$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Issuing a publisher use license off-line in a digital rights management (DRM) system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06Q-020/00
  • G06Q-050/00
출원번호 US-0053090 (2008-03-21)
등록번호 US-8700535 (2014-04-15)
발명자 / 주소
  • Bourne, Steve
  • Dillaway, Blair Brewster
  • Jacomet, Pierre
  • Malviarachchi, Rushmi U
  • Parambir, Kumar B
  • Rozenfeld, Yevgeniy Eugene
  • Venkatesh, Chandramouli
  • Rose, III, Charles F
출원인 / 주소
  • Microsoft Corporation
대리인 / 주소
    Tabor, Ben
인용정보 피인용 횟수 : 0  인용 특허 : 596

초록

A publishing user publishes digital content and issues to itself a corresponding digital publisher license to allow itself to render the published digital content. The publishing user is supplied with a publishing certificate from a digital rights management (DRM) server, where the publishing certif

대표청구항

1. A method executed by a publishing computing device for rendering encrypted digital content using a self-issued digital publisher use license, the method comprising: obtaining, by the publishing computing device, an off-line publishing (OLP) certificate from a digital rights management (DRM) serve

이 특허에 인용된 특허 (596)

  1. Edward M. Scheidt ; Ersin L. Domangue, Access control and authorization system.
  2. Fabbio Robert A. (Austin TX), Access control policies for an object oriented database, including access control lists which span across object boundar.
  3. Rumiko Kakehi JP; Masaki Kyojima JP, Access rights authentication apparatus.
  4. Outram John D. (Taylor\s Lane Bosham ; Chichester W. Sussex GB2 P018 8QQ) Outram Richard G. (Clarence Street Darmouth Devon GB2 TQ6 9NW), Adaptive data logger.
  5. Cuccia David ; Epstein Michael A. ; Pasieka Michael S., Administration and utilization of secret fresh random numbers in a networked environment.
  6. Blair,Paul; Hansen,Kurt L.; Seifert,Dean, Airline ticket payment and reservation system and methods.
  7. Brosh Scott (Arlington TX) Wright Timothy (Lake Dallas TX), Anti-counterfeiting process using lenticular optics and color masking.
  8. Feldbau Ofra,ILX ; Feldbau Michael,ILX, Apparatus and method for authenticating the dispatch and contents of documents.
  9. Mansell,David Hennah; Nonweiler,Michael Robert; Middleton,Peter Guy, Apparatus and method for controlling access to a memory.
  10. Tardo, Joseph John; Frailong, Jean-Marc; Mendoza, Harold Lee; Haris, Shiv, Apparatus and method for cryptographic-based license management.
  11. Kocher,Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  12. Butler Theodore ; Wong Marcus, Apparatus and method for encryption key generation.
  13. Huddleston Paul M. (Stone Mountain GA) Porter ; Jr. G. Burns (Doraville GA) Rooney David T. (Marietta GA), Apparatus and method for monitoring an energy management system.
  14. Chou Wayne W. ; Elteto Laszlo ; Kulinets Joseph M. ; LaRussa Joseph, Apparatus and method for preventing theft of computer devices.
  15. Robert J. Gray, Apparatus and method for providing and authentication system.
  16. Lee, Kyoung Woo; Lee, Sang Hyup, Apparatus and method for providing file structure for multimedia streaming service.
  17. Muratani Hirofumi,JPX ; Muto Akihiro,JPX, Apparatus and method for receiving and decrypting encrypted data and protecting decrypted data from illegal use.
  18. Arnold Todd Weston, Apparatus and method for secure distribution of data.
  19. James L. Howard, Jr. ; Pennington J. Hess ; James A. MacStravic, Apparatus and methods for managing key material in heterogeneous cryptographic assets.
  20. Anselm Anthony C., Apparatus for affixing a strain wire into the wiring of flexible electric conduit.
  21. Lem Paulus M. (Wilnis NLX), Apparatus for monitoring the replay of audio/video information carriers.
  22. Robert D. Cassagnol ; Douglas M. Dillon ; David S. Kloper ; Sandra J. Weber ; Brandon E. Bautz, Apparatus for providing a secure processing environment.
  23. Takeda Masaru (Saitama JPX), Apparatus for transferring information between different window systems.
  24. Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
  25. Tsakanikas Peter J. (3080 N. Course Dr. Bldg. 51 ; #108 Palm-Aire Country Club of Florida Pompano Beach FL 33069), Apparatus, method and system for printing of legal currency and negotiable instruments.
  26. Lal,Vishal; Singhal,Umesh; Chakravorthy,Jyothirmoy; Reddy,Rajesh T S, Application rights management in a mobile environment.
  27. Lacombe,John; Galloway,Jeffery L.; Majni,Tim, Application-level software watchdog timer.
  28. Hofsss Michael (Vaihingen/Enz DEX) Nitschke Werner (Ditzingen DEX) Schweren Harald (Korntal-Mnchingen DEX) Angerbauer Margit (Stuttgart DEX), Arrangement for testing a watchdog circuit.
  29. Marsh,David J, Associating content with households using smart cards.
  30. Berson William ; Bernobich Elizabeth ; Heiden Richard W. ; Potoczek Richard A. ; Sisson Robert W. ; Violante Anthony F., Auditable security system for the generation of cryptographically protected digital data.
  31. Schipper John F. ; Loomis Peter V. W. ; Pelley Allan M. ; Janky James M. ; Sheynblat Len, Authentication of a message source.
  32. Parsons,Donald; Edwards,Judith; McCoy,Donald; Block,James, Automated banking machine component authentication system and method.
  33. Harris,Walter; Zajkowski,Timothy, Automated banking machine key loading system and method.
  34. Kenneth Louis Milsted ; Craig Kindell ; Qing Gong, Automated method and apparatus to package digital content for electronic distribution using the identity of the source content.
  35. Young,Carl, Automated security management.
  36. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Automated system for management of licensed software.
  37. Lockwood Lawrence B., Automatic business and financial transaction processing system.
  38. Sherwani, Adil A.; Punniamoorthy, Pranavakumar; Deshpande, Rajesh A; Rambhia, Avni H.; Kuhn, Reid J.; Van Dyke, Clifford P., Automatic update of computer-readable components to support a trusted environment.
  39. Chronister Clyde H. (6115 Bermuda Dunes Houston TX 77069), Ball valve having replaceable seals under full service pressure.
  40. Wiedemer John D. (930 W. Forest Dr. Houston TX 77079), Billing system for computer software.
  41. Frank, Alexander, Binding a device to a computer.
  42. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  43. Robert, Arnaud; Alkove, James M.; Hofmeyr, Jan M., Binding content to an entity.
  44. Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding digital content to a portable storage device or the like in a digital rights management (DRM) system.
  45. Arai Yoshinori,JPX ; Suzuki Masakazu,JPX, CT scanning apparatus.
  46. Jankowitz Charles M. ; Matula Valentine C. ; Munson Gary A. ; Wu Fang, Call handling method for credit and fraud management.
  47. Vesely, Ivan, Cascaded stream cipher.
  48. Micali Silvio, Certificate issue lists.
  49. Micali Silvio, Certificate revocation system.
  50. Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Certificate revocation system.
  51. Hsu Yung-Kao ; Seymour Stephen, Certification process.
  52. Geer ; Jr. Daniel E. ; Tumblin Henry R., Certifying authorization in computer networks.
  53. Ahdout, Isaac; Hall, Martin H.; Xu, Zhangwei, Changing product behavior in accordance with license.
  54. Hartman ; Jr. Robert C. (Woodside CA), Client/server based secure timekeeping system.
  55. Hartman ; Jr. Robert C. (Woodside CA), Client/server based secure timekeeping system.
  56. Norskog, Allen C., Combined pointing device and bar code scanner.
  57. Farris Robert D. ; McDermott Christine D., Common channel signaling event detection and control.
  58. Proudler,Graeme John; Chan,David, Communications between modules of a computing apparatus.
  59. Venners Howard W. (Indianapolis IN) Beyers Jr. Billy W. (Greenfield IN) Hailey James E. (Indianapolis IN), Component audio/video system with timed control of plural peripheral devices.
  60. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  61. Rich, Bruce Arland; Yarsa, Julianne; Shrader, Theodore Jack London; Skibbie, Donna, Composite keystore facility apparatus and method therefor.
  62. Adams ; Jr. Richard L. (Fairfax VA) Hallenbeck Peter D. (Elfland NC), Computer network encryption/decryption device.
  63. Pearson,Siani Lynne; Chan,David, Computer platforms and their methods of operation.
  64. Chelliah Raman ; Cornez Jason S. ; Dellar Carl ; Harrison Stephen ; Hempe John A. ; Hsu Chih-Cheng ; Golin Eric J. ; Price Charles A. ; Rutta Neal S. ; Wood Thomas A. ; Yamamoto Wayne K., Computer system and method for electronic commerce.
  65. Benson Glenn,DEX, Computer system for protecting a file and a method for protecting a file.
  66. Benson Glenn,DEX, Computer system for protecting software and a method for protecting software.
  67. Angelo, Michael F.; Wisecup, George David; Collins, David L., Computer system having security features for authenticating different components.
  68. Griffin,Jonathan, Computer system operable to revert to a trusted state.
  69. Challener,David Carroll; Goodman,Steven Dale; Reinberg,Kevin Michael; Springfield,Randall Scott; Ward,James Peter, Computer system with selectively available immutable boot block code.
  70. Yasuhiro Ishibashi JP, Computer system, and video decoder used in the system.
  71. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  72. Sullivan Robert R. ; Acken John M. ; Aucsmith David W., Conditional access and content security method.
  73. Auerbach,Alan B.; Murphy,Shawn M.; Smith,Walter R, Configurable collection of computer related metric data.
  74. Abdulkader Omar Barbir CA, Confusion data generator.
  75. Simon Robert Walmsley AU; Paul Lapstun AU, Consumable authentication protocol and system.
  76. Hurst,Leon; Durand,Julian; Wilkinson,Jeffrey Miles; Michael,Mulligan, Consumption of content.
  77. Candelore,Brant L., Content distribution for multiple digital rights management.
  78. Matsuyama,Shinako; Ishibashi,Yoshihito; Futamura,Ichiro; Kon,Masashi; Watanabe,Hideaki, Content distribution system authenticating a user based on an identification certificate identified in a secure container.
  79. Bell, Alan Edward; Lotspiech, Jeffrey Bruce; Traw, Chandler Brendan Stanton, Content guard system for copy protection of recordable media.
  80. Traw Chandler Brendan Stanton ; Aucsmith David Wayne, Content protection for transmission systems.
  81. Chase, Jr.,Charlie David; Ganesan,Krishnamurthy; Lafornara,Philip J.; McKune,Jeffrey Richard; Strom,Clifford Paul; Gajjala,Vijay K., Content revocation and license modification in a digital rights management (DRM) system on a computing device.
  82. Hatakeyama, Takahisa; Yoshioka, Makoto; Miyazawa, Yuji, Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method.
  83. Okamoto,Ryuichi; Tokuda,Katsumi; Miura,Kouji, Content usage management system and server used in the system.
  84. Thomas Schmidt DE; Karl-Heinz Knobl DE, Control circuit for a microcontroller.
  85. England, Paul; DeTreville, John D.; Lampson, Butler W., Controlling access to content based on certificates and access predicates.
  86. Montague David S. ; Misra Pradyumna K. ; Swift Michael M. ; Reichel Robert P., Controlling access to objects on multiple operating systems.
  87. Havens, Darryl E.; Kishan, Arun U.; Ward, Richard B., Creating secure process objects.
  88. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  89. Saito Makoto,JPX, Crypt key system.
  90. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  91. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Cryptographic identification, financial transaction, and credential device.
  92. Tatebayashi Makoto. (Vienna VA) Newman ; Jr. David B. (Rockville MD), Cryptographic key distribution method and system.
  93. Wack,C. Jay; Scheidt,Edward M.; Kolouch,James L., Cryptographic key split binder for use with tagged data elements.
  94. Matthew W. Thomlinson ; Scott Field ; Allan Cooper, Cryptographic protection of core data secrets.
  95. Kelly John R., Cryptographically secure pseudo random number generator.
  96. Nonaka, Akira; Ezaki, Tadashi, Data distribution system and method thereof, data processing device, data control device, and machine-readable recording medium recording distribution data.
  97. Boebert William E. (Minneapolis MN) Markham Thomas R. (Anoka MN) Olmsted Robert A. (Minnetonka MN), Data enclave and trusted path system.
  98. Heer Daniel Nelson ; Maher David P., Data encryption security module.
  99. Saito Makoto,JPX, Data management system.
  100. Taguchi Masahiro,JPX ; Kawano Kenji,JPX ; Saito Kazuo,JPX, Data processing apparatus with software protecting functions.
  101. Cromer, Daryl Carvis; Freeman, Joseph Wayne; Goodman, Steven Dale; Kern, Eric Richard; Springfield, Randall Scott, Data processing system and method for password protecting a boot device.
  102. Okaue,Takumi, Data processing system, data processing method, and program providing medium.
  103. Horning Randall (Longmont CO), Data protection system using different levels of reserve power to maintain data in volatile memories for any period of t.
  104. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  105. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  106. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  107. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  108. Snowdon, Dave; Glance, Natalie S., Decentralized network system.
  109. Frank,Alexander; Phillips,Thomas G.; Reilly,George V., Delicate metering of computer usage.
  110. Cross,David B.; Gu,Jianrong; Benaloh,Josh D.; Jones,Thomas C.; Leach,Paul J.; Pittaway,Glenn D., Deriving a symmetric key from an asymmetric key for file encryption or decryption.
  111. Cutter, Jr.,Benjamin Brooks; Strom,Clifford Paul; Evans,Brian Patrick; Jain,Amit; Siu,Michael Yui Kwan, Device certificate self-individualization.
  112. Garg, Rahul; Mittal, Parul Alok; Modani, Natwar, Differential rewards with dynamic user profiling.
  113. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  114. Saw,Chit Wei; Ilnicki,Slawomir K.; van den Branden Lambrecht,Christian J.; Farrell,Joyce E; Herley,Cormac; Ribes,Joan Maria Mas, Digital content distribution systems.
  115. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  116. Makoto Saito JP, Digital content management system and apparatus.
  117. Medina, Cesar; Gong, Qing; Milsted, Kenneth Louis, Digital content preparation system.
  118. Yoshiura Hiroshi,JPX ; Takaragi Kazuo,JPX ; Sasaki Ryoichi,JPX ; Susaki Seiichi,JPX ; Toyoshima Hisashi,JPX ; Saito Tsukasa,JPX, Digital data authentication method.
  119. Davida George I. (Milwaukee WI) Wells David L. (Milwaukee WI), Digital data enciphering and deciphering circuit and method.
  120. Katz Donald R. ; Lau Edwin J. ; Mott Timothy ; Brenneman Scott A. ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen, Digital information library and delivery system with logic for generating files targeted to the playback device.
  121. Katz, Donald R.; Lau, Edwin J.; Mott, Timothy; Brenneman, Scott A.; Jun, Benjamin Che-Ming; Pai, Samuel Hong-Yen, Digital information library and delivery system with logic for generating files targeting a playback device.
  122. Peinado,Marcus; Abburi,Rajasekhar; England,Paul; Ganesan,Krishnamurthy; Bell,Jeffrey R. C.; Blinn,Arnold N.; Jones,Thomas C., Digital license and method for obtaining/providing a digital license.
  123. Grimes,Tom; Mai,Khanh, Digital rights management.
  124. England Paul ; DeTreville John D. ; Lampson Butler W., Digital rights management operating system.
  125. Peinado, Marcus; Liu, Donna; Ganesan, Krishnamurthy, Digital rights management system operating on computing device and having black box tied to computing device.
  126. Hsu, Jay; Zadrozny, Stanley, Digital wireless telephone system for downloading software to a digital telephone using wireless data link protocol.
  127. Anderson David B. ; Gaertner Mark A. ; Forehand Monty A. ; Norman ; Jr. Robert W., Disc storage system having a non-volatile cache to store write data in the event of a power failure.
  128. Lasker Jeffrey M. (Marlboro MA) McGillis James M. (Franklin MA), Disk controller with volatile and non-volatile cache memories.
  129. Jonathan Clark, Distributed execution software license server.
  130. Patterson David M. ; Williams Eugene E., Distributed method of and system for maintaining application program security.
  131. Newmark Rona J. (Northboro MA) Alicandro Rosemarie (Millbury MA) Bixby Peter C. (Northboro MA) Burn Donald D. (Westboro MA) Enberg Eric H. (Westboro MA) Marino Paul K. (Hopkinton MA) Woodbury Paul W., Distributed processing system having plural computers each using identical retaining information to identify another com.
  132. Thomas L. Peterson ; Michael L. Blomquist, Drug pump systems and methods.
  133. Chaudhury,Krish; Pravetz,James D., Dynamic enabling of functionality in electronic document readers.
  134. Roberts Thomas J. (Batavia IL), Efficient method for encrypting superblocks of data.
  135. Caronni Germano ; Waldvogel Marcel,CHX, Efficient, secure multicasting with global knowledge.
  136. Germer Warren R. (Dover NH) Balch Richard A. (Rochester NH), Electric meter with electronic rolling demand register.
  137. Moribatake, Hidemi; Okamoto, Tatsuaki, Electronic cash implementing method and equipment using user signature and recording medium recorded thereon a program for the method.
  138. Bode Hans-Joergen (Mnchen DEX) Lueders Klaus (Markt Schwaben DEX), Electronic component with a shift register test architecture (boundary scan).
  139. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  140. Sudia Frank W. ; Asay Alan ; Brickell Ernest F. ; Ankney Richard ; Freund Peter C. ; Yung Marcel M. ; Kravitz David W., Electronic cryptographic packing.
  141. Olsen James E., Electronic licensing system.
  142. Arsenault Robert ; Bailey William ; DeFilippo Craig, Electronic postage meter system having plural clock system providing enhanced security.
  143. Dvorkis Paul (Stony Brook NY) Thomas Ralph (East Patchogve NY) Goren David (Ronkonkoma NY) Fuller Robert (Pataskala OH) Goldner Leonard H. (Cold Spring Harbor NY), Electronic stylus type optical reader.
  144. Campbell William C. (Longmont CO) Blair Barry O. (Lafayette CO), Electronic system with variable threshold power failure signaling.
  145. Keiichi Iwamura JP, Electronic watermark system electronic information distribution system and image filing apparatus.
  146. Zhang, Minda; Mehta, Pranav H., Enabling secure communications with a client.
  147. Mischenko Valentin Alexandrovich,BYX ; Zakharau Uladzimir Uladzimirovich,BYX, Encoding and decoding information using randomization with an alphabet of high dimensionality.
  148. Peinado, Marcus; Venkatesan, Ramarathnam, Encrypting a digital object based on a key ID selected therefor.
  149. Peinado,Marcus; Venkatesan,Ramarathnam, Encrypting a digital object on a key ID selected therefor.
  150. Matsuzaki Natsume,JPX ; Harada Syunji,JPX ; Tatebayashi Makoto,JPX, Encryption apparatus for ensuring security in communication between devices.
  151. Bianco Mark E. (Diamond Bar CA) Reed Dana A. (Castle Rock CO), Encryption system based on chaos theory.
  152. Lieblich,Jason; Norman,Dustin, End user risk management.
  153. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Enforcement architecture and method for digital rights management.
  154. Abburi,Rajasekhar; Alkove,James M.; McNeill,William P.; McKune,Jeffrey R., Enforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices.
  155. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  156. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  157. Westerinen, William J.; Carpenter, Todd L.; Frank, Alexander; Schmidt, Shon; Drake, Stephen Richard; Foster, David James; Yu, Tse-Ching James, Enhanced packaging for PC security.
  158. Wade Jack (La Jolla CA) Szaroletta William K. (Des Moines IA) Madden Thomas R. (San Diego CA), Enhanced security system for computing devices.
  159. Marsh,David J, Enhancing smart card usage for associating media content with households.
  160. Kostal,Gregory; Bourne,Steve; Krishnaswamy,Vinay, Enrolling / sub-enrolling a digital rights management (DRM) server into a DRM architecture.
  161. Smith Sean William ; Weingart Steve Harris, Establishing and employing the provable untampered state of a device.
  162. Yang,Ming Hsuan, Face recognition using kernel fisherfaces.
  163. Lebizay Gerald (Vence NY FRX) Lien Yeong-Chang (Briarcliff Manor NY) Taso Michael M. (Yorktown Heights NY), Fault tolerant switch with selectable operating modes.
  164. Nelson Eric L. ; Evans Michael L. ; Shelton Lance N. ; Roundy Jared C., Field configurable embedded computer system.
  165. Wyman Robert M. (Kirkland WA), Filters in license management system.
  166. Jeun Jaehan,KRX, Focus servo apparatus for multi-layer disc and method for operating the same.
  167. Sekar Chandersekaran ; Sarbari Gupta, Framework-based cryptographic key recovery system.
  168. Storey Thomas W., Fully integrated, on-line interactive frequency and award redemption program.
  169. Becker Seth P. ; Becker Paul J. ; Becker Scott E. ; Lombardo Paul V., Gemstons identification tracking and recovery system.
  170. Fujisaki Masahide (Kawasaki JPX) Okuda Motoi (Kawasaki JPX), Generating system of random-number sequences for a parallel computer system.
  171. Johnson Donald B., Generating unique and unpredictable values.
  172. Reece,Richard W., Global encryption system.
  173. Renton Paul (14926 20th SW. Seattle WA 98166), Hard drive security system.
  174. Zimmer,Vincent J.; Bulusu,Mallik, Hardened extended firmware interface framework.
  175. Circenis, Edgar, Hardware based utilization metering.
  176. Marsh, David J.; Reneris, Kenneth; Blythe, David R.; Debique, Kirt A., Hardware functionality scan for device authentication.
  177. Adkisson Willis B. (Salt Lake City UT) Rattlingourd Glen D. (Salt Lake City UT) Spencer Billie M. (Bountiful UT) Zscheile ; Jr. John W. (Farmington UT), High speed code sequence generator.
  178. Matyas Stephen M. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Prymak Rostislaw (Dumfries VA) Wilkins John D. (Somerville VA) Martin William C. (Concord NC) Rohland William S., Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors.
  179. Edlund,David J.; Pledger,William A.; Studebaker,R. Todd, Hydrogen purification membranes, components and fuel processing systems containing the same.
  180. Ryuji Ishiguro JP; Yoshitomo Osawa JP; Yoshio Osakabe JP; Makoto Sato JP; Hisato Shima ; Tomoyuki Asano JP, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, INFORMATION PROCESSING SYSTEM AND RECORDING MEDIUM USING AN APPARATUS ID AND PROVIDED LICENSE KEY FOR AUTHENTICATION OF EACH INFORMATI.
  181. Bird Richard M. (Woodland Hills CA) Byrd Houston F. (Lewisville TX), Identification system for broadcast program segments.
  182. Oka Toshinari,JPX, Image creation apparatus.
  183. Adan Manolito E. ; Lipscomb Terry M., Image sensing operator input device.
  184. Manolito E. Adan ; Terry M. Lipscomb, Image sensing operator input device.
  185. Koritzinsky Ianne Mae Howards ; Reich John Aurthur, Imaging system protocol handling method and apparatus.
  186. Chateau,Alain; Azema,Jerome; Haidamous,Constantin, Indirect data protection using random key encryption.
  187. Nakahara,Tohru; Hiramoto,Takuji; Miura,Kouji; Yamamoto,Masaya; Inoue,Mitsuhiro, Information management system having a common management server for establishing secure communication among groups formed out of a plurality of terminals.
  188. Ishiguro,Ryuji, Information processing apparatus.
  189. Matsuyama, Shinako; Ishibashi, Yoshihito, Information processing apparatus and method, information management apparatus and method, and information providing medium.
  190. Ishiguro,Ryuji, Information processing apparatus for watermarking digital content.
  191. Ishiguro, Ryuji; Osawa, Yoshitomo; Osakabe, Yoshio; Sato, Makoto; Shima, Hisato; Asano, Tomoyuki; Nakano, Takehiko, Information processing apparatus, information processing method, information processing system and recording medium.
  192. Ishiguro,Ryuji; Tada,Keiko; Futagami,Motomasa, Information processing device, method, and program.
  193. Tanaka,Koichi; Kawakami,Itaru; Kuroda,Yoshisuke; Ishiguro,Ryuji, Information processing method, information processing apparatus and recording medium.
  194. Toru Kambayashi JP; Koichiro Akiyama JP; Shuichi Tsujimoto JP; Kazuo Sumita JP; Hideki Hirakawa JP; Toshihiro Sugaya JP, Information recording apparatus, information reproducing apparatus, and information distribution system.
  195. Abdulkader Omar Barbir CA, Initializer for a confusion data generator.
  196. Philyaw, Jeffry Jovan, Input device having positional and scanning capabilities.
  197. Smola, Michael; Wegertseder, Dominik, Integrated circuit.
  198. Casto, James John; Qureshi, Qadeer Ahmad; Boothby, Hugh William, Integrated circuit package incorporating programmable elements.
  199. Choy David M., Integrated method and system for controlling information access and distribution.
  200. Hoffberg, Steven M., Intelligent electronic appliance system and method.
  201. Lappington John P. ; Marshall Susan K. ; Yamamoto Wayne Y. ; Wilson Cameron A. ; Berkobin Eric C. ; Simons Richard S., Interactive television security through transaction time stamping.
  202. Gressel Carmi David,ILX ; Dror Itai,ILX, Internationally regulated system for one to one cryptographic communications with national sovereignty without key escr.
  203. Crawford Christopher M., Internet online backup system provides remote storage for customers using IDs and passwords which were interactively est.
  204. Bourne,Steve; Dillaway,Blair Brewster; Jacomet,Pierre; Malaviarachchi,Rushmi U.; Parambir,Kumar B.; Rozenfeld,Yevgeniy (Eugene); Venkatesh,Chandramouli; Rose, III,Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  205. Adams Phillip M. (Parowan UT) Holmstron Larry W. (Salt Lake City UT) Jacob Steve A. (South Weber UT) Powell Steven H. (Ogden UT) Condie Robert F. (Tuscon AZ) Culley Martin L. (Tuscon AZ), Kernels, description tables, and device drivers.
  206. Medvinsky,Alexander; Peterka,Petr; Moroney,Paul; Sprunk,Eric, Key management protocol and authentication system for secure internet protocol rights management architecture.
  207. George Gregory Gruse ; Marco M. Hurtado ; Kenneth Louis Milsted ; Jeffrey B. Lotspiech, Key management system for digital content player.
  208. Wyman Robert M. (Kirkland WA), License document interchange format for license management system.
  209. Baratti, Paolo; Squartini, Paolo, License management system.
  210. Christiano Matt (Saratoga CA), License management system for software applications.
  211. Duvvoori Vikram ; Sahai Vikram ; Parthasarathy Balaji ; Waldhauer Neil, License management system using daemons and aliasing.
  212. Franklin Nicholas Huston ; Bodine Bill Guy ; Cook Randall R. ; Gaisford Calvin R. ; Brooks Matthew G. ; Heesch Carla M. ; Sonderegger Kelly E., Licensing controller using network directory services.
  213. Serkowski,Robert J.; Walker,William T., Licensing duplicated systems.
  214. Reneris, Kenneth; Marsh, David J.; Blythe, David R.; Debique, Kirt A., Linking Diffie Hellman with HFS authentication by using a seed.
  215. England Paul ; DeTreville John D. ; Lampson Butler W., Loading and identifying a digital rights management operating system.
  216. Brehmer Gerald M. (Allen Park MI) Hill John P. (Westland MI), Low cost/low current watchdog circuit for microprocessor.
  217. Frank,Alexander; Light,Mark C.; Hall,Martin H., Maintaining and managing metering data for a subsidized computer.
  218. Wyman Robert M. (Kirkland WA), Management interface for license management system.
  219. Armstrong, William Joseph; Nayar, Naresh; Stamschror, Kevin Patrick, Management of a concurrent use license in a logically-partitioned computer.
  220. Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Manipulating rights-to-execute in connection with a software copy protection mechanism.
  221. Carpenter Richard Christopher, Mapping interface for a distributed server to translate between dissimilar file formats.
  222. Liu, Sharon S.; Luehe, Jan, Mechanism for determining restrictions to impose on an implementation of a service.
  223. Sims, III, J Robert, Media content protection utilizing public key cryptography.
  224. Mohammed, Sohail Baig; Debique, Kirt A.; Dunbar, Geoffrey T.; Nelson, Patrick N.; Weiss, Rebecca C.; Barde, Sumedh N.; Sherwani, Adil; Speed, Robin C. B.; Grigorovitch, Alexandre V., Media processing methods, systems and application program interfaces.
  225. Bertin Claude L. (S. Burlington VT) Drake Charles E. (Underhill VT) Fifield John A. (Underhill VT) Hedberg Erik (Essex Junction VT), Memory system reset circuit.
  226. Cutter,Benjamin Brooks; Evans,Brian P.; Strom,Clifford P.; Parks,Michael Jay, Metering accessing of content and the like in a content protection system or the like.
  227. Davies,Trevor; Couling,John David, Method an apparatus for adjusting the time of a clock if it is determined that the degree of adjustment is within a limit based on the clocks initial time.
  228. Aziz Ashar (Fremont CA), Method and apparatus for a key-management scheme for internet protocols.
  229. Coppersmith Don ; Gennaro Rosario ; Halevi Shai ; Jutla Charanjit S. ; Matyas ; Jr. Stephen M. ; Peyravian Mohammed ; Safford David Robert ; Zunic Nevenko, Method and apparatus for advanced symmetric key block cipher with variable length key and block.
  230. Freeman, Thomas D.; Pedersen, Bradley Jay, Method and apparatus for communicating among a network of servers.
  231. Hinckley, Kenneth P.; Sinclair, Michael J.; Szeliski, Richard S.; Conway, Matthew J.; Hanson, Erik J., Method and apparatus for computer input using six degrees of freedom.
  232. Breeden Robert L. (Boynton Beach FL) Muppidi Prabhakar (Boynton Beach FL), Method and apparatus for controlling access to a communication system.
  233. Salas Pito ; Beir Jeffrey ; Leffler Melissa ; Glenn McDonald ; Kleppner Paul ; Morrissey Craig ; Tonra ; Jr. James E., Method and apparatus for controlling access to a product.
  234. Karger,David; Lehman,Eric; Leighton,F. Thomson; Levine,Matthew; Lewin,Daniel; Panigrahy,Rina, Method and apparatus for distributing requests among a plurality of resources.
  235. Ross Cliff D. (Pleasant Grove UT) Taylor Neil W. (Springville UT), Method and apparatus for electronic license distribution.
  236. Ross Cliff D. (Pleasant Grove UT) Taylor Neil W. (Springville UT) Kingdon Kevin W. (Orem UT) Davis Howard R. (Salem UT) Major Drew (Orem UT), Method and apparatus for electronic licensing.
  237. Cooper Thomas Edward ; Philips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing an encryptio.
  238. Al-Salqan, Yahya Y, Method and apparatus for encoding keys.
  239. Kramer, Gerald Arthur; Whitlow, Eric Scott, Method and apparatus for encouraging timely payments associated with a computer system.
  240. Klonowski John L. (Durham NC), Method and apparatus for encrypted communication in data networks.
  241. Kubala,Jeffrey P.; Nick,Jeffrey M.; Yocom,Peter B., Method and apparatus for enforcing capacity limitations in a logically partitioned system.
  242. Garst Blaine ; Serlet Bertrand, Method and apparatus for enforcing software licenses.
  243. Helbig ; Sr. Walter A, Method and apparatus for enhancing computer system security.
  244. Chang Sheue-Ling ; Gosling James, Method and apparatus for enhancing software security and distributing software.
  245. Schell, Roger R.; Kingdon, Kevin W.; Berson, Thomas A.; Jueneman, Robert R., Method and apparatus for escrowing properties used for accessing executable modules.
  246. Matyas ; Jr. Stephen Michael ; Johnson Donald Byron, Method and apparatus for establishing an authenticated shared secret value between a pair of users.
  247. Becker Craig Henry ; Cook John ; Folger Troy Douglas ; Knutson James Irwin, Method and apparatus for extending a java archive file.
  248. Gibbs,Simon; Hoch,Michael; Gauba,Ravi; Liu,Jeff; Wang,Sidney, Method and apparatus for extending protected content access with peer to peer applications.
  249. Salas Pito ; Beir Jeffrey ; Leffler Melissa ; McDonald Glenn ; Kleppner Paul ; Finnegan Neal ; Morrisey Craig ; Crowley Patrick, Method and apparatus for facilitating communication between collaborators in a networked environment.
  250. Mirov Russell Norman ; Onufer Gregory Charles, Method and apparatus for firmware authentication.
  251. Eyer Mark K. (San Diego CA) Moroney Paul (Olivenhain CA), Method and apparatus for incremental delivery of access rights.
  252. Chandersekaran Coimbatore S. ; Gennaro Rosario ; Gupta Sarbari ; Matyas ; Jr. Stephen M. ; Safford David R. ; Zunic Nevenko, Method and apparatus for interoperable validation of key recovery information in a cryptographic system.
  253. Knutson James Irwin, Method and apparatus for licensing computer programs using a DSA signature.
  254. Land, David MacLeod; Getgood, Alan Bruce, Method and apparatus for managing credit inquiries within account receivables.
  255. Freeman, Thomas D.; Gulkis, Daniel Alec; Pedersen, Bradley Jay, Method and apparatus for managing server load.
  256. Shin, Kum-Ho, Method and apparatus for maximizing an advertising effect using a control unit to detect if advertisement is being displayed and suspending a function if advertisement is not displayed.
  257. Frank, Alexander; Duffus, James, Method and apparatus for measuring presentation data exposure.
  258. Setala,Henri, Method and apparatus for medical X-radiography.
  259. Eskelinen,Jaakko Joonas, Method and apparatus for performing single-point projection imaging.
  260. Hanna, Stephen R.; Anderson, Anne H.; Elley, Yassir K.; Perlman, Radia J.; Mullan, Sean J., Method and apparatus for presenting anonymous group names.
  261. Fink,Russell Andrew; Brannigan,Matthew Aloysius; Evans,Shelby Alana; Almeida,Aswin Morgan; Ferguson,Shelley Anne, Method and apparatus for providing adaptive self-synchronized dynamic address translation.
  262. Anthony J. Wasilewski ; Douglas F. Woodhead ; Gary Lee Logston, Method and apparatus for providing conditional access in connection-oriented interactive networks with a multiplicity of service providers.
  263. Frank, Alexander; Steeb, Curt; Duffus, James; Light, Mark C.; Holladay, Martin; Sutton, Paul; Phillips, Thomas; Xu, Zeyong; Xu, Zhangwei, Method and apparatus for provisioning software.
  264. Sirbu Marvin A. ; Tygar J. D. ; Cox Benjamin T. H. ; Wagner Thomas, Method and apparatus for purchasing and delivering digital goods over a network.
  265. Van Dyke Korbin S., Method and apparatus for restricting memory access.
  266. Schmeidler,Yonah; Atkins,Derek; Eichin,Mark W.; Rostcheck,David J., Method and apparatus for secure content delivery over broadband access networks.
  267. Langford Glenn C.,CAX ; Curry Ian H.,CAX, Method and apparatus for secure group communications.
  268. Vu, Son Trung; Phan, Quang, Method and apparatus for secure processing of cryptographic keys.
  269. Bantz, David Frederick; Chefalas, Thomas E.; Karve, Alexei A.; Mastrianni, Steven J., Method and apparatus for selective and quantitative rights management.
  270. Doonan,Wes; Wettlaufer,Albert J.; Lewis,Rone H.; Haber,Stuart A., Method and apparatus for self-authenticating digital records.
  271. Brandt Marcia Lynn ; Destefano George Francis ; Fosdick Eric Leonard ; Mehta Ramila Alexandra ; Prokop Teresa McConville ; Stamschror Kevin Patrick, Method and apparatus for software license management.
  272. Cohen Aaron Michael, Method and apparatus for software licensing electronically distributed programs.
  273. Aziz Ashar (Fremont CA), Method and apparatus for stepping pair keys in a key-management scheme.
  274. Jacobs Herbert H., Method and apparatus for storing and selectively retrieving and delivering product data based on embedded expert judgeme.
  275. Mott Timothy ; Story Guy ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen ; Kocher Paul, Method and apparatus for targeting a digital information playback device.
  276. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for tracking states of digital works.
  277. Krishnarajah,Ainkaran; Soliman,Hesham, Method and apparatus for transporting different classes of data bits in a payload over a radio interface.
  278. Archibald William Charles ; Spielman Terence Paul ; Spielman Jason, Method and apparatus that accounts for usage of digital applications.
  279. Milsted Kenneth Louis ; Nguyen Kha Dinh ; Gong Qing, Method and apparatus to create encoded digital content.
  280. Sengodan, Senthil; Subbiah, Baranitharan, Method and apparatus to provide encryption and authentication of a mini-packet in a multiplexed RTP payload.
  281. Ishiguro Ryuji,JPX ; Osawa Yoshitomo,JPX, Method and device for data decryption, a method and device for device identification, a recording medium, a method of d.
  282. Mollier Jean (Bougival FRX), Method and device for protecting software delivered to a user by a supplier.
  283. Nissl, Klaus; Meinhold, Matthias, Method and device that validates time of an internal source using an external source.
  284. Ortlieb, Thomas E.; Read, Walter, Method and system for adaptive sampling testing of assemblies.
  285. Pasieka, Michael S., Method and system for consumer electronic device certificate management.
  286. Pettitt John Philip, Method and system for controlling distribution of software in a multitiered distribution chain.
  287. Schreiber Daniel,ILX ; Goldman Andrew,ILX, Method and system for copyright protection of digital images transmitted over networks.
  288. Arnold Thomas Andrew ; Pettitt John Philip ; Rendleman ; Jr. Jesse Noel ; Lewis ; Jr. Robert Lincoln, Method and system for delivering digital products electronically.
  289. Powell Robert D. ; Nitzberg Mark J., Method and system for digital image signatures.
  290. Scott Richard Ball ; Joseph H. Greenwald ; Bob Jones ; Kyle Pause, Method and system for enforcing floating licenses.
  291. Molaro,Donald Joseph, Method and system for implementing digital rights management.
  292. Johnson,Douglas Karl; Levine,Lewis J., Method and system for improved correction of registration error in a fluoroscopic image.
  293. Nicholson,Clark D.; Westerinen,William J., Method and system for improved reliability in storage devices.
  294. Benson Greg,SEX ; Urich Gregory H.,SEX, Method and system for managing a data object so as to comply with predetermined conditions for usage.
  295. Wyman Robert M., Method and system for managing execution of licensed programs.
  296. Ahmad Arshad, Method and system for monitoring the use of rented software.
  297. Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
  298. Brice ; Jr. Frank W. ; Hefferon Eugene P. ; Scalzi Casper A. ; Tarcza Richard P., Method and system for providing a hardware machine function in a protected virtual machine.
  299. Salas Pito ; Beir Jeffrey ; Leffler Melissa ; McDonald Glenn ; Dennie Andy ; Kleppner Paul ; Finnegan Neal ; Morrissey Craig ; Steele Alan ; Crowley Patrick, Method and system for providing a networked collaborative work environment.
  300. Heiden, Richard W.; Weiant, Jr., Monroe A., Method and system for revocation of certificates used to certify public key users.
  301. Chan, Shannon; Jensenworth, Gregory; Goertzel, Mario C.; Shah, Bharat; Swift, Michael M.; Ward, Richard B., Method and system for secure running of untrusted content.
  302. Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
  303. Spagna,Richard L.; Zhao,Ting; Geisler,Douglas R.; Mahlbacher,James C., Method and system for securing local database file of local content stored on end-user system.
  304. Douglas, Daniel Graham, Method and system for the exchange of digitally signed objects over an insecure network.
  305. Woo,Je Hak; Lee,Hwan Chul; Cho,Sang Young; Jeong,Seong Ho; Ha,Young Soo; Shin,Seog Kyoon; Kim,Seong Il, Method and system for the information protection of digital content.
  306. Fransdonk, Robert W., Method and system to secure content for distribution via a network.
  307. Fransdonk,Robert W., Method and system to securely distribute content via a network.
  308. Fransdonk,Robert W., Method and system to store and distribute encryption keys.
  309. Goud,Gundrala D.; Zimmer,Vincent J., Method and system to support a trusted set of operational environments using emulated trusted hardware.
  310. Murray, Douglas G., Method and system verifying product licenses using hardware and product identifications.
  311. Fruechtel Ingrid,DEX, Method for debiting shipping services.
  312. Spagna, Richard; Milsted, Kenneth Louis; Lybrand, David P.; Downs, Edgar, Method for delivering electronic content from an online store.
  313. da Silva Luis A., Method for determining a source of failure during a file system access.
  314. Schull Jonathan (Haverford PA), Method for encouraging purchase of executable and non-executable software.
  315. Markl Katrin,DEX ; Freytag Claus,DEX ; Gunther Stephan,DEX ; Kubatzki Ralf,DEX ; Thiel Wolfgang,DEX, Method for entering data into a scale.
  316. Zurko, Mary Ellen; Casey, Jr., Thomas Andrew; Gasser, Morrie; Hall, Judith Shelhorse; Kahn, Clifford Earl; Mason, Andrew Halstead; Sawyer, Paul Douglas; Kendall, Leslie Richard; Lipner, Steven B., Method for executing trusted-path commands.
  317. Hazard Michel (Mareil sur Mauldre FRX), Method for generating a random number in a data processing system/and system for implementing the method.
  318. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  319. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  320. Bobich, Thomas; Brachet, Carl-Manuel; Gray, Robert; Hinman, John, Method for minimizing financial risk for wireless services.
  321. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system.
  322. Filepp Robert ; Appleman Kenneth H. ; Bidwell Alexander W. ; Wolf Allan M. ; Galambos James A. ; Meo Sam, Method for presenting applications in an interactive service.
  323. Larsson Jeffrey E. ; Richardson Alan ; Steckler Paul A., Method for preventing software piracy during installation from a read only storage medium.
  324. Carr,Jeffrey D, Method for processing multiple security policies applied to a data packet structure.
  325. Lee, Tae-seung; Lee, Sang-seo, Method for protecting data stored in lost mobile terminal and recording medium therefor.
  326. Ahmet Mursit Eskicioglu, Method for protecting the audio/visual data across the NRSS interface.
  327. Davis Derek L. (Phoenix AZ), Method for providing a roving software license from one node to another node.
  328. Martin Seysen DE, Method for secure distribution of data.
  329. Angelo, Michael F.; Michels, Peter J., Method for securely creating, storing and using encryption keys in a computer system.
  330. Graunke Gary L. ; Carbajal John ; Maliszewski Richard L. ; Rozas Carlos V., Method for securely distributing a conditional use private key to a trusted entity on a remote system.
  331. Sarvar Patel, Method for securing over-the-air communication in a wireless system.
  332. Christie,David S.; Strongin,Geoffrey S.; McGrath,Kevin J., Method for selectively disabling interrupts on a secure execution mode-capable processor.
  333. Cognigni,Giorgio; Presciutti,Alessio, Method of controlling use of digitally encoded products.
  334. Merriman Dwight Allen ; O'Connor Kevin Joseph, Method of delivery, targeting, and measuring advertising over networks.
  335. Amberg Richard D. ; Wong Roger ; Lynch Michael,IEX, Method of installing software on and/or testing a computer system.
  336. Perlman Radia J. (Acton MA) Kaufman Charles W. (Northborough MA), Method of issuance and revocation of certificates of authenticity used in public key networks and other systems.
  337. Rothrock,Lewis V., Method of providing adaptive security.
  338. Miki Mullor IL; Julian Valiko IL, Method of restricting software operation within a license limitation.
  339. Epstein Michael A., Method of secure anonymous query by electronic messages transported via a public network and method of response.
  340. Abrams, Peter C.; Bharadhwaj, Rajeev; Nathan, Swami; Rodriguez, Robert; Martyn, Craig W., Method system and apparatus for providing pay-per-use distributed computing resources.
  341. Scott D. Lincke ; Ronald Marianetti, II ; Jeffrey C. Hawkins, Method, system and apparatus for packet minimized communications.
  342. Scott,Mark; Wong,William; Cheng,Anita; Ho,Simon; Irimescu,George; Voineag,Dorel; Yao,Min; Zadeh,Row J., Method, system, and computer program product for managing database servers and service.
  343. Baldev Krishan ; Leo Chien Chang ; Ronald G. Lambert, Methods and apparatus for delivering targeted information and advertising over the internet.
  344. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  345. Yacobi,Yacov; England,Paul; Yuval,Gideon A., Methods and apparatus for protecting information content.
  346. James O'Toole ; M. Frans Kaashoek, Methods and apparatus for remote configuration of an appliance on a network.
  347. Wilt,Nicholas P.; Nene,Sameer A.; Beda, III,Joseph S., Methods and system for managing computational resources of a coprocessor in a computing system.
  348. Alkove, James M.; Estrop, Stephen J., Methods and systems for protecting media content.
  349. Rao, Raghunath K., Methods for surround sound simulation and circuits and systems using the same.
  350. Holden,James M.; Levin,Stephen E.; Nickel,James O.; Wrench,Edwin H., Methods of operating portable computerized device with network security.
  351. Hind, John R.; Peters, Marcia Lambert, Methods, systems and computer program products for rule based firmware updates utilizing certificate extensions and certificates for use therein.
  352. O'Leary Daniel J. ; Jeffries Robin, Methods, systems, and computer program products for storing, loading, analyzing, and sharing references to recently used objects.
  353. Hayakashi, Yoshiki, Microcomputer and information processing system.
  354. Shinzaki, Takashi, Mobile electronic apparatus having function of verifying a user by biometrics information.
  355. Schell, Roger R.; Jueneman, Robert R.; Gayman, Mark G., Module authentication and binding library extensions.
  356. Rose, Anthony, Monitoring of computer-related resources and associated methods and systems for allocating and disbursing compensation.
  357. Ogrodski Albert V. (Anaheim CA), Monolithic random digital noise generator.
  358. Sporer Michael ; Kline Mark H. ; Zawojski Peter, Motion video processing circuit for capture playback and manipulation of digital motion video information on a computer.
  359. Kikuchi,Yoshihiro; Masuda,Tadaaki; Nagai,Takeshi, Moving image coding apparatus and decoding apparatus.
  360. Chen James F. ; Wang Jieh-Shan ; Brook Christopher T. ; Garvey Francis, Multi-access virtual private network.
  361. Ramzan,Zulfikar Amin; Gentry,Craig B.; Bruhn,Bernhard, Multi-certificate revocation using encrypted proof data for proving certificate's validity or invalidity.
  362. Siu,Michael Yiu Kwan; Strom,Clifford Paul; Evans,Brian Patrick, Multi-level nested open hashed data stores.
  363. Williams Timothy C., Multi-level security network system.
  364. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Multi-site software license balancing.
  365. Yeung, Minerva Ming-Yee; Holliman, Matthew J.; Liu, Robert G.; Macy, William W.; Yeo, Boon-Lock, Multimedia data delivery and playback system with multi-level content and privacy protection.
  366. Nakamura Kenji (Hadano JPX), Multimedia network system.
  367. Hull,Jonathan J.; Gormish,Michael J.; Piersol,Kurt W., Multimedia output device having embedded encryption functionality.
  368. Marco M. Hurtado ; George Gregory Gruse ; Edgar Downs ; Kenneth Louis Milsted, Multimedia player for an electronic content delivery system.
  369. Goldwasser Shafi (Cambridge MA) Kilian Joseph (Cambridge MA) Wigderson Avi (Jerusalem ILX) Ben-Or Michael (Jerusalem ILX), Multiprover interactive verification system.
  370. Anshel Michael M. (New York NY) Gertner Izidor C. (New York NY) Goldfeld Dorian (Tenafly NJ) Klebansky Boris A. (Demarest NJ), Multistream encryption system for secure communication.
  371. Schell, Roger R.; Kingdon, Kevin W.; Berson, Thomas A., Nested strong loader apparatus and method.
  372. Woest Karen L. (Wauwatosa WI) Stark James K. (Wauwatosa WI) Rasmussen David E. (Wales WI), Network control system with improved reliability.
  373. Carter Stephen R. ; LaVange ; Jr. Donald H. ; Jensen Delos C., Network license authentication.
  374. Conte Brian ; Hui Christine ; Key Roger, Network license compliance apparatus and method.
  375. Kawamoto, Youji; Hidaka, Isao; Tsunoda, Tomohiro, Network system, network server and terminal device for recording, converting, and transmitting information conformed to a terminal device.
  376. Raike William Michael,NZX, Non-deterministic public key encrypton system.
  377. Ergan, Cenk; Nicholson, Clark D.; Teodosiu, Dan; DeWhitt, Dean L.; Hill, Emily Nicole; Kodavalla, Hanumantha R.; Zwilling, Michael J.; Parchem, John M.; Fortin, Michael R.; Obr, Nathan Steven; Nagar, Rajeev Y.; Verma, Surenda; Powell, Therron; Westerinen, William J.; Zbikowski, Mark Joseph; Stemen, Patrick L., Non-volatile memory cache performance improvement.
  378. Peterson Gregory W. (Lyons CO) Kurzawa Leonard J. (Broomfield CO), Non-volatile memory storage and bilevel index structure for fast retrieval of modified records of a disk track.
  379. Bourne,Steven; Malik,Prashant; Krishnaswamy,Vinay; Shobe, Jr.,James B.; Venkatesh,Chandramouli; Narin,Attila, Obtaining a signed rights label (SRL) for digital content and obtaining a digital license corresponding to the content based on the SRL in a digital rights management system.
  380. Ronning Joel A., On-line try before you buy software distribution system.
  381. Lovelace John V. ; Nevis Bryon S., Operating system bootstrap security mechanism.
  382. Aas, Eric; Nuttall, Gordon R., Optical imaging device with speed variable illumination.
  383. Angert Joseph C., Pad encryption method and software.
  384. Schmuck Frank B. ; Wyllie James Christopher ; Engelsiepen Thomas E., Parallel file system and method with extensible hashing.
  385. McNesby John (Mesa AZ) Kalla Amritpal S. (Cupertino CA) Rodriguez Angel (Jackson NJ), Parallel scrambler used in sonet data transmission.
  386. Lee Byeong Gi (Seoul KRX) Kim Seok Chang (Seoul KRX), Parallel scrambling system.
  387. Chu William W. Y., Password protected modular computer method and device.
  388. Quoc Vu ; Wen-Syan Li ; Edward Chang, Personalized navigation trees.
  389. Derek L. Davis ; Howard C. Herbert, Platform and method for assuring integrity of trusted agent communications.
  390. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  391. Evans, Brian P.; Strom, Clifford P.; Dunbar, Geoffrey; Prologo, Richard D., Playlist burning in rights-management context.
  392. Alkove, James M.; Debique, Kirt A.; Grigorovitch, Alexandre V.; Powell, William C.; McKune, Jeffrey Richard, Policy engine and methods and systems for protecting data.
  393. Phillips,Thomas G; Schoppa,Christopher A; Westerinen,William J; Myers,Mark A, Portable computing environment.
  394. Phillips, Thomas G; Schoppa, Christopher A; Westerinen, William J; Myers, Mark A, Portable computing environment solution.
  395. Ung, Dara; Titus, Mark, Prepaid real-time web based reporting.
  396. Buchheit,Marcellus; Winzenried,Oliver, Procedure for the protection of computer software and/or computer-readable data as well as protective equipment.
  397. Brian Baker, Process and streaming server for encrypting a data stream.
  398. Morten,Glenn A.; Baker,Brian, Process and streaming server for encrypting a data stream to a virtual smart card client system.
  399. Zurko, Mary Ellen; Casey, Jr., Thomas Andrew; Gasser, Morrie; Hall, Judith Shelhorse; Kahn, Clifford Earl; Mason, Andrew Halstead; Sawyer, Paul Douglas; Kendall, Leslie Richard; Lipner, Steven B., Processing trusted commands in trusted and untrusted environments.
  400. Peinado,Marcus; Venkatesan,Ramarathnam; Davis,Malcolm, Producing a new black box for a digital rights management (DRM) system.
  401. Shimizu, Yusuke; Uchida, Yoichi; Adachi, Seiji; Hammond, Eric Rayburn; Noguchi, Yasuhiro; Heilman, III, Paul Mitchell; Poling, Jr., Daniel Luke, Program data distribution via open network.
  402. Ganesan Ravi, Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public crypt.
  403. Alkove,James M.; Knowlton,Chadd; Dunbar,Geoffrey, Protected media path and refusal response enabler.
  404. Dunbar,Geoffrey; Chu,Chengyun; Alkove,James M., Protected media path and refusal response enabler.
  405. England, Paul; Peinado, Marcus; Sankaranarayan, Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  406. Roberts David J. (Eastleigh GB2) Simmons John (Chandlers Ford GB2), Protection of data processing system against unauthorized programs.
  407. Goodman,Steven Dale; Hoff,James Patrick; Springfield,Randall Scott; Ward,James Peter, Proving BIOS trust in a TCPA compliant system.
  408. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.
  409. Patrick E. Patterson, Regulating access to digital content.
  410. Peinado,Marcus; England,Paul; Yerrace,Frank, Releasing decrypted digital content to an authenticated path.
  411. Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Remote access terminal security.
  412. Hicks, Christian Bielefeldt; Creath, Peter Janssen, Remote authorization for unlocking electronic data system and method.
  413. Jean-Marc Frailong ; Charles A. Price ; Joseph John Tardo, Remote reconfiguration of a secure network interface.
  414. Phillips, Thomas G; Schoppa, Christopher A; Westerinen, William J; Myers, Mark A, Remote services for portable computing environment.
  415. Schneier Bruce ; Walker Jay ; Jorasch James, Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic an.
  416. Evans, Brian P.; Strom, Clifford P.; Parks, Michael Jay, Rendering digital content in a content protection system according to a plurality of chained digital licenses.
  417. Peinado, Marcus; Manferdelli, John L.; Bell, Jeffrey R. C., Rendering digital content in an encrypted rights-protected form.
  418. Jain, Amit; Cutter, Benjamin Brooks; Evans, Brian P.; Strom, Clifford P., Retention of information about digital-media rights in transformed digital media content.
  419. Rabne Michael W. ; Barker James A. ; Alrashid Tareq M.T. ; Christian Brian S. ; Cox Steven C. ; Slotta Elizabeth A. ; Upthegrove Luella R., Rights management system for digital media.
  420. Davis Derek L. (Phoenix AZ), Roving software license for a hardware agent.
  421. Knee Derek L. ; Davis Bradley K., Scanning mouse for a computer system.
  422. Wang,Chung Wei; Chou,Yuan Hsu, Scanning unit suitable for applications with a high-speed scanning requirement.
  423. Saito, Takeshi; Hashimoto, Mikio; Kambayashi, Toru; Akiyama, Koichiro, Scheme for realizing communications through external network from contents processing device connected to local network in home environment.
  424. Ogawa Kiyotaka,JPX ; Kohiyama Kiyoshi,JPX ; Akiyama Ryota,JPX ; Iijima Kiyokatsu,JPX, Scrambling and descrambling of data with improved security.
  425. Davis Derek L., Secure BIOS.
  426. Arbaugh William A. ; Farber David J. ; Keromytis Angelos D. ; Smith Jonathan M., Secure and reliable bootstrap architecture.
  427. Komarla,Eshwari P.; Zimmer,Vincent J., Secure booting and provisioning.
  428. Parks,M. Jay; Helin,Jonas Fredrik, Secure clock on computing device such as may be required in connection with a trust-based system.
  429. Nordenstam, Jan Olof; Hansson, Allan, Secure distribution and protection of encryption key information.
  430. Downs, Edgar; Gruse, George Gregory; Hurtado, Marco M.; Medina, Cesar; Milsted, Kenneth Louis, Secure electronic content management system.
  431. Floyd Michel ; Horstmann Cay S., Secure electronic software packaging using setup-external unlocking module.
  432. Bush,Ronald Roscoe, Secure encryption of data packets for transmission over unsecured networks.
  433. Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
  434. Underwood, Roy Aaron, Secure gateway interconnection in an e-commerce based environment.
  435. Walker, Jay; Schneier, Bruce, Secure improved remote gaming system.
  436. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  437. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  438. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  439. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  440. Evans,Glenn F.; Bradstreet,John, Secure media path methods, systems, and architectures.
  441. Holtey Thomas O. (Newton MA), Secure memory card with programmed controlled security access control.
  442. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure network file access control system.
  443. Ananda, Mohan, Secure on-line PC postage metering system.
  444. Philip R. Wiser ; Andrew R. Cherenson ; Steven T. Ansell ; Susan A. Cannon, Secure online music distribution system.
  445. Folmsbee, Alan, Secure program execution using instruction buffer interdependencies.
  446. Ananda Mohan (15910 Ventura Blvd. ; Suite 800 Encino CA 91436), Secure software rental system using continuous asynchronous password verification.
  447. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  448. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  449. Sites, Richard L., Secure time on computers with insecure clocks.
  450. Hsiang,Peter C.; Chock,Raymond O.; Hess,Mark, Secure transaction microcontroller with secure boot loader.
  451. Puhl Larry C. ; Vogler Dean H. ; Dabbish Ezzat A., Secure wireless electronic-commerce system with digital product certificates and digital license certificates.
  452. Robert L. Geiger ; Jyh-Han Lin ; Rajiv Mehta, Secure wireless electronic-commerce system with wireless network domain.
  453. Marchant Brian E., Security apparatus for data transmission with dynamic random encryption.
  454. Marchant Brian E., Security apparatus for data transmission with dynamic random encryption.
  455. Marchant Brian E., Security apparatus for data transmission with dynamic random encryption.
  456. Phillips, Thomas G; Schoppa, Christopher A; Westerinen, William J; Myers, Mark A, Security features for portable computing environment.
  457. Kuroda Yasutsugu,JPX, Security level control apparatus and method for a network securing communications between parties without presetting th.
  458. Jensenworth Gregory ; Garg Praerit ; Swift Michael M. ; Goertzel Mario C. ; Chan Shannon J., Security model using restricted tokens.
  459. Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a client proxy.
  460. Medvinsky, Alexander; Sprunk, Eric J., Self-generation of certificates using secure microprocessor in a device for transferring digital information.
  461. Ryder ; Sr. John H. (Durham NC) Smith Susanna R. (Tampa FL), Self-verifying receipt and acceptance system for electronically delivered data objects.
  462. Wiseman, Willard M.; Grawrock, David W.; Brickell, Ernie; Wood, Matthew D.; Cihula, Joseph F., Session key exchange.
  463. Davis John E. (Reseda CA), Shadow memory system for storing variable backup blocks in consecutive time periods.
  464. Shin Kil-Ho,JPX ; Kobayashi Kenichi,JPX ; Aratani Toru,JPX, Signing method and apparatus using the same.
  465. Matias, Yossi; Mayer, Alain Jules; Silberschatz, Abraham, Simplified secure shared key establishment and data delivery protocols for electronic commerce.
  466. Montgomery, Michael A., Smart card application-selection.
  467. Bereiter Thomas William, Software auditing mechanism for a distributed computer enterprise environment.
  468. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  469. Takahashi Toshinari,JPX ; Nogami Hiroyasu,JPX, Software distribution system and software utilization scheme for improving security and user convenience.
  470. Yamamura Kazuyuki,JPX, Software license control system and software license control equipment.
  471. Park Hyo Joon,KRX, Software license control system based on independent software registration server.
  472. Frison Michael R. ; Kirchberger Bela L., Software pay per use licensing system.
  473. Pavlin, Dominique Vincent; Sotoodeh, Mehdi; Tibbetts, Reed H.; Godding, Patrick N.; Spiewek, Alain Raymond; Nixon, Roger Graham, Software protection device and method.
  474. Taaffe James L. (74 Appleton St. Arlington MA 02174), Software security method and systems.
  475. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  476. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  477. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  478. Rhoads Geoffrey B. (West Linn OR), Steganography methods employing embedded calibration data.
  479. Steed David L., Step motor actuated continuously variable shock absorber.
  480. Iguchi,Shinya; Tsunehiro,Takashi; Tsunoda,Motoyasu; Ishihara,Haruji; Mizushima,Nagamasa; Totsuka,Takashi, Storage device including a non-volatile memory.
  481. Wee,Susie J.; Apostolopoulos,John G., Storage devices for secure scalable data streaming.
  482. Howell, Gareth; Jones, Thobias M.; Mulye, Nishad; Virdi, Gurpratap, Strategies for processing media information using a plug-in processing module in a path-agnostic manner.
  483. Peinado,Marcus; Abburi,Rajasekhar; Bell,Jeffrey R. C., Structural of digital rights management (DRM) system.
  484. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Bell,Jeffrey R. C., Structure of a digital content package.
  485. Dan Asit ; Ramaswami Rajiv ; Sitaram Dinkar, Support for portable trusted software.
  486. Delpuch,Alain; Whitledge,James; Menand,Jean Rene; Barbier,Emmanuel; Hausman,Kevin; Hensgen,Debra; Su,Dongmin, Supporting common interactive television functionality through presentation engine syntax.
  487. Merino Gonzalez Jose L. (Madrid ESX) Ortiz Saenz Fernando (Madrid ESX) Burriel Luna Rafael (Majadahonda ESX) Ortega Rodriguez Fernando (Majadahonda ESX) Menendez Martin Ana Ma del Mar (Madrid ESX), Synchronous system for parallel data scrambling.
  488. Doherty, Robert J.; Tierney, Peter L.; Arnaoutoglou-Andreou, Marios, System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files.
  489. Taylor David R. P. ; Lynch-Freshner Lawrence A. ; McKinlay Eric W. ; Pacheco Stephen P. ; Goyal Dinesh K., System and method for a communication system.
  490. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  491. Musgrave Clyde ; Dulude Robert S., System and method for authenticating electronic transactions using biometric certificates.
  492. Kusumoto, Laura Lee; Sacerdoti, Earl David; Sigler, Leila Janine; Sigler, Sonya Lee, System and method for consumer-selected advertising and branding in interactive media.
  493. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  494. Davis Derek L., System and method for copy-protecting distributed video content.
  495. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
  496. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for data recovery.
  497. Whitehouse Harry T., System and method for dispensing postage based on telephonic or web milli-transactions.
  498. Lipscomb,Kenneth O.; Petritis,John B.; Robison,Richard D.; Morrison,Kelly P.; Hirsch,Michael D.; Muntz,Eric Neal; Whitehead, III,John Paul, System and method for distributing media assets to user devices via a portal synchronized by said user devices.
  499. Sutton, II,James A.; Grawrock,David W., System and method for execution of a secured environment initialization instruction.
  500. Watanabe, Ryoji; Fung, Henry T.; Schwartz, Paul D., System and method for installing and servicing an operating system in a computer or information appliance.
  501. Strunk, David D.; Kephart, Aaron D.; Liseski, Steven J.; Fields, Robin M., System and method for interactive advertising.
  502. Bolle, Rudolf Maarten; Connell, Jonathan Hudson; Ratha, Nalini K., System and method for liveness authentication using an augmented challenge/response scheme.
  503. Frank,Alexander; Light,Mark C.; Westerinen,William J., System and method for maintaining persistent state data.
  504. Erickson John S., System and method for managing copyrighted electronic media.
  505. Rose John R., System and method for managing try-and-buy usage of application programs.
  506. Hair, Arthur R., System and method for manipulating a computer file and/or program.
  507. Hall ; III Sheldon F. ; Stoikoff Ivan T., System and method for offering and providing secured credit card products.
  508. Agrawal,Rakesh; Kiernan,Gerald George; Srikant,Ramakrishnan; Xu,Yirong, System and method for order-preserving encryption for numeric data.
  509. Angelo Michael F. ; Olarig Sompong P. ; Wooten David R. ; Driscoll Dan J., System and method for performing secure device communications in a peer-to-peer bus architecture.
  510. Cheung, Colman, System and method for prioritizing packetized data from a distributed control environment for transmission through a high bandwidth link.
  511. Frank, Alexander; Phillps, Thomas G., System and method for programming an isolated computing environment.
  512. Lockhart Roland T.,CAX ; Wiener Michael J.,CAX, System and method for protecting a multipurpose data string used for both decrypting data and for authenticating a user.
  513. Chess David M. ; Sorkin Gregory Bret ; White Steve Richard, System and method for protecting integrity of alterable ROM using digital signatures.
  514. Ichikawa Bryan K., System and method for providing security in data communication systems.
  515. Sohail B. Mohammed ; Kipley J. Olson, System and method for regulating a network service provider's ability to host distributed applications in a distributed processing environment.
  516. Othmer Konstantin ; Derossi Chris, System and method for remotely monitoring a plurality of computer-based systems.
  517. Grawrock,David W.; Sutton, II,James A., System and method for resetting a platform configuration register.
  518. Brunheroto, Jose R.; Laemen, Frans; Nogima, Julio; Schaffa, Frank A.; Anzick, William J., System and method for searching patterns in real-time over a shared media.
  519. Bull, John A.; Otway, David J., System and method for secure distribution of digital information to a chain of computer system nodes in a network.
  520. Fox, Barbara L.; Waters, Lester L.; Spelman, Jeffrey F.; Seidensticker, Robert B.; Thomlinson, Matthew W., System and method for secure electronic commerce transaction.
  521. Misra Pradyumna K. ; Graziadio Bradley J. ; Spies Terence R., System and method for software licensing.
  522. Misra,Pradyumna K.; Graziadio,Bradley J.; Spies,Terence R., System and method for software licensing.
  523. Voth Duane J., System and method for synchronizing time across a computer cluster.
  524. Frank,Alexander; Westerinen,William J., System and method for trustworthy metering and deactivation.
  525. Aull,Kenneth W.; McCullough,Vincent J.; Northrup,James I., System and method for usage of a role certificate in encryption and as a seal, digital stamp, and signature.
  526. Chilimbi, Trishul M., System and method for using data address sequences of a program in a software development tool.
  527. Frank,Alexander; England,Paul, System and method to lock TPM always 'on' using a monitor.
  528. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  529. Onoe Takutaro ; Chiang Jason Yi-Yu, System for collecting detailed internet information on the basis of the condition of activities of information viewers v.
  530. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  531. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  532. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
  533. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  534. Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
  535. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  536. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  537. Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
  538. Steven Karl Schoch ; Paul Swart, System for controlling the use of licensed software.
  539. Strong Hovey R. (San Jose CA), System for decoupling clock amortization from clock synchronization.
  540. Slik David,CAX ; Byrne Shannon,CAX, System for distributing digital information.
  541. Riebe,Heinrich Henning; Aldis,David, System for persistently encrypting critical software data to control the operation of an executable software program.
  542. Osborn William R., System for preventing electronic memory tampering.
  543. Clark Paul C. (4705 Broad Brook Dr. Bethesda MD 20814), System for protecting computers via intelligent tokens or smart cards.
  544. Libicki Charles M., System for protecting weight verification device private key.
  545. Freeny ; Jr. Charles C. (Fort Worth TX), System for reproducing information in material objects at a point of sale location.
  546. Diersch Hans-Joerg,DEX ; Gruendler Rainer,DEX ; Stefan Kaden,DEX ; Michels Ingo,DEX, System for securing protected software from unauthorized use in computer networks.
  547. Richardson ; III Frederic B. (Brookvale AUX), System for software registration.
  548. Mori Ryoichi (Tokyo JPX), System for storing history of use of programs including user credit data and having access by the proprietor.
  549. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  550. Guillou Louis C. (Bourgbarre FRX), System for transmitting information provided with means for controlling access to the information transmitted.
  551. Guheen, Michael F.; Mitchell, James D.; Barrese, James J., System method and article of manufacture for building, managing, and supporting various components of a system.
  552. Nguyen Trong ; Subramanian Mahadevan P. ; Haller Daniel R., System, method and article of manufacture for a gateway system architecture with system administration information accessible from a browser.
  553. Fuh You-Chin Gene ; Meier Michael Stephen ; Pan Hsin, System, method and program for debugging external programs in client/server-based relational database management systems.
  554. Gunyakti,Caglar; Hatlelid,Kristjan E.; Zhang,Ning; Tan,Xiaoxi, Systems and methods for deterring software piracy in a volume license environment.
  555. McKune,Jeffrey R.; Chu,Chengyun; Alkove,James M.; Barde,Sumedh; Grigorovitch,Alexandre, Systems and methods for disabling software components to protect digital media.
  556. Waxman, Peter David; Narin, Attila; Cottrille, Scott; Krishnaswamy, Vinay; DeMello, Marco A.; Venkatesh, Chandramouli; Byrum, Frank D.; Bourne, Steve, Systems and methods for issuing usage licenses for digital content and services.
  557. Maher,David P.; Rudd,James M.; Swenson,Eric J.; Landsman,Richard A., Systems and methods for managing and protecting electronic content and applications.
  558. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  559. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  560. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  561. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  562. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  563. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  564. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  565. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  566. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  567. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  568. Comerford Liam D. (Carmel NY) Ledermann Peter G. (Pleasantville NY) Levy Lawrence I. (Yorktown Heights NY) White Steve R. (New York NY), Tamper resistant packaging for information protection in electronic circuitry.
  569. Circenis, Edgar; Diamant, John R., Tamper-evident data management.
  570. Piosenka Gerald V. (Scottsdale AZ) Harrison David M. (Mesa AZ) Chandos Ronald V. (Tempe AZ), Tamperproof arrangement for an integrated circuit device.
  571. Wang, Zhenyu; Ma, Qingming, Technique for implementing high performance stable storage hierarchy in a computer network.
  572. Greenberg Burton (New York NY), Television program transmission verification method and apparatus.
  573. Peterson ; Jr. Mendel Lazear, Time based availability to content of a storage medium.
  574. Crane, Randall T.; Hastings, Brian L., Tracking pointing device motion using a single buffer for cross and auto correlation determination.
  575. Fierstein,Scott J.; Evans,Brian P.; Dunbar,Geoffrey T.; Alkove,James M.; Rosenstein,Daniel; Howard,Matthew; Ma,Ming; Grigorovitch,Alexandre Vicktorovich, Transcryption of digital content between content protection systems.
  576. Sehr Richard P., Travel system and methods utilizing multi-application passenger cards.
  577. Griffin Claire ; Barnes Douglas, Trusted delegation system.
  578. Cutter, Benjamin Brooks; Evans, Brian P.; Strom, Clifford P.; Khandelwal, Vikas, Trusted license removal in a content protection system or the like.
  579. Marino ; Jr. Joseph T. (Fountain Hill AZ) Lambert Paul A. (Scottsdale AZ), Uniform interface for cryptographic services.
  580. Ginter Thomas,DEX, Updating mechanism for user programs in a computer system.
  581. Vogel, Keith R.; Chase, Charlie D.; Yiu, Kelvin S.; Hallin, Philip J.; Thomas, Louis K., Updating trusted root certificates on a client computer.
  582. Granger Mark J. ; Smith Cyrus E. ; Hoffman Matthew I., Use of pseudocode to protect software from unauthorized use.
  583. Bourne,Steven; DeMello,Marco A.; Cahill,Jason; Antonoff,Lauren; Venkatesh,Chandramouli; Malik,Prashant, Using a flexible rights template to obtain a signed rights label (SRL) for digital content in a rights management system.
  584. Bourne, Steven; Venkatesh, Chandramouli; Krishnaswamy, Vinay, Using a rights template to obtain a signed rights label (SRL) for digital content in a digital rights management system.
  585. Hind, John R.; Peters, Marcia L., Using device certificates for automated authentication of communicating devices.
  586. Paresh Patel GB; Ku Lee ; Roger Reider ; Drew Kittel ; Lolo Lasida, Vault controller based registration application serving web based registration authorities and end users for conducting electronic commerce in secure end-to-end distributed information system.
  587. Scott A. Vanstone CA; Donald B. Johnson, Verification protocol.
  588. Welsh Russell J. (Toronto CAX), Video monitoring system.
  589. Martinez Ronald ; Schneier Bruce ; Guerin Greg, Virtual property system.
  590. Flavin Robert Alan ; Nihal Perwaiz ; Perez Ronald ; Smith Sean William, Watchdog for trusted electronic content distributions.
  591. Finch Richard (Austin TX) Schieve Eric (Austin TX), Watchdog timer for computer system reset.
  592. Kral, Joseph Michael, Window and door closing mechanism.
  593. Park,Kenneth James, Wireless device having a secure clock authentication method and apparatus.
  594. Ganesan Ravi (Arlington VA), Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography.
  595. Angert Joseph C., pad encryption method and software.
  596. Clapp Craig S.K., w-bit non-linear combiner for pseudo-random number generation.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로