$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Securing digital content system and method 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-029/06
  • G06F-021/60
  • H04L-009/08
  • H04L-009/32
  • G06F-021/62
출원번호 US-0553209 (2014-11-25)
등록번호 US-9191376 (2015-11-17)
발명자 / 주소
  • Phillips, II, Eugene B.
  • Ornstein, Seth
출원인 / 주소
  • Digital Reg of Texas, LLC
대리인 / 주소
    McGuireWoods LLP
인용정보 피인용 횟수 : 0  인용 특허 : 116

초록

A system and method of encrypting digital content in a digital container and securely locking the encrypted content to a particular user and/or computer or other computing device is provided. The system uses a token-based authentication and authorization procedure and involves the use of an authenti

대표청구항

1. A computer-implemented method for protecting electronic content, the method comprising the steps of: storing an asymmetric decryption key that is associated with a digital electronic container;receiving client device footprint data from a client device;creating a re-key value using both the clien

이 특허에 인용된 특허 (116)

  1. Anoop Gupta ; David M Bargeron, Accessing annotations across multiple target media streams.
  2. Ji Shuang ; Chen Eva ; Liang Yung-Chang ; Tsai Warren,TWX, Apparatus and method for electronic mail virus detection and elimination.
  3. Houha James A. ; Freedman Gordon J., Apparatus and method for preprocessing computer programs prior to transmission across a network.
  4. Hoyt Daniel M. ; Lee Robin M. ; Lickiss Alan L., Automated contract negotiator/generation system and method.
  5. Wesinger ; Jr. Ralph E. ; Coley Christopher D., Automated on-line information service and directory, particularly for the world wide web.
  6. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Automated system for management of licensed software.
  7. Dixon Michael D., Bi-directional process-to-process byte stream protocol.
  8. Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding digital content to a portable storage device or the like in a digital rights management (DRM) system.
  9. Boris,Ann S.; Rohtbart,Daniel; Murphy,Jeffrey, Computer system for portable digital data capture and data distribution.
  10. Benson Glenn,DEX, Computer system for protecting a file and a method for protecting a file.
  11. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  12. Walker Jay S. ; Lech Robert R. ; Van Luchene Andrew S. ; Sparico Thomas M. ; Jorasch James A. ; Schneier Bruce, Conditional purchase offer management system for event tickets.
  13. Blumenau Trevor, Content display monitor.
  14. Blumenau,Trevor, Content display monitoring by a processing system.
  15. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  16. Hasegawa,Satoshi, Data transmission system for prevention of unauthorized copy of data from recording medium.
  17. Yoshida Hideki,JPX ; Segawa Hideo,JPX ; Imai Toru,JPX, Decryption key management scheme for software distribution system.
  18. Patterson, Patrick E., Delivering electronic content.
  19. Patterson,Patrick E., Delivering electronic content.
  20. Gifford David K., Digital active advertising.
  21. Tycksen ; Jr. Frank A. ; Jennings Charles W., Digital product dissemination and sale.
  22. Sesma Jimmy L., Digital product execution control.
  23. Grimes,Tom; Mai,Khanh, Digital rights management.
  24. Parks,M. Jay; Helin,Jonas Fredrik, Digital rights management (DRM) encryption and data-protection for content on a relatively simple device.
  25. Parks,M. Jay; Peinado,Marcus; Helin,Jonas Fredrik; Strom,Clifford P., Digital rights management (DRM) encryption and data-protection for content on device without interactive authentication.
  26. Renaud Benjamin J., Digital signatures for data streams and data archives.
  27. Allan, David Ian; Larose, Gordon Edward, Distribution and controlled use of software products.
  28. Cho Won-bong,KRX ; Lee Sang-youl,KRX ; Hwang Ho-woong,KRX, E-mail processing method.
  29. Venkatraman Rajamadam C. ; Chern Vincent Min-Hao ; Nanja Sekaran ; Gujarathi Haresh, E-mail program capable of transmitting, opening and presenting a container having digital content using embedded executable software.
  30. Elgamal Taher (Palo Alto CA), Electronic commerce using a secure courier system.
  31. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  32. Smith Jeffrey C. ; Bandini Jean-Christophe, Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof.
  33. Thorne John ; Davis Marie L. ; Strauss Michael J., Electronic mail security.
  34. Yamazaki Nobuhide,JPX, Electronic mail system and electronic mail access acknowledging method.
  35. Kohler Timothy L., Electronic mail with recipient-specific content.
  36. Kazmierczak Gregory J. (Plainsboro NJ) Michener John R. (Neshanic Station NJ) Smith Kathryn M. (Somerville NJ), Encrypted data package record for use in remote transaction metered data system.
  37. Olsen James E. ; Bringhurst Adam L., Fault tolerant electronic licensing system.
  38. Dunbar,Geoffrey T.; Ternasky,Joseph D.; Debique,Kirt A.; Crow,William M., Image file container.
  39. Renaud Benjamin J. ; Pampuch John C. ; Hodges Wilsher Avril E., Implementing digital signatures for data streams and data archives.
  40. Levergood Thomas Mark ; Stewart Lawrence C. ; Morris Stephen Jeffrey ; Payne Andrew C. ; Treese George Winfield, Internet server access control and monitoring systems.
  41. Griswold Gary N., Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a.
  42. Apte Jitendra, Mechanism for enabling secure electronic transactions on the open internet.
  43. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven cond.
  44. Wang David Shan-Ming ; Hsu P. Robert, Method and apparatus for certified electronic mail messages.
  45. Donoho David Leigh ; Hindawi David Salim ; Lippincott Lisa Ellen, Method and apparatus for computed relevance messaging.
  46. Cooper Thomas Edward ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-d.
  47. Maillard Michel,FRX ; Benardeau Christian,FRX ; Dauvois Jean-Luc,FRX, Method and apparatus for encrypted data stream transmission.
  48. Eyer Mark K. (San Diego CA) Shumate Allen (Poway CA), Method and apparatus for impulse purchasing of packaged information services.
  49. Lang Gerald S. (812 Downs Dr. Silver Spring MD 20904), Method and apparatus for protecting material on storage media and for transferring material on storage media to various.
  50. Beecher David A. (Kirkland WA), Method and apparatus for protection of software in an electronic system.
  51. Dureau Vincent Louis ; Girons Regis St.,FRX, Method and apparatus for seamless connectivity of wide-band networks and narrow-band networks.
  52. Davis Owen ; Jain Vidyut, Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource d.
  53. Raley,Michael; Chen,Daniel; Wu,Hsi Cheng; Ta,Thanh, Method and apparatus for validating security components through a request for content.
  54. Mollier Jean (Bougival FRX), Method and device for protecting software delivered to a user by a supplier.
  55. Redpath Richard J., Method and system for efficiently notifying an information copy recipient in an electronic mail system.
  56. Benson Greg,SEX ; Urich Gregory H.,SEX, Method and system for managing a data object so as to comply with predetermined conditions for usage.
  57. Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
  58. Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
  59. Woo,Je Hak; Lee,Hwan Chul; Cho,Sang Young; Jeong,Seong Ho; Ha,Young Soo; Shin,Seog Kyoon; Kim,Seong Il, Method and system for the information protection of digital content.
  60. Greenstein Bret A., Method for blocking all unwanted e-mail (SPAM) using a header-based password.
  61. Williams Marvin L. (Lewisville TX), Method for confirmation of document recipient in a data processing system.
  62. Schull Jonathan (Haverford PA), Method for encouraging purchase of executable and non-executable software.
  63. Ruckdashel Glenn A., Method for notifying an individual of a previously scheduled event.
  64. Wolfe Everett W. (Lauderdale Lakes FL), Method of controlling the copying of software.
  65. Venkatraman Rajamadam C. ; Chern Vincent Min-Hao ; Nanja Sekaran ; Gujarathi Haresh, Method of processing an E-mail message that includes a representation of an envelope.
  66. Mages Kenneth G. ; Feng Jie, Method of secure server control of local media via a trigger through a network for instant local access of encrypted da.
  67. Mages Kenneth G. ; Feng Jie ; Mages Kent, Method of securing the playback of a DVD-ROM via triggering data sent via a cable network.
  68. Chou Wayne W. (Ridgefield CT) Kulinets Joseph M. (Stamford CT) Elteto Laszlo (Stamford CT) Engel Frederik (Wilton CT), Method of software distribution protection.
  69. Janacek, Robert; Muchhala, Mahesh, Method of transferring data from a sender to a recipient during which a unique account for the recipient is automatically created if the account does not previously exist.
  70. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  71. Nemovicher,Kerry, Methods, software programs, and systems for electronic information security.
  72. Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
  73. Payne Andrew C. ; Stewart Lawrence C. ; Mackie David J., Network sales system.
  74. Walker Jay S. ; Jorasch James A. ; Carson Gregory G., Parallel data network billing and collection system.
  75. Montulli Lou, Persistant client state in a hypertext transfer protocol based client-server system.
  76. Baker, Brian, Process and streaming server for encrypting a data stream.
  77. Brian Baker, Process and streaming server for encrypting a data stream.
  78. Patrick E. Patterson, Regulating access to digital content.
  79. Manduley Flavio M., Remote activation of software features in a data processing device.
  80. Philip R. Wiser ; Andrew R. Cherenson ; Steven T. Ansell ; Susan A. Cannon, Secure online music distribution system.
  81. Wiser, Philip R.; Cherenson, Andrew R.; Ansell, Steven T.; Cannon, Susan A., Secure online music distribution system.
  82. Venters, III,Carl Vernon; Phillips, II,Eugene B.; Ornstein,Seth, Secure streaming container.
  83. Kirsch Steven T., Secure, convenient and efficient system and method of performing trans-internet purchase transactions.
  84. Blumenthal Michael S. ; Barthel Daniel J. ; Newman Bruce ; Newman Brenda S., Secured electronic information delivery system having a three-tier structure.
  85. Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a key recovery agent.
  86. Kikinis Dan, Simulcast WEB page delivery using a 3D user interface system.
  87. Pearce David B. ; Hughes Aidan, Software anti-piracy system that adapts to hardware upgrades.
  88. Chernow Fred (360 Kiowa Pl. Boulder CO 80303) Peterson Randy J. (1330 Arapahoe St. Boulder CO 80302), Software distribution system.
  89. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  90. Donald Thomas C. (2651 Rillwood Rd. Birmingham AL 35243) Donald Henry W. (428 Lakewood Dr. Homewood AL 35209), Software protection system.
  91. Nielsen Jakob, Subscribed update monitors.
  92. Dolphin Janet L. (Milpitas CA), System and method for access control for portable data storage media.
  93. Dolphin Janet L. (Milpitas CA), System and method for access control for portable data storage media.
  94. Dolphin Janet L. (Milpitas CA), System and method for access data control.
  95. Rusnak David J. ; Zientara John T., System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet.
  96. Powell Ken R., System and method for distributing coupons through a system of computer networks.
  97. Erickson John S., System and method for managing copyrighted electronic media.
  98. Erickson, John S., System and method for managing copyrighted electronic media.
  99. Rose John R., System and method for managing try-and-buy usage of application programs.
  100. Uchida Wataru,JPX ; Nozaki Tsutomu,JPX, System for broadcasting electronic mails that separately stores and sends a portion of electronic mails with an access code for filtering and retrieving purpose.
  101. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  102. Stefik Mark J. ; Pirolli Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  103. Slik David,CAX ; Byrne Shannon,CAX, System for distributing digital information.
  104. Kupka,Michael S.; Hawkins,Michael L.; Thomas,Trent M., System for keying protected electronic data to particular media to prevent unauthorized copying using a compound key.
  105. Freeny ; Jr. Charles C. (Fort Worth TX), System for reproducing information in material objects at a point of sale location.
  106. Richardson ; III Frederic B. (Brookvale AUX), System for software registration.
  107. Ohmura Kazunori,JPX, System for tracking information copied from a web page and sent via electronic mail.
  108. Kahn Robert E. ; Ely David K., System for uniquely and persistently identifying, managing, and tracking digital objects.
  109. Rudd, James M., Systems and methods for managing the distribution of electronic content.
  110. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  111. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  112. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  113. Patterson, Patrick E., Tracking electronic component.
  114. Patterson, Patrick E., Tracking electronic content.
  115. Mourad,Magda M.; Munson,Jonathan P.; Nadeem,Tamer; Pacifici,Giovanni; Pistoia,Marco; Youssef,Alaa S., Transparent digital rights management for extendible content viewers.
  116. Igura Toshinori (Shizuoka JPX) Fukuda Masaru (Shizuoka JPX), Waterproofness checking jig for a waterproof connector.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로