Validity Report
Basic Report
US7162735B2 — Digital data protection arrangement
Priority Date: 2000-07-18, Publication Date: 2007-01-09, Current Assignee: Simplex Patents CorpReport Generated: 2020-08-01

Preview Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Search Efficiency
Original Assignee
Current Assignee
EP1303808A2●●●●●COMPUTER SOFTWARE INSTALLATIONGRANT2003-04-232000-07-18GreatBitarts LtdSIMPLEX MAJOR Sdn Bhd
US6141698A●●●●●Method and system for injecting new code into existing application codeGRANT2000-10-311997-01-29GreatNetwork Commerce IncCRS LLC
EP1126356A2●●●●●Tamper resistant microprocessorGRANT2001-08-222000-02-14GreatToshiba CorpToshiba Corp
US5530752A●●●●●Systems and methods for protecting software from unlicensed copying and useGRANT1996-06-251994-02-22GreatConvex Computer CorpNortonLifeLock Inc
US6075862A●●●●●Decryption key management scheme for software distribution systemGRANT2000-06-131995-07-31GreatToshiba CorpToshiba Corp
EP0115395B1●●●●●COMPUTER PROCESSOR SYSTEM WITH SOFTWARE PROTECTIONGRANT1990-08-291983-01-26GreatFujitsu Services LtdFujitsu Services Ltd
US7000119B1●●●●●Instruction/data protection employing derived obscuring instruction/dataGRANT2006-02-142000-04-20GreatRealNetworks IncIntel Corp
EP0962850A2●●●●●A method for protecting embedded system software and embedded systemGRANT1999-12-081998-06-01GreatNokia Mobile Phones Ltd, Nokia OyjNokia Oyj
US4847902A●●●●●Digital computer system for executing encrypted programsGRANT1989-07-111984-02-10GreatPrime Computer IncBankers Trust Co
US7171693B2●●●●●Information security method and systemGRANT2007-01-302000-05-12GreatXtreamlok Pty LtdNortonLifeLock Inc
US6223288B1●●●●●System for persistently encrypting critical software file to prevent installation of software program on unauthorized computersGRANT2001-04-241998-05-22GreatProtexis IncIII Holdings 12 LLC
US5625690A●●●●●Software pay per use systemGRANT1997-04-291993-11-15GreatNokia of America CorpAT&T Corp, Nokia of America Corp
EP0720098A1●●●●●Apparatus for securing information systems organised around microprocessorsGRANT1996-07-031994-12-30GreatThomson CSF SAThales SA
EP0932955A1●●●●●SELF-DECRYPTING DIGITAL INFORMATION SYSTEM AND METHODGRANT1999-08-041996-09-12Great
US5359659A●●●●●Method for securing software against corruption by computer virusesGRANT1994-10-251992-06-19Great
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.

Predictive Analytics

Composite Research Score (1-10)
7
  MODERATE
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateMID
Tech DiversityAVERAGE
Expert Services Estimate$3,750 — $4,200
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

Preview CPC Technology Profile

Possible Classes
149
Recommended Classes
38
Government Assigned Classes
1
CPC
Title
Score
G06F21/125by manipulating the program code  e.g. source code  compiled code  interpreted code  machine code●●●●●
G06F21/10Protecting distributed programs or content  e.g. vending or licensing of copyrighted material●●●●●
G06F9/44521Dynamic linking or loading| Link editing at or after load time  e.g. Java class loading●●●●●
G06F21/123by using dedicated hardware  e.g. dongles  smart cards  cryptographic processors  global positioning systems [GPS] devices●●●●●
G06F9/445Program loading or initiating | bootstrapping | (ref: G06F9/4401)| | security arrangements for program loading or initiating | (ref: G06F21/57)●●●●●
G06F21/563by source code analysis●●●●●
H04L9/00Cryptographic mechanisms or cryptographic|  arrangements for secret or secure communication | network architectures or network communication protocols for network security | (ref: H04L63/00)|  or for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)●●●●●
G06F21/74operating in dual or compartmented mode  i.e. at least one secure mode●●●●●
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine●●●●●
G06F21/60Protecting data●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.