$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure processor architecture for use with a digital rights management (DRM) system on a computing device 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-021/00
  • G06F-021/02
출원번호 US-0892329 (2001-06-27)
발명자 / 주소
  • Peinado,Marcus
  • England,Paul
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Woodcock Washburn LLP
인용정보 피인용 횟수 : 72  인용 특허 : 12

초록

초록이 없습니다.

대표청구항

대표청구항이 없습니다.

이 특허에 인용된 특허 (12)

  1. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  2. Mirov Russell Norman ; Onufer Gregory Charles, Method and apparatus for firmware authentication.
  3. Vu, Son Trung; Phan, Quang, Method and apparatus for secure processing of cryptographic keys.
  4. Chan, Shannon; Jensenworth, Gregory; Goertzel, Mario C.; Shah, Bharat; Swift, Michael M.; Ward, Richard B., Method and system for secure running of untrusted content.
  5. Angelo, Michael F.; Michels, Peter J., Method for securely creating, storing and using encryption keys in a computer system.
  6. Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
  7. Downs, Edgar; Gruse, George Gregory; Hurtado, Marco M.; Medina, Cesar; Milsted, Kenneth Louis, Secure electronic content management system.
  8. Hair, Arthur R., System and method for manipulating a computer file and/or program.
  9. Fox, Barbara L.; Waters, Lester L.; Spelman, Jeffrey F.; Seidensticker, Robert B.; Thomlinson, Matthew W., System and method for secure electronic commerce transaction.
  10. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  11. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  12. Marino ; Jr. Joseph T. (Fountain Hill AZ) Lambert Paul A. (Scottsdale AZ), Uniform interface for cryptographic services.

이 특허를 인용한 특허 (72)

  1. Gunasekara, Don; Nallani, Laxman, Apparatus and method for wireless network services in moving vehicles.
  2. Hybertson, Eric, Apparatus and methods for content transfer protection.
  3. Hybertson, Eric, Apparatus and methods for content transfer protection.
  4. Gunasekara, Don; Bencheikh, Ahmed; Vira, Priyank, Apparatus and methods for monitoring and diagnosing a wireless network.
  5. Apsangi, Shrikant; Guduru, Srinivas; Schnitzer, Jason Kazimir; Markley, Jeffrey P.; Carlucci, John B.; Bevilacqua, John G., Apparatus and methods for provisioning in a download-enabled system.
  6. Apsangi, Shrikant; Guduru, Srinivas; Schnitzer, Jason Kazimir; Markley, Jeffrey P.; Carlucci, John B.; Bevilacqua, John G., Apparatus and methods for provisioning in a download-enabled system.
  7. Gunasekara, Don, Apparatus and methods for selective data network access.
  8. Johnson, Richard C.; Morgan, Andrew; Anvin, H. Peter; Torvalds, Linus, Architecture, system, and method for operating on encrypted and/or hidden information.
  9. Johnson, Richard C.; Morgan, Andrew; Anvin, H. Peter; Torvalds, Linus, Architecture, system, and method for operating on encrypted and/or hidden information.
  10. Diamond, Michael B.; White, Jonathan B., Content keys for authorizing access to content.
  11. Diamond, Michael B.; White, Jonathan B., Content server and method of providing content therefrom.
  12. Diamond, Michael B.; White, Jonathan B., Content server and method of storing content.
  13. Schnell, Patrik; Grigorovitch, Alexandre V.; Alkove, James M., Digital content packaging, licensing and consumption.
  14. Helms, William L.; Carlucci, John B.; Schnitzer, Jason Kazmir, Downloadable security and protection methods and apparatus.
  15. Helms, William L.; Carlucci, John B.; Schnitzer, Jason Kazmir, Downloadable security and protection methods and apparatus.
  16. Yano, Yoshihiro; Handa, Fukio, Electronic contract system.
  17. Mason, W. Anthony; Noone, Scott J.; Widdowson, Roderick David Wolfe, File system directory attribute correction.
  18. Mason, W. Anthony; Noone, Scott J.; Widdowson, Roderick David Wolfe, File system directory attribute correction.
  19. Walker, William T.; Rhodes, James E.; Serkowski, Robert J.; Morgan, Lawrence J.; Gopalakrishna, Mohana Krishnan, Flexible license file feature controls.
  20. Gentles, Thomas A., Gaming machine having reduced-read software authentication.
  21. Bauchot, Frederic; Marmigere, Gerard; Mialon, Christophe; Secondo, Pierre, Generating and processing an authentication certificate.
  22. Mazza, Bruce P.; Walker, William T., Generation of enterprise-wide licenses in a customer environment.
  23. Takashima, Yoshikazu, Information processing apparatus and method, information recording medium manufacturing apparatus and method, and information recording medium.
  24. Takashima, Yoshikazu, Information processing apparatus and method, information recording medium, and computer program.
  25. Hattori, Shinobu; Takashima, Yoshikazu, Information processing apparatus, information processing method and computer program.
  26. Rhodes, James E.; Serkowski, Robert J.; Walker, William T.; Morgan, Lawrence John; Gopalakrishna, Mohana Krishnan, License modes in call processing.
  27. Cholas, Chris; Helms, William L.; Markley, Jeffrey P., Media bridge apparatus and methods.
  28. Cholas, Chris; Helms, William L.; Markley, Jeffrey P., Media bridge apparatus and methods.
  29. Cholas, Chris; Helms, William L.; Markley, Jeffrey P., Media bridge apparatus and methods.
  30. Munetsugu, Toshihiko; Nishitani, Kazuhiro; Kajimoto, Kazuo; Iwata, Yoshiaki; Tanikawa, Kentaro, Media contents distribution system and method.
  31. Munetsugu, Toshihiko; Nishitani, Kazuhiro; Kajimoto, Kazuo; Iwata, Yoshiaki; Tanikawa, Kentaro, Media contents distribution system and method.
  32. Rabin, Michael O.; Shasha, Dennis E.; Beinart, Yossi; Caceres, Ramon; Karia, Timir; Molnar, David; Rolinson, Sean, Method and apparatus for protecting information and privacy.
  33. Oxford, William V., Method and system for a recursive security protocol for digital copyright control.
  34. Oxford, William V., Method and system for a recursive security protocol for digital copyright control.
  35. Diamond, Michael B.; White, Jonathan B., Method and system for accessing content on demand.
  36. Oxford, William V., Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol.
  37. Oxford, William V., Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol.
  38. Gunyakti,Caglar; Hatlelid,Kristjan Eric, Method and system for limiting software updates.
  39. Oxford, William V., Method and system for process working set isolation.
  40. Diamond, Michael B.; White, Jonathan B., Method and system for registering and activating content.
  41. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Method for authorizing a substitute software license server.
  42. McAllister, Bryan, Methods and apparatus for determining an optimized wireless interface installation configuration.
  43. Cholas, Chris; Helms, William L.; Carlucci, John B.; Markley, Jeffrey P., Methods and apparatus for premises content distribution.
  44. Cholas, Chris; Helms, William; Carlucci, John; Markley, Jeffrey, Methods and apparatus for premises content distribution.
  45. Suzuoki, Masakazu; Hatakeyama, Akiyuki, Methods and apparatus for secure data processing and transmission.
  46. Suzuoki,Masakazu; Hatakeyama,Akiyuki, Methods and apparatus for secure data processing and transmission.
  47. Mason, W. Anthony, Methods and systems for data storage.
  48. Roberts, Jr., Henry Arnold, Methods of authorizing a computer license.
  49. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Predictive software license balancing.
  50. Walker, William T.; Serkowski, Robert J., Remote feature activation authentication file system.
  51. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  52. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  53. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  54. Diamond, Michael B.; White, Jonathan B.; Daniell, Piers J., Secure content enabled drive digital rights management system and method.
  55. Diamond, Michael B.; White, Jonathan B.; Daniell, Piers J., Secure content enabled drive system and method.
  56. Rao, Santhpur N.; Trapa, Valerie, Secure download manager.
  57. Gilman, Robert R.; Robinson, Richard L.; Serkowski, Robert J., Secure installation activation.
  58. Feng, Weishi, Secure methods for generating content and operating a drive based on identification of a system on chip.
  59. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  60. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  61. Ache, Marc; Pence, William E., System and method for unlimited licensing to a fixed number of devices.
  62. Ghose, Kanad, System and method for validating program execution at run-time using control flow signatures.
  63. King, Linda G.; Orr, Charles L., System and method of facilitating compliance with information sharing regulations.
  64. King, Linda Giessel; Orr, Charles Lee, System and method of facilitating compliance with information sharing regulations.
  65. Morgan, Andrew; Anvin, H. Peter, System with secure cryptographic capabilities using a hardware specific digital secret.
  66. Mason, W. Anthony; Viscarola, Peter G.; Cariddi, Mark J.; Noone, Scott J., Systems and methods for arbitrary data transformations.
  67. Mason, W. Anthony; Viscarola, Peter G.; Cariddi, Mark J.; Noone, Scott J., Systems and methods for arbitrary data transformations.
  68. Dive-Reclus, Corinne, Tamper evident removable media storing executable code.
  69. Helms, William; Hayashi, Michael T.; Leddy, Kevin J.; Christman, David A., Technique for securely communicating and storing programming material in a trusted domain.
  70. Helms, William L.; Carlucci, John B.; Hayashi, Michael T.; Fahrny, James W., Technique for securely communicating programming content.
  71. Helms, William; Carlucci, John B.; Hayashi, Michael T.; Fahrny, John W., Technique for securely communicating programming content.
  72. Wagner, Todd M.; Traenkenschuh, John L.; Bierdeman, Paul W., Virtualized service tool and virtualized control tool.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로