US Patent No: 7,930,756

Number of patents in Portfolio can not be more than 2000

Multi-level cryptographic transformations for securing digital assets

Stats

See full text
ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

Enhanced multi-level cryptographic transformations that secure electronic files are disclosed. The secured electronic files contain not only secured data but also security information. The security information includes cryptographic structure information, access rules and secrets (e.g., keys). The cryptographic structure information explains the multi-level cryptographic transformations associated with securing or unsecuring the electronic files. The access rules and the secrets are used by the cryptographic transformations to secure the electronic files. Since the secured electronic files contain the cryptographic structure information, the particular cryptographic transformations (including their sequencing) can vary with each electronic file, if so desired. Typically, the secured electronic files are secured and managed by a file security system, such as a distributed security system.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Related Publications

Loading Related Publications... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTELLECTUAL VENTURES I LLCDENKENDORF1672

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Crocker, Steven Toye Redwood City, CA 6 180
Garcia, Denis Jacques Paul Palo Alto, CA 18 303

Cited Art Landscape

Patent Info (Count) # Cites Year
 
MICROSOFT CORPORATION (51)
5,732,265 Storage optimizing encoder and method 82 1995
5,719,941 Method for changing passwords on a remote computer 103 1996
6,055,314 System and method for secure purchase and delivery of video content programs 500 1996
5,757,920 Logon certification 168 1997
5,978,802 System and method for providing opportunistic file access in a network environment 43 1997
6,134,658 Multi-server location-independent authentication certificate management system 128 1997
6,272,631 Protected storage of core data secrets 110 1997
6,031,584 Method for reducing digital video frame frequency while maintaining temporal smoothness 30 1997
6,044,155 Method and system for securely archiving core data secrets 136 1997
6,308,273 Method and system of security location discrimination 326 1998
6,505,300 Method and system for secure running of untrusted content 219 1998
6,289,458 Per property access control mechanism 52 1998
6,466,932 System and method for implementing group policy 220 1999
6,775,779 Hierarchical trusted code for content protection in computers 100 1999
6,584,466 Internet document management system and methods 192 1999
6,801,999 Passive and active software objects containing bore resistant watermarking 127 1999
6,389,433 Method and system for automatically merging files into a single instance store 207 1999
6,477,544 Single instance store for file systems 230 1999
6,810,479 System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer 58 2000
6,834,341 Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet 161 2000
6,971,018 File protection service for a computer system 76 2000
6,349,337 Maintaining a first session on a first computing device and subsequently connecting to the first session via different computing devices and adapting the first session to conform to the different computing devices system configurations 93 2000
6,891,953 Method and system for binding enhanced software features to a persona 83 2000
7,035,910 System and method for document isolation 59 2000
6,976,259 Method for abstract state transitions without requiring state machine knowledge 19 2000
2001/0032,181 System and method for secure third-party development and hosting within a financial services network 94 2000
7,058,978 Security component for a computing device 57 2000
7,013,332 Distributed policy model for access control 49 2001
2002/0194,484 On-disk file format for serverless distributed file system with signed manifest of file modifications 77 2001
7,043,637 On-disk file format for a serverless distributed file system 62 2001
7,478,243 On-disk file format for serverless distributed file system with signed manifest of file modifications 18 2001
7,073,063 Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like 104 2001
6,754,657 Time stamping of database records 46 2001
7,287,058 Methods, systems and computer program products for performing document-inclusion operations over a network 19 2002
2003/0182,584 Systems and methods for setting and resetting a password 48 2002
7,509,492 Distributed scalable cryptographic access control 24 2002
7,000,150 Platform for computer process monitoring 38 2002
2003/0233,650 Visual group interface for group connectivity 74 2002
6,950,818 System and method for implementing group policy 107 2002
6,938,042 Peer-to-peer file sharing 93 2002
2004/0098,580 State reference 46 2002
7,383,586 File system operation and digital rights management (DRM) 42 2003
2005/0091,289 File sharing in P2P group shared spaces 51 2003
2005/0198,326 Invalid policy detection 46 2004
2004/0243,853 System and method for improved network security 41 2004
2006/0075,465 Rule-driven specification of Web Service policy 45 2004
2005/0256,909 Peer-to-peer file sharing 97 2004
7,401,220 On-disk file format for a serverless distributed file system 38 2004
7,415,608 On-disk file format for a serverless distributed file system 37 2004
7,454,612 On-disk file format for a serverless distributed file system 22 2004
7,539,867 On-disk file format for a serverless distributed file system 20 2004
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (48)
4,203,166 Cryptographic file security for multiple domain networks 181 1977
4,238,854 Cryptographic file security for single domain networks 142 1977
4,887,204 System and method for accessing remote files in a distributed networking environment 274 1987
5,032,979 Distributed security auditing subsystem for an operating system 304 1990
5,319,705 Method and system for multimedia access control enablement 655 1992
5,414,852 Method for protecting data in a computer system 147 1992
5,689,688 Probabilistic anonymous clock synchronization method and apparatus for synchronizing a local time scale with a reference time scale 73 1993
5,461,710 Method for providing a readily distinguishable template and means of duplication thereof in a computer system graphical user interface 141 1994
5,535,375 File manager for files shared by heterogeneous clients 191 1994
5,821,933 Visual access to restricted functions represented on a graphical user interface 118 1995
5,787,169 Method and apparatus for controlling access to encrypted data files in a computer system 85 1995
5,778,065 Method and system for changing an authorization password or key in a distributed communication network 104 1996
5,870,468 Enhanced data privacy for portable computers 86 1996
5,673,316 Creation and distribution of cryptographic envelope 459 1996
6,032,216 Parallel file system with method using tokens for locking modes 220 1997
6,035,404 Concurrent user access control in stateless network computing service system 54 1997
6,405,315 Decentralized remotely encrypted file system 143 1997
6,105,131 Secure server and method of operation for a distributed information system 129 1997
6,141,754 Integrated method and system for controlling information access and distribution 257 1997
6,260,040 Shared file system for digital content 99 1998
6,088,805 Systems, methods and computer program products for authenticating client requests with client certificate information 102 1998
6,199,070 Using a database for program logs 32 1998
6,282,649 Method for controlling access to electronically provided services and system for implementing such method 83 1998
6,442,695 Establishment of user home directories in a heterogeneous network environment 45 1998
6,587,878 System, method, and program for measuring performance in a network system 64 1999
6,598,161 Methods, systems and computer program products for multi-level encryption 145 1999
6,961,849 Selective data encryption using style sheet processing for decryption by a group clerk 72 1999
6,950,943 System for electronic repository of data enforcing access control on data search and retrieval 61 1999
7,237,002 System and method for dynamic browser management of web site 67 2000
7,099,926 Object caching and update queuing technique to improve performance and resource utilization 54 2000
6,947,556 Secure data storage and retrieval with key management and user authentication 121 2000
7,010,689 Secure data storage and retrieval in a client-server environment 96 2000
6,978,366 Secure document management system 44 2000
6,647,388 Access control system, access control method, storage medium and program transmission apparatus 110 2000
2001/0034,839 Method and apparatus for secure transmission of data and applications 106 2000
2002/0133,735 System and method for efficient failover/failback techniques for fault-tolerant data storage system 5 2001
6,959,308 Archiving and retrieval method and apparatus 44 2001
7,280,658 Systems, methods, and computer program products for accelerated dynamic protection of data 37 2001
2003/0051,039 Apparatus and method for awarding a user for accessing content based on access rights information 47 2001
6,892,201 Apparatus and method for providing access rights information in a portion of a file 66 2001
2003/0115,570 Development environment for building software applications that mimics the target environment 42 2001
2002/0136,317 Block coding for multilevel data communication 3 2002
7,035,854 Content management system and methodology employing non-transferable access tokens to control data access 47 2002
2003/0154,296 Transmission control system, server, terminal station, transmission control method, program and storage medium 14 2002
6,842,825 Adjusting timestamps to preserve update timing information for cached data objects 65 2002
7,120,635 Event-based database access execution 47 2002
2005/0039,034 Security containers for document components 78 2003
7,130,964 Object caching and update queuing technique to improve performance and resource utilization 45 2004
 
INTELLECTUAL VENTURES I LLC (28)
2004/0103,202 System and method for providing distributed access control to secured items 67 2002
7,260,555 Method and architecture for providing pervasive security to digital assets 58 2002
7,380,120 Secured data format for access control 65 2002
7,681,034 Method and apparatus for securing electronic data 22 2002
6,931,597 Indications of secured digital assets 47 2002
7,631,184 System and method for imposing security on copies of secured items 23 2002
2003/0110,397 Guaranteed delivery of changes to security policies in a distributed system 78 2002
7,478,418 Guaranteed delivery of changes to security policies in a distributed system 26 2002
7,565,683 Method and system for implementing changes to security policies in a distributed security system 24 2002
7,729,995 Managing secured files in designated locations 19 2002
2003/0120,684 System and method for providing manageability to security information for secured items 47 2002
7,562,232 System and method for providing manageability to security information for secured items 23 2002
7,512,810 Method and system for protecting encrypted files transmitted over a network 28 2002
2004/0064,710 Document security system that permits external users to gain access to secured files 43 2002
7,730,543 Method and system for enabling users of a group shared across multiple file security systems to access secured files 17 2003
7,555,558 Method and system for fault-tolerant transfer of files across a network 17 2003
2005/0071,275 Method and apparatus for transitioning between states of security policies used to secure electronic documents 39 2003
2005/0071,658 Method and system for securing digital assets using process-driven security policies 53 2003
7,703,140 Method and system for securing digital assets using process-driven security policies 19 2003
2005/0086,531 Method and system for proxy approval of security changes for a file security system 38 2003
2005/0138,371 Method and system for distribution of notifications in file security systems 38 2003
2005/0138,383 Method and system for validating timestamps 45 2003
7,702,909 Method and system for validating timestamps 18 2003
2005/0223,242 Method and system for providing document retention using cryptography 59 2004
2005/0223,414 Method and system for providing cryptographic document retention with off-line access 58 2004
7,748,045 Method and system for providing cryptographic document retention with off-line access 16 2004
7,707,427 Multi-level file digests 17 2004
2010/0199,088 Method and System For Securing Digital Assets Using Process-Driven Security Policies 16 2010
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (16)
5,212,788 System and method for consistent timestamping in distributed computer databases 82 1990
5,204,897 Management interface for license management system 494 1992
5,923,754 Copy protection for recorded media 88 1997
6,611,599 Watermarking of digital object 97 1997
6,148,338 System for logging and enabling ordered retrieval of management events 70 1998
6,550,011 Media content protection utilizing public key cryptography 268 1999
7,340,600 Authorization infrastructure based on public key cryptography 46 2000
2002/0077,988 Distributing digital content 128 2000
2003/0005,168 System and method for auditing system call events with system call wrappers 25 2001
2003/0009,685 System and method for file system mandatory access control 56 2001
2003/0078,959 Deployment of business logic software and data content onto network servers 78 2001
7,003,116 System for encrypted file storage optimization via differentiated key lengths 17 2001
7,171,557 System for optimized key management with file groups 46 2001
7,203,317 System for enabling lazy-revocation through recursive key generation 44 2001
2002/0120,851 Device and method for data timestamping 24 2002
7,219,230 Optimizing costs associated with managing encrypted data 36 2002
 
EMC CORPORATION (13)
5,661,668 Apparatus and method for analyzing and correlating events in a system using a causality matrix 174 1996
6,249,755 Apparatus and method for event correlation and problem reporting 161 1997
6,192,408 Network file server sharing local caches of file access information in data processors assigned to respective file systems 232 1997
6,314,408 Method and apparatus for controlling access to a product 99 1998
6,615,350 Module authentication and binding library extensions 97 1999
6,289,450 Information security architecture for encrypting documents for remote access while maintaining access control 130 1999
6,978,376 Information security architecture for encrypting documents for remote access while maintaining access control 67 2000
6,339,825 Method of encrypting information for remote access while maintaining access control 87 2001
2002/0029,340 Method of encrypting information for remote access while maintaining access control 53 2001
2002/0178,271 Dynamic file access control and management 149 2001
7,024,427 Virtual file system 113 2001
7,249,251 Methods and apparatus for secure modification of a retention period for data in a storage system 23 2004
7,107,185 Apparatus and method for event correlation and problem reporting 33 2005
 
MCAFEE, INC. (12)
5,502,766 Data enclave and trusted path system 230 1993
5,499,297 System and method for trusted path communications 111 1994
5,557,765 System and method for data recovery 186 1995
5,745,573 System and method for controlling access to a user secret 124 1997
6,272,632 System and method for controlling access to a user secret using a key recovery field 107 1998
6,357,010 System and method for controlling access to documents stored on an internal network 141 1998
6,453,419 System and method for implementing a security policy 102 1998
7,308,702 Locally adaptable central security management in a heterogeneous network environment 55 2000
6,826,698 System, method and computer program product for rule based network security policies 97 2000
6,640,307 System and method for controlling access to documents stored on an internal network 83 2000
6,920,558 Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system 77 2001
7,159,036 Updating data from a source computer to groups of destination computers 86 2001
 
Entrust Technologies Limited (9)
6,603,857 Method and apparatus for controlling release of time sensitive information 51 1997
6,370,249 Method and apparatus for public key management 77 1997
6,442,688 Method and apparatus for obtaining status of public key certificate updates 58 1997
5,968,177 Method and apparatus for processing administration of a secured community 60 1997
6,134,327 Method and apparatus for creating communities of trust in a secure communication system 72 1997
6,341,164 Method and apparatus for correcting improper encryption and/or for reducing memory storage 45 1998
6,266,420 Method and apparatus for secure group communications 126 1998
6,574,733 Centralized secure backup system and method 43 1999
6,567,914 Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system 100 2000
 
ORACLE INTERNATIONAL CORPORATION (9)
6,158,010 System and method for maintaining security in a distributed computer network 330 1999
6,591,295 Methods and apparatus for using multimedia data stored in a relational database in web applications 68 1999
6,968,456 Method and system for providing a tamper-proof storage of an audit trail in a database 22 2000
6,941,472 System and method for maintaining security in a distributed computer network 69 2001
7,080,077 Localized access 132 2001
7,194,764 User authentication 85 2001
7,185,364 Access system interface 118 2001
6,816,871 Delivering output XML with dynamically selectable processing 78 2001
7,225,256 Impersonation in an access system 53 2001
 
TECSEC, INCORPORATED (9)
5,369,702 Distributed cryptographic object method 227 1993
5,717,755 Distributed cryptographic object method 60 1994
5,680,452 Distributed cryptographic object method 109 1995
5,787,173 Cryptographic key management method and apparatus 71 1997
5,898,781 Distributed cryptographic object method 57 1997
6,490,680 Access control and authorization system 168 1998
6,542,608 Cryptographic key split combiner 64 2001
6,549,623 Cryptographic key split combiner 50 2002
2003/0172,280 Access control and authorization system 55 2002
 
GOOGLE INC. (8)
5,495,533 Personal key archive 314 1994
5,778,350 Data collection, processing, and reporting system 54 1995
7,058,696 Internet-based shared file service with native PC client access and semantics 91 2000
7,136,903 Internet-based shared file service with native PC client access and semantics and distributed access control 105 2000
2002/0133,481 Methods and apparatus for providing search results in response to an ambiguous search query 36 2000
7,117,322 Method, system, and program for retention management and protection of stored objects 43 2003
7,146,388 Method, system, and program for archiving files 81 2003
7,107,416 Method, system, and program for implementing retention policies to archive records 79 2003
 
INTEL CORPORATION (8)
6,907,034 Out-of-band signaling for network based computer session synchronization 85 1999
6,317,777 Method for web based storage and retrieval of documents 232 1999
2002/0174,415 System and method for debugging distributed software environments 84 2001
6,957,261 Resource policy management using a centralized policy data structure 107 2001
2003/0196,096 Microcode patch authentication 48 2002
7,343,488 Method and apparatus for providing discrete data storage security 12 2002
2004/0193,912 Methods and systems for managing security policies 80 2003
2007/0006,214 Updating machines while disconnected from an update source 42 2005
 
SONY CORPORATION (8)
6,978,377 Copy protection using detailed copy control information 42 2000
6,754,665 Information processing apparatus, information processing method, and storage medium 48 2000
7,073,073 Data providing system, device, and method 83 2000
2003/0046,238 Data processing apparatus, data processing system, and data processing method therefor 117 2000
7,116,785 Data processing system, data processing method, and program providing medium 21 2001
7,319,752 Information recording device, information playback device, information recording method, information playback method, and information recording medium and program providing medium used therewith 44 2001
7,203,968 Method and apparatus for selectively executing information recording using a cognizant mode and a non-cognizant mode 47 2001
6,834,333 Data processing device, data storage device, data processing method, and program providing medium for storing content protected under high security management 42 2001
 
SUN MICROSYSTEMS, INC. (8)
5,708,709 System and method for managing try-and-buy usage of application programs 460 1995
6,295,361 Method and apparatus for multicast indication of group key change 94 1998
7,188,181 Universal session sharing 125 1999
6,308,256 Secure execution of program instructions provided by network interactions with processor 64 1999
6,363,480 Ephemeral decryptability 60 1999
6,915,435 Method and system for managing information retention 72 2000
6,931,450 Direct access from client to storage device 69 2000
6,941,456 Method, system, and program for encrypting files in a computer system 46 2001
 
CISCO TECHNOLOGY, INC. (7)
6,212,561 Forced sequential access to specified domains in a computer network 89 1998
6,038,322 Group key distribution 92 1998
6,405,318 Intrusion detection system 247 1999
6,629,243 Secure communications system 83 1999
6,961,855 Notification of modifications to a trusted computing base 23 1999
6,988,133 Method and apparatus for communicating network quality of service policy information to a plurality of policy enforcement points 90 2000
6,845,452 Providing security for external access to a protected computer network 55 2002
 
LUCENT TECHNOLOGIES INC. (7)
5,720,033 Security platform and method using object oriented rules for computer-based systems using UNIX-line operating systems 138 1995
6,069,957 Method and apparatus for providing hierarchical key system in restricted-access television system 62 1997
6,421,714 Efficient mobility management scheme for a wireless internet access system 204 1998
6,587,946 Method and system for quorum controlled asymmetric proxy encryption 50 1998
6,687,822 Method and system for providing translation certificates 58 1999
6,987,752 Method and apparatus for frequency offset estimation and interleaver synchronization using periodic signature sequences 19 1999
7,107,269 Methods and apparatus for providing privacy-preserving global customization 46 2001
 
ADOBE SYSTEMS INCORPORATED (5)
6,185,684 Secured document access control using recipient lists 97 1998
6,205,549 Encapsulation of public key cryptography standard number 7 into a secured document 49 1998
7,359,517 Nestable skeleton decryption keys for digital rights management 26 2001
7,434,048 Controlling access to electronic documents 58 2003
2005/0097,061 Offline access in a document control system 75 2003
 
ENTRUST, INC. (5)
5,850,443 Key management system for mixed-trust environments 120 1996
6,182,142 Distributed access management of information resources 419 1998
6,161,139 Administrative roles that govern access to administrative functions 408 1999
6,453,353 Role-based navigation of information resources 288 1999
6,339,423 Multi-domain access control 162 2000
 
GUARDIAN DATA STORAGE, LLC (5)
2003/0110,169 System and method for providing manageability to security information for secured items 61 2002
7,178,033 Method and apparatus for securing digital assets 56 2002
2003/0154,381 Managing file access via a designated place 50 2002
6,889,210 Method and system for managing security tiers 59 2003
2005/0071,657 Method and system for securing digital assets using time-based security criteria 48 2003
 
HITACHI, LTD. (5)
5,235,641 File encryption method and file cryptographic system 137 1991
6,023,506 Data encryption control apparatus and method 129 1996
6,816,969 Digital signature generating method and digital signature verifying method 22 2001
6,882,994 Method and system for querying database, as well as a recording medium for storing a database querying program 29 2001
7,120,757 Storage management integrated system and storage control method for storage management integrated system 111 2002
 
KABUSHIKI KAISHA TOSHIBA (5)
5,835,601 File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing 138 1995
5,944,794 User identification data management scheme for networking computer systems using wide area network 173 1995
6,085,323 Information processing system having function of securely protecting confidential information 107 1997
6,332,025 Software distribution system and software utilization scheme for improving security and user convenience 102 2000
6,993,135 Content processing system and content protecting method 50 2001
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (5)
6,240,188 Distributed group key management scheme for secure many-to-many communication 111 1999
7,146,498 Computer and program recording medium 41 2000
2002/0129,235 Digital data distributing system 60 2001
2004/0064,507 Information providing system and device constituting the same 26 2003
2005/0177,858 Reproduction apparatus and digest reproduction method 37 2004
 
SYMANTEC CORPORATION (5)
5,052,040 Multiple user stored data cryptographic labeling system and method 190 1990
5,699,428 System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-threaded operating system under which applications run in real-time 100 1996
5,953,419 Cryptographic file labeling system for supporting secured access by multiple users 95 1996
7,139,399 Cryptographic system with methods for user-controlled message recovery 20 2001
7,197,638 Unified permissions control for remotely and locally stored files whose informational content may be protected by smart-locking and/or bubble-protection 35 2001
 
CANON KABUSHIKI KAISHA (4)
5,684,987 Management system of multimedia 46 1994
5,922,073 System and method for controlling access to subject data using location data associated with the subject data and a requesting device 104 1996
6,862,103 Network print system, and information processing apparatus and its control method 46 2000
6,898,627 Communication device having the capability of performing information exchange between a facsimile medium and an electronic information medium such as an e-mail medium 19 2000
 
FUJITSU LIMITED (4)
7,051,213 Storage medium and method and apparatus for separately protecting data in different areas of the storage medium 53 1998
6,915,434 Electronic data storage apparatus with key management function and electronic data storage method 76 1999
7,046,807 Data administration method 38 2001
2002/0052,981 Method for suppressing a menu, method for controlling copying and moving of data and computer-readable recording medium recorded with program code for controlling a menu 16 2001
 
InterTrust Technologies Corp. (4)
5,892,900 Systems and methods for secure transaction management and electronic rights protection 1764 1996
6,253,193 Systems and methods for the secure transaction management and electronic rights protection 545 1998
7,233,948 Methods and apparatus for persistent control and protection of content 132 1999
2005/0177,716 Systems and methods for secure transaction management and electronic rights protection 52 2005
 
NEC CORPORATION (4)
5,606,663 Password updating system to vary the password updating intervals according to access frequency 86 1994
6,014,730 Dynamic adding system for memory files shared among hosts, dynamic adding method for memory files shared among hosts, and computer-readable medium recording dynamic adding program for memory files shared among hosts 53 1997
6,343,316 Cooperative work support system 54 1999
2004/0186,845 File system for managing files in tree structure allowing users to readily know availability condition 19 2004
 
SAMSUNG ELECTRONICS CO., LTD. (4)
6,892,306 Digital content cryptograph and process 57 1998
6,950,941 Copy protection system for portable storage media 108 1999
6,466,476 Data coding for multi-bit-per-cell memories having variable numbers of bits per memory cell 100 2001
2002/0035,624 Gateway and a method for operating the same 91 2001
 
APPLE INC. (3)
5,638,501 Method and apparatus for displaying an overlay image 171 1993
5,497,422 Message protection mechanism and graphical user interface therefor 114 1993
5,857,189 File sharing in a teleconference application 80 1996
 
DIGIMARC CORPORATION (3)
5,765,152 System and method for managing copyrighted electronic media 883 1995
6,807,534 System and method for managing copyrighted electronic media 169 2000
2002/0169,963 Digital watermarking apparatus, systems and methods 43 2001
 
LIQUID MACHINES, INC. (3)
6,625,734 Controlling and tracking access to disseminated information 90 1999
7,313,824 Method for protecting digital content from unauthorized use by automatically and dynamically integrating a content-protection agent 43 2002
2005/0028,006 Computer method and apparatus for managing data objects in a distributed context 54 2004
 
MITSUBISHI DENKI KABUSHIKI KAISHA (3)
5,689,718 System and method for processing document information using password protected icons that represent document content 63 1996
6,782,403 Inter-application data transmitting system and method 68 2000
7,227,953 MPEG data recorder having IEEE 1394 interface 37 2002
 
SAP AG (3)
6,058,424 System and method for transferring a session from one application server to another without losing existing resources 68 1997
2004/0254,884 Content catalog and application designer framework 41 2003
2007/0067,837 Method and transaction interface for secure data exchange between distinguishable networks 33 2006
 
SILICON VALLEY BANK (3)
5,751,287 System for organizing document icons with suggestions, folders, drawers, and cabinets 103 1995
5,790,790 Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof 671 1996
2005/0050,098 System and method for aligning data frames in time 19 2003
 
XEROX CORPORATION (3)
5,220,657 Updating local copy of shared data in a collaborative system 453 1991
5,781,711 Document server for processing a distribution job in a document processing system 53 1997
2002/0099,947 Secure content objects 61 2001
 
ALCATEL (2)
6,678,835 State transition protocol for high availability units 125 2000
6,944,183 Object model for network policy management 111 2000
 
ALEARO PROPERTIES LIMITED LIABILITY COMPANY (2)
7,281,272 Method and system for copyright protection of digital images 38 1999
7,076,469 Copyright protection of digital images transmitted over networks 39 2000
 
AT&T CORP. (2)
6,996,718 System and method for providing access to multiple user accounts via a common password 53 2000
6,381,698 System and method for providing assurance to a host that a piece of software possesses a particular property 58 2000
 
CONTENTGUARD HOLDINGS, INC. (2)
5,715,403 System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar 912 1994
6,519,700 Self-protecting documents 66 1998
 
ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE (2)
6,646,515 Isolator/circulator having propeller resonator loaded with a plurality of symmetric magnetic walls 36 2002
2003/0126,434 File security system using a security class and method for managing an encryption key 50 2002
 
FUJI XEROX CO., LTD. (2)
6,530,020 Group oriented public key encryption and key management system 68 1998
2003/0197,729 Systems and methods for displaying text recommendations during collaborative note taking 47 2002
 
INTELLECTUAL VENTURES II LLC (2)
5,933,498 System for controlling access and distribution of digital property 677 1997
6,314,409 System for controlling access and distribution of digital property 469 1998
 
IRDETO USA, INC. (2)
6,683,954 Key encryption using a client-unique additional key for fraud prevention 54 1999
2005/0021,467 Distributed digital rights network (drn), and methods to access operate and implement the same 79 2004
 
JDA SOFTWARE GROUP, INC (2)
7,013,485 Computer security system 63 2001
7,249,044 Fulfillment management system for managing ATP data in a distributed supply chain environment 109 2001
 
JPMORGAN CHASE BANK, N.A. (2)
6,070,244 Computer network security management system 257 1997
6,557,039 System and method for managing information retrievals from distributed archives 188 1999
 
LEVEL 3 COMMUNICATIONS, LLC (2)
6,226,618 Electronic content delivery system 1011 1998
6,779,031 Network architecture with event logging 39 1999
 
MCI COMMUNICATIONS CORPORATION (2)
6,909,708 System, method and article of manufacture for a communication system architecture including video conferencing 269 1996
7,145,898 System, method and article of manufacture for selecting a gateway of a hybrid communication system architecture 268 1996
 
NOKIA MOBILE PHONES LTD. (2)
2002/0129,236 VoIP terminal security module, SIP stack with security manager, system and security methods 14 2000
2002/0124,180 Security animation for display on portable electronic device 37 2001
 
PALO ALTO RESEARCH CENTER INCORPORATED (2)
2004/0088,548 System and method for providing secure resource management 66 2002
2004/0103,280 Method and system for securely Sharing files 107 2002
 
PRC INC. (2)
6,134,664 Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sources 116 1998
6,408,404 System and method for ensuring and managing situation awareness 60 1998
 
RICOH COMPANY, LTD. (2)
7,386,599 Methods and apparatuses for searching both external public documents and internal private documents in response to single search request 20 1999
6,693,652 System and method for automatic generation of visual representations and links in a hierarchical messaging system 86 2000
 
ROCKSTAR CONSORTIUM US LP (2)
5,825,876 Time based availability to content of a storage medium 211 1996
5,970,502 Method and apparatus for synchronizing multiple copies of a database 72 1996
 
RPX CORPORATION (2)
6,122,630 Bidirectional database replication scheme for controlling ping-ponging 151 1999
7,095,853 System and method for preventing an illegal copy of contents 47 2001
 
SCIENTIFIC-ATLANTA, INC. (2)
5,467,342 Methods and apparatus for time stamp correction in an asynchronous transfer mode network 136 1994
5,640,388 Method and apparatus for removing jitter and correcting timestamps in a packet stream 161 1995
 
SECRETSEAL INC. (2)
2003/0120,601 Dynamic evaluation of access rights 109 2002
2003/0217,281 System and method for imposing security on copies of secured items 36 2002
 
SECURIFY, INC. (2)
2002/0093,527 User interface for a security policy system and method 44 2001
2003/0061,506 System and method for security policy 134 2001
 
SIEBEL SYSTEMS, INC. (2)
2007/0192,478 System and method for configuring and viewing audit trails in an information network 21 2001
7,131,071 Defining an approval process for requests for approval 38 2002
 
SONY ELECTRONICS INC. (2)
6,223,285 Method and system for transferring information using an encryption mode indicator 90 1997
7,177,427 Method and system for transferring information using an encryption mode indicator 42 2000
 
TEXAS INSTRUMENTS INCORPORATED (2)
6,711,683 Compresses video decompression system with encryption of compressed data stored in video buffer 40 1999
7,187,033 Drain-extended MOS transistors with diode clamp and methods for making the same 43 2004
 
UNISYS CORPORATION (2)
5,682,537 Object lock management system with improved local lock management and global deadlock detection in a parallel data processing system 120 1995
6,446,090 Tracker sensing method for regulating synchronization of audit files between primary and secondary hosts 69 1999
 
ABB RESEARCH LTD. (1)
2004/0073,718 Time synchronization in computer network 55 2003
 
ACCENTURE GLOBAL SERVICES LIMITED (1)
7,003,560 Data warehouse computing system 172 2000
 
ACHIEVEMENT FIRST (1)
2010/0047,757 System and method for using interim-assessment data for instructional decision-making 16 2008
 
ACTIVISION PUBLISHING, INC. (1)
6,098,056 System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet 184 1997
 
ADV COMMUNICATIONS, INC. (1)
2004/0158,586 METHOD AND SYSTEM OF USING SHARED FILE FOR DATA COLLABORATION 47 2003
 
ADVANCED MICRO DEVICES, INC. (1)
6,571,291 Apparatus and method for validating and updating an IP checksum in a network switching system 46 2000
 
AGERE SYSTEMS GUARDIAN CORP. (1)
2002/0036,984 Method and apparatus for guaranteeing data transfer rates and enforcing conformance with traffic profiles in a packet network 41 2001
 
AGILENT TECHNOLOGIES, INC. (1)
6,751,573 Performance monitoring in distributed systems using synchronized clocks and distributed event logs 38 2000
 
AKAMAI TECHNOLOGIES, INC. (1)
7,096,266 Extending an Internet content delivery network into an enterprise 59 2002
 
ALIBABA GROUP HOLDING LIMITED (1)
6,393,420 Securing Web server source documents and executables 61 1999
 
Amano Corporation (1)
2003/0159,048 Time stamping system for electronic documents and program medium for the same 38 2003
 
AMERICA ONLINE, INC. (1)
2004/0199,514 Techniques for facilitating item sharing 51 2003
 
AMERICAN POWER CONVERSION CORPORATION (1)
2003/0132,949 User interface providing UPS information 23 2002
 
APPLE COMPUTER, INC. (1)
5,729,734 File privilege administration apparatus and methods 148 1995
 
ARBITRON INC. (1)
4,912,552 Distributed monitoring system 206 1988
 
ARCHITECTURE TECHNOLOGY CORPORATION (1)
7,496,959 Remote collection of computer forensic evidence 24 2003
 
ARL HOLDINGS LLC (1)
6,134,660 Method for revoking computer backup files using cryptographic techniques 183 1997
 
ARRIS ENTERPRISES, INC. (1)
6,865,555 System and method for providing conditional access to digital content 84 2001
 
ASSA ABLOY AB (1)
2006/0230,437 Secure digital credential sharing arrangement 48 2006
 
ATABOK JAPAN, INC. (1)
2002/0077,986 Controlling and managing digital assets 82 2001
 
AUTHENTICA SECURITY TECHNOLOGIES, INC. (1)
6,449,721 Method of encrypting information for remote access while maintaining access control 95 2001
 
AUTODESK, INC. (1)
5,570,108 Method and apparatus for display calibration and control 77 1995
 
AUTONOMY, INC. (1)
6,101,507 File comparison for data backup and file synchronization 96 1998
 
AZALEOS CORPORATION (1)
2004/0039,781 Peer-to-peer content sharing method and system 101 2002
 
BEA SYSTEMS, INC. (1)
2003/0217,333 System and method for rules-based web scenarios and campaigns 77 2002
 
BINFORMA GROUP LIMITED LIABILITY COMPANY (1)
2006/0149,407 Quality management and intelligent manufacturing with labels and smart tags in event-based product manufacturing 59 2006
 
Biolink Technologies International, Inc. (1)
6,487,662 Biometric system for biometric input, comparison, authentication and access control and method therefor 60 1999
 
BOMGAR (1)
2007/0294,368 METHOD AND SYSTEM FOR PROVIDING SECURE REMOTE ACCESS AND CONTROL 20 2007
 
Bottomline Technologies (DE) Inc. (1)
2002/0198,798 Modular business transactions platform 87 2001
 
BRAINSHIELD TECHNOLOGIES, INC. (1)
2003/0177,378 Apparatus and method for the decryption of an encrypted electronic document 40 2002
 
BRITISH TECHNOLOGY GROUP LIMITED (1)
4,799,258 Apparatus and methods for granting access to computers 157 1985
 
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (1)
2003/0014,391 Data distribution 102 2002
 
Bull HN Information Systems Inc. (1)
5,991,879 Method for gradual deployment of user-access security within a data processing system 60 1997
 
BULL S.A. (1)
6,968,060 Method for verifying the use of public keys generated by an on-board system 40 2000
 
CERTCO, INC. (1)
7,177,839 Reliance manager for electronic transaction system 37 2000
 
CGI TECHNOLOGIES AND SOLUTIONS INC. (1)
6,356,903 Content management system 136 1998
 
CHANG, CHUNG NAN (1)
5,835,592 Secure, swift cryptographic key exchange 47 1995
 
CHANTILLEY CORPORATION LIMITED (1)
5,768,381 Apparatus for key distribution in an encryption system 67 1996
 
Charles Smith Enterprises, LLC (1)
6,877,010 System and method for computer-assisted manual and automatic logging of time-based media 49 2001
 
ContractPal, Inc. (1)
7,698,230 Transaction architecture utilizing transaction policy statements 28 2003
 
Crest Industries, Inc. (1)
5,301,247 Method for ensuring secure communications 72 1992
 
CROWLEY, JOHN J. (1)
5,375,169 Cryptographic key management method and apparatus 113 1993
 
CURRENEX, INC. (1)
2002/0156,726 Using digital signatures to streamline the process of amending financial transactions 36 2001
 
CYBER-ARK SOFTWARE LTD. (1)
6,356,941 Network vaults 125 1999
 
Cysive, Inc. (1)
2003/0110,266 Apparatus and method of using session state data across sessions 83 2001
 
CYVA RESEARCH HOLDINGS, LLC (1)
5,987,440 Personal information security and exchange tool 315 1997
 
DIGITAL DOORS, INC. (1)
7,140,044 Data security system and method for separation of user communities 202 2001
 
EASTERN IX GROUP LLC (1)
5,999,907 Intellectual property audit system 191 1993
 
EFUNDS CORPORATION (1)
2003/0061,482 Software security control system and method 50 2002
 
ELECTRONIC PUBLISHING RESOURCES, INC. (1)
4,827,508 Database usage metering and protection system and method 872 1985
 
ELIAS ARTS, LLC (1)
2002/0112,035 System and method for performing content experience management 104 2001
 
ENTRUST LIMITED (1)
7,174,563 Computer network security system and method having unilateral enforceable security policy provision 89 2000
 
EPLUS CAPITAL, INC. (1)
2005/0288,961 Method for a server-less office architecture 59 2005
 
ERUCES, INC. (1)
7,362,868 Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data 32 2000
 
ETEL ACQUISITION CORP A WHOLLY OWNED SUBSIDIARY OF IP UNITY, A CALIFORNIA CORPORATION (1)
7,126,957 Media flow method for transferring real-time data between asynchronous and synchronous networks 27 2002
 
EVAULT, INC. (1)
7,134,041 Systems and methods for data backup over a network 48 2002
 
FACEBOOK, INC. (1)
6,633,311 E-service to manage and export contact information 82 2000
 
FELSHER, DAVID P., MR. (1)
7,181,017 System and method for secure three-party communications 299 2002
 
FIRST DATA CORPORATION (1)
6,938,156 ABDS system and verification status for authenticating entity access 58 2003
 
FISHER-ROSEMOUNT SYSTEMS, INC. (1)
7,076,312 Integrated electronic signatures for approval of process control and safety system software objects 42 2003
 
FLEXERA SOFTWARE LLC (1)
5,671,412 License management system for software applications 355 1995
 
FLEXERA SOFTWARE, INC. (1)
2006/0005,021 Methods and apparatus for secure distribution of software 37 2005
 
FOUNDATIONIP, LLC (1)
6,594,662 Method and system for gathering information resident on global computer networks 86 1999
 
FRANCE TELECOM (1)
5,661,806 Process of combined authentication of a telecommunication terminal and of a user module 104 1995
 
FUJITSU SEMICONDUCTOR LIMITED (1)
6,698,022 Timestamp-based timing recovery for cable modem media access controller 63 1999
 
GEODIGM CORPORATION (1)
2006/0184,637 Method and apparatus for electronic delivery of electronic model images 15 2006
 
GEORGIA TECH RESEARCH CORPORATION (1)
6,510,349 Adaptive data security system and method 46 2000
 
GEOTRUST, INC. (1)
7,003,661 Methods and systems for automated authentication, processing and issuance of digital certificates 58 2002
 
GIGATRUST (1)
7,484,245 System and method for providing data security 60 2000
 
HELIOS SOFTWARE, LLC (1)
6,629,140 Method of controlling an internet web browser in the absence of key activity on a computer 9 2000
 
HERBERT STREET TECHNOLOGIES (1)
7,406,596 Data transfer and management system 30 2001
 
HEWLETT-PACKARD COMPANY (1)
4,888,800 Secure messaging systems 126 1988
 
HITACHI COMPUTER PRODUCTS (AMERICA), INC. (1)
6,807,636 Methods and apparatus for facilitating security in a network 98 2002
 
HUGHES ELECTRONICS CORPORATION (1)
5,434,918 Method for providing mutual authentication of a user and a server on a network 129 1993
 
Hush Communications Corporation (1)
6,292,895 Public key cryptosystem with roaming user capability 65 2000
 
HYGLO SYSTEMS AB (1)
7,461,157 Distributed server functionality for emulated LAN 19 2001
 
INDENTICRYPT, INC. (1)
7,003,117 Identity-based encryption system for secure data distribution 57 2003
 
INTEGRATED TECHNOLOGOES OF AMERICA, INC. (1)
6,351,813 Access control/crypto system 192 1998
 
INTELLISYNC CORPORATION (1)
6,061,790 Network computer system with remote user data encipher methodology 114 1997
 
INTERFUSE TECHNOLOGY CORPORATION (1)
6,874,139 Method and system for seamless integration of preprocessing and postprocessing functions with an existing application program 69 2001
 
Intermind Corporation (1)
5,862,325 Computer-based communication system and method using metadata defining a control structure 1172 1996
 
INTRALINKS, INC. (1)
7,168,094 Method and system for managing access to information and the transfer thereof 21 2001
 
INVENTEC CORPORATION (1)
2004/0193,602 Method and system for maintenance of engineering change data 44 2003
 
ISPHERES CORPORATION (1)
2002/0174,109 EVENT DETECTION WITH CONCURRENT DATA UPDATES 37 2001
 
Kabushiki Kaisha Sega (1)
2006/0168,147 Information processor, file server, accounting control system, accounting control method, and recording medium recording a program therefor 44 2006
 
KASTEN CHASE APPLIED RESEARCH LIMITED (1)
2002/0172,367 System for secure electronic information transmission 85 2002
 
KAYDARA, INC. (1)
7,461,405 Mixed-media data encoding 17 2001
 
KDMS International LLC (1)
2003/0159,066 Method and apparatus for network user location verification 48 2002
 
KEYBYTE TECHNOLOGIES, INC. (1)
6,011,847 Cryptographic access and labeling system 58 1995
 
KINGLITE HOLDINGS INC. (1)
2003/0037,237 Systems and methods for computer device authentication 109 2001
 
KONINKLIJKE PHILIPS ELECTRONICS N.V. (1)
2006/0075,258 Archive system and method for copy controlled storage devices 22 2003
 
KYLINTV, INC. (1)
2006/0277,316 Internet protocol television 43 2006
 
Laurel Intelligent Systems, Co., Ltd. (1)
5,267,313 File security system 38 1992
 
LENOVO (SINGAPORE) PTE LTD. (1)
6,922,785 Apparatus and a method for secure communications for network computers 26 2000
 
LG-NORTEL CO., LTD. (1)
2001/0056,550 Protective device for internal resource protection in network and method for operating the same 54 2001
 
MARK ANY, INC. OF 10TH FLOOR (1)
2003/0023,559 Method for securing digital information and system therefor 42 2001
 
MATHON SYSTEMS, INC. (1)
7,386,529 System and method for managing content with event driven actions to facilitate workflow and other features 42 2003
 
MATSUSHITA-KOTOBUKI ELECTRONICS INDUSTRIES, LTD. (1)
7,200,747 System for ensuring data privacy and user differentiation in a distributed file system 54 2001
 
MEDTECH GLOBAL LIMITED (1)
6,611,846 Method and system for medical patient data analysis 151 1999
 
MESSAGE SECURE CORPORATION (1)
6,988,199 Secure and reliable document delivery 80 2001
 
METACRYPTION, LLC (1)
2003/0088,783 Systems, methods and devices for secure computing 52 2001
 
MICRON TECHNOLOGY, INC. (1)
6,625,650 System for multi-layer broadband provisioning in computer networks 124 1999
 
MIST INC. (1)
6,588,673 Method and system providing in-line pre-production data preparation and personalization solutions for smart cards 108 2000
 
MODUS OPERANDI, INC. (1)
2002/0069,363 System and method for data recovery and protection 62 2000
 
MOTOROLA MOBILITY LLC (1)
5,404,404 Method for updating encryption key information in communication units 54 1993
 
NAMCO HOLDING CORPORATION (1)
6,924,425 Method and apparatus for storing a multipart audio performance with interactive playback 48 2002
 
NASTALOR VENTERI TRE L.L.C. (1)
6,336,114 System and method for restricting access to a data table within a database 74 1998
 
NATIONAL REALTY SYSTEMS, LLC (1)
2003/0101,072 Document protection system 50 2002
 
NATIONAL SEMICONDUCTOR CORPORATION (1)
5,058,164 Encryption of streams of addressed information to be used for program code protection 181 1990
 
NCR CORPORATION (1)
6,608,636 Server based virtual conferencing 83 1992
 
NET CONVERSIONS, INC. (1)
2002/0062,245 System and method for generating real-time promotions on an electronic commerce world wide website to increase the likelihood of purchase 89 2001
 
Net i Trust (1)
6,145,084 Adaptive communication system enabling dissimilar devices to exchange information over a network 90 1998
 
Netlink I.T. Solutions Ltd. (1)
2003/0079,175 Data processing system and development tool 43 2001
 
NETWORK APPLIANCE, INC. (1)
6,718,361 Method and apparatus for reliable and scalable distribution of data files in distributed networks 365 2000
 
NETZERO, INC. (1)
6,366,298 Monitoring of individual internet usage 159 1999
 
NFR SECURITY, INC. (1)
6,530,024 Adaptive feedback security system and method 182 1998
 
NIPPON TELEGRAPH AND TELEPHONE CORPORATION (1)
5,600,722 System and scheme of cipher communication 56 1994
 
NISHIDA, TAISHIN (1)
7,224,795 Variable-length key cryptosystem 37 2002
 
NORTEL NETWORKS LIMITED (1)
2002/0138,762 Management of log archival and reporting for data network security systems 115 2001
 
NOVELL INTELLECTUAL PROPERTY HOLDINGS, INC. (1)
6,950,936 Secure intranet access 71 2003
 
NOVELL, INC. (1)
5,787,175 Method and apparatus for collaborative document control 229 1995
 
NUANCE COMMUNICATIONS, INC. (1)
6,870,920 System and method for multi-stage data logging 24 2002
 
NVIDIA CORPORATION (1)
7,265,764 System and method for providing a hardware icon with magnification and security 35 2002
 
ODS NETWORKS, INC. (1)
6,347,374 Event detection 370 1998
 
OMNISECURE, INC. (1)
5,584,023 Computer system including a transparent and secure file transform mechanism 188 1993
 
OneName Corporation (1)
6,088,717 Computer-based communication system and method using metadata defining a control-structure 476 1998
 
OPEN TEXT S.A. (1)
7,287,055 Web-based groupware system 36 2004
 
PANASONIC CORPORATION (1)
2001/0056,541 File management apparatus 44 2001
 
PARALLELS IP HOLDINGS GMBH (1)
7,076,633 Hosting service providing platform system and method 95 2001
 
PEOPLE TO PEOPLE PUBLISHING, INC. (1)
2003/0028,610 Peer-to-peer file sharing system and method using user datagram protocol 103 2001
 
Pride Software Development Corp. (1)
4,796,220 Method of controlling the copying of software 351 1986
 
PROBIX, INC. (1)
2002/0046,350 Method and system for establishing an audit trail to protect objects distributed over a network 43 2001
 
PROOFPOINT, INC. (1)
2006/0101,285 Secure and searchable storage system and method 73 2004
 
PUMPKIN HOUSE INCORPORATED (1)
5,870,477 Enciphering/deciphering device and method, and encryption/decryption communication system 75 1996
 
RAKUTEN, INC. (1)
6,299,069 Integrated circuit for embedding in smart cards, and method of issuing smart cards 28 1998
 
RAPPORE TECHNOLOGIES, INC. (1)
2002/0169,965 Clearance-based method for dynamically configuring encryption strength 38 2001
 
RAXCO SOFTWARE, INC. (1)
5,655,119 Method for moving an open file being accessed by at least one user 45 1996
 
RAYTHEON BBN TECHNOLOGIES CORP. (1)
6,941,355 System for selecting and disseminating active policies to peer device and discarding policy that is not being requested 57 2000
 
REEFEDGE NETWORKS, LLC (1)
6,851,050 Providing secure network access for short-range wireless computing devices 44 2001
 
RENESAS ELECTRONICS CORPORATION (1)
7,290,148 Encryption and decryption communication semiconductor device and recording/reproducing apparatus 38 2003
 
REVEO, INC. (1)
2002/0026,321 INTERNET-BASED SYSTEM AND METHOD FOR FAIRLY AND SECURELY ENABLING TIMED-CONSTRAINED COMPETITION USING GLOBALLY TIME-SYCHRONIZED CLIENT SUBSYSTEMS AND INFORMATION SERVERS HAVING MICROSECOND CLIENT-EVENT RESOLUTION 101 1999
 
ROWLAND NETWORK GROUP LLC (1)
2003/0115,146 System and method for detecting unauthorized copying of encrypted data 41 2001
 
RPK NEW ZEALAND LIMITED (1)
7,076,067 Encrypted media key management 38 2001
 
SAFECOM A/S (1)
6,952,780 System and method for ensuring secure transfer of a document from a client of a network to a printer 71 2001
 
SAFENET DATA SECURITY (ISRAEL) LTD. (1)
6,915,425 System for permitting off-line playback of digital content, and for managing content rights 40 2000
 
SANYO ELECTRIC CO., LTD. (1)
7,010,809 Reproduction device stopping reproduction of encrypted content data having encrypted region shorter than predetermined length 37 2001
 
SECURE AXCESS LLC (1)
6,601,170 Secure internet user state creation method and system with user supplied key and seeding 33 2000
 
SECURE COMPUTING TECHNOLOGY CORPORATION (1)
5,276,735 Data enclave and trusted path system 339 1992
 
SECURITY SOFTWARE AMERICA, INC., A CORP. OF DE (1)
4,757,533 Security system for microcomputers 228 1985
 
SERENA SOFTWARE INTERNATIONAL, INC. (1)
6,263,348 Method and apparatus for identifying the existence of differences between two files 109 1998
 
SIGHTSOUND TECHNOLOGIES, LLC (1)
2004/0025,037 System and method for manipulating a computer file and/or program 40 2003
 
SIGHTSOUND.COM INCORPORATED (1)
6,615,349 System and method for manipulating a computer file and/or program 103 1999
 
Signitas Corporation (1)
2003/0217,264 System and method for providing a secure environment during the use of electronic documents and data 62 2002
 
SIVAULT, INC. (1)
2002/0031,230 Method and apparatus for a web-based application service model for security management 151 2001
 
Social Communications Company (1)
2009/0254,843 SHARED VIRTUAL AREA COMMUNICATION ENVIRONMENT BASED APPARATUS AND METHODS 38 2009
 
SOL LABS K.G. LIMITED LIABILITY COMPANY (1)
5,881,287 Method and apparatus for copy protection of images in a computer system 99 1997
 
Solarsoft Ltd. (1)
2003/0191,938 Computer security system and method 29 2002
 
SPX CORPORATION (1)
2003/0037,133 Method and system for implementing redundant servers 42 2001
 
SPYRUS, INC. (1)
5,677,953 System and method for access control for portable data storage media 252 1995
 
SUMITOMO HEAVY INDUSTRIES, LTD. (1)
2001/0044,903 Information access method and network system 42 2001
 
SURETY, LLC (1)
7,047,404 Method and apparatus for self-authenticating digital records 31 2000
 
SYMMETRICOM, INC. (1)
2002/0056,042 System and methods for generating trusted and authenticatable time stamps for electronic documents 47 2002
 
SYNETICS, INC. (1)
2004/0022,390 System and method for data protection and secure sharing of information over a computer network 51 2002
 
SYNOPSYS, INC. (1)
6,810,389 System and method for flexible packaging of software application licenses 64 2000
 
SYSTAR SA (1)
2002/0112,048 System and method for providing behavioral information of a user accessing on-line resources 92 2000
 
TANDEM COMPUTERS CORPORATION (1)
4,972,472 Method and apparatus for changing the master key in a cryptographic system 73 1985
 
TEC SEC, INCORPORATED (1)
2002/0062,451 System and method of providing communication security 116 2001
 
TEIGEL PROCESSING AB, L.L.C. (1)
7,020,645 Systems and methods for state-less authentication 106 2001
 
THE REGENTS OF THE UNIVERSITY OF CALIFORNIA (1)
7,113,594 Systems and methods for identity-based encryption and related cryptographic techniques 76 2002
 
THOMSON LICENSING (1)
2003/0182,579 Transmitting and processing protected content 58 2003
 
Toppan Moore Co., Ltd. (1)
4,734,568 IC card which can set security level for every memory area 144 1986
 
TRANSFINITY CORPORATION (1)
5,893,084 Method for creating specific purpose rule-based n-bit virtual machines 56 1996
 
TTI INVENTIONS C LLC (1)
5,406,628 Public key authentication and key agreement for low-cost terminals 107 1993
 
TUMBLEWEED COMMUNICATIONS CORP. (1)
6,529,956 Private, trackable URLs for directed document delivery 86 2000
 
U.S. Philips Corporation (1)
4,423,387 Current mirror arrangement 29 1981
 
UNIFIEDMARKET WORLDWIDE, LLC (1)
2002/0007,335 Method and system for a network-based securities marketplace 100 2001
 
UNITED SERVICES AUTOMOBILE ASSOCIATION, INC. (1)
6,877,136 System and method of providing electronic access to one or more documents 49 2002
 
UniVirtual Corp. (1)
5,813,009 Computer based records management system method 672 1995
 
VADIUM TECHNOLOGY, INC. (1)
2003/0026,431 One-time-pad encryption with central key service and key management 29 2002
 
VENAFI, INC. (1)
2005/0081,029 Remote management of client installed digital certificates 45 2004
 
VERIZON BUSINESS GLOBAL LLC (1)
6,385,644 Multi-threaded web based user inbox for report management 88 1998
 
VERSADA NETWORKS (1)
2003/0033,528 System and method for specifying security, privacy, and access control to information used by others 46 2002
 
VIDIUS INC. (1)
2002/0150,239 Method for personalized encryption in an un-trusted environment 85 2002
 
VISUALGOLD.COM, INC. (1)
2002/0016,922 Secure distributing services network system and method thereof 78 2001
 
VOLTAGE SECURITY, INC. (1)
7,103,911 Identity-based-encryption system with district policy information 25 2003
 
VORMETRIC, INC. (1)
6,931,530 Secure network file access controller implementing access control and auditing 76 2002
 
WATCHGUARD TECHNOLOGIES, INC. (1)
6,738,908 Generalized network security policy templates for implementing similar network security policies across multiple networks 79 1999
 
WAVE SYSTEMS CORP. (1)
5,247,575 Information distribution system 807 1992
 
WEB.COM HOLDING COMPANY, INC. (1)
2002/0069,272 System and method for managing server configurations 74 2001
 
WELLS FARGO BANK, NATIONAL ASSOCIATION (1)
7,266,684 Internet third-party authentication using electronic tickets 47 2001
 
Westport Benefits, L.L.C. (1)
2002/0069,077 Computerized system for customizing and managing benefits 60 2001
 
WISTRON CORPORATION (1)
6,389,538 System for tracking end-user electronic content usage 416 1998
 
XCERT SOFTWARE, INC. (1)
6,249,873 Method of and apparatus for providing secure distributed directory services and public key infrastructure 124 1999
 
XYLECO, INC. (1)
2003/0088,517 System and method for controlling access and use of private information 54 2001
 
YAHOO! INC. (1)
6,301,614 System and method for efficient representation of data set addresses in a web crawler 51 1999
 
YAMAHA CORPORATION (1)
2003/0023,649 Digital filtering method and device and sound image localizing device 3 2002
 
YASZISTRA FUND III, LLC (1)
6,735,701 Network policy management and effectiveness system 152 1998
 
Other [Check patent profile for assignment information] (18)
5,144,660 Securing a computer against undesired write operations to or read operations from a mass storage device 200 1989
5,619,576 Variable-key cryptography system 35 1995
5,748,736 System and method for secure group communications via multicast or broadcast 206 1996
5,790,789 Method and architecture for the creation, control and deployment of services within a distributed computer environment 370 1996
6,226,745 Information sharing system and method with requester dependent sharing and security rules 145 1998
6,292,899 Volatile key apparatus for safeguarding confidential data stored in a computer system memory 69 1998
6,260,141 Software license control system based on independent software registration server 84 2000
6,990,441 Natural language messages from a keystroke output wedge 10 2000
2002/0133,699 Method and apparatus to regulate use of freely exchanged files and streams 41 2001
7,124,164 Method and apparatus for providing group interaction via communications networks 111 2001
2002/0003,886 Method and system for storing multiple media tracks in a single, multiply encrypted computer file 33 2001
2002/0010,679 Information record infrastructure, system and method 405 2001
2002/0050,098 Rotary access locking apparatus 37 2001
2003/0046,176 One page purchasing system 15 2001
2004/0205,576 System and method for managing Knowledge information 24 2002
2003/0037,253 Digital rights management system 39 2002
2004/0193,905 System and method for providing secure transmission, search, and storage of data 42 2004
2005/0273,600 Method and system for file data access within a secure environment 42 2005

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
INTELLECTUAL VENTURES I LLC (5)
8,543,827 Methods and systems for providing access control to secured data 0 2008
8,266,674 Method and system for implementing changes to security policies in a distributed security system 0 2009
8,327,138 Method and system for securing digital assets using process-driven security policies 2 2010
8,341,407 Method and system for protecting electronic data in enterprise environment 0 2011
8,341,406 System and method for providing different levels of key security for controlling access to secured items 0 2011
 
OSR OPEN SYSTEMS RESOURCES, INC. (2)
8,521,752 Systems and methods for arbitrary data transformations 0 2005
8,539,228 Managing access to a resource 1 2006
 
GEMALTO SA (1)
8,229,112 Decipherable searchable encryption method, system for such an encryption 0 2007
 
GENERAL DYNAMICS C4 SYSTEMS, INC. (1)
8,499,163 Serial architecture for high assurance processing 0 2010

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
3.5 Year Payment $1600.00 $800.00 $400.00 Oct 19, 2014
7.5 Year Payment $3600.00 $1800.00 $900.00 Oct 19, 2018
11.5 Year Payment $7400.00 $3700.00 $1850.00 Oct 19, 2022
Fee Large entity fee small entity fee micro entity fee
Surcharge - 3.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 7.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00