US Patent No: 7,930,756

Number of patents in Portfolio can not be more than 2000

Multi-level cryptographic transformations for securing digital assets

Stats

See full text
ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

Enhanced multi-level cryptographic transformations that secure electronic files are disclosed. The secured electronic files contain not only secured data but also security information. The security information includes cryptographic structure information, access rules and secrets (e.g., keys). The cryptographic structure information explains the multi-level cryptographic transformations associated with securing or unsecuring the electronic files. The access rules and the secrets are used by the cryptographic transformations to secure the electronic files. Since the secured electronic files contain the cryptographic structure information, the particular cryptographic transformations (including their sequencing) can vary with each electronic file, if so desired. Typically, the secured electronic files are secured and managed by a file security system, such as a distributed security system.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Related Publications

Loading Related Publications... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTELLECTUAL VENTURES I LLCDENKENDORF1672

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Crocker, Steven Toye Redwood City, CA 6 184
Garcia, Denis Jacques Paul Palo Alto, CA 18 309

Cited Art Landscape

Patent Info (Count) # Cites Year
 
MICROSOFT CORPORATION (51)
5,732,265 Storage optimizing encoder and method 83 1995
5,719,941 Method for changing passwords on a remote computer 104 1996
6,055,314 System and method for secure purchase and delivery of video content programs 503 1996
5,757,920 Logon certification 169 1997
5,978,802 System and method for providing opportunistic file access in a network environment 45 1997
6,134,658 Multi-server location-independent authentication certificate management system 129 1997
6,272,631 Protected storage of core data secrets 111 1997
6,031,584 Method for reducing digital video frame frequency while maintaining temporal smoothness 31 1997
6,044,155 Method and system for securely archiving core data secrets 138 1997
6,308,273 Method and system of security location discrimination 328 1998
6,505,300 Method and system for secure running of untrusted content 220 1998
6,289,458 Per property access control mechanism 53 1998
6,466,932 System and method for implementing group policy 222 1999
6,775,779 Hierarchical trusted code for content protection in computers 101 1999
6,584,466 Internet document management system and methods 193 1999
6,801,999 Passive and active software objects containing bore resistant watermarking 128 1999
6,389,433 Method and system for automatically merging files into a single instance store 209 1999
6,477,544 Single instance store for file systems 231 1999
6,810,479 System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer 59 2000
6,834,341 Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet 162 2000
6,971,018 File protection service for a computer system 77 2000
6,349,337 Maintaining a first session on a first computing device and subsequently connecting to the first session via different computing devices and adapting the first session to conform to the different computing devices system configurations 95 2000
6,891,953 Method and system for binding enhanced software features to a persona 84 2000
7,035,910 System and method for document isolation 60 2000
6,976,259 Method for abstract state transitions without requiring state machine knowledge 20 2000
2001/0032,181 System and method for secure third-party development and hosting within a financial services network 95 2000
7,058,978 Security component for a computing device 58 2000
7,013,332 Distributed policy model for access control 50 2001
2002/0194,484 On-disk file format for serverless distributed file system with signed manifest of file modifications 79 2001
7,043,637 On-disk file format for a serverless distributed file system 63 2001
7,478,243 On-disk file format for serverless distributed file system with signed manifest of file modifications 19 2001
7,073,063 Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like 105 2001
6,754,657 Time stamping of database records 47 2001
7,287,058 Methods, systems and computer program products for performing document-inclusion operations over a network 20 2002
2003/0182,584 Systems and methods for setting and resetting a password 49 2002
7,509,492 Distributed scalable cryptographic access control 25 2002
7,000,150 Platform for computer process monitoring 39 2002
2003/0233,650 Visual group interface for group connectivity 75 2002
6,950,818 System and method for implementing group policy 108 2002
6,938,042 Peer-to-peer file sharing 94 2002
2004/0098,580 State reference 47 2002
7,383,586 File system operation and digital rights management (DRM) 43 2003
2005/0091,289 File sharing in P2P group shared spaces 52 2003
2005/0198,326 Invalid policy detection 47 2004
2004/0243,853 System and method for improved network security 42 2004
2006/0075,465 Rule-driven specification of Web Service policy 46 2004
2005/0256,909 Peer-to-peer file sharing 99 2004
7,401,220 On-disk file format for a serverless distributed file system 39 2004
7,415,608 On-disk file format for a serverless distributed file system 38 2004
7,454,612 On-disk file format for a serverless distributed file system 23 2004
7,539,867 On-disk file format for a serverless distributed file system 21 2004
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (48)
4,203,166 Cryptographic file security for multiple domain networks 181 1977
4,238,854 Cryptographic file security for single domain networks 143 1977
4,887,204 System and method for accessing remote files in a distributed networking environment 275 1987
5,032,979 Distributed security auditing subsystem for an operating system 305 1990
5,319,705 Method and system for multimedia access control enablement 657 1992
5,414,852 Method for protecting data in a computer system 148 1992
5,689,688 Probabilistic anonymous clock synchronization method and apparatus for synchronizing a local time scale with a reference time scale 74 1993
5,461,710 Method for providing a readily distinguishable template and means of duplication thereof in a computer system graphical user interface 143 1994
5,535,375 File manager for files shared by heterogeneous clients 192 1994
5,821,933 Visual access to restricted functions represented on a graphical user interface 119 1995
5,787,169 Method and apparatus for controlling access to encrypted data files in a computer system 86 1995
5,778,065 Method and system for changing an authorization password or key in a distributed communication network 105 1996
5,870,468 Enhanced data privacy for portable computers 87 1996
5,673,316 Creation and distribution of cryptographic envelope 461 1996
6,032,216 Parallel file system with method using tokens for locking modes 222 1997
6,035,404 Concurrent user access control in stateless network computing service system 55 1997
6,405,315 Decentralized remotely encrypted file system 144 1997
6,105,131 Secure server and method of operation for a distributed information system 130 1997
6,141,754 Integrated method and system for controlling information access and distribution 259 1997
6,260,040 Shared file system for digital content 102 1998
6,088,805 Systems, methods and computer program products for authenticating client requests with client certificate information 103 1998
6,199,070 Using a database for program logs 34 1998
6,282,649 Method for controlling access to electronically provided services and system for implementing such method 84 1998
6,442,695 Establishment of user home directories in a heterogeneous network environment 46 1998
6,587,878 System, method, and program for measuring performance in a network system 65 1999
6,598,161 Methods, systems and computer program products for multi-level encryption 146 1999
6,961,849 Selective data encryption using style sheet processing for decryption by a group clerk 73 1999
6,950,943 System for electronic repository of data enforcing access control on data search and retrieval 62 1999
7,237,002 System and method for dynamic browser management of web site 68 2000
7,099,926 Object caching and update queuing technique to improve performance and resource utilization 55 2000
6,947,556 Secure data storage and retrieval with key management and user authentication 122 2000
7,010,689 Secure data storage and retrieval in a client-server environment 97 2000
6,978,366 Secure document management system 46 2000
6,647,388 Access control system, access control method, storage medium and program transmission apparatus 111 2000
2001/0034,839 Method and apparatus for secure transmission of data and applications 107 2000
2002/0133,735 System and method for efficient failover/failback techniques for fault-tolerant data storage system 5 2001
6,959,308 Archiving and retrieval method and apparatus 45 2001
7,280,658 Systems, methods, and computer program products for accelerated dynamic protection of data 38 2001
2003/0051,039 Apparatus and method for awarding a user for accessing content based on access rights information 48 2001
6,892,201 Apparatus and method for providing access rights information in a portion of a file 67 2001
2003/0115,570 Development environment for building software applications that mimics the target environment 43 2001
2002/0136,317 Block coding for multilevel data communication 3 2002
7,035,854 Content management system and methodology employing non-transferable access tokens to control data access 48 2002
2003/0154,296 Transmission control system, server, terminal station, transmission control method, program and storage medium 15 2002
6,842,825 Adjusting timestamps to preserve update timing information for cached data objects 66 2002
7,120,635 Event-based database access execution 48 2002
2005/0039,034 Security containers for document components 79 2003
7,130,964 Object caching and update queuing technique to improve performance and resource utilization 46 2004
 
INTELLECTUAL VENTURES I LLC (28)
2004/0103,202 System and method for providing distributed access control to secured items 68 2002
7,260,555 Method and architecture for providing pervasive security to digital assets 59 2002
7,380,120 Secured data format for access control 66 2002
7,681,034 Method and apparatus for securing electronic data 23 2002
6,931,597 Indications of secured digital assets 48 2002
7,631,184 System and method for imposing security on copies of secured items 24 2002
2003/0110,397 Guaranteed delivery of changes to security policies in a distributed system 80 2002
7,478,418 Guaranteed delivery of changes to security policies in a distributed system 27 2002
7,565,683 Method and system for implementing changes to security policies in a distributed security system 25 2002
7,729,995 Managing secured files in designated locations 20 2002
2003/0120,684 System and method for providing manageability to security information for secured items 48 2002
7,562,232 System and method for providing manageability to security information for secured items 24 2002
7,512,810 Method and system for protecting encrypted files transmitted over a network 29 2002
2004/0064,710 Document security system that permits external users to gain access to secured files 44 2002
7,730,543 Method and system for enabling users of a group shared across multiple file security systems to access secured files 18 2003
7,555,558 Method and system for fault-tolerant transfer of files across a network 18 2003
2005/0071,275 Method and apparatus for transitioning between states of security policies used to secure electronic documents 40 2003
2005/0071,658 Method and system for securing digital assets using process-driven security policies 54 2003
7,703,140 Method and system for securing digital assets using process-driven security policies 20 2003
2005/0086,531 Method and system for proxy approval of security changes for a file security system 39 2003
2005/0138,371 Method and system for distribution of notifications in file security systems 39 2003
2005/0138,383 Method and system for validating timestamps 46 2003
7,702,909 Method and system for validating timestamps 19 2003
2005/0223,242 Method and system for providing document retention using cryptography 60 2004
2005/0223,414 Method and system for providing cryptographic document retention with off-line access 59 2004
7,748,045 Method and system for providing cryptographic document retention with off-line access 17 2004
7,707,427 Multi-level file digests 18 2004
2010/0199,088 Method and System For Securing Digital Assets Using Process-Driven Security Policies 17 2010
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (16)
5,212,788 System and method for consistent timestamping in distributed computer databases 83 1990
5,204,897 Management interface for license management system 495 1992
5,923,754 Copy protection for recorded media 89 1997
6,611,599 Watermarking of digital object 99 1997
6,148,338 System for logging and enabling ordered retrieval of management events 71 1998
6,550,011 Media content protection utilizing public key cryptography 270 1999
7,340,600 Authorization infrastructure based on public key cryptography 47 2000
2002/0077,988 Distributing digital content 129 2000
2003/0005,168 System and method for auditing system call events with system call wrappers 26 2001
2003/0009,685 System and method for file system mandatory access control 57 2001
2003/0078,959 Deployment of business logic software and data content onto network servers 79 2001
7,003,116 System for encrypted file storage optimization via differentiated key lengths 18 2001
7,171,557 System for optimized key management with file groups 47 2001
7,203,317 System for enabling lazy-revocation through recursive key generation 45 2001
2002/0120,851 Device and method for data timestamping 25 2002
7,219,230 Optimizing costs associated with managing encrypted data 37 2002
 
EMC CORPORATION (13)
5,661,668 Apparatus and method for analyzing and correlating events in a system using a causality matrix 175 1996
6,249,755 Apparatus and method for event correlation and problem reporting 163 1997
6,192,408 Network file server sharing local caches of file access information in data processors assigned to respective file systems 234 1997
6,314,408 Method and apparatus for controlling access to a product 100 1998
6,615,350 Module authentication and binding library extensions 98 1999
6,289,450 Information security architecture for encrypting documents for remote access while maintaining access control 133 1999
6,978,376 Information security architecture for encrypting documents for remote access while maintaining access control 68 2000
6,339,825 Method of encrypting information for remote access while maintaining access control 88 2001
2002/0029,340 Method of encrypting information for remote access while maintaining access control 54 2001
2002/0178,271 Dynamic file access control and management 150 2001
7,024,427 Virtual file system 114 2001
7,249,251 Methods and apparatus for secure modification of a retention period for data in a storage system 24 2004
7,107,185 Apparatus and method for event correlation and problem reporting 34 2005
 
MCAFEE, INC. (12)
5,502,766 Data enclave and trusted path system 231 1993
5,499,297 System and method for trusted path communications 112 1994
5,557,765 System and method for data recovery 187 1995
5,745,573 System and method for controlling access to a user secret 125 1997
6,272,632 System and method for controlling access to a user secret using a key recovery field 108 1998
6,357,010 System and method for controlling access to documents stored on an internal network 142 1998
6,453,419 System and method for implementing a security policy 103 1998
7,308,702 Locally adaptable central security management in a heterogeneous network environment 56 2000
6,826,698 System, method and computer program product for rule based network security policies 98 2000
6,640,307 System and method for controlling access to documents stored on an internal network 84 2000
6,920,558 Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system 78 2001
7,159,036 Updating data from a source computer to groups of destination computers 89 2001
 
Entrust Technologies Limited (9)
6,603,857 Method and apparatus for controlling release of time sensitive information 52 1997
6,370,249 Method and apparatus for public key management 78 1997
6,442,688 Method and apparatus for obtaining status of public key certificate updates 59 1997
5,968,177 Method and apparatus for processing administration of a secured community 61 1997
6,134,327 Method and apparatus for creating communities of trust in a secure communication system 74 1997
6,341,164 Method and apparatus for correcting improper encryption and/or for reducing memory storage 46 1998
6,266,420 Method and apparatus for secure group communications 128 1998
6,574,733 Centralized secure backup system and method 44 1999
6,567,914 Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system 101 2000
 
ORACLE INTERNATIONAL CORPORATION (9)
6,158,010 System and method for maintaining security in a distributed computer network 332 1999
6,591,295 Methods and apparatus for using multimedia data stored in a relational database in web applications 70 1999
6,968,456 Method and system for providing a tamper-proof storage of an audit trail in a database 23 2000
6,941,472 System and method for maintaining security in a distributed computer network 70 2001
7,080,077 Localized access 133 2001
7,194,764 User authentication 88 2001
7,185,364 Access system interface 119 2001
6,816,871 Delivering output XML with dynamically selectable processing 79 2001
7,225,256 Impersonation in an access system 54 2001
 
TECSEC, INCORPORATED (9)
5,369,702 Distributed cryptographic object method 228 1993
5,717,755 Distributed cryptographic object method 61 1994
5,680,452 Distributed cryptographic object method 110 1995
5,787,173 Cryptographic key management method and apparatus 72 1997
5,898,781 Distributed cryptographic object method 58 1997
6,490,680 Access control and authorization system 170 1998
6,542,608 Cryptographic key split combiner 65 2001
6,549,623 Cryptographic key split combiner 51 2002
2003/0172,280 Access control and authorization system 56 2002
 
GOOGLE INC. (8)
5,495,533 Personal key archive 315 1994
5,778,350 Data collection, processing, and reporting system 55 1995
7,058,696 Internet-based shared file service with native PC client access and semantics 92 2000
7,136,903 Internet-based shared file service with native PC client access and semantics and distributed access control 106 2000
2002/0133,481 Methods and apparatus for providing search results in response to an ambiguous search query 37 2000
7,117,322 Method, system, and program for retention management and protection of stored objects 44 2003
7,146,388 Method, system, and program for archiving files 83 2003
7,107,416 Method, system, and program for implementing retention policies to archive records 80 2003
 
INTEL CORPORATION (8)
6,907,034 Out-of-band signaling for network based computer session synchronization 86 1999
6,317,777 Method for web based storage and retrieval of documents 235 1999
2002/0174,415 System and method for debugging distributed software environments 85 2001
6,957,261 Resource policy management using a centralized policy data structure 108 2001
2003/0196,096 Microcode patch authentication 49 2002
7,343,488 Method and apparatus for providing discrete data storage security 13 2002
2004/0193,912 Methods and systems for managing security policies 81 2003
2007/0006,214 Updating machines while disconnected from an update source 43 2005
 
SONY CORPORATION (8)
6,978,377 Copy protection using detailed copy control information 43 2000
6,754,665 Information processing apparatus, information processing method, and storage medium 49 2000
7,073,073 Data providing system, device, and method 84 2000
2003/0046,238 Data processing apparatus, data processing system, and data processing method therefor 118 2000
7,116,785 Data processing system, data processing method, and program providing medium 22 2001
7,319,752 Information recording device, information playback device, information recording method, information playback method, and information recording medium and program providing medium used therewith 45 2001
7,203,968 Method and apparatus for selectively executing information recording using a cognizant mode and a non-cognizant mode 48 2001
6,834,333 Data processing device, data storage device, data processing method, and program providing medium for storing content protected under high security management 43 2001
 
SUN MICROSYSTEMS, INC. (8)
5,708,709 System and method for managing try-and-buy usage of application programs 462 1995
6,295,361 Method and apparatus for multicast indication of group key change 95 1998
7,188,181 Universal session sharing 127 1999
6,308,256 Secure execution of program instructions provided by network interactions with processor 65 1999
6,363,480 Ephemeral decryptability 61 1999
6,915,435 Method and system for managing information retention 73 2000
6,931,450 Direct access from client to storage device 70 2000
6,941,456 Method, system, and program for encrypting files in a computer system 47 2001
 
CISCO TECHNOLOGY, INC. (7)
6,212,561 Forced sequential access to specified domains in a computer network 91 1998
6,038,322 Group key distribution 93 1998
6,405,318 Intrusion detection system 248 1999
6,629,243 Secure communications system 84 1999
6,961,855 Notification of modifications to a trusted computing base 24 1999
6,988,133 Method and apparatus for communicating network quality of service policy information to a plurality of policy enforcement points 91 2000
6,845,452 Providing security for external access to a protected computer network 56 2002
 
LUCENT TECHNOLOGIES INC. (7)
5,720,033 Security platform and method using object oriented rules for computer-based systems using UNIX-line operating systems 139 1995
6,069,957 Method and apparatus for providing hierarchical key system in restricted-access television system 63 1997
6,421,714 Efficient mobility management scheme for a wireless internet access system 206 1998
6,587,946 Method and system for quorum controlled asymmetric proxy encryption 51 1998
6,687,822 Method and system for providing translation certificates 59 1999
6,987,752 Method and apparatus for frequency offset estimation and interleaver synchronization using periodic signature sequences 20 1999
7,107,269 Methods and apparatus for providing privacy-preserving global customization 47 2001
 
ADOBE SYSTEMS INCORPORATED (5)
6,185,684 Secured document access control using recipient lists 98 1998
6,205,549 Encapsulation of public key cryptography standard number 7 into a secured document 50 1998
7,359,517 Nestable skeleton decryption keys for digital rights management 27 2001
7,434,048 Controlling access to electronic documents 59 2003
2005/0097,061 Offline access in a document control system 76 2003
 
ENTRUST, INC. (5)
5,850,443 Key management system for mixed-trust environments 122 1996
6,182,142 Distributed access management of information resources 422 1998
6,161,139 Administrative roles that govern access to administrative functions 410 1999
6,453,353 Role-based navigation of information resources 289 1999
6,339,423 Multi-domain access control 164 2000
 
GUARDIAN DATA STORAGE, LLC (5)
2003/0110,169 System and method for providing manageability to security information for secured items 62 2002
7,178,033 Method and apparatus for securing digital assets 57 2002
2003/0154,381 Managing file access via a designated place 51 2002
6,889,210 Method and system for managing security tiers 60 2003
2005/0071,657 Method and system for securing digital assets using time-based security criteria 49 2003
 
HITACHI, LTD. (5)
5,235,641 File encryption method and file cryptographic system 138 1991
6,023,506 Data encryption control apparatus and method 130 1996
6,816,969 Digital signature generating method and digital signature verifying method 23 2001
6,882,994 Method and system for querying database, as well as a recording medium for storing a database querying program 30 2001
7,120,757 Storage management integrated system and storage control method for storage management integrated system 113 2002
 
KABUSHIKI KAISHA TOSHIBA (5)
5,835,601 File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing 139 1995
5,944,794 User identification data management scheme for networking computer systems using wide area network 174 1995
6,085,323 Information processing system having function of securely protecting confidential information 108 1997
6,332,025 Software distribution system and software utilization scheme for improving security and user convenience 103 2000
6,993,135 Content processing system and content protecting method 51 2001
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (5)
6,240,188 Distributed group key management scheme for secure many-to-many communication 112 1999
7,146,498 Computer and program recording medium 42 2000
2002/0129,235 Digital data distributing system 61 2001
2004/0064,507 Information providing system and device constituting the same 27 2003
2005/0177,858 Reproduction apparatus and digest reproduction method 38 2004
 
SYMANTEC CORPORATION (5)
5,052,040 Multiple user stored data cryptographic labeling system and method 191 1990
5,699,428 System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-threaded operating system under which applications run in real-time 101 1996
5,953,419 Cryptographic file labeling system for supporting secured access by multiple users 96 1996
7,139,399 Cryptographic system with methods for user-controlled message recovery 21 2001
7,197,638 Unified permissions control for remotely and locally stored files whose informational content may be protected by smart-locking and/or bubble-protection 36 2001
 
CANON KABUSHIKI KAISHA (4)
5,684,987 Management system of multimedia 47 1994
5,922,073 System and method for controlling access to subject data using location data associated with the subject data and a requesting device 105 1996
6,862,103 Network print system, and information processing apparatus and its control method 47 2000
6,898,627 Communication device having the capability of performing information exchange between a facsimile medium and an electronic information medium such as an e-mail medium 20 2000
 
FUJITSU LIMITED (4)
7,051,213 Storage medium and method and apparatus for separately protecting data in different areas of the storage medium 55 1998
6,915,434 Electronic data storage apparatus with key management function and electronic data storage method 77 1999
7,046,807 Data administration method 39 2001
2002/0052,981 Method for suppressing a menu, method for controlling copying and moving of data and computer-readable recording medium recorded with program code for controlling a menu 17 2001
 
InterTrust Technologies Corp. (4)
5,892,900 Systems and methods for secure transaction management and electronic rights protection 1771 1996
6,253,193 Systems and methods for the secure transaction management and electronic rights protection 547 1998
7,233,948 Methods and apparatus for persistent control and protection of content 134 1999
2005/0177,716 Systems and methods for secure transaction management and electronic rights protection 53 2005
 
NEC CORPORATION (4)
5,606,663 Password updating system to vary the password updating intervals according to access frequency 87 1994
6,014,730 Dynamic adding system for memory files shared among hosts, dynamic adding method for memory files shared among hosts, and computer-readable medium recording dynamic adding program for memory files shared among hosts 54 1997
6,343,316 Cooperative work support system 55 1999
2004/0186,845 File system for managing files in tree structure allowing users to readily know availability condition 20 2004
 
SAMSUNG ELECTRONICS CO., LTD. (4)
6,892,306 Digital content cryptograph and process 58 1998
6,950,941 Copy protection system for portable storage media 110 1999
6,466,476 Data coding for multi-bit-per-cell memories having variable numbers of bits per memory cell 101 2001
2002/0035,624 Gateway and a method for operating the same 92 2001
 
APPLE INC. (3)
5,638,501 Method and apparatus for displaying an overlay image 172 1993
5,497,422 Message protection mechanism and graphical user interface therefor 116 1993
5,857,189 File sharing in a teleconference application 82 1996
 
DIGIMARC CORPORATION (3)
5,765,152 System and method for managing copyrighted electronic media 887 1995
6,807,534 System and method for managing copyrighted electronic media 171 2000
2002/0169,963 Digital watermarking apparatus, systems and methods 45 2001
 
LIQUID MACHINES, INC. (3)
6,625,734 Controlling and tracking access to disseminated information 91 1999
7,313,824 Method for protecting digital content from unauthorized use by automatically and dynamically integrating a content-protection agent 44 2002
2005/0028,006 Computer method and apparatus for managing data objects in a distributed context 55 2004
 
MITSUBISHI DENKI KABUSHIKI KAISHA (3)
5,689,718 System and method for processing document information using password protected icons that represent document content 64 1996
6,782,403 Inter-application data transmitting system and method 69 2000
7,227,953 MPEG data recorder having IEEE 1394 interface 38 2002
 
SAP AG (3)
6,058,424 System and method for transferring a session from one application server to another without losing existing resources 69 1997
2004/0254,884 Content catalog and application designer framework 42 2003
2007/0067,837 Method and transaction interface for secure data exchange between distinguishable networks 34 2006
 
SILICON VALLEY BANK (3)
5,751,287 System for organizing document icons with suggestions, folders, drawers, and cabinets 104 1995
5,790,790 Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof 674 1996
2005/0050,098 System and method for aligning data frames in time 20 2003
 
XEROX CORPORATION (3)
5,220,657 Updating local copy of shared data in a collaborative system 457 1991
5,781,711 Document server for processing a distribution job in a document processing system 54 1997
2002/0099,947 Secure content objects 62 2001
 
ALCATEL (2)
6,678,835 State transition protocol for high availability units 126 2000
6,944,183 Object model for network policy management 112 2000
 
ALEARO PROPERTIES LIMITED LIABILITY COMPANY (2)
7,281,272 Method and system for copyright protection of digital images 39 1999
7,076,469 Copyright protection of digital images transmitted over networks 40 2000
 
AT&T CORP. (2)
6,996,718 System and method for providing access to multiple user accounts via a common password 54 2000
6,381,698 System and method for providing assurance to a host that a piece of software possesses a particular property 59 2000
 
CONTENTGUARD HOLDINGS, INC. (2)
5,715,403 System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar 914 1994
6,519,700 Self-protecting documents 67 1998
 
ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE (2)
6,646,515 Isolator/circulator having propeller resonator loaded with a plurality of symmetric magnetic walls 37 2002
2003/0126,434 File security system using a security class and method for managing an encryption key 51 2002
 
FUJI XEROX CO., LTD. (2)
6,530,020 Group oriented public key encryption and key management system 69 1998
2003/0197,729 Systems and methods for displaying text recommendations during collaborative note taking 48 2002
 
INTELLECTUAL VENTURES II LLC (2)
5,933,498 System for controlling access and distribution of digital property 682 1997
6,314,409 System for controlling access and distribution of digital property 470 1998
 
IRDETO USA, INC. (2)
6,683,954 Key encryption using a client-unique additional key for fraud prevention 55 1999
2005/0021,467 Distributed digital rights network (drn), and methods to access operate and implement the same 80 2004
 
JDA SOFTWARE GROUP, INC (2)
7,013,485 Computer security system 64 2001
7,249,044 Fulfillment management system for managing ATP data in a distributed supply chain environment 110 2001
 
JPMORGAN CHASE BANK, N.A. (2)
6,070,244 Computer network security management system 259 1997
6,557,039 System and method for managing information retrievals from distributed archives 190 1999
 
LEVEL 3 COMMUNICATIONS, LLC (2)
6,226,618 Electronic content delivery system 1016 1998
6,779,031 Network architecture with event logging 40 1999
 
MCI COMMUNICATIONS CORPORATION (2)
6,909,708 System, method and article of manufacture for a communication system architecture including video conferencing 270 1996
7,145,898 System, method and article of manufacture for selecting a gateway of a hybrid communication system architecture 269 1996
 
NOKIA MOBILE PHONES LTD. (2)
2002/0129,236 VoIP terminal security module, SIP stack with security manager, system and security methods 16 2000
2002/0124,180 Security animation for display on portable electronic device 38 2001
 
PALO ALTO RESEARCH CENTER INCORPORATED (2)
2004/0088,548 System and method for providing secure resource management 67 2002
2004/0103,280 Method and system for securely Sharing files 110 2002
 
PRC INC. (2)
6,134,664 Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sources 117 1998
6,408,404 System and method for ensuring and managing situation awareness 61 1998
 
RICOH COMPANY, LTD. (2)
7,386,599 Methods and apparatuses for searching both external public documents and internal private documents in response to single search request 21 1999
6,693,652 System and method for automatic generation of visual representations and links in a hierarchical messaging system 87 2000
 
ROCKSTAR CONSORTIUM US LP (2)
5,825,876 Time based availability to content of a storage medium 212 1996
5,970,502 Method and apparatus for synchronizing multiple copies of a database 73 1996
 
RPX CORPORATION (2)
6,122,630 Bidirectional database replication scheme for controlling ping-ponging 152 1999
7,095,853 System and method for preventing an illegal copy of contents 48 2001
 
SCIENTIFIC-ATLANTA, INC. (2)
5,467,342 Methods and apparatus for time stamp correction in an asynchronous transfer mode network 137 1994
5,640,388 Method and apparatus for removing jitter and correcting timestamps in a packet stream 162 1995
 
SECRETSEAL INC. (2)
2003/0120,601 Dynamic evaluation of access rights 112 2002
2003/0217,281 System and method for imposing security on copies of secured items 37 2002
 
SECURIFY, INC. (2)
2002/0093,527 User interface for a security policy system and method 46 2001
2003/0061,506 System and method for security policy 135 2001
 
SIEBEL SYSTEMS, INC. (2)
2007/0192,478 System and method for configuring and viewing audit trails in an information network 22 2001
7,131,071 Defining an approval process for requests for approval 39 2002
 
SONY ELECTRONICS INC. (2)
6,223,285 Method and system for transferring information using an encryption mode indicator 92 1997
7,177,427 Method and system for transferring information using an encryption mode indicator 43 2000
 
TEXAS INSTRUMENTS INCORPORATED (2)
6,711,683 Compresses video decompression system with encryption of compressed data stored in video buffer 41 1999
7,187,033 Drain-extended MOS transistors with diode clamp and methods for making the same 44 2004
 
UNISYS CORPORATION (2)
5,682,537 Object lock management system with improved local lock management and global deadlock detection in a parallel data processing system 121 1995
6,446,090 Tracker sensing method for regulating synchronization of audit files between primary and secondary hosts 70 1999
 
ABB RESEARCH LTD. (1)
2004/0073,718 Time synchronization in computer network 56 2003
 
ACCENTURE GLOBAL SERVICES LIMITED (1)
7,003,560 Data warehouse computing system 174 2000
 
ACHIEVEMENT FIRST (1)
2010/0047,757 System and method for using interim-assessment data for instructional decision-making 17 2008
 
ACTIVISION PUBLISHING, INC. (1)
6,098,056 System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet 185 1997
 
ADV COMMUNICATIONS, INC. (1)
2004/0158,586 METHOD AND SYSTEM OF USING SHARED FILE FOR DATA COLLABORATION 48 2003
 
ADVANCED MICRO DEVICES, INC. (1)
6,571,291 Apparatus and method for validating and updating an IP checksum in a network switching system 47 2000
 
AGERE SYSTEMS GUARDIAN CORP. (1)
2002/0036,984 Method and apparatus for guaranteeing data transfer rates and enforcing conformance with traffic profiles in a packet network 42 2001
 
AGILENT TECHNOLOGIES, INC. (1)
6,751,573 Performance monitoring in distributed systems using synchronized clocks and distributed event logs 39 2000
 
AKAMAI TECHNOLOGIES, INC. (1)
7,096,266 Extending an Internet content delivery network into an enterprise 61 2002
 
ALIBABA GROUP HOLDING LIMITED (1)
6,393,420 Securing Web server source documents and executables 62 1999
 
Amano Corporation (1)
2003/0159,048 Time stamping system for electronic documents and program medium for the same 40 2003
 
AMERICA ONLINE, INC. (1)
2004/0199,514 Techniques for facilitating item sharing 52 2003
 
AMERICAN POWER CONVERSION CORPORATION (1)
2003/0132,949 User interface providing UPS information 24 2002
 
APPLE COMPUTER, INC. (1)
5,729,734 File privilege administration apparatus and methods 149 1995
 
ARBITRON INC. (1)
4,912,552 Distributed monitoring system 207 1988
 
ARCHITECTURE TECHNOLOGY CORPORATION (1)
7,496,959 Remote collection of computer forensic evidence 25 2003
 
ARL HOLDINGS LLC (1)
6,134,660 Method for revoking computer backup files using cryptographic techniques 184 1997
 
ARRIS ENTERPRISES, INC. (1)
6,865,555 System and method for providing conditional access to digital content 85 2001
 
ASSA ABLOY AB (1)
2006/0230,437 Secure digital credential sharing arrangement 49 2006
 
ATABOK JAPAN, INC. (1)
2002/0077,986 Controlling and managing digital assets 84 2001
 
AUTHENTICA SECURITY TECHNOLOGIES, INC. (1)
6,449,721 Method of encrypting information for remote access while maintaining access control 96 2001
 
AUTODESK, INC. (1)
5,570,108 Method and apparatus for display calibration and control 78 1995
 
AUTONOMY, INC. (1)
6,101,507 File comparison for data backup and file synchronization 98 1998
 
AZALEOS CORPORATION (1)
2004/0039,781 Peer-to-peer content sharing method and system 102 2002
 
BEA SYSTEMS, INC. (1)
2003/0217,333 System and method for rules-based web scenarios and campaigns 78 2002
 
BINFORMA GROUP LIMITED LIABILITY COMPANY (1)
2006/0149,407 Quality management and intelligent manufacturing with labels and smart tags in event-based product manufacturing 60 2006
 
Biolink Technologies International, Inc. (1)
6,487,662 Biometric system for biometric input, comparison, authentication and access control and method therefor 61 1999
 
BOMGAR (1)
2007/0294,368 METHOD AND SYSTEM FOR PROVIDING SECURE REMOTE ACCESS AND CONTROL 21 2007
 
Bottomline Technologies (DE) Inc. (1)
2002/0198,798 Modular business transactions platform 88 2001
 
BRAINSHIELD TECHNOLOGIES, INC. (1)
2003/0177,378 Apparatus and method for the decryption of an encrypted electronic document 41 2002
 
BRITISH TECHNOLOGY GROUP LIMITED (1)
4,799,258 Apparatus and methods for granting access to computers 158 1985
 
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (1)
2003/0014,391 Data distribution 104 2002
 
Bull HN Information Systems Inc. (1)
5,991,879 Method for gradual deployment of user-access security within a data processing system 61 1997
 
BULL S.A. (1)
6,968,060 Method for verifying the use of public keys generated by an on-board system 41 2000
 
CERTCO, INC. (1)
7,177,839 Reliance manager for electronic transaction system 38 2000
 
CGI TECHNOLOGIES AND SOLUTIONS INC. (1)
6,356,903 Content management system 137 1998
 
CHANG, CHUNG NAN (1)
5,835,592 Secure, swift cryptographic key exchange 49 1995
 
CHANTILLEY CORPORATION LIMITED (1)
5,768,381 Apparatus for key distribution in an encryption system 68 1996
 
Charles Smith Enterprises, LLC (1)
6,877,010 System and method for computer-assisted manual and automatic logging of time-based media 50 2001
 
ContractPal, Inc. (1)
7,698,230 Transaction architecture utilizing transaction policy statements 29 2003
 
Crest Industries, Inc. (1)
5,301,247 Method for ensuring secure communications 73 1992
 
CROWLEY, JOHN J. (1)
5,375,169 Cryptographic key management method and apparatus 114 1993
 
CURRENEX, INC. (1)
2002/0156,726 Using digital signatures to streamline the process of amending financial transactions 37 2001
 
CYBER-ARK SOFTWARE LTD. (1)
6,356,941 Network vaults 126 1999
 
Cysive, Inc. (1)
2003/0110,266 Apparatus and method of using session state data across sessions 84 2001
 
CYVA RESEARCH HOLDINGS, LLC (1)
5,987,440 Personal information security and exchange tool 319 1997
 
DIGITAL DOORS, INC. (1)
7,140,044 Data security system and method for separation of user communities 209 2001
 
EASTERN IX GROUP LLC (1)
5,999,907 Intellectual property audit system 192 1993
 
EFUNDS CORPORATION (1)
2003/0061,482 Software security control system and method 51 2002
 
ELECTRONIC PUBLISHING RESOURCES, INC. (1)
4,827,508 Database usage metering and protection system and method 874 1985
 
ELIAS ARTS, LLC (1)
2002/0112,035 System and method for performing content experience management 106 2001
 
ENTRUST LIMITED (1)
7,174,563 Computer network security system and method having unilateral enforceable security policy provision 90 2000
 
EPLUS CAPITAL, INC. (1)
2005/0288,961 Method for a server-less office architecture 60 2005
 
ERUCES, INC. (1)
7,362,868 Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data 33 2000
 
ETEL ACQUISITION CORP A WHOLLY OWNED SUBSIDIARY OF IP UNITY, A CALIFORNIA CORPORATION (1)
7,126,957 Media flow method for transferring real-time data between asynchronous and synchronous networks 28 2002
 
EVAULT, INC. (1)
7,134,041 Systems and methods for data backup over a network 49 2002
 
FACEBOOK, INC. (1)
6,633,311 E-service to manage and export contact information 83 2000
 
FELSHER, DAVID P., MR. (1)
7,181,017 System and method for secure three-party communications 300 2002
 
FIRST DATA CORPORATION (1)
6,938,156 ABDS system and verification status for authenticating entity access 60 2003
 
FISHER-ROSEMOUNT SYSTEMS, INC. (1)
7,076,312 Integrated electronic signatures for approval of process control and safety system software objects 43 2003
 
FLEXERA SOFTWARE LLC (1)
5,671,412 License management system for software applications 356 1995
 
FLEXERA SOFTWARE, INC. (1)
2006/0005,021 Methods and apparatus for secure distribution of software 38 2005
 
FOUNDATIONIP, LLC (1)
6,594,662 Method and system for gathering information resident on global computer networks 89 1999
 
FRANCE TELECOM (1)
5,661,806 Process of combined authentication of a telecommunication terminal and of a user module 105 1995
 
FUJITSU SEMICONDUCTOR LIMITED (1)
6,698,022 Timestamp-based timing recovery for cable modem media access controller 64 1999
 
GEODIGM CORPORATION (1)
2006/0184,637 Method and apparatus for electronic delivery of electronic model images 16 2006
 
GEORGIA TECH RESEARCH CORPORATION (1)
6,510,349 Adaptive data security system and method 47 2000
 
GEOTRUST, INC. (1)
7,003,661 Methods and systems for automated authentication, processing and issuance of digital certificates 60 2002
 
GIGATRUST (1)
7,484,245 System and method for providing data security 61 2000
 
HELIOS SOFTWARE, LLC (1)
6,629,140 Method of controlling an internet web browser in the absence of key activity on a computer 10 2000
 
HERBERT STREET TECHNOLOGIES (1)
7,406,596 Data transfer and management system 31 2001
 
HEWLETT-PACKARD COMPANY (1)
4,888,800 Secure messaging systems 127 1988
 
HITACHI COMPUTER PRODUCTS (AMERICA), INC. (1)
6,807,636 Methods and apparatus for facilitating security in a network 99 2002
 
HUGHES ELECTRONICS CORPORATION (1)
5,434,918 Method for providing mutual authentication of a user and a server on a network 130 1993
 
Hush Communications Corporation (1)
6,292,895 Public key cryptosystem with roaming user capability 66 2000
 
HYGLO SYSTEMS AB (1)
7,461,157 Distributed server functionality for emulated LAN 20 2001
 
INDENTICRYPT, INC. (1)
7,003,117 Identity-based encryption system for secure data distribution 58 2003
 
INTEGRATED TECHNOLOGOES OF AMERICA, INC. (1)
6,351,813 Access control/crypto system 193 1998
 
INTELLISYNC CORPORATION (1)
6,061,790 Network computer system with remote user data encipher methodology 115 1997
 
INTERFUSE TECHNOLOGY CORPORATION (1)
6,874,139 Method and system for seamless integration of preprocessing and postprocessing functions with an existing application program 71 2001
 
Intermind Corporation (1)
5,862,325 Computer-based communication system and method using metadata defining a control structure 1173 1996
 
INTRALINKS, INC. (1)
7,168,094 Method and system for managing access to information and the transfer thereof 22 2001
 
INVENTEC CORPORATION (1)
2004/0193,602 Method and system for maintenance of engineering change data 45 2003
 
ISPHERES CORPORATION (1)
2002/0174,109 EVENT DETECTION WITH CONCURRENT DATA UPDATES 38 2001
 
Kabushiki Kaisha Sega (1)
2006/0168,147 Information processor, file server, accounting control system, accounting control method, and recording medium recording a program therefor 45 2006
 
KASTEN CHASE APPLIED RESEARCH LIMITED (1)
2002/0172,367 System for secure electronic information transmission 86 2002
 
KAYDARA, INC. (1)
7,461,405 Mixed-media data encoding 18 2001
 
KDMS International LLC (1)
2003/0159,066 Method and apparatus for network user location verification 49 2002
 
KEYBYTE TECHNOLOGIES, INC. (1)
6,011,847 Cryptographic access and labeling system 60 1995
 
KINGLITE HOLDINGS INC. (1)
2003/0037,237 Systems and methods for computer device authentication 110 2001
 
KONINKLIJKE PHILIPS ELECTRONICS N.V. (1)
2006/0075,258 Archive system and method for copy controlled storage devices 23 2003
 
KYLINTV, INC. (1)
2006/0277,316 Internet protocol television 44 2006
 
Laurel Intelligent Systems, Co., Ltd. (1)
5,267,313 File security system 39 1992
 
LENOVO (SINGAPORE) PTE LTD. (1)
6,922,785 Apparatus and a method for secure communications for network computers 27 2000
 
LG-NORTEL CO., LTD. (1)
2001/0056,550 Protective device for internal resource protection in network and method for operating the same 55 2001
 
MARK ANY, INC. OF 10TH FLOOR (1)
2003/0023,559 Method for securing digital information and system therefor 43 2001
 
MATHON SYSTEMS, INC. (1)
7,386,529 System and method for managing content with event driven actions to facilitate workflow and other features 43 2003
 
MATSUSHITA-KOTOBUKI ELECTRONICS INDUSTRIES, LTD. (1)
7,200,747 System for ensuring data privacy and user differentiation in a distributed file system 55 2001
 
MEDTECH GLOBAL LIMITED (1)
6,611,846 Method and system for medical patient data analysis 152 1999
 
MESSAGE SECURE CORPORATION (1)
6,988,199 Secure and reliable document delivery 81 2001
 
METACRYPTION, LLC (1)
2003/0088,783 Systems, methods and devices for secure computing 53 2001
 
MICRON TECHNOLOGY, INC. (1)
6,625,650 System for multi-layer broadband provisioning in computer networks 125 1999
 
MIST INC. (1)
6,588,673 Method and system providing in-line pre-production data preparation and personalization solutions for smart cards 109 2000
 
MODUS OPERANDI, INC. (1)
2002/0069,363 System and method for data recovery and protection 63 2000
 
MOTOROLA MOBILITY LLC (1)
5,404,404 Method for updating encryption key information in communication units 55 1993
 
NAMCO HOLDING CORPORATION (1)
6,924,425 Method and apparatus for storing a multipart audio performance with interactive playback 50 2002
 
NASTALOR VENTERI TRE L.L.C. (1)
6,336,114 System and method for restricting access to a data table within a database 75 1998
 
NATIONAL REALTY SYSTEMS, LLC (1)
2003/0101,072 Document protection system 51 2002
 
NATIONAL SEMICONDUCTOR CORPORATION (1)
5,058,164 Encryption of streams of addressed information to be used for program code protection 182 1990
 
NCR CORPORATION (1)
6,608,636 Server based virtual conferencing 85 1992
 
NET CONVERSIONS, INC. (1)
2002/0062,245 System and method for generating real-time promotions on an electronic commerce world wide website to increase the likelihood of purchase 90 2001
 
Net i Trust (1)
6,145,084 Adaptive communication system enabling dissimilar devices to exchange information over a network 91 1998
 
Netlink I.T. Solutions Ltd. (1)
2003/0079,175 Data processing system and development tool 44 2001
 
NETWORK APPLIANCE, INC. (1)
6,718,361 Method and apparatus for reliable and scalable distribution of data files in distributed networks 371 2000
 
NETZERO, INC. (1)
6,366,298 Monitoring of individual internet usage 160 1999
 
NFR SECURITY, INC. (1)
6,530,024 Adaptive feedback security system and method 184 1998
 
NIPPON TELEGRAPH AND TELEPHONE CORPORATION (1)
5,600,722 System and scheme of cipher communication 57 1994
 
NISHIDA, TAISHIN (1)
7,224,795 Variable-length key cryptosystem 38 2002
 
NORTEL NETWORKS LIMITED (1)
2002/0138,762 Management of log archival and reporting for data network security systems 116 2001
 
NOVELL INTELLECTUAL PROPERTY HOLDINGS, INC. (1)
6,950,936 Secure intranet access 72 2003
 
NOVELL, INC. (1)
5,787,175 Method and apparatus for collaborative document control 231 1995
 
NUANCE COMMUNICATIONS, INC. (1)
6,870,920 System and method for multi-stage data logging 25 2002
 
NVIDIA CORPORATION (1)
7,265,764 System and method for providing a hardware icon with magnification and security 36 2002
 
ODS NETWORKS, INC. (1)
6,347,374 Event detection 372 1998
 
OMNISECURE, INC. (1)
5,584,023 Computer system including a transparent and secure file transform mechanism 189 1993
 
OneName Corporation (1)
6,088,717 Computer-based communication system and method using metadata defining a control-structure 477 1998
 
OPEN TEXT S.A. (1)
7,287,055 Web-based groupware system 37 2004
 
PANASONIC CORPORATION (1)
2001/0056,541 File management apparatus 45 2001
 
PARALLELS IP HOLDINGS GMBH (1)
7,076,633 Hosting service providing platform system and method 96 2001
 
PEOPLE TO PEOPLE PUBLISHING, INC. (1)
2003/0028,610 Peer-to-peer file sharing system and method using user datagram protocol 105 2001
 
Pride Software Development Corp. (1)
4,796,220 Method of controlling the copying of software 352 1986
 
PROBIX, INC. (1)
2002/0046,350 Method and system for establishing an audit trail to protect objects distributed over a network 44 2001
 
PROOFPOINT, INC. (1)
2006/0101,285 Secure and searchable storage system and method 74 2004
 
PUMPKIN HOUSE INCORPORATED (1)
5,870,477 Enciphering/deciphering device and method, and encryption/decryption communication system 76 1996
 
RAKUTEN, INC. (1)
6,299,069 Integrated circuit for embedding in smart cards, and method of issuing smart cards 29 1998
 
RAPPORE TECHNOLOGIES, INC. (1)
2002/0169,965 Clearance-based method for dynamically configuring encryption strength 39 2001
 
RAXCO SOFTWARE, INC. (1)
5,655,119 Method for moving an open file being accessed by at least one user 46 1996
 
RAYTHEON BBN TECHNOLOGIES CORP. (1)
6,941,355 System for selecting and disseminating active policies to peer device and discarding policy that is not being requested 58 2000
 
REEFEDGE NETWORKS, LLC (1)
6,851,050 Providing secure network access for short-range wireless computing devices 45 2001
 
RENESAS ELECTRONICS CORPORATION (1)
7,290,148 Encryption and decryption communication semiconductor device and recording/reproducing apparatus 39 2003
 
REVEO, INC. (1)
2002/0026,321 INTERNET-BASED SYSTEM AND METHOD FOR FAIRLY AND SECURELY ENABLING TIMED-CONSTRAINED COMPETITION USING GLOBALLY TIME-SYCHRONIZED CLIENT SUBSYSTEMS AND INFORMATION SERVERS HAVING MICROSECOND CLIENT-EVENT RESOLUTION 102 1999
 
ROWLAND NETWORK GROUP LLC (1)
2003/0115,146 System and method for detecting unauthorized copying of encrypted data 42 2001
 
RPK NEW ZEALAND LIMITED (1)
7,076,067 Encrypted media key management 39 2001
 
SAFECOM A/S (1)
6,952,780 System and method for ensuring secure transfer of a document from a client of a network to a printer 72 2001
 
SAFENET DATA SECURITY (ISRAEL) LTD. (1)
6,915,425 System for permitting off-line playback of digital content, and for managing content rights 41 2000
 
SANYO ELECTRIC CO., LTD. (1)
7,010,809 Reproduction device stopping reproduction of encrypted content data having encrypted region shorter than predetermined length 38 2001
 
SECURE AXCESS LLC (1)
6,601,170 Secure internet user state creation method and system with user supplied key and seeding 34 2000
 
SECURE COMPUTING TECHNOLOGY CORPORATION (1)
5,276,735 Data enclave and trusted path system 340 1992
 
SECURITY SOFTWARE AMERICA, INC., A CORP. OF DE (1)
4,757,533 Security system for microcomputers 229 1985
 
SERENA SOFTWARE INTERNATIONAL, INC. (1)
6,263,348 Method and apparatus for identifying the existence of differences between two files 110 1998
 
SIGHTSOUND TECHNOLOGIES, LLC (1)
2004/0025,037 System and method for manipulating a computer file and/or program 41 2003
 
SIGHTSOUND.COM INCORPORATED (1)
6,615,349 System and method for manipulating a computer file and/or program 104 1999
 
Signitas Corporation (1)
2003/0217,264 System and method for providing a secure environment during the use of electronic documents and data 63 2002
 
SIVAULT, INC. (1)
2002/0031,230 Method and apparatus for a web-based application service model for security management 153 2001
 
Social Communications Company (1)
2009/0254,843 SHARED VIRTUAL AREA COMMUNICATION ENVIRONMENT BASED APPARATUS AND METHODS 39 2009
 
SOL LABS K.G. LIMITED LIABILITY COMPANY (1)
5,881,287 Method and apparatus for copy protection of images in a computer system 100 1997
 
Solarsoft Ltd. (1)
2003/0191,938 Computer security system and method 30 2002
 
SPX CORPORATION (1)
2003/0037,133 Method and system for implementing redundant servers 43 2001
 
SPYRUS, INC. (1)
5,677,953 System and method for access control for portable data storage media 253 1995
 
SUMITOMO HEAVY INDUSTRIES, LTD. (1)
2001/0044,903 Information access method and network system 43 2001
 
SURETY, LLC (1)
7,047,404 Method and apparatus for self-authenticating digital records 32 2000
 
SYMMETRICOM, INC. (1)
2002/0056,042 System and methods for generating trusted and authenticatable time stamps for electronic documents 48 2002
 
SYNETICS, INC. (1)
2004/0022,390 System and method for data protection and secure sharing of information over a computer network 52 2002
 
SYNOPSYS, INC. (1)
6,810,389 System and method for flexible packaging of software application licenses 65 2000
 
SYSTAR SA (1)
2002/0112,048 System and method for providing behavioral information of a user accessing on-line resources 95 2000
 
TANDEM COMPUTERS CORPORATION (1)
4,972,472 Method and apparatus for changing the master key in a cryptographic system 74 1985
 
TEC SEC, INCORPORATED (1)
2002/0062,451 System and method of providing communication security 117 2001
 
TEIGEL PROCESSING AB, L.L.C. (1)
7,020,645 Systems and methods for state-less authentication 107 2001
 
THE REGENTS OF THE UNIVERSITY OF CALIFORNIA (1)
7,113,594 Systems and methods for identity-based encryption and related cryptographic techniques 77 2002
 
THOMSON LICENSING (1)
2003/0182,579 Transmitting and processing protected content 59 2003
 
Toppan Moore Co., Ltd. (1)
4,734,568 IC card which can set security level for every memory area 145 1986
 
TRANSFINITY CORPORATION (1)
5,893,084 Method for creating specific purpose rule-based n-bit virtual machines 57 1996
 
TTI INVENTIONS C LLC (1)
5,406,628 Public key authentication and key agreement for low-cost terminals 108 1993
 
TUMBLEWEED COMMUNICATIONS CORP. (1)
6,529,956 Private, trackable URLs for directed document delivery 89 2000
 
U.S. Philips Corporation (1)
4,423,387 Current mirror arrangement 30 1981
 
UNIFIEDMARKET WORLDWIDE, LLC (1)
2002/0007,335 Method and system for a network-based securities marketplace 101 2001
 
UNITED SERVICES AUTOMOBILE ASSOCIATION, INC. (1)
6,877,136 System and method of providing electronic access to one or more documents 50 2002
 
UniVirtual Corp. (1)
5,813,009 Computer based records management system method 679 1995
 
VADIUM TECHNOLOGY, INC. (1)
2003/0026,431 One-time-pad encryption with central key service and key management 30 2002
 
VENAFI, INC. (1)
2005/0081,029 Remote management of client installed digital certificates 47 2004
 
VERIZON BUSINESS GLOBAL LLC (1)
6,385,644 Multi-threaded web based user inbox for report management 89 1998
 
VERSADA NETWORKS (1)
2003/0033,528 System and method for specifying security, privacy, and access control to information used by others 47 2002
 
VIDIUS INC. (1)
2002/0150,239 Method for personalized encryption in an un-trusted environment 86 2002
 
VISUALGOLD.COM, INC. (1)
2002/0016,922 Secure distributing services network system and method thereof 79 2001
 
VOLTAGE SECURITY, INC. (1)
7,103,911 Identity-based-encryption system with district policy information 26 2003
 
VORMETRIC, INC. (1)
6,931,530 Secure network file access controller implementing access control and auditing 77 2002
 
WATCHGUARD TECHNOLOGIES, INC. (1)
6,738,908 Generalized network security policy templates for implementing similar network security policies across multiple networks 80 1999
 
WAVE SYSTEMS CORP. (1)
5,247,575 Information distribution system 808 1992
 
WEB.COM HOLDING COMPANY, INC. (1)
2002/0069,272 System and method for managing server configurations 75 2001
 
WELLS FARGO BANK, NATIONAL ASSOCIATION (1)
7,266,684 Internet third-party authentication using electronic tickets 49 2001
 
Westport Benefits, L.L.C. (1)
2002/0069,077 Computerized system for customizing and managing benefits 61 2001
 
WISTRON CORPORATION (1)
6,389,538 System for tracking end-user electronic content usage 419 1998
 
XCERT SOFTWARE, INC. (1)
6,249,873 Method of and apparatus for providing secure distributed directory services and public key infrastructure 126 1999
 
XYLECO, INC. (1)
2003/0088,517 System and method for controlling access and use of private information 55 2001
 
YAHOO! INC. (1)
6,301,614 System and method for efficient representation of data set addresses in a web crawler 52 1999
 
YAMAHA CORPORATION (1)
2003/0023,649 Digital filtering method and device and sound image localizing device 3 2002
 
YASZISTRA FUND III, LLC (1)
6,735,701 Network policy management and effectiveness system 153 1998
 
Other [Check patent profile for assignment information] (18)
5,144,660 Securing a computer against undesired write operations to or read operations from a mass storage device 201 1989
5,619,576 Variable-key cryptography system 36 1995
5,748,736 System and method for secure group communications via multicast or broadcast 207 1996
5,790,789 Method and architecture for the creation, control and deployment of services within a distributed computer environment 371 1996
6,226,745 Information sharing system and method with requester dependent sharing and security rules 145 1998
6,292,899 Volatile key apparatus for safeguarding confidential data stored in a computer system memory 70 1998
6,260,141 Software license control system based on independent software registration server 85 2000
6,990,441 Natural language messages from a keystroke output wedge 11 2000
2002/0133,699 Method and apparatus to regulate use of freely exchanged files and streams 42 2001
7,124,164 Method and apparatus for providing group interaction via communications networks 112 2001
2002/0003,886 Method and system for storing multiple media tracks in a single, multiply encrypted computer file 34 2001
2002/0010,679 Information record infrastructure, system and method 407 2001
2002/0050,098 Rotary access locking apparatus 38 2001
2003/0046,176 One page purchasing system 16 2001
2004/0205,576 System and method for managing Knowledge information 25 2002
2003/0037,253 Digital rights management system 40 2002
2004/0193,905 System and method for providing secure transmission, search, and storage of data 43 2004
2005/0273,600 Method and system for file data access within a secure environment 43 2005

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
INTELLECTUAL VENTURES I LLC (5)
8,543,827 Methods and systems for providing access control to secured data 0 2008
8,266,674 Method and system for implementing changes to security policies in a distributed security system 0 2009
8,327,138 Method and system for securing digital assets using process-driven security policies 2 2010
8,341,407 Method and system for protecting electronic data in enterprise environment 0 2011
8,341,406 System and method for providing different levels of key security for controlling access to secured items 0 2011
 
OSR OPEN SYSTEMS RESOURCES, INC. (2)
8,521,752 Systems and methods for arbitrary data transformations 0 2005
8,539,228 Managing access to a resource 1 2006
 
GEMALTO SA (1)
8,229,112 Decipherable searchable encryption method, system for such an encryption 0 2007
 
GENERAL DYNAMICS C4 SYSTEMS, INC. (1)
8,499,163 Serial architecture for high assurance processing 0 2010

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
3.5 Year Payment $1600.00 $800.00 $400.00 Oct 19, 2014
7.5 Year Payment $3600.00 $1800.00 $900.00 Oct 19, 2018
11.5 Year Payment $7400.00 $3700.00 $1850.00 Oct 19, 2022
Fee Large entity fee small entity fee micro entity fee
Surcharge - 3.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 7.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00