$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure streaming container

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-021/24
출원번호 US-0822124 (2007-07-02)
등록번호 US8001608 (2011-08-03)
발명자 / 주소
  • Venters, III, Carl Vernon
  • Phillips, II, Eugene B.
  • Ornstein, Seth
출원인 / 주소
  • Digital Reg of Texas, LLC
대리인 / 주소
    McGuireWoods LLP
인용정보 피인용 횟수 : 4  인용 특허 : 118

초록

A system and method for securely streaming encrypted digital media content out of a digital container to a user's media player. This streaming occurs after the digital container has been delivered to the user's machine and after the user has been authorized to access the encrypted content. The user'

대표청구항

We claim: 1. A method of providing streaming content, comprising the steps of:creating a digital container that includes contents including streaming media content;selecting one or more modules for inclusion in the digital container, the selection of the modules being based on at least one of a type

이 특허에 인용된 특허 (118)

  1. Anoop Gupta ; David M Bargeron, Accessing annotations across multiple target media streams.
  2. Ji Shuang ; Chen Eva ; Liang Yung-Chang ; Tsai Warren,TWX, Apparatus and method for electronic mail virus detection and elimination.
  3. Houha James A. ; Freedman Gordon J., Apparatus and method for preprocessing computer programs prior to transmission across a network.
  4. Hoyt Daniel M. ; Lee Robin M. ; Lickiss Alan L., Automated contract negotiator/generation system and method.
  5. Kenneth Louis Milsted ; Craig Kindell ; Qing Gong, Automated method and apparatus to package digital content for electronic distribution using the identity of the source content.
  6. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Automated on-line information service and directory, particularly for the world wide web.
  7. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Automated system for management of licensed software.
  8. Dixon Michael D., Bi-directional process-to-process byte stream protocol.
  9. Boris,Ann S.; Rohtbart,Daniel; Murphy,Jeffrey, Computer system for portable digital data capture and data distribution.
  10. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  11. Tsukahara, Daisuke; Akita, Yasutaka; Oka, Susumu; Murakami, Tokumichi; Matsuda, Yukinari, Conditional access system enabling partial viewing.
  12. Walker Jay S. ; Lech Robert R. ; Van Luchene Andrew S. ; Sparico Thomas M. ; Jorasch James A. ; Schneier Bruce, Conditional purchase offer management system for event tickets.
  13. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  14. Hasegawa,Satoshi, Data transmission system for prevention of unauthorized copy of data from recording medium.
  15. Yoshida Hideki,JPX ; Segawa Hideo,JPX ; Imai Toru,JPX, Decryption key management scheme for software distribution system.
  16. Patterson, Patrick E., Delivering electronic content.
  17. Patterson,Patrick E., Delivering electronic content.
  18. Gifford David K., Digital active advertising.
  19. Katz Donald R. ; Lau Edwin J. ; Mott Timothy ; Brenneman Scott A. ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen, Digital information library and delivery system with logic for generating files targeted to the playback device.
  20. Sesma Jimmy L., Digital product execution control.
  21. Grimes,Tom; Mai,Khanh, Digital rights management.
  22. Pankajakshan,Bejoy; Parker,Benjamin J., Digital rights management for multicasting content distribution.
  23. Renaud Benjamin J., Digital signatures for data streams and data archives.
  24. Cho Won-bong,KRX ; Lee Sang-youl,KRX ; Hwang Ho-woong,KRX, E-mail processing method.
  25. Venkatraman Rajamadam C. ; Chern Vincent Min-Hao ; Nanja Sekaran ; Gujarathi Haresh, E-mail program capable of transmitting, opening and presenting a container having digital content using embedded executable software.
  26. Elgamal Taher (Palo Alto CA), Electronic commerce using a secure courier system.
  27. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  28. Smith Jeffrey C. ; Bandini Jean-Christophe, Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof.
  29. Thorne John ; Davis Marie L. ; Strauss Michael J., Electronic mail security.
  30. Yamazaki Nobuhide,JPX, Electronic mail system and electronic mail access acknowledging method.
  31. Kohler Timothy L., Electronic mail with recipient-specific content.
  32. Kazmierczak Gregory J. (Plainsboro NJ) Michener John R. (Neshanic Station NJ) Smith Kathryn M. (Somerville NJ), Encrypted data package record for use in remote transaction metered data system.
  33. Eller Marlin J. ; Mills Brent R., Encryption system with transaction coded decryption key.
  34. Olsen James E. ; Bringhurst Adam L., Fault tolerant electronic licensing system.
  35. Dunbar,Geoffrey T.; Ternasky,Joseph D.; Debique,Kirt A.; Crow,William M., Image file container.
  36. Renaud Benjamin J. ; Pampuch John C. ; Hodges Wilsher Avril E., Implementing digital signatures for data streams and data archives.
  37. Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
  38. Wyman Robert M. (Kirkland WA), Management interface for license management system.
  39. Apte Jitendra, Mechanism for enabling secure electronic transactions on the open internet.
  40. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven cond.
  41. Wang David Shan-Ming ; Hsu P. Robert, Method and apparatus for certified electronic mail messages.
  42. DeMont Jason Paul, Method and apparatus for distributing information products.
  43. Cooper Thomas E. (Louisville CO) Philips Hudson W. (Boulder CO) Pryor Robert F. (Longmont CO), Method and apparatus for enabling trial period use of software products: Method and apparatus for utilizing a decryption.
  44. Maillard Michel,FRX ; Benardeau Christian,FRX ; Dauvois Jean-Luc,FRX, Method and apparatus for encrypted data stream transmission.
  45. Eyer Mark K. (San Diego CA) Shumate Allen (Poway CA), Method and apparatus for impulse purchasing of packaged information services.
  46. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  47. Beecher David A. (Kirkland WA), Method and apparatus for protection of software in an electronic system.
  48. Dureau Vincent Louis ; Girons Regis St.,FRX, Method and apparatus for seamless connectivity of wide-band networks and narrow-band networks.
  49. Davis Owen ; Jain Vidyut, Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource d.
  50. Jeffrey Vinson ; Steig Westerberg ; Jeffrey DeVries, Method and apparatus to allow remotely located computer programs and/or data to be accessed on a local computer in a secure, time-limited manner, with persistent caching.
  51. Mollier Jean (Bougival FRX), Method and device for protecting software delivered to a user by a supplier.
  52. Redpath Richard J., Method and system for efficiently notifying an information copy recipient in an electronic mail system.
  53. Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
  54. Durst ; Jr. Robert T. (212 Shelton Rd. Monroe CT 06468) Hunter Kevin D. (440 Allyndale Dr. Stratford CT 06497), Method and system for preventing unauthorized use of software.
  55. Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
  56. Woo,Je Hak; Lee,Hwan Chul; Cho,Sang Young; Jeong,Seong Ho; Ha,Young Soo; Shin,Seog Kyoon; Kim,Seong Il, Method and system for the information protection of digital content.
  57. Greenstein Bret A., Method for blocking all unwanted e-mail (SPAM) using a header-based password.
  58. Williams Marvin L. (Lewisville TX), Method for confirmation of document recipient in a data processing system.
  59. Wyatt Stuart Alan, Method for defining and verifying user access rights to a computer information.
  60. Spagna, Richard; Milsted, Kenneth Louis; Lybrand, David P.; Downs, Edgar, Method for delivering electronic content from an online store.
  61. Schull Jonathan (Haverford PA), Method for encouraging purchase of executable and non-executable software.
  62. Ruckdashel Glenn A., Method for notifying an individual of a previously scheduled event.
  63. Wolfe Everett W. (Lauderdale Lakes FL), Method of controlling the copying of software.
  64. Venkatraman Rajamadam C. ; Chern Vincent Min-Hao ; Nanja Sekaran ; Gujarathi Haresh, Method of processing an E-mail message that includes a representation of an envelope.
  65. Mages Kenneth G. ; Feng Jie, Method of secure server control of local media via a trigger through a network for instant local access of encrypted da.
  66. Mages Kenneth G. ; Feng Jie ; Mages Kent, Method of securing the playback of a DVD-ROM via triggering data sent via a cable network.
  67. Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT) Elteto Laszlo (Stamford CT) Engel Frederik (Wilton CT), Method of software distribution protection.
  68. Janacek, Robert; Muchhala, Mahesh, Method of transferring data from a sender to a recipient during which a unique account for the recipient is automatically created if the account does not previously exist.
  69. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  70. Earnest Lester D. (Los Altos Hills CA), Modular software security.
  71. Marco M. Hurtado ; George Gregory Gruse ; Edgar Downs ; Kenneth Louis Milsted, Multimedia player for an electronic content delivery system.
  72. Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
  73. Payne Andrew C. ; Stewart Lawrence C. ; Mackie David J., Network sales system.
  74. Montulli Lou, Persistant client state in a hypertext transfer protocol based client-server system.
  75. van Oldenborgh, Marc; Gnirrep, Martijn, Playing media content on a media player while streaming the retrieved parts of the media content to other devices.
  76. Baker, Brian, Process and streaming server for encrypting a data stream.
  77. Brian Baker, Process and streaming server for encrypting a data stream.
  78. van Oldenborgh,Marc; Gnirrep,Martijn, Receiver driven distribution of data using address data of a peer node.
  79. Patrick E. Patterson, Regulating access to digital content.
  80. Manduley Flavio M., Remote activation of software features in a data processing device.
  81. Hicks, Christian Bielefeldt; Creath, Peter Janssen, Remote authorization for unlocking electronic data system and method.
  82. van Oldenborgh,Marc; Gnirrep,Martijn, SYSTEM AND METHOD FOR DISTRIBUTED DATA NETWORK HAVING A DYNAMIC TOPOLOGY OF COMMUNICATING A PLURALITY OF PRODUCTION NODES WITH A PLURALITY OF CONSUMER NODES WITHOUT INTERMEDIATE NODE LOGICALLY POSITI.
  83. McMullan ; Jr. Jay C. (Doraville GA) Burleson David B. (Roswell GA) Borsetti ; Jr. Paul (Alpharetta GA) Filion John T. (Lawrenceville GA), Secure authorization and control method and apparatus for a game delivery service.
  84. Downs, Edgar; Gruse, George Gregory; Hurtado, Marco M.; Medina, Cesar; Milsted, Kenneth Louis, Secure electronic content management system.
  85. Philip R. Wiser ; Andrew R. Cherenson ; Steven T. Ansell ; Susan A. Cannon, Secure online music distribution system.
  86. Wiser, Philip R.; Cherenson, Andrew R.; Ansell, Steven T.; Cannon, Susan A., Secure online music distribution system.
  87. Venters, III,Carl Vernon; Phillips, II,Eugene B.; Ornstein,Seth, Secure streaming container.
  88. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  89. Kirsch Steven T., Secure, convenient and efficient system and method of performing trans-internet purchase transactions.
  90. Blumenthal Michael S. ; Barthel Daniel J. ; Newman Bruce ; Newman Brenda S., Secured electronic information delivery system having a three-tier structure.
  91. Phillips, II,Eugene B.; Ornstein,Seth, Securing digital content system and method.
  92. Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a key recovery agent.
  93. Kikinis Dan, Simulcast WEB page delivery using a 3D user interface system.
  94. Chernow Fred (360 Kiowa Pl. Boulder CO 80303) Peterson Randy J. (1330 Arapahoe St. Boulder CO 80302), Software distribution system.
  95. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  96. Donald Thomas C. (2651 Rillwood Rd. Birmingham AL 35243) Donald Henry W. (428 Lakewood Dr. Homewood AL 35209), Software protection system.
  97. Moore Steven Jerome, Software security system using remove function to restrict unauthorized duplicating and installation of an application program.
  98. Nielsen Jakob, Subscribed update monitors.
  99. Dolphin Janet L. (Milpitas CA), System and method for access control for portable data storage media.
  100. Dolphin Janet L. (Milpitas CA), System and method for access data control.
  101. Rusnak David J. ; Zientara John T., System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet.
  102. Powell Ken R., System and method for distributing coupons through a system of computer networks.
  103. Erickson John S., System and method for managing copyrighted electronic media.
  104. Rose John R., System and method for managing try-and-buy usage of application programs.
  105. Uchida Wataru,JPX ; Nozaki Tsutomu,JPX, System for broadcasting electronic mails that separately stores and sends a portion of electronic mails with an access code for filtering and retrieving purpose.
  106. McCarty Johnnie C. (2304 Wright Cir. Round Rock TX 78664), System for computer software protection.
  107. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  108. Barber Jon H. (Santa Barbara CA) Woodward Ronald A. (Boulder CO) Burkley Richard M. (Boulder CO) Rehme Erwin L. (Longmont CO) Jackson Matthew W. (Boulder CO) Young Douglas M. (Boulder CO), System for controlling the number of concurrent copies of a program in a network based on the number of available licens.
  109. Freeny ; Jr. Charles C. (Fort Worth TX), System for reproducing information in material objects at a point of sale location.
  110. Kleiman Ruben,MXX, System for selectively distributing music to a plurality of jukeboxes.
  111. Richardson ; III Frederic B. (Brookvale AUX), System for software registration.
  112. Ohmura Kazunori,JPX, System for tracking information copied from a web page and sent via electronic mail.
  113. Michener John R. (Princeton NJ) Samit Benjamin (Princeton NJ), System method and apparatus for authenticating an encrypted signal.
  114. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  115. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  116. Patterson, Patrick E., Tracking electronic component.
  117. Patterson, Patrick E., Tracking electronic content.
  118. Igura Toshinori (Shizuoka JPX) Fukuda Masaru (Shizuoka JPX), Waterproofness checking jig for a waterproof connector.

이 특허를 인용한 특허 (4)

  1. Soroushian, Kourosh; Priyadarshi, Shaiwal; Braness, Jason; Osborne, Roland; Frantz, William; Vashisht-Rota, Jerome; Salmonsen, Daniel; Funnell, John; Floyd, Michael, Chunk header incorporating binary flags and correlated variable-length fields.
  2. Soroushian, Kourosh; Priyadarshi, Shaiwal; Braness, Jason; Osborne, Roland; Frantz, William; Vashisht-Rota, Jerome; Salmonsen, Daniel; Funnell, John; Floyd, Michael, Chunk header incorporating binary flags and correlated variable-length fields.
  3. Belenky, Yaacov, Privacy-aware content protection system.
  4. Milstein, Lee, System and method for playing content on certified devices.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트