$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Isolated computing environment anchored into CPU and motherboard 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/30
  • G06F-012/14
  • G08B-029/00
  • H04L-009/32
출원번호 US-0022493 (2004-12-22)
등록번호 US-8464348 (2013-06-11)
발명자 / 주소
  • Frank, Alexander
  • Hall, Martin H.
  • Phillips, Thomas G.
출원인 / 주소
  • Microsoft Corporation
인용정보 피인용 횟수 : 0  인용 특허 : 170

초록

A computer is adapted for pay-for-use operation by adding a isolated computing environment to a standard computer. The isolated computing environment may include a trusted non-volatile memory, a digital signature verification capability, a clock or timer and a logic circuit for triggering execution

대표청구항

1. A computer that is adapted for pay-for-use operation, the computer comprising: a first unsecure memory;a display;a processor operatively coupled to the first unsecure memory and the display;an isolated computing environment that is adapted to communicate with the processor and allow the computer

이 특허에 인용된 특허 (170)

  1. Outram John D. (Taylor\s Lane Bosham ; Chichester W. Sussex GB2 P018 8QQ) Outram Richard G. (Clarence Street Darmouth Devon GB2 TQ6 9NW), Adaptive data logger.
  2. Mansell,David Hennah; Nonweiler,Michael Robert; Middleton,Peter Guy, Apparatus and method for controlling access to a memory.
  3. Huddleston Paul M. (Stone Mountain GA) Porter ; Jr. G. Burns (Doraville GA) Rooney David T. (Marietta GA), Apparatus and method for monitoring an energy management system.
  4. James L. Howard, Jr. ; Pennington J. Hess ; James A. MacStravic, Apparatus and methods for managing key material in heterogeneous cryptographic assets.
  5. Anselm Anthony C., Apparatus for affixing a strain wire into the wiring of flexible electric conduit.
  6. Lem Paulus M. (Wilnis NLX), Apparatus for monitoring the replay of audio/video information carriers.
  7. Robert D. Cassagnol ; Douglas M. Dillon ; David S. Kloper ; Sandra J. Weber ; Brandon E. Bautz, Apparatus for providing a secure processing environment.
  8. Takeda Masaru (Saitama JPX), Apparatus for transferring information between different window systems.
  9. Lacombe,John; Galloway,Jeffery L.; Majni,Tim, Application-level software watchdog timer.
  10. Hofsss Michael (Vaihingen/Enz DEX) Nitschke Werner (Ditzingen DEX) Schweren Harald (Korntal-Mnchingen DEX) Angerbauer Margit (Stuttgart DEX), Arrangement for testing a watchdog circuit.
  11. Parsons,Donald; Edwards,Judith; McCoy,Donald; Block,James, Automated banking machine component authentication system and method.
  12. Harris,Walter; Zajkowski,Timothy, Automated banking machine key loading system and method.
  13. Lockwood Lawrence B., Automatic business and financial transaction processing system.
  14. Frank, Alexander, Binding a device to a computer.
  15. Arai Yoshinori,JPX ; Suzuki Masakazu,JPX, CT scanning apparatus.
  16. Ahdout, Isaac; Hall, Martin H.; Xu, Zhangwei, Changing product behavior in accordance with license.
  17. Hartman ; Jr. Robert C. (Woodside CA), Client/server based secure timekeeping system.
  18. Norskog, Allen C., Combined pointing device and bar code scanner.
  19. Farris Robert D. ; McDermott Christine D., Common channel signaling event detection and control.
  20. Proudler,Graeme John; Chan,David, Communications between modules of a computing apparatus.
  21. Venners Howard W. (Indianapolis IN) Beyers Jr. Billy W. (Greenfield IN) Hailey James E. (Indianapolis IN), Component audio/video system with timed control of plural peripheral devices.
  22. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  23. Pearson,Siani Lynne; Chan,David, Computer platforms and their methods of operation.
  24. Angelo, Michael F.; Wisecup, George David; Collins, David L., Computer system having security features for authenticating different components.
  25. Griffin,Jonathan, Computer system operable to revert to a trusted state.
  26. Yasuhiro Ishibashi JP, Computer system, and video decoder used in the system.
  27. Auerbach,Alan B.; Murphy,Shawn M.; Smith,Walter R, Configurable collection of computer related metric data.
  28. Okamoto,Ryuichi; Tokuda,Katsumi; Miura,Kouji, Content usage management system and server used in the system.
  29. Thomas Schmidt DE; Karl-Heinz Knobl DE, Control circuit for a microcontroller.
  30. Cromer, Daryl Carvis; Freeman, Joseph Wayne; Goodman, Steven Dale; Kern, Eric Richard; Springfield, Randall Scott, Data processing system and method for password protecting a boot device.
  31. Frank,Alexander; Phillips,Thomas G.; Reilly,George V., Delicate metering of computer usage.
  32. Cutter, Jr.,Benjamin Brooks; Strom,Clifford Paul; Evans,Brian Patrick; Jain,Amit; Siu,Michael Yui Kwan, Device certificate self-individualization.
  33. Garg, Rahul; Mittal, Parul Alok; Modani, Natwar, Differential rewards with dynamic user profiling.
  34. England Paul ; DeTreville John D. ; Lampson Butler W., Digital rights management operating system.
  35. Hsu, Jay; Zadrozny, Stanley, Digital wireless telephone system for downloading software to a digital telephone using wireless data link protocol.
  36. Germer Warren R. (Dover NH) Balch Richard A. (Rochester NH), Electric meter with electronic rolling demand register.
  37. Dvorkis Paul (Stony Brook NY) Thomas Ralph (East Patchogve NY) Goren David (Ronkonkoma NY) Fuller Robert (Pataskala OH) Goldner Leonard H. (Cold Spring Harbor NY), Electronic stylus type optical reader.
  38. Lieblich,Jason; Norman,Dustin, End user risk management.
  39. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Enforcement architecture and method for digital rights management.
  40. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  41. Westerinen, William J.; Carpenter, Todd L.; Frank, Alexander; Schmidt, Shon; Drake, Stephen Richard; Foster, David James; Yu, Tse-Ching James, Enhanced packaging for PC security.
  42. Yang,Ming Hsuan, Face recognition using kernel fisherfaces.
  43. Lebizay Gerald (Vence NY FRX) Lien Yeong-Chang (Briarcliff Manor NY) Taso Michael M. (Yorktown Heights NY), Fault tolerant switch with selectable operating modes.
  44. Storey Thomas W., Fully integrated, on-line interactive frequency and award redemption program.
  45. Becker Seth P. ; Becker Paul J. ; Becker Scott E. ; Lombardo Paul V., Gemstons identification tracking and recovery system.
  46. Renton Paul (14926 20th SW. Seattle WA 98166), Hard drive security system.
  47. Circenis, Edgar, Hardware based utilization metering.
  48. Bird Richard M. (Woodland Hills CA) Byrd Houston F. (Lewisville TX), Identification system for broadcast program segments.
  49. Adan Manolito E. ; Lipscomb Terry M., Image sensing operator input device.
  50. Manolito E. Adan ; Terry M. Lipscomb, Image sensing operator input device.
  51. Koritzinsky Ianne Mae Howards ; Reich John Aurthur, Imaging system protocol handling method and apparatus.
  52. Chateau,Alain; Azema,Jerome; Haidamous,Constantin, Indirect data protection using random key encryption.
  53. Philyaw, Jeffry Jovan, Input device having positional and scanning capabilities.
  54. Smola, Michael; Wegertseder, Dominik, Integrated circuit.
  55. Casto, James John; Qureshi, Qadeer Ahmad; Boothby, Hugh William, Integrated circuit package incorporating programmable elements.
  56. Crawford Christopher M., Internet online backup system provides remote storage for customers using IDs and passwords which were interactively est.
  57. Adams Phillip M. (Parowan UT) Holmstron Larry W. (Salt Lake City UT) Jacob Steve A. (South Weber UT) Powell Steven H. (Ogden UT) Condie Robert F. (Tuscon AZ) Culley Martin L. (Tuscon AZ), Kernels, description tables, and device drivers.
  58. Christiano Matt (Saratoga CA), License management system for software applications.
  59. Duvvoori Vikram ; Sahai Vikram ; Parthasarathy Balaji ; Waldhauer Neil, License management system using daemons and aliasing.
  60. England Paul ; DeTreville John D. ; Lampson Butler W., Loading and identifying a digital rights management operating system.
  61. Brehmer Gerald M. (Allen Park MI) Hill John P. (Westland MI), Low cost/low current watchdog circuit for microprocessor.
  62. Frank,Alexander; Light,Mark C.; Hall,Martin H., Maintaining and managing metering data for a subsidized computer.
  63. Cutter,Benjamin Brooks; Evans,Brian P.; Strom,Clifford P.; Parks,Michael Jay, Metering accessing of content and the like in a content protection system or the like.
  64. Hinckley, Kenneth P.; Sinclair, Michael J.; Szeliski, Richard S.; Conway, Matthew J.; Hanson, Erik J., Method and apparatus for computer input using six degrees of freedom.
  65. Breeden Robert L. (Boynton Beach FL) Muppidi Prabhakar (Boynton Beach FL), Method and apparatus for controlling access to a communication system.
  66. Salas Pito ; Beir Jeffrey ; Leffler Melissa ; Glenn McDonald ; Kleppner Paul ; Morrissey Craig ; Tonra ; Jr. James E., Method and apparatus for controlling access to a product.
  67. Kramer, Gerald Arthur; Whitlow, Eric Scott, Method and apparatus for encouraging timely payments associated with a computer system.
  68. Kubala,Jeffrey P.; Nick,Jeffrey M.; Yocom,Peter B., Method and apparatus for enforcing capacity limitations in a logically partitioned system.
  69. Garst Blaine ; Serlet Bertrand, Method and apparatus for enforcing software licenses.
  70. Helbig ; Sr. Walter A, Method and apparatus for enhancing computer system security.
  71. Becker Craig Henry ; Cook John ; Folger Troy Douglas ; Knutson James Irwin, Method and apparatus for extending a java archive file.
  72. Salas Pito ; Beir Jeffrey ; Leffler Melissa ; McDonald Glenn ; Kleppner Paul ; Finnegan Neal ; Morrisey Craig ; Crowley Patrick, Method and apparatus for facilitating communication between collaborators in a networked environment.
  73. Land, David MacLeod; Getgood, Alan Bruce, Method and apparatus for managing credit inquiries within account receivables.
  74. Shin, Kum-Ho, Method and apparatus for maximizing an advertising effect using a control unit to detect if advertisement is being displayed and suspending a function if advertisement is not displayed.
  75. Frank, Alexander; Duffus, James, Method and apparatus for measuring presentation data exposure.
  76. Setala,Henri, Method and apparatus for medical X-radiography.
  77. Eskelinen,Jaakko Joonas, Method and apparatus for performing single-point projection imaging.
  78. Frank, Alexander; Steeb, Curt; Duffus, James; Light, Mark C.; Holladay, Martin; Sutton, Paul; Phillips, Thomas; Xu, Zeyong; Xu, Zhangwei, Method and apparatus for provisioning software.
  79. Brandt Marcia Lynn ; Destefano George Francis ; Fosdick Eric Leonard ; Mehta Ramila Alexandra ; Prokop Teresa McConville ; Stamschror Kevin Patrick, Method and apparatus for software license management.
  80. Archibald William Charles ; Spielman Terence Paul ; Spielman Jason, Method and apparatus that accounts for usage of digital applications.
  81. Pasieka, Michael S., Method and system for consumer electronic device certificate management.
  82. Johnson,Douglas Karl; Levine,Lewis J., Method and system for improved correction of registration error in a fluoroscopic image.
  83. Ahmad Arshad, Method and system for monitoring the use of rented software.
  84. Brice ; Jr. Frank W. ; Hefferon Eugene P. ; Scalzi Casper A. ; Tarcza Richard P., Method and system for providing a hardware machine function in a protected virtual machine.
  85. Salas Pito ; Beir Jeffrey ; Leffler Melissa ; McDonald Glenn ; Dennie Andy ; Kleppner Paul ; Finnegan Neal ; Morrissey Craig ; Steele Alan ; Crowley Patrick, Method and system for providing a networked collaborative work environment.
  86. da Silva Luis A., Method for determining a source of failure during a file system access.
  87. Markl Katrin,DEX ; Freytag Claus,DEX ; Gunther Stephan,DEX ; Kubatzki Ralf,DEX ; Thiel Wolfgang,DEX, Method for entering data into a scale.
  88. Bobich, Thomas; Brachet, Carl-Manuel; Gray, Robert; Hinman, John, Method for minimizing financial risk for wireless services.
  89. Larsson Jeffrey E. ; Richardson Alan ; Steckler Paul A., Method for preventing software piracy during installation from a read only storage medium.
  90. Davis Derek L. (Phoenix AZ), Method for providing a roving software license from one node to another node.
  91. Merriman Dwight Allen ; O'Connor Kevin Joseph, Method of delivery, targeting, and measuring advertising over networks.
  92. Amberg Richard D. ; Wong Roger ; Lynch Michael,IEX, Method of installing software on and/or testing a computer system.
  93. Miki Mullor IL; Julian Valiko IL, Method of restricting software operation within a license limitation.
  94. Abrams, Peter C.; Bharadhwaj, Rajeev; Nathan, Swami; Rodriguez, Robert; Martyn, Craig W., Method system and apparatus for providing pay-per-use distributed computing resources.
  95. Baldev Krishan ; Leo Chien Chang ; Ronald G. Lambert, Methods and apparatus for delivering targeted information and advertising over the internet.
  96. Yacobi,Yacov; England,Paul; Yuval,Gideon A., Methods and apparatus for protecting information content.
  97. Wilt,Nicholas P.; Nene,Sameer A.; Beda, III,Joseph S., Methods and system for managing computational resources of a coprocessor in a computing system.
  98. Shinzaki, Takashi, Mobile electronic apparatus having function of verifying a user by biometrics information.
  99. Rose, Anthony, Monitoring of computer-related resources and associated methods and systems for allocating and disbursing compensation.
  100. Sporer Michael ; Kline Mark H. ; Zawojski Peter, Motion video processing circuit for capture playback and manipulation of digital motion video information on a computer.
  101. Siu,Michael Yiu Kwan; Strom,Clifford Paul; Evans,Brian Patrick, Multi-level nested open hashed data stores.
  102. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Multi-site software license balancing.
  103. Woest Karen L. (Wauwatosa WI) Stark James K. (Wauwatosa WI) Rasmussen David E. (Wales WI), Network control system with improved reliability.
  104. Carter Stephen R. ; LaVange ; Jr. Donald H. ; Jensen Delos C., Network license authentication.
  105. Conte Brian ; Hui Christine ; Key Roger, Network license compliance apparatus and method.
  106. Bourne,Steven; Malik,Prashant; Krishnaswamy,Vinay; Shobe, Jr.,James B.; Venkatesh,Chandramouli; Narin,Attila, Obtaining a signed rights label (SRL) for digital content and obtaining a digital license corresponding to the content based on the SRL in a digital rights management system.
  107. Lovelace John V. ; Nevis Bryon S., Operating system bootstrap security mechanism.
  108. Aas, Eric; Nuttall, Gordon R., Optical imaging device with speed variable illumination.
  109. Chu William W. Y., Password protected modular computer method and device.
  110. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  111. Phillips,Thomas G; Schoppa,Christopher A; Westerinen,William J; Myers,Mark A, Portable computing environment.
  112. Phillips, Thomas G; Schoppa, Christopher A; Westerinen, William J; Myers, Mark A, Portable computing environment solution.
  113. Ung, Dara; Titus, Mark, Prepaid real-time web based reporting.
  114. Buchheit,Marcellus; Winzenried,Oliver, Procedure for the protection of computer software and/or computer-readable data as well as protective equipment.
  115. Zurko, Mary Ellen; Casey, Jr., Thomas Andrew; Gasser, Morrie; Hall, Judith Shelhorse; Kahn, Clifford Earl; Mason, Andrew Halstead; Sawyer, Paul Douglas; Kendall, Leslie Richard; Lipner, Steven B., Processing trusted commands in trusted and untrusted environments.
  116. Goodman,Steven Dale; Hoff,James Patrick; Springfield,Randall Scott; Ward,James Peter, Proving BIOS trust in a TCPA compliant system.
  117. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.
  118. Jean-Marc Frailong ; Charles A. Price ; Joseph John Tardo, Remote reconfiguration of a secure network interface.
  119. Phillips, Thomas G; Schoppa, Christopher A; Westerinen, William J; Myers, Mark A, Remote services for portable computing environment.
  120. Schneier Bruce ; Walker Jay ; Jorasch James, Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic an.
  121. Evans, Brian P.; Strom, Clifford P.; Parks, Michael Jay, Rendering digital content in a content protection system according to a plurality of chained digital licenses.
  122. Davis Derek L. (Phoenix AZ), Roving software license for a hardware agent.
  123. Knee Derek L. ; Davis Bradley K., Scanning mouse for a computer system.
  124. Davis Derek L., Secure BIOS.
  125. Arbaugh William A. ; Farber David J. ; Keromytis Angelos D. ; Smith Jonathan M., Secure and reliable bootstrap architecture.
  126. Komarla,Eshwari P.; Zimmer,Vincent J., Secure booting and provisioning.
  127. Nordenstam, Jan Olof; Hansson, Allan, Secure distribution and protection of encryption key information.
  128. Underwood, Roy Aaron, Secure gateway interconnection in an e-commerce based environment.
  129. Holtey Thomas O. (Newton MA), Secure memory card with programmed controlled security access control.
  130. Folmsbee, Alan, Secure program execution using instruction buffer interdependencies.
  131. Puhl Larry C. ; Vogler Dean H. ; Dabbish Ezzat A., Secure wireless electronic-commerce system with digital product certificates and digital license certificates.
  132. Robert L. Geiger ; Jyh-Han Lin ; Rajiv Mehta, Secure wireless electronic-commerce system with wireless network domain.
  133. Phillips, Thomas G; Schoppa, Christopher A; Westerinen, William J; Myers, Mark A, Security features for portable computing environment.
  134. Medvinsky, Alexander; Sprunk, Eric J., Self-generation of certificates using secure microprocessor in a device for transferring digital information.
  135. Bereiter Thomas William, Software auditing mechanism for a distributed computer enterprise environment.
  136. Iguchi,Shinya; Tsunehiro,Takashi; Tsunoda,Motoyasu; Ishihara,Haruji; Mizushima,Nagamasa; Totsuka,Takashi, Storage device including a non-volatile memory.
  137. Doherty, Robert J.; Tierney, Peter L.; Arnaoutoglou-Andreou, Marios, System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files.
  138. Taylor David R. P. ; Lynch-Freshner Lawrence A. ; McKinlay Eric W. ; Pacheco Stephen P. ; Goyal Dinesh K., System and method for a communication system.
  139. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  140. Kusumoto, Laura Lee; Sacerdoti, Earl David; Sigler, Leila Janine; Sigler, Sonya Lee, System and method for consumer-selected advertising and branding in interactive media.
  141. Watanabe, Ryoji; Fung, Henry T.; Schwartz, Paul D., System and method for installing and servicing an operating system in a computer or information appliance.
  142. Strunk, David D.; Kephart, Aaron D.; Liseski, Steven J.; Fields, Robin M., System and method for interactive advertising.
  143. Bolle, Rudolf Maarten; Connell, Jonathan Hudson; Ratha, Nalini K., System and method for liveness authentication using an augmented challenge/response scheme.
  144. Frank,Alexander; Light,Mark C.; Westerinen,William J., System and method for maintaining persistent state data.
  145. Hall ; III Sheldon F. ; Stoikoff Ivan T., System and method for offering and providing secured credit card products.
  146. Angelo Michael F. ; Olarig Sompong P. ; Wooten David R. ; Driscoll Dan J., System and method for performing secure device communications in a peer-to-peer bus architecture.
  147. Frank, Alexander; Phillps, Thomas G., System and method for programming an isolated computing environment.
  148. Chess David M. ; Sorkin Gregory Bret ; White Steve Richard, System and method for protecting integrity of alterable ROM using digital signatures.
  149. Misra Pradyumna K. ; Graziadio Bradley J. ; Spies Terence R., System and method for software licensing.
  150. Frank,Alexander; Westerinen,William J., System and method for trustworthy metering and deactivation.
  151. Chilimbi, Trishul M., System and method for using data address sequences of a program in a software development tool.
  152. Frank,Alexander; England,Paul, System and method to lock TPM always 'on' using a monitor.
  153. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  154. Strong Hovey R. (San Jose CA), System for decoupling clock amortization from clock synchronization.
  155. Osborn William R., System for preventing electronic memory tampering.
  156. Diersch Hans-Joerg,DEX ; Gruendler Rainer,DEX ; Stefan Kaden,DEX ; Michels Ingo,DEX, System for securing protected software from unauthorized use in computer networks.
  157. Guheen, Michael F.; Mitchell, James D.; Barrese, James J., System method and article of manufacture for building, managing, and supporting various components of a system.
  158. Waxman, Peter David; Narin, Attila; Cottrille, Scott; Krishnaswamy, Vinay; DeMello, Marco A.; Venkatesh, Chandramouli; Byrum, Frank D.; Bourne, Steve, Systems and methods for issuing usage licenses for digital content and services.
  159. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  160. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  161. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  162. Circenis, Edgar; Diamant, John R., Tamper-evident data management.
  163. Greenberg Burton (New York NY), Television program transmission verification method and apparatus.
  164. Crane, Randall T.; Hastings, Brian L., Tracking pointing device motion using a single buffer for cross and auto correlation determination.
  165. Ginter Thomas,DEX, Updating mechanism for user programs in a computer system.
  166. Vogel, Keith R.; Chase, Charlie D.; Yiu, Kelvin S.; Hallin, Philip J.; Thomas, Louis K., Updating trusted root certificates on a client computer.
  167. Granger Mark J. ; Smith Cyrus E. ; Hoffman Matthew I., Use of pseudocode to protect software from unauthorized use.
  168. Bourne, Steven; Venkatesh, Chandramouli; Krishnaswamy, Vinay, Using a rights template to obtain a signed rights label (SRL) for digital content in a digital rights management system.
  169. Welsh Russell J. (Toronto CAX), Video monitoring system.
  170. Finch Richard (Austin TX) Schieve Eric (Austin TX), Watchdog timer for computer system reset.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로