., Bernard P.; Waidner, Michael P.; Whitmore, James J., Software protection using an installation product having an entitlement file.
Hahn, Timothy J.; Palmer, Jr., Bernard P.; Waidner, Michael P.; Whitmore, James J., Software protection using an installation product having an entitlement file.
Hahn, Timothy J.; Palmer, Jr., Bernard P.; Waidner, Michael P.; Whitmore, James J., Software protection using an installation product having an entitlement file.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.