US Patent No: 7,996,669

Number of patents in Portfolio can not be more than 2000

Computer platforms and their methods of operation

ALSO PUBLISHED AS: 20090031141

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A computer platform (100) uses a tamper-proof component (120), or 'trusted module', of a computer platform in conjunction with software, preferably running within the tamper-proof component, that controls the uploading and usage of data on the platform as a generic dongle for that platform. Licensing checks can occur within a trusted environment (in other words, an environment which can be trusted to behave as the user expects); this can be enforced by integrity checking of the uploading and license-checking software. Metering records can be stored in the tamper-proof device and reported back to administrators as required. There can be an associated clearinghouse mechanism to enable registration and payment for data.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
HEWLETT-PACKARD COMPANYPALO ALTO, CA883
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.HOUSTON, TX23149

International Classification(s)

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Chan, David Scarborough, CA 109 1313
Pearson, Siani Lynne Bristol, GB 39 476

Cited Art Landscape

Patent Info (Count) # Cites Year
 
MICROSOFT CORPORATION (10)
6,189,146 System and method for software licensing 298 1998
6,820,063 Controlling access to content based on certificates and access predicates 98 1999
6,510,513 Security services and policy enforcement for electronic data 177 1999
6,609,199 Method and apparatus for authenticating an open system application to a portable IC device 185 1999
6,775,779 Hierarchical trusted code for content protection in computers 110 1999
7,124,938 Enhancing smart card usage for associating media content with households 44 2000
* 7,680,743 Software application protection by way of a digital rights management (DRM) system 2 2002
* 7,529,927 Specifying security for an element by assigning a scaled value representative of the relative security thereof 11 2004
* 7,680,744 Method for interdependently validating a digital content package and a corresponding digital license 9 2005
* 7,203,313 Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client 2 2005
 
CONTENTGUARD HOLDINGS, INC. (2)
* 7,386,513 Networked services licensing system and method 5 2004
* 7,720,767 Method and system to support dynamic rights and resources sharing 17 2005
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (2)
6,378,072 Cryptographic system 225 1998
* 7,461,249 Computer platforms and their methods of operation 96 2000
 
InterTrust Technologies Corp. (2)
6,363,488 Systems and methods for secure transaction management and electronic rights protection 461 1999
2003/0041,239 Systems and methods using cryptography to protect secure computing environments 62 2002
 
SUN MICROSYSTEMS, INC. (2)
5,724,425 Method and apparatus for enhancing software security and distributing software 321 1994
6,092,147 Virtual machine with securely distributed bytecode verification 103 1997
 
APPLE INC. (1)
6,477,648 Trusted workstation in a networked client/server computing system 124 1997
 
CERTCO, INC. (1)
5,659,616 Method for securely using digital signatures in a commercial cryptographic system 358 1996
 
CISCO TECHNOLOGY, INC. (1)
6,463,474 Local authentication of a client at a network device 240 1999
 
EMC CORPORATION (1)
6,701,433 Method and apparatus for escrowing properties used for accessing executable modules 27 1999
 
FLEXERA SOFTWARE LLC (1)
5,390,297 System for controlling the number of concurrent copies of a program in a network based on the number of available licenses 254 1987
 
GEMALTO SA (1)
5,923,884 System and method for loading applications onto a smart card 203 1996
 
H2 PARTNERS LLC (1)
5,991,399 Method for securely distributing a conditional use private key to a trusted entity on a remote system 453 1997
 
INTEL CORPORATION (1)
5,949,877 Content protection for transmission systems 183 1997
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (1)
4,918,653 Trusted path mechanism for an operating system 115 1988
 
PARKER-HANNIFIN CORPORATION (1)
5,473,692 Roving software license for a hardware agent 548 1994
 
SAFENET DATA SECURITY (ISRAEL) LTD. (1)
* 6,189,097 Digital Certificate 75 1997
 
SHIELDIP, INC. (1)
6,697,948 Methods and apparatus for protecting information 178 1999
 
SONY CORPORATION (1)
* 2003/0182,236 Information processor 10 2003
 
SOSPITA AS (1)
6,266,416 Protection of software against use without permit 97 1998
 
TUT SYSTEMS, INC. (1)
6,557,105 Apparatus and method for cryptographic-based license management 59 1999
 
UNILOC LUXEMBOURG S. A. (1)
6,857,067 System and method for preventing unauthorized access to electronic data 43 2001
 
Other [Check patent profile for assignment information] (3)
5,359,659 Method for securing software against corruption by computer viruses 177 1992
6,343,280 Distributed execution software license server 146 1998
2006/0008,534 Crystal liquid/crystal bioenergy device 1 2004
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

  • No Forward Cites to Display

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
3.5 Year Payment $1600.00 $800.00 $400.00 Feb 9, 2015
7.5 Year Payment $3600.00 $1800.00 $900.00 Feb 9, 2019
11.5 Year Payment $7400.00 $3700.00 $1850.00 Feb 9, 2023
Fee Large entity fee small entity fee micro entity fee
Surcharge - 3.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 7.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00