$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Systems and methods for the prevention of unauthorized use and manipulation of digital content 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/00
  • G06F-012/14
출원번호 US-0142366 (2002-05-09)
등록번호 US-7328453 (2008-02-05)
발명자 / 주소
  • Merkle, Jr.,James A.
  • LeVine,Richard B.
  • Lee,Andrew R.
  • Howard,Daniel G.
  • Goldman,Daniel M.
  • Pagliarulo,Jeffrey A.
  • Hart, III,John J.
  • Bouza,Jose L.
출원인 / 주소
  • ECD Systems, Inc.
대리인 / 주소
    Mills & Onello LLP
인용정보 피인용 횟수 : 143  인용 특허 : 192

초록

A number of systems and methods, alone, or in combination, achieve various levels of protection against unauthorized modification and distribution of digital content. This encompasses at least unauthorized study, modification, monitoring, reconstruction, and any other means for subversion from the o

대표청구항

We claim: 1. A method for preventing unauthorized use of digital content data in a computer system comprising: executing protected digital content data; in response to the execution of the protected digital content data, examining system devices that are operational in the system; determining wheth

이 특허에 인용된 특허 (192)

  1. David M. Mooney ; Paul J. Kimlinger ; James Virgil Bradley, Access control/crypto system.
  2. Beetcher Robert Carl ; Corrigan Michael Joseph ; Reardon ; Jr. Francis Joseph ; Moran James William, Apparatus and method for controlling access to software.
  3. Campbell Randall B., Apparatus and method for remotely executing commands using distributed computing environment remote procedure calls.
  4. Ciacelli Mark Louis ; Urda John William ; Lam Wai Man ; Kouloheris Jack Lawrence ; Fetkovich John Edward, Apparatus, method and computer program product for protecting copyright data within a computer system.
  5. Ohta Kazuo (Fujisawa JPX) Okamoto Tatsuaki (Yokosuka JPX), Authentication system and apparatus therefor.
  6. Deo Vinay ; Seidensticker Robert B. ; Simon Daniel R., Authentication system and method for smart card transactions.
  7. Paulson John W. (Edina MN) Dunn Mark E. (Apple Valley MN) Heidorn Allen J. (Minnetonka MN), Automated accompaniment apparatus and method.
  8. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Automated system for management of licensed software.
  9. Park Seong-Kab,KRX, Automatic software updating method.
  10. Wiedemer John D. (Houston TX), Billing system for computing software.
  11. Spelman Jeffrey F. (Duvall WA) Thomlinson Matthew W. (Bellvue WA), Blind encryption.
  12. Brandenburg Barbara B., Broadcast software distribution.
  13. Ronning Joel A., Central database system for automatic software program sales.
  14. Atkinson Robert G. ; Price Robert M. ; Contorer Aaron M., Code certification for network transmission.
  15. Schupak Donald (Schupak Group ; 730 Fifth Ave. ; Suite 1901 New York NY 10019), Computer controlled audio-visual system.
  16. Baena-Arnaiz Marco T. ; Church Benjamin T. ; Kirchoff Michael J. ; Seshadri Harish, Computer implemented method and a computer system for enforcing software licenses.
  17. Drake Christopher Nathan,AUX, Computer software authentication, protection, and security system.
  18. Plum Thomas (Kamuela HI), Computer software licensing authentication method and apparatus.
  19. Joshi Bhagirath S. (11 Sheffield Rd. Waltham MA 02154), Computer software security system.
  20. Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
  21. Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
  22. Shimura, Satoshi; Saida, Yoshinori, Content supply apparatus for transmitting the content to a portable terminal in transmitted divided units and prefetching other contents from the transmitted divided units.
  23. Sollish,Baruch; Brody,Moshe, Copy protected DVD and method for producing and validating same.
  24. Drew, Jeffrey M.; Selinfreund, Richard H.; Goyette, Donald R.; Vig, Rakesh, Copy-protected optical media and method of manufacture thereof.
  25. Selinfreund, Richard H.; Drew, Jeffrey M.; Vig, Rakesh, Copy-protected optical media and method of manufacture thereof.
  26. Selinfreund, Richard H.; Drew, Jeffrey M.; Vig, Rakesh; Goyette, Donald R., Copy-protected optical media and method of manufacture thereof.
  27. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Crypto microprocessor for executing enciphered programs.
  28. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  29. Best Robert M. (16016 Ninth Ave. Northeast Seattle WA 98155), Cryptographic decoder for computer programs.
  30. Pond Eugene W. (Garland TX) Rush Jeffrey R. (Richardson TX) Watson John D. (Carrollton TX) Woodall Bruce A. (Plano TX) Goode Walter M. (Dallas TX) Goode George E. (Richardson TX), Cryptographic labeling of electronically stored data.
  31. Greenberg Harold (630 W. 246 St. ; Apt. 1134 Bronx NY 10471), Cryptographic system and method.
  32. Dudle James (Homewood IL) Leatherman Michael (Tinley Park IL) Morrison Michael (Highland Park IL) Schnell Waldo (Prospect Heights IL), Custom product estimating and order processing system.
  33. Allen LindaMay P. (Rochester MN) Elshaug Ronald G. (Rochester MN) Harney Carrie L. (Rochester MN) Lemmon Wayne L. (Rochester MN) Miller Irwin (Rochester MN) Miller Irving L. (Pine Island MN) Murray G, Customized instruction generator.
  34. Saito Makoto,JPX ; Okazaki Shoichi,JPX, Data copyright management system.
  35. Kobayashi Seiji,JPX ; Koide Akio,JPX ; Morimoto Norishige,JPX ; Shimizu Shuichi,JPX, Data hiding method and data extraction method using statistical examination.
  36. Hartrick Thomas V. (Gaithersburg MD) Stevens Jeffrey N. (Gaithersburg MD) Sabia Nicholas J. (Silver Spring MD), Data processing system and method to enforce payment of royalties when copying softcopy books.
  37. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  38. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  39. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  40. Bates Cary Lee ; Day Paul Reuben, Debug watch mechanism and method for debugging a computer program.
  41. Grube Gary W. (Palatine IL) Markison Timothy W. (Hoffman Estates IL), Detection of unauthorized use of software applications in communication units.
  42. Lumley Robert M. (Lawrence Township ; Mercer County NJ), Digital computer having code conversion apparatus for an encrypted program.
  43. Tatebayashi, Makoto; Nakamura, Yutaka; Harada, Shunji; Kozuka, Masayuki, Digital content protection system.
  44. Neville Eugene A. ; Sesma Jimmy L., Digital product execution control and security.
  45. England Paul ; DeTreville John D. ; Lampson Butler W., Digital rights management operating system.
  46. Kutaragi, Ken; Kawai, Eiji; Miura, Kazuo, Disk recording medium, reproduction device and method for performing reproduction on disk recording medium.
  47. Jonathan Clark, Distributed execution software license server.
  48. Bains Jeffrey E. (Madison AL) Case Willard W. (Madison AL), Distributed license administration system using a local policy server to communicate with a license server and control e.
  49. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  50. Hasebe Takayuki (Kawasaki JPX) Akiyama Ryota (Kawasaki JPX) Yoshioka Makoto (Kawasaki JPX), Electronic data protection system.
  51. Johnson Woodrow W. ; Atkins Christine J. ; Yoh Jon, Electronic rights management and authorization system.
  52. Kazmierczak Gregory J. (Plainsboro NJ) Michener John R. (Neshanic Station NJ) Smith Kathryn M. (Somerville NJ), Encrypted data package record for use in remote transaction metered data system.
  53. Torii Naoya (Kawasaki JPX) Hasebe Takayuki (Kawasaki JPX) Akiyama Ryota (Kawasaki JPX), Encryption communication system.
  54. Platteter Dale T. (Fairport NY) Westfall Robert S. (Rochester NY) Carter Jeff C. (Fairport NY), Execution protection for floppy disks.
  55. Olsen James E. ; Bringhurst Adam L., Fault tolerant electronic licensing system.
  56. Tetsu Kimura JP, File management apparatus and method, and recording medium including same.
  57. Comerford Liam D. (Carmel NY) White Steve R. (Mt. Kisco NY), Hardware key-on-disk system for copy-protecting magnetic storage media.
  58. Horiike, Norikazu, Image processing apparatus and method, and storage medium storing program codes realizing such method.
  59. Torii Naoya (Kawasaki MD JPX) Newman ; Jr. David B. (La Plata MD), Key distribution protocol for file transfer in the local area network.
  60. Christiano Matt (Saratoga CA), License management system for software applications.
  61. Griswold Gary N., Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a.
  62. England Paul ; DeTreville John D. ; Lampson Butler W., Loading and identifying a digital rights management operating system.
  63. Walters Kenn D. (Vaterstetten DEX), Memory card.
  64. Guillou Louis C. (Rennes FRX) Quisquater Jean-Jacques (Brussels BEX), Method and apparatus for authenticating accreditations and for authenticating and signing messages.
  65. Heath Chester A. (Boca Raton FL) Langgood John K. (Boca Raton FL) Valli Ronald E. (Pittsburgh PA), Method and apparatus for automatic initialization of pluggable option cards.
  66. Fletcher Rick ; Lin Pei-Chen, Method and apparatus for automatically updating software components on end systems over a network.
  67. Hollar,Mark A., Method and apparatus for determining digital A/V content distribution terms based on detected piracy levels.
  68. Ross Cliff D. (Pleasant Grove UT) Taylor Neil W. (Springville UT) Kingdon Kevin W. (Orem UT) Davis Howard R. (Salem UT) Major Drew (Orem UT), Method and apparatus for electronic licensing.
  69. Cooper Thomas Edward ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-d.
  70. Cooper Thomas Edward ; Phillips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption.
  71. Garst Blaine ; Serlet Bertrand, Method and apparatus for enforcing software licenses.
  72. Helbig ; Sr. Walter A, Method and apparatus for enhancing computer system security.
  73. Kocher Paul C. ; Jaffe Joshua M. ; Jun Benjamin C., Method and apparatus for preventing piracy of digital content.
  74. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  75. Logan Andrew J. (Gladwyne PA), Method and apparatus for protecting software.
  76. Koelle,Katharina Veronika; Worzel,William P., Method and apparatus for protection of electronic media.
  77. Beecher David A. (Kirkland WA), Method and apparatus for protection of software in an electronic system.
  78. Arnold, William C.; Chess, David M.; Morar, John F.; Segal, Alla; Swimmer, Morton G.; Whalley, Ian N.; White, Steve R., Method and apparatus for replicating and analyzing worm programs.
  79. Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Method and apparatus for retrieving secure information from mass storage media.
  80. Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Method and apparatus for retrieving selected information from a secure information source.
  81. Brandt Marcia Lynn ; Destefano George Francis ; Fosdick Eric Leonard ; Mehta Ramila Alexandra ; Prokop Teresa McConville ; Stamschror Kevin Patrick, Method and apparatus for software license management.
  82. Cohen Aaron Michael, Method and apparatus for software licensing electronically distributed programs.
  83. Davis Owen ; Jain Vidyut, Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource d.
  84. Kirouac Donald L. (Thornhill CAX) Porrett William A. (Unionville CAX) Czerwinski Marek J. (Scarborough CAX), Method and apparatus for updating software at remote locations.
  85. Hsu Jerry,TWX ; Shen Sidney,TWX, Method and apparatus to protect computer software.
  86. Hennige Hartmut (23 Packman Lane ; Home Green Kirk Ella Hull HU10 7TH N. Humberside GB3), Method and device for simplifying the use of a plurality of credit cards, or the like.
  87. Herzberg Amir (Bronx NY) Jarecki Stanislaw M. (Cambridge MA) Krawczyk Hugo M. (Riverdale NY) Yung Marcel M. (New York NY), Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret s.
  88. Horadan Peter H. ; Candell Eric M., Method and system for creating and searching directories on a server.
  89. Wyman Robert M., Method and system for managing execution of licensed programs.
  90. Durst ; Jr. Robert T. (212 Shelton Rd. Monroe CT 06468) Hunter Kevin D. (440 Allyndale Dr. Stratford CT 06497), Method and system for preventing unauthorized use of software.
  91. Dwork Cynthia ; Halpern Joseph Y. ; Lotspiech Jeffrey Bruce, Method and system for protection of digital information.
  92. Dwork Cynthia ; Halpern Joseph Y. ; Lotspiech Jeffrey Bruce, Method and system for protection of digital information.
  93. Rice, John R.; Atallah, Mikhail J., Method and system for secure computational outsourcing and disguise.
  94. Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
  95. Wolf Timothy J. (Raleigh NC), Method and system for software asset usage detection and management.
  96. Fisher Arvin J. (Rochester MN) Hlava Alan (Longmont CO) Koeller Paul D. (Rochester MN) Manges Mary C. (Rochester MN) Russell Michael K. (Rochester MN) Satin Robert H. (Rochester MN) Stewart Gordon G., Method for automated complex multilevel softward installation in a data processing system.
  97. Wyatt Stuart Alan, Method for defining and verifying user access rights to a computer information.
  98. Grube Gary W. (Palatine IL) Markison Timothy W. (Hoffman Estates IL), Method for detecting unauthorized modification of a communication or broadcast unit.
  99. Fraser Robert E., Method for dynamically wrapping files for downloading.
  100. Schull Jonathan (Haverford PA), Method for encouraging purchase of executable and non-executable software.
  101. Singh Jitendra K. (San Jose CA), Method for locking software files to a specific storage device.
  102. Mason Donald ; Criswell Christopher A., Method for negotiating software compatibility.
  103. Larsson Jeffrey E. ; Richardson Alan ; Steckler Paul A., Method for preventing software piracy during installation from a read only storage medium.
  104. Lipscomb Thomas H. (New York NY) Nagel Robert H. (New York NY), Method for retrieving secure information from a database.
  105. Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
  106. Hill Charles E., Method for updating a remote computer.
  107. Miyaji Atsuko (Kawachinagano JPX), Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication.
  108. Singh Jitendra K. (6361 Almaden Rd. San Jose CA 95120), Method of preventng software piracy by uniquely identifying the specific magnetic storage device the software is stored.
  109. Miyaji Atsuko (Kawachinagano JPX) Tatebayashi Makoto (Takarazuka JPX), Method of privacy communication using elliptic curves.
  110. Chou Wayne W. (25 Hauley Pl. Ridgefield CT 06877) Erett Richard (278 Russet Rd. Stamford CT 06903) Kulinets Joseph M. (Stamford CT), Method of protecting computer software from unauthorized execution using multiple keys.
  111. Choudhury Abhijit K. (Scotch Plains NJ) Maxemchuk Nicholas F. (Mountainside NJ) Paul Sanjoy (Scotch Plains NJ) Schulzrinne Henning G. (Sterling NJ), Method of protecting electronically published materials using cryptographic protocols.
  112. Platt Stephen M. (Ft. Collins CO), Method of remotely installing software directly from a central computer.
  113. Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT) Elteto Laszlo (Stamford CT) Engel Frederik (Wilton CT), Method of software distribution protection.
  114. Mattson ; Jr. James S. ; Shah Lacky V. ; Buzbee William B. ; Benitez Manuel E., Method, apparatus, and product for dynamic software code translation system.
  115. Labaton Isaac (Haifa AZ ILX) Kelly Michael K. (Phoenix AZ), Methods and apparatus for data encryption and transmission.
  116. Liu Cheng-Chung (Warren NJ) Lo Daniel S. (Warren NJ) Nazif Zaher A. (High Bridge NJ) Wu Fu-Lin (East Brunswick NJ) Zobre Donald W. (South Somerville NJ), Methods and apparatus for software retrofitting.
  117. Marx Philipp Wilhelm,DEX, Module for the protection of software.
  118. Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
  119. Milne Steven H. ; Tindell James Michael ; Tobias ; II John C. ; Dilts Michael R. ; Edelman Bradley Alan ; Denman Matthew, Object-oriented framework for creating multimedia applications.
  120. Asai Toshinori,JPX, Program operating apparatus.
  121. Casto ; Walter V. ; DeLong ; Lawrence W. ; Markley ; Theodore J. ; Stru ger ; Odo J., Program protection module for programmable controller.
  122. Yamagishi Toru (Tokyo JPX), Protection against unauthorized use of software recorded on recording medium.
  123. Sandberg-Diment Erik, Providing verification information for a transaction.
  124. Scholz Stephan (Munich DEX) Becker Wolfgang (Munich DEX) Doellinger Carl-Heinz (Germering DEX) Wollensak Martin (Munich DEX), Real time control system and method for replacing software in a controlled system.
  125. Jensen Craig Charles ; Staffer Andrew C., Real-time apparatus and method for minimizing disk fragmentation in a computer system.
  126. Horstmann Cay S., Relicensing of electronically purchased software.
  127. Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
  128. Choo, Tse Huong, Robust encryption and decryption of packetized data transferred across communications networks.
  129. Davis Derek L. (Phoenix AZ), Roving software license for a hardware agent.
  130. Wahbe Robert S. ; Lucco Steven E. ; Fraser Christopher W. ; Morrison Vance Palmer, Safe general purpose virtual machine computing system.
  131. McMullan ; Jr. Jay C. (Doraville GA) Burleson David B. (Roswell GA) Borsetti ; Jr. Paul (Alpharetta GA) Filion John T. (Lawrenceville GA), Secure authorization and control method and apparatus for a game delivery service.
  132. Hurtado, Marco M.; Milsted, Kenneth L.; Gruse, George G.; Downs, Edgar; Lehman, Christopher T.; Spagna, Richard L.; Lotspiech, Jeffrey B., Secure electronic content distribution on CDS and DVDs.
  133. Floyd Michel ; Horstmann Cay S., Secure electronic software packaging using setup-external unlocking module.
  134. Marshall Alan D. (Merchants Landing GB2) Mitchell Christopher J. (Codford GB2) Proudler Graeme J. (Meade Park GB2), Secure messaging systems.
  135. Grimonprez Georges (Villeneuve d\Asq FRX) Paradinas Pierre (Villeneuve d\Asq FRX), Secured method for loading a plurality of applications into a microprocessor memory card.
  136. Ronning Joel A., Self-launching encrypted digital information distribution system.
  137. Ronning Joel A., Self-launching encrypted try before you buy software distribution system.
  138. Brett Bevin R. (Merrimack NH), Smart recompilation of performing matchup/difference after code generation.
  139. Mandelbaum Richard (Manalapan NJ) Sherman Stephen A. (Hackettstown NJ) Wetherington Diane R. (Bernardsville NJ), Smartcard adapted for a plurality of service providers and for remote installation of same.
  140. Pearce David B. ; Hughes Aidan, Software anti-piracy system that adapts to hardware upgrades.
  141. Richard Bean ; Young Harvill, Software authorization system and method.
  142. Nakagawa Toru,JPX ; Takada Yuji,JPX, Software distribution and maintenance system and method.
  143. Chernow Fred (360 Kiowa Pl. Boulder CO 80303) Peterson Randy J. (1330 Arapahoe St. Boulder CO 80302), Software distribution system.
  144. Michel Alan D. (Fishers IN) Reinke Robert E. (Indianapolis IN), Software pay per use system.
  145. Hill Charles E., Software piracy detection system.
  146. Hsu Jerry,TWX, Software protection apparatus and the method of protection utilizing read-write memory means having inconsistent input a.
  147. Pickholtz Andrew (Fairfax VA), Software protection method and apparatus.
  148. Noguchi Sunao,JPX, Software rental method and apparatus, and circulating medium therefor.
  149. Kobus ; Jr. Paul (Phoenix AZ), Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes f.
  150. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  151. Hasebe Takayuki (Kawasaki JPX) Akiyama Ryota (Kawasaki JPX) Yoshioka Makoto (Kawasaki JPX), Storage medium for preventing an illegal use by a third party.
  152. Hasebe Takayuki,JPX ; Akiyama Ryota,JPX ; Yoshioka Makoto,JPX, Storage medium for preventing an irregular use by a third party.
  153. Adams Carlisle M. (Ottawa CAX), Symmetric cryptographic system for data encryption.
  154. Medveczky Geza (5395 Greenrich Rd. Castro Valley CA 94552) Lunsford Kelvin (36156 Bayonne Dr. Newark CA 94560) ..UC: 380/4 380/25 380/49 340/82534, System and apparatus for protecting computer software.
  155. Wallace David R., System and method for cloaking software.
  156. Tajalli Homayoon (Ellicott City MD) Badger Mark L. (Rockville MD) Dalva David I. (Rockville MD) Walker Stephen T. (Glenwood MD), System and method for controlling the use of a computer.
  157. Holmes Keith (Dublin IEX) Cunningham Connel G. (Dublin IEX) Gleeson Fiona (Dublin IEX), System and method for installing software and updating configuration files.
  158. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for key escrow encryption.
  159. Rose John R., System and method for managing try-and-buy usage of application programs.
  160. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  161. Nilsson Rickard (Stockholm SEX) Markstrm Ulf (Stockholm SEX) Klfver Leif (lvsj SEX), System for changing software during computer operation.
  162. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  163. Slik David,CAX ; Byrne Shannon,CAX, System for distributing digital information.
  164. Byrne,Shannon; Muecke,Innes; Patterson,Andrew; Slik,David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  165. Byrne Shannon,CAX, System for persistently encrypting critical software file to prevent installation of software program on unauthorized computers.
  166. Kittirutsunetorn Kitti (957 Durlane Ct. Sunnyvale CA 94087), System for protection of software in memory against unauthorized use.
  167. Collins ; III Theodore Joseph ; Anderson Scott Roy ; McDowall Steven J. ; Kratsch Charles Henry ; Larson Joseph Paul, System for software distribution in a digital computer network.
  168. Richardson ; III Frederic B. (Brookvale AUX), System for software registration.
  169. Whiting Douglas L. (Carlsbad CA), System for transparently compressing data files in a computer system.
  170. Michener John R. (Princeton NJ) Samit Benjamin (Princeton NJ), System method and apparatus for authenticating an encrypted signal.
  171. Molnar Charles E. (471 Toft La. Webster Groves MO 63119) Backus Alan L. (1550 Centinela Ave. ; No. 210 Los Angeles CA 90025), System to demonstrate and sell computer programs.
  172. Edwards ; Jr. Gordon L. (Easley SC), System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of prote.
  173. McIchionc, Daniel Joseph, System, method and computer program product for process-based selection of virus detection actions.
  174. Edwards, Jonathan L.; White, Edmund H., System, method and computer program product for selecting virus detection actions based on a process by which files are being accessed.
  175. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  176. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  177. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  178. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  179. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  180. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  181. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  182. Nardone Joseph M. ; Mangold Richard T. ; Pfotenhauer Jody L. ; Shippy Keith L. ; Aucsmith David W. ; Maliszewski Richard L. ; Graunke Gary L., Tamper resistant methods and apparatus.
  183. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  184. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  185. Archie Kent C. (Warrenville IL) Fonorow Owen R. (Plainfield IL) McGould Mary C. (Wheaton IL) McLear ; III Robert E. (Warrenville IL) Read Edward C. (Bolingbrook IL) Schaefer ; III Edwin M. (North Aur, Test automation system.
  186. Pickett Thomas E., Transaction security method and apparatus.
  187. Stringer John W. (Santa Cruz CA) Richards Theodore S. (Los Gatos CA), Transformation of ephemeral material.
  188. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  189. Ronning Joel A., Try before you buy software distribution and marketing system.
  190. Granger Mark J. ; Smith Cyrus E. ; Hoffman Matthew I., Use of pseudocode to protect software from unauthorized use.
  191. Blackman Stephen M. (Westmont IL), Vending and reclosure device for powder and granular products.
  192. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.

이 특허를 인용한 특허 (143)

  1. Haq, Thoufique; Zhai, Jinjian; Pidathala, Vinay K., Advanced persistent threat (APT) detection center.
  2. Sahita, Ravi; Schluessler, Travis; Hahn, Scott, Agent presence monitor configured to execute in a secure environment.
  3. Ito, Satoshi; Aisu, Hideyuki; Kamibayashi, Tooru; Akiyama, Koichiro; Hamada, Shinichiro, Apparatus and method for digital content editing.
  4. Aisu, Hideyuki; Ito, Satoshi, Apparatus and method for playback of digital content.
  5. Thioux, Emmanuel; Vashisht, Sai; Vincent, Michael, Computer exploit detection using heap spray pattern matching.
  6. Smith, Fred Hewitt, Controlling user access to electronic resources without password.
  7. Smith, Fred Hewitt, Controlling user access to electronic resources without password.
  8. Smith, Fred Hewitt, Controlling user access to electronic resources without password.
  9. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Correlation and consolidation of analytic data for holistic view of a malware attack.
  10. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Correlation and consolidation of analytic data for holistic view of malware attack.
  11. Mehra, Divyesh; Singh, Abhishek, Cyber attack early warning system.
  12. Freeman, Robert G.; Ollmann, Gunter, Detecting malicious use of computer resources by tasks running on a computer system.
  13. Freeman, Robert G.; Ollmann, Gunter D., Detecting malicious use of computer resources by tasks running on a computer system.
  14. Jain, Varun; Singh, Abhishek, Detecting malware based on reflection.
  15. Haga, Tomoyuki; Matsushima, Hideki; Ito, Takayuki; Maeda, Manabu; Sato, Taichi, Detecting unauthorized tampering of a program.
  16. Gomez, Joshua Lewis; Singh, Abhishek, Detection and classification of exploit kits.
  17. Paithane, Sushant; Vashisht, Sai, Detection efficacy of virtual machine-based analysis with application specific events.
  18. Paithane, Sushant; Vashisht, Sai, Detection efficacy of virtual machine-based analysis with application specific events.
  19. Ferrie, Peter, Detection of malicious code in non-paged pool unused pages.
  20. Mushtaq, Atif; Rosenberry, Todd; Aziz, Ashar; Islam, Ali, Distributed systems and methods for automatically detecting unknown bots and botnets.
  21. Mushtaq, Atif; Rosenberry, Todd; Aziz, Ashar; Islam, Ali, Distributed systems and methods for automatically detecting unknown bots and botnets.
  22. Paithane, Sushant; Vashisht, Sai, Dynamic content activation for automated analysis of embedded objects.
  23. Goradia, Harnish, Dynamic guest image creation and rollback.
  24. Vincent, Michael; Thioux, Emmanuel; Vashisht, Sai; Kindlund, Darien, Dynamically remote tuning of a malware content detection system.
  25. Manni, Jayaraman; Eun, Philip; Berrow, Michael M., Electronic device for aggregation, correlation and consolidation of analysis attributes.
  26. Harjanto, Dono, Electronic mail sender verification.
  27. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Amin, Muhammad; Staniford, Stuart, Electronic message analysis for malware detection.
  28. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Sukhera, Amin; Staniford, Stuart, Electronic message analysis for malware detection.
  29. Aziz, Ashar; Uyeno, Henry; Manni, Jay; Sukhera, Amin; Staniford, Stuart, Electronic message analysis for malware detection.
  30. Rathor, Hirendra; Dalal, Kaushal, Exploit detection of malware and malware families.
  31. Rathor, Hirendra; Dalal, Kaushal, Exploit detection of malware and malware families.
  32. Singh, Japneet; Ramchetty, Harinath; Gupta, Anil, Exploit detection system.
  33. Thioux, Emmanuel; Amin, Muhammad; Ismael, Osman, File extraction from memory dump for malicious content analysis.
  34. Cagno, Brian J.; Elliott, John C V.; Lucas, Gregg S.; Qiu, Kenny N., Flash sector seeding to reduce program times.
  35. Singh, Abhishek; Mesdaq, Ali; Das, Anirban; Jain, Varun, Framework for classifying an object as malicious with machine learning for deploying updated predictive models.
  36. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mohan, Prashanth; Xue, Hui, Framework for efficient security coverage of mobile software applications.
  37. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar; Johnson, Noah; Mohan, Prshanth; Xue, Hui, Framework for efficient security coverage of mobile software applications.
  38. Ismael, Osman Abdoul; Song, Dawn, Framework for efficient security coverage of mobile software applications installed on mobile devices.
  39. Ismael, Osman Abdoul; Song, Dawn; Xue, Hui, Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application.
  40. Ismael, Osman Abdoul; Song, Dawn; Aziz, Ashar, Framework for iterative analysis of mobile software applications.
  41. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  42. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  43. Mesdaq, Ali; Westin, III, Paul L., Fuzzy hash of behavioral results.
  44. Sakagawa, Takashi; Hosoi, Ayako, Information processing apparatus.
  45. Richardson, Ric B., Installing protected software product using unprotected installation image.
  46. Khalid, Yasir; Paithane, Sushant; Vashisht, Sai, Intelligent context aware user interaction for malware detection.
  47. Rathor, Hirendra; Dalal, Kaushal; Gupta, Anil, Interactive infection visualization for improved exploit detection and signature generation for malware and malware families.
  48. Eyada, Hatem, Intrusion prevention and remedy system.
  49. Abbasi, Fahim H.; Salam, Abdul; Shahzad, Farrukh, Leveraging behavior-based rules for malware family classification.
  50. Thioux, Emmanuel; Amin, Muhammad; Kindlund, Darien; Pilipenko, Alex; Vincent, Michael, Malicious content analysis using simulated user interaction without user involvement.
  51. Thioux, Emmanuel; Amin, Muhammad; Kindlund, Darien; Pilipenko, Alex; Vincent, Michael, Malicious content analysis using simulated user interaction without user involvement.
  52. Khalid, Yasir; Amin, Muhammad; Jing, Emily; Rizwan, Muhammad, Malicious content analysis with multi-version application support within single operating environment.
  53. Khalid, Yasir; Amin, Muhammad; Jing, Emily; Rizwan, Muhammad, Malicious content analysis with multi-version application support within single operating environment.
  54. Singh, Abhishek, Malicious message analysis system.
  55. Vincent, Michael; Mesdaq, Ali; Thioux, Emmanuel; Singh, Abhishek; Vashisht, Sal, Malware analysis in accordance with an analysis plan.
  56. Wang, Jiaxiang, Method and device for recombining runtime instruction.
  57. Nagabhushan, Gayathri; Sahita, Ravi; Khosravi, Hormuzd; Grover, Satyajit, Method and system for whitelisting software components.
  58. Gomez Hernandez, Jaime Enrique; Perry Peinado, Carlos A.; Linares Montañes, Wilmer; Tovar Rueda, Ivan Dario, Method for internet transactions.
  59. Malik, Amit; Pande, Reghav; Jain, Aakash, Method to detect application execution hijacking using memory protection.
  60. Alagna, Michael Tony; Obrecht, Mark; Payne, Andy; Norwood, Peter, Method, computer software, and system for providing end to end security protection of an online transaction.
  61. Dewan, Prashant; Durham, David, Methods and systems to directly render an image and correlate corresponding user input in a secure memory domain.
  62. Paithane, Sushant; Vashisht, Sai; Yang, Raymond; Khalid, Yasir, Methods for detecting file altering malware in VM based analysis.
  63. Etchegoyen, Craig S., Modular software protection.
  64. Savagaonkar, Uday; Sahita, Ravi; Durham, David, Monitoring a target agent execution pattern on a VT-enabled system.
  65. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  66. Obrecht, Mark E.; Myers, Robert P.; Hartmann, Alfred C.; Alagna, Nick F.; Pyle, Kevin N.; Sullivan, Scott D.; Little, Michael W., Monitoring computer process resource usage.
  67. Malik, Amit; Deshpande, Shivani; Singh, Abhishek; Zheng, Wei, Multistage system and method for analyzing obfuscated content for malware.
  68. Manni, Jayaraman; Aziz, Ashar; Gong, Fengmin; Loganathan, Upendran; Amin, Muhammad, Network-based binary file extraction and analysis for malware detection.
  69. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, Network-based malware detection.
  70. Ismael, Osman Abdoul, Optimized resource allocation for virtual machines within a malware content detection system.
  71. D'Souza, Roy Peter; Shanbhag, Santosh S., Originator publishing an attestation of a statement.
  72. Richardson, Ric B., Post-production preparation of an unprotected installation image for downloading as a protected software product.
  73. Israel, Maurice, Process of authentication for an access to a web site.
  74. Lagar-Cavilla, Horacio Andres; Varshavsky, Alexander, Remote-assisted malware detection.
  75. Thioux, Emmanuel; Lin, Yichong, Return-oriented programming detection.
  76. Durham, David; Khosravi, Hormuzd M.; Blumenthal, Uri; Long, Men, Secure platform voucher service for software components within an execution environment.
  77. Smith, Fred Hewitt, Secure processing module and method for making the same.
  78. Durham, David M.; Khosravi, Hormuzd M.; Blumenthal, Uri; Long, Men, Secure vault service for software components within an execution environment.
  79. Durham, David M.; Khosravi, Hormuzd M.; Blumenthal, Uri; Long, Men, Secure vault service for software components within an execution environment.
  80. Durham, David M; Khosravi, Hormuzd M; Blumenthal, Uri; Long, Men, Secure vault service for software components within an execution environment.
  81. Durham, David; Khosravi, Hormuzd; Blumenthal, Uri; Long, Men, Secure vault service for software components within an execution environment.
  82. Ha, Phung-Te; Xu, Wei, Selective system call monitoring.
  83. Thioux, Emmanuel, Shellcode detection.
  84. Schluessler, Travis; Durham, David; Cox, George; Grewal, Karanvir Ken, Signed manifest for run-time verification of software program identity and integrity.
  85. Etchegoyen, Craig S., Software signature tracking.
  86. Orikasa, Daisuke; Takata, Yutaka; Inoue, Shintaro, Storage system for controlling assignment of storage area to virtual volume storing specific pattern data.
  87. Orikasa, Daisuke; Takata, Yutaka; Inoue, Shintaro, Storage system for controlling assignment of storage area to virtual volume storing specific pattern data.
  88. Aziz, Ashar, Subscriber based protection system.
  89. Khalid, Yasir; Deshpande, Shivani, Susceptible environment detection system.
  90. Aziz, Ashar; Amin, Muhammad; Ismael, Osman Abdoul; Bu, Zheng, System and method for IPS and VM-based detection of suspicious objects.
  91. Richardson, Ric B., System and method for adjustable licensing of digital products.
  92. Thioux, Emmanuel; Amin, Muhammad; Ismael, Osman Abdoul, System and method for analysis of a memory dump associated with a potentially malicious content suspect.
  93. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for analyzing packets.
  94. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for analyzing suspicious network data.
  95. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for bot detection.
  96. Aziz, Ashar, System and method for detecting anomalous behaviors using a virtual machine environment.
  97. Paithane, Sushant; Vashist, Sai; Yang, Raymond; Khalid, Yasir, System and method for detecting file altering behaviors pertaining to a malicious attack.
  98. Paithane, Sushant; Vashisht, Sai Omkar, System and method for detecting interpreter-based exploit attacks.
  99. Pidathala, Vinay; Uyeno, Henry, System and method for detecting malicious links in electronic messages.
  100. Pidathala, Vinay; Uyeno, Henry, System and method for detecting malicious links in electronic messages.
  101. Aziz, Ashar, System and method for detecting malicious traffic using a virtual machine configured with a select software environment.
  102. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method for determining a threat based on correlation of indicators of compromise from other sources.
  103. Shokhor, Sergey; Shigapov, Andrey, System and method for dynamic policy based access over a virtual private network.
  104. Chan, Eric; Ismael, Osman Abdoul; Snyder, Gregory J., System and method for enhanced security of storage devices.
  105. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, System and method for malware containment.
  106. Amin, Muhammad; Mehmood, Masood; Ramaswamy, Ramaswamy; Challa, Madhusudan; Karandikar, Shrikrishna, System and method for offloading packet processing and static analysis operations.
  107. Amin, Muhammad; Mehmood, Masood; Ramaswamy, Ramaswamy; Challa, Madhusudan; Karandikar, Shrikrishna, System and method for offloading packet processing and static analysis operations.
  108. Pidathala, Vinay K.; Bu, Zheng; Aziz, Ashar, System and method for run-time object classification.
  109. Aziz, Ashar, System and method for signature generation.
  110. Kumar, Vineet; Otvagin, Alexander; Borodulin, Nikita, System and method for triggering analysis of an object for malware in response to modification of that object.
  111. Smith, Fred Hewitt; Smith, Cynthia, System and method for using a separate device to facilitate authentication.
  112. Smith, Fred Hewitt; Smith, Cynthia, System and method for using a separate device to facilitate authentication.
  113. Aziz, Ashar; Radhakrishnan, Ramesh; Ismael, Osman, System and method for virtual analysis of network data.
  114. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method of detecting delivery of malware based on indicators of compromise from different sources.
  115. Rivlin, Alexandr; Mehra, Divyesh; Uyeno, Henry; Pidathala, Vinay, System and method of detecting delivery of malware using cross-customer data.
  116. Aziz, Ashar, System and method of detecting malicious content.
  117. Pilipenko, Alex; Ha, Phung-Te, System and methods for advanced malware detection through placement of transition events.
  118. Aziz, Ashar; Amin, Muhammad; Ismael, Osman Abdoul; Bu, Zheng, System, apparatus and method for automatically verifying exploits within suspect objects and highlighting the display information associated with the verified exploits.
  119. Khalid, Yasir; Deshpande, Shivani; Amin, Muhammad, System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object.
  120. Ismael, Osman Abdoul, System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection.
  121. Ismael, Osman Abdoul, System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection.
  122. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers.
  123. Karandikar, Shrikrishna; Amin, Muhammad; Deshpande, Shivani; Khalid, Yasir, System, device and method for detecting a malicious attack based on direct communications between remotely hosted virtual machines and malicious web servers.
  124. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for analyzing PDF documents.
  125. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for analyzing malicious PDF network content.
  126. Singh, Abhishek; Manni, Jayaraman, Systems and methods for automatically detecting backdoors.
  127. Aziz, Ashar, Systems and methods for computer worm defense.
  128. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious PDF network content.
  129. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for detecting malicious network content.
  130. Etchegoyen, Craig S., Systems and methods for game activation.
  131. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack detection and identification.
  132. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack prevention.
  133. Aziz, Ashar; Lai, Wei-Lung; Manni, Jayaraman, Systems and methods for malware attack prevention by intercepting flows of information.
  134. Aziz, Ashar, Systems and methods for malware defense.
  135. LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  136. Levine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  137. Staniford, Stuart Gresley; Aziz, Ashar, Systems and methods for scheduling analysis of network content for malware.
  138. Aziz, Ashar, Systems and methods for unauthorized activity defense.
  139. Aziz, Ashar, Systems and methods for unauthorized activity defense.
  140. Savagaonkar, Uday; Sahita, Ravi; Durham, David; Khosravi, Hormuzd, Tamper protection of software agents operating in a vitual technology environment methods and apparatuses.
  141. Baskerville, Richard; Grace, Martin; Straub, Detmar; Stucke, Carl; Vaishnavi, Vijay; Vandenberg, Art; Sainsbury, Robert; Zheng, Guangzhi; Bloomquist, David; Bellard, Michelle; Vance, Anthony, Trusted query network systems and methods.
  142. Bu, Zheng; Lin, Yichong, Zero-day discovery system.
  143. Zafar, Asim; Qureshi, Eirij; Kindlund, Darien, Zero-day rotating guest image profile.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로