Validity Report
Full Report
US7162735B2 — Digital data protection arrangement
Priority Date: 2000-07-18, Publication Date: 2007-01-09, Current Assignee: Simplex Patents CorpReport Generated: 2020-08-01

Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Family Id
Search Efficiency
Original Assignee
Current Assignee
EP1303808A20.955COMPUTER SOFTWARE INSTALLATIONGRANT2003-04-232000-07-189895780GreatBitarts LtdSIMPLEX MAJOR Sdn Bhd
US6141698A0.908Method and system for injecting new code into existing application codeGRANT2000-10-311997-01-2925157848GreatNetwork Commerce IncCRS LLC
EP1126356A20.901Tamper resistant microprocessorGRANT2001-08-222000-02-1426585335GreatToshiba CorpToshiba Corp
US5530752A0.895Systems and methods for protecting software from unlicensed copying and useGRANT1996-06-251994-02-2222738588GreatConvex Computer CorpNortonLifeLock Inc
US6075862A0.887Decryption key management scheme for software distribution systemGRANT2000-06-131995-07-3116328743GreatToshiba CorpToshiba Corp
EP0115395B10.874COMPUTER PROCESSOR SYSTEM WITH SOFTWARE PROTECTIONGRANT1990-08-291983-01-2610536953GreatFujitsu Services LtdFujitsu Services Ltd
US7000119B10.870Instruction/data protection employing derived obscuring instruction/dataGRANT2006-02-142000-04-2035768073GreatRealNetworks IncIntel Corp
EP0962850A20.841A method for protecting embedded system software and embedded systemGRANT1999-12-081998-06-018551868GreatNokia Mobile Phones Ltd, Nokia OyjNokia Oyj
US4847902A0.841Digital computer system for executing encrypted programsGRANT1989-07-111984-02-1024315516GreatPrime Computer IncBankers Trust Co
US7171693B20.839Information security method and systemGRANT2007-01-302000-05-1222755673GreatXtreamlok Pty LtdNortonLifeLock Inc
US6223288B10.834System for persistently encrypting critical software file to prevent installation of software program on unauthorized computersGRANT2001-04-241998-05-2222176669GreatProtexis IncIII Holdings 12 LLC
US5625690A0.830Software pay per use systemGRANT1997-04-291993-11-1522544360GreatNokia of America CorpAT&T Corp, Nokia of America Corp
EP0720098A10.829Apparatus for securing information systems organised around microprocessorsGRANT1996-07-031994-12-309470476GreatThomson CSF SAThales SA
EP0932955A10.827SELF-DECRYPTING DIGITAL INFORMATION SYSTEM AND METHODGRANT1999-08-041996-09-1226700571Great
US5359659A0.823Method for securing software against corruption by computer virusesGRANT1994-10-251992-06-1925414406Great
US5995623A0.814Information processing apparatus with a software protecting functionGRANT1999-11-301996-01-3026349795GreatFuji Xerox Co LtdFuji Xerox Co Ltd
US20040193987A10.795Protection of software code from unauthorized use by executing portions of the code in a secure computer environment separate from the environment that executes the remaining portions of the codeAPPLICATION2004-09-301995-07-1319898393GreatSospita ASSospita AS
EP1073051A20.794Signal processing apparatus and method and information recording medium to be used thereinGRANT2001-01-311999-07-2916660879GreatPioneer CorpPioneer Corp
US5802275A0.790Isolation of non-secure software from secure software to limit virus infectionGRANT1998-09-011994-06-2223003500GreatNokia of America CorpAT&T Corp, Nokia of America Corp
EP0266748A20.786A software protection system using a single-key cryptosystem  a hardware-based authorization system and a secure coprocessorGRANT1988-05-111986-11-0527129941GreatInternational Business Machines CorpInternational Business Machines Corp
US5991399A0.786Method for securely distributing a conditional use private key to a trusted entity on a remote systemGRANT1999-11-231997-12-1825539740GreatIntel CorpHoneyman Cipher Solutions LLC
US6480959B10.786Software system and associated methods for controlling the use of computer programsGRANT2002-11-121997-12-0526748333GreatJamama LLCHanger Solutions LLC
EP0706118A10.783DATA PROTECTION SYSTEMGRANT1996-04-101994-04-2214430570GreatAdvance KKAdvance KK
US6868495B10.781One-time pad Encryption key DistributionGRANT2005-03-151996-09-1234279986GreatOpen Security Solutions LLCRPX Corp, Open Security Solutions LLC
US6334189B10.779Use of pseudocode to protect software from unauthorized useGRANT2001-12-251997-12-0526748332GreatJamama LLCHanger Solutions LLC
EP0561685A20.778An electronic data protection systemGRANT1993-09-221992-03-1613073046GreatFujitsu LtdFujitsu Ltd
EP0121853A20.777Data processing system having public encryption and private decryption keysGRANT1984-10-171983-04-0423914202GreatBurroughs CorpUnisys Corp
US6643775B10.775Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applicationsGRANT2003-11-041997-12-0529272544GreatJamama LLCHanger Solutions LLC
EP0268139A20.772Manipulating rights-to-execute in connection with a software copy protection mechanismGRANT1988-05-251986-11-0526108649GreatInternational Business Machines CorpInternational Business Machines Corp
US5844986A0.771Secure BIOSGRANT1998-12-011996-09-3024909346GreatIntel CorpIntel Corp
US4634807A0.770Software protection deviceGRANT1987-01-061984-08-2310565726GreatNational Research Development Corp of IndiaBTG International Ltd
US4817140A0.768Software protection system using a single-key cryptosystem  a hardware-based authorization system and a secure coprocessorGRANT1989-03-281986-11-0525455024GreatInternational Business Machines CorpInternational Business Machines Corp
US5224166A0.766System for seamless processing of encrypted and non-encrypted data and instructionsGRANT1993-06-291992-08-1125456876GreatInternational Business Machines CorpInternational Business Machines Corp
US7051200B10.765System and method for interfacing a software process to secure repositoriesGRANT2006-05-232000-06-2724419919GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US7822979B20.763Method and apparatus for secure execution using a secure memory partitionGRANT2010-10-262000-06-3024436506GreatIntel CorpIntel Corp
EP0191162A20.760Method of software protectionGRANT1986-08-201984-12-1824741461GreatInternational Business Machines CorpInternational Business Machines Corp
US5109413A0.757Manipulating rights-to-execute in connection with a software copy protection mechanismGRANT1992-04-281986-11-0527032721GreatInternational Business Machines CorpInternational Business Machines Corp
US5881287A0.756Method and apparatus for copy protection of images in a computer systemGRANT1999-03-091994-08-1223111929GreatSOL LABS KG LLCSOL LABS KG LLC
US7757097B20.754Method and system for tamperproofing softwareGRANT2010-07-131999-09-0335811750GreatPurdue Research FoundationPurdue Research Foundation
US6006328A0.746Computer software authentication  protection  and security systemGRANT1999-12-211995-07-1427157876Great
US5146575A0.746Implementing privilege on microprocessor systems for use in software asset protectionGRANT1992-09-081986-11-0525454519GreatInternational Business Machines CorpInternational Business Machines Corp
EP0302710A20.745A method of controlling the use of computer programsGRANT1989-02-081987-08-0522168357GreatInternational Business Machines CorpInternational Business Machines Corp
US7539875B10.741Secure repository with layers of tamper resistance and system and method for providing sameGRANT2009-05-262000-06-2724418492GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US6308256B10.735Secure execution of program instructions provided by network interactions with processorGRANT2001-10-231999-08-1823488542GreatSun Microsystems IncOracle America Inc
US5416840A0.735Software catalog encoding method and systemGRANT1995-05-161993-07-0622208084GreatPhoenix Technologies LtdKinglite Holdings Inc
US6523119B20.734Software protection device and methodGRANT2003-02-181996-12-0425059750GreatRainbow Technologies IncSafeNet Inc
US5237611A0.731Encryption/decryption apparatus with non-accessible table of keysGRANT1993-08-171992-07-2325439035GreatCrest Industries IncCREST INDUSTRIES Inc A Corp OF WA, Crest Industries Inc
EP0794487A20.725Image information processing system and microprocessor for the protected reproduction of AV dataGRANT1997-09-101996-03-0827294252GreatPanasonic CorpPanasonic Corp
EP0768601A10.723DEVICE FOR EXECUTING ENCIPHERED PROGRAMGRANT1997-04-161995-04-2714370339GreatCasio Computer Co LtdCasio Computer Co Ltd
US4633388A0.722On-chip microprocessor instruction decoder having hardware for selectively bypassing on-chip circuitry used to decipher encrypted instruction codesGRANT1986-12-301984-01-1824284980GreatSiemens Corporate Research and Support IncSiemens Corporate Research and Support Inc
EP0679978A10.720Method and apparatus enabling software trial using a decryption stubGRANT1995-11-021994-04-2522883794GreatInternational Business Machines CorpInternational Business Machines Corp
US6272636B10.718Digital product execution control and securityGRANT2001-08-071997-04-1125273283GreatPreview Systems IncSafeNet Data Security Israel Ltd
US6675298B10.718Execution of instructions using op code lengths longer than standard op code lengths to encode dataGRANT2004-01-061999-08-1823488545GreatSun Microsystems IncOracle America Inc
US7124437B20.716System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment softwareGRANT2006-10-171996-06-2826707371GreatProtexis IncArvato Digital Services LLC
US7421586B20.716Protecting mobile code against malicious hostsGRANT2008-09-021999-05-1232913186GreatFraunhofer Gesellschaft zur Forderung der Angewandten Forschung eVFraunhofer Gesellschaft zur Forderung der Angewandten Forschung eV
US4864616A0.715Cryptographic labeling of electronically stored dataGRANT1989-09-051987-10-1522323942GreatMicronyx IncMICRONYX Inc 1901 N CENTRAL EXPRESSWAY SUITE 400 RICHARDSON TEXAS 75080, Micronyx Inc
EP0681233A10.715Method and apparatus enabling software trial using an encryption headerGRANT1995-11-081994-04-2522883783GreatInternational Business Machines CorpInternational Business Machines Corp
US5892906A0.714Apparatus and method for preventing theft of computer devicesGRANT1999-04-061996-07-1924749007GreatSafeNet IncSafeNet Inc
US4864494A0.712Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected softwareGRANT1989-09-051986-03-2125287612GreatComputerized Data Systems for Manufacturing IncComputerized Data Systems for Manufacturing Inc
US6681212B10.712Internet-based automated system and a method for software copyright protection and salesGRANT2004-01-201999-04-2330002560Great
USRE39802E10.712Storage medium for preventing an irregular use by a third partyGRANT2007-08-281992-03-1626399131GreatFujitsu LtdFujitsu Ltd
US7287166B10.711Guards for application in software tamperproofingGRANT2007-10-231999-09-0338657211GreatPurdue Research FoundationPurdue Research Foundation
EP0679977A10.705Method and apparatus enabling software trial allowing the distribution of software objectsGRANT1995-11-021994-04-2522897809GreatInternational Business Machines CorpInternational Business Machines Corp
US6711553B10.703Method and apparatus for digital content copy protectionGRANT2004-03-232000-02-2529707964GreatKent Ridge Digital LabsKent Ridge Digital Labs
US4558176A0.703Computer systems to inhibit unauthorized copying  unauthorized usage  and automated cracking of protected softwareGRANT1985-12-101982-09-2023666980Great
US5757915A0.702Parameterized hash functions for access controlGRANT1998-05-261995-08-2524067740GreatIntel CorpIntel Corp
US7225322B20.699Methods of microprocessor instruction result obfuscationGRANT2007-05-291999-08-1829711920GreatSun Microsystems IncSun Microsystems Inc
US8024810B20.698Method and apparatus for protecting digital data by double re-encryptionGRANT2011-09-201998-10-1517992773GreatIntarsia Software LLCKioba Processing LLC
US5894516A0.698Broadcast software distributionGRANT1999-04-131996-07-1024727723GreatNCR CorpNCR Corp
US7360252B10.693Method and apparatus for secure distribution of softwareGRANT2008-04-151999-04-3039281750GreatMacrovision CorpFlexera Software LLC
US5222136A0.692Encrypted communication systemGRANT1993-06-221992-07-2325440240GreatCrest Industries IncCREST INDUSTRIES Inc A CORP OF WASHINGTON, Crest Industries Inc
US4408203A0.691Security system for electronic funds transfer systemGRANT1983-10-041978-01-0926900299GreatMastercard International IncMastercard International Inc
EP0679979A10.688Method and apparatus enabling software trial with a try-and-buy user interactionGRANT1995-11-021994-04-2522883809GreatInternational Business Machines CorpInternational Business Machines Corp
US6336189B10.686Apparatus and method for data capsule generationGRANT2002-01-011997-07-1016160796GreatFuji Xerox Co LtdFuji Xerox Co Ltd
US5455862A0.685Apparatus and method for encrypting communications without exchanging an encryption keyGRANT1995-10-031993-12-0222578934GreatCrest Industries IncCRESTECH LLC
EP0339115A10.685Method for the protection of a programme stored on a recording mediumGRANT1989-11-021988-04-288198926GreatSiemens AGSiemens AG
US5694472A0.683Personal access management systemGRANT1997-12-021995-02-1323533434GreatETA Tech CorpCYPHERCOMM Inc
US4259720A0.682Security system for electronic funds transfer systemGRANT1981-03-311978-01-0925350725GreatINTERBANK CARD ASSOCIATIONINTERBANK CARD ASSOCIATION
US5682428A0.682Personal access management systemGRANT1997-10-281995-02-1323533420GreatETA Tech CorpCYPHERCOMM Inc
US5692049A0.680Personal access management systemGRANT1997-11-251995-02-1323533449GreatETA Tech CorpCYPHERCOMM Inc
US5696825A0.676Personal access management systemGRANT1997-12-091995-02-1323533413GreatETA Tech CorpCYPHERCOMM Inc
US4652990A0.675Protected software access control apparatus and methodGRANT1987-03-241983-10-2724179325GreatREMOTE SYSTEMS IncREMOTE SYSTEMS Inc
US5903647A0.671Self-launching encrypted digital information distribution systemGRANT1999-05-111995-06-0723898200GreatDigital River IncDigital River Inc
EP0908810A20.670Secure processor with external memory using block chaining and block re-orderingGRANT1999-04-141997-10-1025488612GreatArris Technology IncArris Technology Inc
US5343527A0.669Hybrid encryption method and system for protecting reusable software componentsGRANT1994-08-301993-10-2722496991GreatInternational Business Machines CorpLockheed Martin Corp
US5224160A0.669Process for securing and for checking the integrity of the secured programsGRANT1993-06-291987-02-2327433834GreatWincor Nixdorf International GmbHFujitsu Technology Solutions GmbH
US5734819A0.668Method and apparatus for validating system operationGRANT1998-03-311994-10-1223254037GreatInternational Business Machines CorpInternational Business Machines Corp
US5870543A0.668System for preventing unauthorized copying of active softwareGRANT1999-02-091995-06-0723889640GreatDigital River IncDigital River Inc
EP0265183A20.668Billing system for computer softwareGRANT1988-04-271986-10-2425447441Great
US5883955A0.667On-line try before you buy software distribution systemGRANT1999-03-161995-06-0723928895GreatDigital River IncDigital River Inc
US7140005B20.667Method and apparatus to test an instruction sequenceGRANT2006-11-211998-12-2122811342GreatIntel CorpIntel Corp
US6249866B10.664Encrypting file system and methodGRANT2001-06-191997-09-1625461329GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US4670857A0.664Cartridge-controlled system whose use is limited to authorized cartridgesGRANT1987-06-021981-10-2623223349Great
US5592549A0.664Method and apparatus for retrieving selected information from a secure information sourceGRANT1997-01-071995-06-1523952627GreatInfosafe Systems IncHARMONY LOGIC SYSTEMS LLC
US5999622A0.663Method and apparatus for protecting widely distributed digital informationGRANT1999-12-071995-11-2224245505GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US6523118B10.663Secure cache for instruction and data protectionGRANT2003-02-181998-06-2922312877GreatKoninklijke Philips NVNXP BV
US5649187A0.663Method and apparatus for remotely controlling and monitoring the use of computer softwareGRANT1997-07-151989-04-2823353434GreatSofTel IncSofTel Inc
US5907617A0.663Try before you buy software distribution and marketing systemGRANT1999-05-251995-06-0723938715GreatDigital River IncDigital River Inc
US5034980A0.659Microprocessor for providing copy protectionGRANT1991-07-231987-10-0217202313GreatIntel CorpIntel Corp
US4525599A0.658Software protection methods and apparatusGRANT1985-06-251982-05-2123502378GreatGeneral Computer CorpGCC Technologies Inc
US6351813B10.658Access control/crypto systemGRANT2002-02-261996-02-0926682374GreatDigital Privacy IncINTEGRATED TECHNOLOGOES OF AMERICA Inc, Digital Privacy Inc
US5497479A0.656Method and apparatus for remotely controlling and monitoring the use of computer softwareGRANT1996-03-051989-04-2826994243GreatSofTel IncSofTel Inc
US4688169A0.656Computer software security systemGRANT1987-08-181985-05-3024971099Great
EP1031909A20.655A system and method for manipulating a computer file and/or programGRANT2000-08-301999-02-2322972212GreatSightsoundcom IncDMT Licensing LLC
US5883954A0.654Self-launching encrypted try before you buy software distribution systemGRANT1999-03-161995-06-0723889197GreatDigital River IncDigital River Inc
US5666411A0.653System for computer software protectionGRANT1997-09-091994-01-1322661068GreatIntarsia Software LLCIntarsia Software LLC
US5301247A0.651Method for ensuring secure communicationsGRANT1994-04-051992-07-2325440266GreatCrest Industries IncCrest Industries Inc
US5394469A0.650Method and apparatus for retrieving secure information from mass storage mediaGRANT1995-02-281994-02-1822734578GreatInfosafe Systems IncHARMONY LOGIC SYSTEMS LLC
US4959861A0.650Security system for computer softwareGRANT1990-09-251988-07-1322814893Great
US5337357A0.648Method of software distribution protectionGRANT1994-08-091993-06-1722264740GreatSoftware Security IncSafeNet Inc
US5490216A0.645System for software registrationGRANT1996-02-061992-09-2125644335GreatUniloc Singapore Pvt LtdUniloc Luxembourg SA
US7336789B10.645System for providing encrypted data  system for decrypting encrypted data and method for providing a communication interface in such a decrypting systemGRANT2008-02-261998-08-318234071GreatIrdeto Access BVIrdeto BV
US7430670B10.645Software self-defense systems and methodsGRANT2008-09-301999-07-2939776569GreatIntertrust Technologies CorpIntertrust Technologies Corp
US6594761B10.644Tamper resistant software encodingGRANT2003-07-151999-06-0923283915GreatCloakware CorpIrdeto BV
US6088452A0.642Encoding technique for software and hardwareGRANT2000-07-111996-03-0724451142GreatNorthern Telecom LtdNortel Networks Ltd
US6157721A0.639Systems and methods using cryptography to protect secure computing environmentsGRANT2000-12-051996-08-1224769786GreatIntertrust Technologies CorpIntertrust Technologies Corp
US6173402B10.637Technique for localizing keyphrase-based data encryption and decryptionGRANT2001-01-091998-03-0421875522GreatInternational Business Machines CorpInternational Business Machines Corp
US7236610B10.637Authenticating executable code and executions thereofGRANT2007-06-261998-04-3038178825GreatFRAUNHOFER GESELLSCHAFTFraunhofer Gesellschaft zur Forderung der Angewandten Forschung eV
US5481610A0.634Digital radio transceiver with encrypted key storageGRANT1996-01-021994-02-2822751072GreatEricsson IncEricsson Inc
US6473861B10.633Magnetic optical encryption/decryption disk drive arrangementGRANT2002-10-291998-12-0322757173Great
US7519810B20.632Methods for conducting server-side encryption/decryption-on-demandGRANT2009-04-141999-06-3038429777GreatEducational Testing ServiceEducational Testing Service
US5473687A0.632Method for retrieving secure information from a databaseGRANT1995-12-051993-12-2922637323GreatInfosafe Systems IncHARMONY LOGIC SYSTEMS LLC
US4937861A0.632Computer software encryption apparatusGRANT1990-06-261988-08-0322854192GreatKelly Services IncKelly Services Inc
US5007082A0.631Computer software encryption apparatusGRANT1991-04-091988-08-0327397756GreatKelly Services IncKelly Services Inc
US4747139A0.629Software security method and systemsGRANT1988-05-241984-08-2727094508Great
US6345359B10.628In-line decryption for protecting embedded softwareGRANT2002-02-051997-11-1425517185GreatRaytheon CoRaytheon Co
US6959390B10.628Data processing system and method for maintaining secure user private keys in non-secure storageGRANT2005-10-251999-03-0335115414GreatInternational Business Machines CorpInternational Business Machines Corp
US5757919A0.627Cryptographically protected paging subsystemGRANT1998-05-261996-12-1225069838GreatIntel CorpIntel Corp
US5557346A0.627System and method for key escrow encryptionGRANT1996-09-171994-08-1123112250GreatTrusted Information Systems IncMcAfee LLC
US5696823A0.627High-bandwidth encryption system with low-bandwidth cryptographic modulesGRANT1997-12-091995-03-3123644008GreatNokia of America CorpNokia of America Corp
US5559884A0.626Method and system for generating and auditing a signature for a computer programGRANT1996-09-241994-06-3023025286GreatMicrosoft CorpMicrosoft Technology Licensing LLC
US5014234A0.625System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected softwareGRANT1991-05-071986-08-2525412143GreatNCR CorpNCR Corp
US5758068A0.625Method and apparatus for software license managementGRANT1998-05-261995-09-1924112239GreatInternational Business Machines CorpInternational Business Machines Corp
US4593353A0.625Software protection method and apparatusGRANT1986-06-031981-10-2623222661GreatTELECOMMUNICATIONS ASSOC IncRainbow Technologies Inc
US6202152B10.624System and method for accessing information decrypted in multiple-byte blocksGRANT2001-03-131998-01-2721762989GreatPhilips Semiconductors IncNXP BV
US20070271191A10.624METHOD AND APPARATUS FOR SECURE DISTRIBUTION OF SOFTWAREAPPLICATION2007-11-222000-03-0938713115GreatMacrovision CorpFlexera Software LLC
US5029206A0.624Uniform interface for cryptographic servicesGRANT1991-07-021989-12-2723817457GreatMotorola Solutions IncGeneral Dynamics C4 Systems Inc
US6591415B10.623Polymorphic code generation method and system thereforGRANT2003-07-081999-04-3026829777GreatTrymedia SystemsMacrovision Corp
US6003117A0.622Secure memory management unit which utilizes a system processor to perform page swappingGRANT1999-12-141997-10-0825486049GreatPhilips Semiconductors IncIII Holdings 6 LLC
US6775778B10.620Secure computing device having boot read only memory verification of program codeGRANT2004-08-101998-05-2932829232GreatTexas Instruments IncTexas Instruments Inc
US20040139211A10.619Systems and methods for prevention of peer-to-peer file sharingAPPLICATION2004-07-151995-12-2032719700GreatNB NetworksNB Networks
US20090063846A10.619SYSTEMS AND METHODS FOR PREVENTION OF PEER-TO-PEER FILE SHARINGAPPLICATION2009-03-051995-12-2024300598GreatNB NetworksNB Networks
US4306289A0.618Digital computer having code conversion apparatus for an encrypted programGRANT1981-12-151980-02-0422375982GreatWestern Electric Co IncNokia of America Corp
US6862683B10.618Method and system for protecting native librariesGRANT2005-03-012000-03-2434193405GreatMicro Focus Software IncOracle International Corp
US7043641B10.618Encryption in a secure computerized gaming systemGRANT2006-05-092000-03-0824072450GreatInternational Game TechnologyInternational Game Technology
US5542045A0.618Method for interposing a security function in a computer programGRANT1996-07-301993-10-1522479249GreatSoftware Security IncSoftware Security Inc, Rainbow Technologies Inc
EP0875815A20.617Information processing apparatus and method and recording mediumGRANT1998-11-041997-04-3014580238GreatSony CorpSony Corp
US6684198B10.617Program data distribution via open networkGRANT2004-01-271997-09-0325446908GreatSega Games Co LtdSega Games Co Ltd
US6708274B20.615Cryptographically protected paging subsystemGRANT2004-03-161998-04-3022100902GreatIntel CorpIntel Corp
US6067622A0.611Software security system using remove function to restrict unauthorized duplicating and installation of an application programGRANT2000-05-231996-01-0224326654Great
US5557765A0.610System and method for data recoveryGRANT1996-09-171994-08-1126965728GreatTrusted Information Systems IncMcAfee LLC
US5610980A0.679Method and apparatus for re-initializing a processing device and a storage deviceGRANT1997-03-111995-02-1323533439GoodETA Tech CorpQUANTUM DIGITAL SOLUTIONS Corp
US5727061A0.660Personal access management systemsGRANT1998-03-101995-02-1323533403GoodETA Tech CorpCYPHERCOMM Inc
US4281216A0.615Key management for encryption/decryption systemsGRANT1981-07-281979-04-0221828960GoodMotorola Solutions IncMotorola Solutions Inc
US6378072B10.610Cryptographic systemGRANT2002-04-231998-02-0321784383GoodCompaq Computer CorpMicro Focus LLC
US5933498A0.609System for controlling access and distribution of digital propertyGRANT1999-08-031996-01-1124337542GoodMRJ IncHanger Solutions LLC
EP1287416B10.608SYSTEM AND EMBEDDED LICENSE CONTROL MECHANISM FOR THE CREATION AND DISTRIBUTION OF DIGITAL CONTENT FILES AND ENFORCEMENT OF LICENSED USE OF THE DIGITAL CONTENT FILESGRANT2007-06-132000-04-0724173146GoodViatech Technologies IncViatech Technologies Inc
US20050246549A10.607Methods and apparatus for secure distribution of softwareAPPLICATION2005-11-031999-06-0935188449GoodFlexera Software LLCFlexera Software LLC
US6971022B10.607Cryptographic apparatus for performing cryptography on a specified area of content dataGRANT2005-11-291999-06-1535405413GoodPanasonic CorpPanasonic Corp
US7380139B20.603Digital data recording apparatus  digital data recording method  and computer-readable recording mediumGRANT2008-05-271998-07-2226515986GoodPanasonic CorpPanasonic Intellectual Property Corp
US6832318B10.602Method and apparatus for secure distribution of information recorded on fixed mediaGRANT2004-12-141999-01-1533489108GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US6000030A0.600Software fingerprinting and brandingGRANT1999-12-071996-06-2024677819GoodEMC CorpEMC Corp
US6647495B10.600Information processing apparatus and method and recording mediumGRANT2003-11-111997-04-3014580316GoodSony CorpSony Corp
USRE40405E10.599Method and apparatus for securing executable programs against copyingGRANT2008-06-241995-04-1823678781GoodRicoh Co LtdRicoh Co Ltd
US7200230B20.597System and method for controlling and enforcing access rights to encrypted mediaGRANT2007-04-032000-04-0622720289GoodMacrovision CorpMarking Object Virtualization Intelligence LLC
US7243236B10.596Systems and methods for using cryptography to protect secure and insecure computing environmentsGRANT2007-07-101999-07-2938227140GoodIntertrust Technologies CorpIntertrust Technologies Corp
US20110010299A10.596System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment softwareAPPLICATION2011-01-131996-06-2839810189GoodArvato Digital Services LLCArvato Digital Services LLC
US5343524A0.594Intelligent security deviceGRANT1994-08-301991-06-2124886725Good
US4764959A0.593Single-chip microcomputer with encryptable function on program memoryGRANT1988-08-161983-10-1426506985GoodToshiba CorpToshiba Corp
US6400823B10.591Securely generating a computer system password by utilizing an external encryption algorithmGRANT2002-06-041996-12-1325075925GoodCompaq Computer CorpHewlett Packard Development Co LP
US5546463A0.589Pocket encrypting and authenticating communications deviceGRANT1996-08-131994-07-1223045299GoodInformation Resource Engineering IncSafeNet Inc
US5311595A0.589Method of transferring data  between computer systems using electronic cardsGRANT1994-05-101989-06-078115812GoodKommunedata ISKommunedata IS
US5301231A0.587User defined function facilityGRANT1994-04-051992-02-1225267410GoodInternational Business Machines CorpInternational Business Machines Corp
US7466823B20.587Digital media distribution method and systemGRANT2008-12-162000-03-034165438GoodDestiny Software Productions IncDestiny Software Productions Inc
US5826011A0.586Method of metering and protecting computer softwareGRANT1998-10-201995-12-2624551466GoodRainbow Technologies IncSafeNet Inc
US4562305A0.584Software cryptographic apparatus and methodGRANT1985-12-311982-12-2223795713GoodInternational Business Machines CorpInternational Business Machines Corp
US5933620A0.584Method and apparatus for serializing microprocessor identification numbersGRANT1999-08-031996-03-2824496461GoodAdvanced Micro Devices IncGlobalFoundries Inc
US4646234A0.583Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of computer programsGRANT1987-02-241984-02-2924338499GoodBrigham Young UniversityBrigham Young University
US4433207A0.583Cryptographic decoder for computer programsGRANT1984-02-211981-09-1023160635GoodDallas Semiconductor CorpDallas Semiconductor Corp
US5249232A0.582DATA PROCESSING SYSTEM HAVING AN ENCRYPTION DEVICEGRANT1993-09-281991-06-206434390GoodAlcatel Lucent NVAlcatel Lucent NV
US6163612A0.582Coding device  decoding device and IC circuitGRANT2000-12-191996-07-0816036495GoodKanekichi CorpKanekichi Corp
EP1168185A20.582Method for protecting a memory card  and a memory cardGRANT2002-01-022000-05-088558347GoodNokia Mobile Phones Ltd, Nokia OyjNokia Oyj
US7096358B20.581Encrypting file systemGRANT2006-08-221998-05-0736817006GoodMAZ Tech IncMAZ ENCRYPTION TECHNOLOGIES LLC
US7690039B20.581Method and apparatus for content protection in a secure content delivery systemGRANT2010-03-301998-11-1632684475GoodSoftricity IncMicrosoft Technology Licensing LLC
US7827109B20.581Digital content management system and apparatusGRANT2010-11-021994-10-2727530431GoodIntarsia Software LLCPiracy Protection LLC, Xylon LLC
US4246638A0.580Method and apparatus for controlling usage of a programmable computing machineGRANT1981-01-201978-09-1425478045Good
US6272637B10.579Systems and methods for protecting access to encrypted informationGRANT2001-08-071997-04-1425273642GoodDallas Semiconductor CorpMaxim Integrated Products Inc
US5081675A0.579System for protection of software in memory against unauthorized useGRANT1992-01-141989-11-1323729174Good
US20080082446A10.579Remote Authorization for Unlocking Electronic Data System and MethodAPPLICATION2008-04-031999-10-0139262160GoodGreater Boston Authentication Solutions LLCGreater Boston Authentication Solutions LLC
US5103476A0.579Secure system for activating personal computer software at remote locationsGRANT1992-04-071990-11-0724443361GoodBETANET LLCBETANET LLC
US5784459A0.578Method and apparatus for secure  remote swapping of memory resident active entitiesGRANT1998-07-211996-08-1524805686GoodInternational Business Machines CorpLenovo PC International Ltd
US7730323B20.577Controlling database copyrightsGRANT2010-06-011994-04-0136191195GoodIntarsia Software LLCPiracy Protection LLC, Intarsia Software LLC
US7739511B20.576Systems and methods for watermarking software and other mediaGRANT2010-06-151999-07-2938987962GoodIntertrust Technologies CorpIntertrust Technologies Corp
US5764774A0.575Source data compression and decompression in code symbol printing and decodingGRANT1998-06-091995-09-2524124538GoodIntermec Technologies CorpIntermec IP Corp
EP1237323A10.573DEVICE FOR REPRODUCING DATAGRANT2002-09-041999-12-0718393402GoodFujitsu Ltd, Hitachi Ltd, Nippon Columbia Co Ltd, Sanyo Electric Co LtdFujitsu Ltd, Sanyo Electric Co Ltd
US4888802A0.573System and method for providing for secure encryptor key managementGRANT1989-12-191988-06-1722774172GoodNCR CorpNCR Corp
US7707641B20.573Method and apparatus for secure content delivery over broadband access networksGRANT2010-04-271998-11-1636045753GoodSoftricity IncMicrosoft Technology Licensing LLC
US5790663A0.573Method and apparatus for software access to a microprocessor serial numberGRANT1998-08-041996-03-2824496456GoodAdvanced Micro Devices IncGlobalFoundries Inc
US5222133A0.572METHOD OF PROTECTING COMPUTER SOFTWARE FROM UNAUTHORIZED EXECUTION USING MULTIPLE KEYSGRANT1993-06-221991-10-1725113550GoodSafeNet IncSafeNet Inc
EP0715242A10.571Method and system for digital information protectionGRANT1996-06-051994-12-0126561626GoodNippon Telegraph and Telephone CorpNippon Telegraph and Telephone Corp
EP0800312A10.570DATA TRANSMITTER  DATA TRANSMITTING METHOD  DATA RECEIVER  INFORMATION PROCESSOR  AND INFORMATION RECORDING MEDIUMGRANT1997-10-081995-10-0927457220GoodPanasonic CorpPanasonic Corp
US4977594A0.569Database usage metering and protection system and methodGRANT1990-12-111986-10-1426977654GoodElectronic Publishing Resources IncElectronic Publishing Resources Inc
US5892900A0.569Systems and methods for secure transaction management and electronic rights protectionGRANT1999-04-061996-08-3024836636GoodIntertrust Technologies CorpIntertrust Technologies Corp
US6871278B10.568Secure transactions with passive storage mediaGRANT2005-03-222000-07-0624448679GoodLaserCard CorpAssa Abloy AB
US6073256A0.568Digital product execution controlGRANT2000-06-061997-04-1125273279GoodPreview Systems IncSafeNet Data Security Israel Ltd
US9219755B20.567Malicious mobile code runtime monitoring system and methodsGRANT2015-12-221996-11-0855018096GoodFinjan IncFinjan Inc
US10552603B20.567Malicious mobile code runtime monitoring system and methodsGRANT2020-02-042000-05-1727394815GoodFinjan IncFinjan Inc
US5457748A0.567Method and apparatus for improved security within encrypted communication devicesGRANT1995-10-101992-11-3025529829GoodMotorola Solutions IncMotorola Solutions Inc
US5754761A0.567Universal sofeware key processGRANT1998-05-191995-03-0623577365Good
US4278837A0.566Crypto microprocessor for executing enciphered programsGRANT1981-07-141977-10-3126722203GoodDallas Semiconductor CorpDallas Semiconductor Corp
US6018712A0.564Method and apparatus for remote program execution to use in computer software protection without the use of encryptionGRANT2000-01-251997-12-1925541162Good
US4319079A0.562Crypto microprocessor using block cipherGRANT1982-03-091979-09-1326756455GoodDallas Semiconductor CorpDallas Semiconductor Corp
US6801625B10.562Apparatus and method for stripping parity bits from an input streamGRANT2004-10-051999-12-0833030092GoodIntel CorpIntel Corp
US8639625B10.562Systems and methods for secure transaction management and electronic rights protectionGRANT2014-01-281995-02-1349958042GoodIntertrust Technologies CorpIntertrust Technologies Corp
US9141786B20.562Malicious mobile code runtime monitoring system and methodsGRANT2015-09-221996-11-0836642059GoodFinjan IncFinjan Inc
US5235641A0.560FILE ENCRYPTION METHOD AND FILE CRYPTOGRAPHIC SYSTEMGRANT1993-08-101990-03-1313184996GoodHitachi LtdHitachi Ltd
US7124302B20.560Systems and methods for secure transaction management and electronic rights protectionGRANT2006-10-171995-02-1346278128GoodIntertrust Technologies CorpIntertrust Technologies Corp
US4573119A0.559Computer software protection systemGRANT1986-02-251983-07-1124038180Good
US6742177B10.559Method and system for secure debugging of a secure software moduleGRANT2004-05-252000-03-3132313231GoodInternational Business Machines CorpInternational Business Machines Corp
US5790783A0.558Method and apparatus for upgrading the software lock of microprocessorGRANT1998-08-041996-03-2824496454GoodAdvanced Micro Devices IncAdvanced Micro Devices Inc
US4797928A0.558Encryption printed circuit boardGRANT1989-01-101987-01-0721694897GoodMIU AutomationMIU INDUSTRIES Ltd 1600-609 GRANVILLE STREET
US6519700B10.557Self-protecting documentsGRANT2003-02-111998-10-2322652901GoodContentguard Holdings IncContentguard Holdings Inc
US5388157A0.556Data security arrangements for semiconductor programmable devicesGRANT1995-02-071991-10-1110702763GoodPilkington Micro-Electronics LtdNXP USA Inc
US4827512A0.556Programmable portable electronic deviceGRANT1989-05-021985-10-0727312661GoodToshiba CorpToshiba Corp
US5778071A0.555Pocket encrypting and authenticating communications deviceGRANT1998-07-071994-07-1224769678GoodInformation Resource Engineering IncSafeNet Inc
US5615264A0.555Encrypted data package record for use in remote transaction metered data systemGRANT1997-03-251995-06-0823939890GoodWave Systems CorpWave Systems Corp
US7350085B20.555Tamper resistant software-mass data encodingGRANT2008-03-252000-04-124165877GoodCloakware CorpIrdeto BV
US5815714A0.553Embedded debug commands in a source fileGRANT1998-09-291994-12-2923441472GoodHitachi America LtdHitachi America Ltd
US5768372A0.552Method and apparatus for securing programming data of a programmable logic deviceGRANT1998-06-161996-03-1324474522GoodAltera CorpAltera Corp
US7757101B20.552Data processing apparatus  data processing system  and data processing method thereforGRANT2010-07-131999-12-2018472711GoodSony CorpSony Corp
US6049609A0.552Cell array providing non-persistent secret storage through a mutation cycleGRANT2000-04-111997-08-0625422824GoodIntel CorpIntel Corp
US5050213A0.552Database usage metering and protection system and methodGRANT1991-09-171986-10-1427405482GoodElectronic Publishing Resources IncElectronic Publishing Resources Inc
US6606385B10.551Data encrypting/decrypting conversion methods and apparatuses and data communication system adopting the sameGRANT2003-08-121997-08-0716637327GoodHitachi LtdMaxell Ltd
US20040117663A10.548METHOD FOR AUTHENTICATION OF DIGITAL CONTENT USED OR ACCESSED WITH SECONDARY DEVICES TO REDUCE UNAUTHORIZED USE OR DISTRIBUTIONAPPLICATION2004-06-171998-06-0446299908GoodZ4 Technologies IncZ4 Technologies Inc
US7526655B20.548Microprocessor configuration and method for operating a microprocessor configurationGRANT2009-04-282000-01-188167654GoodInfineon Technologies AGInfineon Technologies AG
US20010042124A10.547Web-based method  apparatus  and system for secure data storageAPPLICATION2001-11-152000-03-2724137572GoodSECURIT-E-DOC IncSECURIT-E-DOC Inc
US7168065B10.547Method for monitoring program flow to verify execution of proper instructions by a processorGRANT2007-01-231999-03-099542995GoodGemplus SAThales DIS France SA
US6986063B20.547Method for monitoring software using encryption including digital signatures/certificatesGRANT2006-01-101998-06-0446281942GoodZ4 Technologies IncZ4 Technologies Inc
US6965992B10.546Method and system for network security capable of doing stronger encryption with authorized devicesGRANT2005-11-152000-02-2435266511Good3Com CorpHP Inc, Hewlett Packard Development Co LP
US5191611A0.546METHOD AND APPARATUS FOR PROTECTING MATERIAL ON STORAGE MEDIA AND FOR TRANSFERRING MATERIAL ON STORAGE MEDIA TO VARIOUS RECIPIENTSGRANT1993-03-021989-04-0327502453GoodLANRALD DATA MGMT NV LLCLANRALD DATA MGMT NV LLC
US4914697A0.546Cryptographic method and apparatus with electronically redefinable algorithmGRANT1990-04-031988-02-0122536381GoodMotorola Solutions IncMotorola Solutions Inc
US6308270B10.545Validating and certifying execution of a software program with a smart cardGRANT2001-10-231998-02-1321815854GoodSchlumberger Technologies IncSchlumberger Technologies Inc
US6226618B10.542Electronic content delivery systemGRANT2001-05-011998-08-1322458995GoodInternational Business Machines CorpLevel 3 Communications LLC
US6397301B10.542Preventing access to secure area of a cacheGRANT2002-05-281999-12-2923881738GoodIntel CorpIntel Corp
US6510519B20.541Conditional access systemGRANT2003-01-211995-04-0327556700GoodScientific Atlanta LLCCisco Technology Inc
US5610981A0.540Preboot protection for a data security system with anti-intrusion capabilityGRANT1997-03-111992-06-0426899632GoodIntegrated Tech Of America IncCEDAR WEST C/O GESTINOR SERVICES, HILLIARD LP, INDEPENDENCE PLAZA Inc, LENOWITZ MARK, OFFIT ANDREW, SIMON DEBRA, Digital Privacy Inc
EP0455064A20.540Data encryption device and method for data encryptionGRANT1991-11-061990-05-0324062621GoodNational Semiconductor CorpNational Semiconductor Corp
US6105134A0.540Verification of the source of program information in a conditional access systemGRANT2000-08-151995-04-0326733211GoodScientific Atlanta LLCCisco Technology Inc
US5754647A0.540Software protection apparatus and the method of protection utilizing read-write memory means having inconsistent input and output dataGRANT1998-05-191996-03-2724503243GoodUnited Microelectronics CorpUnited Microelectronics Corp
US6424717B10.540Encryption devices for use in a conditional access systemGRANT2002-07-231995-04-0327573932GoodScientific Atlanta LLCCisco Technology Inc
US5343530A0.539Method for the authentication of dataGRANT1994-08-301991-09-039416583GoodGemplus Card International SAGemplus SA
US7730324B20.538Method for controlling database copyrightsGRANT2010-06-011994-04-0113271114GoodIntarsia Software LLCPiracy Protection LLC
US5613012A0.538Tokenless identification system for authorization of electronic transactions and electronic transmissionsGRANT1997-03-181994-11-2823758581GoodSmartTouch LLCOpen Invention Network LLC, Excel Innovations Inc
USRE42163E10.537Data management systemGRANT2011-02-221994-04-0143597263GoodIntarsia Software LLCPiracy Protection LLC, Intarsia Software LLC
US20040225894A10.537HARDWARE BASED METHOD FOR DIGITAL RIGHTS MANAGEMENT INCLUDING SELF ACTIVATING/SELF AUTHENTICATION SOFTWAREAPPLICATION2004-11-111998-06-0446299910GoodZ4 Technologies IncZ4 Technologies Inc
US6157719A0.537Conditional access systemGRANT2000-12-051995-04-0327555592GoodScientific Atlanta LLCCisco Technology Inc
US6609116B10.536System and method for securely updating copy-protected mediaGRANT2003-08-191998-04-2422066173GoodInternational Business Machines CorpGlobalFoundries Inc
US8548166B20.536Method for partially encrypting program dataGRANT2013-10-011995-04-0335375176GoodCisco Technology IncCisco Technology Inc
US20100095131A10.536METHOD AND SYSTEM FOR SEAMLESS INTEGRATION OF PREPROCESSING AND POSTPROCESSING FUNCTIONS WITH AN EXISTING APPLICATION PROGRAMAPPLICATION2010-04-152000-05-1526899321Good
US6266754B10.535Secure computing device including operating system stored in non-relocatable page of memoryGRANT2001-07-241998-05-2926776708GoodTexas Instruments IncTexas Instruments Inc
US7380137B20.535Content guard system for copy protection of recordable mediaGRANT2008-05-271999-07-2032823768GoodIntel Corp, International Business Machines CorpIntel Corp, International Business Machines Corp
US20050021477A10.535Method and system for securely incorporating electronic information into an online purchasing applicationAPPLICATION2005-01-271997-01-2934084799GoodCRS LLCHanger Solutions LLC
US5590199A0.535Electronic information network user authentication and authorization systemGRANT1996-12-311993-10-1222463201GoodMitre CorpGreen Wireless LLC
US6026235A0.535System and methods for monitoring functions in natively compiled software programsGRANT2000-02-151997-05-2025328719GoodBorland Software CorpBorland Software Corp
US7152165B10.534Trusted storage systems and methodsGRANT2006-12-191999-07-1636575766GoodIntertrust Technologies CorpIntertrust Technologies Corp
US7133845B10.534System and methods for secure transaction management and electronic rights protectionGRANT2006-11-071995-02-1334831157GoodIntertrust Technologies CorpIntertrust Technologies Corp
US8474058B20.534Method and system for managing a data object so as to comply with predetermined conditions for usageGRANT2013-06-251995-02-0120397045GoodRovi Solutions CorpRovi Solutions Corp
US20010044901A10.533BUBBLE-PROTECTED SYSTEM FOR AUTOMATIC DECRYPTION OF FILE DATA ON A PER-USE BASIS AND AUTOMATIC RE-ENCRYPTIONAPPLICATION2001-11-221998-03-2421948284GoodSymantec CorpCA Inc
US7069451B10.533Systems and methods for secure transaction management and electronic rights protectionGRANT2006-06-271995-02-1331999095GoodIntertrust Technologies CorpIntertrust Technologies Corp
US6948070B10.531Systems and methods for secure transaction management and electronic rights protectionGRANT2005-09-201995-02-1332686239GoodIntertrust Technologies CorpIntertrust Technologies Corp
US5899987A0.531Apparatus for and method of providing user exits on an operating system platformGRANT1999-05-041995-10-0324147319GoodMemco Software LtdCA Software Israel Ltd
US6499106B10.531Method and apparatus for secure distribution of information recorded of fixed mediaGRANT2002-12-241999-01-1522935415GoodSony Corp, Sony Electronics IncSony Corp, Sony Electronics Inc
US4465901A0.530Crypto microprocessor that executes enciphered programsGRANT1984-08-141979-06-0426722202GoodDallas Semiconductor CorpDallas Semiconductor Corp
US6516412B20.529Authorization of services in a conditional access systemGRANT2003-02-041995-04-0327573934GoodScientific Atlanta LLCCisco Technology Inc
US6035380A0.529Integrated circuitGRANT2000-03-071995-02-1410769574Good
US5379433A0.529Protection against unauthorized use of software recorded on recording mediumGRANT1995-01-031989-05-0814645874GoodVictor Company of Japan LtdVictor Company of Japan Ltd
US7095854B10.529Systems and methods for secure transaction management and electronic rights protectionGRANT2006-08-221995-02-1336821780GoodIntertrust Technologies CorpIntertrust Technologies Corp
US5910987A0.528Systems and methods for secure transaction management and electronic rights protectionGRANT1999-06-081995-02-1323532729GoodIntertrust Technologies CorpIntertrust Technologies Corp
US6668325B10.528Obfuscation techniques for enhancing software securityGRANT2003-12-231997-06-0919926287GoodIntertrust Technologies CorpIntertrust Technologies Corp
US6560340B10.528Method and apparatus for geographically limiting service in a conditional access systemGRANT2003-05-061995-04-0327573933GoodScientific Atlanta LLCCisco Technology Inc
US6519762B10.527Method and apparatus for restoration of a computer system hard driveGRANT2003-02-111998-12-1522788901GoodDell USA LPDell USA LP
US5199066A0.527Method and apparatus for protecting softwareGRANT1993-03-301989-04-1823330461GoodSpecial Effects Software IncLOGAN ANDREW J PO BOX 314 HAVERFORD PA 19041, SPECIAL EFFECTS SOFTWARE Inc A CORP OF, Special Effects Software Inc
US6292568B10.527Representing entitlements to service in a conditional access systemGRANT2001-09-181966-12-1627573935GoodScientific Atlanta LLCCisco Technology Inc
US6367017B10.527Apparatus and method for providing and authentication systemGRANT2002-04-021996-11-0746276276GoodLitronic IncImprivata Inc
US6823460B10.526Method and system for intercepting an application program interfaceGRANT2004-11-231999-11-1433428271GoodNetworks Associates Technology IncMcAfee LLC
US5144659A0.526COMPUTER FILE PROTECTION SYSTEMGRANT1992-09-011989-04-1923335345GoodIntellectual Ventures Fund 24 LLC, EMPIRICAL RESEARCH SYSTEMS Inc A NV CORPJONES RICHARD P 7930 EAST SIDE DR NE TACOMA WA 98422
US6937729B20.526Representing entitlements to service in a conditional access systemGRANT2005-08-301995-04-0327577920GoodScientific Atlanta LLCCisco Technology Inc
US4446519A0.526Method and apparatus for providing security for computer softwareGRANT1984-05-011981-05-2623015748GoodCorban International LtdCorban International Ltd
US4262329A0.525Security system for data processingGRANT1981-04-141978-03-2725396723GoodCOMPUTATION PLANNING IncCOMPUTER PLANNING Inc, COMPUTATION PLANNING Inc
EP0989497A10.524Method and apparatus for protection of recorded digital dataGRANT2000-03-291997-09-258229855GoodCanal Plus SACanal Plus SA
US4352952A0.524Data security moduleGRANT1982-10-051978-06-1226825050GoodMotorola Solutions IncMotorola Solutions Inc
EP0008033A10.524Microprocessor for executing enciphered programsGRANT1980-02-201978-07-2425454931Good
US20070223688A10.523Architecture of an encryption circuit implementing various types of encryption algorithms simultaneously without a loss of performanceAPPLICATION2007-09-271999-11-099551907Good
US6128094A0.523Printer having processor with instruction cache and compressed program storeGRANT2000-10-031998-07-0822342127GoodHP IncHewlett Packard Development Co LP
US6792528B10.522Method and apparatus for securing data contents of a non-volatile memory deviceGRANT2004-09-142000-05-1724296740GoodOpen Invention Network LLCOpen Invention Network LLC
US5544244A0.522Method for protecting an enciphered computer object code against cryptanalysisGRANT1996-08-061993-10-2817489996GoodNEC CorpNEC Corp
US5970142A0.521Configuration stream encryptionGRANT1999-10-191996-08-2624824086GoodXilinx IncXilinx Inc
US7203842B20.521Method and apparatus for secure configuration of a field programmable gate arrayGRANT2007-04-101999-12-2210866706GoodAlgotronix LtdAlgotronix Ltd
US4999806A0.521Software distribution systemGRANT1991-03-121987-09-0422238294Good
US6259789B10.520Computer implemented secret object key block cipher encryption and digital signature device and methodGRANT2001-07-101997-12-1225534922GoodSafecourier Software IncSafecourier Software Inc
US6182217B10.519Electronic data-processing device and systemGRANT2001-01-301997-03-037822093GoodSiemens AGInfineon Technologies AG, Siemens AG
US7249105B10.518BORE-resistant digital goods configuration and distribution methods and arrangementsGRANT2007-07-242000-03-1424092360GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5724425A0.518Method and apparatus for enhancing software security and distributing softwareGRANT1998-03-031994-06-1022979711GoodSun Microsystems IncSun Microsystems Inc
US7228437B20.517Method and system for securing local database file of local content stored on end-user systemGRANT2007-06-051998-08-1346204170GoodInternational Business Machines CorpInternational Business Machines Corp
US5740248A0.516Software level touchpoints for an international cryptography frameworksGRANT1998-04-141996-11-1225007943GoodCheyenne Property TrustCheyenne Property Trust
US6327660B10.516Method for securing communications in a pre-boot environmentGRANT2001-12-041998-09-1822558744GoodIntel CorpIntel Corp
US5606609A0.516Electronic document verification system and methodGRANT1997-02-251994-09-1923185324GoodScientific Atlanta LLCSilanis Technology Inc
US6611812B20.515Secure electronic content distribution on CDS and DVDsGRANT2003-08-261998-08-1323483714GoodInternational Business Machines CorpWistron Corp
US6519721B10.515Method and apparatus to reduce the risk of observation of program operationGRANT2003-02-111999-05-1923220799GoodIntel CorpIntel Corp
US5265159A0.514Secure file erasureGRANT1993-11-231992-06-2325416104GoodHughes Aircraft CoHughes Aircraft Co, DirecTV Group Inc
US6983371B10.514Super-distribution of protected digital contentGRANT2006-01-031998-10-2235509163GoodInternational Business Machines CorpWistron Corp
US5812661A0.512Software reproduction apparatusGRANT1998-09-221994-08-1016734276GoodFujitsu LtdFujitsu Ltd
US4987595A0.509Secure cryptographic processor arrangementGRANT1991-01-221989-09-1123602521GoodMotorola Solutions IncGeneral Dynamics C4 Systems Inc
US5524072A0.508Methods and apparatus for data encryption and transmissionGRANT1996-06-041991-12-0426322363GoodEnco Tone LtdENCO-TONE Ltd, Enco Tone Ltd
US4888798A0.507Modular software securityGRANT1989-12-191985-04-1927111114GoodOms IncQMS Inc A DE CORP, Oms Inc
EP0635790A10.507Client/server based secure timekeeping systemGRANT1995-01-251993-07-2222255621GoodInternational Business Machines CorpInternational Business Machines Corp
US4306111A0.506Simple and effective public-key cryptosystemGRANT1981-12-151979-05-3121931532GoodComsat CorpComsat Corp
US7082539B10.505Information processing apparatusGRANT2006-07-251999-03-1914235251GoodHitachi LtdHitachi Ltd
EP0694846A10.505Numerial scrambling method and its application to a programmable circuitGRANT1996-01-311994-07-299465930GoodSTMicroelectronics SA, SGS Thomson Microelectronics SASTMicroelectronics SA
US6173403B10.503Method and apparatus for distributing information productsGRANT2001-01-091997-04-3046256381GoodAchates Reference Publishing IncAchates Reference Publishing Inc
US6557104B20.503Method and apparatus for secure processing of cryptographic keysGRANT2003-04-291997-05-0225304733GoodPhoenix Technologies LtdKinglite Holdings Inc
US7673059B20.501Tracking electronic contentGRANT2010-03-021998-11-2432392298GoodDRM Tech LLCDigital Reg of Texas LLC
EP0109504A20.501Protection system for storage and input/output facilities and the likeGRANT1984-05-301982-11-1823758286GoodInternational Business Machines CorpInternational Business Machines Corp
USRE44209E10.501Method and system for real-time control of document printingGRANT2013-05-071998-06-1448183395GoodAlearo Properties LLCKioba Processing LLC
EP0089876A10.499Method and device for the protection of software delivered by a supplyer to a userGRANT1983-09-281982-03-189272137GoodBull SABull SA
US7039806B10.498Method and apparatus for packaging and transmitting dataGRANT2006-05-021999-10-0136216244GoodInfraworks CorpGigamedia Access Corp, GigaTrust Corp
US4932054A0.497Method and apparatus for protecting computer software utilizing coded filter network in conjunction with an active coded hardware deviceGRANT1990-06-051988-09-1622927779GoodSafeNet IncSafeNet Inc
EP0732657A10.497Method and apparatus for enciphering and deciphering informationGRANT1996-09-181995-03-148219069GoodUtimaco Safeware AGUtimaco Safeware AG
US7191219B20.497Self-destructing document and e-mail messaging systemGRANT2007-03-131997-06-1721962098GoodClarios CorpHanger Solutions LLC
US7024696B10.497Method and system for prevention of piracy of a given software application via a communications networkGRANT2006-04-042000-06-1436102181GoodUniloc 2017 LLCUniloc 2017 LLC
US4905277A0.497Method for enciphering and deciphering instructions in a microcomputer  and a microcomputer used for effecting sameGRANT1990-02-271981-12-2916643716GoodFujitsu LtdFujitsu Ltd
US5742682A0.496Method of manufacturing secure boxes in a key management systemGRANT1998-04-211995-03-3127022777GoodPitney Bowes IncPitney Bowes Inc
US6526511B10.496Apparatus and method for modifying microprocessor system at random and maintaining equivalent functionality in spite of modification  and the same microprocessor systemGRANT2003-02-251997-12-2527549972GoodNippon Telegraph and Telephone CorpNippon Telegraph and Telephone Corp
US7017189B10.495System and method for activating a rendering device in a multi-level rights-management architectureGRANT2006-03-212000-06-2724420122GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6981262B10.495System and method for client interaction in a multi-level rights-management architectureGRANT2005-12-272000-06-2724420395GoodMicrosoft CorpMicrosoft Technology Licensing LLC
EP0598587A10.493File locking based on disk locationGRANT1994-05-251992-11-1325523818GoodHP IncHP Inc
US5844497A0.493Apparatus and method for providing an authentication systemGRANT1998-12-011996-11-0724992433GoodLitronic IncImprivata Inc
US8595502B20.492Data management systemGRANT2013-11-261995-09-2937525420GoodIntarsia Software LLCPiracy Protection LLC
US5689561A0.492Computer-based trading card system and methodGRANT1997-11-181995-10-0624154472Good
US4332009A0.491Memory protection systemGRANT1982-05-251980-01-2122350532GoodMostek CorpSTMicroelectronics lnc USA
US6389403B10.491Method and apparatus for uniquely identifying a customer purchase in an electronic distribution systemGRANT2002-05-141998-08-1323571123GoodInternational Business Machines CorpWistron Corp
US6268788B10.491Apparatus and method for providing an authentication system based on biometricsGRANT2001-07-311996-11-0746256089GoodLitronic IncImprivata Inc
US7406603B10.491Data protection systems and methodsGRANT2008-07-291999-08-3139643385GoodIntertrust Technologies CorpIntertrust Technologies Corp
US7110984B10.491Updating usage conditions in lieu of download digital rights management protected contentGRANT2006-09-191998-08-1336974618GoodInternational Business Machines CorpLevel 3 Communications LLC
US4888800A0.491Secure messaging systemsGRANT1989-12-191987-03-0310613228GoodHP IncHP Inc
US5012514A0.490Hard drive security systemGRANT1991-04-301990-06-2624168015GoodSCHRAMKE STEPHEN RSCHRAMKE STEPHEN R
US7958366B20.489Information processing systemGRANT2011-06-071999-03-3013940290GoodSony CorpSony Corp
US8794516B20.489Data storage and access systemsGRANT2014-08-051999-10-2510863339GoodSmartflash LLCSmartflash LLC
US6412071B10.489Method for secure function execution by calling address validationGRANT2002-06-251999-11-1411073475GoodCorekt Security Systems IncMcAfee LLC
US5835597A0.489Software-efficient pseudorandom function and the use thereof for decryptionGRANT1998-11-101993-12-0622588290GoodInternational Business Machines CorpInternational Business Machines Corp
US6009525A0.489Multi-tier electronic software distributionGRANT1999-12-281997-08-2925445362GoodPreview Systems IncSafeNet Data Security Israel Ltd
US6898038B10.488Method and apparatus for disc drive data security using fields in servo wedgesGRANT2005-05-242000-03-1533422545GoodSeagate Technology LLCSeagate Technology LLC
US4442486A0.488Protected programmable apparatusGRANT1984-04-101981-11-2523264914GoodUS Philips CorpPhilips North America LLC
US7213005B20.488Digital content distribution using web broadcasting servicesGRANT2007-05-011999-12-0927038655GoodInternational Business Machines CorpInternational Business Machines Corp
US7657759B20.488Method and system for copy protection of displayed data contentGRANT2010-02-021998-06-1448094375GoodFinjan Software LtdKioba Processing LLC
US5638445A0.487Blind encryptionGRANT1997-06-101995-09-1924112143GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6959288B10.486Digital content preparation systemGRANT2005-10-251998-08-1326872926GoodInternational Business Machines CorpInternational Business Machines Corp
US6785825B20.485Method for securing software to decrease software piracyGRANT2004-08-311998-06-0422223567GoodZ4 Technologies IncZ4 Technologies Inc
USRE39369E10.485Electronic casino gaming system with improved play capacity  authentication and securityGRANT2006-10-311995-06-2946124176GoodInternational Game TechnologyInternational Game Technology
US6061656A0.484Computer-based trading card system and methodGRANT2000-05-091995-10-0646254651Good
US5509074A0.484Method of protecting electronically published materials using cryptographic protocolsGRANT1996-04-161994-01-2722689562GoodAT&T CorpAT&T Corp
US6996720B10.483System and method for accessing protected content in a rights-management architectureGRANT2006-02-071999-12-1727390117GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5892826A0.483Data processor with flexible data encryptionGRANT1999-04-061996-01-3024377047GoodMotorola Solutions IncApple Inc
US6938170B10.482System and method for preventing automated crawler access to web-based data sources using a dynamic data transcoding schemeGRANT2005-08-302000-07-1734860576GoodInternational Business Machines CorpInternational Business Machines Corp
US8016189B20.482Electronic transaction systems and methods thereforGRANT2011-09-131996-12-0425156177GoodOtomaku Properties Ltd LLCCallahan Cellular LLC
US5812666A0.482Cryptographic key management and validation systemGRANT1998-09-221995-03-3127022605GoodPitney Bowes IncPitney Bowes Inc
US5680456A0.482Method of manufacturing generic meters in a key management systemGRANT1997-10-211995-03-3123647355GoodPitney Bowes IncPitney Bowes Inc
US6678833B10.479Protection of boot block data and accurate reporting of boot block contentsGRANT2004-01-132000-06-3024436994GoodIntel CorpIntel Corp
US4471163A0.479Software protection systemGRANT1984-09-111981-10-0523193189GoodDONALD THOMAS CHRISTOPHERCHRONOGUARD LLC, DONALD LYNN DUTY & DONALD THOMAS CLAUDE AS TRUSTEES OF CHRONOGUARD TRUST, DONALD LYNN DUTY AS TRUSTEE OF DUTY TRUST, DONALD SARAH HOLLIS
US5406624A0.478Data processor systemsGRANT1995-04-111992-09-0411063996GoodAlgorithmic Research LtdAlgorithmic Research Ltd
US5940508A0.478Method and apparatus for seamless crypto rekey systemGRANT1999-08-171997-04-0725268229GoodMotorola Solutions IncGeneral Dynamics Mission Systems Inc
US6789197B10.478Apparatus for data copyright management systemGRANT2004-09-071994-10-2732931483GoodMitsubishi CorpPiracy Protection LLC, Xylon LLC
EP0704785A20.476Data copyright management systemGRANT1996-04-031994-09-3027332495GoodMitsubishi CorpMitsubishi Corp
US5982889A0.475Method and apparatus for distributing information productsGRANT1999-11-091997-04-3025296120GoodAchates Reference Publishing IncAchates Reference Publishing Inc
US7302415B10.475Data copyright management systemGRANT2007-11-271994-09-3027617864GoodIntarsia LLCPiracy Protection LLC, Intarsia LLC, Xylon LLC
US6190257B10.475Systems and method for providing security in a video game systemGRANT2001-02-201995-11-2227409442GoodNintendo Co LtdNintendo Co Ltd
EP0600732A20.473Copy protection of software for use in a private branch exchange switchGRANT1994-06-081992-12-0325530895GoodAmerican Telephone and Telegraph Co Inc, AT&T CorpAT&T Corp
US7137012B10.473Storage medium and contents protection method using the storage mediumGRANT2006-11-141999-06-1615896379GoodToshiba Corp, Panasonic CorpToshiba Corp, Panasonic Corp
US6449717B10.473Data copyright management systemGRANT2002-09-101994-09-3027477706GoodMitsubishi CorpPiracy Protection LLC, Xylon LLC
US5465300A0.473Secure communication setup methodGRANT1995-11-071993-12-2722629949GoodMotorola Solutions IncGeneral Dynamics C4 Systems Inc
US7240218B20.473Method of using a mask programmed key to securely configure a field programmable gate arrayGRANT2007-07-032000-02-0827255516GoodAlgotronix LtdAlgotronix Ltd
US6408390B10.472Apparatus for data copyright management systemGRANT2002-06-181994-10-2726546399GoodMitsubishi CorpPiracy Protection LLC, Xylon LLC
US5661803A0.472Method of token verification in a key management systemGRANT1997-08-261995-03-3123643464GoodPitney Bowes IncPitney Bowes Inc
US7062500B10.469Techniques for defining  using and manipulating rights management data structuresGRANT2006-06-131997-02-2536588994GoodIntertrust Technologies CorpIntertrust Technologies Corp
US7644273B10.468Modulation method for minimizing pirating and/or unauthorized copying and/or unauthorized access of/to data on/from data media including compact discs and digital versatile discsGRANT2010-01-051998-05-2022196487GoodRecording Industry Association of AmericaRecording Industry Association of America
US4523271A0.468Software protection method and apparatusGRANT1985-06-111982-06-2223544352Good
US20070288765A10.468Method and Apparatus for Secure Configuration of a Field Programmable Gate ArrayAPPLICATION2007-12-131999-12-2238823321GoodAlgotronix LtdAlgotronix Ltd
US4521853A0.467Secure microprocessor/microcomputer with secured memoryGRANT1985-06-041982-06-3023556933GoodTexas Instruments IncTexas Instruments Inc
US4120030A0.467Computer software security systemGRANT1978-10-101977-03-1125108144GoodKearney and Trecker CorpKearney and Trecker Corp
US6071191A0.467Systems and methods for providing security in a video game systemGRANT2000-06-061995-11-2225308824GoodNintendo Co LtdNintendo Co Ltd
US6188995B10.467Method and apparatus for enforcing software licensesGRANT2001-02-131997-07-2825414796GoodApple Computer IncApple Inc
US6741991B20.466Data management systemGRANT2004-05-251994-09-3027577654GoodMitsubishi CorpPiracy Protection LLC, Xylon LLC
US6185306B10.466Method of secure server control of local media via a trigger through a network for local access of encrypted data on an internet webpageGRANT2001-02-061995-12-0727504875GoodHyperLOCK Tech IncApple Inc
US8005936B20.465Method and system to erase data by overwriting after expiration or other conditionGRANT2011-08-231998-10-0637526640GoodRicoh Co LtdRicoh Co Ltd
US5361359A0.465System and method for controlling the use of a computerGRANT1994-11-011992-08-3125469909GoodTrusted Information Systems IncMcAfee LLC
US5590329A0.464Method and apparatus for detecting memory access errorsGRANT1996-12-311994-02-0422708831GoodNokia of America CorpAT&T Corp, Nokia of America Corp
US5745678A0.464Method and system for the secured distribution of multimedia titlesGRANT1998-04-281994-12-1323394550GoodInternational Business Machines CorpInternational Business Machines Corp
US8176551B10.463Detection of observer programs and countermeasures against observer programsGRANT2012-05-082000-01-2746002228GoodTrapware CorpTrapware Corp
US5615266A0.463Secure communication setup methodGRANT1997-03-251995-07-1323995075GoodMotorola Solutions IncGeneral Dynamics C4 Systems Inc
US4513174A0.462Software security method using partial fabrication of proprietary control word decoders and microinstruction memoriesGRANT1985-04-231981-03-1922926913GoodStandard Microsystems LLCStandard Microsystems LLC
US5027396A0.462Execution protection for floppy disksGRANT1991-06-251990-05-0724072147GoodXerox CorpXerox Corp
USRE41657E10.462Data management systemGRANT2010-09-071994-10-2717399897GoodIntarsia Software LLCPiracy Protection LLC, Xylon LLC
US20060206397A10.461Cryptographic methods  apparatus and systems for storage media electronic right management in closed and connected appliancesAPPLICATION2006-09-141995-02-1336972194GoodIntertrust Technologies CorpIntertrust Technologies Corp
US5860099A0.461Stored program system with protected memory and secure signature extractionGRANT1999-01-121993-05-1222034300GoodUSAR Systems IncUSARSYS ACQUISITION CORP
US7107366B20.459System  method  and computer program product for uninstalling computer softwareGRANT2006-09-121996-06-0724649735GoodMcAfee LLCMcAfee LLC
US7613301B20.459Data storage device and data storage methodGRANT2009-11-031998-07-1616442060GoodSony CorpSony Corp
US7209902B20.458Repository with security class and method for use thereofGRANT2007-04-241994-11-2323351914GoodContentguard Holdings IncContentguard Holdings Inc
US4603381A0.457Use of implant process for programming ROM type processor for encryptionGRANT1986-07-291982-06-3023556940GoodTexas Instruments IncTexas Instruments Inc
US20010029582A10.457Method and system for copy protection of data contentAPPLICATION2001-10-111999-05-1726978657GoodAlchemedia LtdKioba Processing LLC, Alearo Properties LLC
EP0727746A20.457Method and system for encoding and decoding softwareGRANT1996-08-211995-02-1412173265GoodFujitsu LtdFujitsu Ltd
US5664099A0.457Method and apparatus for establishing a protected channel between a user and a computer systemGRANT1997-09-021995-12-2824318169GoodLotus Development CorpInternational Business Machines Corp
US5629980A0.457System for controlling the distribution and use of digital worksGRANT1997-05-131994-11-2323348793GoodXerox CorpContentguard Holdings Inc
US5599231A0.457Security systems and methods for a videographics and authentication game/program fabricating deviceGRANT1997-02-041994-10-3123299955GoodNintendo Co LtdNintendo Co Ltd
US5166886A0.456System to demonstrate and sell computer programsGRANT1992-11-241989-07-3127011914Good
US5638443A0.455System for controlling the distribution and use of composite digital worksGRANT1997-06-101994-11-2323351987GoodXerox CorpContentguard Holdings Inc
US5619576A0.455Variable-key cryptography systemGRANT1997-04-081994-03-1422780869Good
US6408387B10.455Preventing unauthorized updates to a non-volatile memoryGRANT2002-06-181999-01-2222887562GoodIntel CorpIntel Corp
US6891953B10.454Method and system for binding enhanced software features to a personaGRANT2005-05-102000-06-2724420005GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6243468B10.454Software anti-piracy system that adapts to hardware upgradesGRANT2001-06-051998-04-2922095770GoodMicrosoft CorpMicrosoft Corp
US7290288B20.453Method and system for controlling access  by an authentication server  to protected computer resources provided via an internet protocol networkGRANT2007-10-301997-06-1141118015GoodPrism Technologies LLCPrism Technologies LLC
US4926476A0.453Method and apparatus for secure execution of untrusted softwareGRANT1990-05-151989-02-0323181373GoodMotorola Solutions IncGeneral Dynamics C4 Systems Inc
US4238854A0.453Cryptographic file security for single domain networksGRANT1980-12-091977-12-0525326215GoodInternational Business Machines CorpInternational Business Machines Corp
US6850916B10.453Portable electronic charge and authorization devices and methods thereforGRANT2005-02-011998-04-2722988945GoodEsignx CorpCallahan Cellular LLC, Esignx Corp
US6684199B10.452METHOD FOR MINIMIZING PIRATING AND/OR UNAUTHORIZED COPYING AND/OR UNAUTHORIZED ACCESS OF/TO DATA ON/FROM DATA MEDIA INCLUDING COMPACT DISCS AND DIGITAL VERSATILE DISCS  AND SYSTEM AND DATA MEDIA FOR SAMEGRANT2004-01-271998-05-2030117679GoodRecording Industry Association of AmericaRecording Industry Association of America
US6970849B10.451Inter-server communication using request with encrypted parameterGRANT2005-11-291999-12-1727390116GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5351293A0.451System method and apparatus for authenticating an encrypted signalGRANT1994-09-271993-02-0121752371GoodWave Systems CorpCRYPTOLOGICS INTERNATIONAL Inc, Wave Systems Corp
US7171692B10.451Asynchronous communication within a server arrangementGRANT2007-01-302000-06-2737682032GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US4649510A0.450Methods and apparatus for the protection and control of computer programsGRANT1987-03-101982-04-3023473359GoodSCHMIDT WALTER E 8100 BALCONES DRIVE SUITE 254 AUSTIN TEXAS 78759SCHMIDT WALTER E 8100 BALCONES DRIVE SUITE 254 AUSTIN TEXAS 78759
US7548887B10.449Information-signal playback system  information-signal reading apparatus  information-signal processing apparatus  information-signal playback method  information-signal reading method and information-signal processing apparatusGRANT2009-06-161998-07-1516421456GoodSony CorpSony Corp
US5737415A0.449Data management module  data reproduction management device and data reproduction management systemGRANT1998-04-071994-08-1026523081GoodFujitsu LtdFujitsu Ltd
US4918653A0.448Trusted path mechanism for an operating systemGRANT1990-04-171988-01-2822530315GoodInternational Business Machines CorpInternational Business Machines Corp
US5634012A0.448System for controlling the distribution and use of digital works having a fee reporting mechanismGRANT1997-05-271994-11-2323351974GoodXerox CorpContentguard Holdings Inc
US7296163B20.448System and methods for encrypted execution of computer programsGRANT2007-11-132000-02-0826877122GoodDartmouth CollegeDartmouth College
US4590470A0.447User authentication system employing encryption functionsGRANT1986-05-201983-07-1124041033GoodNokia Bell LabsNokia Bell Labs
US7086087B10.447Information processing device  card device and information processing systemGRANT2006-08-011999-06-2416053946GoodHitachi Ltd, Hitachi ULSI Systems Co LtdHitachi Ltd, Hitachi ULSI Systems Co Ltd
US5848435A0.447Address protection circuit and method for preventing access to unauthorized address rangersGRANT1998-12-081990-10-1924403894GoodEMC CorpEMC Corp
EP0005179A20.446Authenticating the identity of a user of an information systemGRANT1979-11-141978-05-0525417234GoodInternational Business Machines CorpInternational Business Machines Corp
US6453304B10.446Digital information recording apparatus for recording digital informationGRANT2002-09-171997-12-1518370771GoodHitachi LtdMaxell Ltd
US5850450A0.446Method and apparatus for encryption key creationGRANT1998-12-151995-07-2027356886GoodDallas Semiconductor CorpDallas Semiconductor Corp
US7707433B20.446Method and system for secure computational outsourcing and disguiseGRANT2010-04-271998-05-1428046896GoodPurdue Research FoundationPurdue Research Foundation
US7063615B20.442Electronic gaming apparatus with authenticationGRANT2006-06-201995-06-2929783401GoodInternational Game TechnologyInternational Game Technology
US4555591A0.441Integrated circuit devices for secure data encryptionGRANT1985-11-261982-09-0723646679GoodNokia Bell LabsNokia Bell Labs
US8510226B20.440Method for synchronous encryption between a client and a licensing agentGRANT2013-08-131996-02-2622436337GoodGraphOn CorpGraphOn Corp
US6064738A0.439Method for encrypting and decrypting data using chaotic mapsGRANT2000-05-161996-12-1025068213GoodResearch Foundation of State University of New YorkResearch Foundation of State University of New York
US7073197B20.438Methods and apparatus for protecting informationGRANT2006-07-041999-05-0523181353GoodShieldIP IncRPX Corp
US7797372B20.438Serving software applications from servers for client computersGRANT2010-09-142000-03-1746277625GoodSoftricity IncMicrosoft Technology Licensing LLC
US4238853A0.438Cryptographic communication security for single domain networksGRANT1980-12-091977-12-0525326211GoodInternational Business Machines CorpInternational Business Machines Corp
US6202176B10.437Method of monitoring the correct execution of software programsGRANT2001-03-131997-01-157817440GoodInfineon Technologies AGInfineon Technologies AG, Siemens AG
US4249180A0.436Past dependent microcomputer cipher apparatusGRANT1981-02-031978-09-2025480218GoodNorthern Telecom LtdNortel Networks Ltd
US7158953B10.436Method and system for limiting the use of user-specific software featuresGRANT2007-01-022000-06-2724418707GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5745570A0.436Object-oriented programming environment that provides object encapsulation via encryptionGRANT1998-04-281996-04-1524534955GoodInternational Business Machines CorpInternational Business Machines Corp
US5920861A0.435Techniques for defining using and manipulating rights management data structuresGRANT1999-07-061997-02-2525192553GoodIntertrust Technologies CorpIntertrust Technologies Corp
US20010009580A10.435Information encryption device and encryption methodAPPLICATION2001-07-262000-01-2618548174GoodNEC CorpNEC Corp
EP0601500A10.435Transformation of distributed dataGRANT1994-06-151992-12-0425532087GoodTestDrive CorpTestDrive Corp
US5953416A0.434Data processing apparatusGRANT1999-09-141996-11-1217888089GoodFujitsu LtdFujitsu Ltd
US20010032312A10.434System and method for secure electronic digital rights management  secure transaction management and content distributionAPPLICATION2001-10-182000-03-0626882622GoodPLAYMEDIA SYSTEMS IncPLAYMEDIA SYSTEMS Inc
US5287407A0.433Computer software protectionGRANT1994-02-151990-05-318205437GoodInternational Business Machines CorpInternational Business Machines Corp
US6523067B20.432System and method for using internet based caller ID for controlling access to an object stored in a computerGRANT2003-02-181999-01-1922879686GoodIntel CorpIntel Corp
US7392225B20.431Revocation information updating method  revocation information updating apparatus and storage mediumGRANT2008-06-241999-11-0823730835GoodToshiba Corp, Panasonic CorpToshiba Corp, Panasonic Corp
US6760438B10.430System and method for Viterbi decoding on encrypted dataGRANT2004-07-061999-07-0132594862GoodNortel Networks LtdMicrosoft Technology Licensing LLC
US6516064B10.430Signal recording apparatus  signal record medium and signal reproducing apparatusGRANT2003-02-041995-07-2516239195GoodSony CorpSony Corp
US4850017A0.429Controlled use of cryptographic keys via generating station established control valuesGRANT1989-07-181987-05-2921998271GoodInternational Business Machines CorpInternational Business Machines Corp
US4965804A0.429Key management for encrypted packet based networksGRANT1990-10-231989-02-0323181824GoodRacal Data Communications IncRACAL-GUARDATA Inc
US5155827A0.428Method for inhibiting an executable program in a disk operating system by replacing the program with an unexecutable programGRANT1992-10-131989-03-1723267252Good
US6446210B10.428Method for securing communication by selecting an encoding process using a first computer based upon ability of a second computer and deleting the process thereafterGRANT2002-09-031996-12-0426708297GoodActivCard Ireland LtdActivCard Ireland Ltd
US7493486B10.428Method and apparatus for supporting cryptographic-related activities in a public key infrastructureGRANT2009-02-172000-06-0940349417GoodVerizon Laboratories IncVerizon Patent and Licensing Inc
EP0617383A20.428Data storage deviceGRANT1994-09-281993-03-2010732455GoodMotorola Solutions IncMotorola Solutions Inc
US5412718A0.427Method for utilizing medium nonuniformities to minimize unauthorized duplication of digital informationGRANT1995-05-021993-09-1322393608GoodInstitute of Systems ScienceKent Ridge Digital Labs, Institute of Systems Science
US5870474A0.426Method and apparatus for providing conditional access in connection-oriented  interactive networks with a multiplicity of service providersGRANT1999-02-091995-12-0426677571GoodScientific Atlanta LLCCisco Technology Inc
US5247577A0.426Methods and apparatus for securely enabling features in highly integrated electronic circuitsGRANT1993-09-211992-05-1325380269GoodIntel CorpIntel Corp
US5600818A0.425Data protective microprocessor circuit for portable data carriers  for example credit cardsGRANT1997-02-041991-05-086431312GoodGesellschaft fur Automation und Organisation mbH GAOGesellschaft fur Automation und Organisation mbH GAO
US5237616A0.425Secure computer system having privileged and unprivileged memoriesGRANT1993-08-171992-09-2125486922GoodInternational Business Machines CorpInternational Business Machines Corp
US5243654A0.424METERING SYSTEM WITH REMOTELY RESETTABLE TIME LOCKOUTGRANT1993-09-071991-03-1824691951GoodPitney Bowes IncPitney Bowes Inc
US5056009A0.424IC memory card incorporating software copy protectionGRANT1991-10-081988-08-0316295055GoodMitsubishi Electric CorpMitsubishi Electric Corp
US4408093A0.423Cryptographic encoder-decoderGRANT1983-10-041981-06-0523032397GoodITT Industries IncITT Corp
US7143290B10.423Trusted and secure techniques  systems and methods for item delivery and executionGRANT2006-11-281995-02-1334841925GoodIntertrust Technologies CorpIntertrust Technologies Corp
US7505945B20.423Electronic negotiable documentsGRANT2009-03-171995-02-0827267581GoodCryptomathic ASCryptomathic AS
US6205550B10.422Tamper resistant methods and apparatusGRANT2001-03-201996-06-1325450647GoodIntel CorpIntel Corp
US6839842B10.421Method and apparatus for authenticating informationGRANT2005-01-041996-12-2733541701GoodIntel CorpIntel Corp
US5966441A0.420Method and apparatus for creating a secure autonomous network entity of a network component systemGRANT1999-10-121996-11-1825021468GoodApple Computer IncApple Inc
US5442699A0.418Searching for patterns in encrypted dataGRANT1995-08-151994-11-2123342182GoodInternational Business Machines CorpTrend Micro Inc
US7312845B20.416Method of capturing and processing sensed imagesGRANT2007-12-251997-07-1225446806GoodSilverbrook Research Pty LtdGoogle LLC
US20010034838A10.416Control program  device including the control program  method for creating the control program  and method for operating the control programAPPLICATION2001-10-252000-01-1418534161GoodPanasonic CorpPanasonic Corp
US7747154B20.416Method of capturing and processing sensed imagesGRANT2010-06-291997-07-1525446807GoodSilverbrook Research Pty LtdSilverbrook Research Pty Ltd
US4183085A0.416Protection of data processing system against unauthorized programsGRANT1980-01-081976-11-1810447723GoodInternational Business Machines CorpInternational Business Machines Corp
US3806882A0.414SECURITY FOR COMPUTER SYSTEMSGRANT1974-04-231971-11-2210470162Good
US8270603B10.414Authentication method and systemGRANT2012-09-182000-05-2437633536GoodTracer Detection Technology CorpCoPilot Ventures Fund III LLC
US8099758B20.413Policy based composite file system and methodGRANT2012-01-171999-05-1237420699GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US4386234A0.412Cryptographic communication and file security using terminalsGRANT1983-05-311977-12-0525326213GoodInternational Business Machines CorpInternational Business Machines Corp
US5434999A0.411Safeguarded remote loading of service programs by authorizing loading in protected memory zones in a terminalGRANT1995-07-181988-11-0926226976GoodBull CP8CP8 Technologies
US6076165A0.411Method for authenticating digital recording devicesGRANT2000-06-131998-01-1621732513GoodSony Corp, Sony Electronics IncSony Corp, Sony Music Entertainment Inc, Sony Electronics Inc
US4868736A0.410Code operated access control system for electronic data storeGRANT1989-09-191986-08-1610602814GoodRUNTIME INNOVATIONS LtdMODRAY Ltd 102 KELVIN CAMPUS WEST OF SCOTLAND SCIENCE PARK GLASGOW G20 0SP SCOTLAND, MODRAY Ltd 102 KELVIN CAMPUS WEST OF SCOTLAND SCIENCE PARK GLASGOW G20 OSP, RUNTIME INNOVATIONS Ltd 102 KELVIN CAMPUS WEST OF SCOTLAND SCIENCE PARK GLASGOW G20 OSP, RUNTIME INNOVATIONS Ltd
US5033084A0.410Method and apparatus for protection of software in an electronic systemGRANT1991-07-161990-04-0224001094GoodData I O CorpLeannoux Properties AG LLC
US7159244B20.409Audio data playback management system and method with editing apparatus and recording mediumGRANT2007-01-022000-03-0927061003GoodPanasonic CorpPanasonic Corp
US5515540A0.407Microprocessor with single pin for memory wipeGRANT1996-05-071990-08-2724292593GoodDallas Semiconductor CorpMaxim Integrated Products Inc
US9363083B10.406Authentication method and systemGRANT2016-06-072000-05-2436942143GoodCoPilot Ventures Fund III LLCCoPilot Ventures Fund III LLC
US4799635A0.406System for determining authenticity of an external memory used in an information processing apparatusGRANT1989-01-241985-06-2426471684GoodNintendo Co LtdNintendo Co Ltd
US4227253A0.404Cryptographic communication security for multiple domain networksGRANT1980-10-071977-12-0525326207GoodInternational Business Machines CorpInternational Business Machines Corp
US4168396A0.404Microprocessor for executing enciphered programsGRANT1979-09-181977-10-3125298493GoodDallas Semiconductor CorpDallas Semiconductor Corp
US20060265337A10.403AUTOMATED SYSTEM FOR MANAGEMENT OF LICENSED DIGITAL ASSETSAPPLICATION2006-11-231996-02-2637449503GoodGraphOn CorpGraphOn Corp
US4807288A0.403Microprocessor intended particularly for executing the calculation algorithms of a public code encoding systemGRANT1989-02-211982-11-309279650GoodBull SA, Francais Ministre des PTT, Telediffusion de France ets Public de DiffusionETAT FRANCAIS REPRESENTE PAR LE MINISTRE DES P T T (C N E T), Francais Ministre des PTT, Telediffusion de France ets Public de Diffusion, Bull SA
EP0613073A10.401Licence management mechanism for a computer systemGRANT1994-08-311993-02-2310730878GoodFujitsu Services LtdFujitsu Services Ltd
US7324975B10.401Method for managing commands in several application files and microchip card for implementing said methodGRANT2008-01-291999-04-299545024GoodAxalto SAThales DIS France SA
US5835601A0.400File editing system and shared file editing system with file content secrecy  file version management  and asynchronous editingGRANT1998-11-101994-03-1527291911GoodToshiba CorpToshiba Corp
EP0660215A20.400Protected programmable memory cartridge for a computer systemGRANT1995-06-281993-12-1622612467GoodInternational Business Machines CorpInternational Business Machines Corp
US5235642A0.399Access control subsystem and method for distributed computer system using locally cached authentication credentialsGRANT1993-08-101992-07-2125439287GoodDigital Equipment CorpGoogle LLC
US7503072B20.398Hardware ID to prevent software piracyGRANT2009-03-101998-04-2931996463GoodMicrosoft CorpMicrosoft Corp
US8936196B20.398Camera unit incorporating program script scannerGRANT2015-01-201997-07-1536144289GoodGoogle LLCGoogle LLC
US6178509B10.398Tamper resistant methods and apparatusGRANT2001-01-231996-06-1325449804GoodIntel CorpIntel Corp
US5557518A0.397Trusted agents for open electronic commerceGRANT1996-09-171994-04-2822881494GoodCitibank NACitibank NA
US5943422A0.396Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channelsGRANT1999-08-241996-08-1224769169GoodIntertrust Technologies CorpIntertrust Technologies Corp
US6226747B10.396Method for preventing software piracy during installation from a read only storage mediumGRANT2001-05-011998-04-1022019882GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6564253B10.396Content authorization system over networks including searching and reporting for unauthorized content locationsGRANT2003-05-131999-05-0723186684GoodRecording Industry Association of AmericaRecording Industry Association of America
US7711795B20.396System  method and article of manufacture for remote control and navigation of local contentGRANT2010-05-042000-01-2023984467GoodSonic Solutions LLCRovi Technologies Corp
US6834346B10.395Content processing systemGRANT2004-12-211998-07-3016678626GoodSony CorpSony Corp
US7415712B20.394Heavyweight and lightweight instrumentationGRANT2008-08-191998-10-0227580995GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US6088797A0.391Tamper-proof electronic processing deviceGRANT2000-07-111994-04-2827398571GoodCitibank NACitibank NA
US6374278B10.389Method and apparatus for the generation of statistically random numbersGRANT2002-04-161999-03-2523056373GoodIntel CorpMicron Technology Inc
US7028187B10.388Electronic transaction apparatus for electronic commerceGRANT2006-04-111991-11-1527574268GoodCitibank NACitibank NA
US4462076A0.386Video game cartridge recognition and security systemGRANT1984-07-241982-06-0423519235GoodSMITH ENGRSMITH ENGINEERING A SOLE PROPRIETORSHIP, SMITH ENGR
US5313521A0.386Key distribution protocol for file transfer in the local area networkGRANT1994-05-171992-04-1525351939GoodFujitsu LtdFujitsu Ltd
US6175925B10.384Tamper resistant player for scrambled contentsGRANT2001-01-161996-06-1325449807GoodIntel CorpIntel Corp
US7644439B20.384Timing attacks against user logon and network I/OGRANT2010-01-051999-05-0334192877GoodCisco Technology IncCisco Technology Inc
EP0449256A20.383Microcontroller having security meansGRANT1991-10-021990-03-2713634250GoodToshiba Corp, Toshiba Microelectronics CorpToshiba Corp, Toshiba Microelectronics Corp
US7797539B20.383Resilient cryptographic schemeGRANT2010-09-141999-01-204163209GoodCerticom CorpBlackBerry Ltd
US6173391B10.381Bossless architecture and digital cell technology for computer programsGRANT2001-01-091995-04-0727310898GoodSofmap Future Design Co LtdSofmap Future Design Co Ltd
US7444563B20.381Multilevel semiconductor memory  write/read method thereto/therefrom and storage medium storing write/read programGRANT2008-10-281996-09-1834119504GoodPegre Semiconductors LLCIntellectual Ventures I LLC
US7515712B20.380Mechanism and apparatus for encapsulation of entitlement authorization in conditional access systemGRANT2009-04-071997-08-0146304205GoodCisco Technology IncCisco Technology Inc
US5153921A0.380MicrocomputerGRANT1992-10-061990-10-0917497524GoodMitsubishi Electric CorpMitsubishi Electric Corp
US4598170A0.379Secure microprocessorGRANT1986-07-011984-05-1724449515GoodMotorola Solutions IncGeneral Dynamics Decision Systems Inc
US5230052A0.379APPARATUS AND METHOD FOR LOADING BIOS INTO A COMPUTER SYSTEM FROM A REMOTE STORAGE LOCATIONGRANT1993-07-201990-10-0124363539GoodInternational Business Machines CorpLenovo Singapore Pte Ltd
US20020013907A10.379Method of preventing stack manipulation attacks during function callsAPPLICATION2002-01-311998-10-097884002GoodSiemens AG, International Business Machines CorpSiemens AG, International Business Machines Corp
US6499035B10.376Licensing java objectsGRANT2002-12-241998-07-1522361358GoodMicrosoft CorpZhigu Holdings Ltd
US5963642A0.376Method and apparatus for secure storage of dataGRANT1999-10-051996-12-3025110198GoodLONG CORNER SECURITY LLCLONG CORNER SECURITY LLC
US4716586A0.374State sequence dependent read only memoryGRANT1987-12-291983-12-0727071973GoodAmerican Microsystems Holding CorpAmi Semiconductor Inc
US6971027B10.374Computer security systemGRANT2005-11-291999-04-0135405416GoodCOMPROTECT IncHanger Solutions LLC
US5625692A0.373Method and system for a public key cryptosystem having proactive  robust  and recoverable distributed threshold secret sharingGRANT1997-04-291995-01-2323485585GoodInternational Business Machines CorpInternational Business Machines Corp
US6941383B10.373System  method and article of manufacture for java/javascript component in a multimedia synchronization frameworkGRANT2005-09-062000-01-2034885886GoodInteractual Technologies IncRovi Technologies Corp
US5014311A0.371Integrated circuit with an access-controlled data memoryGRANT1991-05-071985-07-036274882GoodSiemens AGSiemens AG
US6397332B20.367Verification data generating apparatus  data verification apparatus and storage medium for storing verification data generating programGRANT2002-05-281997-07-1816309700GoodFuji Xerox Co LtdFuji Xerox Co Ltd
US5710814A0.366Cryptographic unit touch point logicGRANT1998-01-201996-07-2324750687GoodCheyenne Property TrustCheyenne Property Trust
US6769130B10.366System  method and article of manufacture for late synchronization during the execution of a multimedia event on a plurality of client computersGRANT2004-07-272000-01-2032713728GoodInteractual Technologies IncRovi Technologies Corp
US6870546B10.364Protectable expressions in objects having authorable behaviors and appearancesGRANT2005-03-221998-06-0134280139GoodAutodesk IncAutodesk Inc
US4591660A0.364Common control audio decryptorGRANT1986-05-271983-10-2524175928GoodNokia Bell LabsNokia Bell Labs
US6587948B10.360Recording apparatus  recording medium  playback apparatus  recording method and playback methodGRANT2003-07-011998-02-1312317657GoodSony CorpSony Corp
US4040034A0.358DATA SECURITY SYSTEM EMPLOYING AUTOMATIC TIME STAMPING MECHANISMGRANT1977-08-021975-12-0424556172GoodInternational Business Machines CorpInternational Business Machines Corp
US6070154A0.357Internet credit card securityGRANT2000-05-301998-11-2722742904GoodActive Point LtdActive Point Ltd
US5220606A0.357Cryptographic system and methodGRANT1993-06-151992-02-1025263087Good
US20020072830A10.357Dynamic classification of sections of softwareAPPLICATION2002-06-131998-10-0226799767GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US7617124B10.357Apparatus and method for secure downloading of filesGRANT2009-11-101998-12-0441261604GoodDigital River IncDigital River Inc
US5559889A0.357System and methods for data encryption using public key cryptographyGRANT1996-09-241995-03-3123643258GoodInternational Business Machines CorpRPX Corp
US5845128A0.355Automatically preserving application customizations during installation of a new software releaseGRANT1998-12-011996-02-2024414218GoodOracle CorpOracle International Corp
US6307940B10.355Communication network for encrypting/deciphering communication text while updating encryption key  a communication terminal thereof  and a communication method thereofGRANT2001-10-231997-06-2526492308GoodCanon IncCanon Inc
US5812669A0.354Method and system for providing secure EDI over an open networkGRANT1998-09-221995-07-1924004363GoodPREMINOS CorpCLASSIFIELD INFORMATION Inc, HARBINGER
US7343495B20.353Information recording apparatus  information reproducing apparatus  and information distribution systemGRANT2008-03-111997-05-1326352996GoodToshiba CorpToshiba Corp
US7177845B20.353Copy detection for digitally-formatted worksGRANT2007-02-131999-11-2934192979GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US4195200A0.352Key controlled block-cipher cryptographic system employing a multidirectional shift matrixGRANT1980-03-251976-06-3024815912GoodInternational Business Machines CorpInternational Business Machines Corp
US4123747A0.351Identity verification method and apparatusGRANT1978-10-311977-05-2025174925GoodInternational Business Machines CorpInternational Business Machines Corp
US6247131B10.350Information management method and recording mediumGRANT2001-06-121997-03-1413174868GoodFujitsu LtdFujitsu Ltd
US7281136B20.348LSI design method and verification methodGRANT2007-10-092000-02-1418558895GoodPanasonic CorpSocionext Inc
US5802342A0.347Image creating device loadable with external memory medium capable of storing an image creating program and created image dataGRANT1998-09-011992-10-1326524233GoodKonami Holdings CorpKonami Digital Entertainment Co Ltd
US4550350A0.341Secure copy method and device for stored programsGRANT1985-10-291983-07-1924050082GoodSoftware Distribution Newtork IncSOFTWARE DISTRIBUTION NETWORK Inc, Software Distribution Newtork Inc
US6195766B10.339System and method for providing soft audio and soft modem copy protection for hardware interfaces and software codeGRANT2001-02-271999-05-1023197157GoodLakestar Semi IncSynaptics Inc
US4945468A0.338Trusted path mechanism for virtual terminal environmentsGRANT1990-07-311988-02-0122536754GoodInternational Business Machines CorpInternational Business Machines Corp
EP0062438A20.337Microcomputer having memory content protecting meansGRANT1982-10-131981-03-3012724545GoodFujitsu LtdFujitsu Ltd
US5774652A0.336Restricted access computer systemGRANT1998-06-301995-09-2927357662GoodPUBLIC ACCESS TECHNOLOGYCOM IncPUBLIC ACCESS TECHNOLOGYCOM Inc
US20040098584A10.334Method and system for embedded  automated  component-level control of computer systems and other complex systemsAPPLICATION2004-05-201998-03-2532303364GoodSoftvault Systems IncSoftvault Systems Inc, SOFTVAULT SYSEMS Inc
US5261003A0.334Data communication system and method with data scramblingGRANT1993-11-091991-06-1315303033GoodMitsubishi Electric CorpMitsubishi Electric Corp
US5530751A0.334Embedded hidden identification codes in digital objectsGRANT1996-06-251994-06-3023028731GoodHP IncHewlett Packard Development Co LP
US7134137B20.332Providing data to applications from an access systemGRANT2006-11-072000-07-1026911482GoodOracle International CorpOracle International Corp
US5812663A0.332Data reproducing deviceGRANT1998-09-221994-12-2918342954GoodFujitsu LtdFujitsu Ltd
US6128741A0.332Compact transparent dongle deviceGRANT2000-10-031998-03-0521881174GoodRainbow Technologies IncSafeNet Inc
US5623545A0.330Automatic data generation for self-test of cryptographic hash algorithms in personal security devicesGRANT1997-04-221995-08-3124078187GoodNational Semiconductor CorpNational Semiconductor Corp
US5812762A0.330Personal computer having card read/write controllerGRANT1998-09-221995-03-3119411357GoodSamsung Electronics Co LtdSamsung Electronics Co Ltd
US6788787B10.330Pseudorandom number generator  stream encryption method  and stream encrypting communication methodGRANT2004-09-071999-02-2526389303GoodYazaki CorpYazaki Corp
US6289448B10.328Method  apparatus and computer program product for debugging a computer's boot processGRANT2001-09-111998-06-2622306677GoodSun Microsystems IncOracle America Inc
US20030044017A10.328Data distributionAPPLICATION2003-03-061999-07-238241539GoodBritish Telecommunications PLCBritish Telecommunications PLC
US5511123A0.325Symmetric cryptographic system for data encryptionGRANT1996-04-231994-08-0423095266GoodNorthern Telecom LtdEntrust Ltd
US5532920A0.323Data processing system and method to enforce payment of royalties when copying softcopy booksGRANT1996-07-021992-04-2925366608GoodInternational Business Machines CorpInternational Business Machines Corp
US6157966A0.323System and method for an ISO7816 complaint smart card to become master over a terminalGRANT2000-12-051997-06-3026729305GoodSchlumberger Malco IncAxalto Inc
US4010451A0.323DATA STRUCTURE PROCESSORGRANT1977-03-011972-10-0327259890GoodNational Research Development Corp UKNational Research Development Corp UK
US7133846B10.322Digital certificate support system  methods and techniques for secure electronic commerce transaction and rights managementGRANT2006-11-071995-02-1337036736GoodIntertrust Technologies CorpIntertrust Technologies Corp
US6658568B10.322Trusted infrastructure support system  methods and techniques for secure electronic commerce transaction and rights managementGRANT2003-12-021995-02-1332601076GoodIntertrust Technologies CorpIntertrust Technologies Corp
US7165174B10.321Trusted infrastructure support systems  methods and techniques for secure electronic commerce transaction and rights managementGRANT2007-01-161995-02-1337648853GoodIntertrust Technologies CorpIntertrust Technologies Corp
US3798359A0.320BLOCK CIPHER CRYPTOGRAPHIC SYSTEMGRANT1974-03-191971-06-3022567775GoodInternational Business Machines CorpInternational Business Machines Corp
US5832083A0.320Method and device for utilizing data contentGRANT1998-11-031994-09-0917239942GoodFujitsu LtdFujitsu Ltd
US7343414B20.320System and method for distributing media assets to user devices and managing user rights of the media assetsGRANT2008-03-111999-10-0527574995GoodZapMedia Services IncNim Sar, ZapMedia Services Inc
USRE30957E0.319Variant key matrix cipher systemGRANT1982-06-011973-10-1526860525GoodInternational Business Machines CorpInternational Business Machines Corp
EP0595288A10.317Security circuit for protecting data stored in memoryGRANT1994-05-041992-10-2726540228GoodToshiba Corp, Toshiba Microelectronics CorpToshiba Corp, Toshiba Microelectronics Corp
US6728773B10.315System for controlling and regulating distribution of intellectual properties using internet protocol frameworkGRANT2004-04-272000-05-1032108353GoodCisco Technology IncCisco Technology Inc
US20020196938A10.315Method and apparatus for reproducing ciphered dataAPPLICATION2002-12-261995-06-3026490981GoodSony CorpSony Corp
US3996449A0.315Operating system authenticatorGRANT1976-12-071975-08-2524432146GoodInternational Business Machines CorpInternational Business Machines Corp
EP1093056A10.315Data processor having data processing unit incorporating scramble and descramble meansGRANT2001-04-181999-10-1317762415GoodNEC CorpNEC Electronics Corp
US3798605A0.311CENTRALIZED VERIFICATION SYSTEMGRANT1974-03-191971-06-3022566995GoodInternational Business Machines CorpInternational Business Machines Corp
US6112181A0.305Systems and methods for matching  selecting  narrowcasting  and/or classifying based on rights management and/or other informationGRANT2000-08-291997-11-0625509597GoodIntertrust Technologies CorpIntertrust Technologies Corp
US5943283A0.303Address scrambling in a semiconductor memoryGRANT1999-08-241997-12-0525532189GoodINVOX TechnologySanDisk Technologies LLC
US6115820A0.302Determining theft of grammar codeGRANT2000-09-051998-06-0122211955GoodInternational Business Machines CorpInternational Business Machines Corp
US7496198B20.301Partial dual encrypted stream utilizing program map tablesGRANT2009-02-241995-04-0333568640GoodCisco Technology IncCisco Technology Inc
US7225159B20.300Method for authenticating and securing integrated bookstore entriesGRANT2007-05-292000-06-3026909938GoodMicrosoft CorpMicrosoft Technology Licensing LLC
EP1172731A20.297Data processing apparatus and integrated circuitGRANT2002-01-162000-07-1318708672GoodFujitsu LtdFujitsu Ltd
US7080258B20.297IC  IC-mounted electronic device  debugging method and IC debuggerGRANT2006-07-182000-06-3018697312GoodFujitsu LtdFujitsu Ltd
US4719566A0.297Method for entrapping unauthorized computer accessGRANT1988-01-121985-10-2325151144GoodInternational Business Machines CorpInternational Business Machines Corp
EP0751516A20.293Recording and reproduction of data and provision and collection of informationGRANT1997-01-021995-06-3026490936GoodSony CorpSony Corp
USRE44131E10.292Storage device having function for coping with computer virusGRANT2013-04-021995-06-0215172729GoodFujitsu LtdRPX Corp
US5590193A0.292Method to secure the operations for accessing detachable cards for computersGRANT1996-12-311994-05-059462933GoodGemplus Card International SAThales DIS France SA
US6766456B10.291Method and system for authenticating a user of a computer systemGRANT2004-07-202000-02-2332682653GoodMicron Technology IncMicron Technology Inc
US8823823B20.291Portable imaging device with multi-core processor and orientation sensorGRANT2014-09-021997-07-1534423662GoodGoogle LLCGoogle LLC
US6957348B10.288Interoperability of vulnerability and intrusion detection systemsGRANT2005-10-182000-01-1035066308GoodNcircle Network Security IncTripwire Inc
EP0722154A20.285Method for selling data sets| vending machine  storing device and chipcard used therefor and system for selling telecommunication software therewithGRANT1996-07-171994-12-226536620GoodAlcatel SEL AG, Alcatel Lucent NVAlcatel SEL AG, Alcatel SA
US7224798B20.281Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay systemGRANT2007-05-291995-04-0333568005GoodScientific Atlanta LLCCisco Technology Inc
US3958081A0.274Block cipher system for data securityGRANT1976-05-181975-02-2424206358GoodInternational Business Machines CorpInternational Business Machines Corp
US4004089A0.274Programmable cryptic device for enciphering and deciphering dataGRANT1977-01-181975-02-2824211461GoodNCR CorpNCR Corp
US6282291B10.273Method and apparatus for encrypting input bit sequenceGRANT2001-08-281997-03-1313114524GoodInternational Business Machines CorpInternational Business Machines Corp
US6122625A0.272Apparatus and method for secure transactingGRANT2000-09-191991-11-1525161747GoodCitibank NACitibank NA
EP0135888A20.271Process for preventing the execution of a programme in a computer which is not allowed to execute said programmeGRANT1985-04-031983-09-296210472GoodSiemens AGSiemens AG
US4405829A0.270Cryptographic communications system and methodGRANT1983-09-201977-12-1425333547GoodMassachusetts Institute of TechnologyMassachusetts Institute of Technology
US20050132233A10.267Digital rights frameworkAPPLICATION2005-06-162000-05-1046303738GoodCisco Technology IncCisco Technology Inc
US7634429B20.267Architecture for an electronic shopping service integratable with a software applicationGRANT2009-12-152000-06-3026910084GoodMicrosoft CorpMicrosoft Technology Licensing LLC
US5349249A0.261Programmable logic device having security elements located amongst configuration bit location to prevent unauthorized readingGRANT1994-09-201993-04-0721929383GoodXilinx IncXilinx Inc
US4949298A0.260Memory cartridge having a multi-memory controller with memory bank switching capabilities and data processing apparatusGRANT1990-08-141986-11-1917585010GoodNintendo Co LtdNintendo Co Ltd
US5325433A0.260Encryption communication systemGRANT1994-06-281992-04-0213733627GoodFujitsu LtdFujitsu Ltd
US3962539A0.255Product block cipher system for data securityGRANT1976-06-081975-02-2424206352GoodInternational Business Machines CorpInternational Business Machines Corp
US5495531A0.255Equipment which included electronicsGRANT1996-02-271992-07-2125581911GoodSon Holdings Ltd of c o Celtic Trust Co LtdXYTING Corp
US5185717A0.255Tamper resistant module having logical elements arranged in multiple layers on the outer surface of a substrate to protect stored informationGRANT1993-02-091988-08-0527327152Good
US4865321A0.244Memory cartridge and information processor unit using such cartridgeGRANT1989-09-121985-10-0416778678GoodNintendo Co LtdNintendo Co Ltd
US6591229B10.241Metrology device with programmable smart cardGRANT2003-07-081998-10-0922615500GoodSchlumberger SASchlumberger SA, Axalto Inc
USRE34161E0.238Memory cartridge and information processor unit using such cartridgeGRANT1993-01-121985-10-0427566608GoodNintendo Co LtdNintendo Co Ltd
US6947559B20.237Random number generator based on turbulent convectionGRANT2005-09-202000-02-1826879130GoodKent State UniversityKent State University
US7068786B10.234Dual use block/stream cipherGRANT2006-06-271999-08-2936600564GoodIntel CorpIntel Corp
US20060117344A10.234Presentation of media contentAPPLICATION2006-06-011999-04-2127586898GoodInteractual Technologies IncRovi Technologies Corp
US6912284B10.233Self-Authenticating cryptographic apparatusGRANT2005-06-281983-06-1334676566GoodNational Security AgencyNational Security Agency
US6920221B10.232Method and apparatus for protected exchange of status and secret values between a video source application and a video hardware interfaceGRANT2005-07-191999-08-2934742755GoodIntel CorpIntel Corp
US5226136A0.225Memory cartridge bank selecting apparatusGRANT1993-07-061986-05-0627469192GoodNintendo Co LtdNintendo Co Ltd
US20020194130A10.222NETWORK SYSTEM  DATA DISTRIBUTION METHOD AND RECORDING MEDIUM ON WHICH DISTRIBUTION USE DATA IS RECORDED AND WHICH CAN BE READ BY COMPUTERAPPLICATION2002-12-191997-09-2217305789GoodData Cake Baker CorpData Cake Baker Corp, MAEGAWA KAZUYOSHI
US4525777A0.222Split-cycle cache system with SCU controlled cache clearing during cache store access periodGRANT1985-06-251981-08-0323112533GoodBull HN Information Systems IncBull HN Information Systems Inc
US5351297A0.221Method of privacy communication using elliptic curvesGRANT1994-09-271991-06-2826485405GoodPanasonic CorpPanasonic Corp
US5095525A0.216Memory transformation apparatus and methodGRANT1992-03-101989-06-2623462778GoodRockwell International CorpNXP BV
US4926372A0.213Memory cartridge bank selectingGRANT1990-05-151986-05-0614373685GoodNintendo Co LtdNintendo Co Ltd
US5488664A0.209Method and apparatus for protecting visual information with printed cryptographic watermarksGRANT1996-01-301994-04-2222871218GoodYeda Research and Development Co LtdYeda Research and Development Co Ltd
US5272755A0.208Public key cryptosystem with an elliptic curveGRANT1993-12-211991-06-2815666584GoodPanasonic CorpPanasonic Corp
US20030132299A10.184Communication terminal  personal data transmitting system and method for transmitting data using the sameAPPLICATION2003-07-172000-05-0819668160Good
US8285137B20.182Digital camera system for simultaneous printing and magnetic recordingGRANT2012-10-091997-07-1529999070GoodSilverbrook Research Pty LtdGoogle LLC
US6564995B10.181Smart card application-selectionGRANT2003-05-201997-09-1926738690GoodSchlumberger Malco IncAxalto Inc
US5497423A0.177Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communicationGRANT1996-03-051993-06-1815427835GoodPanasonic CorpPanasonic Corp
US6249009B10.176Random number generatorGRANT2001-06-191997-06-1625369039Good
US20020007440A10.174Cache access control systemAPPLICATION2002-01-172000-07-1418709499GoodHitachi LtdHitachi Ltd
US8102568B20.172System for creating garments using camera and encoded cardGRANT2012-01-241997-07-153802317GoodSilverbrook Research Pty LtdGoogle LLC
US6571263B10.171Random number generating apparatusGRANT2003-05-271998-08-1916945347GoodJapan Science and Technology Agency, System Ind Labs Co LtdSYSTEM INDUSTRIAL LABORATORY Co Ltd, Japan Science and Technology Agency, System Ind Labs Co Ltd
EP0136155A20.162Single-chip microcomputer comprising means for preventing read-out of its internal ROMGRANT1985-04-031983-09-2216005545GoodFujitsu LtdFujitsu Ltd
US6539410B10.144Random number generatorGRANT2003-03-251999-03-1723036337Good
US8908075B20.143Image capture and processing integrated circuit for a cameraGRANT2014-12-091997-07-1546300477GoodGoogle LLCGoogle LLC
US8096642B20.112Inkjet nozzle with paddle layer arranged between first and second wafersGRANT2012-01-171997-08-1132327191GoodSilverbrook Research Pty LtdMemjet Technology Ltd
US8902333B20.109Image processing method using sensed eye positionGRANT2014-12-021997-07-1530771558GoodGoogle LLCGoogle LLC
US8896724B20.102Camera system to facilitate a cascade of imaging effectsGRANT2014-11-251997-07-1528042532GoodGoogle LLCGoogle LLC
WO2001098908A1NRWATERMARK DETECTORAPPLICATION2001-12-272000-06-168171641Good
WO2001026277A1NRMETHOD AND APPARATUS FOR PACKAGING AND TRANSMITTING DATAAPPLICATION2001-04-121999-10-0126854164Good
WO2001008345A1NRA COMPUTER SYSTEM AND PROCESS FOR ACCESSING AN ENCRYPTED AND SELF-DECRYPTING DIGITAL INFORMATION PRODUCTAPPLICATION2001-02-011999-07-2222511903Good
WO2000072112A2NROBFUSCATION OF EXECUTABLE CODEAPPLICATION2000-11-301999-05-1226831746Good
WO2000070620A1NRMEMORY ARRAY WITH ADDRESS SCRAMBLINGAPPLICATION2000-11-231999-05-127908004Good
WO2000057262A1NRSYSTEM FOR SECURING ENTRY OF ENCRYPTED AND NON-ENCRYPTED INFORMATION ON A TOUCH SCREENAPPLICATION2000-09-281999-03-2423052420Good
WO2000055707A1NRMETHOD OF SECURING DATA IN A PORTABLE MASS MEMORY AGAINST UNAUTHORIZED DUPLICATIONAPPLICATION2000-09-211999-03-187901521Good
WO2000026791A2NRSECURE MEMORY MANAGEMENT UNIT WHICH USES MULTIPLE CRYPTOGRAPHIC ALGORITHMSAPPLICATION2000-05-111998-11-0522685369Good
WO2000019321A1NRMETHOD FOR DISABLING DATA AND DATA PROCESSING CIRCUIT FOR CARRYING OUT SAID METHODAPPLICATION2000-04-061998-09-307882968Good
WO1999066387A1NRMETHOD FOR VERIFYING THE EXECUTION OF A SOFTWARE PRODUCTAPPLICATION1999-12-231998-06-129522531Good
WO1999063697A2NRPROGRAMME-CONTROLLED DEVICEAPPLICATION1999-12-091998-06-037869788Good
WO1999035582A1NRA COMPUTER SOFTWARE ACTIVATION SYSTEM AND A METHOD OF AUTHENTICATING COMPUTER SOFTWAREAPPLICATION1999-07-151998-01-0520429847Good
WO1998010381A1NRTRUSTED INFRASTRUCTURE SUPPORT SYSTEMS  METHODS AND TECHNIQUES FOR SECURE ELECTRONIC COMMERCE  ELECTRONIC TRANSACTIONS  COMMERCE PROCESS CONTROL AND AUTOMATION  DISTRIBUTED COMPUTING  AND RIGHTS MANAGEMENTAPPLICATION1998-03-121996-09-0422255732Good
WO1998008323A1NRPUBLIC KEY CRYPTOSYSTEM METHOD AND APPARATUSAPPLICATION1998-02-261996-08-1921819032Good
WO1997044736A1NRMETHOD AND APPARATUS FOR TWO-LEVEL COPY PROTECTIONAPPLICATION1997-11-271996-05-2324618492Good
WO1997043761A2NRCRYPTOGRAPHIC METHODS  APPARATUS AND SYSTEMS FOR STORAGE MEDIA ELECTRONIC RIGHTS MANAGEMENT IN CLOSED AND CONNECTED APPLIANCESAPPLICATION1997-11-201996-05-1527567573Good
WO1988009971A1NRSECURITY SYSTEM HAVING SELECTIVE SOFTWARE PROGRAM LOCKS UTILIZING REMOVABLE PLA KEYS TO ALLOW HARDWARE SECURITY LOCK UPDATESAPPLICATION1988-12-151987-06-0322011215Good
WO1985002310A1NRSOFTWARE DISTRIBUTION SYSTEMAPPLICATION1985-05-231983-11-1424199978Good
WO1983001848A1NRMEMORY SECURITY SYSTEMAPPLICATION1983-05-261981-11-1223247880Good
WO1981002480A1NRMEMORY ADDRESSING APPARATUS AND METHODAPPLICATION1981-09-031980-02-2022405050Good
US3368207ANRFile protection to i/o storageGRANT1968-02-061965-05-1223807213GoodInternational Business Machines CorpInternational Business Machines Corp
NL9301880ANRMethod and device for storing data  in particular pin codes.GRANT1995-06-011993-11-0219863071Good
JPS63124153ANRMEMORY INFORMATION PROTECTORGRANT1988-05-271986-11-0525454548Good
GB2367164ANRSecurely storing and executing a programGRANT2002-03-272000-05-1624289048GoodHP IncHP Inc
GB2332606ANRSecure bootGRANT1999-06-231996-09-3024901262GoodIntel CorpIntel Corp
GB2330932ANRMethod and system for preventing unauthorized access to a computer programGRANT1999-05-051997-10-1525490685GoodDell USA LPDell USA LP
GB2321728ANRSmart card having separate memory and scrambler for interaction therewithGRANT1998-08-051997-01-3010806806GoodMotorola Solutions IncMotorola Solutions Inc
GB2288893ANRProtecting a software program in a microprocessor-based controllerGRANT1995-11-011994-04-2814567344GoodNEC CorpNEC Corp
GB2264373BNRData encryption apparatus and methodGRANT1995-12-201992-02-0510709883GoodEUROLOGIC RESEARCH LtdEUROLOGIC RESEARCH Ltd
GB2247548ANRDATA SECURITY SYSTEMGRANT1992-03-041990-08-1310680558GoodGEC Marconi Ltd, Marconi Co LtdBAE Systems Electronics Ltd, BAE Systems Electronics Ltd
GB2205667ANRMETHOD OF CONTROLLING THE OPERATION OF SECURITY MODULESGRANT1988-12-141987-06-1210618788GoodNCR CorpNCR Corp
GB2204971ANRTransportable security systemGRANT1988-11-231987-05-1910617546GoodGeneral Electric Co PLCGeneral Electric Co PLC
GB2172721ANRProtective softwareGRANT1986-09-241985-03-2110576419Good
GB2140592ANRMemory unit comprising a memory and a protection unitGRANT1984-11-281983-04-2923935622GoodKoninklijke Philips NVKoninklijke Philips NV
GB2119978ANRDEVICE FOR PROTECTION AGAINST THE UNAUTHORIZED READING OF PROGRAM WORDS STORED IN A MEMORYGRANT1983-11-231982-05-0619839688GoodKoninklijke Philips NVKoninklijke Philips NV
GB2114331ANRProgram storage hardwareGRANT1983-08-171982-01-0610527481GoodEMI LtdEMI Ltd
GB2099616ANRImprovements relating to microprocessor unitsGRANT1982-12-081981-06-0310522239GoodJPM AUTOMATIC MACHINES LtdJPM AUTOMATIC MACHINES Ltd
FR2810425A1NRSecure data transfer between processor and memory uses encryption and addition of electronic signature to prevent copying of dataGRANT2001-12-212000-06-208851474GoodGROUPE ECOLES TELECOMMGROUPE ECOLES TELECOMM
FR2793050A1NRMETHOD FOR SECURING USER SOFTWARE FROM A SECRET PROCESSING AND STORING UNIT AND SYSTEM USING THE SAMEGRANT2000-11-031999-04-289545130GoodFINGERPRINTFINGERPRINT
FR2793049A1NRMETHOD FOR SECURING THE USE OF SOFTWARE FROM A SECRET PROCESSING AND STORING UNIT AND SYSTEM USING THE SAMEGRANT2000-11-031999-04-289545129GoodFINGERPRINTFINGERPRINT
FR2787216A1NRMETHOD FOR STORING AND OPERATING INFORMATION UNITS IN A SECURITY MODULE  AND RELATED SECURITY MODULEGRANT2000-06-161998-12-119533861GoodBull CP8Bull CP8
FR2780177A1NRSOFTWARE PROTECTION SYSTEMGRANT1999-12-241998-06-179527490GoodSchlumberger SASchlumberger SA
FR2762417A1NRSecurity system preventing unauthorised copying of computer software from distribution disksGRANT1998-10-231997-04-169506448GoodGemplus Card International SA, Gemplus SAGemplus SA, Gemplus SA
FR2762111A1NRProtection of computer file against illicit copying and useGRANT1998-10-161997-04-099505683GoodTelediffusion de France ets Public de DiffusionTelediffusion de France ets Public de Diffusion
FR2716550A1NREmbedded encrypted bulk memory with data protectionGRANT1995-08-251994-02-249460378GoodDassault Electronique SA, Bertin Technologies SAThales SA, Bertin Technologies SA
FR2643475A1NRMETHOD FOR CONTROLLING THE USE OF AN INFORMATION MEDIUM  IN PARTICULAR MAGNETIC OR MAGNETO-OPTICAL  AND SYSTEMS FOR ITS IMPLEMENTATIONGRANT1990-08-241989-02-219378987GoodLIVOWSKY JEAN MICHELLIVOWSKY JEAN MICHEL
FR2623640A1NRMicrocomputer device to counter the running of pirate programsGRANT1989-05-261987-11-199356955GoodDassault Electronique SAThales SA
DE4423565C1NRCrypto circuitGRANT1996-03-071994-07-056522303GoodSiemens AGRohde and Schwarz SIT GmbH
DE19755796B4NRApparatus and method for securing electronic information in a wireless communication deviceGRANT2009-02-051996-12-3125105074GoodMotorola Solutions IncMotorola Mobility LLC
EP0447386A20.751Security system for computer systemGRANT1991-09-181990-03-153884716FairWOW CoWOW COMPANY
US5778068A0.682Personal access management systemGRANT1998-07-071995-02-1323533132FairETA Tech CorpCYPHERCOMM Inc
US5887060A0.656Central database system for automatic software program salesGRANT1999-03-231995-06-0723876334FairDigital River IncDigital River Inc
US5619574A0.655Personal access management systemGRANT1997-04-081995-02-1323533148FairETA Tech CorpQUANTUM DIGITAL SOLUTIONS Corp
US4759062A0.654Arrangement for and method of protecting private security codes from unauthorized disclosureGRANT1988-07-191986-10-0625435712FairINTERNATIONAL ELECTRONICS Tech CORPINTERNATIONAL ELECTRONICS Tech CORP
US5689564A0.646Personal access management systemGRANT1997-11-181995-02-1323533190FairETA Tech CorpCYPHERCOMM Inc
US6044469A0.602Software publisher or distributor configurable software security mechanismGRANT2000-03-281997-08-2925445191FairPreview SoftwareSafeNet Data Security Israel Ltd
US6895502B10.573Method and system for securely displaying and confirming request to perform operation on host computerGRANT2005-05-172000-06-0834573086FairCurriculum CorpBcs Software D/b/a Bluebonnet Consulting Services & Software LLC
US9053316B20.537Secure access computer systemGRANT2015-06-091996-10-2824969948FairChi Development Mgmt Ltd Iii LLCCallahan Cellular LLC
US7801817B20.537Digital content management system and apparatusGRANT2010-09-211995-10-2737718738FairIntarsia Software LLCPiracy Protection LLC, Xylon LLC
US6529985B10.532Selective interception of system callsGRANT2003-03-042000-02-0423983802FairEnsim CorpCufer Asset Ltd LLC
US3992702A0.531Code conversion arrangements for addresses to faulty memory locationsGRANT1976-11-161974-05-0110121871FairFujitsu Services LtdFujitsu Services Ltd
US6845441B20.531User initiated microcode modificationGRANT2005-01-181998-01-1319531379FairLG Semicon Co LtdAbov Semiconductor Co Ltd
US7233948B10.517Methods and apparatus for persistent control and protection of contentGRANT2007-06-191998-03-1638157169FairIntertrust Technologies CorpIntertrust Technologies Corp
US6834110B10.500Multi-tier digital TV programming for content distributionGRANT2004-12-211999-12-0923817218FairInternational Business Machines CorpInternational Business Machines Corp
US5634046A0.497General purpose use of a stack pointer registerGRANT1997-05-271994-09-3023229925FairMicrosoft CorpMicrosoft Technology Licensing LLC
US6094483A0.485Secure encryption and hiding of data and messages in imagesGRANT2000-07-251997-08-0625423610FairResearch Foundation of State University of New YorkRESEARCH FOUNDATION OF STATE UNIVERSITY OF NEW YORK TECHNOLOGY TRANSFER OFFICE, Research Foundation of State University of New York
US5638442A0.483Method for remotely inspecting a postage meterGRANT1997-06-101995-08-2324063954FairPitney Bowes IncPitney Bowes Inc
USRE47642E10.482Signal processing apparatus and methodsGRANT2019-10-081981-11-0368070305FairPersonalized Media Communications LLCPersonalized Media Communications LLC
US5022077A0.482Apparatus and method for preventing unauthorized access to BIOS in a personal computer systemGRANT1991-06-041989-08-2523576925FairInternational Business Machines CorpLenovo Singapore Pte Ltd
US6263344B10.482Method and apparatus for processing hypertext objects on optical disc playersGRANT2001-07-171997-09-1826738933FairHanger Solutions LLCHanger Solutions LLC
US6697942B10.475Method for remotely managing a remote device using an electronic mail messageGRANT2004-02-241999-02-0426816587FairEarthLink IncGoogle LLC
US5335277A0.473Signal processing appparatus and methodsGRANT1994-08-021981-11-0322255280FairPersonalized Mass Media CorpPersonalized Mass Media Corp
US5978916A0.469Method  system and computer program product for updating region-dependent software using a common update module for multiple regionsGRANT1999-11-021997-11-2525525955FairInternational Business Machines CorpInternational Business Machines Corp
US6070245A0.463Application interface method and system for encryption controlGRANT2000-05-301997-11-2525525974FairInternational Business Machines CorpInternational Business Machines Corp
US7769344B10.462Signal processing apparatus and methodsGRANT2010-08-031981-11-0342358876FairPersonalized Media Communications LLCPersonalized Media Communications LLC
US3662343A0.462CREDIT CARD AUTOMATIC CURRENCY DISPENSERGRANT1972-05-091970-07-2922021129FairDocutel CorpDocutel Corp
US5251909A0.459Secured high throughput data channel for public broadcast systemGRANT1993-10-121991-05-2824836715FairTCI Technology Management LLCTime Warner Entertainment Co LP
US4787027A0.456System using an adapter board to couple a personal computer to a plurality of peripherals in a financial environmentGRANT1988-11-221985-09-2025113812FairNCR CorpNCR Corp
US7730169B10.456Business method and system for serving third party software applicationsGRANT2010-06-011999-04-1242200311FairSoftricity IncMicrosoft Technology Licensing LLC
USRE39370E10.453Electronic casino gaming system with improved play capacity  authentication and securityGRANT2006-10-311995-06-2937189417FairInternational Game TechnologyInternational Game Technology
US5454038A0.450Electronic data interchange postage evidencing systemGRANT1995-09-261993-12-0622581696FairPitney Bowes IncPitney Bowes Inc
US5784585A0.447Computer system for executing instruction stream containing mixed compressed and uncompressed instructions by automatically detecting and expanding compressed instructionsGRANT1998-07-211994-04-0510753009FairMotorola Solutions IncMotorola Solutions Inc
US4068300A0.444Data processing system utilizing data field descriptors for processing data filesGRANT1978-01-101973-12-1323682026FairBull HN Information Systems IncBull HN Information Systems Inc
US5680533A0.443Videographics program/video game fabricating system and methodGRANT1997-10-211994-10-3123299951FairNintendo Co LtdNintendo Co Ltd
US5155847A0.439Method and apparatus for updating software at remote locationsGRANT1992-10-131988-08-0322854512FairMinicom Data CorpDot Assets No 9 LLC
US6944296B10.436Video bit scramblingGRANT2005-09-131999-03-2434910582FairIntel CorpIntel Corp
US7470182B20.433Computerized gaming system  method and apparatusGRANT2008-12-302000-03-0824072455FairInternational Game TechnologyInternational Game Technology
US6453420B10.432System  method and article of manufacture for authorizing the use of electronic content utilizing a laser-centric mediumGRANT2002-09-171999-04-2123140598FairResearch Investment Network IncResearch Investment Network Inc
US6405203B10.429Method and program product for preventing unauthorized users from using the content of an electronic storage mediumGRANT2002-06-111999-04-2123138819FairResearch Investment Network IncResearch Investment Network Inc
US6115036A0.429Video game/videographics program editing apparatus with program halt and data transfer featuresGRANT2000-09-051994-10-3123298771FairNintendo Co LtdNintendo Co Ltd, Intelligent Systems Co Ltd
US6665489B20.428System  method and article of manufacturing for authorizing the use of electronic content utilizing a laser-centric medium and a network serverGRANT2003-12-161999-04-2123139989FairResearch Investment Network IncResearch Investment Network Inc
US6089460A0.428Semiconductor device with security protection function  ciphering and deciphering method thereof  and storage medium for storing software thereforGRANT2000-07-181996-09-1317419130FairNippon Steel CorpIntellectual Ventures I LLC
US5680534A0.424Video game/videographics program fabricating system and method with superimpose controlGRANT1997-10-211994-10-3123299960FairNintendo Co LtdNintendo Co Ltd
US5592609A0.420Video game/videographics program fabricating system and method with unit based program processingGRANT1997-01-071994-10-3123298749FairNintendo Co LtdNintendo Co Ltd
US6405265B10.418Device driver for accessing computer filesGRANT2002-06-111996-05-0823130112FairMijenix CorpSmith Micro Software Inc
US4613901A0.413Signal encryption and distribution system for controlling scrambling and selective remote descrambling of television signalsGRANT1986-09-231983-05-2723982554FairM A COM LINKABIT IncNEXT LEVEL SYSTEMS Inc (NLS-1), Arris Technology Inc, Engility LLC
US5257381A0.413Method of intercepting a global function of a network operating system and calling a monitoring functionGRANT1993-10-261992-02-2825290338FairIntel CorpIntel Corp
US7343421B10.411Restricting communication of selected processes to a set of specific network addressesGRANT2008-03-112000-02-1439155452FairDigital Asset Enterprises LLCLonghorn Hd LLC
US6154877A0.408Method and apparatus for portable checkpointing using data structure metrics and conversion functionsGRANT2000-11-281997-07-0346254555FairUniversity of Iowa Research Foundation UIRFUniversity of Iowa Research Foundation UIRF
US6957342B20.405Security module  security system and mobile stationGRANT2005-10-181998-09-048552425Fair
US6463449B20.405System for creating non-algorithmic random numbers and publishing the numbers on the internetGRANT2002-10-082000-05-0126896209Fair
US6990387B10.404Test system for identification and sorting of integrated circuit devicesGRANT2006-01-242000-05-1835614117FairIntel CorpIntel Corp
US7039919B10.395Tools and techniques for instrumenting interfaces of units of a software programGRANT2006-05-021998-10-0234840765FairMicrosoft CorpMicrosoft Technology Licensing LLC
US6161219A0.394System and method for providing checkpointing with precompile directives and supporting software to produce checkpoints  independent of environment constraintsGRANT2000-12-121997-07-0325392346FairUniversity of Iowa Research Foundation UIRFUniversity of Iowa Research Foundation UIRF
US8037193B20.391Virtual tokenGRANT2011-10-111999-12-2425646234FairTelstra Corp LtdTelstra Corp Ltd
US6976258B10.390Providing quality of service guarantees to virtual hostsGRANT2005-12-131999-11-3023795883FairEnsim CorpHanger Solutions LLC
US5463778A0.390User controlled trap handlerGRANT1995-10-311989-11-1627031643FairTexas Instruments IncTexas Instruments Inc
US5136713A0.390APPARATUS AND METHOD FOR DECREASING THE MEMORY REQUIREMENTS FOR BIOS IN A PERSONAL COMPUTER SYSTEMGRANT1992-08-041989-08-2523577082FairInternational Business Machines CorpLenovo Singapore Pte Ltd
US5299282A0.386Random tone or voice message synthesizer circuitGRANT1994-03-291991-02-0811938794FairNEC CorpNEC Electronics Corp
US5396609A0.385Method of protecting programs and data in a computer against unauthorized access and modification by monitoring address regionsGRANT1995-03-071989-01-196372377FairHelmholtz Zentrum Muenchen Deutsches Forschngs fuer Gesundheit und UmweltHelmholtz Zentrum Muenchen Deutsches Forschngs fuer Gesundheit und Umwelt
US6907421B10.383Regulating file access rates according to file typeGRANT2005-06-142000-05-1634633041FairEnsim CorpDatacloud Technologies LLC
US8443200B20.382Biometric verification for electronic transactions over the webGRANT2013-05-142000-06-2919749464FairKarsof Systems LLCSURESHWARA Inc
US5210875A0.382INITIAL BIOS LOAD FOR A PERSONAL COMPUTER SYSTEMGRANT1993-05-111989-08-2523577103FairInternational Business Machines CorpLenovo Singapore Pte Ltd
US6810200B10.382Digital data processing device that restricts usage of data present on a recording mediumGRANT2004-10-261999-04-1433156511FairPanasonic CorpPanasonic Corp, Delphi Technologies Inc
US5684956A0.380Data transmission system with parallel packet deliveryGRANT1997-11-041994-11-1423325706Fair
US4056711A0.380Method and apparatus for programming microprocessorsGRANT1977-11-011975-10-2424507097Fair
US5410699A0.379Apparatus and method for loading BIOS from a diskette in a personal computer systemGRANT1995-04-251989-08-2523580310FairInternational Business Machines CorpLenovo Singapore Pte Ltd
US4506325A0.375Reflexive utilization of descriptors to reconstitute computer instructions which are Huffman-like encodedGRANT1985-03-191980-03-2426831149FairSperry CorpSperry Corp
US3978454A0.375SYSTEM AND METHOD FOR PROGRAMMABLE SEQUENCE CONTROLGRANT1976-08-311974-06-2023911291FairWestinghouse Electric CorpCBS Corp
US4064554A0.374Microcomputer with code conversionGRANT1977-12-201976-08-1624871189FairTexas Instruments IncTexas Instruments Inc
US7562150B20.372Delivering electronic contentGRANT2009-07-141999-01-1522870376FairDRM Tech LLCDigital Reg of Texas LLC
US7188193B10.371System  method and article of manufacture for a synchronizer component in a multimedia synchronization frameworkGRANT2007-03-062000-01-2037807260FairSonic Solutions LLCRovi Technologies Corp
US6467080B10.369Shared  dynamically customizable user documentationGRANT2002-10-151999-06-2423329589FairInternational Business Machines CorpInternational Business Machines Corp
US5021997A0.364Test automation systemGRANT1991-06-041986-09-2925432468FairNokia Bell LabsNokia Bell Labs, AT&T Information Systems Inc, AT&T Corp
US6639996B20.357Image processing apparatus  image processing method and computer readable memory mediumGRANT2003-10-281998-04-1026438756FairCanon IncCanon Inc
US6381740B10.356Method and system for incrementally improving a program layoutGRANT2002-04-301997-09-1625460300FairMicrosoft CorpVISION2 INTERNATIONAL Inc, Microsoft Technology Licensing LLC
US3940736A0.354Digital code monitor systemGRANT1976-02-241973-08-0226428243FairNippon Telegraph and Telephone CorpNippon Telegraph and Telephone Corp
US6269374B10.350Method and apparatus for updating checksums of data structuresGRANT2001-07-311998-05-2622185555FairInternational Business Machines CorpInternational Business Machines Corp
US5065428A0.349Secure mode answering machineGRANT1991-11-121990-05-2924111285FairMotorola Solutions IncGeneral Dynamics Decision Systems Inc
US6282703B10.349Statically linking an application process with a wrapper libraryGRANT2001-08-281998-10-2922668140FairInternational Business Machines CorpInternational Business Machines Corp
US7267612B20.344Gaming apparatus with portrait-mode displayGRANT2007-09-111997-05-2824717446FairInternational Game TechnologyInternational Game Technology
USRE41227E10.344System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detectionGRANT2010-04-131999-01-1926814163Fair
US7289959B20.339Biometric identification method  portable electronic device and electronic device acquiring biometric data thereforGRANT2007-10-302000-03-108848089FairGemplus SAThales DIS France SA
EP0853315A20.336Cipher key and reproduction methods  apparatuses  systems and optical discGRANT1998-07-151997-01-1027280750FairVictor Company of Japan LtdVictor Company of Japan Ltd
US6615264B10.335Method and apparatus for remotely administered authentication and access controlGRANT2003-09-021999-04-0923113102FairSun Microsystems IncOracle America Inc
US6724921B20.332Method of processing image information and method of preventing forgery of certificates or the likeGRANT2004-04-201997-12-0326488954FairToshiba CorpToshiba Corp
US6721793B10.331Intellectual property over non-internet protocol systems and networksGRANT2004-04-132000-05-1032043575FairCisco Technology IncCisco Technology Inc
US5014982A0.329Memory cartridge and game apparatus using the sameGRANT1991-05-141987-08-2616622786FairNintendo Co LtdNintendo Co Ltd
US20140074990A10.328SYSTEM AND METHOD FOR ADDING TARGETED CONTENT IN A WEB PAGEAPPLICATION2014-03-131999-10-2823702893FairHipcricket IncUpland Software Inc
US10361802B10.328Adaptive pattern recognition based control system and methodGRANT2019-07-231999-02-0167300558FairBlanding Hovenweep LLCHOFFBERG FAMILY TRUST 1, STEVEN M HOFFBERG 2004-1 GRAT, Blanding Hovenweep LLC
US9817650B20.326Scheduling of a file download and search for updatesGRANT2017-11-141998-12-0428794893FairDigital River IncDigital River Inc
US5161194A0.326SATELLITE COMMUNICATIONS SYSTEM OPERATING IN ASYNCHRONOUS MODE FOR CENTRAL-TO-TERMINAL STATION TRANSMISSIONGRANT1992-11-031989-07-3116387520FairNEC CorpNEC Corp
US4543646A0.324Chip topography for MOS Data Encryption Standard circuitGRANT1985-09-241980-06-0522560221FairWestern Digital CorpWestern Digital Corp
US6499124B10.307Intest security circuit for boundary-scan architectureGRANT2002-12-241999-05-0623186235FairXilinx IncXilinx Inc
US6938021B20.303Methods for matching  selecting  narrowcasting  and/or classifying based on rights management and/or other informationGRANT2005-08-301997-11-0627052814FairIntertrust Technologies CorpIntertrust Technologies Corp
US5414850A0.300System for transparently compressing data files in a computer systemGRANT1995-05-091991-08-2325011701FairStac Electronics IncHI/FN Inc
US5502812A0.294Method and system for automatic fault detection and recovery in a data processing systemGRANT1996-03-261991-10-049417604FairAirbus Group SASAirbus Group SAS
EP0456916A10.291Integral protection system for vehiclesGRANT1991-11-211990-05-118267274FairTelettra Espanola SATelettra Espanola SA
US5559505A0.277Security system providing lockout for invalid access attemptsGRANT1996-09-241992-05-2025389222FairNokia of America CorpNokia of America Corp
US7178106B20.267Presentation of media content from multiple media sourcesGRANT2007-02-131999-04-2137810568FairSonic Solutions LLCRovi Technologies Corp
US7464274B20.267Manufacturing trusted devicesGRANT2008-12-091999-07-0935066307FairDigital Video Express LPGoogle LLC
US10311094B20.264Synthetic audiovisual description scheme  method and system for MPEG-7GRANT2019-06-041999-02-0126815892FairAT&T Intellectual Property II LPAT&T Intellectual Property II LP
US6763364B10.260Random number generator and generation methodGRANT2004-07-131995-02-1423534882FairQuantum World CorpQuantum World Corp
US5388230A0.257Parallel processor having multi-processing units either connected or bypassed in either series or parallel by the use of bus switchingGRANT1995-02-071988-06-2315600688FairHitachi LtdRenesas Electronics Corp
US6157559A0.256Apparatus and method for updating ROM without removing it from circuit boardGRANT2000-12-051997-09-2319521527FairSamsung Electronics Co LtdSamsung Electronics Co Ltd
US4051460A0.252APPARATUS FOR ACCESSING AN INFORMATION STORAGE DEVICE HAVING DEFECTIVE MEMORY CELLSGRANT1977-09-271975-02-0111839344FairNippon Telegraph and Telephone CorpNippon Telegraph and Telephone Corp
US8866923B20.250Modular camera and printerGRANT2014-10-211999-05-253814761FairGoogle LLCGoogle LLC
US6512454B20.250Tamper resistant enclosure for an electronic device and electrical assembly utilizing sameGRANT2003-01-282000-05-249892172FairInternational Business Machines CorpInternational Business Machines Corp
US6731758B10.248Digital video content transmission ciphering and deciphering method and apparatusGRANT2004-05-041999-08-2923522062FairIntel CorpIntel Corp
US7058597B10.247Apparatus and method for adaptive fraud screening for electronic commerce transactionsGRANT2006-06-061998-12-0434742610FairDigital River IncDigital River Inc
US4368357A0.243Bypass apparatus for use in secure communication systemsGRANT1983-01-111980-11-1422767939FairInternational Telephone and Telegraph CorpNational Security Agency, ITT Corp
US3909802A0.235Diagnostic maintenance and test apparatusGRANT1975-09-301974-04-0823822636FairBull HN Information Systems IncBull HN Information Systems Inc
US4882683A0.234Cellular addressing permutation bit map raster graphics architectureGRANT1989-11-211987-03-1621829549FairFairchild Semiconductor CorpNational Semiconductor Corp
US5521722A0.230Image handling facilitating computer aided design and manufacture of documentsGRANT1996-05-281990-01-3126296573FairDe la Rue Co PLCDe la Rue International Ltd
US6771649B10.219Middle approach to asynchronous and backward-compatible detection and prevention of ARP cache poisoningGRANT2004-08-031999-12-0632772101FairAT&T CorpAT&T Corp
US7073198B10.208Method and system for detecting a vulnerability in a networkGRANT2006-07-041999-08-2636613932FairNcircle Network Security IncTripwire Inc
US6714955B20.208High speed random number generationGRANT2004-03-301999-12-219553532FairBull SABull SA
US5379243A0.189Method and apparatus for performing finite field divisionGRANT1995-01-031992-08-3125470917FairComstream CorpEntropic Communications LLC
US4860128A0.185Recordable data device having identification symbols formed thereon and cooperating data processing system having registering symbolsGRANT1989-08-221985-04-2426402426FairNintendo Co LtdNintendo Co Ltd
EP0766472A20.185Method for using electronic information services ensuring the anonymity of users towards companies delivering such servicesGRANT1997-04-021995-09-267773136FairSiemens AGSiemens AG
US6678803B20.183Method and device to use memory access request tagsGRANT2004-01-131999-11-0323717195FairMicron Technology IncMicron Technology Inc
US5784581A0.182Apparatus and method for operating a peripheral device as either a master device or a slave deviceGRANT1998-07-211996-05-0324576333FairIntel CorpIntel Corp
US3943492A0.172Plural storage systemGRANT1976-03-091972-08-1726960837FairOak Industries IncOCI COMMUNICATIONS Inc
US8421869B20.167Camera system for with velocity sensor and de-blurring processorGRANT2013-04-161997-07-1536974522FairGoogle LLCGoogle LLC
US7021216B10.163Method of and system for controlling a blasting networkGRANT2006-04-041999-04-2025587682FairOrica Explosives Technology Pty LtdOrica Explosives Technology Pty Ltd
US5268899A0.126Apparatus for generating pseudo-random numbers in a communication system  or other system involving a shared resourceGRANT1993-12-071991-10-1725113774Fair3Com CorpHP Inc
US4056809A0.107Fast table lookup apparatus for reading memoryGRANT1977-11-011975-04-3024291431FairDATA FLO CORPDATA FLO CORP
US6377104B20.093Static clock pulse generator and displayGRANT2002-04-232000-04-049889034FairSharp CorpSharp Corp
US6240432B10.089Enhanced random number generatorGRANT2001-05-291998-12-2822831571FairVanguard International Semiconductor CorpTaiwan Semiconductor Manufacturing Co TSMC Ltd
US6542014B10.087Thermal noise random pulse generator and random number generatorGRANT2003-04-011999-11-0218021449FairLeisure Electronics TechLeisure Electronics Tech Co Ltd, Leisure Electronics Tech
US3920894A0.085PSEUDO-RANDOM PARALLEL WORD GENERATORGRANT1975-11-181974-03-1123787061FairNokia Bell LabsNokia Bell Labs
US4641102A0.079Random number generatorGRANT1987-02-031984-08-1724574379FairNokia Bell LabsNokia Bell Labs
US8789939B20.034Print media cartridge with ink supply manifoldGRANT2014-07-291998-11-093811233FairGoogle LLCGoogle LLC
US3686910A0.014METHODS OF AND APPARATUS FOR HYDROSTATIC FORMINGGRANT1972-08-291968-03-2024902179FairWestern Electric Co IncNokia of America Corp
WO1999012350A1NRMETHOD AND APPARATUS FOR TRANSMITTING MOTION PICTURE CINEMATIC INFORMATION FOR VIEWING IN MOVIE THEATERSAPPLICATION1999-03-111997-09-0325447660Fair
WO1999003273A1NRMOVIE PLAYBACK APPARATUS AND MOVIE COLLECTING APPARATUSAPPLICATION1999-01-211997-07-1126404030Fair
WO1998043438A1NRELECTRONIC PROJECTION CINEMA VIA SATELLITEAPPLICATION1998-10-011997-03-218298717Fair
WO1997042762A2NRSECURITY DEVICE MANAGED ACCESS TO INFORMATIONAPPLICATION1997-11-131996-05-068223951Fair
WO1997006637A1NRHIGH DEFINITION TV MOTION PICTURE DISTRIBUTION NETWORKAPPLICATION1997-02-201995-08-0411403521Fair
USH1944H1NRFirewall security method and apparatusGRANT2001-02-061998-03-2421947652FairNokia of America CorpNokia of America Corp
US3377624ANRMemory protection systemGRANT1968-04-091966-01-0724067911FairInternational Business Machines CorpInternational Business Machines Corp
JPS63184853ANRPORTABLE ELECTRONIC APPARATUSGRANT1988-07-301987-01-2811946373Fair
JPS59229646ANRWITHOUT-PERMISSION USE INHIBITING DEVICE OF CODED PROGRAMGRANT1984-12-241983-06-1014366663Fair
JPS59212954ANRPROGRAM ROBBERY PREVENTING DEVICE FOR ELECTRONIC CIRCUITGRANT1984-12-011983-05-1813936772Fair
JPH04287124ANRMETHOD AND DEVICE FOR INHIBITING SOFTWARE FROM BEING USED WITHOUT PERMISSION AT COMPUTER SYSTEMGRANT1992-10-121991-03-1513622132Fair
JPH04268924ANRMETHOD FOR PROTECTING REVERSE ASSEMBLINGGRANT1992-09-241991-02-2512938106Fair
JPH04101529ANRENCIPHERED COMMUNICATION SYSTEMGRANT1992-04-031990-08-2116714390Fair
JPH03148734ANRCACHE MEMORY CONTROLLERGRANT1991-06-251989-11-0617716594Fair
JPH02155034ANRCOMPUTER WITH SECURITY FUNCTIONGRANT1990-06-141988-12-0817984656Fair
GB2230362ANRIdentifying processorsGRANT1990-10-171989-04-1410655044FairSmiths Group PLCSmiths Group PLC
GB2135175ANRA frame for a piece of furniture  set of shelves  inside fittings or similar constructionsGRANT1984-08-301983-02-1526223288Fair
GB2129586ANRImprovements in or relating to memory systemsGRANT1984-05-161982-11-0126284275Fair
FR2771828A1NRError confinement in multitasking computer systemGRANT1999-06-041997-12-039514105FairThales Avionics SASThales Avionics SAS
FR2553541A1NRDEVICE AND METHOD FOR QUICK AND STABLE INFORMATION STORAGEGRANT1985-04-191983-10-179293218FairInstitut National de Recherche en Informatique et en Automatique INRIAInstitut National de Recherche en Informatique et en Automatique INRIA
CN1085359CNREncrypted method and device for application programGRANT2002-05-221996-12-115127229Fair
CN100348052CNRSource coding to provide for robust error recovery during transmission lossesGRANT2007-11-071997-10-2327567286Fair

Predictive Analytics

Composite Research Score (1-10)
7
  MODERATE
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateMID
Tech DiversityAVERAGE
Expert Services Estimate$3,750 — $4,200
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

CPC Technology Profile

Possible Classes
149
Recommended Classes
38
Government Assigned Classes
1
CPC
Title
Score
G06F21/125by manipulating the program code  e.g. source code  compiled code  interpreted code  machine code2.067
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material1.059
G06F9/44521Dynamic linking or loading| Link editing at or after load time  e.g. Java class loading1.046
G06F21/123by using dedicated hardware  e.g. dongles  smart cards  cryptographic processors  global positioning systems [GPS] devices0.916
G06F9/445Program loading or initiating | bootstrapping | (ref: G06F9/4401)| | security arrangements for program loading or initiating | (ref: G06F21/57)0.902
G06F21/563by source code analysis0.900
H04L9/00Cryptographic mechanisms or cryptographic|  arrangements for secret or secure communication | network architectures or network communication protocols for network security | (ref: H04L63/00)|  or for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)0.879
G06F21/74operating in dual or compartmented mode  i.e. at least one secure mode0.868
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine0.868
G06F21/60Protecting data0.865
G06F21/564by virus signature recognition0.864
G06F21/14against software analysis or reverse engineering  e.g. by obfuscation0.864
G06F21/72in cryptographic circuits0.861
G06F21/602Providing cryptographic facilities or services0.857
H04L9/08Key distribution | or management  e.g. generation  sharing or updating  of cryptographic keys or passwords | network architectures or network communication protocols for supporting key management in a packet data network | (ref: H04L63/06)0.857
G06F21/12Protecting executable software0.856
G06F12/1408by using cryptography | for digital transmission | (ref: H04L9/00)0.856
G06F21/121Restricting unauthorised execution of programs0.852
G06F21/566Dynamic detection  i.e. detection performed at run-time  e.g. emulation  suspicious activities0.848
H04L63/0876based on the identity of the terminal or configuration  e.g. MAC address  hardware or software configuration or device fingerprint0.846
G07F7/1008Active credit-cards provided with means to personalise their use  e.g. with PIN-introduction/comparison system0.844
G06F21/52during program execution  e.g. stack integrity | | Preventing unwanted data erasure| Buffer overflow0.841
G06F21/54by adding security routines or objects to programs0.837
G06F21/87by means of encapsulation  e.g. for integrated circuits0.835
H04L29/06characterised by a protocol0.835
H04L63/0457wherein the sending and receiving network entities apply dynamic encryption  e.g. stream encryption | cryptographic mechanisms or cryptographic arrangements for stream encryption | (ref: H04L9/065)0.835
G06F21/51at application loading time  e.g. accepting  rejecting  starting or inhibiting executable software based on integrity or source reliability0.832
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload0.828
H04L9/3236using cryptographic hash functions0.828
G06F8/75Structural analysis for program understanding0.826
G06F21/56Computer malware detection or handling  e.g. anti-virus arrangements0.826
G06F12/1425the protection being physical  e.g. cell  word  block0.824
H04L9/0897involving additional devices  e.g. trusted platform module [TPM]  smartcard or USB0.822
G06F21/126Interacting with the operating system0.819
G06F21/78to assure secure storage of data | address-based protection against unauthorised use of memory | (ref: G06F12/14)| | record carriers for use with machines and with at least a part designed to carry digital markings | (ref: G06K19/00)0.808
G06F21/16Program or content traceability  e.g. by watermarking | digital watermarking on images | (ref: H04N1/32)0.803
H04L9/0618Block ciphers  i.e. encrypting groups of characters of a plain text message using fixed encryption transformation0.802
G06F21/577Assessing vulnerabilities and evaluating computer system security0.802
H04L9/36with means for detecting characters not meant for transmission0.802
G06F9/44552Conflict resolution  i.e. enabling coexistence of conflicting executables0.392
G06F12/02Addressing or allocation| Relocation | program address sequencing | (ref: G06F9/00)| | arrangements for selecting an address in a digital store | (ref: G11C8/00)0.363
G06F21/629to features or functions of an application0.343
G06F9/44536Selecting among different versions0.338
G06F12/145the protection being virtual  e.g. for virtual blocks or segments before a translation mechanism0.330
G06F12/0246in block erasable memory  e.g. flash memory0.330
G06F21/71to assure secure computing or processing of information0.325
G06F9/455Emulation| Interpretation| Software simulation  e.g. virtualisation or emulation of application or operating system execution engines0.325
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures0.325
H04L9/088Usage controlling of secret information  e.g. techniques for restricting cryptographic keys to pre-authorized uses  different access levels  validity of crypto-period  different key- or password length  or different strong and weak cryptographic algorithms | network architectures or network communication protocols for using time-dependent keys in a packet data network | (ref: H04L63/068)0.324
H04L9/16the keys or algorithms being changed during operation0.324
G06F21/565by checking file integrity0.324
H04L9/0637Modes of operation  e.g. cipher block chaining [CBC]  electronic codebook [ECB] or Galois/counter mode [GCM]0.324
H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence  e.g. one-time-pad [OTP] or Vernam's cipher0.324
G06F21/75by inhibiting the analysis of circuitry or operation0.323
G06F21/575Secure boot0.322
H04L63/145the attack involving the propagation of malware through the network  e.g. viruses  trojans or worms0.321
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules0.321
G06F21/6281at program execution time  where the protection is within the operating system0.319
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database0.319
G06F21/79in semiconductor storage media  e.g. directly-addressable memories0.319
H04L63/0435wherein the sending and receiving network entities apply symmetric encryption  i.e. same key used for encryption and decryption | cryptographic mechanisms or cryptographic arrangements for symmetric key encryption | (ref: H04L9/06)0.317
H04L63/064Hierarchical key distribution  e.g. by multi-tier trusted parties0.317
G06F12/0888using selective caching  e.g. bypass0.317
G06Q20/40975Use of encryption for mutual authentication0.316
G07F7/082Features insuring the integrity of the data on or in the card0.316
G06Q20/341Active cards  i.e. cards including their own processing means  e.g. including an IC or chip0.316
G06Q20/12specially adapted for electronic shopping systems0.315
H04L9/3247involving digital signatures0.313
G06F21/57Certifying or maintaining trusted computer platforms  e.g. secure boots or power-downs  version controls  system software checks  secure updates or assessing vulnerabilities0.313
H04L9/3234involving additional secure or trusted devices  e.g. TPM  smartcard  USB or software token | network architectures or network communication protocols for supporting authentication of entities using an additional device in a packet data network | (ref: H04L63/0853)0.313
H04L63/105Multiple levels of security0.313
H04L43/18using protocol analyzers0.313
H04L41/142using statistical or mathematical methods0.313
H04L9/0894Escrow  recovery or storing of secret information  e.g. secret key escrow or cryptographic key storage0.312
G06F8/61Installation0.312
H04L63/12Applying verification of the received information | cryptographic mechanisms or cryptographic arrangements for data integrity or data verification | (ref: H04L9/32)0.311
G06F21/6245Protecting personal data  e.g. for financial or medical purposes0.311
H04L9/0891Revocation or update of secret information  e.g. encryption key update or rekeying0.311
H04L9/14using a plurality of keys or algorithms | network architectures or network communication protocols wherein the sending and receiving network entities apply hybrid encryption  i.e. combination of symmetric and asymmetric encryption | (ref: H04L63/045)0.311
G06F11/36Preventing errors by testing or debugging software0.310
G06F11/34Recording or statistical evaluation of computer activity  e.g. of down time  of input/output operation | | Recording or statistical evaluation of user activity  e.g. usability assessment0.310
G06F8/53Decompilation| Disassembly0.310
G06F21/36by graphic or iconic representation0.310
G06F21/6209to a single file or object  e.g. in a secure envelope  encrypted and accessed using a key  or with access control rules appended to the object itself0.310
H04L9/30Public key  i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy0.309
G06F12/1466Key-lock mechanism0.309
H04L9/3242involving keyed hash functions  e.g. message authentication codes [MACs]  CBC-MAC or HMAC0.309
G06F12/0837with software control  e.g. non-cacheable data0.309
G06F12/0842for multiprocessing or multitasking0.309
H04L9/0631Substitution permutation network [SPN]  i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations  e.g. AES algorithms0.309
G06F21/73by creating or determining hardware identification  e.g. serial numbers0.308
H04L9/006involving public key infrastructure [PKI] trust models | network architecture or network communication protocol for supporting authentication of entities using certificates in a packet data network | (ref: H04L63/0823)0.308
H04L9/3226using a predetermined code  e.g. password  passphrase or PIN | network architectures or network communication protocols for supporting authentication of entities using passwords in a packet data network | (ref: H04L63/083)0.306
H04L63/0478applying multiple layers of encryption  e.g. nested tunnels or encrypting the content with a first key and then with at least a second key | cryptographic mechanisms or cryptographic arrangements using a plurality of keys or algorithms | (ref: H04L9/14)0.306
G06F12/1027using associative or pseudo-associative address translation means  e.g. translation look-aside buffer [TLB]0.306
G06F13/24using interrupt | (ref: G06F13/32)|  takes precedence0.306
G06F21/554involving event detection and direct action0.306
G06F21/70Protecting specific internal or peripheral components  in which the protection of a component leads to protection of the entire computer0.306
G06F11/3664Environments for testing or debugging software0.305
G06F9/4486Formation of subprogram jump address0.305
H04L9/0822using key encryption key0.304
H04L9/0825using asymmetric-key encryption or public key infrastructure [PKI]  e.g. key signature or public key certificates0.302
G06F8/42Syntactic analysis0.301
G09C1/00Apparatus or methods whereby a given sequence of signs  e.g. an intelligible text  is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system | cryptographic typewriters | (ref: G09C3/00)0.301
G06F11/1405at machine instruction level0.301
G06F21/44Program or device authentication0.301
G06F9/223Execution means for microinstructions irrespective of the microinstruction function  e.g. decoding of microinstructions and nanoinstructions| timing of microinstructions| programmable logic arrays| delays and fan-out problems0.301
H04L9/004for fault attacks0.301
G06F2221/0797using dedicated hardware at the client0.057
G06F2221/2135Metering0.056
G06F2221/2147Locking files0.056
G06F2221/0737Traceability0.056
G06F2211/007Encryption  En-/decode  En-/decipher  En-/decypher  Scramble  (De-)compress0.056
G06F2009/45583Memory management  e.g. access  allocation | memory management in general | (ref: G06F12/00)| | allocation of memory to service a request | (ref: G06F9/5016)0.055
H04L2209/60Digital content management  e.g. content distribution0.055
G06F2221/2149Restricted operating environment0.054
G06F2221/2125Just-in-time application of countermeasures  e.g.  on-the-fly decryption  just-in-time obfuscation or de-obfuscation0.054
G06F2221/2107File encryption0.054
G06F2221/2101Auditing as a secondary aspect0.054
G06F2221/2143Clearing memory  e.g. to prevent the data from being stolen0.054
H04L2209/24Key scheduling  i.e. generating round keys or sub-keys for block encryption0.054
H04L2209/603Digital right managament [DRM]0.054
G06F11/327Alarm or error message display0.054
H01L2924/30107Inductance0.054
G06F2211/008Public Key  Asymmetric Key  Asymmetric Encryption0.054
G06F2212/1052Security improvement0.053
G06F2221/0755Generation0.053
G06F2221/2153Using hardware token as a secondary aspect0.052
H04L43/028using filtering | alarm or event filtering | (ref: H04L41/0604)0.052
H04L69/03Protocol definition or specification | protocol conformance testing | (ref: H04L1/244)| | specification techniques | (ref: G06F8/10)0.052
H04L69/22Header parsing or analysis | traffic monitoring by flow aggregation or filtering | (ref: H04L43/02)| | flow identification in packet switching networks | (ref: H04L47/2483)0.052
H04L43/16using threshold monitoring0.052
G06F2221/033Test or assess software0.052
G06F2201/865Monitoring of software0.052
G06F11/3414Workload generation  e.g. scripts  playback0.052
G06F2221/032Protect output to user by software means0.052
G06F2221/031Protect user input by software means0.052
H04L2209/16Obfuscation or hiding  e.g. involving white box0.051
G06F2221/0742Enhanced product0.051
H04L2209/127Trusted platform modules [TPM]0.051
H04L63/06for supporting key management in a packet data network | cryptographic mechanisms or cryptographic arrangements for key management | (ref: H04L9/08)0.051
G06F2212/682Multiprocessor TLB consistency0.051
H04L2209/605Copy protection0.051
G06F2221/2151Time stamp0.050
G11B20/0021involving encryption or decryption of contents recorded on or reproduced from a record carrier0.050
G06F2221/2137Time limited access  e.g. to a computer or data0.050
G06F2221/0704Device0.050
G06F2221/0744Unique instance | (ref: G06F2221/0702)|  takes precedence0.050
H04L2209/34Encoding or coding  e.g. Huffman coding or error correction0.050
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.