$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Digital rights management in a mobile communications environment 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06Q-099/00
출원번호 US-0449597 (2006-06-09)
등록번호 US-7415439 (2008-08-19)
발명자 / 주소
  • Kontio,Markku
  • Sipponen,Juha Pekka
  • Ylitalo,Tapio
출원인 / 주소
  • Nokia Corporation
대리인 / 주소
    Morgan & Finnegan LLP
인용정보 피인용 횟수 : 86  인용 특허 : 166

초록

The invention provides a method, system, and computer program product to control the access, copying, and/or transfer of a digital asset by mobile, wireless devices using a digital voucher. The digital voucher references a primary content that contains all of the expression for that particular asset

대표청구항

We claim: 1. A system, comprising: a plurality of content servers in a network, including a first content server storing a copy of a digital asset containing content encrypted with a content key; a plurality of voucher servers in the network coupled to said plurality of content servers, including a

이 특허에 인용된 특허 (166)

  1. Ansell, Steven T.; Cherenson, Andrew R.; Rishniw, Leon; Cannon, Susan A.; Allard, Edward J.; Brownell, Jason S.; Stroud, Micah, Adaptable security mechanism for preventing unauthorized access of digital data.
  2. Davis Derek L., Apparatus and method for providing secured communications.
  3. Davis Derek L. (Phoenix AZ), Apparatus and method for providing secured communications.
  4. Grantz Jeffrey A. ; Ure J. Robert, Apparatus and method to allow a user a trial period before licensing a software program product.
  5. Aditham Radhakrishna ; Chang Philip ; Kramer Paul H., Authenticating remote users in a distributed environment.
  6. Takeda Koichiro (Kawasaki JPX), Automatic output level control system for multi-carrier radio transmission apparatus.
  7. Williams Donald D. (Boca Raton FL), Bios emulation of a hard file image as a diskette.
  8. Aucsmith David W. (Portland OR), Broadcast key distribution apparatus and method using Chinese Remainder.
  9. Ronning Joel A., Central database system for automatic software program sales.
  10. Hartman ; Jr. Robert C. (Woodside CA), Client/server based secure timekeeping system.
  11. Matyas Stephen M. (Kingston NY) Oseas Jonathan (Hurley NY), Code protection using cryptography.
  12. Gladney Henry M. (Saratoga CA) Lorch Douglas J. (San Jose CA) Mattson Richard L. (San Jose CA), Communication for version management in a distributed information service.
  13. Reed Drummond Shattuck ; Heyman Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Communications system for transferring information between memories according to processes transferred with the information.
  14. Holmes Keith (Dublin IEX), Computer software protection.
  15. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Computer-based communication system and method using metadata defining a control structure.
  16. Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
  17. Traw Chandler Brendan Stanton ; Aucsmith David Wayne, Content protection for transmission systems.
  18. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  19. Ehrsam William F. (Kingston NY) Elander Robert C. (Saugerties NY) Hollis Lloyd L. (Cary NC) Lennon Richard E. (Woodstock NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Oseas J, Cryptographic communication security for multiple domain networks.
  20. Morimoto Norishige,JPX ; Maeda Junji,JPX, Data hiding and extraction methods.
  21. Hartrick Thomas V. (Gaithersburg MD) Stevens Jeffrey N. (Gaithersburg MD) Sabia Nicholas J. (Silver Spring MD), Data processing system and method to enforce payment of royalties when copying softcopy books.
  22. Hecht Matthew S. (Potomac MD), Data processing system with improved work flow system and method.
  23. Yagasaki Yoichi,JPX ; Koyanagi Hideki,JPX ; Tahara Katsumi,JPX ; Fujinami Yasushi,JPX, Data recording apparatus and method for preventing illegal copying.
  24. Sako Yoichiro,JPX ; Kurihara Akira,JPX ; Osawa Yoshitomo,JPX ; Kawashima Isao,JPX ; Owa Hideo,JPX, Decoding key recorded at a recording site in order to decode information transmitted to that site is encoded with information specific to the recording site.
  25. Enari Masahiko,JPX, Decrypting method and electronic device.
  26. Tycksen ; Jr. Frank A. ; Jennings Charles W., Digital Certificate.
  27. Aucsmith David W. ; Cox George ; Onnen Paul E., Digital certificates containing multimedia data extensions.
  28. Aucsmith David W. ; Cox George ; Onnen Paul E., Digital certificates containing multimedia data extensions.
  29. Aucsmith David W. ; Cox George ; Onnen Paul E., Digital certificates containing multimedia data extensions.
  30. Saito Makoto,JPX, Digital content management system using electronic watermark.
  31. Tsevdos James T. ; Cook Ross L. ; Ring Nancy Lee ; Barnhill Robert S. ; Hamblin Glen E. ; Milsted Kenneth L. ; Kindell Craig N. ; Waefler Susan Elizabeth ; Portela Carlos ; Anderson Brent C., Digital information accessing, delivery and production system.
  32. Amada Nobutaka,JPX ; Yamazaki Shigeru,JPX ; Noguchi Takaharu,JPX ; Nishijima Hideo,JPX ; Ono Hiroaki,JPX ; Okamoto Hiroo,JPX ; Owashi Hitoaki,JPX ; Arai Takao,JPX ; Hatanaka Yuji,JPX ; Saito Seiichi,, Digital information signal transmitting/receiving method and system.
  33. Watson Gary E., Distributed world wide web servers.
  34. Easty Allen Dwight ; Wagner Byron David ; Wendt Thomas Christian ; McConaughy Joel ; Baskin Aaron Richard ; Taplin Jonathan Trumbull ; Chechik Jeremiah, Dynamic digital asset management.
  35. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  36. Hasebe Takayuki (Kawasaki JPX) Akiyama Ryota (Kawasaki JPX) Yoshioka Makoto (Kawasaki JPX), Electronic data protection system.
  37. Pravetz James D., Encapsulation of public key cryptography standard number 7 into a secured document.
  38. Ishiguro Ryuji,JPX ; Minami Masafumi,JPX, Encrypting method and apparatus, recording method, decrypting method and apparatus, and recording medium.
  39. Blaze Matthew A., Escrow key management system for accessing encrypted data with portable cryptographic modules.
  40. Takenaka Masahiko,JPX ; Hasebe Takayuki,JPX ; Torii Naoya,JPX ; Iwayama Noboru,JPX, File protection system, software utilization system using the file protection system and storage medium used in the sof.
  41. Karp Alan H. (Palo Alto CA), Hardware assist for protecting PC software.
  42. Comerford Liam D. (Carmel NY) White Steve R. (Mt. Kisco NY), Hardware key-on-disk system for copy-protecting magnetic storage media.
  43. Mitlitsky Fred (Livermore CA) Hoard Ronald W. (Livermore CA), High-field magnets using high-critical-temperature superconducting thin films.
  44. Hambrick Geoffrey Martin ; Rowan James Matthew, Implementation of teams and roles within a people oriented work environment.
  45. Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Implementing a shared higher level of privilege on personal computers for copy protection of software.
  46. Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Implementing a shared higher level of privilege on personal computers for copy protection of software.
  47. Nolan ; Jr. Thomas J. (Mahopac NY), Implementing privilege on microprocessor systems for use in software asset protection.
  48. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Card Stuart K. (Los Altos CA) Casey Michalene M. (Morgan Hill CA) Goldstein Richard J. (San Francisco CA) Lamming Michael G. (Cambridge CA, Interactive contents revealing storage device.
  49. Mintzer Frederick Cole ; Yeung Minerva Ming-Yee, Invisible image watermark for image verification.
  50. Aucsmith David Wayne, Key management system for DVD copyright management.
  51. Levine Earl, Lossless data compression with low complexity.
  52. Levine Earl, Lossless data compression with low complexity.
  53. Levine Earl, Lossless data compression with low complexity.
  54. Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Manipulating rights-to-execute in connection with a software copy protection mechanism.
  55. Eldridge Alan D. ; Kaufman Charles W., Method and apparatus for controlling access to encrypted data files in a computer system.
  56. Moore Robert E. (Durham NC), Method and apparatus for correlating network management report messages.
  57. Wang, Xin; Tadayon, Bijan; DeMartini, Thomas; Raley, Michael; Lao, Guillermo; Chen, Eddie; Gilliam, Charles P., Method and apparatus for distributing enforceable property rights.
  58. Cooper Thomas E. (Louisville CO) Philips Hudson W. (Boulder CO) Pryor Robert F. (Longmont CO), Method and apparatus for enabling trial period use of software products: Method and apparatus for utilizing a decryption.
  59. Cooper Thomas Edward (Louisville CO) Pryor Robert Franklin (Longmont CO), Method and apparatus for enabling trial period use of software products: method and apparatus for allowing a try-and-buy.
  60. Cooper Thomas Edward ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-d.
  61. Cooper Thomas E. (Louisville CO) Nagda Jagdish (Boulder CO) Pryor Robert F. (Longmont CO), Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted file.
  62. Cooper Thomas Edward ; Phillips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption.
  63. Cooper Thomas Edward ; Philips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing an encryptio.
  64. Tsutsui Kyoya,JPX ; Shimoyoshi Osamu,JPX, Method and apparatus for encoding the information, method and apparatus for decoding the information and method for information transmission.
  65. Douglas Francis Archibald Brown (Bethesda MD) Glowny David Andrew (Naugatuck CT) Mastrangelo Colette Anne (Danbury CT) Mayer Paul Melvin (Middlebury CT) Shier Peter David (Danbury CT) Shih Jenngang (, Method and apparatus for establishing communications sessions in a remote resource control environment.
  66. Kubala Jeffrey P. (Poughquag NY), Method and apparatus for providing a server function in a logically partitioned hardware machine.
  67. Grantz Jeffrey A. (Boca Raton FL) Ure J. Robert (Coral Springs FL), Method and apparatus for providing a trial period for a software license product using a date stamp and designated test.
  68. Williams Christopher D. ; Goldschmidt-Iki Jean M. ; Shah-Nazaroff Anthony A. ; Hackson David N., Method and apparatus for providing and monitoring coupons via a network.
  69. Curtis Bryce Allen, Method and apparatus for providing security certificate management for Java Applets.
  70. Aras Caglan M. ; Griffin Luther B. ; Lai Fuyung ; Stagg Arthur James ; Sy Kian-Bon Kho, Method and apparatus for screening audio-visual materials presented to a subscriber.
  71. Brandt Marcia Lynn ; Destefano George Francis ; Fosdick Eric Leonard ; Mehta Ramila Alexandra ; Prokop Teresa McConville ; Stamschror Kevin Patrick, Method and apparatus for software license management.
  72. Bellare Mihir M. (New York NY) Rogaway Phillip W. (Austin TX), Method and apparatus for three-party entity authentication and key distribution using message authentication codes.
  73. Modeste A. Robert ; Kearby Gerald W., Method and apparatus for user controlled modulation and mixing of digitally stored compressed data.
  74. Ishiguro Ryuji,JPX ; Osawa Yoshitomo,JPX, Method and device for data decryption, a method and device for device identification, a recording medium, a method of d.
  75. Nakashima Kazuo (Kawasaki JPX) Naito Kazunori (Kawasaki JPX), Method and manufacture for preventing unauthorized use by judging the corresponding relationship between logical and phy.
  76. Camillone Nicholas A. (Austin TX) Steves Douglas H. (Austin TX) Witte Kendall C. (Austin TX), Method and system for access and accounting control in a data processing system by using a single resource account for a.
  77. Dorfman Barry L. (Austin TX), Method and system for authenticating files.
  78. Maddalozzo ; Jr. John ; McBrearty Gerald Francis ; Shieh Johnny Meng-Han, Method and system for creating and utilizing common caches for internetworks.
  79. Stiles Ian James, Method and system for efficiently disbursing requests among a tiered hierarchy of service providers.
  80. Benson Greg,SEX ; Urich Gregory H.,SEX, Method and system for managing a data object so as to comply with predetermined conditions for usage.
  81. Dwork Cynthia ; Halpern Joseph Y. ; Lotspiech Jeffrey Bruce, Method and system for protection of digital information.
  82. Dwork Cynthia ; Halpern Joseph Y. ; Lotspiech Jeffrey Bruce, Method and system for protection of digital information.
  83. Wolf Timothy J. (Raleigh NC), Method and system for software asset usage detection and management.
  84. Janis Frederick L. (Keller TX), Method and system for variable authority level user access control in a distributed data processing system having multip.
  85. Glowny David A. (Naugatuck CT) Shih Jenngang (Bronx NY) Carr Brian P. (Jefferson Valley NY), Method for authenticating messages passed between tasks.
  86. Nuttall Fran.cedilla.ois-Xavier,FRX, Method for computer network operation providing basis for usage fees.
  87. Schull Jonathan (Haverford PA), Method for encouraging purchase of executable and non-executable software.
  88. Douglas Daniel G. ; Edelman Stewart J., Method for establishing a secured communication channel over the internet.
  89. Dwork Cynthia (Palo Alto CA) Naor Simeon (Tel-Aviv ILX), Method for message authentication from non-malleable crypto systems.
  90. Kramer Paul H. (Rochester MN) Tate Kay A. (Rochester MN), Method for protecting data in a computer system.
  91. Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
  92. Cook Sherri E. (Boca Raton FL) McNeill ; Jr. Andrew B. (Deerfield Beach FL), Method for selecting transmission speeds for transmitting data packets over a serial bus.
  93. Filepp Robert (Springfield NJ) Gordon Michael L. (Dobbs Ferry NJ) Bidwell Alexander W. (New York NY) Wolf Allan M. (Ridgefield CT) Young Francis C. (Pearl River NY) Tiemann Duane (Ossining NY) Applem, Method for storing data in an interactive computer network.
  94. Schull Jonathan, Method for tracking software lineage.
  95. Aucsmith David W., Method of caching digital certificate revocation lists.
  96. Cina ; Jr. Vincent J. (Spring Valley NY), Method to prevent use of incorrect program version in a computer system.
  97. Schreiber Daniel,ILX ; Guedaliah David,ILX, Methods and apparatus for preventing reuse of text, images and software transmitted via networks.
  98. Rhoads Geoffrey B., Methods for controlling systems using control signals embedded in empirical data.
  99. Carpenter Mark Alan ; Khalifa Kathy Lockaby ; Lection David Bruce, Methods, system and computer program products for delayed message generation and encoding in an intermittently connecte.
  100. Bialick William P. ; Sutherland Mark J. ; Dolphin-Peterson Janet L. ; Rowland Thomas K. ; Skeba Kirk W. ; Housley Russell D., Modular security device.
  101. Earnest Lester D. (Los Altos Hills CA), Modular software security.
  102. Lawrence Sampson ; Emilio Belmonte ES; Marco Fanti ; Raul Medina, Multi-domain access control.
  103. Horstmann Cay S., Multi-tier electronic software distribution.
  104. Johnson Verlyn Mark, Negotiable locks for concurrent access of control data by multiple programs.
  105. Jones Donald Newland (Vestal NY) Kalka ; Jr. Robert Alois (Endicott NY), Network server for local and remote resources.
  106. Ronning Joel A., On-line try before you buy software distribution system.
  107. Aucsmith David W. ; Knauerhase Robert C., Parameterized hash functions for access control.
  108. Bialick William P. ; Sutherland Mark J. ; Dolphin-Peterson Janet L. ; Rowland Thomas K. ; Skeba Kirk W. ; Housley Russell D., Peripheral device with integrated security functionality.
  109. O'Neil Kevin ; Seidman Glenn R., Personal information security and exchange tool.
  110. Linehan Mark H. (Yorktown Heights NY) Simicich Nicholas J. (Boca Raton FL) Tsudik Gene Y. (Thalwil CHX), Personal key archive.
  111. Siegel, Jaime A., Portable music player with pay per play usage and method for purchase of credits for usage.
  112. Hambrick Geoffrey Martin (Round Rock TX) Rogers Judd Thomas (Austin TX), Project management tool implementing authority for a people oriented work environment tool.
  113. Braudaway Gordon Wesley ; Mintzer Frederick Cole, Protecting images with an image watermark.
  114. Horstmann Cay S., Relicensing of electronically purchased software.
  115. Johnson Donavon W. (Georgetown TX) Smith Todd A. (Austin TX), Remote authentication and authorization in a distributed data processing system.
  116. Jalili Reza (Mount Kisco NY) Wooten Wayne L. (Clarkston GA), Remote procedure execution.
  117. Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
  118. Philip R. Wiser ; Andrew R. Cherenson ; Steven T. Ansell ; Susan A. Cannon, Secure online music distribution system.
  119. Puhl Larry C. ; Vogler Dean H. ; Dabbish Ezzat A., Secure wireless electronic-commerce system with digital product certificates and digital license certificates.
  120. Robert L. Geiger ; Jyh-Han Lin ; Rajiv Mehta, Secure wireless electronic-commerce system with wireless network domain.
  121. Pravetz James D. ; Malloy Thomas J., Secured document access control using recipient lists.
  122. Boyd ; William Weller ; Grafe ; Robert Joseph ; Pingry ; III ; Carl Osc ar, Security controlled information exchange system.
  123. Campbell John E. (Hurley NY) Chan Michael J. (Raleigh NC) Hajek Steven F. (West Hurley NY) Wiltgen Paul L. (Hurley NY), Self modifying access code for altering capabilities.
  124. Ronning Joel A., Self-launching encrypted digital information distribution system.
  125. Ronning Joel A., Self-launching encrypted try before you buy software distribution system.
  126. Carlson Brent A. (Rochester MN) Huss Frederic L. (Rochester MN) Schmucki Nancy M. (Rochester MN) Zelenski Richard E. (Rochester MN), Server entity that provides secure access to its resources through token validation.
  127. Devarakonda Murthy V. (Ossining NY) Kish William A. (Millerton NY) Mohindra Ajay (Tarrytown NY) Zlotek Anthony J. (Pleasant Valley NY), Simultaneous updates to the modification time attribute of a shared file in a cluster having a server and client nodes.
  128. Horstmann Cay S., Software program self-modification.
  129. Chandra Ashileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocess.
  130. Obermann David F. (Austin TX) Trumble Mary K. (Austin TX), Specification of cultural bias in database manager.
  131. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  132. Dan Asit ; Ramaswami Rajiv ; Sitaram Dinkar, Support for portable trusted software.
  133. Dolphin Janet L. (Milpitas CA), System and method for access control for portable data storage media.
  134. Dolphin Janet L. (Milpitas CA), System and method for access control for portable data storage media.
  135. Dolphin Janet L. (Milpitas CA), System and method for access data control.
  136. Adams Robert, System and method for distributing and indexing computerized documents using independent agents.
  137. Mitchell Herman (Lithonia GA) Rich William L. (Charlotte NC) Shackelford Floyd W. (Beauford GA), System and method for importing and exporting data between an object oriented computing environment and an external comp.
  138. Inui Takashi,JPX ; Itoh Kazumi,JPX ; Inoue Ken,JPX, System and method for initializing an information processing system.
  139. Cox James O. (Austin TX) Mott James M. (Austin TX), System and method for secure initial program load for diskless workstations.
  140. Spies Terence R. ; Simon Daniel R., System and method for secure purchase and delivery of video content programs.
  141. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  142. Howell William E. (North Richland Hills TX) Reddy Hari N. (Grapevine TX) Wang Diana S. (Trophy Club TX), System for controlling group access to objects using group access control folder and group identification as individual.
  143. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
  144. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  145. Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
  146. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  147. Stefik Mark J. ; Pirolli Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  148. Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
  149. Nagahama Eiichi (Kawasaki JPX), System for licensing to use software products.
  150. Ronning Joel A., System for preventing unauthorized copying of active software.
  151. Hartman ; Jr. Robert C. (Woodside CA), System for seamless processing of encrypted and non-encrypted data and instructions.
  152. Butter Adrian S. (Binghamton NY) Finkel Brian S. (Chapel Hill NC) Kao Chang-Yung (Boulder CO) Kodukula Sivarama K. (Austin TX) Kuruts James P. (Forest City PA), System for translating encrypted data.
  153. Kahn Robert E. ; Ely David K., System for uniquely and persistently identifying, managing, and tracking digital objects.
  154. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  155. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  156. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  157. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  158. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  159. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  160. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  161. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  162. Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC), Transaction system security method and apparatus.
  163. Abraham Dennis G. (Concord NC) Aden Steven G. (Charlotte NC) Arnold Todd W. (Charlotte NC) Neckyfarow Steven W. (Charlotte NC) Rohland William S. (Charlotte NC), Transaction system security method and apparatus.
  164. Ronning Joel A., Try before you buy software distribution and marketing system.
  165. Martherus,Robin E.; Ramamurthy,Srinivasagopalan, User authentication.
  166. Yemini,Yechiam; Florissi,Danilo; Dailianas,Apostolos, Using electronic security value units to control access to a resource.

이 특허를 인용한 특허 (86)

  1. Neystadt, John; Nice, Nir, Access control using identifiers in links.
  2. Boudreau, Jesse; Panezic, Alan; Murphy, Thomas, Administration of policies for wireless devices in a wireless communication system.
  3. Murphy, Thomas, Administration of wireless systems.
  4. Boudreau, Jesse; Murphy, Thomas; Omar, Salim; Washburn, Mike, Apparatus and methods for coordination of wireless systems.
  5. Boudreau, Jesse; Murphy, Thomas; Omar, Salim; Washburn, Mike, Apparatus and methods for coordination of wireless systems.
  6. Boudreau, Jesse, Apparatus and methods for operation of a wireless server.
  7. Boudreau, Jesse, Apparatus and methods for operation of a wireless server.
  8. Runstedler, Christopher; Jain, Rohit; Fahmy, Samer; Hardy, Michael, Apparatus and methods using a data hub server with servers to source and access informational content.
  9. Minear, Brian; Yu, Julie; Oliver, Mitchell B.; Lundblade, Laurence; Horel, Gerald C.; Patwari, Jaiteerth, Application-based value billing in a wireless subscriber network.
  10. Maes, Maurice Jerome Justin Jean-Baptiste; Skoric, Boris; Staring, Antonius Adriaan Maria; Talstra, Johan Cornelis, Authentication method for authenticating a first party to a second party.
  11. Maes, Maurice Jerome Justin Jean-Baptiste; Skoric, Boris; Staring, Antonius Adriaan Maria; Talstra, Johan Cornelis, Authentication method for authenticating a first party to a second party.
  12. Maes, Maurice Jerome Justin Jean-Baptiste; Skoric, Boris; Staring, Antonius Adriaan Maria; Talstra, Johan Cornelis, Authentication method for authenticating a first party to a second party.
  13. Horel, Gerald Charles; Klein, Michelle; Nguyen, Phil Tien, Automated account mapping in a wireless subscriber billing system.
  14. Haze, Michael; O'Connor, Clint H.; Lo, Yuan-Chang, Automated digital migration.
  15. Ben-Yaacov, Yaacov; Ben-Yaacov, Boaz, Automatic digital music library builder.
  16. Ben-Yaacov, Yaacov; Ben-Yaacov, Boaz, Automatic digital music library builder.
  17. Yu, Julie; Horel, Gerald; Patwari, Jaiteerth; Klein, Michelle; Oliver, Mitchell, Automatic subscription system for applications and services provided to wireless devices.
  18. O'Neil, Douglas R.; Rivera, Jose F.; Thomson, William George, Centralized authentication system.
  19. Wickliffe, Paul, Computer enabled methods and systems for facilitating micropayments via public networks.
  20. Boliek, Martin; Widergren, Robert D.; Hossenlopp, Wayne S., Content distribution systems and methods.
  21. Schnell, Patrik; Strom, Clifford P.; Oney, Adrian J; Beaubien, Mark L.; Dubhashi, Kedarnath A.; Grigorovitch, Alexandre V.; Paka, Anand; Randhawa, Satvir, Content preview.
  22. Ben-Yaacov, Yaacov; Ben-Yaacov, Boaz; Lieberman, Abraham, Content provisioning and revenue disbursement.
  23. Murase, Yasuhiro; Iwatsu, Takeshi; Sakoh, Noriyuki, Content supply system, content supply apparatus and method, content playback apparatus and method, and program.
  24. Runstedler, Christopher; Jain, Rohit; Fahmy, Samer; Hardy, Michael, Data hub server.
  25. Horel, Gerald; Yu, Julie; Truitt, Robert J., Data synchronization interface.
  26. Runstedler, Christopher; Jain, Rohit; Hardy, Michael, Device to-device transfer.
  27. Senoh, Takanori, Digital literary work protection system and digital literary work protection method.
  28. Read, Christopher Jensen, Digital rights management dongle.
  29. Yanase, Tsutomu; Umezawa, Satoru, Electronic musical apparatus, music contents distributing site, music contents processing method, music contents distributing method, music contents processing program, and music contents distributing program.
  30. Murphy, Thomas, Information exchange in wireless servers that bypass external domain servers.
  31. Murphy, Thomas, Information exchange in wireless servers that bypass external domain servers.
  32. Sato, Jun; Watanabe, Keiko; Terauchi, Toru, Information terminal.
  33. Schnell, Patrik; Strom, Clifford P.; Dubhashi, Kedarnath A.; Rosenstein, Daniel; Beaubien, Mark L; McKelvey, Alex; Grigorovitch, Alexandre V.; Paka, Anand; Randhawa, Satvir, Managing digital rights for multiple assets in an envelope.
  34. Wu, Yongjun; Sadhwani, Shyam; Wenker, Samuel J.; Evans, Brian P.; Farag, Hany; Darsa, Lucia, Media decoding control with hardware-protected digital rights management.
  35. Ben-Yaacov, Yaacov; Ben-Yaacov, Boaz; Lieberman, Abraham, Media management and tracking.
  36. Olson, William L.; Ilderem, Vida; Kitson, Frederick L.; Moore, Morris A.; Moroney, Paul; Peterka, Petr; Rzeszewski, Theodore S.; Yacobellis, Robert H., Method and apparatus for enabling digital rights management in file transfers.
  37. Robert, Arnaud; Schonfeld, Robert; Todorovic, Maja; Diner, David; Peng, Shih-Ta (Thomas), Method and system for allocating access to digital media content.
  38. Kim, Te-Hyun; Lee, Seung-Jae, Method and system for digital rights management among apparatuses.
  39. O'Connor, Clint H.; Huber, Gary D.; Clardy, James W.; Haze, Michael, Method and system for late binding of option features associated with a device using at least in part license and unique ID information.
  40. Ben-Yaacov, Yaacov; Ben-Yaacov, Boaz, Method and system for managing rights for digital music.
  41. Schmidt, Andreas; Trauberg, Markus, Method for carrying out the premium-based recommendation of content objects that can be downloaded to a mobile terminal.
  42. Manion, Todd R.; Rao, Ravi T.; Shappell, Michael, Method for efficient content distribution using a peer-to-peer networking infrastructure.
  43. Kim, Jea-Un, Method for processing rights object in digital rights management system and method and system for processing rights object using the same.
  44. Coronel, Jack Bertram; Coronel, Joseph R, Method, system, and device for providing a market for digital goods.
  45. Coronel, Jack Bertram; Coronel, Joseph R, Method, system, and device for providing a market for digital goods.
  46. Rauba, Rimas; Salazar, Gonzalo, Methods, systems and computer products to incentivize high speed internet access.
  47. Huslak, Nicholas S.; McQuaide, Jr., Arnold C.; Carter, Sharon E., Methods, systems and computer program products for proactively offering a network turbo boost service to end users.
  48. Huslak, Nicholas S.; McQuaide, Jr., Arnold C.; Carter, Sharon E., Methods, systems and computer program products for proactively offering a network turbo boost service to end users.
  49. Hill, Timothy A.; McMenamin, Marie; Patrawaia, Zakir; Singh, Mukesh K., Methods, systems, and storage mediums for providing multi-media content storage and management services.
  50. Terauchi, Toru; Sato, Jun; Watanabe, Keiko, Mobile communication terminal.
  51. O'Neil, Douglas R.; Rivera, Jose F., Multiple access internet portal revenue sharing.
  52. O'Neil, Douglas R.; Rivera, Jose F., Multiple access internet portal revenue sharing.
  53. Doganata, Yurdaer N.; Tantawi, Asser N., On-demand information retrieval using wireless communication devices.
  54. Abu-Amara, Hosame H., Piracy prevention in digital rights management systems.
  55. Hinds, Donald W., Policy enforcement in mobile devices.
  56. Ben-Yaacov, Yaacov; Ben-Yaacov, Boaz, Portable music player and transmitter.
  57. Sprigg, Stephen A.; Minear, Brian; Oliver, Mitchell B.; Gardner, III, Richard Wayne, Prepay accounts for applications, services and content for communication devices.
  58. Burns, Eric Lee; Suponau, Dzmitry; Kaplanian, Harry; Girotto, Jay Robert, Previews providing viewable regions for protected electronic documents.
  59. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  60. Sharma, Rajesh Kumar; Lo, Winping; Papa, Joseph, Real time lockdown.
  61. Eisener, Thane; Doucet, Heloise Rose, Remote administration of mobile wireless devices.
  62. Boudreau, Jesse; Yach, David; Murphy, Thomas; Panezic, Alan, Remote control in a wireless communication system.
  63. O'Neil, Douglas R.; Rivera, Jose F., Revenue sharing.
  64. Halasz, David E.; Andrade, Merwyn B., Rogue access point detection.
  65. O'Connor, Clint H.; Huber, Gary D.; Haze, Michael, System and method for handling software activation in entitlement.
  66. O'Connor, Clint H.; Huber, Gary D.; Haze, Michael; Curtis, William A.; Decker, Brian; Molsberry, Frank; Ganesan, Subramanian, System and method for identifying systems and replacing components.
  67. O'Connor, Clint H.; Huber, Gary D.; Haze, Michael; Curtis, William A., System and method for manufacturing and personalizing computing devices.
  68. Azar, Cyrus; Brostoff, George, System and method for providing secure access to an electronic device using facial biometrics.
  69. Minear, Brian; Gardner, III, Richard Wayne; Sprigg, Stephen A.; Nguyen, Phil Tien; Oliver, Mitchell B.; Lekven, Eric J., System and method for providing subscribed applications on wireless devices over a wireless network.
  70. Poltorak, Alexander, System and method for secure relayed communications from an implantable medical device.
  71. Poltorak, Alexander, System and method for secure relayed communications from an implantable medical device.
  72. O'Connor, Clint H.; Huber, Gary D.; Curtis, William A., System and method for separation of software purchase from fulfillment.
  73. Matuchniak, Peter Tadeusz; Bledstein, Bryan; Ware, Walterlance, System and method for tracking a downloaded digital media file.
  74. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  75. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  76. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  77. Stahlberg, Patrick; Shankar, Umesh; Reeder, Robert Wilson; Wen, Tzay-Yeu; Williams, Peter; Bonneau, Joseph, System for associating related digital assets.
  78. Zilka, Kevin J., System, method, and computer program product for using a cellular phone as an interface for a VoIP-equipped computer.
  79. Downes, Stephen; Savoie, Rodrigue, Systems, methods, and apparatus for facilitating client-side digital rights compliance.
  80. Dave, Swapnil R.; Varoglu, Devrim, Transferring assets.
  81. Tsuyama, Fumio; Murata, Noriyuki, Using an information image to perform a predetermined action.
  82. Boudreau, Jesse; Yach, David, Wireless communication system installation.
  83. Boudreau, Jesse; Murphy, Thomas; Clough, Ian; Panezic, Alan; Yach, David; Omar, Salim; Washburn, Mike, Wireless communication systems.
  84. Boudreau, Jesse; Murphy, Thomas; Clough, Ian; Panezic, Alan; Yach, David; Omar, Salim; Washburn, Mike, Wireless communication systems.
  85. Oliver, Mitchell B.; Horel, Gerald Charles; Minear, Brian, Wireless subscriber application and content distribution and differentiated pricing.
  86. Yu, Julie; Oliver, Mitchell B.; Horel, Gerald Charles; Nguyen, Phil Tien; Prast, Sandra L.; Patwari, Jaiteerth, Wireless subscriber billing and distribution.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로