$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Ensuring authenticity in a closed content distribution system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-021/00
  • H04L-009/08
  • H04L-009/16
  • H04L-009/32
  • G06F-021/60
  • G06F-021/10
출원번호 US-0475806 (2017-03-31)
등록번호 US-9985781 (2018-05-29)
발명자 / 주소
  • Princen, John
  • Srinivasan, Pramila
  • Blythe, David
  • Yen, Wei
출원인 / 주소
  • Acer Cloud Technology, Inc.
대리인 / 주소
    Sheppard, Mullin, Richter & Hampton LLP
인용정보 피인용 횟수 : 0  인용 특허 : 133

초록

A technique for maintaining encrypted content received over a network in a secure processor without exposing a key used to decrypt the content in the clear is disclosed.

대표청구항

1. A method executed by a secure processor of a secure player, the secure player comprising secure memory secured against access outside the secure player and insecure memory, the method comprising: receiving encrypted content comprising a plurality of data portions in an encrypted format;receiving

이 특허에 인용된 특허 (133)

  1. Hogan, Kenneth; Polucha, Micheal; Pham, Trieu; Vollum, Steve; Johnston, Jessee, Airborne e-mail data transfer protocol.
  2. Knobl,Karl Heinz; Menzenbach,Christof; Eibach,Wolfgang G; Nuttall,Mark Patrick; Phippen,Robert William, Apparatus and method for establishing communication in a computer network.
  3. Durham Peter Emmanuel, Apparatus and method for optimizing client-state data storage.
  4. Boyle John M. (Cranford NJ) Maiwald Eric S. (Southfields NY) Snow David W. (Convent Station NJ), Apparatus and method for providing multi-level security for communication among computers and terminals on a network.
  5. Davis Derek L., Apparatus and method for providing secured communications.
  6. Bright Michael W. ; Fuchs Kenneth Carl ; Marquardt Kelly Jo, Apparatus and method of reading a program into a processor.
  7. Coskun,Risvan; Oliver,Robert D.; Zhang,Haining; Estable,Luis P., Apparatus and method of wireless instant messaging.
  8. Haynes,Ramond M., Apparatus and methods for intellectual property database navigation.
  9. Peters Wolfgang,DEX ; Schneider Gerhard,DEX, Apparatus and service for transmitting video data.
  10. Robert Roy Blandford, Authenticated time device.
  11. Giniger, Michael L.; Hilton, Warren S., Automated operation and security system for virtual private networks.
  12. Bayassi, Mulham; De La Tullaye, Pierre; Jezequel, Jean-Francois, Broadcast and reception, and conditional access system therefor.
  13. Peterson, Leonard J.; Freedman, Steven J.; Partovi, Hadi; Endres, Raymond E.; D'Souza, David J.; Ellerman, Erik Castedo; Jiggins, Julian P., Client-side system for scheduling delivery of web content and locally managing the web content.
  14. Akio Ikeda JP; Toshikazu Tomizawa JP, Combined game system.
  15. Toshikazu Tomizawa JP; Akio Ikeda JP, Combined game system of portable and video game machines.
  16. Karolak Dale W. (Ft. Wayne IN) Shirey Carl L. (Ft. Wayne IN) Steiner Wesley D. (Ft. Wayne IN) Rue Robert T. (Ft. Wayne IN), Communications management system architecture.
  17. Okada Satoru (Kyoto JPX) Kojo Shin (Kyoto JPX), Compact hand-held video game system.
  18. Leung Yiu C. (Hong Kong HKX) Leung Iu S. (Hong Kong HKX), Computer game control apparatus.
  19. Acharya, Swarup; Korth, Henry F.; Poosala, Viswanath, Computer implemented method and apparatus for fulfilling a request for information content with a user-selectable version of a file containing that information content.
  20. Hatakeyama, Takahisa; Yoshioka, Makoto; Miyazawa, Yuji, Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method.
  21. Morito Hajime,JPX ; Yoshiura Hiroshi,JPX ; Roe Michael,GBX, Copy protection apparatus and method.
  22. Yen,Wei, Creation of customized web pages for use in a system of dynamic trading of knowledge, goods and services.
  23. Himmel Maria Azua, Customization of web pages based on requester type.
  24. Ikuta Masanao,JPX ; Kambe Tomoaki,JPX ; Takida Satoshi,JPX, Data caching apparatus, data caching method and medium recorded with data caching program in client/server distributed system.
  25. Blatter Harold ; Horlander Thomas Edward ; Bridgewater Kevin Elliott ; Deiss Michael Scott, Decoding system and data format for processing and storing encrypted broadcast, cable or satellite video data.
  26. Yen, Wei; Princen, John; Lo, Raymond; Srinivasan, Pramila, Delivery of license information using a short messaging system protocol in a closed content distribution system.
  27. McKune,Jeffrey R., Detecting and responding to a clock rollback in a digital rights management system on a computing device.
  28. Tatebayashi, Makoto; Nakamura, Yutaka; Harada, Shunji; Kozuka, Masayuki, Digital content protection system.
  29. Banerjee,Dwip N.; Dutta,Rabindranath; Yellepeddy,Krishna, Digital rights management.
  30. Tracton, Kenneth; Jaff, Kosar; Shands, Walter, Dynamic content customization in a client-server environment.
  31. Nazem Farzad ; Patel Ashvinkumar P, Dynamic page generator.
  32. Dedrick, Rick; Shine, Laura I.; Koski, Jeanne M., Electronic asset lending library method and apparatus.
  33. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  34. Okada Saturo (Kyoto JPX) Tanaka Hirokazu (Kyoto JPX), Electronic gaming device with pseudo-stereophonic sound generating capabilities.
  35. Krajewski ; Jr. Marjan (Acton MA) Chipchak John C. (Dracut MA) Chodorow David A. (Groton MA) Trostle Jonathan T. (Lexington MA) Baldwin Peter T. (Rowley MA), Electronic information network user authentication and authorization system.
  36. Shaw David E. ; Ardai Charles E. ; Marsh Brian D. ; Moraes Mark A. ; Rudolph Dana B. ; Mc Auliffe Jon D., Electronic mail system for displaying advertisement at local computer received from remote system while the local compu.
  37. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  38. Colgate ; Jr. Gilbert, Enhancement of chip card security.
  39. Olsen James E. ; Bringhurst Adam L., Fault tolerant electronic licensing system.
  40. Weiss, Steven A., Gaming device and method.
  41. Reay, C. Phillip; Coco, Geoffrey P., Generating revenue for the use of softgoods that are freely distributed over a network.
  42. Traversat Bernard A. ; Saulpaugh Tom ; Schmidt Jeffrey A. ; Slaughter Gregory L. ; Tracey William J. ; Woodward Steve, Generic schema for storing configuration information on a server computer.
  43. William Stuart Bush ; Carlos Ferdinand Roura, Hands-free, voice-operated remote control transmitter.
  44. Katherine Hua Guo ; Markus Andreas Hofmann ; Tze Sing Eugene Ng ; Sanjoy Paul ; Hui Zhang, High quality streaming multimedia.
  45. Shimizu, Yusuke, Information processing device and method for reading information recorded on an information recording medium.
  46. Asano, Tomoyuki; Osawa, Yoshitomo, Information transmission system and method, drive device and access method, information recording medium, device and method for producing recording medium.
  47. Ishibashi,Yoshihito; Oishi,Tateo; Matsuyama,Shinako; Asano,Tomoyuki; Muto,Akihiro; Kitahara,Jun, Information transmission system, transmitter, and transmission method as well as information reception system, receiver and reception method.
  48. Maissel, Jonathan; Eilat, Amir; Tsuria, Yossef; Kranc, Moshe; Sered, Yishai; Bar-On, Gershon; Atlow, Shabtai; Zviel, David, Intelligent electronic program guide.
  49. Herz, Fredrick; Smith, Jonathan M.; Parkes, David C., Location enhanced information delivery system.
  50. Okada Satoru (Kyoto JPX), Memory cartridge including a key detector for inhibiting memory access and preventing undesirable write operations.
  51. Khan Raheel Ahmed ; Burleson David Brent ; Filion John Thomas ; Cheek Donald Scott, Method and apparatus for a game delivery service including flash memory and a game back-up module.
  52. Jack E. Ozzie ; Raymond E. Ozzie, Method and apparatus for activity-based collaboration by a computer system equipped with a dynamics manager.
  53. Lexenberg, Robert A.; Huang, Yifei C., Method and apparatus for automatically determining allocation of voice and data channels on T1/E1 line.
  54. Deng, Huijie Robert; Wu, Yong Dong, Method and apparatus for digital content copy protection.
  55. Christopher H. Stewart ; Svilen B. Pronev ; Darrell J. Starnes, Method and apparatus for efficient storage and retrieval of objects in and from an object storage device.
  56. Luciano, Jr., Robert Anthony, Method and apparatus for enhancing game play through savable game play state.
  57. Vu, Son Trung; Phan, Quang, Method and apparatus for secure processing of cryptographic keys.
  58. Lee, Larry A.; Kilmer, Jr., Robert L.; Menigoz, David R., Method and apparatus for selectively denying access to encoded data.
  59. Lambert Mark L. ; van der Rijn Daniel J. G. ; Kemper David J. ; Verkler Jay L., Method and apparatus for storing and delivering documents on the internet.
  60. James Goodman CA, Method and apparatus for switchably selecting an integrated circuit operating mode.
  61. Beck Robert D. ; Richardson John, Method and apparatus for transmitting electronic mail attachments with attachment references.
  62. Sanjay Agraharam ; Robert Edward Markowitz ; Kenneth H. Rosen ; David Hilton Shur ; Joel A. Winthrop, Method and apparatus to enhance a multicast information stream in a communication network.
  63. Arnold Thomas Andrew ; Pettitt John Philip ; Rendleman ; Jr. Jesse Noel ; Lewis ; Jr. Robert Lincoln, Method and system for delivering digital products electronically.
  64. Bittinger Reed ; Brubaker Nils C. ; Housel ; III Barron Cornelius ; Wang Steve, Method and system for differencing container files.
  65. Fields, Duane Kimbell; Gregg, Thomas Preston; Hassinger, Sebastian Daniel; Hurley, II, William Walter; Kolb, Mark Andrew; Vu, Stacy Braden, Method and system for distributing image-based content on the internet.
  66. Malkin Peter Kenneth ; Yu Philip Shi-lung, Method and system for dynamically prefetching information via a server hierarchy.
  67. Spagna,Richard L.; Zhao,Ting; Geisler,Douglas R.; Mahlbacher,James C., Method and system for securing local database file of local content stored on end-user system.
  68. Sanders, Barbara; Robb, Curtis; Gau, Jet, Method and system for strategic services enterprise workload management.
  69. Luo Tie, Method for sending a secure message in a telecommunications system.
  70. Ober Timothy ; Reed Peter, Method of implementing a key recovery system.
  71. Wilkinson W. Kevin (Sunnyvale CA) Neimat Marie-Anne (Atherton CA), Method of maintaining consistency of cached data in a database system.
  72. Scott, Mark; Cheng, Anita; Ho, Simon; Irimescu, George; Voineag, Dorel; Wong, William; Yao, Min; Zadeh, Row J., Method, system, and computer program product for providing voice over the internet communication.
  73. Rabin, Michael O.; Shasha, Dennis E., Methods and apparatus for protecting information.
  74. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  75. Uesaka Yasushi,JPX ; Yamauchi Kazuhiko,JPX ; Kozuka Masayuki,JPX ; Higaki Nobuo,JPX ; Horiuchi Koichi,JPX ; Haruna Syusuke,JPX, Microprocessor suitable for reproducing AV data while protecting the AV data from illegal copy and image information processing system using the microprocessor.
  76. Andrew Goodman ; Jean Rene Menand, Module manager for interactive television system.
  77. Edson, Richard, Multi-service in-home network with an open interface.
  78. Sen, Subhabrata; Towsley, Don; Zhang, Zhi-Li; Dey, Jayanta Kumar, Multicasting video.
  79. Webber Neil F. (Hudson MA) Israel Robert K. (Westford MA) Kenley Gregory (Northborough MA) Taylor Tracy M. (Upton MA) Foster Antony W. (Framingham MA), Network file migration system.
  80. Tzelnic Percy ; Dunham Scott R., On-line tape backup using an integrated cached disk array.
  81. Sawano, Takao; Kawase, Tomohiro, Portable game machine with download capability.
  82. Ong Lance, Predictive memory caching for media-on-demand systems.
  83. Vanstone Scott A.,CAX ; Johnson Donald B., Private key validity and validation.
  84. Lin Mengjou, Process scheduling for streaming data through scheduling of disk jobs and network jobs and the relationship of the scheduling between these types of jobs.
  85. Theriault Roger ; Lockhart Thomas Wayne,CAX ; Battin Robert D., Proxy host computer and method for accessing and retrieving information between a browser and a proxy.
  86. Hideyuki Tsutsumitake JP, Real-time information transmission system.
  87. Bel,Hendrik Jan; Lokhoff,Gerardus Cornelis Petrus; Breugom,Michel Ronald; Engelen,Dirk Valentinus Rene; Van De Poel,Peter, Receiving device for securely storing a content item, and playback device.
  88. Pitts William Michael, Request interceptor in network nodes for determining local storage of file image satisfying predetermined criteria.
  89. Gidron,Yoad; Holder,Ophir; Teichholtz,Haim; Reich,Benny; Gur Ari,Yaron; Schiller,Michael, Rule-based system and method for managing the provisioning of user applications on limited-resource and/or wireless devices.
  90. Tso Michael Man-Hak ; Jing Jin ; Knauerhase Robert Conrad ; Romrell David Alfred ; Gillespie Daniel Joshua ; Bakshi Bikram Singh ; Sathyanarayan Seshardi, Scaling proxy server sending to the client a graphical user interface for establishing object encoding preferences after receiving the client's request for the object.
  91. Vaitzblit Lev (Concord MA) Ramakrishnan Kadangode K. (Maynard MA) Tzelnic Percy (Concord MA), Scheduling and admission control policy for a continuous media server.
  92. Srinivasan,Pramila; Princen,John; Berndt,Frank; Blythe,David; Saperstein,William; Yen,Wei, Secure and backward-compatible processor and secure software execution thereon.
  93. Srinivasan,Pramila; Princen,John; Berndt,Frank; Blythe,David; Saperstein,William; Yen,Wei, Secure and backward-compatible processor and secure software execution thereon.
  94. Saphar, Louis-Pierre; Karlisch, Thierry, Smart card reader with microcontroller and security component.
  95. Doherty, Robert J.; Tierney, Peter L.; Arnaoutoglou-Andreou, Marios, System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files.
  96. England,Paul; DeTreville,John D.; Lampson,Butler W., System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party.
  97. Bernardo Richard S. ; Scanell Jane ; Zepf Diedre, System and method for building a web site for use in E-commerce with user specific pricing.
  98. Duane Kimbell Fields ; Thomas Preston Gregg ; Sebastian Daniel Hassinger ; William Walter Hurley, System and method for cooperative client/server customization of web pages.
  99. Erickson John S., System and method for managing copyrighted electronic media.
  100. Ashour,Gal; Sundaresan,Neelakantan, System and method for protecting user logoff from web business transactions.
  101. Pasquali Sandro, System and method for providing a dynamic advertising content window within a window based content manifestation environment provided in a browser.
  102. Jeffrey Conklin ; David Foucher ; Daniel Foucher, System and method for providing and updating user supplied context for a negotiations system.
  103. Gilliam,Charles P.; Tadayon,Bijan; Wang,Xin, System and method for supplying and managing usage rights based on rules.
  104. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  105. Wang Pong-sheng ; Hsu Ching-San, System and process for delivering digital data on demand.
  106. Ford, Daniel A.; Kraft, Reiner; Tewari, Gaurav, System and technique for dynamic information gathering and targeted advertising in a web based model using a live information selection and analysis tool.
  107. Schindler Jeffrey ; Forrest Bradley A., System for assigning multichannel audio signals to independent wireless audio output devices.
  108. Abrams, Steven R.; Jameson, David H., System for collecting and displaying summary information from disparate sources.
  109. Schneck Paul B. ; Abrams Marshall D., System for controlling access and distribution of digital property.
  110. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
  111. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  112. Lubenow Josef K. ; Albright Charles T., System for distributing items from an origin to a plurality of destinations.
  113. Garfinkle Norton (2800 S. Ocean Blvd. Boca Raton FL 33432), System for limiting use of down-loaded video-on-demand data.
  114. Martenson Dale Warner, System for network resource management.
  115. Levinson Frank H. (Palo Alto CA), System for scheduling transmission of indexed and requested database tiers on demand at varying repetition rates.
  116. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  117. LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
  118. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  119. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  120. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  121. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  122. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  123. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  124. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  125. Venkatesh Ramachandran ; Otis Allen J. ; Bretl Robert F., Transactional virtual machine architecture.
  126. Kuzma Andrew J., Transmitting electronic mail attachment over a network using a e-mail page.
  127. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  128. Suzuki Mitsuhiro,JPX, Two-way information transmission system and two-way information transmission method.
  129. Thomas Michael, Variable rate optional security measures method and apparatus for wireless communications network.
  130. Fuller William H., Video distribution system.
  131. Nakamura Hiroki,JPX ; Kusumi Yuki,JPX ; Oashi Masahiro,JPX ; Shimoji Tatsuya,JPX, Video on demand system with a transmission schedule table in the video server including entries for client identifiers,.
  132. Belknap William R. (San Jose CA) Henley Martha R. (Morgan Hill CA) Falcon ; Jr. Lorenzo (San Jose CA) Frayne Thomas E. (San Jose CA) Luo Mei-Lan (San Jose CA) Saxena Ashok R. (San Jose CA), Video optimized media streamer with cache management.
  133. McBride Randall C., Volatile key apparatus for safeguarding confidential data stored in a computer system memory.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로