$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method enabling parallel processing of hash functions using authentication checkpoint hashes 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-021/00
출원번호 US-0431696 (2012-03-27)
등록번호 US-8627097 (2014-01-07)
발명자 / 주소
  • Wolf, Bryan D.
출원인 / 주소
  • IGT
대리인 / 주소
    Neal, Gerber & Eisenberg LLP
인용정보 피인용 횟수 : 0  인용 특허 : 188

초록

Systems and methods enabling parallel processing of hash functions are provided. A data string including a plurality of pieces arranged in an order is hashed using a hash function to determine a plurality of authentication checkpoint hashes associated with the pieces. To authenticate the data string

대표청구항

1. A system comprising: at least one processor;at least one display device; andat least one memory device storing a plurality of instructions which, when executed by the at least one processor, cause the at least one processor to operate with the at least one display device to:(a) for a first piece

이 특허에 인용된 특허 (188)

  1. Wobber Edward (Menlo Park CA) Abadi Martin (Palo Alto CA) Birrell Andrew (Los Altos CA) Lampson Butler (Cambridge MA), Access control subsystem and method for distributed computer system using locally cached authentication credentials.
  2. Rumiko Kakehi JP; Masaki Kyojima JP, Access rights authentication apparatus.
  3. Hogan, Kenneth; Polucha, Micheal; Pham, Trieu; Vollum, Steve; Johnston, Jessee, Airborne e-mail data transfer protocol.
  4. Knobl,Karl Heinz; Menzenbach,Christof; Eibach,Wolfgang G; Nuttall,Mark Patrick; Phippen,Robert William, Apparatus and method for establishing communication in a computer network.
  5. Durham Peter Emmanuel, Apparatus and method for optimizing client-state data storage.
  6. Uchenick Gordon (Baltimore MD), Apparatus and method for preventing unauthorized use of computer programs.
  7. Boyle John M. (Cranford NJ) Maiwald Eric S. (Southfields NY) Snow David W. (Convent Station NJ), Apparatus and method for providing multi-level security for communication among computers and terminals on a network.
  8. Davis Derek L., Apparatus and method for providing secured communications.
  9. Fisher Laren D. (Henderson NV) Vedeen Leonard I. (Las Vegas NV) Gutknecht LeRoy N. (Las Vegas NV), Apparatus and method for reading data encoded on circular objects, such as gaming chips.
  10. Bright Michael W. ; Fuchs Kenneth Carl ; Marquardt Kelly Jo, Apparatus and method of reading a program into a processor.
  11. Haynes,Ramond M., Apparatus and methods for intellectual property database navigation.
  12. Robert Roy Blandford, Authenticated time device.
  13. Hino,Akira; Kasamatsu,Eitaroh; Tanaka,Akiyoshi, Authentication system and method.
  14. Giniger, Michael L.; Hilton, Warren S., Automated operation and security system for virtual private networks.
  15. Chaum David L. (14652 Sutton St. Sherman Oaks CA 91403), Blind unanticipated signature systems.
  16. Princen, John; Srinivasan, Pramila; Anderson, Craig Steven, Block-based media content authentication.
  17. Bayassi, Mulham; De La Tullaye, Pierre; Jezequel, Jean-Francois, Broadcast and reception, and conditional access system therefor.
  18. Peterson, Leonard J.; Freedman, Steven J.; Partovi, Hadi; Endres, Raymond E.; D'Souza, David J.; Ellerman, Erik Castedo; Jiggins, Julian P., Client-side system for scheduling delivery of web content and locally managing the web content.
  19. Atkinson Robert G. ; Price Robert M. ; Contorer Aaron M., Code certification for network transmission.
  20. Toshikazu Tomizawa JP; Akio Ikeda JP, Combined game system of portable and video game machines.
  21. Karolak Dale W. (Ft. Wayne IN) Shirey Carl L. (Ft. Wayne IN) Steiner Wesley D. (Ft. Wayne IN) Rue Robert T. (Ft. Wayne IN), Communications management system architecture.
  22. Wong John J. (Atherton CA) Lui Paul S. (Sunnyvale CA), Computer game cartridge security circuit.
  23. Leung Yiu C. (Hong Kong HKX) Leung Iu S. (Hong Kong HKX), Computer game control apparatus.
  24. Acharya, Swarup; Korth, Henry F.; Poosala, Viswanath, Computer implemented method and apparatus for fulfilling a request for information content with a user-selectable version of a file containing that information content.
  25. Sato Albert (Austin TX) Baker David C. (Austin TX) Waldron Christie J. (Plano TX), Computer system having system feature extension software containing a self-describing feature table for accessing I/O de.
  26. Hatakeyama, Takahisa; Yoshioka, Makoto; Miyazawa, Yuji, Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method.
  27. Morito Hajime,JPX ; Yoshiura Hiroshi,JPX ; Roe Michael,GBX, Copy protection apparatus and method.
  28. Yen,Wei, Creation of customized web pages for use in a system of dynamic trading of knowledge, goods and services.
  29. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  30. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  31. Lennon Richard E. (Woodstock NY) Matyas Stephen M. (Poughkeepsie NY) Meyer Carl H. W. (Kingston NY) Oseas Jonathan (Hurley NY) Prentice Paul N. (Hyde Park NY) Tuchman Walter L. (Woodstock NY), Cryptographic verification of operational keys used in communication networks.
  32. Byers Larry L. (Appley Valley MN) Desubijana Joseba M. (Minneapolis MN) Michaelson Wayne A. (Circle Pines MN), Data block check sequence generation and validation in a file cache system.
  33. Ikuta Masanao,JPX ; Kambe Tomoaki,JPX ; Takida Satoshi,JPX, Data caching apparatus, data caching method and medium recorded with data caching program in client/server distributed system.
  34. Ohba Toshihiro (Tokyo JPX) Asai Toshinori (Tokyo JPX), Data security apparatus and method.
  35. Blatter Harold ; Horlander Thomas Edward ; Bridgewater Kevin Elliott ; Deiss Michael Scott, Decoding system and data format for processing and storing encrypted broadcast, cable or satellite video data.
  36. Miura, Takayuki; Ono, Tsuyoshi; Suzuki, Naoshi; Miyata, Kouji, Device authentication system.
  37. Goudard Jean-Louis (Guyancourt FRX) Pottier Denis (L\Hay les Roses FRX) Hoppe Joseph (Les Molires FRX), Device for protecting the validity of time sensitive information.
  38. Tatebayashi, Makoto; Nakamura, Yutaka; Harada, Shunji; Kozuka, Masayuki, Digital content protection system.
  39. Amin Pravin T. (7414 Dew Mist La. Houston TX 77095), Digital processing system with self-test capability.
  40. Kravitz David W. (Owings Mills MD), Digital signature algorithm.
  41. Tracton, Kenneth; Jaff, Kosar; Shands, Walter, Dynamic content customization in a client-server environment.
  42. LeMay,Steven G.; Rodgers,Andrew M.; Breckner,Robert E.; Chen,Xuedong, EPROM file system in a gaming apparatus.
  43. Dedrick, Rick; Shine, Laura I.; Koski, Jeanne M., Electronic asset lending library method and apparatus.
  44. Alcorn Allan E. (Portola Valley CA) Barnett Michael (Santa Clara CA) Giacalone ; Jr. Louis D. (Palo Alto CA) Levinthal Adam E. (Redwood City CA), Electronic casino gaming apparatus with improved play capacity, authentication and security.
  45. Alcorn Allan E. ; Barnett Michael ; Giacalone ; Jr. Louis D. ; Levinthal Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  46. Lyons, Martin; Muir, Robert Linley, Electronic casino gaming with authentication and improved security.
  47. Alcorn, Allan E.; Jenkins, Harry H., Electronic gaming apparatus having authentication data sets.
  48. Alcorn,Allan E.; Jenkins,Harry H., Electronic gaming apparatus with authentication.
  49. Krajewski ; Jr. Marjan (Acton MA) Chipchak John C. (Dracut MA) Chodorow David A. (Groton MA) Trostle Jonathan T. (Lexington MA) Baldwin Peter T. (Rowley MA), Electronic information network user authentication and authorization system.
  50. Piosenka Gerald V. (Scottsdale AZ) Worger William R. (Mesa AZ) Savage Michael A. (Chandler AZ), Electronic keying scheme for locking data.
  51. Ginsburg, Alec; Gifford, Darin T.; Piechowiak, Robert J., Electronic security technique for gaming software.
  52. Saffari Ali M. ; Hunt James P., Encryption of bill validation data.
  53. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  54. Olsen James E. ; Bringhurst Adam L., Fault tolerant electronic licensing system.
  55. Sarbin Theodore R. (Reno NV) Brugger Paul R. (Carson City NV) Wellman Walter H. (Sparks NV) Kuhns Darryl E. (Reno NV), Game machine data transfer system utilizing portable data units.
  56. Weiss, Steven A., Gaming device and method.
  57. Weiss Steven A. ; Carlson Rex R., Gaming device security system: apparatus and method.
  58. McCoull, James Ross; Muir, Robert Linley, Gaming machine having a secure boot chain and method of use.
  59. Gentles, Thomas A., Gaming machine having reduced-read software authentication.
  60. Ryan,Chad A., Gaming machine having targeted run-time software authentication.
  61. Gazdic, Daniel J.; Ryan, Chad A.; Sylla, Craig J., Gaming software authentication.
  62. Gazdic, Daniel J.; Ryan, Chad A.; Sylla, Craig J., Gaming software authentication.
  63. Traversat Bernard A. ; Saulpaugh Tom ; Schmidt Jeffrey A. ; Slaughter Gregory L. ; Tracey William J. ; Woodward Steve, Generic schema for storing configuration information on a server computer.
  64. Moore James W. (Potomac MD), Hybrid encryption method and system for protecting reusable software components.
  65. Nolan ; Jr. Thomas J. (Mahopac NY), Implementing privilege on microprocessor systems for use in software asset protection.
  66. Shimizu, Yusuke, Information processing device and method for reading information recorded on an information recording medium.
  67. Asano, Tomoyuki; Osawa, Yoshitomo, Information transmission system and method, drive device and access method, information recording medium, device and method for producing recording medium.
  68. Ishibashi,Yoshihito; Oishi,Tateo; Matsuyama,Shinako; Asano,Tomoyuki; Muto,Akihiro; Kitahara,Jun, Information transmission system, transmitter, and transmission method as well as information reception system, receiver and reception method.
  69. Sinha,Saurabh; Jakubowski,Mariusz H.; Venkatesan,Ramarathnam; Chen,Yuqun; Cary,Matthew; Pang,Ruoming, Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context.
  70. Menashe Julian (54 Copley Park London SW16 3DB GBX), Interactive, computerised gaming system with remote terminals.
  71. Herz, Fredrick; Smith, Jonathan M.; Parkes, David C., Location enhanced information delivery system.
  72. Nakagawa Katsuya (Kusatsu JPX) Yukawa Masayuki (Kyoto JPX), Memory cartridge and information processor unit using such cartridge.
  73. Okada Satoru (Kyoto JPX), Memory cartridge including a key detector for inhibiting memory access and preventing undesirable write operations.
  74. Brunner Norman (Gurnee IL) Pajak Phillip (Western Springs IL) Hilgendorf Douglas (Gurnee all of IL), Memory integrity checking system for a gaming device.
  75. Khan Raheel Ahmed ; Burleson David Brent ; Filion John Thomas ; Cheek Donald Scott, Method and apparatus for a game delivery service including flash memory and a game back-up module.
  76. Jack E. Ozzie ; Raymond E. Ozzie, Method and apparatus for activity-based collaboration by a computer system equipped with a dynamics manager.
  77. Jablon David P. (Shrewsbury MA) Hanley Nora E. (Shrewsbury MA), Method and apparatus for assessing integrity of computer system software.
  78. Lexenberg, Robert A.; Huang, Yifei C., Method and apparatus for automatically determining allocation of voice and data channels on T1/E1 line.
  79. McGee, William G.; Langford, Glenn C.; Van Oorschot, Paul C., Method and apparatus for controlling program execution and program distribution.
  80. Christopher H. Stewart ; Svilen B. Pronev ; Darrell J. Starnes, Method and apparatus for efficient storage and retrieval of objects in and from an object storage device.
  81. Luciano, Jr., Robert Anthony, Method and apparatus for enhancing game play through savable game play state.
  82. Rabin, Michael O.; Shasha, Dennis E., Method and apparatus for protecting information and privacy.
  83. Vu, Son Trung; Phan, Quang, Method and apparatus for secure processing of cryptographic keys.
  84. Walker Jay S. ; Schneier Bruce ; Jorasch James A. ; Van Luchene Andrew S., Method and apparatus for securing a computer-based game of chance.
  85. Bruce Schneier ; Jay S. Walker ; James A. Jorasch, Method and apparatus for securing electronic games.
  86. Schneier Bruce ; Walker Jay S. ; Jorasch James A., Method and apparatus for securing electronic games.
  87. Schneier Bruce ; Walker Jay S. ; Jorasch James A., Method and apparatus for securing electronic games.
  88. Lee, Larry A.; Kilmer, Jr., Robert L.; Menigoz, David R., Method and apparatus for selectively denying access to encoded data.
  89. LeMay,Steven G.; Benbrahim,Jamal; Chen,Xuedong, Method and apparatus for software authentication.
  90. Lambert Mark L. ; van der Rijn Daniel J. G. ; Kemper David J. ; Verkler Jay L., Method and apparatus for storing and delivering documents on the internet.
  91. James Goodman CA, Method and apparatus for switchably selecting an integrated circuit operating mode.
  92. Beck Robert D. ; Richardson John, Method and apparatus for transmitting electronic mail attachments with attachment references.
  93. Pease Logan L. (Reno NV) Richard Delbert (Sparks NV) Dickinson ; deceased Peter D. (late of Reno NV by Kathy E. Dickinson ; executrix ), Method and apparatus for verifying the contents of a storage device.
  94. Dyson Patrick (Mountain View CA), Method and apparatus for verifying the integrity of a file stored separately from a computer.
  95. Sanjay Agraharam ; Robert Edward Markowitz ; Kenneth H. Rosen ; David Hilton Shur ; Joel A. Winthrop, Method and apparatus to enhance a multicast information stream in a communication network.
  96. Alcorn Allan E. ; Hale Richard L., Method and apparatus using geographical position and universal time determination means to provide authenticated, secure, on-line communication between remote gaming locations.
  97. Arnold Thomas Andrew ; Pettitt John Philip ; Rendleman ; Jr. Jesse Noel ; Lewis ; Jr. Robert Lincoln, Method and system for delivering digital products electronically.
  98. Fields, Duane Kimbell; Gregg, Thomas Preston; Hassinger, Sebastian Daniel; Hurley, II, William Walter; Kolb, Mark Andrew; Vu, Stacy Braden, Method and system for distributing image-based content on the internet.
  99. Malkin Peter Kenneth ; Yu Philip Shi-lung, Method and system for dynamically prefetching information via a server hierarchy.
  100. Lathrop Frederick L. (Delray Beach FL) Rowland Kenneth A. (Boynton Beach FL), Method and system for providing device driver support which is independent of changeable characteristics of devices and.
  101. Sanders, Barbara; Robb, Curtis; Gau, Jet, Method and system for strategic services enterprise workload management.
  102. Hellwig Friedrich-Wilhelm (Hemhofen DEX) Schrei Werner (Kleinsendelbach DEX), Method for checking data written into buffered write-read memories in numerically controlled machine tools.
  103. Francisco Michael H. (1276 Stradella Rd. Los Angeles CA 90077), Method for maintaining data processing system securing.
  104. Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
  105. Luo Tie, Method for sending a secure message in a telecommunications system.
  106. Alcorn Allan E. ; Barnett Michael ; Giacalone ; Jr. Louis D ; Levinthal Adam E., Method of authenticating game data sets in an electronic casino gaming system.
  107. Ober Timothy ; Reed Peter, Method of implementing a key recovery system.
  108. Wilkinson W. Kevin (Sunnyvale CA) Neimat Marie-Anne (Atherton CA), Method of maintaining consistency of cached data in a database system.
  109. Cina ; Jr. Vincent J. (Spring Valley NY), Method to prevent use of incorrect program version in a computer system.
  110. Scott, Mark; Cheng, Anita; Ho, Simon; Irimescu, George; Voineag, Dorel; Wong, William; Yao, Min; Zadeh, Row J., Method, system, and computer program product for providing voice over the internet communication.
  111. Rabin, Michael O.; Shasha, Dennis E., Methods and apparatus for protecting information.
  112. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  113. Uesaka Yasushi,JPX ; Yamauchi Kazuhiko,JPX ; Kozuka Masayuki,JPX ; Higaki Nobuo,JPX ; Horiuchi Koichi,JPX ; Haruna Syusuke,JPX, Microprocessor suitable for reproducing AV data while protecting the AV data from illegal copy and image information processing system using the microprocessor.
  114. Andrew Goodman ; Jean Rene Menand, Module manager for interactive television system.
  115. Edson, Richard, Multi-service in-home network with an open interface.
  116. Iijima Yasuo (Yokohama JPX), Mutual authentication system and method which checks the authenticity of a device before transmitting authentication dat.
  117. Martinek,Michael G.; Jackson,Mark D.; Downs, III,Justin G., Pass-through live validation device and method.
  118. Lampson Butler W. (Cambridge MA) Hawe William R. (Pepperell MA) Gupta Amar (Northboro MA) Spinney Barry A. (Wayland MA), Pipelined cryptography processor and method for its use in communication networks.
  119. Fullerton Graeme D. (Beverly Hills AUX), Poker machine with improved security after power failure.
  120. Audebert Yves (Croissy-sur-Seine FRX) Delahaye Achille (Chennev Ieres-sur-Marne FRX), Portable electronic device to establish public loyalty to a medium or similar.
  121. Ong Lance, Predictive memory caching for media-on-demand systems.
  122. Vanstone Scott A.,CAX ; Johnson Donald B., Private key validity and validation.
  123. Paulini Werner (Salzkotten DEX) Wessel Dietmar (Delbrck DEX), Process for securing and for checking the integrity of the secured programs.
  124. Lin Mengjou, Process scheduling for streaming data through scheduling of disk jobs and network jobs and the relationship of the scheduling between these types of jobs.
  125. Cockerille, Warner; LeMay, Steven G.; Breckner, Robert, Process verification.
  126. Jakubowski,Mariusz H.; Venkatesan,Ramarathnam, Protecting digital goods using oblivious checking.
  127. Theriault Roger ; Lockhart Thomas Wayne,CAX ; Battin Robert D., Proxy host computer and method for accessing and retrieving information between a browser and a proxy.
  128. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  129. Dolan George M. (Charlotte NC) Holloway Christopher J. (Woking GB2) Matyas ; Jr. Stephen M. (Poughkeepsie NY), Public key data communications system under control of a portable security device.
  130. Hideyuki Tsutsumitake JP, Real-time information transmission system.
  131. Bel,Hendrik Jan; Lokhoff,Gerardus Cornelis Petrus; Breugom,Michel Ronald; Engelen,Dirk Valentinus Rene; Van De Poel,Peter, Receiving device for securely storing a content item, and playback device.
  132. Hedges Richard A. (130 Montecito Oakland CA 94610) Shockley David L. (340 Dorantes San Francisco CA 94116) Fralick Stanley C. (21476 Sara Hills Ct. Saratoga CA 95070) Kane Paul H. (10471 Scenic Cir. , Remote gaming system.
  133. Schneier Bruce ; Walker Jay ; Jorasch James, Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic an.
  134. Pitts William Michael, Request interceptor in network nodes for determining local storage of file image satisfying predetermined criteria.
  135. Gidron,Yoad; Holder,Ophir; Teichholtz,Haim; Reich,Benny; Gur Ari,Yaron; Schiller,Michael, Rule-based system and method for managing the provisioning of user applications on limited-resource and/or wireless devices.
  136. Tso Michael Man-Hak ; Jing Jin ; Knauerhase Robert Conrad ; Romrell David Alfred ; Gillespie Daniel Joshua ; Bakshi Bikram Singh ; Sathyanarayan Seshardi, Scaling proxy server sending to the client a graphical user interface for establishing object encoding preferences after receiving the client's request for the object.
  137. Vaitzblit Lev (Concord MA) Ramakrishnan Kadangode K. (Maynard MA) Tzelnic Percy (Concord MA), Scheduling and admission control policy for a continuous media server.
  138. Srinivasan,Pramila; Princen,John; Berndt,Frank; Blythe,David; Saperstein,William; Yen,Wei, Secure and backward-compatible processor and secure software execution thereon.
  139. Srinivasan,Pramila; Princen,John; Berndt,Frank; Blythe,David; Saperstein,William; Yen,Wei, Secure and backward-compatible processor and secure software execution thereon.
  140. Pease Logan L. (Reno NV) Bond Eugene T. (Las Vegas NV) Crevelt Dwight E. (Las Vegas NV) Holmes ; Jr. Verne F. (Las Vegas NV), Secure automated electronic casino gaming system.
  141. Craft, David J., Secure code authentication.
  142. Walker, Jay; Schneier, Bruce, Secure improved remote gaming system.
  143. Peinado,Marcus; England,Paul, Secure processor architecture for use with a digital rights management (DRM) system on a computing device.
  144. Duri,Sastry S.; Gruteser,Marco O.; Liu,Xuan; Moskowitz,Paul A.; Perez,Ronald; Schonberg,Edith G.; Singh,Moninder; Tang,Jung Mu; Tresser,Charles P., Secure system and method for enforcement of privacy policy and protection of confidentiality.
  145. Orus, Herve; Foglino, Jean-Jacques, Secured method for monitoring the transfer of value units in a chip card gambling system.
  146. Kaish Norman (Whitestone NY), Security arrangement for and method of rendering microprocessor-controlled electronic equipment inoperative after occurr.
  147. Ohta,Yuusaku; Yamaguchi,Masashi; Yamauchi,Hiroki, Security communication packet processing apparatus and the method thereof.
  148. Matsuhara Taku (Tokyo JPX), Security system for software.
  149. Hibino Toshiro (Kyoto-fu JPX) Yamato Satoshi (Kyoto-fu JPX), Security systems and methods for a videographics and authentication game/program fabricating device.
  150. Rowe, Richard E.; Oberberger, Michael M.; Low, Michael N., Server based meter model softcount and audit processing for gaming machines.
  151. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  152. Curran Kevin G. (Sudbury MA) Golson Steven E. (Wayland MA) Rode Christian S. (Cambridge MA), Software protection methods and apparatus.
  153. Chandra Ashileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocess.
  154. Doherty, Robert J.; Tierney, Peter L.; Arnaoutoglou-Andreou, Marios, System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files.
  155. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  156. Duane Kimbell Fields ; Thomas Preston Gregg ; Sebastian Daniel Hassinger ; William Walter Hurley, System and method for cooperative client/server customization of web pages.
  157. Erickson John S., System and method for managing copyrighted electronic media.
  158. Smith, Brian N.; Oksanen, Scott R; Johnson, Jon D., System and method for parallel processing of data integrity algorithms.
  159. Ashour,Gal; Sundaresan,Neelakantan, System and method for protecting user logoff from web business transactions.
  160. Jeffrey Conklin ; David Foucher ; Daniel Foucher, System and method for providing and updating user supplied context for a negotiations system.
  161. Johnson, Peter J.; Brendall, Eric, System and method for verifying the contents of a mass storage device before granting access to computer readable data stored on the device.
  162. Von Kohorn Henry (945 Treasure La. Vero Beach FL 32963-3044), System and method of communication with authenticated wagering participation.
  163. Torreiter Otto,DEX ; Metzger Roland,DEX ; Wendel Dieter,DEX, System and method testing computer memories.
  164. Shaughnessy Steven T. (Scotts Valley CA), System and methods for improved file management in a multi-user environment.
  165. Wang Pong-sheng ; Hsu Ching-San, System and process for delivering digital data on demand.
  166. Ford, Daniel A.; Kraft, Reiner; Tewari, Gaurav, System and technique for dynamic information gathering and targeted advertising in a web based model using a live information selection and analysis tool.
  167. Abrams, Steven R.; Jameson, David H., System for collecting and displaying summary information from disparate sources.
  168. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  169. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  170. Lubenow Josef K. ; Albright Charles T., System for distributing items from an origin to a plurality of destinations.
  171. Levinson Frank H. (Palo Alto CA), System for scheduling transmission of indexed and requested database tiers on demand at varying repetition rates.
  172. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  173. Takeda Genyo,JPX ; Kato Shuhei,JPX ; Nishiumi Satoshi,JPX, Systems and method for providing security in a video game system.
  174. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  175. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  176. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  177. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  178. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  179. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  180. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  181. Venkatesh Ramachandran ; Otis Allen J. ; Bretl Robert F., Transactional virtual machine architecture.
  182. Kuzma Andrew J., Transmitting electronic mail attachment over a network using a e-mail page.
  183. Hruska Jan,GBX ; Lammer Peter,GBX, Validity checking.
  184. Thomas Michael, Variable rate optional security measures method and apparatus for wireless communications network.
  185. Smith ; III Jay (Pacific Palisades CA), Video game cartridge recognition and security system.
  186. Eberhardt Lyle N. (Bozeman MT) Robertus Bryan L. (Bozeman MT), Video lottery system with improved site controller and validation unit.
  187. Nakamura Hiroki,JPX ; Kusumi Yuki,JPX ; Oashi Masahiro,JPX ; Shimoji Tatsuya,JPX, Video on demand system with a transmission schedule table in the video server including entries for client identifiers,.
  188. McBride Randall C., Volatile key apparatus for safeguarding confidential data stored in a computer system memory.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로