$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for content protection in a secure content delivery system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04N-007/16
출원번호 UP-0889811 (2004-07-13)
등록번호 US-7690039 (2010-04-23)
발명자 / 주소
  • Schmeidler, Yonah
  • Atkins, Derek
  • Eichin, Mark W.
  • Rostcheck, David J.
출원인 / 주소
  • Softricity, Inc.
대리인 / 주소
    Woodcock Washburn LLP
인용정보 피인용 횟수 : 24  인용 특허 : 163

초록

A system for secure delivery of on-demand content over broadband access networks utilizes a pair of servers and security mechanisms to prevent client processes from accessing and executing content without authorization. A plurality of encrypted titles are stored on a content server coupled to the ne

대표청구항

What is claimed is: 1. A server apparatus connectable to one or more requestor processes and at least one a source of titles over a computer network comprising: a processor; a memory coupled to the processor; a network interface coupled to the memory and processor; conversion logic responsive to a

이 특허에 인용된 특허 (163)

  1. Hoang Thao M., Adaptive interface controller that can operate with segments of different protocol and transmission rates in a single integrated device.
  2. Alegre Alfred A. ; Sha Rong Q. ; Soley William R., Apparatus and method for providing trusted network security.
  3. Belove Edward (Cambridge MA) Johnson R. Patrick (Manchester MA) Leland ; III O. Stevens (Hudson MA) Mendez Deborah (Malden MA) Zagieboylo Stephen (Norfolk MA), Apparatus using circuit manager to associate a single circuit with each host application where the circuit is shared by.
  4. Hind John Raithel ; Lindquist David Bruce ; Nanavati Pratik Biharilal ; Tan Yih-Shin ; Wesley Ajamu Akinwunmi, Applet redirection for controlled access to non-orginating hosts.
  5. Goldsteen David S. ; Bachinski Thomas J. ; Sullivan Daniel J., Artificial medical graft with a releasable retainer.
  6. Tsou, I-Wen; Araki, Hirokatsu; Hirao, Tsuyoshi; Takahashi, Tadashi; Kido, Toshiharu, Automatic tracking system and method for distributable software.
  7. Cheng William ; Hwang Kenneth ; Kannan Ravi ; Katchapalayam Babu ; Liu Bing ; Narasimhan Balaji ; Ramanujam Gopal ; Tran Jonathan, Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer.
  8. Schmidt, Rene W.; Muller, Hans E.; Violet, Scott R., Browser-independent and automatic apparatus and method for receiving, installing and launching applications from a browser on a client computer.
  9. Chung Pi-Yu ; Huang Yennun ; Lin Chih-Mei ; Wang Yi-Min, Client-side parallel requests for network services using group name association.
  10. Drewry Raymond G. ; George David ; Epperson Dirk, Client/server system with methods for prefetching and managing semantic objects based on object-based prefetch primitive.
  11. Darago Vincent S. ; Jenkins Christopher, Computer architecture for managing courseware in a shared use operating environment.
  12. Hoyle, Martin David, Computer interface method and apparatus with portable network organization system and targeted advertising.
  13. Drake Christopher Nathan,AUX, Computer software authentication, protection, and security system.
  14. Amstein Peter R. ; Blumer Thomas P. ; Coburn ; IV Arthur L. ; Forgaard Randy J. ; Schulert Andrew J. ; Stefanik Ted ; Mauceri Robert J., Computer system and computer-implemented process for creation and maintenance of online services.
  15. Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
  16. Abecassis Max (19020 NE. 20 Ave. Miami FL 33179), Content-on-demand interactive video method and apparatus.
  17. Li Bobby ; Chen Eva, Controlled distribution of application programs in a computer network.
  18. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  19. Dillon Douglas M., Deferred billing, broadcast, electronic document distribution system and method.
  20. Okamoto, Ryuichi; Kozuka, Masayuki; Minami, Masataka; Inoue, Mitsuhiro, Digital data distribution system.
  21. Harter John L. ; Lection David Bruce, Distributed application launcher for optimizing desktops based on client characteristics information.
  22. Barker Kent D., Distributed control interface for managing the interoperability and concurrency of agents and resources in a real-time e.
  23. Susaki Seiichi,JPX ; Umezawa Katsuyuki,JPX ; Kaji Tadashi,JPX ; Tezuka Satoru,JPX ; Sasaki Ryoichi,JPX ; Tabata Kuniaki,JPX ; Akaosugi Takashi,JPX ; Kito Akira,JPX, Distributed object system and service supply method therein.
  24. Fairchild Steven E., Dynamic proxy server.
  25. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  26. Robert G. Atkinson ; James W. Kelly, Jr. ; Bryan W. Tuttle ; Robert M. Price ; Robert P. Reichel, Embedding certifications in executable files for network transmission.
  27. Eller Marlin J. ; Mills Brent R., Encryption system with transaction coded decryption key.
  28. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Firewall system for protecting network elements connected to a public network.
  29. Jones Clay LaMoyne, Foreign file system establishing method which uses a native file system virtual device driver.
  30. Leighton F. Thomson ; Lewin Daniel M., Global hosting system.
  31. Bailey, Jay Patrick; Copley, Brian J.; Freitas, Mark J., High performance communications interface.
  32. Morimoto Osamu,JPX, Hyper text reading system.
  33. Meisner, Gregory P.; Pinkerton, Frederick E.; Meyer, Martin S.; Balogh, Michael P.; Kundrat, Matthew D., Imide/amide hydrogen storage materials and methods.
  34. Moezzi Saied ; Katkere Arun ; Jain Ramesh, Immersive video, including video hypermosaicing to generate from multiple video views of a scene a three-dimensional v.
  35. Uenoyama Tsutomo,JPX ; Ohno Toshiichi,JPX ; Kato Masao,JPX ; Inagaki Akira,JPX, Information management apparatus providing efficient management of multimedia titles in a client-server network.
  36. Boucher Laurence B. ; Blightman Stephen E. J. ; Craft Peter K. ; Higgen David A. ; Philbrick Clive M. ; Starr Daryl D., Intelligent network interface system method for protocol processing.
  37. Christiano Matt (Saratoga CA), License management system for software applications.
  38. Dale Geoffrey W. ; Swenson Eric J. ; Skok Michael J. ; Stave Matthew ; Boehm Jeffrey S. ; Poonen Sanjay J., Mechanism for automatically establishing connections between executable components of a hypertext-based application.
  39. Cragun Brian John ; Rothschild Wayne Jay, Mechanism for retrieving information using data encoded on an object.
  40. Sambamurthy Namakkal S. ; Tripathi Devendra K. ; Deb Alak K. ; Truong Linh Tien ; Kumar Praveen D., Media access control receiver and network management system.
  41. Akio Kido JP; Reiji Todani JP, Method and apparatus for accessing an object, and storage medium storing a program for controlling access to an object.
  42. Pashupathy Anand ; Korn Rodney A., Method and apparatus for automating a software delivery system by locating, downloading, installing, and upgrading of viewer software.
  43. Pistriotto Joseph C. ; Montinola Katrina, Method and apparatus for configuring a client to redirect requests to a caching proxy server based on a category ID with the request.
  44. Jones Adrian,GBX ; Moore Alan,GBX, Method and apparatus for content processing and routing.
  45. Schmeidler, Yonah; Atkins, Derek; Eichin, Mark W.; Rostcheck, David J., Method and apparatus for content protection in a secure content delivery system.
  46. Gai,Silvano; McCloghrie,Keith, Method and apparatus for defining and implementing high-level quality of service policies in computer networks.
  47. Cooper Thomas Edward ; Philips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing an encryptio.
  48. Yonah Schmeidler ; Derek Atkins ; Mark W. Eichin ; David J. Rostcheck, Method and apparatus for installation abstraction in a secure content delivery system.
  49. Mark A. Fox ; Peter F. King ; Seetharaman Ramasubramani, Method and apparatus for maintaining security in a push server.
  50. Bittinger Reed Richard ; Housel ; III Barron Cornelius ; Lindquist David Bruce ; Munson Jonathan Paul, Method and apparatus for optimal rebasing of web page transmission using a plurality of different rebasing tests and a Cost-Effectiveness determination.
  51. Tomas Stephen P. ; Joshi Sunil P., Method and apparatus for refreshing file locks to minimize conflicting accesses to data files.
  52. Colosso Juan Carlos, Method and apparatus for regulating the use of licensed products.
  53. Laursen Andrew ; Olkin Jeffrey C. ; Porter Mark A. ; Nazem Farzad ; Bailey William ; Moore Mark, Method and apparatus for scalable, high bandwidth storage retrieval and transportation of multimedia data on a network.
  54. Schmeidler,Yonah; Atkins,Derek; Eichin,Mark W.; Rostcheck,David J., Method and apparatus for secure content delivery over broadband access networks.
  55. Colvin David S., Method and apparatus for securing software to reduce unauthorized use.
  56. Lambert Mark L. ; van der Rijn Daniel J. G. ; Kemper David J. ; Verkler Jay L., Method and apparatus for storing and delivering documents on the internet.
  57. Alexander ; III William Preston ; Berry Robert Francis ; Mulvey Donald L. ; Urquhart Robert John, Method and apparatus for structured profiling of data processing systems and applications.
  58. Ariel Cohen ; Sampath Rangarajan ; Navjot Singh, Method and apparatus for transparently directing requests for web objects to proxy caches.
  59. Mages Kenneth G. ; Feng Jie, Method and apparatus of secure server control of local media via a trigger through a network for instant local access o.
  60. Jeffrey Vinson ; Steig Westerberg ; Jeffrey DeVries, Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching.
  61. Larose Gordon Edward,CAX ; Allan David Ian,CAX, Method and system for networked installation of uniquely customized, authenticable, and traceable software application.
  62. Breslau Franklin Charles ; Greenstein Paul Gregory ; Rodell John Ted, Method and system for on-demand software distribution.
  63. Rodger D. Erickson ; Ronald D. Sanders, Method and system for providing a persistent HTTP tunnel.
  64. Boyle Stephen S. ; Fox Mark A. ; Ramasubramani Seetharaman ; Schwartz Bruce V. ; Martin ; Jr. Bruce K. ; King Peter F. ; Liao Hanqing, Method and system for pushing and pulling data using wideband and narrowband transport systems.
  65. Greschler,David M.; Mysliwy,Owen; Schaefer,Stuart, Method and system for serving software applications to client computers.
  66. Herzberg Amir ; Krawczyk Hugo Mario ; Kutten Shay ; Le An Van ; Matyas Stephen Michael ; Yung Marcel Mordechay, Method and system for the secured distribution of multimedia titles.
  67. Jia Zheng ; Shen Ji, Method and system of dynamic transformation of encrypted material.
  68. Nuttall Fran.cedilla.ois-Xavier,FRX, Method for computer network operation providing basis for usage fees.
  69. Dean Jeffrey ; Eustace Robert A. ; Hicks James E. ; Waldspurger Carl A. ; Weihl William E., Method for estimating execution rates of program execution paths.
  70. Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
  71. Greschler,David M.; Schaefer,Stuart, Method for serving third party software applications from servers to client computers.
  72. Van Hoff Arthur ; Payne Jonathan ; Shaio Sami, Method for the distribution of code and data updates.
  73. Igawa,Masaru; Takiyasu,Yoshihiro, Method of and an apparatus for controlling a web server, a web server control program, and a storage medium on which the web server control program is stored.
  74. Gifford David K., Method of providing internet pages by mapping telephone number provided by client to URL and returning the same in a red.
  75. Altschuler Steven J. ; Ridgeway Greg, Methods and apparatus for using resource transition probability models for pre-fetching resources.
  76. Cox David E. ; Hayes ; Jr. Kent F. ; Kaminsky David L. ; Lindquist David B., Methods, systems and computer program products for management of configurable application programs on a network.
  77. Polcyn Michael J., Monitoring and directing flow of HTML documents for security and access.
  78. Zhao Yan, Multi-level category dynamic bundling for content distribution.
  79. McDonald John Maurice,CAX ; Hillson Andrew Raines,CAX ; Fielding Bruce Allen,CAX ; Judd James Marshall ; Isgro Nick,CAX ; Jansen Bernard Gerald,CAX, Multimedia public communication services distribution method and apparatus with distribution of configuration files.
  80. Jewett Douglas E. (Austin TX), Multiprocessor system with each processor executing the same instruction sequence and hierarchical memory providing on d.
  81. Hendricks John S. (Potomac MD) Bonner Alfred E. (Bethesda MD), Network controller for cable television delivery systems.
  82. Tzelnic Percy ; Vahalia Uresh K, Network file server maintaining local caches of file directory information in data mover computers.
  83. Tzelnic Percy ; Vahalia Uresh K ; Ting Dennis P.J. ; Gupta Uday, Network file server using a cached disk array storing a network file directory including file locking information and da.
  84. Kalajan Kevin E., Network message redirection.
  85. Inniss Hadyn A. ; Welch Robert P., Network redirection for the enhancement of server capacities.
  86. Kothary Piyush, Network switch providing per virtual channel queuing for segmentation and reassembly.
  87. Collberg, Christian Sven; Thomborson, Clark David; Low, Douglas Wai Kok, Obfuscation techniques for enhancing software security.
  88. Glover, John J., One-time pad Encryption key Distribution.
  89. Moughanni Claude (Austin TX) Haddad Elie I. (Austin TX) Lakamsani Rama K. (Austin TX), Page address translation cache replacement algorithm with improved testability.
  90. Eshel Marc ; Kienzle Martin Gerhard ; McNabb Daniel Lloyd ; Rose Raymond Edward ; Schmuck Frank Bernhard, Phantom files for dynamic read bandwidth measurements of computer disks.
  91. Katsunori Kurose JP; Masahiro Anno JP; Chikara Tsutsui JP; Minoru Nakamura JP; Hiroyuki Fukuda JP, Production method of toner.
  92. Wolfe Robert L. ; Pinals Jeffrey, Programmed music on demand from the internet.
  93. Cone Kevin A., Proxy terminal for network controlling of power managed user terminals in suspend mode.
  94. Baugher Mark J. ; Dhesikan Subha ; Patki Ema Y., Proxy-based reservation of network resources.
  95. Butman Ronald A. ; Ramachandran Raja ; Burns Thomas A. ; Malone Thomas J. ; Kmiec Michael D. ; Dougherty Joseph C., Publication network control system using domain and client side communications resource locator lists for managing infor.
  96. Erickson Alan K., Remote computer management system.
  97. Matsuzawa Shigeru,JPX ; Takiyasu Yoshihiro,JPX, Retrieval method and system of multimedia database.
  98. Teresa Win ; Emilio Belmonte, Role-based navigation of information resources.
  99. Holmes Lyndon S. ; King ; III James, Secure electronic publishing system.
  100. Cianfrocca Francis ; Sohn Adam H., Secure middleware and server control system for querying through a network firewall.
  101. Philip R. Wiser ; Andrew R. Cherenson ; Steven T. Ansell ; Susan A. Cannon, Secure online music distribution system.
  102. Ananda Mohan (15910 Ventura Blvd. ; Suite 800 Eucino CA 91436), Secure software rental system using distributed software.
  103. Shavit Nir N., Secure software system and related techniques.
  104. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  105. Van Der Meer Joannes Jozef Everardus,NLX, Securely accessing a file system of a remote server computer.
  106. Hooper Donald F. (Shrewsbury MA) Goldman Matthew S. (Marlborough MA) Bixby Peter C. (Westborough MA) Krishnamoorthy Suban (Shrewsbury MA), Segmented video on demand system.
  107. Toyouchi Junichi,JPX ; Mori Kinji,JPX ; Kawano Katsumi,JPX ; Honda Yoshinori,JPX ; Hirasawa Shigeki,JPX, Service providing system for providing services suitable to an end user request based on characteristics of a request, attributes of a service and operating conditions of a processor.
  108. Morley John E., Software emulation system with reduced memory requirements.
  109. Moore Steven Jerome, Software security system using remove function to restrict unauthorized duplicating and installation of an application program.
  110. Stern, Thomas A, System and method for automated annotation of files.
  111. Hudetz Frank C. ; Hudetz Peter R., System and method for automatic access of a remote computer over a network.
  112. Franklin D. Chase ; Remington Darren B. ; Saliba Bassam ; Speelpenning Bert ; Cockrill Michael, System and method for conducting commerce over a distributed network.
  113. Rusnak David J. ; Zientara John T., System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet.
  114. Saksena Gagan, System and method for creating pathfiles for use to predict patterns of web surfaces.
  115. Steven W Rogers ; George M. Gill ; Jean de Belleuille ; Michael J. Kling, III ; Michael L. Baird, System and method for distributed computer automotive service equipment.
  116. Coile Brantley W. ; Howes Richard A. ; Kersey Edward C., System and method for implementing multiple IP addresses on multiple ports.
  117. Grate Thomas A. ; Saliba Bassam A., System and method for making function calls from a web browser to a local application.
  118. Erickson John S., System and method for managing copyrighted electronic media.
  119. Atkin Steven Edward ; Borgendale Kenneth Wayne ; Howard John D, System and method for managing multiple cultural profiles in an information handling system.
  120. Rose John R., System and method for managing try-and-buy usage of application programs.
  121. Oren Joseph Eugene ; Schumann Robert W. ; Walko Lisa S. ; McQueen Kevin S., System and method for movie transaction processing.
  122. Liu James C., System and method for on-line multimedia access.
  123. Saboff Michael L., System and method for on-line replacement of software.
  124. Brian Kenner ; Kenneth W. Colby ; Lonnie J. Brownell ; Guy P. Weathersby, System and method for selection and retrieval of diverse types of video data on a computer network.
  125. Kenner Brian ; Colby Kenneth W. ; Mudry Robert N., System and method for server-side optimization of data delivery on a distributed computer network.
  126. Kells Timothy Roger ; Peebles Thomas Frank, System and method for supporting distributed computing mechanisms in a local area network server environment.
  127. Lynn Erich Peterson ; Mack Edward Phelps ; Gary Roy Shippy ; John Douglas Wright, System and method for transferring information over a computer network.
  128. Viswanathan Srinivasan ; Nazari Siamak ; Swaroop Anil ; Khalidi Yousef, System and method for transparent, global access to physical devices on a computer cluster.
  129. Dunn James M. ; Ganek Alan G. ; Stern Edith H. ; Willner Barry E., System and method of operation for providing user's security on-demand over insecure networks.
  130. Pitts William Michael, System for accessing distributed data cache at each network node to pass requests and data.
  131. Nakashima Kazuo,JPX ; Nakahara Masaru,JPX ; Itami Satoshi,JPX ; Utsumi Kenichi,JPX, System for decrypting encrypted software.
  132. Slik David,CAX ; Byrne Shannon,CAX, System for distributing digital information.
  133. Krishnamoorthy Suban ; Faccenda Ronald A., System for downloading computer software programs.
  134. Byrne,Shannon; Muecke,Innes; Patterson,Andrew; Slik,David, System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software.
  135. Marlin James Warden ; Knudson Raymond Lowell ; Ruehle Thomas Michael ; Stuart Anthony Franke ; Hughes ; III Edward Thomas, System for extending the desktop management interface at one node to a network by using pseudo management interface, ps.
  136. de Hond Maurice,NLX, System for generating graphics in response to a database search.
  137. Dan Asit ; Tetzlaff William H. ; Sitaram Dinkar, System for providing custom functionality to client systems by redirecting of messages through a user configurable filt.
  138. Fishler Leonard R. ; Zargham Bahman, System for transferring a data stream to a requestor without copying data segments to each one of multiple data source/s.
  139. Goetz Tom ; Sridhar Manickam R. ; Prasad Mukesh, System, device, and method for streaming a multimedia file.
  140. Clifford Heath AU; Graeme Port AU; Steven Klos ; Graeme Greenhill, Systems and methods for automatic application version upgrading and maintenance.
  141. Croman,Joe D.; Anderson,Christopher N.; Rees,Robert; Silverman,Seth; Sered,Yishai; Eichin,Mark W., Systems and methods for delivering content over a computer network.
  142. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server.
  143. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server.
  144. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server at an internet site.
  145. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to server at an internet site.
  146. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  147. White John Gregg, Systems, methods and computer program products for sharing state information between a stateless server and a stateful client.
  148. Laurence B. Boucher ; Stephen E. J. Blightman ; Peter K. Craft ; David A. Higgen ; Clive M. Philbrick ; Daryl D. Starr, TCP/IP offload network interface device.
  149. Chiles Anthony A. ; Chiles David C. ; Manbeck ; Jr. Jackie Lee ; Nguyen Vu Hoanh, Technique for automatically updating software stored on a client computer in a networked client-server environment.
  150. Probert, Thomas, Techniques for encoding information in computer code.
  151. Greer Paul E. ; Pashupathy Anand, URL bookmark update notification of page content or location changes.
  152. Granger, Mark J.; Smith, Cyrus E.; Hoffman, Matthew I., Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications.
  153. Granger Mark J. ; Smith Cyrus E. ; Hoffman Matthew I., Use of pseudocode to protect software from unauthorized use.
  154. Sampat Ketan (Portland OR) Kembel John (Lake Oswego OR), User interface, method, and apparatus selecting and playing channels having video, audio, and/or text streams.
  155. Fuller, Michael J.; Graham, John J., Video and audio streaming for multiple users.
  156. Hiroshi Nojima JP, Video information retrieval method and apparatus.
  157. Garfinkle Norton (2800 S. Ocean Blvd. Boca Raton FL 33432), Video on demand.
  158. Hooper Donald F. (Shrewsbury MA) Goldman Matthew S. (Marlborough MA) Bixby Peter C. (Westborough MA) Krishnamoorthy Suban (Shrewsbury MA), Video on demand with memory accessing and or like functions.
  159. Roger Anthony Sayle, Virtual network file server.
  160. Stringer John W. (Santa Cruz CA), Virtualized installation of material.
  161. Judson David H. (6823 Northport Dallas TX 75230), Web browser with dynamic display of information objects during linking.
  162. DeBettencourt Jason ; Lara Marco ; Yamane Stanley ; Abbott Freeland, Web service.
  163. Judson David Hugh, World wide web browsing with content delivery over an idle connection and interstitial content display.

이 특허를 인용한 특허 (24)

  1. Reierson, Kristofer Hellick; Anderson, Angela Mele, Application execution in a restricted application execution environment.
  2. Reierson, Kristofer Hellick; Anderson, Angela Mele, Application execution in a restricted application execution environment.
  3. Reierson, Kristofer Hellick; Anderson, Angela Mele, Application execution in a restricted application execution environment.
  4. Kohli, Aseem; Reierson, Kristofer Hellick; Anderson, Angela Mele, Converting desktop applications to web applications.
  5. Williams, Wayne D.; Swindell, Michael L.; Pitts, James B., Creating a software product from a software application.
  6. Fiducci, Thomas E., Data backup and transfer system, method and computer program product.
  7. Rogers, Jr., Cleon L.; Logan, Glen T., Method of identifying and protecting the integrity of a set of source data.
  8. Nicolson, Kenneth Alexander; Asai, Rieko; Sato, Taichi; Matsushima, Hideki, Obfuscation assisting apparatus.
  9. Mefford, Jr., Cread Wellington; Babey, Matthew Christopher; Chardon, Alvin; Stearns, Scott Elliot; Anderson, Adam Brady; de Souza, Lidiane Pereira; Anderson, Angela Mele, Policy-based access to virtualized applications.
  10. Young, Matthew David; Reierson, Kristofer Hellick; Jewart, Eric, Predicting, diagnosing, and recovering from application failures based on resource access patterns.
  11. Young, Matthew David; Reierson, Kristofer Hellick; Jewart, Eric, Predicting, diagnosing, and recovering from application failures based on resource access patterns.
  12. Chardon, Alvin; Reierson, Kristofer Hellick; Anderson, Angela Mele; Hunt, Galen Clyde; Burger, Douglas Christopher; Pai, Dilip Krishna, Providing a persona-based application experience.
  13. Chardon, Alvin; Reierson, Kristofer Hellick; Anderson, Angela Mele; Hunt, Galen Clyde; Burger, Douglas Christopher; Pai, Dilip Krishna, Providing a persona-based application experience.
  14. Reierson, Kristofer Hellick; de Souza, Lidiane Pereira; Anderson, Angela Mele, Providing a security boundary.
  15. Babey, Matthew Christopher; Jewart, Eric; Reierson, Kristofer Hellick; Anderson, Angela Mele, Satisfying application dependencies.
  16. Babey, Matthew Christopher; Jewart, Eric; Reierson, Kristofer Hellick; Anderson, Angela Mele, Satisfying application dependencies.
  17. Knox, Christopher R.; Law, William; Devanneaux, Thomas; Brookins, Nicholas Shayne; Olugbile, Akinwale Olugbemiga, Security framework for HTTP streaming architecture.
  18. Greschler, David M.; Schaefer, Stuart, Serving software applications from servers to client computers.
  19. Kekeh, Charles; Kohli, Aseem; Stearns, Scott Elliot; Reierson, Kristofer Hellick; Mefford, Cread Wellington; Anderson, Angela Mele, Storing and resuming application runtime state.
  20. Kekeh, Charles; Kohli, Aseem; Stearns, Scott Elliot; Reierson, Kristofer Hellick; Mefford, Cread Wellington; Anderson, Angela Mele, Storing and resuming application runtime state.
  21. Kekeh, Charles; Kohli, Aseem; Stearns, Scott Elliot; Reierson, Kristofer Hellick; Mefford, Jr., Cread Wellington; Anderson, Angela Mele, Storing and resuming application runtime state.
  22. Mendonca, Pat; Pruett, Jonathan C., System and method for providing centralized management and distribution of information to remote users.
  23. Mendonca, Pat; Pruett, Jonathan C., System and method for providing centralized management and distribution of information to remote users.
  24. Jennings, Chuck; Bate, Donald, System and method for routing media.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로