CA2265473C - Systems and methods for secure transaction management and electronic rights protection - Google Patents
Systems and methods for secure transaction management and electronic rights protection Download PDFInfo
- Publication number
- CA2265473C CA2265473C CA002265473A CA2265473A CA2265473C CA 2265473 C CA2265473 C CA 2265473C CA 002265473 A CA002265473 A CA 002265473A CA 2265473 A CA2265473 A CA 2265473A CA 2265473 C CA2265473 C CA 2265473C
- Authority
- CA
- Canada
- Prior art keywords
- vde
- information
- content
- electronic
- secure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 title claims abstract description 268
- 230000004224 protection Effects 0.000 title abstract description 24
- 238000012545 processing Methods 0.000 claims abstract description 81
- 230000006870 function Effects 0.000 claims description 88
- 238000009434 installation Methods 0.000 claims description 86
- 238000004891 communication Methods 0.000 claims description 51
- 230000009471 action Effects 0.000 claims description 12
- 238000004422 calculation algorithm Methods 0.000 claims description 11
- 230000002633 protecting effect Effects 0.000 claims description 8
- 230000000977 initiatory effect Effects 0.000 claims description 2
- 238000009826 distribution Methods 0.000 abstract description 54
- 239000004065 semiconductor Substances 0.000 abstract description 12
- 230000015654 memory Effects 0.000 description 126
- 239000000306 component Substances 0.000 description 125
- 230000008569 process Effects 0.000 description 109
- 238000003860 storage Methods 0.000 description 58
- 238000007726 management method Methods 0.000 description 50
- 241000894007 species Species 0.000 description 48
- 230000000694 effects Effects 0.000 description 47
- 150000001768 cations Chemical class 0.000 description 43
- 230000007246 mechanism Effects 0.000 description 35
- 238000000429 assembly Methods 0.000 description 34
- 230000000712 assembly Effects 0.000 description 33
- 230000037361 pathway Effects 0.000 description 32
- 239000000047 product Substances 0.000 description 30
- 230000008901 benefit Effects 0.000 description 18
- 238000004519 manufacturing process Methods 0.000 description 16
- 238000012546 transfer Methods 0.000 description 15
- 238000012384 transportation and delivery Methods 0.000 description 15
- 238000012550 audit Methods 0.000 description 14
- 230000004888 barrier function Effects 0.000 description 14
- 238000005516 engineering process Methods 0.000 description 14
- 230000010354 integration Effects 0.000 description 14
- 238000013461 design Methods 0.000 description 13
- 238000013459 approach Methods 0.000 description 12
- 230000008093 supporting effect Effects 0.000 description 10
- 230000001276 controlling effect Effects 0.000 description 9
- 230000000875 corresponding effect Effects 0.000 description 9
- 230000003993 interaction Effects 0.000 description 9
- 230000008520 organization Effects 0.000 description 9
- 230000002776 aggregation Effects 0.000 description 7
- 238000004220 aggregation Methods 0.000 description 7
- 230000002860 competitive effect Effects 0.000 description 7
- 230000006835 compression Effects 0.000 description 7
- 238000007906 compression Methods 0.000 description 7
- 230000006837 decompression Effects 0.000 description 7
- 239000000463 material Substances 0.000 description 7
- 230000003287 optical effect Effects 0.000 description 7
- 230000002093 peripheral effect Effects 0.000 description 7
- 238000004458 analytical method Methods 0.000 description 6
- 238000013475 authorization Methods 0.000 description 6
- 238000013500 data storage Methods 0.000 description 6
- 230000001419 dependent effect Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 101001073212 Arabidopsis thaliana Peroxidase 33 Proteins 0.000 description 5
- 101001123325 Homo sapiens Peroxisome proliferator-activated receptor gamma coactivator 1-beta Proteins 0.000 description 5
- 102100028961 Peroxisome proliferator-activated receptor gamma coactivator 1-beta Human genes 0.000 description 5
- 239000003795 chemical substances by application Substances 0.000 description 5
- 238000000605 extraction Methods 0.000 description 5
- 230000004044 response Effects 0.000 description 5
- 230000007704 transition Effects 0.000 description 5
- 238000010200 validation analysis Methods 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 4
- 238000003032 molecular docking Methods 0.000 description 4
- 238000000926 separation method Methods 0.000 description 4
- 230000003068 static effect Effects 0.000 description 4
- 238000013519 translation Methods 0.000 description 4
- 230000014616 translation Effects 0.000 description 4
- 230000033228 biological regulation Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 3
- 239000000470 constituent Substances 0.000 description 3
- 230000000670 limiting effect Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 238000004806 packaging method and process Methods 0.000 description 3
- 230000002688 persistence Effects 0.000 description 3
- 239000012925 reference material Substances 0.000 description 3
- 238000006467 substitution reaction Methods 0.000 description 3
- 230000029305 taxis Effects 0.000 description 3
- 230000036962 time dependent Effects 0.000 description 3
- 101100498930 Mus musculus Degs1 gene Proteins 0.000 description 2
- 238000007792 addition Methods 0.000 description 2
- 230000032683 aging Effects 0.000 description 2
- 238000013474 audit trail Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 239000000872 buffer Substances 0.000 description 2
- 230000003139 buffering effect Effects 0.000 description 2
- 230000001427 coherent effect Effects 0.000 description 2
- 230000001010 compromised effect Effects 0.000 description 2
- 238000011217 control strategy Methods 0.000 description 2
- 230000002596 correlated effect Effects 0.000 description 2
- 230000006378 damage Effects 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 2
- 238000005530 etching Methods 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 238000010348 incorporation Methods 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 235000013490 limbo Nutrition 0.000 description 2
- 238000011068 loading method Methods 0.000 description 2
- 239000002184 metal Substances 0.000 description 2
- VUQUOGPMUUJORT-UHFFFAOYSA-N methyl 4-methylbenzenesulfonate Chemical compound COS(=O)(=O)C1=CC=C(C)C=C1 VUQUOGPMUUJORT-UHFFFAOYSA-N 0.000 description 2
- 230000036961 partial effect Effects 0.000 description 2
- 230000000737 periodic effect Effects 0.000 description 2
- 238000002360 preparation method Methods 0.000 description 2
- 238000003825 pressing Methods 0.000 description 2
- 238000007639 printing Methods 0.000 description 2
- 230000000750 progressive effect Effects 0.000 description 2
- 230000001105 regulatory effect Effects 0.000 description 2
- 238000007493 shaping process Methods 0.000 description 2
- 229910052710 silicon Inorganic materials 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 241000962514 Alosa chrysochloris Species 0.000 description 1
- 208000019300 CLIPPERS Diseases 0.000 description 1
- 101100001674 Emericella variicolor andI gene Proteins 0.000 description 1
- 239000004593 Epoxy Substances 0.000 description 1
- 241000699670 Mus sp. Species 0.000 description 1
- XUIMIQQOPSSXEZ-UHFFFAOYSA-N Silicon Chemical compound [Si] XUIMIQQOPSSXEZ-UHFFFAOYSA-N 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 239000002253 acid Substances 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 239000003990 capacitor Substances 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 208000021930 chronic lymphocytic inflammation with pontine perivascular enhancement responsive to steroids Diseases 0.000 description 1
- OROGSEYTTFOCAN-DNJOTXNNSA-N codeine Chemical compound C([C@H]1[C@H](N(CC[C@@]112)C)C3)=C[C@H](O)[C@@H]1OC1=C2C3=CC=C1OC OROGSEYTTFOCAN-DNJOTXNNSA-N 0.000 description 1
- 239000013065 commercial product Substances 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000001143 conditioned effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 239000008358 core component Substances 0.000 description 1
- 238000013479 data entry Methods 0.000 description 1
- 238000013497 data interchange Methods 0.000 description 1
- 238000013506 data mapping Methods 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000005315 distribution function Methods 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 238000012854 evaluation process Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 239000012634 fragment Substances 0.000 description 1
- 235000019580 granularity Nutrition 0.000 description 1
- OROGSEYTTFOCAN-UHFFFAOYSA-N hydrocodone Natural products C1C(N(CCC234)C)C2C=CC(O)C3OC2=C4C1=CC=C2OC OROGSEYTTFOCAN-UHFFFAOYSA-N 0.000 description 1
- 230000001976 improved effect Effects 0.000 description 1
- 150000002500 ions Chemical class 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 230000033001 locomotion Effects 0.000 description 1
- 230000007787 long-term memory Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 208000024714 major depressive disease Diseases 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000004382 potting Methods 0.000 description 1
- 238000004886 process control Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 230000002829 reductive effect Effects 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 238000004366 reverse phase liquid chromatography Methods 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 238000013515 script Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 230000006403 short-term memory Effects 0.000 description 1
- 239000010703 silicon Substances 0.000 description 1
- 238000000348 solid-phase epitaxy Methods 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 238000009424 underpinning Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
- G06F21/1078—Logging; Metering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/108—Transfer of content, software, digital rights or licenses
- G06F21/1082—Backup or restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/109—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by using specially-adapted hardware at the client
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/42—User authentication using separate channels for security data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/572—Secure firmware programming, e.g. of basic input output system [BIOS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
- G06F21/608—Secure printing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/72—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
- G06F21/725—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits operating on a secure reference time value
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/73—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
- G06F21/87—Secure or tamper-resistant housings by means of encapsulation, e.g. for integrated circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
- G06Q20/1235—Shopping for digital content with control of digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/24—Credit schemes, i.e. "pay after"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F9/00—Details other than those peculiar to special kinds or types of apparatus
- G07F9/02—Devices for alarm or indication, e.g. when empty; Advertising arrangements in coin-freed apparatus
- G07F9/026—Devices for alarm or indication, e.g. when empty; Advertising arrangements in coin-freed apparatus for alarm, monitoring and auditing in vending machines or means for indication, e.g. when empty
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2541—Rights Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26613—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4623—Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8355—Generation of protective data, e.g. certificates involving usage data, e.g. number of copies or viewings allowed
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/034—Test or assess a computer or a system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2147—Locking files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
Abstract
The present invention provides systems and methods for electronic commerce including secure transaction management and electronic rights protection.
Electronic appliances such as computers employed in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Secure subsystems used with such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Secure distributed and other operating system environments and architectures, employing, for example, secure semiconductor processing arrangements that may establish secure, protected environments at each node. These techniques may be used to support an end-to-end electronic information distribution capability that may be used, for example, utilizing the "electronic highway".
Electronic appliances such as computers employed in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Secure subsystems used with such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Secure distributed and other operating system environments and architectures, employing, for example, secure semiconductor processing arrangements that may establish secure, protected environments at each node. These techniques may be used to support an end-to-end electronic information distribution capability that may be used, for example, utilizing the "electronic highway".
Description
?CA 02265473 1995902-25âDEMANDES OU BREVETS VOLUMINEUXLAâ PRESENTE PARTIE DE CETTE DEMANDE OU CE BREVETCOMPREND PLUS DâUN TOME. â .cecn EST LE TOMEâ DE.â._-..._â_.â_â.â-CNOTE: Pour Ies tomes additionels, veuillez contacter le Bureau canadien desbrevetsâJUMBO APPLICATIONS/PIATENTSITHIS SECTION OF THE APPLICATION/PATENT CONTAINS MORE"THAN ONE VOLUME ',_THIS IS VOLUME âl__ OF ffâ NOTE: For additional volumes-pleasécontacté?the Canadian Patent Officeâ .?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243SYSTEMS AND METHODS FOR SECURE TRANSACTIONMANAGEMENT AND ELECTRONIC RIGHTS PROTECTIONFe 3 ft Inve tie aThis invention generally relates to computer and/orelectronic security.More particularly, this invention relates to systems andtechniques for secure transaction management. This inventionalso relates to computer-based and other electronic appliance-based technologies that help to ensure that information isaccessed and/or otherwise used only in authorized Ways, andmaintains the integrity, availability, and/or con?dentiality ofsuch information and processes related to such use.The invention also relates to systems and methods forprotecting rights of various participants in electronic commerceand other electronic or electronicallyâfacilitated transactions.The invention also relates to secure chains of handling andcontrol for both information content and information employed toregulate the use of such content and consequences of such use. Italso relates to systems and techniques that manage, includingmeter and/or limit and/or otherwise monitor use of electronicallystored and/or disseminated information. The invention-1-?101520CA 02265473 1999-02-25WO 98/09209 PCT/U S97! 15243particularly relates to transactions, conduct and arrangementsthat make use of, including consequences of use of, such systemsand/or techniques.The invention also relates to distributed and otheroperating systems, environments and architectures. It alsogenerally relates to secure architectures, including, for example,tamperâresistant hardware-based processors, that can be used toestablish security at each node of a distributed system.Background and Summary of the Invention(s)Telecommunications, financial transactions, governmentprocesses, business operations, entertainment, and personalbusiness productivity all now depend on electronic appliances.Millions of these electronic appliances have been electronicallyconnected together. These interconnected electronic appliancescomprise what is increasingly called the âinformation highway.âMany businesses, academicians, and government leaders areconcerned about how to protect the rights of citizens andorganizations who use this information (also âelectronicâ orâdigitalâ) highway.?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243Electronic ContentToday, virtually anything that can be represented bywords, numbers, graphics, or system of commands andinstructions can be formatted into electronic digital information.Television, cable, satellite transmissions, and on-line servicestransmitted over telephone lines, compete to distribute digitalinformation and entertainment to homes and businesses. Theowners and marketers of this content include softwaredevelopers, motion picture and recording companies, publishersof books, magazines, and newspapers, and information databaseproviders. The popularization of on-line services has alsoenabled the individual personal computer user to participate as acontent provider. It is estimated that the worldwide market forelectronic information in 1992 was approximately $40 billion andis expected to grow to $200 billion by 1997, according toMicrosoft Corporation. The present invention can materiallyenhance the revenue of content providers, lower the distribution.costs and the costs for content, better support advertising andusage information gathering, and better satisfy the needs ofelectronic information users. These improvements can lead to asigni?cant increase in the amount and variety of electronicinformation and the methods by which such information isdistributed.?101520WO 98109209CA 02265473 1999-02-25PCT/US97/15243The inability of conventional products to be shaped to theneeds of electronic information providers and users is sharply incontrast to the present invention. Despite the attention devotedby a cross-section of Americaâs largest telecommunications,computer, entertainment and information provider companies tosome of the problems addressed by the present invention, onlythe present invention provides commercially secure, effectivesolutions for con?gurable, general purpose electronic commercetransaction/distribution control systems.Controlling Electronic ContentThe present invention provides a new kind of âvirtualdistribution environmentâ (called in this document) thatsecures, administers, and audits electronic information use.VDE also features fundamentally important capabilities formanaging content that travels âacrossâ the âinformationhighway.â These capabilities comprise a rights protectionsolution that serves all electronic community members. Thesemembers include content creators and distributors, financialservice providers, end-users, and others. VDE is the ?rst generalpurpose, con?gurable, transaction control/rights protectionsolution for users of computers, other electronic appliances,networks, and the information highway.?10,1520WO 98/09209CA 02265473 1999-02-25PCTlUS97ll5243A fundamental problem for electronic content providers is -extending their ability to control the use of proprietaryinformation. Content providers often need to limit use toauthorized activities and amounts. Participants in a businessmodel involving, for example, provision of movies andadvertising on optical discs may include actors, directors, scriptand other writers, musicians, studios, publishers, distributors,retailers, advertisers, credit card services, and content end-users.These participants need the ability to embody their range ofagreements and requirements, including use limitations, into anâextendedâ agreement comprising an overall electronic businessmodel. This extended agreement is represented by electroniccontent control information that can automatically enforceagreed upon rights and obligations. Under VDE, such anextended agreement may comprise an electronic contractinvolving all business model participants. Such an agreementmay alternatively, or in addition, be made up of electronicagreements between subsets of the business model participants.Through the use of VDE, electronic commerce can function in thesame way as traditional commerceââthat is commercialrelationships regarding products and services can be shapedthrough the negotiation of one or more agreements between avariety of parties.?101520W0 98l09209CA 02265473 1999-02-25PCT/US97/15243Commercial content providers are concerned with ensuring .proper compensation for the use of their electronic information.Electronic digital information, for example a CD recording, cantoday be copied relatively easily and inexpensively. Similarly,unauthorized copying and use of software programs deprivesrightful owners of billions of dollars in annual revenue accordingto the International Intellectual Property Alliance. Contentproviders and distributors have devised a number of limitedfunctionrights protection mechanisms to protect their rights.Authorization passwords and protocols, license servers,âlock/unlockâ distribution methods, and non-electroniccontractual limitations imposed on users of shrink-wrappedsoftware are a few of the more prevalent content protectionschemes. In a commercial context, these efforts are inefficientand limited solutions.Providers of âelectronic currencyâ have also createdprotections for their type of content. These systems are notsu?iciently adaptable, ef?cient, nor flexible enough to supportthe generalized use of electronic currency. Furthermore, they donot provide sophisticated auditing and control con?gurationcapabilities. This means that current electronic currency toolslack the sophistication needed for many real-world ?nancialbusiness models. VDE provides means for anonymous currency-5-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243and for âconditionallyâ anonymous currency, wherein currencyrelated activities remain anonymous except under specialcircumstances.VDE Control CapabilitiesVDE allows the owners and distributors of electronicdigital information to reliably bill for, and securely control, audit,and budget the use of, electronic information. It can reliablydetect and monitor the use of commercial information products.VDE uses a wide variety of different electronic informationdelivery means: including, for example, digital networks, digitalbroadcast, and physical storage media such as optical andmagnetic disks. VDE can be used by major network providers,hardware manufacturers, owners of electronic information,providers of such information, and clearinghouses that gatherusage information regarding, and bill for the use of, electronicinformation.VDE provides comprehensive and configurable transactionmanagement, metering monitoring technology. It canchange how electronic information products are protected,marketed, packaged, and distributed. When used, VDE shouldresult in higher revenues for information providers and greater-7-?CA 02265473 1999-02-25WO 98/09209 PCT/US97l15243user satisfaction and value. Use of VDE will normally result inlower usage costs, decreased transaction costs, more efficientaccess to electronic information, re-usability of rights protectionand other transaction management implementations, greatly5 improved ?exibility in the use of secured information, andgreater standardization of tools and processes for electronictransaction management. VDE can be used to create anadaptable environment that ful?lls the needs of electronicinformation owners, distributors, and users; ?nancial10 â clearinghouses; and usage information analyzers and resellers.Rights and Control InformationIn general, the present invention can be used to protect therights of parties who have:15(a) proprietary or con?dentiality interests in electronicinformation. It can, for example, help ensure thatinformation is used only in authorized ways;20 (b) financial interests resulting from the use ofelectronically distributed information. It can helpensure that content providers will be paid for use ofdistributed information; and?101520WO 98/09209CA 02265473 1999-02-25PCTIU S97/ 15243(C) interests in electronic credit and electronic currencystorage, communication, and/or use includingelectronic cash, banking, and purchasing.Protecting the rights of electronic community membersinvolves a broad range of technologies. VDE combines thesetechnologies in a way that creates a âdistributedâ electronicrights protection âenvironment.â This environment secures andprotects transactions and other processes important for rightsprotection. VDE, for example, provides the ability to prevent, orimpede, interference With and/or observation of, important rightsrelated transactions and processes. VDE, in its preferredembodiment, uses special purpose tamper resistant SecureProcessing Units (SPUS) to help provide a high level of securityfor VDE processes and information storage and communication.The rights protection problems solved by the presentinvention are electronic versions of basic societal issues. Theseissues include protecting property rights, protecting privacyrights, properly compensating people and organizations for theirwork and risk, protecting money and credit, and generallyprotecting the security of information. VDE employs a systemthat uses a common set of processes to manage rights issues inan e?icient, trusted, and cost-effective way.-9-?101520CA 02265473 1999-02-25W0 98,092,â PCTIUS97/15243VDE can be used to protect the rights of parties who create .electronic content such as, for example: records, games, movies,newspapers, electronic books and reference materials, personalelectronic mail, and con?dential records and communications.The invention can also be used to protect the rights of partieswho provide electronic products, such as publishers anddistributors; the rights of parties who provide electronic creditand currency to pay for use of products, for example, creditclearinghouses and banks; the rights to privacy of parties whouse electronic content (such as consumers, business people,governments); and the privacy rights of parties described byelectronic information, such as privacy rights related toinformation contained in a medical record, tax record, orpersonnel record.In general, the present invention can protect the rights ofparties who have:(a) commercial interests in electronically distributedinformation -- the present invention can helpensure, for example, that parties, will be paid for useof distributed information in a manner consistentwith their agreement;-10-?WO 98/09209(b)10(d)CA 02265473 1999-02-25PCT/US97/ 15243proprietary and/or con?dentiality interests inelectronic information -- the present invention can,for example, help ensure that data is used only inauthorized ways;interests in electronic credit and electronic currencystorage, communication, and/or use -- this caninclude electronic cash, banking, and purchasing;andinterests in electronic information derived, at leastin part, from use of other electronic information.VDE Functional Properties15 VDE is a costâeffective and efficient rights protectionsolution that provides a uni?ed, consistent system for securingand managing transaction processing. VDE can:(a)20(b)audit and analyze the use of content,ensure that content is used only in authorized ways,and-11-?CI101520WO 98/09209(c)CA 02265473 1999-02-25PCT/US97/ 15243allow information regarding content usage to beused only in ways approved by content users.In addition, VDE:(a)(b)(c)(d)(e)is very con?gurable, modi?able, and reâusab1e;supports a wide range of useful capabilities thatmay be combined in di?erent ways to accommodatemost potential applications;operates on a wide variety of electronic appliancesranging from hand-held inexpensive devices to largemainframe computers;is able to ensure the various rights of a number ofdifferent parties, and a number of different rightsprotection schemes, simultaneously;is able to preserve the rights of parties through aseries of transactions that may occur at di?erenttimes and different locations;-12-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97Il5243(fl is able to ?exibly accommodate different ways ofsecurely delivering information and reporting usage;and(g) provides for electronic analogues to "real" moneyand credit, including anonymous electronic cash, topay for products and services and to supportpersonal (including home) banking and other?nancial activities.VDE economically and efficiently fulfills the rightsprotection needs of electronic community members. Users ofVDE will not require additional rights protection systems fordifferent information highway products and rightsproblemsânor will they be required to install and learn a newsystem for each new information highway application.VDE provides a uni?ed solution that allows all contentcreators, providers, and users to employ the same electronicrights protection solution. Under authorized circumstances, theparticipants can freely exchange content and associated contentcontrol sets. This means that a user of VDE may, if allowed, usethe same electronic system to work with different kinds ofcontent having different sets of content control information. The-13-?WO 98/09209CA 02265473 1999-02-25PCTIU S97! 15243content and control information supplied by one group can beused by people who normally use content and control informationsupplied by a different group. VDE can allow content to beexchanged âuniversallyâ and users of an implementation of thepresent invention can interact electronically without fear ofincompatibilities in content control, violation of rights, or theneed to get, install, or learn a new content control system.The VDE securely administers transactions that specifyprotection of rights. It can protect electronic rights including, for510example:(a)15 (b)(c)20 (d)(e)the property rights of authors of electronic content,the commercial rights of distributors of content,the rights of any parties who facilitated thedistribution of content,the privacy rights of users of content,the privacy rights of parties portrayed by storedand/or distributed content, and-14-?101520WO 98/09209CA 02265473 1999-02-25PCT/Us97/15243(0 any other rights regarding enforcement of electronicagreements.VDE can enable a very broad variety of electronically enforcedcommercial and societal agreements. These agreements caninclude electronically implemented contracts, licenses, laws,regulations, and tax collection.Contrast With Traditional SolutionsTraditional content control mechanisms often requireusers to purchase more electronic information than the userneeds or desires. For example, infrequent users of shrink-wrapped software are required to purchase a program at thesame price as frequent users, even though they may receivemuch less value from their less frequent use. Traditionalsystems do not scale cost according to the extent or character ofusage and traditional systems can not attract potentialcustomers who ?nd that a ?xed price is too high. Systems usingtraditional mechanisms are also not normally particularlysecure. For example, shrink-wrapping does not prevent theconstant illegal pirating of software once removed from either itsphysical or electronic package.-15-?101520CA 02265473 1999-02-25wo 93/09209 PCT/US97/15243Traditional electronic information rights protectionsystems are often in?exible and inefficient and may cause acontent provider to choose costly distribution channels thatincrease a productâs price. In general these mechanisms restrictproduct pricing, con?guration, and marketing ?exibility. Thesecompromises are the result of techniques for controllinginformation which cannot accommodate both different contentmodels and content models which reflect the many, variedrequirements, such as content delivery strategies, of the modelparticipants. This can limit a providerâs ability to deliversufficient overall value to justify a given productâs cost in theeyes of many potential users. VDE allows content providers anddistributors to create applications and distribution networks thatreflect content providersâ and usersâ preferred business models.It offers users a uniquely cost effective and feature rich systemthat supports the ways providers want to distribute informationand the Ways users Want to use such information. VDEsupports content control models that ensure rights and allowcontent delivery strategies to be shaped for maximumcommercial results.Chain of Handling and ControlVDE can protect a collection of rights belonging to variousparties having in rights in, or to, electronic information. This-15-?1020WO 98/09209CA 02265473 1999-02-25PCT/US97/15243information may be at one location or dispersed across (and/ormoving between) multiple locations. The information may passthrough a âchainâ of distributors and a âchainâ of users. Usageinformation may also be reported through one or more âchainsâ ofparties. In general, VDE enables parties that (a) have rights inelectronic information, and/or (b) act as direct or indirect agentsfor parties who have rights in electronic information, to ensurethat the moving, accessing, modifying, or otherwise using ofinformation can be securely controlled by rules regarding how,When, Where, and by whom such activities can be performed.VDE Applications and SoftwareVDE is a secure system for regulating electronic conductand commerce. Regulation is ensured by control information putin place by one or more parties. These parties may includecontent providers, electronic hardware manufacturers, ?nancialservice providers, or electronic âinfrastructure" companies suchas cable or telecommunications companies. The controlinformation implements âRights Applications.â Rightsapplications ârun onâ the âbase softwareâ of the preferredembodiment. This base software serves as a secure, ?exible,general purpose foundation that can accommodate manydifferent rights applications, that is, many different businessmodels and their respective participant requirements.-17-?U!101520CA 02265473 1999-02-25WO 98/09209 PCT/US97/15243A rights application under VDE is made up of specialpurpose pieces, each of which can correspond to one or morebasic electronic processes needed for a rights protectionenvironment. These processes can be combined together likebuilding blocks to create electronic agreements that can protectthe rights, and may enforce ful?llment of the obligations, ofelectronic information users and providers. One or moreproviders of electronic information can easily combine selected blocks to create a rights application that is unique to aspeci?c content distribution model. A group of these pieces canrepresent the capabilities needed to fulfill the agreement(s)between users and providers. These pieces accommodate manyrequirements of electronic commerce including:0 the distribution of permissions to use electronicinformation;0 the persistence of the control information and sets ofcontrol information managing these permissions;0 con?gurable control set information that can beselected by users for use With such information;-18-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/152430 data security and usage auditing of electronicinformation; and0 a secure system for currency, compensation anddebit management.For electronic commerce, a rights application, under thepreferred embodiment of the present invention, can provideelectronic enforcement of the business agreements between allparticipants. Since different groups of components can be puttogether for different applications, the present invention canprovide electronic control information for a wide variety ofdifferent products and markets. This means the presentinvention can provide a âuni?ed,â efficient, secure, andcost-effective system for electronic commerce and data security.This allows VDE to serve as a single standard for electronicrights protection, data security, and electronic currency andbanking.In a VDE, the separation between a rights application andits foundation permits the ef?cient selection of sets of controlinformation that are appropriate for each of many different typesof applications and uses. These control sets can re?ect bothrights of electronic community members, as well as obligations-19-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243(such as providing a history of oneâs use of a product or payingtaxes on oneâs electronic purchases). VDE ?exibility allows itsusers to electronically implement and enforce common social andcommercial ethics and practices. By providing a uni?ed controlsystem, the present invention supports a vast range of possibletransaction related interests and concerns of individuals,communities, businesses, and governments. Due to its opendesign, VDE allows (normally under securely controlledcircumstances) applications using technology independentlycreated by users to be âaddedâ to the system and used inconjunction with the foundation of the invention. In sum, VDEprovides a system that can fairly re?ect and enforce agreementsamong parties. It is a broad ranging and systematic solutionthat answers the pressing need for a secure, cost-effective, andfair electronic environment.VDE ImplementationThe preferred embodiment of the present inventionincludes various tools that enable system designers to directlyinsert VDE capabilities into their products. These tools includean Application Programmerâs Interface (âAPIâ) and a RightsPermissioning and Management Language (âRPMLâ). TheRPML provides comprehensive and detailed control over the useof the inventionâs features. VDE also includes certain user-20-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243interface subsystems for satisfying the needs of contentproviders, distributors, and users.Information distributed using VDE may take many forms.It may, for example, be âdistributedâ for use on an individualâsown computer, that is the present invention can be used toprovide security for locally stored data. Alternatively, VDE maybe used with information that is dispersed by authors and/orpublishers to one or more recipients. This information may takemany forms including: movies, audio recordings, games,electronic catalog shopping, multimedia, training materials,E-mail and personal documents, object oriented libraries,software programming resources, and reference/record keepinginformation resources (such as business, medical, legal,scienti?c, governmental, and consumer databases).Electronic rights protection provided by the presentinvention will also provide an important foundation for trustedand ef?cient home and commercial banking, electronic creditprocesses, electronic purchasing, true or conditionallyanonymous electronic cash, and EDI (Electronic DataInterchange). VDE provides important enhancements forimproving data security in organizations by providing âsmartâ-21-?WO 98/09209101520CA 02265473 1999-02-25PCT/US97/ 15243transaction management features that can be far more effectivethan key and password based âgo/no goâ technology.VDE normally employs an integration of cryptographicand other security technologies (e.g. encryption, digitalsignatures, etc), with other technologies including: component,distributed, and event driven operating system technology, andrelated communications, object container, database, smart agent,smart card, and semiconductor design technologies.I. OverviewA. 9 VDE Solves Important Problems and FillsCritical NeedsThe world is moving towards an integration of electronicinformation appliances. This interconnection of appliancesprovides a foundation for much greater electronic interaction andthe evolution of electronic commerce. A variety of capabilitiesare required to implement an electronic commerce environment.VDE is the first system that provides many of these capabilitiesand therefore solves fundamental problems related to electronicdissemination of information.-22-?CA 02265473 1999-02-25W0 98/09209 PCT/US97/15243Electronic ContentVDE allows electronic arrangements to be createdinvolving two or more parties. These agreements can themselvescomprise a collection of agreements between participants in a5 commercial value chain and/or a data security chain model forhandling, auditing, reporting, and payment. It can providee?icient, reusable, modi?able, and consistent means for secureelectronic content: distribution, usage control, usage payment,usage auditing, and usage reporting. Content may, for example,10 include:0 ?nancial information such as electronic currencyand credit;15 I commercially distributed electronic information suchas reference databases, movies, games, andadvertising; and0 electronic properties produced by persons and20 organizations, such as documents, e-mail, andproprietary database information.-23-?IO1520WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243VDE enables an electronic commerce marketplace that supportsdiffering, competitive business partnerships, agreements, andevolving overall business models.The features of VDE allow it to function as the ?rsttrusted electronic information control environment that canconform to, and support, the bulk of conventional electroniccommerce and data security requirements. In particular, VDEenables the participants in a business value chain model tocreate an electronic version of traditional business agreementterms and conditions and further enables these participants toshape and evolve their electronic commerce models as theybelieve appropriate to their business requirements.VDE offers an architecture that avoids reflecting speci?cdistribution biases, administrative and control perspectives, andcontent types. Instead, VDE provides a broad-spectrum,fundamentally con?gurable and portable, electronic transactioncontrol, distributing, usage, auditing, reporting, and paymentoperating environment. VDE is not limited to being anapplication or application specific toolset that covers only alimited subset of electronic interaction activities andparticipants. Rather, VDE supports systems by which suchapplications can be created, modi?ed, and/or reused. As a result,-24-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243the present invention answers pressing, unsolved needs byo?ering a system that supports a standardized controlenvironment which facilitates interoperability of electronicappliances, interoperability of content containers, and efficientcreation of electronic commerce applications and models throughthe use of a programmable, secure electronic transactionsmanagement foundation and reusable and extensible executablecomponents. VDE can support a single electronic âworldâ withinwhich most forms of electronic transaction activities can bemanaged.To answer the developing needs of rights owners andcontent providers and to provide a system that can accommodatethe requirements and agreements of all parties that may beinvolved in electronic business models (creators, distributors,administrators, users, credit providers, etc. ), VDE supplies anefficient, largely transparent, low cost and sufficiently securesystem (supporting both hardware/ software and software onlymodels). VDE provides the widely varying secure control andadministration capabilities required for:1. Different types of electronic content,2. Differing electronic content delivery schemes,-25-?101520WO 98109209CA 02265473 1999-02-25PCT/US97/152433. Differing electronic content usage schemes,4. Different content usage platforms, andDiffering content marketing and model strategies.PlVDE may be combined with, or integrated into, manyseparate computers and/or other electronic appliances. Theseappliances typically include âa secure subsystem that can enablecontrol of content use such as displaying, encrypting, decrypting,printing, copying, saving, extracting, embedding, distributing,auditing usage, etc. The secure subsystem in the preferredembodiment comprises one or more "protected processingenvironments", one or more secure databases, and secure"component assemblies" and other items and processes that needto be kept secured. VDE can, for example, securely controlelectronic currency, payments, and/or credit management(including electronic credit and/or currency receipt,disbursement, encumbering, and/or allocation) using such a"secure subsystem."VDE provides a secure, distributed electronic transactionmanagement system for controlling the distribution and/or otherusage of electronically provided and/or stored information. VDE-25-?WO 98/09209101520CA 02265473 1999-02-25PCT/US97/15243controls auditing and reporting of electronic content and/orappliance usage. Users of VDE may include content creatorswho apply content usage, usage reporting, and/or usage paymentrelated control information to electronic content and/orappliances for users such as end-user organizations, individuals,and content and/or appliance distributors. VDE also securelysupports the payment of money owed (including money owed forcontent and/or appliance usage) by one or more parties to one ormore other parties, in the form of electronic credit and/orcurrency.Electronic appliances under control of VDE represent VDEânodesâ that securely process and control; distributed electronicinformation and/or appliance usage, control informationformulation, and related transactions. VDE can securelymanage the integration of control information provided by two ormore parties. As a result, VDE can construct an electronicagreement between VDE participants that represent aânegotiationâ between, the control requirements of, two or moreparties and enacts terms and conditions of a resultingagreement. VDE ensures the rights of each party to anelectronic agreement regarding a wide range of electronicactivities related to electronic information and/or applianceusage.-27-?101520W0 98l09209CA 02265473 1999-02-25PCT/US97/15243Through use of VDEâs control system, traditional contentproviders and users can create electronic relationships thatreflect traditional, non-electronic relationships. They can shapeand modify commercial relationships to accommodate theevolving needs of, and agreements among, themselves. VDE âdoes not require electronic content providers and users to modifytheir business practices and personal preferences to conform to ametering and control application program that supports limited,largely fixed functionality. Furthermore, VDE permitsparticipants to develop business models not feasible with non-electronic commerce, for example, involving detailed reporting ofcontent usage information, large numbers of distincttransactions at hitherto infeasibly low price points, âpass-alongâcontrol information that is enforced without involvement oradvance knowledge of the participants, etc.The present invention allows content providers and usersto formulate their transaction environment to accommodate:(1) desired content models, content control models, andcontent usage information pathways,(2) a complete range of electronic media anddistribution means,-23-?101520WO 98/09209(3)(4)(5)(6)CA 02265473 1999-02-25PCT/US97ll5243a broad range of pricing, payment, and auditingstrategies,very ?exible privacy and/or reporting models,practical and effective security architectures, andother administrative procedures that together withsteps (1) through (5) can enable most âreal worldâelectronic commerce and data security models,including models unique to the electronic World.VDEâs transaction management capabilities can enforce:(1)(2)privacy rights of users related to informationregarding their usage of electronic informationand/or appliances,societal policy such as laws that protect rights ofcontent users or require the collection of taxesderived from electronic transaction revenue, and-29-?CA 02265473 1999-02-25W0 98/09209 PCTIUS97/ 15243(3) the proprietary and/or other rights of parties relatedto ownership of, distribution of, and/or othercommercial rights related to, electronic information.5 VDE can support ârealâ commerce in an electronic form,101520that is the progressive creation of commercial relationships thatform, over time, a network of interrelated agreementsrepresenting a value chain business model. This is achieved inpart by enabling content control information to develop throughthe interaction of (negotiation between) securely created andindependently submitted sets of content and/or appliance controlinformation. Different sets of content and/or appliance controlinformation can be submitted by different parties in an electronicbusiness value chain enabled by the present invention. Theseparties create control information sets through the use of theirrespective VDE installations. Independently, securelydeliverable, component based control information allows efficientinteraction among control information sets supplied by differentparties.VDE permits multiple, separate electronic arrangementsto be formed between subsets of parties in a VDE supportedelectronic value chain model. These multiple agreementstogether comprise a VDE value chain âextendedâ agreement.-30-?10.1520WO 98/09209CA 02265473 1999-02-25PCT/US97I15243VDE allows such constituent electronic agreements, andtherefore overall VDE extended agreements, to evolve andreshape over time as additional VDE participants becomeinvolved in VDE content and/or appliance control informationhandling. VDE electronic agreements may also be extended asnew control information is submitted by existing participants.With VDE, electronic commerce participants are free to structureand restructure their electronic commerce business activities andrelationships. As a result, the present invention allows acompetitive electronic commerce marketplace to develop sincethe use of VDE enables different, widely varying business modelsusing the same or shared content.A signi?cant facet of the present inventions ability tobroadly support electronic commerce is its ability to securelymanage independently delivered VDE component objectscontaining control information (normally in the form of VDEobjects containing one or more methods, data, or load moduleVDE components). This independently delivered controlinformation can be integrated with senior and other pre-existingcontent control information to securely form derived controlinformation using the negotiation mechanisms of the presentinvention. All requirements specified by this derived controlinformation must be satis?ed before VDE controlled content can-31-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243be accessed or otherwise used. This means that, for example, all ~load modules and any mediating data which are listed by thederived control information as required must be available andsecurely perform their required function. In combination withother aspects of the present invention, securely, independentlydelivered control components allow electronic commerceparticipants to freely stipulate their business requirements andtrade offs. As a result, much as with traditional, non-electroniccommerce, the present invention allows electronic commerce(through a progressive stipulation of various controlrequirements by VDE participants) to evolve into forms ofbusiness that are the most ef?cient, competitive and useful.VDE provides capabilities that rationalize the support ofelectronic commerce and electronic transaction management.This rationalization stems from the reusability of controlstructures and user interfaces for a wide variety of transactionmanagement related activities. As a result, content usagecontrol, data security, information auditing, and electronic?nancial activities, can be supported with tools that arereusable, convenient, consistent, and familiar. In addition, arational approachâa transaction/distribution controlstandardâalloWs all participants in VDE the same foundationset of hardware control and security, authoring, administration,-32-?101520WO 98/09209CA 02265473 1999- 02 - 25PCT/US97/15243and management tools to support widely varying types ofinformation, business market model, and/or personal objectives.Employing VDE as a general purpose electronictransaction/distribution control system allows users to maintaina single transaction management control arrangement on each oftheir computers, networks, communication nodes, and/or otherelectronic appliances. Such a general purpose system can servethe needs of many electronic transaction managementapplications without requiring distinct, different installations fordifferent purposes. As a result, users of VDE can avoid theconfusion -and expense and other inefficiencies of different,limited purpose transaction control applications for eachdifferent content and/or business model. For example, VDEallows content creators to use the sa.me VDE foundation controlarrangement for both content authoring and for licensing contentfrom other content creators for inclusion into their products orfor other use. Clearinghouses, distributors, content creators, andother VDE users can all interact, both with the applicationsrunning on their VDE installations, and with each other, in anentirely consistent manner, using and reusing (largelytransparently) the same distributed tools, mechanisms, andconsistent user interfaces, regardless of the type of VDE activity.-33-?10v1520WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243VDE prevents many forms of unauthorized use ofelectronic information, by controlling and auditing (and otheradministration of use) electronically stored and/or disseminatedinformation. This includes, for example, commerciallydistributed content, electronic currency, electronic credit,business transactions (such as EDI), con?dentialcommunications, and the like. VDE can further be used toenable commercially provided electronic content to be madeavailable to users in user de?ned portions, rather thanconstraining the user to use portions of content that wereâpredeterminedâ by a content creator and/or other provider forbilling purposes.VDE, for example, can employ:(1) Secure metering means for budgeting and/orauditing electronic content and/or appliance usage;(2) Secure ?exible means for enabling compensationand/or billing rates for content and/or applianceusage, including electronic credit and/or currencymechanisms for payment means;-34-?wo 93/09209(3)5(4)(5)101520CA 02265473 1999-02-25PCT/US97ll5243Secure distributed database means for storingcontrol and usage related information (andemploying validated compartmentalization andtagging schemes);Secure electronic appliance control means;A distributed, secure, âvirtual black boxâ comprisedof nodes located at every user (including VDEcontent container creators, other content providers,client users, and recipients of secure VDE contentusage information) site. The nodes of said virtualblack box normally include a secure subsystemhaving at least one secure hardware element (asemiconductor element or other hardware modulefor securely executing VDE control processes), saidsecure subsystems being distributed at nodes alonga pathway of information storage, distribution,payment, usage, and/or auditing. In someembodiments, the functions of said hardwareelement, for certain or all nodes, may be performedby software, for example, in host processingenvironments of electronic appliances;-35.?WO 98/09209(6)(7)10(8)15CA 02265473 1999-02-25PCT/US97/15243Encryption and decryption means;Secure communications means employingauthentication, digital signaturing, and encryptedtransmissions. The secure subsystems at said usernodes utilize a protocol that establishes andauthenticates each nodeâs and/or participantâsidentity, and establishes one or more securehost-to-host encryption keys for communicationsbetween the secure subsystems; andSecure control means that can allow each VDEinstallation to perform VDE content authoring(placing content into VDE containers withassociated control information), content distribution,and content usage; as well as clearinghouse andother administrative and analysis activitiesemploying content usage information.20 VDE may be used to migrate most non-electronic,traditional information delivery models (includingentertainment, reference materials, catalog shopping, etc.) intoan adequately secure digital distribution and usage management-35-?CA 02265473 1999-02-25W0 93,092,â PCT/US97/15243and payment context. The distribution and ?nancial pathwaysmanaged by a VDE arrangement may include:0 content creator(s),5 O d.istributor( s),0 redistributor(s),0 client administrator(s),0 client user(s),0 i ?nancial and/or other clearinghouse(s),10 0 and/or government agencies.These distribution and ?nancial pathways may also include:0 advertisers,15 0 market survey organizations, and/or0 other parties interested in the user usage ofinformation securely delivered and/or stored usingVDE.20 Normally, participants in a VDE arrangement will employ thesame secure VDE foundation. Alternate embodiments supportVDE arrangements employing differing VDE foundations. Suchalternate embodiments may employ procedures to ensure certaininteroperability requirements are met.-37-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97I15243Secure VDE hardware (also known as SPUs for SecureProcessing Units), or VDE installations that use software tosubstitute for, or complement, said hardware (provided by HostProcessing Environments (HPEs)), operate in conjunction withsecure communications, systems integration software, anddistributed software control information and support structures,to achieve the electronic contract/rights protection environmentof the present invention. Together, these VDE componentscomprise a secure, virtual, distributed content and/or appliancecontrol, auditing (and other administration), reporting, andpayment environment. In some embodiments and wherecommercially acceptable, certain VDE participants, such asclearinghouses that normally maintain sufficiently physicallysecure non-VDE processing environments, may be allowed toemploy HPES rather VDE hardware elements and interoperate,for example, with VDE end-users and content providers. VDEcomponents together comprise a con?gurable, consistent, secureand âtrustedâ architecture for distributed, asynchronous controlof electronic content and/or appliance usage. VDE supports aâuniverse wideâ environment for electronic content delivery,broad dissemination, usage reporting, and usage relatedpayment activities.-33-?101520-m..â.«..«.........-.......................,.... . , . . .WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243VDE provides generalized con?gurability. This results, inpart, from decomposition of generalized requirements forsupporting electronic commerce and data security into a broadrange of constituent âatomicâ and higher level components (suchas load modules, data elements, and methods) that may bevariously aggregated together to form control methods forelectronic commerce applications, commercial electronicagreements, and data security arrangements. VDE provides asecure operating environment employing VDE foundationelements along with secure independently deliverable VDEcomponents that enable electronic commerce models andrelationships to develop. VDE speci?cally supports the unfoldingof distribution models in which content providers, over time, canexpressly agree to, or allow, subsequent content providers and/orusers to participate in shaping the control information for, andconsequences of, use of electronic content and/or appliances. Avery broad range of the functional attributes important forsupporting simple to very complex electronic commerce and datasecurity activities are supported by capabilities of the presentinvention. As a result, VDE supports most types of electronicinformation and/or appliance: usage control (includingdistribution), security, usage auditing, reporting, otheradministration, and payment arrangements.-39-?WO 98/09209101520CA 02265473 1999-02-25PCT/U S97} 15243VDE, in its preferred embodiment, employs object softwaretechnology and uses object technology to form âcontainersâ fordelivery of information that is (at least in part) encrypted orotherwise secured. These containers may contain electroniccontent products or other electronic information and some or allof their associated permissions (control) information. Thesecontainer objects may be distributed along pathways involvingcontentâ providers and/or content users. They may be securelymoved among nodes of a Virtual Distribution Environment(VDE) arrangement, which nodes operate VDE foundationsoftware and execute control methods to enact electronicinformation usage control and/or administration models. Thecontainers delivered through use of the preferred embodiment ofthe present invention may be employed both for distributingVDE control instructions (information) and/or to encapsulate andelectronically distribute content that has been at least partiallysecured.Content providers who employ the present invention mayinclude, for example, software application and game publishers,database publishers, cable, television, and radio broadcasters,electronic shopping vendors, and distributors of information inelectronic document, book, periodical, e-mail and/or other forms.Corporations, govemment agencies, and/or individual-40-?10â1520WO 98/09209CA 02265473 1999-02-25PCTIU S97/ 15243âendâusersâ who act as storers of, and/or distributors of,electronic information, may also be VDE content providers (in arestricted model, a user provides content only to himself andemploys VDE to secure his own con?dential information againstunauthorized use by other parties). Electronic information mayinclude proprietary and/or confidential information for personalor internal organization use, as well as information, such assoftware applications, documents, entertainment materials,and/or reference information, which may be provided to otherparties. Distribution may be by, for example, physical mediadelivery, broadcast and/or telecommunication means, and in theform of âstaticâ ?les and/or streams of data. VDE may also beused, for example. for multi-site âreal-time" interaction such asteleconferencing, interactive games, or on-line bulletin boards,where restrictions on, and/or auditing of, the use of all orportions of communicated information is enforced.VDE provides important mechanisms for both enforcingcommercial agreements and enabling the protection of privacyrights. VDE can securely deliver information from one party toanother concerning the use of commercially distributed electroniccontent. Even if parties are separated by several "steps" in achain (pathway) of handling for such content usage information,such information is protected by VDE through encryption and/or-41-?101520WO 98109209CA 02265473 1999-02-25PCTlUS97l15243other secure processing. Because of that protection, the accuracyof such information is guaranteed by VDE, and the informationcan be trusted by all parties to whom it is delivered.Furthermore, VDE guarantees that all parties can trust thatsuch information cannot be received by anyone other than theintended, authorized, party(ies) because it is encrypted such thatonly an authorized party, or her agents, can decrypt it. Suchinformation may also be derived through a secure VDE processat a previous pathwayâof-handling location to produce secureVDE reporting information that is then communicated securelyto its intended recipientâs VDE secure subsystem. Because VDE 'can deliver such information securely, parties to an electronicagreement need not trust the accuracy of commercial usageand/or other information delivered through means other thanthose under control of VDE.VDE participants in a commercial value chain can beâcommerciallyâ con?dent (that is, sufficiently confident forcommercial purposes) that the direct (constituent) and/orâextendedâ electronic agreements they entered into through theuse of VDE can be enforced reliably. These agreements mayhave both âdynamicâ transaction management related aspects,such as content usage control information enforced throughbudgeting, metering, and/or reporting of electronic information-42-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243and/or appliance use, and/or they may include âstaticâ electronicassertions, such as an end-user using the system to assert his orher agreement to pay for services, not to pass to unauthorizedparties electronic information derived from usage of content orsystems, and/or agreeing to observe copyright laws. Not only canelectronically reported transaction related information be trustedunder the present invention, but payment may be automated bythe passing of payment tokens through a pathway of payment(which may or may not be the same as a pathway for reporting).Such payment can be contained within a VDE container createdautomatically by a VDE installation response to controlinformation (located, in the preferred embodiment, in one ormore permissions records) stipulating the âwithdrawalâ of creditor electronic currency (such as tokens) from an electronic account(for example, an account securely maintained by a userâs VDEinstallation secure subsystem) based upon usage of VDEcontrolled electronic content and/or appliances (such asgovernments, ?nancial credit providers, and users).VDE allows the needs of electronic commerce participantsto be served and it can bind such participants together in auniverse wide, trusted commercial network that can be secureenough to support very large amounts of commerce. VDEâssecurity and metering secure subsystem core will be present at-43-?101520WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243all physical locations where VDE related content is (a) assignedusage related control information (rules and mediating data),and/or (b) used. This core can perform security and auditingfimctions (including metering) that operate within a âvirtualblack box,â a collection of distributed, very secure VDE relatedhardware instances that are interconnected by securedinformation exchange (for example, telecommunication)processes and distributed database means. VDE furtherincludes highly configurable transaction operating systemtechnology, one or more associated libraries of load modulesalong with affiliated data, VDE related administration, datapreparation, and analysis applications, as well as systemsoftware designed to enable VDE integration into hostenvironments and applications. VDEâs usage controlinformation, for example, provide for property content and/orappliance related: usage authorization, usage auditing (whichmay include audit reduction), usage billing, usage payment,privacy ?ltering, reporting, and security related communicationand encryption techniques.VDE extensively employs methods in the form of softwareobjects to augment configurability, portability, and security ofthe VDE environment. It also employs a software objectarchitecture for VDE content containers that carries protected-44-?101520WO 98109209CA 02265473 1999-02-25PCT/US97/15243content and may also carry both freely available information (e.g,summary, table of contents) and secured content controlinformation which ensures the performance of controlinformation. Content control information governs content usageaccording to criteria set by holders of rights to an objectâscontents and/or according to parties who otherwise have rightsassociated with distributing such content (such as governments,?nancial credit providers, and users).In part, security is enhanced by object methods employedby the present invention because the encryption schemes used toprotect an object can ef?ciently be further used to protect theassociated content control information (software controlinformation and relevant data) from modi?cation. Said objecttechniques also enhance portability between various computerand/or other appliance environments because electronicinformation in the form of content can be inserted along with (forexample, in the same object container as) content controlinformation (for said content) to produce a âpublishedâ object.As a result, various portions of said control information may bespeci?cally adapted for different environments, such as fordiverse computer platforms and operating systems, and saidvarious portions may all be carried by a VDE container.-45-?101520CA 02265473 1999-02-25W0 98l09209 PCT/US97/15243An objective of VDE is supporting atransaction/distribution control standard. Development of such astandard has many obstacles, given the security requirementsand related hardware and communications issues, widelydiffering environments, information types, types of informationusage, business and/or data security goals, varieties ofparticipants, and properties of delivered information. Asigni?cant feature of VDE accommodates the many, varyingdistribution and other transaction variables by, in part,decomposing electronic commerce and data security functionsinto generalized capability modules executable within a securehardware SPU and/or corresponding software subsystem andfurther allowing extensive ?exibility in assembling, modifying,and/or replacing, such modules (e.g. load modules and/ormethods) in applications run on a VDE installation foundation.This con?gurability and recon?gurability allows electroniccommerce and data security participants to reflect theirpriorities and requirements through a process of iterativelyshaping an evolving extended electronic agreement (electroniccontrol model). This shaping can occur as content controlinformation passes from one VDE participant to another and tothe extent allowed by âin placeâ content control information.This process allows users of VDE to recast existing control-45-?WO 98/09209101520CA 02265473 1999-02-25PCT/US97/15243information and/or add new control information as necessary(including the elimination of no longer required elements).VDE supports trusted (sufficiently secure) electronicinformation distribution and usage control models for bothcommercial electronic content distribution and data securityapplications. It can be con?gured to meet the diverserequirements of a network of interrelated participants that mayinclude content creators, content distributors, clientadministrators, end users, and/or clearinghouses and/or othercontent usage information users. These parties may constitute anetwork of participants involved in simple to complex electroniccontent dissemination, usage control, usage reporting, and/orusage payment. Disseminated content may include bothoriginally provided and VDE generated information (such ascontent usage information) and content control information maypersist through both chains (one or more pathways) of contentand content control information handling, as well as the directusage of content. The con?gurability provided by the presentinvention is particularly critical for supporting electroniccommerce, that is enabling businesses to create relationshipsand evolve strategies that offer competitive value. Electroniccommerce tools that are not inherently con?gurable andinteroperable will ultimately fail to produce products (and-47-......m...........â...........u..-nae.-uuua4uu.m ...a............ . ..?101520WO 98/09209CA 02265473 1999-02-25PCT/US97l15243services) that meet both basic requirements and evolving needsof most commerce applications.VDEâs fundamental con?gurability will allow a broadrange of competitive electronic commerce business models to?ourish. It allows business models to be shaped to maximizerevenues sources, end-user product value, and operatingefficiencies. VDE can be employed to support multiple, differingmodels, take advantage of new revenue opportunities, anddeliver product con?gurations most desired by users. Electroniccommerce technologies that do not, as the present inventiondoes:I support a broad range of possible, complementaryrevenue activities,0 offer a flexible array of content usage features mostdesired by customers, and0 exploit opportunities for operating e?iciencies,will result in products that are often intrinsically more costlyand less appealing and therefore less competitive in themarketplace.Some of the key factors contributing to the con?gurabilityintrinsic to the present invention include:-43-?101520WO 98/09209(a)(b)(c)(d)(e)(f)(g)CA 02265473 1999-02-25PCT/US97/15243integration into the fundamental controlenvironment of a broad range of electronicappliances through portable API and programminglanguage tools that e?iciently support merging ofcontrol and auditing capabilities in nearly anyelectronic appliance environment while maintainingoverall system security;modular data structures;generic content model; Igeneral modularity and independence of foundationarchitectural components;modular security structures:variable length and multiple branching chains ofcontrol; andindependent, modular control structures in the formof executable load modules that can be maintainedin one or more libraries, and assembled into controlmethods and models, and where such model control-49-?101520WO 98109209CA 02265473 1999-02-25PCT/U S97/ 15243schemes can âevolveâ as control information passesthrough the VDE installations of participants of apathway of VDE content control informationhandling.Because of the breadth of issues resolved by the presentinvention, it can provide the emerging âelectronic highwayâ witha single transaction/distribution control system that can, for avery broad range of commercial and data security models, ensureagainst unauthorized use of con?dential and/or proprietaryinformation and commercial electronic transactions. VDEâselectronic transaction management mechanisms can enforce theelectronic rights and agreements of all parties participating inwidely varying business and data security models, and this canbe efiiciently achieved through a single VDE implementationWithin each VDE participantâs electronic appliance. VDEsupports widely varying business and/or data security modelsthat can involve a broad range of participants at various âlevelsâof VDE content and/or content control information pathways ofhandling. Different content control and/or auditing models andagreements may be available on the same VDE installation.These models and agreements may control content inrelationship to, for example, VDE installations and/or users ingeneral; certain speci?c users, installations, classes and/or other-50-?101520WO 98/09209CA 02265473 1999-02-25PCTIU S97/ 15243groupings of installations and/or users; as well as to electroniccontent generally on a given installation, to speci?c properties,property portions, classes and/or other groupings of content.Distribution using VDE may package both the electroniccontent and control information into the same VDE container,and/or may involve the delivery to an end-user site of differentpieces of the same VDE managed property from plural separateremote locations and/or in plural separate VDE contentcontainers and/or employing plural different delivery means.Content control information may be partially or fully deliveredseparately from its associated content to a user VDE installationin one or more VDE administrative objects. Portions of saidcontrol information may be delivered from one or more sources.Control information may also be available for use by access froma userâs VDE installation secure sub-system to one or moreremote VDE secure sub-systems and/or VDE compatible,certi?ed secure remote locations. VDE control processes such asmetering, budgeting, decrypting and/or ?ngerprinting, may asrelates to a certain user content usage activity, be performed in auserâs local VDE installation secure subsystem, or said processesmay be divided amongst plural secure subsystems which may belocated in the same user VDE installations and/or in a networkserver and in the user installation. For example, a local VDE-51-?101520WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243installation may perform decryption and save any, or all of,usage metering information related to content and/or electronicappliance usage at such user installation could be performed atthe server employing secure (e.g., encrypted) communicationsbetween said secure subsystems. Said server location may alsobe used for near real time, frequent, or more periodic securereceipt of content usage information from said user installation,with, for example, metered information being maintained onlytemporarily at a local user installation.Delivery means for VDE managed content may includeelectronic data storage means such as optical disks for deliveringone portion of said information and broadcasting and/ortelecommunicating means for other portions of said information.Electronic data storage means may include magnetic media,optical media, combined magneto-optical systems, ?ash RAMmemory, bubble memory, and/or other memory storage meanssuch as huge capacity optical storage systems employingholographic, frequency, and/or polarity data storage techniques.Data storage means may also employ layered disc techniques,such as the use of generally transparent and/or translucentmaterials that pass light through layers of data carrying discswhich themselves are physically packaged together as one-52-?10.1520W0 98l09209CA 02265473 1999-02-25PCT/US97/15243thicker disc. Data carrying locations on such discs may be, atleast in part, opaque.VDE supports a general purpose foundation for securetransaction management, including usage control, auditing,reporting, and/or payment. This general purpose foundation iscalled âVDE Functionsâ CVDEFS"). VDE also supports acollection of âatomicâ application elements (e.g., load modules)that can be selectively aggregated together to form variousVDEF capabilities called control methods and which serve asVDEF applications and operating system functions. When a hostoperating environment of an electronic appliance includes VDEFcapabilities, it is called a âRights Operating System" (ROS).VDEF load modules, associated data, and methods form a body ofinformation that for the purposes of the present invention arecalled âcontrol information.â VDEF control information may bespeci?cally associated with one or more pieces of electroniccontent and/or it may be employed as a general component of theoperating system capabilities of a VDE installation.VDEF transaction control elements re?ect and enactcontent speci?c and/or more generalized administrative (forexample, general operating system) control information. VDEFcapabilities which can generally take the form of applications-53-?101520WO 98/09209CA 02265473 1999-02-25PCTIU S97/ 15243(application models) that have more or less con?gurability which Ican be shaped by VDE participants, through the use, forexample, of VDE templates, to employ speci?c capabilities, along,for example, with capability parameter data to reflect theelements of one or more express electronic agreements betweenVDE participants in regards to the use of electronic content suchas commercially distributed products. These control capabilitiesmanage the use of, and/or auditing of use of, electronic content,as well as reporting information based upon content use, and anypayment for said use. VDEF capabilities may âevolveâ to re?ectthe requirements of one or more successive parties who receiveor otherwise contribute to a given set of control information.Frequently, for a VDE application for a given content model(such as distribution of entertainment on CD-ROM, contentdelivery from an Internet repository, or electronic catalogshopping and advertising, or some combination of the above)participants would be able to securely select from amongstavailable, alternative control methods and apply relatedparameter data, wherein such selection of control method and/orsubmission of data would constitute their âcontributionâ ofcontrol information. Alternatively, or in addition, certain controlmethods that have been expressly certi?ed as securelyinteroperable and compatible with said application may beindependently submitted by a participant as part of such a-54-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243contribution. In the most general example, a generally certi?edload module (certi?ed for a given VDE arrangement and/orcontent class) may be used with many or any VDE applicationthat operates in nodes of said arrangement. These parties, to theextent they are allowed, can independently and securely add,delete, and/or otherwise modify the speci?cation of load modulesand methods, as well as add, delete or otherwise modify relatedinformation.Normally the party who creates a VDE content containerdefines the general nature of the VDEF capabilities that willand/or may apply to certain electronic information. A VDEcontent container is an object that contains both content ( forexample, commercially distributed electronic informationproducts such as computer software programs, movies, electronicpublications or reference materials, etc.) and certain controlinformation related to the use of the objectâs content. A creatingparty may make a VDE container available to other parties.Control information delivered by, and/or otherwise available foruse with, VDE content containers comprise (for commercialcontent distribution purposes) VDEF control capabilities (andany associated parameter data) for electronic content. Thesecapabilities may constitute one or more âproposedâ electronicagreements (and/or agreement functions available for selection-55-?101520WO 98109209CA 02265473 1999-02-25PCT/U S97/ 15243and/or use With parameter data) that manage the use and/or theconsequences of use of such content and which can enact theterms and conditions of agreements involving multiple partiesand their various rights and obligations.A VDE electronic agreement may be explicit, through auser interface acceptance by one or more parties, for example bya âjuniorâ party who has received control information from aâseniorâ party, or it may be a process amongst equal parties whoindividually assert their agreement. Agreement may also resultfrom an automated electronic process during which terms andconditions are âevaluatedâ by certain VDE participant controlinformation that assesses whether certain other electronic termsand conditions attached to content and/or submitted by anotherparty are acceptable (do not violate acceptable controlinformation criteria). Such an evaluation process may be quitesimple, for example a comparison to ensure compatibilitybetween a portion of, or all senior, control terms and conditionsin a table of terms and conditions and the submitted controlinformation of a subsequent participant in a pathway of contentcontrol information handling, or it may be a more elaborateprocess that evaluates the potential outcome of, and/orimplements a negotiation process between, two or more sets ofcontrol information submitted by two or more parties. VDE also-56-?W0 98l09209101520CA 02265473 1999-02-25PCT/US97/15243accommodates a semi-automated process during which one ormore VDE participants directly, through user interface means,resolve âdisagreementsâ between control information sets byaccepting and/or proposing certain control information that maybe acceptable to control information representing one or moreother parties interests and/or responds to certain user interfacequeries for selection of certain alternative choices and/or forcertain parameter information, the responses being adopted ifacceptable to applicable senior control information.When another party (other than the first applier of rules),perhaps through a negotiation process, accepts, and/or adds toand/or otherwise modi?es, âin placeâ content control information,a VDE agreement between two or more parties related to the useof such electronic content may be created (so long as anymodi?cations are consistent with senior control information).Acceptance of terms and conditions related to certain electroniccontent may be direct and express, or it may be implicit as aresult of use of content (depending, for example, on legalrequirements, previous exposure to such terms and conditions,and requirements of in place control information).VDEF capabilities may be employed, and a VDEagreement may be entered into, by a plurality of parties Without-57-?101520WO 98109209CA 02265473 1999-02-25PCT/US97/15243the VDEF capabilities being directly associated with thecontrolling of certain, speci?c electronic information. Forexample, certain one or more VDEF capabilities may be presentat a VDE installation, and certain VDE agreements may havebeen entered into during the registration process for a contentdistribution application, to be used by such installation forsecurely controlling VDE content usage, auditing, reportingand/or payment. Similarly, a speci?c VDE participant may enterinto a VDE user agreement with a VDE content or electronicappliance provider when the user and/or her appliance registerwith such provider as a VDE installation and/or user. In suchevents, VDEF in place control information available to the userVDE installation may require that certain VDEF methods areemployed, for example in a certain sequence. in order to be ableto use all and/or certain classes, of electronic content and/or VDEapplications.VDE ensures that certain prerequisites necessary for agiven transaction to occur are met. This includes the secureexecution of any required load modules and the availability ofany required, associated data. For example, required loadmodules and data (e.g. in the form of a method) might specifythat su?icient credit from an authorized source must becon?rmed as available. It might further require certain one or-58-?WO 98/09209101520CA 02265473 1999-02-25PCT/U S97/ 15243more load modules execute as processes at an appropriate timeto ensure that such credit Will be used in order to pay for useruse of the content. A certain content provider might, forexample, require metering the number of copies made fordistribution to employees of a given software program (a portionof the program might be maintained in encrypted form andrequire the presence of a VDE installation to run). This wouldrequire the execution of a metering method for copying of theproperty each time a copy was made for another employee. Thissame provider might also charge fees based on the total numberof different properties licensed from them by the user and ametering history of their licensing of properties might berequired to maintain this information.VDE provides organization, community, and/or universeWide secure environments whose integrity is assured byprocesses securely controlled in VDE participant userinstallations (nodes). VDE installations, in the preferredembodiment, may include both software and tamper resistanthardware semiconductor elements. Such a semiconductorarrangement comprises, at least in part, special purpose circuitrythat has been designed to protect against tampering with, orunauthorized observation of, the information and functions usedin performing the VDEâs control functions. The special purpose-59-?101520W0 98l09209CA 02265473 1999-02-25PCTIUS97I15243secure circuitry provided by the present invention includes atleast one of: a dedicated semiconductor arrangement known as aSecure Processing Unit (SPU) and/or a standard microprocessor,microcontroller, and/or other processing logic that accommodatesthe requirements of the present invention and functions as anSPU. VDEâs secure hardware may be found incorporated into,for example, a fax/modem chip or chip pack, I/O controller, videodisplay controller, and/or other available digital processingarrangements. It is anticipated that portions of the presentinventionâs VDE secure hardware capabilities may ultimately bestandard design elements of central processing units (CPUS) forcomputers and various other electronic devices.Designing VDE capabilities into one or more standardmicroprocessor, microcontroller and/or other digital processingcomponents may materially reduce VDE related hardware costsby employing the same hardware resources for both thetransaction management uses contemplated by the presentinvention and for other, host electronic appliance functions. Thismeans that a VDE SPU can employ (share) circuitry elements ofa âstandardâ CPU. For example, if a âstandardâ processor canoperate in protected mode and can execute VDE relatedinstructions as a protected activity, then such an embodimentmay provide suf?cient hardware security for a variety of-50-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243applications and the expense of a special purpose processormight be avoided. Under one preferred embodiment of thepresent invention, certain memory (e.g., RAM, ROM, NVRAM) ismaintained during VDE related instruction processing in aprotected mode (for example, as supported by protected modemicroprocessors). This memory is located in the same package asthe processing logic (e.g. processor). Desirably, the packagingand memory of such a processor would be designed usingsecurity techniques that enhance its resistance to tampering.The degree of overall securitynof the VDE system isprimarily dependent on the degree of tamper resistance andconcealment of VDE control process execution and related datastorage activities. Employing special purpose semiconductorpackaging techniques can signi?cantly contribute to the degreeof security. Concealment and tamper-resistance insemiconductor memory (e.g., RAM, ROM, NVRAM) can beachieved, in part, by employing such memory within an SPUpackage, by encrypting data before it is sent to external memory(such as an external RAM package) and decrypting encrypteddata within the CPU/RAM package before it is executed. Thisprocess is used for important VDE related data when such datais stored on unprotected media, for example, standard hoststorage, such as random access memory, mass storage, etc. In-51-?1015WO 98/0920920CA 02265473 1999-02-25PCTIU S9'7/ 15243that event, a VDE SPU would encrypt data that results from asecure VDE execution before such data was stored in externalmemory.Summary of Some Important Features Provided by VDE inAccordance With the Present InventionVDE employs a variety of capabilities that serve as afoundation for a general purpose, su?iciently secure distributedelectronic commerce solution. VDE enables an electroniccommerce marketplace that supports divergent, competitivebusiness partnerships, agreements, and evolving overallbusiness models. For example, VDE includes features that:âsufficientlyâ impede unauthorized and/oruncompensated use of electronic information and/orappliances through the use of securecommunication, storage, and transactionmanagement technologies. VDE supports a modelwide, distributed security implementation whichcreates a single secure âvirtualâ transactionprocessing and information storage environment.VDE enables distributed VDE installations tosecurely store and communicate information andremotely control the execution processes and the-62-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243character of use of electronic information at otherVDE installations and in a wide variety of ways;support low-cost, ef?cient, and e?ective securityarchitectures for transaction control, auditing,reporting, and related communications andinformation storage. VDE may employ taggingrelated security techniques, the time-ageing ofencryption keys, the compartmentalization of bothstored control information (including differentiallytagging such stored information to ensure againstsubstitution and tampering) and distributed content(to, for many content applications, employ one ormore content encryption keys that are unique to thespecific VDE installation ancl/or user), private keytechniques such as triple DES to encrypt content,public key techniques such as RSA to protectcommunications and to provide the benefits ofdigital signature and authentication to securely bindtogether the nodes of a VDE arrangement, secureprocessing of important transaction managementexecutable code, and a combining of a small amountof highly secure, hardware protected storage spacewith a much larger âexposedâ mass media storage-63-?101520WO 98/09209CA 02265473 1999-02-25PCTIU S97] 15243space storing secured (normally encrypted andtagged) control and audit information. VDEemploys special purpose hardware distributedthroughout some or all locations of a VDEimplementation: a) said hardware controllingimportant elements of: content preparation (such ascausing such content to be placed in a VDE contentcontainer and associating content controlinformation withsaid content), content and/orelectronic appliance usage auditing, content usageanalysis, as well as content usage control; and b)said hardware having been designed to securelyhandle processing load module control activities,wherein said control processing activities mayinvolve a sequence of required control factors;support dynamic user selection of informationsubsets of a VDE electronic information product(VDE controlled content). This contrasts with theconstraints of having to use a few high levelindividual, pre-de?ned content provider informationincrements such as being required to select a wholeinformation product or product section in order toacquire or otherwise use a portion of such product or-54-?WO 98/09209101520......i..................,._.,....t..,....._,. ., .CA 02265473 1999-02-25PCT /U S97/ 15243section. VDE supports metering and usage controlover a variety of increments (including âatomicâincrements, and combinations of different incrementtypes) that are selected ad hoc by a user andrepresent a collection of preâidenti?ed one or moreincrements (such as one or more blocks of apreidenti?ed nature, e.g., bytes, images, logicallyrelated blocks) that form a generally arbitrary, butlogical to a user, content âdeliverable.â VDE controlinformation (including budgeting, pricing andmetering) can be con?gured so that it canspecifically apply, as appropriate, to ad hoc selectionof different, unanticipated variable user selectedaggregations of information increments and pricinglevels can be, at least in part. based on quantitiesand/or nature of mixed increment selections (forexample, a certain quantity of certain text couldmean associated images might be discounted by15%; a greater quantity of text in the âmixedâincrement selection might mean the images arediscounted 20%). Such user selected aggregatedinformation increments can reflect the actualrequirements of a user for information and is more?exible than being limited to a single, or a few, high-65-?101520WO 98/09209CA 02265473 1999-02-25PCTfUS97I15243level, (e.g. product, document, database record)predetermined increments. Such high levelincrements may include quantities of informationnot desired by the user and as a result be morecostly than the subset of information needed by theuser if such a subset was available. In sum, thepresent invention allows information contained inelectronic information products to be suppliedaccording to user speci?cation. Tailoring to userspeci?cation allows the present invention to providethe greatest value to users, which in turn willgenerate the greatest amount of electronic commerceactivity. The user, for example, would be able todefine an aggregation of content derived fromvarious portions of an available content product, butwhich, as a deliverable for use by the user, is anentirely unique aggregated increment. The usermay, for example, select certain numbers of bytes ofinformation from various portions of an informationproduct, such as a reference work, and copy them todisc in unencrypted form and be billed based ontotal number of bytes plus a surcharge on thenumber of âarticlesâ that provided the bytes. Acontent provider might reasonably charge less for-55-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97ll5243such a user de?ned information increment since theuser does not require all of the content from all ofthe articles that contained desired information. Thisprocess of de?ning a user desired informationincrement may involve arti?cial intelligencedatabase search tools that contribute to the locationof the most relevant portions of information from aninformation product and cause the automatic displayto the user of information describing search criteriahits for user selection or the automatic extractionand delivery of such portions to the user. VDEfurther supports a wide variety of predefinedincrement types including:0 bytes,0 images,0 content over time for audio or video, or anyother increment that can be identi?ed by contentprovider data mapping efforts, such as:0 sentences,0 paragraphs,0 articles,0 database records, and0 byte offsets representing increments oflogically related information.-57-?101520WO 98109209CA 02265473 1999-02-25PCTIU S97/ 15243VDE supports as many simultaneous prede?ned increment typesas may be practical for a given type of content and businessmodel.securely store at a users site potentially highlydetailed information re?ective of a userâs usage of avariety of different content segment types andemploying both inexpensive âexposedâ host massstorage for maintaining detailed information in theform of encrypted data and maintaining summaryinformation for security testing in highly securespecial purpose VDE installation nonvolatilememory (if available).support trusted chain of handling capabilities forpathways of distributed electronic informationand/or for content usage related information. Suchchains may extend, for example, from a contentcreator, to a distributor, a redistributor, a clientuser, and then may provide a pathway for securelyreporting the same and/or differing usageinformation to one or more auditors, such as to oneor more independent clearinghouses and then backto the content providers, including content creators.-68..?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243The same and/or different pathways employed forcertain content handling, and related content controlinformation and reporting information handling,may also be employed as one or more pathways forelectronic payment handling (payment ischaracterized in the present invention asadministrative content) for electronic content and/orappliance usage. These pathways are used forconveyance of all or portions of content, and/orcontent related control information. Contentcreators and other providers can specify thepathways that, partially or fully, must be used todisseminate commercially distributed propertycontent, content control information, paymentadministrative content, and/or associated usagereporting information. Control information speci?edby content providers may also specify which specificparties must or may (including, for example, a groupof eligible parties from which a selection may bemade) handle conveyed information. It may alsospecify what transmission means (for exampletelecommunication carriers or media types) andtransmission hubs must or may be used.-69-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243support ?exible auditing mechanisms, such asemploying âbitmap meters,â that achieve a highdegree of efficiency of operation and throughput andallow, in a practical manner, the retention andready recall of information related to previous usageactivities and related patterns. This flexibility isadaptable to a Wide variety of billing and securitycontrol strategies such as:I upgrade pricing (e.g. suite purchases),I pricing discounts (including quantitydiscounts),I billing related time duration variables such asdiscounting new purchases based on thetiming of past purchases, andI security budgets based on quantity ofdifferent, logically related units of electronicinformation used over an interval of time.Use of bitmap meters (including âregularâ andâwideâ bitmap meters) to record usage and/orpurchase of information, in conjunction with otherelements of the preferred embodiment of the presentinvention, uniquely supports ef?cient maintenanceof usage history for: (a) rental, (b) ?at fee licensing-70-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243or purchase, (C) licensing or purchase discountsbased upon historical usage variables, and (cl)reporting to users in a manner enabling users todetermine whether a certain item was acquired, oracquired Within a certain time period (Withoutrequiring the use of conventional databasemechanisms, which are highly inef?cient for theseapplications). Bitmap meter methods recordactivities associated With electronic appliances,properties, objects, or portions thereof, and/oradministrative activities that are independent ofspecific properties, objects, etc., performed by a userand/or electronic appliance such that a contentand/or appliance provider and/or controller of anadministrative activity can determine whether acertain activity has occurred at some point, orduring a certain period, in the past (for example,certain use of a commercial electronic contentproduct and/or appliance). Such determinations canthen be used as part of pricing and/or controlstrategies of a content and/or appliance provider,and/or controller of an administrative activity. Forexample, the content provider may choose to chargeonly once for access to a portion of a property,-71-?U!101520W0 98l09209CA 02265473 1999-02-25PCT/US97/15243regardless of the number of times that portion of theproperty is accessed by a user.support âlaunchableâ content, that is content thatcan be provided by a content provider to anend-user, who can then copy or pass along thecontent to other end-user parties without requiringthe direct participation of a content provider toregister and/or otherwise initialize the content foruse. This content goes âout of (the traditionaldistribution) channelâ in the form of a âtravelingA object.â Traveling objects are containers thatsecurely carry at least some permissions informationand/or methods that are required for their use (suchmethods need not be carried by traveling objects ifthe required methods will be available at, or directlyavailable to, a destination VDE installation).Certain travelling objects may be used at some or allVDE installations of a given VDE arrangement sincethey can make available the content controlinformation necessary for content use Withoutrequiring the involvement of a commercial VDEvalue chain participant or data securityadministrator (e.g. a control oi?cer or network-72-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243administrator). As long as traveling object controlinformation requirements are available at the userVDE installation secure subsystem (such as thepresence of a sufficient quantity of ?nancial creditfrom an authorized credit provider), at least sometravelling object content may be used by a receivingparty without the need to establish a connectionwith a remote VDE authority (until, for example,budgets are exhausted or a time content usagereporting interval has occurred). Traveling objectscan travel âout-of-channel,â allowing, for example, auser to give a copy of a traveling object whosecontent is a software program, a movie or a game, toa neighbor, the neighbor being able to use thetraveling object if appropriate credit (e.g. anelectronic clearinghouse account from aclearinghouse such as VISA or AT&T) is available.Similarly, electronic information that is generallyavailable on an Internet, or a similar network,repository might be provided in the form of atraveling object that can be downloaded andsubsequently copied by the initial downloader andthen passed along to other parties who may pass theobject on to additional pa.rties..73-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243provide very ?exible andextensible useridenti?cation according to individuals, installations,by groups such as classes, and by function andhierarchical identi?cation employing a hierarchy oflevels of client identi?cation (for example, clientorganization ID, client department ID, clientnetwork ID, client project ID, and client employeeID, or any appropriate subset of the above).provide a general purpose, secure, component basedcontent control and distribution system thatfunctions as a foundation transaction operatingsystem environment that employs executable codepieces crafted for transaction control and auditing.These code pieces can be reused to optimizeefficiency in creation and operation of trusted,distributed transaction management arrangements.VDE supports providing such executable code in theform of âatomicâ load modules and associated data.Many such load modules are inherentlycon?gurable, aggregatable, portable, and extensibleand singularly, or in combination (along withassociated data), run as control methods under theVDE transaction operating environment. VDE can-74-?101520W0 98l09209CA 02265473 1999-02-25PCT/US97/15243satisfy the requirements of widely differingelectronic commerce and data security applicationsby, in part, employing this general purposetransaction management foundation to securelyprocess VDE transaction related control methods.Control methods are created primarily through theuse of one or more of said executable, reusable loadmodule code pieces (normally in the form ofexecutable object components) and associated data.The component nature of control methods allows thepresent invention to âefficiently operate as a highlyconfigurable content control system. Under thepresent invention, content control models can beiteratively and asynchronously shaped, andotherwise updated to accommodate the needs ofVDE participants to the extent that such shapingand otherwise updating conforms to constraintsapplied by a VDE application, if any (e.g., whethernew component assemblies are accepted and, if so,what certi?cation requirements exist for suchcomponent assemblies or whether any or certainparticipants may shape any or certain controlinformation by selection amongst optional controlinformation (permissions record) control methods.-75-?10«1520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243This iterative (or concurrent) multiple participantprocess occurs as a result of the submission and useof secure, control information components(executable code such as load modules and/ormethods, and/or associated data). Thesecomponents may be contributed independently bysecure communication between each controlinformation in?uencing VDE participantâs VDEinstallation and may require certi?cation for usewith a given application, Where such certi?cationwas provided by a certi?cation service manager forthe VDE arrangement who ensures secureinteroperability and/or reliability (e.g., bug controlresulting from interaction) between appliances andsubmitted control methods. The transactionmanagement control functions of a VDE electronicappliance transaction operating environmentinteract with non-secure transaction managementoperating system functions to properly directtransaction processes and data related to electronicinformation security, usage control, auditing, andusage reporting. VDE provides the capability tomanages resources related to secure VDE content-73-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243and/or appliance control information execution anddata storage.facilitate creation of application and/or systemfimctionality under VDE and to facilitate integrationinto electronic appliance environments of loadmodules and methods created under the presentinvention. To achieve this, VDE employs anApplication Programmerâs Interface (API) and/or atransaction operating system (such as a ROS)programming language with incorporated functions, âboth of which support the use of capabilities and canbe used to efficiently and tightly integrate VDEfunctionality into commercial and user applications.support user interaction through: (a) âPop-Upâapplications which, for example, provide messages tousers and enable users to take speci?c actions suchas approving a transaction, (b) stand-alone VDEapplications that provide administrativeenvironments for user activities such as: end-userpreference speci?cations for limiting the price pertransaction, unit of time, and/or session, for-77-?101520WO 98109209CA 02265473 1999-02-25PCT/U S97/ 15243accessing history information concerning previous 9transactions, for reviewing ?nancial informationsuch as budgets, expenditures (e.g. detailed and/orsummary) and usage analysis information, and (c)VDE aware applications which, as a result of the useof a VDE API and/or a transaction management (forexample, ROS based) programming languageembeds VDE âawarenessâ into commercial orinternal software (application programs, games, etc.)so that VDE user control information and servicesare seamlessly integrated into such software andcan be directly accessed by a user since theunderlying functionality has been integrated intothe commercial softWareâs native design. Forexample, in a VDE aware word processorapplication, a user may be able to âprintâ adocument into a VDE content container object,applying speci?c control information by selectingfrom amongst a series of different menu templatesfor different purposes (for example, a confidentialmemo template for internal organization purposesmay restrict the ability to âkeep,â that is to make anelectronic copy of the memo).-73-?10.1520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243employ âtemplatesâ to ease the process of con?guringcapabilities of the present invention as they relate tospeci?c industries or businesses. Templates areapplications or application add-ons under thepresent invention. Templates support the efficientspeci?cation and/or manipulation of criteria relatedto speci?c content types, distribution approaches,pricing mechanisms, user interactions with contentand/or administrative activities, and/or the like.Given the very large range of capabilities andcon?gurations supported by the present invention,reducing the range of con?guration opportunities toa manageable subset particularly appropriate for agiven business model allows the full con?gurablepower of the present invention to be easily employedby âtypicalâ users who would be otherwise burdenedwith complex programming and/or con?gurationdesign responsibilities template applications canalso help ensure that VDE related processes aresecure and optimally bug free by reducing the risksassociated with the contribution of independentlydeveloped load modules, including unpredictableaspects of code interaction between independentmodules and applications, as well as security risks-79-?101520W0 98l09209CA 02265473 1999-02-25PCT/US97l15243associated with possible presence of viruses in suchmodules. VDE, through the use of templates,reduces typical user con?guration responsibilities toan appropriately focused set of activities includingselection of method types (e.g. functionality) throughmenu choices such as multiple choice, icon selection,and/or prompting for method parameter data (suchas identi?cation information, prices, budget limits,dates, periods of time, access rights to specificcontent, etc.) that supply appropriate and/ornecessary data for control information purposes. Bylimiting the typical (non-programming) user to alimited subset of con?guration activities whosegeneral con?guration environment (template) hasbeen preset to reflect general requirementscorresponding to that user, or a content or otherbusiness model can very substantially limitdifficulties associated with content containerization(including placing initial control information oncontent), distribution, client administration,electronic agreement implementation, end-userinteraction, and clearinghouse activities, includingassociated interoperability problems (such ascon?icts resulting from security, operating system,-30-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97l15243and/or certi?cation incompatibilities). Use ofappropriate VDE templates can assure users thattheir activities related to content VDEcontainerization, contribution of other controlinformation, communications, encryption techniquesand/or keys, etc. will be in compliance withspeci?cations for their distributed VDEarrangement. VDE templates constitute presetcon?gurations that can normally be recon?gurableto allow for new and/or modi?ed templates thatre?ect adaptation into new industries as they evolveor to re?ect the evolution or other change of anexisting industry. For example, the templateconcept may be used to provide individual, overallframeworks for organizations and individuals thatcreate, modify, market, distribute, consume, and/orotherwise use movies, audio recordings and liveperformances, magazines, telephony based retailsales, catalogs, computer software, information databases, multimedia, commercial communications,advertisements, market surveys, infomercials,games, CAD/CAM services for numericallycontrolled machines, and the like. As the contextsurrounding these templates changes or evolves,-81-?10.1520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243template applications provided under the presentinvention may be modi?ed to meet these changes forbroad use, or for more focused activities. A givenVDE participant may have a plurality of templatesavailable for different tasks. A party that placescontent in its initial VDE container may have avariety of different, con?gurable templatesdepending on the type of content and/or businessmodel related to the content. An endâuser may havedifferent con?gurable templates that can be appliedto different document types (eâmail, secure internaldocuments, database records, etc.) and/or subsets ofusers (applying differing general sets of controlinformation to different bodies of users, for example,selecting a list of users who may, under certainpreset criteria, use a certain document). Of course,templates may, under certain circumstances have?xed control information and not provide for userselections or parameter data entry.support plural, different control models regulatingthe use and/or auditing of either the same speci?ccopy of electronic information content and/ordifferently regulating different copies (occurrences)-82-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243of the same electronic information content.Differing models for billing, auditing, and securitycan be applied to the same piece of electronicinformation content and such differing sets ofcontrol information may employ, for controlpurposes, the same, or differing, granularities ofelectronic information control increments. Thisincludes supporting variable control information forbudgeting and auditing usage as applied to a varietyof predefined increments of electronic information,including employing a variety of different budgetsand/or metering increments for a given electronicinformation deliverable for: billing units of measure,credit limit, security budget limit and securitycontent metering increments, and/or marketsurveying and customer pro?ling content meteringincrements. For example, a CD-ROM disk with adatabase of scientific articles might be in part billedaccording to a formula based on the number of bytesdecrypted, number of articles containing said bytesdecrypted, while a security budget might limit theuse of said database to no more than 5% of thedatabase per month for users on the wide areanetwork it is installed on.-83-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243provide mechanisms to persistently maintaintrusted content usage and reporting controlinformation through both a sufficiently secure chainof handling of content and content controlinformation and through various forms of usage ofsuch content wherein said persistence of control maysurvive such use. Persistence of control includes theability to extract information from a VDE containerobject by creating a new container whose contentsare at least in part secured and that contains bothI the extracted content and at least a portion of thecontrol information which control information of theoriginal container and/or are at least in partproduced by control information of the originalcontainer for this purpose and/or VDE installationcontrol information stipulates should persist and/orcontrol usage of content in the newly formedcontainer. Such control information can continue tomanage usage of container content if the containeris âembeddedâ into another VDE managed object,such as an object which contains plural embeddedVDE containers, each of which contains contentderived (extracted) from a different source.-34.?101520WO 98/09209CA 02265473 1999-02-25PCT/US97l15243enables users, other value chain participants (suchas clearinghouses and government agencies), and/oruser organizations, to specify preferences orrequirements related to their use of electroniccontent and/or appliances. Content users, such asend-user customers using commercially distributedcontent (games, information resources, softwareprograms, etc.), can define, if allowed by seniorcontrol information, budgets, and/or other controlinformation, to manage their own internal use ofcontent. Uses include, for example, a user setting alimit on the price for electronic documents that theuser is willing to pay without prior express userauthorization, and the user establishing thecharacter of metering information he or she iswilling to allow to be collected (privacy protection).This includes providing the means for content usersto protect the privacy of information derived fromtheir use of a VDE installation and content and/orappliance usage auditing. In particular, VDE canprevent information related to a participantfs usageof electronic content from being provided to otherparties without the participantâs tacit or explicitagreement..35-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243provide mechanisms that allow control informationto âevolveâ and be modi?ed according, at least inpart, to independently, securely delivered furthercontrol information. Said control information mayinclude executable code (e.g., load modules) that hasbeen certi?ed as acceptable (e. g., reliable andtrusted) for use with a speci?c VDE application,class of applications, and/or a VDE distributedarrangement. This âmodification (evolution) ofcontrol information can occur upon content controlinformation (load modules and any associated data)circulating to one or more VDE participants in apathway of handling of control information, or itmay occur upon control information being receivedfrom a VDE participant. Handlers in a pathway ofhandling of content control information, to theextent each is authorized, can establish, modify,and/or contribute to, permission, auditing, payment,and reporting control information related tocontrolling, analyzing, paying for, and/or reportingusage of, electronic content and/or appliances (forexample, as related to usage of VDE controlledproperty content). Independently delivered (from anindependent source which is independent except in-35-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97l15243regards to certi?cation), at least in part secure,control information can be employed to securelymodify content control information when contentcontrol information has ?owed from one party toanother party in a sequence of VDE content controlinformation handling. This modi?cation employs,for example, one or more VDE componentassemblies being securely processed in a VDE securesubsystem. In an alternate embodiment, controlinformation may be modi?ed by a senior partythrough use of their VDE installation securesub-system after receiving submitted, at least inpart secured, control information from a âjunior"party, normally in the form of a VDE administrativeobject. Control» information passing along VDEpathways can represent a mixed control set, in thatit may include: control information that persistedthrough a sequence of control information handlers,other control information that was allowed to bemodi?ed, and further control informationrepresenting new control information and/ormediating data. Such a control set represents anevolution of control information for disseminatedcontent. In this example the overall content control-37-?101520W0 98l09209CA 02265473 1999-02-25PCT/US97/15243set for a VDE content container is âevolvingâ as itsecurely (e.g. communicated in encrypted form andusing authentication and digital signaturingtechniques) passes, at least in part, to a newparticipantâs VDE installation Where the proposedcontrol information is securely received andhandled. The received control information may beintegrated (through use of the receiving partiesâVDE installation secure subâsystem) With inâplacecontrol information through a negotiation processinvolving both control information sets. Forexample, the modi?cation, within the securesub-system of a content providerâs VDE installation,of content control information for a certain VDEcontent container may have occurred as a result ofthe incorporation of required control informationprovided by a ?nancial credit provider. Said creditprovider may have employed their VDE installationto prepare and securely communicate (directly orindirectly) said required control information to saidcontent provider. Incorporating said requiredcontrol information enables a content provider toallow the credit providerâs credit to be employed by acontent end-user to compensate for the endâuserâs-33-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243use of VDE controlled content and/or appliances, solong as said end-user has a credit account with said?nancial credit provider and said credit account hassuf?cient credit available. Similarly, controlinformation requiring the payment of taxes and/orthe provision. of revenue information resulting fromelectronic commerce activities may be securelyreceived by a content provider. This controlinformation may be received, for example, from agovernment agency. Content providers might berequired by law to incorporate such controlinformation into the control information forcommercially distributed content and/or servicesrelated to appliance usage. Proposed controlinformation is used to an extent allowed by seniorcontrol information and as determined by anynegotiation tradeâoffs that satisfy prioritiesstipulated by each set (the received set and theproposed set). VDE also accommodates differentcontrol schemes speci?cally applying to differentparticipants (e.g., individual participants and/orparticipant classes (types)) in a network of VDEcontent handling participants.-89-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243support multiple simultaneous control models forthe same content property and/or property portion.This allows, for example, for concurrent businessactivities which are dependent on electroniccommercial product content distribution, such asacquiring detailed market survey information and/orsupporting advertising, both of which can increaserevenue and result in lower content costs to usersand greater value to content providers. Such controlinformation and/or overall control models may beapplied, as determined or allowed by controlinformation, in differing manners to differentparticipants in a pathway of content, reporting,payment, and/or related control informationhandling. VDE supports applying different contentcontrol information to the same and/or differentcontent and/or appliance usage related activities,and/or to different parties in a content and/orappliance usage model, such that different parties(or classes of VDE users, for example) are subject todiffering control information managing their use ofelectronic information content. For example,differing control models based on the category of auser as a distributor of a VDE controlled content-90-?O1101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243object or an end-user of such content may result indifferent budgets being applied. Alternatively, forexample, a one distributor may have the right todistribute a different array of properties thananother distributor (from a common contentcollection provided, for example, on optical disc). Anindividual, and/or a class or other grouping ofend-users, may have different costs (for example, astudent, senior citizen, and/or poor citizen user ofcontent who may be provided with the same ordiffering discounts) than a âtypicalâ content user.support provider revenue information resulting fromcustomer use of content and/or appliances, and/orprovider and/or end-user payment of taxes, throughthe transfer of credit and/or electronic currency fromsaid end-user and/or provider to a governmentagency, might occur âautomaticallyâ as a result ofsuch received control information causing thegeneration of a VDE content container whosecontent includes customer content usage informationre?ecting secure, trusted revenue summaryinformation and/or detailed user transaction listings(level of detail might depend, for example on type or-91-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243size of transactionâ§information regarding a bankinterest payment to a customer or a transfer of alarge (e.g. over $10,000) might be, by law,automatically reported to the government). Suchsummary and/or detailed information related totaxable events and/or currency, and/or creditorcurrency transfer, may be passed along a pathway ofreporting and/or payment to the government in aVDE container. Such a container may also be usedfor other VDE related content usage reportinginformation.support the ?owing of content control informationthrough different âbranchesâ of content controlinformation handling so as to accommodate, underthe present inventionâs preferred embodiment,diverse controlled distributions of VDE controlledcontent. This allows different parties to employ thesame initial electronic content with differing(perhaps competitive) control strategies. In thisinstance, a party who ?rst placed controlinformation on content can make certain controlassumptions and these assumptions would evolveinto more speci?c and/or extensive control-92-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243assumptions. These control assumptions can evolveduring the branching sequence upon content modelparticipants submitting control information changes,for example, for use in ânegotiatingâ with âin placeâcontent control information. This can result in newor modi?ed content control information and/or itmight involve the selection of certain one or morealready âin-placeâ content usage control methodsover in-place alternative methods, as well as thesubmission of relevant control informationparameter data. This form of evolution of differentcontrol information sets applied to different copies ofthe same electronic property content and./orappliance results from VDE control information?owing âdownâ through different branches in anoverall pathway of handling and control and beingmodified differently as it diverges down thesedifferent pathway branches. This ability of thepresent invention to support multiple pathwaybranches for the flow of both VDE content controlinformation and VDE managed content enables anelectronic commerce marketplace which supportsdiverging, competitive business partnerships,agreements, and evolving overall business models-93-?10â1520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243which can employ the same content propertiescombined, for example, in differing collections ofcontent representing diifering at least in partcompetitive products.enable a user to securely extract, through the use ofthe secure subsystem at the userâs VDE installation,at least a portion of the content included within aVDE content container to produce a new, secureobject (content container), such that the extractedinformation is maintained in a continually securemanner through the extraction process. Formationof the new VDE container containing such extractedcontent shall result in control information consistentwith, or speci?ed by, the source VDE contentcontainer, and/or local VDE installation securesubsystem as appropriate, content controlinformation. Relevant control information, such assecurity and administrative information, derived, atleast in part, from the parent (source) objectâscontrol information, will normally be automaticallyinserted into a new VDE content container objectcontaining extracted VDE content. This processtypically occurs under the control framework of a-94-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243parent object and/or VDE installation controlinformation executing at the userâs VDE installationsecure subsystem (With, for example, at least aportion of this inserted control information beingstored securely in encrypted form in one or morepermissions records). In an alternative embodiment,the derived content control information applied toextracted content may be in part or whole derivedfrom, or employ, content control information storedremotely from the VDE installation that performedthe secure extraction such as at a remote serveri location. As with the content control information formost VDE managed content. features of the presentinvention allows the content's control information to:(a) âevolve,â for example, the extractor of contentmay add new control methods and/or modifycontrol parameter data, such as VDEapplication compliant methods, to the extentallowed by the contentâs in-place controlinformation. Such new control informationmight specify, for example, who may use atleast a portion of the new object, and/or howsaid at least a portion of said extracted-95-?WO 98/092095 (b)10-(c)15(d)20CA 02265473 1999-02-25PCT/US97/15243content may be used (e.g. when at least aportion may be used, or what portion orquantity of portions may be used);allow a user to combine additional contentwith at least a portion of said extractedcontent, such as material authored by theextractor and/or content (for example, images,video, audio, and/or text) extracted from oneor more other VDE container objects forplacement directly into the new container;allow a user to securely edit at least a portionof said content while maintaining said contentin a secure form within said VDE contentcontainer;append extracted content to a preâexistingVDE content container object and attachassociated control information -- in thesecases, user added information may be secured,e.g., encrypted, in part or as a whole, and maybe subject to usage and/or auditing control-95-?101520W0 98I09209(e)CA 02265473 1999-02-25PCT/US97/ 15243information that differs from the those appliedto previously in place object content;preserve VDE control over one or moreportions of extracted content after variousforms of usage of said portions, for example,maintain content in securely stored formwhile allowing âtemporaryâ on screen displayof content or allowing a software program tobe maintained in secure form but transientlydecrypt any encrypted executing portion ofsaid program (all, or only a portion, of saidprogram may be encrypted to secure theprogram).Generally-, the extraction features of the presentinvention allow users to aggregate and/ordisseminate and/or otherwise use protectedelectronic content information extracted fromcontent container sources While maintaining secureVDE capabilities thus preserving the rights ofproviders in said content information after variouscontent usage processes.-97-?101520WO 98/09209CA 02265473 1999-02-25PCTlUS97l15243support the aggregation of portions of VDEcontrolled content, such portions being subject todiffering VDE content container control information,wherein various of said portions may have beenprovided by independent, different content providersfrom one or more different locations remote to theuser performing the aggregation. Such aggregation,in the preferred embodiment of the presentinvention, may involve preserving at least a portionof the control information (e.g., executable code suchas load modules) for each of various of said portionsby, for example. embedding some or all of suchportions individually as VDE content containerobjects within an overall VDE content containerand/or embedding some or all of such portionsdirectly into a VDE content container. In the lattercase, content control information of said contentcontainer may apply differing control informationsets to various of such portions based upon saidportions original control information requirementsbefore aggregation. Each of such embedded VDEcontent containers may have its own controlinformation in the form of one or more permissionsrecords. Alternatively, a negotiation between-98-?101520WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243control information associated with variousaggregated portions of electronic content, mayproduce a control information set that would governsome or all of the aggregated content portions. TheVDE content control information produced by thenegotiation may be uniform (such as having thesame load modules and/or component assemblies,and/or it may apply differing such content controlinformation to two or more portions that constitutean aggregation of VDE controlled content such asdiffering metering, budgeting, billing and/orpayment models. For example, content usagepayment may be automatically made, either througha clearinghouse, or directly, to different contentproviders for different potions.enable flexible metering of, or other collection ofinformation related to, use of electronic contentand/or electronic appliances. A feature of thepresent invention enables such flexibility ofmetering control mechanisms to accommodate asimultaneous, broad array of: (a) differentparameters related to electronic information contentuse; (b) different increment units (bytes, documents,-99-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243properties, paragraphs, images, etc.) and/or otherorganizations of such electronic content; and/or (c)different categories of user and/or VDE installationtypes, such as client organizations, departments,projects, networks, and/or individual users, etc.This feature of the present invention can beemployed for content security, usage analysis (forexample, market surveying), and/or compensationbased upon the use and/or exposure to VDEmanaged content. Such metering is a ?exible basisfor ensuring payment for content royalties,licensing, purchasing, and/or advertising. A featureof the present invention provides for payment meanssupporting flexible electronic currency and creditmechanisms, including the ability to securelymaintain audit trails reflecting information relatedto use of such currency or credit. VDE supportsmultiple differing hierarchies of client organizationcontrol information wherein an organization clientadministrator distributes control informationspecifying the usage rights of departments, users,and/or projects. Likewise, a department (division)network manager can function as a distributor- 100-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97I15243(budgets, access rights, etc.) for departmentnetworks, projects, and/or users, etc.provide scalable, integratable, standardized controlmeans for use on electronic appliances ranging frominexpensive consumer (for example, televisionset-top appliances) and professional devices (andhand-held PDAS) to servers, mainframes,communication switches, etc. The scalabletransaction management/ auditing technology of thepresent invention will result in more efficient andreliable interoperability amongst devices functioningin electronic commerce and/or data securityenvironments. As standardized physical containershave become essential to the shipping of physicalgoods around the world, allowing these physicalcontainers to universally â?tâ unloading equipment,ef?ciently use truck and train space, andaccommodate known arrays of objects (for example,boxes) in an ef?cient manner, so VDE electroniccontent containers may, as provided by the presentinvention, be able to ef?ciently move electronicinformation content (such as commercially publishedproperties, electronic currency and credit, and-101-?WO 98l09209101520CA 02265473 1999-02-25PCT/US97/15243Content audit informationl, and associated contentcontrol information, around the World.Interoperability is fundamental to ef?cientelectronic commerce. The design of the VDEfoundation, VDE load modules, and VDE containers,are important features that enable the VDE nodeoperating environment to be compatible with a verybroad range of electronic appliances. The ability, forexample, for control methods based on load modulesto execute in very âsmallâ and inexpensive securesub-system environments, such as environmentswith very little read/write memory, While also beingable to execute in large memory sub-systems thatmay be used in more expensive electronicappliances, supports consistency across manymachines. This consistent VDE operatingenvironment, includingits control structures andcontainer architecture, enables the use ofstandardized content containers across a broadrange of device types and host operatingenviromnents. Since VDE capabilities can beseamlessly integrated as extensions, additions,and/or modifications to fundamental capabilities ofelectronic appliances and host operating systems,-102-?10â1520WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243VDE containers, content control information, andthe VDE foundation will be able to work with manydevice types and these device types will be able toconsistently and efficiently interpret and enforceVDE control information. Through this integrationusers can also bene?t from a transparent interactionwith many of the capabilities of VDE. VDEintegration with software operating on a hostelectronic appliance supports a variety ofcapabilities that would be unavailable or less securewithout such integration. Through integration Withone or more device applications and/or deviceoperating environments, many capabilities of thepresent invention can be presented as inherentcapabilities of a given electronic appliance,operating system, or appliance application. Forexample, features of the present invention include:(a) VDE system software to in part extend and/ormodify host operating systems such that theypossesses VDE capabilities, such as enabling securetransaction processing and electronic informationstorage; (b) one or more application programs that inpart represent tools associated with VDE operation;and/or (c) code to be integrated into application-103-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243programs, wherein such (code incorporates referencesinto VDE system software to integrate VDEcapabilities and makes such applications VDEaware (for example, word processors, databaseretrieval applications, spreadsheets, multimediapresentation authoring tools, ?lm editing software,music editing software such as MIDI applicationsand the like, robotics control systems such as thoseassociated with CAD/CAM environments and NCMsoftware and the like, electronic mail systems,teleconferencing software, and other data authoring,creating, handling, and/or usage applicationsincluding combinations of the above). These one ormore features (which may also be implemented in?rmware or hardware) may be employed inconjunction with a VDE node secure hardwareprocessing capability, such as a microcontroller(s),microprocessor(s), other CPU(s) or other digitalprocessing logic.employ audit reconciliation and usage patternevaluation processes that assess, through certain,normally network based, transaction processingreconciliation and threshold checking activities,-104-?101520WO 98/09209CA 02265473 1999-02-25PCTIU S97/ 15243whether certain violations of security of a VDEarrangement have occurred. These processes areperformed remote to VDE controlled contentend-user VDE locations by assessing, for example,purchases, and/or requests, for electronic propertiesby a given VDE installation. Applications for suchreconciliation activities include assessing whetherthe quantity of remotely delivered VDE controlledcontent corresponds to the amount of financial creditand/or electronic currency employed for the use ofsuch content. A trusted organization can acquireinformation from content providers concerning thecost for content provided to a given VDE installationand/or user and compare this cost for content withthe credit and/or electronic currency disbursementsfor that installation and/or user. Inconsistencies inthe amount of content delivered versus the amountof disbursement can prove, and/or indicate,depending on the circumstances, whether the localVDE installation has been, at least to some degree,compromised (for example, certain important systemsecurity functions, such as breaking encryption forat least some portion of the secure subsystem and/orVDE controlled content by uncovering one or more-105-?1091520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243keys). Determining whether irregular patterns (e.g.unusually high demand) of content usage, orrequests for delivery of certain kinds of VDEcontrolled information during a certain time periodby one or more VDE installations and/or users(including, for example, groups of related usersWhose aggregate pattern of usage is suspicious) mayalso be useful in determining Whether security atsuch one or more installations, and/or by such one ormore users, has been compromised, particularlywhen used in combination. with an assessment ofelectronic credit and/or currency provided to one ormore VDE users and/or installations, by some or allof their credit and/or currency suppliers, comparedwith the disbursements made by such users and/orinstallations.support security techniques that materially increasethe time required to âbreakâ a systemâs integrity.This includes using a collection of techniques thatminimizes the damage resulting from comprisingsome aspect of the security features of the presentinventions.-106-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97l15243provide a family of authoring, administrative,reporting, payment, and billing tool userapplications that comprise components of thepresent inventionâs trusted/secure, universe wide,distributed transaction control and administrationsystem. These components support VDE related:object creation (including placing controlinformation on content), secure object distributionand management (including distribution controlinformation, ?nancial related, and other usageanalysis), client internal VDE activitiesadministration and control, security management,user interfaces, payment disbursement, andclearinghouse related functions. These componentsare designed to support highly secure, uniform,consistent, and standardized: electronic commerceand/or data security pathwayl s) of handling,reporting, and/or payment; content control andadministration; and human factors (e.g. userinterfaces).support the operation of a plurality ofclearinghouses, including, for example, both?nancial and user clearinghouse activities, such as-107-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243those performed by a client administrator in a largeorganization to assist in the organizationâs use of aVDE arrangement, including usage informationanalysis, and control of VDE activities byindividuals and groups of employees such asspecifying budgets and the character of usage rightsavailable under VDE for certain groups of and/orindividual, client personnel, subject to controlinformation series to control information submittedby the client administrator. At a clearinghouse, oneor more VDE installations may operate togetherwith a trusted distributed database environment(which may include concurrent database processingmeans). A financial clearinghouse normally receivesat its location securely delivered content usageinformation, and user requests (such as requests forfurther credit, electronic currency, and/or highercredit limit). Reporting of usage information anduser requests can be used for supporting electroniccurrency, billing, payment and credit relatedactivities, and/or for user pro?le analysis and/orbroader market survey analysis and marketing(consolidated) list generation or other informationderived, at least in part, from said usage-108-?101520WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243information. this information can be provided tocontent providers or other parties, through secure,authenticated encrypted communication to the VDEinstallation secure subsystems. Clearinghouseprocessing means would normally be connected tospecialized I/O means, which may include highspeed telecommunication switching means that maybe used for secure communications between aclearinghouse and other VDE pathway participants.securely support electronic currency and creditusage control, storage, and communication at, andbetween, VDE installations. VDE further supportsautomated passing of electronic currency and/orcredit information, including payment tokens (suchas in the form of electronic currency or credit) orother payment information, through a pathway ofpayment, which said pathway may or may not be thesame as a pathway for content usage informationreporting. Such payment may be placed into a VDEcontainer created automatically by a VDEinstallation in response to control informationstipulating the âWithdrawalâ of credit or electroniccurrency from an electronic credit or currency-109-?101520WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243account based upon an amount owed resulting fromusage of VDE controlled electronic content and/orappliances. Payment credit or currency may then beautomatically communicated in protected (at least inpart encrypted) form through telecommunication ofa VDE container to an appropriate party such as aclearinghouse, provider of original property contentor appliance, or an agent for such provider (otherthan a clearinghouse). Payment information may bepackaged in said VDE content container with, orWithout, related content usage information, such as9 metering information. An aspect of the presentinvention further enables certain informationregarding currency use to be specified asunavailable to certain, some, or all VDE parties(âconditiona1ly" to fully anonymous currency) and/orfurther can regulate certain content information,such as currency and/or credit use relatedinformation (and/or other electronic informationusage data) to be available only under certain strictcircumstances, such as a court order (which mayitself require authorization through the use of acourt controlled VDE installation that may berequired to securely access âconditionallyâ-110-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243anonymous information). Currency and creditinformation, under the preferred embodiment of thepresent invention, is treated as administrativecontent;support ?ngerprinting (also known aswatermarking) for embedding in content such thatwhen content protected under the present inventionis released in clear form from a VDE object(displayed. printed, communicated, extracted, and/orsavedâ), information representing the identi?cationof the user and/or VDE installation responsible fortransforming the content into clear form isembedded into the released content. Fingerprintingis useful in providing an ability to identify whoextracted information in clear form a VDEcontainer, or who made a copy of a VDE object or aportion of its contents. Since the identity of the userand/or other identifying information may beembedded in an obscure or generally concealed- manner, in VDE container content and/or controlinformation, potential copyright violators may bedeterred from unauthorized extraction or copying.Fingerprinting normally is embedded into-111-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243unencrypted electronic content or controlinformation, though it can be embedded intoencrypted content and later placed in unencryptedcontent in a secure VDE installation sub-system asthe encrypted content carrying the ?ngerprintinginformation is decrypted. Electronic information,such as the content of a VDE container, may be?ngerprinted as it leaves a network (such asInternet) location bound for a receiving party. Suchrepository information may be maintained inunencrypted form prior to communication and beencrypted as it leaves the repository. Fingerprintingwould preferably take place as the content leavesthe repository, but before the encryption step.Encrypted repository content can be decrypted, forexample in a secure VDE sub-system, ?ngerprintinformation can be inserted, and then the contentcan be re-encrypted for transmission. Embeddingidentification information of the intended recipientuser and/or VDE installation into content as itleaves, for example, an Internet repository, wouldprovide important information that would identifyor assist in identifying any party that managed tocompromise the security of a VDE installation or the-112-?101520WO 98109209CA 02265473 1999-02-25PCT/US97/15243delivered content. If a party produces an authorizedclear form copy of VDE controlled content, includingmaking unauthorized copies of an authorized clearform copy, fingerprint information would point backto that individual and/or his or her VDEinstallation. Such hidden information will act as astrong disincentive that should dissuade asubstantial portion of potential content âpiratesâfrom stealing other parties electronic information.Fingerprint information identifying a receivingparty and/or VDE installation can be embedded intoa VDE object before, or during, decryption.replication, or communication of VDE contentobjects to receivers. Fingerprinting electroniccontent before it is encrypted for transfer to acustomer or other user provides information thatcan be very useful for identifying who receivedcertain content which may have then beendistributed or made available in unencrypted form.This information would be useful in tracking whomay have âbrokenâ the security of a VDEinstallation and was illegally making certainelectronic content available to others.Fingerprinting may provide additional, available-113-?WO 98l09209101520CA 02265473 1999-02-25PCT/U S97/ 15243information such as time and/or date of the release(for example extraction) of said content information.Locations for inserting ?ngerprints may be speci?edby VDE installation and/or content container controlinformation. This information may specify thatcertain areas and/or precise locations Withinproperties should be used for ?ngerprinting, such asone or more certain ?elds of information orinformation types. Fingerprinting information maybe incorporated into a property by modifying in anormally undetectable Way color frequency and/orthe brightness of certain image pixels, by slightlymodifying certain audio signals as to frequency, bymodifying font character formation, etc.Fingerprint information, itself, should be encryptedso as to make it particularly difficult for tampered?ngerprints to be interpreted as valid. Variations in?ngerprint locations for different copies of the sameproperty; âfalseâ ?ngerprint information; andmultiple copies of ?ngerprint information Within aspeci?c property or other content which copiesemploy different ?ngerprinting techniques such asinformation distribution patterns, frequency and/orbrightness manipulation, and encryption related-114-?10.1520WO 98/09209CA 02265473 1999-02-25PCT/US97l15243techniques, are features of the present invention forincreasing the difficulty of an unauthorizedindividual identifying ?ngerprint locations anderasing and/or modifying ?ngerprint information.provide smart object agents that can carry requests,data, and/or methods, including budgets,authorizations, credit or currency, and content. Forexample, smart objects may travel to and/or fromremote information resource locations and ful?llrequests for electronic information content. Smartobjects can, for example, be transmitted to a remotelocation to perform a speci?ed database search onbehalf of a user or otherwise âintelligentlyâ searchremote one or more repositories of information foruser desired information. After identifying desiredinformation at one or more remote locations, by forexample, performing one or more database searches,a smart object may return via communication to theuser in the form of a secure âreturn objectâcontaining retrieved information. A user may becharged for the remote retrieving of information, thereturning of information to the users VDEinstallation, and/or the use of such information. In-115-?WO 98/09209O1101520CA 02265473 1999-02-25PCTIUS97/15243the latter case, a user may be charged only for theinformation in the return object that the useractually uses. Smart objects may have the means torequest use of one or more services and/or resources.Services include locating other services and/orresources such as information resources, language orformat translation. processing, credit (or additionalcredit) authorization, etc. Resources includereference databases, networks, high powered orspecialized computing resources (the smart objectmay carry information to another computer to beefficiently processed and then return theinformation to the sending VDE installation),remote object repositories, etc. Smart objects canmake efficient use of remote resources (e.g.centralized databases, super computers, etc.) whileproviding a secure means for charging users basedon information and/or resources actually used.support both âtranslationsâ of VDE electronicagreements elements into modern language printedagreement elements (such as English languageagreements) and translations of electronic rightsprotection/transaction management modern-116~?101520WO 98109209CA 02265473 1999-02-25PCT/U S97] 15243language agreement elements to electronic VDEagreement elements. This feature requiresmaintaining a library of textual language thatcorresponds to VDE load modules and/or methodsand/or component assemblies. As VDE methods areproposed and/or employed for VDE agreements, alisting of textual terms and conditions can beproduced by a VDE user application which, in apreferred embodiment, provides phrases, sentencesand/or paragraphs that have been stored andcorrespond to said methods and/or assemblies. Thisfeature preferably employs artificial intelligencecapabilities to analyze and automatically determine,and/or assist one or more users to determine, theproper order and relationship between the libraryelements corresponding to the chosen methodsand/or assemblies so as to compose some or allportions of a legal or descriptive document. One ormore users, and/or preferably an attorney (if thedocument a legal, binding agreement), would reviewthe generated document material upon completionand employ such additional textual informationand/or editing as necessary to describe nonelectronic transaction elements of the agreement-117-?10.1520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243and make any other improvements that may benecessary. These features further supportemploying modern language tools that allow one ormore users to make selections from choices andprovide answers to questions and to produce a VDEelectronic agreement from such a process. Thisprocess can be interactive and the VDE agreementformulation process may employ arti?cialintelligence expert system technology that learnsfrom responses and, where appropriate and based atleast in part on said responses, provides furtherchoices and/or questions which âevolvesâ the desiredVDE electronic agreement.support the use of multiple VDE secure subsystemsin a single VDE installation. Various securityand/or performance advantages may be realized byemploying a distributed VDE design Within a singleVDE installation. For example, designing a phardware based VDE secure subsystem into anelectronic appliance VDE display device, anddesigning said subsystemâs integration with saiddisplay device so that it is as close as possible to thepoint of display, will increase the security for video-118-?101520WO 98/09209CA 02265473 1999-02-25PCT IU S97/ 15243materials by making it materially more dif?cult toâstealâ decrypted video information as it moves fromoutside to inside the_video system. Ideally, forexample, a VDE secure hardware module would bein the same physical package as the actual displaymonitor, such as within the packaging of a videomonitor or other display device, and such devicewould be designed, to the extent commerciallypractical, to be as tamper resistant as reasonable.As another example, embedding a VDE hardwaremodule into an I/O peripheral may have certainA advantages from the standpoint of overall systemthroughput. If multiple VDE instances areemployed within the same VDE installation, theseinstances will ideally share resources to the extentpractical, such as VDE instances storing certaincontrol information and content and/or applianceusage information on the same mass storage deviceand in the same VDE management database.requiring reporting and payment compliance byemploying exhaustion of budgets and time ageing ofkeys. For example, a VDE commercial arrangementand associated content control information may-119-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243involve a content provide?s content and the use ofclearinghouse credit for payment for end-user usageof said content. Control information regarding saidarrangement may be delivered to a userâs (of saidcontent) VDE installation and/or said ?nancialclearinghouseâs VDE installation. Said controlinformation might require said clearinghouse toprepare and telecommunicate to said contentprovider both content usage based information in acertain form. and content usage payment in the formof electronic credit (such credit might be âownedâ bythe provider after receipt and used in lieu of theavailability or adequacy of electronic currency)and/or electronic currency. This delivery ofinformation and payment may employ trusted VDEinstallation secure subsystems to securely, and insome embodiments, automatically, provide in themanner speci?ed by said control information, saidusage information and payment content. Featuresof the present invention help ensure that arequirement that a clearinghouse report such usageinformation and payment content Will be observed.For example, if one participant to a VDE electronicagreement fails to observe such information-120-?WO 98/09209101520CA 02265473 1999-02-25PCT/US97/15243reporting and/or paying obligation, anotherparticipant can stop the delinquent party fromsuccessfully participating in VDE activities relatedto such agreement. For example, if required usageinformation and payment was not reported asspeci?ed by content control information, theâinjuredâ party can fail to provide, through failing tosecurely communicate from his VDE installationsecure subsystem, one or more pieces of secureinformation necessary for the continuance of one ormore critical processes. For example, failure toreport information and/or payment from aclearinghouse to a content provider (as well as anysecurity failures or other disturbing irregularities)can result in the content provider not providing keyand/or budget refresh information to theclearinghouse, which information can be necessaryto authorize use of the clearinghouseâs credit forusage of the providerâs content and which theclearinghouse would communicate to endâuserâsduring a content usage reporting communicationbetween the clearinghouse and end-user. Asanother example, a distributor that failed to makepayments and/or report usage information to a-121-?WO 98l09209101520CA 02265473 1999-02-25PCT/US97/15243content provider might ?nd that their budget forcreating permissions records to distribute thecontent providerâs content to users, and/or a securitybudget limiting one or more other aspect of their useof the providerâs content, are not being refreshed bythe content provider, once exhausted or timed-out(for example, at a predetermined date). In these andother cases, the offended party might decide not torefresh time ageing keys that had âaged out.â Sucha use of time aged keys has a similar impact asfailing to refresh budgets or time-agedauthorizations.support smart card implementations of the presentinvention in the form of portable electronicappliances, including cards that can be employed assecure credit, banking, and/or money cards. Afeature of the present invention is the use ofportable VDEs as transaction cards at retail andother establishments, wherein such cards can âdockâwith an establishment terminal that has a VDEsecure sub-system and/or an online connection to aVDE secure and/or otherwise secure and compatiblesubsystem, such as a âtrustedâ financial-122-?WO 98/09209101520CA 02265473 1999-02-25PCT/U S97/ 15243clearinghouse (e.g., VISA, Mastercard). The VDEcard and the terminal (and/or online connection) cansecurely exchange information related to atransaction, with credit and/or electronic currencybeing transferred to a merchant and/orclearinghouse and transaction information ?owingback to the card. Such a card can be used fortransaction activities of all sorts. A docking station,such as a PCMCLA connector on an electronicappliance, such as a personal computer, can receivea consumerâs VDE card at home. Such astation/card combination can be used for on-linetransactions in the same manner as a VDEinstallation that is permanently installed in such anelectronic appliance. The card can be used as anâelectronic walletâ and contain electronic currency aswell as credit provided by a clearinghouse. The cardcan act as a convergence point for ?nancial activitiesof a consumer regarding many, if not all, merchant,banking, and on-line financial transactions,including supporting home banking activities. Aconsumer can receive his paycheck and/orinvestment earnings and/or âauthenticâ VDE contentcontainer secured detailed information on such-123-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243receipts, through on-line connections. A user cansend digital currency to another party with a VDEarrangement, including giving away such currency.A VDE card can retain details of transactions in ahighly secure and database organized fashion sothat ?nancially related information is bothconsolidated and very easily retrieved and/oranalyzed. Because of the VDE security, includinguse of effective encryption, authentication, digitalsignaturing, and secure database structures, therecords contained within a VDE card arrangement 'may be accepted as valid transaction records forgovernment and/or corporate recordkeepingrequirements. In some embodiments of the presentinvention a VDE card may employ docking stationand/or electronic appliance storage means and/orshare other VDE arrangement means local to saidappliance and/or available across a network, toaugment the information storage capacity of theVDE card, by for example, storing dated, and/orarchived, backup information. Taxes relating tosome or all of an individualâs financial activities maybe automatically computed based on âauthenticâinformation securely stored and available to said-124-?101520WO 98/09209CA 02265473 1999-02-25PCTlUS97l15243VDE card. Said information may be stored in saidcard, in said docking station, in an associatedelectronic appliance, and/or other device operativelyattached thereto, and/or remotely, such as at aremote server site. A cardâs data, e.g. transactionhistory, can be backed up to an individualâs personalcomputer or other electronic appliance and such anappliance may have an integrated VDE installationof its own. A current transaction, recenttransactions (for redundancy), or all or otherselected card data may be backed up to a remotebackup repository, such a VDE compatiblerepository at a financial clearinghouse, during eachor periodic docking for a ?nancial transaction and/orinformation communication such as a user/merchanttransaction. Backing up at least the currenttransaction during a connection with another partyâsVDE installation (for example a VDE installationthat is also on a ?nancial or general purposeelectronic network), by posting transactioninformation to a remote clearinghouse and/or bank,can ensure that sufficient backup is conducted toenable complete reconstruction of VDE card internalinformation in the event of a card failure or loss.-125-?101520WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243support certi?cation processes that ensureauthorized interoperability between various VDEinstallations so as to prevent VDE arrangementsand/or installations that unacceptably deviate inspeci?cation protocols from other VDEarrangements and/or installations frominteroperating in a manner that may introducesecurity (integrity and/or con?dentiality of VDEsecured information), process control, and/orsoftware compatibility problems. Certi?cationvalidates the identity of VDE installations and/ortheir components, as well as VDE users.Certi?cation data can also serve as information thatcontributes to determining the decommissioning orother change related to VDE sites.support the separation of fundamental transactioncontrol processes through the use of event(triggered) based method control mechanisms.These event methods trigger one or more other VDEmethods (which are available to a secure VDEsub-system) and are used to carry out VDE managedtransaction related processing. These triggeredmethods include independently (separably) and- 126-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243securely processable component billing management 9methods, budgeting management methods, meteringmanagement methods, and related auditingmanagement processes. As a result of this feature ofthe present invention, independent triggering ofmetering, auditing, billing, and budgeting methods,the present invention is able to e?ciently,concurrently support multiple ?nancial currencies(e.g. dollars, marks, yen) and content relatedbudgets, and/or increments as well as very?exible content distribution models.support, complete, modular separation of the controlstructures related to (1) content event triggering, (2)auditing, (3) budgeting (including specifying no rightof use or unlimited right of use), (4) billing, and (5)user identity (VDE installation, client name,department, network, and/or user, etc.). Theindependence of these VDE control structuresprovides a ?exible system which allows pluralrelationships between two or more of thesestructures, for example, the ability to associate a?nancial budget with different event triggerstructures (that are put in place to enable-127-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97l15243controlling content based on its logical portions).Without such separation between these basic VDEcapabilities, it would be more dif?cult to efficientlymaintain separate metering, budgeting,identi?cation, and/or billing activities which involvethe same, differing (including overlapping), orentirely different, portions of content for metering,billing, budgeting, and user identi?cation, forexample, paying fees associated with usage ofcontent, performing home banking, managingadvertising services, etc. VDE modular separationof these basic capabilities supports the programmingof plural, "arbitrary" relationships between one ordiffering content portions (and/or portion units) andbudgeting, auditing, and/or billing controlinformation. For example, under VDE, a budgetlimit of $200 dollars or 300 German Marks a monthmay be enforced for decryption of a certain databaseand 2 U.S. Dollars or 3 German Marks may becharged for each record of said database decrypted(depending on user selected currency). Such usagecan be metered While an additional audit for userpro?le purposes can be prepared recording theidentity of each ?led displayed. Additionally,â 128-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243further metering can be conducted regarding thenumber of said database bytes that have beendecrypted, and a related security budget mayprevent the decrypting of more than 5% of the totalbytes of said database per year. The user may also,under VDE (if allowed by senior controlinformation), collect audit information re?ectingusage of database ?elds by different individuals andclient organization departments and ensure thatdiffering rights of access and differing budgetslimiting database usage can be applied to theseclient individuals and groups. Enabling contentproviders and users to practically employ suchdiverse sets of user identification, metering,budgeting, and billing control information results, inpart, from the use of such independent controlcapabilities. As a result, VDE can support greatcon?gurability in creation of plural control modelsapplied to the same electronic property and thesame and/or plural control models applied todiffering or entirely different content models (forexample, home banking versus electronic shopping).-129-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243Methods, Other Control Information, and VDE ObjectsVDE control information (e.g., methods) that collectivelycontrol use of VDE managed properties (database, document,individual commercial product), are either shipped with thecontent itself (for example, in a content container) and/or one ormore portions of such control information is shipped todistributors and/or other users in separably deliverableâadministrative objects.â A subset of the methods for a propertymay in (part be delivered with each property while one or moreother subsets of methods can be delivered separately to a user orotherwise made available for use (such as being availableremotely by telecommunication means). Required methods(methods listed as required for property and/or appliance use)must be available as specified if VDE controlled content (such asintellectual property distributed Within a VDE content container)is to be used. Methods that control content may apply to aplurality of VDE container objects, such as a class or othergrouping of such objects. Methods may also be required bycertain users or classes of users and/or VDE installations and/orclasses of installations for such parties to use one or morespeci?c, or classes of, objects.A feature of VDE provided by the present invention is thatcertain one or more methods can be specified as required in order-130-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97l15243for a VDE installation and/or user to be able to use certainand/or all content. For example, a distributor of a certain type ofcontent might be allowed by âseniorâ participants (by contentcreators, for example) to require a method which prohibitsend-users from electronically saving decrypted content, aprovider of credit for VDE transactions might require an auditmethod that records the time of an electronic purchase, and/or auser might require a method that summarizes usage informationfor reporting to a clearinghouse (e.g. billing information) in away that does not convey con?dential, personal informationregarding detailed usage behavior.A further feature of VDE provided by the presentinvention is that creators, distributors, and users of content canselect from among a set of prede?ned methods (if available) tocontrol container content usage and distribution functions and/orthey may have the right to provide new customized methods tocontrol at least certain usage functions (such âneW" methods maybe required to be certi?ed for trustedness and interoperability tothe VDE installation and/or for of a group of VDE applications).As a result, VDE provides a very high degree of con?gurabilitywith respect to how the distribution and other usage of eachproperty or object (or one or more portions of objects or propertiesas desired and/or applicable) will be controlled. Each VDE-131-?10,1520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243pa.rticipant in a VDE pathway of content control informationmay set methods for some or all of the content in a VDEcontainer, so long as such control information does not con?ictwith senior control information already in place With respect to:(1) certain or all VDE managed content,(2 ) certain one or more VDE users and/or groupings ofusers,(3) certain one or more VDE nodes and/or groupings ofnodes, and/or(4) certain one or more VDE applications and/orarrangements.For example, a content creatorâs VDE control informationfor certain content can take precedence over other submittedVDE participant control information and, for example, if allowedby senior control information, a content distributors controlinformation may itself take precedence over a clientadministratorâs control information, which may take precedenceover an end-userâs control information. A path of distributionparticipantâs ability to set such electronic content control-132-?101520WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243information can be limited to certain control information (forexample, method mediating data such as pricing and/or salesdates) or it may be limited only to the extent that one or more ofthe participantâs proposed control information con?icts withcontrol information set by senior control information submittedpreviously by participants in a chain of handling of the property,or managed in said participantâs VDE secure subsystem.VDE control information may, in part or in full, (a)represent control information directly put in place by VDEcontent control information pathway participants, and/or (b)comprise control information put in place by such a participanton behalf of a party who does not directly handle electroniccontent (or electronic appliance) permissions records information(for example control information inserted by a participant onbehalf of a ?nancial clearinghouse or government agency). Suchcontrol information methods (and/or load modules and/ormediating data and/or component assemblies) may also be put inplace by either an electronic automated, or a semi-automatedand human assisted, control information (control set) negotiatingprocess that assesses Whether the use of one or more pieces ofsubmitted control information will be integrated into and/orreplace existing control information (and/or chooses betweenalternative control information based upon interaction with-133-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97l15243in-place control information) and how such control informationmay be used.Control information may be provided by a party who doesnot directly participate in the handling of electronic content(and/or appliance) and/or control information for such content(and/or appliance). Such control information may be provided insecure form using VDE installation secure sub-system managedcommunications (including, for example, authenticating thedeliverer of at least in part encrypted control information)between such not directly participating one or more partiesâ VDEinstallation secure subsystems, and a pathway of VDE contentcontrol information participantâs VDE installation securesubsystem. This control information may relate to, for example,the right to access credit supplied by a ?nancial servicesprovider, the enforcement of regulations or laws enacted by agovernment agency, or the requirements of a customer of VDEmanaged content usage information (re?ecting usage of contentby one or more parties other than such customer) relating to thecreation, handling and/or manner of reporting of usageinformation received by such customer. Such control informationmay, for example, enforce societal requirements such as lawsrelated to electronic commerce.- 134-?101520WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243VDE content control information may apply differently todi?'erent pathway of content and/or control information handlingparticipants. Furthermore, permissions records rights may beadded, altered, and/or removed by a VDE participant if they areallowed to take such action. Rights of VDE participants may bede?ned in relation to speci?c parties and/or categories of partiesand/or other groups of parties in a chain of handling of contentand/or content control information (eg, permissions records).Modifications to control information that may be made by agiven, eligible party or parties, may be limited in the number ofmodifications, and/or degree of modi?cation, they may make.At least one secure subsystem in electronic appliances ofcreators, distributors, auditors, clearinghouses, clientadministrators, and end-users (understanding that two or moreof the above classi?cations may describe a single user) provides aâsuf?cientlyâ secure (for the intended applications) environmentfor:1. Decrypting properties and control information;2. Storing control and metering related information;3. Managing communications;-135-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 152434. Processing core control programs, along withassociated data, that constitute control informationfor electronic content and/or appliance rightsprotection, including the enforcing of preferencesand requirements of VDE participants.Normally, most usage, audit, reporting, payment, anddistribution control methods are themselves at least in partencrypted and are executed by the secure subsystem of a VDEinstallation. Thus, for example, billing and metering records canbe securely generated and updated, and encryption anddecryption keys are securely utilized, Within a secure subsystem.Since VDE also employs secure (e.g. encrypted andauthenticated) communications when passing informationbetween the participant location (nodes) secure subsystems of aVDE arrangement, important components of a VDE electronicagreement can be reliably enforced with su?icient security(sufficiently trusted) for the intended commercial purposes. AVDE electronic agreement for a value chain can be composed, atleast in part, of one or more subagreements between one or moresubsets of the value chain participants. These subagreementsare comprised of one or more electronic contract âcomplianceâelements (methods including associated parameter data) thatensure the protection of the rights of VDE participants.-136-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243The degree of trustedness of a VDE arrangement will beprimarily based on whether hardware SPUs are employed atparticipant location secure subsystems and the effectiveness ofthe SPU hardware security architecture, software securitytechniques when an SPU is emulated in software, and theencryption algorithm(s) and keys that are employed for securingcontent, control information, communications, and access to VDEnode (VDE installation) secure subsystems. Physical facility anduser identity authentication security procedures may be usedinstead of-hardware SPUS at certain nodes, such as at anestablished ?nancial clearinghouse, where such procedures mayprovide suf?cient security for trusted interoperability with aVDE arrangement employing hardware SPUS at user nodes.The updating of property management ?les at eachlocation of a VDE arrangement, to accommodate new or modi?edcontrol information, is performed in the VDE secure subsystemand under the control of secure management ?le updatingprograms executed by the protected subsystem. Since all securecommunications are at least in part encrypted and theprocessing inside the secure subsystem is concealed from outsideobservation and interference, the present invention ensures thatcontent control information can be enforced. As a result, thecreator and/or distributor and/or client administrator and/or-137-?101520CA 02265473 1999-02-25wo 98,09209 PCT/US97I15243other contributor of secure control information for each property(for example, an end-user restricting the kind of auditinformation he or she will allow to be reported and/or a ?nancialclearinghouse establishing certain criteria for use of its credit forpayment for use of distributed content) can be con?dent thattheir contributed and accepted control information will beenforced (Within the security limitations of a given VDE securityimplementation design). This control information can determine,for example:( 1) How and/or to whom electronic content can beprovided, for example, how an electronic propertycan be distributed;(2) How one or more objects and/or properties, orportions of an object or property, can be directlyused, such as decrypted, displayed, printed, etc;(3) How payment for usage of such content and/orcontent portions may or must be handled; and(4) How audit information about usage informationrelated to at least a portion of a property should becollected, reported, and/or used.-138-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243Seniority of contributed control information, includingresolution of conflicts between content control informationsubmitted by multiple parties, is normally established by:(1)(2)(3)the sequence in which control information is put inplace by various parties (in place control informationnormally takes precedence over subsequentlysubmitted control information),the specifics of VDE content and/or appliance controlinformation. For example, in-place controlâ information can stipulate which subsequent one ormore piece of control from one or more parties orclass of parties will take precedence over controlinformation submitted by one or more yet differentparties and/or classes of parties, and/ornegotiation between control information sets fromplural parties, which negotiation establishes Whatcontrol information shall constitute the resultingcontrol information set for a given piece of VDEmanaged content and/or VDE installation.-139-?CA 02265473 1999-02-25wo 93/09209 PCT/US97/15243Electronic Agreements and Rights ProtectionAn important feature of VDE is that it can be used toassure the administration of, and adequacy of security and rightsprotection for, electronic agreements implemented through the5 use of the present invention. Such agreements may involve oneor more of:(1) creators, publishers, and other distributors, ofelectronic information,10 '(2) financial service (e..g. credit) providers,(3) users of(other than ?nancial senice providers)information arising from content usage such as15 content speci?c demographic information and userspeci?c descriptive information. Such users mayinclude market analysts, marketing list compilersfor direct and directed marketing, and governmentagencies,20(4) end users of content,(5) infrastructure service and device providers such astelecommunication companies and hardware-140-?CA 02265473 1999-02-25wo 98/09209 PCT/US97/15243manufacturers (semiconductor and electronicappliance and/or other computer systemmanufacturers) who receive compensation basedupon the use of their services and/or devices, and(6) certain parties described by electronic information.VDE supports commercially secure âextendedâ value chainelectronic agreements. VDE can be con?gured to support the10 various underlying agreements between parties that comprisethis extended agreement. These agreements can de?neimportant electronic commerce considerations including:(1) security,â15(2) content use control, including electronic distribution,(3) privacy (regarding, for example, informationconcerning parties described by medical, credit, tax,20 personal, and/or of other forms of confidentialinformation),(4) management of ?nancial processes, and-141-?CA 02265473 1999-02-25WO 98109209 PCT/US97/15243(5) pathways of handling for electronic content, contentand/or appliance control information, electroniccontent and/or appliance usage information andpayment and/or credit.5101520VDE agreements may de?ne the electronic commercerelationship of two or more parties of a value chain, but suchagreements may, at times, not directly obligate or otherwisedirectly involve other VDE value chain participants. Forexample, an electronic agreement between a content creator anda distributor may establish both the price to the distributor for acreatorâs content (such as for a property distributed in a VDEcontainer object) and the number of copies of this object that thisdistributor may distribute to end-users over a given period oftime. In a second agreement, a value chain end-user may beinvolved in a three party agreement in which the end-useragrees to certain requirements for using the distributed productsuch as accepting distributor charges for content use andagreeing to observe the copyright rights of the creator. A thirdagreement might exist between the distributor and a ?nancialclearinghouse that allows the distributor to employ theclearinghouseâs credit for payment for the product if the end-userhas a separate (fourth) agreement directly with theclearinghouse extending credit to the end-user. A fifth, evolving-142-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97] 15243agreement may develop between all value chain participants ascontent control information passes along its chain of handling.This evolving agreement can establish the rights of all parties tocontent usage information, including, for example, the nature ofinformation to be received by each party and the pathway ofhandling of content usage information and related procedures. Asixth agreement in this example, may involve all parties to theagreement and establishes certain general assumptions, such assecurity techniques and degree of trustedness (for example,commercial integrity of the system may require each VDEinstallation secure subsystem to electronically warrant that theirVDE node meets certain interoperability requirements). In theabove example, these six agreements could comprise agreementsof an extended agreement for this commercial value chaininstance.VDE agreements support evolving (âlivingâ) electronicagreement arrangements that can be modified by current and/ornew participants through very simple to sophisticatedânegotiationsâ between newly proposed content controlinformation interacting with control information already in placeand/or by negotiation between concurrently proposed contentcontrol information submitted by a plurality of parties. A givenmodel may be asynchronously and progressively modi?ed over-143-?10âl520CA 02265473 1999-02-25PCT/US97/15243WO 98/09209time in accordance with existing senior rules and suchmodification may be applied to all, to classes of, and/or to speci?ccontent, and/or to classes and/or speci?c users and/or user nodes.A given piece of content may be subject to different controlinformation at different times or places of handling, dependingon the evolution of its content control information (and/or ondiffering, applicable VDE installation content controlinformation). The evolution of control information can occurduring the passing along of one or more VDE control informationcontaining objects, that is control information may be modi?ed atone or more points along a chain of control information handling,so long as such modi?cation is allowed. As a result, VDEmanaged content may have different control information appliedat both different âlocationsâ in a chain of content handling and atsimilar locations in differing chains of the handling of suchcontent. Such different application of control information mayalso result from content control information specifying that acertain party or group of parties shall be subject to contentcontrol information that differs from another party or group ofparties. For example, content control information for a givenpiece of content may be stipulated as senior information andtherefore not changeable, might be put in place by a contentcreator and might stipulate that national distributors of a givenpiece of their content may be permitted to make 100,000 copies-144-?101520CA 02265473 1999-02-25WO 98109209 PCT/US97/15243per calendar quarter, so long as such copies are provided to boni?de end-users, but may pass only a single copy of such content toa local retailers and the control information limits such a retailerto making no more than 1,000 copies per month for retail sales toend-users. In addition, for example, an end-user of such contentmight be limited by the same content control information tomaking three copies of such content, one for each of threedifferent computers he or she uses (one desktop computer atWork, one for a desktop computer at home, and one for a portablecomputer).Electronic agreements supported by the preferredembodiment of the present invention can vary from very simpleto very elaborate. They can support widely diverse informationmanagement models that provide for electronic informationsecurity, usage administration, and communication and maysupport:(a) secure electronic distribution of information, forexample commercial literary properties,(b) secure electronic information usage monitoring andreporting,-145-?WO 98/09209(c)(d)(e)101520CA 02265473 1999-02-25PCT/US97/15243secure ?nancial transaction capabilities related toboth electronic information and/or appliance usageand other electronic credit and/or currency usageand administration capabilities,privacy protection for usage information a user doesnot wish to release, andâlivingâ electronic information content disseminationmodels that ?exibly accommodate:(1) a breadth of participants,(2) one or more pathways (chains) for: thehandling of content, content and/or appliancecontrol information, reporting of contentand/or appliance usage related information,and/or payment,(3) supporting an evolution of terms andconditions incorporated into content controlinformation, including use of electronicnegotiation capabilities,-146-?101520WO 98/09209CA 02265473 1999-02-25PCTlUS97l15243(4) support the combination of multiple pieces ofcontent to form new content aggregations, and(5) multiple concurrent models.Secure Processing UnitsAn important part of VDE provided by the presentinvention is the core secure transaction control arrangement,herein called an SPU (or SPUs), that typically must be present ineach userâs computer. other electronic appliance, or network.SPUs provide a trusted environment for generating decryptionkeys, encrypting and decrypting information, managing thesecure communication of keys and other information betweenelectronic appliances (i.e. between VDE installations and/orbetween plural VDE instances within a single VDE installation),securely accumulating and managing audit trail, reporting, andbudget information in secure and/or nonâsecure non-volatilememory, maintaining a secure database of control informationmanagement instructions, and providing a secure environmentfor performing certain other control and administrativefunctions.A hardware SPU (rather than a software emulation)Within a VDE node is necessary if a highly trusted environment-147-?101520CA 02265473 1999-02-25PCT/US97/15243WO 98/09209for performing certain VDE activities is required. Such a trustedenvironment may be created through the use of certain controlsoftware, one or more tamper resistant hardware modules suchas a semiconductor or semiconductor chipset (including, forexample, a tamper resistant hardware electronic applianceperipheral device), for use Within, and/or operatively connectedto, an electronic appliance. With the present invention, thetrustedness of a hardware SPU_ can be enhanced by enclosingsome or all of its hardware elements within tamper resistantpackaging and/or by employing other tamper resistingtechniques (e.g. microfusing and/or thin wire detectiontechniques). A trusted environment of the present inventionimplemented, in part, through the use of tamper resistantsemiconductor design, contains control logic, such as amicroprocessor, that securely executes VDE processes.A VDE nodeâs hardware SPU is a core component of a VDEsecure subsystem and may employ some or all of an electronicapplianceâs primary control logic, such as a microcontroller,microcomputer or other CPU arrangement. This primary controllogic may be otherwise employed for non VDE purposes such asthe control of some or all of an electronic applianceâs non-VDEfunctions. When operating in a hardware SPU mode, saidprimary control logic must be suf?ciently secure so as to protect-148-?101520WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243and conceal important VDE processes. For example, a hardwareSPU may employ a host electronic appliance microcomputeroperating in protected mode while performing VDE relatedactivities, thus allowing portions of VDE processes to executewith a certain degree of security. This alternate embodiment isin contrast to the preferred embodiment wherein a trustedenvironment is created using a combination of one or moretamper resistant semiconductors that are not part of saidprimary control logic. In either embodiment, certain controlinformation (software and parameter data) must be securelymaintained Within the SPU, and further control information canbe stored externally and securely (e.g. in encrypted and taggedform) and loaded into said hardware SPU when needed. Inmany cases, and in particular with microcomputers, thepreferred embodiment approach of employing special purposesecure hardware for executing said VDE processes, rather thanusing said primary control logic, may be more secure andefficient. The level of security and tamper resistance requiredfor trusted SPU hardware processes depends on the commercialrequirements of particular markets or market niches, and mayvary Widely.-149-?101520WO 98/09209CA 02265473 1999-02-25PCTIUS97l15243B F D R ION F T SThese and other features and advantages provided by thepresent invention(s) may be better and more completelyunderstood by referring to the following detailed description ofpresently preferred example embodiments in connection with thedrawings, of which:FIGURE 1 illustrates an example of a âVirtualDistribution Environmentâ provided in accordance with apreferred example/embodiment of this invention;FIGURE 1A is a more detailed illustration of an exampleof the âInformation Utilityâ shown in FIGURE 1; 'FIGURE 2 illustrates an example of a chain of handlingand control;FIGURE 2A illustrates one example of how rules andcontrol information may persist from one participant to anotherin the Figure 2 chain of handling and control;FIGURE 3 shows one example of different controlinformation that may be provided;-150-?101520CA 02265473 1999-02-25W0 98/09209 PCT/US97Il5243FIGURE 4 illustrates examples of some di?erent types ofrules and/or control information;FIGURES 5A and 5B show an example of an âobjectâ;FIGURE 6 shows an example of a Secure Processing Unit(âSPUâ);FIGURE 7 shows an example of an electronic appliance;FIGURE 8 is a more detailed block diagram of an exampleof the electronic appliance shown in FIGURE 7;FIGURE 9 is a detailed view of an example of the SecureProcessing Unit (SPU) shown in FIGURES 6 and 8;Figure 9A shows an example combined secure processingunit and control processing unit;Figure 9B shows an example secure processing unitintegrated with a standard CPU;-151-?101520W0 98/09209CA 02265473 1999-02-25PCT IU S97/ 15243FIGURE 10 shows an example of a âRights OperatingSystemâ (âROSâ) architecture provided by the VirtualDistribution Environment;FIGURES 11A-11C show examples of functionalrelationship(s) between applications and the Rights OperatingSystem;FIGURES 11D-11J show examples of âcomponentsâ andâcomponent assembliesâ;FIGURE 12 is a more detailed diagram of an example ofthe Rights Operating System shown in FIGURE 10;FIGURE 12A âshows an example of how âobjectsâ can becreated;FIGURE 13 is a detailed block diagram of an example thesoftware architecture for a âprotected processing environmentâshown in FIGURE 12;FIGURES 14A-14C are examples of SPU memory mapsprovided by the protected processing environment shown inFIGURE 13;-152-?10â1520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243FIGURE 15 illustrates an example of how the channelservices manager and load module execution manager ofFIGURE 13 can support a channel;FIGURE 15A is an example of a channel header andchannel detail records shown in FIGURE 15;FIGURE 15B is a ?owchart of an example of programcontrol steps that may be performed by the FIGURE 13 protectedprocessing environment to create a channel;FIGURE 16 is a block diagram of an example of a securedata base structure;FIGURE 17 is an illustration of an example of a logicalobject structure;FIGURE 18 shows an example of a stationary objectstructure;FIGURE 19 shows an example of a traveling objectstructure;-153-?CA 02265473 1999-02-25WO 98/09209 PCT/US97/15243FIGURE 20 shows an example of a content objectstructure;FIGURE 21 shows an example of an administrative object5 structure;FIGURE 22 shows an example of a method core structure;FIGURE 23 shows an example of a load module structure;10FIGURE 24 shows an example of a User Data Element(UDE) and/or Method Data Element (MDE) structure;FIGURES 25A-25C show examples of âmap metersâ;15FIGURE 26 shows an example of a permissions record(PERC) structure;FIGURES 26A and 26B together show a more detailed20 example of a permissions record structure;FIGURE 27 shows an example of a shipping tablestructure;-154-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243FIGURE 28 shows an example of a receiving tablestructure;FIGURE 29 shows an example of an administrative eventlog structure;FIGURE 30 shows an example inter-relationship betweenand use of the object registration table, subject table and userrights table shown in the FIGURE 16 secure database;FIGURE 31 is a more detailed example of an objectregistration table shown in FIGURE 16;FIGURE 32 is a more detailed example of subject tableshown in FIGURE 16;FIGURE 33 is a more detailed example of a user rightstable shown in FIGURE 16;FIGURE 34 shows a speci?c example of how a site recordtable and group record table may track portions of the securedatabase shown in FIGURE 16;-155-?101520WO 98109209CA 02265473 1999-02-25PCT/US97l15243FIGURE 34A is an example of a FIGURE 34 site recordtable structure;FIGURE 34B is an example of a FIGURE 34 group recordtable structure;FIGURE 35 shows an example of a process for updatingthe secure database;FIGURE 36 shows an example of how new elements maybe inserted into the FIGURE 16 secure data base;FIGURE 37 shows an example of how an element of thesecure database may be accessed;FIGURE 38 is a flowchart example of how to protect asecure database element;FIGURE 39 is a ?owchart example of how to back up asecure database;FIGURE 40 is a ?owchart example of how to recover asecure database from a backup;-156-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243FIGURES 41A-41D are a set of examples showing how aâchain of handling and controlâ may be enabled using âreciprocalmethodsâ;FIGURES 42A-42D show an example of a âreciprocalâBUDGET method;FIGURES 43A-43D show an example of a âreciprocalâREGISTER method;FIGURES 44Aâ44C show an example of a âreciprocalâAUDIT method;FIGURES 45-48 show examples of several methods beingused together to control release of content or other information;FIGURES 49, 49Aâ49F show an example OPEN method;FIGURES 50, 50A-50F show an example of a READmethod;FIGURES 51, 51A-51F show an example of a VVRITEmethod;-157-?CA 02265473 1999-02-25wo 98/09209 PCT/US97/15243FIGURE 52 shows an example of a CLOSE method;FIGURES 53A-53B show an example of an EVENTmethod;FIGURE 53C shows an example of a BILLING method;FIGURE 54 shows an example of an ACCESS method;10 ' FIGURES 55A-55B show examples of DECRYPT andENCRYPT methods:FIGURE 56 shows an example of a CONTENT method;15 FIGURES 57A and 57B show examples of EXTRACT andEMBED methods;FIGURE 58A shows an example of an OBSCURE method;20 FIGURES 58B, 58C show examples of a FINGERPRINTmethod;FIGURE 59 shows an example of a DESTROY method;-158-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243FIGURE 60 shows an example of la PANIC method;FIGURE 61 shows an example of a METER method;FIGURE 62 shows an example of a key âconvolutionâprocess;FIGURE 63 shows an example of how di?erent keys maybe generated using a key convolution process to determine aâtrueâ key;FIGURES 64 and 65 show an example of how protectedprocessing environment keys may be initialized;FIGURES 66 and 67 show example processes fordecrypting information contained within stationary andtraveling objects, respectively;Figures 67A and 67B show example techniques forcracking a software-based protected processing environment;FIGURE 68 shows an example of how a protectedprocessing environment may be initialized;-159-?CA 02265473 1999-02-25WO 98/09209 PCT/U S97/ 15243FIGURE 69 shows an example of how ?rmware may bedownloaded into a protected processing environment;Figure 69A shows an example technique for distributing5 protected processing environment software;Figure 69B-69C show an example installation routine forinstalling a software-based protected processing environment;10 Figure 69D shows example techniques for embeddingcryptographic keys at random locations within structure-basedprotected processing environment operational materials;Figure 69E shows example locations for PPE operational15 materials random modi?cations and/or digital fingerprints;Figure 69F shows an example customized static storagelayout for PPE operational materials;20 Figure 69G shows example electronic appliance signaturelocations;Figure 69H shows example sequence dependent andindependent processes;-160-?CA 02265473 1999-02-25wo 98/09209 PCT /US97/ 15243Figures 691 and 69J show example static code and datastorage organizations;Figures 69K-69L together show example steps for5 providing dynamic protection mechanisms;Figure 69M shows an example initialization time checkroutine;10 Figure 69N shows an example time check routine;Figure 690 shows example time check data structures;FIGURE 70 shows an example of multiple VDE electronic15 appliances connected together with a network or othercommunications means;Figure 70A shows how content may be prepared forprinting and encrypted inside a PPE, then decrypted inside a20 printer;Figure 7 OB shows how characters may be selected fromslightly different fonts in order to place an electronic ?ngerprintor watermark into printed output;-161-?1020WO 98109209CA 02265473 1999-02-25PCT/US97/15243Figure 70C shows how characters in a font may bepermuted to render a printed page unusable Without thecorresponding scrambled font;FIGURE 71 shows an example of a portable VDEelectronic appliance;FIGURES 72A-72D show examples of âpop-upâ displaysthat may be generated by the user noti?cation and exceptioninterface;FIGURE 73 shows an example of a âsmart objectâ;FIGURE 74 shows an example of a process using âsmartobjectsâ;FIGURES 75A-75D show examples of data structures usedfor electronic negotiation;FIGURES 75E-75F show example structures relating to anelectronic agreement;FIGURES 76A-76B show examples of electronicnegotiation processes;-162-?101520WO 98l09209CA 02265473 1999-02-25PCT/US97l 15243FIGURE 77 shows a further example of a chain ofhandling and control;FIGURE 78 shows an example of a VDE "repository";FIGURES 79-83 show an example illustrating a chain ofhandling and control to evolve and transform VDE managedcontent and control information;FIGURE 84 shows a further example of a chain ofhandling and control involving several categories of VDEparticipants;FIGURE 85 shows a further example of a chain ofdistribution and handling Within an organization;Figures 86 and 86A show a further example of a chain ofhandling and control; andFigure 87 shows an example of a virtual silicon containermodel.M DET ED DESCR ION-163-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243Figures 1-7 and the discussion below provides an QE_r_\_r_'g_vyof some aspects of features provided by this invention. Followingthis overview is a more technical âdetail descriptionâ of exampleembodiments in accordance with the invention.OverviewFigure 1 shows a âVirtual Distribution Environmentâ(âVDEâ) 100 that may be provided in accordance with thisinvention. In Figure 1, an infogation utility 200 connects tocommunications means 202 such as telephone or cable TV linesfor example. Telephone or cable TV lines 202 may be part of anâelectronic highwayâ that carries electronic information fromplace to place. Lines 202 connect information utility 200 to otherpeople such as for example a consumer 208, an office 210, a videoproduction studio 204, and a publishing house 214. Each of thepeople connected to information utility 200 may be called a âVDEparticipant" because they can participate in transactionsoccurring within the virtual distribution environment 100.Almost any sort of transaction you can think of can besupported by virtual distribution environment 100. A few ofmany examples of transactions that can be supported by virtualdistribution environment 100 include:-164-?101520WO 98109209CA 02265473 1999-02-25PCT/US97I15243- home banking and electronic payments;- electronic legal contracts;- distribution of âcontentâ such as electronic printed matter,video, audio, images and computer programs; and- secure communication of private information such asmedical records and ?nancial information.Virtual distribution environment 100 is âvirtualâ becauseit does not require many of the physical âthingsâ that used to benecessary to protect rights, ensure reliable and predictabledistribution, and ensure proper compensation to content creatorsand distributors. For example, in the past, information wasdistributed on records or disks that were difficult to copy. In thepast, private or secret content was distributed in sealedenvelopes or locked briefcases delivered by courier. To ensureappropriate compensation, consumers received goods andservices only after they handed cash over to a seller. Althoughinformation utility 200 may deliver information by transferringphysical âthingsâ such as electronic storage media, the virtualdistribution environment 100 facilitates a completely electronicâchain of handling and control.âVDE Flexibility Supports Transactions- 165-?101520WO 98/09209CA 02265473 1999-02-25PCTIU S97/ 15243Information utility 200 ?exibly supports many differentkinds of information transactions. Different VDE participantsmay de?ne and/or participate in different parts of a transaction.Information utility 200 may assist with delivering informationabout a transaction, or it may be one of the transactionparticipants.For example, the video production studio 204 in the upperright-hand corner of Figure 1 may create video/televisionprograms. Video production studio 204 may send theseprograms over lines 202, or may use other paths such as satellitelink 205 and CD ROM delivery service 216. Video productionstudio 204 can send the programs directly to consumers 206, 208,210, or it can send the programs to information utility 200 whichmay store and later send them to the consumers, for example.Consumers 206, 208, 210 are each capable of receiving andusing the programs created by video production studio204-âassuming, that is, that the video production studio orinformation utility 200 has arranged for these consumers to haveappropriate â â (control information) that givethe consumers rights to use the programs.Even if a consumer has a copy of a video program, shecannot watch or copy the program unless she has ârules and- 166-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243controlsâ that authorize use of the program. She can use theprogram only as permitted by the ârules and controls.âFor example, video production studio 204 might release ahalf-hour exercise video in the hope that as many viewers aspossible will view it. The video production studio 204 wishes toreceive $2.00 per viewing. Video production studio 204 may,through information utility 200, make the exercise videoavailable in âprotectedâ form to all consumers 206, 208, 210.Video production studio 204 may also provide ârules andcontrolsâ for the video. These ârules and controlsâ may specifyfor example:(1) any consumer who has good credit of at least $2.00based on a credit account with independent ?nancialprovider 212 (such as Mastercard or VISA) may watch thevideo,(2) virtual distribution environment 100 will âmeterâ eachtime a consumer Watches the video, and report usage tovideo production studio 204 from time to time, and(3) financial provider 212 may electronically collectpayment ($2.00) from the credit account of each consumer-167-?1020WO 98/09209CA 02265473 1999-02-25PCT/US97/15243who watches the video, and transfer these payments to thevideo production studio 204.Information utility 200 allows even a small videoproduction studio to market videos to consumers and receivecompensation for its efforts. Moreover, the videos can, withappropriate payment to the video production studio, be madeavailable to other video publishers who may add value and/or actas repackagers or redistributors.Figure 1 also shows a publishing house 214. Publishinghouse 214 may act as a distributor for an author 206. Thepublishing house 214 may distribute rights to use âcontentâ (suchas computer software, electronic newspapers, the video producedby publishing house 214, audio, or any other data) to consumerssuch as office 210. The use rights may be defined by ârules andcontrolsâ distributed by publishing house 216. Publishing house216 may distribute these ârules and controlsâ with the content,but this is not necessary. Because the content can be used onlyby consumers that have the appropriate ârules and controls,âcontent and its associated ârules and controlsâ may bedistributed at different times, in different ways, by differentVDE participants. The ability of VDE to securely distribute and-168-?101520WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243enforce ârules and controlsâ separately from the content theyapply to provides great advantages.Use rights distributed by publishing house 214 may, forexample, permit office 210 to make and distribute copies of thecontent to its employees. Office 210 may act as a redistributor byextending a âchain of handling and controlâ to its employees.The o?ice 210 may add or modify ârules and controlsâ (consistentwith the ârules and controlsâ it receives from publishing house214) to provide office-intemal control information andmechanisms. For example, office 210 may set a maximum usagebudget for each individual user and/or group Within the office, orit may permit only specified employees and/or groups to accesscertain information.Figure 1 also shows an information delivery service 216delivering electronic storage media such as âCD ROMâ disks toconsumers 206. Even though the electronic storage mediathemselves are not delivered electronically by information utility200 over lines 202, they are still part of the virtual distributionenvironment 100. The electronic storage media may be used todistribute content, ârules and controls,â or other information.-169-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243Example of What's Inside Information Utility 200âInformation utilityâ 200 in Figure 1 can be a collection ofparticipants that may act as distributors, ?nancialclearinghouses, and administrators. Figure 1A shows anexample of what may be inside one example of informationutility 200. Information utility participants 200a-200g couldeach be an independent organization/business. There can be anynumber of each of participants 200a-200g. In this example,electronic âswitchâ 200a connects internal parts of informationutility 200 to each other and to outside participants, and mayalso connect outside participants to one another.Information utility 200 may include a âtransactionprocessorâ 200b that processes transactions (to transferelectronic funds, for example) based on requests fromparticipants and/or report receiver 200e. It may also include aâusage analystâ 200c that analyzes reported usage information.A âreport creatorâ 200d may create reports based on usage forexample, and may provide these reports to outside participantsand/or to participants within information utility 200. A âreportreceiverâ 200e may receive reports such as usage reports fromcontent users. A âpermissioning agentâ 200f may distributeârules and controlsâ granting usage or distribution permissionsbased on a profile of a consumerâs credit worthiness, for example.-170~?10152025WO 98/09209CA 02265473 1999-02-25PCT/US97/15243An administrator 200h may provide information that keeps thevirtual distribution environment 100 operating properly. Acontent and message storage 200g may store information for useby participants within or outside of information utility 200.Example of Distributing Contentâ Using A Chain of Handlingand ControlâAs explained above, virtual distribution environment 100can be used to manage almost any sort of transaction. One typeof important transaction that virtual distribution environment100 may be used to manage is the distribution or communication 'of âcontentâ or other important information. Figure 2 moreabstractly shows a âmodelâ of how the Figure 1 virtualdistribution environment 100 may be used to provide a âchain ofhandling and controlâ for distributing content. Each of theblocks in Figure 2 may correspond to one or more of the VDEparticipants shown in Figure 1.In the Figure 2 example, a VDE content oreator 102creates âoootent.â The content creator 102 may also specifyârules and oontrolsâ for the content. Thesedistribution-related ârules and controlsâ can specify who haspermission to distribute the rights to use content, and how manyusers are allowed to use the content.-171-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97l15243Arrow 104 shows the content creator 102 sending theârules and controlsâ associated with the content to a VDE righte 106 (âdistributorâ) over an 108 (orby some other path such as an optical disk sent by a deliveryservice such as U. S. mail). The content can be distributed overthe same or different path used to send the ârules and controls.âThe distributor 106 generates her own ârules and controlsâ thatrelate to ueage of the content. The usage-related ârules andcontrolsâ may, for example, specify what a user can and canât dowith the content and how much it costs to use the content. Theseusage-related ârules and controlsâ must be consistent with theârules and controlsâ speci?ed by content creator 102.Arrow 110 shows the distributor 106 distributing rights touse the content by sending the contentâs ârules and controlsâ to acentent_1_1_s_e_r 112 such as a consumer. The content user 112 usesthe content in accordance with the usage-related ârules andcontrols.ââIn this Figure 2 example, information relating to contentuse is, as shown by arrow 114, ;epe_1j;_e_d to a ?nageialclearinghguee 116. Based on this âreporting,â the ?nancialclearinghouse 116 may generate a bill and send it to the contentuser 112 over a â network 118. Arrow 120-172-?101520WO 98/09209CA 02265473 1999-02-25PCTIU S97/ 15243shows the content user 112 providing pennants for contentusage to the ?nancial clearinghouse 116. Based on the reportsand payments it receives, the financial clearinghouse 116 mayprovide reports and/or payments to the distributor 106. Thedistributor 106 may, as shown by arrow 122, provide reportsand/or payments to the content creator 102. The clearinghouse116 may provide reports and payments directly to the creator102. Reporting and/or payments may be done differently. Forexample, clearinghouse 116 may directly or through an agent,provide reports and/or payments to each of VDE content creators102, and rights distributor 106, as Well as reports to content user112.The distributor 106 and the content creator 102 may bethe same person, or they may be different people. For example, amusical performing group may act as both content creator 102and distributor 106 by creating and distributing its own musicalrecordings. As another example, a publishing house may act as adistributor 106 to distribute rights to use Works created by anauthor content creator 102. Content creators 102 may use adistributor 106 to ef?ciently manage the ?nancial end of contentdistribution.-173-?101520WO 98/09209CA 02265473 1999-02-25PCTfUS97/ 15243The â?nancial clearinghouseâ 116 shown in Figure 2 mayalso be a ' ' t at 1-.â Financial clearinghouse 116 in itsVDE administrator role sends âadministrativeâ information tothe VDE participants. This administrative information helps tokeep the virtual distribution environment 100 operatingproperly. The âVDE administratorâ and ?nancial clearinghouseroles may be performed by different people or companies, andthere can be more than one of each.More about Rules and ControlsâThe virtual distribution environment 100 prevents use ofprotected information except as permitted by the ârules andcontrolsâ (control information). For example. the ârules andcontrolsâ shown in Figure 2 may grant specific individuals orclasses of content users 112 âpermission'â to use certain content.They may specify what kinds of content usage are permitted, andWhat kinds are not. They may specify how content usage is to bepaid for and how much it costs. As another example, ârules andcontrolsâ may require content usage information to be reportedback to the distributor 106 and/or content creator 102.Every VDE participant in âchain of handling and controlâis normally subject to ârules and controls.â âRules and controlsâdefine the respective rights and obligations of each of the various-174-?1020WO 98/09209CA 02265473 1999-02-25PCTIUS97ll5243VDE participants. âRules and controlsâ provide information andmechanisms that may establish interdependencies andrelationships between the participants. âRules and controlsâ areflexible, and permit âvirtual distribution environmentâ 100 tosupport most âtraditionalâ business transactions. For example:- âRules and controlsâ may specify which ?nancialclearinghouse(s) 116 may process payments,- âRules and controlsâ may specify which participant(s)receive what kind of usage report, and- âRules and controlsâ may specify that certain informationis revealed to certain participants, and that otherinformation is kept secret from them.âRules and controlsâ may self limit if and how they may bechanged. Often, ârules and controlsâ speci?ed by one VDEparticipant cannot be changed by another VDE participant. Forexample, a content user 112 generally canât change ârules andcontrolsâ specified by a distributor 106 that require the user topay for content usage at a certain rate. âRules and controlsâ mayâpersistâ as they pass through a âchain of handling arid control,âand may be âinheritedâ as they are passed down from one VDEparticipant to the next.-175-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243Depending upon their needs, VDE participants can specifythat their ârules and controlsâ can be changed under conditionsspeci?ed by the same or other ârules and controls.â For example,ârules and controlsâ speci?ed by the content creator 102 maypermit the distributor 106 to âmark upâ the usage price just asretail stores âmark upâ the wholesale price of goods. Figure 2Ashows an example in which certain ârules and controlsâ persistunchanged from content creator 102 to content user 112; otherârules and controlsâ are modi?ed or deleted by distributor 106;and still other ârules and controlsâ are added by the distributor.âRules and controlsâ can be used to protect the contentuserâs privacy by limiting the information that is reported toother VDE participants. As one example, ârules and controlsâcan cause content usage information to be reported anonymouslyWithout revealing content user identity, or it can reveal onlycertain information to certain participants (for example,information derived from usage) with appropriate permission, ifrequired. This ability to securely control what information isrevealed and what VDE participant(s) it is revealed to allows theprivacy rights of all VDE participants to be protected.-176-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243Rules and Contentsâ Can Be Separately DeliveredAs mentioned above, virtual distribution environment 100âassociatesâ content with corresponding ârules and controls,â andprevents the content from being used or accessed unless a set ofcorresponding ârules and controlsâ is available. The distributor106 doesnât need to deliver content to control the contentâsdistribution. The preferred embodiment can securely protectcontent by protecting corresponding, usage enabling ârules andcontrolsâ against unauthorized distribution and use.In some examples, ârules and controlsâ may travel with the Icontent they apply to. Virtual distribution environment 100 alsoallows ârules and controlsâ to be delivered separately fromcontent. Since no one can use or access protected contentWithout âpermissionâ from corresponding ârules and controls,âthe distributor 106 can control use of content that has alreadybeen (or will in the future be) delivered. âRules and controlsâmay be delivered over a path different from the one used forcontent delivery. "Rules and controls" may also be delivered atsome other time. The content creator 102 might deliver contentto content user 112 over the electronic highway 108, or couldmake the content available to anyone on the highway. Contentmay be used at the time it is delivered, or it may be stored forlater use or reuse.-177-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243The virtual distribution environment 100 also allowspayment and reporting means to be delivered separately. Forexample, the content user 112 may have a virtual âcredit cardâthat extends credit (up to a certain limit) to pay for usage of anycontent. A âcredit transactionâ can take place at the userâs siteWithout requiring any âonlineâ connection or furtherauthorization. This invention can be used to help securelyprotect the virtual âcredit cardâ against unauthorized use.Rules and Contentsâ De?ne ProcessesFigure 3 shows an example of an overall process based onârules and controls.â It includes an âeventsâ process 402, a meterprocess 404, a billing process 406, and a budget process 408. Notall of the processes shown in Figure 3 will be used for every set ofârules and controls.âThe âevents processâ 402 detects things that happen(âeventsâ) and determines which of those âeventsâ need action bythe other âprocesses.â The âeventsâ may include, for example, arequest to use content or generate a usage permission. Someevents may need additional processing, and others may not.VVhether an âeventâ needs more processing depends on the ârulesand controlsâ corresponding to the content. For example, a userwho lacks permission will not have her request satis?ed (âNo-178-?101520WO 98109209CA 02265473 1999-02-25PCTIU S97! 15243Goâ). As another example, each user request to turn to a newpage of an electronic book may be satis?ed (âGoâ), but it may notbe necessary to meter, bill or budget those requests. A user whohas purchased a copy of a novel may be permitted to open andread the novel as many times as she Wants to Without anyfurther metering, billing or budgeting. in this simple example,the âevent processâ 402 may request metering, billing and/orbudgeting processes the first time the user asks to open theprotected novel (so the purchase price can be charged to theuser), and treat all later requests to open the same novel asâinsigni?cant events.â Other content (for example, searching anelectronic telephone directory) may require the user to pay a feefor each access.âMeterâ process 404 keeps track of events, and may reportusage to distributor 106 and/or other appropriate VDEparticipant(s). Figure 4 shows that process 404 can be based ona number of different factors such as:(a) type of usage to charge for,(b) what kind of unit to base charges on,(c) how much to charge per unit,-179-?10âI520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243(d) when to report, and(e) how to pay.These factors may be speci?ed by the ârules and controlsâ thatcontrol the meter process.Billing process 406 determines how much to charge forevents. It records and reports payment information.Budget process 408 limits how much content usage ispermitted. For example, budget process 408 may limit thenumber of times content may be accessed or copied, or it maylimit the number of pages or other amount of content that can beused based on, for example, the number of dollars available in acredit account. Budget process 408 records and reports financialand other transaction information associated with such limits.Content may be supplied to the user once these processeshave been successfully performed.Containers and ObjectsâFigure 5A shows how the virtual distribution environment100, in a preferred embodiment, may package informationelements (content) into a âcontainerâ 302 so the information canâtbe accessed except as provided by its ârules and controls.â-180-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243Normally, the container 302 is elegtmnig rather than physical.Electronic container 302 in one example comprises âdigitalâinformation having a well defined structure. Container 302 andits contents can be called an âobject 300.âThe Figure 5A example shows items âWithinâ and enclosedby container 302. However, container 302 may âcontainâ itemswithout those items actually being stored within the container.For example, the container 302 may reference items that areavailable elsewhere such as in other containers at remote sites.Container 302 may reference items available at different timesor only during limited times. Some items may be too large tostore within container 302. Items may, for example, be deliveredto the user in the form of a âlive feedâ of video at a certain time.Even then, the container 302 âcontainsâ the live feed (byreference) in this example.Container 302 may contain infggatign content 304 inelectronic (such as ââdigitalââ) form. Information content 304 couldbe the text of a novel, a picture, sound such as a musicalperformance or a reading, a movie or other video, computersoftware, or just about any other kind of electronic informationyou can think of. Other types of âobjectsâ 300 (such as-181-?CA 02265473 1999-02-25WO 98/09209 PCT/US97/15243âadministrative objectsâ) may contain âadministrativeâ or otherinformation instead of or in addition to information content 304.In the Figure 5A example, container 302 may also contain5 ârules and controlsâ in the form of:(a) a â â 808;(b) â 308; and(C) âother methodsâ 1000.10 - Figure 5B gives some additional detail about permissionsrecord 808, budgets 308 and other methods 1000. Theâpermissions record" 808 specifies the rights associated with theobject 300 such as. for example, who can open the container 302,who can use the objects contents, who can distribute the object,15 and what other control mechanisms must be active. Forexample, permissions record 808 may specify a users rights touse, distribute and/or administer the container 302 and itscontent. Permissions record 808 may also specify requirementsto be applied by the budgets 308 and âother methodsâ 1000.20 Permissions record 808 may also contain security relatedinformation such as scrambling and descrambling âkeys.ââBudgetsâ 308 shown in Figure 5B are a special type ofâmethodâ 1000 that may specify, among other things, limitations-182-?101520W0 98I09209CA 02265473 1999-02-25PCT/US97/15243on usage of information content 304, and how usage will be paidfor. Budgets 308 can specify, for example, how much of the totalinformation content 304 can be used and/or copied. The methods310 may prevent use of more than the amount speci?ed by aspeci?c budget.âOther methodsâ 1000 de?ne basic operations used byârules and controls.â Such âmethodsâ 1000 may include, forexample, how usage is to be âmetered,â if and how content 304and other information is to be scrambled and descrambled, andother processes associated with handling and controllinginformation content 304. For example, methods 1000 may recordthe identity of anyone who opens the electronic container 802,and can also control how information content is to be chargedbased on âmetering.â Methods 1000 may apply to one or severaldifferent information contents 304 and associated containers302, as well as to all or speci?c portions of information content304.Secure Processing Unit (SPU)The âVDE participantsâ may each have an âelectronicappliance.â The appliance may be or contain a computer. Theappliances may communicate over the electronic highway 108.Figure 6 shows a (âSPUâ) 500 portion of-183-?101520W0 98l09209CA 02265473 1999-02-25PCT/US97/15243the âelectronic applianceâ used in this example by each VDEparticipant. SPU 500 processes information in a seegm 503, and stores important informationsecurely. SPU 500 may be emulated by software operating in ahost electronic appliance.SPU 500 is enclosed Within and protected by a âtamperresistant seeuijty barrierâ 502. Security barrier 502 separatesthe secure environment 503 from the rest of the world. Itprevents information and processes within the secureenvironment 503 from being observed, interfered with andleaving except under appropriate secure conditions. Barrier 502also controls external access to secure resources, processes andinformation within SPU 500. In one example, tamper resistantsecurity barrier 502 is formed by security features such asâencryption,â and hardware that detects tampering and/ordestroys sensitive information within secure environment 503when tampering is detected.SPU 500 in this example is an integrated circuit (âICâ)âchipâ 504 including â â 506 and â â 508. SPU500 connects to the rest of the electronic appliance through anappligee linkâ 510. SPU â?rmwareâ 508 in this example isâsoftwareâ such as a âcomputer program(s)â âembeddedâ within-184-?1O1520W0 98/09209CA 02265473 1999-02-25PCT/US97l1S243chip 504. Firmware 508 makes the hardware 506 work.Hardware 506 preferably contains a processor to performinstructions speci?ed by ?rmware 508. âHardwareâ 506 alsocontains long-term and short-term memories to store informationsecurely so it canât be tampered with. SPU 500 may also have aprotected clock/calendar used for timing events. The SPUhardware 506 in this example may include special purposeelectronic circuits that are specially designed to perform certainprocesses (such as âencryptionâ-â and âdecryptionâ) rapidly andefficiently.The particular context in which SPU 500 is being used willdetermine how much processing capabilities SPU 500 shouldhave. SPU hardware 506, in this example, provides at leastenough processing capabilities to support the secure parts ofprocesses shown in Figure 3. In some contexts, the functions ofSPU 500 may be increased so the SPU can perform all theelectronic appliance processing, and can be incorporated into ageneral purpose processor. In other contexts, SPU 500 may workalongside a general purpose processor, and therefore only needsto have enough processing capabilities to handle secureprocesses.-185-?101520CA 02265473 1999-02-25WO 98/09209 PCT/US97/15243VDE Electronic Appliance and Rights Operating SystemâFigure 7 shows an example of an electronic appliance 600including SPU 500. Electronic appliance 600 may be practicallyany kind of electrical or electronic device, such as:0 a computer- a T.V. âset topâ control box- a pager- a telephone- a sound system- a video reproduction system- a video game player- a âsmartâ credit cardElectronic appliance 600 in this example may include a keyboardor keypad 612, a voice recognizer 613, and a display 614. Ahuman user can input commands through keyboard 612 and/orvoice recognizer 613, and may view information on display 614.Appliance 600 may communicate with the outside world throughany of the connections/devices normally used within an electronicappliance. The connections/devices shown along the bottom ofthe drawing are examples:a âmodemâ 618 or other telecommunications link;a CD ROM disk 620 or other storage medium or device;- 186-?101520WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243a printer 622;broadcast reception 624;a document scanner 626; anda âcableâ 628 connecting the appliance with a ânetwork.âVirtual distribution environment 100 provides a â;j,gh_§ â 602 that manages appliance 600 and SPU 500by controlling their hardware resources. The operating system602 may also support at least one â â 608. Generally,âapplicationâ 608 is hardware and/or software speci?c to thecontext of appliance 600. For example, if appliance 600 is apersonal computer, then âapplicationâ 608 could be a programloaded by the user, for instance, a word processor, acommunications system or a sound recorder. If appliance 600 isa television controller box, then application 608 might behardware or software that allows a user to order videos ondemand and perform other functions such as fast forward andrewind. In this example, operating system 602 provides astandardized, well defined, generalized âinterfaceâ that couldsupport and work with many different âapplicationsâ 608.Operating system 602 in this example provides ârights andauditing operating system functionsâ 604 and âother operatingsystem functionsâ 606. The ârights and auditing operating-187-?10.1520WO 98/09209CA 02265473 1999-02-25PCT/US97l15243system functionsâ 604 securely handle tasks that relate to virtualdistribution environment 100. SPU 500 provides or supportsmany of the security functions of the ârights and auditingoperating system functionsâ 402. The âother operating systemfunctionsâ 606 handle general appliance functions. Overalloperating system 602 may be designed from the beginning toinclude the ârights and auditing operating system functionsâ 604plus the âother operating system functionsâ 606, or the ârightsand auditing operating system functionsâ may be an add-on to apreexisting operating system providing the âother operatingsystem functions.ââRights operating systemâ 602 in this example can workwith many different types of appliances 600. For example, it canwork with large mainframe computers, âminicomputersâ andâmicrocomputersâ such as personal computers and portablecomputing devices. It can also work in control boxes on the top oftelevision sets, small portable âpagers,â desktop radios, stereosound systems, telephones, telephone switches, or any otherelectronic appliance. This ability to Work on big appliances aswell as little appliances is called âscalable.â A âscalableâoperating system 602 means that there can be a standardizedinterface across many different appliances performing a widevariety of tasks.-188-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97ll5243The ârights operating system functionsâ 604 are ?se?ggbased: in this example. For example, ârights operating systemfunctionsâ 604 handle summary requests from application 608rather than requiring the application to always make moredetailed âsubrequestsâ or otherwise get involved with theunderlying complexities involved in satisfying a summaryrequest. For example, application 608 may simply ask to readspeci?ed information; ârights operating system functionsâ 604can then decide whether the desired information is VDE-protected content and, if it is, perform processes needed to makethe information available. This feature is called âtransparency.ââ'hâansparencyâ makes tasks easy for the application 608.âRights operating system functionsâ 604 can support applications608 that âknowâ nothing about virtual distribution environment100. Applications 608 that are âawareâ of virtual distributionenvironment 100 may be able to make more detailed use ofvirtual distribution environment 100.In this example, ârights operating system functionsâ 604are âevent drivenâ. Rather than repeatedly examining the stateof electronic appliance 600 to determine whether a condition hasarisen, the ârights operating system functionsâ 604 may responddirectly to âeventsâ or âhappeningsâ within appliance 600.-189-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243In this example, some of the services performed by ârightsoperating system functionsâ 604 may be extended based onadditional âcomponentsâ delivered to operating system 602."Rights operating system functionsâ 604 can collect together anduse âcomponentsâ sent by different participants at differenttimes. The âcomponentsâ help to make the operating system 602âscalable.â Some components can change how services Work onlittle appliances versus how they Work on big appliances (e.g.,multi-userâ). Other components are designed to work withspecific applications or classes of applications (eg, some types ofmeters and some types of budgets).Electronic Appliance 600An electronic appliance 600 provided by the preferredembodiment may, for example, be any electronic apparatus thatcontains one or more microprocessors and/or rnicrocontrollersand/or other devices which perform logical and/or mathematicalcalculations. This may include computers; computer terminals;device controllers for use Withcomputers; peripheral devices foruse with computers; digital display devices; televisions; videoand audio/video projection systems; channel selectors and/ordecoders for use With broadcast and/or cable transmissions;remote control devices; video and/or audio recorders; mediaplayers including compact disc players, videodisc players and-190-?1091520WO 98/09209CA 02265473 1999-02-25PCTlUS97l15243tape players; audio and/or video ampli?ers; virtual realitymachines; electronic game players; multimedia players; radios;telephones; videophones; facsimile machines; robots; numericallycontrolled machines including machine tools and the like; andother devices containing one or more microcomputers and/ormicrocontrollers and/or other CPUs, including those not yet inexistence.Figure 8 shows an example of an electronic appliance 600.This example of electronic appliance 600 includes a system bus653. In this example, one or more conventional general purposecentral processing units (âCPUsâ) 654 are connected to bus 653.Bus 653 connects CPU(s) 654 to RAM 656, ROM 658, and I/Ocontroller 660. One or more SPUs 500 may also be connected tosystem bus 653. System bus 653 may permit SPU(s) 500 tocommunicate with CPU(s) 654, and also may allow both theCPU(s) and the SPU(s) to communicate (e.g., over sharedaddress and data lines) with RAM 656, ROM 658 and I/Ocontroller 660. A power supply 659 may provide power to SPU500, CPU 654 and the other system components shown.In the example shown, I/O controller 660 is connected tosecondary storage device 652, a keyboard/display 612,614, acommunications controller 666, and a backup storage device 668.-191-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243Backup storage device 668 may, for example, store informationon mass media such as a tape 670, a ?oppy disk, a removablememory card, etc. Communications controller 666 may allowelectronic appliance 600 to communicate with other electronicappliances via network 672 or other telecommunications links.Different electronic appliances 600 may interoperate even if theyuse di?erent CPUs and different instances of ROS 602, so longas they typically use compatible communication protocols and/orsecurity methods. In this example, I/O controller 660 permitsCPU 654 and SPU 500 to read from and Write to secondarystorage 662, keyboard/display 612, 614, communicationscontroller 666, and backup storage device 668.Secondary storage 662 may comprise the same one ormore non-secure secondary storage devices (such as a magneticdisk and a CD-ROM drive as one example) that electronicappliance 600 uses for general secondary storage functions. Insome implementations, part or all of secondary storage 652 maycomprise a secondary storage device(s) that is physically enclosedWithin a secure enclosure. However, since it may not be practicalor cost-effective to physically secure secondary storage 652 inmany implementations, secondary storage 652 may be used tostore information in a secure manner by encrypting informationbefore storing it in secondary storage 652. If information is-192-?101520W0 98l09209CA 02265473 1999-02-25PCT/US97l15243encrypted before it is stored, physical access to secondary storage652 or its contents does not readily reveal or compromise theinformation.Secondary storage 652 in this example stores code anddata used by CPU 654 and/or SPU 500 to control the overalloperation of electronic appliance 600. For example, Figure 8shows that âRights Operating Systemâ (âROSâ) 602 (including aportion 604 of ROS that provides VDE functions and a portion606 that provides other OS functions) shown in Figure 7 may bestored on secondary storage 652. Secondary storage 652 mayalso store one or more VDE objects 300. Figure 8 also shows thatthe secure ?les 610 shown in Figure 7 may be stored onsecondary storage 652 in the form of a âsecure databaseâ ormanagement ?le system 610. This secure database 610 maystore and organize information used by ROS 602 to perform VDEfunctions 604. Thus, the code that is executed to perform VDEand other OS functions 604, 606, and secure ?les 610 (as well asVDE objects 300) associated with those functions may be storedin secondary storage 652. Secondary storage 652 may also store"other informationâ 673 such as, for example, information usedby other operating system functions 606 for task management,non-VDE ?les, etc. Portions of the elements indicated insecondary storage 652 may also be stored in ROM 658, so long as-193-?10«1520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243those elements do not require changes (except when ROM 658 isreplaced). Portions of ROS 602 in particular may desirably beincluded in ROM 658 (e.g., âbootstrapâ routines, POST routines,etc. for use in establishing an operating environment forelectronic appliance 600 when power is applied).Figure 8 shows that secondary storage 652 may also beused to store code (ââapplication programsâ) providing userapplication( s) 608 shown in Figure '7. Figure 8 shows that theremay be two general types of application programs 608: "VDEawareâ applications 608a, and N onâVDE aware applications608b. VDE aware applications 608a may have been at least inpart designed specifically with VDE 100 in mind to access andtake detailed advantage of VDE functions 604. Because of theâtransparencyâ features of ROS 602, non-VDE awareapplications 608b (e.g., applications not specifically designed forVDE 100) can also access and take advantage of VDE functions604.SECURE PROCESSING UNIT 500Each VDE node or other electronic appliance 600 in thepreferred embodiment may include one or more SPUs 500. SPUs500 may be used to perform all secure processing for VDE 100.For example, SPU 500 is used for decrypting (or otherwise-194-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243unsecuring) VDE protected objects 300. It is also used formanaging encrypted and/or otherwise secured communication(such as by employing authentication and/or error-correctionvalidation of information). SPU 500 may also perform securedata management processes including governing usage of,auditing of, and where appropriate, payment for VDE objects 300(through the use of prepayments, credits, real-time electronicdebits from bank accounts and/or VDE node currency tokendeposit accounts). SPU 500 may perform other transactionsrelated to such VDE objects 300.SPU Physical Packaging and Security Barrier 502As shown Figure 6, in the preferred embodiment, an SPU500 may be implemented as a single integrated circuit âchipâ 505to provide a secure processing environment in which con?dentialand/or commercially valuable information can be safelyprocessed, encrypted and/or decrypted. IC chip 505 may, forexample, comprise a small semiconductor âdieâ about the size of athumbnail. This semiconductor die may include semiconductorand metal conductive pathways. These pathways de?ne thecircuitry, and thus the functionality, of SPU 500. Some of thesepathways are electrically connected to the external âpinsâ 504 ofthe chip 505.-195-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243As shown in Figures 6 and 9, SPU 500 may be surroundedby a tamper-resistant hardware security barrier 502. Part of thissecurity barrier 502 is formed by a plastic or other package inwhich an SPU âdieâ is encased. Because the processing occurringwithin, and information stored by, SPU 500 are not easilyaccessible to the outside world, they are relatively secure fromunauthorized access and tampering. All signals cross barrier502 through a secure, controlled path provided by BTU 530 thatrestricts the outside worldâs access to the internal componentsWithin SPU 500. This secure, controlled path resists attemptsfrom the outside world to access secret information and resourcesWithin SPU 500.It is possible to remove the plastic package of an IC chipand gain access to the âdie.â It is also possible to analyze andâreverse engineerâ the âdieâ itself (e.g., using various types oflogic analyzers and microprobes to collect and analyze signals onthe die while the circuitry is operating, using acid etching orother techniques to remove semiconductor layers to expose otherlayers, viewing and photographing the die using an electronmicroscope, etc.) Although no system or circuit is absolutelyimpervious to such attacks, SPU barrier 502 may includeadditional hardware protections that make successful attacksexceedingly costly and time consuming. For example, ion-196-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243implantation and/or other fabrication techniques may be used tomake it very di?icult to visually discern SPU die conductivepathways, and SPU internal circuitry may be fabricated in sucha way that it âselfâdestructsâ when exposed to air and/or light.SPU 500 may store secret information in internal memory thatloses its contents when power is lost. Circuitry may beincorporated within SPU 500 that detects microprobing or othertampering, and self-destructs (or destroys other parts of theSPU) when tampering is detected. These and other hardware-based physical security techniques contribute to tamper-resistant hardware security barrier 502.To increase the security of security barrier 502 evenfurther, it is possible to encase or include SPU 500 in one ormore further physical enclosures such as, for example: epoxy orother âpotting compoundâ; further module enclosures includingadditional self-destruct, selfâd_isabling or other features activatedwhen tampering is detected; further modules providingadditional security protections such as requiring password orother authentication to operate; and the like. In addition,further layers of metal may be added to the die to complicateacid etching, micro probing, and the like; circuitry designed toâzeroizeâ memory may be included as an aspect of self-destructprocesses; the plastic package itself may be designed to resist-197-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243chemical as well as physical âattacksâ; and memories internal toSPU 500 may have specialized addressing and refresh circuitrythat âshuf?esâ the location of bits to complicate efforts toelectrically determine the value of memory locations. These andother techniques may contribute to the security of barrier 502.In some electronic appliances 600, SPU 500 may beintegrated together with the device microcontroller or equivalentor with a device 1/0 or communications microcontroller into acommon chip (or chip set) 505. For example, in one preferredembodiment, SPU 500 may be integrated together with one ormore other CPU(s) (e.g., a CPU 654 of an electronic appliance) ina single component or package. The other CPU(s) 654 may beany centrally controlling logic arrangement, such as for example,a microprocessor, other microcontroller, and/or array or otherparallel processor. This integrated con?guration may result inlower overall cost, smaller overall size, and potentially fasterinteraction between an SPU 500 and a CPU 654. Integrationmay also provide Wider distribution if an integrated SPU/CPUcomponent is a standard feature of a widely distributedmicroprocessor line. Merging an SPU 500 into a main CPU 654of an electronic appliance 600 (or into another appliance orappliance peripheral microcomputer or other microcontroller)may substantially reduce the overhead cost of implementing-198-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243VDE 100. Integration considerations may include cost ofimplementation, cost of manufacture, desired degree of security,and value of compactness.SPU 500 may also be integrated with devices other thanCPUs. For example, for video and multimedia applications, someperformance and/or security advantages (depending on overalldesign) could result from integrating an SPU 500 into a videocontroller chip or chipset. SPU 500 can also be integrateddirectly into a network communications chip or chipset or thelike. Certain performance advantages in high speedcommunications applications may also result from integrating anSPU 500 with a modem chip or chipset. This may facilitateincorporation of an SPU 500 into communication appliances suchas stand-alone fax machines. SPU 500 may also be integratedinto other peripheral devices, such as CD-ROM devices, set-topcable devices, game devices, and a wide variety of otherelectronic appliances that use, allow access to, performtransactions related to, or consume, distributed information.SPU 500 Internal ArchitectureFigure 9 is a detailed diagram of the internal structureWithin an example of SPU 500. SPU 500 in this exampleincludes a single microprocessor 520 and a limited amount of-199-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97l15243memory con?gured as ROM 532 and RAM 534. In more detail,this example of SPU 500 includes microprocessor 520, anencrypt/decrypt engine 522, a DMA controller 526, a real-timeclock 528, a bus interface unit (âBIUâ) 530, a read only memory(ROM) 532, a random access memory (RAM) 534, and a memorymanagement unit (âMMUâ) 540. DMA controller 526 and MMU540 are optional, but the performance of SPU 500 may suffer ifthey are not present. SPU 500 may also include an optionalpattern matching engine 524, an optional random numbergenerator 542, an optional arithmetic accelerator circuit 544, andoptional compression/decompression circuit 546. A sharedaddress/data bus arrangement 536 may transfer informationbetween these various components under control ofmicroprocessor 520 and/or DMA controller 526. Additional oralternate dedicated paths 538 may connect microprocessor 520 tothe other components (e.g., encrypt/decrypt engine 522 via line538a, real-time clock 528 via line 538b, bus interface unit 530 vialine 5380, DMA controller via line 538d, and memorymanagement unit (MMU) 540 via line 538e).The following section discusses each of these SPUcomponents in more detail.-200-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243Microprocessor 520Microprocessor 520 is the âbrainâ of SPU 500. In thisexample, it executes a sequence of steps speci?ed by code stored(at least temporarily) within ROM 532 and/or RAM 534.Microprocessor 520 in the preferred embodiment comprises adedicated central processing arrangement (e.g., a RISC and/orCISC processor unit, a microcontroller, and/or other centralprocessing means or, less desirably in most applications, processspeci?c dedicated control logic) for executing instructions storedin the ROM 532 and/or other memory. Microprocessor 520 maybe separate elements of a circuitry layout, or may be separatepackages Within a secure SPU 500.In the preferred embodiment, microprocessor 520 normallyhandles the most security sensitive aspects of the operation ofelectronic appliance 600. For example, microprocessor 520 maymanage VDE decrypting, encrypting, certain content and/orappliance usage control information, keeping track of usage ofVDE secured content, and other VDE usage control relatedfunctions.Stored in each SPU 500 and/or electronic appliancesecondary memory 652 may be, for example, an instance of ROS602 software, application programs 608, objects 300 containing-201-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243VDE controlled property content and related information, andmanagement database 610 that stores both informationassociated With objects and VDE control information. ROS 602includes software intended for execution by SPU microprocessor520 for, in part, controlling usage of VDE related objects 300 byelectronic appliance 600. As will be explained, these SPUprograms include âload modulesâ for performing basic controlfunctions. These various programs and associated data areexecuted and manipulated primarily by microprocessor 520.Real Time Clock (RTC) 528In the preferred embodiment, SPU 500 includes a realtime clock circuit (âRTCââ> 528 that serves as a reliable, tamperresistant time base for the SPU. RTC 528 keeps track of time ofday and date (e.g., month, day and year) in the preferredembodiment, and thus may comprise a combination calendar andclock. A reliable time base is important for implementing timebased usage metering methods, "time aged decryption keys,â andother time based SPU functions.The RTC 528 must receive power in order to operate.Optimally, the RTC 528 power source could comprise a smallbattery located within SPU 500 or other secure enclosure.However, the RTC 528 may employ a power source such as an-202-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97l15243externally located battery that is external to the SPU 500. Suchan externally located battery may provide relativelyuninterrupted power to RTC 528, and may also maintain asnon-volatile at least a portion of the otherwise volatile RAM 534within SPU 500.In one implementation, electronic appliance power supply659 is also used to power SPU 500. Using any external powersupply asthe only power source for RTC 528 may signi?cantlyreduce the usefulness of time based security techniques unless,at minimum, SPU 500 recognizes any interruption (or anymaterial interruption) of the supply of external power, recordssuch interruption, and responds as may be appropriate such asdisabling the ability of the SPU 500 to perform certain or allVDE processes. Recognizing a power interruption may, forexample, be accomplished by employing a circuit which isactivated by power failure. The power failure sensing circuitmay power another circuit that includes associated logic forrecording one or more power fail events. Capacitor dischargecircuitry may provide the necessary temporary power to operatethis logic. In addition or alternatively, SPU 500 may from timeto time compare an output of RTC 528 to a clock output of a hostelectronic appliance 600, if available. In the event a discrepancyis detected, SPU 500 may respond as appropriate, including-203-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243recording the discrepancy and/or disabling at least some portionof processes performed by SPU 500 under at least somecircumstances.If a power failure and/or RTC 528 discrepancy and/or otherevent indicates the possibility of tampering, SPU 500 mayautomatically destroy, or render inaccessible without privilegedintervention, one or more portions of sensitive information itstores, such as execution related information and/or encryptionkey related information. To provide further SPU operation, suchdestroyed information would have to be replaced by a VDEclearinghouse, administrator and/or distributor, as may beappropriate. This may be achieved by remotely downloadingupdate and/or replacement data and/or code. In the event of adisabling and/or destruction of processes and/or information asdescribed above, the electronic appliance 600 may require asecure VDE communication with an administrator,clearinghouse, and/or distributor as appropriate in order toreinitialize the RTC 528. Some or all secure SPU 500 processesmay not operate until then.It may be desirable to provide a mechanism for settingand/or synchronizing RTC 528. In the preferred embodiment,when communication occurs between VDE electronic appliance-204-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243600 and another VDE appliance, an output of RTC 528 may becompared to a controlled RTC 528 output time under control ofthe party authorized to be âseniorâ and controlling. In the eventof a discrepancy, appropriate action may be taken, includingresetting the RTC 528 of the âjuniorâ controlled participant inthe communication.SPU Encrypt/Decrypt Engine 522In the preferred embodiment, SPU encrypt/decrypt engine522 provides special purpose hardware (e.g., a hardware statemachine) for rapidly and efficiently encrypting and/or decryptingdata. In some implementations, the encrypt/decrypt functionsmay be performed instead by microprocessor 520 under softwarecontrol, but providing special purpose encrypt/decrypt hardwareengine 522 Will, in general, provide increased performance.Microprocessor 520 may, if desired, comprise a combination ofprocessor circuitry and dedicated encryption/decryption logicthat may be integrated together in the same circuitry layout soas to, for example, optimally share one or more circuit elements.Generally, it is preferable that a computationally efficientbut highly secure âbulkâ encryption/decryption technique shouldbe used to protect most of the data and objects handled by SPU500. It is preferable that an extremely secure-205-?10â1520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243encryption/decryption technique be used as an aspect ofauthenticating the identity of electronic appliances 600 that areestablishing a communication channel and securing anytransferred permission, method, and administrative information.In the preferred embodiment, the encrypt/decrypt engine 522includes both a symmetric key encryption/decryption circuit (e.g.DES, Skipjack/Clipper, IDEA, RCâ2, RC-4, etc.) and anantisymmetric (asymmetric) or Public Key (âPKâ)encryption/decryption circuit. The public/private keyencryption/decryption circuit is used principally as an aspect ofsecure communications between an SPU 500 and VDEadministrators, or other electronic appliances 600, that isbetween VDE secure subsystems. A symmetricencryption/decryption circuit may be used for "bulkâ encryptingand decrypting most data stored in secondary storage 662 ofelectronic appliance 600 in which SPU 500 resides. Thesymmetric key encryption/decryption circuit may also be used forencrypting and decrypting content stored within VDE objects300.DES or public/private key methods may be used for allencryption functions. In alternate embodiments, encryption anddecryption methods other than the DES and public/private keymethods could be used for the various encryption related-206-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97] 15243functions. For instance, other types of symmetricencryption/decryption techniques in which the same key is usedfor encryption and decryption could be used in place of DESencryption and decryption. The preferred embodiment cansupport a plurality of decryption/encryption techniques usingmultiple dedicated circuits within encrypt/decrypt engine 522and/or the processing arrangement within SPU 500.Pattern Matching Engine 524Optional pattern matching engine 524 may provide specialpurpose hardware for performing pattern matching functions.One of the functions SPU 500 may perform is tovalidate/authenticate VDE objects 300 and other items.Validation/authentication often involves comparing long datastrings to determine whether they compare in a predeterminedway. In addition, certain forms of usage (such as logical and/orphysical (contiguous) relatedness of accessed elements) mayrequire searching potentially long strings of data for certain bitpatterns or other signi?cant pattern related metrics. Althoughpattern matching can be performed by SPU microprocessor 520under software control, providing special purpose hardwarepattern matching engine 524 may speed up the pattern matchingprocess.-207-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97Il5243CompressionlDecompression Engine 546An optional compression/decompression engine 546 may beprovided within an SPU 500 to, for example, compress and/ordecompress content stored in, or released from, VDE objects 300.Compression/decompression engine 546 may implement one ormore compression algorithms using hardware circuitry toimprove the performance of compression/decompressionoperations that would otherwise be performed by softwareoperating on microprocessor 520, or outside SPU 500.Decompression is important in the release of data such as videoand audio that is usually compressed before distribution andwhose decompression speed is important. In some cases,information that is useful for usage monitoring purposes (such asrecord separators or other delimiters) is âhiddenâ under acompression layer that must be removed before this informationcan be detected and used inside SPU 500.Random Number Generator 542Optional random number generator 542 may providespecialized hardware circuitry for generating random values(e.g., from inherently unpredictable physical processes such asquantum noise). Such random values are particularly useful forconstructing encryption keys or unique identi?ers, and forinitializing the generation of pseudo-random sequences.-208-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243Random number generator 542 may produce values of anyconvenient length, including as small as a single bit per use. Arandom number of arbitrary size may be constructed byconcatenating values produced by random number generator542. A cryptographically strong pseudo-random sequence maybe generated from a random key and seed generated withrandom number generator 542 and repeated encryption eitherwith the encrypt/decrypt engine 522 or cryptographic algorithmsin SPU 500. Such sequences may be used, for example, inprivate headers to frustrate efforts to determine an encryptionkey through cryptoanalysis.Arithmetic Accelerator 544An optional arithmetic accelerator 544 may be providedWithin an SPU 500 in the form of hardware circuitry that canrapidly perform mathematical calculations such asmultiplication and exponentiation involving large numbers.These calculations can, for example, be requested bymicroprocessor 520 or encrypt/decrypt engine 522, to assist in thecomputations required for certain asymmetricencryption/decryption operations. Such arithmetic acceleratorsare we1lâk.nown to those skilled in the art. In someimplementations, a separate arithmetic accelerator 544 may be-209-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243omitted and any necessary calculations may be performed bymicroprocessor 520 under software control.DMA Controller 526DMA controller 526 controls information transfers overaddress/data bus 536 without requiring microprocessor 520 toprocess each individual data transfer. Typically, microprocessor520 may write to DMA controller 526 target and destinationaddresses and the number of bytes to transfer, and DMAcontroller 526 may then automatically transfer a block of databetween components of SPU 500 (e.g., from ROM 532 to RAM534, between encrypt/decrypt engine 522 and RAM 534, betweenbus interface unit 530 and RAM 534, etc. ). DMA controller 526may have multiple channels to handle multiple transferssimultaneously. In some implementations. a separate DMAcontroller 526 may be omitted, and any necessary datamovements may be performed by microprocessor 520 undersoftware control.Bus Interface Unit (BIU) 530Bus interface unit (BIU) 530 communicates informationbetween SPU 500 and the outside world across the securitybarrier 502. BIU 530 shown in Figure 9 plus appropriate driversoftware may comprise the âappliance linkâ 510 shown in Figure-210-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/152436. Bus interface unit 530 may be modelled after a USART or PCIbus interface in the preferred embodiment. In this example, BIU530 connects SPU 500 to electronic appliance system bus 653shown in Figure 8. BIU 530 is designed to prevent unauthorizedaccess to internal components within SPU 500 and theircontents. It does this by only allowing signals associated with anSPU 500 to be processed by control programs running onmicroprocessor 520 and not supporting direct access to theinternal elements of an SPU 500.Memory Management Unit 540Memory Management Unit (MMU) 540, if present,provides hardware support for memory management and virtualmemory management functions. It may also provide heightenedsecurity by enforcing hardware compartmentalization of thesecure execution space (e.g., to prevent a less trusted task frommodifying a more trusted task). More details are provided belowin connection with a discussion of the architecture of a SecureProcessing Environment (âSPEâ) 503 supported by SPU 500.MMU 540 may also provide hardwareâlevel supportfunctions related to memory management such as, for example,address mapping.-211-?101520W0 98I09209CA 02265473 1999-02-25PCT/U S97/ 15243SPU Memory ArchitectureIn the preferred embodiment, SPU 500 uses three generalkinds of memory:(1) internal ROM 532;(2) internal RAM 534; and(3) external memory (typically RAM and/or disk suppliedby a host electronic appliance).The internal ROM 532 and RAM 534 Within SPU 500provide a secure operating environment and execution space.Because of cost limitations, chip fabrication size, complexity andother limitations, it may not be possible to provide sufficientmemory Within SPU 500 to store all information that an SPUneeds to process in a secure manner. Due to the practical limitson the amount of ROM 532 and RAM 534 that may be includedWithin SPU 500, SPU 500 may store information in memoryexternal to it, and move this information into and out of itssecure internal memory space on an as needed basis. In thesecases, secure processing steps performed by an SPU typicallymust be segmented into small, securely packaged elements thatmay be âpaged inâ and âpaged outâ of the limited availableinternal memory space. Memory external to an SPU 500 maynot be secure. Since the external memory may not be secure,SPU 500 may encrypt and cryptographically seal code and other-212-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243information before storing it in external memory. Similarly,SPU 500 must typically decrypt code and other informationobtained from external memory in encrypted form beforeprocessing (e.g., executing) based on it. In the preferredembodiment, there are two general approaches used to addresspotential memory limitations in a SPU 500. In the ?rst case, thesmall, securely packaged elements represent informationcontained in secure database 610. In the second case, suchelements may represent protected (e.g., encrypted) virtualmemory pages. Although virtual memory pages may correspondto information elements stored in secure database 610, this is not *required in this example of a SPU memory architecture.The following is a more detailed discussion of each of thesethree SPU memory resources.SPU Internal ROMSPU 500 read only memory (ROM) 532 or comparablepurpose device provides secure internal non-volatile storage forcertain programs and other information. For example, ROM 532may store âkeme1â programs such as SPU control ?rmware 508and, if desired, encryption key information and certainfundamental âload modules.â The âkernelâ programs, loadmodule information, and encryption key information enable the-213-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243control of certain basic functions of the SPU 500. Thosecomponents that are at least in part dependent on devicecon?guration (e.g., POST, memory allocation, and a dispatcher)may be loaded in ROM 532 along with additional load modulesthat have been determined to be required for speci?cinstallations or applications.In the preferred embodiment, ROM 532 may comprise acombination of a masked ROM 532a and an EEPROM and/orequivalent â?ashâ memory 532b. EEPROM or ?ash memory532b is used to store items that need to be updated and/orinitialized, such as for example, certain encryption keys. Anadditional bene?t of providing EEPROM and/or ?ash memory532b is the ability to optimize any load modules and libraryfunctions persistently stored within SPU 500 based on typicalusage at a speci?c site. Although these items could also bestored in NVRAM 534b, EEPROM and/or ?ash memory 532bmay be more cost effective.Masked ROM 532a may cost less than ?ash and/orEEPROM 532b, and can be used to store permanent portions ofSPU software/?rmware. Such permanent portions may include,for example, code that interfaces to hardware elements such asthe RTC 528, encryption/decryption engine 522, interrupt-214-?10'1520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243handlers, key generators, etc. Some of the operating system,library calls, libraries, and many of the core services provided bySPU 500 may also be in masked ROM 532a. In addition, some ofthe more commonly used executables are also good candidates forinclusion in masked ROM 532a. Items that need to be updatedor that need to disappear when power is removed from SPU 500should not be stored in masked ROM 5323.Under some circumstances, RAM 534a and/or NVRAM534b (NVRAM 534b may, for example, be constantly poweredconventional RAM) may perform at least part of the role of ROM532.SPU Internal RAMSPU 500 general purpose RAM 534 provides, among otherthings, secure execution space for secure processes. In thepreferred embodiment, RAM 534 is comprised of different typesof RAM such as a combination of highâspeed RAM 534a and anNVRAM (ânon-volatile RAMâ) 534b. RAM 534a may be volatile,while NVRAM 534b is preferably battery hacked or otherwisearranged so as to be non-volatile (i.e., it does not lose its contentswhen power is turned off).-215-?101520WO 98/09209CA 02265473 1999-02-25PCT /U S97/ 15243High-speed RAM 534a stores active code to be executedand associated data structures.NVRAM 534b preferably contains certain keys andsummary values that are preloaded as part of an initializationprocess in which SPU 500 communicates with a VDEadministrator, and may also store changeable or changinginformation associated with the operation of SPU 500. Forsecurity reasons, certain highly sensitive information (e.g.,certain load modules and certain encryption key relatedinformation such as internally generated private keys) needs tobe loaded into or generated internally by SPU 500 from time totime but, once loaded or generated internally, should never leavethe SPU. In this preferred embodiment, the SPU 500non-volatile random access memory (NVRAM) 534b may be usedfor securely storing such highly sensitive information. NVRAM534b is also used by SPU 500 to store data that may changefrequently but which preferably should not be lost in a powerdown or power fail mode.NVRAM 534b is preferably a flash memory array, but mayin addition or alternatively be electrically erasableprogrammable read only memory (EEPROM), static RAM(SRAM), bubble memory, three dimensional holographic or other-216-?101520WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243electro-optical memory, or the like, or any other writable (e.g.,randomly accessible) non-volatile memory of suf?cient speed andcost-effectiveness.SPU External MemoryThe SPU 500 can store certain information on memorydevices external to the SPU. If available, electronic appliance600 memory can also be used to support any device externalportions of SPU 500 software. Certain advantages may begained by allowing the SPU 500 to use external memory. As oneexample, memory internal to SPU 500 may be reduced in size byusing non-volatile read/write memory in the host electronicappliance 600 such as a non-volatile portion ofRAM 656 and/orROM 658.Such external memory may be used to store SPUprograms, data and/or other information. For example, a VDEcontrol program may be, at least in part, loaded into the memoryand communicated to and decrypted within SPU 500 prior toexecution. Such control programs may be re-encrypted andcommunicated back to external memory where they may bestored for later execution by SPU 500. âKernelâ programs and/orsome or all of the non-kernel â1oad modulesâ may be stored bySPU 500 in memory external to it. Since a secure database 610-217-?10A1520W0 98l09209CA 02265473 1999-02-25PCT/U S97/ 15243may be relatively large, SPU 500 can store some or all of securedatabase 610 in external memory and call portions into the SPU500 as needed.As mentioned above, memory external to SPU 500 may notbe secure. Therefore, when security is required, SPU 500 mustencrypt secure information before Writing it to external memory,and decrypt secure information read from external memorybefore using it. Inasmuch as the encryption layer relies onsecure processes and information (e.g., encryption algorithmsand keys) present within SPU 500, the encryption layereffectively âextendsâ the SPU security barrier 502 to protectinformation the SPU 500 stores in memory external to it.SPU 500 can use a wide variety of different types ofexternal memory. For example, external memory may compriseelectronic appliance secondarylstorage 652 such as a disk;external EEPROM or ?ash memory 658; and/or external RAM656. External RAM 656 may comprise an external nonvolatile(e.g. constantly powered) RAM and/or cache RAM.Using external RAM local to SPU 500 can significantlyimprove access times to information stored externally to an SPU.For example, external RAM may be used:-218-?101520WO 98/09209CA 02265473 1999-02-25PCTlUS97/ 15243- to buffer memory image pages and data structures prior totheir storage in ?ash memory or on an external hard disk(assuming transfer to ?ash or hard disk can occur insigni?cant power or system failure cases);- provide encryption and decryption buffers for data beingreleased from VDE objects 300.- to cache âswap blocksâ and VDE data structures currentlyin use as an aspect of providing a secure virtual memoryenvironment for SPU 500.- to cache other information in order to, for example, reducefrequency of access by an SPU to secondary storage 652and/or for other reasons.Dual ported external RAM can be particularly effective inimproving SPU 500 performance, since it can decrease the datamovement overhead of the SPU bus interface unit 530 and SPUmicroprocessor 520.Using external ?ash memory local to SPU 500 can be usedto signi?cantly improve access times to virtually all datastructures. Since most available ?ash storage devices havelimited write lifetimes, ?ash storage needs to take into accountthe number of writes that will occur during the lifetime of the?ash memory. Hence, ?ash storage of frequently Writtentemporary items is not recommended. If external RAM is non--219-?101520WO 98109209CA 02265473 1999-02-25PCTIUS97/15243volatile, then transfer to ?ash (or hard disk) may not benecessary.External memory used by SPU 500 may include twocategories:- external memory dedicated to SPU 500, and- memory shared with electronic appliance 600.For some VDE implementations, sharing memory (e.g.,electronic appliance RAM 656, ROM 658 and/or secondarystorage 652) with CPU 654 or other elements of an electronicappliance 600 may be the most cost effective way to store VDEsecure database management files 610 and information thatneeds to be stored external to SPU 500. A host system hard disksecondary memory 652 used for general purpose ?le storage can,for example, also be used to store VDE management ?les 610.SPU 500 may be given exclusive access to the external memory(e.g., over a local bus high speed connection provided by BIU530). Both dedicated and shared external memory may beprovided.SPU Integrated Within CPUAs discussed above, it may be desirable to integrate CPU654 and SPU 500 into the same integrated circuit and/or device.-220-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243SPU 500 shown in Figure 9 includes a microprocessor 520 thatmay be similar or identical to a standard microprocessoravailable off-the-shelf from a variety of manufacturers.Similarly, the SPU DMA controller 526 and certain othermicroprocessor support circuitry may be standardimplementations available in off-the-shelf microprocessor and/ormicrocomputer chips. Since many of the general control andprocessing requirements provided by SPU 500 in the preferredembodiment can be satis?ed using certain generic CPU and/ormicrocontroller components, it may be desirable to integrate SPUVDE functionality into a standard generic CPU ormicrocontroller chip. Such an integrated solution can result in avery costâeffective "dual mode" component that is capable ofperforming all of the generic processing of a standard CPU aswell as the secure processing of an SPU. Many of the controllogic functions performed by the preferred embodiment SPU canbe performed by generic CPU and/or micro-controller logic sothat at least a portion of the control logic does not have to beduplicated. Additional cost savings (e.g., in terms of reducingmanufacturing costs, inventory costs and printed circuit boardreal estate requirements) may also be obtained by not requiringan additional, separate physical SPU 500 device or package.Figure 9A shows one example architecture of a combinationCPU/SPU 2650. CPU/SPU 2650 may include a standard-221-?1020WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243microprocessor or microcontroller 2652, a standard bus interfaceunit (BIU) 2656, and a standard (optional) DMA controller 2654,as well as various other standard I/O controllers, computationcircuitry, etc. as may be found in a typical off-the-shelfmicroprocessor/microcontroller. Real time clock 528 may beadded to the standard architecture to give the CPU/SPU 2650access to the real time clock functions as discussed above inconnection with Figure 9. Real-time clock 528 must be protectedfrom tampering in order to be secure. Such protections mayinclude internal or external backup power. an indication that itspower (and thus its operation) has been interrupted, and/or anindication that the external clock signaltsli from which it derivesits timing have been interfered with (e.g., sped up, slowed down).Similarly, an encrypt/decrypt engine 522. pattern matchingengine 524, compression/decompression engine 546 and/orarithmetic accelerator 544 may be added if desired to providegreater efficiencies. or the functions performed by thesecomponents could be provided instead by software executing onmicroprocessor 2652. An optional memory management unit 540may also be provided if desired. A true random numbergenerator 542 may be provided also if desired. Connectionsshown between mode interface switch 2658 and othercomponents can carry both data and control information,speci?cally control information that determines What security--222-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243relevant aspects of the other components are available for accessand/or manipulation.In addition, secure ROM 532 and/or secure RAM 534 maybe provided within CPU/SPU 2650 along with a "mode interfaceswitch" 2658a, 2658b. Mode interface switch 2658 selectivelyprovides microprocessor 2652 with access to secure memory 532,534 and other secure components (blocks 522, 546, 524, 542, 544,528) depending upon the "mode" CPU/SPU 2650 is operating in.CPU/SPU 2650 in this example may operate in two differentmodes:- an "SPU" mode, or- a "normal" mode.In the "normal" mode, CPU/SPU 2650 operatessubstantially identically to a standard off-the-shelf CPU whilealso protecting the security of the content, state, and operationsof security-relevant components included in CPU/SPU 2650.Such security-relevant components may include the securememories 532, 534; the encrypt/decrypt engine 522, the optionalpattern-matching engine 524, random number generator 542,arithmetic accelerator 544, the SPUânot-initialized ?ag 2671, thesecure mode interface switch 2658, the real-time clock 528, theDMA controller 2654, the MMU 540, compress/decompress block-223-?101520WO 98/09209CA 02265473 1999-02-25546, and/or any other components that may affect security of theoperation of the CPU/SPU in "SPU" mode.In this example, CPU/SPU 2650 operating in the "normal"mode controls mode interface switch 2658 to effectively"disconnect" (i.e., block unsecure access to) the security-relevantcomponents, or to the security-relevant aspects of the operationsof such components as have a function for both "normal" and"SPU" mode. In the "normal" mode, for example, microprocessor2652 could access information from standard registers or otherinternal RAM and/or ROM (not shown), execute instructions in a"normal" Way, and perform any other tasks as are providedwithin a standard CPU -- but could not access or compromise thecontents of secure memory 532, 534 or access blocks 522, 524,542, 544, 546. In this example "normal" mode, mode interfaceswitch 2658 would effectively prevent any access (e.g., both readand write access) to secure memory 532, 534 so as to prevent theinformation stored Within that secure memory from beingcompromised.VVhen CPU/SPU 2650 operates in the "SPU" mode, modeinterface switch 2658 allows microprocessor 2652 to accesssecure memory 532, 534, and to control security-relevant aspectsof other components in the CPU/SPU. The "SPU" mode in this-224-PCT/U S97/ 15243?101520WO 98/09209CA 02265473 1999-02-25PCT /U S97! 15243example requires all instructions executed by microprocessor2652 to be fetched from secure memory 532, 534 -- preventingexecution based on "mixed" secure and non-secure instructions.In the "SPU" mode, mode interface switch 2658 may, in oneexample embodiment, disconnect or otherwise block externalaccesses carried over bus 652 from outside CPU/SPU 2650 (e.g.,DMA accesses, cache coherency control accesses) to ensure thatthe microprocessor 2652 is controlled entirely by instructionscarried within or derived from the secure memory 532, 534.Mode interface switch 2658 may also disconnect or otherwiseblock access by microprocessor 2652 to some external memoryand/or other functions carried over bus 652. Mode interfaceswitch 2658 in this example prevents other CPUoperations/instructions from exposing the contents of securememory 532, 534. ~In the example shown in Figure 9A, the mode control ofmode interface switch 2658 is based on a "mode" control signalprovided by microprocessor 2652. In this example,microprocessor 2652 may be slightly modi?ed so it can executetwo "new" instructions:-225-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 152430 "enable âSPUâ mode" instruction, ando "disable âSPUâ mode" instruction.When microprocessor 2652 executes the "enable âSPUâmode" instruction, it sends an appropriate "mode" control signalto mode interface switch 2658 to "switch" the interface switchinto the "SPU" mode of operation. When microprocessor 2652executes the "disable âSPUâ mode" instruction, it sends anappropriate "mode" control signal to mode interface switch 2658to disable the "SPU" mode of operation.When CPU/SPU 2650 begins operating in the "SPU" mode(based on microprocessor 2652 executing the "enable "SPU"mode" instruction), mode interface switch 2658 forcesmicroprocessor 2652 to begin fetching instructions from securememory 532, 534 ('e.g., beginning at some fixed address) in oneexample. When CPU/SPU 2650 begins operating in this example"SPU" mode, mode interface switch 2658 may forcemicroprocessor 2652 to load its registers from some ?xed addressin secure memory 532, 534 and may begin execution based onsuch register content. Once operating in the "SPU" mode,microprocessor 2652 may provide encryption/decryption andother control capabilities based upon the code and other contentof secure memory 532, 534 needed to provide the VDE-226-?10>1520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243functionality of SPU 500 described above. For example,microprocessor 2652 operating under control of informationwithin secure memory 532, 534 may read encrypted informationfrom bus 652 via bus interface unit 2656, write decryptedinformation to the bus interface unit, and meter and limitdecryption of such information based on values stored in thesecure memory.At the end of secure processing, execution bymicroprocessor 2652 of the "disable SPU mode" instruction maycause the contents of all registers and other temporary storagelocations used by microprocessor 2652 that are not within securememory 532, 534 to be destroyed or copied into secure memory532, 534 before "opening" mode interface switch 2658. Oncemode interface switch 2658 is "open," the microprocessor 2652 nolonger has access to secure memory 532. 53-1 or the informationit contained, or to control or modify the state of any othersecurity-relevant components or functions contained WithinCPU/SPU 2650 to which access is controlled by mode interfaceswitch 2658.Whenever CPU/SPU 2650 enters or leaves the "SPU"mode, the transition is performed in such a way that noinformation contained in the secure memory 532, 534 or derived-227-?101520WO 98109209CA 02265473 1999-02-25PCT/U S97/ 15243from it (e.g., stored in registers or a cache memory associatedwith microprocessor 2652) while in the "SPU" mode can beexposed by microprocessor 2652 operations that occur in the"normal" mode. This may be accomplished either by hardwaremechanisms that protect against such exposure, softwareinstructions executed in "SPU" mode that clear, reinitialize, andotherwise reset during such transitions, or a combination of both.In some example implementations, interrupts may beenabled While CPU/SPU 2650 is operating in the "SPU" modesimilarly interrupts and returns from interrupts while in the"SPU" mode may allow transitions from "SPU" mode to "normal"mode and back to "SPU" mode without exposing the content ofsecure memory 532, 534 or the content of registers or othermemory associated with microprocessor 2652 that may containinformation derived from secure mode operation.In some example implementations, there may be CPU/SPUactivities such as DMA transfers between external memoryand/or devices and secure memory 532, 534 that are initiated bymicroprocessor 2652 but involve autonomous activity by DMAcontroller 2654 and, optionally, encrypt/decrypt engine 522and/or compress/decompress engine 546. In suchimplementations, mode interface switch 2658 and its associated-228-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243control signals may be con?gured to permit such pendingactivities (e.g. DMA transfers) to continue to completion evenafter CPU/SPU 2650 leaves "SPU" mode, provided that uponcompletion, all required clearing, reinitialization, and/or resetactivities occur, and provided that no access or interference ispermitted with the pending activities except when CPU/SPU2650 is operating in "SPU" mode.Inian additional example embodiment,encryption/decryption logic may be connected betweenmicroprocessor 2652 and secure memory 532, 354. Thisadditional encryption/decryption logic may be connected parallel" to mode interface switch 2658. The additionalencryption/decryption logic may allow certain accesses bymicroprocessor 2652 to the secure memory 532, 534 whenCPU/SPU 2650 is operating in the "normal" mode. In thisalternate embodiment, reads from secure memory 532, 534 whenCPU/SPU 2650 is operating in the "normal" mode automaticallyresult in the read information being encrypted before it isdelivered to microprocessor 2652 (and similarly, and Writes tothe secure memory may result in the written information beingdecrypted before it is deposited into the secure memory). Thisalternative embodiment may permit access to secure memory532, 534 (which may in this example store the information in-229-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243"clear" form) by microprocessor 2652 when CPU/SPU 2650 isoperating in the "non-secure normal" mode, but only reveals thesecure memory contents to microprocessor 2652 in unencryptedform when the CPU/SPU is operating in the "SPU" mode. Suchaccess may also be protected by cryptographic authenticationtechniques (e.g., message authentication codes) to preventmodi?cation or replay attacks that modify encrypted data storedin secure memory 532, 534. Such protection may be performedutilizing either or both of software and/or hardwarecryptographic techniques.All of the components shown in Figure 9A may be disposedwithin a single integrated circuit package. Alternatively, modeinterface switch 2658 and secure memory 532, 534, and othersecurity-relevant components might be placed within anintegrated circuit chip package and/or other package separatefrom the rest of CPU/SPU 2650. In this two-package version, aprivate bus could be used to connect microprocessor 2652 to themode interface switch 2658 and associated secure memory 532,534. To maintain security in such multi-package versions, itmay be necessary to enclose all the packages and theirinterconnections in an external physical tamper-resistantbarrier.-230-?WO 98/09209101520CA 02265473 1999-02-25PCT/US97/ 15243Initialization of Integrated CPU/SPUInstructions and/or data may need to be loaded intoCPU/SPU 2650 before it can operate effectively as an SPU 500.This may occur during the manufacture of CPU/SPU 2650 orsubsequently at a CPU/SPU initialization facility. Security ofsuch initialization may depend on physical control of access tothe CPU/SPU component(s), on cryptographic means, or on somecombination of both. Secure initialization may be performed inplural steps under the control of different parties, such that aninitialization step to be performed by party B is preconditionedon successful performance of a step by party A. Differentinitialization steps may be protected using different securitytechniques (eg. physical access, cryptography).In this example, switch 2658 may expose an externalcontrol signal 2670 that requests operation in "SPU" mode ratherthan "normal" mode after a power-on reset. This signal would becombined (e.g., by a logical AND 2672) With a non-volatilestorage element 2671 internal to CPU/SPU 2650. If both of thesesignals are asserted, AND gate 2672 would cause CPU/SPU 2650to begin operating in SPU mode, either executing existinginstructions from an address in SPU memory 532, executinginstructions from main memory 2665 or otherwise external to the-231-?10.20WO 98/09209CA 02265473 1999-02-25PCT/US97I15243CPU/SPU. The instructions thus executed would permitarbitrary initialization and other functions to be performed in"SPU" mode without necessarily requiring any instructions to bepreviously resident in the SPU memory 532.Once initialized, the SPU would, under control of itsinitialization program, indicate to switch 2658 that the ?ag 2671is to be cleared. Clearing ?ag 2671 would permanently disablethis initialization capability because no mechanism would beprovided to set flag 2671 back to its initial value.If flag 2671 is clear, or control signal 2670 is not asserted,CPU/SPU 2650 would behave precisely as does microprocessor2652 with respect to power-on reset and other externalconditions. Under such conditions, only execution of the "enableSPU mode" instruction or otherwise requesting SPU mode underprogram control would cause "SPU" mode to be entered.Additionally, a mechanism could be provided to permitmicroprocessor 2652 and/or control signal 2672 to reinitialize theflag 2671. Such reinitialization would be performed in a mannerthat cleared secure memory 532, 534 of any security-relevantinformation and reinitialized the state of all security-relevantcomponents. This reinitialization mechanism would permitCPU/SPU 2650 to be initialized several times, facilitating testing-232-?on101520CA 02265473 1999-02-25PCT/US97/ 15243WO 98/09209and/or re-use for different applications, while protecting allsecurity-relevant aspects of its operation.In the preferred embodiment, CPU/SPU 2650 would, whenSPU mode has not yet been established, begin operating in SPUmode by fetching instructions from secure non-volatile memory532, thereby ensuring a consistent initialization sequence andpreventing SPU dependence on any information held outsideCPU/SPU 2650. This approach permits secret initializationinformation (e.g., keys for validating digital signatures onadditional information to be loaded into secure memory 532, 534)to be held internally to CPU/SPU 2650 so that it is never exposedto outside access. Such information could even be supplied by ahardware "mask" used in the semiconductor fabrication process.CPU/SPU Integrated With Unmodi?ed MicroprocessorFigure 9B shows an additional example embodiment, inwhich a completely standard microprocessor 2652 integratedcircuit chip could be transformed into a CPU/SPU 2650 byadding an SPU chip 2660 that mediates access to external I/Odevices and memory. In such an embodiment, themicroprocessor 2652 would be connected to the SPU chip 2660 bya private memory bus 2661, and all three such components-233-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243would be contained within hardware tamper-resistant barrier502.In this embodiment, SPU chip 2660 may have the samesecure components as in Figure 9, i.e., it may have aROM/EEPROM 532, a RAM 532, an RTC 528, an (optional)encryption/decryption engine 522, an (optional) random numbergenerator (RNG) 542, an (optional) arithmetic accelerator 544,and a (optional) compression/decompression engine 546, and a(optional) pattern matching circuit 524. Microprocessor 520 isomitted from SPU chip 2660 since the standard microprocessor2650 performs the processing functions instead. In addition,SPU chip 2660 may include a flag 2671 and AND gate logic 2672for the initialization purposes discussed above.In addition, SPU chip 2660 includes an enhanced switch2663 that provides the same overall (bus enhanced) functionalityperformed by the switch 2658 in the Figure 9A embodiment.Enhanced switch 2663 would perform the functions of abus repeater, mediator and interpreter. For example, enhancedswitch 2663 may act as a bus repeater that enablesmicroprocessor 2652âs memory accesses made over internalmemory bus 2661 to be re?ected to external memory bus 2664-234-?WO 98/09209101520.\..,................._..................._.....n.c...._.«,..,, ..._,. . .CA 02265473 1999-02-25PCT/U S97/ 15243and performed on main memory 2665. Enhanced switch 2663may also act as a bus repeater similarly for internal I/O bus 2662to external I/O bus 2665 in the event that microprocessor 2652performs I/O operations distinctly from memory operations.Enhanced switch 2663 may also perform the function of amediator for microprocessor control functions 2666 (e.g.,non-maskable interrupt, reset) with respect to externallyrequested control functions 2667. Enhanced switch 2663 mayalso provide mediation for access to SPU-protected resourcessuch as ROM 532, RAM 534, encrypt/decrypt engine 522 (ifpresent), random number generator 542 (if present), arithmeticaccelerator 544 (if present), pattern matching engine 524 (ifpresent), and realâtime clock 528 (if present). Enhanced switch2663 may also act as an interpreter of control signals receivedfrom microprocessor 2652 indicating entry to, exit from, andcontrol of SPU mode.Switch 2663 in this example recognizes a speci?cindication (e.g., an instruction fetch access to a designatedaddress in the secure memory 532) as the equivalent to the"enable âSPUâ mode" instruction. Upon recognizing such anindication, it may isolate the CPU/SPU 2650 from external busesand interfaces 2664, 2665, and 2667 such that any externalactivity, such as DMA cycles, would be "held" until the switch-235-?101520WO 98/09209CA 02265473 1999-02-252663 permits access again. After this, switch 2663 permits asingle access to a speci?c location in secure memory 532 tocomplete.The single instruction fetched from the designated locationperforms a control operation (a cache ?ush, for example), thatcan only be performed in microprocessor 2652âs most privilegedoperating mode, and that has an effect visible to switch 2663.Switch 2663 awaits the occurrence of this event, and if it doesnot occur within the expected number of cycles, does not enter"SPU" mode.Occurrence of the control operation demonstrates thatmicroprocessor 2652 is executing in its most privileged "normal"mode and therefore can be trusted to execute successfully the"enter âSPUâ mode" sequence of instructions stored in securememory 532. If microprocessor 2652 were not executing in itsmost privileged mode, there would be no assurance that thoseinstructions would execute successfully. Because switch 2663isolates microprocessor 2652 from external signals (e.g.,interrupts) until "SPU" mode is successfully initialized, the entryinstructions can be guaranteed to complete successfully.-236-PCTIU S97/ 15243 M?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243Following the initial instruction, switch 2663 can enter"partial SPU mode," in which a restricted area of ROM 532 andRAM 534 may be accessible. Subsequent instructions in securememory 532 may then be eicecuted by microprocessor 2652 toplace it into a known state such that it can perform SPUfunctions -- saving any previous state in the restricted area ofRAM 534 that is accessible. After the known state is established,an instruction may be executed to deliver a further indication(eg, a reference to another designated memory location) toswitch 2663, which would enter "SPU" mode. If this furtherindication is not received within the expected interval, switch2663 will not enter "SPU" mode. Once in "SPU" mode, switch2663 permits access to all of ROM 532, RAM 534, and otherdevices in SPU chip 2660.The instructions executed during "partial SPU" mode mustbe carefully selected to ensure that no similar combination ofinstructions and processor state could result in a control transferout of the protected SPU code in ROM 532 or RAM 534. Forexample, internal debugging features of microprocessor 2652must be disabled to ensure that a malicious program could notset up a breakpoint later within protected SPU code and receivecontrol. Similarly, all address translation must be disabled orreinitialized to ensure that previously created MMU data-237~?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243structures would not permit SPU memory accesses to becompromised. The requirement that the instructions for "partia.lSPU mode" run in the microprocessor 2652âs most privilegedmode is necessary to ensure that all its processor controlfunctions can be effectively disabled.The switch 2663 provides additional protection againsttampering by ensuring that the expected control signals occurafter an [appropriate number of clock cycles. Because the "partialSPU" initialization sequence is entirely deterministic, it is notfeasible for malicious software to interfere with it and still retainthe same timing characteristics, even if malicious software isrunning in microprocessor 2652's most privileged mode.Once in "SPU" mode, switch 2663 may respond toadditional indications or signals generated by microprocessor2652 (e.g., references to speci?c memory addresses) controllingfeatures of SPU mode. These might include enabling access toexternal buses 2664 and 2665 so that SPU-protected code couldreference external memory or devices. Any attempts bycomponents outside CPU/SPU 2650 to perform operations (e.g.,accesses to memory, interrupts, or other control functions) maybe prevented by switch 2663 unless they had been explicitlyenabled by instructions executed after "SPU" mode is entered.-238-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243To leave SPU mode and return to normal operation, theinstructions executing in "SPU" mode may provide a speci?cindication to switch 2663 (e.g., a transfer to a designated memoryaddress). This indication may be recognized by switch 2663 asindicating a return to "normal mode," and it may again restrictaccess to ROM 532, RAM 534, and all other devices Within SPUchip 2660, while reâenabling external buses and control lines2664, 2665, and 2667. The instructions executed subsequentlymay restore the CPU state to that which was saved on entry toSPU mode, so that microprocessor 2652 may continue to performfunctions in progress when the SPU was invoked.In an alternate embodiment, the entry into SPU mode maybe conditioned on an indication recognized by switch 2663, butthe switch may then use a hardware mechanism (e.g., theprocessorâs RESET signal) to reinitialize microprocessor 2562. Insuch an embodiment, switch 2663 may not implement partialSPU mode, but may instead enter SPU mode directly and ensurethat the address from which instructions would be fetched bymicroprocessor 2652 (speci?c to microprocessor 2652âsarchitecture) results in accesses to appropriate locations in theSPU memory 532. This could reduce the complexity of the SPUmode entry mechanisms in switch 2663, but could incur an-239-?101520WO 98/09209CA 02265473 1999-02-25PCT /U S97] 15243additional processing cost from using a different reinitializationmechanism for microprocessor 2652.SPU chip 2660 may be customized to operate inconjunction with a particular commercial microprocessor. In thisexample, the SPU may be customized to contain at least thespecialized "enter SPU mode" instruction sequences toreinitialize the processors state and, to recognize specialindications for SPU control operations. SPU chip 2660 may alsobe made electrically compatible with microprocessor 2652âsexternal bus interfaces. This compatibility would permitCPU/SPU 2650 to be substituted for microprocessor 2652 withoutchange either to software or hardware elsewhere in a computersystem.In other alternate embodiments, the functions describedabove for SPU chip 2600, microprocessor 2652, and internalbuses 2661, 2662, and 2666 could all be combined within a singleintegrated circuit package, and/or on a single silicon die. Thiscould reduce packaging compleidty and/or simplify establishmentof the hardware tamper-resistant barrier 502.-240-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243The hardware con?guration of an example of electronicappliance 600 has been described above. The following sectiondescribes an example of the software architecture of electronicappliance 600 provided by the preferred embodiment, includingthe structure and operation of preferred embodiment âRightsOperating Systemâ (âROSâ) 602.Rights Operating System 602Rights Operating System (âROSâ) 602 in the preferredembodiment is a compact, secure, event-driven, services-based,âcomponentâ oriented, distributed multiprocessing operatingsystem environment that integrates VDE information securitycontrol information, components and protocols with traditionaloperating system concepts. Like traditional operating systems,ROS 602 provided by the preferred embodiment is a piece ofsoftware that manages hardware resources of a computer systemand extends management functions to input and/or outputdevices, including communications devices. Also like traditionaloperating systems, preferred embodiment ROS 602 provides acoherent set of basic functions and abstraction layers for hidingthe differences between, and many of the detailed complexitiesof, particular hardware implementations. In addition to thesecharacteristics found in many or most operating systems, ROS602 provides secure VDE transaction management and other-241-?101520WO 98/09209CA 02265473 1999-02-25PCTIUS97/ 15243advantageous features not found in other operating systems.The following is a non-exhaustive list of some of theadvantageous features provided by ROS 602 in the preferredembodiment:Standardized interface provides coherent set of basic functions- simpli?es programming- the same application can run on many di?erent platformsEvent driven- eases functional decomposition- extendible- 9 accommodates state transition and/or process orientedevents- simpli?es task management- simpli?es inter-process communicationsrvi bas d- allows simpli?ed and transparent scalability- simpli?es multiprocessor support- hides machine dependencies- eases network management and supportCgmpgnent Based Arehiteeture- processing based on independently deliverable securecomponents-242-?101520WO 98/09209CA 02265473 1999-02-25PCTlUS97I15243component model of processing control allows differentsequential steps that are recon?gurable based onrequirementscomponents can be added, deleted or modi?ed (subject topermissioning)full control information over pre-de?ned and user-de?nedapplication eventsevents can be individually controlled with independentexecutablesS_eQ1_r.e_secure communicationssecure control functionssecure virtual memory managementinformation control structures protected from exposuredata elements are validated, correlated and accesscontrolledcomponents are encrypted and validated independentlycomponents are tightly correlated to prevent unauthorizeduse of elementscontrol structures and secured executables are validatedprior to use to protect against tamperingintegrates security considerations at the I/O levelprovides on-the-?y decryption of information at releasetime-243-?CA 02265473 1999-02-25wo 98/09209 PCT/US97/15243- enables a secure commercial transaction network- ?exible key management featuresSsalasbls- highly scalaeble across many different platforms5 - supports concurrent processing in a multiprocessorenvironment- supports multiple cooperating processors- any number of host or security processors can be supported- control structures and kernel are easily portable to various1.0 host platforms and to different processors Within a targetplatform without recompilation- supports remote processing- Remote Procedure Calls may be used for internal OScommunications15 _l:Ijgl_ily Inteorg atable20can be highly integrated with host platforms as anadditional operating system layerpermits non-secure storage of secured components andinformation using an OS layer âon top ofâ traditional OSplatformscan be seamlessly integrated with a host operating systemto provide a common usage paradigm for transactionmanagement and content access-244-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243integration may take many forms: operating systemlayers for desktops (e.g., DOS, Windows, Macintosh);device drivers and operating system interfaces for networkservices (e.g, Unix and Netware); and dedicated componentdrivers for "low endâ set tops are a few of many examplescan be integrated in traditional and real time operatingsystemsDisizibiltedprovides distribution of control information and reciprocalcontrol information and mechanismssupports conditional execution of controlled processeswithin any VDE node in a distributed, asynchronousarrangementcontrolled delegation of rights in a distributedenvironmentsupports chains of handling and controlmanagement environment for distributed, occasionallyconnected but otherwise asynchronous networkeddatabasereal time and time independent data managementsupports âagentâ processesIiansnarentcan be seamlessly integrated into einsting operatingsystems-245-?CA 02265473 1999-02-25W0 98/09209 PCT/US97/15243- can Support applications not specifically written to use itlietwork friendly- internal OS structures may use RPCS to distributeprocessing5 - subnets may seamlessly operate as a single node orindependentlyGeneral Background Regarding Operating SystemsAn âoperating systemâ provides a control mechanism for10 organizing computer system resources that allows programmersto create applications for computer systems more easily. Anoperating system does this by providing commonly usedfunctions, and by helping to ensure compatibility betweendifferent computer hardware and architectures (which may, for15 example, be manufactured by different vendors). Operatingsystems also enable computer âperipheral deviceâ manufacturersto far more easily supply compatible equipment to computermanufacturers and users.20 Computer systems are usually made up of several differenthardware components. These hardware components include, forexample:a central processing unit (CPU) for executing instructions;-246-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243an array of main memory cells (e.g., âRAMâ or âROMâ) forstoring instructions for execution and data acted upon orparameterizing those instructions; andone or more secondary storage devices (e.g., hard diskdrive, ?oppy disk drive, CD-ROM drive, tape reader, cardreader, or â?ashâ memory) organized to reflect namedelements ( a ââfile systemâ) for storing images of mainmemory cells.Most computer systems also include input/output devices such askeyboards, mice. video systems, printers, scanners andcommunications devices.To organize the CPUâs execution capabilities withavailable RAM, ROM and secondary storage devices, and toprovide commonly used functions for use by programmers, apiece of software called an âoperating systemâ is usually includedwith the other components. Typically, this piece of software isdesigned to begin executing after power is applied to thecomputer system and hardware diagnostics are completed.Thereafter, all use of the CPU, main memory and secondarymemory devices is normally managed by this âoperating systemâsoftware. Most computer operating systems also typicallyinclude a mechanism for extending their management functions-247-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243to I/O and other peripheral devices, including commonly usedfunctions associated with these devices.By managing the CPU, memory and peripheral devicesthrough the operating system, a coherent set of basic functionsand abstraction layers for hiding hardware details allowsprogrammers to more easily create sophisticated applications. Inaddition, managing the computerâs hardware resources with anoperating system allows many differences in design andequipment requirements between different manufacturers to behidden. Furthermore. applications can be more easily sharedwith other computer users who have the same operating system,with signi?cantly less work to support different manufacturersbase hardware and peripheral devices.ROS 602 is an Operating System Providing Signi?cantAdvantages_13,Q§ 692 is an âQperating system.â It manages theresources of electronic appliance 600, and provides a commonlyused set of functions for programmers writing applications 608for the electronic appliance. ROS 602 in the preferredembodiment manages the hardware (e.g., CPU(s), memoryfiesl,secure RTC(s), and encrypt/decrypt engines) Within SPU 500.ROS may also manage the hardware (e.g., CPU(s) and-248-?WO 98/09209101520CA 02265473 1999-02-25PCT/U S97/ 15243memoryiiesl) within one or more general purpose processorswithin electronic appliance 600. ROS 602 also manages otherelectronic appliance hardware resources, such as peripheraldevices attached to an electronic appliance. For example,referring to Figure 7, R08 602 may manage keyboard 612,display 614, modem 618, disk drive 620, printer 622, scanner624. ROS 602 may also manage secure database 610 and astorage device meg, "secondary storageâ 652) used to store securedatabase 610.ROS 602 supports multiple processors. ROS 602 in thepreferred embodiment supports any number of local and/orremote processors. Supported processors may include at leasttwo types: one or more electronic appliance processors 654,and/or one or more SPUS 500. A host processor CPU 654 mayprovide storage, database, and communications services. SPU500 may provide cryptographic and secured process executionservices. Diverse control and execution structures supported byROS 602 may require that processing of control informationoccur Within a controllable execution space â- this controllableexecution space may be provided by SPU 500. Additional hostand/or SPU processors may increase e?iciencies and/orcapabilities. ROS 602 may access, coordinate and/or managefurther processors remote to an electronic appliance 600 (e.g., via-249-?WO 98/09209U!1020CA 02265473 1999-02-25PCT/U S97/ 15243network or other communications link) to provide additionalprocessor resources and/or capabilities.ROS 602 is services based. The ROS services providedusing a host processor 654 and/or a secure processor (SPU 500)are linked in the preferred embodiment using a âRemoteProcedure Callâ (âRPCâ) internal processing request structure.Cooperating processors may request interprocess services using aRPC mechanism. which is minimally time dependent and can bedistributed over cooperating processors on a network of hosts.The multi-processor architecture provided by ROS 602 is easilyextensible to support any number of host or security processors.This extensibility supports high levels of scalability. Servicesalso allow functions to be implemented differently on differentequipment. For example, a small appliance that typically haslow levels of usage by one user may implement a databaseservice using very different techniques than a very largeappliance with high levels of usage by many users. This isanother aspect of scalability.B08 602 provides a distributed processing environment.For example, it permits information and control structures toautomatically, securely pass between sites as required to ful?ll ausers requests. Communications between VDE nodes under the-250-?1020WO 98/09209CA 02265473 1999-02-25PCT/US97/15243distributed processing features of ROS 602 may includeinterprocess service requests as discussed above. ROS 602supports conditional and/or state dependent execution ofcontrolled processors within any VDE node. The location thatthe process executes and the control structures used may belocally resident, remotely accessible, or carried along by theprocess to support execution on a remote system.ROS 602 provides distribution of control information,including for example the distribution of control structuresrequired to permit "agentsâ to operate in remote environments.Thus, ROS" 602 provides facilities for passing execution and/orinformation control as part of emerging requirements for âagentâprocesses.If desired, ROS 602 may independently distribute controlinformation over very low bandwidth connections that may ormay not be âreal timeâ connections. ROS 602 provided by thepreferred embodiment is ânetWork friendly,â and can beimplemented with any level of networking protocol. Someexamples include e-mail and direct connection at approximately"Layer 5â of the ISO model.-251-?WO 98/09209U!101520CA 02265473 1999-02-25PCT/U S97/ 15243The ROS 602 distribution process (and the associatedauditing of distributed information) is a controlled event thatitself _uses such control structures. This âref1ectiveâ distributedprocessing mechanism permits ROS 602 to securely distributerights and permissions in a controlled manner, and effectivelyrestrict the characteristics of use of information content. Thecontrolled delegation of rights in a distributed environment andthe secure processing techniques used by ROS 602 to supportthis approach provide signi?cant advantages.Certain control mechanisms within ROS 602 areâreciprocal.â Reciprocal control mechanisms place one or morecontrol components at one or more locations that interact withone or more components at the same or other locations in acontrolled Way. For example, a usage control associated withobject content at a useiâs location may have a reciprocal controlat a distributorâs location that governs distribution of the usagecontrol, auditing of the usage control, and logic to process userrequests associated with the usage control. A usage control at ausefs location (in addition to controlling one or more aspects ofusage) may prepare audits for a distributor and format requestsassociated with the usage control for processing by a distributor.Processes at either end of a reciprocal control may be furthercontrolled by other processes (eg, a distributor may be limited-252-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243by a budget for the number of usage control mechanisms theymay produce). Reciprocal control mechanisms may extend overmany sites and many levels (e.g., a creator to a distributor to auser) and may take any relationship into account (e.g.,creator/distributor, distributor/user, user/user, user/creator,user/creator/distributor. etc.) Reciprocal control mechanismshave many uses in VDE 100 in representing relationships andagreements in a distributed environment.RQS 602 is scalable. Many portions of ROS 602 controlstructures and kernell s; are easily portable to various hostplatforms without recompilation. Any control structure may bedistributed (or redistributed) if a granting authority permits thistype of activity. The executable references within ROS 602 areportable Within a target platform. Different instances of ROS602 may execute the references using different resources. Forexample, one instance of ROS 602 may perform a task using anSPU 500, while another instance of ROS 602 might perform thesame task using a host processing environment running inprotected memory that is emulating an SPU in software. ROS602 control informationis similarly portable; in many cases theevent processing structures may be passed between machinesand host platforms as easily as between cooperative processors ina single computer. Appliances with different levels of usage-253-?U!101520WO 98109209CA 02265473 1999-02-25PCT/US97l15243and/or resources available for ROS 602 functions may implementthose functions in very different ways. Some services may beomitted entirely if insufficient resources exist. As describedelsewhere, ROS 602 âknowsâ what services are available, andhow to proceed based on any given event. Not all events may beprocessable if resources are missing or inadequate.EDS 602 iscomponenLbased. Much of the functionalityprovided by ROS 602 in the preferred embodiment may be basedon âcomponentsâ that can be "securely. independently deliverable,replaceable and capable of being modi?ed (e.g., under iappropriately secure conditions and authorizations). Moreover,the ââcomponentsââ may themselves be made of independentlydeliverable elements. ROS 602 may assemble these elementstogether (using a construct provided by the preferredembodiment called a âchannelâ) at execution time. For example,a "load moduleâ for execution by SPU 500 may reference one ormore âmethod cores,â method parameters and other associateddata structures that ROS 602 may collect and assemble togetherto perform a task such as billing or metering. Different usersmay have different combinations of elements, and some of theelements may be customizable by users with appropriateauthorization. This increases flexibility, allows elements to bereused, and has other advantages.-254-?10'1520WO 98/09209CA 02265473 1999-02-25PCT/US97l152438425 mg jg hjcrhiy seggre. ROS 602 provides mechanismsto protect information control structures from exposure by endusers and conduit hosts. ROS 602 can protect information, VDEcontrol structures and control executables using strongencryption and validation mechanisms. These encryption andvalidation mechanisms are designed to make them highlyresistant to undetected tampering. ROS 602 encryptsinformation stored on secondary storage device(s) 652 to inhibittampering. ROS 602 also separately encrypts and validates itsvarious components. ROS 602 correlates control and datastructure components to prevent unauthorized use of elements.These features permit ROS 602 to independently distributeelements, and also allows integration of VDE functions 604 withnon-secure âother" OS functions 606.ROS 602 provided by the preferred embodiment extendsconventional capabilities such as, for example, Access ControlList (ACL) structures, to user and process de?ned events,including state transitions. ROS 602 may provide full controlinformation over pre-de?ned and user-de?ned applicationevents. These control mechanisms include âgo/no-goâpermissions, and also include optional event-speci?c executablesthat permit complete fleidbility in the processing and/orcontrolling of events. This structure permits events to be-255-?101520WO 98109209CA 02265473 1999-02-25PCT/U S97/ 15243individually controlled so that, for example, metering andbudgeting may be provided using independent executables. Forexample, ROS 602 extends ACL structures to control arbitrarygranularity of information. Traditional operating systemsprovide static âgo-no goâ control mechanisms at a ?le or resourcelevel; ROS 602 extends the control concept in a general way fromthe largest to the smallest sub-element using a ?exible controlstructure. ROS 602 can, for example, control the printing of asingle paragraph out of a document file.ROS 602 provided by the preferred embodiment permitssecure modi?cation and update of control information governingeach component. The control information may be provided in atemplate format such as method options to an end-user. Anend~user may then customize the actual control information usedwithin guidelines provided by a distributor or content creator.Modi?cation and update of existing control structures ispreferably also a controllable event subject to auditing andcontrol information.ROS 602 provided by the preferred embodiment validatescontrol structures and secured executables prior to use. Thisvalidation provides assurance that control structures andexecutables have not been tampered with by end-users. The-256-?U!101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243validation also permits ROS 602 to securely implementcomponents that include fragments of ?les and other operatingsystem structures. ROS 602 provided by the preferredembodiment integrates security considerations at the operatingsystem I/O level (which is below the access level), and providesâon-the-?yâ decryption of information at release time. Thesefeatures permit non-secure storage of ROS 602 securedcomponents and information using an OS layer âon top ofâtraditional operating system platforms.2 is hiohlv int orat bl with host platforms as anadditional operating system layer. Thus, ROS 602 may becreated by "adding on" to existing operating systems. Thisinvolves hooking VDE "add onsâ to the host operating system atthe device driver and network interface levels. Alternatively,ROS 602 may comprise a wholly new operating system thatintegrates both VDE functions and other operating systemfunctions.Indeed, there are at least three general approaches tointegrating VDE functions into a new operating system,potentially based on an existing operating system, to create aRights Operating System 602 including:-257-?10'1520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243(1) Redesign the operating system based on VDEtransaction management requirements;( 2) Compile VDE API functions into an existing operatingsystems; and(3) Integrate a VDE Interpreter into an existing operatingsystem.The first approach could be most effectively applied whena new operating system is being designed. or if a significantupgrade to an existing operating system is planned. Thetransaction management and security requirements provided bythe VDE functions could be added to the design requirements listfor the design of a new operating system that provides. in anoptimally efficient manner. an integration of "traditionalâoperating system capabilities and VDE capabilities. For example,the engineers responsible for the design of the new version orinstance of an operating system would include the requirementsof VDE metering/transaction management in addition to otherrequirements (if any) that they use to form their designapproach, speci?cations, and actual implementations. Thisapproach could lead to a âseamlessâ integration of VDE functionsand capabilities by threading metering/transaction managementfunctionality throughout the system design and implementation.-258-?CA 02265473 1999-02-25WO 98/09209 PCTIUS97/15243The second approach would involve taking an existing setof API (Application Programmer Interface) functions, andincorporating references in the operating system code to VDEfunction calls. This is similar to the way that the current' 5 Windows operating system is integrated with DOS, wherein DOSserves as both the launch point and as a signi?cant portion ofthe kernel underpinning of the Windows operating system. Thisapproach would be also provide a high degree of ââseamlessââintegration (although not quite as âseamlessâ as the first10 approach). The bene?ts of this approach include the possibilitythat the incorporation of metering/transaction managementfunctionality into the new version or instance of an operatingsystem may be accomplished with lower cost (by making use ofthe existing code embodied in an API. and also using the design15 implications of the API functional approach to in?uence thedesign of the elements into which the metering/transactionmanagement functionality is incorporated).The third approach is distinct from the first two in that it20 does not incorporate VDE functionality associated withmetering/transaction management and data security directlyinto the operating system code, but instead adds a newgeneralized capability to the operating system for executingmetering/transaction management functionality. In this case, an-259-?U]101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243interpreter including metering/transaction managementfunctions would be integrated with other operating system codein a "stand aloneâ mode. This interpreter might take scripts orother inputs to determine what metering/transactionmanagement functions should be performed, and in What orderand under which circumstances or conditions they should beperformed.Instead of (or in addition to) integrating VDE functionsinto/with an electronic appliance operating system, it would bepossible to provide certain VDE functionality available as anapplication running on a conventional operating system.ROS Software ArchitectureFigure 10 is a block diagram of one example of a softwarestructure/architecture for Rights Operating System (âROSâ) 602provided by the preferred embodiment. In this example, ROS602 includes an operating system (âOSâ) âcoreâ 679, a userApplication Program Interface (âAPIâ) 682, a âredirectorâ 684, anâinterceptâ 692, a User N oti?cation/Exception Interface 686, anda file system 687. ROS 602 in this example also includes one ormore Host Event Processing Environments (âHPEsâ) 655 and/orone or more Secure Event Processing Environments (âSPEsâ) 503-260-?WO 98/09209101520CA 02265473 1999-02-25PCT/U S97] 15243(these environments may be generically referred to as "âProtectedProcessing Environmentsâ 650).HPE(s) 655 and SPE(s) 503 are selfâcontained computingand processing environments that may include their ownoperating system kernel 688 including code and data processingresources. A given electronic appliance 600 may include anynumber of SPE(s) 503 and/or any number of HPE(s) 655. HPE(s)655 and SPE(s) 503 may process information in a secure way,and provide secure processing support for ROS 602. Forexample, they may each perform secure processing based on oneor more VDE component assemblies 690, and they may each offersecure processing services to OS kernel 680.In the preferred embodiment, SPE 503 is a secureprocessing environment provided at least in part by an SPU 500.Thus, SPU 500 provides the hardware tamper-resistant barrier503 surrounding SPE 503. SPE 503 provided by the preferredembodiment is preferably:- small and compact- loadable into resource constrainedenvironments such as for example minimallycon?gured SPUs 500- dynamically updatable-261-?01101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243- extensible by authorized users- integratable into object or proceduralenvironments- secure.In the preferred embodiment, HPE 655 is a secureprocessing environment supported by a processor other than anSPU, such as for example an electronic appliance CPU 654general-purpose microprocessor or other processing system ordevice. In the preferred embodiment. HPE 655 may beconsidered to "emulate" an SPU 500 in the sense that it may usesoftware to provide some or all of the processing resourcesprovided in hardware and/or ?rmware by an SPU. HPE 655 inone preferred embodiment of the present invention is full-featured and fully compatible with SPE 503ââthat is, HPE 655can handle each and every service call SPE 503 can handle suchthat the SPE and the HPE are âplug compatibleâ from an outsideinterface standpoint (with the exception that the HPE may notprovide as much security as the SPE).HPES 655 may be provided in two types: secure and notsecure. For example, it may be desirable to provide non-secureversions of HPE 655 to allow electronic appliance 600 toe?iciently run non-sensitive VDE tasks using the full resources-262-?WO 98/09209101520CA 02265473 1999-02-25PCT IU S97! 1 5243of a fast general purpose processor or computer. Such non-secure versions of HPE 655 may run under supervision of aninstance of ROS 602âthat also includes an SPE 503. In this way,ROS 602 may run all secure processes within SPE 503, and onlyuse HPE 655 for processes that do not require security but thatmay require (or run more efficiently) under potentially greaterresources provided by a general purpose computer or processorsupporting HPE 655. Non-secure and secure HPE 655 mayoperate together with a secure SPE 503.HPES 655 may (as shown in Figure 10) be provided with asoftware-based tamper resistant barrier 674 that makes themmore secure. Such a software-based tamper resistant barrier674 may be created by software executing on general-purposeCPU 654. Such a "secureâ HPE 655 can be used by ROS 602 toexecute processes that, while still needing security, may notrequire the degree of security provided by SPU 500. This can beespecially bene?cial in architectures providing both an SPE 503and an HPE 655. The SPU 502 may be used to perform all trulysecure processing, whereas one or more HPES 655 may be usedto provide additional secure (albeit possibly less secure than theSPE) processing using host processor or other general purposeresources that may be available within an electronic appliance600. Any service may be provided by such a secure HPE 655. In-263-?WO 98/09209O11020CA 02265473 1999-02-25PCT/US97/ 15243the preferred embodiment, certain aspects of âchannelprocessingâ appears to be a candidate that could be readilyexported from SPE 503 to HPE 655.The software-based tamper resistant barrier 674 providedby HPE 655 may be provided, for example, by: introducing timechecks and/or code modifications to complicate the process ofstepping through code comprising a portion of kernel 688a and/ora portion of component assemblies 690 using a debugger; using amap of defects on a storage device (e.g., a hard disk, memorycard, etc.) to form internal test values to impede moving and/orcopying HPE 655 to other electronic appliances 600; using kernelcode that contains false branches and other complications in flowof control to disguise internal processes to some degree fromdisassembly or other efforts to discover details of processes; usingâsel.f-generatingâ code (based on the output of a co-sinetransform, for example) such that detailed and/or completeinstruction sequences are not stored explicitly on storage devicesand/or in active memory but rather are generated as needed;using code that âshu?lesâ memory locations used for data valuesbased on operational parameters to complicate e?brts tomanipulate such values; using any software and/or hardwarememory management resources of electronic appliance 600 toâprotectâ the operation of HPE 655 from other processes,-264-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243functions, etc. Although such a software-based tamper resistantbarrier 674 may provide a fair degree of security, it typically willnot be as secure as the hardware-based tamper resistant barrier502 provided (at least in part) by SPU 500. Because securitymay be better/more effectively enforced with the assistance ofhardware security features such as those provided by SPU 500(and because of other factors such as increased performanceprovided by special purpose circuitry within SPU 500), at leastone SP5 503 is preferred for many or most higher securityapplications. However. in applications where lesser security canbe tolerated anchor the cost of an SPU 500 cannot be tolerated,the SPE 503 may be omitted and all secure processing mayinstead be performed by one or more secure HPES 655 executingon general-purpose CPUS 654. Some VDE processes may not beallowed to proceed on reducedâsecurity electronic appliances ofthis type if insufficient security is provided for the particularprocess involved.Only those processes that execute completely within SPES503 (and in some cases, HPEs 655) may be considered to be trulysecure. Memory and other resources external to SPE 503 andPIPES 655 used to store and/or process code and/or data to beused in secure processes should only receive and handle thatinformation in encrypted form unless SPE 503/HPE 655 can-265-?WO 98/09209O1101520CA 02265473 1999-02-25PCT/US97/15243protect secure process code and/or data from non-secureprocesses.OS âcoreâ 679 in the preferred embodiment includes akernel 680, an RPC manager 7 32, and an âobject switchâ 734.API 682, HPE 655 and SPE 503 may communicate âeventâmessages with one another via OS âcoreâ 679. They may alsocommunicate messages directly with one another Withoutmessages going through OS âcoreâ 679.Kernel 680 may manage the hardware ofan electronicappliance 600. For example, it may provide appropriate driversand hardware managers for interacting with input/output and/orperipheral devices such as keyboard 612. display 614, otherdevices such as a "mouseâ pointing device and speech recognizer613, modern 618, printer 622, and an adapter for network 672.Kernel 680 may also be responsible for initially loading theremainder of ROS 602, and may manage the various ROS tasks(and associated underlying hardware resources) duringexecution. OS kernel 680 may also manage and access securedatabase 610 and ?le system 687. OS kernel 680 also providesexecution services for applications 608a(1), 608a(2), etc. andother applications.-266-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243RPC manager 732 performs messaging routing andresource management/integration for ROS 680. It receives androutes âca.llsâ from/to API 682, HPE 655 and SPE 503, forexample.Object switch 734 may manage construction,deconstruction and other manipulation of VDE objects 300.User N oti?cation/âExce'ption Interface 686 in the preferredembodiment (which may be considered part ofAPI 682 oranother application coupled to the API) provides âpop upâwindows/displays on display 614. This allows ROS 602 tocommunicate directly with a user without having to passinformation to be communicated through applications 608. Forapplications that are not "VDE aware.â usernoti?cation/exception interface 686 may provide communicationsbetween ROS 602 and the user.API 682 in the preferred embodiment provides astandardized, documented software interface to applications 608.In part, API 682 may translate operating system ââcallsâgenerated by applications 608 into Remote Procedure Calls(âRPCsâ) specifying âevents.â RPC manager 732 may route theseRPCs to kernel 680 or elsewhere (e.g., to HPE(s) 655 and/or-267-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243SPE(s) 503, or to remote electronic appliances 600, processors, orVDE participants) for processing. The API 682 may also serviceRPC requests by passing them to applications 608 that registerto receive and process speci?c requests.API 682 provides an "Applications Programming Interfaceâthat is preferably standardized and documented. It provides aconcise set of function calls an application program can use toaccess services provided by R06 602. In at least one preferredexample, API 682 will include two parts: an application programinterface to VDE functions 604; and an application programinterface to other OS functions 606. These parts may beinterwoven into the same software, or they may be provided astwo or more discrete pieces of software (for example).Some applications. such as application 608a(1) shown inFigure 11, may be âVDE awareâ and may therefore directlyaccess both of these parts of API 682. Figure 11A shows anexample of this. A âVDE awareâ application may, for example,include explicit calls to ROS 602 requesting the creation of newVDE objects 300, metering usage of VDE objects, storinginformation in VDE-protected form, etc. Thus, a âVDE awareâapplication can initiate (and, in some examples, enhance and/orextend) VDE functionality provided by ROS 602. In addition,-268-?WO 98/09209101520CA 02265473 1999-02-25PCT/US97/ 15243"VDE awareâ applications may provide a more direct interfacebetween a user and ROS 602 (e.g., by suppressing or otherwisedispensing with âpop up" displays otherwise provided by usernoti?cation/exception interface 686 and instead providing a moreâseamlessâ interface that integrates application and ROSmessages).Other applications, such as application 608b shown inFigure 1.1B, may not be âVDE Awareâ and therefore may notâknowâ how to directly access an interface to VDE functions 604provided by API 682. To provide for this, ROS 602 may include aâredirectorâ 684 that allows such ânon-VDE awareâ applications608(b) to access VDE objects 300 and functions 604. Redirector684, in the preferred embodiment. translates OS calls directed tothe âother OS functionsâ 606 into calls to the âVDE functionsâ604. As one simple example, redirector 684 may intercept a ââfileopenâ call from application 608(b), determine whether the file tobe opened is contained within a VDE container 300, and if it is,generate appropriate VDE function call( s) to ?le system 687 toopen the VDE container (and potentially generate events to HPE655 and/or SPE 503 to determine the name(s) of ?lefs) that maybe stored in a VDE object 300, establish a control structureassociated with a VDE object 300, perform a registration for aVDE object 300, etc.). Without redirector 684 in this example, a-269-?WO 98/09209U!10.1520CA 02265473 1999-02-25PCT/US97l15243non-VDE aware application such as 608b could access only thepart of API 682 that provides an interface to other OS functions606, and therefore could not access any VDE functions.This âtranslationâ feature of redirector 684 providesâtransparency.â It allows VDE functions to be provided to theapplication 608( b) in a âtransparentâ way without requiring theapplication to become involved in the complexity and detailsassociated with generating the one or more calls to VDEfunctions 604. This aspect of the âtransparencyâ features of ROS602 has at least two important advantages:(a) it allows applications not Written specifically for VDEfunctions 604 ("nonâVDE aware applicationsâ) tonevertheless access critical VDE functions; and(b) it reduces the complexity of the interface between anapplication and ROS 602.Since the second advantage (reducing complexity) makes iteasier for an application creator to produce applications, evenâVDE awareâ applications 608a(2) may be designed so that somecalls invoking VDE functions 604 are requested at the level of anâother OS functionsâ call and then âtranslatedâ by redirector 684into a VDE function call (in this sense, redirector 684 may beconsidered a part of API 682). Figure 11C shows an example of-270-?Cu101520WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243this. Other calls invoking VDE functions 604 may be passeddirectly Without translation by redirector 684.Referring again to Figure 10, ROS 620 may also include anâinterceptorâ 692 that transmits and/or receives one or more realtime data feeds 694 (this may be provided over cable(s) 628 forexample), and routes one or more such data feeds appropriatelywhile providing âtranslationâ functions for real time data sentand/or received by electronic appliance 600 to allowâtransparencyâ for this type of information analogous to thetransparency provided by redirector 684 (and/or it may generateone or more real time data feeds).Secure ROS Components and Component AssembliesAs discussed above, ROS 602 in the preferred embodimentis a component-based architecture. ROS VDE functions 604 maybe based on segmented, independently loadable executable"component assembliesâ 690. These component assemblies 690are independently securely deliverable. The componentassemblies 690 provided by the preferred embodiment comprisecode and data elements that are themselves independentlydeliverable. Thus, each component assembly 690 provided by thepreferred embodiment is comprised of independently securelydeliverable elements which may be communicated using VDE-271-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243secure communication techniques. between VDE securesubsystems.These component assemblies 690 are the basic functionalunit provided by ROS 602. The component assemblies 690 areexecuted to perform operating system or application tasks. Thus,some component assemblies 690 may be considered to be part ofthe ROS operating system 602, while other componentassemblies may be considered to be âapplicationsâ that run underthe support of the operating system. As with any systemincorporating "applications" and âoperating systems,â theboundary between these aspects of an overall system can beambiguous. For example. commonly used âapplicationâ functions(such as determining the structure and/or other attributes of acontent container) may be incorporated into an operating system.Furthermore, âoperating systemâ functions (such as taskmanagement, or memory allocation) may be modi?ed and/orreplaced by an application. A common thread in the preferredembodimentâs ROS 602 is that component assemblies 690provide functions needed for a user to ful?ll her intendedactivities, some of which may be âapplication-likeâ and some ofwhich may be âoperating system-like.â-272-?U!101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243Components 690 are preferably designed to be easilyseparable and individually loadable. ROS 602 assembles theseelements together into an executable component assembly 690prior to loading and executing the component assembly (e.g., in asecure operating environment such as SPE 503 and/or HPE 655).ROS 602 provides an element identi?cation and referencingmechanism that includes information necessary to automaticallyassemble elements into a component assembly 690 in a securemanner prior to, and/or during, execution.ROS 602 application structures and control parametersused to form component assemblies 690 can be provided bydifferent parties. Because the components forming componentassemblies 690 are independently securely deliverable. they maybe delivered at different times and/or by different parties(âdelivery'â may take place within a local VDE secure subsystem,that is submission through the use of such a secure subsystem ofcontrol information by a chain of content control informationhandling participant for the preparation of a modi?ed controlinformation set constitutes independent, secure delivery). Forexample, a content creator can produce a ROS 602 applicationthat de?nes the circumstances required for licensing contentcontained within a VDE object 300. This application mayreference structures provided by other parties. Such references-273-?U!1020WO 98/09209CA 02265473 1999-02-25PCT/US97/15243might, for example, take the form of a control path that usescontent creator structures to meter user activities; andstructures created/owned by a ?nancial provider to handle?nancial pans of a content distribution transaction (e.g.,de?ning a credit budget that must be present in a controlstructure to establish creditworthiness, audit processes whichmust be performed by the licensee, etc.). As another example, adistributor may give one user more favorable pricing thananother user by delivering different data elements de?ningpricing to different users. This attribute of supporting multipleparty securely, independently deliverable control information isfundamental to enabling electronic commerce, that is. de?ning ofa content andjor appliance control information set thatrepresents the requirements of a collection of independentparties such as content creators, other content providers,?nancial service providers, and/or users.In the preferred embodiment, R08 602 assembles securelyindependently deliverable elements into a component assembly690 based in part on context parameters (e.g., object, user).Thus, for example, ROS 602 may securely assemble differentelements together to form di?erent component assemblies 690for different users performing the same task on the same VDEobject 300. Similarly, ROS 602 may assemble differing element-274-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243sets which may include, that is reuse, one or more of the samecomponents to form different component assemblies 690 for thesame user performing the same task on di?erent VDE objects300.The component assembly organization provided by ROS602 is ârecursiveâ in that a component assembly 690 maycomprise one or more component âsubassembliesâ that arethemselves independently loadable and executable componentassemblies 690. These component âsubassembliesâ may, in turn,be made of one or more component âsub-sub-assemblies.â In thegeneral case. a component assembly 690 may include N levels ofcomponent subassemblies.Thus, for example. a component assembly 690(k) that mayincludes a component subassembly 690(k + 1). Componentsubassembly 690(k + lâ), in turn, may include a component sub-sub-assembly 690(3), and so on to N-level subassembly 690(k +N). The ability of ROS 602 to build component assemblies 690out of other component assemblies provides great advantages interms of, for example, code/data reusability, and the ability toallow di?erent parties to manage different parts of an overallcomponent.-275-?WO 98/09209U!101520CA 02265473 1999-02-25PCT/US97Il5243Each component assembly 690 in the preferredembodiment is made of distinct components. Figures 11D-11Hare abstract depictions of va.rious distinct components that maybe assembled to form a component assembly 690(k) showingFigure 11I. These same components can be combined indifferent ways (e.g., with more or less components) to formdifferent component assemblies 690 providing completelydifferent ?mctional behavior. Figure 11J is an abstract depictionof the same components being put together in a different way(e.g., with additional components) to form a different componentassembly 690(j). The component assemblies 690(k) and 690(j)each include a common feature 691 that interlocks with aâchannelâ 594 defined by ROS 602. This "channelâ 594assembles component assemblies 690 and interfaces them withthe (rest 00 ROS 602.ROS 602 generates component assemblies 690 in a securemanner. As shown graphically in Figures 111 and 1lJ, thedifferent elements comprising a componentvassembly 690 may beâi.nterlockingâ in the sense that they can only go together in waysthat are intended by the VDE participants who created theelements and/or specified the component assemblies. ROS 602includes security protections that can prevent an unauthorizedperson from modifying elements, and also prevent an-276-?101520WO 98/09209CA 02265473 1999-02-25PCT /U S97/ 15243unauthorized person from substituting elements. One canpicture an unauthorized person making a new element havingthe same âshapeâ as the one of the elements shown in Figures11D-11H, and then attempting to substitute the new element inplace ofâ the original element. Suppose one of the elementsshown in Figure 11H establishes the price for using contentwithin a VDE object 300. Ifan unauthorized person couldsubstitute her own "priceâ element for the price element intendedby the VDE content distributor, then the person could establish aprice of zero instead of the price the content distributor intendedto charge. Similarly, if the element establishes an electroniccredit card, then an ability to substitute a different elementcould have disastrous consequences in terms of allowing a personto charge her usage to someone else's (or a nonâexistent) creditcard. These are merely a few simple examples demonstratingthe importance of ROS 602 ensuring that certain componentassemblies 690 are formed in a secure manner. R08 602provides a wide range of protections against a wide range ofâthreatsâ to the secure handling and execution of componentassemblies 690.In the preferred embodiment, ROS 602 assemblescomponent assemblies 690 based on the following types ofelements:-277-?CA 02265473 1999-02-25WO 98109209 PCTIUS97/15243Permissions Records (âPERCâs) 808;Method âCoresâ 1000;Load Modules 1100;Data Elements (e.g., User Data Elements ("UDEsâ) 12005 and Method Data Elements (âMDEsâ) 1202); and101520Other component assemblies 690.Brie?y, a PERC 808 provided by the preferredembodiment is a record corresponding to a VDE object 300 thatidenti?es to ROS 602. among other things, the elements ROS isto assemble together to form a component assembly 690. Thus 2PERC 808 in effect contains a âlist of assembly instructionsâ or aâplanâ specifying what elements R08 602 is to assemble togetherinto a component assembly and how the elements are to beconnected together. PERC 808 may itself contain data or otherelements that are to become part of the component assembly 690.The PERC 808 may reference one or more method âcoresâ1000â. A method core 1000â may de?ne a basic âmethodâ 1000(e.g., âcontrol,â âbilling,â âmetering,â etc.)In the preferred embodiment, a âmethodâ 1000 is acollection of basic instructions, and information related to basicinstructions, that provides context, data, requirements, and/or-278-?10.1520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243relationships for use in performing, and/or preparing to perform, 9basic instructions in relation to the operation of one or moreelectronic appliances 600. Basic instructions may be comprisedof, forexample:- machine code of the type commonly used in theprogramming of computers; pseudo-code for use byan interpreter or other instruction processingprogram operating on a computer;- a sequence of electronically represented logicaloperations for use with an electronic appliance 600;- or other electronic representations of instructions,source code, object code, and/or pseudo code as thoseterms are commonly understood in the arts.Information relating to said basic instructions maycomprise, for example, data associated intrinsically with basicinstructions such as for example, an identi?er for the combinedbasic instructions and intrinsic data, addresses, constants,and/or the like. The information may also, for example, includeone or more of the following:-279-?1020WO 98/09209CA 02265473 1999-02-25PCT/US97/ 15243information that identi?es associated basicinstructions and said intrinsic data for access,correlation and/or validation purposes;required and/or optional parameters for use withbasic instructions and said intrinsic data;information de?ning relationships to other methods;data elements that may comprise data values, ?eldsof information, and/or the like;information specifying and/or de?ning relationshipsamong data elements, basic instructions and/orintrinsic data;information specifying relationships to external dataelements:information specifying relationships between andamong internal and external data elements,methods, and/or the like, if any exist; andadditional information required in the operation ofbasic instructions and intrinsic data to complete, orattempt to complete, a purpose intended by a user ofa method, where required, including additionalinstructions and/or intrinsic data.-280-?U!101520WO 98/09209CA 02265473 1999-02-25PCT /U S97/ 15243Such information associated with a method may be stored,in part or whole, separately from basic instructions and intrinsicdata. When these components are stored separately, a methodmay nevertheless include and encompass the other informationand one or more sets of basic instructions and intrinsic data (thelatter being included because of said other inforrnationâsreference to one or more sets of basic instructions and intrinsicdata), whether or not said one or more sets of basic instructionsand intrinsic data are accessible at any given point in time.i\/Iethod core 1000â may be parameterized by an âeventcodeâ to permit it to respond to different events in different Ways.For example. a NIETER method may respond to a âuseâ event bystoring usage information in a meter data structure. The sameMETER method may respond to an âadministrativeâ event byreporting the meter data structure to a VDE clearinghouse orother VDE participant.In the preferred embodiment, method core 1000â mayâcontain,â either explicitly or by reference, one or more âloadmodulesâ 1100 and one or more data elements (UDEs 1200,MDEs 1202). In the preferred embodiment, a "load moduleâ 1100is a portion of a method that re?ects basic instructions andintrinsic data. Load modules 1100 in the preferred embodiment-281-?10'1520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243contain executable code, and may also contain data elements(âDTDsâ 1108) associated with the executable code. In thepreferred embodiment, load modules 1100 supply the programinstructions that are actually âexecutedâ by hardware to performthe process de?ned by the method. Load modules 1100 maycontain or reference other load modules.Load modules 1100 in the preferred embodiment aremodular and âcode pureâ so that individual load modules may bereenterable and reusable. In order for components 690 to bedynamically updatable. they may be individually addressableWithin a global public name space. In view of these design goals,load modules 1100 are preferably small, code (and code-like)pure modules that are individually named and addressable. Asingle method may provide different load modules 1100 thatperform the same or similar functions on different platforms,thereby making the method scalable and/or portable across awide range of different electronic appliances.UDEs 1200 and MDES 1202 may store data for input to oroutput from executable component assembly 690 (or datadescribing such inputs and/or outputs). In the preferredembodiment, UDEs 1200 may be user dependent, whereas MDEs1202 may be user independent.-282-?101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243The component assembly example 690( k) shown in Figure11E comprises a method core 1000â, UDEs 1200a & 1200b, anMDE 1202, load modules 1100a-1100d, and a further componentassembly 690(k+1). As mentioned above, a PERC 808(k) de?nes,among other things, the âassembly instructionsâ for componentassembly 690(k), and may contain or reference parts of some orall of the components that are to be assembled to create acomponent assembly.One of the load modules 1100b shown in this example isitself comprised of plural load modules 1100c, 1100d. Some ofthe load modules <e.g., 1100a, 1100d) in this example include oneor more âDTDâ data elements 1108 (e.g., 1108a, 1108b). âDTDâdata elements 1108 may be used, for example, to inform loadmodule 1100a of the data elements included in MDE 1202 and/orUDES 1200a, 1200b. Furthermore, DTDs 1108 may be used asan aspect of forming a portion of an application used to inform auser as to the information required and/or manipulated by one ormore load modules 1100, or other component elements. Such anapplication program may also include functions for creatingand/or manipulating UDE(s) 1200, MDE(s) 1202, or othercomponent elements, subassemblies, etc.-283-?O1101520WO 98/09209CA 02265473 1999-02-25PCT/US97/15243Components Within component assemblies 690 may beâreusedâ to form different component assemblies. As mentionedabove, ?gure HEâ is an abstract depiction of one example of thesame components used for assembling component assembly690(k) to be reused (e. g., with some additional componentsspeci?ed by a different set of âassembly instructionsâ provided ina different PERC 808(1)) to form a di?erent component assembly690(1). Even though component assembly 690(1) is formed fromsome of the same components used to form component assembly690(k), these two component assemblies may perform completelydifferent processes in complete different ways.As mentioned above, ROS 602 provides several layers ofsecurity to ensure the security of component assemblies 690.One important security layer involves ensuring that certaincomponent assemblies 690 are formed, loaded and executed onlyin secure execution space» such as provided Within an SPU 500.Components 690 and/or elements comprising them may be storedon external media encrypted using local SPU 500 generatedand/or distributor provided keys.ROS 602 also provides a tagging and sequencing schemethat may be used Within the loadable component assemblies 690to detect tampering by substitution. Each element comprising a-284-?WO 98/09209101520CA 02265473 1999-02-25PCT/US97/15243component assembly 690 may be loaded into an SPU 500,decrypted using encrypt/decrypt engine 522, and thentested/compared to ensure that the proper element has beenloaded. Several independent comparisons may be used to ensurethere has been no unauthorized substitution. For example, thepublic and private copies of the element ID may be compared toensure that they are the same, thereby preventing grosssubstitution of elements. In addition, a validation/correlationtag stored under the encrypted layer of the loadable element maybe compared to make sure it matches one or more tags providedby a requesting process. This prevents unauthorized use ofinformation. As a third protection, a device assigned tag (e.g., asequence number! stored under an encryption layer of a loadableelement may be checked to make sure it matches a correspondingtag value expected by SPU 500. This prevents substitution ofolder elements. Validation/correlation tags are typically passedonly in secure wrappers to prevent plaintext exposure of thisinformation outside of SPU 500.The secure component based architecture of ROS 602 hasimportant advantages. For example, it accommodates limitedresource execution environments such as provided by a lowercost SPU 500. It also provides an extremely high level ofcon?gurability. In fact, ROS 602 will accommodate an almost-285-?101520CA 02265473 1999-02-25WO 98/09209 PCT/US97/15243unlimited diversity of content types, content provider objectives,transaction types and client requirements. In addition, theability to dynamically assemble independently deliverablecomponents at execution time based on particular objects andusers provides a high degree of flexibility, and facilitates orenables a distributed database, processing, and executionenvironment.One aspect of an advantage of the component-basedarchitecture provided by ROS 602 relates to the ability to âstageâfunctionality and capabilities over time. As designed,implementation of ROS 602 is a ?nite task. Aspects ofits wealthof functionality can remain unexploited until market realitiesdictate the implementation of corresponding VDE applicationfunctionality. As a result, initial product implementationinvestment and complexity may be limited. The process ofâsurfacingâ the full range of capabilities provided by ROS 602 interms of authoring, administrative, and arti?cial intelligenceapplications may take place over time. Moreover, already-designed functionality of ROS 602 may be changed or enhancedat any time to adapt to changing needs or requirements.-286-?10152025WO 98/09209CA 02265473 1999-02-25PCT /U S97l 15243More Detailed Discussion of Rights Operating System 602ArchitectureFigure 12 shows an example of a detailed architecture ofROS 602 shown in Figure 10. ROS 602 may include a ?le system687 that includes a commercial database manager 730 andexternal object repositories 728. Commercial database manager730 may maintain secure database 610. Object repository 728may store, provide access to, and/or maintain VDE objects 300.Figure 12 also shows that ROS 602 may provide one ormore SPES 503 and/or one or more HPES 655. As discussedabove, HPE 655 may "ernulateâ an SPU 500 device, and suchHPES 655 may be integrated in lieu of(or in addition to) physicalSPUS 500 for systems that need higher throughput. Somesecurity may be lost since HPES 655 are typically protected byoperating system security and may not provide truly secureprocessing. Thus, in the preferred embodiment, for high securityapplications at least, all secure processing should take placewithin an SPE 503 having an execution space within a physicalSPU 500 rather than a HPE 655 using software operatingelsewhere in electronic appliance 600.As mentioned above, three basic components of ROS 602are a kernel 680, a Remote Procedure Call (RPC) manager 732-287-?WO 98/09209U!101520CA 02265473 1999-02-25PCT/U S97/ 15243and an object switch 734. These components, and the way theyinteract with other portions of ROS 602, will be discussed below.Kernel 680Kernel 680 manages the basic hardware resources ofelectronic appliance 600, and controls the basic tasking providedby ROS 602. Kernel 680 in the preferred embodiment mayinclude a memory manager 680a, a task manager 680b, and anI/O manager680c. Task manager 680b may initiate and/ormanage initiation of executable tasks and schedule them to beexecuted by a processor on which ROS 602 runs (e.g., CPU 654shown in Figure 8). For example, Task manager 680b mayinclude or be associated with a âbootstrap loaderâ that loadsother parts of ROS 602. Task manager 680b may manage alltasking related to ROS 602, including tasks associated withapplication program(s) 608. Memory manager 680a may manageallocation, deallocation, sharing and/or use of memory (e.g., RAM656 shown in Figure 8) of electronic appliance 600, and may forexample provide virtual memory capabilities as required by anelectronic appliance and/or associated application(s). I/Omanager 680c may manage all input to and output from ROS602, and may interact with drivers and other hardwaremanagers that provide communications and interactivity withphysical devices.-288-?WO 98/09209101520CA 02265473 1999-02-25PCT/US97l15243RPC Manager 732ROS 602 in a preferred embodiment is designed around aâservices basedâ Remote Procedure Call architecture/interface.All functions performed by ROS 602 may use this commoninterface to request services and share information. Forexample, SPE(s) 503 provide processing for one or more RPCbased services. In addition to supporting SPUs 500, the RPCinterface permits the dynamic integration of external servicesand provides an array of con?guration options using existingoperating system components. ROS 602 also communicates withexternal services through the RPC interface to seamlesslyprovide distributed and/or remote processing. In smaller scaleinstances of ROS 602. a simpler message passing IPC protocolmay be used to conserve resources. This may limit thecon?gurability of ROS 602 services, but this possible limitationmay be acceptable in some electronic appliances.The RPC structure allows services to be called/requestedWithout the calling process having to know or specify where theservice is physically provided, what system or device will servicethe request, or how the service request will be ful?lled. Thisfeature supports families of services that may be scaled and/orcustomized for speci?c applications. Service requests can beforwarded and serviced by different processors and/or different-289-?Cl101520WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243sites as easily as they can be forwarded and serviced by a localservice system. Since the same RPC interface is used by ROS602 in the preferred embodiment to request services within andoutside of the operating system, a request for distributed and/orremote processing incurs substantially no additional operatingsystem overhead. Remote processing is easily and simplyintegrated as part of the same service calls used by ROS 602 forrequesting local-based services. In addition, the use of astandard RPC interface <âRSIâ) allows ROS 602 to bemodularized. mth the different modules presenting astandardized interface to the remainder of the operating system.Such modularization and standardized interfacing permitsdifferent vendorsxoperating system programmers to createdifferent portions of the operating system independently, andalso allows the functionality of ROS 602 to be flexibly updatedand/or changed based on different requirements and/orplatforms.RPC manager 732 manages the RPC interface. It receivesservice requests in the form of one or more âRemote ProcedureCallsâ (RPCS) from a service requestor, and routes the servicerequests to a service provider(s) that can service the request. Forexample, when rights operating system 602 receives a requestfrom a user application via user API 682, RPC manager 732 may-290-?101520WO 98/09209CA 02265473 1999-02-25PCTIUS97/15243route the service request to an appropriate service through theâRPC service interfaceâ (âRSIâ). The RSI is an interface betweenRPC manager 732, service requestors, and a resource that willaccept and service requests.The RPC interface (RSI) is used for several major ROS 602subsystems in the preferred embodiment.RPC services provided by ROS 602 in the preferredembodiment are divided into subservices, i.e.. individualinstances of a specific service each of which may be trackedindividually by the RFC manager 732. This mechanism permitsmultiple instances of a specific service on higher throughputsystems while maintaining a common interface across aspectrum of implementations. The subservice concept extends tosupporting multiple processors, multiple SPES 503, multipleHPES 655, and multiple communications services.The preferred embodiment ROS 602 provides the followingRPC based service providers/requestors (each of which have anRPC interface or âRSIâ that communicates with RPC manager732%SPE device driver 736 (this SPE device driver is connectedto an SPE 503 in the preferred embodiment);-291-?WO 98/09209101520CA 02265473 1999-02-25PCT/US97/ 15243HPE Device Driver 738 (this HPE device driver isconnected to an HPE 738 in the preferredembodiment);Noti?cation Service 740 (this noti?cation service isconnected to user noti?cation interface 686 in thepreferred embodiment);API Service 742 (this API service is connected to user API682 in the preferred embodiment;Redirector 684;Secure Database (File) Manager 744 (this secure databaseor ?le manager 744 may connect to and interactwith commercial database manager 730 and secure?les 610 through a cache manager 746, a databaseinterface 748, and a database driver 750);Name Services Manager 752;Outgoing Administrative Objects Manager 754;Incoming Administrative Objects Manager 756;a Gateway 734 to object switch 734 (this is a path used toallow direct communication between RPC manager732 and Object Switch 734); andCommunications Manager 776.The types of services provided by HPE 655, SPE 503, UserNoti?cation 686, API 742 and Redirector 684 have already been-292-?CA 02265473 1999-02-25WO 98/09209 PCTIUS97/15243described above. Here is a brief description of the type( s) ofservices provided by OS resources 74-4, 752, 754, 756 and 776:Secure Database I\/I2_a._r;age;; 734 services requests for accessto secure database 610;5 Name Sggjges Manager 752 services requests relating touser, host, or service identi?cation; servicesrequests relating to outgoing administrative objects;In i Ad ini trativ b' ts M r 7 6 services10 requests relating to incoming administrative objects;andCommunications Manager 776 services requests relatingto communications between electronic appliance 600and the outside world.15Object Switch 734Object switch 734 handles. controls and communicates(both locally and remotely) VDE objects 300. In the preferredembodiment, the object switch may include the following20 elements:a stream router 758;a real time stream interface(s) 760 (which may beconnected to real time data feed(s) 694);a time dependent stream interface(s) 762;-293-?CA 02265473 1999-02-25wo 98,092â PCT/US97/15243a intercept 692;a container manager 764;one or more routing tables 766; andbu?ering/storage 768.5 Stream router 758 routes to/from "real timeâ and âtime101520independentâ data streams handled respectively by real timestream interfacets) 760 and time dependent stream interface(s)762. Intercept 692 intercepts I/O requests that involve real-timeinformation streams such as. for example, real time feed 694.The routing performed by stream router 758 may be determinedby routing tables 766. Buffering/storage 768 provides temporarystore-and-forward, buffering and related services. Containermanager 764 may (typically in conjunction with SPE 503)perform processes on VDE objects 300 such as constructing,deconstructing, and locating portions of objects.Object switch 734 communicates through an Object SwitchInterface (âOSIâ) with other parts of ROS 602. The ObjectSwitch Interface may resemble, for example, the interface for aUnix socket in the preferred embodiment. Each of the âOSIâinterfaces shown in Figure 12 have the ability to communicatewith object switch 734.-294-?CA 02265473 1999-02-25Wo 98/09209 PCT/US97/15243ROS 602 includes the following object switch serviceproviders/resources (each of which can communicate with theobject switch 734 through an âOSIâ):Outgoing Administrative Objects Manager 754;Incoming Administrative Objects Manager 756;01Gateway 734 (which may translate RPC calls into objectswitch calls and vice versa so RPC manager 732 maycommunicate with object switch 734 or any otherelement having an OSI to, for example, provide10 and/or request services);External Services Manager 772;Object Submittal Manager 774; andCommunications Manager 776.15 Brie?y,Qbjegt Repository Manager 770 provides services relatingto access to object repository 728;Eztemal Services Manager 772 provides services relatingto requesting and receiving services externally, such20 as from a network resource or another site;u i al 774 provides services relatingto how a user application may interact with objectswitch 734 (since the object submittal manager-295-?101520WO 98/09209CA 02265473 1999-02-25PCT/US97l15243provides an interface to an application program 608,it could be considered part of user API 682); andQgmmunicatigns Mgager 776 provides services relatingto communicating with the outside world.In the preferred embodiment, communications manager776 may include a network manager 780 and a mail gateway(manager) 782. Mail gateway 782 may include one or more mail?lters 784 to, for example, automatically route VDE relatedelectronic mail between object switch 734 and the outside worldelectronic mail services. External Services Manager 772 mayinterface to communications manager 77 6 through a ServiceTransport Layer 786. Service Transport Layer 786a may enable IExternal Services Manager 772 to communicate with externalcomputers and systems using various protocols managed usingthe service transport layer 786.The characteristics of and interfaces to the varioussubsystems of ROS 680 shown in Figure 12 are described in moredetail below.RPC Manager 732 and Its RPC Services InterfaceAs discussed above, the basic system services provided byROS 602 are invoked by using an RPC service interface (RSI).-296-?W0 98I09209101520CA 02265473 1999-02-25PCT/U S97/ 15243This RPC service interface provides a generic, standardizedinterface for different services systems and subsystems providedby ROS 502.RPC Manager 732 routes RPCs requesting services to anappropriate RPC service interface. In the preferred embodiment,upon receiving an RPC call, RPC manager 732 determines oneor more service managers that are to service the request. RPCmanager 732 then routes a service request to the appropriateservice(s) (via a RSI associated with a service) for action by theappropriate service manager(s).For example, if a SPE 503 is to service a request, the RPCManager 732 routes the request to RSI 736a, which passes therequest on to SPE device driver 736 for forwarding to the SPE.Similarly, if HPE 655 is to service the request, RPC Manager 732routes the request to RSI 738a for forwarding to a HPE. In onepreferred embodiment, SPE 503 and HPE 655 may performessentially the same services so that RSIs 736a, 738a aredifferent instances of the same RSI. Once a service request hasbeen received by SPE 503 (or HPE 655), the SPE (or HPE)typically dispatches the request internally using its own internalRPC manager (as will be discussed shortly). Processes withinSPEs 503 and HPES 655 can also generate RPC requests. These-297-?1020WO 98/09209CA 02265473 1999-02-25PCT/U S97/ 15243requests may be processed internally by a SPE/HPE. or if notinternally serviceable, passed out of the SPE/HPE for dispatchby RPC Manager 732.Remote (âand local) procedure calls may be dispatched by aRPC Manager 732 using an âRPC Services Table.â An RPCServices Table describes where requests for speci?c services areto be routed for processing. Each row of an RPC Services Tablein the preferred embodiment contains a services ID, the locationof the service. and an address to which control will be passed toservice a request. .~\_n RPC Services Table may also includecontrol information that indicates which instance of the RPCdispatcher controls the service. Both RPC Manager 732 and anyattached SPEs 503 and HPES 655 may have symmetric copies ofthe RPC Services Table. lfan RPC service is not found in theRPC services tables, it is either rejected or passed to externalservices manager 772 for remote servicing.Assuming RPC manager 732 finds a row corresponding tothe request in an RPC Services Table, it may dispatch therequest to an appropriate RSI. The receiving RSI accepts arequest from the RPC manager 732 (which may have looked upthe request in an RPC service table), and processes that request-298-?CA 02265473 1999902-25âDEMANDES OU BREVETS VOLUMINEUXLAâ PRESENTE PARTIE DE CETTE DEMANDE OU CE BREVETCOMPREND PLUS DâUN TOME. ' .cecu EST LE TOME A DE-33-3.-NOTE: Pour les tomes additionels, veuillez contacter le Bureau canadien desbrevetsâJUMBO APPLlCATlONS/PEATENTS:THIS SECTION OF THE APPLICATIONIPATENT CONTAINS MORETHAN ONE VOLUME ',-THlS IS VOLUME __,I__ OF 5/' NOTE: For additional volumes-pleaseâcontactlthe Canadian Patent Officeâ .
Claims (12)
1. A method of protecting tamper resistant software consisting of the following steps:
delivering a first instance of the tamper resistant software to a first computing device at a first site;
using a confounding algorithm to customize at least one aspect of the first instance of the tamper-resistant software, the customization being based at least in part on using information relating to an aspect of the first computing device and/or information delivered to the first computing device as a value used by the confounding algorithm;
delivering a second instance of the tamper resistant software to a second computing device at a second site, the second instance being designed to function in a manner which is similar to or indistinguishable from the first instance;
using a confounding algorithm to customize at least one aspect of the second instance of the tamper-resistant software;
the customization being based at least in part on using information relating to an aspect of the second computing device and/or information delivered to the second computing device as a value used by the confounding algorithm;
whereby the first instance and the second instance of the tamper resistant software are each customized in a different manner, and each customization depends at least in part or an aspect of the computing device on which each instance is to run.
delivering a first instance of the tamper resistant software to a first computing device at a first site;
using a confounding algorithm to customize at least one aspect of the first instance of the tamper-resistant software, the customization being based at least in part on using information relating to an aspect of the first computing device and/or information delivered to the first computing device as a value used by the confounding algorithm;
delivering a second instance of the tamper resistant software to a second computing device at a second site, the second instance being designed to function in a manner which is similar to or indistinguishable from the first instance;
using a confounding algorithm to customize at least one aspect of the second instance of the tamper-resistant software;
the customization being based at least in part on using information relating to an aspect of the second computing device and/or information delivered to the second computing device as a value used by the confounding algorithm;
whereby the first instance and the second instance of the tamper resistant software are each customized in a different manner, and each customization depends at least in part or an aspect of the computing device on which each instance is to run.
2. A method as in Claim 1, said steps of using a confounding algorithm including:
using a multiplicity of confounding algorithms to create critical values required for correct operation of at least certain functions of said host processing environment
using a multiplicity of confounding algorithms to create critical values required for correct operation of at least certain functions of said host processing environment
3. A method as in Claim 2, each of said multiplicity of differing algorithms using at least one different variable, but said differing algorithms being otherwise identical.
4. A method as in Claim 1, further including:
timing the duration of said confounding algorithm at said first computing device, comparing said duration to an expected value or range of values, and taking one or more actions if said duration falls outside said expected value or range of values.
timing the duration of said confounding algorithm at said first computing device, comparing said duration to an expected value or range of values, and taking one or more actions if said duration falls outside said expected value or range of values.
5. A method as in claim 4 in which said one or more actions include at least temporarily halting further processing.
6. A method as in claim 4 in which said one or more actions include at least temporarily disabling certain functions.
7. A method as in claim 4 in which said one or more actions include displaying a message to the user.
8. A method as in claim 4 in which said one or more actions include initiating communications with a trusted server.
9. A method as in claim 4 in which said one or more actions includes encrypting at least some information.
10. A method as in claim 4 in which said one or more actions includes deleting at least some information.
11. A method as in claim 10 in which said step of deleting information includes deleting one or more cryptographic keys.
12. A method as in Claim 1, further including the step of executing secure software at said first processing site, including executing installation programming, said installation programming causing the installation of operational programming at said first programming site, said operational programming installation including the step of decrypting said operational programming, said decryption occurring at least in part under the control of said installation programming.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/706,206 | 1996-08-30 | ||
US08/706,206 US5892900A (en) | 1996-08-30 | 1996-08-30 | Systems and methods for secure transaction management and electronic rights protection |
PCT/US1997/015243 WO1998009209A1 (en) | 1996-08-30 | 1997-08-29 | Systems and methods for secure transaction management and electronic rights protection |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002373542A Division CA2373542C (en) | 1996-08-30 | 1997-08-29 | Systems and methods for secure transaction management and electronic rights protection |
CA002373508A Division CA2373508C (en) | 1996-08-30 | 1997-08-29 | Systems and methods for secure transaction management and electronic rights protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2265473A1 CA2265473A1 (en) | 1998-03-05 |
CA2265473C true CA2265473C (en) | 2002-10-22 |
Family
ID=24836636
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002265473A Expired - Lifetime CA2265473C (en) | 1996-08-30 | 1997-08-29 | Systems and methods for secure transaction management and electronic rights protection |
CA002373542A Expired - Lifetime CA2373542C (en) | 1996-08-30 | 1997-08-29 | Systems and methods for secure transaction management and electronic rights protection |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002373542A Expired - Lifetime CA2373542C (en) | 1996-08-30 | 1997-08-29 | Systems and methods for secure transaction management and electronic rights protection |
Country Status (5)
Country | Link |
---|---|
US (7) | US5892900A (en) |
EP (3) | EP1621960A3 (en) |
AU (1) | AU4170397A (en) |
CA (2) | CA2265473C (en) |
WO (1) | WO1998009209A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104714829A (en) * | 2013-12-15 | 2015-06-17 | 中国航空工业集团公司第六三一研究所 | Compiling linkage method for ensuring consistency of object code and source code |
Families Citing this family (3105)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6289322B1 (en) * | 1998-03-03 | 2001-09-11 | Checkfree Corporation | Electronic bill processing |
US5453601A (en) | 1991-11-15 | 1995-09-26 | Citibank, N.A. | Electronic-monetary system |
US10361802B1 (en) | 1999-02-01 | 2019-07-23 | Blanding Hovenweep, Llc | Adaptive pattern recognition based control system and method |
US7509270B1 (en) | 1992-12-09 | 2009-03-24 | Discovery Communications, Inc. | Electronic Book having electronic commerce features |
US8073695B1 (en) | 1992-12-09 | 2011-12-06 | Adrea, LLC | Electronic book with voice emulation features |
US7298851B1 (en) | 1992-12-09 | 2007-11-20 | Discovery Communications, Inc. | Electronic book security and copyright protection system |
US7835989B1 (en) | 1992-12-09 | 2010-11-16 | Discovery Communications, Inc. | Electronic book alternative delivery systems |
ATE183352T1 (en) | 1992-12-09 | 1999-08-15 | Discovery Communicat Inc | IMPROVED TOP-UP TERMINAL FOR CABLE TELEVISION DISTRIBUTION SYSTEMS |
US7849393B1 (en) | 1992-12-09 | 2010-12-07 | Discovery Communications, Inc. | Electronic book connection to world watch live |
US6523079B2 (en) * | 1993-02-19 | 2003-02-18 | Elonex Ip Holdings Ltd | Micropersonal digital assistant |
US6633861B2 (en) * | 1993-03-19 | 2003-10-14 | Ricoh Company Limited | Automatic invocation of computational resources without user intervention across a network |
US6193520B1 (en) * | 1993-05-10 | 2001-02-27 | Yugengaisha Adachi International | Interactive communication system for communicating video game and karaoke software |
US6681028B2 (en) | 1995-07-27 | 2004-01-20 | Digimarc Corporation | Paper-based control of computer systems |
US6424725B1 (en) | 1996-05-16 | 2002-07-23 | Digimarc Corporation | Determining transformations of media signals with embedded code signals |
US6408082B1 (en) | 1996-04-25 | 2002-06-18 | Digimarc Corporation | Watermark detection using a fourier mellin transform |
US7313251B2 (en) * | 1993-11-18 | 2007-12-25 | Digimarc Corporation | Method and system for managing and controlling electronic media |
US5768426A (en) * | 1993-11-18 | 1998-06-16 | Digimarc Corporation | Graphics processing system employing embedded code signals |
US6122403A (en) | 1995-07-27 | 2000-09-19 | Digimarc Corporation | Computer system linked by using information in data objects |
US5841978A (en) | 1993-11-18 | 1998-11-24 | Digimarc Corporation | Network linking method using steganographically embedded data objects |
US6339767B1 (en) | 1997-06-02 | 2002-01-15 | Aurigin Systems, Inc. | Using hyperbolic trees to visualize data generated by patent-centric and group-oriented data processing |
US7861166B1 (en) | 1993-12-02 | 2010-12-28 | Discovery Patent Holding, Llc | Resizing document pages to fit available hardware screens |
US8095949B1 (en) * | 1993-12-02 | 2012-01-10 | Adrea, LLC | Electronic book with restricted access features |
US9053640B1 (en) | 1993-12-02 | 2015-06-09 | Adrea, LLC | Interactive electronic book |
US7865567B1 (en) | 1993-12-02 | 2011-01-04 | Discovery Patent Holdings, Llc | Virtual on-demand electronic book |
US6947571B1 (en) | 1999-05-19 | 2005-09-20 | Digimarc Corporation | Cell phones with optical capabilities, and related applications |
US6522770B1 (en) | 1999-05-19 | 2003-02-18 | Digimarc Corporation | Management of documents and other objects using optical devices |
US7039214B2 (en) * | 1999-11-05 | 2006-05-02 | Digimarc Corporation | Embedding watermark components during separate printing stages |
US6869023B2 (en) * | 2002-02-12 | 2005-03-22 | Digimarc Corporation | Linking documents through digital watermarking |
US7724919B2 (en) * | 1994-10-21 | 2010-05-25 | Digimarc Corporation | Methods and systems for steganographic processing |
US8094949B1 (en) | 1994-10-21 | 2012-01-10 | Digimarc Corporation | Music methods and systems |
US6560349B1 (en) | 1994-10-21 | 2003-05-06 | Digimarc Corporation | Audio monitoring using steganographic information |
TW250616B (en) * | 1994-11-07 | 1995-07-01 | Discovery Communicat Inc | Electronic book selection and delivery system |
JPH08263438A (en) * | 1994-11-23 | 1996-10-11 | Xerox Corp | Distribution and use control system of digital work and access control method to digital work |
US6963859B2 (en) * | 1994-11-23 | 2005-11-08 | Contentguard Holdings, Inc. | Content rendering repository |
US20050149450A1 (en) * | 1994-11-23 | 2005-07-07 | Contentguard Holdings, Inc. | System, method, and device for controlling distribution and use of digital works based on a usage rights grammar |
US7743248B2 (en) * | 1995-01-17 | 2010-06-22 | Eoriginal, Inc. | System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components |
US7162635B2 (en) * | 1995-01-17 | 2007-01-09 | Eoriginal, Inc. | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents |
SE504085C2 (en) | 1995-02-01 | 1996-11-04 | Greg Benson | Methods and systems for managing data objects in accordance with predetermined conditions for users |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6948070B1 (en) * | 1995-02-13 | 2005-09-20 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
WO1996027155A2 (en) | 1995-02-13 | 1996-09-06 | Electronic Publishing Resources, Inc. | Systems and methods for secure transaction management and electronic rights protection |
US6658568B1 (en) * | 1995-02-13 | 2003-12-02 | Intertrust Technologies Corporation | Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management |
US7165174B1 (en) * | 1995-02-13 | 2007-01-16 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management |
US5943422A (en) | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US6157721A (en) * | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US7133846B1 (en) * | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management |
US6515968B1 (en) | 1995-03-17 | 2003-02-04 | Worldcom, Inc. | Integrated interface for real time web based viewing of telecommunications network call traffic |
US7805500B2 (en) * | 1995-05-08 | 2010-09-28 | Digimarc Corporation | Network linking methods and apparatus |
US6728390B2 (en) * | 1995-05-08 | 2004-04-27 | Digimarc Corporation | Methods and systems using multiple watermarks |
US6760463B2 (en) * | 1995-05-08 | 2004-07-06 | Digimarc Corporation | Watermarking methods and media |
US7054462B2 (en) | 1995-05-08 | 2006-05-30 | Digimarc Corporation | Inferring object status based on detected watermark data |
US6549942B1 (en) * | 1995-05-25 | 2003-04-15 | Audiohighway.Com | Enhanced delivery of audio data for portable playback |
JPH09115241A (en) * | 1995-06-30 | 1997-05-02 | Sony Corp | Device and method for recording data, device and method for reproducing data, and recording medium |
JP2002083219A (en) * | 2000-07-04 | 2002-03-22 | Sony Computer Entertainment Inc | In-content advertisement method, server for in-content advertisement, and transfer medium of program for realizing in-content advertisement |
US6829368B2 (en) * | 2000-01-26 | 2004-12-07 | Digimarc Corporation | Establishing and interacting with on-line media collections using identifiers in media signals |
US7003731B1 (en) | 1995-07-27 | 2006-02-21 | Digimare Corporation | User control and activation of watermark enabled objects |
US6965682B1 (en) * | 1999-05-19 | 2005-11-15 | Digimarc Corp | Data transmission by watermark proxy |
US6408331B1 (en) * | 1995-07-27 | 2002-06-18 | Digimarc Corporation | Computer linking methods using encoded graphics |
US6788800B1 (en) * | 2000-07-25 | 2004-09-07 | Digimarc Corporation | Authenticating objects using embedded data |
US6577746B1 (en) | 1999-12-28 | 2003-06-10 | Digimarc Corporation | Watermark-based object linking and embedding |
US6505160B1 (en) * | 1995-07-27 | 2003-01-07 | Digimarc Corporation | Connected audio and other media objects |
US6311214B1 (en) | 1995-07-27 | 2001-10-30 | Digimarc Corporation | Linking of computers based on optical sensing of digital data |
US7562392B1 (en) * | 1999-05-19 | 2009-07-14 | Digimarc Corporation | Methods of interacting with audio and ambient music |
US6411725B1 (en) | 1995-07-27 | 2002-06-25 | Digimarc Corporation | Watermark enabled video objects |
US9630443B2 (en) * | 1995-07-27 | 2017-04-25 | Digimarc Corporation | Printer driver separately applying watermark and information |
US7006661B2 (en) * | 1995-07-27 | 2006-02-28 | Digimarc Corp | Digital watermarking systems and methods |
US6650761B1 (en) | 1999-05-19 | 2003-11-18 | Digimarc Corporation | Watermarked business cards and methods |
US7051086B2 (en) * | 1995-07-27 | 2006-05-23 | Digimarc Corporation | Method of linking on-line data to printed documents |
US7095871B2 (en) * | 1995-07-27 | 2006-08-22 | Digimarc Corporation | Digital asset management and linking media signals with related data using watermarks |
US6345145B1 (en) * | 1995-08-25 | 2002-02-05 | Sony Corporation | Signal recording/reproducing method and apparatus, signal record medium and signal transmission/reception method and apparatus |
US5706442A (en) * | 1995-12-20 | 1998-01-06 | Block Financial Corporation | System for on-line financial services using distributed objects |
EP0880840A4 (en) | 1996-01-11 | 2002-10-23 | Mrj Inc | System for controlling access and distribution of digital property |
US7664263B2 (en) | 1998-03-24 | 2010-02-16 | Moskowitz Scott A | Method for combining transfer functions with predetermined key creation |
US6205249B1 (en) | 1998-04-02 | 2001-03-20 | Scott A. Moskowitz | Multiple transform utilization and applications for secure digital watermarking |
US5898830A (en) * | 1996-10-17 | 1999-04-27 | Network Engineering Software | Firewall providing enhanced network security and user transparency |
US5870550A (en) * | 1996-02-26 | 1999-02-09 | Network Engineering Software | Web server employing multi-homed, moldular framework |
US5826014A (en) * | 1996-02-06 | 1998-10-20 | Network Engineering Software | Firewall system for protecting network elements connected to a public network |
US20060265337A1 (en) * | 1996-02-26 | 2006-11-23 | Graphon Corporation | Automated system for management of licensed digital assets |
US8117298B1 (en) | 1996-02-26 | 2012-02-14 | Graphon Corporation | Multi-homed web server |
US20010011253A1 (en) * | 1998-08-04 | 2001-08-02 | Christopher D. Coley | Automated system for management of licensed software |
US6688888B1 (en) * | 1996-03-19 | 2004-02-10 | Chi Fai Ho | Computer-aided learning system and method |
US20030056103A1 (en) * | 2000-12-18 | 2003-03-20 | Levy Kenneth L. | Audio/video commerce application architectural framework |
US8180844B1 (en) | 2000-03-18 | 2012-05-15 | Digimarc Corporation | System for linking from objects to remote resources |
US7770230B2 (en) * | 2002-04-22 | 2010-08-03 | Arvato Digital Services Canada, Inc. | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US7010697B2 (en) * | 1996-06-28 | 2006-03-07 | Protexis, Inc. | System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software |
US7146327B1 (en) * | 1996-07-01 | 2006-12-05 | Electronic Data Systems Corporation | Electronic publication distribution method and system |
US7159116B2 (en) | 1999-12-07 | 2007-01-02 | Blue Spike, Inc. | Systems, methods and devices for trusted transactions |
US7177429B2 (en) | 2000-12-07 | 2007-02-13 | Blue Spike, Inc. | System and methods for permitting open access to data objects and for securing data within the data objects |
US7096003B2 (en) | 1996-08-08 | 2006-08-22 | Raymond Anthony Joao | Transaction security apparatus |
US7366908B2 (en) | 1996-08-30 | 2008-04-29 | Digimarc Corporation | Digital watermarking with content dependent keys and autocorrelation properties for synchronization |
US7917643B2 (en) * | 1996-09-12 | 2011-03-29 | Audible, Inc. | Digital information library and delivery system |
US5926624A (en) * | 1996-09-12 | 1999-07-20 | Audible, Inc. | Digital information library and delivery system with logic for generating files targeted to the playback device |
US6052717A (en) * | 1996-10-23 | 2000-04-18 | Family Systems, Ltd. | Interactive web book system |
US7058822B2 (en) | 2000-03-30 | 2006-06-06 | Finjan Software, Ltd. | Malicious mobile code runtime monitoring system and methods |
US20080172314A1 (en) | 1996-11-12 | 2008-07-17 | Hahn-Carlson Dean W | Financial institution-based transaction processing system and approach |
US8392285B2 (en) | 1996-11-12 | 2013-03-05 | Syncada Llc | Multi-supplier transaction and payment programmed processing approach with at least one supplier |
US20030009670A1 (en) * | 2001-04-02 | 2003-01-09 | Digimarc Corporation | Background watermark processing |
US8396811B1 (en) | 1999-02-26 | 2013-03-12 | Syncada Llc | Validation approach for auditing a vendor-based transaction |
US20070055582A1 (en) * | 1996-11-12 | 2007-03-08 | Hahn-Carlson Dean W | Transaction processing with core and distributor processor implementations |
US7751596B2 (en) * | 1996-11-12 | 2010-07-06 | Digimarc Corporation | Methods and arrangements employing digital content items |
US6578146B2 (en) * | 1996-11-19 | 2003-06-10 | R. Brent Johnson | System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocol |
US6199073B1 (en) * | 1997-04-21 | 2001-03-06 | Ricoh Company, Ltd. | Automatic archiving of documents during their transfer between a peripheral device and a processing device |
US8225089B2 (en) * | 1996-12-04 | 2012-07-17 | Otomaku Properties Ltd., L.L.C. | Electronic transaction systems utilizing a PEAD and a private key |
US6047296A (en) * | 1996-12-09 | 2000-04-04 | Omnimark Technologies Corporation | Comprehensive method of resolving nested forward references in electronic data streams within defined resolution scopes |
EP0848337A1 (en) * | 1996-12-12 | 1998-06-17 | SONY DEUTSCHLAND GmbH | Server with automatic document assembly |
US6460020B1 (en) | 1996-12-30 | 2002-10-01 | De Technologies, Inc. | Universal shopping center for international operation |
US6141698A (en) * | 1997-01-29 | 2000-10-31 | Network Commerce Inc. | Method and system for injecting new code into existing application code |
US7062500B1 (en) * | 1997-02-25 | 2006-06-13 | Intertrust Technologies Corp. | Techniques for defining, using and manipulating rights management data structures |
US7003480B2 (en) * | 1997-02-27 | 2006-02-21 | Microsoft Corporation | GUMP: grand unified meta-protocol for simple standards-based electronic commerce transactions |
US6233684B1 (en) * | 1997-02-28 | 2001-05-15 | Contenaguard Holdings, Inc. | System for controlling the distribution and use of rendered digital works through watermaking |
WO1998040982A1 (en) * | 1997-03-12 | 1998-09-17 | Visa International | Secure electronic commerce employing integrated circuit cards |
JP3994466B2 (en) * | 1997-03-26 | 2007-10-17 | ソニー株式会社 | User terminal and portable playback device |
JP4637974B2 (en) * | 1997-03-27 | 2011-02-23 | ブリティッシュ・テレコミュニケーションズ・パブリック・リミテッド・カンパニー | Data copy protection |
CA2293650C (en) | 1997-06-09 | 2012-09-25 | Christian Sven Collberg | Obfuscation techniques for enhancing software security |
US7290288B2 (en) | 1997-06-11 | 2007-10-30 | Prism Technologies, L.L.C. | Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network |
US6353929B1 (en) * | 1997-06-23 | 2002-03-05 | One River Worldtrek, Inc. | Cooperative system for measuring electronic media |
IL121178A (en) * | 1997-06-27 | 2003-11-23 | Nds Ltd | Interactive game system |
US6119234A (en) * | 1997-06-27 | 2000-09-12 | Sun Microsystems, Inc. | Method and apparatus for client-host communication over a computer network |
US6718534B1 (en) * | 1997-07-14 | 2004-04-06 | Microsoft Corporation | System for application independent programming of controls |
US5978836A (en) | 1997-07-28 | 1999-11-02 | Solectron Corporation | Workflow systems and methods |
US7546346B2 (en) | 1997-07-28 | 2009-06-09 | Juniper Networks, Inc. | Workflow systems and methods for project management and information management |
US6188995B1 (en) | 1997-07-28 | 2001-02-13 | Apple Computer, Inc. | Method and apparatus for enforcing software licenses |
US6016476A (en) * | 1997-08-11 | 2000-01-18 | International Business Machines Corporation | Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security |
US6684198B1 (en) * | 1997-09-03 | 2004-01-27 | Sega Enterprises, Ltd. | Program data distribution via open network |
US6473407B1 (en) | 1997-09-05 | 2002-10-29 | Worldcom, Inc. | Integrated proxy interface for web based alarm management tools |
US6321337B1 (en) | 1997-09-09 | 2001-11-20 | Sanctum Ltd. | Method and system for protecting operations of trusted internal networks |
JP3623347B2 (en) * | 1997-09-11 | 2005-02-23 | 三菱電機株式会社 | Digital content distribution system device |
US6381644B2 (en) * | 1997-09-26 | 2002-04-30 | Mci Worldcom, Inc. | Integrated proxy interface for web based telecommunications network management |
US6763376B1 (en) | 1997-09-26 | 2004-07-13 | Mci Communications Corporation | Integrated customer interface system for communications network management |
US6631402B1 (en) * | 1997-09-26 | 2003-10-07 | Worldcom, Inc. | Integrated proxy interface for web based report requester tool set |
US6714979B1 (en) | 1997-09-26 | 2004-03-30 | Worldcom, Inc. | Data warehousing infrastructure for web based reporting tool |
US6745229B1 (en) | 1997-09-26 | 2004-06-01 | Worldcom, Inc. | Web based integrated customer interface for invoice reporting |
US7225249B1 (en) * | 1997-09-26 | 2007-05-29 | Mci, Llc | Integrated systems for providing communications network management services and interactive generating invoice documents |
US7058600B1 (en) * | 1997-09-26 | 2006-06-06 | Mci, Inc. | Integrated proxy interface for web based data management reports |
US6182120B1 (en) * | 1997-09-30 | 2001-01-30 | International Business Machines Corporation | Method and system for scheduling queued messages based on queue delay and queue priority |
US7225155B1 (en) | 1997-09-30 | 2007-05-29 | Acs State & Local Solutions, Inc. | Method and apparatus for payment processing using debit-based electronic funds transfer and disbursement processing using addendum-based electronic data interchange |
US6226744B1 (en) * | 1997-10-09 | 2001-05-01 | At&T Corp | Method and apparatus for authenticating users on a network using a smart card |
US6038563A (en) | 1997-10-31 | 2000-03-14 | Sun Microsystems, Inc. | System and method for restricting database access to managed object information using a permissions table that specifies access rights corresponding to user access rights to the managed objects |
US7092914B1 (en) * | 1997-11-06 | 2006-08-15 | Intertrust Technologies Corporation | Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
JPH11149511A (en) * | 1997-11-14 | 1999-06-02 | Hitachi Ltd | Electronic slip processing method, its execution system and medium for recording its processing program |
US6092195A (en) * | 1997-11-14 | 2000-07-18 | Castlewood Systems, Inc. | Encryption of defects map |
US6098056A (en) * | 1997-11-24 | 2000-08-01 | International Business Machines Corporation | System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet |
US6189139B1 (en) * | 1997-12-10 | 2001-02-13 | Ncr Corporation | INF development environment |
US6247127B1 (en) * | 1997-12-19 | 2001-06-12 | Entrust Technologies Ltd. | Method and apparatus for providing off-line secure communications |
US6418400B1 (en) * | 1997-12-31 | 2002-07-09 | Xml-Global Technologies, Inc. | Representation and processing of EDI mapping templates |
US7587044B2 (en) * | 1998-01-02 | 2009-09-08 | Cryptography Research, Inc. | Differential power analysis method and apparatus |
US6804376B2 (en) | 1998-01-20 | 2004-10-12 | Digimarc Corporation | Equipment employing watermark-based authentication function |
US20040157200A1 (en) * | 1998-01-21 | 2004-08-12 | Jesper Lohse | Method for developing a flexible and efficient distributed educational system, in a computer environment, with the opportunity to protect instructions and data |
US7268700B1 (en) | 1998-01-27 | 2007-09-11 | Hoffberg Steven M | Mobile communication device |
US6385596B1 (en) | 1998-02-06 | 2002-05-07 | Liquid Audio, Inc. | Secure online music distribution system |
US6134661A (en) * | 1998-02-11 | 2000-10-17 | Topp; William C. | Computer network security device and method |
US6240400B1 (en) * | 1998-02-17 | 2001-05-29 | International Business Machines Corporation | Method and system for accommodating electronic commerce in the semiconductor manufacturing industry |
US6108644A (en) * | 1998-02-19 | 2000-08-22 | At&T Corp. | System and method for electronic transactions |
US6038595A (en) * | 1998-03-02 | 2000-03-14 | Emc Corporation | Information/communication device for network based services and a system for use of information/communication based services |
US6513117B2 (en) | 1998-03-04 | 2003-01-28 | Gemstar Development Corporation | Certificate handling for digital rights management system |
US20010011238A1 (en) * | 1998-03-04 | 2001-08-02 | Martin Forest Eberhard | Digital rights management system |
JP4176181B2 (en) * | 1998-03-13 | 2008-11-05 | 富士通株式会社 | Electronic wallet management system, terminal device and computer-readable recording medium recording electronic wallet management program |
US7809138B2 (en) * | 1999-03-16 | 2010-10-05 | Intertrust Technologies Corporation | Methods and apparatus for persistent control and protection of content |
US6170014B1 (en) * | 1998-03-25 | 2001-01-02 | Community Learning And Information Network | Computer architecture for managing courseware in a shared use operating environment |
US20040098584A1 (en) * | 1998-03-25 | 2004-05-20 | Sherman Edward G. | Method and system for embedded, automated, component-level control of computer systems and other complex systems |
US7185332B1 (en) | 1998-03-25 | 2007-02-27 | Symantec Corporation | Multi-tiered incremental software updating |
KR20010034683A (en) * | 1998-03-26 | 2001-04-25 | 마찌다 가쯔히꼬 | Data distributing system and data selling apparatus therefor, data retrieving apparatus, duplicated data detecting system, and data reproducing apparatus |
JPH11282684A (en) * | 1998-03-27 | 1999-10-15 | Canon Inc | Image processor, method for controlling image processor and storage medium |
US7051004B2 (en) * | 1998-04-03 | 2006-05-23 | Macrovision Corporation | System and methods providing secure delivery of licenses and content |
US6202056B1 (en) | 1998-04-03 | 2001-03-13 | Audiosoft, Inc. | Method for computer network operation providing basis for usage fees |
US7602940B2 (en) * | 1998-04-16 | 2009-10-13 | Digimarc Corporation | Steganographic data hiding using a device clock |
US6118873A (en) * | 1998-04-24 | 2000-09-12 | International Business Machines Corporation | System for encrypting broadcast programs in the presence of compromised receiver devices |
US6058400A (en) * | 1998-04-28 | 2000-05-02 | Sun Microsystems, Inc. | Highly available cluster coherent filesystem |
US7503072B2 (en) * | 1998-04-29 | 2009-03-10 | Microsoft Corporation | Hardware ID to prevent software piracy |
US6327657B1 (en) * | 1998-05-07 | 2001-12-04 | At&T Corp. | Method and apparatus for creating electronic water marks in digital data |
US6189035B1 (en) * | 1998-05-08 | 2001-02-13 | Motorola | Method for protecting a network from data packet overload |
US6941463B1 (en) | 1998-05-14 | 2005-09-06 | Purdue Research Foundation | Secure computational outsourcing techniques |
US6957341B2 (en) * | 1998-05-14 | 2005-10-18 | Purdue Research Foundation | Method and system for secure computational outsourcing and disguise |
US6567821B1 (en) * | 1998-05-15 | 2003-05-20 | Acs State & Local Solutions, Inc. | Method and apparatus for electronic collection, translation, grouping and delivery of wage assignment information |
US6253237B1 (en) * | 1998-05-20 | 2001-06-26 | Audible, Inc. | Personalized time-shifted programming |
US6275942B1 (en) * | 1998-05-20 | 2001-08-14 | Network Associates, Inc. | System, method and computer program product for automatic response to computer system misuse using active response modules |
IL124571A0 (en) * | 1998-05-21 | 1998-12-06 | Miki Mullor | Method of restricting software operation within a licensed limitation |
US7644282B2 (en) | 1998-05-28 | 2010-01-05 | Verance Corporation | Pre-processed information embedding system |
DE69942712D1 (en) * | 1998-05-29 | 2010-10-14 | Texas Instruments Inc | Secure computing device |
US6219652B1 (en) * | 1998-06-01 | 2001-04-17 | Novell, Inc. | Network license authentication |
US20040117664A1 (en) * | 1998-06-04 | 2004-06-17 | Z4 Technologies, Inc. | Apparatus for establishing a connectivity platform for digital rights management |
US6892300B2 (en) * | 1998-06-04 | 2005-05-10 | International Business Machines Corporation | Secure communication system and method of operation for conducting electronic commerce using remote vault agents interacting with a vault controller |
US20040117628A1 (en) * | 1998-06-04 | 2004-06-17 | Z4 Technologies, Inc. | Computer readable storage medium for enhancing license compliance of software/digital content including self-activating/self-authenticating software/digital content |
US20040117631A1 (en) * | 1998-06-04 | 2004-06-17 | Z4 Technologies, Inc. | Method for digital rights management including user/publisher connectivity interface |
US20040117644A1 (en) * | 1998-06-04 | 2004-06-17 | Z4 Technologies, Inc. | Method for reducing unauthorized use of software/digital content including self-activating/self-authenticating software/digital content |
US20040225894A1 (en) * | 1998-06-04 | 2004-11-11 | Z4 Technologies, Inc. | Hardware based method for digital rights management including self activating/self authentication software |
US20040107368A1 (en) * | 1998-06-04 | 2004-06-03 | Z4 Technologies, Inc. | Method for digital rights management including self activating/self authentication software |
US20040117663A1 (en) * | 1998-06-04 | 2004-06-17 | Z4 Technologies, Inc. | Method for authentication of digital content used or accessed with secondary devices to reduce unauthorized use or distribution |
JP3835655B2 (en) * | 1998-06-09 | 2006-10-18 | ソニー株式会社 | Information signal reproducing apparatus, information signal processing apparatus, information signal reproducing method and information signal output method |
US6985452B2 (en) * | 1998-06-11 | 2006-01-10 | Nuworld Marketing Ltd. | Wireless system for broadcasting, receiving, storing and selectively printing coupons and the like in a retail environment |
US7495788B2 (en) * | 1998-06-11 | 2009-02-24 | Nch Marketing Services, Inc. | Wireless system for broadcasting, receiving and printing packets of information |
US6298446B1 (en) | 1998-06-14 | 2001-10-02 | Alchemedia Ltd. | Method and system for copyright protection of digital images transmitted over networks |
IL124895A0 (en) | 1998-06-14 | 1999-01-26 | Csafe Ltd | Methods and apparatus for preventing reuse of text images and software transmitted via networks |
US6044349A (en) * | 1998-06-19 | 2000-03-28 | Intel Corporation | Secure and convenient information storage and retrieval method and apparatus |
US9792659B2 (en) * | 1999-04-13 | 2017-10-17 | Iplearn, Llc | Computer-aided methods and apparatus to access materials in a network environment |
US6398556B1 (en) | 1998-07-06 | 2002-06-04 | Chi Fai Ho | Inexpensive computer-aided learning methods and apparatus for learners |
US6363356B1 (en) * | 1998-07-16 | 2002-03-26 | Preview Software | Referrer-based system for try/buy electronic software distribution |
AR020608A1 (en) | 1998-07-17 | 2002-05-22 | United Video Properties Inc | A METHOD AND A PROVISION TO SUPPLY A USER REMOTE ACCESS TO AN INTERACTIVE PROGRAMMING GUIDE BY A REMOTE ACCESS LINK |
EP1014618A1 (en) * | 1998-07-30 | 2000-06-28 | Sony Corporation | Content processing system |
US6697997B1 (en) * | 1998-08-12 | 2004-02-24 | Nippon Telegraph And Telephone Corporation | Recording medium with a signed hypertext recorded thereon signed hypertext generating method and apparatus and signed hypertext verifying method and apparatus |
US7110984B1 (en) * | 1998-08-13 | 2006-09-19 | International Business Machines Corporation | Updating usage conditions in lieu of download digital rights management protected content |
US6983371B1 (en) | 1998-10-22 | 2006-01-03 | International Business Machines Corporation | Super-distribution of protected digital content |
US6959288B1 (en) | 1998-08-13 | 2005-10-25 | International Business Machines Corporation | Digital content preparation system |
US6226618B1 (en) * | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US6389403B1 (en) * | 1998-08-13 | 2002-05-14 | International Business Machines Corporation | Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system |
US7228437B2 (en) * | 1998-08-13 | 2007-06-05 | International Business Machines Corporation | Method and system for securing local database file of local content stored on end-user system |
AU5780899A (en) * | 1998-08-21 | 2000-03-14 | Aurigin Systems, Inc. | System, method, and computer program product for managing and analyzing intellectual property (ip) related transactions |
AU5677599A (en) * | 1998-08-21 | 2000-03-14 | Marketxt, Inc. | A real-time computerized stock trading system |
AU5909999A (en) * | 1998-09-03 | 2000-03-27 | Regents Of The University Of California, The | Method and apparatus for executing remote procedures in a remote processor from a client process executed in a local processor |
US6311278B1 (en) * | 1998-09-09 | 2001-10-30 | Sanctum Ltd. | Method and system for extracting application protocol characteristics |
JP3819160B2 (en) * | 1998-09-18 | 2006-09-06 | 富士通株式会社 | Information management method and information management apparatus |
AU6423999A (en) * | 1998-10-13 | 2000-05-01 | Indulge.Com | Replenishment system and method for electronic commerce |
US6609199B1 (en) * | 1998-10-26 | 2003-08-19 | Microsoft Corporation | Method and apparatus for authenticating an open system application to a portable IC device |
US7194092B1 (en) * | 1998-10-26 | 2007-03-20 | Microsoft Corporation | Key-based secure storage |
US6820063B1 (en) * | 1998-10-26 | 2004-11-16 | Microsoft Corporation | Controlling access to content based on certificates and access predicates |
US6330670B1 (en) | 1998-10-26 | 2001-12-11 | Microsoft Corporation | Digital rights management operating system |
US7139915B2 (en) * | 1998-10-26 | 2006-11-21 | Microsoft Corporation | Method and apparatus for authenticating an open system application to a portable IC device |
US7174457B1 (en) | 1999-03-10 | 2007-02-06 | Microsoft Corporation | System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party |
US6327652B1 (en) | 1998-10-26 | 2001-12-04 | Microsoft Corporation | Loading and identifying a digital rights management operating system |
ATE268484T1 (en) | 1998-10-28 | 2004-06-15 | Verticalone Corp | SYSTEM AND METHOD FOR AUTOMATIC ACCESS TO PERSONAL DATA |
US6871220B1 (en) | 1998-10-28 | 2005-03-22 | Yodlee, Inc. | System and method for distributed storage and retrieval of personal information |
US8290202B2 (en) * | 1998-11-03 | 2012-10-16 | Digimarc Corporation | Methods utilizing steganography |
US6763370B1 (en) | 1998-11-16 | 2004-07-13 | Softricity, Inc. | Method and apparatus for content protection in a secure content delivery system |
US7017188B1 (en) * | 1998-11-16 | 2006-03-21 | Softricity, Inc. | Method and apparatus for secure content delivery over broadband access networks |
US6751670B1 (en) * | 1998-11-24 | 2004-06-15 | Drm Technologies, L.L.C. | Tracking electronic component |
US6731774B1 (en) * | 1998-11-30 | 2004-05-04 | Sony Corporation | Associated information adding apparatus and method, and associated information detecting apparatus and method |
US6339766B1 (en) * | 1998-12-02 | 2002-01-15 | Transactionsecure | Electronic payment system employing limited-use account number |
US6292788B1 (en) * | 1998-12-03 | 2001-09-18 | American Master Lease, L.L.C. | Methods and investment instruments for performing tax-deferred real estate exchanges |
US8069407B1 (en) | 1998-12-08 | 2011-11-29 | Yodlee.Com, Inc. | Method and apparatus for detecting changes in websites and reporting results to web developers for navigation template repair purposes |
US7085997B1 (en) | 1998-12-08 | 2006-08-01 | Yodlee.Com | Network-based bookmark management and web-summary system |
US7200804B1 (en) * | 1998-12-08 | 2007-04-03 | Yodlee.Com, Inc. | Method and apparatus for providing automation to an internet navigation application |
US7672879B1 (en) | 1998-12-08 | 2010-03-02 | Yodlee.Com, Inc. | Interactive activity interface for managing personal data and performing transactions over a data packet network |
US7624046B2 (en) * | 1998-12-24 | 2009-11-24 | Universal Music Group, Inc. | Electronic music/media distribution system |
US8175977B2 (en) * | 1998-12-28 | 2012-05-08 | Audible | License management for digital content |
US7127515B2 (en) | 1999-01-15 | 2006-10-24 | Drm Technologies, Llc | Delivering electronic content |
US7130831B2 (en) * | 1999-02-08 | 2006-10-31 | Copyright Clearance Center, Inc. | Limited-use browser and security system |
EP1203332A4 (en) * | 1999-02-12 | 2002-09-25 | Mack Hicks | System and method for providing certification-related and other services |
US6654724B1 (en) * | 1999-02-12 | 2003-11-25 | Adheris, Inc. | System for processing pharmaceutical data while maintaining patient confidentially |
WO2000048063A1 (en) * | 1999-02-15 | 2000-08-17 | Hewlett-Packard Company | Trusted computing platform |
EP2042966B1 (en) * | 1999-02-17 | 2013-03-27 | Nippon Telegraph and Telephone Corporation | Original data circulation method, system, apparatus, and computer readable medium |
US7610614B1 (en) * | 1999-02-17 | 2009-10-27 | Certco, Inc. | Cryptographic control and maintenance of organizational structure and functions |
AUPP893399A0 (en) * | 1999-02-26 | 1999-03-25 | Watson, Robert John | Site certificate system |
EP1159799B1 (en) | 1999-02-26 | 2006-07-26 | Bitwise Designs, Inc. | Digital file management and imaging system and method including secure file marking |
CA2683191A1 (en) * | 1999-03-02 | 2000-09-08 | Amway Corp. | Electronic commerce transactions within a marketing system |
US7353194B1 (en) * | 1999-03-02 | 2008-04-01 | Alticor Investments, Inc. | System and method for managing recurring orders in a computer network |
US7966328B2 (en) | 1999-03-02 | 2011-06-21 | Rose Blush Software Llc | Patent-related tools and methodology for use in research and development projects |
US7716060B2 (en) | 1999-03-02 | 2010-05-11 | Germeraad Paul B | Patent-related tools and methodology for use in the merger and acquisition process |
JP4779183B2 (en) * | 1999-03-26 | 2011-09-28 | ソニー株式会社 | Playback apparatus and playback method |
US6615192B1 (en) * | 1999-03-12 | 2003-09-02 | Matsushita Electric Industrial Co., Ltd. | Contents copying system, copying method, computer-readable recording medium and disc drive copying contents but not a cipher key via a host computer |
CA2332034C (en) * | 1999-03-15 | 2008-07-29 | Koninklijke Philips Electronics N.V. | A method and system for providing copy-protection on a storage medium and storage medium for use in such a system |
US7549056B2 (en) | 1999-03-19 | 2009-06-16 | Broadcom Corporation | System and method for processing and protecting content |
US7058803B2 (en) * | 2002-05-22 | 2006-06-06 | Broadcom Corporation | System and method for protecting transport stream content |
US7664264B2 (en) | 1999-03-24 | 2010-02-16 | Blue Spike, Inc. | Utilizing data reduction in steganographic and cryptographic systems |
JP4951811B2 (en) * | 1999-03-24 | 2012-06-13 | 富士通セミコンダクター株式会社 | Manufacturing method of semiconductor device |
US7103574B1 (en) * | 1999-03-27 | 2006-09-05 | Microsoft Corporation | Enforcement architecture and method for digital rights management |
US7225333B2 (en) * | 1999-03-27 | 2007-05-29 | Microsoft Corporation | Secure processor architecture for use with a digital rights management (DRM) system on a computing device |
AU3381000A (en) * | 1999-03-27 | 2000-10-16 | Microsoft Corporation | Rendering digital content in an encrypted rights-protected form |
US7073063B2 (en) | 1999-03-27 | 2006-07-04 | Microsoft Corporation | Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like |
US7136838B1 (en) * | 1999-03-27 | 2006-11-14 | Microsoft Corporation | Digital license and method for obtaining/providing a digital license |
US7319759B1 (en) | 1999-03-27 | 2008-01-15 | Microsoft Corporation | Producing a new black box for a digital rights management (DRM) system |
US7024393B1 (en) * | 1999-03-27 | 2006-04-04 | Microsoft Corporation | Structural of digital rights management (DRM) system |
US20020019814A1 (en) * | 2001-03-01 | 2002-02-14 | Krishnamurthy Ganesan | Specifying rights in a digital rights license according to events |
US7051005B1 (en) * | 1999-03-27 | 2006-05-23 | Microsoft Corporation | Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system |
US6973444B1 (en) * | 1999-03-27 | 2005-12-06 | Microsoft Corporation | Method for interdependently validating a digital content package and a corresponding digital license |
US6829708B1 (en) | 1999-03-27 | 2004-12-07 | Microsoft Corporation | Specifying security for an element by assigning a scaled value representative of the relative security thereof |
US7383205B1 (en) | 1999-03-27 | 2008-06-03 | Microsoft Corporation | Structure of a digital content package |
US7409546B2 (en) | 1999-10-20 | 2008-08-05 | Tivo Inc. | Cryptographically signed filesystem |
US6363434B1 (en) | 1999-03-30 | 2002-03-26 | Sony Corporation Of Japan | Method of managing resources within a network of consumer electronic devices |
US6728713B1 (en) | 1999-03-30 | 2004-04-27 | Tivo, Inc. | Distributed database management system |
US8131648B2 (en) * | 1999-10-20 | 2012-03-06 | Tivo Inc. | Electronic content distribution and exchange system |
US20050192008A1 (en) * | 1999-03-31 | 2005-09-01 | Nimesh Desai | System and method for selective information exchange |
US6820204B1 (en) | 1999-03-31 | 2004-11-16 | Nimesh Desai | System and method for selective information exchange |
US6651171B1 (en) | 1999-04-06 | 2003-11-18 | Microsoft Corporation | Secure execution of program code |
US6584466B1 (en) * | 1999-04-07 | 2003-06-24 | Critical Path, Inc. | Internet document management system and methods |
US6618789B1 (en) * | 1999-04-07 | 2003-09-09 | Sony Corporation | Security memory card compatible with secure and non-secure data processing systems |
JP4238410B2 (en) * | 1999-04-09 | 2009-03-18 | ソニー株式会社 | Information processing system |
US7730169B1 (en) | 1999-04-12 | 2010-06-01 | Softricity, Inc. | Business method and system for serving third party software applications |
AU4230300A (en) * | 1999-04-12 | 2000-11-14 | Reciprocal, Inc. | System and method for data rights management |
US7370071B2 (en) | 2000-03-17 | 2008-05-06 | Microsoft Corporation | Method for serving third party software applications from servers to client computers |
US7539628B2 (en) | 2000-03-21 | 2009-05-26 | Bennett James D | Online purchasing system supporting buyer affordability screening |
US7346920B2 (en) * | 2000-07-07 | 2008-03-18 | Sonic Solutions, A California Corporation | System, method and article of manufacture for a common cross platform framework for development of DVD-Video content integrated with ROM content |
US6405203B1 (en) * | 1999-04-21 | 2002-06-11 | Research Investment Network, Inc. | Method and program product for preventing unauthorized users from using the content of an electronic storage medium |
US7178106B2 (en) * | 1999-04-21 | 2007-02-13 | Sonic Solutions, A California Corporation | Presentation of media content from multiple media sources |
US6665489B2 (en) | 1999-04-21 | 2003-12-16 | Research Investment Network, Inc. | System, method and article of manufacturing for authorizing the use of electronic content utilizing a laser-centric medium and a network server |
US6941383B1 (en) | 2000-01-20 | 2005-09-06 | Interactual Technologies, Inc. | System, method and article of manufacture for java/javascript component in a multimedia synchronization framework |
AU4359400A (en) | 1999-04-21 | 2000-11-02 | Interactual Technologies, Inc. | System, method and article of manufacture for updating content stored on a portable storage medium |
US7188193B1 (en) | 2000-01-20 | 2007-03-06 | Sonic Solutions, A California Corporation | System, method and article of manufacture for a synchronizer component in a multimedia synchronization framework |
US20050182828A1 (en) | 1999-04-21 | 2005-08-18 | Interactual Technologies, Inc. | Platform specific execution |
US7448021B1 (en) | 2000-07-24 | 2008-11-04 | Sonic Solutions, A California Corporation | Software engine for combining video or audio content with programmatic content |
CA2388592A1 (en) * | 1999-04-21 | 2000-10-26 | Interactual Technologies, Inc. | Targeted update of a laser-centric medium |
US6453420B1 (en) | 1999-04-21 | 2002-09-17 | Research Investment Network, Inc. | System, method and article of manufacture for authorizing the use of electronic content utilizing a laser-centric medium |
US7458091B1 (en) | 2000-01-20 | 2008-11-25 | Sonic Solutions, A California Corporation | System, method and article of manufacture for a business layer component in a multimedia synchronization framework |
US6529949B1 (en) | 2000-02-07 | 2003-03-04 | Interactual Technologies, Inc. | System, method and article of manufacture for remote unlocking of local content located on a client device |
US6769130B1 (en) * | 2000-01-20 | 2004-07-27 | Interactual Technologies, Inc. | System, method and article of manufacture for late synchronization during the execution of a multimedia event on a plurality of client computers |
US6918059B1 (en) | 1999-04-28 | 2005-07-12 | Universal Music Group | Method and system for handling errors in a distributed computer system |
WO2000068811A1 (en) * | 1999-04-30 | 2000-11-16 | Network Forensics, Inc. | System and method for capturing network data and identifying network events therefrom |
US7016951B1 (en) | 1999-04-30 | 2006-03-21 | Mantech Ctx Corporation | System and method for network security |
US6697948B1 (en) | 1999-05-05 | 2004-02-24 | Michael O. Rabin | Methods and apparatus for protecting information |
US6424950B1 (en) * | 1999-05-10 | 2002-07-23 | Xerox Corporation | Remote feature delivery for output devices |
US6526443B1 (en) * | 1999-05-12 | 2003-02-25 | Sandia Corporation | Method and apparatus for managing transactions with connected computers |
US8099758B2 (en) | 1999-05-12 | 2012-01-17 | Microsoft Corporation | Policy based composite file system and method |
US7111170B2 (en) * | 1999-05-19 | 2006-09-19 | Digimarc Corporation | Distributed system for responding to watermarked documents |
KR100853951B1 (en) * | 1999-05-19 | 2008-08-25 | 디지맥 코포레이션 | Methods and devices for processing audio |
US7302574B2 (en) * | 1999-05-19 | 2007-11-27 | Digimarc Corporation | Content identifiers triggering corresponding responses through collaborative processing |
US20010034705A1 (en) * | 1999-05-19 | 2001-10-25 | Rhoads Geoffrey B. | Payment-based systems for internet music |
US7164413B2 (en) * | 1999-05-19 | 2007-01-16 | Digimarc Corporation | Enhanced input peripheral |
US20070055884A1 (en) * | 1999-05-19 | 2007-03-08 | Rhoads Geoffrey B | User control and activation of watermark enabled objects |
US8095796B2 (en) * | 1999-05-19 | 2012-01-10 | Digimarc Corporation | Content identifiers |
US6522769B1 (en) | 1999-05-19 | 2003-02-18 | Digimarc Corporation | Reconfiguring a watermark detector |
US20020032734A1 (en) | 2000-07-26 | 2002-03-14 | Rhoads Geoffrey B. | Collateral data combined with user characteristics to select web site |
US7143949B1 (en) | 2000-04-05 | 2006-12-05 | Digimarc Corporation | Internet-linking scanner |
US7206820B1 (en) | 2000-03-18 | 2007-04-17 | Digimarc Corporation | System for linking from object to remote resource |
US8752118B1 (en) | 1999-05-19 | 2014-06-10 | Digimarc Corporation | Audio and video content-based methods |
US6549935B1 (en) | 1999-05-25 | 2003-04-15 | Silverbrook Research Pty Ltd | Method of distributing documents having common components to a plurality of destinations |
JP2000341263A (en) | 1999-05-27 | 2000-12-08 | Sony Corp | Information processing device and its method |
EP1055990A1 (en) | 1999-05-28 | 2000-11-29 | Hewlett-Packard Company | Event logging in a computing platform |
US6289450B1 (en) * | 1999-05-28 | 2001-09-11 | Authentica, Inc. | Information security architecture for encrypting documents for remote access while maintaining access control |
EP1056010A1 (en) | 1999-05-28 | 2000-11-29 | Hewlett-Packard Company | Data integrity monitoring in trusted computing entity |
US7752535B2 (en) | 1999-06-01 | 2010-07-06 | Yodlec.com, Inc. | Categorization of summarized information |
US20050197919A1 (en) * | 1999-06-02 | 2005-09-08 | Robertson Steven C. | System and method for providing electronic multi-merchant gift certificate & contribution brokering services over a distributed network |
US6785815B1 (en) | 1999-06-08 | 2004-08-31 | Intertrust Technologies Corp. | Methods and systems for encoding and protecting data using digital signature and watermarking techniques |
US6959384B1 (en) | 1999-12-14 | 2005-10-25 | Intertrust Technologies Corporation | Systems and methods for authenticating and protecting the integrity of data streams and other data |
WO2001001331A1 (en) * | 1999-06-28 | 2001-01-04 | Digimarc Corporation | Digital watermarks in tv and radio broadcasts |
US8103542B1 (en) | 1999-06-29 | 2012-01-24 | Digimarc Corporation | Digitally marked objects and promotional methods |
WO2001001221A2 (en) * | 1999-06-30 | 2001-01-04 | Biztro, Inc. | Improved scalable architecture and methods for e-commerce applications in a clustered computer system |
WO2001001227A1 (en) * | 1999-06-30 | 2001-01-04 | Accenture Llp | A system, method and article of manufacture for tracking software sale transactions of an internet-based retailer for reporting to a software publisher |
AU6061300A (en) * | 1999-06-30 | 2001-01-31 | Ac Properties B.V. | A system, method and article of manufacture for an electronic software distribution, post-download payment scheme with encryption capabilities |
US7058817B1 (en) | 1999-07-02 | 2006-06-06 | The Chase Manhattan Bank | System and method for single sign on process for websites with multiple applications and services |
EP1120715A4 (en) * | 1999-07-06 | 2005-02-16 | Sony Corp | Data providing system, device, and method |
US20010020228A1 (en) * | 1999-07-09 | 2001-09-06 | International Business Machines Corporation | Umethod, system and program for managing relationships among entities to exchange encryption keys for use in providing access and authorization to resources |
US6526438B1 (en) | 1999-07-12 | 2003-02-25 | Divine, Inc. | Method for distributing information to subscribers over a network |
GB2353682B (en) * | 1999-07-15 | 2004-03-31 | Nds Ltd | Key management for content protection |
IL130963A (en) | 1999-07-15 | 2006-04-10 | Nds Ltd | Key management for content protection |
AU6104800A (en) | 1999-07-16 | 2001-02-05 | Intertrust Technologies Corp. | Trusted storage systems and methods |
US7152165B1 (en) * | 1999-07-16 | 2006-12-19 | Intertrust Technologies Corp. | Trusted storage systems and methods |
US7243236B1 (en) * | 1999-07-29 | 2007-07-10 | Intertrust Technologies Corp. | Systems and methods for using cryptography to protect secure and insecure computing environments |
US7430670B1 (en) * | 1999-07-29 | 2008-09-30 | Intertrust Technologies Corp. | Software self-defense systems and methods |
US7770016B2 (en) * | 1999-07-29 | 2010-08-03 | Intertrust Technologies Corporation | Systems and methods for watermarking software and other media |
EP1526435A3 (en) * | 1999-07-30 | 2005-07-27 | Intertrust Technologies Corp. | Methods and systems for transaction record delivery using thresholds and multi-stage protocol |
US7475246B1 (en) | 1999-08-04 | 2009-01-06 | Blue Spike, Inc. | Secure personal content server |
AU6760900A (en) * | 1999-08-09 | 2001-03-05 | Frank W Sudia | Distributed rule enforcement systems |
US7124170B1 (en) * | 1999-08-20 | 2006-10-17 | Intertrust Technologies Corp. | Secure processing unit systems and methods |
US6731784B2 (en) * | 1999-08-25 | 2004-05-04 | Hewlett-Packard Development Company, L.P. | Detection and deterrence of counterfeiting of documents with a seal having characteristic color, size, shape and radial density profile |
ATE333682T1 (en) * | 1999-08-26 | 2006-08-15 | Moneycat Ltd | ELECTRONIC MONEY, RELATED ELECTRONIC EXCHANGE AND ELECTRONIC PAYMENT SYSTEMS USING THEM |
WO2001016775A1 (en) * | 1999-08-27 | 2001-03-08 | Comnex Co., Ltd. | Method for providing literary work data, system for executing the method, and computer-readable recorded medium |
US7502759B2 (en) * | 1999-08-30 | 2009-03-10 | Digimarc Corporation | Digital watermarking methods and related toy and game applications |
US6697824B1 (en) | 1999-08-31 | 2004-02-24 | Accenture Llp | Relationship management in an E-commerce application framework |
US7406603B1 (en) | 1999-08-31 | 2008-07-29 | Intertrust Technologies Corp. | Data protection systems and methods |
US7343321B1 (en) * | 1999-09-01 | 2008-03-11 | Keith Ryan Hill | Method of administering licensing of use of copyright works |
US6289455B1 (en) | 1999-09-02 | 2001-09-11 | Crypotography Research, Inc. | Method and apparatus for preventing piracy of digital content |
US7287166B1 (en) | 1999-09-03 | 2007-10-23 | Purdue Research Foundation | Guards for application in software tamperproofing |
US7757097B2 (en) * | 1999-09-03 | 2010-07-13 | Purdue Research Foundation | Method and system for tamperproofing software |
US7149893B1 (en) | 1999-09-07 | 2006-12-12 | Poofaway.Com, Inc. | System and method for enabling the originator of an electronic mail message to preset an expiration time, date, and/or event, and to control processing or handling by a recipient |
US7051364B1 (en) * | 1999-09-09 | 2006-05-23 | Daimlerchrysler Financial Services Americas Llc | System and method for preparing, executing, and securely managing electronic documents |
US7386516B2 (en) * | 1999-09-10 | 2008-06-10 | Metavante Corporation | System and method for providing secure services over public and private networks using a removable portable computer-readable storage |
US20020029200A1 (en) | 1999-09-10 | 2002-03-07 | Charles Dulin | System and method for providing certificate validation and other services |
AU7357200A (en) * | 1999-09-10 | 2001-04-10 | Mack Hicks | System and method for providing certificate-related and other services |
US7669233B2 (en) * | 1999-09-10 | 2010-02-23 | Metavante Corporation | Methods and systems for secure transmission of identification information over public networks |
WO2001018715A1 (en) * | 1999-09-10 | 2001-03-15 | Mack Hicks | System and method for providing certificate-related and other services |
EP1085396A1 (en) | 1999-09-17 | 2001-03-21 | Hewlett-Packard Company | Operation of trusted state in computing platform |
US6957195B1 (en) * | 1999-09-18 | 2005-10-18 | Wildtangent | Player-centric method and apparatus for creating, distributing, and consuming content |
US6985885B1 (en) | 1999-09-21 | 2006-01-10 | Intertrust Technologies Corp. | Systems and methods for pricing and selling digital goods |
KR100304482B1 (en) * | 1999-09-22 | 2001-11-02 | 구자홍 | Method and apparatus for user adaptive information presentation using multiple hierarchical preference information structure and the data structure of multiple hierarchical preference information |
WO2001024082A1 (en) * | 1999-09-24 | 2001-04-05 | Mary Mckenney | System and method for providing payment services in electronic commerce |
US20060195400A1 (en) * | 2000-10-13 | 2006-08-31 | Patrick Patterson | Controlling access to electronic content |
WO2001029730A1 (en) * | 1999-10-15 | 2001-04-26 | Net I Trust Corporation | Algorithm-independent encryption method |
US7536561B2 (en) * | 1999-10-15 | 2009-05-19 | Ebrary, Inc. | Method and apparatus for improved information transactions |
US8311946B1 (en) * | 1999-10-15 | 2012-11-13 | Ebrary | Method and apparatus for improved information transactions |
US7668956B2 (en) * | 1999-10-19 | 2010-02-23 | Netzero, Inc. | Intelligent autodialer |
US7039656B1 (en) * | 1999-10-20 | 2006-05-02 | Yodlee.Com, Inc. | Method and apparatus for synchronizing data records between a remote device and a data server over a data-packet-network |
US6954753B1 (en) | 1999-10-20 | 2005-10-11 | Hewlett-Packard Development Company, L.P. | Transparent electronic safety deposit box |
GB9925227D0 (en) | 1999-10-25 | 1999-12-22 | Internet Limited | Data storage retrieval and access system |
WO2001033329A1 (en) * | 1999-10-29 | 2001-05-10 | Casio Computer Co., Ltd. | Contents distributing apparatus |
US7133937B2 (en) * | 1999-10-29 | 2006-11-07 | Ge Medical Systems Information Technologies | Input devices for entering data into an electronic medical record (EMR) |
US7224995B2 (en) * | 1999-11-03 | 2007-05-29 | Digimarc Corporation | Data entry method and system |
US7328244B1 (en) | 1999-11-03 | 2008-02-05 | International Business Machines Corporation | Electronic mail system |
WO2001033477A2 (en) | 1999-11-04 | 2001-05-10 | Jpmorgan Chase Bank | System and method for automated financial project management |
KR20070094988A (en) * | 1999-11-05 | 2007-09-27 | 소니 가부시끼 가이샤 | Data decoding apparatus and method, charge information processing apparatus and method, data reproducing apparatus and method, electronic money, electronic use right, and terminal apparatus |
US6876991B1 (en) | 1999-11-08 | 2005-04-05 | Collaborative Decision Platforms, Llc. | System, method and computer program product for a collaborative decision platform |
US6850914B1 (en) * | 1999-11-08 | 2005-02-01 | Matsushita Electric Industrial Co., Ltd. | Revocation information updating method, revocation informaton updating apparatus and storage medium |
US6449719B1 (en) * | 1999-11-09 | 2002-09-10 | Widevine Technologies, Inc. | Process and streaming server for encrypting a data stream |
US8055894B2 (en) * | 1999-11-09 | 2011-11-08 | Google Inc. | Process and streaming server for encrypting a data stream with bandwidth based variation |
US7130807B1 (en) | 1999-11-22 | 2006-10-31 | Accenture Llp | Technology sharing during demand and supply planning in a network-based supply chain environment |
US7716077B1 (en) | 1999-11-22 | 2010-05-11 | Accenture Global Services Gmbh | Scheduling and planning maintenance and service in a network-based supply chain environment |
US8032409B1 (en) | 1999-11-22 | 2011-10-04 | Accenture Global Services Limited | Enhanced visibility during installation management in a network-based supply chain environment |
WO2001039086A2 (en) * | 1999-11-22 | 2001-05-31 | Accenture Llp | Technology sharing during asset management and asset tracking in a network-based supply chain environment and method thereof |
AU1801401A (en) * | 1999-11-22 | 2001-06-04 | Andersen Consulting Llp | Network and life cycle asset management in an e-commerce environment and method thereof |
US8271336B2 (en) | 1999-11-22 | 2012-09-18 | Accenture Global Services Gmbh | Increased visibility during order management in a network-based supply chain environment |
US10275780B1 (en) | 1999-11-24 | 2019-04-30 | Jpmorgan Chase Bank, N.A. | Method and apparatus for sending a rebate via electronic mail over the internet |
US8571975B1 (en) | 1999-11-24 | 2013-10-29 | Jpmorgan Chase Bank, N.A. | System and method for sending money via E-mail over the internet |
WO2001039063A1 (en) * | 1999-11-26 | 2001-05-31 | Michigan State University | System and method for preparing educational materials |
US20010034678A1 (en) * | 1999-12-01 | 2001-10-25 | Online Investments, Inc. | Electronic purchase and sale of securities system and method |
EP1237326A4 (en) * | 1999-12-06 | 2007-09-05 | Sanyo Electric Co | Data distribution system and recorder for use therein |
US6834110B1 (en) | 1999-12-09 | 2004-12-21 | International Business Machines Corporation | Multi-tier digital TV programming for content distribution |
US7213005B2 (en) * | 1999-12-09 | 2007-05-01 | International Business Machines Corporation | Digital content distribution using web broadcasting services |
US6757824B1 (en) | 1999-12-10 | 2004-06-29 | Microsoft Corporation | Client-side boot domains and boot rules |
US7024373B1 (en) * | 1999-12-15 | 2006-04-04 | Kris Reynolds | Auto purchase system and method |
US7047411B1 (en) | 1999-12-17 | 2006-05-16 | Microsoft Corporation | Server for an electronic distribution system and method of operating same |
US6996720B1 (en) | 1999-12-17 | 2006-02-07 | Microsoft Corporation | System and method for accessing protected content in a rights-management architecture |
US6970849B1 (en) | 1999-12-17 | 2005-11-29 | Microsoft Corporation | Inter-server communication using request with encrypted parameter |
US6903838B1 (en) | 1999-12-20 | 2005-06-07 | Hewlett-Packard Development Company, L.P. | Automatically specifying address where document is to be sent |
US6842740B1 (en) | 1999-12-20 | 2005-01-11 | Hewlett-Packard Development Company, L.P. | Method for providing automatic payment when making duplicates of copyrighted material |
US6792113B1 (en) | 1999-12-20 | 2004-09-14 | Microsoft Corporation | Adaptable security mechanism for preventing unauthorized access of digital data |
JP2001175606A (en) * | 1999-12-20 | 2001-06-29 | Sony Corp | Data processor, and data processing equipment and its method |
US6865284B2 (en) * | 1999-12-20 | 2005-03-08 | Hewlett-Packard Development Company, L.P. | Method and system for processing an electronic version of a hardcopy of a document |
US7069234B1 (en) * | 1999-12-22 | 2006-06-27 | Accenture Llp | Initiating an agreement in an e-commerce environment |
US6854009B1 (en) * | 1999-12-22 | 2005-02-08 | Tacit Networks, Inc. | Networked computer system |
US7610233B1 (en) | 1999-12-22 | 2009-10-27 | Accenture, Llp | System, method and article of manufacture for initiation of bidding in a virtual trade financial environment |
US7167844B1 (en) | 1999-12-22 | 2007-01-23 | Accenture Llp | Electronic menu document creator in a virtual financial environment |
US6832316B1 (en) * | 1999-12-22 | 2004-12-14 | Intertrust Technologies, Corp. | Systems and methods for protecting data secrecy and integrity |
US8037193B2 (en) * | 1999-12-24 | 2011-10-11 | Telstra Corporation Limited | Virtual token |
AU3076801A (en) * | 1999-12-27 | 2001-07-09 | Pitchware, Inc. | Method and apparatus for a cryptographically assisted commercial network system designed to facilitate purchase and licensing |
EP1830552A1 (en) | 1999-12-28 | 2007-09-05 | Sony Corporation | Image commercial transactions system and method |
KR100840520B1 (en) * | 1999-12-28 | 2008-06-24 | 디지맥 코포레이션 | Digital watermarks as data proxies |
EP1670233A1 (en) * | 1999-12-28 | 2006-06-14 | Sony Corporation | A photographic image commercial transaction system using a portable music player |
US7110965B1 (en) * | 1999-12-30 | 2006-09-19 | Pitney Bowes Inc. | Method and system for data repository |
AU2080901A (en) * | 1999-12-30 | 2001-07-16 | Sony Electronics Inc. | A resource manager for providing user-dependent access control |
US7171390B1 (en) * | 1999-12-31 | 2007-01-30 | Soft-On-Net, Inc. | System and method for executing a rental software program in distributed computing environment |
US6957220B2 (en) | 2000-11-07 | 2005-10-18 | Research Investment Networks, Inc. | System, method and article of manufacture for tracking and supporting the distribution of content electronically |
US7392481B2 (en) * | 2001-07-02 | 2008-06-24 | Sonic Solutions, A California Corporation | Method and apparatus for providing content-owner control in a networked device |
US20020114465A1 (en) * | 2000-01-05 | 2002-08-22 | Shen-Orr D. Chaim | Digital content delivery system and method |
US20070156587A1 (en) * | 2000-01-06 | 2007-07-05 | Super Talent Electronics Inc. | Content Protection Using Encryption Key Embedded with Content File |
US8015112B2 (en) * | 2000-01-07 | 2011-09-06 | Prakken Randy L | Embedded license data file distribution and processing system |
EP2352120B1 (en) * | 2000-01-13 | 2016-03-30 | Digimarc Corporation | Network-based access to auxiliary data based on steganographic information |
US7450734B2 (en) * | 2000-01-13 | 2008-11-11 | Digimarc Corporation | Digital asset management, targeted searching and desktop searching using digital watermarks |
US6772340B1 (en) | 2000-01-14 | 2004-08-03 | Microsoft Corporation | Digital rights management system operating on computing device and having black box tied to computing device |
US7353209B1 (en) | 2000-01-14 | 2008-04-01 | Microsoft Corporation | Releasing decrypted digital content to an authenticated path |
AU2000269232A1 (en) * | 2000-01-14 | 2001-07-24 | Microsoft Corporation | Specifying security for an element by assigning a scaled value representative ofthe relative security thereof |
US20020009000A1 (en) * | 2000-01-18 | 2002-01-24 | Qdesign Usa, Inc. | Adding imperceptible noise to audio and other types of signals to cause significant degradation when compressed and decompressed |
US6912528B2 (en) | 2000-01-18 | 2005-06-28 | Gregg S. Homer | Rechargeable media distribution and play system |
US7177841B2 (en) * | 2000-01-28 | 2007-02-13 | Canon Kabushiki Kaisha | Digital contents distribution system, digital contents distribution method, roaming server, information processor, and information processing method |
US20010037205A1 (en) * | 2000-01-29 | 2001-11-01 | Joao Raymond Anthony | Apparatus and method for effectuating an affiliated marketing relationship |
JP4120125B2 (en) * | 2000-02-01 | 2008-07-16 | 富士ゼロックス株式会社 | License issuing device and method |
US20040230546A1 (en) * | 2000-02-01 | 2004-11-18 | Rogers Russell A. | Personalization engine for rules and knowledge |
US20030097338A1 (en) * | 2000-02-03 | 2003-05-22 | Piotrowski Tony E. | Method and system for purchasing content related material |
US7236596B2 (en) | 2000-02-07 | 2007-06-26 | Mikos, Ltd. | Digital imaging system for evidentiary use |
JP2001219440A (en) * | 2000-02-09 | 2001-08-14 | Sony Disc Technology Inc | Multi-cavity molding apparatus and its molding method |
NL1014328C2 (en) * | 2000-02-09 | 2001-04-23 | Jan Pieter Christiaan Speyart | Method and device for securing data to be sent over an open network. |
US8706627B2 (en) * | 2000-02-10 | 2014-04-22 | Jon Shore | Apparatus, systems and methods for wirelessly transacting financial transfers , electronically recordable authorization transfers, and other information transfers |
US20010037319A1 (en) * | 2000-02-11 | 2001-11-01 | Eric Edwards | Public submission content library |
US7810037B1 (en) | 2000-02-11 | 2010-10-05 | Sony Corporation | Online story collaboration |
US8407595B1 (en) | 2000-02-11 | 2013-03-26 | Sony Corporation | Imaging service for automating the display of images |
WO2001059545A2 (en) * | 2000-02-11 | 2001-08-16 | Subramaniam Arun K | System and method for providing anonymous internet transaction |
US7262778B1 (en) | 2000-02-11 | 2007-08-28 | Sony Corporation | Automatic color adjustment of a template design |
GB2359156B (en) * | 2000-02-14 | 2004-10-13 | Reuters Ltd | Methods of computer programs for and apparatus for providing and accessing digital content |
US8095467B2 (en) * | 2000-02-14 | 2012-01-10 | Bettinger David S | Internet news compensation system |
US6867789B1 (en) | 2000-02-15 | 2005-03-15 | Bank One, Delaware, National Association | System and method for generating graphical user interfaces |
US20010034845A1 (en) * | 2000-02-15 | 2001-10-25 | Brunt George B. | Secure web-based document control process and system |
US6737957B1 (en) | 2000-02-16 | 2004-05-18 | Verance Corporation | Remote control signaling using audio watermarks |
US20030018581A1 (en) * | 2000-02-16 | 2003-01-23 | Bratton Timothy R. | Delivering media data to portable computing devices |
US6453301B1 (en) | 2000-02-23 | 2002-09-17 | Sony Corporation | Method of using personal device with internal biometric in conducting transactions over a network |
US20010034758A1 (en) * | 2000-02-24 | 2001-10-25 | Dan Kikinis | Virtual private network (VPN) for servicing home gateway system through external disk management |
JP2001237819A (en) * | 2000-02-24 | 2001-08-31 | Nec Corp | Literary work reproduction system, literary work decoder, and user specific information storage device |
US7792745B2 (en) * | 2000-02-25 | 2010-09-07 | Ipass Inc. | Method and system to facilitate financial settlement of service access transactions between multiple parties |
US20010034693A1 (en) * | 2000-02-25 | 2001-10-25 | Jay Farhat | Method and system to broker a service access transaction |
JP3385270B2 (en) * | 2000-03-03 | 2003-03-10 | 株式会社エイティング | Personal authentication method |
AU2001250017A1 (en) | 2000-03-03 | 2001-09-17 | Dun And Bradstreet, Inc. | Facilitating a transaction in electronic commerce |
AU2001237696A1 (en) * | 2000-03-03 | 2001-09-12 | Sanctum Ltd. | System for determining web application vulnerabilities |
US20030105720A1 (en) * | 2000-03-14 | 2003-06-05 | Yoshihito Ishibashi | Content secondary distribution management system and method, and program providing medium therefor |
US8635160B2 (en) * | 2000-03-14 | 2014-01-21 | Sony Corporation | Information providing apparatus and method, information processing apparatus and method, program storage medium, program, and information providing system |
US7272572B1 (en) * | 2000-03-20 | 2007-09-18 | Innovaport Llc | Method and system for facilitating the transfer of intellectual property |
US20020055878A1 (en) * | 2000-03-22 | 2002-05-09 | Burton Peter A. | Methods and apparatus for on-line ordering |
AU2001252986A1 (en) * | 2000-03-28 | 2001-10-08 | Renee Bunnell | Method and system for creating a multi-tiered, e-commerce extranet for a community of businesses |
US6812938B2 (en) * | 2000-03-29 | 2004-11-02 | Citicorp Development Center, Inc. | Method and system for providing status indication and control to a computer network user |
US6901386B1 (en) * | 2000-03-31 | 2005-05-31 | Intel Corporation | Electronic asset lending library method and apparatus |
WO2001076246A1 (en) * | 2000-04-05 | 2001-10-11 | Sony United Kingdom Limited | Electronic media distribution |
AU2001249935A1 (en) * | 2000-04-05 | 2001-10-23 | Therics, Inc. | System and method for rapidly customizing a design and remotely manufacturing biomedical devices using a computer system |
US7155414B2 (en) * | 2000-04-05 | 2006-12-26 | International Business Machines Corporation | License compliance verification system |
US6772026B2 (en) * | 2000-04-05 | 2004-08-03 | Therics, Inc. | System and method for rapidly customizing design, manufacture and/or selection of biomedical devices |
US6898579B1 (en) * | 2000-04-06 | 2005-05-24 | Xerox Corporation | System, method and article of manufacture for contract term certification utilizing a network |
US7836395B1 (en) * | 2000-04-06 | 2010-11-16 | International Business Machines Corporation | System, apparatus and method for transformation of java server pages into PVC formats |
US7200230B2 (en) | 2000-04-06 | 2007-04-03 | Macrovision Corporation | System and method for controlling and enforcing access rights to encrypted media |
US7266681B1 (en) * | 2000-04-07 | 2007-09-04 | Intertrust Technologies Corp. | Network communications security agent |
US7085839B1 (en) | 2000-04-07 | 2006-08-01 | Intertrust Technologies Corporation | Network content management |
AU2001254802A1 (en) * | 2000-04-11 | 2001-10-23 | Thomson Multimedia | System and process for storing securely secret information, apparatus and serverto be used in such a system and method for distribution of a digital content |
JP2001297202A (en) * | 2000-04-11 | 2001-10-26 | Hitachi Ltd | Method and device for selling digital information |
US20070129955A1 (en) * | 2000-04-14 | 2007-06-07 | American Express Travel Related Services Company, Inc. | System and method for issuing and using a loyalty point advance |
CA2406001A1 (en) | 2000-04-14 | 2001-10-25 | American Express Travel Related Services Company, Inc. | A system and method for using loyalty points |
US7240100B1 (en) * | 2000-04-14 | 2007-07-03 | Akamai Technologies, Inc. | Content delivery network (CDN) content server request handling mechanism with metadata framework support |
CA2305249A1 (en) * | 2000-04-14 | 2001-10-14 | Branko Sarcanin | Virtual safe |
US20010047365A1 (en) * | 2000-04-19 | 2001-11-29 | Hiawatha Island Software Co, Inc. | System and method of packaging and unpackaging files into a markup language record for network search and archive services |
JP2003535393A (en) * | 2000-04-20 | 2003-11-25 | フォトライブラリー・ドット・コム・ピーティワイ・リミテッド | Micro licensing system and method |
JP2001306753A (en) * | 2000-04-21 | 2001-11-02 | Nec Corp | System and method for electronic examination |
US7603301B1 (en) | 2000-04-26 | 2009-10-13 | Accenture Llp | Verification and printing of a tax return in a network-based tax architecture |
US20020111997A1 (en) * | 2000-04-26 | 2002-08-15 | Maurice Herlihy | Methods and systems for securing computer software |
US7089173B1 (en) | 2000-04-26 | 2006-08-08 | Altera Corporation | Hardware opencore evaluation |
US7234103B1 (en) | 2000-04-26 | 2007-06-19 | Accenture Llp | Network-based tax framework database |
WO2001084536A1 (en) * | 2000-04-28 | 2001-11-08 | Deutsche Telekom Ag | Method for detecting a voice activity decision (voice activity detector) |
JP2001312325A (en) * | 2000-04-28 | 2001-11-09 | Hitachi Ltd | Method and system for issuing program license key |
US7191156B1 (en) * | 2000-05-01 | 2007-03-13 | Digimarc Corporation | Digital watermarking systems |
US7111168B2 (en) * | 2000-05-01 | 2006-09-19 | Digimarc Corporation | Digital watermarking systems |
AU750261B2 (en) * | 2000-05-02 | 2002-07-11 | Canon Kabushiki Kaisha | Printing using secure pickup |
JP4396080B2 (en) * | 2000-05-08 | 2010-01-13 | ソニー株式会社 | Digital data trading equipment |
US20050132233A1 (en) * | 2000-05-10 | 2005-06-16 | Cisco Technology, Inc. | Digital rights framework |
US6728773B1 (en) | 2000-05-10 | 2004-04-27 | Cisco Technology Inc. | System for controlling and regulating distribution of intellectual properties using internet protocol framework |
US6885999B1 (en) | 2000-05-10 | 2005-04-26 | Cisco Technology, Inc. | Digital identifiers and digital identifier control systems for intellectual properties |
US6959289B1 (en) | 2000-05-10 | 2005-10-25 | Cisco Technology, Inc. | Digital rights framework |
US7426495B1 (en) | 2000-05-10 | 2008-09-16 | Cisco Technology, Inc. | Virtual packing list |
US6721793B1 (en) | 2000-05-10 | 2004-04-13 | Cisco Technology, Inc. | Intellectual property over non-internet protocol systems and networks |
US7606883B1 (en) | 2000-05-11 | 2009-10-20 | Thomson Licensing | Method and system for controlling and auditing content/service systems |
US20020159592A1 (en) * | 2000-05-11 | 2002-10-31 | Hideki Matsushima | Content reception terminal and recording medium |
JP4037999B2 (en) * | 2000-05-15 | 2008-01-23 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Website, robot type search engine response system, robot type search engine registration method, storage medium, and program transmission device |
US10521782B2 (en) * | 2000-05-15 | 2019-12-31 | Efunds Corporation | System for and method of effecting an electronic transaction |
US20020123956A1 (en) * | 2000-05-16 | 2002-09-05 | Albhy Galuten | Method and system for creating and verifying derivative contract terms using party relationships |
CN1313897C (en) * | 2000-05-19 | 2007-05-02 | 网景通信公司 | Adaptive multi-tier authentication system |
US7343348B2 (en) * | 2000-05-19 | 2008-03-11 | First American Residential Group, Inc. | System for performing real-estate transactions over a computer network using participant templates |
US7174454B2 (en) * | 2002-11-19 | 2007-02-06 | America Online, Inc. | System and method for establishing historical usage-based hardware trust |
US7313692B2 (en) * | 2000-05-19 | 2007-12-25 | Intertrust Technologies Corp. | Trust management systems and methods |
US7003107B2 (en) * | 2000-05-23 | 2006-02-21 | Mainstream Encryption | Hybrid stream cipher |
US6985945B2 (en) * | 2000-12-07 | 2006-01-10 | Ipass, Inc. | Service quality monitoring process |
US7240112B2 (en) * | 2000-05-26 | 2007-07-03 | Ipass Inc. | Service quality monitoring process |
US7519695B2 (en) | 2000-05-26 | 2009-04-14 | Ipass Inc. | Service quality monitoring process |
US20030135467A1 (en) * | 2000-05-30 | 2003-07-17 | Akiyoshi Okamoto | Rental system of digital content |
US7107448B1 (en) | 2000-06-04 | 2006-09-12 | Intertrust Technologies Corporation | Systems and methods for governing content rendering, protection, and management applications |
WO2001095218A1 (en) * | 2000-06-05 | 2001-12-13 | Wirca, Inc. | A method and apparatus for executing tasks remotely |
US7213266B1 (en) * | 2000-06-09 | 2007-05-01 | Intertrust Technologies Corp. | Systems and methods for managing and protecting electronic content and applications |
JP4016575B2 (en) * | 2000-06-09 | 2007-12-05 | セイコーエプソン株式会社 | Data management apparatus, storage medium storing data management program, storage medium storing usage certificate data, and data usage method |
US7426530B1 (en) | 2000-06-12 | 2008-09-16 | Jpmorgan Chase Bank, N.A. | System and method for providing customers with seamless entry to a remote server |
US7050586B1 (en) | 2000-06-19 | 2006-05-23 | Intertrust Technologies Corporation | Systems and methods for retrofitting electronic appliances to accept different content formats |
US10185936B2 (en) | 2000-06-22 | 2019-01-22 | Jpmorgan Chase Bank, N.A. | Method and system for processing internet payments |
US7831508B1 (en) | 2000-06-23 | 2010-11-09 | Jpmorgan Chase Bank, N.A. | System and method for implementing a consolidated application process |
US6891953B1 (en) | 2000-06-27 | 2005-05-10 | Microsoft Corporation | Method and system for binding enhanced software features to a persona |
US7539875B1 (en) | 2000-06-27 | 2009-05-26 | Microsoft Corporation | Secure repository with layers of tamper resistance and system and method for providing same |
US7051200B1 (en) | 2000-06-27 | 2006-05-23 | Microsoft Corporation | System and method for interfacing a software process to secure repositories |
US7158953B1 (en) | 2000-06-27 | 2007-01-02 | Microsoft Corporation | Method and system for limiting the use of user-specific software features |
US7017189B1 (en) * | 2000-06-27 | 2006-03-21 | Microsoft Corporation | System and method for activating a rendering device in a multi-level rights-management architecture |
US6981262B1 (en) | 2000-06-27 | 2005-12-27 | Microsoft Corporation | System and method for client interaction in a multi-level rights-management architecture |
US7171692B1 (en) | 2000-06-27 | 2007-01-30 | Microsoft Corporation | Asynchronous communication within a server arrangement |
US9038108B2 (en) * | 2000-06-28 | 2015-05-19 | Verizon Patent And Licensing Inc. | Method and system for providing end user community functionality for publication and delivery of digital media content |
AU2001271259A1 (en) * | 2000-06-28 | 2002-01-08 | Intertainer, Inc. | Intelligent media targeting system and method |
AU2001274655A1 (en) * | 2000-06-29 | 2002-01-08 | Wysetech Co., Ltd. | Distributed processing system and method for application programs |
US7225159B2 (en) * | 2000-06-30 | 2007-05-29 | Microsoft Corporation | Method for authenticating and securing integrated bookstore entries |
US20020046045A1 (en) * | 2000-06-30 | 2002-04-18 | Attila Narin | Architecture for an electronic shopping service integratable with a software application |
JP4774582B2 (en) * | 2000-06-30 | 2011-09-14 | ソニー株式会社 | Content management apparatus, content management method, and program storage medium |
US20080147564A1 (en) * | 2001-06-26 | 2008-06-19 | Tara Chand Singhal | Security in use of bankcards that protects bankcard data from merchant systems in a payment card system |
WO2002005061A2 (en) * | 2000-07-06 | 2002-01-17 | David Paul Felsher | Information record infrastructure, system and method |
JP4973899B2 (en) * | 2000-07-06 | 2012-07-11 | ソニー株式会社 | TRANSMISSION DEVICE, TRANSMISSION METHOD, RECEPTION DEVICE, RECEPTION METHOD, RECORDING MEDIUM, AND COMMUNICATION SYSTEM |
JP2002023628A (en) * | 2000-07-07 | 2002-01-23 | Fujitsu Ltd | Electronic trading transaction server, client for seller, client for purchaser, and electronic trading transaction method |
US6981252B1 (en) | 2000-07-14 | 2005-12-27 | Symantec Corporation | Method and apparatus for automatically uninstalling software on a network |
AU7593601A (en) * | 2000-07-14 | 2002-01-30 | Atabok Inc | Controlling and managing digital assets |
US7234062B2 (en) * | 2000-07-18 | 2007-06-19 | General Electric Company | Authentication of remote appliance messages using an embedded cryptographic device |
US20040148191A1 (en) * | 2000-07-21 | 2004-07-29 | Hoke Clare L | Digitized intellectual property archive with preferential method of transfer and routing |
US6535871B1 (en) * | 2000-07-24 | 2003-03-18 | Pitney Bowes Inc. | Method for searching a digital rights management package |
US20020049910A1 (en) * | 2000-07-25 | 2002-04-25 | Salomon Allen Michael | Unified trust model providing secure identification, authentication and validation of physical products and entities, and processing, storage and exchange of information |
WO2002009019A2 (en) * | 2000-07-25 | 2002-01-31 | Digimarc Corporation | Authentication watermarks for printed objects and related applications |
AU2001279312A1 (en) * | 2000-08-02 | 2002-02-13 | Ipass, Inc. | A method and system to customize and update a network connection application fordistribution to mulitple end users |
WO2002013094A1 (en) * | 2000-08-03 | 2002-02-14 | Digimarc Corporation | Linking from paper invoices and statements to on-line resources |
US7024552B1 (en) | 2000-08-04 | 2006-04-04 | Hewlett-Packard Development Company, L.P. | Location authentication of requests to a web server system linked to a physical entity |
US7343335B1 (en) * | 2000-08-08 | 2008-03-11 | Ebay Inc. | Method for managing group finances via an electronic network |
US7380270B2 (en) * | 2000-08-09 | 2008-05-27 | Telos Corporation | Enhanced system, method and medium for certifying and accrediting requirements compliance |
US6993448B2 (en) | 2000-08-09 | 2006-01-31 | Telos Corporation | System, method and medium for certifying and accrediting requirements compliance |
US6901346B2 (en) | 2000-08-09 | 2005-05-31 | Telos Corporation | System, method and medium for certifying and accrediting requirements compliance |
US6947557B1 (en) | 2000-08-14 | 2005-09-20 | International Business Machines Corporation | Method and program product for maintaining security of publicly distributed information |
CN1770299B (en) * | 2000-08-16 | 2012-12-12 | Uqe有限责任公司 | Method and device for controlling distribution and use of digital works. |
US6826546B1 (en) * | 2000-08-17 | 2004-11-30 | Ideaflood, Inc. | Method and system for licensing a copy of a copyright protected work |
GB0020441D0 (en) * | 2000-08-18 | 2000-10-04 | Hewlett Packard Co | Performance of a service on a computing platform |
US7747866B1 (en) | 2000-08-24 | 2010-06-29 | Jpmorgan Chase Bank, N.A. | System and method providing improved error detection related to transmission of data over a communication link |
US7010808B1 (en) | 2000-08-25 | 2006-03-07 | Microsoft Corporation | Binding digital content to a portable storage device or the like in a digital rights management (DRM) system |
US6931545B1 (en) * | 2000-08-28 | 2005-08-16 | Contentguard Holdings, Inc. | Systems and methods for integrity certification and verification of content consumption environments |
US7743259B2 (en) | 2000-08-28 | 2010-06-22 | Contentguard Holdings, Inc. | System and method for digital rights management using a standard rendering engine |
US7603319B2 (en) * | 2000-08-28 | 2009-10-13 | Contentguard Holdings, Inc. | Method and apparatus for preserving customer identity in on-line transactions |
FR2813409A1 (en) * | 2000-08-29 | 2002-03-01 | Canon Res Ct France Sa | Configuration of a peripheral for processing of electronic documents in a communication network, uses user data to access level of service available to that user on a network and prepares configuration from user data and service level data |
US7284008B2 (en) * | 2000-08-30 | 2007-10-16 | Kontera Technologies, Inc. | Dynamic document context mark-up technique implemented over a computer network |
JP4416294B2 (en) * | 2000-08-30 | 2010-02-17 | 富士通株式会社 | Advertising method and awareness server |
US7451099B2 (en) * | 2000-08-30 | 2008-11-11 | Kontera Technologies, Inc. | Dynamic document context mark-up technique implemented over a computer network |
US7478089B2 (en) * | 2003-10-29 | 2009-01-13 | Kontera Technologies, Inc. | System and method for real-time web page context analysis for the real-time insertion of textual markup objects and dynamic content |
US20020128878A1 (en) * | 2000-08-31 | 2002-09-12 | Maritzen L. Michael | Method and apparatus for consolidating billing information and paying suppliers on a network |
JP4556308B2 (en) * | 2000-08-31 | 2010-10-06 | ソニー株式会社 | Content distribution system, content distribution method, information processing apparatus, and program providing medium |
JP4655345B2 (en) * | 2000-08-31 | 2011-03-23 | ソニー株式会社 | Information processing apparatus, information processing method, and program providing medium |
JP2002175387A (en) * | 2000-09-01 | 2002-06-21 | Sony Computer Entertainment Inc | Utilization condition monitoring method and system for contents, computer program and recording medium |
US20020069156A1 (en) * | 2000-09-01 | 2002-06-06 | Kerry Adam | Electronic trading platform for agricultural commodities |
US7165175B1 (en) | 2000-09-06 | 2007-01-16 | Widevine Technologies, Inc. | Apparatus, system and method for selectively encrypting different portions of data sent over a network |
WO2002021853A2 (en) * | 2000-09-07 | 2002-03-14 | United States Postal Service | Data-driven management decision tool for total resource management |
US7689510B2 (en) | 2000-09-07 | 2010-03-30 | Sonic Solutions | Methods and system for use in network management of content |
US7072870B2 (en) * | 2000-09-08 | 2006-07-04 | Identrus, Llc | System and method for providing authorization and other services |
US6978375B1 (en) | 2000-09-08 | 2005-12-20 | International Business Machines Corporation | System and method for secure authentication of external software modules provided by third parties |
WO2002021408A1 (en) * | 2000-09-08 | 2002-03-14 | Tallent Guy S | System and method for transparently providing certificate validation and other services within an electronic transaction |
JP2002157437A (en) * | 2000-09-08 | 2002-05-31 | Nec Corp | Contents transaction method through network, contents transaction device, contents transaction system and program |
US6952485B1 (en) | 2000-09-11 | 2005-10-04 | Digimarc Corporation | Watermark encoding and decoding in imaging devices and imaging device interfaces |
AU2001290707A1 (en) * | 2000-09-12 | 2002-03-26 | Syndicast Corporation | System for transmitting syndicated programs over the internet |
US6993131B1 (en) * | 2000-09-12 | 2006-01-31 | Nokia Corporation | Method and system for managing rights in digital information over a network |
US8037492B2 (en) | 2000-09-12 | 2011-10-11 | Thomson Licensing | Method and system for video enhancement transport alteration |
US20020046350A1 (en) * | 2000-09-14 | 2002-04-18 | Lordemann David A. | Method and system for establishing an audit trail to protect objects distributed over a network |
US20020138446A1 (en) * | 2000-09-14 | 2002-09-26 | Thierry Antonin | System and method for providing security for financial services terminals with a document driven interface |
WO2002023798A1 (en) * | 2000-09-14 | 2002-03-21 | Probix, Inc. | System for protecting objects distributed over a network |
US20020032655A1 (en) * | 2000-09-14 | 2002-03-14 | Thierry Antonin | System and method for providing financial services terminals with a document driven interface |
US20020138431A1 (en) * | 2000-09-14 | 2002-09-26 | Thierry Antonin | System and method for providing supervision of a plurality of financial services terminals with a document driven interface |
US20080015982A1 (en) * | 2000-09-20 | 2008-01-17 | Jeremy Sokolic | Funds transfer method and system including payment enabled invoices |
US7383223B1 (en) * | 2000-09-20 | 2008-06-03 | Cashedge, Inc. | Method and apparatus for managing multiple accounts |
US8335855B2 (en) | 2001-09-19 | 2012-12-18 | Jpmorgan Chase Bank, N.A. | System and method for portal infrastructure tracking |
US20030236728A1 (en) * | 2000-09-20 | 2003-12-25 | Amir Sunderji | Method and apparatus for managing a financial transaction system |
US6724913B1 (en) * | 2000-09-21 | 2004-04-20 | Wen-Hsing Hsu | Digital watermarking |
US20020059100A1 (en) * | 2000-09-22 | 2002-05-16 | Jon Shore | Apparatus, systems and methods for customer specific receipt advertising |
US7237123B2 (en) * | 2000-09-22 | 2007-06-26 | Ecd Systems, Inc. | Systems and methods for preventing unauthorized use of digital content |
US7149722B1 (en) | 2000-09-28 | 2006-12-12 | Microsoft Corporation | Retail transactions involving distributed and super-distributed digital content in a digital rights management (DRM) system |
US7039615B1 (en) * | 2000-09-28 | 2006-05-02 | Microsoft Corporation | Retail transactions involving digital content in a digital rights management (DRM) system |
WO2002029666A1 (en) * | 2000-09-29 | 2002-04-11 | Frans Martin Coetzee | Method of and system for e-commerce security |
JP3755394B2 (en) * | 2000-09-29 | 2006-03-15 | 日本電気株式会社 | Electronic commerce audit system, electronic commerce audit method, and recording medium recording electronic commerce audit program |
US8027867B2 (en) * | 2000-10-03 | 2011-09-27 | Blenk Christopher W | System and method for decision of publishing literary work based on reviewer's satisfaction demographic factors |
JP2002108827A (en) * | 2000-10-03 | 2002-04-12 | Ntt Docomo Inc | Method for providing contents, equipment on providing side and equipment on using side |
US7240024B2 (en) * | 2000-10-10 | 2007-07-03 | Canon Kabushiki Kaisha | Method for remote execution of a function in a communication network |
HU226286B1 (en) * | 2000-10-17 | 2008-07-28 | Danubia I P Services Ltd | Attestation label system for marking and checking the legally correct nature of products and method for indicating the legalized status of such products brought into commerce |
WO2002033954A2 (en) | 2000-10-17 | 2002-04-25 | Digimarc Corporation | User control and activation of watermark enabled objects |
JP4714980B2 (en) * | 2000-10-17 | 2011-07-06 | ソニー株式会社 | Content receiving apparatus and content receiving method |
JP2002132585A (en) * | 2000-10-20 | 2002-05-10 | Sony Corp | Information recording apparatus, information reproducing apparatus, information recording medium, information recording method, information reproducing method, and program providing medium |
US20020091584A1 (en) * | 2000-10-25 | 2002-07-11 | Clark George Philip | Electronic content distribution |
US20020082939A1 (en) * | 2000-10-25 | 2002-06-27 | Clark George Phillip | Fulfilling a request for an electronic book |
US20020073177A1 (en) * | 2000-10-25 | 2002-06-13 | Clark George Philip | Processing content for electronic distribution using a digital rights management system |
US20020052799A1 (en) * | 2000-10-26 | 2002-05-02 | Vasiliy Starikov | Customized customer design, development and ordering system |
AU2001257208A1 (en) * | 2000-10-30 | 2002-05-15 | Mcafee.Com, Inc. | Wireless protocol information for marketing opportunities |
US7191442B2 (en) | 2000-10-30 | 2007-03-13 | Research Investment Network, Inc. | BCA writer serialization management |
US20030110132A1 (en) * | 2000-10-30 | 2003-06-12 | Yoichiro Sako | Content data, and its recording medium, recording method, recording apparatus, copying method, reproducing method, reproducing apparatus and output method |
US7333953B1 (en) | 2000-10-31 | 2008-02-19 | Wells Fargo Bank, N.A. | Method and apparatus for integrated payments processing and decisioning for internet transactions |
US8145567B2 (en) * | 2000-10-31 | 2012-03-27 | Wells Fargo Bank, N.A. | Transaction ID system and process |
US10915296B2 (en) | 2000-11-01 | 2021-02-09 | Flexiworld Technologies, Inc. | Information apparatus that includes a touch sensitive screen interface for managing or replying to e-mails |
US11204729B2 (en) | 2000-11-01 | 2021-12-21 | Flexiworld Technologies, Inc. | Internet based digital content services for pervasively providing protected digital content to smart devices based on having subscribed to the digital content service |
US11467856B2 (en) | 2002-12-12 | 2022-10-11 | Flexiworld Technologies, Inc. | Portable USB device for internet access service |
US10860290B2 (en) | 2000-11-01 | 2020-12-08 | Flexiworld Technologies, Inc. | Mobile information apparatuses that include a digital camera, a touch sensitive screen interface, support for voice activated commands, and a wireless communication chip or chipset supporting IEEE 802.11 |
US20150363763A1 (en) * | 2000-11-01 | 2015-12-17 | Flexiworld Technologies, Inc, | Mobile Information Apparatus That Includes A Secure Element Storing Payment Information And Using A Cryptographic Technique For Implementing Mobile Payment |
US6904410B1 (en) * | 2000-11-02 | 2005-06-07 | Haveneed.Com, Inc. | Online method and system for management of collectibles |
US7343324B2 (en) * | 2000-11-03 | 2008-03-11 | Contentguard Holdings Inc. | Method, system, and computer readable medium for automatically publishing content |
US6889209B1 (en) * | 2000-11-03 | 2005-05-03 | Shieldip, Inc. | Method and apparatus for protecting information and privacy |
US7398225B2 (en) * | 2001-03-29 | 2008-07-08 | American Express Travel Related Services Company, Inc. | System and method for networked loyalty program |
US7398226B2 (en) | 2000-11-06 | 2008-07-08 | American Express Travel Related Services Company, Inc. | System and method for networked loyalty program |
US7124114B1 (en) * | 2000-11-09 | 2006-10-17 | Macrovision Corporation | Method and apparatus for determining digital A/V content distribution terms based on detected piracy levels |
AU2001296667A1 (en) * | 2000-11-09 | 2002-05-21 | Macrovision Corporation | Method and apparatus for determining digital a/v content distribution terms based on detected piracy levels |
US6629822B2 (en) * | 2000-11-10 | 2003-10-07 | Parker Hannifin Corporation | Internally supercharged axial piston pump |
US20020143567A1 (en) * | 2000-11-20 | 2002-10-03 | Maritzen L. Michael | Information-based digital currency and bartering |
US7318086B2 (en) | 2000-11-20 | 2008-01-08 | Flexiworld Technologies, Inc. | System for mobile and pervasive output |
US20030036963A1 (en) * | 2000-11-20 | 2003-02-20 | Jeffrey Jacobson | Method and system for aggregating real estate information content in an on-line computing environment |
US7636687B2 (en) | 2000-11-20 | 2009-12-22 | General Electric Capital Corporation | Method and system for completing a lease for real property in an on-line computing environment |
US20020062218A1 (en) * | 2000-11-20 | 2002-05-23 | Carolyn Pianin | Method and system for providing property management services in an on-line computing evironment |
US7130810B2 (en) * | 2000-11-20 | 2006-10-31 | General Electrical Capital Corp | Method and system for property valuation in an on-line computing environment |
FI113898B (en) * | 2000-11-21 | 2004-06-30 | Nokia Corp | Process for producing content in a wireless communication device |
AU2002220402A1 (en) * | 2000-11-21 | 2002-06-03 | Margaret Hurley | System and method for transmitting goods, remuneration, and information |
US7043473B1 (en) | 2000-11-22 | 2006-05-09 | Widevine Technologies, Inc. | Media tracking system and method |
US20020099666A1 (en) * | 2000-11-22 | 2002-07-25 | Dryer Joseph E. | System for maintaining the security of client files |
US6938164B1 (en) * | 2000-11-22 | 2005-08-30 | Microsoft Corporation | Method and system for allowing code to be securely initialized in a computer |
US20020099800A1 (en) * | 2000-11-27 | 2002-07-25 | Robert Brainard | Data mark and recall system and method for a data stream |
GB2376763B (en) * | 2001-06-19 | 2004-12-15 | Hewlett Packard Co | Demonstrating integrity of a compartment of a compartmented operating system |
JP2002163382A (en) * | 2000-11-29 | 2002-06-07 | Fujitsu Ltd | Customizing method in asp service |
US7072867B2 (en) * | 2000-11-30 | 2006-07-04 | International Business Machines Corporation | System and method for third party logging server |
CA2358009A1 (en) * | 2000-11-30 | 2002-05-30 | Nortel Networks Limited | Method for facilitating a transaction involving a company with software assets |
US20070288394A1 (en) * | 2000-12-01 | 2007-12-13 | Carrott Richard F | Transactional security over a network |
US8260723B2 (en) | 2000-12-01 | 2012-09-04 | Carrott Richard F | Transactional security over a network |
US6839692B2 (en) * | 2000-12-01 | 2005-01-04 | Benedor Corporation | Method and apparatus to provide secure purchase transactions over a computer network |
US7856394B2 (en) * | 2000-12-05 | 2010-12-21 | Ubs Ag | Computer system and a method for managing a financial transaction |
US20020069176A1 (en) * | 2000-12-06 | 2002-06-06 | Daniel Newman | System for obtaining fee-based data and services |
US20020072931A1 (en) * | 2000-12-07 | 2002-06-13 | Ronald C. Card | System and method to provide financial rewards and other incentives to users of personal transaction devices |
US20080214300A1 (en) * | 2000-12-07 | 2008-09-04 | Igt | Methods for electronic data security and program authentication |
US6961567B1 (en) * | 2000-12-07 | 2005-11-01 | Palm, Inc. | Generic activation and registration framework for wireless devices |
US7251633B2 (en) * | 2000-12-11 | 2007-07-31 | Sony Corporation | Method or system for executing deferred transactions |
US20020123971A1 (en) * | 2000-12-11 | 2002-09-05 | Maritzen L. Michael | Method and system of conducting network-based transactions |
US7328186B2 (en) * | 2000-12-12 | 2008-02-05 | International Business Machines Corporation | Client account and information management system and method |
US7765163B2 (en) * | 2000-12-12 | 2010-07-27 | Sony Corporation | System and method for conducting secure transactions over a network |
US7150045B2 (en) * | 2000-12-14 | 2006-12-12 | Widevine Technologies, Inc. | Method and apparatus for protection of electronic media |
US7870592B2 (en) | 2000-12-14 | 2011-01-11 | Intertainer, Inc. | Method for interactive video content programming |
US20020083006A1 (en) * | 2000-12-14 | 2002-06-27 | Intertainer, Inc. | Systems and methods for delivering media content |
CA2328644C (en) * | 2000-12-15 | 2005-05-10 | Ibm Canada Limited-Ibm Canada Limitee | Methods, systems, signals and media for encouraging users of computer readable content to register |
US7266704B2 (en) * | 2000-12-18 | 2007-09-04 | Digimarc Corporation | User-friendly rights management systems and methods |
US8055899B2 (en) * | 2000-12-18 | 2011-11-08 | Digimarc Corporation | Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities |
US20020091645A1 (en) * | 2000-12-20 | 2002-07-11 | Kagemoto Tohyama | Software licensing system |
WO2002051063A1 (en) | 2000-12-21 | 2002-06-27 | Digimarc Corporation | Methods, apparatus and programs for generating and utilizing content signatures |
EP1217591B1 (en) * | 2000-12-21 | 2014-04-02 | Nokia Corporation | Improvements in and relating to the distribution of content |
WO2002052480A1 (en) * | 2000-12-22 | 2002-07-04 | Trac Medical Solutions, Inc. | Dynamic electronic chain-of-trust document with audit trail |
US20070156610A1 (en) * | 2000-12-25 | 2007-07-05 | Sony Corporation | Digital data processing apparatus and method, data reproducing terminal apparatus, data processing terminal apparatus, and terminal apparatus |
JP4081980B2 (en) * | 2000-12-26 | 2008-04-30 | ヤマハ株式会社 | Content providing service system, server device, and client device |
EP1219946A3 (en) * | 2000-12-28 | 2008-03-12 | Fuji Jukogyo Kabushiki Kaisha | Vehicle management system |
US7162429B1 (en) * | 2000-12-29 | 2007-01-09 | Bellsouth Intellectual Property Corporation | System and method for managing sponsorships |
US20020087662A1 (en) * | 2000-12-29 | 2002-07-04 | Stephane Bouet | System and method for selective updating of media files |
US6912294B2 (en) * | 2000-12-29 | 2005-06-28 | Contentguard Holdings, Inc. | Multi-stage watermarking process and system |
EP1220173A1 (en) * | 2000-12-29 | 2002-07-03 | THOMSON multimedia | System and method for the secure distribution of digital content in a sharing network |
US7107236B2 (en) * | 2001-01-02 | 2006-09-12 | ★Roaming Messenger, Inc. | Self-contained business transaction capsules |
WO2002077750A2 (en) * | 2001-01-04 | 2002-10-03 | 3Cx, Inc. | Authoring platform for synchronized multimedia presentation |
US7555571B1 (en) * | 2001-01-05 | 2009-06-30 | Palm, Inc. | Activation of mobile computing device on a cellular network |
US6920563B2 (en) | 2001-01-05 | 2005-07-19 | International Business Machines Corporation | System and method to securely store information in a recoverable manner on an untrusted system |
US20020128976A1 (en) * | 2001-01-11 | 2002-09-12 | Segue Software, Inc. | Method and system for tracking software licenses and usage |
US7606771B2 (en) * | 2001-01-11 | 2009-10-20 | Cardinalcommerce Corporation | Dynamic number authentication for credit/debit cards |
US20060269061A1 (en) * | 2001-01-11 | 2006-11-30 | Cardinalcommerce Corporation | Mobile device and method for dispensing authentication codes |
US7739195B2 (en) * | 2001-01-12 | 2010-06-15 | Acs State & Local Solutions, Inc. | Apparatus and methods for providing a payment system over a network |
JP4281252B2 (en) * | 2001-01-16 | 2009-06-17 | ソニー株式会社 | Information recording apparatus, information reproducing apparatus, information recording method, information reproducing method, information recording medium, and program storage medium |
US7529698B2 (en) * | 2001-01-16 | 2009-05-05 | Raymond Anthony Joao | Apparatus and method for providing transaction history information, account history information, and/or charge-back information |
US7028009B2 (en) * | 2001-01-17 | 2006-04-11 | Contentguardiholdings, Inc. | Method and apparatus for distributing enforceable property rights |
US7774279B2 (en) * | 2001-05-31 | 2010-08-10 | Contentguard Holdings, Inc. | Rights offering and granting |
US6754642B2 (en) * | 2001-05-31 | 2004-06-22 | Contentguard Holdings, Inc. | Method and apparatus for dynamically assigning usage rights to digital works |
US7206765B2 (en) * | 2001-01-17 | 2007-04-17 | Contentguard Holdings, Inc. | System and method for supplying and managing usage rights based on rules |
US8069116B2 (en) * | 2001-01-17 | 2011-11-29 | Contentguard Holdings, Inc. | System and method for supplying and managing usage rights associated with an item repository |
US20030220880A1 (en) | 2002-01-17 | 2003-11-27 | Contentguard Holdings, Inc. | Networked services licensing system and method |
US20020097417A1 (en) | 2001-01-19 | 2002-07-25 | Chang William Ho | System for universal data output |
US8458754B2 (en) | 2001-01-22 | 2013-06-04 | Sony Computer Entertainment Inc. | Method and system for providing instant start multimedia content |
GB2389688A (en) * | 2001-01-26 | 2003-12-17 | Shearman & Sterling Llp | Methods and systems for electronically representing records ofobligations |
US7174568B2 (en) * | 2001-01-31 | 2007-02-06 | Sony Computer Entertainment America Inc. | Method and system for securely distributing computer software products |
AU1547402A (en) * | 2001-02-09 | 2002-08-15 | Sony Corporation | Information processing method/apparatus and program |
AUPR321701A0 (en) * | 2001-02-20 | 2001-03-15 | Millard, Stephen R. | Method of licensing content on updatable digital media |
US7228342B2 (en) | 2001-02-20 | 2007-06-05 | Sony Computer Entertainment America Inc. | System for utilizing an incentive point system based on disc and user identification |
US20020116283A1 (en) * | 2001-02-20 | 2002-08-22 | Masayuki Chatani | System and method for transfer of disc ownership based on disc and user identification |
JP2002251478A (en) * | 2001-02-22 | 2002-09-06 | Hitachi Ltd | Electronic mall system |
EP1764734A1 (en) * | 2001-02-22 | 2007-03-21 | Sony Corporation | Content providing/obtaining system |
GB2372594B (en) * | 2001-02-23 | 2004-10-06 | Hewlett Packard Co | Trusted computing environment |
GB2372592B (en) | 2001-02-23 | 2005-03-30 | Hewlett Packard Co | Information system |
GB2372595A (en) * | 2001-02-23 | 2002-08-28 | Hewlett Packard Co | Method of and apparatus for ascertaining the status of a data processing environment. |
US7222101B2 (en) * | 2001-02-26 | 2007-05-22 | American Express Travel Related Services Company, Inc. | System and method for securing data through a PDA portal |
US20020120581A1 (en) * | 2001-02-26 | 2002-08-29 | Schiavone Vincent J. | Reply based electronic mail transactions |
WO2002069108A2 (en) * | 2001-02-26 | 2002-09-06 | Eprivacy Group, Inc. | System and method for controlling distribution of network communications |
US7584149B1 (en) | 2001-02-26 | 2009-09-01 | American Express Travel Related Services Company, Inc. | System and method for securing data through a PDA portal |
US7647411B1 (en) | 2001-02-26 | 2010-01-12 | Symantec Corporation | System and method for controlling distribution of network communications |
US20020120748A1 (en) * | 2001-02-26 | 2002-08-29 | Schiavone Vincent J. | Method and apparatus for selective delivery and forwarding of electronic mail |
US8467502B2 (en) | 2001-02-27 | 2013-06-18 | Verizon Data Services Llc | Interactive assistant for managing telephone communications |
US8873730B2 (en) | 2001-02-27 | 2014-10-28 | Verizon Patent And Licensing Inc. | Method and apparatus for calendared communications flow control |
US8751571B2 (en) | 2001-02-27 | 2014-06-10 | Verizon Data Services Llc | Methods and systems for CPN triggered collaboration |
US7418090B2 (en) | 2002-11-25 | 2008-08-26 | Telesector Resources Group Inc. | Methods and systems for conference call buffering |
US8774380B2 (en) * | 2001-02-27 | 2014-07-08 | Verizon Patent And Licensing Inc. | Methods and systems for call management with user intervention |
US8761363B2 (en) | 2001-02-27 | 2014-06-24 | Verizon Data Services Llc | Methods and systems for automatic forwarding of communications to a preferred device |
US8122119B1 (en) | 2001-02-27 | 2012-02-21 | Flowcharge, Inc. | Non-resident metering and billing system for applications and devices |
US8798251B2 (en) | 2001-02-27 | 2014-08-05 | Verizon Data Services Llc | Methods and systems for computer enhanced conference calling |
US8750482B2 (en) * | 2001-02-27 | 2014-06-10 | Verizon Data Services Llc | Methods and systems for preemptive rejection of calls |
US20020124190A1 (en) * | 2001-03-01 | 2002-09-05 | Brian Siegel | Method and system for restricted biometric access to content of packaged media |
US7197160B2 (en) * | 2001-03-05 | 2007-03-27 | Digimarc Corporation | Geographic information systems using digital watermarks |
US7098931B2 (en) * | 2001-03-05 | 2006-08-29 | Digimarc Corporation | Image management system and methods using digital watermarks |
US20020128061A1 (en) * | 2001-03-09 | 2002-09-12 | Blanco Victor Keith | Method and apparatus for restricting access to content in a gaming system |
US20020128928A1 (en) * | 2001-03-09 | 2002-09-12 | Hiroshi Sukegawa | Music distribution method for distributing production such as music, server used for said music distribution method, and music reproduction apparatus |
US20020128068A1 (en) * | 2001-03-09 | 2002-09-12 | Randall Whitten Jon Marcus | Method and apparatus for managing data in a gaming system |
US20020128067A1 (en) * | 2001-03-09 | 2002-09-12 | Victor Keith Blanco | Method and apparatus for creating and playing soundtracks in a gaming system |
US20020137565A1 (en) * | 2001-03-09 | 2002-09-26 | Blanco Victor K. | Uniform media portal for a gaming system |
US7218739B2 (en) * | 2001-03-09 | 2007-05-15 | Microsoft Corporation | Multiple user authentication for online console-based gaming |
US7769374B2 (en) * | 2001-03-12 | 2010-08-03 | Son Phan-Anh | Recovery techniques in mobile networks |
US20020128935A1 (en) * | 2001-03-12 | 2002-09-12 | Smart Mediary Systems, Llc | Many-to-many mediated commercial electronic publishing |
US7313822B2 (en) * | 2001-03-16 | 2007-12-25 | Protegrity Corporation | Application-layer security method and system |
US7882555B2 (en) * | 2001-03-16 | 2011-02-01 | Kavado, Inc. | Application layer security method and system |
US7305354B2 (en) * | 2001-03-20 | 2007-12-04 | Lightsurf,Technologies, Inc. | Media asset management system |
WO2002075622A2 (en) * | 2001-03-20 | 2002-09-26 | Abraham Blau | System and method for item exchange |
US20020138576A1 (en) * | 2001-03-21 | 2002-09-26 | Schleicher Jorg Gregor | Method and system for generating revenue in a peer-to-peer file delivery network |
US7653552B2 (en) * | 2001-03-21 | 2010-01-26 | Qurio Holdings, Inc. | Digital file marketplace |
US20020138396A1 (en) * | 2001-03-21 | 2002-09-26 | Brown A. Demetrius | Methods and apparatus for exchanging ferrous, non-ferrous and platinum group metals |
US20040133745A1 (en) | 2002-10-28 | 2004-07-08 | Quicksilver Technology, Inc. | Adaptable datapath for a digital processing system |
US7752419B1 (en) | 2001-03-22 | 2010-07-06 | Qst Holdings, Llc | Method and system for managing hardware resources to implement system functions using an adaptive computing architecture |
US6836839B2 (en) | 2001-03-22 | 2004-12-28 | Quicksilver Technology, Inc. | Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements |
US7653710B2 (en) | 2002-06-25 | 2010-01-26 | Qst Holdings, Llc. | Hardware task manager |
US7962716B2 (en) | 2001-03-22 | 2011-06-14 | Qst Holdings, Inc. | Adaptive integrated circuitry with heterogeneous and reconfigurable matrices of diverse and adaptive computational units having fixed, application specific computational elements |
US20020178207A1 (en) * | 2001-03-22 | 2002-11-28 | Mcneil Donald H. | Ultra-modular processor in lattice topology |
US7181017B1 (en) | 2001-03-23 | 2007-02-20 | David Felsher | System and method for secure three-party communications |
US7401054B1 (en) * | 2001-03-26 | 2008-07-15 | Accenture Gmbh | Content bank for objects |
US20020174236A1 (en) * | 2001-03-26 | 2002-11-21 | Sanjay Mathur | Methods and apparatus for processing data in a content network |
GB2373885A (en) * | 2001-03-28 | 2002-10-02 | World Information On Net | A data processing system enabling users to access services without need of specifying payment means direct to each service provider |
US7512986B2 (en) * | 2001-03-28 | 2009-03-31 | Nds Limited | Digital rights management system and method |
WO2003038695A1 (en) * | 2001-03-28 | 2003-05-08 | Vidius Inc. | Method and system for creation, management and analysis of distribution syndicates |
US20030182236A1 (en) * | 2001-03-29 | 2003-09-25 | Koichi Tanaka | Information processor |
KR100911282B1 (en) * | 2001-03-29 | 2009-08-11 | 소니 가부시끼 가이샤 | Information processing apparatus |
US6925469B2 (en) * | 2001-03-30 | 2005-08-02 | Intertainer, Inc. | Digital entertainment service platform |
US20020143647A1 (en) * | 2001-03-30 | 2002-10-03 | Intertainer, Inc. | Subscriber management system |
US20020144283A1 (en) * | 2001-03-30 | 2002-10-03 | Intertainer, Inc. | Content distribution system |
US7107249B2 (en) * | 2001-03-31 | 2006-09-12 | First Data Corporation | Electronic identifier payment systems and methods |
US8438465B2 (en) * | 2001-04-03 | 2013-05-07 | Purdue Pharma L.P. | Privileged communication system with routing controls |
US20020147766A1 (en) * | 2001-04-04 | 2002-10-10 | Marko Vanska | Operating user profiles with distributed profile model using a hybrid terminal |
US7580988B2 (en) * | 2001-04-05 | 2009-08-25 | Intertrust Technologies Corporation | System and methods for managing the distribution of electronic content |
US20030187798A1 (en) * | 2001-04-16 | 2003-10-02 | Mckinley Tyler J. | Digital watermarking methods, programs and apparatus |
US7500075B1 (en) * | 2001-04-17 | 2009-03-03 | Rambus Inc. | Mechanism for enabling full data bus utilization without increasing data granularity |
US7469341B2 (en) * | 2001-04-18 | 2008-12-23 | Ipass Inc. | Method and system for associating a plurality of transaction data records generated in a service access system |
US7921290B2 (en) * | 2001-04-18 | 2011-04-05 | Ipass Inc. | Method and system for securely authenticating network access credentials for users |
US20030065919A1 (en) * | 2001-04-18 | 2003-04-03 | Albert Roy David | Method and system for identifying a replay attack by an access device to a computer system |
US7188342B2 (en) * | 2001-04-20 | 2007-03-06 | Microsoft Corporation | Server controlled branding of client software deployed over computer networks |
US8849716B1 (en) | 2001-04-20 | 2014-09-30 | Jpmorgan Chase Bank, N.A. | System and method for preventing identity theft or misuse by restricting access |
US7136840B2 (en) | 2001-04-20 | 2006-11-14 | Intertrust Technologies Corp. | Systems and methods for conducting transactions and communications using a trusted third party |
US20020156726A1 (en) * | 2001-04-23 | 2002-10-24 | Kleckner James E. | Using digital signatures to streamline the process of amending financial transactions |
US20020184208A1 (en) * | 2001-04-24 | 2002-12-05 | Saul Kato | System and method for dynamically generating content on a portable computing device |
US6842433B2 (en) | 2001-04-24 | 2005-01-11 | Wideray Corporation | System and method for communicating information from a computerized distributor to portable computing devices |
US7072975B2 (en) * | 2001-04-24 | 2006-07-04 | Wideray Corporation | Apparatus and method for communicating information to portable computing devices |
WO2002086688A1 (en) * | 2001-04-25 | 2002-10-31 | Ndchealth Corporation | Systems and methods for processing claims in real-time |
US7046819B2 (en) * | 2001-04-25 | 2006-05-16 | Digimarc Corporation | Encoded reference signal for digital watermarks |
WO2002088997A1 (en) * | 2001-04-26 | 2002-11-07 | Newsgrade Corporation | Dynamic generation of personalized presentations of domain-specific information content |
WO2002088968A1 (en) * | 2001-04-30 | 2002-11-07 | Ctx Corporation | Apparatus and method for network analysis |
US20100027430A1 (en) * | 2001-04-30 | 2010-02-04 | Netwitness Corporation | Apparatus and Method for Network Analysis |
US20020162106A1 (en) * | 2001-04-30 | 2002-10-31 | Pickover Clifford Alan | Method and system for information insertion |
JP2004530210A (en) * | 2001-04-30 | 2004-09-30 | ノキア コーポレイション | Improvements in content delivery |
WO2002091181A2 (en) * | 2001-05-04 | 2002-11-14 | Koninklijke Philips Electronics N.V. | Method for charging information about an error in a database |
US8812398B2 (en) * | 2001-05-08 | 2014-08-19 | Qualcomm Incorporated | Key for a wireless-enabled device |
US6577678B2 (en) | 2001-05-08 | 2003-06-10 | Quicksilver Technology | Method and system for reconfigurable channel coding |
WO2002091146A2 (en) * | 2001-05-09 | 2002-11-14 | Ecd Systems, Inc. | Systems and methods for the prevention of unauthorized use and manipulation of digital content |
US20020169963A1 (en) * | 2001-05-10 | 2002-11-14 | Seder Phillip Andrew | Digital watermarking apparatus, systems and methods |
JP3719654B2 (en) * | 2001-05-10 | 2005-11-24 | 松下電器産業株式会社 | LSI test method |
US20020169721A1 (en) * | 2001-05-10 | 2002-11-14 | Cooley William Ray | Digital watermarking apparatus, systems and methods |
US7249029B2 (en) * | 2001-05-16 | 2007-07-24 | The Mechanical Copyright Protection Society Limited | Method of using a computerised administration system to administer licensing of use of copyright material |
US6944770B2 (en) | 2001-05-17 | 2005-09-13 | Intelli-Mark Technologies, Inc. | Methods and systems for generating and validating value-bearing documents |
US20030043852A1 (en) * | 2001-05-18 | 2003-03-06 | Bijan Tadayon | Method and apparatus for verifying data integrity based on data compression parameters |
US7340438B2 (en) | 2001-05-21 | 2008-03-04 | Nokia Corporation | Method and apparatus for managing and enforcing user privacy |
US6678516B2 (en) | 2001-05-21 | 2004-01-13 | Nokia Corporation | Method, system, and apparatus for providing services in a privacy enabled mobile and Ubicom environment |
WO2002095748A2 (en) | 2001-05-22 | 2002-11-28 | Koninklijke Philips Electronics N.V. | Record carrier with hidden channel |
JP3546232B2 (en) * | 2001-05-25 | 2004-07-21 | 佐賀大学長 | Teaching material utilization system and method |
KR20040007621A (en) * | 2001-05-29 | 2004-01-24 | 마쯔시다덴기산교 가부시키가이샤 | Rights management unit |
US8275709B2 (en) * | 2001-05-31 | 2012-09-25 | Contentguard Holdings, Inc. | Digital rights management of content when content is a future live event |
US20030009424A1 (en) * | 2001-05-31 | 2003-01-09 | Contentguard Holdings, Inc. | Method for managing access and use of resources by verifying conditions and conditions for use therewith |
US8001053B2 (en) * | 2001-05-31 | 2011-08-16 | Contentguard Holdings, Inc. | System and method for rights offering and granting using shared state variables |
US8099364B2 (en) * | 2001-05-31 | 2012-01-17 | Contentguard Holdings, Inc. | Digital rights management of content when content is a future live event |
US7222104B2 (en) * | 2001-05-31 | 2007-05-22 | Contentguard Holdings, Inc. | Method and apparatus for transferring usage rights and digital work having transferrable usage rights |
US8275716B2 (en) | 2001-05-31 | 2012-09-25 | Contentguard Holdings, Inc. | Method and system for subscription digital rights management |
US6895503B2 (en) | 2001-05-31 | 2005-05-17 | Contentguard Holdings, Inc. | Method and apparatus for hierarchical assignment of rights to documents and documents having such rights |
US6876984B2 (en) | 2001-05-31 | 2005-04-05 | Contentguard Holdings, Inc. | Method and apparatus for establishing usage rights for digital content to be created in the future |
US7152046B2 (en) * | 2001-05-31 | 2006-12-19 | Contentguard Holdings, Inc. | Method and apparatus for tracking status of resource in a system for managing use of the resources |
US20020184291A1 (en) * | 2001-05-31 | 2002-12-05 | Hogenauer Eugene B. | Method and system for scheduling in an adaptable computing engine |
US7725401B2 (en) * | 2001-05-31 | 2010-05-25 | Contentguard Holdings, Inc. | Method and apparatus for establishing usage rights for digital content to be created in the future |
JP2002358239A (en) * | 2001-06-04 | 2002-12-13 | Fuji Electric Co Ltd | Copyright protection system |
US20020184153A1 (en) * | 2001-06-05 | 2002-12-05 | De Vries Jean Pierre | System and method for sharing matched interests without disclosing non-shared interests |
US7124303B2 (en) * | 2001-06-06 | 2006-10-17 | Sony Corporation | Elementary stream partial encryption |
US7426494B2 (en) * | 2001-06-06 | 2008-09-16 | Matsushita Electric Industrial Co., Ltd. | Rental system |
US7895616B2 (en) | 2001-06-06 | 2011-02-22 | Sony Corporation | Reconstitution of program streams split across multiple packet identifiers |
DE10127558A1 (en) * | 2001-06-06 | 2002-12-12 | Philips Corp Intellectual Pty | Operation of interface systems, such as text synthesis systems, for provision of information to a user in synthesized speech or gesture format where a user profile can be used to match output to user preferences |
US7395245B2 (en) * | 2001-06-07 | 2008-07-01 | Matsushita Electric Industrial Co., Ltd. | Content usage management system and server used in the system |
US7774280B2 (en) | 2001-06-07 | 2010-08-10 | Contentguard Holdings, Inc. | System and method for managing transfer of rights using shared state variables |
EP1323018A4 (en) * | 2001-06-07 | 2004-07-07 | Contentguard Holdings Inc | Protected content distribution system |
JP2004530222A (en) * | 2001-06-07 | 2004-09-30 | コンテントガード ホールディングズ インコーポレイテッド | Method and apparatus for supporting multiple zones of trust in a digital rights management system |
WO2003007213A1 (en) * | 2001-06-07 | 2003-01-23 | Contentguard Holdings, Inc. | Method and apparatus managing the transfer of rights |
WO2002099598A2 (en) | 2001-06-07 | 2002-12-12 | First Usa Bank, N.A. | System and method for rapid updating of credit information |
JP2003058180A (en) * | 2001-06-08 | 2003-02-28 | Matsushita Electric Ind Co Ltd | Synthetic voice sales system and phoneme copyright authentication system |
US7581103B2 (en) | 2001-06-13 | 2009-08-25 | Intertrust Technologies Corporation | Software self-checking systems and methods |
US20020194128A1 (en) * | 2001-06-14 | 2002-12-19 | Michael Maritzen | System and method for secure reverse payment |
KR100430158B1 (en) * | 2001-06-18 | 2004-05-04 | 지은묵 | A contents consignment sale system of the internet broadcasting and a method thereof |
US7962962B2 (en) * | 2001-06-19 | 2011-06-14 | International Business Machines Corporation | Using an object model to improve handling of personally identifiable information |
GB2376762A (en) * | 2001-06-19 | 2002-12-24 | Hewlett Packard Co | Renting a computing environment on a trusted computing platform |
US7603317B2 (en) * | 2001-06-19 | 2009-10-13 | International Business Machines Corporation | Using a privacy agreement framework to improve handling of personally identifiable information |
GB2376764B (en) * | 2001-06-19 | 2004-12-29 | Hewlett Packard Co | Multiple trusted computing environments |
US7979914B2 (en) * | 2001-06-25 | 2011-07-12 | Audible, Inc. | Time-based digital content authorization |
JP2004536504A (en) | 2001-06-25 | 2004-12-02 | ジェイピー・モーガン・チェイス・バンク | Electronic merchandise voucher and system and method for issuing electronic merchandise vouchers |
CA2351898A1 (en) * | 2001-06-26 | 2002-12-26 | Predrag Zivic | Information security model |
US8972862B2 (en) | 2001-06-27 | 2015-03-03 | Verizon Patent And Licensing Inc. | Method and system for providing remote digital media ingest with centralized editorial control |
US7970260B2 (en) * | 2001-06-27 | 2011-06-28 | Verizon Business Global Llc | Digital media asset management system and method for supporting multiple users |
US7239708B2 (en) | 2001-06-27 | 2007-07-03 | Microsoft Corporation | Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client |
US20060236221A1 (en) * | 2001-06-27 | 2006-10-19 | Mci, Llc. | Method and system for providing digital media management using templates and profiles |
US6948073B2 (en) | 2001-06-27 | 2005-09-20 | Microsoft Corporation | Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client |
US20070089151A1 (en) * | 2001-06-27 | 2007-04-19 | Mci, Llc. | Method and system for delivery of digital media experience via common instant communication clients |
US8990214B2 (en) * | 2001-06-27 | 2015-03-24 | Verizon Patent And Licensing Inc. | Method and system for providing distributed editing and storage of digital media over a network |
US7346560B1 (en) * | 2001-06-29 | 2008-03-18 | I2 Technologies Us, Inc. | Protecting content from unauthorized reproduction |
EP2276247A3 (en) * | 2001-06-29 | 2014-04-09 | Sony Corporation | Information supply system, information supply device and method, and information processing device and method |
US7130829B2 (en) * | 2001-06-29 | 2006-10-31 | International Business Machines Corporation | Digital rights management |
FR2827105A1 (en) * | 2001-07-03 | 2003-01-10 | Netquartz | PERSONALIZED COMMUNICATION METHOD RELATING TO DIFFERENT COMPUTER APPLICATIONS AND CORRESPONDING PROGRAM PRODUCT |
US8122465B2 (en) * | 2001-07-05 | 2012-02-21 | Digimarc Corporation | Watermarking to set video usage permissions |
US7069330B1 (en) * | 2001-07-05 | 2006-06-27 | Mcafee, Inc. | Control of interaction between client computer applications and network resources |
US7237121B2 (en) * | 2001-09-17 | 2007-06-26 | Texas Instruments Incorporated | Secure bootloader for securing digital devices |
US7421411B2 (en) * | 2001-07-06 | 2008-09-02 | Nokia Corporation | Digital rights management in a mobile communications environment |
US7505760B2 (en) * | 2001-07-06 | 2009-03-17 | Nokia Corporation | Method and apparatus for the superdistribution of content in a network including stationary and mobile stations |
US7266839B2 (en) | 2001-07-12 | 2007-09-04 | J P Morgan Chase Bank | System and method for providing discriminated content to network users |
JP2003030438A (en) * | 2001-07-13 | 2003-01-31 | Hitachi Ltd | Method for processing loan application in electronic commercial transaction system |
US7523066B2 (en) * | 2001-07-20 | 2009-04-21 | General Electric Captical Corporation | Apparatus and method for facilitating communication for borrowers and investors regarding commercial mortgages |
US7188085B2 (en) | 2001-07-20 | 2007-03-06 | International Business Machines Corporation | Method and system for delivering encrypted content with associated geographical-based advertisements |
US7249107B2 (en) * | 2001-07-20 | 2007-07-24 | Microsoft Corporation | Redistribution of rights-managed content |
GB2378013A (en) * | 2001-07-27 | 2003-01-29 | Hewlett Packard Co | Trusted computer platform audit system |
EP1282023A1 (en) * | 2001-07-30 | 2003-02-05 | Hewlett-Packard Company | Trusted platform evaluation |
KR20010088917A (en) * | 2001-07-30 | 2001-09-29 | 최종욱 | Method of protecting digital information and system thereof |
GB2378274A (en) * | 2001-07-31 | 2003-02-05 | Hewlett Packard Co | Distributing electronic content |
GB2378272A (en) * | 2001-07-31 | 2003-02-05 | Hewlett Packard Co | Method and apparatus for locking an application within a trusted environment |
US8515773B2 (en) * | 2001-08-01 | 2013-08-20 | Sony Corporation | System and method for enabling distribution and brokering of content information |
US20030188160A1 (en) * | 2001-08-02 | 2003-10-02 | Singam Sunder | Method and system to securely update files via a network |
US7761606B2 (en) * | 2001-08-02 | 2010-07-20 | Ipass Inc. | Method and system to secure a connection application for distribution to multiple end-users |
US20030033354A1 (en) * | 2001-08-08 | 2003-02-13 | Schulz Kenneth Joseph | System and method for caching entitlement sets |
US20030046112A1 (en) * | 2001-08-09 | 2003-03-06 | International Business Machines Corporation | Method of providing medical financial information |
WO2003019331A2 (en) * | 2001-08-24 | 2003-03-06 | American Bio Medica Corporation | Method of conducting and documenting analyte screening tests |
JP2005525714A (en) * | 2001-08-24 | 2005-08-25 | ヴァーチャル ペイパー イーメディア ソリューションズ ゲームーベーハー | Digital content distribution, advertisement, payment, refund method and apparatus. |
US20030188175A1 (en) * | 2001-08-27 | 2003-10-02 | Volk Steven B. | System and method for identifying vendors of hidden content |
JP3729106B2 (en) * | 2001-08-31 | 2005-12-21 | 日本電気株式会社 | Content distribution system and content distribution method used therefor |
EP1425680A4 (en) * | 2001-08-31 | 2006-05-03 | Trac Medical Solutions Inc | System for interactive processing of form documents |
US20040015382A1 (en) * | 2001-09-06 | 2004-01-22 | Baca Dennis M. | Data-driven management decision tool for total resource management |
WO2003023727A1 (en) * | 2001-09-06 | 2003-03-20 | Nokia Corporation | A method and network element for paying by a mobile terminal through a communication network |
US7171434B2 (en) * | 2001-09-07 | 2007-01-30 | Network Appliance, Inc. | Detecting unavailability of primary central processing element, each backup central processing element associated with a group of virtual logic units and quiescing I/O operations of the primary central processing element in a storage virtualization system |
US7313545B2 (en) * | 2001-09-07 | 2007-12-25 | First Data Corporation | System and method for detecting fraudulent calls |
US7472231B1 (en) | 2001-09-07 | 2008-12-30 | Netapp, Inc. | Storage area network data cache |
US20050021467A1 (en) * | 2001-09-07 | 2005-01-27 | Robert Franzdonk | Distributed digital rights network (drn), and methods to access operate and implement the same |
US8412633B2 (en) * | 2002-03-04 | 2013-04-02 | The Western Union Company | Money transfer evaluation systems and methods |
US20030050892A1 (en) * | 2001-09-07 | 2003-03-13 | Efunds Corporation | Electronic point-of-sale check processing method and system |
US20030051172A1 (en) * | 2001-09-13 | 2003-03-13 | Lordemann David A. | Method and system for protecting digital objects distributed over a network |
US7103576B2 (en) * | 2001-09-21 | 2006-09-05 | First Usa Bank, Na | System for providing cardless payment |
US8041803B2 (en) * | 2001-09-26 | 2011-10-18 | Qurio Holdings, Inc. | Method and system for delivering files in digital file marketplace |
AU2002343452A1 (en) * | 2001-09-28 | 2003-04-07 | Acs State And Local Solutions, Inc. | Apparatus and methods for providing a national portal for electronic services |
US8271776B2 (en) * | 2001-10-03 | 2012-09-18 | Hewlett-Packard Development Company, L.P. | Mobile printing |
US9817983B2 (en) | 2001-10-03 | 2017-11-14 | Hewlett-Packard Development Company, L.P. | Mobile Printing |
US20030069875A1 (en) * | 2001-10-05 | 2003-04-10 | Rechtsteiner Mark Joseph | Web enabled system for component hardware repair collaboration and material replacement |
US7506053B1 (en) * | 2001-10-17 | 2009-03-17 | Cisco Technology, Inc. | Software distribution system and method |
JP2003242714A (en) * | 2001-10-24 | 2003-08-29 | Fuji Electric Co Ltd | Information recording medium, manufacturing method therefor, information processor and copyright management system |
US20030083996A1 (en) * | 2001-10-25 | 2003-05-01 | Todd Fischer | Secure remote printing via a communication network |
GB2382439B (en) * | 2001-10-26 | 2004-11-03 | Qonnectis Group Ltd | Internet based data communication system |
US8732566B2 (en) * | 2006-11-29 | 2014-05-20 | Omtool, Ltd. | Methods and apparatus for digital content handling |
US8904270B2 (en) * | 2006-11-29 | 2014-12-02 | Omtool Ltd. | Methods and apparatus for enterprise document distribution |
CA2466071C (en) * | 2001-11-01 | 2016-04-12 | Bank One, Delaware, N.A. | System and method for establishing or modifying an account with user selectable terms |
US8250025B2 (en) * | 2001-11-06 | 2012-08-21 | Business Controls, Inc. | Anonymous reporting system |
JP2005301321A (en) * | 2001-11-08 | 2005-10-27 | Ntt Docomo Inc | Information delivery apparatus, information processing terminal, method for storing content externaly, method for outputting content externally, content describing output permission level, and content output control program |
US7428638B1 (en) | 2001-11-13 | 2008-09-23 | Microsoft Corporation | Architecture for manufacturing authenticatable gaming systems |
US7203835B2 (en) * | 2001-11-13 | 2007-04-10 | Microsoft Corporation | Architecture for manufacturing authenticatable gaming systems |
JP2003150833A (en) * | 2001-11-13 | 2003-05-23 | Sony Corp | Information processing device and method, information processing system and method, and program |
KR100947152B1 (en) | 2001-11-15 | 2010-03-12 | 소니 주식회사 | System and method for controlling the use and duplication of digital content distributed on removable media |
CA2467349A1 (en) * | 2001-11-16 | 2003-05-22 | Koninklijke Philips Electronics N.V. | Fingerprint database updating method, client and server |
US7159240B2 (en) * | 2001-11-16 | 2007-01-02 | Microsoft Corporation | Operating system upgrades in a trusted operating system environment |
JP2003150456A (en) * | 2001-11-16 | 2003-05-23 | Hitachi Ltd | Information processor, information processing method, program and recording medium |
US7243230B2 (en) | 2001-11-16 | 2007-07-10 | Microsoft Corporation | Transferring application secrets in a trusted operating system environment |
US7137004B2 (en) * | 2001-11-16 | 2006-11-14 | Microsoft Corporation | Manifest-based trusted agent management in a trusted operating system environment |
EP1485833A4 (en) | 2001-11-20 | 2005-10-12 | Contentguard Holdings Inc | An extensible rights expression processing system |
US7974923B2 (en) * | 2001-11-20 | 2011-07-05 | Contentguard Holdings, Inc. | Extensible rights expression processing system |
US7904804B1 (en) | 2001-11-20 | 2011-03-08 | Vignette Software Llc | System and method for web sites in hierarchical relationship to share assets |
US7840488B2 (en) * | 2001-11-20 | 2010-11-23 | Contentguard Holdings, Inc. | System and method for granting access to an item or permission to use an item based on configurable conditions |
US20030149962A1 (en) * | 2001-11-21 | 2003-08-07 | Willis John Christopher | Simulation of designs using programmable processors and electronically re-configurable logic arrays |
US20030120938A1 (en) * | 2001-11-27 | 2003-06-26 | Miki Mullor | Method of securing software against reverse engineering |
US7046635B2 (en) | 2001-11-28 | 2006-05-16 | Quicksilver Technology, Inc. | System for authorizing functionality in adaptable hardware devices |
US20030105707A1 (en) * | 2001-11-30 | 2003-06-05 | Yves Audebert | Financial risk management system and method |
US6986021B2 (en) | 2001-11-30 | 2006-01-10 | Quick Silver Technology, Inc. | Apparatus, method, system and executable module for configuration and operation of adaptive integrated circuitry having fixed, application specific computational elements |
US8412915B2 (en) | 2001-11-30 | 2013-04-02 | Altera Corporation | Apparatus, system and method for configuration of adaptive integrated circuitry having heterogeneous computational elements |
US7987501B2 (en) | 2001-12-04 | 2011-07-26 | Jpmorgan Chase Bank, N.A. | System and method for single session sign-on |
US20040162762A1 (en) * | 2001-12-05 | 2004-08-19 | Rubin Owen Robert | Consumer product distribution in the embedded system market with structure to increase revenue potential |
US7644279B2 (en) * | 2001-12-05 | 2010-01-05 | Nvidia Corporation | Consumer product distribution in the embedded system market |
US7587695B2 (en) * | 2001-12-10 | 2009-09-08 | Mentor Graphics Corporation | Protection boundaries in a parallel printed circuit board design environment |
EP1451732A4 (en) * | 2001-12-10 | 2007-08-08 | Mentor Graphics Corp | Parallel electronic design automation: shared simultaneous editing |
US8001052B2 (en) * | 2001-12-10 | 2011-08-16 | Dunkeld Bryan C | System and method for unique digital asset identification and transaction management |
US7516435B2 (en) * | 2001-12-10 | 2009-04-07 | Mentor Graphics Corporation | Reservation of design elements in a parallel printed circuit board design environment |
KR100425313B1 (en) * | 2001-12-11 | 2004-03-30 | 삼성전자주식회사 | Method for setting TV environment through user authentification and apparatus thereof |
US7653814B2 (en) * | 2001-12-11 | 2010-01-26 | International Business Machines Corporation | System and method for securely hyperlinking graphic objects |
US7478418B2 (en) | 2001-12-12 | 2009-01-13 | Guardian Data Storage, Llc | Guaranteed delivery of changes to security policies in a distributed system |
US10360545B2 (en) | 2001-12-12 | 2019-07-23 | Guardian Data Storage, Llc | Method and apparatus for accessing secured electronic data off-line |
US7930756B1 (en) | 2001-12-12 | 2011-04-19 | Crocker Steven Toye | Multi-level cryptographic transformations for securing digital assets |
US8065713B1 (en) | 2001-12-12 | 2011-11-22 | Klimenty Vainstein | System and method for providing multi-location access management to secured items |
US7681034B1 (en) | 2001-12-12 | 2010-03-16 | Chang-Ping Lee | Method and apparatus for securing electronic data |
USRE41546E1 (en) | 2001-12-12 | 2010-08-17 | Klimenty Vainstein | Method and system for managing security tiers |
US7783765B2 (en) * | 2001-12-12 | 2010-08-24 | Hildebrand Hal S | System and method for providing distributed access control to secured documents |
US8006280B1 (en) | 2001-12-12 | 2011-08-23 | Hildebrand Hal S | Security system for generating keys from access rules in a decentralized manner and methods therefor |
US7562232B2 (en) * | 2001-12-12 | 2009-07-14 | Patrick Zuili | System and method for providing manageability to security information for secured items |
US7565683B1 (en) | 2001-12-12 | 2009-07-21 | Weiqing Huang | Method and system for implementing changes to security policies in a distributed security system |
US7921284B1 (en) | 2001-12-12 | 2011-04-05 | Gary Mark Kinghorn | Method and system for protecting electronic data in enterprise environment |
US7921288B1 (en) | 2001-12-12 | 2011-04-05 | Hildebrand Hal S | System and method for providing different levels of key security for controlling access to secured items |
US7631184B2 (en) * | 2002-05-14 | 2009-12-08 | Nicholas Ryan | System and method for imposing security on copies of secured items |
US7921450B1 (en) | 2001-12-12 | 2011-04-05 | Klimenty Vainstein | Security system using indirect key generation from access rules and methods therefor |
US7178033B1 (en) | 2001-12-12 | 2007-02-13 | Pss Systems, Inc. | Method and apparatus for securing digital assets |
US7380120B1 (en) | 2001-12-12 | 2008-05-27 | Guardian Data Storage, Llc | Secured data format for access control |
US7260555B2 (en) | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
US7215701B2 (en) | 2001-12-12 | 2007-05-08 | Sharad Sambhwani | Low I/O bandwidth method and system for implementing detection and identification of scrambling codes |
US10033700B2 (en) * | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights |
US7392394B2 (en) * | 2001-12-13 | 2008-06-24 | Digimarc Corporation | Digital watermarking with variable orientation and protocols |
US7392392B2 (en) | 2001-12-13 | 2008-06-24 | Digimarc Corporation | Forensic digital watermarking with variable orientation and protocols |
US7472083B2 (en) * | 2001-12-14 | 2008-12-30 | Amphire Solutions, Inc. | Document exchange |
US7117535B1 (en) | 2001-12-14 | 2006-10-03 | Microsoft Corporation | Software-generated machine identifier |
WO2003052680A1 (en) | 2001-12-18 | 2003-06-26 | Digimarc Id System, Llc | Multiple image security features for identification documents and methods of making same |
US20030115139A1 (en) * | 2001-12-19 | 2003-06-19 | U-Haul International, Inc. | Electronic entity records system |
US7950066B1 (en) | 2001-12-21 | 2011-05-24 | Guardian Data Storage, Llc | Method and system for restricting use of a clipboard application |
US7225161B2 (en) * | 2001-12-21 | 2007-05-29 | Schlumberger Omnes, Inc. | Method and system for initializing a key management system |
GB2383442A (en) * | 2001-12-24 | 2003-06-25 | Inventec Corp | Centralised management of material supply within decentralised production |
US7793846B2 (en) | 2001-12-24 | 2010-09-14 | L-1 Secure Credentialing, Inc. | Systems, compositions, and methods for full color laser engraving of ID documents |
CA2471457C (en) | 2001-12-24 | 2011-08-02 | Digimarc Id Systems, Llc | Covert variable information on id documents and methods of making same |
US7728048B2 (en) | 2002-12-20 | 2010-06-01 | L-1 Secure Credentialing, Inc. | Increasing thermal conductivity of host polymer used with laser engraving methods and compositions |
US7694887B2 (en) | 2001-12-24 | 2010-04-13 | L-1 Secure Credentialing, Inc. | Optically variable personalized indicia for identification documents |
US20030125964A1 (en) * | 2001-12-27 | 2003-07-03 | Grace Tsui-Feng Chang | System and method for controlling distribution of digital copyrighted material using a multi-level marketing model |
US20030126086A1 (en) * | 2001-12-31 | 2003-07-03 | General Instrument Corporation | Methods and apparatus for digital rights management |
US7155012B2 (en) * | 2002-01-02 | 2006-12-26 | Sony Corporation | Slice mask and moat pattern partial encryption |
US7823174B2 (en) | 2002-01-02 | 2010-10-26 | Sony Corporation | Macro-block based content replacement by PID mapping |
US8051443B2 (en) * | 2002-01-02 | 2011-11-01 | Sony Corporation | Content replacement by PID mapping |
US7765567B2 (en) | 2002-01-02 | 2010-07-27 | Sony Corporation | Content replacement by PID mapping |
US7292690B2 (en) * | 2002-01-02 | 2007-11-06 | Sony Corporation | Video scene change detection |
US7376233B2 (en) * | 2002-01-02 | 2008-05-20 | Sony Corporation | Video slice and active region based multiple partial encryption |
US8027470B2 (en) * | 2002-01-02 | 2011-09-27 | Sony Corporation | Video slice and active region based multiple partial encryption |
US7302059B2 (en) * | 2002-01-02 | 2007-11-27 | Sony Corporation | Star pattern partial encryption |
US7403981B2 (en) | 2002-01-04 | 2008-07-22 | Quicksilver Technology, Inc. | Apparatus and method for adaptive multimedia reception and transmission in communication environments |
EP1456796A4 (en) * | 2002-01-08 | 2007-11-07 | Tivo Inc | Electronic content distribution and exchange system |
CA2367091A1 (en) * | 2002-01-10 | 2003-07-10 | Algorithmics International Corp. | System and methods for valuing and managing the risk of credit instrument portfolios |
CA2394742A1 (en) * | 2002-01-17 | 2003-07-17 | Michel Caron | Portable device, activated by the fingerprint of the holder, that will provide a unique and different access code each time the holder uses it |
KR20040078674A (en) * | 2002-01-22 | 2004-09-10 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | Method and system for distributing multimedia object |
WO2003065219A1 (en) * | 2002-01-25 | 2003-08-07 | Aaron Berkson | Digital media distribution system with expiring advertisements |
US20030145206A1 (en) * | 2002-01-25 | 2003-07-31 | Jack Wolosewicz | Document authentication and verification |
US7328345B2 (en) * | 2002-01-29 | 2008-02-05 | Widevine Technologies, Inc. | Method and system for end to end securing of content for video on demand |
JP3871201B2 (en) * | 2002-01-29 | 2007-01-24 | ソニー株式会社 | Content provision acquisition system |
US20050240491A1 (en) * | 2002-01-31 | 2005-10-27 | Jeff Greenberg | E-mail launched Web transaction |
US9286635B2 (en) | 2002-02-05 | 2016-03-15 | Square, Inc. | Method of transmitting information from efficient communication protocol card readers to mobile devices |
US20120323788A1 (en) * | 2002-02-05 | 2012-12-20 | Cardinalcommerce Corporation | Dynamic pin pad for credit/debit/other electronic transactions |
US9324100B2 (en) | 2002-02-05 | 2016-04-26 | Square, Inc. | Card reader with asymmetric spring |
US9916581B2 (en) * | 2002-02-05 | 2018-03-13 | Square, Inc. | Back end of payment system associated with financial transactions using card readers coupled to mobile devices |
US9495676B2 (en) | 2002-02-05 | 2016-11-15 | Square, Inc. | Method of transmitting information from a power efficient card to a mobile device |
US9224142B2 (en) | 2002-02-05 | 2015-12-29 | Square, Inc. | Card reader with power efficient architecture that includes a power supply and a wake up circuit |
US9262757B2 (en) | 2002-02-05 | 2016-02-16 | Square, Inc. | Method of transmitting information from a card reader with a power supply and wake-up circuit to a mobile device |
US9262777B2 (en) | 2002-02-05 | 2016-02-16 | Square, Inc. | Card reader with power efficient architecture that includes a wake-up circuit |
US9582795B2 (en) | 2002-02-05 | 2017-02-28 | Square, Inc. | Methods of transmitting information from efficient encryption card readers to mobile devices |
US9305314B2 (en) | 2002-02-05 | 2016-04-05 | Square, Inc. | Methods of transmitting information to mobile devices using cost effective card readers |
US8573486B2 (en) | 2010-10-13 | 2013-11-05 | Square, Inc. | Systems and methods for financial transaction through miniaturized card reader with confirmation of payment sent to buyer |
US20090024409A1 (en) * | 2002-02-06 | 2009-01-22 | Ryan Steelberg | Apparatus, system and method for a brand affinity engine using positive and negative mentions |
US20090112698A1 (en) * | 2007-10-31 | 2009-04-30 | Ryan Steelberg | System and method for brand affinity content distribution and optimization |
US20090228354A1 (en) * | 2008-03-05 | 2009-09-10 | Ryan Steelberg | Engine, system and method for generation of brand affinity content |
US20090018922A1 (en) * | 2002-02-06 | 2009-01-15 | Ryan Steelberg | System and method for preemptive brand affinity content distribution |
US20090112692A1 (en) * | 2007-10-31 | 2009-04-30 | Ryan Steelberg | Engine, system and method for generation of brand affinity content |
US20090112715A1 (en) * | 2007-10-31 | 2009-04-30 | Ryan Steelberg | Engine, system and method for generation of brand affinity content |
US8176334B2 (en) | 2002-09-30 | 2012-05-08 | Guardian Data Storage, Llc | Document security system that permits external users to gain access to secured files |
US8818833B2 (en) * | 2002-02-14 | 2014-08-26 | International Business Machines Corporation | Method and system for managing service requests across multiple systems |
US7328353B2 (en) * | 2002-02-14 | 2008-02-05 | Matsushita Electric Industrial Co., Ltd. | Content distribution system |
US7941533B2 (en) | 2002-02-19 | 2011-05-10 | Jpmorgan Chase Bank, N.A. | System and method for single sign-on session management without central server |
US7251635B2 (en) * | 2002-02-25 | 2007-07-31 | Schlumberger Omnes, Inc. | Method and apparatus for managing a key management system |
JP2003248629A (en) * | 2002-02-26 | 2003-09-05 | Fujitsu Ltd | Removable disc device having identification information |
US7725404B2 (en) * | 2002-02-27 | 2010-05-25 | Imagineer Software, Inc. | Secure electronic commerce using mutating identifiers |
US6996544B2 (en) * | 2002-02-27 | 2006-02-07 | Imagineer Software, Inc. | Multiple party content distribution system and method with rights management features |
US20060195402A1 (en) * | 2002-02-27 | 2006-08-31 | Imagineer Software, Inc. | Secure data transmission using undiscoverable or black data |
US7376624B2 (en) * | 2002-02-27 | 2008-05-20 | Imagineer Software, Inc. | Secure communication and real-time watermarking using mutating identifiers |
US9392120B2 (en) | 2002-02-27 | 2016-07-12 | Verizon Patent And Licensing Inc. | Methods and systems for call management with user intervention |
US7159059B2 (en) * | 2002-03-01 | 2007-01-02 | Mcneil Donald H | Ultra-modular processor in lattice topology |
AUPS112202A0 (en) * | 2002-03-14 | 2002-04-18 | Commonwealth Scientific And Industrial Research Organisation | Semiconductor manufacture |
AU2003220269A1 (en) * | 2002-03-14 | 2003-09-29 | Contentguard Holdings, Inc. | Method and apparatus for processing usage rights expressions |
US7805371B2 (en) | 2002-03-14 | 2010-09-28 | Contentguard Holdings, Inc. | Rights expression profile system and method |
US7640529B2 (en) * | 2002-07-30 | 2009-12-29 | Photronics, Inc. | User-friendly rule-based system and method for automatically generating photomask orders |
US9170812B2 (en) * | 2002-03-21 | 2015-10-27 | Pact Xpp Technologies Ag | Data processing system having integrated pipelined array data processor |
US20030187784A1 (en) * | 2002-03-27 | 2003-10-02 | Michael Maritzen | System and method for mid-stream purchase of products and services |
US7299292B2 (en) * | 2002-03-29 | 2007-11-20 | Widevine Technologies, Inc. | Process and streaming server for encrypting a data stream to a virtual smart card client system |
US7562053B2 (en) * | 2002-04-02 | 2009-07-14 | Soluble Technologies, Llc | System and method for facilitating transactions between two or more parties |
US9269067B2 (en) * | 2002-04-04 | 2016-02-23 | Altisource Solutions S.À.R.L. | Method and apparatus for providing selective access to information |
GB2387254B (en) * | 2002-04-05 | 2005-11-23 | Armoursoft Ltd | User authentication for computer systems |
US7961884B2 (en) * | 2002-08-13 | 2011-06-14 | Ipass Inc. | Method and system for changing security information in a computer network |
EP1497779A4 (en) * | 2002-04-09 | 2006-08-16 | Matan Arazi | Computerized trading system and method useful therefor |
DE10216384A1 (en) * | 2002-04-12 | 2003-10-30 | Scm Microsystems Gmbh | Access control network |
US7076669B2 (en) * | 2002-04-15 | 2006-07-11 | Intel Corporation | Method and apparatus for communicating securely with a token |
US6988204B2 (en) | 2002-04-16 | 2006-01-17 | Nokia Corporation | System and method for key distribution and network connectivity |
US7890771B2 (en) * | 2002-04-17 | 2011-02-15 | Microsoft Corporation | Saving and retrieving data based on public key encryption |
US6986006B2 (en) * | 2002-04-17 | 2006-01-10 | Microsoft Corporation | Page granular curtained memory via mapping control |
US7287275B2 (en) | 2002-04-17 | 2007-10-23 | Moskowitz Scott A | Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth |
US7565509B2 (en) * | 2002-04-17 | 2009-07-21 | Microsoft Corporation | Using limits on address translation to control access to an addressable entity |
US7058768B2 (en) * | 2002-04-17 | 2006-06-06 | Microsoft Corporation | Memory isolation through address translation data edit control |
US7487365B2 (en) * | 2002-04-17 | 2009-02-03 | Microsoft Corporation | Saving and retrieving data based on symmetric key encryption |
US7748045B2 (en) * | 2004-03-30 | 2010-06-29 | Michael Frederick Kenrich | Method and system for providing cryptographic document retention with off-line access |
US8613102B2 (en) * | 2004-03-30 | 2013-12-17 | Intellectual Ventures I Llc | Method and system for providing document retention using cryptography |
US7383570B2 (en) | 2002-04-25 | 2008-06-03 | Intertrust Technologies, Corp. | Secure authentication systems and methods |
US7149899B2 (en) | 2002-04-25 | 2006-12-12 | Intertrust Technologies Corp. | Establishing a secure channel with a human user |
US20030204711A1 (en) * | 2002-04-29 | 2003-10-30 | Guess Alan J. | Method and system for restoring custom user configuration settings across a host application download |
US8543511B2 (en) | 2002-04-29 | 2013-09-24 | Contentguard Holdings, Inc. | System and method for specifying and processing legality expressions |
CA2483605A1 (en) * | 2002-05-02 | 2003-11-13 | David Molnar | Method and apparatus for protecting information and privacy |
TWI220365B (en) * | 2002-05-02 | 2004-08-11 | Honda Motor Co Ltd | Output correcting device for image sensor |
US20030212639A1 (en) * | 2002-05-06 | 2003-11-13 | Cronce Paul A. | Method and system for providing secure authoring services for protected software |
IL149583A0 (en) * | 2002-05-09 | 2003-07-06 | Kavado Israel Ltd | Method for automatic setting and updating of a security policy |
US7824029B2 (en) | 2002-05-10 | 2010-11-02 | L-1 Secure Credentialing, Inc. | Identification card printer-assembler for over the counter card issuing |
US7660984B1 (en) | 2003-05-13 | 2010-02-09 | Quicksilver Technology | Method and system for achieving individualized protected space in an operating system |
US7328414B1 (en) | 2003-05-13 | 2008-02-05 | Qst Holdings, Llc | Method and system for creating and programming an adaptive computing engine |
US6782116B1 (en) * | 2002-11-04 | 2004-08-24 | Mediasec Technologies, Gmbh | Apparatus and methods for improving detection of watermarks in content that has undergone a lossy transformation |
US7809152B2 (en) * | 2002-05-14 | 2010-10-05 | Schreiner Group Gmbh & Co. Kg | Visible authentication patterns for printed document |
US20030217006A1 (en) * | 2002-05-15 | 2003-11-20 | Stefan Roever | Methods and apparatus for a title transaction network |
US20060036447A1 (en) * | 2002-05-15 | 2006-02-16 | Stefan Roever | Methods of facilitating contact management using a computerized system including a set of titles |
US7814025B2 (en) * | 2002-05-15 | 2010-10-12 | Navio Systems, Inc. | Methods and apparatus for title protocol, authentication, and sharing |
US7707121B1 (en) | 2002-05-15 | 2010-04-27 | Navio Systems, Inc. | Methods and apparatus for title structure and management |
US7401224B2 (en) * | 2002-05-15 | 2008-07-15 | Qualcomm Incorporated | System and method for managing sonic token verifiers |
US7707066B2 (en) * | 2002-05-15 | 2010-04-27 | Navio Systems, Inc. | Methods of facilitating merchant transactions using a computerized system including a set of titles |
CN1482556A (en) * | 2002-05-20 | 2004-03-17 | ��ʽ����Ntt����Ħ | Electronic book distribution method and program |
US7324971B2 (en) * | 2002-05-29 | 2008-01-29 | Richard Bookstaber | Blind perturbation encryption method for protecting financial position information while providing risk transparency |
US7478233B2 (en) * | 2002-05-30 | 2009-01-13 | Microsoft Corporation | Prevention of software tampering |
JPWO2003102948A1 (en) * | 2002-05-31 | 2005-10-06 | 富士通株式会社 | Content distribution storage system |
US7398209B2 (en) | 2002-06-03 | 2008-07-08 | Voicebox Technologies, Inc. | Systems and methods for responding to natural language speech utterance |
JP3869761B2 (en) * | 2002-06-05 | 2007-01-17 | 三洋電機株式会社 | Content playback device |
US20030229594A1 (en) * | 2002-06-05 | 2003-12-11 | Johnson Douglas A. | Decoupled ingredient brand licensing method |
JP2004078883A (en) * | 2002-06-17 | 2004-03-11 | Ntt Docomo Inc | Communication terminal, program and record medium |
US20030236750A1 (en) * | 2002-06-19 | 2003-12-25 | Suermondt Henri Jacques | Customized information access |
AU2003245574A1 (en) * | 2002-06-21 | 2004-01-06 | Probix, Inc. | Method and system for protecting digital objects distributed over a network using an electronic mail interface |
US20040001606A1 (en) * | 2002-06-28 | 2004-01-01 | Levy Kenneth L. | Watermark fonts |
US7421579B2 (en) | 2002-06-28 | 2008-09-02 | Microsoft Corporation | Multiplexing a secure counter to implement second level secure counters |
US7065607B2 (en) * | 2002-06-28 | 2006-06-20 | Microsoft Corporation | System and method for implementing a counter |
US20040083487A1 (en) * | 2002-07-09 | 2004-04-29 | Kaleidescape, A Corporation | Content and key distribution system for digital content representing media streams |
JP4129783B2 (en) * | 2002-07-10 | 2008-08-06 | ソニー株式会社 | Remote access system and remote access method |
US7296157B2 (en) * | 2002-07-10 | 2007-11-13 | Electronics For Imaging, Inc. | Methods and apparatus for secure document printing |
AU2002950202A0 (en) * | 2002-07-11 | 2002-09-12 | University Of Wollongong | Methods for standard mechanisms for digital item manipulation and handling |
US7693720B2 (en) * | 2002-07-15 | 2010-04-06 | Voicebox Technologies, Inc. | Mobile systems and methods for responding to natural language speech utterance |
CA2407774C (en) * | 2002-07-16 | 2005-01-04 | Musicrypt Inc. | Content distribution system and method |
US20040091111A1 (en) * | 2002-07-16 | 2004-05-13 | Levy Kenneth L. | Digital watermarking and fingerprinting applications |
US7802108B1 (en) | 2002-07-18 | 2010-09-21 | Nvidia Corporation | Secure storage of program code for an embedded system |
EP1383047A1 (en) * | 2002-07-18 | 2004-01-21 | Cp8 | Method for the secure execution of a program against attacks by radiation or other means |
JP2004054834A (en) * | 2002-07-24 | 2004-02-19 | Matsushita Electric Ind Co Ltd | Program development method, program development support device, and program packaging method |
JP3737462B2 (en) * | 2002-07-30 | 2006-01-18 | ソニー・エリクソン・モバイルコミュニケーションズ株式会社 | Information processing system, information communication terminal and method, information processing device and method, recording medium, and program |
AU2003247009A1 (en) * | 2002-07-31 | 2004-02-23 | Truecontext Corporation | Contextual computing system |
US20040025033A1 (en) * | 2002-08-02 | 2004-02-05 | Todd Luke B. | System and method for preventing unauthorized installation, use and reproduction of software |
US20040093595A1 (en) * | 2002-08-08 | 2004-05-13 | Eric Bilange | Software application framework for network-connected devices |
EP1546933A4 (en) * | 2002-08-09 | 2007-12-26 | Anda Inc | System and method for pharmacy restocking applications |
WO2004015553A1 (en) * | 2002-08-13 | 2004-02-19 | Nokia Corporation | Computer architecture for executing a program in a secure of insecure mode |
SE0202450D0 (en) * | 2002-08-15 | 2002-08-15 | Ericsson Telefon Ab L M | Non-repudiation of digital content |
US7496834B2 (en) * | 2002-08-23 | 2009-02-24 | Lg Electronics, Inc. | Electronic document request/supply method based on XML |
US20040044697A1 (en) * | 2002-08-28 | 2004-03-04 | Nixon Michael L. | Systems and methods for distributing, obtaining and using digital media files |
US8108656B2 (en) | 2002-08-29 | 2012-01-31 | Qst Holdings, Llc | Task definition for specifying resource requirements |
US20050038707A1 (en) * | 2002-08-30 | 2005-02-17 | Navio Systems, Inc. | Methods and apparatus for enabling transactions in networks |
US20050038724A1 (en) * | 2002-08-30 | 2005-02-17 | Navio Systems, Inc. | Methods and apparatus for enabling transaction relating to digital assets |
US20050234860A1 (en) * | 2002-08-30 | 2005-10-20 | Navio Systems, Inc. | User agent for facilitating transactions in networks |
US20050246193A1 (en) * | 2002-08-30 | 2005-11-03 | Navio Systems, Inc. | Methods and apparatus for enabling transaction relating to digital assets |
JP3881942B2 (en) * | 2002-09-04 | 2007-02-14 | 松下電器産業株式会社 | Semiconductor device having encryption unit |
US7693795B2 (en) * | 2002-09-05 | 2010-04-06 | Panasonic Corporation | Digital work protection system |
US7020636B2 (en) * | 2002-09-05 | 2006-03-28 | Matsushita Electric Industrial, Co., Ltd. | Storage-medium rental system |
WO2004023257A2 (en) * | 2002-09-06 | 2004-03-18 | De La Rue International Limited | Payment and media management |
US20060146839A1 (en) * | 2002-09-06 | 2006-07-06 | Hurwitz Harlan A | Payment and media management |
US7765135B2 (en) * | 2002-09-06 | 2010-07-27 | Talaris Holdings Limited | Count and login management |
US20060112006A1 (en) * | 2002-09-06 | 2006-05-25 | De La Rue International Limited | Audio/visual clips |
US8818896B2 (en) * | 2002-09-09 | 2014-08-26 | Sony Corporation | Selective encryption with coverage encryption |
US20080313282A1 (en) | 2002-09-10 | 2008-12-18 | Warila Bruce W | User interface, operating system and architecture |
JP2004102789A (en) * | 2002-09-11 | 2004-04-02 | Sony Corp | License management device, license management method and computer program |
US7512810B1 (en) | 2002-09-11 | 2009-03-31 | Guardian Data Storage Llc | Method and system for protecting encrypted files transmitted over a network |
US8103589B2 (en) | 2002-09-16 | 2012-01-24 | Touchtunes Music Corporation | Digital downloading jukebox system with central and local music servers |
US9646339B2 (en) * | 2002-09-16 | 2017-05-09 | Touchtunes Music Corporation | Digital downloading jukebox system with central and local music servers |
US7594271B2 (en) * | 2002-09-20 | 2009-09-22 | Widevine Technologies, Inc. | Method and system for real-time tamper evidence gathering for software |
US7716068B2 (en) * | 2002-09-25 | 2010-05-11 | Mckesson Financial Holdings Limited | Systems and methods for look-alike sound-alike medication error messaging |
US7778438B2 (en) | 2002-09-30 | 2010-08-17 | Myport Technologies, Inc. | Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval |
US10721066B2 (en) | 2002-09-30 | 2020-07-21 | Myport Ip, Inc. | Method for voice assistant, location tagging, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatags/contextual tags, storage and search retrieval |
US6996251B2 (en) | 2002-09-30 | 2006-02-07 | Myport Technologies, Inc. | Forensic communication apparatus and method |
US7058660B2 (en) | 2002-10-02 | 2006-06-06 | Bank One Corporation | System and method for network-based project management |
US7185363B1 (en) | 2002-10-04 | 2007-02-27 | Microsoft Corporation | Using a first device to engage in a digital rights management transaction on behalf of a second device |
US8489742B2 (en) | 2002-10-10 | 2013-07-16 | Convergys Information Management Group, Inc. | System and method for work management |
US8577795B2 (en) * | 2002-10-10 | 2013-11-05 | Convergys Information Management Group, Inc. | System and method for revenue and authorization management |
EP1551644A4 (en) * | 2002-10-15 | 2008-01-02 | Digimarc Corp | Identification document and related methods |
ES2507642T3 (en) | 2002-10-15 | 2014-10-15 | Verance Corporation | Media supervision, management and information system |
US20040073789A1 (en) * | 2002-10-15 | 2004-04-15 | Powers John Stephenson | Method for collaborative software licensing of electronically distributed computer programs |
JP2004139471A (en) * | 2002-10-18 | 2004-05-13 | Toshiba Corp | Content price management system, method and program |
US7978874B2 (en) * | 2002-10-21 | 2011-07-12 | Digimarc Corporation | Digital watermarking for workflow by tracking content or content identifiers with respect to time |
US7937591B1 (en) | 2002-10-25 | 2011-05-03 | Qst Holdings, Llc | Method and system for providing a device which can be adapted on an ongoing basis |
US7315946B1 (en) * | 2003-04-14 | 2008-01-01 | Aol Llc | Out-of-band tokens for rights access |
US7647277B1 (en) * | 2002-10-25 | 2010-01-12 | Time Warner Inc. | Regulating access to content using a multitiered rule base |
US7373658B1 (en) | 2002-10-25 | 2008-05-13 | Aol Llc | Electronic loose-leaf remote control for enabling access to content from a media player |
AU2002368304A1 (en) * | 2002-10-28 | 2004-05-13 | Nokia Corporation | Device keys |
US7836310B1 (en) | 2002-11-01 | 2010-11-16 | Yevgeniy Gutnik | Security system that uses indirect password-based encryption |
US8301493B2 (en) | 2002-11-05 | 2012-10-30 | Jpmorgan Chase Bank, N.A. | System and method for providing incentives to consumers to share information |
JP2004157864A (en) * | 2002-11-07 | 2004-06-03 | Canon Inc | Content distribution system |
US8276135B2 (en) | 2002-11-07 | 2012-09-25 | Qst Holdings Llc | Profiling of software and circuit designs utilizing data operation analyses |
FR2847104A1 (en) * | 2002-11-08 | 2004-05-14 | Thomson Licensing Sa | METHOD FOR DISTRIBUTING AUDIOVISUAL DOCUMENTS USING FIXED DOWNLOAD TERMINALS AND PORTABLE TERMINALS, TERMINALS AND TERMINALS FOR IMPLEMENTING THE METHOD |
US20040093509A1 (en) * | 2002-11-12 | 2004-05-13 | Gidon Elazar | Method and apparatus for connecting a storage device to a television |
JP2004164299A (en) * | 2002-11-13 | 2004-06-10 | Nec Corp | Content using system and method, and server |
KR100636909B1 (en) * | 2002-11-14 | 2006-10-19 | 엘지전자 주식회사 | Electronic document versioning method and updated information supply method using version number based on XML |
JP4099039B2 (en) * | 2002-11-15 | 2008-06-11 | 松下電器産業株式会社 | Program update method |
US7225301B2 (en) | 2002-11-22 | 2007-05-29 | Quicksilver Technologies | External memory controller node |
US7089429B2 (en) * | 2002-11-25 | 2006-08-08 | Nokia Corporation | Creation of local usage rights voucher |
US7804982B2 (en) | 2002-11-26 | 2010-09-28 | L-1 Secure Credentialing, Inc. | Systems and methods for managing and detecting fraud in image databases used with identification documents |
US6983221B2 (en) * | 2002-11-27 | 2006-01-03 | Telos Corporation | Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model |
US6980927B2 (en) * | 2002-11-27 | 2005-12-27 | Telos Corporation | Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment |
US20040103309A1 (en) * | 2002-11-27 | 2004-05-27 | Tracy Richard P. | Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing threat vulnerability feed |
US7051322B2 (en) | 2002-12-06 | 2006-05-23 | @Stake, Inc. | Software analysis framework |
US20040117220A1 (en) * | 2002-12-12 | 2004-06-17 | International Business Machines Corporation | Secure system and method for self-management of customer relationship management database |
US7149900B2 (en) * | 2002-12-12 | 2006-12-12 | Intel Corporation | Method of defending software from debugger attacks |
WO2004055638A2 (en) | 2002-12-12 | 2004-07-01 | Flexiworld Technologies, Inc. | Wireless communication between computing devices |
US7493289B2 (en) * | 2002-12-13 | 2009-02-17 | Aol Llc | Digital content store system |
US20040177115A1 (en) * | 2002-12-13 | 2004-09-09 | Hollander Marc S. | System and method for music search and discovery |
US7412532B2 (en) * | 2002-12-13 | 2008-08-12 | Aol Llc, A Deleware Limited Liability Company | Multimedia scheduler |
US7797064B2 (en) | 2002-12-13 | 2010-09-14 | Stephen Loomis | Apparatus and method for skipping songs without delay |
US7912920B2 (en) | 2002-12-13 | 2011-03-22 | Stephen Loomis | Stream sourcing content delivery system |
US7203965B2 (en) * | 2002-12-17 | 2007-04-10 | Sony Corporation | System and method for home network content protection and copy management |
US20040117322A1 (en) * | 2002-12-17 | 2004-06-17 | Nokia Corporation | System, method and computer program product for providing profile information |
US8230084B2 (en) * | 2002-12-17 | 2012-07-24 | Sony Corporation | Network management in a media network environment |
US7712673B2 (en) | 2002-12-18 | 2010-05-11 | L-L Secure Credentialing, Inc. | Identification document with three dimensional image of bearer |
US9129288B2 (en) * | 2002-12-18 | 2015-09-08 | Ncr Corporation | System and method for operating multiple checkout stations with a single processor |
US20040122772A1 (en) * | 2002-12-18 | 2004-06-24 | International Business Machines Corporation | Method, system and program product for protecting privacy |
US7890990B1 (en) | 2002-12-20 | 2011-02-15 | Klimenty Vainstein | Security system with staging capabilities |
US7577838B1 (en) | 2002-12-20 | 2009-08-18 | Alain Rossmann | Hybrid systems for securing digital assets |
US7370017B1 (en) * | 2002-12-20 | 2008-05-06 | Microsoft Corporation | Redistribution of rights-managed content and technique for encouraging same |
CN1729671A (en) * | 2002-12-20 | 2006-02-01 | 松下电器产业株式会社 | System and terminal equipment for collecting content history log and server equipment |
JP4619615B2 (en) * | 2002-12-25 | 2011-01-26 | 株式会社東芝 | Benefit management computer and method and program |
JP2004252931A (en) * | 2002-12-26 | 2004-09-09 | Sony Corp | Electronic device, device function control method and server |
FI20022278A (en) * | 2002-12-27 | 2004-06-28 | Nokia Corp | Method and system for testing the program and device |
US20040128528A1 (en) * | 2002-12-31 | 2004-07-01 | Poisner David I. | Trusted real time clock |
US8141159B2 (en) * | 2002-12-31 | 2012-03-20 | Portauthority Technologies Inc. | Method and system for protecting confidential information |
US7761176B2 (en) * | 2003-01-02 | 2010-07-20 | Catch Media, Inc. | Promotional portable music players |
US8644969B2 (en) | 2003-01-02 | 2014-02-04 | Catch Media, Inc. | Content provisioning and revenue disbursement |
US7191193B2 (en) * | 2003-01-02 | 2007-03-13 | Catch Media | Automatic digital music library builder |
US20060107330A1 (en) * | 2003-01-02 | 2006-05-18 | Yaacov Ben-Yaacov | Method and system for tracking and managing rights for digital music |
US8918195B2 (en) * | 2003-01-02 | 2014-12-23 | Catch Media, Inc. | Media management and tracking |
US8666524B2 (en) * | 2003-01-02 | 2014-03-04 | Catch Media, Inc. | Portable music player and transmitter |
US8732086B2 (en) * | 2003-01-02 | 2014-05-20 | Catch Media, Inc. | Method and system for managing rights for digital music |
US20040133797A1 (en) * | 2003-01-06 | 2004-07-08 | International Business Machines Corporation | Rights management enhanced storage |
US7801820B2 (en) * | 2003-01-13 | 2010-09-21 | Sony Corporation | Real-time delivery of license for previously stored encrypted content |
FR2849980B1 (en) * | 2003-01-15 | 2005-04-08 | Medialive | METHOD FOR THE DISTRIBUTION OF VIDEO SEQUENCES, DECODER AND SYSTEM FOR THE IMPLEMENTATION OF THIS PRODUCT |
US20040143757A1 (en) * | 2003-01-17 | 2004-07-22 | Brian Cheng | Method, system, and computer program product for verifying rule processing for web pages |
JP3928561B2 (en) * | 2003-01-23 | 2007-06-13 | ソニー株式会社 | Content distribution system, information processing apparatus or information processing method, and computer program |
US20040148223A1 (en) * | 2003-01-28 | 2004-07-29 | Junaid Ghaffar | Targeted direct marketing system and process for distributing coupons to information handling systems |
JP4029735B2 (en) * | 2003-01-28 | 2008-01-09 | ヤマハ株式会社 | Song data reproducing apparatus and program |
US7424115B2 (en) * | 2003-01-30 | 2008-09-09 | Nokia Corporation | Generating asymmetric keys in a telecommunications system |
US20050004873A1 (en) * | 2003-02-03 | 2005-01-06 | Robin Pou | Distribution and rights management of digital content |
US20050102515A1 (en) * | 2003-02-03 | 2005-05-12 | Dave Jaworski | Controlling read and write operations for digital media |
US20060053080A1 (en) * | 2003-02-03 | 2006-03-09 | Brad Edmonson | Centralized management of digital rights licensing |
WO2004070584A2 (en) * | 2003-02-04 | 2004-08-19 | Canonline Global Media, Inc. | Method and apparatus for converting objects between weakly and strongly typed programming frameworks |
US9818136B1 (en) | 2003-02-05 | 2017-11-14 | Steven M. Hoffberg | System and method for determining contingent relevance |
US20040267384A1 (en) * | 2003-02-07 | 2004-12-30 | Broadon Communications, Inc. | Integrated console and controller |
JP2006514361A (en) * | 2003-02-07 | 2006-04-27 | ノキア コーポレイション | Software distribution |
US8131649B2 (en) | 2003-02-07 | 2012-03-06 | Igware, Inc. | Static-or-dynamic and limited-or-unlimited content rights |
US20100017627A1 (en) | 2003-02-07 | 2010-01-21 | Broadon Communications Corp. | Ensuring authenticity in a closed content distribution system |
US7779482B1 (en) | 2003-02-07 | 2010-08-17 | iGware Inc | Delivery of license information using a short messaging system protocol in a closed content distribution system |
US7322042B2 (en) * | 2003-02-07 | 2008-01-22 | Broadon Communications Corp. | Secure and backward-compatible processor and secure software execution thereon |
US20040158733A1 (en) * | 2003-02-11 | 2004-08-12 | Thaddeus Bouchard | Method and system for secure facsimile delivery and registration |
US20040167859A1 (en) * | 2003-02-14 | 2004-08-26 | Richard Mirabella | Software license management system configurable for post-use payment business models |
US7526347B2 (en) * | 2003-02-18 | 2009-04-28 | Fisher-Rosemount Systems, Inc. | Security for objects in a process plant configuration system |
JP4338989B2 (en) * | 2003-02-20 | 2009-10-07 | パナソニック株式会社 | Memory device |
US20060167813A1 (en) * | 2003-02-25 | 2006-07-27 | Ali Aydar | Managing digital media rights through missing masters lists |
US20060167807A1 (en) * | 2003-02-25 | 2006-07-27 | Ali Aydar | Dispute resolution in an open copyright database |
US8117130B2 (en) * | 2003-02-25 | 2012-02-14 | Stragent, Llc | Batch loading and self-registration of digital media files |
US20060167882A1 (en) * | 2003-02-25 | 2006-07-27 | Ali Aydar | Digital rights management system architecture |
US7370212B2 (en) | 2003-02-25 | 2008-05-06 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
US20060294371A1 (en) * | 2003-02-25 | 2006-12-28 | Shawn Fanning | Content Regulation |
US20060167804A1 (en) * | 2003-02-25 | 2006-07-27 | Ali Aydar | Track listening and playing service for digital media files |
US20040172371A1 (en) * | 2003-02-28 | 2004-09-02 | Fujitsu Limited | Automated negotiation |
WO2004081771A2 (en) * | 2003-03-12 | 2004-09-23 | Matsushita Electric Industrial Co., Ltd. | Digital content distribution system, right management server and user terminal |
CA2519116C (en) * | 2003-03-13 | 2012-11-13 | Drm Technologies, Llc | Secure streaming container |
US7668990B2 (en) * | 2003-03-14 | 2010-02-23 | Openpeak Inc. | Method of controlling a device to perform an activity-based or an experience-based operation |
DE10311634A1 (en) * | 2003-03-14 | 2004-09-30 | Authentidate International Ag | Electronic transmission of documents |
US7007170B2 (en) * | 2003-03-18 | 2006-02-28 | Widevine Technologies, Inc. | System, method, and apparatus for securely providing content viewable on a secure device |
US7356143B2 (en) * | 2003-03-18 | 2008-04-08 | Widevine Technologies, Inc | System, method, and apparatus for securely providing content viewable on a secure device |
US7805366B2 (en) * | 2003-03-21 | 2010-09-28 | Ebay Inc. | Method and system to facilitate payments to satisfy payment obligations resulting from purchase transactions |
US10535049B2 (en) * | 2003-03-21 | 2020-01-14 | Paypal, Inc. | Payment transactions via substantially instant communication system |
US8510571B1 (en) | 2003-03-24 | 2013-08-13 | Hoi Chang | System and method for inserting security mechanisms into a software program |
GB0306746D0 (en) * | 2003-03-24 | 2003-04-30 | Medic To Medic Ltd | A graphical user interface |
US7975117B2 (en) | 2003-03-24 | 2011-07-05 | Microsoft Corporation | Enforcing isolation among plural operating systems |
US7292692B2 (en) * | 2003-03-25 | 2007-11-06 | Sony Corporation | Content scrambling with minimal impact on legacy devices |
US7131077B1 (en) * | 2003-03-28 | 2006-10-31 | Xilinx, Inc | Using an embedded processor to implement a finite state machine |
US20040199771A1 (en) * | 2003-04-04 | 2004-10-07 | Widevine Technologies, Inc. | Method for tracing a security breach in highly distributed content |
US7373519B1 (en) | 2003-04-09 | 2008-05-13 | Symantec Corporation | Distinguishing legitimate modifications from malicious modifications during executable computer file modification analysis |
US7822685B1 (en) * | 2003-04-09 | 2010-10-26 | Cisco Technology, Inc. | Method and system for digital rights management brokering and digital asset security transcoding |
FR2853786B1 (en) * | 2003-04-11 | 2005-08-05 | Medialive | METHOD AND EQUIPMENT FOR DISTRIBUTING DIGITAL VIDEO PRODUCTS WITH A RESTRICTION OF CERTAIN AT LEAST REPRESENTATION AND REPRODUCTION RIGHTS |
CN100392554C (en) * | 2003-04-11 | 2008-06-04 | 松下电器产业株式会社 | Equipment for reproducing digital content, and method for reproducing digital content |
WO2004093149A2 (en) | 2003-04-11 | 2004-10-28 | Flexiworld Technologies, Inc. | Autorun for integrated circuit memory component |
US20040205345A1 (en) * | 2003-04-11 | 2004-10-14 | Ripley Michael S. | System for identification and revocation of audiovisual titles and replicators |
DE602004030434D1 (en) | 2003-04-16 | 2011-01-20 | L 1 Secure Credentialing Inc | THREE-DIMENSIONAL DATA STORAGE |
US7788669B2 (en) * | 2003-05-02 | 2010-08-31 | Microsoft Corporation | System for isolating first computing environment from second execution environment while sharing resources by copying data from first portion to second portion of memory |
US7827077B2 (en) * | 2003-05-02 | 2010-11-02 | Visa U.S.A. Inc. | Method and apparatus for management of electronic receipts on portable devices |
US7243237B2 (en) * | 2003-05-02 | 2007-07-10 | Microsoft Corporation | Secure communication with a keyboard or related device |
US7139892B2 (en) * | 2003-05-02 | 2006-11-21 | Microsoft Corporation | Implementation of memory access control using optimizations |
US8141052B2 (en) * | 2003-05-09 | 2012-03-20 | Microsoft Corporation | Instrumenting software for enhanced diagnosability |
US20040243518A1 (en) * | 2003-05-13 | 2004-12-02 | Clifton John William | Individual identity authentication system |
US20040230538A1 (en) * | 2003-05-13 | 2004-11-18 | Clifton John William | Identity theft reduction system |
US20040230593A1 (en) * | 2003-05-16 | 2004-11-18 | Rudin Harry R. | Anonymous advertisement intermediation |
KR20050085351A (en) * | 2003-05-16 | 2005-08-29 | 가부시키가이샤 재팬 웨이브 | System for preventing unauthorized use of digital content |
US7814477B2 (en) * | 2003-05-20 | 2010-10-12 | Oracle International Corp. | Packaging system for customizing software |
US7493499B1 (en) | 2003-05-22 | 2009-02-17 | Copyright Clearance Center, Inc. | Method and apparatus for secure delivery and rights management of digital content |
CA2430456C (en) * | 2003-05-30 | 2012-10-09 | Coinamatic Canada Inc. | Offline code based reloading system |
US8707034B1 (en) | 2003-05-30 | 2014-04-22 | Intellectual Ventures I Llc | Method and system for using remote headers to secure electronic files |
US8306907B2 (en) | 2003-05-30 | 2012-11-06 | Jpmorgan Chase Bank N.A. | System and method for offering risk-based interest rates in a credit instrument |
CA2527668A1 (en) * | 2003-06-02 | 2004-12-16 | Liquid Machines, Inc. | Managing data objects in dynamic, distributed and collaborative contexts |
EP1634230A1 (en) * | 2003-06-03 | 2006-03-15 | Koninklijke Philips Electronics N.V. | Multimedia purchasing apparatus, purchasing and supplying method |
US20040249782A1 (en) * | 2003-06-04 | 2004-12-09 | International Business Machines Corporation | Method and system for highly efficient database bitmap index processing |
US20050055371A1 (en) * | 2003-06-05 | 2005-03-10 | Singam Sunder | Method and system to manage a network connection application |
CN1802813A (en) * | 2003-06-05 | 2006-07-12 | 松下电器产业株式会社 | User terminal for receiving license |
EA015549B1 (en) * | 2003-06-05 | 2011-08-30 | Интертраст Текнолоджис Корпорейшн | Interoperable systems and methods for peer-to-peer service orchestration |
US8606885B2 (en) * | 2003-06-05 | 2013-12-10 | Ipass Inc. | Method and system of providing access point data associated with a network access point |
EP1489544A3 (en) * | 2003-06-06 | 2005-01-12 | Norbert Boehnke | Content distribution system for billing of copyright fees |
US7269702B2 (en) * | 2003-06-06 | 2007-09-11 | Microsoft Corporation | Trusted data store for use in connection with trusted computer operating system |
US9256753B2 (en) * | 2003-06-11 | 2016-02-09 | Microsoft Technology Licensing, Llc | Method and apparatus for protecting regions of an electronic document |
WO2004111751A2 (en) | 2003-06-13 | 2004-12-23 | Orbid Limited | Method and system for performing a transaction and for performing a verification of legitimate use of digital data |
FR2856167A1 (en) * | 2003-06-13 | 2004-12-17 | Goulven Jean Alain Vernois | Audiovisual data distribution device, has selection unit to select audiovisual data stored in hard disk, and calculation unit to calculate amount to be paid for obtaining independent information medium carrying selected data |
US11063766B2 (en) | 2003-06-13 | 2021-07-13 | Ward Participations B.V. | Method and system for performing a transaction and for performing a verification of legitimate access to, or use of digital data |
US7320140B1 (en) | 2003-06-16 | 2008-01-15 | Adobe Systems Incorporated | Modifying digital rights |
JP4482380B2 (en) * | 2003-06-19 | 2010-06-16 | パナソニック株式会社 | Viewing control device, viewing control program, secure module |
US20040268033A1 (en) * | 2003-06-24 | 2004-12-30 | Seagate Technology Llc | Refreshing data in a data storage device |
US20050289081A1 (en) * | 2003-06-24 | 2005-12-29 | Manushantha Sporny | Computing system and method for secure sales transactions on a network |
US7685642B2 (en) | 2003-06-26 | 2010-03-23 | Contentguard Holdings, Inc. | System and method for controlling rights expressions by stakeholders of an item |
KR20060034250A (en) * | 2003-06-30 | 2006-04-21 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | Identification of protected content items by means of icons |
US7730543B1 (en) | 2003-06-30 | 2010-06-01 | Satyajit Nath | Method and system for enabling users of a group shared across multiple file security systems to access secured files |
US9412123B2 (en) | 2003-07-01 | 2016-08-09 | The 41St Parameter, Inc. | Keystroke analysis |
US7324648B1 (en) | 2003-07-08 | 2008-01-29 | Copyright Clearance Center, Inc. | Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site |
US7373330B1 (en) | 2003-07-08 | 2008-05-13 | Copyright Clearance Center, Inc. | Method and apparatus for tracking and controlling e-mail forwarding of encrypted documents |
US8006307B1 (en) | 2003-07-09 | 2011-08-23 | Imophaze Research Co., L.L.C. | Method and apparatus for distributing secure digital content that can be indexed by third party search engines |
US20050010531A1 (en) | 2003-07-09 | 2005-01-13 | Kushalnagar Nandakishore R. | System and method for distributing digital rights management digital content in a controlled network ensuring digital rights |
JP2005032164A (en) * | 2003-07-11 | 2005-02-03 | Matsushita Electric Ind Co Ltd | Authentication system, authentication device, server device, registration device, and terminal device |
US20070168287A1 (en) * | 2003-07-16 | 2007-07-19 | Digital Networks North America, Inc. | Method and apparatus for distributing media in a pay per play architecture with remote playback |
US7299500B1 (en) | 2003-07-17 | 2007-11-20 | Copyright Clearance Center, Inc. | Method and apparatus for secure delivery and rights management of digital content at an unsecure site |
US7860727B2 (en) * | 2003-07-17 | 2010-12-28 | Ventana Medical Systems, Inc. | Laboratory instrumentation information management and control network |
DE10333889A1 (en) * | 2003-07-22 | 2005-02-24 | Siemens Ag | Method for generating a structure representation describing a specific automation system |
US7730518B2 (en) * | 2003-07-31 | 2010-06-01 | Emc Corporation | Method and apparatus for graph-based partition of cryptographic functionality |
JP2005149466A (en) * | 2003-08-01 | 2005-06-09 | Yoshinobu Inada | Sales management system of utilization right with respect to utilization object, sales server, terminal device and sales management method |
US7530103B2 (en) * | 2003-08-07 | 2009-05-05 | Microsoft Corporation | Projection of trustworthiness from a trusted environment to an untrusted environment |
WO2005017893A1 (en) * | 2003-08-14 | 2005-02-24 | Ralf Richardson Da Silva | Recording configuration of a digital information carrier (sound and image) for avoid non authorized copies |
US9767634B2 (en) | 2003-08-15 | 2017-09-19 | Rentrak Corporation | Systems and methods for measuring consumption of entertainment commodities |
US7555558B1 (en) | 2003-08-15 | 2009-06-30 | Michael Frederick Kenrich | Method and system for fault-tolerant transfer of files across a network |
US20050038706A1 (en) * | 2003-08-15 | 2005-02-17 | Amir Yazdani | Business transaction reporting system |
US20050044397A1 (en) * | 2003-08-19 | 2005-02-24 | Telefonaktiebolaget Lm Ericsson | Method and system for secure time management in digital rights management |
US20050050057A1 (en) * | 2003-08-25 | 2005-03-03 | Microsoft Corporation | System and method for integrating management of resources between application services and applications |
US8108319B2 (en) * | 2003-08-26 | 2012-01-31 | Sony Computer Entertainment America Llc | System and method for controlling access to computer readable content using downloadable authentication |
US7698229B2 (en) * | 2003-08-29 | 2010-04-13 | International Business Machines Corporation | Method and apparatus for trading digital items in a network data processing system |
US20050050170A1 (en) * | 2003-08-29 | 2005-03-03 | International Business Machines Corporation | Method and apparatus for securely conducting digital property trade |
US7958055B2 (en) * | 2003-08-29 | 2011-06-07 | International Business Machines Corporation | Method and apparatus for temporary ownership of digital items in a network data processing system |
DE10340411B4 (en) * | 2003-09-02 | 2005-10-13 | Infineon Technologies Ag | Device and method for the safe execution of a program |
FR2859555B1 (en) * | 2003-09-04 | 2005-12-23 | Fidalis | COMMUNICATION SYSTEM FOR MONITORING TRACEABILITY |
WO2005026884A2 (en) * | 2003-09-05 | 2005-03-24 | Ims Health Incorporated | Techniques for estimating sales of items through a particular channel |
TW200511117A (en) * | 2003-09-10 | 2005-03-16 | Wistron Corp | Method for controlling a computer system |
US7681035B1 (en) | 2003-09-10 | 2010-03-16 | Realnetworks, Inc. | Digital rights management handler and related methods |
US7286667B1 (en) | 2003-09-15 | 2007-10-23 | Sony Corporation | Decryption system |
US20050066353A1 (en) * | 2003-09-18 | 2005-03-24 | Robert Fransdonk | Method and system to monitor delivery of content to a content destination |
US8127366B2 (en) | 2003-09-30 | 2012-02-28 | Guardian Data Storage, Llc | Method and apparatus for transitioning between states of security policies used to secure electronic documents |
US7703140B2 (en) | 2003-09-30 | 2010-04-20 | Guardian Data Storage, Llc | Method and system for securing digital assets using process-driven security policies |
WO2005033830A2 (en) * | 2003-10-03 | 2005-04-14 | Npx Technologies Ltd. | Methods and systems for determining the reliability of transactions |
US8224750B1 (en) * | 2003-10-07 | 2012-07-17 | Microsoft Corporation | Method and system for upgrading licenses to installed software |
US7788496B2 (en) * | 2003-10-08 | 2010-08-31 | Microsoft Corporation | First computer process and second computer process proxy-executing code on behalf thereof |
US9055239B2 (en) * | 2003-10-08 | 2015-06-09 | Verance Corporation | Signal continuity assessment using embedded watermarks |
US7979911B2 (en) * | 2003-10-08 | 2011-07-12 | Microsoft Corporation | First computer process and second computer process proxy-executing code from third computer process on behalf of first process |
US20060239501A1 (en) | 2005-04-26 | 2006-10-26 | Verance Corporation | Security enhancements of digital watermarks for multi-media content |
US7343347B2 (en) * | 2003-10-08 | 2008-03-11 | Time Warner Inc. | Electronic media player with metadata based control and method of operating the same |
US8805878B2 (en) * | 2003-10-08 | 2014-08-12 | Open Text S.A. | System and method for managing enterprise-level interrelated site, channel, and content objects |
US7369677B2 (en) | 2005-04-26 | 2008-05-06 | Verance Corporation | System reactions to the detection of embedded watermarks in a digital host content |
US8103592B2 (en) * | 2003-10-08 | 2012-01-24 | Microsoft Corporation | First computer process and second computer process proxy-executing code on behalf of first process |
US20070039018A1 (en) * | 2005-08-09 | 2007-02-15 | Verance Corporation | Apparatus, systems and methods for broadcast advertising stewardship |
US7668093B1 (en) | 2004-08-05 | 2010-02-23 | Convergys Information Management Group, Inc. | Architecture for balancing workload |
KR20060126958A (en) * | 2003-10-14 | 2006-12-11 | 마츠시타 덴끼 산교 가부시키가이샤 | Content distribution method and content server |
US7281274B2 (en) * | 2003-10-16 | 2007-10-09 | Lmp Media Llc | Electronic media distribution system |
US7925372B2 (en) | 2003-10-17 | 2011-04-12 | Trinary Anlagenbau Gmbh | Neutral data computer control system for a machine tool used to produce workpieces with a threaded surface and associated machine tool |
MXPA06003926A (en) * | 2003-10-17 | 2006-07-05 | Trinary Anlagenbau Gmbh | Method and device for preventing a control error of a machine tool. |
WO2005043802A1 (en) | 2003-10-20 | 2005-05-12 | Drm Technologies, Llc | Securing digital content system and method |
US7406174B2 (en) * | 2003-10-21 | 2008-07-29 | Widevine Technologies, Inc. | System and method for n-dimensional encryption |
US7730318B2 (en) * | 2003-10-24 | 2010-06-01 | Microsoft Corporation | Integration of high-assurance features into an application through application factoring |
US6980650B2 (en) * | 2003-10-27 | 2005-12-27 | Nds Limited | System for providing keys |
US8190893B2 (en) | 2003-10-27 | 2012-05-29 | Jp Morgan Chase Bank | Portable security transaction protocol |
US7310721B2 (en) * | 2003-10-30 | 2007-12-18 | Microsoft Corporation | Shadow page tables for address translation control |
US7853980B2 (en) | 2003-10-31 | 2010-12-14 | Sony Corporation | Bi-directional indices for trick mode video-on-demand |
US20050108303A1 (en) * | 2003-10-31 | 2005-05-19 | Carter Richard D. | Remote backup and restore technique |
US8392226B1 (en) * | 2003-11-04 | 2013-03-05 | Viabridge, Inc. | Controlling meta-data of information resources |
US20050102513A1 (en) * | 2003-11-10 | 2005-05-12 | Nokia Corporation | Enforcing authorized domains with domain membership vouchers |
US7590963B2 (en) * | 2003-11-21 | 2009-09-15 | Mentor Graphics Corporation | Integrating multiple electronic design applications |
US7882034B2 (en) * | 2003-11-21 | 2011-02-01 | Realnetworks, Inc. | Digital rights management for content rendering on playback devices |
US8996420B2 (en) * | 2003-11-21 | 2015-03-31 | Intel Corporation | System and method for caching data |
US20060265329A1 (en) * | 2003-11-21 | 2006-11-23 | Realnetworks | System and method for automatically transferring dynamically changing content |
US20060259436A1 (en) * | 2003-11-21 | 2006-11-16 | Hug Joshua D | System and method for relicensing content |
US7305648B2 (en) * | 2003-11-21 | 2007-12-04 | Mentor Graphics Corporation | Distributed autorouting of conductive paths in printed circuit boards |
US8185475B2 (en) | 2003-11-21 | 2012-05-22 | Hug Joshua D | System and method for obtaining and sharing media content |
US10013535B2 (en) * | 2003-11-21 | 2018-07-03 | Ciena Corporation | Software configuration of module dependent on history |
US8738537B2 (en) * | 2003-11-21 | 2014-05-27 | Intel Corporation | System and method for relicensing content |
WO2005053271A2 (en) * | 2003-11-24 | 2005-06-09 | America Online, Inc. | Systems and methods for authenticated communications |
US7711575B2 (en) * | 2003-11-24 | 2010-05-04 | At&T Intellectual Property I, L.P. | Methods for providing communications services |
US7069389B2 (en) * | 2003-11-26 | 2006-06-27 | Microsoft Corporation | Lazy flushing of translation lookaside buffers |
CN100468429C (en) * | 2003-11-27 | 2009-03-11 | 松下电器产业株式会社 | Content distribution system and content license management method |
CN1622511A (en) * | 2003-11-28 | 2005-06-01 | 皇家飞利浦电子股份有限公司 | CD user credit decision method and apparatus |
US7552093B2 (en) * | 2003-12-04 | 2009-06-23 | Black Duck Software, Inc. | Resolving license dependencies for aggregations of legally-protectable content |
US20060116966A1 (en) * | 2003-12-04 | 2006-06-01 | Pedersen Palle M | Methods and systems for verifying protectable content |
US8700533B2 (en) * | 2003-12-04 | 2014-04-15 | Black Duck Software, Inc. | Authenticating licenses for legally-protectable content based on license profiles and content identifiers |
US9489687B2 (en) * | 2003-12-04 | 2016-11-08 | Black Duck Software, Inc. | Methods and systems for managing software development |
US7415267B2 (en) * | 2003-12-15 | 2008-08-19 | Jp Morgan Chase Bank | Methods and systems for managing call reports for the financial services industry |
WO2005057844A1 (en) * | 2003-12-15 | 2005-06-23 | Matsushita Electric Industrial Co., Ltd. | Secret information setting device and secret information setting method |
US20050137983A1 (en) * | 2003-12-18 | 2005-06-23 | Matthew Bells | System and method for digital rights management |
US20050137940A1 (en) * | 2003-12-22 | 2005-06-23 | Lindsay Jeffrey D. | Method to provide a product to a consumer to protect consumer privacy |
US20100174826A1 (en) * | 2003-12-23 | 2010-07-08 | Anupam Sharma | Information gathering system and method |
JP2005190350A (en) * | 2003-12-26 | 2005-07-14 | Toshiba Corp | Content transmission system and method |
US7478059B2 (en) * | 2003-12-29 | 2009-01-13 | Robert W. Crocitto | System and method for content distribution and commerce on a peer-to-peer network |
US20050144083A1 (en) * | 2003-12-31 | 2005-06-30 | Christ Paul F. | Method and system for locating, selecting, purchasing and delivering small unit research information |
DE102004003347A1 (en) * | 2004-01-22 | 2005-08-18 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Method for providing a virtual goods to third parties |
US8250150B2 (en) * | 2004-01-26 | 2012-08-21 | Forte Internet Software, Inc. | Methods and apparatus for identifying and facilitating a social interaction structure over a data packet network |
US8024225B1 (en) | 2004-01-27 | 2011-09-20 | Amazon Technologies, Inc. | Controlling access to services via usage models |
US7797198B1 (en) | 2004-01-27 | 2010-09-14 | Amazon Technologies, Inc. | Providing an invocable composite network service based on multiple other invocable constituent network services |
US7801771B1 (en) | 2004-01-27 | 2010-09-21 | Amazon Technologies, Inc. | Providing configurable usage models for available services |
US10332190B1 (en) | 2004-01-30 | 2019-06-25 | Jpmorgan Chase Bank, N.A. | System and method for trade payment exchange |
US20050169473A1 (en) * | 2004-02-03 | 2005-08-04 | Candelore Brant L. | Multiple selective encryption with DRM |
KR100597401B1 (en) * | 2004-02-06 | 2006-07-06 | 삼성전자주식회사 | Digital rights managementDRM base on method and apparatus for content right protection |
US8429081B1 (en) * | 2004-02-12 | 2013-04-23 | Novell, Inc. | Techniques for securely delivering media data |
US8843413B2 (en) * | 2004-02-13 | 2014-09-23 | Microsoft Corporation | Binding content to a domain |
EP1787199A2 (en) * | 2004-02-18 | 2007-05-23 | Ipass, Inc. | Method and system for managing transactions in a remote network access system |
US20050289003A1 (en) * | 2004-02-20 | 2005-12-29 | Thompson R M | System and method for direct marketing |
EP1723594B1 (en) * | 2004-02-23 | 2017-11-29 | Symantec International | Token authentication system and method |
US7222365B2 (en) * | 2004-02-26 | 2007-05-22 | Metavante Corporation | Non-algorithmic vectored steganography |
US7546587B2 (en) * | 2004-03-01 | 2009-06-09 | Microsoft Corporation | Run-time call stack verification |
US20060010072A1 (en) * | 2004-03-02 | 2006-01-12 | Ori Eisen | Method and system for identifying users and detecting fraud by use of the Internet |
US10999298B2 (en) | 2004-03-02 | 2021-05-04 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
US7853533B2 (en) * | 2004-03-02 | 2010-12-14 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
US20050216548A1 (en) * | 2004-03-04 | 2005-09-29 | Brian Wormington | Method and system for digital content distribution |
US9020854B2 (en) | 2004-03-08 | 2015-04-28 | Proxense, Llc | Linked account system using personal digital key (PDK-LAS) |
US7744002B2 (en) | 2004-03-11 | 2010-06-29 | L-1 Secure Credentialing, Inc. | Tamper evident adhesive and identification document including same |
EP1580644A3 (en) * | 2004-03-15 | 2005-11-09 | Yamaha Corporation | Electronic musical apparatus for recording and reproducing music content |
JP4705027B2 (en) * | 2004-03-29 | 2011-06-22 | パナソニック株式会社 | Rights management device, terminal device and rights management system |
KR101043336B1 (en) * | 2004-03-29 | 2011-06-22 | 삼성전자주식회사 | Method and apparatus for acquiring and removing informations of digital right objects |
US7287159B2 (en) | 2004-04-01 | 2007-10-23 | Shieldip, Inc. | Detection and identification methods for software |
US7539862B2 (en) * | 2004-04-08 | 2009-05-26 | Ipass Inc. | Method and system for verifying and updating the configuration of an access device during authentication |
JP4442294B2 (en) * | 2004-04-09 | 2010-03-31 | ソニー株式会社 | Content playback apparatus, program, and content playback control method |
US9003548B2 (en) | 2004-04-13 | 2015-04-07 | Nl Systems, Llc | Method and system for digital rights management of documents |
US20060059561A1 (en) * | 2004-04-14 | 2006-03-16 | Digital River, Inc. | Electronic storefront that limits download of software wrappers based on geographic location |
US7742997B1 (en) | 2004-04-23 | 2010-06-22 | Jpmorgan Chase Bank, N.A. | System and method for management and delivery of content and rules |
CA2563786A1 (en) * | 2004-04-28 | 2005-11-10 | Openlogic, Inc. | Tools for stacking uncoordinated software projects |
US8581803B2 (en) * | 2004-04-30 | 2013-11-12 | Microsoft Corporation | Video presenting network management |
CA2565360C (en) | 2004-04-30 | 2012-01-10 | Research In Motion Limited | System and method for securing data |
US7903045B2 (en) | 2004-04-30 | 2011-03-08 | Microsoft Corporation | Video presenting network supporting separately-configurable resources |
US20060242406A1 (en) * | 2005-04-22 | 2006-10-26 | Microsoft Corporation | Protected computing environment |
US7898533B2 (en) | 2004-04-30 | 2011-03-01 | Microsoft Corporation | Video presenting network configuration solution space traversal |
US7679612B2 (en) * | 2004-04-30 | 2010-03-16 | Microsoft Corporation | Configuration goals via video presenting network |
US20050251464A1 (en) * | 2004-05-10 | 2005-11-10 | Ames Bradley C | Method and system for automating an audit process |
US20050256804A1 (en) * | 2004-05-14 | 2005-11-17 | International Business Machines Corporation | Model and flow for distributing digitally conveyable content |
US9219729B2 (en) | 2004-05-19 | 2015-12-22 | Philip Drope | Multimedia network system with content importation, content exportation, and integrated content management |
US20060004745A1 (en) * | 2004-06-04 | 2006-01-05 | Agfa Corporation | Structured reporting report data manager |
KR100490863B1 (en) * | 2004-06-09 | 2005-05-24 | 디지아나 주식회사 | System for charging royalty of copyrights in digital multimedia broadcasting and method thereof |
AU2005255456B2 (en) | 2004-06-09 | 2007-09-13 | Syncada Llc | Order-resource fulfillment and management system and approach |
CN101031905A (en) * | 2004-06-09 | 2007-09-05 | 美国银行和许可股份有限公司 | Distributor-based transaction processing arrangement and approach |
US8762238B2 (en) | 2004-06-09 | 2014-06-24 | Syncada Llc | Recurring transaction processing system and approach |
US7590980B1 (en) | 2004-06-14 | 2009-09-15 | Convergys Cmg Utah, Inc. | System and method for a functional extensibility framework |
US7249252B2 (en) * | 2004-06-16 | 2007-07-24 | Intel Corporation | Method of replacing initialization code in a control store with main code after execution of the initialization code has completed |
JP4333494B2 (en) * | 2004-06-17 | 2009-09-16 | ソニー株式会社 | Content reproduction apparatus, content reproduction method, content management apparatus, content management method, and computer program. |
US20070255580A1 (en) * | 2004-06-22 | 2007-11-01 | Ebooks Corporation Limited | Lending System and Method |
US20100208950A1 (en) * | 2009-02-17 | 2010-08-19 | Silvester Kelan C | Biometric identification data protection |
US7694121B2 (en) * | 2004-06-30 | 2010-04-06 | Microsoft Corporation | System and method for protected operating system boot using state validation |
JP4150701B2 (en) * | 2004-06-30 | 2008-09-17 | 株式会社東芝 | Information processing apparatus, information processing method, and information processing program |
EP1771827A1 (en) * | 2004-06-30 | 2007-04-11 | France Télécom | Multipurpose electronic payment method and system |
US20060004668A1 (en) | 2004-07-01 | 2006-01-05 | Hamnen Jan H | Method of distributing electronic license keys |
US20060020556A1 (en) * | 2004-07-01 | 2006-01-26 | Hamnen Jan H | System and method for distributing electronic content utilizing electronic license keys |
US20060015399A1 (en) * | 2004-07-13 | 2006-01-19 | Alberth William P Jr | Content distribution revenue sharing methods and devices therefore |
WO2006020238A2 (en) * | 2004-07-16 | 2006-02-23 | Ns8 Corporation | Method and system for managing the use of electronic works |
US7707427B1 (en) | 2004-07-19 | 2010-04-27 | Michael Frederick Kenrich | Multi-level file digests |
US20060020561A1 (en) * | 2004-07-20 | 2006-01-26 | Toshiba Corporation | System for generating a user interface and service cost display for mobile document processing services |
WO2006009208A1 (en) * | 2004-07-21 | 2006-01-26 | Sony Corporation | Communication system, communication method, contents processing device, and computer program |
US7460668B2 (en) * | 2004-07-21 | 2008-12-02 | Divx, Inc. | Optimized secure media playback control |
US20060020548A1 (en) * | 2004-07-26 | 2006-01-26 | Dave Flather | Interactive media viewer system with interactive email and purchase follow up capabilities and special security features |
US20090144135A1 (en) * | 2004-07-27 | 2009-06-04 | Andreu Riera Jorba | Methods for the management and protection of electoral processes, which are associated with an electronic voting terminal, and operative module used |
US8306920B1 (en) * | 2004-07-28 | 2012-11-06 | Ebay Inc. | Method and system to securely store customer data in a network-based commerce system |
KR100692011B1 (en) * | 2004-07-28 | 2007-03-09 | 엘지전자 주식회사 | Method for Renewing The Criterion Of The Expriration Of The Right Of The Using Contents On The Mobile Communication Terminal |
JP2006042087A (en) * | 2004-07-29 | 2006-02-09 | Toshiba Corp | Client terminal, access point apparatus and radio communication system |
US7617211B2 (en) * | 2004-08-02 | 2009-11-10 | International Business Machines Corporation | System and method for automatically synchronizing security-relevant information between a relational database and a multidimensional database |
JP2006048464A (en) * | 2004-08-06 | 2006-02-16 | Toshiba Corp | Content data distribution system, contents data distribution method, and commodity sales method |
KR20060013099A (en) * | 2004-08-06 | 2006-02-09 | 한국전자통신연구원 | Distribution system for digital contents and method thereof |
US20080319862A1 (en) * | 2004-08-10 | 2008-12-25 | Hiromedia Ltd. | Method and system for preventing ad stripping from ad-supported digital content |
US8112361B2 (en) * | 2004-08-10 | 2012-02-07 | Hiro Media Ltd. | Method and system for dynamic, real-time addition of advertisement to downloaded static content |
EP1791167A4 (en) * | 2004-08-12 | 2011-04-27 | Nikon Corp | Substrate processing apparatus, use state ascertaining method, and false use preventing method |
WO2006019016A1 (en) * | 2004-08-18 | 2006-02-23 | Sony Corporation | Backlight device and color liquid crystal display device |
US20060101368A1 (en) * | 2004-09-08 | 2006-05-11 | Mentor Graphics Corporation | Distributed electronic design automation environment |
US7546571B2 (en) * | 2004-09-08 | 2009-06-09 | Mentor Graphics Corporation | Distributed electronic design automation environment |
US8612772B1 (en) | 2004-09-10 | 2013-12-17 | Altera Corporation | Security core using soft key |
US8566616B1 (en) | 2004-09-10 | 2013-10-22 | Altera Corporation | Method and apparatus for protecting designs in SRAM-based programmable logic devices and the like |
US7590589B2 (en) | 2004-09-10 | 2009-09-15 | Hoffberg Steven M | Game theoretic prioritization scheme for mobile ad hoc networks permitting hierarchal deference |
US20060059369A1 (en) * | 2004-09-10 | 2006-03-16 | International Business Machines Corporation | Circuit chip for cryptographic processing having a secure interface to an external memory |
US20060059372A1 (en) * | 2004-09-10 | 2006-03-16 | International Business Machines Corporation | Integrated circuit chip for encryption and decryption having a secure mechanism for programming on-chip hardware |
US20060059373A1 (en) * | 2004-09-10 | 2006-03-16 | International Business Machines Corporation | Integrated circuit chip for encryption and decryption using instructions supplied through a secure interface |
US20060059574A1 (en) * | 2004-09-10 | 2006-03-16 | International Business Machines Corporation | System for securely configuring a field programmable gate array or other programmable hardware |
US7818574B2 (en) | 2004-09-10 | 2010-10-19 | International Business Machines Corporation | System and method for providing dynamically authorized access to functionality present on an integrated circuit chip |
JP4380480B2 (en) * | 2004-09-16 | 2009-12-09 | ソニー株式会社 | License processing apparatus, program, and license processing method |
JP2006085483A (en) * | 2004-09-16 | 2006-03-30 | Sony Corp | License processing device, program and license lending-out method |
US20060064723A1 (en) * | 2004-09-20 | 2006-03-23 | Thomas Poslinski | Method for an instant pop-up interface for a set-top box |
DE102004046018A1 (en) * | 2004-09-21 | 2006-03-30 | Deutsche Post Ag | Method and device for franking mailpieces |
US20060063590A1 (en) * | 2004-09-21 | 2006-03-23 | Paul Abassi | Mechanism to control game usage on user devices |
JP4125277B2 (en) * | 2004-09-22 | 2008-07-30 | キヤノン株式会社 | Image forming apparatus and data erasing method |
US9609279B2 (en) | 2004-09-24 | 2017-03-28 | Google Inc. | Method and system for providing secure CODECS |
US8326764B1 (en) * | 2004-09-30 | 2012-12-04 | Rockwell Automation Technologies, Inc. | Factory automation transactions |
JP4843208B2 (en) * | 2004-09-30 | 2011-12-21 | 株式会社東芝 | Digital content editing apparatus, digital content editing method, digital content editing program, and recording medium recording digital content editing program |
US7664751B2 (en) | 2004-09-30 | 2010-02-16 | Google Inc. | Variable user interface based on document access privileges |
JP2006127485A (en) * | 2004-09-30 | 2006-05-18 | Sanyo Electric Co Ltd | Device and method for reproducing content |
US7603355B2 (en) | 2004-10-01 | 2009-10-13 | Google Inc. | Variably controlling access to content |
US8768844B2 (en) | 2004-10-06 | 2014-07-01 | Sony Corporation | Method and system for content sharing and authentication between multiple devices |
US20060080257A1 (en) * | 2004-10-08 | 2006-04-13 | Level 3 Communications, Inc. | Digital content distribution framework |
EP1645992A1 (en) | 2004-10-08 | 2006-04-12 | Philip Morris Products S.A. | Methods and systems for marking, tracking and authentication of products |
US20070271281A1 (en) * | 2004-10-12 | 2007-11-22 | Audit Business Solutions Ltda. | Computerized system for data collection and management |
US8620816B2 (en) * | 2004-10-14 | 2013-12-31 | Google Inc. | Information vault, data format conversion services system and method |
US7747537B2 (en) * | 2004-10-14 | 2010-06-29 | International Business Machines Corporation | System and method for providing a secure intellectual property marketplace |
US8224725B2 (en) * | 2004-10-14 | 2012-07-17 | Google Inc. | Escrowing digital property in a secure information vault |
US8688590B2 (en) * | 2004-10-14 | 2014-04-01 | Google Inc. | System and method to strengthen advertiser and consumer affinity |
US7587366B2 (en) * | 2004-10-14 | 2009-09-08 | International Business Machines Corporation | Secure information vault, exchange and processing system and method |
US7015823B1 (en) | 2004-10-15 | 2006-03-21 | Systran Federal Corporation | Tamper resistant circuit boards |
US8347078B2 (en) | 2004-10-18 | 2013-01-01 | Microsoft Corporation | Device certificate individualization |
JP4529639B2 (en) * | 2004-10-28 | 2010-08-25 | 富士通株式会社 | Device with electronic information transfer function, electronic information transfer program, etc. and electronic information transfer method |
US20060095290A1 (en) * | 2004-11-02 | 2006-05-04 | Kvarts, Llc | System and method for authenticating users for secure mobile electronic gaming |
US7752181B2 (en) * | 2004-11-08 | 2010-07-06 | Oracle International Corporation | System and method for performing a data uniqueness check in a sorted data set |
WO2006053191A2 (en) * | 2004-11-10 | 2006-05-18 | Mastercard International Incorporated | Method and system for performing a transaction using a dynamic authorization code |
US8336085B2 (en) | 2004-11-15 | 2012-12-18 | Microsoft Corporation | Tuning product policy using observed evidence of customer behavior |
US7428520B2 (en) * | 2004-11-15 | 2008-09-23 | Becton, Dickinson And Company | Graphical user interface for use with open expert system |
US7725721B2 (en) * | 2004-11-18 | 2010-05-25 | Cisco Technology, Inc. | Method and system for transferring software and hardware feature licenses between devices |
US8660961B2 (en) | 2004-11-18 | 2014-02-25 | Contentguard Holdings, Inc. | Method, system, and device for license-centric content consumption |
JP4275053B2 (en) * | 2004-11-19 | 2009-06-10 | シャープ株式会社 | Image recording device |
US7876766B1 (en) | 2004-11-22 | 2011-01-25 | Syniverse Icx Corporation | Method and apparatus to enable interoperation between multi-media messaging service centers |
EP1817595B1 (en) * | 2004-11-22 | 2009-03-04 | Freescale Semiconductor Inc. | Integrated circuit and a method for secure testing |
US20060143135A1 (en) * | 2004-11-26 | 2006-06-29 | Tucker David M | Associating licensing information with software applications |
US20060117004A1 (en) * | 2004-11-30 | 2006-06-01 | Hunt Charles L | System and method for contextually understanding and analyzing system use and misuse |
CA2529402A1 (en) * | 2004-12-01 | 2006-06-01 | Kerri Smart | Wheel stud cleaning device |
US7734548B2 (en) * | 2004-12-06 | 2010-06-08 | At&T Intellectual Property, I,L.P. | Methods, systems, and products for providing electronic media |
US20060129479A1 (en) * | 2004-12-09 | 2006-06-15 | International Business Machines Corporation | Method and system for auction trading |
JP4857123B2 (en) * | 2004-12-13 | 2012-01-18 | パナソニック株式会社 | Unauthorized device detection apparatus, unauthorized device detection system, unauthorized device detection method, program, recording medium, and device information update method |
US20060129496A1 (en) * | 2004-12-14 | 2006-06-15 | Motorola, Inc. | Method and apparatus for providing digital rights management |
US7895617B2 (en) | 2004-12-15 | 2011-02-22 | Sony Corporation | Content substitution editor |
US8041190B2 (en) | 2004-12-15 | 2011-10-18 | Sony Corporation | System and method for the creation, synchronization and delivery of alternate content |
WO2006066052A2 (en) | 2004-12-16 | 2006-06-22 | Sonic Solutions | Methods and systems for use in network management of content |
RU2007127725A (en) | 2004-12-20 | 2009-01-27 | ПРОКСЕНС, ЭлЭлСи (US) | PERSONAL DATA (PDK) AUTHENTICATION BY BIOMETRIC KEY |
US8412779B1 (en) | 2004-12-21 | 2013-04-02 | Trend Micro Incorporated | Blocking of unsolicited messages in text messaging networks |
US8874544B2 (en) | 2005-01-13 | 2014-10-28 | International Business Machines Corporation | System and method for exposing internal search indices to internet search engines |
US9275052B2 (en) | 2005-01-19 | 2016-03-01 | Amazon Technologies, Inc. | Providing annotations of a digital work |
US8131647B2 (en) * | 2005-01-19 | 2012-03-06 | Amazon Technologies, Inc. | Method and system for providing annotations of a digital work |
US8700729B2 (en) | 2005-01-21 | 2014-04-15 | Robin Dua | Method and apparatus for managing credentials through a wireless network |
GB2422453A (en) * | 2005-01-22 | 2006-07-26 | Hewlett Packard Development Co | Dynamically allocating resources according to a privacy policy |
US20060167811A1 (en) * | 2005-01-24 | 2006-07-27 | Microsoft Corporation | Product locker for multi-merchant purchasing environment for downloadable products |
US20090171847A2 (en) * | 2005-01-24 | 2009-07-02 | Microsoft Corporation | Multi-merchant purchasing environment for downloadable products |
CA2592315C (en) * | 2005-01-26 | 2013-12-10 | Telcordia Technologies, Inc. | System and method for authorized digital content distribution |
US20060174350A1 (en) * | 2005-02-03 | 2006-08-03 | Navio Systems, Inc. | Methods and apparatus for optimizing identity management |
US20060170759A1 (en) * | 2005-02-03 | 2006-08-03 | Navio Systems Inc. | Methods and apparatus for optimizing digital asset distribution |
US20080015999A1 (en) * | 2005-02-04 | 2008-01-17 | Widevine Technologies, Inc. | Securely ingesting encrypted content into content servers |
US7890428B2 (en) * | 2005-02-04 | 2011-02-15 | Microsoft Corporation | Flexible licensing architecture for licensing digital application |
US20070106616A1 (en) * | 2005-02-07 | 2007-05-10 | Motoji Ohmori | License information management apparatus and license information management method |
US7840564B2 (en) | 2005-02-16 | 2010-11-23 | Ebrary | System and method for automatic anthology creation using document aspects |
US7584482B2 (en) * | 2005-02-23 | 2009-09-01 | Toshiba Corporation | System and method for authenticating transactions |
GB2423614A (en) * | 2005-02-25 | 2006-08-30 | Canon Europa Nv | Security management in a print control device |
US8813181B2 (en) * | 2005-03-07 | 2014-08-19 | Taun Eric Willis | Electronic verification systems |
KR20060097514A (en) * | 2005-03-07 | 2006-09-14 | 삼성전자주식회사 | Method and apparatus for providing encrypted content according to broadcast encryption scheme at local server |
US7549051B2 (en) * | 2005-03-10 | 2009-06-16 | Microsoft Corporation | Long-life digital certification for publishing long-life digital content or the like in content rights management system or the like |
JP3944216B2 (en) * | 2005-03-11 | 2007-07-11 | 株式会社エヌ・ティ・ティ・ドコモ | Authentication device, portable terminal, and authentication method |
US20130247146A1 (en) * | 2005-03-17 | 2013-09-19 | Dennis Lyon | Authentication system and method |
US7797245B2 (en) * | 2005-03-18 | 2010-09-14 | Black Duck Software, Inc. | Methods and systems for identifying an area of interest in protectable content |
US8539587B2 (en) | 2005-03-22 | 2013-09-17 | Hewlett-Packard Development Company, L.P. | Methods, devices and data structures for trusted data |
US7526812B2 (en) * | 2005-03-24 | 2009-04-28 | Xerox Corporation | Systems and methods for manipulating rights management data |
US7801808B1 (en) * | 2005-03-24 | 2010-09-21 | Morgan Stanley | Database structure for financial products with unique, consistent identifier for parties that assume roles with respect to the products and methods of using the database structure |
US8438645B2 (en) | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
JP4442487B2 (en) * | 2005-03-29 | 2010-03-31 | セイコーエプソン株式会社 | Confidential printing control apparatus and confidential printing control method |
US20060229998A1 (en) * | 2005-03-31 | 2006-10-12 | Mark Harrison | Payment via financial service provider using network-based device |
US20060242277A1 (en) * | 2005-03-31 | 2006-10-26 | Tripwire, Inc. | Automated change approval |
US20060224517A1 (en) * | 2005-04-04 | 2006-10-05 | Anirudha Shimpi | Systems and methods for delivering digital content to remote locations |
US20060249576A1 (en) * | 2005-04-04 | 2006-11-09 | Mark Nakada | Systems and methods for providing near real-time collection and reporting of data to third parties at remote locations |
US7970671B2 (en) * | 2005-04-12 | 2011-06-28 | Syncada Llc | Automated transaction processing system and approach with currency conversion |
US7856404B2 (en) * | 2005-04-14 | 2010-12-21 | Microsoft Corporation | Playlist burning in rights-management context |
US8880433B2 (en) | 2005-04-14 | 2014-11-04 | At&T Intellectual Property I, L.P. | Dynamic authentication of mark use |
US8738536B2 (en) * | 2005-04-14 | 2014-05-27 | Microsoft Corporation | Licensing content for use on portable device |
US8725646B2 (en) | 2005-04-15 | 2014-05-13 | Microsoft Corporation | Output protection levels |
US20060235795A1 (en) * | 2005-04-19 | 2006-10-19 | Microsoft Corporation | Secure network commercial transactions |
US8996423B2 (en) * | 2005-04-19 | 2015-03-31 | Microsoft Corporation | Authentication for a commercial transaction using a mobile module |
BRPI0608591A2 (en) * | 2005-04-19 | 2010-01-19 | Microsoft Corp | networked business transactions |
US7849020B2 (en) * | 2005-04-19 | 2010-12-07 | Microsoft Corporation | Method and apparatus for network transactions |
NZ595027A (en) * | 2005-04-19 | 2013-03-28 | Microsoft Corp | Network commercial transactions |
US7395254B2 (en) * | 2005-04-21 | 2008-07-01 | Xerox Corporation | Method for dynamic knowledge capturing in production printing workflow domain |
US7693280B2 (en) | 2005-04-22 | 2010-04-06 | Microsoft Corporation | Rights management system for streamed multimedia content |
US8290874B2 (en) | 2005-04-22 | 2012-10-16 | Microsoft Corporation | Rights management system for streamed multimedia content |
US20060242087A1 (en) * | 2005-04-22 | 2006-10-26 | Gregory Naehr | Point-of-sale and declining balance system, and method, having a relay server for facilitating communication between front-end devices and back-end account servers |
US20060242074A1 (en) * | 2005-04-22 | 2006-10-26 | Nokia Corporation | Encrypting digital rights management protected content |
US8516093B2 (en) | 2005-04-22 | 2013-08-20 | Intel Corporation | Playlist compilation system and method |
US9363481B2 (en) * | 2005-04-22 | 2016-06-07 | Microsoft Technology Licensing, Llc | Protected media pipeline |
US9507919B2 (en) | 2005-04-22 | 2016-11-29 | Microsoft Technology Licensing, Llc | Rights management system for streamed multimedia content |
US8091142B2 (en) * | 2005-04-26 | 2012-01-03 | Microsoft Corporation | Supplementary trust model for software licensing/commercial digital distribution policy |
US7657459B2 (en) * | 2005-04-27 | 2010-02-02 | Apple Inc. | Techniques for acquiring a media season of digital media assets |
US7848954B2 (en) * | 2005-04-27 | 2010-12-07 | Apple Inc. | On-line media store that supports pre-ordering of digital media assets |
US7848955B2 (en) * | 2005-04-27 | 2010-12-07 | Apple Inc. | On-line media store that supports pre-ordering of digital media assets |
US20090144153A1 (en) * | 2005-04-27 | 2009-06-04 | Kondrk Roberth H | Techniques for acquiring a set of digital media assets |
US8570586B2 (en) * | 2005-05-02 | 2013-10-29 | Digimarc Corporation | Active images through digital watermarking |
US7634494B2 (en) * | 2005-05-03 | 2009-12-15 | Intel Corporation | Flash memory directory virtualization |
US7533234B2 (en) * | 2005-05-13 | 2009-05-12 | Intel Corporation | Method and apparatus for storing compressed code without an index table |
US11362897B2 (en) * | 2005-05-19 | 2022-06-14 | International Business Machines Corporation | Site policy administrative agent |
US20060265758A1 (en) | 2005-05-20 | 2006-11-23 | Microsoft Corporation | Extensible media rights |
US7401083B2 (en) * | 2005-05-23 | 2008-07-15 | Goldman Sachs & Co. | Methods and systems for managing user access to computer software application programs |
US20060271915A1 (en) * | 2005-05-24 | 2006-11-30 | Contentguard Holdings, Inc. | Usage rights grammar and digital works having usage rights created with the grammar |
US7684566B2 (en) * | 2005-05-27 | 2010-03-23 | Microsoft Corporation | Encryption scheme for streamed multimedia content protected by rights management system |
US7721278B2 (en) * | 2005-05-27 | 2010-05-18 | Microsoft Corporation | Modular server architecture for multi-environment HTTP request processing |
GB0510878D0 (en) * | 2005-05-27 | 2005-07-06 | Qinetiq Ltd | Digital evidence bag |
US8321283B2 (en) * | 2005-05-27 | 2012-11-27 | Per-Se Technologies | Systems and methods for alerting pharmacies of formulary alternatives |
US7703033B2 (en) * | 2005-06-01 | 2010-04-20 | Sap Ag | Access administration using activatable rules |
US8676711B2 (en) * | 2005-06-10 | 2014-03-18 | Aniruddha Gupte | Payment method and apparatus for use in digital distribution system |
FR2887098B1 (en) * | 2005-06-14 | 2007-09-28 | Viaccess Sa | METHOD AND SYSTEM FOR SECURING A TRANSACTION IN A TELECOMMUNICATION NETWORK |
US8370639B2 (en) * | 2005-06-16 | 2013-02-05 | Sensible Vision, Inc. | System and method for providing secure access to an electronic device using continuous facial biometrics |
US8327448B2 (en) * | 2005-06-22 | 2012-12-04 | Intel Corporation | Protected clock management based upon a non-trusted persistent time source |
US8185877B1 (en) | 2005-06-22 | 2012-05-22 | Jpmorgan Chase Bank, N.A. | System and method for testing applications |
US20090076893A1 (en) * | 2007-09-13 | 2009-03-19 | Castineiras George A | Method for memorializing an individual's creative works |
JP2007011423A (en) * | 2005-06-28 | 2007-01-18 | Fujitsu Ltd | Charge processing apparatus |
US7831520B2 (en) * | 2005-06-28 | 2010-11-09 | Ebay Inc. | Mobile device communication system |
US20070011141A1 (en) * | 2005-06-30 | 2007-01-11 | Brooke Foucault | Method and system for augmenting a physical artifact with a digital story |
US20090235364A1 (en) * | 2005-07-01 | 2009-09-17 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Media markup for promotional content alteration |
US7433869B2 (en) * | 2005-07-01 | 2008-10-07 | Ebrary, Inc. | Method and apparatus for document clustering and document sketching |
US8203609B2 (en) * | 2007-01-31 | 2012-06-19 | The Invention Science Fund I, Llc | Anonymization pursuant to a broadcasted policy |
US20080013859A1 (en) * | 2005-07-01 | 2008-01-17 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Implementation of media content alteration |
US9230601B2 (en) * | 2005-07-01 | 2016-01-05 | Invention Science Fund I, Llc | Media markup system for content alteration in derivative works |
US20090037278A1 (en) * | 2005-07-01 | 2009-02-05 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Implementing visual substitution options in media works |
US20090150199A1 (en) * | 2005-07-01 | 2009-06-11 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Visual substitution options in media works |
US20090300480A1 (en) * | 2005-07-01 | 2009-12-03 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Media segment alteration with embedded markup identifier |
US20090151004A1 (en) * | 2005-07-01 | 2009-06-11 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Media markup for visual content alteration |
US9583141B2 (en) * | 2005-07-01 | 2017-02-28 | Invention Science Fund I, Llc | Implementing audio substitution options in media works |
US20090150444A1 (en) * | 2005-07-01 | 2009-06-11 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Media markup for audio content alteration |
US20080028422A1 (en) * | 2005-07-01 | 2008-01-31 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Implementation of media content alteration |
US8020004B2 (en) | 2005-07-01 | 2011-09-13 | Verance Corporation | Forensic marking using a common customization function |
US20090204475A1 (en) * | 2005-07-01 | 2009-08-13 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Media markup for promotional visual content |
US8126938B2 (en) | 2005-07-01 | 2012-02-28 | The Invention Science Fund I, Llc | Group content substitution in media works |
US20070294720A1 (en) * | 2005-07-01 | 2007-12-20 | Searete Llc | Promotional placement in media works |
US20090037243A1 (en) * | 2005-07-01 | 2009-02-05 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Audio substitution options in media works |
US8732087B2 (en) * | 2005-07-01 | 2014-05-20 | The Invention Science Fund I, Llc | Authorization for media content alteration |
US8126190B2 (en) * | 2007-01-31 | 2012-02-28 | The Invention Science Fund I, Llc | Targeted obstrufication of an image |
US7860342B2 (en) | 2005-07-01 | 2010-12-28 | The Invention Science Fund I, Llc | Modifying restricted images |
US20080052161A1 (en) * | 2005-07-01 | 2008-02-28 | Searete Llc | Alteration of promotional content in media works |
US20080010083A1 (en) * | 2005-07-01 | 2008-01-10 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Approval technique for media content alteration |
US20100154065A1 (en) * | 2005-07-01 | 2010-06-17 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Media markup for user-activated content alteration |
US9065979B2 (en) | 2005-07-01 | 2015-06-23 | The Invention Science Fund I, Llc | Promotional placement in media works |
US20070005422A1 (en) * | 2005-07-01 | 2007-01-04 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Techniques for image generation |
US20100017885A1 (en) * | 2005-07-01 | 2010-01-21 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Media markup identifier for alterable promotional segments |
US9092928B2 (en) | 2005-07-01 | 2015-07-28 | The Invention Science Fund I, Llc | Implementing group content substitution in media works |
US8781967B2 (en) | 2005-07-07 | 2014-07-15 | Verance Corporation | Watermarking in an encrypted domain |
US9911124B2 (en) | 2005-07-22 | 2018-03-06 | Gtj Ventures, Llc | Transaction security apparatus and method |
US9235841B2 (en) | 2005-07-22 | 2016-01-12 | Gtj Ventures, Llc | Transaction security apparatus and method |
US20080167994A1 (en) * | 2005-07-22 | 2008-07-10 | Koninklijke Philips Electronics, N.V. | Digital Inheritance |
US9245270B2 (en) | 2005-07-22 | 2016-01-26 | Gtj Ventures, Llc | Transaction security apparatus and method |
US7483862B1 (en) * | 2005-07-25 | 2009-01-27 | Yt Acquisition Corporation | System and method for prepaid biometric redemption accounts |
JP5265916B2 (en) * | 2005-07-25 | 2013-08-14 | 東洋インキScホールディングス株式会社 | Active energy ray curable ink for ink jet |
WO2007016124A2 (en) * | 2005-07-27 | 2007-02-08 | Mix & Burn, Llc. | Station for sale of digital media |
US20070058832A1 (en) | 2005-08-05 | 2007-03-15 | Realnetworks, Inc. | Personal media device |
US7438078B2 (en) * | 2005-08-05 | 2008-10-21 | Peter Woodruff | Sleeping bag and system |
US7640160B2 (en) | 2005-08-05 | 2009-12-29 | Voicebox Technologies, Inc. | Systems and methods for responding to natural language speech utterance |
US7620549B2 (en) | 2005-08-10 | 2009-11-17 | Voicebox Technologies, Inc. | System and method of supporting adaptive misrecognition in conversational speech |
US20070034266A1 (en) * | 2005-08-11 | 2007-02-15 | Ban-Chih Wang | Four-way valve |
US8321690B2 (en) * | 2005-08-11 | 2012-11-27 | Microsoft Corporation | Protecting digital media of various content types |
JP4824088B2 (en) * | 2005-08-12 | 2011-11-24 | エルジー エレクトロニクス インコーポレイティド | Usage rights transfer method in digital rights management |
US7734515B1 (en) | 2005-08-17 | 2010-06-08 | Amazon Technologies, Inc. | Generating new invocable composite network services based on multiple other invocable constituent network services |
US20070156525A1 (en) * | 2005-08-26 | 2007-07-05 | Spot Runner, Inc., A Delaware Corporation, Small Business Concern | Systems and Methods For Media Planning, Ad Production, and Ad Placement For Television |
US7949529B2 (en) | 2005-08-29 | 2011-05-24 | Voicebox Technologies, Inc. | Mobile systems and methods of supporting natural language human-machine interactions |
US7995753B2 (en) * | 2005-08-29 | 2011-08-09 | Cisco Technology, Inc. | Parallel cipher operations using a single data pass |
US8631226B2 (en) * | 2005-09-07 | 2014-01-14 | Verizon Patent And Licensing Inc. | Method and system for video monitoring |
US20070107012A1 (en) * | 2005-09-07 | 2007-05-10 | Verizon Business Network Services Inc. | Method and apparatus for providing on-demand resource allocation |
US9401080B2 (en) | 2005-09-07 | 2016-07-26 | Verizon Patent And Licensing Inc. | Method and apparatus for synchronizing video frames |
US9076311B2 (en) * | 2005-09-07 | 2015-07-07 | Verizon Patent And Licensing Inc. | Method and apparatus for providing remote workflow management |
US20070061268A1 (en) * | 2005-09-12 | 2007-03-15 | Microsoft Corporation | Prepaid or pay-as-you-go software, content and services delivered in a secure manner |
US8326926B2 (en) * | 2005-09-13 | 2012-12-04 | Mentor Graphics Corporation | Distributed electronic design automation architecture |
US7702590B2 (en) * | 2005-09-19 | 2010-04-20 | At&T Intellectual Property I, Lp | Trial access for media files from a media list |
US8583926B1 (en) | 2005-09-19 | 2013-11-12 | Jpmorgan Chase Bank, N.A. | System and method for anti-phishing authentication |
US20070106551A1 (en) * | 2005-09-20 | 2007-05-10 | Mcgucken Elliot | 22nets: method, system, and apparatus for building content and talent marketplaces and archives based on a social network |
US20070067643A1 (en) * | 2005-09-21 | 2007-03-22 | Widevine Technologies, Inc. | System and method for software tamper detection |
US8438115B2 (en) * | 2005-09-23 | 2013-05-07 | Pitney Bowes Inc. | Method of securing postage data records in a postage printing device |
US7817608B2 (en) * | 2005-09-23 | 2010-10-19 | Widevine Technologies, Inc. | Transitioning to secure IP communications for encoding, encapsulating, and encrypting data |
US8065733B2 (en) * | 2005-09-23 | 2011-11-22 | Google, Inc. | Method for evolving detectors to detect malign behavior in an artificial immune system |
WO2007038245A2 (en) | 2005-09-23 | 2007-04-05 | Widevine Technologies, Inc. | Method for evolving detectors to detect malign behavior in an artificial immune system |
US20120323735A1 (en) * | 2005-09-28 | 2012-12-20 | Saf-T-Pay, Inc. | Payment system and clearinghouse of internet transactions |
US8239682B2 (en) | 2005-09-28 | 2012-08-07 | Nl Systems, Llc | Method and system for digital rights management of documents |
US7516104B1 (en) | 2005-09-29 | 2009-04-07 | Qurio Holdings, Inc. | Methods of providing software over a network and related systems and computer program products |
WO2007041170A2 (en) * | 2005-09-29 | 2007-04-12 | Contentguard Holdings, Inc. | System for digital rights management using advanced copy with issue rights and managed copy tokens |
US20070079364A1 (en) * | 2005-09-30 | 2007-04-05 | Timothy Abels | Directory-secured packages for authentication of software installation |
US8874477B2 (en) | 2005-10-04 | 2014-10-28 | Steven Mark Hoffberg | Multifactorial optimization system and method |
US7996679B2 (en) * | 2005-10-05 | 2011-08-09 | International Business Machines Corporation | System and method for performing a trust-preserving migration of data objects from a source to a target |
US7328199B2 (en) * | 2005-10-07 | 2008-02-05 | Microsoft Corporation | Componentized slot-filling architecture |
US20070083474A1 (en) * | 2005-10-07 | 2007-04-12 | Burkhart Michael J | Administration of end-user licence agreements |
US8706635B2 (en) * | 2005-10-11 | 2014-04-22 | Microsoft Corporation | Use of licensed content without identification thereof |
US8306918B2 (en) * | 2005-10-11 | 2012-11-06 | Apple Inc. | Use of media storage structure with multiple pieces of content in a content-distribution system |
KR101198583B1 (en) * | 2005-10-12 | 2012-11-06 | 한국과학기술원 | Apparatus of multimedia middle ware using metadata and management method and storing medium thereof |
KR100763193B1 (en) * | 2005-10-13 | 2007-10-04 | 삼성전자주식회사 | System and Method for providing DRM license |
JP2009512096A (en) * | 2005-10-18 | 2009-03-19 | インタートラスト テクノロジーズ コーポレイション | System and method for digital rights management engine |
US20070204078A1 (en) * | 2006-02-09 | 2007-08-30 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
US9626667B2 (en) * | 2005-10-18 | 2017-04-18 | Intertrust Technologies Corporation | Digital rights management engine systems and methods |
US7720767B2 (en) * | 2005-10-24 | 2010-05-18 | Contentguard Holdings, Inc. | Method and system to support dynamic rights and resources sharing |
US7555715B2 (en) * | 2005-10-25 | 2009-06-30 | Sonic Solutions | Methods and systems for use in maintaining media data quality upon conversion to a different data format |
US20080126257A1 (en) * | 2005-10-26 | 2008-05-29 | Ballard Curtis C | Capacity ordering from storage apparatus |
US20070130209A1 (en) * | 2005-11-03 | 2007-06-07 | David Marples | System and method for generating consumer relational marketing information in a system for the distribution of digital content |
US20070106521A1 (en) * | 2005-11-04 | 2007-05-10 | Tp Lab | System and method to process media with preset credit |
US7822699B2 (en) * | 2005-11-30 | 2010-10-26 | Microsoft Corporation | Adaptive semantic reasoning engine |
US20070106496A1 (en) * | 2005-11-09 | 2007-05-10 | Microsoft Corporation | Adaptive task framework |
US7606700B2 (en) * | 2005-11-09 | 2009-10-20 | Microsoft Corporation | Adaptive task framework |
KR100746014B1 (en) * | 2005-11-09 | 2007-08-06 | 삼성전자주식회사 | Digital rights management method and system |
US20070143212A1 (en) * | 2005-11-09 | 2007-06-21 | Electronic Arts Inc. | Online product distribution using fingerprint and encryption |
CA2526791C (en) * | 2005-11-14 | 2012-01-10 | Bce Inc. | Method and system for providing personalized service mobility |
JP4732864B2 (en) * | 2005-11-15 | 2011-07-27 | 株式会社リコー | Program distribution server, program distribution method, program distribution program and recording medium thereof |
US20070110225A1 (en) * | 2005-11-16 | 2007-05-17 | Sub-Crypto Systems, Llc | Method and apparatus for efficient encryption |
US9020855B2 (en) * | 2005-11-18 | 2015-04-28 | Panasonic Intellectual Property Management Co., Ltd. | Recording/reproducing device, communication device, program, system LSI |
US9202210B2 (en) | 2005-11-23 | 2015-12-01 | Sandisk Il Ltd. | Digital rights management device and method |
JP4687424B2 (en) * | 2005-11-25 | 2011-05-25 | ソニー株式会社 | Information processing apparatus, information recording medium, information processing method, and computer program |
US7861308B2 (en) * | 2005-11-28 | 2010-12-28 | Sony Corporation | Digital rights management using trusted time |
US20070174385A1 (en) * | 2005-12-02 | 2007-07-26 | Dufour Remi | Computer system, method and software for establishing, managing, evaluating, classifying and storing on a server a set of server client digital media files under direct control of server client for delivery to third parties |
US20070168485A1 (en) * | 2005-12-02 | 2007-07-19 | Dufour Remi | Computer system, method and software for establishing, managing, evaluating, classifying and storing on a server a set of server client digital media files under direct control of server client for delivery to third parties |
US8689016B2 (en) * | 2005-12-02 | 2014-04-01 | Google Inc. | Tamper prevention and detection for video provided over a network to a client |
US20070130134A1 (en) * | 2005-12-05 | 2007-06-07 | Microsoft Corporation | Natural-language enabling arbitrary web forms |
US7933914B2 (en) * | 2005-12-05 | 2011-04-26 | Microsoft Corporation | Automatic task creation and execution using browser helper objects |
US7831585B2 (en) * | 2005-12-05 | 2010-11-09 | Microsoft Corporation | Employment of task framework for advertising |
EP1796000A1 (en) * | 2005-12-06 | 2007-06-13 | International Business Machines Corporation | Method, system and computer program for distributing software products in trial mode |
US20070162303A1 (en) * | 2005-12-08 | 2007-07-12 | Ndchealth Corporation | Systems and Methods for Shifting Prescription Market Share by Presenting Pricing Differentials for Therapeutic Alternatives |
GB0525244D0 (en) * | 2005-12-12 | 2006-01-18 | Nokia Corp | Providing communication service sessions |
US8938671B2 (en) | 2005-12-16 | 2015-01-20 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US11301585B2 (en) | 2005-12-16 | 2022-04-12 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US20070143856A1 (en) * | 2005-12-20 | 2007-06-21 | Naveen Aerrabotu | Method and apparatus for managing content in a mobile device |
JP2007172165A (en) * | 2005-12-20 | 2007-07-05 | Matsushita Electric Ind Co Ltd | Droit information management method |
US7788337B2 (en) * | 2005-12-21 | 2010-08-31 | Flinchem Edward P | Systems and methods for advertisement tracking |
US8191098B2 (en) * | 2005-12-22 | 2012-05-29 | Verimatrix, Inc. | Multi-source bridge content distribution system and method |
US20070162390A1 (en) * | 2005-12-22 | 2007-07-12 | Macrovision Corporation | Techniques for distributing and monitoring content |
US9118617B1 (en) | 2005-12-23 | 2015-08-25 | Emc Corporation | Methods and apparatus for adapting the protection level for protected content |
US7788181B2 (en) * | 2005-12-27 | 2010-08-31 | Microsoft Corporation | Software licensing using certificate issued by authorized authority |
US9177338B2 (en) * | 2005-12-29 | 2015-11-03 | Oncircle, Inc. | Software, systems, and methods for processing digital bearer instruments |
WO2007078987A2 (en) | 2005-12-29 | 2007-07-12 | Navio Systems, Inc. | Software, systems, and methods for processing digital bearer instruments |
US8171293B2 (en) | 2005-12-30 | 2012-05-01 | Apple Inc. | Receiver non-repudiation via a secure device |
US20070174159A1 (en) * | 2005-12-30 | 2007-07-26 | O'neil Douglas | Methods, systems, and products for monitoring transactions |
US9817831B2 (en) * | 2005-12-30 | 2017-11-14 | Microsoft Technology Licensing, Llc | Monetization of multimedia queries |
US8447695B2 (en) * | 2006-01-05 | 2013-05-21 | International Business Machines Corporation | System and method for processing feedback entries received from software |
JP4564464B2 (en) * | 2006-01-05 | 2010-10-20 | 株式会社東芝 | Digital content playback apparatus, method and program |
US9113464B2 (en) | 2006-01-06 | 2015-08-18 | Proxense, Llc | Dynamic cell size variation via wireless link parameter adjustment |
US8526612B2 (en) * | 2006-01-06 | 2013-09-03 | Google Inc. | Selective and persistent application level encryption for video provided to a client |
US11206664B2 (en) | 2006-01-06 | 2021-12-21 | Proxense, Llc | Wireless network synchronization of cells and client devices on a network |
US7813964B2 (en) * | 2006-01-06 | 2010-10-12 | Oracle America, Inc. | Click and run software purchasing |
US20070162369A1 (en) * | 2006-01-09 | 2007-07-12 | Hardison Joseph H Iii | Internet-based method of and system for transfering and exercising monetary rights within a financial marketplace |
US8626626B2 (en) | 2006-01-09 | 2014-01-07 | Interest Capturing Systems, Llc | Method of and system for capturing interest earned on the monetary value of transferred monetary rights managed on an internet-based monetary rights transfer (MRT) network supported by a real-time gross settlement (RTGS) system |
US20070168284A1 (en) * | 2006-01-10 | 2007-07-19 | International Business Machines Corporation | Management of encrypted storage media |
CN101401390B (en) * | 2006-01-11 | 2012-10-31 | 三星电子株式会社 | Security management method and apparatus in multimedia middleware, and storage medium therefor |
US7568143B2 (en) * | 2006-01-18 | 2009-07-28 | International Business Machines Corporation | System and method of utilizing a network to correct flawed media data |
JP2007193579A (en) * | 2006-01-19 | 2007-08-02 | Tokyo Electron Ltd | Substrate-processing device, license-managing program, license information-providing device, license information-providing program, license-managing system, and recording medium |
IL173268A0 (en) * | 2006-01-19 | 2006-06-11 | Lazovsky Alexander | Peer to peer file sharing mobile system with copy right protection |
US20100235924A1 (en) * | 2006-01-20 | 2010-09-16 | Bulot Earl J | Secure Personal Medical Process |
CN100452075C (en) * | 2006-01-27 | 2009-01-14 | 北京飞天诚信科技有限公司 | Security control methods for date transmission process of software protection device and device thereof |
US20070180231A1 (en) * | 2006-01-31 | 2007-08-02 | Widevine Technologies, Inc. | Preventing entitlement management message (EMM) filter attacks |
US20070179898A1 (en) * | 2006-02-02 | 2007-08-02 | General Instrument Corporation | Secure consumer distribution of content using subkeys for encryption and authentication |
US7792291B2 (en) * | 2006-02-10 | 2010-09-07 | Palo Alto Research Center Incorporated | XOR encoded document for secure message exchange |
US7747521B2 (en) * | 2006-02-22 | 2010-06-29 | First American Corelogic, Inc. | System and method for monitoring events associated with a person or property |
US7945070B2 (en) | 2006-02-24 | 2011-05-17 | Digimarc Corporation | Geographic-based watermarking keys |
US8185921B2 (en) | 2006-02-28 | 2012-05-22 | Sony Corporation | Parental control of displayed content using closed captioning |
US7555464B2 (en) * | 2006-03-01 | 2009-06-30 | Sony Corporation | Multiple DRM management |
US7996783B2 (en) * | 2006-03-02 | 2011-08-09 | Microsoft Corporation | Widget searching utilizing task framework |
JP2007267369A (en) * | 2006-03-03 | 2007-10-11 | Ricoh Co Ltd | Image formation device, control method thereof, program for controlling same, and recording medium |
US7381884B1 (en) * | 2006-03-03 | 2008-06-03 | Yourik Atakhanian | Sound generating hand wear |
GB0604784D0 (en) * | 2006-03-09 | 2006-04-19 | Ttp Communications Ltd | Integrity protection |
JP2007243703A (en) * | 2006-03-09 | 2007-09-20 | Toshiba Corp | Portable terminal |
US20070233568A1 (en) * | 2006-03-10 | 2007-10-04 | Provident Intellectual Property, Llc | Microtransactions Using Points Over Electronic Networks |
JP5200204B2 (en) | 2006-03-14 | 2013-06-05 | ディブエックス リミテッド ライアビリティー カンパニー | A federated digital rights management mechanism including a trusted system |
JP4876210B2 (en) * | 2006-03-14 | 2012-02-15 | 株式会社日本レジストリサービス | Identifier authentication system |
US7779099B2 (en) | 2006-03-16 | 2010-08-17 | Us Beverage Net Inc. | Distributed intelligent systems and methods therefor |
US9082113B2 (en) * | 2006-03-17 | 2015-07-14 | Wildtangent, Inc. | Licensing media consumption using digital currency |
US7480656B2 (en) | 2006-03-20 | 2009-01-20 | Sony Computer Entertainment America Inc. | Active validation of network devices |
US7753795B2 (en) * | 2006-03-20 | 2010-07-13 | Sony Computer Entertainment America Llc | Maintaining community integrity |
US8771061B2 (en) | 2006-03-20 | 2014-07-08 | Sony Computer Entertainment America Llc | Invalidating network devices with illicit peripherals |
US8622837B2 (en) | 2006-03-20 | 2014-01-07 | Sony Computer Entertainment America Llc | Managing game metrics and authorizations |
JP4920277B2 (en) * | 2006-03-24 | 2012-04-18 | 株式会社東芝 | Information processing device |
US20070226150A1 (en) * | 2006-03-27 | 2007-09-27 | Brent Pietrzak | Distribution of digital licenses and software via license tokens |
US8352449B1 (en) | 2006-03-29 | 2013-01-08 | Amazon Technologies, Inc. | Reader device content indexing |
US7778926B1 (en) * | 2006-03-29 | 2010-08-17 | Amazon Technologies, Inc. | Processes for verifying, and accepting content postings from, creators of works represented in an electronic catalog |
US8151327B2 (en) | 2006-03-31 | 2012-04-03 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
US20100138451A1 (en) * | 2006-04-03 | 2010-06-03 | Assaf Henkin | Techniques for facilitating on-line contextual analysis and advertising |
US9710818B2 (en) * | 2006-04-03 | 2017-07-18 | Kontera Technologies, Inc. | Contextual advertising techniques for implemented at mobile devices |
US8086535B2 (en) | 2006-04-04 | 2011-12-27 | Apple Inc. | Decoupling rights in a digital content unit from download |
US20070233601A1 (en) * | 2006-04-04 | 2007-10-04 | Nakada Mark W | Systems and methods for protecting digital content |
US7987514B2 (en) * | 2006-04-04 | 2011-07-26 | Intertrust Technologies Corp. | Systems and methods for retrofitting electronic appliances to accept different content formats |
US10102351B2 (en) * | 2006-04-04 | 2018-10-16 | Apple Inc. | Decoupling rights in a digital content unit from download |
CA3049789C (en) * | 2006-04-05 | 2022-06-28 | Timothy Mu-Chu Lee | Methods and systems for enhanced consumer payment |
DK2011301T3 (en) | 2006-04-10 | 2011-10-17 | Trust Integration Services B V | Arrangement and method for secure data transmission |
WO2007121911A1 (en) * | 2006-04-21 | 2007-11-01 | Tac Ab | Product, device, and system for controlling |
WO2007127881A2 (en) | 2006-04-26 | 2007-11-08 | Business Controls, Inc. | Anonymous reporting system |
WO2007130416A2 (en) * | 2006-04-29 | 2007-11-15 | Navio Systems, Inc. | Title-enabled networking |
US20070255659A1 (en) * | 2006-05-01 | 2007-11-01 | Wei Yen | System and method for DRM translation |
WO2007130554A2 (en) | 2006-05-02 | 2007-11-15 | Broadon Communications Corp. | Content management system and method |
US8224751B2 (en) * | 2006-05-03 | 2012-07-17 | Apple Inc. | Device-independent management of cryptographic information |
US20070288518A1 (en) * | 2006-05-03 | 2007-12-13 | Jeff Crigler | System and method for collecting and distributing content |
US7904718B2 (en) | 2006-05-05 | 2011-03-08 | Proxense, Llc | Personal digital key differentiation for secure transactions |
US8010538B2 (en) * | 2006-05-08 | 2011-08-30 | Black Duck Software, Inc. | Methods and systems for reporting regions of interest in content files |
US20070265982A1 (en) * | 2006-05-09 | 2007-11-15 | Stora Enso Oyj | Methods and computer program products for licensing software to multiple user classes |
KR101182473B1 (en) | 2006-05-09 | 2012-09-13 | 인터디지탈 테크날러지 코포레이션 | Secure time functionality for a wireless device |
US10528705B2 (en) * | 2006-05-09 | 2020-01-07 | Apple Inc. | Determining validity of subscription to use digital content |
US7908487B2 (en) * | 2006-05-10 | 2011-03-15 | Ndchealth Corporation | Systems and methods for public-key encryption for transmission of medical information |
JP2007304849A (en) * | 2006-05-11 | 2007-11-22 | Sony Corp | Management device, information processor, management method, and information processing method |
KR101346734B1 (en) * | 2006-05-12 | 2014-01-03 | 삼성전자주식회사 | Multi certificate revocation list support method and apparatus for digital rights management |
US20120259876A1 (en) * | 2006-05-15 | 2012-10-11 | Mathai Aji K | Database for Managing Contracts were Multiple Existing or Expiring Contracts are Replaced with a Combined Contract |
US20070265980A1 (en) * | 2006-05-15 | 2007-11-15 | Mukesh Sehgal | Systems and methods for managing, maximizing and clearing contractually based media assets |
US20080052165A1 (en) * | 2006-05-24 | 2008-02-28 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Peer to peer distribution system and method |
US8162209B2 (en) | 2006-05-25 | 2012-04-24 | Buchheit Brian K | Storefront purchases utilizing non-negotiable credits earned from a game of chance |
US8684265B1 (en) | 2006-05-25 | 2014-04-01 | Sean I. Mcghie | Rewards program website permitting conversion/transfer of non-negotiable credits to entity independent funds |
US9704174B1 (en) | 2006-05-25 | 2017-07-11 | Sean I. Mcghie | Conversion of loyalty program points to commerce partner points per terms of a mutual agreement |
US10062062B1 (en) | 2006-05-25 | 2018-08-28 | Jbshbm, Llc | Automated teller machine (ATM) providing money for loyalty points |
US20070282710A1 (en) * | 2006-05-25 | 2007-12-06 | Motorola, Inc. | Method for demonstrating the features of an application program |
US8376224B2 (en) | 2006-05-25 | 2013-02-19 | Sean I. Mcghie | Self-service stations for utilizing non-negotiable credits earned from a game of chance |
US7703673B2 (en) | 2006-05-25 | 2010-04-27 | Buchheit Brian K | Web based conversion of non-negotiable credits associated with an entity to entity independent negotiable funds |
US8342399B1 (en) | 2006-05-25 | 2013-01-01 | Mcghie Sean I | Conversion of credits to funds |
US8668146B1 (en) | 2006-05-25 | 2014-03-11 | Sean I. Mcghie | Rewards program with payment artifact permitting conversion/transfer of non-negotiable credits to entity independent funds |
WO2007143394A2 (en) * | 2006-06-02 | 2007-12-13 | Nielsen Media Research, Inc. | Digital rights management systems and methods for audience measurement |
US20080005034A1 (en) * | 2006-06-09 | 2008-01-03 | General Instrument Corporation | Method and Apparatus for Efficient Use of Trusted Third Parties for Additional Content-Sharing Security |
US20070289028A1 (en) * | 2006-06-12 | 2007-12-13 | Software Spectrum, Inc. | Time Bound Entitlement for Digital Content Distribution Framework |
US20070288389A1 (en) * | 2006-06-12 | 2007-12-13 | Vaughan Michael J | Version Compliance System |
US10229276B2 (en) * | 2006-06-12 | 2019-03-12 | Adobe Inc. | Method and apparatus for document author control of digital rights management |
CN100524333C (en) | 2006-06-13 | 2009-08-05 | 正璞科技有限公司 | Method for preventing illegal using software |
US8224745B2 (en) * | 2006-06-13 | 2012-07-17 | Corelogic Tax Services, Llc | Automatic delinquency item processing with customization for lenders |
US8024762B2 (en) * | 2006-06-13 | 2011-09-20 | Time Warner Cable Inc. | Methods and apparatus for providing virtual content over a network |
US20080005027A1 (en) * | 2006-06-14 | 2008-01-03 | John Jason Gentry Mullins | System and methods for transmission of media files across a telephone, internet, intranet, satellite, cable or combination network to avoid unpaid digital file sharing or copying |
US7836489B2 (en) * | 2006-06-15 | 2010-11-16 | Microsoft Corporation | Selecting policy for compatible communication |
US9277295B2 (en) | 2006-06-16 | 2016-03-01 | Cisco Technology, Inc. | Securing media content using interchangeable encryption key |
US9137480B2 (en) * | 2006-06-30 | 2015-09-15 | Cisco Technology, Inc. | Secure escrow and recovery of media device content keys |
US8427668B2 (en) * | 2006-07-03 | 2013-04-23 | Oracle America Inc. | Grid job submission using shared network filesystem |
US8869066B2 (en) | 2006-07-06 | 2014-10-21 | Addthis, Llc | Generic content collection systems |
US8069084B2 (en) | 2006-07-14 | 2011-11-29 | Wells Fargo Bank, N.A. | Customer controlled account, system, and process |
US8793490B1 (en) | 2006-07-14 | 2014-07-29 | Jpmorgan Chase Bank, N.A. | Systems and methods for multifactor authentication |
US8185960B1 (en) | 2006-07-27 | 2012-05-22 | Qlogic, Corporation | System and method for managing access to adapter features |
JP4816306B2 (en) * | 2006-07-28 | 2011-11-16 | 富士ゼロックス株式会社 | Information processing system, information processing apparatus, and program |
US8150748B1 (en) * | 2006-08-09 | 2012-04-03 | United Services Automobile Association (Usaa) | Systems and methods for dynamic configuration of software agents for transfer operations |
US20070100773A1 (en) * | 2006-08-11 | 2007-05-03 | Regions Asset Company | Transaction security system having user defined security parameters |
US8144266B2 (en) * | 2007-02-27 | 2012-03-27 | Sony Corporation | Module system for permitting storage device interface with TV |
US9299039B1 (en) * | 2006-08-23 | 2016-03-29 | A9.Com, Inc. | Managing task lists utilizing integrated information requests |
WO2008028200A2 (en) * | 2006-08-29 | 2008-03-06 | Benjamin Filmalter Grobler | Digital data licensing system |
FR2905543B1 (en) * | 2006-08-30 | 2009-01-16 | Viaccess Sa | SECURITY PROCESSOR AND METHOD AND RECORDING MEDIUM FOR CONFIGURING THE BEHAVIOR OF THIS PROCESSOR. |
JP4932390B2 (en) * | 2006-08-31 | 2012-05-16 | 株式会社日立製作所 | Virtualization system and area allocation control method |
US20100191624A1 (en) * | 2006-09-05 | 2010-07-29 | Bmc Software, Inc. | System and method for classifying requests |
US7992171B2 (en) * | 2006-09-06 | 2011-08-02 | Qurio Holdings, Inc. | System and method for controlled viral distribution of digital content in a social network |
US7873988B1 (en) | 2006-09-06 | 2011-01-18 | Qurio Holdings, Inc. | System and method for rights propagation and license management in conjunction with distribution of digital content in a social network |
US7606752B2 (en) | 2006-09-07 | 2009-10-20 | Yodlee Inc. | Host exchange in bill paying services |
US20080066192A1 (en) * | 2006-09-07 | 2008-03-13 | International Business Machines Corporation | Keyless copy of encrypted data |
EP1903716B1 (en) * | 2006-09-21 | 2013-06-19 | Siemens Aktiengesellschaft | Selective detailed representation of devices on a network |
WO2008037000A1 (en) * | 2006-09-25 | 2008-04-03 | Synaptic Laboratories Limited | Inhibiting cloning of hardware devices by general purpose software processors |
US7925592B1 (en) | 2006-09-27 | 2011-04-12 | Qurio Holdings, Inc. | System and method of using a proxy server to manage lazy content distribution in a social network |
US20080091613A1 (en) * | 2006-09-28 | 2008-04-17 | Microsoft Corporation | Rights management in a cloud |
US8725565B1 (en) | 2006-09-29 | 2014-05-13 | Amazon Technologies, Inc. | Expedited acquisition of a digital item following a sample presentation of the item |
US8056092B2 (en) * | 2006-09-29 | 2011-11-08 | Clearspring Technologies, Inc. | Method and apparatus for widget-container hosting and generation |
US8554827B2 (en) * | 2006-09-29 | 2013-10-08 | Qurio Holdings, Inc. | Virtual peer for a content sharing system |
US9672533B1 (en) | 2006-09-29 | 2017-06-06 | Amazon Technologies, Inc. | Acquisition of an item based on a catalog presentation of items |
US20080082627A1 (en) * | 2006-09-29 | 2008-04-03 | Allen Stewart O | Method and Apparatus for Widget Container/Widget Tracking and Metadata Manipulation |
US8051488B2 (en) * | 2006-10-05 | 2011-11-01 | Microsoft Corporation | Trial usage for encrypted subscription-based data |
US8712884B2 (en) | 2006-10-06 | 2014-04-29 | Syncada Llc | Transaction finance processing system and approach |
US20080249951A1 (en) * | 2006-10-10 | 2008-10-09 | Gilder Clark S | Security systems and methods for digital payments |
US8010803B2 (en) * | 2006-10-12 | 2011-08-30 | Black Duck Software, Inc. | Methods and apparatus for automated export compliance |
US7681045B2 (en) * | 2006-10-12 | 2010-03-16 | Black Duck Software, Inc. | Software algorithm identification |
US8073681B2 (en) | 2006-10-16 | 2011-12-06 | Voicebox Technologies, Inc. | System and method for a cooperative conversational voice user interface |
US7624276B2 (en) * | 2006-10-16 | 2009-11-24 | Broadon Communications Corp. | Secure device authentication system and method |
KR100828370B1 (en) * | 2006-10-20 | 2008-05-08 | 삼성전자주식회사 | Method and apparatus for providing DRM contents and license, and method and apparatus for using DRM contents |
US7870395B2 (en) * | 2006-10-20 | 2011-01-11 | International Business Machines Corporation | Load balancing for a system of cryptographic processors |
US20080098214A1 (en) * | 2006-10-24 | 2008-04-24 | Antonio Rodriguez Martinez | Encryption/decryption method, method for safe data transfer across a network, computer program products and computer readable media |
US20090112769A1 (en) * | 2007-10-24 | 2009-04-30 | Kent Dicks | Systems and methods for remote patient monitoring |
US20080097912A1 (en) * | 2006-10-24 | 2008-04-24 | Kent Dicks | Systems and methods for wireless processing and transmittal of medical data through an intermediary device |
US20080097917A1 (en) * | 2006-10-24 | 2008-04-24 | Kent Dicks | Systems and methods for wireless processing and medical device monitoring via remote command execution |
US20080104206A1 (en) * | 2006-10-31 | 2008-05-01 | Microsoft Corporation | Efficient knowledge representation in data synchronization systems |
US20080103923A1 (en) * | 2006-10-31 | 2008-05-01 | Digital River, Inc. | Centralized Payment Gateway System and Method |
US7966262B2 (en) * | 2006-10-31 | 2011-06-21 | Radiant Systems, Inc. | Pay at pump encryption device |
US20080103977A1 (en) * | 2006-10-31 | 2008-05-01 | Microsoft Corporation | Digital rights management for distributed devices |
US20080109656A1 (en) * | 2006-11-08 | 2008-05-08 | General Instrument Corporation | Method and Apparatus for Enabling Content to be Shared Among Multiple Devices in a Secure Environment |
US7613915B2 (en) * | 2006-11-09 | 2009-11-03 | BroadOn Communications Corp | Method for programming on-chip non-volatile memory in a secure processor, and a device so programmed |
WO2008057082A1 (en) * | 2006-11-09 | 2008-05-15 | Tp Lab, Inc. | System and method to process media with preset credit |
US9269221B2 (en) | 2006-11-13 | 2016-02-23 | John J. Gobbi | Configuration of interfaces for a location detection system and application |
US8102557B2 (en) * | 2006-11-13 | 2012-01-24 | Samsung Electronics Co., Ltd. | System and method for disabling access to non-volatile storage in a multi-function peripheral |
US8763110B2 (en) * | 2006-11-14 | 2014-06-24 | Sandisk Technologies Inc. | Apparatuses for binding content to a separate memory device |
WO2008066690A2 (en) * | 2006-11-14 | 2008-06-05 | Sandisk Corporation | Methods and apparatuses for linking content with license |
US8327454B2 (en) * | 2006-11-14 | 2012-12-04 | Sandisk Technologies Inc. | Method for allowing multiple users to access preview content |
US20080112562A1 (en) * | 2006-11-14 | 2008-05-15 | Fabrice Jogand-Coulomb | Methods for linking content with license |
US20080114772A1 (en) * | 2006-11-14 | 2008-05-15 | Fabrice Jogand-Coulomb | Method for connecting to a network location associated with content |
US20080114686A1 (en) * | 2006-11-14 | 2008-05-15 | Fabrice Jogand-Coulomb | Apparatuses for linking content with license |
US20080114693A1 (en) * | 2006-11-14 | 2008-05-15 | Fabrice Jogand-Coulomb | Method for allowing content protected by a first DRM system to be accessed by a second DRM system |
US8079071B2 (en) * | 2006-11-14 | 2011-12-13 | SanDisk Technologies, Inc. | Methods for accessing content based on a session ticket |
US10380621B2 (en) * | 2006-11-15 | 2019-08-13 | Api Market, Inc. | Title-acceptance and processing architecture |
IL179351A0 (en) * | 2006-11-16 | 2008-01-20 | Nds Ltd | System for embedding data |
US8200961B2 (en) * | 2006-11-19 | 2012-06-12 | Igware, Inc. | Securing a flash memory block in a secure device system and method |
US8107626B2 (en) * | 2006-11-22 | 2012-01-31 | The Directv Group, Inc. | Method and system for enabling transfer of content between a storage device and a portable media player device |
US9143734B2 (en) * | 2006-11-22 | 2015-09-22 | The Directv Group, Inc. | Method and system for providing content to a portable media player device and maintaining licensing rights |
US7702585B2 (en) * | 2006-11-30 | 2010-04-20 | Checkfree Corporation | Methods and systems for the determination and display of payment lead time in an electronic payment system |
EP2100239A1 (en) * | 2006-11-30 | 2009-09-16 | Koninklijke Philips Electronics N.V. | Arrangement for comparing content identifiers of files |
US8601555B2 (en) * | 2006-12-04 | 2013-12-03 | Samsung Electronics Co., Ltd. | System and method of providing domain management for content protection and security |
US20080133414A1 (en) * | 2006-12-04 | 2008-06-05 | Samsung Electronics Co., Ltd. | System and method for providing extended domain management when a primary device is unavailable |
US20080133419A1 (en) * | 2006-12-05 | 2008-06-05 | Brian Wormington | Secure financial transaction system and method |
US20080249882A1 (en) * | 2006-12-05 | 2008-10-09 | Spolar Margaret M | System for purchasing commercial products and items having monetary value with entertainment content |
US20080133368A1 (en) * | 2006-12-05 | 2008-06-05 | Spolar Margaret M | Entertainment, business transaction, information, telecommunications package |
US20090265649A1 (en) * | 2006-12-06 | 2009-10-22 | Pumpone, Llc | System and method for management and distribution of multimedia presentations |
US20080141378A1 (en) * | 2006-12-12 | 2008-06-12 | Mclean Ivan Hugh | Method and apparatus for creating licenses in a mobile digital rights management network |
US20080141334A1 (en) * | 2006-12-12 | 2008-06-12 | Wicker James M | Method and Apparatus for Dissociating Binding Information from Objects to Enable Proper Rights Management |
US8243923B2 (en) * | 2006-12-13 | 2012-08-14 | The Directv Group, Inc. | Method and system for providing a predeactivation warning in a system having a conditional access authorization expiration in a mobile receiving device |
US8548918B1 (en) | 2006-12-18 | 2013-10-01 | Qurio Holdings, Inc. | Methods and systems for automated content distribution |
US20080162228A1 (en) * | 2006-12-19 | 2008-07-03 | Friedrich Mechbach | Method and system for the integrating advertising in user generated contributions |
US20080148414A1 (en) * | 2006-12-19 | 2008-06-19 | Spansion Llc | Portable digital rights management (drm) |
US20120265715A1 (en) * | 2006-12-21 | 2012-10-18 | Seth Silver | Facilitated method to improve professional relationships |
US8325889B2 (en) * | 2006-12-22 | 2012-12-04 | Mobileaxept As | Efficient authentication of a user for conduct of a transaction initiated via mobile telephone |
US7890559B2 (en) * | 2006-12-22 | 2011-02-15 | International Business Machines Corporation | Forward shifting of processor element processing for load balancing |
US7590599B2 (en) * | 2006-12-22 | 2009-09-15 | International Business Machines Corporation | System and method of automatically maintaining and recycling software components |
US7788464B2 (en) * | 2006-12-22 | 2010-08-31 | Microsoft Corporation | Scalability of virtual TLBs for multi-processor virtual machines |
US7979398B2 (en) * | 2006-12-22 | 2011-07-12 | International Business Machines Corporation | Physical to electronic record content management |
US7831576B2 (en) * | 2006-12-22 | 2010-11-09 | International Business Machines Corporation | File plan import and sync over multiple systems |
US7836080B2 (en) * | 2006-12-22 | 2010-11-16 | International Business Machines Corporation | Using an access control list rule to generate an access control list for a document included in a file plan |
US7805472B2 (en) * | 2006-12-22 | 2010-09-28 | International Business Machines Corporation | Applying multiple disposition schedules to documents |
US8805743B2 (en) * | 2006-12-27 | 2014-08-12 | International Business Machines Corporation | Tracking, distribution and management of apportionable licenses granted for distributed software products |
US7865817B2 (en) * | 2006-12-29 | 2011-01-04 | Amazon Technologies, Inc. | Invariant referencing in digital works |
US8055586B1 (en) * | 2006-12-29 | 2011-11-08 | Amazon Technologies, Inc. | Providing configurable use by applications of sequences of invocable services |
KR101369399B1 (en) * | 2006-12-29 | 2014-03-05 | 삼성전자주식회사 | Method and system for performing drm related rights enforcement when drm agent and rendering application are inplimented on separate devices |
US7877812B2 (en) * | 2007-01-04 | 2011-01-25 | International Business Machines Corporation | Method, system and computer program product for enforcing privacy policies |
US8239688B2 (en) | 2007-01-07 | 2012-08-07 | Apple Inc. | Securely recovering a computing device |
US8254568B2 (en) | 2007-01-07 | 2012-08-28 | Apple Inc. | Secure booting a computing device |
US20080172336A1 (en) * | 2007-01-11 | 2008-07-17 | Oracle International Corporation | Content Distribution |
US8004713B2 (en) * | 2007-01-12 | 2011-08-23 | Ricoh Company, Ltd. | Creating and manufacturing documents that initially exceed equipment finishing capacity |
US8958562B2 (en) * | 2007-01-16 | 2015-02-17 | Voltage Security, Inc. | Format-preserving cryptographic systems |
WO2008090265A1 (en) * | 2007-01-24 | 2008-07-31 | Cpfk Holding | System for managing hiring access of a user to audio or video works |
US20080183626A1 (en) * | 2007-01-31 | 2008-07-31 | Francisco Romero | Software license agreement management based on temporary usage |
US20080183624A1 (en) * | 2007-01-31 | 2008-07-31 | Microsoft Corporation | Protecting presentations and binding presentation elements to the presentation |
US7818176B2 (en) | 2007-02-06 | 2010-10-19 | Voicebox Technologies, Inc. | System and method for selecting and presenting advertisements based on natural language processing of voice-based input |
US7620659B2 (en) * | 2007-02-09 | 2009-11-17 | Microsoft Corporation | Efficient knowledge representation in data synchronization systems |
US20080192446A1 (en) | 2007-02-09 | 2008-08-14 | Johannes Hankofer | Protection For Circuit Boards |
US20080195962A1 (en) * | 2007-02-12 | 2008-08-14 | Lin Daniel J | Method and System for Remotely Controlling The Display of Photos in a Digital Picture Frame |
US8024400B2 (en) | 2007-09-26 | 2011-09-20 | Oomble, Inc. | Method and system for transferring content from the web to mobile devices |
US7751807B2 (en) | 2007-02-12 | 2010-07-06 | Oomble, Inc. | Method and system for a hosted mobile management service architecture |
WO2008103286A2 (en) * | 2007-02-16 | 2008-08-28 | Veracode, Inc. | Assessment and analysis of software security flaws |
US9069967B2 (en) | 2007-02-16 | 2015-06-30 | Veracode, Inc. | Assessment and analysis of software security flaws |
US8613080B2 (en) | 2007-02-16 | 2013-12-17 | Veracode, Inc. | Assessment and analysis of software security flaws in virtual machines |
US20100281248A1 (en) * | 2007-02-16 | 2010-11-04 | Lockhart Malcolm W | Assessment and analysis of software security flaws |
JP4295328B2 (en) * | 2007-02-19 | 2009-07-15 | シャープ株式会社 | Image processing device |
US20080208762A1 (en) * | 2007-02-22 | 2008-08-28 | First Data Corporation | Payments using a mobile commerce device |
US20080207234A1 (en) * | 2007-02-22 | 2008-08-28 | First Data Corporation | Marketing messages in mobile commerce |
US20080208743A1 (en) * | 2007-02-22 | 2008-08-28 | First Data Corporation | Transfer of value between mobile devices in a mobile commerce system |
US8566239B2 (en) | 2007-02-22 | 2013-10-22 | First Data Corporation | Mobile commerce systems and methods |
US10102518B2 (en) | 2007-02-22 | 2018-10-16 | First Data Corporation | Enrollment and registration of a device in a mobile commerce system |
US20080208688A1 (en) * | 2007-02-22 | 2008-08-28 | First Data Corporation | Methods and systems for handling of mobile discount certificates using mobile devices |
US7895515B1 (en) * | 2007-02-28 | 2011-02-22 | Trend Micro Inc | Detecting indicators of misleading content in markup language coded documents using the formatting of the document |
US9009728B2 (en) * | 2007-03-06 | 2015-04-14 | Addthis, Inc. | Method and apparatus for widget and widget-container distribution control based on content rules |
WO2008109761A2 (en) * | 2007-03-06 | 2008-09-12 | Clearspring Technologies, Inc. | Method and apparatus for data processing |
US20080226078A1 (en) * | 2007-03-12 | 2008-09-18 | Microsoft Corporation | Enabling recording and copying data |
EP2363842A1 (en) * | 2007-03-12 | 2011-09-07 | Aristocrat Technologies Australia Pty, Ltd | System and method for server-based calculation of royalties for gaming |
WO2011005900A1 (en) * | 2009-07-07 | 2011-01-13 | Finsphere Corporation | Mobile directory number and email verification of financial transactions |
US20080235142A1 (en) * | 2007-03-20 | 2008-09-25 | Yahoo! Inc. | System and methods for obtaining rights in playlist entries |
US20080235141A1 (en) * | 2007-03-21 | 2008-09-25 | Microsoft Corporation | License manager and schema |
US8296240B2 (en) * | 2007-03-22 | 2012-10-23 | Sony Corporation | Digital rights management dongle |
WO2008116137A2 (en) * | 2007-03-22 | 2008-09-25 | Nielsen Media Research, Inc. | Digital rights management and audience measurement systems and methods |
US20100174608A1 (en) * | 2007-03-22 | 2010-07-08 | Harkness David H | Digital rights management and audience measurement systems and methods |
US20080262968A1 (en) * | 2007-03-26 | 2008-10-23 | Infosys Technologies Ltd. | Software licensing control via mobile devices |
US9665529B1 (en) | 2007-03-29 | 2017-05-30 | Amazon Technologies, Inc. | Relative progress and event indicators |
US7716224B2 (en) | 2007-03-29 | 2010-05-11 | Amazon Technologies, Inc. | Search and indexing on a user device |
US20080243788A1 (en) * | 2007-03-29 | 2008-10-02 | Reztlaff James R | Search of Multiple Content Sources on a User Device |
US20120164613A1 (en) * | 2007-11-07 | 2012-06-28 | Jung Edward K Y | Determining a demographic characteristic based on computational user-health testing of a user interaction with advertiser-specified content |
US20090132275A1 (en) * | 2007-11-19 | 2009-05-21 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Determining a demographic characteristic of a user based on computational user-health testing |
US20080244755A1 (en) * | 2007-03-30 | 2008-10-02 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Authorization for media content alteration |
WO2008124560A1 (en) * | 2007-04-05 | 2008-10-16 | Sentillion, Inc. | Augmenting a virtual machine hosting environment from within a virtual machine |
US20080256078A1 (en) * | 2007-04-10 | 2008-10-16 | Venkat Bhashyam | Secure distributed computing engine and database system |
US8548908B2 (en) * | 2007-04-11 | 2013-10-01 | First Data Corporation | Mobile commerce infrastructure systems and methods |
US8539543B2 (en) * | 2007-04-12 | 2013-09-17 | Microsoft Corporation | Managing digital rights for multiple assets in an envelope |
US20080256646A1 (en) * | 2007-04-12 | 2008-10-16 | Microsoft Corporation | Managing Digital Rights in a Member-Based Domain Architecture |
US8116323B1 (en) | 2007-04-12 | 2012-02-14 | Qurio Holdings, Inc. | Methods for providing peer negotiation in a distributed virtual environment and related systems and computer program products |
US9805374B2 (en) | 2007-04-12 | 2017-10-31 | Microsoft Technology Licensing, Llc | Content preview |
US20100106580A1 (en) * | 2007-04-17 | 2010-04-29 | American Express Travel Related Services Company, Inc. | System and method for determining positive behavior and/or making awards based upon geographic location |
US20080263056A1 (en) * | 2007-04-19 | 2008-10-23 | Youbiquity, Llc | Electronic content asset publication system |
WO2008131423A1 (en) * | 2007-04-23 | 2008-10-30 | Weogeo, Inc. | Digital content marketing system and method |
US20080270161A1 (en) * | 2007-04-26 | 2008-10-30 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Authorization rights for substitute media content |
US9215512B2 (en) | 2007-04-27 | 2015-12-15 | Invention Science Fund I, Llc | Implementation of media content alteration |
US20080301022A1 (en) * | 2007-04-30 | 2008-12-04 | Cashedge, Inc. | Real-Time Core Integration Method and System |
US20080301023A1 (en) * | 2007-05-02 | 2008-12-04 | Cashedge, Inc. | Multi-Channel and Cross-Channel Account Opening |
US8706696B2 (en) | 2007-05-04 | 2014-04-22 | Salesforce.Com, Inc. | Method and system for on-demand communities |
EP1988451A1 (en) * | 2007-05-04 | 2008-11-05 | Deutsche Thomson OHG | Method for generating a set of machine-interpretable instructions for presenting media content to a user |
US8737965B2 (en) * | 2007-05-07 | 2014-05-27 | Battelle Energy Alliance, Llc | Wireless device monitoring systems and monitoring devices, and associated methods |
US8522051B2 (en) * | 2007-05-07 | 2013-08-27 | Infineon Technologies Ag | Protection for circuit boards |
US8175578B2 (en) * | 2007-05-07 | 2012-05-08 | Battelle Energy Alliance, Llc | Wireless device monitoring methods, wireless device monitoring systems, and articles of manufacture |
TWI394459B (en) * | 2007-05-16 | 2013-04-21 | Sony Corp | Content download system and content download method, content receiving device, and content supply method and content receiving program, content receiving apparatus, and content receiving method and content receiving program |
TW200846896A (en) * | 2007-05-16 | 2008-12-01 | Icp Electronics Inc | System for backing up and recovering data and method for the same applied to data processing apparatus |
US8473735B1 (en) | 2007-05-17 | 2013-06-25 | Jpmorgan Chase | Systems and methods for managing digital certificates |
US8621093B2 (en) * | 2007-05-21 | 2013-12-31 | Google Inc. | Non-blocking of head end initiated revocation and delivery of entitlements non-addressable digital media network |
US8341210B1 (en) | 2007-05-21 | 2012-12-25 | Amazon Technologies, Inc. | Delivery of items for consumption by a user device |
US20080294561A1 (en) * | 2007-05-22 | 2008-11-27 | Microsoft Corporation | Media content deciphered when initiated for playback |
US8347098B2 (en) * | 2007-05-22 | 2013-01-01 | Apple Inc. | Media storage structures for storing content, devices for using such structures, systems for distributing such structures |
US9311492B2 (en) | 2007-05-22 | 2016-04-12 | Apple Inc. | Media storage structures for storing content, devices for using such structures, systems for distributing such structures |
WO2008148118A2 (en) * | 2007-05-25 | 2008-12-04 | Metafos Inc. | Anonymous online payment systems and methods |
TW200910959A (en) * | 2007-05-30 | 2009-03-01 | Sony Corp | Content download system, content download method, content supplying apparatus, content supplying method, content receiving apparatus, content receiving method, and program |
US8566246B2 (en) * | 2007-05-30 | 2013-10-22 | Red Hat, Inc. | Hosted system monitoring service |
US7711648B2 (en) * | 2007-06-05 | 2010-05-04 | Copyright Clearance Center, Inc. | Method and apparatus for obtaining content license rights via a document link resolver |
US8996409B2 (en) | 2007-06-06 | 2015-03-31 | Sony Computer Entertainment Inc. | Management of online trading services using mediated communications |
US20080307237A1 (en) * | 2007-06-08 | 2008-12-11 | Michael Holtzman | Method for improving accuracy of a time estimate used to authenticate an entity to a memory device |
US8688588B2 (en) * | 2007-06-08 | 2014-04-01 | Sandisk Technologies Inc. | Method for improving accuracy of a time estimate used in digital rights management (DRM) license validation |
US8869288B2 (en) * | 2007-06-08 | 2014-10-21 | Sandisk Technologies Inc. | Method for using time from a trusted host device |
US8688924B2 (en) * | 2007-06-08 | 2014-04-01 | Sandisk Technologies Inc. | Method for improving accuracy of a time estimate from a memory device |
US7778869B2 (en) * | 2007-06-12 | 2010-08-17 | Microsoft Corporation | Fair discounting auction |
US8433656B1 (en) * | 2007-06-13 | 2013-04-30 | Qurio Holdings, Inc. | Group licenses for virtual objects in a distributed virtual world |
US20090140992A1 (en) * | 2007-06-16 | 2009-06-04 | Sunrise Telecom Incorporated | Display system |
US20080313084A1 (en) * | 2007-06-18 | 2008-12-18 | Socolofsky David E | Digital Content Royalty Management System and Method |
KR101333206B1 (en) * | 2007-06-19 | 2013-11-26 | 퀄컴 인코포레이티드 | Methods, systems, and apparatus for content licensing |
KR101030489B1 (en) * | 2007-06-22 | 2011-04-25 | 주식회사 케이티 | system for controlling smart card and method thereof |
US8121956B2 (en) | 2007-06-25 | 2012-02-21 | Visa U.S.A. Inc. | Cardless challenge systems and methods |
US20080319871A1 (en) * | 2007-06-25 | 2008-12-25 | Rowland Hayes Thomas | Systems and Methods for Auto-Generation of Rich Media Purchase, Reservation and/or Activity Information |
US20090006261A1 (en) * | 2007-06-28 | 2009-01-01 | Microsoft Corporation | Portable device for carrying licenses |
US8117094B2 (en) * | 2007-06-29 | 2012-02-14 | Microsoft Corporation | Distribution channels and monetizing |
US8243924B2 (en) * | 2007-06-29 | 2012-08-14 | Google Inc. | Progressive download or streaming of digital media securely through a localized container and communication protocol proxy |
US10223858B2 (en) * | 2007-07-05 | 2019-03-05 | Mediaport Entertainment, Inc. | Systems and methods monitoring devices, systems, users and user activity at remote locations |
US8590028B2 (en) * | 2007-07-09 | 2013-11-19 | Infosys Limited | Content licensing and conditional access using a mobile device |
US7991790B2 (en) * | 2007-07-20 | 2011-08-02 | Salesforce.Com, Inc. | System and method for storing documents accessed by multiple users in an on-demand service |
JP2009027525A (en) * | 2007-07-20 | 2009-02-05 | Nec Corp | Optical transmission system and optical transmission method |
US7552405B1 (en) | 2007-07-24 | 2009-06-23 | Xilinx, Inc. | Methods of implementing embedded processor systems including state machines |
KR20090011152A (en) * | 2007-07-25 | 2009-02-02 | 삼성전자주식회사 | Method and system for service contents |
US20090037963A1 (en) * | 2007-08-02 | 2009-02-05 | Youbiquity, Llc | System for electronic retail sales of multi-media assets |
JP2011504617A (en) * | 2007-08-02 | 2011-02-10 | ソニー ビーエムジー ミュージック エンターテイメント | Method and apparatus for distributing digital content |
JP2009038739A (en) * | 2007-08-03 | 2009-02-19 | Brother Ind Ltd | Color converting apparatus, color converting program and color converting method |
WO2009020605A2 (en) * | 2007-08-06 | 2009-02-12 | Thomson Licensing | Method and system for product services analysis and optimization |
US9147049B2 (en) * | 2007-08-16 | 2015-09-29 | Honeywell International Inc. | Embedded building conroller with stored software license information |
US8219494B1 (en) * | 2007-08-16 | 2012-07-10 | Corbis Corporation | End-to-end licensing of digital media assets |
US9098840B2 (en) * | 2007-08-22 | 2015-08-04 | Siemens Aktiengesellschaft | System and method for providing and activating software licenses |
US20110040688A1 (en) * | 2007-08-28 | 2011-02-17 | Deutsche Telekom Ag | Method, system and computer program product for the decentralized distribution of digital content |
US9774445B1 (en) * | 2007-09-04 | 2017-09-26 | Netapp, Inc. | Host based rekeying |
US20100274644A1 (en) * | 2007-09-07 | 2010-10-28 | Ryan Steelberg | Engine, system and method for generation of brand affinity content |
US9294727B2 (en) * | 2007-10-31 | 2016-03-22 | Veritone, Inc. | System and method for creation and management of advertising inventory using metadata |
US20110047050A1 (en) * | 2007-09-07 | 2011-02-24 | Ryan Steelberg | Apparatus, System And Method For A Brand Affinity Engine Using Positive And Negative Mentions And Indexing |
US20100114693A1 (en) * | 2007-09-07 | 2010-05-06 | Ryan Steelberg | System and method for developing software and web based applications |
US20100131337A1 (en) * | 2007-09-07 | 2010-05-27 | Ryan Steelberg | System and method for localized valuations of media assets |
US20100318375A1 (en) * | 2007-09-07 | 2010-12-16 | Ryan Steelberg | System and Method for Localized Valuations of Media Assets |
US20110040648A1 (en) * | 2007-09-07 | 2011-02-17 | Ryan Steelberg | System and Method for Incorporating Memorabilia in a Brand Affinity Content Distribution |
US20110078003A1 (en) * | 2007-09-07 | 2011-03-31 | Ryan Steelberg | System and Method for Localized Valuations of Media Assets |
US20090112717A1 (en) * | 2007-10-31 | 2009-04-30 | Ryan Steelberg | Apparatus, system and method for a brand affinity engine with delivery tracking and statistics |
US20110131141A1 (en) * | 2008-09-26 | 2011-06-02 | Ryan Steelberg | Advertising request and rules-based content provision engine, system and method |
US8452764B2 (en) * | 2007-09-07 | 2013-05-28 | Ryan Steelberg | Apparatus, system and method for a brand affinity engine using positive and negative mentions and indexing |
US20100217664A1 (en) * | 2007-09-07 | 2010-08-26 | Ryan Steelberg | Engine, system and method for enhancing the value of advertisements |
US20100114704A1 (en) * | 2007-09-07 | 2010-05-06 | Ryan Steelberg | System and method for brand affinity content distribution and optimization |
US9633505B2 (en) * | 2007-09-07 | 2017-04-25 | Veritone, Inc. | System and method for on-demand delivery of audio content for use with entertainment creatives |
US20100131085A1 (en) * | 2007-09-07 | 2010-05-27 | Ryan Steelberg | System and method for on-demand delivery of audio content for use with entertainment creatives |
US20100114719A1 (en) * | 2007-09-07 | 2010-05-06 | Ryan Steelberg | Engine, system and method for generation of advertisements with endorsements and associated editorial content |
US8751479B2 (en) * | 2007-09-07 | 2014-06-10 | Brand Affinity Technologies, Inc. | Search and storage engine having variable indexing for information associations |
US20090112718A1 (en) * | 2007-10-31 | 2009-04-30 | Ryan Steelberg | System and method for distributing content for use with entertainment creatives |
US8725563B2 (en) * | 2007-09-07 | 2014-05-13 | Brand Affinity Technologies, Inc. | System and method for searching media assets |
US8285700B2 (en) | 2007-09-07 | 2012-10-09 | Brand Affinity Technologies, Inc. | Apparatus, system and method for a brand affinity engine using positive and negative mentions and indexing |
US20100131357A1 (en) * | 2007-09-07 | 2010-05-27 | Ryan Steelberg | System and method for controlling user and content interactions |
US20090112714A1 (en) * | 2007-10-31 | 2009-04-30 | Ryan Steelberg | Engine, system and method for generation of brand affinity content |
US20090112700A1 (en) * | 2007-10-31 | 2009-04-30 | Ryan Steelberg | System and method for brand affinity content distribution and optimization |
US7809603B2 (en) * | 2007-09-07 | 2010-10-05 | Brand Affinity Technologies, Inc. | Advertising request and rules-based content provision engine, system and method |
US20100114701A1 (en) * | 2007-09-07 | 2010-05-06 | Brand Affinity Technologies, Inc. | System and method for brand affinity content distribution and optimization with charitable organizations |
US20100030746A1 (en) * | 2008-07-30 | 2010-02-04 | Ryan Steelberg | System and method for distributing content for use with entertainment creatives including consumer messaging |
US20090070122A1 (en) * | 2007-09-12 | 2009-03-12 | Apple Inc. | Escrow service for providing licensed digital content |
KR101401818B1 (en) * | 2007-09-12 | 2014-05-30 | 소니 픽쳐스 엔터테인먼트, 인크. | Open market content distribution |
US9483405B2 (en) | 2007-09-20 | 2016-11-01 | Sony Interactive Entertainment Inc. | Simplified run-time program translation for emulating complex processor pipelines |
JP4823992B2 (en) * | 2007-09-21 | 2011-11-24 | キヤノンソフトウェア株式会社 | Print control system, printing apparatus, print management server, print control method, and program |
EP2040413B1 (en) * | 2007-09-21 | 2013-06-19 | Nokia Siemens Networks Oy | Subscription and advice of charge control |
US8321508B2 (en) * | 2007-09-25 | 2012-11-27 | International Business Machines Corporation | Controlling collaboration participation |
US9060012B2 (en) * | 2007-09-26 | 2015-06-16 | The 41St Parameter, Inc. | Methods and apparatus for detecting fraud with time based computer tags |
US10361864B2 (en) * | 2007-09-29 | 2019-07-23 | Intel Corporation | Enabling a secure OEM platform feature in a computing environment |
WO2009044461A1 (en) * | 2007-10-03 | 2009-04-09 | Fujitsu Limited | Device access control program, device access control method, and information processor |
WO2009043164A1 (en) * | 2007-10-04 | 2009-04-09 | Memory Experts International Inc. | A method of providing firmware to a processor-based electronic device |
US8209378B2 (en) * | 2007-10-04 | 2012-06-26 | Clearspring Technologies, Inc. | Methods and apparatus for widget sharing between content aggregation points |
US8768853B2 (en) * | 2007-10-05 | 2014-07-01 | Ebay Inc. | Secondary identification for remittance delivery |
US20090094160A1 (en) * | 2007-10-09 | 2009-04-09 | Webster Kurt F | Portable digital content device and methods for use therewith |
US20090100060A1 (en) * | 2007-10-11 | 2009-04-16 | Noam Livnat | Device, system, and method of file-utilization management |
US10558961B2 (en) * | 2007-10-18 | 2020-02-11 | Wayne Fueling Systems Llc | System and method for secure communication in a retail environment |
US20090112770A1 (en) * | 2007-10-29 | 2009-04-30 | Siemens Aktiengesellschaft | Method for generating a context of medical data for medical treatment |
US8065166B2 (en) | 2007-10-30 | 2011-11-22 | Onemednet Corporation | Methods, systems, and devices for managing medical images and records |
US9171344B2 (en) | 2007-10-30 | 2015-10-27 | Onemednet Corporation | Methods, systems, and devices for managing medical images and records |
US20090299837A1 (en) * | 2007-10-31 | 2009-12-03 | Ryan Steelberg | System and method for brand affinity content distribution and optimization |
US20100076866A1 (en) * | 2007-10-31 | 2010-03-25 | Ryan Steelberg | Video-related meta data engine system and method |
US20110106632A1 (en) * | 2007-10-31 | 2011-05-05 | Ryan Steelberg | System and method for alternative brand affinity content transaction payments |
US10013536B2 (en) * | 2007-11-06 | 2018-07-03 | The Mathworks, Inc. | License activation and management |
WO2009062194A1 (en) | 2007-11-09 | 2009-05-14 | Proxense, Llc | Proximity-sensor supporting multiple application services |
US20090132425A1 (en) * | 2007-11-20 | 2009-05-21 | Hogan Peter P | Methods and systems for financial transaction card security |
US20090132422A1 (en) * | 2007-11-21 | 2009-05-21 | Microsoft Corporation | Machine-readable and enforceable license |
US20090132435A1 (en) * | 2007-11-21 | 2009-05-21 | Microsoft Corporation | Popularity based licensing of user generated content |
US20090132403A1 (en) * | 2007-11-21 | 2009-05-21 | Microsoft Corporation | Licensing interface for user generated content |
US9223884B2 (en) * | 2007-11-29 | 2015-12-29 | Sap Se | Resource identifier personalization |
US9349127B2 (en) | 2007-11-29 | 2016-05-24 | Visa Usa Inc. | Serial number and payment data based payment card processing |
US8831220B2 (en) * | 2007-11-30 | 2014-09-09 | Battelle Energy Alliance, Llc | Processing module operating methods, processing modules, and communications systems |
US8171528B1 (en) | 2007-12-06 | 2012-05-01 | Proxense, Llc | Hybrid device having a personal digital key and receiver-decoder circuit and methods of use |
JP5088735B2 (en) * | 2007-12-07 | 2012-12-05 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Technology to control access to the database |
US8140335B2 (en) | 2007-12-11 | 2012-03-20 | Voicebox Technologies, Inc. | System and method for providing a natural language voice user interface in an integrated voice navigation services environment |
US9892390B2 (en) * | 2007-12-12 | 2018-02-13 | Microsoft Technology Licensing, Llc | Digital content packaging, licensing and consumption |
US9122843B2 (en) * | 2007-12-12 | 2015-09-01 | International Business Machines Corporation | Software license reconciliation facility |
US20090154699A1 (en) * | 2007-12-13 | 2009-06-18 | Verizon Services Organization Inc. | Network-based data exchange |
US20090157748A1 (en) * | 2007-12-14 | 2009-06-18 | Mckesson Financial Holding Limited | Systems and methods for seekable layer file encoding and decoding |
US7904602B2 (en) * | 2008-02-05 | 2011-03-08 | Raptor Networks Technology, Inc. | Distributed computing bus |
KR20090065350A (en) * | 2007-12-17 | 2009-06-22 | 한국전자통신연구원 | Apparatus and method for protecting contents in case of contents streaming by use of re-transmittion |
CN101903787A (en) * | 2007-12-18 | 2010-12-01 | 皇家飞利浦电子股份有限公司 | Dynamic magnetic resonance imaging (MRI) with adaptive image quality |
US9251332B2 (en) | 2007-12-19 | 2016-02-02 | Proxense, Llc | Security system and method for controlling access to computing resources |
US20090164949A1 (en) * | 2007-12-20 | 2009-06-25 | Kontera Technologies, Inc. | Hybrid Contextual Advertising Technique |
EP2223460A4 (en) * | 2007-12-20 | 2011-12-28 | Bce Inc | Contact-less tag with signature, and applications thereof |
RU2504005C2 (en) * | 2007-12-20 | 2014-01-10 | Конинклейке Филипс Электроникс Н.В. | Digital rights management apparatus and method |
US9071436B2 (en) * | 2007-12-21 | 2015-06-30 | The Invention Science Fund I, Llc | Security-activated robotic system |
KR20100133953A (en) | 2007-12-21 | 2010-12-22 | 코쿤 데이터 홀딩스 리미티드 | System and method for securing data |
US8752166B2 (en) * | 2007-12-21 | 2014-06-10 | The Invention Science Fund I, Llc | Security-activated operational components |
US9128476B2 (en) | 2007-12-21 | 2015-09-08 | The Invention Science Fund I, Llc | Secure robotic operational system |
US20090164379A1 (en) * | 2007-12-21 | 2009-06-25 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Conditional authorization for security-activated device |
US20110178619A1 (en) * | 2007-12-21 | 2011-07-21 | Searete Llc, A Limited Liability Corporation Of The State Of Delaware | Security-activated robotic tasks |
US8286236B2 (en) * | 2007-12-21 | 2012-10-09 | The Invention Science Fund I, Llc | Manufacturing control system |
US9818071B2 (en) * | 2007-12-21 | 2017-11-14 | Invention Science Fund I, Llc | Authorization rights for operational components |
US9626487B2 (en) * | 2007-12-21 | 2017-04-18 | Invention Science Fund I, Llc | Security-activated production device |
US8429754B2 (en) * | 2007-12-21 | 2013-04-23 | The Invention Science Fund I, Llc | Control technique for object production rights |
US9501453B2 (en) | 2007-12-23 | 2016-11-22 | Salesforce.Com Inc. | Method and system for a flexible-data column user interface |
US20110282728A1 (en) * | 2007-12-26 | 2011-11-17 | Sarah Bingham | System and method for engaging and acquiring customers |
US20110014972A1 (en) * | 2007-12-26 | 2011-01-20 | Herrmann Mark E | System and method for managing content delivery and measuring engagement |
AU2008344947B2 (en) * | 2007-12-27 | 2013-10-17 | Safend Ltd. | System and method for securely storing information |
AU2008344956B2 (en) * | 2007-12-31 | 2013-09-26 | Safend Ltd. | System, apparatus, and method for bios level contextual configuration of resources |
US8997161B2 (en) * | 2008-01-02 | 2015-03-31 | Sonic Ip, Inc. | Application enhancement tracks |
CN101477666A (en) * | 2008-01-03 | 2009-07-08 | 鸿富锦精密工业(深圳)有限公司 | Information lease system, information lease provider and lease method thereof |
KR100958782B1 (en) * | 2008-01-03 | 2010-05-19 | 성균관대학교산학협력단 | Electronic device, home network system and method for protecting unauthorized distribution of digital contents |
JP2009163595A (en) * | 2008-01-09 | 2009-07-23 | Sony Corp | Information processing system, information processor, information processing method, and computer program |
US8612997B2 (en) | 2008-01-15 | 2013-12-17 | International Business Machines Corporation | Event-driven component integration framework for implementing distributed systems |
AU2009205675B2 (en) * | 2008-01-18 | 2014-09-25 | Identrust, Inc. | Binding a digital certificate to multiple trust domains |
US8321682B1 (en) | 2008-01-24 | 2012-11-27 | Jpmorgan Chase Bank, N.A. | System and method for generating and managing administrator passwords |
US8751337B2 (en) | 2008-01-25 | 2014-06-10 | Syncada Llc | Inventory-based payment processing system and approach |
US8656190B2 (en) * | 2008-01-31 | 2014-02-18 | Microsoft Corporation | One time settable tamper resistant software repository |
US8868464B2 (en) | 2008-02-07 | 2014-10-21 | Google Inc. | Preventing unauthorized modification or skipping of viewing of advertisements within content |
JP2011511384A (en) * | 2008-02-07 | 2011-04-07 | ブランド・アフィニティー・テクノロジーズ・インコーポレイテッド | Qualitative and quantitative methods for rating brands using keywords |
US20090210333A1 (en) * | 2008-02-14 | 2009-08-20 | Microsoft Corporation | Micro-licensing of composite content |
US9928349B2 (en) * | 2008-02-14 | 2018-03-27 | International Business Machines Corporation | System and method for controlling the disposition of computer-based objects |
WO2009102979A2 (en) | 2008-02-14 | 2009-08-20 | Proxense, Llc | Proximity-based healthcare management system with automatic access to private information |
US9690913B2 (en) * | 2008-02-25 | 2017-06-27 | International Business Machines Corporation | License management in a networked software application solution |
US20090216678A1 (en) * | 2008-02-25 | 2009-08-27 | Research In Motion Limited | System and method for facilitating secure communication of messages associated with a project |
US8214298B2 (en) * | 2008-02-26 | 2012-07-03 | Rfinity Corporation | Systems and methods for performing wireless financial transactions |
US8407331B2 (en) * | 2008-02-28 | 2013-03-26 | Microsoft Corporation | Codeless provisioning |
WO2009107219A1 (en) * | 2008-02-28 | 2009-09-03 | 日本電信電話株式会社 | Authentication device, authentication method, and authentication program with the method mounted thereon |
FR2928235A1 (en) * | 2008-02-29 | 2009-09-04 | Thomson Licensing Sas | METHOD FOR DISPLAYING MULTIMEDIA CONTENT WITH VARIABLE DISTURBANCES IN LOCAL RECEIVER / DECODER RIGHT FUNCTIONS. |
US8104091B2 (en) * | 2008-03-07 | 2012-01-24 | Samsung Electronics Co., Ltd. | System and method for wireless communication network having proximity control based on authorization token |
US8281166B2 (en) * | 2008-03-10 | 2012-10-02 | Virdiem Corporation | System and method for computer power control |
US20090239503A1 (en) * | 2008-03-20 | 2009-09-24 | Bernard Smeets | System and Method for Securely Issuing Subscription Credentials to Communication Devices |
US20100088232A1 (en) * | 2008-03-21 | 2010-04-08 | Brian Gale | Verification monitor for critical test result delivery systems |
US20090249067A1 (en) * | 2008-03-25 | 2009-10-01 | Contineo Systems | System and Method for Pre-Placing Secure Content on an End User Storage Device |
US20090248474A1 (en) * | 2008-04-01 | 2009-10-01 | Eric Philip Fried | Meeting planning assistance via network messages |
US8635083B1 (en) | 2008-04-02 | 2014-01-21 | Mckesson Financial Holdings | Systems and methods for facilitating the establishment of pharmaceutical rebate agreements |
JP5436793B2 (en) * | 2008-04-04 | 2014-03-05 | 株式会社バンダイナムコゲームス | Game video distribution system |
WO2009126732A2 (en) | 2008-04-08 | 2009-10-15 | Proxense, Llc | Automated service-based order processing |
US8826375B2 (en) * | 2008-04-14 | 2014-09-02 | Lookwithus.Com Inc. | Rich media collaboration system |
US8150039B2 (en) * | 2008-04-15 | 2012-04-03 | Apple Inc. | Single security model in booting a computing device |
US20090265180A1 (en) * | 2008-04-21 | 2009-10-22 | Microsoft Corporation | Machine-readable end user license agreement with automated acceptance |
US8261334B2 (en) | 2008-04-25 | 2012-09-04 | Yodlee Inc. | System for performing web authentication of a user by proxy |
DE102008020832B3 (en) * | 2008-04-25 | 2009-11-19 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Concept for efficient distribution of access authorization information |
US8966580B2 (en) * | 2008-05-01 | 2015-02-24 | Sandisk Il Ltd. | System and method for copying protected data from one secured storage device to another via a third party |
US20090276474A1 (en) * | 2008-05-01 | 2009-11-05 | Rotem Sela | Method for copying protected data from one secured storage device to another via a third party |
WO2009134705A1 (en) * | 2008-05-02 | 2009-11-05 | Invicta Networks, Inc. | Method and system for protection of computer applications and software products againts unauthorized copying |
US20120203648A1 (en) * | 2008-05-05 | 2012-08-09 | Reagan Inventions Llc | Lending digital media content |
US8769675B2 (en) * | 2008-05-13 | 2014-07-01 | Apple Inc. | Clock roll forward detection |
US8819839B2 (en) * | 2008-05-24 | 2014-08-26 | Via Technologies, Inc. | Microprocessor having a secure execution mode with provisions for monitoring, indicating, and managing security levels |
US8615799B2 (en) * | 2008-05-24 | 2013-12-24 | Via Technologies, Inc. | Microprocessor having secure non-volatile storage access |
US20110078041A1 (en) * | 2008-05-27 | 2011-03-31 | Ian Barker | Method, System, and Computer Program for Parsing, Compiling and Disseminating Digital Media |
US8589161B2 (en) | 2008-05-27 | 2013-11-19 | Voicebox Technologies, Inc. | System and method for an integrated, multi-modal, multi-device natural language voice services environment |
US9305548B2 (en) | 2008-05-27 | 2016-04-05 | Voicebox Technologies Corporation | System and method for an integrated, multi-modal, multi-device natural language voice services environment |
CA2724729A1 (en) * | 2008-05-28 | 2009-12-03 | Bhagyarekha Plainfield | Systems and methods for secure data entry and storage |
US20090312094A1 (en) * | 2008-05-30 | 2009-12-17 | Igt | Methods and apparatus for secured transaction logging |
US8321784B1 (en) | 2008-05-30 | 2012-11-27 | Adobe Systems Incorporated | Reviewing objects |
US9043243B2 (en) * | 2008-06-02 | 2015-05-26 | Apple Inc. | System and method of generating a media package for ingesting into an on-line downloading application |
US20090320128A1 (en) * | 2008-06-04 | 2009-12-24 | Dell Products L.P. | System management interrupt (smi) security |
US8924543B2 (en) | 2009-01-28 | 2014-12-30 | Headwater Partners I Llc | Service design center for device assisted services |
US8275830B2 (en) | 2009-01-28 | 2012-09-25 | Headwater Partners I Llc | Device assisted CDR creation, aggregation, mediation and billing |
US8406748B2 (en) | 2009-01-28 | 2013-03-26 | Headwater Partners I Llc | Adaptive ambient services |
US8635335B2 (en) | 2009-01-28 | 2014-01-21 | Headwater Partners I Llc | System and method for wireless network offloading |
US8832777B2 (en) | 2009-03-02 | 2014-09-09 | Headwater Partners I Llc | Adapting network policies based on device service processor configuration |
US8924469B2 (en) | 2008-06-05 | 2014-12-30 | Headwater Partners I Llc | Enterprise access control and accounting allocation for access networks |
US8589541B2 (en) | 2009-01-28 | 2013-11-19 | Headwater Partners I Llc | Device-assisted services for protecting network capacity |
US8423889B1 (en) | 2008-06-05 | 2013-04-16 | Amazon Technologies, Inc. | Device specific presentation control for electronic book reader devices |
US8898293B2 (en) | 2009-01-28 | 2014-11-25 | Headwater Partners I Llc | Service offer set publishing to device agent with on-device service selection |
US8626115B2 (en) | 2009-01-28 | 2014-01-07 | Headwater Partners I Llc | Wireless network service interfaces |
US8229812B2 (en) | 2009-01-28 | 2012-07-24 | Headwater Partners I, Llc | Open transaction central billing system |
US8340634B2 (en) * | 2009-01-28 | 2012-12-25 | Headwater Partners I, Llc | Enhanced roaming services and converged carrier networks with device assisted services and a proxy |
US8391834B2 (en) | 2009-01-28 | 2013-03-05 | Headwater Partners I Llc | Security techniques for device assisted services |
US8548428B2 (en) | 2009-01-28 | 2013-10-01 | Headwater Partners I Llc | Device group partitions and settlement platform |
US8725123B2 (en) | 2008-06-05 | 2014-05-13 | Headwater Partners I Llc | Communications device with secure data path processing agents |
US8402111B2 (en) | 2009-01-28 | 2013-03-19 | Headwater Partners I, Llc | Device assisted services install |
US8346225B2 (en) | 2009-01-28 | 2013-01-01 | Headwater Partners I, Llc | Quality of service for device assisted services |
US20090307053A1 (en) * | 2008-06-06 | 2009-12-10 | Ryan Steelberg | Apparatus, system and method for a brand affinity engine using positive and negative mentions |
US20090307137A1 (en) * | 2008-06-09 | 2009-12-10 | Microsoft Corporation | Managing provenance of digitally signed data in user editable records |
CA2727711A1 (en) * | 2008-06-12 | 2009-12-17 | Ryan Steelberg | Barcode advertising |
US20090315766A1 (en) | 2008-06-19 | 2009-12-24 | Microsoft Corporation | Source switching for devices supporting dynamic direction information |
US8700301B2 (en) * | 2008-06-19 | 2014-04-15 | Microsoft Corporation | Mobile computing devices, architecture and user interfaces based on dynamic direction information |
US20090315775A1 (en) * | 2008-06-20 | 2009-12-24 | Microsoft Corporation | Mobile computing services based on devices with dynamic direction information |
US20090319166A1 (en) * | 2008-06-20 | 2009-12-24 | Microsoft Corporation | Mobile computing services based on devices with dynamic direction information |
US20100009662A1 (en) | 2008-06-20 | 2010-01-14 | Microsoft Corporation | Delaying interaction with points of interest discovered based on directional device information |
US8626525B2 (en) * | 2008-06-23 | 2014-01-07 | Mckesson Financial Holdings | Systems and methods for real-time monitoring and analysis of prescription claim rejections |
US8259938B2 (en) | 2008-06-24 | 2012-09-04 | Verance Corporation | Efficient and secure forensic marking in compressed |
EP2138970A1 (en) * | 2008-06-26 | 2009-12-30 | Nokia Siemens Networks Oy | Ordering scheme |
US20090327031A1 (en) * | 2008-06-26 | 2009-12-31 | Microsoft Corporation | Rent-to-own media |
US8538777B1 (en) | 2008-06-30 | 2013-09-17 | Mckesson Financial Holdings Limited | Systems and methods for providing patient medication history |
US20090326977A1 (en) * | 2008-06-30 | 2009-12-31 | Mckesson Financial Holding Limited | Systems and Methods for Providing Drug Samples to Patients |
US8015037B2 (en) * | 2008-07-01 | 2011-09-06 | Corelogic Information Solutions, Inc. | System and method for tracking, monitoring and reporting extinguishment of a title insurance policy |
US9390384B2 (en) * | 2008-07-01 | 2016-07-12 | The 41 St Parameter, Inc. | Systems and methods of sharing information through a tagless device consortium |
CA2732006A1 (en) * | 2008-07-31 | 2010-02-04 | Koolspan, Inc. | System for and method of remote secure backup |
US20100031352A1 (en) * | 2008-08-04 | 2010-02-04 | Amarender Reddy Kethireddy | System and Method for Enforcing Licenses During Push Install of Software to Target Computers in a Networked Computer Environment |
US9075957B2 (en) * | 2008-08-04 | 2015-07-07 | Sandisk Il Ltd. | Backing up digital content that is stored in a secured storage device |
US9104662B2 (en) * | 2008-08-08 | 2015-08-11 | Oracle International Corporation | Method and system for implementing parallel transformations of records |
US8447421B2 (en) * | 2008-08-19 | 2013-05-21 | Sony Computer Entertainment Inc. | Traffic-based media selection |
US8290604B2 (en) * | 2008-08-19 | 2012-10-16 | Sony Computer Entertainment America Llc | Audience-condition based media selection |
US9760921B2 (en) * | 2008-08-21 | 2017-09-12 | Digital River, Inc. | Half-graphical user interface order processing system and method |
US8230442B2 (en) | 2008-09-05 | 2012-07-24 | International Business Machines Corporation | Executing an accelerator application program in a hybrid computing environment |
US20100063926A1 (en) * | 2008-09-09 | 2010-03-11 | Damon Charles Hougland | Payment application framework |
US8538942B2 (en) | 2008-09-12 | 2013-09-17 | Salesforce.Com, Inc. | Method and system for sharing documents between on-demand services |
US8984390B2 (en) | 2008-09-15 | 2015-03-17 | Palantir Technologies, Inc. | One-click sharing for screenshots and related documents |
US20100100605A1 (en) * | 2008-09-15 | 2010-04-22 | Allen Stewart O | Methods and apparatus for management of inter-widget interactions |
KR101574618B1 (en) * | 2008-09-24 | 2015-12-04 | 파나소닉 주식회사 | Recordingreproducing system recording medium device and recordingreproducing device |
US20100076778A1 (en) * | 2008-09-25 | 2010-03-25 | Kondrk Robert H | Method and System for Providing and Maintaining Limited-Subscriptions to Digital Media Assets |
CA2738455A1 (en) * | 2008-09-26 | 2010-04-01 | Brand Affinity Technologies, Inc. | An advertising request and rules-based content provision engine, system and method |
US20100082494A1 (en) * | 2008-09-29 | 2010-04-01 | Infosys Technologies Limited | Method and system for cash transfer |
WO2010039860A1 (en) * | 2008-09-30 | 2010-04-08 | Brand Affinity Technologies, Inc. | System and method for brand affinity content distribution and placement |
US9311455B1 (en) * | 2008-10-07 | 2016-04-12 | Amdocs Software Systems Limited | System, method, and computer program for distributing payment to digital content owners |
US20100088746A1 (en) * | 2008-10-08 | 2010-04-08 | Sony Corporation | Secure ebook techniques |
US9342663B2 (en) * | 2008-10-09 | 2016-05-17 | Adobe Systems Incorporated | Distributing media with variable resolution and format |
US20100095281A1 (en) * | 2008-10-14 | 2010-04-15 | Riverside Research Institute | Internal Function Debugger |
CA2739582A1 (en) | 2008-10-14 | 2010-04-22 | Brand Affinity Technologies, Inc. | Apparatus, system and method for a brand affinity engine using positive and negative mentions and indexing |
US20100100452A1 (en) * | 2008-10-22 | 2010-04-22 | International Business Machines Corporation | Virtual business object to manage virtual world transactions |
US8848904B2 (en) * | 2008-10-24 | 2014-09-30 | University Of Maryland, College Park | Method and implementation for information exchange using Markov models |
EP2370160A1 (en) * | 2008-10-29 | 2011-10-05 | Sorin CRM SAS | Optimal cardiac pacing with q learning |
WO2010056545A1 (en) * | 2008-10-29 | 2010-05-20 | Brand Affinity Technologies, Inc. | System and method for metricizing assets in a brand affinity content distribution |
CN101727646A (en) * | 2008-10-31 | 2010-06-09 | 深圳富泰宏精密工业有限公司 | Alarm system and method thereof of network bank |
US9586149B2 (en) | 2008-11-05 | 2017-03-07 | International Business Machines Corporation | Collaborative virtual business objects social sharing in a virtual world |
WO2010055515A1 (en) * | 2008-11-15 | 2010-05-20 | Vibesec Ltd. | Network security server suitable for unified communications network |
US8909925B2 (en) * | 2008-11-17 | 2014-12-09 | Prakash Baskaran | System to secure electronic content, enforce usage policies and provide configurable functionalities |
JP5308127B2 (en) * | 2008-11-17 | 2013-10-09 | 株式会社豊田中央研究所 | Power supply system |
US20100125891A1 (en) * | 2008-11-17 | 2010-05-20 | Prakash Baskaran | Activity Monitoring And Information Protection |
US10419541B2 (en) | 2008-11-26 | 2019-09-17 | Free Stream Media Corp. | Remotely control devices over a network without authentication or registration |
US8180891B1 (en) | 2008-11-26 | 2012-05-15 | Free Stream Media Corp. | Discovery, access control, and communication with networked services from within a security sandbox |
US10977693B2 (en) | 2008-11-26 | 2021-04-13 | Free Stream Media Corp. | Association of content identifier of audio-visual data with additional data through capture infrastructure |
US9961388B2 (en) | 2008-11-26 | 2018-05-01 | David Harrison | Exposure of public internet protocol addresses in an advertising exchange server to improve relevancy of advertisements |
US9519772B2 (en) | 2008-11-26 | 2016-12-13 | Free Stream Media Corp. | Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device |
US10567823B2 (en) | 2008-11-26 | 2020-02-18 | Free Stream Media Corp. | Relevant advertisement generation based on a user operating a client device communicatively coupled with a networked media device |
US9986279B2 (en) | 2008-11-26 | 2018-05-29 | Free Stream Media Corp. | Discovery, access control, and communication with networked services |
US10334324B2 (en) | 2008-11-26 | 2019-06-25 | Free Stream Media Corp. | Relevant advertisement generation based on a user operating a client device communicatively coupled with a networked media device |
US10880340B2 (en) | 2008-11-26 | 2020-12-29 | Free Stream Media Corp. | Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device |
US10631068B2 (en) | 2008-11-26 | 2020-04-21 | Free Stream Media Corp. | Content exposure attribution based on renderings of related content across multiple devices |
US9154942B2 (en) | 2008-11-26 | 2015-10-06 | Free Stream Media Corp. | Zero configuration communication between a browser and a networked media device |
US8806214B2 (en) | 2008-12-01 | 2014-08-12 | Novell, Inc. | Communication with non-repudiation and blind signatures |
US8458477B2 (en) * | 2008-12-01 | 2013-06-04 | Novell, Inc. | Communication with non-repudiation |
US10943030B2 (en) | 2008-12-15 | 2021-03-09 | Ibailbonding.Com | Securable independent electronic document |
US8914351B2 (en) | 2008-12-16 | 2014-12-16 | Clinton A. Krislov | Method and system for secure automated document registration from social media networks |
US8341141B2 (en) * | 2008-12-16 | 2012-12-25 | Krislov Clinton A | Method and system for automated document registration |
US8589372B2 (en) | 2008-12-16 | 2013-11-19 | Clinton A. Krislov | Method and system for automated document registration with cloud computing |
WO2010069034A1 (en) | 2008-12-18 | 2010-06-24 | Bce Inc. | Processing of communication device signatures for use in securing nomadic electronic transactions |
US9231928B2 (en) | 2008-12-18 | 2016-01-05 | Bce Inc. | Validation method and system for use in securing nomadic electronic transactions |
KR20100071852A (en) * | 2008-12-19 | 2010-06-29 | 한국전자통신연구원 | Method and system for protecting broadcasting program |
US8837908B2 (en) * | 2009-01-06 | 2014-09-16 | Cyberlink Corp. | Systems and methods for performing secure playback of media content |
MX2011007344A (en) | 2009-01-07 | 2012-02-28 | Divx Inc | Singular, collective and automated creation of a media guide for online content. |
US8606628B2 (en) * | 2009-01-15 | 2013-12-10 | International Business Machines Corporation | User driven transactions through referred virtual business object |
US20100186066A1 (en) * | 2009-01-20 | 2010-07-22 | Pollard Stephen M | Methods and systems for facilitating personal data propagation |
US8296323B2 (en) * | 2009-01-20 | 2012-10-23 | Titanium Fire Ltd. | Personal data subscriber systems and methods |
US8364713B2 (en) * | 2009-01-20 | 2013-01-29 | Titanium Fire Ltd. | Personal data manager systems and methods |
US8046242B1 (en) | 2009-01-22 | 2011-10-25 | Mckesson Financial Holdings Limited | Systems and methods for verifying prescription dosages |
US8527734B2 (en) | 2009-01-23 | 2013-09-03 | International Business Machines Corporation | Administering registered virtual addresses in a hybrid computing environment including maintaining a watch list of currently registered virtual addresses by an operating system |
US20110213655A1 (en) * | 2009-01-24 | 2011-09-01 | Kontera Technologies, Inc. | Hybrid contextual advertising and related content analysis and display techniques |
US9286232B2 (en) * | 2009-01-26 | 2016-03-15 | International Business Machines Corporation | Administering registered virtual addresses in a hybrid computing environment including maintaining a cache of ranges of currently registered virtual addresses |
US9087032B1 (en) | 2009-01-26 | 2015-07-21 | Amazon Technologies, Inc. | Aggregation of highlights |
USD636771S1 (en) | 2009-01-27 | 2011-04-26 | Amazon Technologies, Inc. | Control pad for an electronic device |
USD601559S1 (en) | 2009-01-27 | 2009-10-06 | Amazon Technologies, Inc. | Electronic reader device |
US8843880B2 (en) * | 2009-01-27 | 2014-09-23 | International Business Machines Corporation | Software development for a hybrid computing environment |
US8378979B2 (en) | 2009-01-27 | 2013-02-19 | Amazon Technologies, Inc. | Electronic device with haptic feedback |
US9351193B2 (en) | 2009-01-28 | 2016-05-24 | Headwater Partners I Llc | Intermediate networking devices |
US9392462B2 (en) | 2009-01-28 | 2016-07-12 | Headwater Partners I Llc | Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy |
US9647918B2 (en) | 2009-01-28 | 2017-05-09 | Headwater Research Llc | Mobile device and method attributing media services network usage to requesting application |
US9954975B2 (en) | 2009-01-28 | 2018-04-24 | Headwater Research Llc | Enhanced curfew and protection associated with a device group |
US9578182B2 (en) | 2009-01-28 | 2017-02-21 | Headwater Partners I Llc | Mobile device and service management |
US10064055B2 (en) | 2009-01-28 | 2018-08-28 | Headwater Research Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US9980146B2 (en) | 2009-01-28 | 2018-05-22 | Headwater Research Llc | Communications device with secure data path processing agents |
US10715342B2 (en) | 2009-01-28 | 2020-07-14 | Headwater Research Llc | Managing service user discovery and service launch object placement on a device |
US8255909B2 (en) | 2009-01-28 | 2012-08-28 | International Business Machines Corporation | Synchronizing access to resources in a hybrid computing environment |
US11218854B2 (en) | 2009-01-28 | 2022-01-04 | Headwater Research Llc | Service plan design, user interfaces, application programming interfaces, and device management |
US8606911B2 (en) | 2009-03-02 | 2013-12-10 | Headwater Partners I Llc | Flow tagging for service policy implementation |
US9572019B2 (en) | 2009-01-28 | 2017-02-14 | Headwater Partners LLC | Service selection set published to device agent with on-device service selection |
US10492102B2 (en) | 2009-01-28 | 2019-11-26 | Headwater Research Llc | Intermediate networking devices |
US9858559B2 (en) | 2009-01-28 | 2018-01-02 | Headwater Research Llc | Network service plan design |
US9609510B2 (en) | 2009-01-28 | 2017-03-28 | Headwater Research Llc | Automated credential porting for mobile devices |
US10484858B2 (en) | 2009-01-28 | 2019-11-19 | Headwater Research Llc | Enhanced roaming services and converged carrier networks with device assisted services and a proxy |
US10841839B2 (en) | 2009-01-28 | 2020-11-17 | Headwater Research Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US9253663B2 (en) | 2009-01-28 | 2016-02-02 | Headwater Partners I Llc | Controlling mobile device communications on a roaming network based on device state |
US10057775B2 (en) | 2009-01-28 | 2018-08-21 | Headwater Research Llc | Virtualized policy and charging system |
US8793758B2 (en) | 2009-01-28 | 2014-07-29 | Headwater Partners I Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US9571559B2 (en) | 2009-01-28 | 2017-02-14 | Headwater Partners I Llc | Enhanced curfew and protection associated with a device group |
US10783581B2 (en) | 2009-01-28 | 2020-09-22 | Headwater Research Llc | Wireless end-user device providing ambient or sponsored services |
US10264138B2 (en) | 2009-01-28 | 2019-04-16 | Headwater Research Llc | Mobile device and service management |
US10237757B2 (en) | 2009-01-28 | 2019-03-19 | Headwater Research Llc | System and method for wireless network offloading |
US9955332B2 (en) | 2009-01-28 | 2018-04-24 | Headwater Research Llc | Method for child wireless device activation to subscriber account of a master wireless device |
US9755842B2 (en) | 2009-01-28 | 2017-09-05 | Headwater Research Llc | Managing service user discovery and service launch object placement on a device |
US9565707B2 (en) | 2009-01-28 | 2017-02-07 | Headwater Partners I Llc | Wireless end-user device with wireless data attribution to multiple personas |
US8351898B2 (en) | 2009-01-28 | 2013-01-08 | Headwater Partners I Llc | Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account |
US10779177B2 (en) | 2009-01-28 | 2020-09-15 | Headwater Research Llc | Device group partitions and settlement platform |
US9706061B2 (en) | 2009-01-28 | 2017-07-11 | Headwater Partners I Llc | Service design center for device assisted services |
US10248996B2 (en) | 2009-01-28 | 2019-04-02 | Headwater Research Llc | Method for operating a wireless end-user device mobile payment agent |
US10326800B2 (en) | 2009-01-28 | 2019-06-18 | Headwater Research Llc | Wireless network service interfaces |
US9557889B2 (en) | 2009-01-28 | 2017-01-31 | Headwater Partners I Llc | Service plan design, user interfaces, application programming interfaces, and device management |
US20130124242A1 (en) | 2009-01-28 | 2013-05-16 | Adobe Systems Incorporated | Video review workflow process |
US8745191B2 (en) | 2009-01-28 | 2014-06-03 | Headwater Partners I Llc | System and method for providing user notifications |
US10798252B2 (en) | 2009-01-28 | 2020-10-06 | Headwater Research Llc | System and method for providing user notifications |
US8893009B2 (en) | 2009-01-28 | 2014-11-18 | Headwater Partners I Llc | End user device that secures an association of application to service policy with an application certificate check |
US10200541B2 (en) | 2009-01-28 | 2019-02-05 | Headwater Research Llc | Wireless end-user device with divided user space/kernel space traffic policy system |
US9270559B2 (en) | 2009-01-28 | 2016-02-23 | Headwater Partners I Llc | Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow |
US8914310B2 (en) * | 2009-01-29 | 2014-12-16 | A Major Difference, Inc. | Multi-functional control unit for an ionic foot bath system |
US8776032B2 (en) * | 2009-01-29 | 2014-07-08 | Microsoft Corporation | Automatic region-based verification of garbage collectors |
US20100191923A1 (en) * | 2009-01-29 | 2010-07-29 | International Business Machines Corporation | Data Processing In A Computing Environment |
US9170864B2 (en) * | 2009-01-29 | 2015-10-27 | International Business Machines Corporation | Data processing in a hybrid computing environment |
US8341602B2 (en) * | 2009-01-29 | 2012-12-25 | Microsoft Corporation | Automated verification of a type-safe operating system |
US20130054402A1 (en) * | 2009-02-11 | 2013-02-28 | Content Galaxy Inc. | System for digital commerce and method of secure, automated crediting of publishers, editors, content providers, and affiliates |
US8326637B2 (en) | 2009-02-20 | 2012-12-04 | Voicebox Technologies, Inc. | System and method for processing multi-modal device interactions in a natural language voice services environment |
EP2242268A1 (en) * | 2009-02-23 | 2010-10-20 | BRITISH TELECOMMUNICATIONS public limited company | Streamed content distribution service |
US9098820B2 (en) * | 2009-02-23 | 2015-08-04 | International Business Machines Corporation | Conservation modeling engine framework |
US20100214893A1 (en) * | 2009-02-25 | 2010-08-26 | Aylward Adrian R | Copy protection using complexity and uncomputability |
US9946848B2 (en) | 2009-02-26 | 2018-04-17 | International Business Machines Corporation | Software protection using an installation product having an entitlement file |
WO2010099475A1 (en) * | 2009-02-26 | 2010-09-02 | Kynen Llc | User authentication system and method |
US8555359B2 (en) | 2009-02-26 | 2013-10-08 | Yodlee, Inc. | System and methods for automatically accessing a web site on behalf of a client |
US9292481B2 (en) | 2009-02-27 | 2016-03-22 | Adobe Systems Incorporated | Creating and modifying a snapshot of an electronic document with a user comment |
US8930843B2 (en) | 2009-02-27 | 2015-01-06 | Adobe Systems Incorporated | Electronic content workflow review process |
US20100228589A1 (en) * | 2009-03-05 | 2010-09-09 | Grasstell Networks Llc | Behavior-based feedback and routing in social-networking business |
US20100228612A1 (en) * | 2009-03-09 | 2010-09-09 | Microsoft Corporation | Device transaction model and services based on directional information of device |
US20100241855A1 (en) * | 2009-03-17 | 2010-09-23 | Cyberlink Corp. | Systems and Methods for Secure Execution of Code Using a Hardware Protection Module |
JP2010224964A (en) * | 2009-03-24 | 2010-10-07 | Sony Corp | Device and method for reproducing content |
US8473352B2 (en) * | 2009-03-24 | 2013-06-25 | The Western Union Company | Consumer due diligence for money transfer systems and methods |
US9112850B1 (en) | 2009-03-25 | 2015-08-18 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
EP2237182A1 (en) * | 2009-03-31 | 2010-10-06 | Sony DADC Austria AG | Method, system, license server for providing a license to a user for accessing a protected content on a user device and software module |
US8832584B1 (en) | 2009-03-31 | 2014-09-09 | Amazon Technologies, Inc. | Questions on highlighted passages |
US8929303B2 (en) * | 2009-04-06 | 2015-01-06 | Samsung Electronics Co., Ltd. | Control and data channels for advanced relay operation |
US9373137B2 (en) | 2009-04-07 | 2016-06-21 | International Business Machines Corporation | Mapping transactions between the real world and a virtual world |
US20100268649A1 (en) * | 2009-04-17 | 2010-10-21 | Johan Roos | Method and Apparatus for Electronic Ticket Processing |
WO2010126797A1 (en) | 2009-04-29 | 2010-11-04 | Onemednet Corporation | Methods, systems, and devices for managing medical images and records |
USD624074S1 (en) | 2009-05-04 | 2010-09-21 | Amazon Technologies, Inc. | Electronic reader device |
US20110282769A1 (en) * | 2009-05-08 | 2011-11-17 | Mcnulty John F | Method and System for Quantifying Interactions with Digital Content |
CN102460496B (en) | 2009-05-21 | 2016-05-25 | 英特托拉斯技术公司 | Content delivery system and method |
US8943431B2 (en) | 2009-05-27 | 2015-01-27 | Adobe Systems Incorporated | Text operations in a bitmap-based document |
US8943408B2 (en) | 2009-05-27 | 2015-01-27 | Adobe Systems Incorporated | Text image review process |
JP5423149B2 (en) * | 2009-05-28 | 2014-02-19 | 日本電気株式会社 | Browsing information collection system, browsing information collection method, server, and program |
US10325266B2 (en) | 2009-05-28 | 2019-06-18 | Sony Interactive Entertainment America Llc | Rewarding classes of purchasers |
US8914903B1 (en) | 2009-06-03 | 2014-12-16 | Amdocs Software System Limited | System, method, and computer program for validating receipt of digital content by a client device |
EP2438710A2 (en) * | 2009-06-04 | 2012-04-11 | BAE SYSTEMS plc | System and method of analysing transfer of data over at least one network |
US8255296B2 (en) | 2009-06-11 | 2012-08-28 | Interest Capturing Systems, Llc | System for implementing a security issuer rights management process over a distributed communications network, deployed in a financial marketplace |
US8635317B2 (en) * | 2009-06-23 | 2014-01-21 | Nokia Corporation | Method and apparatus for providing uniform content management |
US20100332324A1 (en) * | 2009-06-25 | 2010-12-30 | Microsoft Corporation | Portal services based on interactions with points of interest discovered via directional device information |
EP2446408A4 (en) * | 2009-06-25 | 2013-02-27 | Ericsson Telefon Ab L M | Method and arrangement for enabling a media purchase |
US8918728B2 (en) * | 2009-06-26 | 2014-12-23 | International Business Machines Corporation | Rule-based content filtering in a virtual universe |
US9608826B2 (en) | 2009-06-29 | 2017-03-28 | Jpmorgan Chase Bank, N.A. | System and method for partner key management |
US11797997B2 (en) | 2009-07-07 | 2023-10-24 | Visa International Service Association | Data verification in transactions in distributed network |
US8872767B2 (en) | 2009-07-07 | 2014-10-28 | Microsoft Corporation | System and method for converting gestures into digital graffiti |
US8763156B2 (en) | 2009-07-10 | 2014-06-24 | Disney Enterprises, Inc. | Digital receipt for use with an interoperable keychest |
US10621518B2 (en) * | 2009-07-10 | 2020-04-14 | Disney Enterprises, Inc. | Interoperable keychest |
US9508064B2 (en) * | 2009-07-17 | 2016-11-29 | James Robert Curtis | Kiosk gift card system and method |
US11379810B2 (en) | 2009-07-17 | 2022-07-05 | James Curtis | Kiosk gift card system and method |
US10846684B2 (en) | 2009-07-17 | 2020-11-24 | James Curtis | Kiosk gift card system and method |
US20110015968A1 (en) * | 2009-07-17 | 2011-01-20 | Carlson Alan L | Automated media and content reporting system for broadcast media |
US20150154384A1 (en) * | 2009-07-17 | 2015-06-04 | James Robert Curtis | Media Distribution System and Method |
US10460311B2 (en) | 2009-07-17 | 2019-10-29 | Arch Holdings, Lp | Kiosk gift card system and method |
US20110216640A1 (en) * | 2009-07-17 | 2011-09-08 | James Curtis | Universal multimedia distribution, storage, and playback systems, and methods |
AU2010276315B2 (en) * | 2009-07-20 | 2015-11-05 | Verimatrix, Inc. | Off-line content delivery system with layered encryption |
US20110016182A1 (en) * | 2009-07-20 | 2011-01-20 | Adam Harris | Managing Gifts of Digital Media |
US20110022406A1 (en) * | 2009-07-27 | 2011-01-27 | Barbara Ann Fox | Apparatus and method for providing security in an online gaming and/or digital environment |
WO2011014625A1 (en) | 2009-07-29 | 2011-02-03 | Reversinglabs Corporation | Automated unpacking of portable executable files |
US8180972B2 (en) | 2009-08-07 | 2012-05-15 | International Business Machines Corporation | Reducing remote reads of memory in a hybrid computing environment by maintaining remote memory values locally |
US8375442B2 (en) * | 2009-08-17 | 2013-02-12 | Fatskunk, Inc. | Auditing a device |
US8448009B2 (en) * | 2009-08-17 | 2013-05-21 | Sandisk Il Ltd. | Method and memory device for generating a time estimate |
US8949989B2 (en) | 2009-08-17 | 2015-02-03 | Qualcomm Incorporated | Auditing a device |
US8544089B2 (en) * | 2009-08-17 | 2013-09-24 | Fatskunk, Inc. | Auditing a device |
US8370935B1 (en) | 2009-08-17 | 2013-02-05 | Fatskunk, Inc. | Auditing a device |
US20110047424A1 (en) * | 2009-08-18 | 2011-02-24 | James Ray Bailey | Integrated circuit including a programmable logic analyzer with enhanced analyzing and debugging capabilites and a method therefor |
DE102009038035A1 (en) * | 2009-08-19 | 2011-02-24 | Bayerische Motoren Werke Aktiengesellschaft | Method for configuring infotainment applications in a motor vehicle |
GB0915863D0 (en) * | 2009-09-10 | 2009-10-14 | Smart Overseas Inc | Improvements in or relating to a virtual management system and method |
US8250273B2 (en) * | 2009-09-14 | 2012-08-21 | International Business Machines Corporation | Secure handling and routing of message-signaled interrupts |
JP5413078B2 (en) * | 2009-09-14 | 2014-02-12 | 株式会社リコー | Device management system, device management device, mediation device, device management method, and device management program |
US8346305B2 (en) * | 2009-09-25 | 2013-01-01 | Intel Corporation | Theft deterrent techniques and secure mobile platform subscription for wirelessly enabled mobile devices |
US8692763B1 (en) | 2009-09-28 | 2014-04-08 | John T. Kim | Last screen rendering for electronic book reader |
JP4753217B2 (en) * | 2009-09-28 | 2011-08-24 | 株式会社ソニー・コンピュータエンタテインメント | License management method and content processing system |
US8489415B1 (en) | 2009-09-30 | 2013-07-16 | Mckesson Financial Holdings Limited | Systems and methods for the coordination of benefits in healthcare claim transactions |
US8464038B2 (en) | 2009-10-13 | 2013-06-11 | Google Inc. | Computing device with developer mode |
KR101046992B1 (en) * | 2009-10-29 | 2011-07-06 | 한국인터넷진흥원 | Sensor data security method, system and recording media |
EP2325773B1 (en) * | 2009-10-30 | 2018-06-06 | Nxp B.V. | System and method for obtaining an authorization key to use a product |
US9900150B2 (en) * | 2009-10-30 | 2018-02-20 | International Business Machines Corporation | Dispersed storage camera device and method of operation |
US20110113443A1 (en) * | 2009-11-06 | 2011-05-12 | Xudong Yu | IP TV With DRM |
US9171541B2 (en) | 2009-11-10 | 2015-10-27 | Voicebox Technologies Corporation | System and method for hybrid processing in a natural language voice services environment |
US9502025B2 (en) * | 2009-11-10 | 2016-11-22 | Voicebox Technologies Corporation | System and method for providing a natural language content dedication service |
US8306873B2 (en) * | 2009-11-11 | 2012-11-06 | Joe Smith | System and method of media distribution management |
WO2011068668A1 (en) | 2009-12-04 | 2011-06-09 | Divx, Llc | Elementary bitstream cryptographic material transport systems and methods |
CN102096775A (en) * | 2009-12-15 | 2011-06-15 | 鸿富锦精密工业(深圳)有限公司 | Enthrallment-preventing computer mainboard and computer enthrallment-preventing method |
US9756076B2 (en) * | 2009-12-17 | 2017-09-05 | American Express Travel Related Services Company, Inc. | Dynamically reacting policies and protections for securing mobile financial transactions |
EP2348465A1 (en) | 2009-12-22 | 2011-07-27 | Philip Morris Products S.A. | Method and apparatus for storage of data for manufactured items |
US20110276491A1 (en) * | 2009-12-31 | 2011-11-10 | Douglas Elliott | Methods and systems for in-game advertising |
JP5560723B2 (en) * | 2010-01-13 | 2014-07-30 | ソニー株式会社 | Information processing apparatus and method, and information processing system and method |
US9235399B2 (en) * | 2010-01-15 | 2016-01-12 | Dell Products L.P. | System and method for manufacturing and personalizing computing devices |
US10387927B2 (en) * | 2010-01-15 | 2019-08-20 | Dell Products L.P. | System and method for entitling digital assets |
US9256899B2 (en) * | 2010-01-15 | 2016-02-09 | Dell Products, L.P. | System and method for separation of software purchase from fulfillment |
KR101814221B1 (en) | 2010-01-21 | 2018-01-02 | 스비랄 인크 | A method and apparatus for a general-purpose, multiple-core system for implementing stream-based computations |
DE112010004426B4 (en) * | 2010-01-22 | 2015-11-12 | International Business Machines Corporation | Non-linkable transmission without memory with pricing and rechargeable purses |
US8788296B1 (en) | 2010-01-29 | 2014-07-22 | Mckesson Financial Holdings | Systems and methods for providing notifications of availability of generic drugs or products |
US20110191160A1 (en) * | 2010-01-29 | 2011-08-04 | Bank Of America Corporation | Mobile payment device for conducting transactions associated with a merchant offer program |
US9100396B2 (en) * | 2010-01-29 | 2015-08-04 | Dell Products L.P. | System and method for identifying systems and replacing components |
US9417905B2 (en) * | 2010-02-03 | 2016-08-16 | International Business Machines Corporation | Terminating an accelerator application program in a hybrid computing environment |
US8386276B1 (en) | 2010-02-11 | 2013-02-26 | Mckesson Financial Holdings Limited | Systems and methods for determining prescribing physician activity levels |
US8321243B1 (en) | 2010-02-15 | 2012-11-27 | Mckesson Financial Holdings Limited | Systems and methods for the intelligent coordination of benefits in healthcare transactions |
US20110208974A1 (en) * | 2010-02-25 | 2011-08-25 | Alcatel-Lucent Usa Inc. | Countermeasure Against Keystroke Logger Devices |
US9053472B2 (en) * | 2010-02-26 | 2015-06-09 | Red Hat, Inc. | Offering additional license terms during conversion of standard software licenses for use in cloud computing environments |
US9237294B2 (en) | 2010-03-05 | 2016-01-12 | Sony Corporation | Apparatus and method for replacing a broadcasted advertisement based on both heuristic information and attempts in altering the playback of the advertisement |
US10339575B2 (en) * | 2010-03-05 | 2019-07-02 | International Business Machines Corporation | Method and system for provenance tracking in software ecosystems |
US9418205B2 (en) | 2010-03-15 | 2016-08-16 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US9659264B2 (en) * | 2010-03-16 | 2017-05-23 | International Business Machines Corporation | Enablement of licensed features at a logical volume level of granularity |
US8170783B2 (en) | 2010-03-16 | 2012-05-01 | Dell Products L.P. | System and method for handling software activation in entitlement |
US10514940B2 (en) * | 2010-03-17 | 2019-12-24 | Microsoft Technology Licensing, Llc | Virtual application package reconstruction |
US9489697B1 (en) | 2010-03-17 | 2016-11-08 | Microroyalties, LLC | Systems and methods of determining microroyalties |
US9286485B2 (en) * | 2010-03-23 | 2016-03-15 | Fujitsu Limited | Using trust points to provide services |
US20110238980A1 (en) | 2010-03-23 | 2011-09-29 | Fujitsu Limited | System and methods for remote maintenance in an electronic network with multiple clients |
US20110239293A1 (en) * | 2010-03-24 | 2011-09-29 | Microsoft Corporation | Auditing access to data based on resource properties |
US8548824B1 (en) | 2010-03-26 | 2013-10-01 | Mckesson Financial Holdings Limited | Systems and methods for notifying of duplicate product prescriptions |
US8650195B2 (en) * | 2010-03-26 | 2014-02-11 | Palle M Pedersen | Region based information retrieval system |
US8578132B2 (en) * | 2010-03-29 | 2013-11-05 | International Business Machines Corporation | Direct injection of data to be transferred in a hybrid computing environment |
US9727850B2 (en) * | 2010-03-29 | 2017-08-08 | Forward Pay Systems, Inc. | Secure electronic cash-less payment systems and methods |
US8688468B1 (en) | 2010-03-30 | 2014-04-01 | Mckesson Financial Holdings | Systems and methods for verifying dosages associated with healthcare transactions |
US9189786B2 (en) * | 2010-03-31 | 2015-11-17 | Mastercard International Incorporated | Systems and methods for operating transaction terminals |
US8788842B2 (en) | 2010-04-07 | 2014-07-22 | Apple Inc. | System and method for content protection based on a combination of a user PIN and a device specific identifier |
US8510552B2 (en) * | 2010-04-07 | 2013-08-13 | Apple Inc. | System and method for file-level data protection |
US20110251909A1 (en) * | 2010-04-09 | 2011-10-13 | Clark Clark S | Credit card payment system for handling numerous payors |
US8661266B2 (en) * | 2010-04-21 | 2014-02-25 | Cavium, Inc. | System and method for secure device key storage |
US9373106B1 (en) * | 2010-04-26 | 2016-06-21 | Sprint Communications Company L.P. | Tracking the download and purchase of digital content |
US9015443B2 (en) | 2010-04-30 | 2015-04-21 | International Business Machines Corporation | Reducing remote reads of memory in a hybrid computing environment |
US8930277B2 (en) * | 2010-04-30 | 2015-01-06 | Now Technologies (Ip) Limited | Content management apparatus |
US8544103B2 (en) | 2010-05-04 | 2013-09-24 | Intertrust Technologies Corporation | Policy determined accuracy of transmitted information |
US10657507B2 (en) * | 2010-05-17 | 2020-05-19 | Adobe Inc. | Migration between digital rights management systems without content repackaging |
US8433759B2 (en) | 2010-05-24 | 2013-04-30 | Sony Computer Entertainment America Llc | Direction-conscious information sharing |
NL2004825C2 (en) * | 2010-06-04 | 2011-12-06 | Ubiqu B V | A method of authorizing a person, an authorizing architecture and a computer program product. |
US20110307354A1 (en) * | 2010-06-09 | 2011-12-15 | Bilgehan Erman | Method and apparatus for recommending applications to mobile users |
US10366425B2 (en) * | 2010-06-11 | 2019-07-30 | Cardinalcommerce Corporation | Method and system for secure order management system data encryption, decryption, and segmentation |
WO2011156746A2 (en) * | 2010-06-11 | 2011-12-15 | California Institute Of Technology | Systems and methods for rapid processing and storage of data |
CN102279956A (en) * | 2010-06-11 | 2011-12-14 | 索尼爱立信移动通讯有限公司 | Mobile communication terminal, data processing method thereof and settlement terminal |
US8874896B2 (en) | 2010-06-18 | 2014-10-28 | Intertrust Technologies Corporation | Secure processing systems and methods |
US8498982B1 (en) | 2010-07-07 | 2013-07-30 | Openlogic, Inc. | Noise reduction for content matching analysis results for protectable content |
US20120011068A1 (en) * | 2010-07-09 | 2012-01-12 | United States Postal Service | System and method of electronic and physical mail categorization and targeted delivery |
US8918854B1 (en) | 2010-07-15 | 2014-12-23 | Proxense, Llc | Proximity-based system for automatic application initialization |
US8904189B1 (en) | 2010-07-15 | 2014-12-02 | The Research Foundation For The State University Of New York | System and method for validating program execution at run-time using control flow signatures |
US20120016761A1 (en) * | 2010-07-15 | 2012-01-19 | Enyama, Inc. | Techniques For Provisioning Content |
CA2806089C (en) | 2010-07-27 | 2015-07-07 | Glen Stewart Alfredson | Computer-implemented system and methods for distributing content pursuant to audit-based processes |
US20120042309A1 (en) * | 2010-08-10 | 2012-02-16 | Hank Risan | Method and system for automatically executing an operation after a media event |
US20120042134A1 (en) * | 2010-08-11 | 2012-02-16 | Hank Risan | Method and system for circumventing usage protection applicable to electronic media |
CN102376064A (en) * | 2010-08-12 | 2012-03-14 | 威睿公司 | Elastic permission of software in cloud environment |
US8983870B2 (en) * | 2010-08-18 | 2015-03-17 | Snap-On Incorporated | Apparatus and method for managing software applications using partitioned data storage devices |
US9471923B2 (en) | 2010-08-18 | 2016-10-18 | International Business Machines Corporation | Providing licensed content to a user |
US9454763B2 (en) | 2010-08-24 | 2016-09-27 | Adobe Systems Incorporated | Distribution of offer to a social group by sharing based on qualifications |
US8700896B1 (en) * | 2010-08-25 | 2014-04-15 | Symantec Corporation | Techniques for automatic management of file system encryption drivers |
US20120072509A1 (en) * | 2010-09-03 | 2012-03-22 | Booth Lloyd George | Method and system for integrating applications within a work process |
US8838977B2 (en) | 2010-09-16 | 2014-09-16 | Verance Corporation | Watermark extraction and content screening in a networked environment |
US8484219B2 (en) | 2010-09-21 | 2013-07-09 | Sony Computer Entertainment America Llc | Developing a knowledge base associated with a user that facilitates evolution of an intelligent user interface |
US20120136796A1 (en) * | 2010-09-21 | 2012-05-31 | Ayman Hammad | Device Enrollment System and Method |
BR112013008597A2 (en) * | 2010-09-21 | 2017-07-25 | Ebay Inc | market supply for software services |
US9495322B1 (en) | 2010-09-21 | 2016-11-15 | Amazon Technologies, Inc. | Cover display |
US8504487B2 (en) | 2010-09-21 | 2013-08-06 | Sony Computer Entertainment America Llc | Evolution of a user interface based on learned idiosyncrasies and collected data of a user |
US8812908B2 (en) * | 2010-09-22 | 2014-08-19 | Microsoft Corporation | Fast, non-write-cycle-limited persistent memory for secure containers |
US20120221382A1 (en) * | 2010-09-28 | 2012-08-30 | Adam Kidron | Influence based discovery platform apparatuses, methods and systems |
US8707378B2 (en) * | 2010-09-29 | 2014-04-22 | Verizon Patent And Licensing Inc. | Catalog and user application for a video provisioning system |
US8996575B2 (en) * | 2010-09-29 | 2015-03-31 | M-Files Oy | Method, an apparatus, a computer system, a security component and a computer readable medium for defining access rights in metadata-based file arrangement |
US20120084174A1 (en) * | 2010-09-30 | 2012-04-05 | Jinho Yang | Digital content transaction system and method using download window |
JP5669517B2 (en) * | 2010-10-18 | 2015-02-12 | オリンパスイメージング株式会社 | Image data selling system, image data selling method, photographing apparatus, and server apparatus |
WO2012054646A2 (en) | 2010-10-19 | 2012-04-26 | The 41St Parameter, Inc. | Variable risk engine |
US9832528B2 (en) | 2010-10-21 | 2017-11-28 | Sony Corporation | System and method for merging network-based content with broadcasted programming content |
RU2447512C1 (en) * | 2010-10-29 | 2012-04-10 | Государственное образовательное учреждение высшего профессионального образования Ставропольский государственный университет | Device for simulation protection of group of controlled objects |
US8676891B2 (en) | 2010-11-01 | 2014-03-18 | Google Inc. | Visibility inspector in social networks |
US9636589B2 (en) | 2010-11-02 | 2017-05-02 | Sony Interactive Entertainment America Llc | Detecting lag switch cheating in game |
US8775794B2 (en) | 2010-11-15 | 2014-07-08 | Jpmorgan Chase Bank, N.A. | System and method for end to end encryption |
US20120136738A1 (en) * | 2010-11-29 | 2012-05-31 | Sap Ag | Royalty calculation engine |
US9652769B1 (en) * | 2010-11-30 | 2017-05-16 | Carbonite, Inc. | Methods, apparatus and systems for securely storing and/or accessing payment information or other sensitive information based on tokens |
US8762284B2 (en) * | 2010-12-16 | 2014-06-24 | Democracyontheweb, Llc | Systems and methods for facilitating secure transactions |
US9262760B2 (en) * | 2010-12-22 | 2016-02-16 | Gilbarco Inc. | Fuel dispensing payment system for secure evaluation of cardholder data |
US20120166266A1 (en) * | 2010-12-22 | 2012-06-28 | Ebay Inc. | Enabling a second system to manage selected anonymous users of a first system in a performance of a task |
US9129322B2 (en) * | 2010-12-29 | 2015-09-08 | Amazon Technologies, Inc. | Electronic book rentals |
EP2472451A1 (en) | 2010-12-30 | 2012-07-04 | Philip Morris Products S.A. | Method and apparatus for marking manufactured items |
US20130334300A1 (en) * | 2011-01-03 | 2013-12-19 | Curt Evans | Text-synchronized media utilization and manipulation based on an embedded barcode |
US9247312B2 (en) | 2011-01-05 | 2016-01-26 | Sonic Ip, Inc. | Systems and methods for encoding source media in matroska container files for adaptive bitrate streaming using hypertext transfer protocol |
US20140324705A1 (en) * | 2011-01-05 | 2014-10-30 | Fox Digital Enterprises, Inc. | System and method for exchanging physical media for a secured digital copy |
US9782674B2 (en) * | 2011-01-07 | 2017-10-10 | Ganz | Synchronizing system for gameplaying |
US9924044B2 (en) * | 2011-01-20 | 2018-03-20 | Verizon Patent And Licensing Inc. | Recommendations based on real-time usage information |
US9576159B1 (en) | 2011-01-24 | 2017-02-21 | Square, Inc. | Multiple payment card reader system |
US8504480B2 (en) * | 2011-02-03 | 2013-08-06 | Ricoh Co., Ltd | Creation of signatures for authenticating applications |
WO2012106573A1 (en) * | 2011-02-04 | 2012-08-09 | Opnet Technologies, Inc. | Correlating input and output requests between client and server components in a multi-tier application |
CN103460730B (en) * | 2011-02-08 | 2017-04-26 | T移动美国公司 | Dynamic binding of service bearer |
KR101293370B1 (en) * | 2011-02-10 | 2013-08-05 | 주식회사 엘지씨엔에스 | System and method for servicing customized mobile content |
US9265450B1 (en) | 2011-02-21 | 2016-02-23 | Proxense, Llc | Proximity-based system for object tracking and automatic application initialization |
US8630902B2 (en) | 2011-03-02 | 2014-01-14 | Adobe Systems Incorporated | Automatic classification of consumers into micro-segments |
US9177327B2 (en) | 2011-03-02 | 2015-11-03 | Adobe Systems Incorporated | Sequential engine that computes user and offer matching into micro-segments |
US20120226562A1 (en) * | 2011-03-02 | 2012-09-06 | Adobe Systems Incorporated | Persistent metadata for a user-controlled policy of personal data disclosure and usage for online advertising |
US8700468B2 (en) | 2011-03-02 | 2014-04-15 | Adobe Systems Incorporated | Micro-segment definition system |
US8635226B2 (en) | 2011-03-02 | 2014-01-21 | Adobe Systems Incorporated | Computing user micro-segments for offer matching |
US9777510B2 (en) | 2011-03-03 | 2017-10-03 | Assa Abloy Ab | Tamper switch activation without power |
US8898461B2 (en) | 2011-03-03 | 2014-11-25 | Lenovo (Singapore) Pte. Ltd. | Battery authentication method and apparatus |
US9026474B2 (en) * | 2011-03-07 | 2015-05-05 | Google Inc. | Generating printable certificates to verify log authenticity |
US8355805B2 (en) | 2011-03-08 | 2013-01-15 | D. Light Design, Inc. | Systems and methods for activation and deactivation of appliances |
KR20120102450A (en) * | 2011-03-08 | 2012-09-18 | 삼성전자주식회사 | Method and apparatus for managing contents to sharing contents among devices |
US9460461B1 (en) * | 2011-03-09 | 2016-10-04 | Amazon Technologies, Inc. | System for collecting and exposing usage metrics associated with mobile device applications |
CN103416021B (en) * | 2011-03-16 | 2016-08-17 | 国际商业机器公司 | For realizing the mthods, systems and devices of digital signature examination & verification |
US10678905B2 (en) * | 2011-03-18 | 2020-06-09 | Lenovo (Singapore) Pte. Ltd. | Process for controlling battery authentication |
US8812868B2 (en) | 2011-03-21 | 2014-08-19 | Mocana Corporation | Secure execution of unsecured apps on a device |
US9396325B2 (en) | 2011-03-21 | 2016-07-19 | Mocana Corporation | Provisioning an app on a device and implementing a keystore |
US9473485B2 (en) | 2011-03-21 | 2016-10-18 | Blue Cedar Networks, Inc. | Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing |
US8955142B2 (en) | 2011-03-21 | 2015-02-10 | Mocana Corporation | Secure execution of unsecured apps on a device |
US8769305B2 (en) | 2011-03-21 | 2014-07-01 | Moncana Corporation | Secure execution of unsecured apps on a device |
AU2012230299B2 (en) * | 2011-03-23 | 2016-04-14 | Detica Patent Limited | An automated fraud detection method and system |
EP2506519A1 (en) * | 2011-03-25 | 2012-10-03 | EADS Deutschland GmbH | Method for determining integrity in an evolutionary collabroative information system |
US8966624B2 (en) | 2011-03-31 | 2015-02-24 | Mcafee, Inc. | System and method for securing an input/output path of an application against malware with a below-operating system security agent |
US8925089B2 (en) | 2011-03-29 | 2014-12-30 | Mcafee, Inc. | System and method for below-operating system modification of malicious code on an electronic device |
US8863283B2 (en) | 2011-03-31 | 2014-10-14 | Mcafee, Inc. | System and method for securing access to system calls |
US9038176B2 (en) | 2011-03-31 | 2015-05-19 | Mcafee, Inc. | System and method for below-operating system trapping and securing loading of code into memory |
US9032525B2 (en) | 2011-03-29 | 2015-05-12 | Mcafee, Inc. | System and method for below-operating system trapping of driver filter attachment |
US8959638B2 (en) | 2011-03-29 | 2015-02-17 | Mcafee, Inc. | System and method for below-operating system trapping and securing of interdriver communication |
US8813227B2 (en) | 2011-03-29 | 2014-08-19 | Mcafee, Inc. | System and method for below-operating system regulation and control of self-modifying code |
US8966629B2 (en) | 2011-03-31 | 2015-02-24 | Mcafee, Inc. | System and method for below-operating system trapping of driver loading and unloading |
US8650642B2 (en) * | 2011-03-31 | 2014-02-11 | Mcafee, Inc. | System and method for below-operating system protection of an operating system kernel |
US9262246B2 (en) | 2011-03-31 | 2016-02-16 | Mcafee, Inc. | System and method for securing memory and storage of an electronic device with a below-operating system security agent |
US9087199B2 (en) | 2011-03-31 | 2015-07-21 | Mcafee, Inc. | System and method for providing a secured operating system execution environment |
US9317690B2 (en) | 2011-03-28 | 2016-04-19 | Mcafee, Inc. | System and method for firmware based anti-malware security |
US8799363B2 (en) | 2011-03-29 | 2014-08-05 | Amazon Technologies, Inc. | Lending digital items to identified recipients |
US20120253990A1 (en) * | 2011-04-01 | 2012-10-04 | Skala Thomas E | Interactive communication system |
GB201105765D0 (en) | 2011-04-05 | 2011-05-18 | Visa Europe Ltd | Payment system |
US9154826B2 (en) | 2011-04-06 | 2015-10-06 | Headwater Partners Ii Llc | Distributing content and service launch objects to mobile devices |
CA2832752A1 (en) | 2011-04-11 | 2012-10-18 | Intertrust Technologies Corporation | Information security systems and methods |
US20120278904A1 (en) * | 2011-04-26 | 2012-11-01 | Microsoft Corporation | Content distribution regulation by viewing user |
US9772737B1 (en) | 2011-04-28 | 2017-09-26 | Amazon Technologies, Inc. | Managing content access data in a communication network |
CN102769846A (en) * | 2011-05-04 | 2012-11-07 | 中国银联股份有限公司 | User terminal and payment system |
US8943330B2 (en) * | 2011-05-10 | 2015-01-27 | Qualcomm Incorporated | Apparatus and method for hardware-based secure data processing using buffer memory address range rules |
KR101670522B1 (en) * | 2011-05-13 | 2016-10-28 | 주식회사 케이티 | Time Synchronization Method in Machine to Machine Communication System |
US8346672B1 (en) | 2012-04-10 | 2013-01-01 | Accells Technologies (2009), Ltd. | System and method for secure transaction process via mobile device |
AU2012257312A1 (en) | 2011-05-17 | 2014-01-16 | Ping Identity Corporation | System and method for performing a secure transaction |
US9098850B2 (en) | 2011-05-17 | 2015-08-04 | Ping Identity Corporation | System and method for transaction security responsive to a signed authentication |
US10650361B2 (en) * | 2011-05-18 | 2020-05-12 | Dubset Media Holdings, Inc. | Method and system for analyzing copyright information in a mixed long-format audio file |
US9064276B2 (en) * | 2011-05-24 | 2015-06-23 | Amazon Technologies, Inc. | Service for managing digital content resales |
US8315620B1 (en) | 2011-05-27 | 2012-11-20 | The Nielsen Company (Us), Llc | Methods and apparatus to associate a mobile device with a panelist profile |
US20120303487A1 (en) * | 2011-05-27 | 2012-11-29 | Lonstein Wayne D | Online stream honey pot capture |
FR2976147B1 (en) * | 2011-05-30 | 2013-11-22 | Maxim Integrated Products | DATA INTERLACEMENT DIAGRAM FOR AN EXTERNAL MEMORY OF A SECURE MICROCONTROLLER |
US8635107B2 (en) | 2011-06-03 | 2014-01-21 | Adobe Systems Incorporated | Automatic expansion of an advertisement offer inventory |
US9235532B2 (en) * | 2011-06-03 | 2016-01-12 | Apple Inc. | Secure storage of full disk encryption keys |
US20120315893A1 (en) * | 2011-06-09 | 2012-12-13 | Alcatel-Lucent Canada Inc. | Intelligent network management of subscriber-related events |
US20160197929A9 (en) * | 2011-06-22 | 2016-07-07 | Billy G. Tiller | Authenticated information exchange |
EP2541478A1 (en) * | 2011-06-27 | 2013-01-02 | Accenture Global Services Limited | Dynamic electronic money |
US8527361B2 (en) * | 2011-06-27 | 2013-09-03 | Amazon Technologies, Inc. | Service for adding in-application shopping functionality to applications |
US10296878B1 (en) * | 2011-06-28 | 2019-05-21 | Amazon Technologies, Inc. | Platform for providing generic e-content |
US8560453B2 (en) * | 2011-06-30 | 2013-10-15 | Intel Corporation | Method and apparatus for dynamic, real-time ad insertion based on meta-data within a hardware based root of trust |
US20130013358A1 (en) * | 2011-07-08 | 2013-01-10 | Mark Sears | E-commerce content management system for dealer self-routing |
CN102325217A (en) * | 2011-07-11 | 2012-01-18 | 惠州Tcl移动通信有限公司 | Mobile terminal, software sharing system and sharing method thereof |
SG10201605288SA (en) * | 2011-07-15 | 2016-08-30 | Mastercard International Inc | Methods and systems for payments assurance |
EP2735184A4 (en) * | 2011-07-18 | 2015-04-01 | Visa Int Service Ass | Mobile device with secure element |
US9575903B2 (en) * | 2011-08-04 | 2017-02-21 | Elwha Llc | Security perimeter |
US9443085B2 (en) | 2011-07-19 | 2016-09-13 | Elwha Llc | Intrusion detection using taint accumulation |
US8955111B2 (en) | 2011-09-24 | 2015-02-10 | Elwha Llc | Instruction set adapted for security risk monitoring |
US8943313B2 (en) | 2011-07-19 | 2015-01-27 | Elwha Llc | Fine-grained security in federated data sets |
US8813085B2 (en) | 2011-07-19 | 2014-08-19 | Elwha Llc | Scheduling threads based on priority utilizing entitlement vectors, weight and usage level |
US9798873B2 (en) | 2011-08-04 | 2017-10-24 | Elwha Llc | Processor operable to ensure code integrity |
US9558034B2 (en) | 2011-07-19 | 2017-01-31 | Elwha Llc | Entitlement vector for managing resource allocation |
US9170843B2 (en) | 2011-09-24 | 2015-10-27 | Elwha Llc | Data handling apparatus adapted for scheduling operations according to resource allocation based on entitlement |
US9465657B2 (en) | 2011-07-19 | 2016-10-11 | Elwha Llc | Entitlement vector for library usage in managing resource allocation and scheduling based on usage and priority |
US9460290B2 (en) | 2011-07-19 | 2016-10-04 | Elwha Llc | Conditional security response using taint vector monitoring |
US9471373B2 (en) | 2011-09-24 | 2016-10-18 | Elwha Llc | Entitlement vector for library usage in managing resource allocation and scheduling based on usage and priority |
US9098608B2 (en) | 2011-10-28 | 2015-08-04 | Elwha Llc | Processor configured to allocate resources using an entitlement vector |
US9298918B2 (en) | 2011-11-30 | 2016-03-29 | Elwha Llc | Taint injection and tracking |
RU2597526C2 (en) * | 2011-07-20 | 2016-09-10 | Виза Интернэшнл Сервис Ассосиэйшн | Gateway communication with security ensuring |
US20130030896A1 (en) * | 2011-07-26 | 2013-01-31 | Shlomo Mai-Tal | Method and system for generating and distributing digital content |
US9665726B2 (en) | 2011-07-27 | 2017-05-30 | Hewlett-Packard Development Company, L.P. | Printing of encrypted print content |
US9509704B2 (en) | 2011-08-02 | 2016-11-29 | Oncircle, Inc. | Rights-based system |
US8849819B2 (en) * | 2011-08-05 | 2014-09-30 | Deacon Johnson | System and method for controlling and organizing metadata associated with on-line content |
CA2844667C (en) * | 2011-08-08 | 2018-07-17 | Gennady Slobodsky | System and method for electronic distribution of software and data |
US20130041822A1 (en) * | 2011-08-08 | 2013-02-14 | Kim Wagner | Payment Device with Integrated Chip |
US8713672B2 (en) * | 2011-08-15 | 2014-04-29 | Bank Of America Corporation | Method and apparatus for token-based context caching |
US9747592B2 (en) * | 2011-08-16 | 2017-08-29 | Verizon Digital Media Services Inc. | End-to-end content delivery network incorporating independently operated transparent caches and proxy caches |
US8732574B2 (en) | 2011-08-25 | 2014-05-20 | Palantir Technologies, Inc. | System and method for parameterizing documents for automatic workflow generation |
US9439240B1 (en) | 2011-08-26 | 2016-09-06 | Sprint Communications Company L.P. | Mobile communication system identity pairing |
AU2011213908A1 (en) * | 2011-08-26 | 2013-03-14 | The Carapace Limited | Improvements in or related to purchasing and/or performing financial transactions using a mobile phone |
US9467708B2 (en) | 2011-08-30 | 2016-10-11 | Sonic Ip, Inc. | Selection of resolutions for seamless resolution switching of multimedia content |
WO2013030832A1 (en) | 2011-08-31 | 2013-03-07 | Accells Technologies (2009) Ltd. | System and method for secure transaction process via mobile device |
US8964977B2 (en) | 2011-09-01 | 2015-02-24 | Sonic Ip, Inc. | Systems and methods for saving encoded media streamed using adaptive bitrate streaming |
US8909922B2 (en) | 2011-09-01 | 2014-12-09 | Sonic Ip, Inc. | Systems and methods for playing back alternative streams of protected content protected using common cryptographic information |
US20130060661A1 (en) * | 2011-09-06 | 2013-03-07 | Apple Inc. | Managing access to digital content items |
US20130060702A1 (en) * | 2011-09-07 | 2013-03-07 | Qualcomm Incorporated | Methods and apparatus for demographics information collection |
JP2013058150A (en) * | 2011-09-09 | 2013-03-28 | Ricoh Co Ltd | Information processor and program |
US8832455B1 (en) | 2011-09-21 | 2014-09-09 | Google Inc. | Verified boot path retry |
US8776043B1 (en) | 2011-09-29 | 2014-07-08 | Amazon Technologies, Inc. | Service image notifications |
US9335885B1 (en) * | 2011-10-01 | 2016-05-10 | BioFortis, Inc. | Generating user interface for viewing data records |
EP2764477A4 (en) * | 2011-10-03 | 2015-07-29 | Ezetap Mobile Solutions Private Ltd | A dongle device with tamper proof characteristics for a secure electronic transaction |
US20140207680A1 (en) * | 2011-10-17 | 2014-07-24 | Capital One Financial Corporation | System and method for providing a mobile wallet shopping companion application |
US8271394B1 (en) * | 2011-10-27 | 2012-09-18 | Bogaard Erik T | Confirming local marketplace transaction consummation for online payment consummation |
US10339525B2 (en) | 2011-10-27 | 2019-07-02 | Boom! Payments, Inc. | Confirming local marketplace transaction consummation for online payment consummation |
US9158741B1 (en) | 2011-10-28 | 2015-10-13 | Amazon Technologies, Inc. | Indicators for navigating digital works |
US20130110661A1 (en) * | 2011-10-28 | 2013-05-02 | Microsoft Corporation | Application store delivered platform components |
US8533481B2 (en) | 2011-11-03 | 2013-09-10 | Verance Corporation | Extraction of embedded watermarks from a host content based on extrapolation techniques |
US8682026B2 (en) | 2011-11-03 | 2014-03-25 | Verance Corporation | Efficient extraction of embedded watermarks in the presence of host content distortions |
US8923548B2 (en) | 2011-11-03 | 2014-12-30 | Verance Corporation | Extraction of embedded watermarks from a host content using a plurality of tentative watermarks |
US8615104B2 (en) | 2011-11-03 | 2013-12-24 | Verance Corporation | Watermark extraction based on tentative watermarks |
US10754913B2 (en) | 2011-11-15 | 2020-08-25 | Tapad, Inc. | System and method for analyzing user device information |
US20130121490A1 (en) * | 2011-11-15 | 2013-05-16 | Martin Boliek | Method and apparatus for trust based data scanning, capture, and transfer |
US8949664B2 (en) * | 2011-11-18 | 2015-02-03 | Nokia Corporation | Method and apparatus for providing information consistency in distributed computing environments |
DE202012100620U1 (en) | 2011-11-22 | 2012-06-13 | Square, Inc. | System for processing cardless payment transactions |
US8745403B2 (en) | 2011-11-23 | 2014-06-03 | Verance Corporation | Enhanced content management based on watermark extraction records |
US9792451B2 (en) | 2011-12-09 | 2017-10-17 | Echarge2 Corporation | System and methods for using cipher objects to protect data |
US8751800B1 (en) | 2011-12-12 | 2014-06-10 | Google Inc. | DRM provider interoperability |
US9323902B2 (en) | 2011-12-13 | 2016-04-26 | Verance Corporation | Conditional access using embedded watermarks |
US10949815B2 (en) * | 2011-12-13 | 2021-03-16 | Visa International Service Association | Integrated mobile trusted service manager |
CN104115175A (en) | 2011-12-13 | 2014-10-22 | 维萨国际服务协会 | Integrated mobile trusted service manager |
US9547753B2 (en) | 2011-12-13 | 2017-01-17 | Verance Corporation | Coordinated watermarking |
US10694258B2 (en) * | 2011-12-14 | 2020-06-23 | Netflix, Inc. | Startup times of streaming digital media playback |
JP5908991B2 (en) * | 2011-12-21 | 2016-04-26 | インテル・コーポレーション | Secure direct memory access |
US20130179353A1 (en) * | 2012-01-10 | 2013-07-11 | Intuit Inc. | Secure financial transactions using multiple communication technologies |
US20130185214A1 (en) * | 2012-01-12 | 2013-07-18 | Firethorn Mobile Inc. | System and Method For Secure Offline Payment Transactions Using A Portable Computing Device |
JP2015513830A (en) | 2012-02-17 | 2015-05-14 | インタートラスト テクノロジーズ コーポレイション | System and method for vehicle policy enforcement |
US9286063B2 (en) | 2012-02-22 | 2016-03-15 | Veracode, Inc. | Methods and systems for providing feedback and suggested programming methods |
US20130226812A1 (en) * | 2012-02-24 | 2013-08-29 | Mads Landrok | Cloud proxy secured mobile payments |
US20160117673A1 (en) * | 2012-02-24 | 2016-04-28 | Cryptomathic Limited | System and method for secured transactions using mobile devices |
US20130227710A1 (en) * | 2012-02-27 | 2013-08-29 | Computer Associates Think, Inc. | System and method for securing leased images in a cloud environment |
KR102088451B1 (en) | 2012-02-29 | 2020-03-12 | 모비웨이브 인코포레이티드 | Method, device and secure element for conducting a secured financial transaction on a device |
US20130232061A1 (en) * | 2012-03-01 | 2013-09-05 | Carmel - Haifa University Economic Corporation Ltd | Reducing unsolicited traffic in communication networks |
US9633201B1 (en) | 2012-03-01 | 2017-04-25 | The 41St Parameter, Inc. | Methods and systems for fraud containment |
US8844036B2 (en) * | 2012-03-02 | 2014-09-23 | Sri International | Method and system for application-based policy monitoring and enforcement on a mobile device |
US9009258B2 (en) | 2012-03-06 | 2015-04-14 | Google Inc. | Providing content to a user across multiple devices |
US20130246259A1 (en) * | 2012-03-15 | 2013-09-19 | Firethorn Mobile, Inc. | System and method for managing payment in transactions with a pcd |
US9092776B2 (en) * | 2012-03-15 | 2015-07-28 | Qualcomm Incorporated | System and method for managing payment in transactions with a PCD |
US9503512B2 (en) | 2012-03-21 | 2016-11-22 | Intertrust Technologies Corporation | Distributed computation systems and methods |
US9521551B2 (en) | 2012-03-22 | 2016-12-13 | The 41St Parameter, Inc. | Methods and systems for persistent cross-application mobile device identification |
CN103327000A (en) * | 2012-03-23 | 2013-09-25 | 华硕电脑股份有限公司 | Authentication method and authentication system of electronic product |
US8627097B2 (en) | 2012-03-27 | 2014-01-07 | Igt | System and method enabling parallel processing of hash functions using authentication checkpoint hashes |
FR2988884A1 (en) * | 2012-03-29 | 2013-10-04 | France Telecom | METHOD AND SYSTEM FOR PROVIDING A DIGITAL TICKET FOR ACCESS TO AT LEAST ONE DIGITAL OBJECT |
US8976960B2 (en) | 2012-04-02 | 2015-03-10 | Apple Inc. | Methods and apparatus for correlation protected processing of cryptographic operations |
ITMI20120561A1 (en) * | 2012-04-05 | 2013-10-06 | St Microelectronics Srl | METHOD TO PROTECT AN APPLICATION PROGRAM |
CA3118235A1 (en) | 2012-04-13 | 2013-10-17 | Ologn Technologies Ag | Apparatuses, methods and systems for computer-based secure transactions |
TW201349009A (en) | 2012-04-13 | 2013-12-01 | Ologn Technologies Ag | Secure zone for digital communications |
US8719169B2 (en) * | 2012-04-13 | 2014-05-06 | Metrodigi, Inc. | Digital media personalization |
TW201403375A (en) | 2012-04-20 | 2014-01-16 | 歐樂岡科技公司 | Secure zone for secure purchases |
US10360543B2 (en) * | 2012-04-23 | 2019-07-23 | Grubhub Holdings Inc. | Scraping resistant system and method for placing orders through an internet shopping service |
US9398454B1 (en) | 2012-04-24 | 2016-07-19 | Sprint Communications Company L.P. | In-car head unit wireless communication service subscription initialization |
US9514446B1 (en) | 2012-04-27 | 2016-12-06 | Google Inc. | Remarketing content to a user associated with multiple devices |
US8966043B2 (en) | 2012-04-27 | 2015-02-24 | Google Inc. | Frequency capping of content across multiple devices |
US8978158B2 (en) | 2012-04-27 | 2015-03-10 | Google Inc. | Privacy management across multiple devices |
US9258279B1 (en) | 2012-04-27 | 2016-02-09 | Google Inc. | Bookmarking content for users associated with multiple devices |
US9881301B2 (en) * | 2012-04-27 | 2018-01-30 | Google Llc | Conversion tracking of a user across multiple devices |
US11216854B2 (en) * | 2012-04-27 | 2022-01-04 | Blackberry Limited | Software distribution accounting |
US9426127B2 (en) | 2012-05-02 | 2016-08-23 | Visa International Service Association | Small form-factor cryptographic expansion device |
US20130297456A1 (en) * | 2012-05-03 | 2013-11-07 | Sprint Communications Company L.P. | Methods and Systems of Digital Rights Management for Vehicles |
US9400983B1 (en) | 2012-05-10 | 2016-07-26 | Jpmorgan Chase Bank, N.A. | Method and system for implementing behavior isolating prediction model |
US9027102B2 (en) | 2012-05-11 | 2015-05-05 | Sprint Communications Company L.P. | Web server bypass of backend process on near field communications and secure element chips |
US20170140145A1 (en) * | 2012-05-14 | 2017-05-18 | Netspective Communications Llc | Computer-controlled physically distributed collaborative asynchronous digital transactions |
US20130311326A1 (en) * | 2012-05-16 | 2013-11-21 | Bank Of America Corporation | Virtual registry |
US9642005B2 (en) | 2012-05-21 | 2017-05-02 | Nexiden, Inc. | Secure authentication of a user using a mobile device |
US20130311382A1 (en) | 2012-05-21 | 2013-11-21 | Klaus S. Fosmark | Obtaining information for a payment transaction |
US9521548B2 (en) | 2012-05-21 | 2016-12-13 | Nexiden, Inc. | Secure registration of a mobile device for use with a session |
US20130317936A1 (en) * | 2012-05-25 | 2013-11-28 | Apple Inc. | Digital mixed tapes |
US20130326634A1 (en) * | 2012-05-30 | 2013-12-05 | Clint H. O'Connor | Simple Product Purchase for Multisystem Accounts |
US8949401B2 (en) | 2012-06-14 | 2015-02-03 | Dell Products L.P. | Automated digital migration |
US11636489B2 (en) | 2013-10-19 | 2023-04-25 | Ondot Systems Inc. | System and method for authorizing a transaction based on dynamic location updates from a user device |
US11899711B2 (en) | 2012-06-19 | 2024-02-13 | Ondot Systems Inc. | Merchant logo detection artificial intelligence (AI) for injecting user control to ISO back-end transaction approvals between acquirer processors and issuer processors over data communication networks |
US20190147450A1 (en) * | 2012-06-19 | 2019-05-16 | Ondot System | Real-time enrichment of raw merchant data from iso transactions on data communication networks for preventing false declines in fraud prevention systems |
US9733953B2 (en) * | 2012-06-22 | 2017-08-15 | Microsoft Technology Licensing, Llc | API redirection for limited capability operating systems |
US9213966B2 (en) * | 2012-06-22 | 2015-12-15 | Intuit Inc. | Regulation compliant data integration for financial institutions |
US9282898B2 (en) | 2012-06-25 | 2016-03-15 | Sprint Communications Company L.P. | End-to-end trusted communications infrastructure |
US20130346305A1 (en) * | 2012-06-26 | 2013-12-26 | Carta Worldwide Inc. | Mobile wallet payment processing |
US20140006282A1 (en) * | 2012-06-27 | 2014-01-02 | Mastercard International Incorporated | Methods and systems for connecting multiple merchants to an interactive element in a web page |
US20140012762A1 (en) * | 2012-07-06 | 2014-01-09 | Terry L. Glatt | Embedded Electronic Payment System and Integrated Circuit |
US20140020105A1 (en) * | 2012-07-10 | 2014-01-16 | William Nix | Distributing Software Images with Mixed Licensing |
US8639619B1 (en) | 2012-07-13 | 2014-01-28 | Scvngr, Inc. | Secure payment method and system |
US9805350B2 (en) * | 2012-07-16 | 2017-10-31 | Infosys Limited | System and method for providing access of digital contents to offline DRM users |
US20140047557A1 (en) * | 2012-07-16 | 2014-02-13 | Infosys Limited | Providing access of digital contents to online drm users |
US10496977B2 (en) | 2012-07-16 | 2019-12-03 | Square, Inc. | Storing and forwarding payment transactions |
US20140026222A1 (en) * | 2012-07-18 | 2014-01-23 | Vikram Venkata Koka | Framework for providing electronic licenses and licensing programs |
US20140025574A1 (en) * | 2012-07-20 | 2014-01-23 | Bank Of America Corporation | Readable indicia for a payment claim |
US9053307B1 (en) | 2012-07-23 | 2015-06-09 | Amazon Technologies, Inc. | Behavior based identity system |
US20150227932A1 (en) * | 2012-08-02 | 2015-08-13 | Visa International Service Association | Issuing and storing of payment credentials |
EP2880619A1 (en) | 2012-08-02 | 2015-06-10 | The 41st Parameter, Inc. | Systems and methods for accessing records via derivative locators |
US9779219B2 (en) | 2012-08-09 | 2017-10-03 | Dell Products L.P. | Method and system for late binding of option features associated with a device using at least in part license and unique ID information |
US9183412B2 (en) | 2012-08-10 | 2015-11-10 | Sprint Communications Company L.P. | Systems and methods for provisioning and using multiple trusted security zones on an electronic device |
US10592887B2 (en) * | 2012-08-15 | 2020-03-17 | International Business Machines Corporation | System and method for software allocation based on forecasts and calendars |
US20140058945A1 (en) * | 2012-08-22 | 2014-02-27 | Mcafee, Inc. | Anonymous payment brokering |
US11132657B2 (en) * | 2012-08-27 | 2021-09-28 | Ncr Corporation | Transaction flow |
EP2891127A4 (en) * | 2012-08-30 | 2016-05-04 | Strategic Engineering Group Llc | Virtual check system and method |
US9571606B2 (en) | 2012-08-31 | 2017-02-14 | Verance Corporation | Social media viewing system |
US20140074712A1 (en) * | 2012-09-10 | 2014-03-13 | Sound Halo Pty. Ltd. | Media distribution system and process |
US8726304B2 (en) | 2012-09-13 | 2014-05-13 | Verance Corporation | Time varying evaluation of multimedia content |
US9106964B2 (en) | 2012-09-13 | 2015-08-11 | Verance Corporation | Enhanced content distribution using advertisements |
US8869222B2 (en) | 2012-09-13 | 2014-10-21 | Verance Corporation | Second screen content |
US8938796B2 (en) | 2012-09-20 | 2015-01-20 | Paul Case, SR. | Case secure computer architecture |
US9116888B1 (en) * | 2012-09-28 | 2015-08-25 | Emc Corporation | Customer controlled data privacy protection in public cloud |
US9389898B2 (en) | 2012-10-02 | 2016-07-12 | Ca, Inc. | System and method for enforcement of security controls on virtual machines throughout life cycle state changes |
EP2717552A1 (en) * | 2012-10-04 | 2014-04-09 | Nagravision S.A. | A portable proximity wireless communication device |
US20140101032A1 (en) * | 2012-10-09 | 2014-04-10 | Red.Com, Inc. | Rights Management and Content Distribution Platform |
JP2016502295A (en) * | 2012-10-10 | 2016-01-21 | レッド.コム,インコーポレイテッド | Video distribution and playback |
US9348677B2 (en) | 2012-10-22 | 2016-05-24 | Palantir Technologies Inc. | System and method for batch evaluation programs |
US9164880B2 (en) * | 2012-10-23 | 2015-10-20 | Hitachi, Ltd. | Method and apparatus for offloading storage workload |
US20180129827A1 (en) * | 2012-10-23 | 2018-05-10 | Adobe Systems Incorporated | Digital marking in a network environment |
US20140115713A1 (en) * | 2012-10-23 | 2014-04-24 | Adobe Systems Incorporated | Providing electronic signature services to third party applications based on api calls |
WO2014078569A1 (en) | 2012-11-14 | 2014-05-22 | The 41St Parameter, Inc. | Systems and methods of global identification |
US20140143108A1 (en) * | 2012-11-21 | 2014-05-22 | Mastercard International Incorporated | Mobile device provisioning framework system |
US20140149263A1 (en) * | 2012-11-27 | 2014-05-29 | Mashinery Pty Ltd. | Data Assembly, Transfer and Storage |
US20140149243A1 (en) * | 2012-11-29 | 2014-05-29 | Red Hat, Inc. | Vendor download integration |
US9105178B2 (en) | 2012-12-03 | 2015-08-11 | Sony Computer Entertainment Inc. | Remote dynamic configuration of telemetry reporting through regular expressions |
US20140156534A1 (en) * | 2012-12-05 | 2014-06-05 | Sam Quigley | Method for securely storing and forwarding payment transactions |
GB2508631A (en) * | 2012-12-06 | 2014-06-11 | Ibm | Propagating a query in a network by applying a delay at a node |
US20140164225A1 (en) * | 2012-12-06 | 2014-06-12 | Javier Cardona | Method and apparatus for content distribution and deferred payment over a wireless network |
US10296968B2 (en) | 2012-12-07 | 2019-05-21 | United Parcel Service Of America, Inc. | Website augmentation including conversion of regional content |
US9123106B2 (en) * | 2012-12-13 | 2015-09-01 | Microsoft Technology Licensing, Llc | Watermarking screen capture content |
TWI610253B (en) | 2012-12-17 | 2018-01-01 | 印奈克斯托股份有限公司 | Method and apparatus for storage of data for tracking manufactured items |
US9313510B2 (en) | 2012-12-31 | 2016-04-12 | Sonic Ip, Inc. | Use of objective quality measures of streamed content to reduce streaming bandwidth |
US9191457B2 (en) | 2012-12-31 | 2015-11-17 | Sonic Ip, Inc. | Systems, methods, and media for controlling delivery of content |
US9578664B1 (en) | 2013-02-07 | 2017-02-21 | Sprint Communications Company L.P. | Trusted signaling in 3GPP interfaces in a network function virtualization wireless communication system |
JP2014157544A (en) * | 2013-02-18 | 2014-08-28 | Toshiba Corp | Information distribution device, information distribution method and information distribution program |
US10341509B2 (en) * | 2013-02-24 | 2019-07-02 | Qualys, Inc. | Client device state collection and network-based processing solution |
US20140244514A1 (en) * | 2013-02-26 | 2014-08-28 | Digimarc Corporation | Methods and arrangements for smartphone payments and transactions |
US9311640B2 (en) | 2014-02-11 | 2016-04-12 | Digimarc Corporation | Methods and arrangements for smartphone payments and transactions |
US10163108B1 (en) | 2013-02-28 | 2018-12-25 | OnDot Systems, Inc. | Transparently reconstructing sniffed network traffic over a back-end data communications network to reconstruct payment card transactions for generating user notifications during transactions |
US9626489B2 (en) | 2013-03-13 | 2017-04-18 | Intertrust Technologies Corporation | Object rendering systems and methods |
US9613208B1 (en) | 2013-03-13 | 2017-04-04 | Sprint Communications Company L.P. | Trusted security zone enhanced with trusted hardware drivers |
US9262794B2 (en) | 2013-03-14 | 2016-02-16 | Verance Corporation | Transactional video marking system |
US10140664B2 (en) | 2013-03-14 | 2018-11-27 | Palantir Technologies Inc. | Resolving similar entities from a transaction database |
US20140279128A1 (en) * | 2013-03-14 | 2014-09-18 | Rodrigo SAGEBIN | Accessing media content in a media management system |
US9904579B2 (en) | 2013-03-15 | 2018-02-27 | Advanced Elemental Technologies, Inc. | Methods and systems for purposeful computing |
US9419957B1 (en) | 2013-03-15 | 2016-08-16 | Jpmorgan Chase Bank, N.A. | Confidence-based authentication |
US20140281560A1 (en) * | 2013-03-15 | 2014-09-18 | Ologn Technologies Ag | Secure zone on a virtual machine for digital communications |
CA3234925A1 (en) | 2013-03-15 | 2014-09-18 | Ologn Technologies Ag | Systems, methods and apparatuses for securely storing and providing payment information |
US9906785B2 (en) | 2013-03-15 | 2018-02-27 | Sonic Ip, Inc. | Systems, methods, and media for transcoding video data according to encoding parameters indicated by received metadata |
US8868486B2 (en) | 2013-03-15 | 2014-10-21 | Palantir Technologies Inc. | Time-sensitive cube |
US9721086B2 (en) | 2013-03-15 | 2017-08-01 | Advanced Elemental Technologies, Inc. | Methods and systems for secure and reliable identity-based computing |
US20140279124A1 (en) * | 2013-03-15 | 2014-09-18 | Daniel M. Rotar | System and method for providing access to user generated content |
US10397292B2 (en) | 2013-03-15 | 2019-08-27 | Divx, Llc | Systems, methods, and media for delivery of content |
US9378065B2 (en) | 2013-03-15 | 2016-06-28 | Advanced Elemental Technologies, Inc. | Purposeful computing |
EP2973278A4 (en) * | 2013-03-15 | 2017-07-19 | First Data Corporation | Remote secure transactions |
US8909656B2 (en) | 2013-03-15 | 2014-12-09 | Palantir Technologies Inc. | Filter chains with associated multipath views for exploring large data sets |
US10075384B2 (en) | 2013-03-15 | 2018-09-11 | Advanced Elemental Technologies, Inc. | Purposeful computing |
US9887983B2 (en) | 2013-10-29 | 2018-02-06 | Nok Nok Labs, Inc. | Apparatus and method for implementing composite authenticators |
US9305298B2 (en) | 2013-03-22 | 2016-04-05 | Nok Nok Labs, Inc. | System and method for location-based authentication |
US10270748B2 (en) | 2013-03-22 | 2019-04-23 | Nok Nok Labs, Inc. | Advanced authentication techniques and applications |
US20140331314A1 (en) * | 2013-03-28 | 2014-11-06 | Fuhu Holdings, Inc. | Time and Sleep Control System and Method |
US9324016B1 (en) | 2013-04-04 | 2016-04-26 | Sprint Communications Company L.P. | Digest of biographical information for an electronic device with static and dynamic portions |
US9838869B1 (en) * | 2013-04-10 | 2017-12-05 | Sprint Communications Company L.P. | Delivering digital content to a mobile device via a digital rights clearing house |
US10075470B2 (en) | 2013-04-19 | 2018-09-11 | Nicira, Inc. | Framework for coordination between endpoint security and network security services |
US9306981B2 (en) | 2013-04-24 | 2016-04-05 | Intertrust Technologies Corporation | Bioinformatic processing systems and methods |
US20140324716A1 (en) * | 2013-04-29 | 2014-10-30 | Carolina Haber Florencio | Method and system for deterring product counterfeiting |
US9369467B1 (en) * | 2013-05-08 | 2016-06-14 | Amdocs Software Systems Limited | System, method, and computer program for providing generic access to web content on a mobile device |
KR102100456B1 (en) * | 2013-05-09 | 2020-04-13 | 삼성전자주식회사 | Method and apparatus for drm service in an electronic device |
WO2014183106A2 (en) | 2013-05-10 | 2014-11-13 | Proxense, Llc | Secure element as a digital pocket |
US11210380B2 (en) | 2013-05-13 | 2021-12-28 | Veridium Ip Limited | System and method for authorizing access to access-controlled environments |
US9003196B2 (en) | 2013-05-13 | 2015-04-07 | Hoyos Labs Corp. | System and method for authorizing access to access-controlled environments |
US20140344170A1 (en) * | 2013-05-17 | 2014-11-20 | Chegg, Inc. | Publishing Personalized Documents on a Secondary Market |
US20140351096A1 (en) * | 2013-05-23 | 2014-11-27 | Katherine Laurel Radziwon | Techniques for facilitating acquisition and exchange of ebook and other digital content via a computer network |
US11263221B2 (en) * | 2013-05-29 | 2022-03-01 | Microsoft Technology Licensing, Llc | Search result contexts for application launch |
US10430418B2 (en) | 2013-05-29 | 2019-10-01 | Microsoft Technology Licensing, Llc | Context-based actions from a source application |
US9094737B2 (en) | 2013-05-30 | 2015-07-28 | Sonic Ip, Inc. | Network video streaming with trick play based on separate trick play files |
US9247317B2 (en) | 2013-05-30 | 2016-01-26 | Sonic Ip, Inc. | Content streaming with client device trick play index |
US9560519B1 (en) | 2013-06-06 | 2017-01-31 | Sprint Communications Company L.P. | Mobile communication device profound identity brokering framework |
US9274978B2 (en) * | 2013-06-10 | 2016-03-01 | Western Digital Technologies, Inc. | Migration of encrypted data for data storage systems |
WO2014204363A1 (en) * | 2013-06-19 | 2014-12-24 | Telefonaktiebolaget L M Ericsson (Publ) | Method and an integrated circuit for executing a trusted application within a trusted runtime environment |
US20140379595A1 (en) * | 2013-06-23 | 2014-12-25 | Cisco Technology, Inc. | Associating licenses of a computer product with a purchaser of the computer product via an n-tier channel |
US20140379596A1 (en) * | 2013-06-23 | 2014-12-25 | Cisco Technology, Inc. | Cloud-based auditing and management of licenses to use computer products |
US20140379594A1 (en) * | 2013-06-23 | 2014-12-25 | Cisco Technology, Inc. | Recording and maintaining acceptances of licenses for using computer products |
US9262470B1 (en) | 2013-06-25 | 2016-02-16 | Amazon Technologies, Inc. | Application recommendations based on application and lifestyle fingerprinting |
US10269029B1 (en) | 2013-06-25 | 2019-04-23 | Amazon Technologies, Inc. | Application monetization based on application and lifestyle fingerprinting |
US9921827B1 (en) | 2013-06-25 | 2018-03-20 | Amazon Technologies, Inc. | Developing versions of applications based on application fingerprinting |
US9967305B2 (en) | 2013-06-28 | 2018-05-08 | Divx, Llc | Systems, methods, and media for streaming media content |
US10460314B2 (en) * | 2013-07-10 | 2019-10-29 | Ca, Inc. | Pre-generation of session keys for electronic transactions and devices that pre-generate session keys for electronic transactions |
US8770478B2 (en) | 2013-07-11 | 2014-07-08 | Scvngr, Inc. | Payment processing with automatic no-touch mode selection |
US20150026078A1 (en) * | 2013-07-18 | 2015-01-22 | Google Inc. | Generating and providing an authorization indication in relation to a media content item |
EP2827601A1 (en) * | 2013-07-19 | 2015-01-21 | Nagravision S.A. | Method and device for protecting decryption keys of a decoder |
US9251549B2 (en) | 2013-07-23 | 2016-02-02 | Verance Corporation | Watermark extractor enhancements based on payload ranking |
EP3028210B1 (en) | 2013-08-02 | 2020-01-08 | OLogN Technologies AG | Secure server in a system with virtual machines |
US10074115B1 (en) | 2013-08-14 | 2018-09-11 | Amazon Technologies, Inc. | Subscription management service |
US20150058175A1 (en) * | 2013-08-21 | 2015-02-26 | Microsoft Corporation | Realizing boxed experience for digital content acquisition |
JP5485485B1 (en) * | 2013-08-22 | 2014-05-07 | 楽天株式会社 | Information processing apparatus, information processing method, program, and storage medium |
CN104426867B (en) * | 2013-08-28 | 2018-02-02 | 北大方正集团有限公司 | Authority checking system, method and server, transit terminal |
FI3022059T4 (en) | 2013-08-30 | 2024-04-04 | Hewlett Packard Development Co Lp | Supply authentication via timing challenge response |
US10902327B1 (en) | 2013-08-30 | 2021-01-26 | The 41St Parameter, Inc. | System and method for device identification and uniqueness |
US20150066744A1 (en) * | 2013-09-05 | 2015-03-05 | Our Film Festival, Inc. | Apparatus and Method for Geolocation Based Content Delivery Fee Computation |
US10339113B2 (en) * | 2013-09-21 | 2019-07-02 | Oracle International Corporation | Method and system for effecting incremental changes to a repository |
US10489132B1 (en) | 2013-09-23 | 2019-11-26 | Sprint Communications Company L.P. | Authenticating mobile device for on board diagnostic system access |
RU2587423C2 (en) * | 2013-09-26 | 2016-06-20 | Закрытое акционерное общество "Лаборатория Касперского" | System and method of providing safety of online transactions |
US11714923B2 (en) | 2013-09-26 | 2023-08-01 | Salesforce, Inc. | Methods and systems for protecting data integrity |
US9703684B1 (en) | 2013-10-01 | 2017-07-11 | Amazon Technologies, Inc. | Unified user element information provisioning |
US20150095225A1 (en) * | 2013-10-02 | 2015-04-02 | Mastercard International Incorporated | Enabling synchronization between disparate payment account systems |
US8938686B1 (en) | 2013-10-03 | 2015-01-20 | Palantir Technologies Inc. | Systems and methods for analyzing performance of an entity |
US20150101065A1 (en) * | 2013-10-04 | 2015-04-09 | Bio-Key International, Inc. | User controlled data sharing platform |
US20150100494A1 (en) * | 2013-10-08 | 2015-04-09 | A-Men Technology Corporation | Point transaction system and method for mobile communication device |
US10769613B1 (en) | 2013-10-22 | 2020-09-08 | Ondot Systems, Inc | Delegate cards |
US9208334B2 (en) | 2013-10-25 | 2015-12-08 | Verance Corporation | Content management using multiple abstraction layers |
US9319727B2 (en) | 2013-10-29 | 2016-04-19 | Fx Networks, Llc | Viewer-authored content acquisition and management system for in-the-moment broadcast in conjunction with media programs |
US20170325301A1 (en) * | 2013-11-03 | 2017-11-09 | Lightel Technologies, Inc. | Methods And Systems Of Proactive Monitoring And Metering Of Lighting Devices |
US20150127593A1 (en) * | 2013-11-06 | 2015-05-07 | Forever Identity, Inc. | Platform to Acquire and Represent Human Behavior and Physical Traits to Achieve Digital Eternity |
DK3095044T3 (en) * | 2013-11-19 | 2020-12-21 | Top Galore Ltd | BLOCK MINING PROCEDURE AND APPLIANCE |
US8910868B1 (en) | 2013-11-27 | 2014-12-16 | Square, Inc. | Firmware management |
WO2015084797A1 (en) * | 2013-12-02 | 2015-06-11 | Mastercard International Incorporated | Method and system for secure tranmission of remote notification service messages to mobile devices without secure elements |
US20150161360A1 (en) * | 2013-12-06 | 2015-06-11 | Microsoft Corporation | Mobile Device Generated Sharing of Cloud Media Collections |
US11823190B2 (en) * | 2013-12-09 | 2023-11-21 | Mastercard International Incorporated | Systems, apparatus and methods for improved authentication |
US9105000B1 (en) | 2013-12-10 | 2015-08-11 | Palantir Technologies Inc. | Aggregating data from a plurality of data sources |
US9633236B1 (en) | 2013-12-11 | 2017-04-25 | Square, Inc. | Power harvesting in reader devices |
US8931699B1 (en) | 2013-12-11 | 2015-01-13 | Square, Inc. | Bidirectional audio communication in reader devices |
US20150170157A1 (en) * | 2013-12-13 | 2015-06-18 | 2308134 Ontario Inc. | System and Method for Brokering the Publication of Media Content |
US20150172920A1 (en) * | 2013-12-16 | 2015-06-18 | Mourad Ben Ayed | System for proximity based encryption and decryption |
US10019724B2 (en) | 2015-01-30 | 2018-07-10 | PayRange Inc. | Method and system for providing offers for automated retail machines via mobile devices |
US9659296B2 (en) | 2013-12-18 | 2017-05-23 | PayRange Inc. | Method and system for presenting representations of payment accepting unit events |
US11205163B2 (en) | 2013-12-18 | 2021-12-21 | PayRange Inc. | Systems and methods for determining electric pulses to provide to an unattended machine based on remotely-configured options |
US11475454B2 (en) | 2013-12-18 | 2022-10-18 | PayRange Inc. | Intermediary communications over non-persistent network connections |
USD755183S1 (en) | 2013-12-18 | 2016-05-03 | Payrange, Inc. | In-line dongle |
US11481780B2 (en) | 2013-12-18 | 2022-10-25 | PayRange Inc. | Method and system for asynchronous mobile payments for multiple in-person transactions conducted in parallel |
US9875473B2 (en) | 2013-12-18 | 2018-01-23 | PayRange Inc. | Method and system for retrofitting an offline-payment operated machine to accept electronic payments |
US11481781B2 (en) | 2013-12-18 | 2022-10-25 | PayRange Inc. | Processing interrupted transaction over non-persistent network connections |
US11074580B2 (en) | 2013-12-18 | 2021-07-27 | PayRange Inc. | Device and method for providing external access to multi-drop bus peripheral devices |
US11966895B2 (en) | 2013-12-18 | 2024-04-23 | PayRange Inc. | Refund centers for processing and dispensing vending machine refunds via an MDB router |
US11966926B2 (en) | 2013-12-18 | 2024-04-23 | PayRange Inc. | Method and system for asynchronous mobile payments for multiple in-person transactions conducted in parallel |
US20150170136A1 (en) * | 2013-12-18 | 2015-06-18 | PayRange Inc. | Method and System for Performing Mobile Device-To-Machine Payments |
US8856045B1 (en) | 2013-12-18 | 2014-10-07 | PayRange Inc. | Mobile-device-to-machine payment systems |
US9922322B2 (en) | 2013-12-19 | 2018-03-20 | Visa International Service Association | Cloud-based transactions with magnetic secure transmission |
AU2014368949A1 (en) | 2013-12-19 | 2016-06-09 | Visa International Service Association | Cloud-based transactions methods and systems |
US10445769B2 (en) | 2013-12-24 | 2019-10-15 | Google Llc | Systems and methods for audience measurement |
US20150188956A1 (en) * | 2013-12-27 | 2015-07-02 | T-Mobile Usa, Inc. | Unified Communication Device |
US10931721B2 (en) | 2013-12-27 | 2021-02-23 | T-Mobile Usa, Inc. | User account-based access to real-time communications |
US9380052B2 (en) | 2013-12-31 | 2016-06-28 | Hoyos Labs Ip Ltd. | System and method for biometric protocol standards |
US9838388B2 (en) | 2014-08-26 | 2017-12-05 | Veridium Ip Limited | System and method for biometric protocol standards |
US20150193626A1 (en) * | 2014-01-07 | 2015-07-09 | Disney Enterprises, Inc. | Method and system for user content view protection |
US9374368B1 (en) | 2014-01-07 | 2016-06-21 | Amazon Technologies, Inc. | Distributed passcode verification system |
US9292711B1 (en) | 2014-01-07 | 2016-03-22 | Amazon Technologies, Inc. | Hardware secret usage limits |
US9369461B1 (en) | 2014-01-07 | 2016-06-14 | Amazon Technologies, Inc. | Passcode verification using hardware secrets |
WO2015106284A1 (en) * | 2014-01-13 | 2015-07-16 | uQontrol, Inc. | Data storage key for secure online transactions |
EP2894588B1 (en) * | 2014-01-13 | 2018-08-15 | Nxp B.V. | Data processing device, method for executing an application and computer program product |
US11392927B2 (en) * | 2014-01-13 | 2022-07-19 | uQontrol, Inc. | Multi-function data key |
CN104796380B (en) * | 2014-01-16 | 2019-09-17 | 腾讯科技(深圳)有限公司 | Method and system, terminal, the authentication server of safety check |
US10148726B1 (en) | 2014-01-24 | 2018-12-04 | Jpmorgan Chase Bank, N.A. | Initiating operating system commands based on browser cookies |
WO2015116998A2 (en) * | 2014-01-30 | 2015-08-06 | Gary Kremen | Electronic transfer and obligation enforcement system |
US20150371234A1 (en) * | 2014-02-21 | 2015-12-24 | Looppay, Inc. | Methods, devices, and systems for secure provisioning, transmission, and authentication of payment data |
US9256769B1 (en) | 2014-02-25 | 2016-02-09 | Square, Inc. | Mobile reader device |
US8838501B1 (en) * | 2014-02-26 | 2014-09-16 | Scvngr, Inc. | Methods and systems for permissions management |
GB2523758A (en) * | 2014-03-03 | 2015-09-09 | Mastercard International Inc | Secure mobile device transactions |
US9721248B2 (en) | 2014-03-04 | 2017-08-01 | Bank Of America Corporation | ATM token cash withdrawal |
JP6266646B2 (en) * | 2014-03-10 | 2018-01-24 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America | Information device, management server, and copy control method |
CN106170988A (en) | 2014-03-13 | 2016-11-30 | 凡瑞斯公司 | The interactive content using embedded code obtains |
US20150262190A1 (en) * | 2014-03-14 | 2015-09-17 | Disney Enterprises, Inc. | Methods and Systems for Determining Consumer Entitlements for Playback Interoperability |
US8935201B1 (en) | 2014-03-18 | 2015-01-13 | Palantir Technologies Inc. | Determining and extracting changed data from a data source |
US9836580B2 (en) | 2014-03-21 | 2017-12-05 | Palantir Technologies Inc. | Provider portal |
JP2017518714A (en) | 2014-03-27 | 2017-07-06 | エックスシネックス コーポレイション | Techniques for watching movies |
US9459861B1 (en) | 2014-03-31 | 2016-10-04 | Terbium Labs, Inc. | Systems and methods for detecting copied computer code using fingerprints |
US10297344B1 (en) | 2014-03-31 | 2019-05-21 | Mckesson Corporation | Systems and methods for establishing an individual's longitudinal medication history |
US8997256B1 (en) | 2014-03-31 | 2015-03-31 | Terbium Labs LLC | Systems and methods for detecting copied computer code using fingerprints |
US9866878B2 (en) | 2014-04-05 | 2018-01-09 | Sonic Ip, Inc. | Systems and methods for encoding and playing back video at different frame rates using enhancement layers |
JP2015203901A (en) * | 2014-04-11 | 2015-11-16 | キヤノン株式会社 | Management system, information processor, management server, control method therefor, and program |
US11574300B1 (en) * | 2014-04-30 | 2023-02-07 | Wells Fargo Bank, N.A. | Mobile wallet systems and methods using trace identifier using card networks |
CA2949348A1 (en) * | 2014-05-16 | 2015-11-19 | Cardlytics, Inc. | System and apparatus for identifier matching and management |
US10304043B1 (en) | 2014-05-21 | 2019-05-28 | Square, Inc. | Multi-peripheral host device |
AU2015264124B2 (en) | 2014-05-21 | 2019-05-09 | Visa International Service Association | Offline authentication |
US10838378B2 (en) * | 2014-06-02 | 2020-11-17 | Rovio Entertainment Ltd | Control of a computer program using media content |
US10089611B1 (en) * | 2014-06-05 | 2018-10-02 | Amazon Technologies, Inc. | Sharing digital media |
USD762651S1 (en) | 2014-06-06 | 2016-08-02 | Square, Inc. | Mobile device case |
US9438627B2 (en) | 2014-06-11 | 2016-09-06 | International Business Machines Corporation | Shared security utility appliance for secure application and data processing |
US9252951B1 (en) | 2014-06-13 | 2016-02-02 | Sprint Communications Company L.P. | Vehicle key function control from a mobile phone based on radio frequency link from phone to vehicle |
US9760740B1 (en) | 2014-06-23 | 2017-09-12 | Square, Inc. | Terminal case with integrated dual reader stack |
EP3161704B1 (en) * | 2014-06-24 | 2021-02-17 | Hewlett-Packard Development Company, L.P. | Composite document access |
US20150379439A1 (en) * | 2014-06-30 | 2015-12-31 | Udo Klein | Integrated and intrinsic intellectual property management |
TW201600997A (en) * | 2014-06-30 | 2016-01-01 | 萬國商業機器公司 | Method, appliance and computer program product of dynamically generating a packet inspection policy for a policy enforcement point in a centralized management environment |
US9256770B1 (en) | 2014-07-02 | 2016-02-09 | Square, Inc. | Terminal case with integrated reader and shortened base |
US9491192B2 (en) * | 2014-07-08 | 2016-11-08 | Marcio Veloso Antunes | Universal relationships, system and method to build and operate a repository to manage and share trusted information of entities and their relationships |
US20160012399A1 (en) * | 2014-07-09 | 2016-01-14 | Uniloc Luxembourg S.A. | Secure two-stage transactions |
US10956907B2 (en) | 2014-07-10 | 2021-03-23 | Datalogic Usa, Inc. | Authorization of transactions based on automated validation of customer speech |
US9965466B2 (en) | 2014-07-16 | 2018-05-08 | United Parcel Service Of America, Inc. | Language content translation |
JP2016025490A (en) * | 2014-07-22 | 2016-02-08 | 富士ゼロックス株式会社 | Information processing system, information processing apparatus, portable terminal device and program |
US20160035047A1 (en) * | 2014-07-30 | 2016-02-04 | International Business Machines Corporation | Managing Energy Meter Usage Feedback |
US9941223B2 (en) * | 2014-08-08 | 2018-04-10 | The Charles Stark Draper Laboratory, Inc. | Devices and methods for detecting counterfeit semiconductor devices |
US10600076B2 (en) | 2014-08-14 | 2020-03-24 | Google Llc | Systems and methods for obfuscated audience measurement |
US9799025B2 (en) | 2014-08-19 | 2017-10-24 | Square, Inc. | Energy harvesting bidirectional audio interface |
US10460098B1 (en) | 2014-08-20 | 2019-10-29 | Google Llc | Linking devices using encrypted account identifiers |
US9775029B2 (en) | 2014-08-22 | 2017-09-26 | Visa International Service Association | Embedding cloud-based functionalities in a communication device |
CN105471956A (en) * | 2014-09-11 | 2016-04-06 | 中兴通讯股份有限公司 | User safety control method of social network, social application tool and terminal |
US9898459B2 (en) | 2014-09-16 | 2018-02-20 | Voicebox Technologies Corporation | Integration of domain information into state transitions of a finite state transducer for natural language processing |
WO2016044290A1 (en) | 2014-09-16 | 2016-03-24 | Kennewick Michael R | Voice commerce |
EP3205138B1 (en) | 2014-10-07 | 2023-06-28 | Nokia Solutions and Networks Oy | Method, apparatus and computer program product for changing a network based on received network information |
US11055682B2 (en) | 2014-10-13 | 2021-07-06 | NCR Corportation | Authenticated self-service terminal (SST) access |
US10091312B1 (en) | 2014-10-14 | 2018-10-02 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
CN107003999B (en) | 2014-10-15 | 2020-08-21 | 声钰科技 | System and method for subsequent response to a user's prior natural language input |
US10140365B2 (en) | 2014-10-21 | 2018-11-27 | Escapex Limited | System and method for facilitating co-play and download of artist specific client applications via user-provided playlists |
US20160110830A1 (en) * | 2014-10-21 | 2016-04-21 | Escapemusic Limited | System and method for facilitating cross-application functionality among artist specific client applications |
US10275767B2 (en) | 2014-10-21 | 2019-04-30 | Mastercard International Incorporated | Method and system for generating cryptograms for validation in a webservice environment |
RU2584506C1 (en) * | 2014-10-22 | 2016-05-20 | Закрытое акционерное общество "Лаборатория Касперского" | System and method of protecting operations with electronic money |
US9591482B1 (en) | 2014-10-31 | 2017-03-07 | Sprint Communications Company L.P. | Method for authenticating driver for registration of in-vehicle telematics unit |
WO2016118216A2 (en) | 2014-11-06 | 2016-07-28 | Intertrust Technologies Corporation | Secure application distribution systems and methods |
GB2532039B (en) | 2014-11-06 | 2016-09-21 | Ibm | Secure database backup and recovery |
SG11201703723WA (en) * | 2014-11-07 | 2017-06-29 | Tendyron Corp | Data interaction method and system |
US9792595B2 (en) * | 2014-11-10 | 2017-10-17 | Hui Lin | Secure data transfer from a vending device to portable data storage devices |
US9569776B2 (en) | 2014-11-12 | 2017-02-14 | BenedorTSE LLC | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
US10614457B2 (en) | 2014-11-12 | 2020-04-07 | BenedorTSE LLC | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
US9558492B2 (en) | 2014-11-12 | 2017-01-31 | Benedoretse Llc | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
US9558493B2 (en) | 2014-11-12 | 2017-01-31 | BenedorTSE LLC | Secure authorizations using independent communications and different one-time-use encryption keys for each party to a transaction |
US10431214B2 (en) | 2014-11-26 | 2019-10-01 | Voicebox Technologies Corporation | System and method of determining a domain and/or an action related to a natural language input |
US10614799B2 (en) | 2014-11-26 | 2020-04-07 | Voicebox Technologies Corporation | System and method of providing intent predictions for an utterance prior to a system detection of an end of the utterance |
US10348596B1 (en) * | 2014-12-03 | 2019-07-09 | Amazon Technologies, Inc. | Data integrity monitoring for a usage analysis system |
JP2016110346A (en) * | 2014-12-04 | 2016-06-20 | キヤノン株式会社 | License management system, client device, and license management method |
US20160164884A1 (en) * | 2014-12-05 | 2016-06-09 | Skuchain, Inc. | Cryptographic verification of provenance in a supply chain |
US10291589B1 (en) | 2014-12-12 | 2019-05-14 | Amazon Technologies, Inc. | Session-based access control determinations |
US9935769B1 (en) | 2014-12-12 | 2018-04-03 | Amazon Technologies, Inc. | Resource-based cipher suite selection |
US20160191531A1 (en) * | 2014-12-29 | 2016-06-30 | Check Point Software Technologies Ltd | Method for file scrubbing in a security gateway for threat prevention |
US11302426B1 (en) | 2015-01-02 | 2022-04-12 | Palantir Technologies Inc. | Unified data interface and system |
US9779232B1 (en) | 2015-01-14 | 2017-10-03 | Sprint Communications Company L.P. | Trusted code generation and verification to prevent fraud from maleficent external devices that capture data |
GB2534373A (en) * | 2015-01-20 | 2016-07-27 | Ibm | Distributed system with accelerator and catalog |
US10387834B2 (en) * | 2015-01-21 | 2019-08-20 | Palantir Technologies Inc. | Systems and methods for accessing and storing snapshots of a remote application in a document |
US9838868B1 (en) | 2015-01-26 | 2017-12-05 | Sprint Communications Company L.P. | Mated universal serial bus (USB) wireless dongles configured with destination addresses |
US20160217443A1 (en) * | 2015-01-28 | 2016-07-28 | Konica Minolta Laboratory U.S.A., Inc. | Digital rights management system providing trial use and facilitating purchase of managed documents |
EP3051469A1 (en) | 2015-01-28 | 2016-08-03 | Philip Morris Products S.A. | Method and apparatus for unit and container identification and tracking |
US10019696B2 (en) * | 2015-01-29 | 2018-07-10 | International Business Machines Corporation | Distributed digital rights-managed file transfer and access control |
USD763888S1 (en) | 2015-01-30 | 2016-08-16 | PayRange Inc. | Display screen or portion thereof with graphical user interface |
US20180018643A1 (en) * | 2015-01-30 | 2018-01-18 | Gina LeBlanc | System and method for assuring commercial regulatory compliance |
USD836118S1 (en) | 2015-01-30 | 2018-12-18 | Payrange, Inc. | Display screen or portion thereof with an animated graphical user interface |
USD763905S1 (en) | 2015-01-30 | 2016-08-16 | PayRange Inc. | Display screen or portion thereof with animated graphical user interface |
USD773508S1 (en) | 2015-01-30 | 2016-12-06 | PayRange Inc. | Display screen or portion thereof with a graphical user interface |
USD764532S1 (en) | 2015-01-30 | 2016-08-23 | PayRange Inc. | Display screen or portion thereof with animated graphical user interface |
USD862501S1 (en) | 2015-01-30 | 2019-10-08 | PayRange Inc. | Display screen or portion thereof with a graphical user interface |
ES2728680T3 (en) | 2015-01-31 | 2019-10-28 | Inexto Sa | Secure product identification and verification |
CN105844738B (en) * | 2015-02-02 | 2018-04-24 | 株式会社东海理化电机制作所 | Electronic key registration system |
US20150149362A1 (en) * | 2015-02-04 | 2015-05-28 | vitaTrackr, Inc. | Encryption and Distribution of Health-related Data |
WO2016130552A1 (en) * | 2015-02-10 | 2016-08-18 | Curtis James Robert | Media distribution system and method |
US9355285B1 (en) | 2015-02-12 | 2016-05-31 | Square, Inc. | Tone-based wake up circuit for card reader |
US20150161413A1 (en) * | 2015-02-16 | 2015-06-11 | vitaTrackr, Inc. | Encryption and distribution of health-related data |
US9436923B1 (en) | 2015-02-26 | 2016-09-06 | Skuchain, Inc. | Tracking unitization occurring in a supply chain |
US10042589B2 (en) | 2015-03-11 | 2018-08-07 | Secure Cloud Systems, Inc. | Encrypted data storage and retrieval system |
US9641338B2 (en) | 2015-03-12 | 2017-05-02 | Skuchain, Inc. | Method and apparatus for providing a universal deterministically reproducible cryptographic key-pair representation for all SKUs, shipping cartons, and items |
US10910089B2 (en) * | 2015-03-20 | 2021-02-02 | Universal Patient Key, Inc. | Methods and systems providing centralized encryption key management for sharing data across diverse entities |
LT3275153T (en) * | 2015-03-25 | 2021-05-25 | Alm. Dansk Vare- Og Industrilotteri | Verifiable transfer of data over a network |
US10509695B1 (en) * | 2015-03-30 | 2019-12-17 | ThetaRay Ltd. | System and method for anomaly detection in dynamically evolving data using low rank matrix decomposition |
US20160292445A1 (en) | 2015-03-31 | 2016-10-06 | Secude Ag | Context-based data classification |
US9531547B2 (en) * | 2015-04-06 | 2016-12-27 | Vmware, Inc. | Host-based digital signature verification for guest components |
US9473945B1 (en) | 2015-04-07 | 2016-10-18 | Sprint Communications Company L.P. | Infrastructure for secure short message transmission |
US9628488B1 (en) | 2015-04-08 | 2017-04-18 | Jpmorgan Chase Bank, N.A. | Method and system for sensitive data abstraction |
US9667790B1 (en) | 2015-04-08 | 2017-05-30 | Jpmorgan Chase Bank, N.A. | Method and system for conveying context data in a multi-channel and omni-channel environment |
WO2016172474A1 (en) | 2015-04-24 | 2016-10-27 | Encryptics, Llc | System and method for enhanced data protection |
US9649999B1 (en) | 2015-04-28 | 2017-05-16 | Sprint Communications Company L.P. | Vehicle remote operations control |
US20160321435A1 (en) * | 2015-05-01 | 2016-11-03 | Monegraph, Inc. | Managing digital content via block chain registers |
US10380702B2 (en) * | 2015-05-01 | 2019-08-13 | Monegraph, Inc. | Rights transfers using block chain transactions |
US9781105B2 (en) | 2015-05-04 | 2017-10-03 | Ping Identity Corporation | Fallback identity authentication techniques |
US9444892B1 (en) | 2015-05-05 | 2016-09-13 | Sprint Communications Company L.P. | Network event management support for vehicle wireless communication |
US10878411B2 (en) * | 2015-05-13 | 2020-12-29 | Sony Corporation | Method and apparatus for issued token management |
US20160335675A1 (en) * | 2015-05-15 | 2016-11-17 | T-Mobile, Usa, Inc. | Binding social account interactions to a master agnostic identity |
US11367072B2 (en) * | 2015-05-20 | 2022-06-21 | Ripple Luxembourg S.A. | Private networks and content requests in a resource transfer system |
US11392944B2 (en) * | 2015-05-20 | 2022-07-19 | Ripple Luxembourg S.A. | Transfer costs in a resource transfer system |
US10740732B2 (en) | 2015-05-20 | 2020-08-11 | Ripple Luxembourg S.A. | Resource transfer system |
US20160342984A1 (en) * | 2015-05-20 | 2016-11-24 | 402 Technologies S.A. | Loop transfer in a resource transfer system |
US11392955B2 (en) * | 2015-05-20 | 2022-07-19 | Ripple Luxembourg S.A. | Temporary consensus networks in a resource transfer system |
US11386415B2 (en) * | 2015-05-20 | 2022-07-12 | Ripple Luxembourg S.A. | Hold condition in a resource transfer system |
US11481771B2 (en) * | 2015-05-20 | 2022-10-25 | Ripple Luxembourg S.A. | One way functions in a resource transfer system |
US9843449B2 (en) * | 2015-06-09 | 2017-12-12 | Dresser, Inc. | Secure device communication |
US10628834B1 (en) | 2015-06-16 | 2020-04-21 | Palantir Technologies Inc. | Fraud lead detection system for efficiently processing database-stored data and automatically generating natural language explanatory information of system results for display in interactive user interfaces |
US20160379214A1 (en) * | 2015-06-25 | 2016-12-29 | International Business Machines Corporation | Privacy protection in ecommerce/logistics |
US10343063B2 (en) * | 2015-07-13 | 2019-07-09 | Deidre Maria Watson | System and method for playing a game |
WO2017011577A1 (en) | 2015-07-13 | 2017-01-19 | Intertrust Technologies Corporation | Systems and methods for protecting personal information |
US9928359B1 (en) | 2015-07-15 | 2018-03-27 | Security Together Corporation | System and methods for providing security to an endpoint device |
US10216924B1 (en) | 2015-07-15 | 2019-02-26 | Security Together Corporation | System and methods for providing security to an endpoint device and for combating electromagnetic pulse (EMP) attacks |
US10380335B1 (en) | 2015-07-15 | 2019-08-13 | Security Together Corporation | Systems and methods for providing security to a host endpoint device |
US11050782B2 (en) | 2015-07-15 | 2021-06-29 | Security Together Corporation | Systems and methods for providing security to an integrated circuit in an endpoint device using a dynamic security architecture environment (DSAE) |
US9418337B1 (en) | 2015-07-21 | 2016-08-16 | Palantir Technologies Inc. | Systems and models for data analytics |
US9392008B1 (en) | 2015-07-23 | 2016-07-12 | Palantir Technologies Inc. | Systems and methods for identifying information related to payment card breaches |
US20170024828A1 (en) * | 2015-07-23 | 2017-01-26 | Palantir Technologies Inc. | Systems and methods for identifying information related to payment card testing |
WO2017024080A1 (en) * | 2015-08-03 | 2017-02-09 | Citifyd, Inc. | Transaction payment processing system implementing a virtual exchange platform |
US20170039570A1 (en) * | 2015-08-04 | 2017-02-09 | Ca, Inc. | Determining transaction risk from similarity of parameters characterizing a user terminal which originated a transaction to a user terminal identified from the transaction |
US9604651B1 (en) | 2015-08-05 | 2017-03-28 | Sprint Communications Company L.P. | Vehicle telematics unit communication authorization and authentication and communication service provisioning |
US10402792B2 (en) * | 2015-08-13 | 2019-09-03 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
US20180205543A1 (en) | 2015-08-13 | 2018-07-19 | Inexto Sa | Enhanced obfuscation or randomization for secure product identification and verification |
US10572672B2 (en) | 2015-08-14 | 2020-02-25 | Hewlett Packard Enterprise Development Lp | Modification of data elements using a semantic relationship |
US20170046531A1 (en) * | 2015-08-14 | 2017-02-16 | Strong Bear Llc | Data encryption method and system for use with cloud storage |
US20170052676A1 (en) * | 2015-08-19 | 2017-02-23 | vAtomic Systems, LLC | Virtual object registry and tracking platform |
US11329980B2 (en) | 2015-08-21 | 2022-05-10 | Veridium Ip Limited | System and method for biometric protocol standards |
US11176096B2 (en) * | 2015-08-24 | 2021-11-16 | International Business Machines Corporation | File system for genomic data |
US10579889B2 (en) | 2015-08-25 | 2020-03-03 | Inexto Sa | Verification with error tolerance for secure product identifiers |
WO2017032860A1 (en) | 2015-08-25 | 2017-03-02 | Inexto Sa | Multiple authorization modules for secure production and verification |
EP3362980B1 (en) * | 2015-08-27 | 2022-06-08 | Citytaps SAS | Resource delivery |
US9485265B1 (en) | 2015-08-28 | 2016-11-01 | Palantir Technologies Inc. | Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces |
WO2017037544A2 (en) | 2015-09-05 | 2017-03-09 | Nudata Security Inc. | Systems and methods for matching and scoring sameness |
US11080675B1 (en) * | 2015-09-08 | 2021-08-03 | Square, Inc. | Point-of-sale system having a secure touch mode |
US9819679B1 (en) | 2015-09-14 | 2017-11-14 | Sprint Communications Company L.P. | Hardware assisted provenance proof of named data networking associated to device data, addresses, services, and servers |
US10504080B2 (en) * | 2015-09-14 | 2019-12-10 | OX Labs Inc. | Cryptographically managingtelecommunications settlement |
US11816672B1 (en) * | 2015-09-22 | 2023-11-14 | Wells Fargo Bank, N.A. | Flexible authentication |
US11301823B2 (en) * | 2015-10-02 | 2022-04-12 | Eoriginal, Inc. | System and method for electronic deposit and authentication of original electronic information objects |
EP3356929A4 (en) * | 2015-10-02 | 2019-02-27 | United States Postal Service | System and method for generating and implementing a household customer database |
US20170103380A1 (en) * | 2015-10-12 | 2017-04-13 | Wal-Mart Stores, Inc. | System, method, and non-transitory computer-readable storage media related to transactions using a mobile device |
US20170103396A1 (en) * | 2015-10-13 | 2017-04-13 | Mastercard International Incorporated | Adaptable messaging |
JP6561761B2 (en) * | 2015-10-21 | 2019-08-21 | コニカミノルタ株式会社 | Medical information management system and management server |
US10694352B2 (en) | 2015-10-28 | 2020-06-23 | Activision Publishing, Inc. | System and method of using physical objects to control software access |
US9449189B1 (en) | 2015-11-03 | 2016-09-20 | International Business Machines Corporation | Protection of state data in computer system code |
US20170134161A1 (en) * | 2015-11-06 | 2017-05-11 | Cable Television Laboratories, Inc | Blockchaining for media distribution |
US10282719B1 (en) | 2015-11-12 | 2019-05-07 | Sprint Communications Company L.P. | Secure and trusted device-based billing and charging process using privilege for network proxy authentication and audit |
US10372935B1 (en) | 2015-11-13 | 2019-08-06 | Google Llc | Selectively encrypting commit log entries |
US10535047B1 (en) * | 2015-11-19 | 2020-01-14 | Wells Fargo Bank N.A. | Systems and methods for financial operations performed at a contactless ATM |
US9817992B1 (en) | 2015-11-20 | 2017-11-14 | Sprint Communications Company Lp. | System and method for secure USIM wireless network access |
US20180253702A1 (en) * | 2015-11-24 | 2018-09-06 | Gartland & Mellina Group | Blockchain solutions for financial services and other transactions-based industries |
US10223429B2 (en) | 2015-12-01 | 2019-03-05 | Palantir Technologies Inc. | Entity data attribution using disparate data sets |
US20170169195A1 (en) * | 2015-12-15 | 2017-06-15 | Salesforce.Com, Inc. | Techniques for granular licensing |
EP3185194A1 (en) * | 2015-12-24 | 2017-06-28 | Gemalto Sa | Method and system for enhancing the security of a transaction |
US10187464B2 (en) | 2015-12-27 | 2019-01-22 | Dropbox, Inc. | Systems and methods of re-associating content items |
US9792020B1 (en) | 2015-12-30 | 2017-10-17 | Palantir Technologies Inc. | Systems for collecting, aggregating, and storing data, generating interactive user interfaces for analyzing data, and generating alerts based upon collected data |
EP3193299A1 (en) * | 2016-01-15 | 2017-07-19 | Accenture Global Services Limited | Device, method and system for autonomous selection of a commodity supplier through a blockchain distributed database |
US20170213210A1 (en) * | 2016-01-22 | 2017-07-27 | International Business Machines Corporation | Asset transfers using a multi-tenant transaction database |
KR101905771B1 (en) * | 2016-01-29 | 2018-10-11 | 주식회사 엔오디비즈웨어 | Self defense security server with behavior and environment analysis and operating method thereof |
GB2604540B (en) * | 2016-02-03 | 2023-01-11 | Luther Systems | System and method for secure management of digital contracts |
US20170228511A1 (en) | 2016-02-05 | 2017-08-10 | Novum Patent Holdco, LLC | Medical Registration System |
EP3208968A1 (en) * | 2016-02-22 | 2017-08-23 | HOB GmbH & Co. KG | Computer implemented method for generating a random seed with high entropy |
WO2017152037A1 (en) * | 2016-03-04 | 2017-09-08 | 1Usf, Inc. | Systems and methods for media codecs and containers |
US20170286933A1 (en) * | 2016-04-01 | 2017-10-05 | Joseph Medeiros, III | Content protection |
EP3236383A1 (en) * | 2016-04-20 | 2017-10-25 | Gemalto Sa | Method for managing a real-time clock in a portable tamper-resistant device |
US10460367B2 (en) | 2016-04-29 | 2019-10-29 | Bank Of America Corporation | System for user authentication based on linking a randomly generated number to the user and a physical item |
US10046228B2 (en) * | 2016-05-02 | 2018-08-14 | Bao Tran | Smart device |
US20170329942A1 (en) * | 2016-05-12 | 2017-11-16 | Markany Inc. | Method and apparatus of drm systems for protecting enterprise confidentiality |
US20170331896A1 (en) * | 2016-05-13 | 2017-11-16 | De La Rue International Limited | Methods and systems for processing assets |
CN106020357A (en) * | 2016-05-23 | 2016-10-12 | 京东方科技集团股份有限公司 | Intelligent wearing device, and operation method and apparatus of intelligent wearing device |
EP3255597A1 (en) * | 2016-06-12 | 2017-12-13 | Apple Inc. | Managing secure transactions between electronic devices and service providers |
EP3472791A1 (en) * | 2016-06-15 | 2019-04-24 | Mastercard International Incorporated | Systems and methods for budget, financial account alerts management, remedial action controls and fraud monitoring |
US10268635B2 (en) | 2016-06-17 | 2019-04-23 | Bank Of America Corporation | System for data rotation through tokenization |
CN111899026A (en) * | 2016-06-20 | 2020-11-06 | 创新先进技术有限公司 | Payment method and device |
US20170372306A1 (en) * | 2016-06-27 | 2017-12-28 | Samsung Electronics Co., Ltd. | Payment by mobile device secured by f-puf |
US10169106B2 (en) | 2016-06-30 | 2019-01-01 | International Business Machines Corporation | Method for managing control-loss processing during critical processing sections while maintaining transaction scope integrity |
US10366378B1 (en) | 2016-06-30 | 2019-07-30 | Square, Inc. | Processing transactions in offline mode |
WO2018006072A1 (en) | 2016-06-30 | 2018-01-04 | Clause, Inc. | Systems and method for forming, storing, managing,and executing contracts |
CN116471105A (en) | 2016-07-11 | 2023-07-21 | 维萨国际服务协会 | Encryption key exchange procedure using access means |
US20190173884A1 (en) * | 2016-07-29 | 2019-06-06 | nChain Holdings Limited | Blockchain-implemented method and system |
WO2018023106A1 (en) | 2016-07-29 | 2018-02-01 | Erik SWART | System and method of disambiguating natural language processing requests |
US10637853B2 (en) | 2016-08-05 | 2020-04-28 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
US10769635B2 (en) | 2016-08-05 | 2020-09-08 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
WO2018046103A1 (en) * | 2016-09-10 | 2018-03-15 | Swiss Reinsurance Company Ltd. | Secure key management and peer-to-peer transmission system with a controlled, double-tier cryptographic key structure and corresponding method thereof |
US11151566B2 (en) | 2016-09-19 | 2021-10-19 | Early Warning Services, Llc | Authentication and fraud prevention in provisioning a mobile wallet |
US10748130B2 (en) * | 2016-09-30 | 2020-08-18 | Square, Inc. | Sensor-enabled activation of payment instruments |
US10553238B2 (en) | 2016-11-18 | 2020-02-04 | Microroyalties, LLC | Crowdsourced noise monitoring systems and methods |
US9842338B1 (en) | 2016-11-21 | 2017-12-12 | Palantir Technologies Inc. | System to identify vulnerable card readers |
US10841337B2 (en) | 2016-11-28 | 2020-11-17 | Secureworks Corp. | Computer implemented system and method, and computer program product for reversibly remediating a security risk |
US11250425B1 (en) | 2016-11-30 | 2022-02-15 | Palantir Technologies Inc. | Generating a statistic using electronic transaction data |
US11526881B1 (en) | 2016-12-12 | 2022-12-13 | Dosh Holdings, Inc. | System for generating and tracking offers chain of titles |
US11488190B1 (en) | 2016-12-12 | 2022-11-01 | Dosh, Llc | System for sharing and transferring currency |
US11538052B1 (en) | 2016-12-12 | 2022-12-27 | Dosh Holdings, Inc. | System for generating and tracking offers chain of titles |
US20190287146A1 (en) * | 2016-12-14 | 2019-09-19 | Amdocs Development Limited | System, method, and computer program for implementing a license ledger in a network function virtualization (nfv) based communication network |
US9886525B1 (en) | 2016-12-16 | 2018-02-06 | Palantir Technologies Inc. | Data item aggregate probability analysis system |
RU178282U1 (en) * | 2016-12-19 | 2018-03-28 | федеральное государственное казенное военное образовательное учреждение высшего образования "Краснодарское высшее военное училище имени генерала армии С.М. Штеменко" Министерства обороны Российской Федерации | Device for monitoring the state of security of military-grade automated control systems |
US10728262B1 (en) | 2016-12-21 | 2020-07-28 | Palantir Technologies Inc. | Context-aware network-based malicious activity warning systems |
US20180173891A1 (en) * | 2016-12-21 | 2018-06-21 | AppBugs, INC. | Provision of risk information associated with compromised accounts |
US10484753B2 (en) | 2016-12-23 | 2019-11-19 | DISH Tchnologies L.L.C. | Securely paired delivery of activation codes from smart card to remote client set-top box |
US10484752B2 (en) * | 2016-12-23 | 2019-11-19 | DISH Technologies L.L.C. | Securely paired delivery of activation codes from smart card to host set-top box |
US10721262B2 (en) | 2016-12-28 | 2020-07-21 | Palantir Technologies Inc. | Resource-centric network cyber attack warning system |
US10922279B1 (en) | 2016-12-30 | 2021-02-16 | Groupon, Inc. | Server for ingesting and updating renderable data objects from a flat file server |
US20220222662A1 (en) * | 2016-12-30 | 2022-07-14 | Wells Fargo Bank, N.A. | Dynamic payment gateway |
US20180191685A1 (en) * | 2016-12-31 | 2018-07-05 | The Western Union Company | Recurring transfer notifications and secure transfers |
CN108287759B (en) | 2017-01-10 | 2021-07-09 | 阿里巴巴集团控股有限公司 | Scheduling method, device and system in data processing process |
US20180211316A1 (en) * | 2017-01-20 | 2018-07-26 | Jiko Group, Inc. | Systems and methods for private node-level data computing and reconciliation |
US11321681B2 (en) | 2017-02-06 | 2022-05-03 | Northern Trust Corporation | Systems and methods for issuing and tracking digital tokens within distributed network nodes |
US11341488B2 (en) * | 2017-02-06 | 2022-05-24 | Northern Trust Corporation | Systems and methods for issuing and tracking digital tokens within distributed network nodes |
WO2018149504A1 (en) | 2017-02-17 | 2018-08-23 | Nokia Technologies Oy | Changing smart contracts recorded in block chains |
US11138574B2 (en) * | 2017-02-17 | 2021-10-05 | Tiffany Walling-McGarity | Systems and methods for protecting digital media |
US10498795B2 (en) | 2017-02-17 | 2019-12-03 | Divx, Llc | Systems and methods for adaptive switching between multiple content delivery networks during adaptive bitrate streaming |
US10192233B2 (en) | 2017-02-22 | 2019-01-29 | Arch Holdings, Lp | System and method for media trade-in |
US11210670B2 (en) * | 2017-02-28 | 2021-12-28 | Early Warning Services, Llc | Authentication and security for mobile-device transactions |
US10382492B2 (en) | 2017-03-02 | 2019-08-13 | Draios Inc. | Automated service-oriented performance management |
CA3058156A1 (en) * | 2017-03-30 | 2018-10-04 | Blonder Tongue Laboratories, Inc. | Enterprise content gateway |
US11538031B2 (en) * | 2017-03-31 | 2022-12-27 | Vijay Madisetti | Method and system for identity and access management for blockchain interoperability |
KR101919590B1 (en) * | 2017-05-10 | 2019-02-08 | 주식회사 코인플러그 | METHOD FOR PAYING COST OF IoT DEVICE BASED ON BLOCKCHAIN AND MERKLE TREE STRUCTURE RELATED THERETO, AND SERVER, SERVICE PROVIDING TERMINAL, AND DIGITAL WALLET USING THE SAME |
US20180336539A1 (en) * | 2017-05-22 | 2018-11-22 | Entit Software Llc | Processing event data provided by components of payment networks to determine issues |
US10430767B2 (en) | 2017-05-24 | 2019-10-01 | Arch Holdings, Lp | Media life cycle management system |
KR20200027475A (en) | 2017-05-24 | 2020-03-12 | 모듈레이트, 인크 | System and method for speech-to-speech conversion |
US10805082B2 (en) * | 2017-06-30 | 2020-10-13 | Futurewei Technologies, Inc. | ID-based data plane security for identity-oriented networks |
US10499249B1 (en) | 2017-07-11 | 2019-12-03 | Sprint Communications Company L.P. | Data link layer trust signaling in communication network |
US11216762B1 (en) | 2017-07-13 | 2022-01-04 | Palantir Technologies Inc. | Automated risk visualization using customer-centric data analysis |
CN109284622B (en) * | 2017-07-20 | 2022-05-17 | 腾讯科技(深圳)有限公司 | Contact information processing method and device and storage medium |
US20190026803A1 (en) * | 2017-07-20 | 2019-01-24 | Sony Interactive Entertainment LLC | Digital code server |
US11270295B2 (en) * | 2017-08-01 | 2022-03-08 | Digital Asset (Switzerland) GmbH | Method and apparatus for automated committed settlement of digital assets |
WO2019043550A1 (en) * | 2017-08-28 | 2019-03-07 | Fireid Inc | System and method of performing a financial transaction |
US20190087834A1 (en) | 2017-09-15 | 2019-03-21 | Pearson Education, Inc. | Digital credential analysis in a digital credential platform |
US10460130B1 (en) * | 2017-09-18 | 2019-10-29 | Amazon Technologies, Inc. | Mechanism to protect a distributed replicated state machine |
KR102495672B1 (en) * | 2017-09-20 | 2023-02-03 | 삼성전자주식회사 | Electronic device for supporting backup and reinstallation of mobile card |
US11004548B1 (en) | 2017-09-20 | 2021-05-11 | Datavant, Inc. | System for providing de-identified mortality indicators in healthcare data |
US20190095593A1 (en) * | 2017-09-25 | 2019-03-28 | Hewlett Packard Enterprise Development Lp | License information based on baseboard management controller |
US11521166B2 (en) * | 2017-09-25 | 2022-12-06 | Cable Television Laboratories, Inc. | Systems and methods for secure fulfillment tracking using a shared registry |
US11148059B2 (en) * | 2017-09-28 | 2021-10-19 | Ags Llc | Methods for generating and validating gaming machine subscription keys and securing subscription parameter data and jurisdiction files |
US10749674B2 (en) | 2017-09-29 | 2020-08-18 | Micro Focus Llc | Format preserving encryption utilizing a key version |
US11539686B2 (en) * | 2017-10-12 | 2022-12-27 | Mx Technologies, Inc. | Data aggregation management based on credentials |
US11568505B2 (en) | 2017-10-18 | 2023-01-31 | Docusign, Inc. | System and method for a computing environment for verifiable execution of data-driven contracts |
US11699201B2 (en) | 2017-11-01 | 2023-07-11 | Docusign, Inc. | System and method for blockchain-based network transitioned by a legal contract |
US10735470B2 (en) | 2017-11-06 | 2020-08-04 | Secureworks Corp. | Systems and methods for sharing, distributing, or accessing security data and/or security applications, models, or analytics |
US11855987B1 (en) * | 2017-11-09 | 2023-12-26 | Amazon Technologies, Inc. | Utilizing distributed ledger for cloud service access control |
US10594713B2 (en) | 2017-11-10 | 2020-03-17 | Secureworks Corp. | Systems and methods for secure propagation of statistical models within threat intelligence communities |
CN109788009B (en) * | 2017-11-13 | 2021-11-26 | 青岛海尔智能技术研发有限公司 | Interaction method for Internet of things equipment and Internet of things equipment |
US11868995B2 (en) * | 2017-11-27 | 2024-01-09 | Nok Nok Labs, Inc. | Extending a secure key storage for transaction confirmation and cryptocurrency |
US11416616B2 (en) | 2017-11-30 | 2022-08-16 | Forcepoint Llc | Secure boot chain for live boot systems |
US11836717B2 (en) | 2017-12-04 | 2023-12-05 | Vijay Madisetti | System and method for processing payments in fiat currency using blockchain and tethered tokens |
US10410021B1 (en) | 2017-12-08 | 2019-09-10 | Square, Inc. | Transaction object reader with digital signal input/output and internal audio-based communication |
US11087301B1 (en) | 2017-12-19 | 2021-08-10 | Square, Inc. | Tamper resistant device |
US11394741B1 (en) * | 2017-12-27 | 2022-07-19 | NortonLifeLock Inc. | Systems and methods for hindering malicious computing actions |
CN108364223B (en) * | 2017-12-29 | 2021-01-26 | 创新先进技术有限公司 | Data auditing method and device |
US11288740B2 (en) | 2017-12-29 | 2022-03-29 | Intel Corporation | Securing distributed electronic wallet shares |
US11386420B2 (en) | 2017-12-29 | 2022-07-12 | Intel Corporation | Contextual authentication of an electronic wallet |
US20190034917A1 (en) * | 2017-12-29 | 2019-01-31 | Intel Corporation | Tracking an Electronic Wallet Using Radio Frequency Identification (RFID) |
US11831409B2 (en) | 2018-01-12 | 2023-11-28 | Nok Nok Labs, Inc. | System and method for binding verifiable claims |
US11537748B2 (en) | 2018-01-26 | 2022-12-27 | Datavant, Inc. | Self-contained system for de-identifying unstructured data in healthcare records |
US10853457B2 (en) * | 2018-02-06 | 2020-12-01 | Didi Research America, Llc | System and method for program security protection |
US20190251532A1 (en) * | 2018-02-14 | 2019-08-15 | Red Hat Israel, Ltd. | Systems and methods for providing distributed licensing and subscription management |
US11368457B2 (en) * | 2018-02-20 | 2022-06-21 | Visa International Service Association | Dynamic learning system for intelligent authentication |
US11329963B2 (en) | 2018-02-22 | 2022-05-10 | Eclypses, Inc. | System and method for securely transferring data |
US11012722B2 (en) | 2018-02-22 | 2021-05-18 | Secure Cloud Systems, Inc. | System and method for securely transferring data |
US10817829B2 (en) * | 2018-02-23 | 2020-10-27 | Bank Of America Corporation | Blockchain-based supply chain smart recall |
EP3543853A1 (en) * | 2018-03-20 | 2019-09-25 | Siemens Healthcare GmbH | Providing microservice information |
US11295402B2 (en) | 2018-03-28 | 2022-04-05 | Bank Of America Corporation | Blockchain-based property repair |
US11475422B2 (en) * | 2018-03-28 | 2022-10-18 | Bank Of America Corporation | Blockchain-based property management |
US11397935B2 (en) * | 2018-04-02 | 2022-07-26 | Hover Developer Services, Inc. | System and method for wireless transactions |
US10877654B1 (en) | 2018-04-03 | 2020-12-29 | Palantir Technologies Inc. | Graphical user interfaces for optimizations |
US11042668B1 (en) | 2018-04-12 | 2021-06-22 | Datavant, Inc. | System for preparing data for expert certification and monitoring data over time to ensure compliance with certified boundary conditions |
US11120144B1 (en) * | 2018-04-12 | 2021-09-14 | Datavant, Inc. | Methods and systems providing central management of distributed de-identification and tokenization software for sharing data |
US11080423B1 (en) | 2018-04-13 | 2021-08-03 | Datavant, Inc. | System for simulating a de-identified healthcare data set and creating simulated personal data while retaining profile of authentic data |
EP3786927B1 (en) * | 2018-04-26 | 2023-06-14 | Nippon Telegraph And Telephone Corporation | System, apparatus, method and program for secure aggregate median computation |
USD904450S1 (en) | 2018-04-27 | 2020-12-08 | Square, Inc. | Portion of a display screen with graphical user interface for option selection |
CN108830099A (en) * | 2018-05-04 | 2018-11-16 | 平安科技(深圳)有限公司 | Call verification method, device, computer equipment and the storage medium of api interface |
US10754946B1 (en) | 2018-05-08 | 2020-08-25 | Palantir Technologies Inc. | Systems and methods for implementing a machine learning approach to modeling entity behavior |
CN108632045A (en) * | 2018-05-10 | 2018-10-09 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, device, processing equipment and system |
US11520913B2 (en) | 2018-05-11 | 2022-12-06 | International Business Machines Corporation | Secure execution support for A.I. systems (and other heterogeneous systems) |
CA3100738A1 (en) * | 2018-05-18 | 2019-11-21 | Element Ai Inc. | Computer resource allocation and scheduling system |
US11775479B2 (en) | 2018-05-24 | 2023-10-03 | Luther Systems Us Incorporated | System and method for efficient and secure private similarity detection for large private document repositories |
US11003718B2 (en) | 2018-06-12 | 2021-05-11 | Secureworks Corp. | Systems and methods for enabling a global aggregated search, while allowing configurable client anonymity |
US10785238B2 (en) | 2018-06-12 | 2020-09-22 | Secureworks Corp. | Systems and methods for threat discovery across distinct organizations |
US11119630B1 (en) | 2018-06-19 | 2021-09-14 | Palantir Technologies Inc. | Artificial intelligence assisted evaluations and user interface for same |
US11093599B2 (en) * | 2018-06-28 | 2021-08-17 | International Business Machines Corporation | Tamper mitigation scheme for locally powered smart devices |
USD905059S1 (en) | 2018-07-25 | 2020-12-15 | Square, Inc. | Card reader device |
JP7136619B2 (en) * | 2018-07-26 | 2022-09-13 | 東芝テック株式会社 | Image processing device, image processing system, and application startup control method |
US11276059B2 (en) * | 2018-07-31 | 2022-03-15 | Molten Inc. | System and method for autonomous sustenance of digital assets |
US10721069B2 (en) | 2018-08-18 | 2020-07-21 | Eygs Llp | Methods and systems for enhancing privacy and efficiency on distributed ledger-based networks |
US11789933B2 (en) | 2018-09-06 | 2023-10-17 | Docusign, Inc. | System and method for a hybrid contract execution environment |
US11966917B2 (en) * | 2018-09-12 | 2024-04-23 | Bitclave Pte. Ltd. | Systems and methods for providing personal rewards in a trustless ecosystem |
US11704635B2 (en) * | 2018-09-25 | 2023-07-18 | T-Mobile Usa, Inc. | Virtual currency for managing advertising and content delivery |
US11514437B1 (en) | 2018-09-27 | 2022-11-29 | Block, Inc. | Encapsulation of payment accounts with tokenization |
US11636468B1 (en) * | 2018-09-27 | 2023-04-25 | Block, Inc. | Encapsulation of payment accounts with nested tokens |
US11210654B2 (en) | 2018-10-23 | 2021-12-28 | Capital One Services, Llc | Systems and methods for multicomputer data transferring to activate contactless communication |
US10588175B1 (en) | 2018-10-24 | 2020-03-10 | Capital One Services, Llc | Network of trust with blockchain |
US11494757B2 (en) | 2018-10-24 | 2022-11-08 | Capital One Services, Llc | Remote commands using network of trust |
US11842331B2 (en) * | 2018-10-24 | 2023-12-12 | Capital One Services, Llc | Network of trust for bill splitting |
WO2020091763A1 (en) * | 2018-10-31 | 2020-05-07 | Hewlett-Packard Development Company, L.P. | Group printing |
US10636030B1 (en) * | 2018-11-06 | 2020-04-28 | Capital One Services, Llc | System and method for creating a secure mesh network utilizing the blockchain |
US10579994B1 (en) | 2018-11-06 | 2020-03-03 | Capital One Services, Llc | Method for routing to mesh network content utilizing blockchain technology |
US11741196B2 (en) | 2018-11-15 | 2023-08-29 | The Research Foundation For The State University Of New York | Detecting and preventing exploits of software vulnerability using instruction tags |
US11164206B2 (en) * | 2018-11-16 | 2021-11-02 | Comenity Llc | Automatically aggregating, evaluating, and providing a contextually relevant offer |
US11860822B2 (en) | 2018-11-19 | 2024-01-02 | Luther Systems Us Incorporated | Immutable ledger with efficient and secure data destruction, system and method |
US11315108B2 (en) | 2018-11-30 | 2022-04-26 | Block, Inc. | Profile generation and association with multiple transaction cards contemporaneously |
US10748135B2 (en) | 2018-11-30 | 2020-08-18 | Square, Inc. | Offline onboarding of trackable transaction instrument with associated profile |
US11050571B2 (en) | 2019-02-14 | 2021-06-29 | Carrott Richard F | Systems for producing and maintaining verified electronic signatures |
US10915417B1 (en) * | 2019-03-19 | 2021-02-09 | Amazon Technologies, Inc. | Audit correctness of asynchronous batch transformation systems |
CN112348514A (en) | 2019-03-19 | 2021-02-09 | 创新先进技术有限公司 | Block chain-based data checking system, method, computing device and storage medium |
WO2020191462A1 (en) * | 2019-03-27 | 2020-10-01 | Xard Group Pty Ltd | Disabling payment scheme on a digital transaction processing unit (dtpu) |
US11792024B2 (en) | 2019-03-29 | 2023-10-17 | Nok Nok Labs, Inc. | System and method for efficient challenge-response authentication |
US11316691B2 (en) | 2019-04-15 | 2022-04-26 | Eygs Llp | Methods and systems for enhancing network privacy of multiple party documents on distributed ledger-based networks |
US11748757B1 (en) | 2019-04-19 | 2023-09-05 | Mastercard International Incorporated | Network security systems and methods for detecting fraud |
US11949677B2 (en) * | 2019-04-23 | 2024-04-02 | Microsoft Technology Licensing, Llc | Resource access based on audio signal |
US20220164262A1 (en) * | 2019-04-24 | 2022-05-26 | Hewlett-Packard Development Company, L.P. | Critical data storage |
US11880882B2 (en) * | 2019-04-25 | 2024-01-23 | Intellectual Frontiers Llc | Computer-controlled marketplace network for digital transactions |
US11206138B2 (en) | 2019-05-02 | 2021-12-21 | Ernst & Young U.S. Llp | Biosignature-based tokenization of assets in a blockchain |
US11310268B2 (en) | 2019-05-06 | 2022-04-19 | Secureworks Corp. | Systems and methods using computer vision and machine learning for detection of malicious actions |
US11418524B2 (en) | 2019-05-07 | 2022-08-16 | SecureworksCorp. | Systems and methods of hierarchical behavior activity modeling and detection for systems-level security |
US11336750B1 (en) * | 2019-06-10 | 2022-05-17 | EMC IP Holding Company LLC | Remote procedure calls that offload search pattern matching from clients to servers |
US11089029B2 (en) | 2019-07-24 | 2021-08-10 | Palantir Technologies Inc. | Enforcing granular access control policy |
US10609041B1 (en) * | 2019-07-24 | 2020-03-31 | Palantir Technologies Inc. | Enforcing granular access control policy |
US11314935B2 (en) | 2019-07-25 | 2022-04-26 | Docusign, Inc. | System and method for electronic document interaction with external resources |
US11049115B2 (en) | 2019-07-31 | 2021-06-29 | Advanced New Technologies Co., Ltd. | Blockchain-based bill write-off method, apparatus, electronic device, and storage medium |
US10963854B2 (en) | 2019-07-31 | 2021-03-30 | Advanced New Technologies Co., Ltd. | Blockchain-based electronic bill reimbursement method, apparatus, and electronic device |
US10956903B2 (en) | 2019-07-31 | 2021-03-23 | Advanced New Technologies Co., Ltd. | Obtaining a blockchain-based, real-name, electronic bill |
US10846765B2 (en) | 2019-07-31 | 2020-11-24 | Advanced New Technologies Co., Ltd. | Blockchain-based e-bill number application method, apparatus, and electronic device |
US10789628B2 (en) | 2019-07-31 | 2020-09-29 | Alibaba Group Holding Limited | Blockchain-based bill number allocation method, apparatus and electronic device |
US11887102B1 (en) | 2019-07-31 | 2024-01-30 | Block, Inc. | Temporary virtual payment card |
US11232439B2 (en) | 2019-08-09 | 2022-01-25 | Eygs Llp | Methods and systems for preventing transaction tracing on distributed ledger-based networks |
US11538485B2 (en) * | 2019-08-14 | 2022-12-27 | Modulate, Inc. | Generation and detection of watermark for real-time voice conversion |
EP3877884A1 (en) * | 2019-08-29 | 2021-09-15 | Google LLC | Securing external data storage for a secure element integrated on a system-on-chip |
GB2586785A (en) * | 2019-08-30 | 2021-03-10 | Mobilise Consulting Ltd | Authentication |
US11694148B2 (en) | 2019-09-03 | 2023-07-04 | United States Postal Service | Systems and methods for delivering items having encoded delivery points |
JP7234870B2 (en) * | 2019-09-12 | 2023-03-08 | 富士フイルムビジネスイノベーション株式会社 | Information processing device and information processing program |
US11736466B2 (en) * | 2019-09-18 | 2023-08-22 | Bioconnect Inc. | Access control system |
US11381589B2 (en) | 2019-10-11 | 2022-07-05 | Secureworks Corp. | Systems and methods for distributed extended common vulnerabilities and exposures data management |
US11681965B2 (en) * | 2019-10-25 | 2023-06-20 | Georgetown University | Specialized computing environment for co-analysis of proprietary data |
US11232441B2 (en) * | 2019-10-30 | 2022-01-25 | Accenture Global Solutions Limited | Cryptologic coordinated symmetric conditional key release |
SG10201910109RA (en) * | 2019-10-30 | 2020-07-29 | Accenture Global Solutions Ltd | Leading-party-initiated cryptologic coordinated symmetric conditional key release |
US11704636B2 (en) * | 2019-10-31 | 2023-07-18 | Adi Association | Proxied cross-ledger authentication |
WO2021102116A1 (en) * | 2019-11-20 | 2021-05-27 | Eygs Llp | Systems, apparatus and methods for identifying and securely storing distinguishing characteristics in a distributed ledger within a distributed ledger-based network based on fungible and non-fungible tokens |
WO2020098815A2 (en) * | 2019-11-29 | 2020-05-22 | Alipay (Hangzhou) Information Technology Co., Ltd. | Methods and devices for cryptographic key management based on blockchain system |
US11232416B2 (en) * | 2019-12-01 | 2022-01-25 | Bank Of America Corporation | Local edge-node server |
US11522877B2 (en) | 2019-12-16 | 2022-12-06 | Secureworks Corp. | Systems and methods for identifying malicious actors or activities |
US10992738B1 (en) | 2019-12-31 | 2021-04-27 | Cardlytics, Inc. | Transmitting interactive content for rendering by an application |
US11405203B2 (en) | 2020-02-17 | 2022-08-02 | Eclypses, Inc. | System and method for securely transferring data using generated encryption keys |
WO2021183093A1 (en) * | 2020-03-09 | 2021-09-16 | Hewlett-Packard Development Company, L.P. | Power controls of computing devices |
TWI743715B (en) * | 2020-03-24 | 2021-10-21 | 瑞昱半導體股份有限公司 | Method and apparatus for performing data protection regarding non-volatile memory |
US11574308B2 (en) | 2020-04-15 | 2023-02-07 | Eygs Llp | Intelligent assertion tokens for authenticating and controlling network communications using a distributed ledger |
US11442772B2 (en) * | 2020-05-22 | 2022-09-13 | Francis Lee | Collaborative and dynamic mobile workflow execution platform |
US11481207B2 (en) * | 2020-05-29 | 2022-10-25 | Santa Clara University | Blockchain based secure software updates for IoT devices |
EP3923167A1 (en) * | 2020-06-10 | 2021-12-15 | Siemens Aktiengesellschaft | Method for creating an automated security analysis of an installation, device and computer program product |
US11676140B2 (en) * | 2020-06-17 | 2023-06-13 | Capital One Services, Llc | System and method for facilitating transfer of electronic payment information |
KR20210156985A (en) | 2020-06-19 | 2021-12-28 | 삼성전자주식회사 | Semiconductor devices including work function layers |
KR20210158615A (en) | 2020-06-24 | 2021-12-31 | 삼성전자주식회사 | Integrate circuit device including gate line |
KR20210158607A (en) | 2020-06-24 | 2021-12-31 | 삼성전자주식회사 | Semiconductor device including capping layer |
US20220036328A1 (en) * | 2020-07-29 | 2022-02-03 | Joshua Garth Kaye | Activating Monetization for Uncompensated Online Content Creators |
US11675524B2 (en) | 2020-08-17 | 2023-06-13 | Crystal Group, Inc. | Isolated hardware data sanitize system and method |
DE102020122894A1 (en) * | 2020-09-02 | 2022-03-03 | Audi Aktiengesellschaft | Provision of motor vehicle data |
US11588834B2 (en) | 2020-09-03 | 2023-02-21 | Secureworks Corp. | Systems and methods for identifying attack patterns or suspicious activity in client networks |
US11755779B1 (en) | 2020-09-30 | 2023-09-12 | Datavant, Inc. | Linking of tokenized trial data to other tokenized data |
US20220150241A1 (en) * | 2020-11-11 | 2022-05-12 | Hewlett Packard Enterprise Development Lp | Permissions for backup-related operations |
CN112286643B (en) * | 2020-12-24 | 2021-04-20 | 北京百度网讯科技有限公司 | Transaction processing method, device, equipment and medium for Ether house virtual machine |
US11874827B2 (en) | 2020-12-30 | 2024-01-16 | Luther Systems Us Incorporated | System and method for automatic, rapid, and auditable updates of digital contracts |
CN114756827A (en) * | 2021-01-08 | 2022-07-15 | 华为技术有限公司 | License file management method, device and equipment |
US20220229650A1 (en) * | 2021-01-21 | 2022-07-21 | Nvidia Corporation | Semiconductor component update device |
US11528294B2 (en) | 2021-02-18 | 2022-12-13 | SecureworksCorp. | Systems and methods for automated threat detection |
US11522707B2 (en) | 2021-03-05 | 2022-12-06 | Eclypses, Inc. | System and method for detecting compromised devices |
US11720693B2 (en) | 2021-03-05 | 2023-08-08 | Eclypses, Inc. | System and method for securely transferring data |
US20220383305A1 (en) * | 2021-05-28 | 2022-12-01 | Civic Technologies, Inc. | Methods and apparatus for validation of rules of a smart contract on a centralized or distributed digital ledger |
JP7126180B1 (en) * | 2021-06-17 | 2022-08-26 | 株式会社シグニティ | Information processing device and program |
US11411805B1 (en) | 2021-07-12 | 2022-08-09 | Bank Of America Corporation | System and method for detecting root cause of an exception error in a task flow in a distributed network |
US20230046788A1 (en) * | 2021-08-16 | 2023-02-16 | Capital One Services, Llc | Systems and methods for resetting an authentication counter |
US11809850B2 (en) * | 2021-08-25 | 2023-11-07 | Microsoft Technology Licensing, Llc | Generating and distributing customized embedded operating systems |
CN113449135B (en) | 2021-08-31 | 2021-11-19 | 阿里巴巴达摩院(杭州)科技有限公司 | Image generation system and method |
US11461774B1 (en) | 2021-09-03 | 2022-10-04 | Arif Khan | Creating and managing artificially intelligent entities represented by non-fungible tokens on a blockchain |
US11556403B1 (en) | 2021-10-19 | 2023-01-17 | Bank Of America Corporation | System and method for an application programming interface (API) service modification |
US11956363B2 (en) * | 2021-11-05 | 2024-04-09 | Nicholas M. VENEZIA | Systems and methods for hierarchical organization of data within a non-fungible tokens or chain-based decentralized systems |
US20230161795A1 (en) * | 2021-11-19 | 2023-05-25 | Intertrust Technologies Corporation | Time series data management systems and methods |
US11948144B2 (en) * | 2022-02-07 | 2024-04-02 | Capital One Services, Llc | Knowledge-based authentication for asset wallets |
US11799971B2 (en) | 2022-02-17 | 2023-10-24 | Bank Of America Corporation | Systems and methods for session migration between devices |
US11892937B2 (en) | 2022-02-28 | 2024-02-06 | Bank Of America Corporation | Developer test environment with containerization of tightly coupled systems |
US11438251B1 (en) | 2022-02-28 | 2022-09-06 | Bank Of America Corporation | System and method for automatic self-resolution of an exception error in a distributed network |
US20230325472A1 (en) * | 2022-03-24 | 2023-10-12 | Menni Menashe Zinger | identification of art /artifacts. |
EP4270218A1 (en) * | 2022-04-29 | 2023-11-01 | Utopia Music AG | Method, apparatus, and computer program product for providing protected media content |
Family Cites Families (577)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US3609697A (en) * | 1968-10-21 | 1971-09-28 | Ibm | Program security device |
US3573747A (en) * | 1969-02-24 | 1971-04-06 | Institutional Networks Corp | Instinet communication system for effectuating the sale or exchange of fungible properties between subscribers |
US3845391A (en) | 1969-07-08 | 1974-10-29 | Audicom Corp | Communication including submerged identification signal |
US3798605A (en) * | 1971-06-30 | 1974-03-19 | Ibm | Centralized verification system |
US3798359A (en) * | 1971-06-30 | 1974-03-19 | Ibm | Block cipher cryptographic system |
US3798360A (en) * | 1971-06-30 | 1974-03-19 | Ibm | Step code ciphering system |
US3796830A (en) * | 1971-11-02 | 1974-03-12 | Ibm | Recirculating block cipher cryptographic system |
GB1414126A (en) * | 1971-11-22 | 1975-11-19 | Key Tronic Ltd | Secutity for computer systems |
US3790700A (en) * | 1971-12-17 | 1974-02-05 | Hughes Aircraft Co | Catv program control system |
US3931504A (en) * | 1972-02-07 | 1976-01-06 | Basic Computing Arts, Inc. | Electronic data processing security system and method |
SE381940B (en) | 1972-04-11 | 1975-12-22 | Gretag Ag | DEVICE FOR INDIVIDUAL IDENTIFICATION OF A MAJORITY OF INDIVIDUALS |
US3829833A (en) * | 1972-10-24 | 1974-08-13 | Information Identification Co | Code element identification method and apparatus |
US3911397A (en) * | 1972-10-24 | 1975-10-07 | Information Identification Inc | Access control assembly |
GB1494736A (en) | 1974-01-21 | 1977-12-14 | Chubb Integrated Syst Ltd | Token-control |
US3944397A (en) * | 1974-03-07 | 1976-03-16 | E. I. Du Pont De Nemours And Company | Motor fuel composition containing mannich condensation products |
US3924065A (en) * | 1974-04-05 | 1975-12-02 | Information Identification Inc | Coherent, fixed BAUD rate FSK communication method and apparatus |
US3946220A (en) * | 1974-06-10 | 1976-03-23 | Transactron, Inc. | Point-of-sale system and apparatus |
US3956615A (en) * | 1974-06-25 | 1976-05-11 | Ibm Corporation | Transaction execution system with secure data storage and communications |
US3970992A (en) * | 1974-06-25 | 1976-07-20 | Ibm Corporation | Transaction terminal with unlimited range of functions |
US3906448A (en) * | 1974-08-01 | 1975-09-16 | Rca Corp | Fault detection facilitating means for card reader of identification card reading system |
US4270182A (en) * | 1974-12-30 | 1981-05-26 | Asija Satya P | Automated information input, storage, and retrieval system |
US3958081A (en) * | 1975-02-24 | 1976-05-18 | International Business Machines Corporation | Block cipher system for data security |
US3946200A (en) * | 1975-02-24 | 1976-03-23 | Gca Corporation | Proportional temperature controller |
US4217588A (en) * | 1975-04-16 | 1980-08-12 | Information Identification Company, Inc. | Object monitoring method and apparatus |
US4209787A (en) * | 1975-04-16 | 1980-06-24 | Gould Inc. | Method for monitoring the location of monitored objects |
US4112421A (en) * | 1975-04-16 | 1978-09-05 | Information Identification Company, Inc. | Method and apparatus for automatically monitoring objects |
US4071911A (en) * | 1975-04-22 | 1978-01-31 | Continental Can Co. Inc. | Machine control system with machine serializing and safety circuits |
US3996449A (en) | 1975-08-25 | 1976-12-07 | International Business Machines Corporation | Operating system authenticator |
US4196310A (en) * | 1976-04-09 | 1980-04-01 | Digital Data, Inc. | Secure SCA broadcasting system including subscriber actuated portable receiving terminals |
JPS533029A (en) * | 1976-06-30 | 1978-01-12 | Toshiba Corp | Electronic computer |
US4048619A (en) * | 1976-09-07 | 1977-09-13 | Digital Data Inc. | Secure two channel sca broadcasting system |
US4141005A (en) * | 1976-11-11 | 1979-02-20 | International Business Machines Corporation | Data format converting apparatus for use in a digital data processor |
GB1561482A (en) * | 1976-11-18 | 1980-02-20 | Ibm | Protection of data processing system against unauthorised programmes |
US4104721A (en) | 1976-12-30 | 1978-08-01 | International Business Machines Corporation | Hierarchical security mechanism for dynamically assigning security levels to object programs |
US4120030A (en) * | 1977-03-11 | 1978-10-10 | Kearney & Trecker Corporation | Computer software security system |
US4162483A (en) | 1977-04-01 | 1979-07-24 | Intech Laboratories, Inc. | Bilateral master station-plural satellite station signalling apparatus |
US4200913A (en) * | 1977-04-13 | 1980-04-29 | International Business Machines Corporation | Operator controlled programmable keyboard apparatus |
GB1553027A (en) * | 1977-05-12 | 1979-09-19 | Marconi Co Ltd | Message signal scrambling apparatus |
DE2840980C3 (en) * | 1977-10-08 | 1982-05-06 | Tokyo Electric Co., Ltd., Tokyo | Electronic cash register and electronic cash register system |
US4278837A (en) * | 1977-10-31 | 1981-07-14 | Best Robert M | Crypto microprocessor for executing enciphered programs |
US4168396A (en) * | 1977-10-31 | 1979-09-18 | Best Robert M | Microprocessor for executing enciphered programs |
US4405829A (en) | 1977-12-14 | 1983-09-20 | Massachusetts Institute Of Technology | Cryptographic communications system and method |
US4259720A (en) * | 1978-01-09 | 1981-03-31 | Interbank Card Association | Security system for electronic funds transfer system |
US4262329A (en) * | 1978-03-27 | 1981-04-14 | Computation Planning, Inc. | Security system for data processing |
US4246638A (en) * | 1978-09-14 | 1981-01-20 | Thomas William J | Method and apparatus for controlling usage of a programmable computing machine |
US4253157A (en) * | 1978-09-29 | 1981-02-24 | Alpex Computer Corp. | Data access system wherein subscriber terminals gain access to a data bank by telephone lines |
US4265371A (en) * | 1978-10-06 | 1981-05-05 | Trafalgar Industries Inc. | Foodstuff vending apparatus employing improved solid-state type control apparatus |
US4232317A (en) * | 1978-11-01 | 1980-11-04 | Freeny Jr Charles C | Quantized hyperbolic and inverse hyperbolic object location system |
US4305131A (en) * | 1979-02-05 | 1981-12-08 | Best Robert M | Dialog between TV movies and human viewers |
FR2448824A1 (en) * | 1979-02-06 | 1980-09-05 | Telediffusion Fse | VIDEOTEX SYSTEM PROVIDED WITH INFORMATION ACCESS CONTROL MEANS |
FR2448825A1 (en) * | 1979-02-06 | 1980-09-05 | Telediffusion Fse | SYSTEM FOR TRANSMITTING INFORMATION BETWEEN A TRANSMISSION CENTER AND RECEIVING STATIONS, WHICH IS PROVIDED WITH A MEANS OF CONTROLLING ACCESS TO THE INFORMATION TRANSMITTED |
US4598288A (en) | 1979-04-16 | 1986-07-01 | Codart, Inc. | Apparatus for controlling the reception of transmitted programs |
US4236217A (en) * | 1979-04-20 | 1980-11-25 | Kennedy Stanley P | Energy utilization or consumption recording arrangement |
US4465901A (en) * | 1979-06-04 | 1984-08-14 | Best Robert M | Crypto microprocessor that executes enciphered programs |
US4309569A (en) * | 1979-09-05 | 1982-01-05 | The Board Of Trustees Of The Leland Stanford Junior University | Method of providing digital signatures |
US4319079A (en) * | 1979-09-13 | 1982-03-09 | Best Robert M | Crypto microprocessor using block cipher |
DE2943436A1 (en) | 1979-10-26 | 1981-05-07 | Wolfram Dr.-Ing. 5100 Aachen Szepanski | Security coding system for documents - has cover coding printed on document and optically scanned for comparison with normal text |
FR2469760A1 (en) | 1979-11-09 | 1981-05-22 | Cii Honeywell Bull | METHOD AND SYSTEM FOR IDENTIFYING PEOPLE REQUESTING ACCESS TO CERTAIN MEDIA |
US4321672A (en) * | 1979-11-26 | 1982-03-23 | Braun Edward L | Financial data processing system |
US4328544A (en) * | 1980-01-04 | 1982-05-04 | International Business Machines Corporation | Electronic point-of-sale system using direct-access storage |
US4375579A (en) * | 1980-01-30 | 1983-03-01 | Wisconsin Alumni Research Foundation | Database encryption and decryption circuit and method using subkeys |
US4306289A (en) * | 1980-02-04 | 1981-12-15 | Western Electric Company, Inc. | Digital computer having code conversion apparatus for an encrypted program |
US4361877A (en) * | 1980-02-05 | 1982-11-30 | Sangamo Weston, Inc. | Billing recorder with non-volatile solid state memory |
US4529870A (en) | 1980-03-10 | 1985-07-16 | David Chaum | Cryptographic identification, financial transaction, and credential device |
JPS56140452A (en) * | 1980-04-01 | 1981-11-02 | Hitachi Ltd | Memory protection system |
US4392196A (en) | 1980-08-11 | 1983-07-05 | Harris Corporation | Multi-processor time alignment control system |
JPS57501899A (en) * | 1980-09-26 | 1982-10-21 | ||
US4442484A (en) | 1980-10-14 | 1984-04-10 | Intel Corporation | Microprocessor memory management and protection mechanism |
US5007083A (en) | 1981-03-17 | 1991-04-09 | Constant James N | Secure computer |
US4513174A (en) * | 1981-03-19 | 1985-04-23 | Standard Microsystems Corporation | Software security method using partial fabrication of proprietary control word decoders and microinstruction memories |
US4446519A (en) * | 1981-05-26 | 1984-05-01 | Corban International, Ltd. | Method and apparatus for providing security for computer software |
US4578530A (en) * | 1981-06-26 | 1986-03-25 | Visa U.S.A., Inc. | End-to-end encryption system and method of operation |
US4433207A (en) * | 1981-09-10 | 1984-02-21 | Best Robert M | Cryptographic decoder for computer programs |
US4471163A (en) * | 1981-10-05 | 1984-09-11 | Donald Thomas C | Software protection system |
US4593353A (en) * | 1981-10-26 | 1986-06-03 | Telecommunications Associates, Inc. | Software protection method and apparatus |
US4670857A (en) * | 1981-10-26 | 1987-06-02 | Rackman Michael I | Cartridge-controlled system whose use is limited to authorized cartridges |
US4454594A (en) * | 1981-11-25 | 1984-06-12 | U.S. Philips Corporation | Method and apparatus to secure proprietary operation of computer equipment |
US4442486A (en) * | 1981-11-25 | 1984-04-10 | U.S. Philips Corporation | Protected programmable apparatus |
US4553252A (en) * | 1981-12-21 | 1985-11-12 | Egendorf Harris H | Counting computer software cartridge |
HU183765B (en) * | 1981-12-23 | 1984-05-28 | Phylaxia Oltoanyagtermeloe | Process for producing lyophilized vaccine against duck hepatitis |
EP0084441A3 (en) | 1982-01-19 | 1984-08-22 | Tabs Limited | Method and apparatus for the protection of proprietary computer software |
US4458315A (en) * | 1982-02-25 | 1984-07-03 | Penta, Inc. | Apparatus and method for preventing unauthorized use of computer programs |
AU542447B2 (en) * | 1982-02-27 | 1985-02-21 | Fujitsu Limited | System for controlling key storage unit |
FR2523745B1 (en) * | 1982-03-18 | 1987-06-26 | Bull Sa | METHOD AND DEVICE FOR PROTECTING SOFTWARE DELIVERED BY A SUPPLIER TO A USER |
US4593183A (en) | 1982-05-06 | 1986-06-03 | Tokyo Shibaura Denki Kabushiki Kaisha | Automatic transaction machine |
US4484217A (en) * | 1982-05-11 | 1984-11-20 | Telease, Inc. | Method and system for remote reporting, particularly for pay television billing |
US4494156A (en) * | 1982-05-14 | 1985-01-15 | Media Systems Technology | Selectable format computer disk copier machine |
US4525599A (en) | 1982-05-21 | 1985-06-25 | General Computer Corporation | Software protection methods and apparatus |
US4462076A (en) * | 1982-06-04 | 1984-07-24 | Smith Engineering | Video game cartridge recognition and security system |
US4523271A (en) | 1982-06-22 | 1985-06-11 | Levien Raphael L | Software protection method and apparatus |
US4590552A (en) | 1982-06-30 | 1986-05-20 | Texas Instruments Incorporated | Security bit for designating the security status of information stored in a nonvolatile memory |
US4462078A (en) * | 1982-08-02 | 1984-07-24 | Ron Ross | Computer program protection method |
US4558176A (en) * | 1982-09-20 | 1985-12-10 | Arnold Mark G | Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software |
FR2536880B1 (en) | 1982-11-30 | 1987-05-07 | Bull Sa | MICROPROCESSOR DESIGNED IN PARTICULAR FOR EXECUTING THE CALCULATION ALGORITHMS OF A PUBLIC KEY ENCRYPTION SYSTEM |
US4562305A (en) | 1982-12-22 | 1985-12-31 | International Business Machines Corporation | Software cryptographic apparatus and method |
US4609985A (en) | 1982-12-30 | 1986-09-02 | Thomson Components-Mostek Corporation | Microcomputer with severable ROM |
US4528643A (en) * | 1983-01-10 | 1985-07-09 | Fpdc, Inc. | System for reproducing information in material objects at a point of sale location |
US4588991A (en) * | 1983-03-07 | 1986-05-13 | Atalla Corporation | File access security method and means |
US4680731A (en) * | 1983-03-17 | 1987-07-14 | Romox Incorporated | Reprogrammable cartridge memory with built-in identification circuitry and programming method |
US4593376A (en) * | 1983-04-21 | 1986-06-03 | Volk Larry N | System for vending program cartridges which have circuitry for inhibiting program usage after preset time interval expires |
US4597058A (en) * | 1983-05-09 | 1986-06-24 | Romox, Inc. | Cartridge programming system |
EP0128672A1 (en) | 1983-05-13 | 1984-12-19 | Ira Dennis Gale | Data security device |
US4573119A (en) * | 1983-07-11 | 1986-02-25 | Westheimer Thomas O | Computer software protection system |
US4658093A (en) * | 1983-07-11 | 1987-04-14 | Hellman Martin E | Software distribution system |
FR2550638A1 (en) | 1983-08-11 | 1985-02-15 | Christophe Leveque | DEVICE FOR PROTECTING SOFTWARE USED BY A COMPUTER CONNECTED TO AT LEAST ONE PERIPHERAL TERMINAL |
US4926480A (en) | 1983-08-22 | 1990-05-15 | David Chaum | Card-computer moderated systems |
US4621334A (en) | 1983-08-26 | 1986-11-04 | Electronic Signature Lock Corporation | Personal identification apparatus |
US4584641A (en) * | 1983-08-29 | 1986-04-22 | Paul Guglielmino | Copyprotecting system for software protection |
US4562306A (en) * | 1983-09-14 | 1985-12-31 | Chou Wayne W | Method and apparatus for protecting computer software utilizing an active coded hardware device |
US5103392A (en) | 1983-10-05 | 1992-04-07 | Fujitsu Limited | System for storing history of use of programs including user credit data and having access by the proprietor |
WO1985001854A1 (en) * | 1983-10-07 | 1985-04-25 | National Information Utilities Corporation | Education utility |
US4652990A (en) * | 1983-10-27 | 1987-03-24 | Remote Systems, Inc. | Protected software access control apparatus and method |
GB2149944A (en) | 1983-11-14 | 1985-06-19 | Softnet Inc | Software distribution |
US4558413A (en) * | 1983-11-21 | 1985-12-10 | Xerox Corporation | Software version management system |
US4740890A (en) * | 1983-12-22 | 1988-04-26 | Software Concepts, Inc. | Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media |
US4584639A (en) | 1983-12-23 | 1986-04-22 | Key Logic, Inc. | Computer security system |
DE3347483A1 (en) | 1983-12-29 | 1985-07-11 | GAO Gesellschaft für Automation und Organisation mbH, 8000 München | DEVICE FOR SECURING SECRET INFORMATION |
US4577289A (en) * | 1983-12-30 | 1986-03-18 | International Business Machines Corporation | Hardware key-on-disk system for copy-protecting magnetic storage media |
WO1985003584A1 (en) | 1984-02-03 | 1985-08-15 | Paul Guignard | Security and usage monitoring |
US4799258A (en) * | 1984-02-13 | 1989-01-17 | National Research Development Corporation | Apparatus and methods for granting access to computers |
US4621321A (en) | 1984-02-16 | 1986-11-04 | Honeywell Inc. | Secure data processing system architecture |
US4609777A (en) | 1984-02-22 | 1986-09-02 | Gordian Systems, Inc. | Solid state key for controlling access to computer software |
US4599489A (en) | 1984-02-22 | 1986-07-08 | Gordian Systems, Inc. | Solid state key for controlling access to computer software |
US4646234A (en) * | 1984-02-29 | 1987-02-24 | Brigham Young University | Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of computer programs |
US4672605A (en) | 1984-03-20 | 1987-06-09 | Applied Spectrum Technologies, Inc. | Data and voice communications system |
US4649515A (en) * | 1984-04-30 | 1987-03-10 | Westinghouse Electric Corp. | Methods and apparatus for system fault diagnosis and control |
US4748561A (en) | 1984-05-14 | 1988-05-31 | Mark Brown | Method of protecting computer software |
US4757553A (en) * | 1984-05-15 | 1988-07-12 | Crimmins James W | Communication system with portable unit |
US4672572A (en) * | 1984-05-21 | 1987-06-09 | Gould Inc. | Protector system for computer access and use |
US4712238A (en) * | 1984-06-08 | 1987-12-08 | M/A-Com Government Systems, Inc. | Selective-subscription descrambling |
US4791565A (en) * | 1984-06-20 | 1988-12-13 | Effective Security Systems, Inc. | Apparatus for controlling the use of computer software |
US4562495A (en) * | 1984-07-02 | 1985-12-31 | Verbatim Corporation | Multiple system disk |
US4677546A (en) | 1984-08-17 | 1987-06-30 | Signetics | Guarded regions for controlling memory access |
GB2163577B (en) * | 1984-08-23 | 1988-01-13 | Nat Res Dev | Software protection device |
US4747139A (en) * | 1984-08-27 | 1988-05-24 | Taaffe James L | Software security method and systems |
BE900479A (en) | 1984-08-31 | 1984-12-17 | Smets Raph | Magnetic recording disc for computer data - has sector subjected to different treatment to prevent unauthorised copying |
US4644493A (en) | 1984-09-14 | 1987-02-17 | International Business Machines Corporation | Implementing a shared higher level of privilege on personal computers for copy protection of software |
US4677552A (en) | 1984-10-05 | 1987-06-30 | Sibley Jr H C | International commodity trade exchange |
US4696034A (en) * | 1984-10-12 | 1987-09-22 | Signal Security Technologies | High security pay television system |
US4677434A (en) * | 1984-10-17 | 1987-06-30 | Lotus Information Network Corp. | Access control system for transmitting data from a central station to a plurality of receiving stations and method therefor |
DE3579785D1 (en) | 1984-10-31 | 1990-10-25 | Sony Corp | DECODING DEVICES FOR TELEVISION TV SYSTEMS. |
CA1238427A (en) * | 1984-12-18 | 1988-06-21 | Jonathan Oseas | Code protection using cryptography |
JPS61166652A (en) * | 1985-01-19 | 1986-07-28 | Panafacom Ltd | Interruption generating system using exceptional memory protection |
US4713753A (en) * | 1985-02-21 | 1987-12-15 | Honeywell Inc. | Secure data processing system architecture with format control |
US4888798A (en) | 1985-04-19 | 1989-12-19 | Oms, Inc. | Modular software security |
US4700296A (en) | 1985-04-19 | 1987-10-13 | Palmer Jr Roy A | Electronic access control system |
US4688169A (en) * | 1985-05-30 | 1987-08-18 | Joshi Bhagirath S | Computer software security system |
US4685056A (en) * | 1985-06-11 | 1987-08-04 | Pueblo Technologies, Inc. | Computer security device |
US4879647A (en) | 1985-06-11 | 1989-11-07 | Nec Corporation | Watchdog timer circuit suited for use in microcomputer |
US4685055A (en) * | 1985-07-01 | 1987-08-04 | Thomas Richard B | Method and system for controlling use of protected software |
US4683968A (en) | 1985-09-03 | 1987-08-04 | Burroughs Corporation | System for preventing software piracy employing multi-encrypted keys and single decryption circuit modules |
US4757533A (en) | 1985-09-11 | 1988-07-12 | Computer Security Corporation | Security system for microcomputers |
US4727550A (en) * | 1985-09-19 | 1988-02-23 | Chang David B | Radiation source |
GB2182467B (en) * | 1985-10-30 | 1989-10-18 | Ncr Co | Security device for stored sensitive data |
US5216603A (en) | 1985-11-18 | 1993-06-01 | Action Technologies, Inc. | Method and apparatus for structuring and managing human communications by explicitly defining the types of communications permitted between participants |
US5208748A (en) | 1985-11-18 | 1993-05-04 | Action Technologies, Inc. | Method and apparatus for structuring and managing human communications by explicitly defining the types of communications permitted between participants |
LU86203A1 (en) * | 1985-12-11 | 1987-07-24 | Cen Centre Energie Nucleaire | METHOD AND APPARATUS FOR VERIFYING THE AUTHENTICITY OF DOCUMENTS LINKED TO A PERSON AND THE IDENTITY OF THEIR CARRIERS |
DE3601983A1 (en) * | 1986-01-23 | 1987-07-30 | Siemens Ag | METHOD AND DEVICE FOR CONTACTLESS DETERMINATION OF TEMPERATURE DISTRIBUTION IN AN EXAMINATION OBJECT |
US5759101A (en) | 1986-03-10 | 1998-06-02 | Response Reward Systems L.C. | Central and remote evaluation of responses of participatory broadcast audience with automatic crediting and couponing |
US4864494A (en) | 1986-03-21 | 1989-09-05 | Computerized Data Ssytems For Mfg., Inc. | Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software |
US4893332A (en) * | 1986-05-12 | 1990-01-09 | Aquatrol Corporation | Low-powered remote sensor |
US4823264A (en) | 1986-05-27 | 1989-04-18 | Deming Gilbert R | Electronic funds transfer system |
US4780821A (en) | 1986-07-29 | 1988-10-25 | International Business Machines Corp. | Method for multiple programs management within a network having a server computer and a plurality of remote computers |
GB8619989D0 (en) | 1986-08-16 | 1986-09-24 | Modray Ltd | Controlling length of time |
US4967403A (en) | 1986-08-25 | 1990-10-30 | Sony Corporation | Multi-format optical disk and reading device |
US5014234A (en) | 1986-08-25 | 1991-05-07 | Ncr Corporation | System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software |
US5010571A (en) | 1986-09-10 | 1991-04-23 | Titan Linkabit Corporation | Metering retrieval of encrypted data stored in customer data retrieval terminal |
GB2195478B (en) * | 1986-09-24 | 1990-06-13 | Ncr Co | Security device for sensitive data |
US4799156A (en) | 1986-10-01 | 1989-01-17 | Strategic Processing Corporation | Interactive market management system |
US4827508A (en) | 1986-10-14 | 1989-05-02 | Personal Library Software, Inc. | Database usage metering and protection system and method |
US4977594A (en) | 1986-10-14 | 1990-12-11 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US5050213A (en) | 1986-10-14 | 1991-09-17 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US5047928A (en) | 1986-10-24 | 1991-09-10 | Wiedemer John D | Billing system for computer software |
US5155680A (en) | 1986-10-24 | 1992-10-13 | Signal Security Technologies | Billing system for computing software |
US4796181A (en) * | 1986-10-24 | 1989-01-03 | Wiedemer John D | Billing system for computer software |
US5146575A (en) | 1986-11-05 | 1992-09-08 | International Business Machines Corp. | Implementing privilege on microprocessor systems for use in software asset protection |
US4817140A (en) | 1986-11-05 | 1989-03-28 | International Business Machines Corp. | Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor |
US5109413A (en) | 1986-11-05 | 1992-04-28 | International Business Machines Corporation | Manipulating rights-to-execute in connection with a software copy protection mechanism |
US4860351A (en) | 1986-11-05 | 1989-08-22 | Ibm Corporation | Tamper-resistant packaging for protection of information stored in electronic circuitry |
US4858121A (en) | 1986-12-12 | 1989-08-15 | Medical Payment Systems, Incorporated | Medical payment system |
US4796220A (en) * | 1986-12-15 | 1989-01-03 | Pride Software Development Corp. | Method of controlling the copying of software |
US4797928A (en) * | 1987-01-07 | 1989-01-10 | Miu Automation | Encryption printed circuit board |
US4757914A (en) | 1987-01-27 | 1988-07-19 | Continental Can Company, Inc. | Laminated closure for a plastic container |
US4893248A (en) * | 1987-02-06 | 1990-01-09 | Access Corporation | Monitoring and reporting system for remote terminals |
US4881197A (en) | 1987-02-13 | 1989-11-14 | Addison Fischer | Document composition system using named formats and named fonts |
US5224160A (en) | 1987-02-23 | 1993-06-29 | Siemens Nixdorf Informationssysteme Ag | Process for securing and for checking the integrity of the secured programs |
US4975647A (en) | 1987-06-01 | 1990-12-04 | Nova Biomedical Corporation | Controlling machine operation with respect to consumable accessory units |
US4930073A (en) | 1987-06-26 | 1990-05-29 | International Business Machines Corporation | Method to prevent use of incorrect program version in a computer system |
US5070400A (en) | 1987-06-30 | 1991-12-03 | Comsat | Pay-tv time purchase scheme |
US4866769A (en) | 1987-08-05 | 1989-09-12 | Ibm Corporation | Hardware assist for protecting PC software |
US5206951A (en) | 1987-08-21 | 1993-04-27 | Wang Laboratories, Inc. | Integration of data between typed objects by mutual, direct invocation between object managers corresponding to object types |
DE3876617T2 (en) | 1987-09-04 | 1993-04-08 | Digital Equipment Corp | CONNECTION CONTROL IN A NETWORK FOR A DIGITAL DATA PROCESSING SYSTEM THAT SUPPLIES MULTIPLE TRANSMISSION PROTOCOLS. |
US4999806A (en) | 1987-09-04 | 1991-03-12 | Fred Chernow | Software distribution system |
US5005122A (en) | 1987-09-08 | 1991-04-02 | Digital Equipment Corporation | Arrangement with cooperating management server node and network service node |
ATE102424T1 (en) * | 1987-09-30 | 1994-03-15 | Thomson Brandt Gmbh | METHOD AND CIRCUIT ARRANGEMENT FOR DETECTING A SIGNUM CONTAINED IN A VIDEO SIGNAL. |
US4864616A (en) | 1987-10-15 | 1989-09-05 | Micronyx, Inc. | Cryptographic labeling of electronically stored data |
US5390297A (en) * | 1987-11-10 | 1995-02-14 | Auto-Trol Technology Corporation | System for controlling the number of concurrent copies of a program in a network based on the number of available licenses |
US4975878A (en) | 1988-01-28 | 1990-12-04 | National Semiconductor | Programmable memory data protection scheme |
DE3803982A1 (en) | 1988-02-10 | 1990-01-25 | Igor Groza | Data carrier with duplication prevention |
US5214702A (en) | 1988-02-12 | 1993-05-25 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US5005200A (en) | 1988-02-12 | 1991-04-02 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US4868877A (en) | 1988-02-12 | 1989-09-19 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US4937863A (en) | 1988-03-07 | 1990-06-26 | Digital Equipment Corporation | Software licensing management system |
JP2635087B2 (en) | 1988-03-25 | 1997-07-30 | 株式会社日立製作所 | Process control method |
GB8809346D0 (en) * | 1988-04-20 | 1988-05-25 | Emi Plc Thorn | Improvements relating to marked recorded signals |
US5113518A (en) | 1988-06-03 | 1992-05-12 | Durst Jr Robert T | Method and system for preventing unauthorized use of software |
US4924378A (en) | 1988-06-13 | 1990-05-08 | Prime Computer, Inc. | License mangagement system and license storage key |
US5191573A (en) * | 1988-06-13 | 1993-03-02 | Hair Arthur R | Method for transmitting a desired digital video or audio signal |
JPH0213040A (en) * | 1988-06-30 | 1990-01-17 | Toshiba Corp | System for registering/searching address information in network system |
US5185717A (en) | 1988-08-05 | 1993-02-09 | Ryoichi Mori | Tamper resistant module having logical elements arranged in multiple layers on the outer surface of a substrate to protect stored information |
ATE166986T1 (en) | 1988-08-16 | 1998-06-15 | Cryptologics International Inc | INFORMATION DISTRIBUTION SYSTEM |
US5247575A (en) | 1988-08-16 | 1993-09-21 | Sprague Peter J | Information distribution system |
US5111390A (en) | 1988-08-22 | 1992-05-05 | Unisys Corporation | Software security system for maintaining integrity of compiled object code by restricting users ability to define compilers |
US5023907A (en) | 1988-09-30 | 1991-06-11 | Apollo Computer, Inc. | Network license server |
US4953209A (en) | 1988-10-31 | 1990-08-28 | International Business Machines Corp. | Self-verifying receipt and acceptance system for electronically delivered data objects |
US4949187A (en) | 1988-12-16 | 1990-08-14 | Cohen Jason M | Video communications system having a remotely controlled central source of video and audio data |
US4919545A (en) | 1988-12-22 | 1990-04-24 | Gte Laboratories Incorporated | Distributed security procedure for intelligent networks |
US4926476A (en) | 1989-02-03 | 1990-05-15 | Motorola, Inc. | Method and apparatus for secure execution of untrusted software |
US4962533A (en) | 1989-02-17 | 1990-10-09 | Texas Instrument Incorporated | Data protection for computer systems |
US4941175A (en) | 1989-02-24 | 1990-07-10 | International Business Machines Corporation | Tamper-resistant method for authorizing access to data between a host and a predetermined number of attached workstations |
US5063596A (en) | 1989-02-24 | 1991-11-05 | Miu Automation Corporation | Encryption printed circuit board |
EP0383985A1 (en) * | 1989-02-24 | 1990-08-29 | Claus Peter Prof. Dr. Schnorr | Method for subscriber identification and for generation and verification of electronic signatures in a data exchange system |
US5065429A (en) | 1989-04-03 | 1991-11-12 | Lang Gerald S | Method and apparatus for protecting material on storage media |
US5325524A (en) | 1989-04-06 | 1994-06-28 | Digital Equipment Corporation | Locating mobile objects in a distributed computer system |
US5199066A (en) * | 1989-04-18 | 1993-03-30 | Special Effects Software, Inc. | Method and apparatus for protecting software |
US5227797A (en) | 1989-04-25 | 1993-07-13 | Murphy Quentin M | Radar tomography |
KR920701894A (en) | 1989-04-28 | 1992-08-12 | 브루스 마르쿠스 | Remote control device of computer software and its protection method |
CA2053261A1 (en) * | 1989-04-28 | 1990-10-29 | Gary D. Hornbuckle | Method and apparatus for remotely controlling and monitoring the use of computer software |
JPH02293930A (en) * | 1989-05-08 | 1990-12-05 | Victor Co Of Japan Ltd | Preventing system for stealing of recording contents of recording medium |
EP0398645B1 (en) | 1989-05-15 | 1997-08-06 | International Business Machines Corporation | System for controlling access privileges |
US5075847A (en) | 1989-05-26 | 1991-12-24 | Hewlett-Packard Company | Method and apparatus for computer program encapsulation |
US5442645A (en) | 1989-06-06 | 1995-08-15 | Bull Cp8 | Method for checking the integrity of a program or data, and apparatus for implementing this method |
US5129084A (en) | 1989-06-29 | 1992-07-07 | Digital Equipment Corporation | Object container transfer system and method in an object based computer operating system |
US5347579A (en) | 1989-07-05 | 1994-09-13 | Blandford Robert R | Personal computer diary |
US5557798A (en) | 1989-07-27 | 1996-09-17 | Tibco, Inc. | Apparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes |
US5257369A (en) | 1990-10-22 | 1993-10-26 | Skeen Marion D | Apparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes |
US5187787B1 (en) * | 1989-07-27 | 1996-05-07 | Teknekron Software Systems Inc | Apparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes |
US6044205A (en) * | 1996-02-29 | 2000-03-28 | Intermind Corporation | Communications system for transferring information between memories according to processes transferred with the information |
US5126936A (en) | 1989-09-01 | 1992-06-30 | Champion Securities | Goal-directed financial asset management system |
US5027397A (en) | 1989-09-12 | 1991-06-25 | International Business Machines Corporation | Data protection by detection of intrusion into electronic assemblies |
US5138712A (en) | 1989-10-02 | 1992-08-11 | Sun Microsystems, Inc. | Apparatus and method for licensing software on a network of computers |
US5148481A (en) | 1989-10-06 | 1992-09-15 | International Business Machines Corporation | Transaction system security method and apparatus |
US5048085A (en) | 1989-10-06 | 1991-09-10 | International Business Machines Corporation | Transaction system security method and apparatus |
US5001752A (en) | 1989-10-13 | 1991-03-19 | Fischer Addison M | Public/key date-time notary facility |
US5136643A (en) | 1989-10-13 | 1992-08-04 | Fischer Addison M | Public/key date-time notary facility |
US5241671C1 (en) | 1989-10-26 | 2002-07-02 | Encyclopaedia Britannica Educa | Multimedia search system using a plurality of entry path means which indicate interrelatedness of information |
DE3939970A1 (en) * | 1989-12-02 | 1991-06-06 | Tetra Pak Gmbh | PACKAGE FOR FLOWABLE FILLING MATERIAL WITH CIRCULAR SEAM |
US5201047A (en) | 1989-12-21 | 1993-04-06 | International Business Machines Corporation | Attribute-based classification and retrieval system |
US5163091A (en) | 1990-01-29 | 1992-11-10 | Graziano James M | Knowledge based system for document authentication (apparatus) |
US5218605A (en) | 1990-01-31 | 1993-06-08 | Hewlett-Packard Company | Software modules for testing computer hardware and software |
US5251294A (en) | 1990-02-07 | 1993-10-05 | Abelow Daniel H | Accessing, assembling, and using bodies of information |
US5263165A (en) | 1990-02-15 | 1993-11-16 | International Business Machines Corporation | System for providing user access control within a distributed data processing system having multiple resource managers |
US5263158A (en) | 1990-02-15 | 1993-11-16 | International Business Machines Corporation | Method and system for variable authority level user access control in a distributed data processing system having multiple resource manager |
US5263157A (en) | 1990-02-15 | 1993-11-16 | International Business Machines Corporation | Method and system for providing user access control within a distributed data processing system by the exchange of access control profiles |
US5119493A (en) | 1990-02-23 | 1992-06-02 | International Business Machines Corporation | System for recording at least one selected activity from a selected resource object within a distributed data processing system |
US5204966A (en) | 1990-03-09 | 1993-04-20 | Digital Equipment Corporation | System for controlling access to a secure system by verifying acceptability of proposed password by using hashing and group of unacceptable passwords |
DE69031758T2 (en) | 1990-04-13 | 1998-05-28 | Koninkl Philips Electronics Nv | Process for organizing and accessing product descriptive data in connection with a technical process |
US5022080A (en) | 1990-04-16 | 1991-06-04 | Durst Robert T | Electronic notary |
FR2662007B1 (en) | 1990-05-10 | 1992-07-10 | Bull Sa | PROCESS FOR OBTAINING A SECURE CLEAR ATTESTATION IN A DISTRIBUTED COMPUTER SYSTEM ENVIRONMENT. |
EP0456386B1 (en) | 1990-05-11 | 1998-11-11 | International Computers Limited | Access control in a distributed computer system |
EP0459046A1 (en) * | 1990-05-31 | 1991-12-04 | International Business Machines Corporation | Computer software protection |
NL9001368A (en) | 1990-06-15 | 1992-01-02 | Tel Developments B V | SECURITY OF OBJECTS OR DOCUMENTS. |
US5050212A (en) | 1990-06-20 | 1991-09-17 | Apple Computer, Inc. | Method and apparatus for verifying the integrity of a file stored separately from a computer |
US5032979A (en) | 1990-06-22 | 1991-07-16 | International Business Machines Corporation | Distributed security auditing subsystem for an operating system |
US5201046A (en) | 1990-06-22 | 1993-04-06 | Xidak, Inc. | Relational database management system and method for storing, retrieving and modifying directed graph data structures |
US5103459B1 (en) | 1990-06-25 | 1999-07-06 | Qualcomm Inc | System and method for generating signal waveforms in a cdma cellular telephone system |
US5161193A (en) | 1990-06-29 | 1992-11-03 | Digital Equipment Corporation | Pipelined cryptography processor and method for its use in communication networks |
US5091966A (en) | 1990-07-31 | 1992-02-25 | Xerox Corporation | Adaptive scaling for decoding spatially periodic self-clocking glyph shape codes |
US5168147A (en) | 1990-07-31 | 1992-12-01 | Xerox Corporation | Binary image processing for decoding self-clocking glyph shape codes |
CA2044404C (en) | 1990-07-31 | 1998-06-23 | Dan S. Bloomberg | Self-clocking glyph shape codes |
US5128525A (en) | 1990-07-31 | 1992-07-07 | Xerox Corporation | Convolution filtering for decoding self-clocking glyph shape codes |
US5136646A (en) | 1991-03-08 | 1992-08-04 | Bell Communications Research, Inc. | Digital document time-stamping with catenate certificate |
US5136647A (en) | 1990-08-02 | 1992-08-04 | Bell Communications Research, Inc. | Method for secure time-stamping of digital documents |
US5058162A (en) | 1990-08-09 | 1991-10-15 | Hewlett-Packard Company | Method of distributing computer data files |
US5224163A (en) | 1990-09-28 | 1993-06-29 | Digital Equipment Corporation | Method for delegating authorization from one entity to another through the use of session encryption keys |
US5251304A (en) | 1990-09-28 | 1993-10-05 | Motorola, Inc. | Integrated circuit microcontroller with on-chip memory and external bus interface and programmable mechanism for securing the contents of on-chip memory |
DE69132600T2 (en) | 1990-10-01 | 2002-02-07 | Thomas A Bush | TRANSACTION PROCESSING SYSTEM |
US5222134A (en) | 1990-11-07 | 1993-06-22 | Tau Systems Corporation | Secure system for activating personal computer software at remote locations |
US5103476A (en) | 1990-11-07 | 1992-04-07 | Waite David P | Secure system for activating personal computer software at remote locations |
US5758152A (en) | 1990-12-06 | 1998-05-26 | Prime Arithmetics, Inc. | Method and apparatus for the generation and manipulation of data structures |
CA2035697A1 (en) | 1991-02-05 | 1992-08-06 | Brian James Smyth | Encryption apparatus for computer device |
JPH04274058A (en) | 1991-02-28 | 1992-09-30 | Olympus Optical Co Ltd | Information recording and reproducing device |
US5504818A (en) | 1991-04-19 | 1996-04-02 | Okano; Hirokazu | Information processing system using error-correcting codes and cryptography |
EP0538453B1 (en) | 1991-05-08 | 1999-02-03 | Digital Equipment Corporation | Management interface and format for license management system |
US5237614A (en) | 1991-06-07 | 1993-08-17 | Security Dynamics Technologies, Inc. | Integrated network security system |
SE513182C2 (en) | 1991-06-12 | 2000-07-24 | Icl Systems Ab | Procedure and system for auditing data in a distributed computer system |
FR2678121B1 (en) | 1991-06-18 | 1994-04-29 | Matra Communication | DEVICE FOR INSERTING DIGITAL PACKETS IN A TRANSMISSION CHANNEL. |
US5204897A (en) | 1991-06-28 | 1993-04-20 | Digital Equipment Corporation | Management interface for license management system |
US5319785A (en) | 1991-06-28 | 1994-06-07 | Digital Equipment Corporation | Polling of I/O device status comparison performed in the polled I/O device |
US5260999A (en) | 1991-06-28 | 1993-11-09 | Digital Equipment Corporation | Filters in license management system |
US5438508A (en) | 1991-06-28 | 1995-08-01 | Digital Equipment Corporation | License document interchange format for license management system |
US5940504A (en) | 1991-07-01 | 1999-08-17 | Infologic Software, Inc. | Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site |
US5577209A (en) | 1991-07-11 | 1996-11-19 | Itt Corporation | Apparatus and method for providing multi-level security for communication among computers and terminals on a network |
US5383113A (en) * | 1991-07-25 | 1995-01-17 | Checkfree Corporation | System and method for electronically providing customer services including payment of bills, financial analysis and loans |
US5367621A (en) | 1991-09-06 | 1994-11-22 | International Business Machines Corporation | Data processing method to provide a generalized link from a reference point in an on-line book to an arbitrary multimedia object which can be dynamically updated |
US5301326A (en) | 1991-09-24 | 1994-04-05 | Microsoft Corporation | Method and system for controlling the execution of an application program |
US5355474A (en) | 1991-09-27 | 1994-10-11 | Thuraisngham Bhavani M | System for multilevel secure database management using a knowledge base with release-based and other security constraints for query, response and update modification |
FR2681997A1 (en) | 1991-09-30 | 1993-04-02 | Arbitron Cy | METHOD AND DEVICE FOR AUTOMATICALLY IDENTIFYING A PROGRAM COMPRISING A SOUND SIGNAL |
US5241599A (en) | 1991-10-02 | 1993-08-31 | At&T Bell Laboratories | Cryptographic protocol for secure communications |
JP3065738B2 (en) | 1991-10-11 | 2000-07-17 | 株式会社東芝 | Computer system |
GB9121995D0 (en) | 1991-10-16 | 1991-11-27 | Jonhig Ltd | Value transfer system |
US5164988A (en) | 1991-10-31 | 1992-11-17 | International Business Machines Corporation | Method to establish and enforce a network cryptographic security policy in a public key cryptosystem |
US5265164A (en) | 1991-10-31 | 1993-11-23 | International Business Machines Corporation | Cryptographic facility environment backup/restore and replication in a public key cryptosystem |
US5557518A (en) | 1994-04-28 | 1996-09-17 | Citibank, N.A. | Trusted agents for open electronic commerce |
US5453601A (en) | 1991-11-15 | 1995-09-26 | Citibank, N.A. | Electronic-monetary system |
US5455861A (en) | 1991-12-09 | 1995-10-03 | At&T Corp. | Secure telecommunications |
US5150407A (en) | 1991-12-16 | 1992-09-22 | Chan Steve S C | Secured data storage devices |
US5276901A (en) * | 1991-12-16 | 1994-01-04 | International Business Machines Corporation | System for controlling group access to objects using group access control folder and group identification as individual user |
GB9126779D0 (en) * | 1991-12-17 | 1992-02-12 | Int Computers Ltd | Security mechanism for a computer system |
US5319735A (en) | 1991-12-17 | 1994-06-07 | Bolt Beranek And Newman Inc. | Embedded signalling |
US5359721A (en) | 1991-12-18 | 1994-10-25 | Sun Microsystems, Inc. | Non-supervisor mode cross address space dynamic linking |
US5245165A (en) | 1991-12-27 | 1993-09-14 | Xerox Corporation | Self-clocking glyph code for encoding dual bit digital values robustly |
US5221833A (en) | 1991-12-27 | 1993-06-22 | Xerox Corporation | Methods and means for reducing bit error rates in reading self-clocking glyph codes |
US5199074A (en) * | 1992-01-06 | 1993-03-30 | Advanced Micro Devices, Inc. | Encryption system |
US5231568A (en) | 1992-01-16 | 1993-07-27 | Impact Telemedia, Inc. | Promotional game method and apparatus therefor |
WO2004077300A1 (en) | 1992-01-22 | 2004-09-10 | Yoshimasa Kadooka | Ic memory card and protection therefor |
US5335169A (en) | 1992-01-27 | 1994-08-02 | Dsi Of Hawaii, Inc. | System for tracking multiple rate assessments on transactions |
JP2942837B2 (en) | 1992-01-31 | 1999-08-30 | 株式会社セガ・エンタープライゼス | Security check method, game device, and information storage medium used for them |
US5521815A (en) | 1992-01-31 | 1996-05-28 | K.L.E. Irrevocable Trust | Uniform system for verifying and tracking articles of value |
US5301231A (en) | 1992-02-12 | 1994-04-05 | International Business Machines Corporation | User defined function facility |
GB2264796A (en) | 1992-03-02 | 1993-09-08 | Ibm | Distributed transaction processing |
JP3073590B2 (en) * | 1992-03-16 | 2000-08-07 | 富士通株式会社 | Electronic data protection system, licensor's device and user's device |
US5418852A (en) * | 1992-03-18 | 1995-05-23 | Fujitsu Limited | Unauthorized use prevention method for optical disks, optical disk having unauthorized use prevention function, and optical disk apparatus |
CA2093094C (en) | 1992-04-06 | 2000-07-11 | Addison M. Fischer | Method and apparatus for creating, supporting, and using travelling programs |
US5291598A (en) * | 1992-04-07 | 1994-03-01 | Gregory Grundy | Method and system for decentralized manufacture of copy-controlled software |
US5392390A (en) | 1992-04-10 | 1995-02-21 | Intellilink Corp. | Method for mapping, translating, and dynamically reconciling data between disparate computer platforms |
US5276735A (en) | 1992-04-17 | 1994-01-04 | Secure Computing Corporation | Data enclave and trusted path system |
JP2659896B2 (en) | 1992-04-29 | 1997-09-30 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Structured document copy management method and structured document copy management device |
US5389738A (en) | 1992-05-04 | 1995-02-14 | Motorola, Inc. | Tamperproof arrangement for an integrated circuit device |
US5421006A (en) | 1992-05-07 | 1995-05-30 | Compaq Computer Corp. | Method and apparatus for assessing integrity of computer system software |
ATE177857T1 (en) | 1992-05-15 | 1999-04-15 | Addison M Fischer | METHOD AND DEVICE FOR SECURING A COMPUTER SYSTEM WITH PROGRAM AUTHORIZATION DATA STRUCTURES |
US5412717A (en) | 1992-05-15 | 1995-05-02 | Fischer; Addison M. | Computer system security method and apparatus having program authorization information data structures |
US5446867A (en) | 1992-05-29 | 1995-08-29 | Intel Corporation | Microprocessor PLL clock circuit with selectable delayed feedback |
GB2267419B (en) | 1992-05-29 | 1996-11-27 | Toshiba Kk | Data processing apparatus |
US5524933A (en) | 1992-05-29 | 1996-06-11 | Ecole Polytechnique Federale De Lausanne | Method for the marking of documents |
US5596718A (en) * | 1992-07-10 | 1997-01-21 | Secure Computing Corporation | Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local workstation user I/O devices without utilizing workstation processor |
EP0581421B1 (en) | 1992-07-20 | 2003-01-15 | Compaq Computer Corporation | Method and system for certificate based alias detection |
US5235642A (en) | 1992-07-21 | 1993-08-10 | Digital Equipment Corporation | Access control subsystem and method for distributed computer system using locally cached authentication credentials |
US5721788A (en) * | 1992-07-31 | 1998-02-24 | Corbis Corporation | Method and system for digital image signatures |
DE69232799T2 (en) * | 1992-07-31 | 2003-09-18 | Micron Technology Inc | NETWORK SECURITY METHOD AND DEVICE |
US5285494A (en) | 1992-07-31 | 1994-02-08 | Pactel Corporation | Network management system |
US5361359A (en) | 1992-08-31 | 1994-11-01 | Trusted Information Systems, Inc. | System and method for controlling the use of a computer |
US5287408A (en) * | 1992-08-31 | 1994-02-15 | Autodesk, Inc. | Apparatus and method for serializing and validating copies of computer software |
IL103062A (en) | 1992-09-04 | 1996-08-04 | Algorithmic Res Ltd | Data processor security system |
US5819226A (en) | 1992-09-08 | 1998-10-06 | Hnc Software Inc. | Fraud detection using predictive modeling |
US5237616A (en) | 1992-09-21 | 1993-08-17 | International Business Machines Corporation | Secure computer system having privileged and unprivileged memories |
EP0689697A1 (en) * | 1992-09-21 | 1996-01-03 | Uniloc (Singapore) Private Limited | System for software registration |
JPH06168163A (en) | 1992-09-30 | 1994-06-14 | Nec Home Electron Ltd | Method and device for monitoring cpu |
JP3084969B2 (en) | 1992-10-16 | 2000-09-04 | 松下電器産業株式会社 | Playback device, recording device, cased recording medium, and recording medium initialization device |
US5471631A (en) | 1992-10-19 | 1995-11-28 | International Business Machines Corporation | Using time stamps to correlate data processing event times in connected data processing units |
US5319705A (en) | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
US5535322A (en) | 1992-10-27 | 1996-07-09 | International Business Machines Corporation | Data processing system with improved work flow system and method |
GB2295947B (en) | 1992-10-27 | 1997-08-13 | Mitsubishi Corp | Pay broadcasting system |
US5343526A (en) | 1992-10-30 | 1994-08-30 | At&T Bell Laboratories | Method for establishing licensor changeable limits on software usage |
US5349642A (en) | 1992-11-03 | 1994-09-20 | Novell, Inc. | Method and apparatus for authentication of client server communication |
US5432928A (en) | 1992-11-10 | 1995-07-11 | Microsoft Corporation | Updating objects stored in a permanent container while preserving logical contiguity |
US5457748A (en) | 1992-11-30 | 1995-10-10 | Motorola, Inc. | Method and apparatus for improved security within encrypted communication devices |
EP0672277B1 (en) | 1992-12-01 | 1998-05-13 | Microsoft Corporation | A method and system for in-place interaction with embedded objects |
US5341429A (en) | 1992-12-04 | 1994-08-23 | Testdrive Corporation | Transformation of ephemeral material |
US5509070A (en) | 1992-12-15 | 1996-04-16 | Softlock Services Inc. | Method for encouraging purchase of executable and non-executable software |
US5751955A (en) | 1992-12-17 | 1998-05-12 | Tandem Computers Incorporated | Method of synchronizing a pair of central processor units for duplex, lock-step operation by copying data into a corresponding locations of another memory |
US5373561A (en) | 1992-12-21 | 1994-12-13 | Bell Communications Research, Inc. | Method of extending the validity of a cryptographic certificate |
US5630069A (en) | 1993-01-15 | 1997-05-13 | Action Technologies, Inc. | Method and apparatus for creating workflow maps of business processes |
US5497491A (en) | 1993-01-26 | 1996-03-05 | International Business Machines Corporation | System and method for importing and exporting data between an object oriented computing environment and an external computing environment |
US5369707A (en) | 1993-01-27 | 1994-11-29 | Tecsec Incorporated | Secure network method and apparatus |
US5351293A (en) | 1993-02-01 | 1994-09-27 | Wave Systems Corp. | System method and apparatus for authenticating an encrypted signal |
WO1994018620A1 (en) | 1993-02-08 | 1994-08-18 | Action Technologies, Inc. | Method and apparatus for managing business processes |
US5390330A (en) | 1993-02-11 | 1995-02-14 | Talati; Kirit K. | Control system and method for direct execution of software application information models without code generation |
US5640546A (en) | 1993-02-23 | 1997-06-17 | Network Programs, Inc. | Composition of systems of objects by interlocking coordination, projection, and distribution |
JP3717951B2 (en) * | 1993-03-02 | 2005-11-16 | ヒューレット・パッカード・カンパニー | Deadlock avoidance system and method |
US5365587A (en) | 1993-03-11 | 1994-11-15 | International Business Machines Corporation | Self modifying access code for altering capabilities |
US5315448A (en) | 1993-03-18 | 1994-05-24 | Macrovision Corporation | Copy protection for hybrid digital video tape recording and unprotected source material |
US5408501A (en) | 1993-04-06 | 1995-04-18 | Conner Peripherals, Inc. | Data transfer system |
FR2703800B1 (en) | 1993-04-06 | 1995-05-24 | Bull Cp8 | Method for signing a computer file, and device for implementing it. |
JP3255754B2 (en) | 1993-04-23 | 2002-02-12 | 富士通株式会社 | Electronic trading system |
US5422953A (en) | 1993-05-05 | 1995-06-06 | Fischer; Addison M. | Personal date/time notary device |
US5504837A (en) | 1993-05-10 | 1996-04-02 | Bell Communications Research, Inc. | Method for resolving conflicts among distributed entities through the generation of counter proposals by transversing a goal hierarchy with acceptable, unacceptable, and indeterminate nodes |
US5583936A (en) | 1993-05-17 | 1996-12-10 | Macrovision Corporation | Video copy protection process enhancement to introduce horizontal and vertical picture distortions |
US5649099A (en) | 1993-06-04 | 1997-07-15 | Xerox Corporation | Method for delegating access rights through executable access control program without delegating access rights not in a specification to any intermediary nor comprising server security |
US5337357A (en) | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
US5428606A (en) | 1993-06-30 | 1995-06-27 | Moskowitz; Scott A. | Digital information commodities exchange |
US5550971A (en) | 1993-06-30 | 1996-08-27 | U S West Technologies, Inc. | Method and system for generating a user interface adaptable to various database management systems |
US5603031A (en) * | 1993-07-08 | 1997-02-11 | General Magic, Inc. | System and method for distributed computation based upon the movement, execution, and interaction of processes in a network |
US5444780A (en) | 1993-07-22 | 1995-08-22 | International Business Machines Corporation | Client/server based secure timekeeping system |
US5418713A (en) | 1993-08-05 | 1995-05-23 | Allen; Richard | Apparatus and method for an on demand data delivery system for the preview, selection, retrieval and reproduction at a remote location of previously recorded or programmed materials |
AU683038B2 (en) | 1993-08-10 | 1997-10-30 | Addison M. Fischer | A method for operating computers and for processing information among computers |
US5458494A (en) | 1993-08-23 | 1995-10-17 | Edutech Research Labs, Ltd. | Remotely operable teaching system and method therefor |
IL110891A (en) | 1993-09-14 | 1999-03-12 | Spyrus | System and method for data access control |
JPH07175868A (en) * | 1993-10-15 | 1995-07-14 | Internatl Business Mach Corp <Ibm> | Method and system for output of digital information to medium |
US5369702A (en) | 1993-10-18 | 1994-11-29 | Tecsec Incorporated | Distributed cryptographic object method |
CA2129075C (en) | 1993-10-18 | 1999-04-20 | Joseph J. Daniele | Electronic copyright royalty accounting system using glyphs |
US5432851A (en) | 1993-10-21 | 1995-07-11 | Tecsec Incorporated | Personal computer access control system |
US6135646A (en) | 1993-10-22 | 2000-10-24 | Corporation For National Research Initiatives | System for uniquely and persistently identifying, managing, and tracking digital objects |
US5343527A (en) | 1993-10-27 | 1994-08-30 | International Business Machines Corporation | Hybrid encryption method and system for protecting reusable software components |
US5463565A (en) | 1993-10-29 | 1995-10-31 | Time Warner Entertainment Co., L.P. | Data block format for software carrier and player therefor |
JPH07212712A (en) | 1993-10-29 | 1995-08-11 | Eastman Kodak Co | Method and equipment for adding and deleting digital watermark in hierarchical picture memory and fetch system |
US5455953A (en) | 1993-11-03 | 1995-10-03 | Wang Laboratories, Inc. | Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket |
US5537526A (en) | 1993-11-12 | 1996-07-16 | Taugent, Inc. | Method and apparatus for processing a display document utilizing a system level document framework |
US5625690A (en) | 1993-11-15 | 1997-04-29 | Lucent Technologies Inc. | Software pay per use system |
US5636292C1 (en) | 1995-05-08 | 2002-06-18 | Digimarc Corp | Steganography methods employing embedded calibration data |
US5768426A (en) | 1993-11-18 | 1998-06-16 | Digimarc Corporation | Graphics processing system employing embedded code signals |
US5748783A (en) | 1995-05-08 | 1998-05-05 | Digimarc Corporation | Method and apparatus for robust information coding |
US5748763A (en) * | 1993-11-18 | 1998-05-05 | Digimarc Corporation | Image steganography system featuring perceptually adaptive and globally scalable signal embedding |
DE69432480T2 (en) | 1993-11-18 | 2004-03-18 | Digimarc Corp., Tualatin | IDENTIFICATION / CERTIFICATION CODING METHOD AND DEVICE |
US5710834A (en) | 1995-05-08 | 1998-01-20 | Digimarc Corporation | Method and apparatus responsive to a code signal conveyed through a graphic image |
US5832119C1 (en) | 1993-11-18 | 2002-03-05 | Digimarc Corp | Methods for controlling systems using control signals embedded in empirical data |
US5572673A (en) | 1993-12-01 | 1996-11-05 | Sybase, Inc. | Secure multi-level system for executing stored procedures |
US5572589A (en) * | 1993-12-09 | 1996-11-05 | Microsoft Corporation | Disc serialization |
US5481611A (en) * | 1993-12-09 | 1996-01-02 | Gte Laboratories Incorporated | Method and apparatus for entity authentication |
EP1235177A3 (en) * | 1993-12-16 | 2003-10-08 | divine technology ventures | Digital active advertising |
US5491800A (en) | 1993-12-20 | 1996-02-13 | Taligent, Inc. | Object-oriented remote procedure call networking system |
US6086706A (en) | 1993-12-20 | 2000-07-11 | Lucent Technologies Inc. | Document copying deterrent method |
US5449895A (en) | 1993-12-22 | 1995-09-12 | Xerox Corporation | Explicit synchronization for self-clocking glyph codes |
US5453605A (en) | 1993-12-22 | 1995-09-26 | Xerox Corporation | Global addressability for self-clocking glyph codes |
US5449896A (en) | 1993-12-22 | 1995-09-12 | Xerox Corporation | Random access techniques for use with self-clocking glyph codes |
US5513261A (en) | 1993-12-29 | 1996-04-30 | At&T Corp. | Key management scheme for use with electronic cards |
US5450493A (en) | 1993-12-29 | 1995-09-12 | At&T Corp. | Secure communication method and apparatus |
US5473687A (en) | 1993-12-29 | 1995-12-05 | Infosafe Systems, Inc. | Method for retrieving secure information from a database |
US5398285A (en) * | 1993-12-30 | 1995-03-14 | Motorola, Inc. | Method for generating a password using public key cryptography |
US5457747A (en) | 1994-01-14 | 1995-10-10 | Drexler Technology Corporation | Anti-fraud verification system using a data card |
US5509074A (en) | 1994-01-27 | 1996-04-16 | At&T Corp. | Method of protecting electronically published materials using cryptographic protocols |
US5420927B1 (en) | 1994-02-01 | 1997-02-04 | Silvio Micali | Method for certifying public keys in a digital signature scheme |
US5422645A (en) | 1994-02-14 | 1995-06-06 | The United States Of America As Represented By The Secretary Of The Army | Delayed laser retroreflector pulse technique and system |
US5394469A (en) | 1994-02-18 | 1995-02-28 | Infosafe Systems, Inc. | Method and apparatus for retrieving secure information from mass storage media |
US5530752A (en) | 1994-02-22 | 1996-06-25 | Convex Computer Corporation | Systems and methods for protecting software from unlicensed copying and use |
JP2853727B2 (en) | 1994-02-22 | 1999-02-03 | 日本ビクター株式会社 | Reproduction protection method and protection reproduction device |
US5504904A (en) | 1994-02-23 | 1996-04-02 | International Business Machines Corporation | Personal computer having operating system definition file for configuring computer system |
RU2158969C2 (en) | 1994-02-28 | 2000-11-10 | Сони Корпорейшн | Method and device for data recording, data recording carrier, and data reading device |
US5862322A (en) * | 1994-03-14 | 1999-01-19 | Dun & Bradstreet Software Services, Inc. | Method and apparatus for facilitating customer service communications in a computing environment |
US5499298A (en) | 1994-03-17 | 1996-03-12 | National University Of Singapore | Controlled dissemination of digital information |
JP3729421B2 (en) * | 1994-03-18 | 2005-12-21 | 富士通株式会社 | Unauthorized use prevention method and unauthorized use prevention system |
WO1995025999A1 (en) | 1994-03-21 | 1995-09-28 | Taligent, Inc. | Document proxy framework |
US5450490A (en) | 1994-03-31 | 1995-09-12 | The Arbitron Company | Apparatus and methods for including codes in audio signals and decoding |
GB2288519A (en) | 1994-04-05 | 1995-10-18 | Ibm | Data encryption |
DE4413451A1 (en) | 1994-04-18 | 1995-12-14 | Rolf Brugger | Device for the distribution of music information in digital form |
US5505461A (en) | 1994-04-19 | 1996-04-09 | Caesars World, Inc. | Method for meeting IRS reporting requirements related to an electronic gaming machine |
US5590269A (en) | 1994-04-22 | 1996-12-31 | Minnesota Mining & Manufacturing Company | Resource assignment system providing mixed-initiative user interface updates |
US5598470A (en) * | 1994-04-25 | 1997-01-28 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: Method and apparatus for utilizing a decryption block |
US5563946A (en) | 1994-04-25 | 1996-10-08 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems |
US5644686A (en) | 1994-04-29 | 1997-07-01 | International Business Machines Corporation | Expert system and method employing hierarchical knowledge base, and interactive multimedia/hypermedia applications |
US5539828A (en) | 1994-05-31 | 1996-07-23 | Intel Corporation | Apparatus and method for providing secured communications |
US5473692A (en) | 1994-09-07 | 1995-12-05 | Intel Corporation | Roving software license for a hardware agent |
US5724425A (en) * | 1994-06-10 | 1998-03-03 | Sun Microsystems, Inc. | Method and apparatus for enhancing software security and distributing software |
US5802275A (en) * | 1994-06-22 | 1998-09-01 | Lucent Technologies Inc. | Isolation of non-secure software from secure software to limit virus infection |
US5533123A (en) | 1994-06-28 | 1996-07-02 | National Semiconductor Corporation | Programmable distributed personal security |
US5513260A (en) | 1994-06-29 | 1996-04-30 | Macrovision Corporation | Method and apparatus for copy protection for various recording media |
US5739864A (en) | 1994-08-24 | 1998-04-14 | Macrovision Corporation | Apparatus for inserting blanked formatted fingerprint data (source ID, time/date) in to a video signal |
US5559884A (en) * | 1994-06-30 | 1996-09-24 | Microsoft Corporation | Method and system for generating and auditing a signature for a computer program |
US5483649A (en) * | 1994-07-01 | 1996-01-09 | Ybm Technologies, Inc. | Personal computer security system |
US5557678A (en) | 1994-07-18 | 1996-09-17 | Bell Atlantic Network Services, Inc. | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem |
US5999711A (en) | 1994-07-18 | 1999-12-07 | Microsoft Corporation | Method and system for providing certificates holding authentication and authorization information for users/machines |
CA2128587A1 (en) | 1994-07-21 | 1996-01-22 | Ed Morson | Method and arrangement for recognition of a coded transmitted signal |
US5574787A (en) | 1994-07-25 | 1996-11-12 | Ryan; John O. | Apparatus and method for comprehensive copy protection for video platforms and unprotected source material |
US5590194A (en) | 1994-08-09 | 1996-12-31 | Macrovision Corporation | Method of and apparatus for scrambling a video signal with full network transmission and recording capability |
EP0706275B1 (en) | 1994-09-15 | 2006-01-25 | International Business Machines Corporation | System and method for secure storage and distribution of data using digital signatures |
US5606609A (en) | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
JPH09506457A (en) | 1994-09-21 | 1997-06-24 | ウォング・ラボラトリーズ・インコーポレーテッド | Link manager for managing links that integrate data between application programs |
US5504757A (en) | 1994-09-27 | 1996-04-02 | International Business Machines Corporation | Method for selecting transmission speeds for transmitting data packets over a serial bus |
US5615061A (en) * | 1994-09-29 | 1997-03-25 | Singh; Jitendra K. | Method of preventng software piracy by uniquely identifying the specific magnetic storage device the software is stored on |
EP0704785B1 (en) | 1994-09-30 | 2003-11-19 | Mitsubishi Corporation | Data copyright management system |
US5678170A (en) | 1994-10-05 | 1997-10-14 | Motorola, Inc. | Method and apparatus for monitoring and limiting distribution of data |
US5842173A (en) | 1994-10-14 | 1998-11-24 | Strum; David P. | Computer-based surgical services management system |
ZA958446B (en) | 1994-10-19 | 1996-05-27 | Intergame | A method and system for cashless gaming machine operation |
US5715314A (en) * | 1994-10-24 | 1998-02-03 | Open Market, Inc. | Network sales system |
US5717923A (en) * | 1994-11-03 | 1998-02-10 | Intel Corporation | Method and apparatus for dynamically customizing electronic information to individual end users |
US5715403A (en) | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
US5634012A (en) | 1994-11-23 | 1997-05-27 | Xerox Corporation | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US5638443A (en) | 1994-11-23 | 1997-06-10 | Xerox Corporation | System for controlling the distribution and use of composite digital works |
JPH08263438A (en) | 1994-11-23 | 1996-10-11 | Xerox Corp | Distribution and use control system of digital work and access control method to digital work |
US5629980A (en) | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
KR100332743B1 (en) | 1994-11-26 | 2002-11-07 | 엘지전자주식회사 | Device and method for preventing illegal copy or unauthorized watching of digital image |
US5758257A (en) | 1994-11-29 | 1998-05-26 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
US5553282A (en) | 1994-12-09 | 1996-09-03 | Taligent, Inc. | Software project history database and method of operation |
US5655077A (en) | 1994-12-13 | 1997-08-05 | Microsoft Corporation | Method and system for authenticating access to heterogeneous computing services |
EP0717337B1 (en) | 1994-12-13 | 2001-08-01 | International Business Machines Corporation | Method and system for the secured distribution of programs |
US5802590A (en) | 1994-12-13 | 1998-09-01 | Microsoft Corporation | Method and system for providing secure access to computer resources |
US5646997A (en) | 1994-12-14 | 1997-07-08 | Barton; James M. | Method and apparatus for embedding authentication information within digital data |
US5485577A (en) | 1994-12-16 | 1996-01-16 | General Instrument Corporation Of Delaware | Method and apparatus for incremental delivery of access rights |
US5745569A (en) | 1996-01-17 | 1998-04-28 | The Dice Company | Method for stega-cipher protection of computer code |
US5732400A (en) | 1995-01-04 | 1998-03-24 | Citibank N.A. | System and method for a risk-based purchase of goods |
JP3366143B2 (en) | 1995-01-10 | 2003-01-14 | 富士通株式会社 | Identifier management apparatus and method in software distribution system, and software distribution management apparatus and method |
US5692180A (en) | 1995-01-31 | 1997-11-25 | International Business Machines Corporation | Object-oriented cell directory database for a distributed computing environment |
US5643428A (en) | 1995-02-01 | 1997-07-01 | Advanced Micro Devices, Inc. | Multiple tier collimator system for enhanced step coverage and uniformity |
SE504085C2 (en) | 1995-02-01 | 1996-11-04 | Greg Benson | Methods and systems for managing data objects in accordance with predetermined conditions for users |
JPH08214281A (en) | 1995-02-06 | 1996-08-20 | Sony Corp | Charging method and system |
JPH11500275A (en) | 1995-02-10 | 1999-01-06 | フレックシーダイアル・プロプライアタリ・リミテッド | Interactive broadcasting system |
US6157721A (en) * | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US7069451B1 (en) | 1995-02-13 | 2006-06-27 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
WO1996027155A2 (en) | 1995-02-13 | 1996-09-06 | Electronic Publishing Resources, Inc. | Systems and methods for secure transaction management and electronic rights protection |
US6658568B1 (en) | 1995-02-13 | 2003-12-02 | Intertrust Technologies Corporation | Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management |
US5943422A (en) | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US6948070B1 (en) | 1995-02-13 | 2005-09-20 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US7095854B1 (en) | 1995-02-13 | 2006-08-22 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US7124302B2 (en) | 1995-02-13 | 2006-10-17 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US7165174B1 (en) | 1995-02-13 | 2007-01-16 | Intertrust Technologies Corp. | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5530235A (en) | 1995-02-16 | 1996-06-25 | Xerox Corporation | Interactive contents revealing storage device |
US5774872A (en) | 1995-03-31 | 1998-06-30 | Richard Golden | Automated taxable transaction reporting/collection system |
US5826012A (en) | 1995-04-21 | 1998-10-20 | Lettvin; Jonathan D. | Boot-time anti-virus and maintenance facility |
US5534975A (en) | 1995-05-26 | 1996-07-09 | Xerox Corporation | Document processing system utilizing document service cards to provide document processing services |
US5613004A (en) | 1995-06-07 | 1997-03-18 | The Dice Company | Steganographic method and device |
US5740549A (en) | 1995-06-12 | 1998-04-14 | Pointcast, Inc. | Information and advertising distribution system and method |
US5592549A (en) | 1995-06-15 | 1997-01-07 | Infosafe Systems, Inc. | Method and apparatus for retrieving selected information from a secure information source |
US5699427A (en) | 1995-06-23 | 1997-12-16 | International Business Machines Corporation | Method to deter document and intellectual property piracy through individualization |
US5689565A (en) | 1995-06-29 | 1997-11-18 | Microsoft Corporation | Cryptography system and method for providing cryptographic services for a computer application |
US5625693A (en) | 1995-07-07 | 1997-04-29 | Thomson Consumer Electronics, Inc. | Apparatus and method for authenticating transmitting applications in an interactive TV system |
US5802497A (en) | 1995-07-10 | 1998-09-01 | Digital Equipment Corporation | Method and apparatus for conducting computerized commerce |
US6006328A (en) * | 1995-07-14 | 1999-12-21 | Christopher N. Drake | Computer software authentication, protection, and security system |
US5878421A (en) * | 1995-07-17 | 1999-03-02 | Microsoft Corporation | Information map |
JPH0944993A (en) | 1995-07-31 | 1997-02-14 | Pioneer Electron Corp | Information recording method and device therefor, function recording method and device therefor and information reproducing method and device therefor |
JP4518574B2 (en) | 1995-08-11 | 2010-08-04 | ソニー株式会社 | Recording method and apparatus, recording medium, and reproducing method and apparatus |
US5913040A (en) | 1995-08-22 | 1999-06-15 | Backweb Ltd. | Method and apparatus for transmitting and displaying information between a remote network and a local computer |
KR0166923B1 (en) | 1995-09-18 | 1999-03-20 | 구자홍 | Method and apparatus of preventing an illegal watching and copying in a digital broadcasting system |
CN1160955C (en) | 1995-10-09 | 2004-08-04 | 松下电器产业株式会社 | Data transmitter, data transmitting method, data receiver, information processor, and information recording medium |
US6807534B1 (en) | 1995-10-13 | 2004-10-19 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US5765152A (en) | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US5689566A (en) | 1995-10-24 | 1997-11-18 | Nguyen; Minhtam C. | Network with secure communications sessions |
US5757914A (en) | 1995-10-26 | 1998-05-26 | Sun Microsystems, Inc. | System and method for protecting use of dynamically linked executable modules |
US5732398A (en) * | 1995-11-09 | 1998-03-24 | Keyosk Corp. | Self-service system for selling travel-related services or products |
US5671279A (en) | 1995-11-13 | 1997-09-23 | Netscape Communications Corporation | Electronic commerce using a secure courier system |
JPH09160899A (en) | 1995-12-06 | 1997-06-20 | Matsushita Electric Ind Co Ltd | Information service processor |
US5692047A (en) | 1995-12-08 | 1997-11-25 | Sun Microsystems, Inc. | System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources |
US5794210A (en) | 1995-12-11 | 1998-08-11 | Cybergold, Inc. | Attention brokerage |
US5633932A (en) | 1995-12-19 | 1997-05-27 | Intel Corporation | Apparatus and method for preventing disclosure through user-authentication at a printing node |
ATE271742T1 (en) | 1996-01-03 | 2004-08-15 | Sony Electronics Inc | COPY PROTECTED RECORDING AND PLAYBACK SYSTEM |
JPH09208823A (en) | 1996-01-29 | 1997-08-12 | Toyota Central Res & Dev Lab Inc | Powdery polyimide composite material and its production |
US5754849A (en) | 1996-01-30 | 1998-05-19 | Wayfarer Communications, Inc. | Self-describing object providing dynamic manipulation of heterogeneous data values and semantic identity between memory and transmission representations |
US5706426A (en) * | 1996-02-07 | 1998-01-06 | United Microelectronics Corporation | Software protection method and apparatus |
US5689587A (en) | 1996-02-09 | 1997-11-18 | Massachusetts Institute Of Technology | Method and apparatus for data hiding in images |
US5862325A (en) | 1996-02-29 | 1999-01-19 | Intermind Corporation | Computer-based communication system and method using metadata defining a control structure |
US5896454A (en) | 1996-03-08 | 1999-04-20 | Time Warner Entertainment Co., L.P. | System and method for controlling copying and playing of digital programs |
JP3816571B2 (en) | 1996-03-15 | 2006-08-30 | パイオニア株式会社 | Information recording apparatus, information recording method, information reproducing apparatus, and information reproducing method |
US6542919B1 (en) | 1996-03-22 | 2003-04-01 | Koninklijke Philips Electronics N.V. | Operating system for use with protection domains in a single address space |
US5991876A (en) | 1996-04-01 | 1999-11-23 | Copyright Clearance Center, Inc. | Electronic rights management and authorization system |
US6085238A (en) | 1996-04-23 | 2000-07-04 | Matsushita Electric Works, Ltd. | Virtual LAN system |
US5978484A (en) | 1996-04-25 | 1999-11-02 | Microsoft Corporation | System and method for safety distributing executable objects |
EP1796014A3 (en) | 1996-05-15 | 2011-05-25 | Intertrust Technologies Corp | System and method for converting analog signals to digital signals with rights management protection |
US5802592A (en) * | 1996-05-31 | 1998-09-01 | International Business Machines Corporation | System and method for protecting integrity of alterable ROM using digital signatures |
US5892899A (en) | 1996-06-13 | 1999-04-06 | Intel Corporation | Tamper resistant methods and apparatus |
US5729760A (en) | 1996-06-21 | 1998-03-17 | Intel Corporation | System for providing first type access to register if processor in first mode and second type access to register if processor not in first mode |
US5819263A (en) | 1996-07-19 | 1998-10-06 | American Express Financial Corporation | Financial planning system incorporating relationship and group management |
ATE448532T1 (en) | 1996-09-04 | 2009-11-15 | Intertrust Tech Corp | RELIABLE INFRASTRUCTURE SUPPORT SYSTEMS, METHODS AND TECHNIQUES FOR SECURE ELECTRONIC COMMERCIAL, ELECTRONIC TRANSACTIONS, TRADE PROCESS CONTROL AND AUTOMATION, DISTRIBUTED PROCESSING AND RIGHTS MANAGEMENT |
US6102965A (en) | 1996-09-23 | 2000-08-15 | National Instruments Corporation | System and method for providing client/server access to graphical programs |
US5832529A (en) * | 1996-10-11 | 1998-11-03 | Sun Microsystems, Inc. | Methods, apparatus, and product for distributed garbage collection |
US5692980A (en) | 1996-10-24 | 1997-12-02 | Trotman; Stephenson E. | Kick bag game and apparatus kit |
US7062500B1 (en) | 1997-02-25 | 2006-06-13 | Intertrust Technologies Corp. | Techniques for defining, using and manipulating rights management data structures |
US5920861A (en) | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
US5999949A (en) | 1997-03-14 | 1999-12-07 | Crandall; Gary E. | Text file compression system utilizing word terminators |
US6108420A (en) | 1997-04-10 | 2000-08-22 | Channelware Inc. | Method and system for networked installation of uniquely customized, authenticable, and traceable software application |
US6557104B2 (en) * | 1997-05-02 | 2003-04-29 | Phoenix Technologies Ltd. | Method and apparatus for secure processing of cryptographic keys |
CA2293650C (en) | 1997-06-09 | 2012-09-25 | Christian Sven Collberg | Obfuscation techniques for enhancing software security |
DE19726027C2 (en) | 1997-06-19 | 1999-05-06 | Memminger Iro Gmbh | Thread delivery device and coupling device |
US6330549B1 (en) | 1997-10-30 | 2001-12-11 | Xerox Corporation | Protected shareware |
US6112181A (en) | 1997-11-06 | 2000-08-29 | Intertrust Technologies Corporation | Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
US7092914B1 (en) | 1997-11-06 | 2006-08-15 | Intertrust Technologies Corporation | Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
US7809138B2 (en) | 1999-03-16 | 2010-10-05 | Intertrust Technologies Corporation | Methods and apparatus for persistent control and protection of content |
WO1999048296A1 (en) | 1998-03-16 | 1999-09-23 | Intertrust Technologies Corporation | Methods and apparatus for continuous control and protection of media content |
US6477559B1 (en) | 1998-08-21 | 2002-11-05 | Aspect Communications Corporation | Method and apparatus for remotely accessing an automatic transaction processing system |
JP2000283960A (en) * | 1999-03-31 | 2000-10-13 | Shimadzu Corp | Micro-chip electrophoretic device |
US6393484B1 (en) | 1999-04-12 | 2002-05-21 | International Business Machines Corp. | System and method for controlled access to shared-medium public and semi-public internet protocol (IP) networks |
US6785815B1 (en) | 1999-06-08 | 2004-08-31 | Intertrust Technologies Corp. | Methods and systems for encoding and protecting data using digital signature and watermarking techniques |
US6959384B1 (en) | 1999-12-14 | 2005-10-25 | Intertrust Technologies Corporation | Systems and methods for authenticating and protecting the integrity of data streams and other data |
AU6104800A (en) | 1999-07-16 | 2001-02-05 | Intertrust Technologies Corp. | Trusted storage systems and methods |
WO2001010076A2 (en) | 1999-07-29 | 2001-02-08 | Intertrust Technologies Corp. | Systems and methods for protecting secure and insecure computing environments using cryptography |
EP1526435A3 (en) | 1999-07-30 | 2005-07-27 | Intertrust Technologies Corp. | Methods and systems for transaction record delivery using thresholds and multi-stage protocol |
US6832316B1 (en) | 1999-12-22 | 2004-12-14 | Intertrust Technologies, Corp. | Systems and methods for protecting data secrecy and integrity |
US7085839B1 (en) | 2000-04-07 | 2006-08-01 | Intertrust Technologies Corporation | Network content management |
US6973499B1 (en) | 2000-04-07 | 2005-12-06 | Intertrust Technologies Corp. | Ticketing and keying for orchestrating distribution of network content |
US7313692B2 (en) | 2000-05-19 | 2007-12-25 | Intertrust Technologies Corp. | Trust management systems and methods |
US7107448B1 (en) | 2000-06-04 | 2006-09-12 | Intertrust Technologies Corporation | Systems and methods for governing content rendering, protection, and management applications |
US7050586B1 (en) | 2000-06-19 | 2006-05-23 | Intertrust Technologies Corporation | Systems and methods for retrofitting electronic appliances to accept different content formats |
US7580988B2 (en) | 2001-04-05 | 2009-08-25 | Intertrust Technologies Corporation | System and methods for managing the distribution of electronic content |
US7136840B2 (en) | 2001-04-20 | 2006-11-14 | Intertrust Technologies Corp. | Systems and methods for conducting transactions and communications using a trusted third party |
US7581103B2 (en) * | 2001-06-13 | 2009-08-25 | Intertrust Technologies Corporation | Software self-checking systems and methods |
US7383570B2 (en) | 2002-04-25 | 2008-06-03 | Intertrust Technologies, Corp. | Secure authentication systems and methods |
US7149899B2 (en) | 2002-04-25 | 2006-12-12 | Intertrust Technologies Corp. | Establishing a secure channel with a human user |
EA015549B1 (en) * | 2003-06-05 | 2011-08-30 | Интертраст Текнолоджис Корпорейшн | Interoperable systems and methods for peer-to-peer service orchestration |
-
1996
- 1996-08-30 US US08/706,206 patent/US5892900A/en not_active Expired - Lifetime
-
1997
- 1997-08-29 WO PCT/US1997/015243 patent/WO1998009209A1/en active Application Filing
- 1997-08-29 CA CA002265473A patent/CA2265473C/en not_active Expired - Lifetime
- 1997-08-29 EP EP05076129A patent/EP1621960A3/en not_active Ceased
- 1997-08-29 EP EP97939670A patent/EP0922248A1/en not_active Withdrawn
- 1997-08-29 AU AU41703/97A patent/AU4170397A/en not_active Abandoned
- 1997-08-29 EP EP08075029.2A patent/EP1914655B1/en not_active Expired - Lifetime
- 1997-08-29 CA CA002373542A patent/CA2373542C/en not_active Expired - Lifetime
-
2001
- 2001-09-10 US US09/948,598 patent/US20030163431A1/en not_active Abandoned
-
2006
- 2006-04-12 US US11/403,536 patent/US8533851B2/en not_active Expired - Fee Related
-
2007
- 2007-07-12 US US11/879,202 patent/US8291238B2/en not_active Expired - Fee Related
- 2007-08-20 US US11/894,521 patent/US8181021B2/en not_active Expired - Fee Related
- 2007-08-20 US US11/894,570 patent/US8055913B2/en not_active Expired - Fee Related
- 2007-10-30 US US11/981,670 patent/US20090048978A1/en not_active Abandoned
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104714829A (en) * | 2013-12-15 | 2015-06-17 | 中国航空工业集团公司第六三一研究所 | Compiling linkage method for ensuring consistency of object code and source code |
CN104714829B (en) * | 2013-12-15 | 2017-11-28 | 中国航空工业集团公司第六三一研究所 | A kind of compiling link method for ensureing object code and source code consistency |
Also Published As
Publication number | Publication date |
---|---|
US8055913B2 (en) | 2011-11-08 |
EP1914655A2 (en) | 2008-04-23 |
US20080034406A1 (en) | 2008-02-07 |
US20080052541A1 (en) | 2008-02-28 |
EP1914655A3 (en) | 2011-12-28 |
US5892900A (en) | 1999-04-06 |
EP1914655B1 (en) | 2013-10-09 |
CA2373542C (en) | 2002-11-12 |
US20070226807A1 (en) | 2007-09-27 |
EP0922248A1 (en) | 1999-06-16 |
CA2373542A1 (en) | 1998-03-05 |
CA2265473A1 (en) | 1998-03-05 |
EP1621960A2 (en) | 2006-02-01 |
WO1998009209A1 (en) | 1998-03-05 |
EP1621960A3 (en) | 2007-01-10 |
AU4170397A (en) | 1998-03-19 |
US20080034231A1 (en) | 2008-02-07 |
US8291238B2 (en) | 2012-10-16 |
US8181021B2 (en) | 2012-05-15 |
US8533851B2 (en) | 2013-09-10 |
US20090048978A1 (en) | 2009-02-19 |
US20030163431A1 (en) | 2003-08-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2265473C (en) | Systems and methods for secure transaction management and electronic rights protection | |
CA2683230C (en) | Systems and methods for secure transaction management and electronic rights protection | |
US7831823B2 (en) | Systems and methods for secure transaction management and electronic rights protection | |
US7984509B2 (en) | Systems and methods for secure transaction management and electronic rights protection | |
US7095854B1 (en) | Systems and methods for secure transaction management and electronic rights protection | |
US7120800B2 (en) | Systems and methods for secure transaction management and electronic rights protection | |
CA2480118C (en) | Systems and methods for secure transaction management and electronic rights protection | |
CA2373508C (en) | Systems and methods for secure transaction management and electronic rights protection | |
CA2619600A1 (en) | Systems and methods for secure transaction management and electronic rights protection |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKEX | Expiry |
Effective date: 20170829 |