US Patent No: 7,925,898

Number of patents in Portfolio can not be more than 2000

Systems and methods using cryptography to protect secure computing environments

ALSO PUBLISHED AS: 20060248353
2 Status Updates

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

Secure computation environments are protected from bogus or rogue load modules, executables and other data elements through use of digital signatures, seals and certificates issued by a verifying authority. A verifying authority—which may be a trusted independent third party—tests the load modules or other executables to verify that their corresponding specifications are accurate and complete, and then digitally signs the load module or other executable based on tamper resistance work factor classification. Secure computation environments with different tamper resistance work factors use different verification digital signature authentication techniques (e.g., different signature algorithms and/or signature verification keys)—allowing one tamper resistance work factor environment to protect itself against load modules from another, different tamper resistance work factor environment. Several dissimilar digital signature algorithms may be used to reduce vulnerability from algorithm compromise, and subsets of multiple digital signatures may be used to reduce the scope of any specific compromise.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Related Publications

Loading Related Publications... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTERTRUST TECHNOLOGIES CORP.SUNNYVALE, CA185

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Shear, Victor H Bethesda, MD 191 16977
Sibert, W Olin Lexington, MA 128 4651
Van, Wie David M Sunnyvale, CA 194 15831

Cited Art Landscape

Patent Info (Count) # Cites Year
 
InterTrust Technologies Corp. (63)
5,940,504 Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site 510 1992
5,943,422 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels 771 1996
6,157,721 Systems and methods using cryptography to protect secure computing environments 432 1996
5,892,900 Systems and methods for secure transaction management and electronic rights protection 1875 1996
5,910,987 Systems and methods for secure transaction management and electronic rights protection 739 1996
5,915,019 Systems and methods for secure transaction management and electronic rights protection 614 1997
5,917,912 System and methods for secure transaction management and electronic rights protection 604 1997
5,949,876 Systems and methods for secure transaction management and electronic rights protection 558 1997
5,920,861 Techniques for defining using and manipulating rights management data structures 540 1997
5,999,949 Text file compression system utilizing word terminators 220 1997
2001/0042,043 CRYPTOGRAPHIC METHODS, APPARATUS AND SYSTEMS FOR STORAGE MEDIA ELECTRONIC RIGHTS MANAGEMENT IN CLOSED AND CONNECTED APPLIANCES 259 1997
5,982,891 Systems and methods for secure transaction management and electronic rights protection 824 1997
6,112,181 Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information 722 1997
6,668,325 Obfuscation techniques for enhancing software security 308 1998
6,253,193 Systems and methods for the secure transaction management and electronic rights protection 577 1998
6,185,683 Trusted and secure techniques, systems and methods for item delivery and execution 626 1998
6,240,185 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels 311 1999
6,138,119 Techniques for defining, using and manipulating rights management data structures 403 1999
6,363,488 Systems and methods for secure transaction management and electronic rights protection 444 1999
6,389,402 Systems and methods for secure transaction management and electronic rights protection 363 1999
6,237,786 Systems and methods for secure transaction management and electronic rights protection 371 1999
7,069,451 Systems and methods for secure transaction management and electronic rights protection 73 1999
6,427,140 Systems and methods for secure transaction management and electronic rights protection 352 1999
7,133,846 Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management 163 1999
6,658,568 Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management 395 1999
7,165,174 Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management 64 1999
6,832,316 Systems and methods for protecting data secrecy and integrity 80 2000
7,092,914 Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information 41 2000
6,959,384 Systems and methods for authenticating and protecting the integrity of data streams and other data 78 2000
6,973,499 Ticketing and keying for orchestrating distribution of network content 17 2000
7,085,839 Network content management 14 2000
6,785,815 Methods and systems for encoding and protecting data using digital signature and watermarking techniques 297 2000
6,950,867 System and method for managing transaction record delivery using an acknowledgement-monitoring process and a failure-recovery process with modifying the predefined fault condition 36 2000
7,062,500 Techniques for defining, using and manipulating rights management data structures 75 2000
7,095,854 Systems and methods for secure transaction management and electronic rights protection 39 2000
6,292,569 Systems and methods using cryptography to protect secure computing environments 299 2000
6,948,070 Systems and methods for secure transaction management and electronic rights protection 115 2000
7,076,652 Systems and methods for secure transaction management and electronic rights protection 117 2001
6,449,367 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels 268 2001
7,107,448 Systems and methods for governing content rendering, protection, and management applications 12 2001
7,050,586 Systems and methods for retrofitting electronic appliances to accept different content formats 12 2001
7,120,802 Systems and methods for using cryptography to protect secure computing environments 31 2001
2003/0163,431 Systems and methods for secure transaction management and electronic rights protection 114 2001
6,640,304 Systems and methods for secure transaction management and electronic rights protection 236 2002
2002/0152,173 System and methods for managing the distribution of electronic content 124 2002
7,051,212 Systems and methods for secure transaction management and electronic rights protection 47 2002
2003/0023,856 Software self-checking systems and methods 80 2002
6,618,484 Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels 158 2002
6,938,021 Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information 120 2002
7,110,983 Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information 64 2002
2003/0041,239 Systems and methods using cryptography to protect secure computing environments 61 2002
2004/0133,793 Systems and methods for secure transaction management and electronic rights protection 109 2003
7,100,199 Systems and methods for secure transaction management and electronic rights protection 61 2003
2004/0107,356 Methods and apparatus for persistent control and protection of content 115 2003
2004/0123,129 Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management 91 2003
2005/0027,871 Interoperable systems and methods for peer-to-peer service orchestration 138 2004
6,961,854 Methods and systems for encoding and protecting data using digital signature and watermarking techniques 49 2004
2005/0060,560 Systems and methods for protecting data secrecy and integrity 54 2004
7,058,805 Systems and methods for protecting data secrecy and integrity 17 2004
7,107,452 Methods and systems for encoding and protecting data using digital signature and watermarking techniques 23 2005
2006/0248,016 Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management 31 2006
7,581,092 Systems and methods using cryptography to protect secure computing environments 8 2007
2008/0077,531 Systems and methods using cryptography to protect secure computing environments 6 2007
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (40)
4,200,913 Operator controlled programmable keyboard apparatus 171 1977
4,183,085 Protection of data processing system against unauthorized programs 82 1977
4,328,544 Electronic point-of-sale system using direct-access storage 85 1980
4,562,305 Software cryptographic apparatus and method 55 1982
4,577,289 Hardware key-on-disk system for copy-protecting magnetic storage media 203 1983
4,644,493 Implementing a shared higher level of privilege on personal computers for copy protection of software 202 1984
4,780,821 Method for multiple programs management within a network having a server computer and a plurality of remote computers 273 1986
4,817,140 Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor 361 1986
5,146,575 Implementing privilege on microprocessor systems for use in software asset protection 114 1986
4,903,296 Implementing a shared higher level of privilege on personal computers for copy protection of software 113 1986
4,757,534 Code protection using cryptography 256 1987
4,930,073 Method to prevent use of incorrect program version in a computer system 149 1987
4,866,769 Hardware assist for protecting PC software 216 1987
4,953,209 Self-verifying receipt and acceptance system for electronically delivered data objects 271 1988
4,941,175 Tamper-resistant method for authorizing access to data between a host and a predetermined number of attached workstations 85 1989
5,027,397 Data protection by detection of intrusion into electronic assemblies 76 1989
5,109,413 Manipulating rights-to-execute in connection with a software copy protection mechanism 250 1989
5,201,047 Attribute-based classification and retrieval system 161 1989
5,263,157 Method and system for providing user access control within a distributed data processing system by the exchange of access control profiles 332 1990
5,263,158 Method and system for variable authority level user access control in a distributed data processing system having multiple resource manager 239 1990
5,263,165 System for providing user access control within a distributed data processing system having multiple resource managers 152 1990
5,119,493 System for recording at least one selected activity from a selected resource object within a distributed data processing system 75 1990
5,032,979 Distributed security auditing subsystem for an operating system 315 1990
5,287,407 Computer software protection 165 1991
5,367,621 Data processing method to provide a generalized link from a reference point in an on-line book to an arbitrary multimedia object which can be dynamically updated 255 1991
5,164,988 Method to establish and enforce a network cryptographic security policy in a public key cryptosystem 184 1991
5,265,164 Cryptographic facility environment backup/restore and replication in a public key cryptosystem 191 1991
5,276,901 System for controlling group access to objects using group access control folder and group identification as individual user 224 1991
5,301,231 User defined function facility 169 1992
5,319,705 Method and system for multimedia access control enablement 677 1992
5,535,322 Data processing system with improved work flow system and method 200 1992
5,497,491 System and method for importing and exporting data between an object oriented computing environment and an external computing environment 147 1993
5,365,587 Self modifying access code for altering capabilities 63 1993
5,644,686 Expert system and method employing hierarchical knowledge base, and interactive multimedia/hypermedia applications 170 1994
5,504,757 Method for selecting transmission speeds for transmitting data packets over a serial bus 152 1994
5,692,180 Object-oriented cell directory database for a distributed computing environment 173 1995
5,699,427 Method to deter document and intellectual property piracy through individualization 108 1995
5,745,678 Method and system for the secured distribution of multimedia titles 195 1997
5,956,408 Apparatus and method for secure distribution of data 162 1998
6,393,484 System and method for controlled access to shared-medium public and semi-public internet protocol (IP) networks 207 1999
 
XEROX CORPORATION (12)
4,558,413 Software version management system 858 1983
5,091,966 Adaptive scaling for decoding spatially periodic self-clocking glyph shape codes 280 1990
5,128,525 Convolution filtering for decoding self-clocking glyph shape codes 248 1990
5,168,147 Binary image processing for decoding self-clocking glyph shape codes 232 1990
5,221,833 Methods and means for reducing bit error rates in reading self-clocking glyph codes 168 1991
5,245,165 Self-clocking glyph code for encoding dual bit digital values robustly 223 1991
5,649,099 Method for delegating access rights through executable access control program without delegating access rights not in a specification to any intermediary nor comprising server security 242 1993
5,449,895 Explicit synchronization for self-clocking glyph codes 151 1993
5,449,896 Random access techniques for use with self-clocking glyph codes 136 1993
5,453,605 Global addressability for self-clocking glyph codes 104 1993
5,444,779 Electronic copyright royalty accounting system using glyphs 391 1994
5,534,975 Document processing system utilizing document service cards to provide document processing services 205 1995
 
DIGIMARC CORPORATION (10)
5,768,426 Graphics processing system employing embedded code signals 493 1994
5,636,292 Steganography methods employing embedded calibration data 652 1995
5,710,834 Method and apparatus responsive to a code signal conveyed through a graphic image 281 1995
5,748,763 Image steganography system featuring perceptually adaptive and globally scalable signal embedding 334 1995
5,748,783 Method and apparatus for robust information coding 430 1995
5,832,119 Methods for controlling systems using control signals embedded in empirical data 410 1995
5,765,152 System and method for managing copyrighted electronic media 926 1995
5,745,604 Identification/authentication system using robust, distributed coding 278 1996
6,026,193 Video steganography 154 1997
6,807,534 System and method for managing copyrighted electronic media 186 2000
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (10)
5,005,122 Arrangement with cooperating management server node and network service node 514 1987
4,937,863 Software licensing management system 341 1988
5,129,084 Object container transfer system and method in an object based computer operating system 128 1989
5,224,163 Method for delegating authorization from one entity to another through the use of session encryption keys 295 1990
5,325,524 Locating mobile objects in a distributed computer system 109 1992
5,204,897 Management interface for license management system 520 1992
5,260,999 Filters in license management system 533 1992
5,319,785 Polling of I/O device status comparison performed in the polled I/O device 50 1992
5,421,006 Method and apparatus for assessing integrity of computer system software 454 1994
5,438,508 License document interchange format for license management system 383 1994
 
MICROSOFT CORPORATION (10)
5,301,326 Method and system for controlling the execution of an application program 83 1991
5,432,928 Updating objects stored in a permanent container while preserving logical contiguity 48 1992
5,559,884 Method and system for generating and auditing a signature for a computer program 64 1994
5,655,077 Method and system for authenticating access to heterogeneous computing services 355 1994
5,802,590 Method and system for providing secure access to computer resources 116 1994
5,581,686 Method and system for in-place interaction with contained objects 229 1995
5,689,565 Cryptography system and method for providing cryptographic services for a computer application 185 1995
5,878,421 Information map 100 1995
5,978,484 System and method for safety distributing executable objects 183 1996
6,330,670 Digital rights management operating system 442 1999
 
INTEL CORPORATION (7)
4,442,484 Microprocessor memory management and protection mechanism 175 1980
5,539,828 Apparatus and method for providing secured communications 246 1994
5,717,923 Method and apparatus for dynamically customizing electronic information to individual end users 712 1994
5,568,552 Method for providing a roving software license from one node to another node 412 1995
5,757,915 Parameterized hash functions for access control 62 1995
5,633,932 Apparatus and method for preventing disclosure through user-authentication at a printing node 343 1995
5,892,899 Tamper resistant methods and apparatus 127 1996
 
SUN MICROSYSTEMS, INC. (6)
5,138,712 Apparatus and method for licensing software on a network of computers 540 1989
5,359,721 Non-supervisor mode cross address space dynamic linking 112 1991
5,724,425 Method and apparatus for enhancing software security and distributing software 317 1994
5,757,914 System and method for protecting use of dynamically linked executable modules 134 1995
5,692,047 System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources 170 1995
6,519,615 Method and system for leasing storage 72 2000
 
APPLE INC. (5)
5,050,212 Method and apparatus for verifying the integrity of a file stored separately from a computer 154 1990
5,537,526 Method and apparatus for processing a display document utilizing a system level document framework 219 1993
5,491,800 Object-oriented remote procedure call networking system 304 1993
5,553,282 Software project history database and method of operation 205 1994
5,638,504 System and method of processing documents with document proxies 127 1996
 
CONTENTGUARD HOLDINGS, INC. (5)
5,629,980 System for controlling the distribution and use of digital works 1090 1994
5,634,012 System for controlling the distribution and use of digital works having a fee reporting mechanism 756 1994
5,638,443 System for controlling the distribution and use of composite digital works 771 1994
5,715,403 System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar 960 1994
5,530,235 Interactive contents revealing storage device 462 1995
 
DALLAS SEMICONDUCTOR CORPORATION (4)
4,278,837 Crypto microprocessor for executing enciphered programs 456 1979
4,319,079 Crypto microprocessor using block cipher 242 1980
4,465,901 Crypto microprocessor that executes enciphered programs 245 1981
4,433,207 Cryptographic decoder for computer programs 256 1981
 
ELECTRONIC PUBLISHING RESOURCES, INC. (4)
4,827,508 Database usage metering and protection system and method 908 1985
4,977,594 Database usage metering and protection system and method 728 1989
5,050,213 Database usage metering and protection system and method 636 1990
5,410,598 Database usage metering and protection system and method 641 1994
 
NIELSEN HOLDINGS N.V. (4)
5,450,490 Apparatus and methods for including codes in audio signals and decoding 480 1994
5,574,962 Method and apparatus for automatically identifying a program including a sound signal 241 1994
5,581,800 Method and apparatus for automatically identifying a program including a sound signal 278 1995
5,787,334 Method and apparatus for automatically identifying a program including a sound signal 123 1996
 
SONY CORPORATION (4)
4,759,060 Decoder for a pay television system 35 1985
4,967,403 Multi-format optical disk and reading device 74 1988
5,646,997 Method and apparatus for embedding authentication information within digital data 637 1994
6,009,170 Method for appending a signal with ciphered playback mode information 52 1996
 
WISTARIA TRADING, INC. (4)
5,428,606 Digital information commodities exchange 498 1993
5,539,735 Digital information commodities exchange 333 1994
5,613,004 Steganographic method and device 687 1995
5,687,236 Steganographic method and device 474 1996
 
CITIBANK, N.A. (3)
5,453,601 Electronic-monetary system 709 1991
5,557,518 Trusted agents for open electronic commerce 833 1994
5,455,407 Electronic-monetary system 412 1995
 
CP8 TECHNOLOGIES (3)
4,683,553 Method and device for protecting software delivered to a user by a supplier 209 1986
5,479,509 Method for signature of an information processing file, and apparatus for implementing it 215 1994
5,442,645 Method for checking the integrity of a program or data, and apparatus for implementing this method 186 1994
 
FUJITSU LIMITED (3)
4,589,064 System for controlling key storage unit which controls access to main storage 164 1983
5,103,392 System for storing history of use of programs including user credit data and having access by the proprietor 189 1990
5,428,685 IC memory card and method of protecting data therein 84 1993
 
HARMONY LOGIC SYSTEMS LLC (3)
5,473,687 Method for retrieving secure information from a database 164 1993
5,394,469 Method and apparatus for retrieving secure information from mass storage media 244 1994
5,592,549 Method and apparatus for retrieving selected information from a secure information source 129 1995
 
HEWLETT-PACKARD COMPANY (3)
5,023,907 Network license server 545 1988
5,218,605 Software modules for testing computer hardware and software 77 1990
5,058,162 Method of distributing computer data files 151 1990
 
HITACHI, LTD. (3)
4,434,464 Memory protection system for effecting alteration of protection information without intervention of control program 159 1981
5,051,932 Method and system for process control with complex inference mechanism 64 1989
2005/0204,105 Remote copy system 2 2004
 
INFORMATION PROTECTION AND AUTHENTICATION OF TEXAS, LLC (3)
4,881,197 Document composition system using named formats and named fonts 53 1987
5,412,717 Computer system security method and apparatus having program authorization information data structures 305 1992
5,311,591 Computer system security method and apparatus for creating and using program authorization information data structures 318 1993
 
JDA SOFTWARE GROUP (3)
2002/0169,657 Supply chain demand forecasting and planning 56 2001
2002/0169,657 Supply chain demand forecasting and planning 56 2001
2002/0169,657 Supply chain demand forecasting and planning 56 2001
 
TECSEC, INCORPORATED (3)
5,369,707 Secure network method and apparatus 181 1993
5,369,702 Distributed cryptographic object method 232 1993
5,432,851 Personal computer access control system 72 1993
 
AKAMAI TECHNOLOGIES, INC. (2)
2009/0132,648 CONTENT DELIVERY AND GLOBAL TRAFFIC MANAGEMENT NETWORK SYSTEM 25 2009
2009/0132,648 CONTENT DELIVERY AND GLOBAL TRAFFIC MANAGEMENT NETWORK SYSTEM 25 2009
 
ASSA ABLOY AB (2)
5,457,747 Anti-fraud verification system using a data card 154 1994
5,420,927 Method for certifying public keys in a digital signature scheme 131 1994
 
AT&T CORP. (2)
5,450,493 Secure communication method and apparatus 128 1993
5,513,261 Key management scheme for use with electronic cards 150 1993
 
CISCO TECHNOLOGY, INC. (2)
5,048,085 Transaction system security method and apparatus 223 1989
5,148,481 Transaction system security method and apparatus 273 1991
 
Corban International, Ltd. (2)
4,446,519 Method and apparatus for providing security for computer software 277 1981
4,685,055 Method and system for controlling use of protected software 149 1985
 
EMC CORPORATION (2)
5,349,642 Method and apparatus for authentication of client server communication 165 1992
6,701,433 Method and apparatus for escrowing properties used for accessing executable modules 27 1999
 
GOOGLE INC. (2)
5,235,642 Access control subsystem and method for distributed computer system using locally cached authentication credentials 415 1992
5,534,855 Method and system for certificate based alias detection 228 1994
 
GOULD INC. (2)
4,209,787 Method for monitoring the location of monitored objects 152 1978
4,672,572 Protector system for computer access and use 231 1984
 
INTELLECTUAL VENTURES I LLC (2)
5,603,031 System and method for distributed computation based upon the movement, execution, and interaction of processes in a network 255 1993
6,016,393 System and method for distributed computation based upon the movement, execution, and interaction of processes in a network 90 1997
 
International Computers Limited (2)
5,253,297 Data processing system with cryptographic facility 11 1992
5,283,830 Security mechanism for a computer system 114 1992
 
MASSACHUSETTS INSTITUTE OF TECHNOLOGY (2)
4,405,829 Cryptographic communications system and method 1015 1977
5,689,587 Method and apparatus for data hiding in images 227 1996
 
NATIONAL SEMICONDUCTOR CORPORATION (2)
4,975,878 Programmable memory data protection scheme 85 1989
5,533,123 Programmable distributed personal security 223 1994
 
NCR CORPORATION (2)
4,691,350 Security device for stored sensitive data 113 1986
5,014,234 System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software 327 1986
 
NITONI PTY LIMITED (2)
5,291,598 Method and system for decentralized manufacture of copy-controlled software 142 1992
5,375,240 Information distribution system 153 1994
 
PITNEY BOWES INC. (2)
5,113,518 Method and system for preventing unauthorized use of software 212 1988
5,022,080 Electronic notary 115 1990
 
RIDDELL, H. GEORGE (2)
5,103,476 Secure system for activating personal computer software at remote locations 427 1990
5,222,134 Secure system for activating personal computer software at remote locations 453 1991
 
SECURE COMPUTING CORPORATION (2)
4,621,321 Secure data processing system architecture 158 1984
4,713,753 Secure data processing system architecture with format control 309 1985
 
SIGHTSOUND.COM INCORPORATED (2)
5,191,573 Method for transmitting a desired digital video or audio signal 308 1990
5,966,440 System and method for transmitting desired digital video or digital audio signals 126 1995
 
Signal Security Technologies (2)
4,696,034 High security pay television system 164 1984
5,155,680 Billing system for computing software 191 1989
 
SofTel, Inc. (2)
5,388,211 Method and apparatus for remotely controlling and monitoring the use of computer software 278 1993
5,497,479 Method and apparatus for remotely controlling and monitoring the use of computer software 194 1995
 
SOVERAIN SOFTWARE LLC (2)
5,715,314 Network sales system 1196 1994
5,724,424 Digital active advertising 986 1995
 
TEKNEKRON SOFTWARE SYSTEMS (2)
5,187,787 Apparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes 383 1989
5,257,369 Apparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes 421 1990
 
TELCORDIA TECHNOLOGIES, INC. (2)
5,136,647 Method for secure time-stamping of digital documents 325 1990
5,136,646 Digital document time-stamping with catenate certificate 295 1991
 
TEXAS INSTRUMENTS INCORPORATED (2)
4,590,552 Security bit for designating the security status of information stored in a nonvolatile memory 114 1982
4,962,533 Data protection for computer systems 82 1989
 
U.S. Philips Corporation (2)
4,454,594 Method and apparatus to secure proprietary operation of computer equipment 254 1981
5,392,220 Method and system for organizing data 74 1994
 
VASCO CORPORATION, 1919 S. HIGHLAND, SUITE 118-C, LOMBARD, ILLINOIS 60148, A UTAH CORP. (2)
4,599,489 Solid state key for controlling access to computer software 133 1984
4,609,777 Solid state key for controlling access to computer software 94 1985
 
VOLPE WELTY FUND SLP (2)
5,208,748 Method and apparatus for structuring and managing human communications by explicitly defining the types of communications permitted between participants 174 1989
5,216,603 Method and apparatus for structuring and managing human communications by explicitly defining the types of communications permitted between participants 148 1990
 
WARNER BROS. ENTERTAINMENT INC. (2)
5,463,565 Data block format for software carrier and player therefor 162 1993
5,896,454 System and method for controlling copying and playing of digital programs 108 1996
 
WAVE SYSTEMS CORP. (2)
5,247,575 Information distribution system 833 1992
5,351,293 System method and apparatus for authenticating an encrypted signal 212 1993
 
ACTIVISION PUBLISHING, INC. (1)
5,563,946 Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems 321 1994
 
Alpex Computer Corp. (1)
4,253,157 Data access system wherein subscriber terminals gain access to a data bank by telephone lines 200 1978
 
ALPVISION SA (1)
5,524,933 Method for the marking of documents 142 1994
 
AMERIPRISE FINANCIAL, INC. (1)
5,819,263 Financial planning system incorporating relationship and group management 212 1996
 
ANGUS FIRE ARMOUR LIMITED (1)
5,517,518 Method and arrangement for recognition of a coded transmitted signal 33 1994
 
Applied Spectrum Technologies, Inc. (1)
4,672,605 Data and voice communications system 394 1984
 
Aquatrol Corporation (1)
4,893,332 Low-powered remote sensor 44 1988
 
ASPECT COMMUNICATIONS CORPORATION (1)
6,477,559 Method and apparatus for remotely accessing an automatic transaction processing system 48 1998
 
AT & T TECHNOLOGIES, INC., (1)
4,306,289 Digital computer having code conversion apparatus for an encrypted program 182 1980
 
AT&T Bell Laboratories (1)
5,343,526 Method for establishing licensor changeable limits on software usage 64 1992
 
AT&T IPM CORP. (1)
5,455,861 Secure telecommunications 118 1993
 
Atalla Corporation (1)
4,588,991 File access security method and means 232 1983
 
BEAK AND BUMPER, LLC (1)
5,774,872 Automated taxable transaction reporting/collection system 91 1996
 
BLUE SPIKE LLC (1)
5,745,569 Method for stega-cipher protection of computer code 365 1996
 
BRANDS, STEFAN, DR. (1)
5,696,827 Secure cryptographic methods for electronic transfer of information 90 1997
 
BRIGHAM YOUNG UNIVERSITY (1)
4,646,234 Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of computer programs 95 1984
 
BRITISH TECHNOLOGY GROUP LIMITED (1)
4,634,807 Software protection device 258 1985
 
BULL S.A. (1)
5,214,700 Method for obtaining a securitized cleartext attestation in a distributed data processing system environment 95 1991
 
Caesars World, Inc. (1)
5,505,461 Method for meeting IRS reporting requirements related to an electronic gaming machine 77 1994
 
CELLCO PARTNERSHIP D/B/A VERIZON WIRELESS (1)
5,285,494 Network management system 288 1992
 
Champion Securities (1)
5,126,936 Goal-directed financial asset management system 474 1989
 
CHECKFREE CORPORATION (1)
5,383,113 System and method for electronically providing customer services including payment of bills, financial analysis and loans 621 1991
 
Codart, Inc. (1)
4,598,288 Apparatus for controlling the reception of transmitted programs 269 1983
 
Compagnie Internationale pour l'Informatique CII-Honeywell Bull (Societe Anonyme) (1)
4,471,216 System and process for identification of persons requesting access to particular facilities 143 1980
 
COMPUTER PLANNING, INC. (1)
4,262,329 Security system for data processing 264 1978
 
Computerized Data Ssytems for Mfg., Inc. (1)
4,864,494 Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software 181 1986
 
COMSAT CORPORATION (1)
5,070,400 Pay-tv time purchase scheme 35 1989
 
Continental Can Company, Inc. (1)
4,757,914 Laminated closure for a plastic container 52 1987
 
COPYRIGHT CLEARANCE CENTER, INC. (1)
5,991,876 Electronic rights management and authorization system 241 1996
 
CORPORATION FOR NATIONAL RESEARCH INITIATIVES (1)
6,135,646 System for uniquely and persistently identifying, managing, and tracking digital objects 283 1997
 
CPT, Ltd. (1)
4,597,058 Cartridge programming system 280 1983
 
DEUTSCHE THOMSON-BRANDT GMBH (1)
4,907,269 Process and circuit layout for the recognition of an identification sign (signum) contained in a video signal 20 1988
 
DIEBOLD, INCORPORATED (1)
7,405,724 Automated banking machine and method 7 2005
 
Digital Data, Inc. (1)
4,196,310 Secure SCA broadcasting system including subscriber actuated portable receiving terminals 170 1977
 
DIGITAL ON-DEMAND, INC. (1)
5,418,713 Apparatus and method for an on demand data delivery system for the preview, selection, retrieval and reproduction at a remote location of previously recorded or programmed materials 526 1993
 
DIGITAL RIVER, INC. (1)
2005/0154,676 Electronic commerce system method for detecting fraud 7 2005
 
DONALD, THOMAS CHRISTOPHER (1)
4,471,163 Software protection system 265 1981
 
DSI of Hawaii, Inc. (1)
5,335,169 System for tracking multiple rate assessments on transactions 93 1992
 
E-CONTACT TECHNOLOGIES LLC (1)
5,347,579 Personal computer diary 194 1993
 
EASTMAN KODAK COMPANY (1)
5,206,951 Integration of data between typed objects by mutual, direct invocation between object managers corresponding to object types 251 1991
 
EduTech Research Labs, Ltd. (1)
5,458,494 Remotely operable teaching system and method therefor 92 1993
 
Effective Security Systems, Inc. (1)
4,791,565 Apparatus for controlling the use of computer software 168 1984
 
Electronic Signature Lock Corporation (1)
4,621,334 Personal identification apparatus 96 1983
 
EMAX ELECTRONIC MODULES CORPORATION MC CORMICK RD BOX 141 TIMONIUM MD 21093 A MD CORP (1)
4,236,217 Energy utilization or consumption recording arrangement 145 1979
 
Encyclopaedia Britannica, Inc. (1)
5,241,671 Multimedia search system using a plurality of entry path means which indicate interrelatedness of information 579 1989
 
ENTERASYS NETWORKS, INC. (1)
5,136,716 Session control in network for digital data processing system which supports multiple transfer protocols 158 1990
 
ENTRYPOINT, INC. (1)
5,740,549 Information and advertising distribution system and method 1375 1995
 
Etat Francais represente par le Ministre des P.T.T. (C.N.E.T.) (1)
4,807,288 Microprocessor intended particularly for executing the calculation algorithms of a public code encoding system 76 1983
 
FINANCIAL NEW NETWORK INC., A CORP. OF CALIFORNIA (1)
4,677,434 Access control system for transmitting data from a central station to a plurality of receiving stations and method therefor 244 1984
 
FIRST DATA CORPORATION (1)
4,321,672 Financial data processing system 685 1979
 
FLEHR HOHBACH TEST ALBRITTON & HERBERT LLP (1)
5,758,152 Method and apparatus for the generation and manipulation of data structures 97 1990
 
FLEXERA SOFTWARE LLC (1)
5,390,297 System for controlling the number of concurrent copies of a program in a network based on the number of available licenses 247 1987
 
FREESCALE SEMICONDUCTOR, INC. (1)
5,432,950 System for securing a data processing system and method of operation 91 1993
 
FUJITSU SIEMENS COMPUTERS GMBH (1)
5,224,160 Process for securing and for checking the integrity of the secured programs 125 1992
 
GENERAL COMPUTER CORPORATION (1)
4,525,599 Software protection methods and apparatus 141 1982
 
GREEN WIRELESS LLC (1)
5,355,474 System for multilevel secure database management using a knowledge base with release-based and other security constraints for query, response and update modification 234 1991
 
Information Identification Company, Inc. (1)
4,217,588 Object monitoring method and apparatus 169 1978
 
INFOSPACE, INC. (1)
4,529,870 Cryptographic identification, financial transaction, and credential device 409 1982
 
INTELLECTUAL VENTURES FUND 83 LLC (1)
5,778,385 Link manager for managing links integrating data between application programs 28 1997
 
INTELLISYNC CORPORATION (1)
5,392,390 Method for mapping, translating, and dynamically reconciling data between disparate computer platforms 449 1992
 
INTER*ACT SYSTEMS, INCORPORATED (1)
5,373,440 Promotional game method and apparatus therefor 240 1992
 
INTERACTIVE HOME SYSTEMS (1)
5,721,788 Method and system for digital image signatures 595 1992
 
Interbank Card Association (1)
4,259,720 Security system for electronic funds transfer system 87 1978
 
Intermind Corporation (1)
6,044,205 Communications system for transferring information between memories according to processes transferred with the information 348 1996
 
International Business Systems, Incorporated (1)
5,734,719 Digital information accessing, delivery and production system 377 1996
 
IPG HEALTHCARE 501 LIMITED (1)
5,335,346 Access control policies for an object oriented database, including access control lists which span across object boundaries 264 1991
 
Kabushiki Kaisha Sega Enterprises (1)
5,371,792 CD-ROM disk and security check method for the same 180 1993
 
KABUSHIKI KAISHA TOSHIBA (1)
5,485,622 Password processing system for computer 79 1992
 
KENT RIDGE DIGITAL LABS (1)
5,499,298 Controlled dissemination of digital information 192 1994
 
Key Logic, Inc. (1)
4,584,639 Computer security system 129 1983
 
KOKUSAI DENSHIN DENWA KABUSHIKI KAISHA (1)
5,508,913 Electronic automatic offer matching system for freezer exchange transactions among banks 147 1994
 
L'ETAT FRANCAIS, REPRESENTE PAR SECRETAIRE D'ETAT POSTES ET TELECOMMUNICATIONS (CENTRE NATIONAL D'ETUDES DES TELECOMMUNICATION) (1)
4,337,483 Text video-transmission system provided with means for controlling access to the information 235 1980
 
L'ETAT FRANCIS, REPRESENTE PAR LE SECRETAIRE D'ETAT AUX POSTES ET TELECOMMUNICATIONS (CENTRE NATIONAL D'ETUDES DES DES TELECOMMMUNICATIONS) (1)
4,323,921 System for transmitting information provided with means for controlling access to the information transmitted 347 1980
 
LANRALD DATA MGMT. NV, LLC (1)
5,065,429 Method and apparatus for protecting material on storage media 234 1990
 
LEGERITY, INC. (1)
5,199,074 Encryption system 41 1992
 
LOCKHEED MARTIN CORPORATION (1)
5,343,527 Hybrid encryption method and system for protecting reusable software components 289 1993
 
LUCENT TECHNOLOGIES INC. (1)
5,629,770 Document copying deterrent method using line and word shift techniques 147 1995
 
MAAST PARTNERS LTD, A CALIFORNIA LIMITED PARTNERSHIP (1)
4,484,217 Method and system for remote reporting, particularly for pay television billing 287 1982
 
MACROVISION CORPORATION (1)
5,315,448 Copy protection for hybrid digital video tape recording and unprotected source material 224 1993
 
MATRA COMMUNICATION, SOCIETE ANONYME (1)
5,280,479 Device for insertion of digital packets in a transmission channel 74 1992
 
MCAFEE, INC. (1)
5,361,359 System and method for controlling the use of a computer 199 1992
 
MEDIABAY. COM, INC. (1)
4,528,643 System for reproducing information in material objects at a point of sale location 675 1983
 
MEDIADNA,COM (1)
5,845,281 Method and system for managing a data object so as to comply with predetermined conditions for usage 347 1996
 
Medical Payment Systems, Incorporated (1)
4,858,121 Medical payment system 350 1986
 
MICRONYX, INC. (1)
4,864,616 Cryptographic labeling of electronically stored data 130 1987
 
MONDEX INTERNATIONAL LIMITED (1)
5,440,634 Value transfer system 213 1993
 
MOTOROLA MOBILITY LLC (1)
5,678,170 Method and apparatus for monitoring and limiting distribution of data 60 1994
 
National Information Utilities Corporation (1)
4,768,087 Education utility 244 1985
 
NATIONAL INSTRUMENTS CORPORATION (1)
6,102,965 System and method for providing client/server access to graphical programs 96 1997
 
NATIONAL RURAL TELECOMMUNICATIONS COOPERATIVE (1)
4,893,248 Monitoring and reporting system for remote terminals 268 1987
 
NEW AURORA CORPORATION (1)
5,671,279 Electronic commerce using a secure courier system 590 1995
 
NEWFREY LLC (1)
5,996,756 Yarn supply apparatus and clutch arrangement therefor 8 1998
 
NEXTLEVEL SYSTEM OF DELAWARE (1)
5,010,571 Metering retrieval of encrypted data stored in customer data retrieval terminal 392 1986
 
NINTENDO CO., LTD. (1)
4,305,131 Dialog between TV movies and human viewers 538 1980
 
North American Philips Corporation (1)
4,442,486 Protected programmable apparatus 178 1981
 
NOVA BIOMEDICAL CORPORATION (1)
4,975,647 Controlling machine operation with respect to consumable accessory units 189 1988
 
OPENTV, INC. (1)
5,625,693 Apparatus and method for authenticating transmitting applications in an interactive TV system 165 1995
 
ORACLE INTERNATIONAL CORPORATION (1)
5,754,849 Self-describing object providing dynamic manipulation of heterogeneous data values and semantic identity between memory and transmission representations 195 1996
 
PACKETVIDEO CORPORATION (1)
5,636,276 Device for the distribution of music information in digital form 425 1995
 
Panafacom Limited (1)
4,701,846 Computer system capable of interruption using special protection code for write interruption region of memory device 63 1986
 
PANASONIC ELECTRIC WORKS CO., LTD. (1)
6,085,238 Virtual LAN system 360 1997
 
PARKER-HANNIFIN CORPORATION (1)
5,473,692 Roving software license for a hardware agent 538 1994
 
PENTA SYSTEMS INTERNATIONAL, IN., A CORP OF MD (1)
4,458,315 Apparatus and method for preventing unauthorized use of computer programs 294 1982
 
Pioneer Electronic Corporation (1)
5,940,505 Information recording method and apparatus, function recording method and apparatus, and information reproducing method and apparatus 48 1996
 
PREVIEW SOFTWARE (1)
4,658,093 Software distribution system 747 1983
 
Pride Software Development Corp. (1)
4,796,220 Method of controlling the copying of software 365 1986
 
PRIME COMPUTER, INC. (1)
4,924,378 License mangagement system and license storage key 421 1988
 
PTT Research (1)
5,504,837 Method for resolving conflicts among distributed entities through the generation of counter proposals by transversing a goal hierarchy with acceptable, unacceptable, and indeterminate nodes 180 1993
 
PUBLIC ESTABLISHMENT (1)
4,816,655 Method and apparatus for checking the authenticity of individual-linked documents and the identity of the holders thereof 103 1986
 
PUBLIC KEY PARTNERS (1)
4,995,082 Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system 202 1990
 
Pueblo Technologies, Inc. (1)
4,685,056 Computer security device 184 1985
 
QMS, INC. (1)
4,888,798 Modular software security 229 1986
 
QUALCOMM INCORPORATED (1)
5,103,459 System and method for generating signal waveforms in a CDMA cellular telephone system 1570 1990
 
RAINBOW TECHNOLOGIES, INC. (1)
4,593,353 Software protection method and apparatus 227 1981
 
RAKUTEN, INC. (1)
5,455,953 Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket 406 1993
 
RAYTHEON BBN TECHNOLOGIES CORP. (1)
5,319,735 Embedded signalling 598 1991
 
Remote Systems, Inc. (1)
4,652,990 Protected software access control apparatus and method 214 1983
 
RESPONSE REWARDS SYSTEMS, L.C. (1)
5,759,101 Central and remote evaluation of responses of participatory broadcast audience with automatic crediting and couponing 279 1994
 
Romox, Inc. (1)
4,680,731 Reprogrammable cartridge memory with built-in identification circuitry and programming method 91 1986
 
ROUND ROCK RESEARCH, LLC (1)
5,577,209 Apparatus and method for providing multi-level security for communication among computers and terminals on a network 263 1994
 
RUNTIME INNOVATIONS LIMITED, 1.02 KELVIN CAMPUS, WEST OF SCOTLAND SCIENCE PARK, GLASGOW, G20 OSP, (1)
4,868,736 Code operated access control system for electronic data store 44 1987
 
SACHIKO OKANO (1)
5,504,818 Information processing system using error-correcting codes and cryptography 212 1994
 
SAFENET, INC. (1)
5,337,357 Method of software distribution protection 288 1993
 
SAMSUNG ELECTRONICS CO., LTD. (1)
4,494,156 Selectable format computer disk copier machine 164 1982
 
Sangamo Weston, Inc. (1)
4,361,877 Billing recorder with non-volatile solid state memory 187 1980
 
SEAGATE TECHNOLOGY LLC (1)
5,408,501 Data transfer system 33 1993
 
SECURE COMPUTING TECHNOLOGY CORPORATION (1)
5,276,735 Data enclave and trusted path system 342 1992
 
SECURE-TIME, INC., A CORP OF IDAHO (1)
4,700,296 Electronic access control system 117 1985
 
Securities Dynamics Technologies, Inc. (1)
5,237,614 Integrated network security system 330 1991
 
SECURITY SOFTWARE AMERICA, INC., A CORP. OF DE (1)
4,757,533 Security system for microcomputers 236 1985
 
SGS-THOMSON MICROELECTRONICS, INC. (1)
4,609,985 Microcomputer with severable ROM 39 1982
 
SILANIS TECHNOLOGY INC. (1)
5,606,609 Electronic document verification system and method 623 1994
 
SILICON GRAPHICS INTERNATIONAL, CORP. (1)
5,390,330 Control system and method for direct execution of software application information models without code generation 149 1993
 
SMITH ENGINEERING, A SOLE PROPRIETORSHIP (1)
4,462,076 Video game cartridge recognition and security system 233 1982
 
Software Concepts, Inc. (1)
4,740,890 Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media 360 1983
 
SOFTWARE SECURITY, INC. (1)
4,562,306 Method and apparatus for protecting computer software utilizing an active coded hardware device 211 1983
 
Special Effects Software, Inc. (1)
5,199,066 Method and apparatus for protecting software 189 1989
 
SPYRUS, INC. (1)
5,457,746 System and method for access control for portable data storage media 401 1994
 
ST. PATENT HOLDINGS LLC (1)
5,509,070 Method for encouraging purchase of executable and non-executable software 512 1992
 
STANDARD MICROSYSTEMS CORPORATION (1)
4,513,174 Software security method using partial fabrication of proprietary control word decoders and microinstruction memories 160 1981
 
STAR CO RANGER DIGITAL, LLC (1)
2004/0095,382 Portable memory drive retaining personalized interface on multiple host computers 1 2002
 
STEVEN M. HOFFBERG 2004-1 GRAT (1)
2002/0151,992 Media recording device with packet data interface 2 2002
 
STRATEGIC PROCESSING CORPORATION (1)
4,799,156 Interactive market management system 1690 1986
 
SURETY, LLC (1)
5,373,561 Method of extending the validity of a cryptographic certificate 216 1992
 
SYBASE, INC. (1)
5,572,673 Secure multi-level system for executing stored procedures 160 1993
 
SYMANTEC CORPORATION (1)
5,530,752 Systems and methods for protecting software from unlicensed copying and use 120 1994
 
TAGAWA, RICHARD S. (1)
5,732,398 Self-service system for selling travel-related services or products 378 1995
 
TESTDRIVE CORPORATION (1)
5,341,429 Transformation of ephemeral material 389 1992
 
THE BOARD OF TRUSTEES OF THE LELAND STANFORD JUNIOR UNIVERSITY (1)
4,309,569 Method of providing digital signatures 214 1979
 
The Marconi Company Limited (1)
4,232,193 Message signal scrambling apparatus 152 1978
 
The United States of America as represented by the Secretary of the Army (1)
5,422,645 Delayed laser retroreflector pulse technique and system 19 1994
 
THOMSON LICENSING (1)
6,141,753 Secure distribution of digital representations 210 1998
 
THORN EMI PLC (1)
5,079,648 Marked recorded signals 195 1989
 
Tibco, Inc. (1)
5,557,798 Apparatus and method for providing decoupling of data exchange details for providing high performance communication between software processes 454 1990
 
TITAN CORPORATION, THE (1)
4,712,238 Selective-subscription descrambling 236 1984
 
Tokyo Electric Co., Ltd. (1)
4,220,991 Electronic cash register with removable memory packs for cashier identification 179 1978
 
Tokyo Shibaura Denki Kabushiki Kaisha (1)
4,593,183 Automatic transaction machine 99 1983
 
TRAFALGAR INDUSTRIES, INC. (MERGED INTO) (1)
4,265,371 Foodstuff vending apparatus employing improved solid-state type control apparatus 72 1978
 
U S WEST TECHNOLOGIES, INC. (1)
5,550,971 Method and system for generating a user interface adaptable to various database management systems 183 1995
 
UNICATE B.V. (1)
5,354,097 Security of objects or documents 74 1992
 
UNILOC LUXEMBOURG S. A. (1)
5,490,216 System for software registration 204 1993
 
UNISYS CAD/CAM (1)
4,683,968 System for preventing software piracy employing multi-encrypted keys and single decryption circuit modules 79 1985
 
UNISYS CORPORATION (1)
5,111,390 Software security system for maintaining integrity of compiled object code by restricting users ability to define compilers 103 1988
 
UNITRAC, LLC (1)
5,521,815 Uniform system for verifying and tracking articles of value 188 1993
 
UP TWO, INC. (1)
5,640,546 Composition of systems of objects by interlocking coordination, projection, and distribution 128 1995
 
VAN DETSAN NETWORKS LIMITED LIABILITY COMPANY (1)
4,926,480 Card-computer moderated systems 330 1988
 
Verbatim Corporation (1)
4,562,495 Multiple system disk 144 1984
 
VERIZON PATENT AND LICENSING INC. (1)
4,919,545 Distributed security procedure for intelligent networks 161 1988
 
VIDEO-ON-DEMAND VENTURES LLC (1)
4,949,187 Video communications system having a remotely controlled central source of video and audio data 755 1988
 
VISA U.S.A. INC. (1)
4,578,530 End-to-end encryption system and method of operation 298 1983
 
WEBVENTION GROUP LLC (1)
5,251,294 Accessing, assembling, and using bodies of information 122 1990
 
Westinghouse Electric Corp. (1)
4,649,515 Methods and apparatus for system fault diagnosis and control 247 1986
 
WISCONSIN ALUMNI RESEARCH FOUNDATION (1)
4,375,579 Database encryption and decryption circuit and method using subkeys 180 1980
 
WISTRON CORPORATION (1)
6,983,371 Super-distribution of protected digital content 120 2000
 
Xidak, Inc. (1)
5,201,046 Relational database management system and method for storing, retrieving and modifying directed graph data structures 182 1990
 
YT ACQUISITION CORPORATION (1)
7,152,045 Tokenless identification system for authorization of electronic transactions and electronic transmissions 64 2002
 
Other [Check patent profile for assignment information] (36)
4,270,182 Automated information input, storage, and retrieval system 198 1974
4,246,638 Method and apparatus for controlling usage of a programmable computing machine 70 1978
4,232,317 Quantized hyperbolic and inverse hyperbolic object location system 90 1978
4,670,857 Cartridge-controlled system whose use is limited to authorized cartridges 129 1981
4,528,588 Method and apparatus for marking the information content of an information carrying signal 458 1982
4,523,271 Software protection method and apparatus 50 1982
4,462,078 Computer program protection method 158 1982
4,558,176 Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software 369 1982
4,553,252 Counting computer software cartridge 149 1982
4,593,376 System for vending program cartridges which have circuitry for inhibiting program usage after preset time interval expires 302 1983
4,573,119 Computer software protection system 77 1983
4,584,641 Copyprotecting system for software protection 209 1983
4,677,552 International commodity trade exchange 578 1984
4,595,950 Method and apparatus for marking the information content of an information carrying signal 357 1984
4,688,169 Computer software security system 221 1985
4,823,264 Electronic funds transfer system 562 1986
4,748,561 Method of protecting computer software 60 1986
4,747,139 Software security method and systems 238 1986
4,796,181 Billing system for computer software 241 1986
4,999,806 Software distribution system 487 1987
4,868,877 Public key/signature cryptosystem with enhanced digital signature certification 396 1988
5,047,928 Billing system for computer software 358 1989
5,005,200 Public key/signature cryptosystem with enhanced digital signature certification 363 1989
5,001,752 Public/key date-time notary facility 206 1989
5,163,091 Knowledge based system for document authentication (apparatus) 87 1990
5,136,643 Public/key date-time notary facility 213 1990
5,150,407 Secured data storage devices 119 1991
5,185,717 Tamper resistant module having logical elements arranged in multiple layers on the outer surface of a substrate to protect stored information 117 1992
5,214,702 Public key/signature cryptosystem with enhanced digital signature certification 275 1992
5,422,953 Personal date/time notary device 153 1993
5,390,247 Method and apparatus for creating, supporting, and using travelling programs 166 1993
5,337,360 Method and apparatus for creating, supporting, and using travelling programs 160 1994
5,689,566 Network with secure communications sessions 233 1995
5,692,980 Kick bag game and apparatus kit 16 1996
5,748,960 Method and apparatus for validating travelling object-oriented programs with digital signatures 137 1996
5,842,173 Computer-based surgical services management system 110 1997

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
MICROSOFT CORPORATION (2)
8,284,942 Persisting private/public key pairs in password-encrypted files for transportation to local cryptographic store 2 2004
8,792,721 Image recognition of content 0 2013
 
COCOON DATA HOLDINGS LIMITED (1)
8,806,207 System and method for securing data 0 2008
 
VODAFONE GROUP PLC (1)
8,600,060 Telecommunications device security 0 2007

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
3.5 Year Payment $1600.00 $800.00 $400.00 Oct 12, 2014
7.5 Year Payment $3600.00 $1800.00 $900.00 Oct 12, 2018
11.5 Year Payment $7400.00 $3700.00 $1850.00 Oct 12, 2022
Fee Large entity fee small entity fee micro entity fee
Surcharge - 3.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 7.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00