$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Systems and methods for preventing unauthorized use of digital content

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • H04K-001/00
  • G06F-012/00
출원번호 UP-0960610 (2001-09-21)
등록번호 US-7565697 (2009-07-29)
발명자 / 주소
  • LeVine, Richard B.
  • Lee, Andrew R.
  • Howard, Daniel G.
  • Hart, III, John J.
출원인 / 주소
  • ECD Systems, Inc.
대리인 / 주소
    Mills & Onello LLP
인용정보 피인용 횟수 : 7  인용 특허 : 183

초록

Theft, distribution, and piracy of digital content (software, video, audio, e-books, any content of any kind that is digitally stored and distributed) is generally accomplished by copying it, if possible, or, if it is protected from being copied in any fashion, such piracy is based upon a number of

대표청구항

We claim: 1. A method for preventing unauthorized use of digital content data comprising: subdividing the digital content data into data segments; modifying the data segments with second data to generate modified data, wherein modifying the data segments comprises interleaving the data segments wit

이 특허에 인용된 특허 (183)

  1. David M. Mooney ; Paul J. Kimlinger ; James Virgil Bradley, Access control/crypto system.
  2. Beetcher Robert Carl ; Corrigan Michael Joseph ; Reardon ; Jr. Francis Joseph ; Moran James William, Apparatus and method for controlling access to software.
  3. Campbell Randall B., Apparatus and method for remotely executing commands using distributed computing environment remote procedure calls.
  4. Ciacelli Mark Louis ; Urda John William ; Lam Wai Man ; Kouloheris Jack Lawrence ; Fetkovich John Edward, Apparatus, method and computer program product for protecting copyright data within a computer system.
  5. Ohta Kazuo (Fujisawa JPX) Okamoto Tatsuaki (Yokosuka JPX), Authentication system and apparatus therefor.
  6. Deo Vinay ; Seidensticker Robert B. ; Simon Daniel R., Authentication system and method for smart card transactions.
  7. Paulson John W. (Edina MN) Dunn Mark E. (Apple Valley MN) Heidorn Allen J. (Minnetonka MN), Automated accompaniment apparatus and method.
  8. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Automated system for management of licensed software.
  9. Park Seong-Kab,KRX, Automatic software updating method.
  10. Wiedemer John D. (Houston TX), Billing system for computing software.
  11. Spelman Jeffrey F. (Duvall WA) Thomlinson Matthew W. (Bellvue WA), Blind encryption.
  12. Brandenburg Barbara B., Broadcast software distribution.
  13. Ronning Joel A., Central database system for automatic software program sales.
  14. Atkinson Robert G. ; Price Robert M. ; Contorer Aaron M., Code certification for network transmission.
  15. Schupak Donald (Schupak Group ; 730 Fifth Ave. ; Suite 1901 New York NY 10019), Computer controlled audio-visual system.
  16. Baena-Arnaiz Marco T. ; Church Benjamin T. ; Kirchoff Michael J. ; Seshadri Harish, Computer implemented method and a computer system for enforcing software licenses.
  17. Drake Christopher Nathan,AUX, Computer software authentication, protection, and security system.
  18. Plum Thomas (Kamuela HI), Computer software licensing authentication method and apparatus.
  19. Joshi Bhagirath S. (11 Sheffield Rd. Waltham MA 02154), Computer software security system.
  20. Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
  21. Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
  22. Shimura, Satoshi; Saida, Yoshinori, Content supply apparatus for transmitting the content to a portable terminal in transmitted divided units and prefetching other contents from the transmitted divided units.
  23. Sollish,Baruch; Brody,Moshe, Copy protected DVD and method for producing and validating same.
  24. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Crypto microprocessor for executing enciphered programs.
  25. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  26. Best Robert M. (16016 Ninth Ave. Northeast Seattle WA 98155), Cryptographic decoder for computer programs.
  27. Pond Eugene W. (Garland TX) Rush Jeffrey R. (Richardson TX) Watson John D. (Carrollton TX) Woodall Bruce A. (Plano TX) Goode Walter M. (Dallas TX) Goode George E. (Richardson TX), Cryptographic labeling of electronically stored data.
  28. Greenberg Harold (630 W. 246 St. ; Apt. 1134 Bronx NY 10471), Cryptographic system and method.
  29. Dudle James (Homewood IL) Leatherman Michael (Tinley Park IL) Morrison Michael (Highland Park IL) Schnell Waldo (Prospect Heights IL), Custom product estimating and order processing system.
  30. Allen LindaMay P. (Rochester MN) Elshaug Ronald G. (Rochester MN) Harney Carrie L. (Rochester MN) Lemmon Wayne L. (Rochester MN) Miller Irwin (Rochester MN) Miller Irving L. (Pine Island MN) Murray G, Customized instruction generator.
  31. Saito Makoto,JPX ; Okazaki Shoichi,JPX, Data copyright management system.
  32. Kobayashi Seiji,JPX ; Koide Akio,JPX ; Morimoto Norishige,JPX ; Shimizu Shuichi,JPX, Data hiding method and data extraction method using statistical examination.
  33. Hartrick Thomas V. (Gaithersburg MD) Stevens Jeffrey N. (Gaithersburg MD) Sabia Nicholas J. (Silver Spring MD), Data processing system and method to enforce payment of royalties when copying softcopy books.
  34. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  35. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  36. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  37. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  38. Bates Cary Lee ; Day Paul Reuben, Debug watch mechanism and method for debugging a computer program.
  39. Grube Gary W. (Palatine IL) Markison Timothy W. (Hoffman Estates IL), Detection of unauthorized use of software applications in communication units.
  40. Lumley Robert M. (Lawrence Township ; Mercer County NJ), Digital computer having code conversion apparatus for an encrypted program.
  41. Tatebayashi, Makoto; Nakamura, Yutaka; Harada, Shunji; Kozuka, Masayuki, Digital content protection system.
  42. Neville Eugene A. ; Sesma Jimmy L., Digital product execution control and security.
  43. England Paul ; DeTreville John D. ; Lampson Butler W., Digital rights management operating system.
  44. Kutaragi, Ken; Kawai, Eiji; Miura, Kazuo, Disk recording medium, reproduction device and method for performing reproduction on disk recording medium.
  45. Jonathan Clark, Distributed execution software license server.
  46. Bains Jeffrey E. (Madison AL) Case Willard W. (Madison AL), Distributed license administration system using a local policy server to communicate with a license server and control e.
  47. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  48. Hasebe Takayuki (Kawasaki JPX) Akiyama Ryota (Kawasaki JPX) Yoshioka Makoto (Kawasaki JPX), Electronic data protection system.
  49. Johnson Woodrow W. ; Atkins Christine J. ; Yoh Jon, Electronic rights management and authorization system.
  50. Kazmierczak Gregory J. (Plainsboro NJ) Michener John R. (Neshanic Station NJ) Smith Kathryn M. (Somerville NJ), Encrypted data package record for use in remote transaction metered data system.
  51. Torii Naoya (Kawasaki JPX) Hasebe Takayuki (Kawasaki JPX) Akiyama Ryota (Kawasaki JPX), Encryption communication system.
  52. Platteter Dale T. (Fairport NY) Westfall Robert S. (Rochester NY) Carter Jeff C. (Fairport NY), Execution protection for floppy disks.
  53. Olsen James E. ; Bringhurst Adam L., Fault tolerant electronic licensing system.
  54. Tetsu Kimura JP, File management apparatus and method, and recording medium including same.
  55. Comerford Liam D. (Carmel NY) White Steve R. (Mt. Kisco NY), Hardware key-on-disk system for copy-protecting magnetic storage media.
  56. Horiike, Norikazu, Image processing apparatus and method, and storage medium storing program codes realizing such method.
  57. Torii Naoya (Kawasaki MD JPX) Newman ; Jr. David B. (La Plata MD), Key distribution protocol for file transfer in the local area network.
  58. Christiano Matt (Saratoga CA), License management system for software applications.
  59. Griswold Gary N., Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a.
  60. England Paul ; DeTreville John D. ; Lampson Butler W., Loading and identifying a digital rights management operating system.
  61. Walters Kenn D. (Vaterstetten DEX), Memory card.
  62. Guillou Louis C. (Rennes FRX) Quisquater Jean-Jacques (Brussels BEX), Method and apparatus for authenticating accreditations and for authenticating and signing messages.
  63. Heath Chester A. (Boca Raton FL) Langgood John K. (Boca Raton FL) Valli Ronald E. (Pittsburgh PA), Method and apparatus for automatic initialization of pluggable option cards.
  64. Fletcher Rick ; Lin Pei-Chen, Method and apparatus for automatically updating software components on end systems over a network.
  65. Ross Cliff D. (Pleasant Grove UT) Taylor Neil W. (Springville UT) Kingdon Kevin W. (Orem UT) Davis Howard R. (Salem UT) Major Drew (Orem UT), Method and apparatus for electronic licensing.
  66. Cooper Thomas Edward ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-d.
  67. Cooper Thomas Edward ; Phillips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption.
  68. Garst Blaine ; Serlet Bertrand, Method and apparatus for enforcing software licenses.
  69. Helbig ; Sr. Walter A, Method and apparatus for enhancing computer system security.
  70. Kocher Paul C. ; Jaffe Joshua M. ; Jun Benjamin C., Method and apparatus for preventing piracy of digital content.
  71. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  72. Logan Andrew J. (Gladwyne PA), Method and apparatus for protecting software.
  73. Beecher David A. (Kirkland WA), Method and apparatus for protection of software in an electronic system.
  74. Arnold, William C.; Chess, David M.; Morar, John F.; Segal, Alla; Swimmer, Morton G.; Whalley, Ian N.; White, Steve R., Method and apparatus for replicating and analyzing worm programs.
  75. Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Method and apparatus for retrieving secure information from mass storage media.
  76. Nagel Robert (New York NY) Lipscomb Thomas H. (New York NY), Method and apparatus for retrieving selected information from a secure information source.
  77. Brandt Marcia Lynn ; Destefano George Francis ; Fosdick Eric Leonard ; Mehta Ramila Alexandra ; Prokop Teresa McConville ; Stamschror Kevin Patrick, Method and apparatus for software license management.
  78. Cohen Aaron Michael, Method and apparatus for software licensing electronically distributed programs.
  79. Davis Owen ; Jain Vidyut, Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource d.
  80. Kirouac Donald L. (Thornhill CAX) Porrett William A. (Unionville CAX) Czerwinski Marek J. (Scarborough CAX), Method and apparatus for updating software at remote locations.
  81. Hsu Jerry,TWX ; Shen Sidney,TWX, Method and apparatus to protect computer software.
  82. Hennige Hartmut (23 Packman Lane ; Home Green Kirk Ella Hull HU10 7TH N. Humberside GB3), Method and device for simplifying the use of a plurality of credit cards, or the like.
  83. Herzberg Amir (Bronx NY) Jarecki Stanislaw M. (Cambridge MA) Krawczyk Hugo M. (Riverdale NY) Yung Marcel M. (New York NY), Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret s.
  84. Horadan Peter H. ; Candell Eric M., Method and system for creating and searching directories on a server.
  85. Wyman Robert M., Method and system for managing execution of licensed programs.
  86. Weidong, Kou, Method and system for managing keys for encrypted data.
  87. Durst ; Jr. Robert T. (212 Shelton Rd. Monroe CT 06468) Hunter Kevin D. (440 Allyndale Dr. Stratford CT 06497), Method and system for preventing unauthorized use of software.
  88. Dwork Cynthia ; Halpern Joseph Y. ; Lotspiech Jeffrey Bruce, Method and system for protection of digital information.
  89. Dwork Cynthia ; Halpern Joseph Y. ; Lotspiech Jeffrey Bruce, Method and system for protection of digital information.
  90. Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
  91. Wolf Timothy J. (Raleigh NC), Method and system for software asset usage detection and management.
  92. Fisher Arvin J. (Rochester MN) Hlava Alan (Longmont CO) Koeller Paul D. (Rochester MN) Manges Mary C. (Rochester MN) Russell Michael K. (Rochester MN) Satin Robert H. (Rochester MN) Stewart Gordon G., Method for automated complex multilevel softward installation in a data processing system.
  93. Wyatt Stuart Alan, Method for defining and verifying user access rights to a computer information.
  94. Grube Gary W. (Palatine IL) Markison Timothy W. (Hoffman Estates IL), Method for detecting unauthorized modification of a communication or broadcast unit.
  95. Fraser Robert E., Method for dynamically wrapping files for downloading.
  96. Schull Jonathan (Haverford PA), Method for encouraging purchase of executable and non-executable software.
  97. Singh Jitendra K. (San Jose CA), Method for locking software files to a specific storage device.
  98. Mason Donald ; Criswell Christopher A., Method for negotiating software compatibility.
  99. Larsson Jeffrey E. ; Richardson Alan ; Steckler Paul A., Method for preventing software piracy during installation from a read only storage medium.
  100. Lipscomb Thomas H. (New York NY) Nagel Robert H. (New York NY), Method for retrieving secure information from a database.
  101. Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
  102. Hill Charles E., Method for updating a remote computer.
  103. Miyaji Atsuko (Kawachinagano JPX), Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication.
  104. Singh Jitendra K. (6361 Almaden Rd. San Jose CA 95120), Method of preventng software piracy by uniquely identifying the specific magnetic storage device the software is stored.
  105. Miyaji Atsuko (Kawachinagano JPX) Tatebayashi Makoto (Takarazuka JPX), Method of privacy communication using elliptic curves.
  106. Chou Wayne W. (25 Hauley Pl. Ridgefield CT 06877) Erett Richard (278 Russet Rd. Stamford CT 06903) Kulinets Joseph M. (Stamford CT), Method of protecting computer software from unauthorized execution using multiple keys.
  107. Choudhury Abhijit K. (Scotch Plains NJ) Maxemchuk Nicholas F. (Mountainside NJ) Paul Sanjoy (Scotch Plains NJ) Schulzrinne Henning G. (Sterling NJ), Method of protecting electronically published materials using cryptographic protocols.
  108. Platt Stephen M. (Ft. Collins CO), Method of remotely installing software directly from a central computer.
  109. Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT) Elteto Laszlo (Stamford CT) Engel Frederik (Wilton CT), Method of software distribution protection.
  110. Mattson ; Jr. James S. ; Shah Lacky V. ; Buzbee William B. ; Benitez Manuel E., Method, apparatus, and product for dynamic software code translation system.
  111. Labaton Isaac (Haifa AZ ILX) Kelly Michael K. (Phoenix AZ), Methods and apparatus for data encryption and transmission.
  112. Liu Cheng-Chung (Warren NJ) Lo Daniel S. (Warren NJ) Nazif Zaher A. (High Bridge NJ) Wu Fu-Lin (East Brunswick NJ) Zobre Donald W. (South Somerville NJ), Methods and apparatus for software retrofitting.
  113. Marx Philipp Wilhelm,DEX, Module for the protection of software.
  114. Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
  115. Milne Steven H. ; Tindell James Michael ; Tobias ; II John C. ; Dilts Michael R. ; Edelman Bradley Alan ; Denman Matthew, Object-oriented framework for creating multimedia applications.
  116. Asai Toshinori,JPX, Program operating apparatus.
  117. Casto ; Walter V. ; DeLong ; Lawrence W. ; Markley ; Theodore J. ; Stru ger ; Odo J., Program protection module for programmable controller.
  118. Yamagishi Toru (Tokyo JPX), Protection against unauthorized use of software recorded on recording medium.
  119. Sandberg-Diment Erik, Providing verification information for a transaction.
  120. Scholz Stephan (Munich DEX) Becker Wolfgang (Munich DEX) Doellinger Carl-Heinz (Germering DEX) Wollensak Martin (Munich DEX), Real time control system and method for replacing software in a controlled system.
  121. Jensen Craig Charles ; Staffer Andrew C., Real-time apparatus and method for minimizing disk fragmentation in a computer system.
  122. Horstmann Cay S., Relicensing of electronically purchased software.
  123. Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
  124. Choo, Tse Huong, Robust encryption and decryption of packetized data transferred across communications networks.
  125. Davis Derek L. (Phoenix AZ), Roving software license for a hardware agent.
  126. Wahbe Robert S. ; Lucco Steven E. ; Fraser Christopher W. ; Morrison Vance Palmer, Safe general purpose virtual machine computing system.
  127. McMullan ; Jr. Jay C. (Doraville GA) Burleson David B. (Roswell GA) Borsetti ; Jr. Paul (Alpharetta GA) Filion John T. (Lawrenceville GA), Secure authorization and control method and apparatus for a game delivery service.
  128. Floyd Michel ; Horstmann Cay S., Secure electronic software packaging using setup-external unlocking module.
  129. Marshall Alan D. (Merchants Landing GB2) Mitchell Christopher J. (Codford GB2) Proudler Graeme J. (Meade Park GB2), Secure messaging systems.
  130. Grimonprez Georges (Villeneuve d\Asq FRX) Paradinas Pierre (Villeneuve d\Asq FRX), Secured method for loading a plurality of applications into a microprocessor memory card.
  131. Ronning Joel A., Self-launching encrypted digital information distribution system.
  132. Ronning Joel A., Self-launching encrypted try before you buy software distribution system.
  133. Brett Bevin R. (Merrimack NH), Smart recompilation of performing matchup/difference after code generation.
  134. Mandelbaum Richard (Manalapan NJ) Sherman Stephen A. (Hackettstown NJ) Wetherington Diane R. (Bernardsville NJ), Smartcard adapted for a plurality of service providers and for remote installation of same.
  135. Pearce David B. ; Hughes Aidan, Software anti-piracy system that adapts to hardware upgrades.
  136. Richard Bean ; Young Harvill, Software authorization system and method.
  137. Nakagawa Toru,JPX ; Takada Yuji,JPX, Software distribution and maintenance system and method.
  138. Chernow Fred (360 Kiowa Pl. Boulder CO 80303) Peterson Randy J. (1330 Arapahoe St. Boulder CO 80302), Software distribution system.
  139. Michel Alan D. (Fishers IN) Reinke Robert E. (Indianapolis IN), Software pay per use system.
  140. Hill Charles E., Software piracy detection system.
  141. Hsu Jerry,TWX, Software protection apparatus and the method of protection utilizing read-write memory means having inconsistent input a.
  142. Pickholtz Andrew (Fairfax VA), Software protection method and apparatus.
  143. Noguchi Sunao,JPX, Software rental method and apparatus, and circulating medium therefor.
  144. Kobus ; Jr. Paul (Phoenix AZ), Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes f.
  145. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  146. Hasebe Takayuki (Kawasaki JPX) Akiyama Ryota (Kawasaki JPX) Yoshioka Makoto (Kawasaki JPX), Storage medium for preventing an illegal use by a third party.
  147. Hasebe Takayuki,JPX ; Akiyama Ryota,JPX ; Yoshioka Makoto,JPX, Storage medium for preventing an irregular use by a third party.
  148. Adams Carlisle M. (Ottawa CAX), Symmetric cryptographic system for data encryption.
  149. Medveczky Geza (5395 Greenrich Rd. Castro Valley CA 94552) Lunsford Kelvin (36156 Bayonne Dr. Newark CA 94560) ..UC: 380/4 380/25 380/49 340/82534, System and apparatus for protecting computer software.
  150. Wallace David R., System and method for cloaking software.
  151. Tajalli Homayoon (Ellicott City MD) Badger Mark L. (Rockville MD) Dalva David I. (Rockville MD) Walker Stephen T. (Glenwood MD), System and method for controlling the use of a computer.
  152. Holmes Keith (Dublin IEX) Cunningham Connel G. (Dublin IEX) Gleeson Fiona (Dublin IEX), System and method for installing software and updating configuration files.
  153. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for key escrow encryption.
  154. Rose John R., System and method for managing try-and-buy usage of application programs.
  155. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  156. Nilsson Rickard (Stockholm SEX) Markstrm Ulf (Stockholm SEX) Klfver Leif (lvsj SEX), System for changing software during computer operation.
  157. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  158. Kittirutsunetorn Kitti (957 Durlane Ct. Sunnyvale CA 94087), System for protection of software in memory against unauthorized use.
  159. Collins ; III Theodore Joseph ; Anderson Scott Roy ; McDowall Steven J. ; Kratsch Charles Henry ; Larson Joseph Paul, System for software distribution in a digital computer network.
  160. Richardson ; III Frederic B. (Brookvale AUX), System for software registration.
  161. Whiting Douglas L. (Carlsbad CA), System for transparently compressing data files in a computer system.
  162. Michener John R. (Princeton NJ) Samit Benjamin (Princeton NJ), System method and apparatus for authenticating an encrypted signal.
  163. Molnar Charles E. (471 Toft La. Webster Groves MO 63119) Backus Alan L. (1550 Centinela Ave. ; No. 210 Los Angeles CA 90025), System to demonstrate and sell computer programs.
  164. Edwards ; Jr. Gordon L. (Easley SC), System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of prote.
  165. McIchionc, Daniel Joseph, System, method and computer program product for process-based selection of virus detection actions.
  166. Edwards, Jonathan L.; White, Edmund H., System, method and computer program product for selecting virus detection actions based on a process by which files are being accessed.
  167. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  168. LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
  169. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  170. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  171. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  172. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  173. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  174. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  175. Nardone Joseph M. ; Mangold Richard T. ; Pfotenhauer Jody L. ; Shippy Keith L. ; Aucsmith David W. ; Maliszewski Richard L. ; Graunke Gary L., Tamper resistant methods and apparatus.
  176. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  177. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  178. Archie Kent C. (Warrenville IL) Fonorow Owen R. (Plainfield IL) McGould Mary C. (Wheaton IL) McLear ; III Robert E. (Warrenville IL) Read Edward C. (Bolingbrook IL) Schaefer ; III Edwin M. (North Aur, Test automation system.
  179. Pickett Thomas E., Transaction security method and apparatus.
  180. Stringer John W. (Santa Cruz CA) Richards Theodore S. (Los Gatos CA), Transformation of ephemeral material.
  181. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  182. Ronning Joel A., Try before you buy software distribution and marketing system.
  183. Granger Mark J. ; Smith Cyrus E. ; Hoffman Matthew I., Use of pseudocode to protect software from unauthorized use.

이 특허를 인용한 특허 (7)

  1. Ito, Satoshi; Aisu, Hideyuki; Kamibayashi, Tooru; Akiyama, Koichiro; Hamada, Shinichiro, Apparatus and method for digital content editing.
  2. Aisu, Hideyuki; Ito, Satoshi, Apparatus and method for playback of digital content.
  3. Repasi, Rolf; Clausen, Simon, Determination of malicious entities.
  4. Asipov, Keren; Asipov, Boris, Method for preventing software reverse engineering, unauthorized modification, and runtime data interception.
  5. Asipov, Keren; Asipov, Boris, Method for preventing software reverse engineering, unauthorized modification, and runtime data interception.
  6. Valenzuela, Edgardo; Chen, Eddie J.; DeMartini, Thomas; Fung, Joseph Zhung Yee; Nguyen, Mai; Tieu, Vincent Hsiang; Tran, Duc, Systems and methods for creating, manipulating and processing rights and contract expressions using tokenized templates.
  7. LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트