$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Special PC mode entered upon detection of undesired state

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-021/00
출원번호 US-0152214 (2005-06-14)
등록번호 US-8176564 (2012-05-08)
발명자 / 주소
  • Frank, Alexander
  • Steeb, Curt A.
  • Ahdout, Isaac P.
  • Duffus, James S.
  • Hall, Martin
  • Temple, Nicholas
  • Venkatachalam, Rajagopal
  • Phillips, Thomas
  • Xu, Zhangwei
출원인 / 주소
  • Microsoft Corporation
인용정보 피인용 횟수 : 7  인용 특허 : 189

초록

A system and method for monitoring a computer, particularly a pay-per-use computer, uses an isolated computing environment or supervisor. The isolated computing environment boots prior to any boot device associated with an operating system, runs concurrently with the operating system and monitors an

대표청구항

1. A computing device, comprising: a first memory device storing an operating system of the computing device;a tamper resistant memory device that is separate from the first memory device, the tamper resistant memory device storing a supervisory program;a processor coupled to both the first memory d

이 특허에 인용된 특허 (189)

  1. Outram John D. (Taylor\s Lane Bosham ; Chichester W. Sussex GB2 P018 8QQ) Outram Richard G. (Clarence Street Darmouth Devon GB2 TQ6 9NW), Adaptive data logger.
  2. Blair,Paul; Hansen,Kurt L.; Seifert,Dean, Airline ticket payment and reservation system and methods.
  3. Mansell,David Hennah; Nonweiler,Michael Robert; Middleton,Peter Guy, Apparatus and method for controlling access to a memory.
  4. Huddleston Paul M. (Stone Mountain GA) Porter ; Jr. G. Burns (Doraville GA) Rooney David T. (Marietta GA), Apparatus and method for monitoring an energy management system.
  5. Chou Wayne W. ; Elteto Laszlo ; Kulinets Joseph M. ; LaRussa Joseph, Apparatus and method for preventing theft of computer devices.
  6. Robert J. Gray, Apparatus and method for providing and authentication system.
  7. Arnold Todd Weston, Apparatus and method for secure distribution of data.
  8. James L. Howard, Jr. ; Pennington J. Hess ; James A. MacStravic, Apparatus and methods for managing key material in heterogeneous cryptographic assets.
  9. Anselm Anthony C., Apparatus for affixing a strain wire into the wiring of flexible electric conduit.
  10. Lem Paulus M. (Wilnis NLX), Apparatus for monitoring the replay of audio/video information carriers.
  11. Robert D. Cassagnol ; Douglas M. Dillon ; David S. Kloper ; Sandra J. Weber ; Brandon E. Bautz, Apparatus for providing a secure processing environment.
  12. Takeda Masaru (Saitama JPX), Apparatus for transferring information between different window systems.
  13. Lacombe,John; Galloway,Jeffery L.; Majni,Tim, Application-level software watchdog timer.
  14. Hofsss Michael (Vaihingen/Enz DEX) Nitschke Werner (Ditzingen DEX) Schweren Harald (Korntal-Mnchingen DEX) Angerbauer Margit (Stuttgart DEX), Arrangement for testing a watchdog circuit.
  15. Parsons,Donald; Edwards,Judith; McCoy,Donald; Block,James, Automated banking machine component authentication system and method.
  16. Harris,Walter; Zajkowski,Timothy, Automated banking machine key loading system and method.
  17. Lockwood Lawrence B., Automatic business and financial transaction processing system.
  18. Frank, Alexander, Binding a device to a computer.
  19. Arai Yoshinori,JPX ; Suzuki Masakazu,JPX, CT scanning apparatus.
  20. Jankowitz Charles M. ; Matula Valentine C. ; Munson Gary A. ; Wu Fang, Call handling method for credit and fraud management.
  21. Ahdout, Isaac; Hall, Martin H.; Xu, Zhangwei, Changing product behavior in accordance with license.
  22. Hartman ; Jr. Robert C. (Woodside CA), Client/server based secure timekeeping system.
  23. Norskog, Allen C., Combined pointing device and bar code scanner.
  24. Farris Robert D. ; McDermott Christine D., Common channel signaling event detection and control.
  25. Proudler,Graeme John; Chan,David, Communications between modules of a computing apparatus.
  26. Venners Howard W. (Indianapolis IN) Beyers Jr. Billy W. (Greenfield IN) Hailey James E. (Indianapolis IN), Component audio/video system with timed control of plural peripheral devices.
  27. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  28. Pearson,Siani Lynne; Chan,David, Computer platforms and their methods of operation.
  29. Angelo, Michael F.; Wisecup, George David; Collins, David L., Computer system having security features for authenticating different components.
  30. Griffin,Jonathan, Computer system operable to revert to a trusted state.
  31. Challener,David Carroll; Goodman,Steven Dale; Reinberg,Kevin Michael; Springfield,Randall Scott; Ward,James Peter, Computer system with selectively available immutable boot block code.
  32. Yasuhiro Ishibashi JP, Computer system, and video decoder used in the system.
  33. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  34. Auerbach,Alan B.; Murphy,Shawn M.; Smith,Walter R, Configurable collection of computer related metric data.
  35. Okamoto,Ryuichi; Tokuda,Katsumi; Miura,Kouji, Content usage management system and server used in the system.
  36. Thomas Schmidt DE; Karl-Heinz Knobl DE, Control circuit for a microcontroller.
  37. Cromer, Daryl Carvis; Freeman, Joseph Wayne; Goodman, Steven Dale; Kern, Eric Richard; Springfield, Randall Scott, Data processing system and method for password protecting a boot device.
  38. Horning Randall (Longmont CO), Data protection system using different levels of reserve power to maintain data in volatile memories for any period of t.
  39. Frank,Alexander; Phillips,Thomas G.; Reilly,George V., Delicate metering of computer usage.
  40. Cutter, Jr.,Benjamin Brooks; Strom,Clifford Paul; Evans,Brian Patrick; Jain,Amit; Siu,Michael Yui Kwan, Device certificate self-individualization.
  41. Garg, Rahul; Mittal, Parul Alok; Modani, Natwar, Differential rewards with dynamic user profiling.
  42. England Paul ; DeTreville John D. ; Lampson Butler W., Digital rights management operating system.
  43. Hsu, Jay; Zadrozny, Stanley, Digital wireless telephone system for downloading software to a digital telephone using wireless data link protocol.
  44. Anderson David B. ; Gaertner Mark A. ; Forehand Monty A. ; Norman ; Jr. Robert W., Disc storage system having a non-volatile cache to store write data in the event of a power failure.
  45. Lasker Jeffrey M. (Marlboro MA) McGillis James M. (Franklin MA), Disk controller with volatile and non-volatile cache memories.
  46. Germer Warren R. (Dover NH) Balch Richard A. (Rochester NH), Electric meter with electronic rolling demand register.
  47. Dvorkis Paul (Stony Brook NY) Thomas Ralph (East Patchogve NY) Goren David (Ronkonkoma NY) Fuller Robert (Pataskala OH) Goldner Leonard H. (Cold Spring Harbor NY), Electronic stylus type optical reader.
  48. Campbell William C. (Longmont CO) Blair Barry O. (Lafayette CO), Electronic system with variable threshold power failure signaling.
  49. Lieblich,Jason; Norman,Dustin, End user risk management.
  50. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Enforcement architecture and method for digital rights management.
  51. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  52. Wade Jack (La Jolla CA) Szaroletta William K. (Des Moines IA) Madden Thomas R. (San Diego CA), Enhanced security system for computing devices.
  53. Smith Sean William ; Weingart Steve Harris, Establishing and employing the provable untampered state of a device.
  54. Yang,Ming Hsuan, Face recognition using kernel fisherfaces.
  55. Lebizay Gerald (Vence NY FRX) Lien Yeong-Chang (Briarcliff Manor NY) Taso Michael M. (Yorktown Heights NY), Fault tolerant switch with selectable operating modes.
  56. Storey Thomas W., Fully integrated, on-line interactive frequency and award redemption program.
  57. Renton Paul (14926 20th SW. Seattle WA 98166), Hard drive security system.
  58. Zimmer,Vincent J.; Bulusu,Mallik, Hardened extended firmware interface framework.
  59. Circenis, Edgar, Hardware based utilization metering.
  60. Bird Richard M. (Woodland Hills CA) Byrd Houston F. (Lewisville TX), Identification system for broadcast program segments.
  61. Adan Manolito E. ; Lipscomb Terry M., Image sensing operator input device.
  62. Manolito E. Adan ; Terry M. Lipscomb, Image sensing operator input device.
  63. Chateau,Alain; Azema,Jerome; Haidamous,Constantin, Indirect data protection using random key encryption.
  64. Philyaw, Jeffry Jovan, Input device having positional and scanning capabilities.
  65. Smola, Michael; Wegertseder, Dominik, Integrated circuit.
  66. Casto, James John; Qureshi, Qadeer Ahmad; Boothby, Hugh William, Integrated circuit package incorporating programmable elements.
  67. Crawford Christopher M., Internet online backup system provides remote storage for customers using IDs and passwords which were interactively est.
  68. Adams Phillip M. (Parowan UT) Holmstron Larry W. (Salt Lake City UT) Jacob Steve A. (South Weber UT) Powell Steven H. (Ogden UT) Condie Robert F. (Tuscon AZ) Culley Martin L. (Tuscon AZ), Kernels, description tables, and device drivers.
  69. Christiano Matt (Saratoga CA), License management system for software applications.
  70. England Paul ; DeTreville John D. ; Lampson Butler W., Loading and identifying a digital rights management operating system.
  71. Brehmer Gerald M. (Allen Park MI) Hill John P. (Westland MI), Low cost/low current watchdog circuit for microprocessor.
  72. Frank,Alexander; Light,Mark C.; Hall,Martin H., Maintaining and managing metering data for a subsidized computer.
  73. Cutter,Benjamin Brooks; Evans,Brian P.; Strom,Clifford P.; Parks,Michael Jay, Metering accessing of content and the like in a content protection system or the like.
  74. Hinckley, Kenneth P.; Sinclair, Michael J.; Szeliski, Richard S.; Conway, Matthew J.; Hanson, Erik J., Method and apparatus for computer input using six degrees of freedom.
  75. Breeden Robert L. (Boynton Beach FL) Muppidi Prabhakar (Boynton Beach FL), Method and apparatus for controlling access to a communication system.
  76. Kramer, Gerald Arthur; Whitlow, Eric Scott, Method and apparatus for encouraging timely payments associated with a computer system.
  77. Kubala,Jeffrey P.; Nick,Jeffrey M.; Yocom,Peter B., Method and apparatus for enforcing capacity limitations in a logically partitioned system.
  78. Garst Blaine ; Serlet Bertrand, Method and apparatus for enforcing software licenses.
  79. Helbig ; Sr. Walter A, Method and apparatus for enhancing computer system security.
  80. Chang Sheue-Ling ; Gosling James, Method and apparatus for enhancing software security and distributing software.
  81. Knutson James Irwin, Method and apparatus for licensing computer programs using a DSA signature.
  82. Land, David MacLeod; Getgood, Alan Bruce, Method and apparatus for managing credit inquiries within account receivables.
  83. Shin, Kum-Ho, Method and apparatus for maximizing an advertising effect using a control unit to detect if advertisement is being displayed and suspending a function if advertisement is not displayed.
  84. Frank, Alexander; Duffus, James, Method and apparatus for measuring presentation data exposure.
  85. Setala,Henri, Method and apparatus for medical X-radiography.
  86. Eskelinen,Jaakko Joonas, Method and apparatus for performing single-point projection imaging.
  87. Anthony J. Wasilewski ; Douglas F. Woodhead ; Gary Lee Logston, Method and apparatus for providing conditional access in connection-oriented interactive networks with a multiplicity of service providers.
  88. Frank, Alexander; Steeb, Curt; Duffus, James; Light, Mark C.; Holladay, Martin; Sutton, Paul; Phillips, Thomas; Xu, Zeyong; Xu, Zhangwei, Method and apparatus for provisioning software.
  89. Archibald William Charles ; Spielman Terence Paul ; Spielman Jason, Method and apparatus that accounts for usage of digital applications.
  90. Ortlieb, Thomas E.; Read, Walter, Method and system for adaptive sampling testing of assemblies.
  91. Pasieka, Michael S., Method and system for consumer electronic device certificate management.
  92. Johnson,Douglas Karl; Levine,Lewis J., Method and system for improved correction of registration error in a fluoroscopic image.
  93. Nicholson,Clark D.; Westerinen,William J., Method and system for improved reliability in storage devices.
  94. Wyman Robert M., Method and system for managing execution of licensed programs.
  95. Brice ; Jr. Frank W. ; Hefferon Eugene P. ; Scalzi Casper A. ; Tarcza Richard P., Method and system for providing a hardware machine function in a protected virtual machine.
  96. da Silva Luis A., Method for determining a source of failure during a file system access.
  97. Markl Katrin,DEX ; Freytag Claus,DEX ; Gunther Stephan,DEX ; Kubatzki Ralf,DEX ; Thiel Wolfgang,DEX, Method for entering data into a scale.
  98. Bobich, Thomas; Brachet, Carl-Manuel; Gray, Robert; Hinman, John, Method for minimizing financial risk for wireless services.
  99. Davis Derek L. (Phoenix AZ), Method for providing a roving software license from one node to another node.
  100. Martin Seysen DE, Method for secure distribution of data.
  101. Christie,David S.; Strongin,Geoffrey S.; McGrath,Kevin J., Method for selectively disabling interrupts on a secure execution mode-capable processor.
  102. Cognigni,Giorgio; Presciutti,Alessio, Method of controlling use of digitally encoded products.
  103. Merriman Dwight Allen ; O'Connor Kevin Joseph, Method of delivery, targeting, and measuring advertising over networks.
  104. Abrams, Peter C.; Bharadhwaj, Rajeev; Nathan, Swami; Rodriguez, Robert; Martyn, Craig W., Method system and apparatus for providing pay-per-use distributed computing resources.
  105. Baldev Krishan ; Leo Chien Chang ; Ronald G. Lambert, Methods and apparatus for delivering targeted information and advertising over the internet.
  106. Yacobi,Yacov; England,Paul; Yuval,Gideon A., Methods and apparatus for protecting information content.
  107. James O'Toole ; M. Frans Kaashoek, Methods and apparatus for remote configuration of an appliance on a network.
  108. Wilt,Nicholas P.; Nene,Sameer A.; Beda, III,Joseph S., Methods and system for managing computational resources of a coprocessor in a computing system.
  109. Shinzaki, Takashi, Mobile electronic apparatus having function of verifying a user by biometrics information.
  110. Sporer Michael ; Kline Mark H. ; Zawojski Peter, Motion video processing circuit for capture playback and manipulation of digital motion video information on a computer.
  111. Siu,Michael Yiu Kwan; Strom,Clifford Paul; Evans,Brian Patrick, Multi-level nested open hashed data stores.
  112. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Multi-site software license balancing.
  113. Woest Karen L. (Wauwatosa WI) Stark James K. (Wauwatosa WI) Rasmussen David E. (Wales WI), Network control system with improved reliability.
  114. Conte Brian ; Hui Christine ; Key Roger, Network license compliance apparatus and method.
  115. Ergan, Cenk; Nicholson, Clark D.; Teodosiu, Dan; DeWhitt, Dean L.; Hill, Emily Nicole; Kodavalla, Hanumantha R.; Zwilling, Michael J.; Parchem, John M.; Fortin, Michael R.; Obr, Nathan Steven; Nagar, Rajeev Y.; Verma, Surenda; Powell, Therron; Westerinen, William J.; Zbikowski, Mark Joseph; Stemen, Patrick L., Non-volatile memory cache performance improvement.
  116. Peterson Gregory W. (Lyons CO) Kurzawa Leonard J. (Broomfield CO), Non-volatile memory storage and bilevel index structure for fast retrieval of modified records of a disk track.
  117. Bourne,Steven; Malik,Prashant; Krishnaswamy,Vinay; Shobe, Jr.,James B.; Venkatesh,Chandramouli; Narin,Attila, Obtaining a signed rights label (SRL) for digital content and obtaining a digital license corresponding to the content based on the SRL in a digital rights management system.
  118. Lovelace John V. ; Nevis Bryon S., Operating system bootstrap security mechanism.
  119. Aas, Eric; Nuttall, Gordon R., Optical imaging device with speed variable illumination.
  120. Chu William W. Y., Password protected modular computer method and device.
  121. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  122. Phillips,Thomas G; Schoppa,Christopher A; Westerinen,William J; Myers,Mark A, Portable computing environment.
  123. Phillips, Thomas G; Schoppa, Christopher A; Westerinen, William J; Myers, Mark A, Portable computing environment solution.
  124. Ung, Dara; Titus, Mark, Prepaid real-time web based reporting.
  125. Buchheit,Marcellus; Winzenried,Oliver, Procedure for the protection of computer software and/or computer-readable data as well as protective equipment.
  126. Zurko, Mary Ellen; Casey, Jr., Thomas Andrew; Gasser, Morrie; Hall, Judith Shelhorse; Kahn, Clifford Earl; Mason, Andrew Halstead; Sawyer, Paul Douglas; Kendall, Leslie Richard; Lipner, Steven B., Processing trusted commands in trusted and untrusted environments.
  127. Goodman,Steven Dale; Hoff,James Patrick; Springfield,Randall Scott; Ward,James Peter, Proving BIOS trust in a TCPA compliant system.
  128. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.
  129. Hicks, Christian Bielefeldt; Creath, Peter Janssen, Remote authorization for unlocking electronic data system and method.
  130. Jean-Marc Frailong ; Charles A. Price ; Joseph John Tardo, Remote reconfiguration of a secure network interface.
  131. Phillips, Thomas G; Schoppa, Christopher A; Westerinen, William J; Myers, Mark A, Remote services for portable computing environment.
  132. Schneier Bruce ; Walker Jay ; Jorasch James, Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic an.
  133. Evans, Brian P.; Strom, Clifford P.; Parks, Michael Jay, Rendering digital content in a content protection system according to a plurality of chained digital licenses.
  134. Davis Derek L. (Phoenix AZ), Roving software license for a hardware agent.
  135. Knee Derek L. ; Davis Bradley K., Scanning mouse for a computer system.
  136. Davis Derek L., Secure BIOS.
  137. Arbaugh William A. ; Farber David J. ; Keromytis Angelos D. ; Smith Jonathan M., Secure and reliable bootstrap architecture.
  138. Komarla,Eshwari P.; Zimmer,Vincent J., Secure booting and provisioning.
  139. Nordenstam, Jan Olof; Hansson, Allan, Secure distribution and protection of encryption key information.
  140. Underwood, Roy Aaron, Secure gateway interconnection in an e-commerce based environment.
  141. Holtey Thomas O. (Newton MA), Secure memory card with programmed controlled security access control.
  142. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure network file access control system.
  143. Folmsbee, Alan, Secure program execution using instruction buffer interdependencies.
  144. Robert L. Geiger ; Jyh-Han Lin ; Rajiv Mehta, Secure wireless electronic-commerce system with wireless network domain.
  145. Phillips, Thomas G; Schoppa, Christopher A; Westerinen, William J; Myers, Mark A, Security features for portable computing environment.
  146. Jensenworth Gregory ; Garg Praerit ; Swift Michael M. ; Goertzel Mario C. ; Chan Shannon J., Security model using restricted tokens.
  147. Medvinsky, Alexander; Sprunk, Eric J., Self-generation of certificates using secure microprocessor in a device for transferring digital information.
  148. Davis John E. (Reseda CA), Shadow memory system for storing variable backup blocks in consecutive time periods.
  149. Frison Michael R. ; Kirchberger Bela L., Software pay per use licensing system.
  150. Iguchi,Shinya; Tsunehiro,Takashi; Tsunoda,Motoyasu; Ishihara,Haruji; Mizushima,Nagamasa; Totsuka,Takashi, Storage device including a non-volatile memory.
  151. Doherty, Robert J.; Tierney, Peter L.; Arnaoutoglou-Andreou, Marios, System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files.
  152. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  153. Kusumoto, Laura Lee; Sacerdoti, Earl David; Sigler, Leila Janine; Sigler, Sonya Lee, System and method for consumer-selected advertising and branding in interactive media.
  154. Sutton, II,James A.; Grawrock,David W., System and method for execution of a secured environment initialization instruction.
  155. Watanabe, Ryoji; Fung, Henry T.; Schwartz, Paul D., System and method for installing and servicing an operating system in a computer or information appliance.
  156. Strunk, David D.; Kephart, Aaron D.; Liseski, Steven J.; Fields, Robin M., System and method for interactive advertising.
  157. Bolle, Rudolf Maarten; Connell, Jonathan Hudson; Ratha, Nalini K., System and method for liveness authentication using an augmented challenge/response scheme.
  158. Frank,Alexander; Light,Mark C.; Westerinen,William J., System and method for maintaining persistent state data.
  159. Hall ; III Sheldon F. ; Stoikoff Ivan T., System and method for offering and providing secured credit card products.
  160. Angelo Michael F. ; Olarig Sompong P. ; Wooten David R. ; Driscoll Dan J., System and method for performing secure device communications in a peer-to-peer bus architecture.
  161. Frank, Alexander; Phillps, Thomas G., System and method for programming an isolated computing environment.
  162. Chess David M. ; Sorkin Gregory Bret ; White Steve Richard, System and method for protecting integrity of alterable ROM using digital signatures.
  163. Grawrock,David W.; Sutton, II,James A., System and method for resetting a platform configuration register.
  164. Frank,Alexander; Westerinen,William J., System and method for trustworthy metering and deactivation.
  165. Chilimbi, Trishul M., System and method for using data address sequences of a program in a software development tool.
  166. Frank,Alexander; England,Paul, System and method to lock TPM always 'on' using a monitor.
  167. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  168. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  169. Steven Karl Schoch ; Paul Swart, System for controlling the use of licensed software.
  170. Strong Hovey R. (San Jose CA), System for decoupling clock amortization from clock synchronization.
  171. Osborn William R., System for preventing electronic memory tampering.
  172. Clark Paul C. (4705 Broad Brook Dr. Bethesda MD 20814), System for protecting computers via intelligent tokens or smart cards.
  173. Richardson ; III Frederic B. (Brookvale AUX), System for software registration.
  174. Guheen, Michael F.; Mitchell, James D.; Barrese, James J., System method and article of manufacture for building, managing, and supporting various components of a system.
  175. Gunyakti,Caglar; Hatlelid,Kristjan E.; Zhang,Ning; Tan,Xiaoxi, Systems and methods for deterring software piracy in a volume license environment.
  176. Waxman, Peter David; Narin, Attila; Cottrille, Scott; Krishnaswamy, Vinay; DeMello, Marco A.; Venkatesh, Chandramouli; Byrum, Frank D.; Bourne, Steve, Systems and methods for issuing usage licenses for digital content and services.
  177. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  178. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  179. Circenis, Edgar; Diamant, John R., Tamper-evident data management.
  180. Piosenka Gerald V. (Scottsdale AZ) Harrison David M. (Mesa AZ) Chandos Ronald V. (Tempe AZ), Tamperproof arrangement for an integrated circuit device.
  181. Wang, Zhenyu; Ma, Qingming, Technique for implementing high performance stable storage hierarchy in a computer network.
  182. Greenberg Burton (New York NY), Television program transmission verification method and apparatus.
  183. Crane, Randall T.; Hastings, Brian L., Tracking pointing device motion using a single buffer for cross and auto correlation determination.
  184. Ginter Thomas,DEX, Updating mechanism for user programs in a computer system.
  185. Vogel, Keith R.; Chase, Charlie D.; Yiu, Kelvin S.; Hallin, Philip J.; Thomas, Louis K., Updating trusted root certificates on a client computer.
  186. Bourne, Steven; Venkatesh, Chandramouli; Krishnaswamy, Vinay, Using a rights template to obtain a signed rights label (SRL) for digital content in a digital rights management system.
  187. Welsh Russell J. (Toronto CAX), Video monitoring system.
  188. Martinez Ronald ; Schneier Bruce ; Guerin Greg, Virtual property system.
  189. Finch Richard (Austin TX) Schieve Eric (Austin TX), Watchdog timer for computer system reset.

이 특허를 인용한 특허 (7)

  1. Thomas, Geoffrey G.; Whaley, John; Agashe, Umesh, Compatibility-based configuration of hardware with virtualization software.
  2. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  3. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  4. Fifer, Nicholas Duane; Gayda, Ilan; Goldberg, Itzhack; Mizrachi, Boaz; Silbershtein, Uri, Limiting the availability of computational resources to a device to stimulate a user of the device to apply necessary updates.
  5. Lu, Zhou; Yu, Huazhang, Method, device and system for protecting software.
  6. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  7. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트