$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Protected media pipeline 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04N-007/16
  • G06F-021/10
  • H04L-029/06
  • H04N-021/426
  • H04N-021/436
  • H04N-021/4627
  • H04N-021/8355
  • G11B-020/00
출원번호 US-0116689 (2005-04-27)
등록번호 US-9363481 (2016-06-07)
발명자 / 주소
  • Grigorovitch, Alexandre
  • Knowlton, Chadd
  • Debique, Kirt
  • Alkove, James
  • Dunbar, Geoffrey T.
  • Barde, Sumedh N.
출원인 / 주소
  • MICROSOFT TECHNOLOGY LICENSING, LLC
대리인 / 주소
    Gabryjelski, Henry
인용정보 피인용 횟수 : 0  인용 특허 : 512

초록

A system for processing a media content comprising an application space, a media control mechanism operating in the application space, the media control mechanism controlling the operation of the system, a user interface adapted to provide input to the media control mechanism, a protected space dist

대표청구항

1. A system comprising a computing device and at least one software module that are together configured for processing media content, the system comprising: a media source having an input and an output, the media source configured for operating in a protected space provided within the computing devi

이 특허에 인용된 특허 (512)

  1. Edward M. Scheidt ; Ersin L. Domangue, Access control and authorization system.
  2. Vetro, Anthony; Divakaran, Ajay; Sun, Huifang, Adaptable compressed bitstream transcoder.
  3. Outram John D. (Taylor\s Lane Bosham ; Chichester W. Sussex GB2 P018 8QQ) Outram Richard G. (Clarence Street Darmouth Devon GB2 TQ6 9NW), Adaptive data logger.
  4. Cuccia David ; Epstein Michael A. ; Pasieka Michael S., Administration and utilization of secret fresh random numbers in a networked environment.
  5. Blair,Paul; Hansen,Kurt L.; Seifert,Dean, Airline ticket payment and reservation system and methods.
  6. Kasai, Naruhiko; Furuhashi, Tsutomu; Kurihara, Hiroshi; Kato, Nobutaka; Mori, Masashi; Hiruta, Yukio, Analog interface display apparatus with color display control.
  7. Brosh Scott (Arlington TX) Wright Timothy (Lake Dallas TX), Anti-counterfeiting process using lenticular optics and color masking.
  8. Mansell,David Hennah; Nonweiler,Michael Robert; Middleton,Peter Guy, Apparatus and method for controlling access to a memory.
  9. Chang, Chin-chi, Apparatus and method for coordinated music playback in wireless ad-hoc networks.
  10. Tardo, Joseph John; Frailong, Jean-Marc; Mendoza, Harold Lee; Haris, Shiv, Apparatus and method for cryptographic-based license management.
  11. Kocher,Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  12. Ezaki Tadashi,JPX ; Hirai Jun,JPX, Apparatus and method for effectively inhibiting unauthorized copying of picture signals which does not interfere with an authorized display thereof.
  13. Huddleston Paul M. (Stone Mountain GA) Porter ; Jr. G. Burns (Doraville GA) Rooney David T. (Marietta GA), Apparatus and method for monitoring an energy management system.
  14. Chou Wayne W. ; Elteto Laszlo ; Kulinets Joseph M. ; LaRussa Joseph, Apparatus and method for preventing theft of computer devices.
  15. Robert J. Gray, Apparatus and method for providing and authentication system.
  16. Muratani Hirofumi,JPX ; Muto Akihiro,JPX, Apparatus and method for receiving and decrypting encrypted data and protecting decrypted data from illegal use.
  17. Arnold Todd Weston, Apparatus and method for secure distribution of data.
  18. James L. Howard, Jr. ; Pennington J. Hess ; James A. MacStravic, Apparatus and methods for managing key material in heterogeneous cryptographic assets.
  19. Anselm Anthony C., Apparatus for affixing a strain wire into the wiring of flexible electric conduit.
  20. Russ, Samuel H.; Gaul, Michael A.; Wasilewski, Anthony J.; Pinder, Howard G., Apparatus for entitling and transmitting service instances to remote client devices.
  21. Lem Paulus M. (Wilnis NLX), Apparatus for monitoring the replay of audio/video information carriers.
  22. Robert D. Cassagnol ; Douglas M. Dillon ; David S. Kloper ; Sandra J. Weber ; Brandon E. Bautz, Apparatus for providing a secure processing environment.
  23. Takeda Masaru (Saitama JPX), Apparatus for transferring information between different window systems.
  24. Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
  25. Lal,Vishal; Singhal,Umesh; Chakravorthy,Jyothirmoy; Reddy,Rajesh T S, Application rights management in a mobile environment.
  26. Lacombe,John; Galloway,Jeffery L.; Majni,Tim, Application-level software watchdog timer.
  27. Hofsss Michael (Vaihingen/Enz DEX) Nitschke Werner (Ditzingen DEX) Schweren Harald (Korntal-Mnchingen DEX) Angerbauer Margit (Stuttgart DEX), Arrangement for testing a watchdog circuit.
  28. Marsh,David J, Associating content with households using smart cards.
  29. Berson William ; Bernobich Elizabeth ; Heiden Richard W. ; Potoczek Richard A. ; Sisson Robert W. ; Violante Anthony F., Auditable security system for the generation of cryptographically protected digital data.
  30. Schipper John F. ; Loomis Peter V. W. ; Pelley Allan M. ; Janky James M. ; Sheynblat Len, Authentication of a message source.
  31. Parsons,Donald; Edwards,Judith; McCoy,Donald; Block,James, Automated banking machine component authentication system and method.
  32. Harris,Walter; Zajkowski,Timothy, Automated banking machine key loading system and method.
  33. Kenneth Louis Milsted ; Craig Kindell ; Qing Gong, Automated method and apparatus to package digital content for electronic distribution using the identity of the source content.
  34. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Automated system for management of licensed software.
  35. Lockwood Lawrence B., Automatic business and financial transaction processing system.
  36. Sherwani, Adil A.; Punniamoorthy, Pranavakumar; Deshpande, Rajesh A; Rambhia, Avni H.; Kuhn, Reid J.; Van Dyke, Clifford P., Automatic update of computer-readable components to support a trusted environment.
  37. Chronister Clyde H. (6115 Bermuda Dunes Houston TX 77069), Ball valve having replaceable seals under full service pressure.
  38. Wiedemer John D. (930 W. Forest Dr. Houston TX 77079), Billing system for computer software.
  39. Frank, Alexander, Binding a device to a computer.
  40. Peinado,Marcus, Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like.
  41. Leung,Yuen Yu; Peinado,Marcus; Strom,Clifford P., Binding digital content to a portable storage device or the like in a digital rights management (DRM) system.
  42. Arai Yoshinori,JPX ; Suzuki Masakazu,JPX, CT scanning apparatus.
  43. Jankowitz Charles M. ; Matula Valentine C. ; Munson Gary A. ; Wu Fang, Call handling method for credit and fraud management.
  44. Geer ; Jr. Daniel E. ; Tumblin Henry R., Certifying authorization in computer networks.
  45. Ahdout, Isaac; Hall, Martin H.; Xu, Zhangwei, Changing product behavior in accordance with license.
  46. Hartman ; Jr. Robert C. (Woodside CA), Client/server based secure timekeeping system.
  47. Hartman ; Jr. Robert C. (Woodside CA), Client/server based secure timekeeping system.
  48. Norskog, Allen C., Combined pointing device and bar code scanner.
  49. Farris Robert D. ; McDermott Christine D., Common channel signaling event detection and control.
  50. Proudler,Graeme John; Chan,David, Communications between modules of a computing apparatus.
  51. Venners Howard W. (Indianapolis IN) Beyers Jr. Billy W. (Greenfield IN) Hailey James E. (Indianapolis IN), Component audio/video system with timed control of plural peripheral devices.
  52. Stefik,Mark J.; Pirolli,Peter L. T., Composite digital works having usage rights and method for creating the same.
  53. Rich, Bruce Arland; Yarsa, Julianne; Shrader, Theodore Jack London; Skibbie, Donna, Composite keystore facility apparatus and method therefor.
  54. Pearson,Siani Lynne; Chan,David, Computer platforms and their methods of operation.
  55. Curry Ian,CAX ; Van Oorschot Paul C.,CAX, Computer security system and method with on demand publishing of certificate revocation lists.
  56. Chelliah Raman ; Cornez Jason S. ; Dellar Carl ; Harrison Stephen ; Hempe John A. ; Hsu Chih-Cheng ; Golin Eric J. ; Price Charles A. ; Rutta Neal S. ; Wood Thomas A. ; Yamamoto Wayne K., Computer system and method for electronic commerce.
  57. Angelo, Michael F.; Wisecup, George David; Collins, David L., Computer system having security features for authenticating different components.
  58. Griffin,Jonathan, Computer system operable to revert to a trusted state.
  59. Challener,David Carroll; Goodman,Steven Dale; Reinberg,Kevin Michael; Springfield,Randall Scott; Ward,James Peter, Computer system with selectively available immutable boot block code.
  60. Yasuhiro Ishibashi JP, Computer system, and video decoder used in the system.
  61. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  62. Sullivan Robert R. ; Acken John M. ; Aucsmith David W., Conditional access and content security method.
  63. Auerbach,Alan B.; Murphy,Shawn M.; Smith,Walter R, Configurable collection of computer related metric data.
  64. Hurst,Leon; Durand,Julian; Wilkinson,Jeffrey Miles; Michael,Mulligan, Consumption of content.
  65. Candelore,Brant L., Content distribution for multiple digital rights management.
  66. Matsuyama,Shinako; Ishibashi,Yoshihito; Futamura,Ichiro; Kon,Masashi; Watanabe,Hideaki, Content distribution system authenticating a user based on an identification certificate identified in a secure container.
  67. Traw Chandler Brendan Stanton ; Aucsmith David Wayne, Content protection for transmission systems.
  68. Chase, Jr.,Charlie David; Ganesan,Krishnamurthy; Lafornara,Philip J.; McKune,Jeffrey Richard; Strom,Clifford Paul; Gajjala,Vijay K., Content revocation and license modification in a digital rights management (DRM) system on a computing device.
  69. Okamoto,Ryuichi; Tokuda,Katsumi; Miura,Kouji, Content usage management system and server used in the system.
  70. Thomas Schmidt DE; Karl-Heinz Knobl DE, Control circuit for a microcontroller.
  71. Sprong Katherine A. ; Sprong Donald J., Controlled usage software.
  72. Havens, Darryl E.; Kishan, Arun U.; Ward, Richard B., Creating secure process objects.
  73. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  74. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  75. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Cryptographic identification, financial transaction, and credential device.
  76. Wack,C. Jay; Scheidt,Edward M.; Kolouch,James L., Cryptographic key split binder for use with tagged data elements.
  77. Matthew W. Thomlinson ; Scott Field ; Allan Cooper, Cryptographic protection of core data secrets.
  78. Takeda Noriko,JPX ; Shinoda Seiichi,JPX ; Haseyama Toshio,JPX, Cryptosystem.
  79. Nonaka, Akira; Ezaki, Tadashi, Data distribution system and method thereof, data processing device, data control device, and machine-readable recording medium recording distribution data.
  80. Cromer, Daryl Carvis; Freeman, Joseph Wayne; Goodman, Steven Dale; Kern, Eric Richard; Springfield, Randall Scott, Data processing system and method for password protecting a boot device.
  81. Okaue,Takumi, Data processing system, data processing method, and program providing medium.
  82. Horning Randall (Longmont CO), Data protection system using different levels of reserve power to maintain data in volatile memories for any period of t.
  83. MacKay,Michael K.; Sibert,W. Olin; Landsman,Richard A.; Swenson,Eric J.; Hunt,William, Data protection systems and methods.
  84. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  85. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  86. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  87. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  88. Snowdon, Dave; Glance, Natalie S., Decentralized network system.
  89. Frank,Alexander; Phillips,Thomas G.; Reilly,George V., Delicate metering of computer usage.
  90. Cross,David B.; Gu,Jianrong; Benaloh,Josh D.; Jones,Thomas C.; Leach,Paul J.; Pittaway,Glenn D., Deriving a symmetric key from an asymmetric key for file encryption or decryption.
  91. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  92. Cutter, Jr.,Benjamin Brooks; Strom,Clifford Paul; Evans,Brian Patrick; Jain,Amit; Siu,Michael Yui Kwan, Device certificate self-individualization.
  93. Okuyama Takehiko,JPX ; Shimoda Kenji,JPX ; Endoh Kenjiro,JPX, Device having a digital interface and a network system using such a device and a copy protection method.
  94. Garg, Rahul; Mittal, Parul Alok; Modani, Natwar, Differential rewards with dynamic user profiling.
  95. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  96. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  97. Medina, Cesar; Gong, Qing; Milsted, Kenneth Louis, Digital content preparation system.
  98. Yoshiura Hiroshi,JPX ; Takaragi Kazuo,JPX ; Sasaki Ryoichi,JPX ; Susaki Seiichi,JPX ; Toyoshima Hisashi,JPX ; Saito Tsukasa,JPX, Digital data authentication method.
  99. Katz Donald R. ; Lau Edwin J. ; Mott Timothy ; Brenneman Scott A. ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen, Digital information library and delivery system with logic for generating files targeted to the playback device.
  100. Peinado,Marcus; Abburi,Rajasekhar; England,Paul; Ganesan,Krishnamurthy; Bell,Jeffrey R. C.; Blinn,Arnold N.; Jones,Thomas C., Digital license and method for obtaining/providing a digital license.
  101. Miller,Eric, Digital rights management negotiation for streaming media over a network.
  102. England Paul ; DeTreville John D. ; Lampson Butler W., Digital rights management operating system.
  103. Peinado, Marcus; Liu, Donna; Ganesan, Krishnamurthy, Digital rights management system operating on computing device and having black box tied to computing device.
  104. Hsu, Jay; Zadrozny, Stanley, Digital wireless telephone system for downloading software to a digital telephone using wireless data link protocol.
  105. Anderson David B. ; Gaertner Mark A. ; Forehand Monty A. ; Norman ; Jr. Robert W., Disc storage system having a non-volatile cache to store write data in the event of a power failure.
  106. Lasker Jeffrey M. (Marlboro MA) McGillis James M. (Franklin MA), Disk controller with volatile and non-volatile cache memories.
  107. Jonathan Clark, Distributed execution software license server.
  108. Patterson David M. ; Williams Eugene E., Distributed method of and system for maintaining application program security.
  109. Angela C. W. Lai ; James Peter Hoddie ; Howard E. Chartock ; Christopher V. Pirazzi ; Giovanni M. Agnoli ; Harry A. Chomsky ; Steve H. Chen ; Hitoshi Hokamura, Distributed on-demand media transcoding system and method.
  110. Narayanaswamy, Shankar, Document transcoding system and method for mobile stations and wireless infrastructure employing the same.
  111. Browning Luke Matthew ; Cremel Olivier Alain Denis ; Peek Jeffrey Scott, Efficient forking of a process.
  112. Caronni Germano ; Waldvogel Marcel,CHX, Efficient, secure multicasting with global knowledge.
  113. Germer Warren R. (Dover NH) Balch Richard A. (Rochester NH), Electric meter with electronic rolling demand register.
  114. Moribatake, Hidemi; Okamoto, Tatsuaki, Electronic cash implementing method and equipment using user signature and recording medium recorded thereon a program for the method.
  115. Bode Hans-Joergen (Mnchen DEX) Lueders Klaus (Markt Schwaben DEX), Electronic component with a shift register test architecture (boundary scan).
  116. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  117. Sudia Frank W. ; Asay Alan ; Brickell Ernest F. ; Ankney Richard ; Freund Peter C. ; Yung Marcel M. ; Kravitz David W., Electronic cryptographic packing.
  118. Ulrich Bryce ; Discolo Anthony ; Alam Salim, Electronic mail object synchronization between a desktop computer and mobile device.
  119. Dvorkis Paul (Stony Brook NY) Thomas Ralph (East Patchogve NY) Goren David (Ronkonkoma NY) Fuller Robert (Pataskala OH) Goldner Leonard H. (Cold Spring Harbor NY), Electronic stylus type optical reader.
  120. Campbell William C. (Longmont CO) Blair Barry O. (Lafayette CO), Electronic system with variable threshold power failure signaling.
  121. Keiichi Iwamura JP, Electronic watermark system electronic information distribution system and image filing apparatus.
  122. Zhang, Minda; Mehta, Pranav H., Enabling secure communications with a client.
  123. Peinado, Marcus; Venkatesan, Ramarathnam, Encrypting a digital object based on a key ID selected therefor.
  124. Peinado,Marcus; Venkatesan,Ramarathnam, Encrypting a digital object on a key ID selected therefor.
  125. Matsuzaki Natsume,JPX ; Harada Syunji,JPX ; Tatebayashi Makoto,JPX, Encryption apparatus for ensuring security in communication between devices.
  126. Lieblich,Jason; Norman,Dustin, End user risk management.
  127. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Enforcement architecture and method for digital rights management.
  128. Abburi,Rajasekhar; Alkove,James M.; McNeill,William P.; McKune,Jeffrey R., Enforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices.
  129. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  130. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  131. Westerinen, William J.; Carpenter, Todd L.; Frank, Alexander; Schmidt, Shon; Drake, Stephen Richard; Foster, David James; Yu, Tse-Ching James, Enhanced packaging for PC security.
  132. Wade Jack (La Jolla CA) Szaroletta William K. (Des Moines IA) Madden Thomas R. (San Diego CA), Enhanced security system for computing devices.
  133. Marsh,David J, Enhancing smart card usage for associating media content with households.
  134. Smith Sean William ; Weingart Steve Harris, Establishing and employing the provable untampered state of a device.
  135. Yang,Ming Hsuan, Face recognition using kernel fisherfaces.
  136. Lebizay Gerald (Vence NY FRX) Lien Yeong-Chang (Briarcliff Manor NY) Taso Michael M. (Yorktown Heights NY), Fault tolerant switch with selectable operating modes.
  137. Alam Salim ; Bhalerao Vinayak A. ; Wu Charles ; Hu George ; Ferrell John I., File object synchronization between a desktop computer and a mobile device.
  138. Sekar Chandersekaran ; Sarbari Gupta, Framework-based cryptographic key recovery system.
  139. Storey Thomas W., Fully integrated, on-line interactive frequency and award redemption program.
  140. Becker Seth P. ; Becker Paul J. ; Becker Scott E. ; Lombardo Paul V., Gemstons identification tracking and recovery system.
  141. Alcorn, Byron A., Graphical display system and method.
  142. Renton Paul (14926 20th SW. Seattle WA 98166), Hard drive security system.
  143. Zimmer,Vincent J.; Bulusu,Mallik, Hardened extended firmware interface framework.
  144. Circenis, Edgar, Hardware based utilization metering.
  145. Marsh, David J.; Reneris, Kenneth; Blythe, David R.; Debique, Kirt A., Hardware functionality scan for device authentication.
  146. Gordon M. Green ; Robin Anne Maley ; Michael H. Barnett ; Richard Eckerstrom ; Richard Allen Kamm ; Robert J. Keenoy ; Donald Louis Mikkelsen ; Coleman L. Munch ; Jesse N. Randall ; Michael , Health care policy on-line maintenance dissemination and compliance testing system.
  147. Edlund,David J.; Pledger,William A.; Studebaker,R. Todd, Hydrogen purification membranes, components and fuel processing systems containing the same.
  148. Bird Richard M. (Woodland Hills CA) Byrd Houston F. (Lewisville TX), Identification system for broadcast program segments.
  149. Marriott,Greg; Boettcher,Jesse; Dowdy,Thomas; Heller,David; Miller,Jeff; Robbin,Jeffrey L., Image scaling arrangement.
  150. Adan Manolito E. ; Lipscomb Terry M., Image sensing operator input device.
  151. Manolito E. Adan ; Terry M. Lipscomb, Image sensing operator input device.
  152. Koritzinsky Ianne Mae Howards ; Reich John Aurthur, Imaging system protocol handling method and apparatus.
  153. Chateau,Alain; Azema,Jerome; Haidamous,Constantin, Indirect data protection using random key encryption.
  154. Zavrel Robert Joseph, Information handling systems with broadband and narrowband communication channels between repository and display systems.
  155. Nakahara,Tohru; Hiramoto,Takuji; Miura,Kouji; Yamamoto,Masaya; Inoue,Mitsuhiro, Information management system having a common management server for establishing secure communication among groups formed out of a plurality of terminals.
  156. Ishiguro,Ryuji, Information processing apparatus.
  157. Ishiguro,Ryuji, Information processing apparatus for watermarking digital content.
  158. Tanaka,Koichi; Kawakami,Itaru; Kuroda,Yoshisuke; Ishiguro,Ryuji, Information processing method, information processing apparatus and recording medium.
  159. Philyaw, Jeffry Jovan, Input device having positional and scanning capabilities.
  160. Smola, Michael; Wegertseder, Dominik, Integrated circuit.
  161. Casto, James John; Qureshi, Qadeer Ahmad; Boothby, Hugh William, Integrated circuit package incorporating programmable elements.
  162. Choy David M., Integrated method and system for controlling information access and distribution.
  163. Hoffberg, Steven M., Intelligent electronic appliance system and method.
  164. Crawford Christopher M., Internet online backup system provides remote storage for customers using IDs and passwords which were interactively est.
  165. Adams Phillip M. (Parowan UT) Holmstron Larry W. (Salt Lake City UT) Jacob Steve A. (South Weber UT) Powell Steven H. (Ogden UT) Condie Robert F. (Tuscon AZ) Culley Martin L. (Tuscon AZ), Kernels, description tables, and device drivers.
  166. George Gregory Gruse ; Marco M. Hurtado ; Kenneth Louis Milsted ; Jeffrey B. Lotspiech, Key management system for digital content player.
  167. England,Paul; DeTreville,John D.; Lampson,Butler W., Key-based secure storage.
  168. Baratti, Paolo; Squartini, Paolo, License management system.
  169. Christiano Matt (Saratoga CA), License management system for software applications.
  170. Duvvoori Vikram ; Sahai Vikram ; Parthasarathy Balaji ; Waldhauer Neil, License management system using daemons and aliasing.
  171. Franklin Nicholas Huston ; Bodine Bill Guy ; Cook Randall R. ; Gaisford Calvin R. ; Brooks Matthew G. ; Heesch Carla M. ; Sonderegger Kelly E., Licensing controller using network directory services.
  172. Serkowski,Robert J.; Walker,William T., Licensing duplicated systems.
  173. Reneris, Kenneth; Marsh, David J.; Blythe, David R.; Debique, Kirt A., Linking Diffie Hellman with HFS authentication by using a seed.
  174. England Paul ; DeTreville John D. ; Lampson Butler W., Loading and identifying a digital rights management operating system.
  175. Haveson, Ryan A.; Davis, Darren R.; Morris, Max G., Local peer-to-peer digital content distribution.
  176. Brehmer Gerald M. (Allen Park MI) Hill John P. (Westland MI), Low cost/low current watchdog circuit for microprocessor.
  177. Frank,Alexander; Light,Mark C.; Hall,Martin H., Maintaining and managing metering data for a subsidized computer.
  178. Wyman Robert M. (Kirkland WA), Management interface for license management system.
  179. Armstrong, William Joseph; Nayar, Naresh; Stamschror, Kevin Patrick, Management of a concurrent use license in a logically-partitioned computer.
  180. Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Manipulating rights-to-execute in connection with a software copy protection mechanism.
  181. Carpenter Richard Christopher, Mapping interface for a distributed server to translate between dissimilar file formats.
  182. Sims, III, J Robert, Media content protection utilizing public key cryptography.
  183. Kurtze Jeffrey (Nashua NH) Cacciatore Ray (Westford MA) Zawojski Peter (Merrimack NH) Peters Eric C. (Carlisle MA) Walsh ; Jr. John (North Chelmsford MA), Media pipeline with multichannel video processing and playback.
  184. Mohammed, Sohail Baig; Debique, Kirt A.; Dunbar, Geoffrey T.; Nelson, Patrick N.; Weiss, Rebecca C.; Barde, Sumedh N.; Sherwani, Adil; Speed, Robin C. B.; Grigorovitch, Alexandre V., Media processing methods, systems and application program interfaces.
  185. Hori,Yoshihiro; Hioki,Toshiaki; Kanamori,Miwa; Yoshikawa,Takatoshi; Takemura,Hiroshi; Takahashi,Masataka; Hasebe,Takayuki; Furuta,Shigeki; Hatakeyama,Takahisa; Tonegawa,Tadaaki; Anazawa,Takeaki, Memory card and data distribution system using it.
  186. Cutter,Benjamin Brooks; Evans,Brian P.; Strom,Clifford P.; Parks,Michael Jay, Metering accessing of content and the like in a content protection system or the like.
  187. Davies,Trevor; Couling,John David, Method an apparatus for adjusting the time of a clock if it is determined that the degree of adjustment is within a limit based on the clocks initial time.
  188. Coppersmith Don ; Gennaro Rosario ; Halevi Shai ; Jutla Charanjit S. ; Matyas ; Jr. Stephen M. ; Peyravian Mohammed ; Safford David Robert ; Zunic Nevenko, Method and apparatus for advanced symmetric key block cipher with variable length key and block.
  189. Freeman, Thomas D.; Pedersen, Bradley Jay, Method and apparatus for communicating among a network of servers.
  190. Hinckley, Kenneth P.; Sinclair, Michael J.; Szeliski, Richard S.; Conway, Matthew J.; Hanson, Erik J., Method and apparatus for computer input using six degrees of freedom.
  191. Breeden Robert L. (Boynton Beach FL) Muppidi Prabhakar (Boynton Beach FL), Method and apparatus for controlling access to a communication system.
  192. Salas Pito ; Beir Jeffrey ; Leffler Melissa ; Glenn McDonald ; Kleppner Paul ; Morrissey Craig ; Tonra ; Jr. James E., Method and apparatus for controlling access to a product.
  193. Wyatt,David A.; Faber,Robert W.; Lee,David A.; Traw,Brendan, Method and apparatus for determining scope of content domain.
  194. Ross Cliff D. (Pleasant Grove UT) Taylor Neil W. (Springville UT) Kingdon Kevin W. (Orem UT) Davis Howard R. (Salem UT) Major Drew (Orem UT), Method and apparatus for electronic licensing.
  195. Cooper Thomas Edward ; Philips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing an encryptio.
  196. Al-Salqan, Yahya Y, Method and apparatus for encoding keys.
  197. Kramer, Gerald Arthur; Whitlow, Eric Scott, Method and apparatus for encouraging timely payments associated with a computer system.
  198. Lyle,James D., Method and apparatus for encrypting data transmitted over a serial link.
  199. Kubala,Jeffrey P.; Nick,Jeffrey M.; Yocom,Peter B., Method and apparatus for enforcing capacity limitations in a logically partitioned system.
  200. Garst Blaine ; Serlet Bertrand, Method and apparatus for enforcing software licenses.
  201. Helbig ; Sr. Walter A, Method and apparatus for enhancing computer system security.
  202. Chang Sheue-Ling ; Gosling James, Method and apparatus for enhancing software security and distributing software.
  203. Schell, Roger R.; Kingdon, Kevin W.; Berson, Thomas A.; Jueneman, Robert R., Method and apparatus for escrowing properties used for accessing executable modules.
  204. Becker Craig Henry ; Cook John ; Folger Troy Douglas ; Knutson James Irwin, Method and apparatus for extending a java archive file.
  205. Salas Pito ; Beir Jeffrey ; Leffler Melissa ; McDonald Glenn ; Kleppner Paul ; Finnegan Neal ; Morrisey Craig ; Crowley Patrick, Method and apparatus for facilitating communication between collaborators in a networked environment.
  206. Lee,David A.; Graunke,Gary L., Method and apparatus for increasing the entropy of a pseudorandom number.
  207. Chandersekaran Coimbatore S. ; Gennaro Rosario ; Gupta Sarbari ; Matyas ; Jr. Stephen M. ; Safford David R. ; Zunic Nevenko, Method and apparatus for interoperable validation of key recovery information in a cryptographic system.
  208. Knutson James Irwin, Method and apparatus for licensing computer programs using a DSA signature.
  209. Land, David MacLeod; Getgood, Alan Bruce, Method and apparatus for managing credit inquiries within account receivables.
  210. Freeman, Thomas D.; Gulkis, Daniel Alec; Pedersen, Bradley Jay, Method and apparatus for managing server load.
  211. Shin, Kum-Ho, Method and apparatus for maximizing an advertising effect using a control unit to detect if advertisement is being displayed and suspending a function if advertisement is not displayed.
  212. Frank, Alexander; Duffus, James, Method and apparatus for measuring presentation data exposure.
  213. Setala,Henri, Method and apparatus for medical X-radiography.
  214. Eskelinen,Jaakko Joonas, Method and apparatus for performing single-point projection imaging.
  215. Fink,Russell Andrew; Brannigan,Matthew Aloysius; Evans,Shelby Alana; Almeida,Aswin Morgan; Ferguson,Shelley Anne, Method and apparatus for providing adaptive self-synchronized dynamic address translation.
  216. Anthony J. Wasilewski ; Douglas F. Woodhead ; Gary Lee Logston, Method and apparatus for providing conditional access in connection-oriented interactive networks with a multiplicity of service providers.
  217. Frank, Alexander; Steeb, Curt; Duffus, James; Light, Mark C.; Holladay, Martin; Sutton, Paul; Phillips, Thomas; Xu, Zeyong; Xu, Zhangwei, Method and apparatus for provisioning software.
  218. Sirbu Marvin A. ; Tygar J. D. ; Cox Benjamin T. H. ; Wagner Thomas, Method and apparatus for purchasing and delivering digital goods over a network.
  219. Schmeidler,Yonah; Atkins,Derek; Eichin,Mark W.; Rostcheck,David J., Method and apparatus for secure content delivery over broadband access networks.
  220. Langford Glenn C.,CAX ; Curry Ian H.,CAX, Method and apparatus for secure group communications.
  221. Brandt Marcia Lynn ; Destefano George Francis ; Fosdick Eric Leonard ; Mehta Ramila Alexandra ; Prokop Teresa McConville ; Stamschror Kevin Patrick, Method and apparatus for software license management.
  222. Mott Timothy ; Story Guy ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen ; Kocher Paul, Method and apparatus for targeting a digital information playback device.
  223. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for tracking states of digital works.
  224. Archibald William Charles ; Spielman Terence Paul ; Spielman Jason, Method and apparatus that accounts for usage of digital applications.
  225. Milsted Kenneth Louis ; Nguyen Kha Dinh ; Gong Qing, Method and apparatus to create encoded digital content.
  226. Ishiguro Ryuji,JPX ; Osawa Yoshitomo,JPX, Method and device for data decryption, a method and device for device identification, a recording medium, a method of d.
  227. Mollier Jean (Bougival FRX), Method and device for protecting software delivered to a user by a supplier.
  228. Chan, Jason; Laksono, Indra, Method and system for accessing data.
  229. Ortlieb, Thomas E.; Read, Walter, Method and system for adaptive sampling testing of assemblies.
  230. Chan,Jason; Laksono,Indra, Method and system for bit-based data access.
  231. Pasieka, Michael S., Method and system for consumer electronic device certificate management.
  232. Pettitt John Philip, Method and system for controlling distribution of software in a multitiered distribution chain.
  233. Schreiber Daniel,ILX ; Goldman Andrew,ILX, Method and system for copyright protection of digital images transmitted over networks.
  234. Arnold Thomas Andrew ; Pettitt John Philip ; Rendleman ; Jr. Jesse Noel ; Lewis ; Jr. Robert Lincoln, Method and system for delivering digital products electronically.
  235. Powell Robert D. ; Nitzberg Mark J., Method and system for digital image signatures.
  236. Bagshaw,Stephen A., Method and system for dual link communications encryption.
  237. Scott Richard Ball ; Joseph H. Greenwald ; Bob Jones ; Kyle Pause, Method and system for enforcing floating licenses.
  238. Molaro,Donald Joseph, Method and system for implementing digital rights management.
  239. Johnson,Douglas Karl; Levine,Lewis J., Method and system for improved correction of registration error in a fluoroscopic image.
  240. Nicholson,Clark D.; Westerinen,William J., Method and system for improved reliability in storage devices.
  241. Benson Greg,SEX ; Urich Gregory H.,SEX, Method and system for managing a data object so as to comply with predetermined conditions for usage.
  242. Ramaley,Alan; Sodt,Andrew; Sonnad,Rahul; Blaine,Ian; Olson,Andrew, Method and system for managing and distributing digital media.
  243. Wyman Robert M., Method and system for managing execution of licensed programs.
  244. Wee,Susie J.; Apostolopoulos,John G., Method and system for midstream transcoding of secure scalable packets in response to downstream requirements.
  245. Ahmad Arshad, Method and system for monitoring the use of rented software.
  246. Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
  247. Brice ; Jr. Frank W. ; Hefferon Eugene P. ; Scalzi Casper A. ; Tarcza Richard P., Method and system for providing a hardware machine function in a protected virtual machine.
  248. Salas Pito ; Beir Jeffrey ; Leffler Melissa ; McDonald Glenn ; Dennie Andy ; Kleppner Paul ; Finnegan Neal ; Morrissey Craig ; Steele Alan ; Crowley Patrick, Method and system for providing a networked collaborative work environment.
  249. Heiden, Richard W.; Weiant, Jr., Monroe A., Method and system for revocation of certificates used to certify public key users.
  250. Krishnan Ganapathy ; Guthrie John ; Oyler Scott, Method and system for securely incorporating electronic information into an online purchasing application.
  251. Yun-Wu Huang ; Roger A. Pollak ; John L. Ponzo, Method and system for synchronizing data using fine-grained synchronization plans.
  252. Fransdonk, Robert W., Method and system to secure content for distribution via a network.
  253. Goud,Gundrala D.; Zimmer,Vincent J., Method and system to support a trusted set of operational environments using emulated trusted hardware.
  254. Murray, Douglas G., Method and system verifying product licenses using hardware and product identifications.
  255. Fruechtel Ingrid,DEX, Method for debiting shipping services.
  256. Spagna, Richard; Milsted, Kenneth Louis; Lybrand, David P.; Downs, Edgar, Method for delivering electronic content from an online store.
  257. da Silva Luis A., Method for determining a source of failure during a file system access.
  258. Schull Jonathan (Haverford PA), Method for encouraging purchase of executable and non-executable software.
  259. Markl Katrin,DEX ; Freytag Claus,DEX ; Gunther Stephan,DEX ; Kubatzki Ralf,DEX ; Thiel Wolfgang,DEX, Method for entering data into a scale.
  260. Zurko, Mary Ellen; Casey, Jr., Thomas Andrew; Gasser, Morrie; Hall, Judith Shelhorse; Kahn, Clifford Earl; Mason, Andrew Halstead; Sawyer, Paul Douglas; Kendall, Leslie Richard; Lipner, Steven B., Method for executing trusted-path commands.
  261. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  262. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  263. Bobich, Thomas; Brachet, Carl-Manuel; Gray, Robert; Hinman, John, Method for minimizing financial risk for wireless services.
  264. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Manferdelli,John L.; Bell,Jeffrey R. C.; Venkatesan,Ramaranthnam; England,Paul; Jakubowski,Mariusz H.; Yu,Hai Ying (Vincent), Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system.
  265. Larsson Jeffrey E. ; Richardson Alan ; Steckler Paul A., Method for preventing software piracy during installation from a read only storage medium.
  266. Ahmet Mursit Eskicioglu, Method for protecting the audio/visual data across the NRSS interface.
  267. Davis Derek L. (Phoenix AZ), Method for providing a roving software license from one node to another node.
  268. Martin Seysen DE, Method for secure distribution of data.
  269. Peled,Ariel; Carny,Ofir; Troyansky,Lidror; Baratz,Arik; Arbel,Oded, Method for securing digital content.
  270. Sarvar Patel, Method for securing over-the-air communication in a wireless system.
  271. Christie,David S.; Strongin,Geoffrey S.; McGrath,Kevin J., Method for selectively disabling interrupts on a secure execution mode-capable processor.
  272. Castillo,Michael J., Method for transcoding MPEG encoded streams.
  273. Cognigni,Giorgio; Presciutti,Alessio, Method of controlling use of digitally encoded products.
  274. Merriman Dwight Allen ; O'Connor Kevin Joseph, Method of delivery, targeting, and measuring advertising over networks.
  275. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Method of extending the validity of a cryptographic certificate.
  276. Amberg Richard D. ; Wong Roger ; Lynch Michael,IEX, Method of installing software on and/or testing a computer system.
  277. Perlman Radia J. (Acton MA) Kaufman Charles W. (Northborough MA), Method of issuance and revocation of certificates of authenticity used in public key networks and other systems.
  278. Miki Mullor IL; Julian Valiko IL, Method of restricting software operation within a license limitation.
  279. Epstein Michael A., Method of secure anonymous query by electronic messages transported via a public network and method of response.
  280. Abrams, Peter C.; Bharadhwaj, Rajeev; Nathan, Swami; Rodriguez, Robert; Martyn, Craig W., Method system and apparatus for providing pay-per-use distributed computing resources.
  281. Evans,John P.; Oren,David; Schwarz,Karl; Squillante,Peter L., Method, apparatus and system for providing multimedia messages to incompatible terminals.
  282. Scott D. Lincke ; Ronald Marianetti, II ; Jeffrey C. Hawkins, Method, system and apparatus for packet minimized communications.
  283. Scott,Mark; Wong,William; Cheng,Anita; Ho,Simon; Irimescu,George; Voineag,Dorel; Yao,Min; Zadeh,Row J., Method, system, and computer program product for managing database servers and service.
  284. Baldev Krishan ; Leo Chien Chang ; Ronald G. Lambert, Methods and apparatus for delivering targeted information and advertising over the internet.
  285. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  286. Yacobi,Yacov; England,Paul; Yuval,Gideon A., Methods and apparatus for protecting information content.
  287. James O'Toole ; M. Frans Kaashoek, Methods and apparatus for remote configuration of an appliance on a network.
  288. Wilt,Nicholas P.; Nene,Sameer A.; Beda, III,Joseph S., Methods and system for managing computational resources of a coprocessor in a computing system.
  289. England,Paul; Peinado,Marcus; Wilt,Nicholas P., Methods and systems for cryptographically protecting secure content.
  290. Alkove, James M.; Estrop, Stephen J., Methods and systems for protecting media content.
  291. Hind, John R.; Peters, Marcia Lambert, Methods, systems and computer program products for rule based firmware updates utilizing certificate extensions and certificates for use therein.
  292. Shinzaki, Takashi, Mobile electronic apparatus having function of verifying a user by biometrics information.
  293. Schell, Roger R.; Jueneman, Robert R.; Gayman, Mark G., Module authentication and binding library extensions.
  294. Rose, Anthony, Monitoring of computer-related resources and associated methods and systems for allocating and disbursing compensation.
  295. Sporer Michael ; Kline Mark H. ; Zawojski Peter, Motion video processing circuit for capture playback and manipulation of digital motion video information on a computer.
  296. Chen James F. ; Wang Jieh-Shan ; Brook Christopher T. ; Garvey Francis, Multi-access virtual private network.
  297. Ramzan,Zulfikar Amin; Gentry,Craig B.; Bruhn,Bernhard, Multi-certificate revocation using encrypted proof data for proving certificate's validity or invalidity.
  298. Siu,Michael Yiu Kwan; Strom,Clifford Paul; Evans,Brian Patrick, Multi-level nested open hashed data stores.
  299. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Multi-site software license balancing.
  300. Teruhiko Suzuki JP; Yoichi Yagasaki JP, Multimedia information retrieval system and method including format conversion system and method.
  301. Marco M. Hurtado ; George Gregory Gruse ; Edgar Downs ; Kenneth Louis Milsted, Multimedia player for an electronic content delivery system.
  302. Goldwasser Shafi (Cambridge MA) Kilian Joseph (Cambridge MA) Wigderson Avi (Jerusalem ILX) Ben-Or Michael (Jerusalem ILX), Multiprover interactive verification system.
  303. Schell, Roger R.; Kingdon, Kevin W.; Berson, Thomas A., Nested strong loader apparatus and method.
  304. Woest Karen L. (Wauwatosa WI) Stark James K. (Wauwatosa WI) Rasmussen David E. (Wales WI), Network control system with improved reliability.
  305. Carter Stephen R. ; LaVange ; Jr. Donald H. ; Jensen Delos C., Network license authentication.
  306. Conte Brian ; Hui Christine ; Key Roger, Network license compliance apparatus and method.
  307. Raike William Michael,NZX, Non-deterministic public key encrypton system.
  308. Ergan, Cenk; Nicholson, Clark D.; Teodosiu, Dan; DeWhitt, Dean L.; Hill, Emily Nicole; Kodavalla, Hanumantha R.; Zwilling, Michael J.; Parchem, John M.; Fortin, Michael R.; Obr, Nathan Steven; Nagar, Rajeev Y.; Verma, Surenda; Powell, Therron; Westerinen, William J.; Zbikowski, Mark Joseph; Stemen, Patrick L., Non-volatile memory cache performance improvement.
  309. Peterson Gregory W. (Lyons CO) Kurzawa Leonard J. (Broomfield CO), Non-volatile memory storage and bilevel index structure for fast retrieval of modified records of a disk track.
  310. Bourne,Steven; Malik,Prashant; Krishnaswamy,Vinay; Shobe, Jr.,James B.; Venkatesh,Chandramouli; Narin,Attila, Obtaining a signed rights label (SRL) for digital content and obtaining a digital license corresponding to the content based on the SRL in a digital rights management system.
  311. Jay F. McLain, Offline viewing of internet content with a mobile device.
  312. Ronning Joel A., On-line try before you buy software distribution system.
  313. Lovelace John V. ; Nevis Bryon S., Operating system bootstrap security mechanism.
  314. Aas, Eric; Nuttall, Gordon R., Optical imaging device with speed variable illumination.
  315. Schmuck Frank B. ; Wyllie James Christopher ; Engelsiepen Thomas E., Parallel file system and method with extensible hashing.
  316. Chu William W. Y., Password protected modular computer method and device.
  317. Balfanz, Dirk; Smetters, Diana K.; Durfee, Glenn E.; Smith, Trevor F., Personal domain controller.
  318. Quoc Vu ; Wen-Syan Li ; Edward Chang, Personalized navigation trees.
  319. Derek L. Davis ; Howard C. Herbert, Platform and method for assuring integrity of trusted agent communications.
  320. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  321. Alkove, James M.; Debique, Kirt A.; Grigorovitch, Alexandre V.; Powell, William C.; McKune, Jeffrey Richard, Policy engine and methods and systems for protecting data.
  322. Phillips,Thomas G; Schoppa,Christopher A; Westerinen,William J; Myers,Mark A, Portable computing environment.
  323. Phillips, Thomas G; Schoppa, Christopher A; Westerinen, William J; Myers, Mark A, Portable computing environment solution.
  324. Ung, Dara; Titus, Mark, Prepaid real-time web based reporting.
  325. Buchheit,Marcellus; Winzenried,Oliver, Procedure for the protection of computer software and/or computer-readable data as well as protective equipment.
  326. Brian Baker, Process and streaming server for encrypting a data stream.
  327. Morten,Glenn A.; Baker,Brian, Process and streaming server for encrypting a data stream to a virtual smart card client system.
  328. Zurko, Mary Ellen; Casey, Jr., Thomas Andrew; Gasser, Morrie; Hall, Judith Shelhorse; Kahn, Clifford Earl; Mason, Andrew Halstead; Sawyer, Paul Douglas; Kendall, Leslie Richard; Lipner, Steven B., Processing trusted commands in trusted and untrusted environments.
  329. Hinsley Stewart R. (Stoke-On-Trent GB3) Hughes Christopher D. (Crewe GB3), Program attribute control in a computer system.
  330. Shimizu, Yusuke; Uchida, Yoichi; Adachi, Seiji; Hammond, Eric Rayburn; Noguchi, Yasuhiro; Heilman, III, Paul Mitchell; Poling, Jr., Daniel Luke, Program data distribution via open network.
  331. Ganesan Ravi, Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public crypt.
  332. Reddy,Karimireddy Hari; Lao,Guillermo; Budo Marek,Andrej, Protected content distribution system.
  333. Alkove,James M.; Knowlton,Chadd; Dunbar,Geoffrey, Protected media path and refusal response enabler.
  334. Dunbar, Geoffrey; Chu, Chengyun; Alkove, James M., Protected media path and refusal response enabler.
  335. Dunbar,Geoffrey; Chu,Chengyun; Alkove,James M., Protected media path and refusal response enabler.
  336. Roberts David J. (Eastleigh GB2) Simmons John (Chandlers Ford GB2), Protection of data processing system against unauthorized programs.
  337. Goodman,Steven Dale; Hoff,James Patrick; Springfield,Randall Scott; Ward,James Peter, Proving BIOS trust in a TCPA compliant system.
  338. Oliveira, Eduardo P.; Alkove, James M.; Prologo, Richard D.; Batterberry, Troy D.; Paka, Anand D., Proximity detection employed in connection with rights management system or the like.
  339. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.
  340. Patrick E. Patterson, Regulating access to digital content.
  341. Peinado,Marcus; England,Paul; Yerrace,Frank, Releasing decrypted digital content to an authenticated path.
  342. Chandra Akhileshwari N. (Mahopac NY) Comerford Liam D. (Carmel NY) White Steve R. (New York NY), Remote access terminal security.
  343. Hicks, Christian Bielefeldt; Creath, Peter Janssen, Remote authorization for unlocking electronic data system and method.
  344. Jean-Marc Frailong ; Charles A. Price ; Joseph John Tardo, Remote reconfiguration of a secure network interface.
  345. Phillips, Thomas G; Schoppa, Christopher A; Westerinen, William J; Myers, Mark A, Remote services for portable computing environment.
  346. Schneier Bruce ; Walker Jay ; Jorasch James, Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic an.
  347. Evans, Brian P.; Strom, Clifford P.; Parks, Michael Jay, Rendering digital content in a content protection system according to a plurality of chained digital licenses.
  348. Peinado, Marcus; Manferdelli, John L.; Bell, Jeffrey R. C., Rendering digital content in an encrypted rights-protected form.
  349. Amin, Samuel; Crites, Brian D.; Debique, Kirt A.; Mohammed, Sohail Baig; Nayak, Niranjan S.; Rudolph, Eric H.; Wilson, Mei L., Resolving partial media topologies.
  350. Jain, Amit; Cutter, Benjamin Brooks; Evans, Brian P.; Strom, Clifford P., Retention of information about digital-media rights in transformed digital media content.
  351. Davis Derek L. (Phoenix AZ), Roving software license for a hardware agent.
  352. Knee Derek L. ; Davis Bradley K., Scanning mouse for a computer system.
  353. Saito, Takeshi; Hashimoto, Mikio; Kambayashi, Toru; Akiyama, Koichiro, Scheme for realizing communications through external network from contents processing device connected to local network in home environment.
  354. Davis Derek L., Secure BIOS.
  355. Arbaugh William A. ; Farber David J. ; Keromytis Angelos D. ; Smith Jonathan M., Secure and reliable bootstrap architecture.
  356. Komarla,Eshwari P.; Zimmer,Vincent J., Secure booting and provisioning.
  357. Parks,M. Jay; Helin,Jonas Fredrik, Secure clock on computing device such as may be required in connection with a trust-based system.
  358. Saunders Keith A.,GBX, Secure data processing method and system.
  359. Nordenstam, Jan Olof; Hansson, Allan, Secure distribution and protection of encryption key information.
  360. Downs, Edgar; Gruse, George Gregory; Hurtado, Marco M.; Medina, Cesar; Milsted, Kenneth Louis, Secure electronic content management system.
  361. Floyd Michel ; Horstmann Cay S., Secure electronic software packaging using setup-external unlocking module.
  362. Minear Spence ; Stockwell Edward B. ; de Jongh Troy, Secure firewall supporting different levels of authentication based on address or encryption status.
  363. Underwood, Roy Aaron, Secure gateway interconnection in an e-commerce based environment.
  364. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  365. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  366. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  367. Evans, Glenn F.; Bradstreet, John, Secure media path methods, systems, and architectures.
  368. Evans,Glenn F.; Bradstreet,John, Secure media path methods, systems, and architectures.
  369. Holtey Thomas O. (Newton MA), Secure memory card with programmed controlled security access control.
  370. Pham, Duc; Nguyen, Tien Le; Zhang, Pu Paul; Lo, Mingchen, Secure network file access control system.
  371. Philip R. Wiser ; Andrew R. Cherenson ; Steven T. Ansell ; Susan A. Cannon, Secure online music distribution system.
  372. Folmsbee, Alan, Secure program execution using instruction buffer interdependencies.
  373. Ananda Mohan (15910 Ventura Blvd. ; Suite 800 Encino CA 91436), Secure software rental system using continuous asynchronous password verification.
  374. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  375. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  376. Hsiang,Peter C.; Chock,Raymond O.; Hess,Mark, Secure transaction microcontroller with secure boot loader.
  377. Puhl Larry C. ; Vogler Dean H. ; Dabbish Ezzat A., Secure wireless electronic-commerce system with digital product certificates and digital license certificates.
  378. Robert L. Geiger ; Jyh-Han Lin ; Rajiv Mehta, Secure wireless electronic-commerce system with wireless network domain.
  379. Phillips, Thomas G; Schoppa, Christopher A; Westerinen, William J; Myers, Mark A, Security features for portable computing environment.
  380. Kuroda Yasutsugu,JPX, Security level control apparatus and method for a network securing communications between parties without presetting th.
  381. Jensenworth Gregory ; Garg Praerit ; Swift Michael M. ; Goertzel Mario C. ; Chan Shannon J., Security model using restricted tokens.
  382. Medvinsky, Alexander; Sprunk, Eric J., Self-generation of certificates using secure microprocessor in a device for transferring digital information.
  383. Ryder ; Sr. John H. (Durham NC) Smith Susanna R. (Tampa FL), Self-verifying receipt and acceptance system for electronically delivered data objects.
  384. Kanno,Kiyoshi, Semiconductor device including fuse and method for testing the same capable of suppressing erroneous determination.
  385. Nguyen,Bich; Slain,Ilya; Connor,Kevin J.; Surazski,Luke K., Server and method for transmitting streaming media to client through a congested network.
  386. Wiseman, Willard M.; Grawrock, David W.; Brickell, Ernie; Wood, Matthew D.; Cihula, Joseph F., Session key exchange.
  387. Davis John E. (Reseda CA), Shadow memory system for storing variable backup blocks in consecutive time periods.
  388. Shin Kil-Ho,JPX ; Kobayashi Kenichi,JPX ; Aratani Toru,JPX, Signing method and apparatus using the same.
  389. Bereiter Thomas William, Software auditing mechanism for a distributed computer enterprise environment.
  390. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  391. Park Hyo Joon,KRX, Software license control system based on independent software registration server.
  392. Frison Michael R. ; Kirchberger Bela L., Software pay per use licensing system.
  393. Frank, Alexander; Steeb, Curt A.; Ahdout, Isaac P.; Duffus, James S.; Hall, Martin; Temple, Nicholas; Venkatachalam, Rajagopal; Phillips, Thomas; Xu, Zhangwei, Special PC mode entered upon detection of undesired state.
  394. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  395. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  396. Rhoads Geoffrey B. (West Linn OR), Steganography methods employing embedded calibration data.
  397. Iguchi,Shinya; Tsunehiro,Takashi; Tsunoda,Motoyasu; Ishihara,Haruji; Mizushima,Nagamasa; Totsuka,Takashi, Storage device including a non-volatile memory.
  398. Howell, Gareth; Jones, Thobias M.; Mulye, Nishad; Virdi, Gurpratap, Strategies for processing media information using a plug-in processing module in a path-agnostic manner.
  399. Howell, Gareth; Jones, Thobias M.; Mulye, Nishad; Virdi, Gurpratap, Strategies for processing media information using a plug-in processing module in a path-agnostic manner.
  400. Peinado,Marcus; Abburi,Rajasekhar; Bell,Jeffrey R. C., Structural of digital rights management (DRM) system.
  401. Peinado,Marcus; Abburi,Rajasekhar; Blinn,Arnold N.; Jones,Thomas C.; Bell,Jeffrey R. C., Structure of a digital content package.
  402. Li,Baoxin; Sampsell,Jeffrey B., Summarization of baseball video content.
  403. Li,Baoxin, Summarization of sumo video content.
  404. Li,Baoxin, Summarization of video content.
  405. Hurtado,Marco M.; Mahlbacher,James C.; Spagna,Richard L., Super-distribution of protected digital content.
  406. Dan Asit ; Ramaswami Rajiv ; Sitaram Dinkar, Support for portable trusted software.
  407. Delpuch,Alain; Whitledge,James; Menand,Jean Rene; Barbier,Emmanuel; Hausman,Kevin; Hensgen,Debra; Su,Dongmin, Supporting common interactive television functionality through presentation engine syntax.
  408. Doherty, Robert J.; Tierney, Peter L.; Arnaoutoglou-Andreou, Marios, System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files.
  409. Taylor David R. P. ; Lynch-Freshner Lawrence A. ; McKinlay Eric W. ; Pacheco Stephen P. ; Goyal Dinesh K., System and method for a communication system.
  410. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  411. Shaheen Amal Ahmed ; Yellepeddy Krishna Kishore, System and method for cache management in mobile user file systems.
  412. Kusumoto, Laura Lee; Sacerdoti, Earl David; Sigler, Leila Janine; Sigler, Sonya Lee, System and method for consumer-selected advertising and branding in interactive media.
  413. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  414. Davis Derek L., System and method for copy-protecting distributed video content.
  415. Lipner Steven B. (Oakton VA) Balenson David M. (Olney MD) Ellison Carl M. (Baltimore MD) Walker Stephen T. (Glenwood MD), System and method for data recovery.
  416. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for data recovery.
  417. Whitehouse Harry T., System and method for dispensing postage based on telephonic or web milli-transactions.
  418. Lipscomb,Kenneth O.; Petritis,John B.; Robison,Richard D.; Morrison,Kelly P.; Hirsch,Michael D.; Muntz,Eric Neal; Whitehead, III,John Paul, System and method for distributing media assets to user devices via a portal synchronized by said user devices.
  419. Bisbee Stephen F. (Gibson Island MD) Trotter Douglas H. (Baltimore MD), System and method for electronic transmission storage and retrieval of authenticated documents.
  420. Sutton, II,James A.; Grawrock,David W., System and method for execution of a secured environment initialization instruction.
  421. Tiller,James; Fish,Bryan; Baker,Theodore, System and method for implementing security management using a database-modeled security policy.
  422. Watanabe, Ryoji; Fung, Henry T.; Schwartz, Paul D., System and method for installing and servicing an operating system in a computer or information appliance.
  423. Amini, Lisa D.; Kienzle, Martin G.; Lepre, Jorge O., System and method for integrating arbitrary isochronous processing algorithms in general media processing systems.
  424. Narin,Attila, System and method for integrating secure and non-secure software objects.
  425. Strunk, David D.; Kephart, Aaron D.; Liseski, Steven J.; Fields, Robin M., System and method for interactive advertising.
  426. Bolle, Rudolf Maarten; Connell, Jonathan Hudson; Ratha, Nalini K., System and method for liveness authentication using an augmented challenge/response scheme.
  427. Frank,Alexander; Light,Mark C.; Westerinen,William J., System and method for maintaining persistent state data.
  428. Meulemans, Michael Edward; Averbuch, Aaron; Roberts, Jason; Showman, Ken; Mohammed, Mazhar; Dadzie, Joseph G., System and method for managing and communicating software updates.
  429. Erickson John S., System and method for managing copyrighted electronic media.
  430. Rose John R., System and method for managing try-and-buy usage of application programs.
  431. Hall ; III Sheldon F. ; Stoikoff Ivan T., System and method for offering and providing secured credit card products.
  432. Agrawal,Rakesh; Kiernan,Gerald George; Srikant,Ramakrishnan; Xu,Yirong, System and method for order-preserving encryption for numeric data.
  433. Angelo Michael F. ; Olarig Sompong P. ; Wooten David R. ; Driscoll Dan J., System and method for performing secure device communications in a peer-to-peer bus architecture.
  434. Cheung, Colman, System and method for prioritizing packetized data from a distributed control environment for transmission through a high bandwidth link.
  435. Griffiths Laurence Kelvin,GBX, System and method for processing multimedia data streams using filter graphs.
  436. Frank, Alexander; Phillps, Thomas G., System and method for programming an isolated computing environment.
  437. Lockhart Roland T.,CAX ; Wiener Michael J.,CAX, System and method for protecting a multipurpose data string used for both decrypting data and for authenticating a user.
  438. Chess David M. ; Sorkin Gregory Bret ; White Steve Richard, System and method for protecting integrity of alterable ROM using digital signatures.
  439. Ichikawa Bryan K., System and method for providing security in data communication systems.
  440. Sohail B. Mohammed ; Kipley J. Olson, System and method for regulating a network service provider's ability to host distributed applications in a distributed processing environment.
  441. Grawrock,David W.; Sutton, II,James A., System and method for resetting a platform configuration register.
  442. Bull, John A.; Otway, David J., System and method for secure distribution of digital information to a chain of computer system nodes in a network.
  443. Misra Pradyumna K. ; Graziadio Bradley J. ; Spies Terence R., System and method for software licensing.
  444. Frank,Alexander; Westerinen,William J., System and method for trustworthy metering and deactivation.
  445. Aull,Kenneth W.; McCullough,Vincent J.; Northrup,James I., System and method for usage of a role certificate in encryption and as a seal, digital stamp, and signature.
  446. Chilimbi, Trishul M., System and method for using data address sequences of a program in a software development tool.
  447. Frank,Alexander; England,Paul, System and method to lock TPM always 'on' using a monitor.
  448. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  449. Onoe Takutaro ; Chiang Jason Yi-Yu, System for collecting detailed internet information on the basis of the condition of activities of information viewers v.
  450. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  451. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
  452. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  453. Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
  454. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  455. Stefik, Mark J.; Pirolli, Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  456. Steven Karl Schoch ; Paul Swart, System for controlling the use of licensed software.
  457. Strong Hovey R. (San Jose CA), System for decoupling clock amortization from clock synchronization.
  458. Slik David,CAX ; Byrne Shannon,CAX, System for distributing digital information.
  459. Riebe,Heinrich Henning; Aldis,David, System for persistently encrypting critical software data to control the operation of an executable software program.
  460. Osborn William R., System for preventing electronic memory tampering.
  461. Clark Paul C. (4705 Broad Brook Dr. Bethesda MD 20814), System for protecting computers via intelligent tokens or smart cards.
  462. Brooks, Roger K., System for redirecting requests for data to servers having sufficient processing power to transcast streams of data in a desired format.
  463. Freeny ; Jr. Charles C. (Fort Worth TX), System for reproducing information in material objects at a point of sale location.
  464. Diersch Hans-Joerg,DEX ; Gruendler Rainer,DEX ; Stefan Kaden,DEX ; Michels Ingo,DEX, System for securing protected software from unauthorized use in computer networks.
  465. Richardson ; III Frederic B. (Brookvale AUX), System for software registration.
  466. Mori Ryoichi (Tokyo JPX), System for storing history of use of programs including user credit data and having access by the proprietor.
  467. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  468. Guillou Louis C. (Bourgbarre FRX), System for transmitting information provided with means for controlling access to the information transmitted.
  469. Guheen, Michael F.; Mitchell, James D.; Barrese, James J., System method and article of manufacture for building, managing, and supporting various components of a system.
  470. Sena,Raffaele; Monson,Nathaniel D.; Lynch,Kevin; Kitani,Keith, System, method and apparatus for converting and integrating media files.
  471. Nguyen Trong ; Subramanian Mahadevan P. ; Haller Daniel R., System, method and article of manufacture for a gateway system architecture with system administration information accessible from a browser.
  472. Agnoli,Giovanni M.; Pirazzi,Christopher V.; Chartock,Howard; Chen,Steve; Chomsky,Harry; Lai,Angela C.; Lindsey,Kerrick; Pawson,David; Shapiro,Jody; Weaver,Daniel, System, method, and computer program product for media publishing request processing.
  473. Agnoli,Giovanni M.; Pirazzi,Christopher V.; Chartock,Howard; Chen,Steve; Chomsky,Harry; Lai,Angela C.; Lindsey,Kerrick; Pawson,David; Shapiro,Jody; Weaver,Daniel, System, method, and computer program product for media publishing request processing.
  474. Mukherjee,Debargha; Said,Amir, System, method, and format thereof for scalable encoded media delivery.
  475. Gunyakti,Caglar; Hatlelid,Kristjan E.; Zhang,Ning; Tan,Xiaoxi, Systems and methods for deterring software piracy in a volume license environment.
  476. McKune,Jeffrey R.; Chu,Chengyun; Alkove,James M.; Barde,Sumedh; Grigorovitch,Alexandre, Systems and methods for disabling software components to protect digital media.
  477. Ta, Thanh; Wang, Xin, Systems and methods for integrity certification and verification of content consumption environments.
  478. Waxman, Peter David; Narin, Attila; Cottrille, Scott; Krishnaswamy, Vinay; DeMello, Marco A.; Venkatesh, Chandramouli; Byrum, Frank D.; Bourne, Steve, Systems and methods for issuing usage licenses for digital content and services.
  479. Maher,David P.; Rudd,James M.; Swenson,Eric J.; Landsman,Richard A., Systems and methods for managing and protecting electronic content and applications.
  480. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  481. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  482. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  483. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  484. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  485. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  486. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  487. Comerford Liam D. (Carmel NY) Ledermann Peter G. (Pleasantville NY) Levy Lawrence I. (Yorktown Heights NY) White Steve R. (New York NY), Tamper resistant packaging for information protection in electronic circuitry.
  488. Circenis, Edgar; Diamant, John R., Tamper-evident data management.
  489. Piosenka Gerald V. (Scottsdale AZ) Harrison David M. (Mesa AZ) Chandos Ronald V. (Tempe AZ), Tamperproof arrangement for an integrated circuit device.
  490. Wang, Zhenyu; Ma, Qingming, Technique for implementing high performance stable storage hierarchy in a computer network.
  491. Greenberg Burton (New York NY), Television program transmission verification method and apparatus.
  492. Peterson ; Jr. Mendel Lazear, Time based availability to content of a storage medium.
  493. Crane, Randall T.; Hastings, Brian L., Tracking pointing device motion using a single buffer for cross and auto correlation determination.
  494. Fierstein,Scott J.; Evans,Brian P.; Dunbar,Geoffrey T.; Alkove,James M.; Rosenstein,Daniel; Howard,Matthew; Ma,Ming; Grigorovitch,Alexandre Vicktorovich, Transcryption of digital content between content protection systems.
  495. Sehr Richard P., Travel system and methods utilizing multi-application passenger cards.
  496. Cutter, Benjamin Brooks; Evans, Brian P.; Strom, Clifford P.; Khandelwal, Vikas, Trusted license removal in a content protection system or the like.
  497. Ginter Thomas,DEX, Updating mechanism for user programs in a computer system.
  498. Vogel, Keith R.; Chase, Charlie D.; Yiu, Kelvin S.; Hallin, Philip J.; Thomas, Louis K., Updating trusted root certificates on a client computer.
  499. Granger Mark J. ; Smith Cyrus E. ; Hoffman Matthew I., Use of pseudocode to protect software from unauthorized use.
  500. Bourne,Steven; DeMello,Marco A.; Cahill,Jason; Antonoff,Lauren; Venkatesh,Chandramouli; Malik,Prashant, Using a flexible rights template to obtain a signed rights label (SRL) for digital content in a rights management system.
  501. Bourne, Steven; Venkatesh, Chandramouli; Krishnaswamy, Vinay, Using a rights template to obtain a signed rights label (SRL) for digital content in a digital rights management system.
  502. Hind, John R.; Peters, Marcia L., Using device certificates for automated authentication of communicating devices.
  503. Paresh Patel GB; Ku Lee ; Roger Reider ; Drew Kittel ; Lolo Lasida, Vault controller based registration application serving web based registration authorities and end users for conducting electronic commerce in secure end-to-end distributed information system.
  504. Scott A. Vanstone CA; Donald B. Johnson, Verification protocol.
  505. Welsh Russell J. (Toronto CAX), Video monitoring system.
  506. Martinez Ronald ; Schneier Bruce ; Guerin Greg, Virtual property system.
  507. Flavin Robert Alan ; Nihal Perwaiz ; Perez Ronald ; Smith Sean William, Watchdog for trusted electronic content distributions.
  508. Finch Richard (Austin TX) Schieve Eric (Austin TX), Watchdog timer for computer system reset.
  509. Kral, Joseph Michael, Window and door closing mechanism.
  510. Park,Kenneth James, Wireless device having a secure clock authentication method and apparatus.
  511. Ganesan Ravi (Arlington VA), Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography.
  512. Clapp Craig S.K., w-bit non-linear combiner for pseudo-random number generation.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로