US Patent No: 7,930,756

Number of patents in Portfolio can not be more than 2000

Multi-level cryptographic transformations for securing digital assets

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

Enhanced multi-level cryptographic transformations that secure electronic files are disclosed. The secured electronic files contain not only secured data but also security information. The security information includes cryptographic structure information, access rules and secrets (e.g., keys). The cryptographic structure information explains the multi-level cryptographic transformations associated with securing or unsecuring the electronic files. The access rules and the secrets are used by the cryptographic transformations to secure the electronic files. Since the secured electronic files contain the cryptographic structure information, the particular cryptographic transformations (including their sequencing) can vary with each electronic file, if so desired. Typically, the secured electronic files are secured and managed by a file security system, such as a distributed security system.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Related Publications

Loading Related Publications... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTELLECTUAL VENTURES I LLCDENKENDORF1613

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Crocker, Steven Toye Redwood City, CA 7 200
Garcia, Denis Jacques Paul Palo Alto, CA 19 350

Cited Art Landscape

Patent Info (Count) # Cites Year
 
MICROSOFT CORPORATION (51)
5,732,265 Storage optimizing encoder and method 98 1995
5,719,941 Method for changing passwords on a remote computer 108 1996
6,055,314 System and method for secure purchase and delivery of video content programs 532 1996
5,757,920 Logon certification 174 1997
5,978,802 System and method for providing opportunistic file access in a network environment 54 1997
6,134,658 Multi-server location-independent authentication certificate management system 134 1997
6,272,631 Protected storage of core data secrets 121 1997
6,031,584 Method for reducing digital video frame frequency while maintaining temporal smoothness 32 1997
6,044,155 Method and system for securely archiving core data secrets 150 1997
6,308,273 Method and system of security location discrimination 373 1998
6,505,300 Method and system for secure running of untrusted content 233 1998
6,289,458 Per property access control mechanism 56 1998
6,466,932 System and method for implementing group policy 229 1999
6,775,779 Hierarchical trusted code for content protection in computers 109 1999
6,584,466 Internet document management system and methods 211 1999
6,801,999 Passive and active software objects containing bore resistant watermarking 145 1999
6,389,433 Method and system for automatically merging files into a single instance store 220 1999
6,477,544 Single instance store for file systems 240 1999
6,810,479 System and method for configuring and managing resources on a multi-purpose integrated circuit card using a personal computer 65 2000
6,834,341 Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet 179 2000
6,971,018 File protection service for a computer system 85 2000
6,349,337 Maintaining a first session on a first computing device and subsequently connecting to the first session via different computing devices and adapting the first session to conform to the different computing devices system configurations 101 2000
6,891,953 Method and system for binding enhanced software features to a persona 95 2000
7,035,910 System and method for document isolation 66 2000
6,976,259 Method for abstract state transitions without requiring state machine knowledge 21 2000
2001/0032,181 System and method for secure third-party development and hosting within a financial services network 107 2000
7,058,978 Security component for a computing device 63 2000
7,013,332 Distributed policy model for access control 52 2001
7,043,637 On-disk file format for a serverless distributed file system 69 2001
7,478,243 On-disk file format for serverless distributed file system with signed manifest of file modifications 20 2001
2002/0194,484 On-disk file format for serverless distributed file system with signed manifest of file modifications 86 2001
7,073,063 Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like 119 2001
6,754,657 Time stamping of database records 49 2001
7,287,058 Methods, systems and computer program products for performing document-inclusion operations over a network 21 2002
2003/0182,584 Systems and methods for setting and resetting a password 53 2002
7,509,492 Distributed scalable cryptographic access control 27 2002
7,000,150 Platform for computer process monitoring 41 2002
2003/0233,650 Visual group interface for group connectivity 83 2002
6,950,818 System and method for implementing group policy 111 2002
6,938,042 Peer-to-peer file sharing 99 2002
2004/0098,580 State reference 49 2002
7,383,586 File system operation and digital rights management (DRM) 45 2003
2005/0091,289 File sharing in P2P group shared spaces 58 2003
2005/0198,326 Invalid policy detection 48 2004
2004/0243,853 System and method for improved network security 43 2004
2006/0075,465 Rule-driven specification of Web Service policy 48 2004
2005/0256,909 Peer-to-peer file sharing 103 2004
7,401,220 On-disk file format for a serverless distributed file system 42 2004
7,415,608 On-disk file format for a serverless distributed file system 40 2004
7,454,612 On-disk file format for a serverless distributed file system 25 2004
7,539,867 On-disk file format for a serverless distributed file system 24 2004
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (48)
4,203,166 Cryptographic file security for multiple domain networks 193 1977
4,238,854 Cryptographic file security for single domain networks 153 1977
4,887,204 System and method for accessing remote files in a distributed networking environment 288 1987
5,032,979 Distributed security auditing subsystem for an operating system 324 1990
5,319,705 Method and system for multimedia access control enablement 686 1992
5,414,852 Method for protecting data in a computer system 156 1992
5,689,688 Probabilistic anonymous clock synchronization method and apparatus for synchronizing a local time scale with a reference time scale 76 1993
5,461,710 Method for providing a readily distinguishable template and means of duplication thereof in a computer system graphical user interface 147 1994
5,535,375 File manager for files shared by heterogeneous clients 208 1994
5,821,933 Visual access to restricted functions represented on a graphical user interface 134 1995
5,787,169 Method and apparatus for controlling access to encrypted data files in a computer system 90 1995
5,778,065 Method and system for changing an authorization password or key in a distributed communication network 109 1996
5,870,468 Enhanced data privacy for portable computers 90 1996
5,673,316 Creation and distribution of cryptographic envelope 490 1996
6,032,216 Parallel file system with method using tokens for locking modes 232 1997
6,035,404 Concurrent user access control in stateless network computing service system 58 1997
6,405,315 Decentralized remotely encrypted file system 153 1997
6,105,131 Secure server and method of operation for a distributed information system 136 1997
6,141,754 Integrated method and system for controlling information access and distribution 288 1997
6,260,040 Shared file system for digital content 103 1998
6,088,805 Systems, methods and computer program products for authenticating client requests with client certificate information 107 1998
6,199,070 Using a database for program logs 37 1998
6,282,649 Method for controlling access to electronically provided services and system for implementing such method 89 1998
6,442,695 Establishment of user home directories in a heterogeneous network environment 47 1998
6,587,878 System, method, and program for measuring performance in a network system 69 1999
6,598,161 Methods, systems and computer program products for multi-level encryption 156 1999
6,961,849 Selective data encryption using style sheet processing for decryption by a group clerk 78 1999
6,950,943 System for electronic repository of data enforcing access control on data search and retrieval 65 1999
7,237,002 System and method for dynamic browser management of web site 75 2000
7,099,926 Object caching and update queuing technique to improve performance and resource utilization 61 2000
6,947,556 Secure data storage and retrieval with key management and user authentication 136 2000
7,010,689 Secure data storage and retrieval in a client-server environment 105 2000
6,978,366 Secure document management system 50 2000
6,647,388 Access control system, access control method, storage medium and program transmission apparatus 127 2000
2001/0034,839 Method and apparatus for secure transmission of data and applications 112 2000
2002/0133,735 System and method for efficient failover/failback techniques for fault-tolerant data storage system 11 2001
6,959,308 Archiving and retrieval method and apparatus 49 2001
7,280,658 Systems, methods, and computer program products for accelerated dynamic protection of data 39 2001
6,892,201 Apparatus and method for providing access rights information in a portion of a file 69 2001
2003/0051,039 Apparatus and method for awarding a user for accessing content based on access rights information 50 2001
2003/0115,570 Development environment for building software applications that mimics the target environment 46 2001
2002/0136,317 Block coding for multilevel data communication 3 2002
7,035,854 Content management system and methodology employing non-transferable access tokens to control data access 52 2002
2003/0154,296 Transmission control system, server, terminal station, transmission control method, program and storage medium 18 2002
6,842,825 Adjusting timestamps to preserve update timing information for cached data objects 69 2002
7,120,635 Event-based database access execution 50 2002
2005/0039,034 Security containers for document components 91 2003
7,130,964 Object caching and update queuing technique to improve performance and resource utilization 47 2004
 
INTELLECTUAL VENTURES I LLC (26)
7,681,034 Method and apparatus for securing electronic data 28 2002
2004/0103,202 System and method for providing distributed access control to secured items 70 2002
6,931,597 Indications of secured digital assets 52 2002
7,631,184 System and method for imposing security on copies of secured items 26 2002
7,478,418 Guaranteed delivery of changes to security policies in a distributed system 31 2002
7,565,683 Method and system for implementing changes to security policies in a distributed security system 28 2002
2003/0110,397 Guaranteed delivery of changes to security policies in a distributed system 86 2002
7,729,995 Managing secured files in designated locations 22 2002
7,562,232 System and method for providing manageability to security information for secured items 26 2002
2003/0120,684 System and method for providing manageability to security information for secured items 51 2002
7,512,810 Method and system for protecting encrypted files transmitted over a network 31 2002
2004/0064,710 Document security system that permits external users to gain access to secured files 47 2002
7,730,543 Method and system for enabling users of a group shared across multiple file security systems to access secured files 20 2003
7,555,558 Method and system for fault-tolerant transfer of files across a network 19 2003
7,703,140 Method and system for securing digital assets using process-driven security policies 25 2003
2005/0071,275 Method and apparatus for transitioning between states of security policies used to secure electronic documents 43 2003
2005/0071,658 Method and system for securing digital assets using process-driven security policies 57 2003
2005/0086,531 Method and system for proxy approval of security changes for a file security system 40 2003
2005/0138,371 Method and system for distribution of notifications in file security systems 40 2003
7,702,909 Method and system for validating timestamps 21 2003
2005/0138,383 Method and system for validating timestamps 47 2003
7,748,045 Method and system for providing cryptographic document retention with off-line access 21 2004
2005/0223,242 Method and system for providing document retention using cryptography 62 2004
2005/0223,414 Method and system for providing cryptographic document retention with off-line access 63 2004
7,707,427 Multi-level file digests 19 2004
2010/0199,088 Method and System For Securing Digital Assets Using Process-Driven Security Policies 18 2010
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (16)
5,212,788 System and method for consistent timestamping in distributed computer databases 86 1990
5,204,897 Management interface for license management system 533 1992
5,923,754 Copy protection for recorded media 90 1997
6,611,599 Watermarking of digital object 107 1997
6,148,338 System for logging and enabling ordered retrieval of management events 72 1998
6,550,011 Media content protection utilizing public key cryptography 304 1999
7,340,600 Authorization infrastructure based on public key cryptography 53 2000
2002/0077,988 Distributing digital content 137 2000
2003/0005,168 System and method for auditing system call events with system call wrappers 28 2001
2003/0009,685 System and method for file system mandatory access control 61 2001
2003/0078,959 Deployment of business logic software and data content onto network servers 81 2001
7,003,116 System for encrypted file storage optimization via differentiated key lengths 19 2001
7,171,557 System for optimized key management with file groups 52 2001
7,203,317 System for enabling lazy-revocation through recursive key generation 47 2001
2002/0120,851 Device and method for data timestamping 26 2002
7,219,230 Optimizing costs associated with managing encrypted data 38 2002
 
EMC CORPORATION (13)
5,661,668 Apparatus and method for analyzing and correlating events in a system using a causality matrix 184 1996
6,249,755 Apparatus and method for event correlation and problem reporting 175 1997
6,192,408 Network file server sharing local caches of file access information in data processors assigned to respective file systems 257 1997
6,314,408 Method and apparatus for controlling access to a product 110 1998
6,615,350 Module authentication and binding library extensions 103 1999
6,289,450 Information security architecture for encrypting documents for remote access while maintaining access control 148 1999
6,978,376 Information security architecture for encrypting documents for remote access while maintaining access control 74 2000
6,339,825 Method of encrypting information for remote access while maintaining access control 93 2001
2002/0029,340 Method of encrypting information for remote access while maintaining access control 57 2001
2002/0178,271 Dynamic file access control and management 159 2001
7,024,427 Virtual file system 121 2001
7,249,251 Methods and apparatus for secure modification of a retention period for data in a storage system 25 2004
7,107,185 Apparatus and method for event correlation and problem reporting 38 2005
 
MCAFEE, INC. (12)
5,502,766 Data enclave and trusted path system 241 1993
5,499,297 System and method for trusted path communications 115 1994
5,557,765 System and method for data recovery 193 1995
5,745,573 System and method for controlling access to a user secret 136 1997
6,272,632 System and method for controlling access to a user secret using a key recovery field 116 1998
6,357,010 System and method for controlling access to documents stored on an internal network 159 1998
6,453,419 System and method for implementing a security policy 106 1998
7,308,702 Locally adaptable central security management in a heterogeneous network environment 59 2000
6,826,698 System, method and computer program product for rule based network security policies 101 2000
6,640,307 System and method for controlling access to documents stored on an internal network 86 2000
6,920,558 Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system 84 2001
7,159,036 Updating data from a source computer to groups of destination computers 102 2001
 
Entrust Technologies Limited (9)
6,603,857 Method and apparatus for controlling release of time sensitive information 57 1997
6,370,249 Method and apparatus for public key management 86 1997
6,442,688 Method and apparatus for obtaining status of public key certificate updates 60 1997
5,968,177 Method and apparatus for processing administration of a secured community 63 1997
6,134,327 Method and apparatus for creating communities of trust in a secure communication system 79 1997
6,341,164 Method and apparatus for correcting improper encryption and/or for reducing memory storage 50 1998
6,266,420 Method and apparatus for secure group communications 143 1998
6,574,733 Centralized secure backup system and method 49 1999
6,567,914 Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system 113 2000
 
ORACLE INTERNATIONAL CORPORATION (9)
6,158,010 System and method for maintaining security in a distributed computer network 345 1999
6,591,295 Methods and apparatus for using multimedia data stored in a relational database in web applications 76 1999
6,968,456 Method and system for providing a tamper-proof storage of an audit trail in a database 24 2000
6,941,472 System and method for maintaining security in a distributed computer network 71 2001
7,080,077 Localized access 150 2001
7,194,764 User authentication 93 2001
7,185,364 Access system interface 130 2001
6,816,871 Delivering output XML with dynamically selectable processing 81 2001
7,225,256 Impersonation in an access system 56 2001
 
TECSEC, INCORPORATED (9)
5,369,702 Distributed cryptographic object method 235 1993
5,717,755 Distributed cryptographic object method 63 1994
5,680,452 Distributed cryptographic object method 112 1995
5,787,173 Cryptographic key management method and apparatus 78 1997
5,898,781 Distributed cryptographic object method 61 1997
6,490,680 Access control and authorization system 187 1998
6,542,608 Cryptographic key split combiner 67 2001
6,549,623 Cryptographic key split combiner 53 2002
2003/0172,280 Access control and authorization system 57 2002
 
GOOGLE INC. (8)
5,495,533 Personal key archive 327 1994
5,778,350 Data collection, processing, and reporting system 58 1995
7,058,696 Internet-based shared file service with native PC client access and semantics 105 2000
7,136,903 Internet-based shared file service with native PC client access and semantics and distributed access control 121 2000
2002/0133,481 Methods and apparatus for providing search results in response to an ambiguous search query 53 2000
7,117,322 Method, system, and program for retention management and protection of stored objects 45 2003
7,146,388 Method, system, and program for archiving files 90 2003
7,107,416 Method, system, and program for implementing retention policies to archive records 91 2003
 
INTEL CORPORATION (8)
6,907,034 Out-of-band signaling for network based computer session synchronization 88 1999
6,317,777 Method for web based storage and retrieval of documents 253 1999
2002/0174,415 System and method for debugging distributed software environments 92 2001
6,957,261 Resource policy management using a centralized policy data structure 110 2001
2003/0196,096 Microcode patch authentication 51 2002
7,343,488 Method and apparatus for providing discrete data storage security 14 2002
2004/0193,912 Methods and systems for managing security policies 93 2003
2007/0006,214 Updating machines while disconnected from an update source 47 2005
 
SONY CORPORATION (8)
6,978,377 Copy protection using detailed copy control information 44 2000
6,754,665 Information processing apparatus, information processing method, and storage medium 61 2000
7,073,073 Data providing system, device, and method 91 2000
2003/0046,238 Data processing apparatus, data processing system, and data processing method therefor 129 2000
7,116,785 Data processing system, data processing method, and program providing medium 23 2001
7,319,752 Information recording device, information playback device, information recording method, information playback method, and information recording medium and program providing medium used therewith 46 2001
7,203,968 Method and apparatus for selectively executing information recording using a cognizant mode and a non-cognizant mode 49 2001
6,834,333 Data processing device, data storage device, data processing method, and program providing medium for storing content protected under high security management 44 2001
 
SUN MICROSYSTEMS, INC. (8)
5,708,709 System and method for managing try-and-buy usage of application programs 494 1995
6,295,361 Method and apparatus for multicast indication of group key change 104 1998
7,188,181 Universal session sharing 136 1999
6,308,256 Secure execution of program instructions provided by network interactions with processor 66 1999
6,363,480 Ephemeral decryptability 67 1999
6,915,435 Method and system for managing information retention 87 2000
6,931,450 Direct access from client to storage device 72 2000
6,941,456 Method, system, and program for encrypting files in a computer system 51 2001
 
CISCO TECHNOLOGY, INC. (7)
6,212,561 Forced sequential access to specified domains in a computer network 96 1998
6,038,322 Group key distribution 95 1998
6,405,318 Intrusion detection system 267 1999
6,629,243 Secure communications system 91 1999
6,961,855 Notification of modifications to a trusted computing base 26 1999
6,988,133 Method and apparatus for communicating network quality of service policy information to a plurality of policy enforcement points 92 2000
6,845,452 Providing security for external access to a protected computer network 59 2002
 
ADOBE SYSTEMS INCORPORATED (5)
6,185,684 Secured document access control using recipient lists 109 1998
6,205,549 Encapsulation of public key cryptography standard number 7 into a secured document 51 1998
7,359,517 Nestable skeleton decryption keys for digital rights management 30 2001
7,434,048 Controlling access to electronic documents 65 2003
2005/0097,061 Offline access in a document control system 82 2003
 
ENTRUST, INC. (5)
5,850,443 Key management system for mixed-trust environments 130 1996
6,182,142 Distributed access management of information resources 458 1998
6,161,139 Administrative roles that govern access to administrative functions 442 1999
6,453,353 Role-based navigation of information resources 316 1999
6,339,423 Multi-domain access control 175 2000
 
GUARDIAN DATA STORAGE, LLC (5)
2003/0110,169 System and method for providing manageability to security information for secured items 69 2002
7,178,033 Method and apparatus for securing digital assets 61 2002
2003/0154,381 Managing file access via a designated place 52 2002
6,889,210 Method and system for managing security tiers 64 2003
2005/0071,657 Method and system for securing digital assets using time-based security criteria 54 2003
 
HITACHI, LTD. (5)
5,235,641 File encryption method and file cryptographic system 149 1991
6,023,506 Data encryption control apparatus and method 137 1996
6,816,969 Digital signature generating method and digital signature verifying method 24 2001
6,882,994 Method and system for querying database, as well as a recording medium for storing a database querying program 31 2001
7,120,757 Storage management integrated system and storage control method for storage management integrated system 127 2002
 
KABUSHIKI KAISHA TOSHIBA (5)
5,835,601 File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing 147 1995
5,944,794 User identification data management scheme for networking computer systems using wide area network 182 1995
6,085,323 Information processing system having function of securely protecting confidential information 113 1997
6,332,025 Software distribution system and software utilization scheme for improving security and user convenience 117 2000
6,993,135 Content processing system and content protecting method 55 2001
 
LUCENT TECHNOLOGIES INC. (5)
5,720,033 Security platform and method using object oriented rules for computer-based systems using UNIX-line operating systems 156 1995
6,421,714 Efficient mobility management scheme for a wireless internet access system 224 1998
6,587,946 Method and system for quorum controlled asymmetric proxy encryption 54 1998
6,687,822 Method and system for providing translation certificates 63 1999
6,987,752 Method and apparatus for frequency offset estimation and interleaver synchronization using periodic signature sequences 21 1999
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (5)
6,240,188 Distributed group key management scheme for secure many-to-many communication 116 1999
7,146,498 Computer and program recording medium 43 2000
2002/0129,235 Digital data distributing system 69 2001
2004/0064,507 Information providing system and device constituting the same 28 2003
2005/0177,858 Reproduction apparatus and digest reproduction method 40 2004
 
SYMANTEC CORPORATION (5)
5,052,040 Multiple user stored data cryptographic labeling system and method 197 1990
5,699,428 System for automatic decryption of file data on a per-use basis and automatic re-encryption within context of multi-threaded operating system under which applications run in real-time 106 1996
5,953,419 Cryptographic file labeling system for supporting secured access by multiple users 109 1996
7,139,399 Cryptographic system with methods for user-controlled message recovery 22 2001
7,197,638 Unified permissions control for remotely and locally stored files whose informational content may be protected by smart-locking and/or bubble-protection 40 2001
 
CANON KABUSHIKI KAISHA (4)
5,684,987 Management system of multimedia 48 1994
5,922,073 System and method for controlling access to subject data using location data associated with the subject data and a requesting device 109 1996
6,862,103 Network print system, and information processing apparatus and its control method 49 2000
6,898,627 Communication device having the capability of performing information exchange between a facsimile medium and an electronic information medium such as an e-mail medium 21 2000
 
FUJITSU LIMITED (4)
7,051,213 Storage medium and method and apparatus for separately protecting data in different areas of the storage medium 62 1998
6,915,434 Electronic data storage apparatus with key management function and electronic data storage method 81 1999
7,046,807 Data administration method 40 2001
2002/0052,981 Method for suppressing a menu, method for controlling copying and moving of data and computer-readable recording medium recorded with program code for controlling a menu 18 2001
 
InterTrust Technologies Corp. (4)
5,892,900 Systems and methods for secure transaction management and electronic rights protection 1944 1996
6,253,193 Systems and methods for the secure transaction management and electronic rights protection 592 1998
7,233,948 Methods and apparatus for persistent control and protection of content 152 1999
2005/0177,716 Systems and methods for secure transaction management and electronic rights protection 58 2005
 
NEC CORPORATION (4)
5,606,663 Password updating system to vary the password updating intervals according to access frequency 88 1994
6,014,730 Dynamic adding system for memory files shared among hosts, dynamic adding method for memory files shared among hosts, and computer-readable medium recording dynamic adding program for memory files shared among hosts 55 1997
6,343,316 Cooperative work support system 57 1999
2004/0186,845 File system for managing files in tree structure allowing users to readily know availability condition 22 2004
 
SAMSUNG ELECTRONICS CO., LTD. (4)
6,892,306 Digital content cryptograph and process 60 1998
6,950,941 Copy protection system for portable storage media 122 1999
6,466,476 Data coding for multi-bit-per-cell memories having variable numbers of bits per memory cell 106 2001
2002/0035,624 Gateway and a method for operating the same 106 2001
 
APPLE INC. (3)
5,638,501 Method and apparatus for displaying an overlay image 179 1993
5,497,422 Message protection mechanism and graphical user interface therefor 121 1993
5,857,189 File sharing in a teleconference application 89 1996
 
DIGIMARC CORPORATION (3)
5,765,152 System and method for managing copyrighted electronic media 951 1995
6,807,534 System and method for managing copyrighted electronic media 195 2000
2002/0169,963 Digital watermarking apparatus, systems and methods 47 2001
 
LIQUID MACHINES, INC. (3)
6,625,734 Controlling and tracking access to disseminated information 104 1999
7,313,824 Method for protecting digital content from unauthorized use by automatically and dynamically integrating a content-protection agent 47 2002
2005/0028,006 Computer method and apparatus for managing data objects in a distributed context 60 2004
 
MITSUBISHI DENKI KABUSHIKI KAISHA (3)
5,689,718 System and method for processing document information using password protected icons that represent document content 67 1996
6,782,403 Inter-application data transmitting system and method 72 2000
7,227,953 MPEG data recorder having IEEE 1394 interface 39 2002
 
SILICON VALLEY BANK (3)
5,751,287 System for organizing document icons with suggestions, folders, drawers, and cabinets 108 1995
5,790,790 Electronic document delivery system in which notification of said electronic document is sent to a recipient thereof 739 1996
2005/0050,098 System and method for aligning data frames in time 21 2003
 
VERIZON PATENT AND LICENSING INC. (3)
6,909,708 System, method and article of manufacture for a communication system architecture including video conferencing 299 1996
7,145,898 System, method and article of manufacture for selecting a gateway of a hybrid communication system architecture 307 1996
6,385,644 Multi-threaded web based user inbox for report management 94 1998
 
XEROX CORPORATION (3)
5,220,657 Updating local copy of shared data in a collaborative system 523 1991
5,781,711 Document server for processing a distribution job in a document processing system 56 1997
2002/0099,947 Secure content objects 70 2001
 
ALCATEL-LUCENT USA INC. (2)
6,069,957 Method and apparatus for providing hierarchical key system in restricted-access television system 67 1997
6,944,183 Object model for network policy management 119 2000
 
ALEARO PROPERTIES LIMITED LIABILITY COMPANY (2)
7,281,272 Method and system for copyright protection of digital images 45 1999
7,076,469 Copyright protection of digital images transmitted over networks 42 2000
 
AT&T CORP. (2)
6,996,718 System and method for providing access to multiple user accounts via a common password 56 2000
6,381,698 System and method for providing assurance to a host that a piece of software possesses a particular property 60 2000
 
CONTENTGUARD HOLDINGS, INC. (2)
5,715,403 System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar 996 1994
6,519,700 Self-protecting documents 73 1998
 
ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE (2)
6,646,515 Isolator/circulator having propeller resonator loaded with a plurality of symmetric magnetic walls 38 2002
2003/0126,434 File security system using a security class and method for managing an encryption key 56 2002
 
FUJI XEROX CO., LTD. (2)
6,530,020 Group oriented public key encryption and key management system 74 1998
2003/0197,729 Systems and methods for displaying text recommendations during collaborative note taking 54 2002
 
INTELLECTUAL VENTURES I LLC (2)
7,260,555 Method and architecture for providing pervasive security to digital assets 63 2002
7,380,120 Secured data format for access control 78 2002
 
IRDETO USA, INC. (2)
6,683,954 Key encryption using a client-unique additional key for fraud prevention 60 1999
2005/0021,467 Distributed digital rights network (drn), and methods to access operate and implement the same 86 2004
 
JDA SOFTWARE GROUP, INC (2)
7,013,485 Computer security system 66 2001
7,249,044 Fulfillment management system for managing ATP data in a distributed supply chain environment 113 2001
 
JPMORGAN CHASE BANK, N.A. (2)
6,070,244 Computer network security management system 271 1997
6,557,039 System and method for managing information retrievals from distributed archives 207 1999
 
LEVEL 3 COMMUNICATIONS, LLC (2)
6,226,618 Electronic content delivery system 1087 1998
6,779,031 Network architecture with event logging 41 1999
 
NOKIA MOBILE PHONES LTD. (2)
2002/0129,236 VoIP terminal security module, SIP stack with security manager, system and security methods 21 2000
2002/0124,180 Security animation for display on portable electronic device 39 2001
 
PALO ALTO RESEARCH CENTER INCORPORATED (2)
2004/0088,548 System and method for providing secure resource management 73 2002
2004/0103,280 Method and system for securely Sharing files 112 2002
 
PRC INC. (2)
6,134,664 Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sources 122 1998
6,408,404 System and method for ensuring and managing situation awareness 63 1998
 
RICOH COMPANY, LTD. (2)
7,386,599 Methods and apparatuses for searching both external public documents and internal private documents in response to single search request 22 1999
6,693,652 System and method for automatic generation of visual representations and links in a hierarchical messaging system 92 2000
 
ROCKSTAR CONSORTIUM US LP (2)
5,825,876 Time based availability to content of a storage medium 231 1996
5,970,502 Method and apparatus for synchronizing multiple copies of a database 74 1996
 
RPX CORPORATION (2)
6,122,630 Bidirectional database replication scheme for controlling ping-ponging 157 1999
7,095,853 System and method for preventing an illegal copy of contents 56 2001
 
SAP AG (2)
6,058,424 System and method for transferring a session from one application server to another without losing existing resources 71 1997
2007/0067,837 Method and transaction interface for secure data exchange between distinguishable networks 36 2006
 
SCIENTIFIC-ATLANTA, INC. (2)
5,467,342 Methods and apparatus for time stamp correction in an asynchronous transfer mode network 140 1994
5,640,388 Method and apparatus for removing jitter and correcting timestamps in a packet stream 167 1995
 
SECRETSEAL INC. (2)
2003/0120,601 Dynamic evaluation of access rights 124 2002
2003/0217,281 System and method for imposing security on copies of secured items 38 2002
 
SECURIFY, INC. (2)
2002/0093,527 User interface for a security policy system and method 50 2001
2003/0061,506 System and method for security policy 145 2001
 
SIEBEL SYSTEMS, INC. (2)
2007/0192,478 System and method for configuring and viewing audit trails in an information network 24 2001
7,131,071 Defining an approval process for requests for approval 41 2002
 
SONY ELECTRONICS INC. (2)
6,223,285 Method and system for transferring information using an encryption mode indicator 95 1997
7,177,427 Method and system for transferring information using an encryption mode indicator 45 2000
 
TEXAS INSTRUMENTS INCORPORATED (2)
6,711,683 Compresses video decompression system with encryption of compressed data stored in video buffer 43 1999
7,187,033 Drain-extended MOS transistors with diode clamp and methods for making the same 45 2004
 
UNISYS CORPORATION (2)
5,682,537 Object lock management system with improved local lock management and global deadlock detection in a parallel data processing system 129 1995
6,446,090 Tracker sensing method for regulating synchronization of audit files between primary and secondary hosts 73 1999
 
ABB RESEARCH LTD. (1)
2004/0073,718 Time synchronization in computer network 58 2003
 
ACCENTURE GLOBAL SERVICES LIMITED (1)
7,003,560 Data warehouse computing system 192 2000
 
ACHIEVEMENT FIRST (1)
2010/0047,757 System and method for using interim-assessment data for instructional decision-making 19 2008
 
ACTIVISION PUBLISHING, INC. (1)
6,098,056 System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet 191 1997
 
ADV COMMUNICATIONS, INC. (1)
2004/0158,586 METHOD AND SYSTEM OF USING SHARED FILE FOR DATA COLLABORATION 51 2003
 
ADVANCED MICRO DEVICES, INC. (1)
6,571,291 Apparatus and method for validating and updating an IP checksum in a network switching system 48 2000
 
AGERE SYSTEMS LLC (1)
2002/0036,984 Method and apparatus for guaranteeing data transfer rates and enforcing conformance with traffic profiles in a packet network 44 2001
 
AGILENT TECHNOLOGIES, INC. (1)
6,751,573 Performance monitoring in distributed systems using synchronized clocks and distributed event logs 42 2000
 
AKAMAI TECHNOLOGIES, INC. (1)
7,096,266 Extending an Internet content delivery network into an enterprise 64 2002
 
ALCATEL LUCENT (1)
6,678,835 State transition protocol for high availability units 135 2000
 
ALIBABA GROUP HOLDING LIMITED (1)
6,393,420 Securing Web server source documents and executables 64 1999
 
Amano Corporation (1)
2003/0159,048 Time stamping system for electronic documents and program medium for the same 44 2003
 
AMERICA ONLINE, INC. (1)
2004/0199,514 Techniques for facilitating item sharing 58 2003
 
AMERICAN POWER CONVERSION CORPORATION (1)
2003/0132,949 User interface providing UPS information 25 2002
 
APPLE COMPUTER, INC. (1)
5,729,734 File privilege administration apparatus and methods 157 1995
 
ARBITRON INC. (1)
4,912,552 Distributed monitoring system 221 1988
 
ARCHITECTURE TECHNOLOGY CORPORATION (1)
7,496,959 Remote collection of computer forensic evidence 27 2003
 
ARL HOLDINGS LLC (1)
6,134,660 Method for revoking computer backup files using cryptographic techniques 195 1997
 
ARRIS ENTERPRISES, INC. (1)
6,865,555 System and method for providing conditional access to digital content 97 2001
 
ASSA ABLOY AB (1)
2006/0230,437 Secure digital credential sharing arrangement 53 2006
 
ATABOK JAPAN, INC. (1)
2002/0077,986 Controlling and managing digital assets 103 2001
 
AUTHENTICA SECURITY TECHNOLOGIES, INC. (1)
6,449,721 Method of encrypting information for remote access while maintaining access control 101 2001
 
AUTODESK, INC. (1)
5,570,108 Method and apparatus for display calibration and control 80 1995
 
AUTONOMY, INC. (1)
6,101,507 File comparison for data backup and file synchronization 103 1998
 
AZALEOS CORPORATION (1)
2004/0039,781 Peer-to-peer content sharing method and system 115 2002
 
BEA SYSTEMS, INC. (1)
2003/0217,333 System and method for rules-based web scenarios and campaigns 83 2002
 
BINFORMA GROUP LIMITED LIABILITY COMPANY (1)
2006/0149,407 Quality management and intelligent manufacturing with labels and smart tags in event-based product manufacturing 65 2006
 
Biolink Technologies International, Inc. (1)
6,487,662 Biometric system for biometric input, comparison, authentication and access control and method therefor 69 1999
 
BOMGAR CORPORATION (1)
2007/0294,368 METHOD AND SYSTEM FOR PROVIDING SECURE REMOTE ACCESS AND CONTROL 22 2007
 
Bottomline Technologies (DE) Inc. (1)
2002/0198,798 Modular business transactions platform 95 2001
 
BRAINSHIELD TECHNOLOGIES, INC. (1)
2003/0177,378 Apparatus and method for the decryption of an encrypted electronic document 42 2002
 
BRITISH TECHNOLOGY GROUP LIMITED (1)
4,799,258 Apparatus and methods for granting access to computers 163 1985
 
BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY (1)
2003/0014,391 Data distribution 105 2002
 
Bull HN Information Systems Inc. (1)
5,991,879 Method for gradual deployment of user-access security within a data processing system 63 1997
 
BULL S.A. (1)
6,968,060 Method for verifying the use of public keys generated by an on-board system 42 2000
 
CERTCO, INC. (1)
7,177,839 Reliance manager for electronic transaction system 47 2000
 
CGI TECHNOLOGIES AND SOLUTIONS INC. (1)
6,356,903 Content management system 143 1998
 
CHANG, CHUNG NAN (1)
5,835,592 Secure, swift cryptographic key exchange 51 1995
 
CHANTILLEY CORPORATION LIMITED (1)
5,768,381 Apparatus for key distribution in an encryption system 70 1996
 
Charles Smith Enterprises, LLC (1)
6,877,010 System and method for computer-assisted manual and automatic logging of time-based media 54 2001
 
ContractPal, Inc. (1)
7,698,230 Transaction architecture utilizing transaction policy statements 31 2003
 
Crest Industries, Inc. (1)
5,301,247 Method for ensuring secure communications 75 1992
 
CROWLEY, JOHN J. (1)
5,375,169 Cryptographic key management method and apparatus 118 1993
 
CURRENEX, INC. (1)
2002/0156,726 Using digital signatures to streamline the process of amending financial transactions 42 2001
 
CYBER-ARK SOFTWARE LTD. (1)
6,356,941 Network vaults 139 1999
 
Cysive, Inc. (1)
2003/0110,266 Apparatus and method of using session state data across sessions 87 2001
 
CYVA RESEARCH HOLDINGS, LLC (1)
5,987,440 Personal information security and exchange tool 400 1997
 
DIGITAL DOORS, INC. (1)
7,140,044 Data security system and method for separation of user communities 279 2001
 
EASTERN IX GROUP LLC (1)
5,999,907 Intellectual property audit system 209 1993
 
EFUNDS CORPORATION (1)
2003/0061,482 Software security control system and method 58 2002
 
ELECTRONIC PUBLISHING RESOURCES, INC. (1)
4,827,508 Database usage metering and protection system and method 927 1985
 
ELIAS ARTS, LLC (1)
2002/0112,035 System and method for performing content experience management 126 2001
 
ENTRUST LIMITED (1)
7,174,563 Computer network security system and method having unilateral enforceable security policy provision 99 2000
 
EPLUS CAPITAL, INC. (1)
2005/0288,961 Method for a server-less office architecture 68 2005
 
ERUCES, INC. (1)
7,362,868 Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data 35 2000
 
ETEL ACQUISITION CORP A WHOLLY OWNED SUBSIDIARY OF IP UNITY, A CALIFORNIA CORPORATION (1)
7,126,957 Media flow method for transferring real-time data between asynchronous and synchronous networks 29 2002
 
EVAULT, INC. (1)
7,134,041 Systems and methods for data backup over a network 51 2002
 
FACEBOOK, INC. (1)
6,633,311 E-service to manage and export contact information 87 2000
 
FELSHER, DAVID P., MR. (1)
7,181,017 System and method for secure three-party communications 355 2002
 
FIRST DATA CORPORATION (1)
6,938,156 ABDS system and verification status for authenticating entity access 70 2003
 
FISHER-ROSEMOUNT SYSTEMS, INC. (1)
7,076,312 Integrated electronic signatures for approval of process control and safety system software objects 45 2003
 
FLEXERA SOFTWARE LLC (1)
5,671,412 License management system for software applications 378 1995
 
FLEXERA SOFTWARE, INC. (1)
2006/0005,021 Methods and apparatus for secure distribution of software 39 2005
 
FOUNDATIONIP, LLC (1)
6,594,662 Method and system for gathering information resident on global computer networks 95 1999
 
FRANCE TELECOM (1)
5,661,806 Process of combined authentication of a telecommunication terminal and of a user module 112 1995
 
FUJITSU SEMICONDUCTOR LIMITED (1)
6,698,022 Timestamp-based timing recovery for cable modem media access controller 65 1999
 
GEODIGM CORPORATION (1)
2006/0184,637 Method and apparatus for electronic delivery of electronic model images 17 2006
 
GEORGIA TECH RESEARCH CORPORATION (1)
6,510,349 Adaptive data security system and method 49 2000
 
GEOTRUST, INC. (1)
7,003,661 Methods and systems for automated authentication, processing and issuance of digital certificates 65 2002
 
GIGATRUST (1)
7,484,245 System and method for providing data security 69 2000
 
HELIOS SOFTWARE, LLC (1)
6,629,140 Method of controlling an internet web browser in the absence of key activity on a computer 11 2000
 
HERBERT STREET TECHNOLOGIES (1)
7,406,596 Data transfer and management system 35 2001
 
HEWLETT-PACKARD COMPANY (1)
4,888,800 Secure messaging systems 131 1988
 
HITACHI COMPUTER PRODUCTS (AMERICA), INC. (1)
6,807,636 Methods and apparatus for facilitating security in a network 112 2002
 
HUGHES ELECTRONICS CORPORATION (1)
5,434,918 Method for providing mutual authentication of a user and a server on a network 135 1993
 
Hush Communications Corporation (1)
6,292,895 Public key cryptosystem with roaming user capability 69 2000
 
HYGLO SYSTEMS AB (1)
7,461,157 Distributed server functionality for emulated LAN 21 2001
 
INDENTICRYPT, INC. (1)
7,003,117 Identity-based encryption system for secure data distribution 68 2003
 
INTEGRATED TECHNOLOGOES OF AMERICA, INC. (1)
6,351,813 Access control/crypto system 201 1998
 
INTELLECTUAL VENTURES II LLC (1)
5,933,498 System for controlling access and distribution of digital property 732 1997
 
INTELLECTUAL VENTURES II LLC (1)
6,314,409 System for controlling access and distribution of digital property 507 1998
 
INTELLISYNC CORPORATION (1)
6,061,790 Network computer system with remote user data encipher methodology 121 1997
 
INTERFUSE TECHNOLOGY CORPORATION (1)
6,874,139 Method and system for seamless integration of preprocessing and postprocessing functions with an existing application program 75 2001
 
Intermind Corporation (1)
5,862,325 Computer-based communication system and method using metadata defining a control structure 1235 1996
 
INTRALINKS, INC. (1)
7,168,094 Method and system for managing access to information and the transfer thereof 23 2001
 
INVENTEC CORPORATION (1)
2004/0193,602 Method and system for maintenance of engineering change data 46 2003
 
ISPHERES CORPORATION (1)
2002/0174,109 EVENT DETECTION WITH CONCURRENT DATA UPDATES 39 2001
 
Kabushiki Kaisha Sega (1)
2006/0168,147 Information processor, file server, accounting control system, accounting control method, and recording medium recording a program therefor 48 2006
 
KASTEN CHASE APPLIED RESEARCH LIMITED (1)
2002/0172,367 System for secure electronic information transmission 89 2002
 
KAYDARA, INC. (1)
7,461,405 Mixed-media data encoding 19 2001
 
KDMS International LLC (1)
2003/0159,066 Method and apparatus for network user location verification 51 2002
 
KEYBYTE TECHNOLOGIES, INC. (1)
6,011,847 Cryptographic access and labeling system 70 1995
 
KINGLITE HOLDINGS INC. (1)
2003/0037,237 Systems and methods for computer device authentication 119 2001
 
KONINKLIJKE PHILIPS ELECTRONICS N.V. (1)
2006/0075,258 Archive system and method for copy controlled storage devices 25 2003
 
KYLINTV, INC. (1)
2006/0277,316 Internet protocol television 53 2006
 
Laurel Intelligent Systems, Co., Ltd. (1)
5,267,313 File security system 40 1992
 
LENOVO (SINGAPORE) PTE LTD. (1)
6,922,785 Apparatus and a method for secure communications for network computers 30 2000
 
LG-NORTEL CO., LTD. (1)
2001/0056,550 Protective device for internal resource protection in network and method for operating the same 61 2001
 
MARCARTAN, LLC (1)
6,735,701 Network policy management and effectiveness system 161 1998
 
MARK ANY, INC. OF 10TH FLOOR (1)
2003/0023,559 Method for securing digital information and system therefor 44 2001
 
MATHON SYSTEMS, INC. (1)
7,386,529 System and method for managing content with event driven actions to facilitate workflow and other features 44 2003
 
MATSUSHITA-KOTOBUKI ELECTRONICS INDUSTRIES, LTD. (1)
7,200,747 System for ensuring data privacy and user differentiation in a distributed file system 59 2001
 
MEDTECH GLOBAL LIMITED (1)
6,611,846 Method and system for medical patient data analysis 168 1999
 
METACRYPTION, LLC (1)
2003/0088,783 Systems, methods and devices for secure computing 56 2001
 
MICRON TECHNOLOGY, INC. (1)
6,625,650 System for multi-layer broadband provisioning in computer networks 129 1999
 
MIST INC. (1)
6,588,673 Method and system providing in-line pre-production data preparation and personalization solutions for smart cards 111 2000
 
MODUS OPERANDI, INC. (1)
2002/0069,363 System and method for data recovery and protection 67 2000
 
MOTOROLA MOBILITY LLC (1)
5,404,404 Method for updating encryption key information in communication units 57 1993
 
NAMCO HOLDING CORPORATION (1)
6,924,425 Method and apparatus for storing a multipart audio performance with interactive playback 53 2002
 
NASTALOR VENTERI TRE L.L.C. (1)
6,336,114 System and method for restricting access to a data table within a database 79 1998
 
NATIONAL REALTY SYSTEMS, LLC (1)
2003/0101,072 Document protection system 57 2002
 
NATIONAL SEMICONDUCTOR CORPORATION (1)
5,058,164 Encryption of streams of addressed information to be used for program code protection 193 1990
 
NCR CORPORATION (1)
6,608,636 Server based virtual conferencing 98 1992
 
NET CONVERSIONS, INC. (1)
2002/0062,245 System and method for generating real-time promotions on an electronic commerce world wide website to increase the likelihood of purchase 95 2001
 
Net i Trust (1)
6,145,084 Adaptive communication system enabling dissimilar devices to exchange information over a network 95 1998
 
Netlink I.T. Solutions Ltd. (1)
2003/0079,175 Data processing system and development tool 47 2001
 
NETWORK APPLIANCE, INC. (1)
6,718,361 Method and apparatus for reliable and scalable distribution of data files in distributed networks 442 2000
 
NETZERO, INC. (1)
6,366,298 Monitoring of individual internet usage 175 1999
 
NFR SECURITY, INC. (1)
6,530,024 Adaptive feedback security system and method 192 1998
 
NIPPON TELEGRAPH AND TELEPHONE CORPORATION (1)
5,600,722 System and scheme of cipher communication 58 1994
 
NISHIDA, TAISHIN (1)
7,224,795 Variable-length key cryptosystem 39 2002
 
NORTEL NETWORKS LIMITED (1)
2002/0138,762 Management of log archival and reporting for data network security systems 124 2001
 
NOVELL INTELLECTUAL PROPERTY HOLDINGS, INC. (1)
6,950,936 Secure intranet access 77 2003
 
NOVELL, INC. (1)
5,787,175 Method and apparatus for collaborative document control 241 1995
 
NUANCE COMMUNICATIONS, INC. (1)
6,870,920 System and method for multi-stage data logging 28 2002
 
NVIDIA CORPORATION (1)
7,265,764 System and method for providing a hardware icon with magnification and security 37 2002
 
ODS NETWORKS, INC. (1)
6,347,374 Event detection 398 1998
 
OMNISECURE, INC. (1)
5,584,023 Computer system including a transparent and secure file transform mechanism 192 1993
 
OneName Corporation (1)
6,088,717 Computer-based communication system and method using metadata defining a control-structure 497 1998
 
OPEN TEXT S.A. (1)
7,287,055 Web-based groupware system 38 2004
 
PANASONIC CORPORATION (1)
2001/0056,541 File management apparatus 54 2001
 
PARALLELS IP HOLDINGS GMBH (1)
7,076,633 Hosting service providing platform system and method 110 2001
 
PEOPLE TO PEOPLE PUBLISHING, INC. (1)
2003/0028,610 Peer-to-peer file sharing system and method using user datagram protocol 110 2001
 
PERIMETER-MSC ACQUISITION CORP. (1)
6,988,199 Secure and reliable document delivery 85 2001
 
Pride Software Development Corp. (1)
4,796,220 Method of controlling the copying of software 376 1986
 
PROBIX, INC. (1)
2002/0046,350 Method and system for establishing an audit trail to protect objects distributed over a network 45 2001
 
PROOFPOINT, INC. (1)
2006/0101,285 Secure and searchable storage system and method 87 2004
 
PUMPKIN HOUSE INCORPORATED (1)
5,870,477 Enciphering/deciphering device and method, and encryption/decryption communication system 80 1996
 
RAKUTEN, INC. (1)
6,299,069 Integrated circuit for embedding in smart cards, and method of issuing smart cards 30 1998
 
RAPPORE TECHNOLOGIES, INC. (1)
2002/0169,965 Clearance-based method for dynamically configuring encryption strength 42 2001
 
RAXCO SOFTWARE, INC. (1)
5,655,119 Method for moving an open file being accessed by at least one user 47 1996
 
RAYTHEON BBN TECHNOLOGIES CORP. (1)
6,941,355 System for selecting and disseminating active policies to peer device and discarding policy that is not being requested 63 2000
 
REEFEDGE NETWORKS, LLC (1)
6,851,050 Providing secure network access for short-range wireless computing devices 46 2001
 
RENESAS ELECTRONICS CORPORATION (1)
7,290,148 Encryption and decryption communication semiconductor device and recording/reproducing apparatus 40 2003
 
REVEO, INC. (1)
2002/0026,321 INTERNET-BASED SYSTEM AND METHOD FOR FAIRLY AND SECURELY ENABLING TIMED-CONSTRAINED COMPETITION USING GLOBALLY TIME-SYCHRONIZED CLIENT SUBSYSTEMS AND INFORMATION SERVERS HAVING MICROSECOND CLIENT-EVENT RESOLUTION 114 1999
 
ROWLAND NETWORK GROUP LLC (1)
2003/0115,146 System and method for detecting unauthorized copying of encrypted data 43 2001
 
RPK NEW ZEALAND LIMITED (1)
7,076,067 Encrypted media key management 40 2001
 
SAFECOM A/S (1)
6,952,780 System and method for ensuring secure transfer of a document from a client of a network to a printer 75 2001
 
SAFENET DATA SECURITY (ISRAEL) LTD. (1)
6,915,425 System for permitting off-line playback of digital content, and for managing content rights 47 2000
 
SANYO ELECTRIC CO., LTD. (1)
7,010,809 Reproduction device stopping reproduction of encrypted content data having encrypted region shorter than predetermined length 40 2001
 
SAP SE (1)
2004/0254,884 Content catalog and application designer framework 44 2003
 
SECURE AXCESS LLC (1)
6,601,170 Secure internet user state creation method and system with user supplied key and seeding 35 2000
 
SECURE COMPUTING TECHNOLOGY CORPORATION (1)
5,276,735 Data enclave and trusted path system 351 1992
 
SECURITY SOFTWARE AMERICA, INC., A CORP. OF DE (1)
4,757,533 Security system for microcomputers 243 1985
 
Serena Software International, Inc. (1)
6,263,348 Method and apparatus for identifying the existence of differences between two files 118 1998
 
SIGHTSOUND TECHNOLOGIES, LLC (1)
2004/0025,037 System and method for manipulating a computer file and/or program 43 2003
 
SIGHTSOUND.COM INCORPORATED (1)
6,615,349 System and method for manipulating a computer file and/or program 112 1999
 
Signitas Corporation (1)
2003/0217,264 System and method for providing a secure environment during the use of electronic documents and data 74 2002
 
SIVAULT, INC. (1)
2002/0031,230 Method and apparatus for a web-based application service model for security management 174 2001
 
Social Communications Company (1)
2009/0254,843 SHARED VIRTUAL AREA COMMUNICATION ENVIRONMENT BASED APPARATUS AND METHODS 49 2009
 
SOL LABS K.G. LIMITED LIABILITY COMPANY (1)
5,881,287 Method and apparatus for copy protection of images in a computer system 102 1997
 
Solarsoft Ltd. (1)
2003/0191,938 Computer security system and method 33 2002
 
SOUND VIEW INNOVATIONS, LLC (1)
7,107,269 Methods and apparatus for providing privacy-preserving global customization 49 2001
 
SPX CORPORATION (1)
2003/0037,133 Method and system for implementing redundant servers 46 2001
 
SPYRUS, INC. (1)
5,677,953 System and method for access control for portable data storage media 260 1995
 
SUMITOMO HEAVY INDUSTRIES, LTD. (1)
2001/0044,903 Information access method and network system 45 2001
 
SURETY, LLC (1)
7,047,404 Method and apparatus for self-authenticating digital records 36 2000
 
SYMMETRICOM, INC. (1)
2002/0056,042 System and methods for generating trusted and authenticatable time stamps for electronic documents 55 2002
 
SYNETICS, INC. (1)
2004/0022,390 System and method for data protection and secure sharing of information over a computer network 59 2002
 
SYNOPSYS, INC. (1)
6,810,389 System and method for flexible packaging of software application licenses 68 2000
 
SYSTAR SA (1)
2002/0112,048 System and method for providing behavioral information of a user accessing on-line resources 110 2000
 
TANDEM COMPUTERS CORPORATION (1)
4,972,472 Method and apparatus for changing the master key in a cryptographic system 78 1985
 
TEC SEC, INCORPORATED (1)
2002/0062,451 System and method of providing communication security 128 2001
 
TEIGEL PROCESSING AB, L.L.C. (1)
7,020,645 Systems and methods for state-less authentication 115 2001
 
THE REGENTS OF THE UNIVERSITY OF CALIFORNIA (1)
7,113,594 Systems and methods for identity-based encryption and related cryptographic techniques 85 2002
 
THOMSON LICENSING (1)
2003/0182,579 Transmitting and processing protected content 65 2003
 
Toppan Moore Co., Ltd. (1)
4,734,568 IC card which can set security level for every memory area 146 1986
 
TRANSFINITY CORPORATION (1)
5,893,084 Method for creating specific purpose rule-based n-bit virtual machines 59 1996
 
TTI INVENTIONS C LLC (1)
5,406,628 Public key authentication and key agreement for low-cost terminals 111 1993
 
TUMBLEWEED COMMUNICATIONS CORP. (1)
6,529,956 Private, trackable URLs for directed document delivery 95 2000
 
U.S. PHILIPS CORPORATION (1)
4,423,387 Current mirror arrangement 31 1981
 
UNIFIEDMARKET WORLDWIDE, LLC (1)
2002/0007,335 Method and system for a network-based securities marketplace 110 2001
 
UNITED SERVICES AUTOMOBILE ASSOCIATION, INC. (1)
6,877,136 System and method of providing electronic access to one or more documents 52 2002
 
UniVirtual Corp. (1)
5,813,009 Computer based records management system method 744 1995
 
VADIUM TECHNOLOGY, INC. (1)
2003/0026,431 One-time-pad encryption with central key service and key management 34 2002
 
VENAFI, INC. (1)
2005/0081,029 Remote management of client installed digital certificates 51 2004
 
VERSADA NETWORKS (1)
2003/0033,528 System and method for specifying security, privacy, and access control to information used by others 49 2002
 
VIDIUS INC. (1)
2002/0150,239 Method for personalized encryption in an un-trusted environment 90 2002
 
VISUALGOLD.COM, INC. (1)
2002/0016,922 Secure distributing services network system and method thereof 81 2001
 
VOLTAGE SECURITY, INC. (1)
7,103,911 Identity-based-encryption system with district policy information 32 2003
 
VORMETRIC, INC. (1)
6,931,530 Secure network file access controller implementing access control and auditing 83 2002
 
WATCHGUARD TECHNOLOGIES, INC. (1)
6,738,908 Generalized network security policy templates for implementing similar network security policies across multiple networks 87 1999
 
WAVE SYSTEMS CORP. (1)
5,247,575 Information distribution system 845 1992
 
WEB.COM HOLDING COMPANY, INC. (1)
2002/0069,272 System and method for managing server configurations 80 2001
 
WELLS FARGO BANK, NATIONAL ASSOCIATION (1)
7,266,684 Internet third-party authentication using electronic tickets 53 2001
 
Westport Benefits, L.L.C. (1)
2002/0069,077 Computerized system for customizing and managing benefits 64 2001
 
WISTRON CORPORATION (1)
6,389,538 System for tracking end-user electronic content usage 460 1998
 
XCERT SOFTWARE, INC. (1)
6,249,873 Method of and apparatus for providing secure distributed directory services and public key infrastructure 144 1999
 
XYLECO, INC. (1)
2003/0088,517 System and method for controlling access and use of private information 58 2001
 
YAHOO! INC. (1)
6,301,614 System and method for efficient representation of data set addresses in a web crawler 54 1999
 
YAMAHA CORPORATION (1)
2003/0023,649 Digital filtering method and device and sound image localizing device 4 2002
 
Other [Check patent profile for assignment information] (18)
5,144,660 Securing a computer against undesired write operations to or read operations from a mass storage device 205 1989
5,619,576 Variable-key cryptography system 39 1995
5,748,736 System and method for secure group communications via multicast or broadcast 215 1996
5,790,789 Method and architecture for the creation, control and deployment of services within a distributed computer environment 378 1996
6,226,745 Information sharing system and method with requester dependent sharing and security rules 148 1998
6,292,899 Volatile key apparatus for safeguarding confidential data stored in a computer system memory 74 1998
6,260,141 Software license control system based on independent software registration server 93 2000
6,990,441 Natural language messages from a keystroke output wedge 13 2000
2002/0133,699 Method and apparatus to regulate use of freely exchanged files and streams 43 2001
7,124,164 Method and apparatus for providing group interaction via communications networks 121 2001
2002/0003,886 Method and system for storing multiple media tracks in a single, multiply encrypted computer file 39 2001
2002/0010,679 Information record infrastructure, system and method 461 2001
2002/0050,098 Rotary access locking apparatus 39 2001
2003/0046,176 One page purchasing system 17 2001
2004/0205,576 System and method for managing Knowledge information 28 2002
2003/0037,253 Digital rights management system 42 2002
2004/0193,905 System and method for providing secure transmission, search, and storage of data 44 2004
2005/0273,600 Method and system for file data access within a secure environment 47 2005

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
INTELLECTUAL VENTURES I LLC (5)
8,543,827 Methods and systems for providing access control to secured data 1 2008
8,266,674 Method and system for implementing changes to security policies in a distributed security system 0 2009
8,327,138 Method and system for securing digital assets using process-driven security policies 2 2010
8,341,407 Method and system for protecting electronic data in enterprise environment 1 2011
8,341,406 System and method for providing different levels of key security for controlling access to secured items 0 2011
 
OSR OPEN SYSTEMS RESOURCES, INC. (2)
8,521,752 Systems and methods for arbitrary data transformations 0 2005
8,539,228 Managing access to a resource 1 2006
 
GEMALTO SA (1)
8,229,112 Decipherable searchable encryption method, system for such an encryption 0 2007
 
GENERAL DYNAMICS C4 SYSTEMS, INC. (1)
8,499,163 Serial architecture for high assurance processing 0 2010

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
3.5 Year Payment $1600.00 $800.00 $400.00 Oct 19, 2014
7.5 Year Payment $3600.00 $1800.00 $900.00 Oct 19, 2018
11.5 Year Payment $7400.00 $3700.00 $1850.00 Oct 19, 2022
Fee Large entity fee small entity fee micro entity fee
Surcharge - 3.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 7.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00