WO2000062232A1 - Secure electronic commerce system - Google Patents
Secure electronic commerce system Download PDFInfo
- Publication number
- WO2000062232A1 WO2000062232A1 PCT/US2000/009774 US0009774W WO0062232A1 WO 2000062232 A1 WO2000062232 A1 WO 2000062232A1 US 0009774 W US0009774 W US 0009774W WO 0062232 A1 WO0062232 A1 WO 0062232A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- client
- server
- units
- media server
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
- G06Q20/1235—Shopping for digital content with control of digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/61—Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio
- H04L65/612—Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for unicast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/70—Media network packetisation
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/102—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for e-commerce
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
Definitions
- This invention relates to secure methods and systems for conducting electronic
- the technology also exists to convert these works into digital data that can be stored in memory in a computer or distributed via a network. This technology permits the
- CDs compact discs
- a four minute song recorded on a CD occupies approximately 40 Megabytes of
- MPEG 1 audio layer 3 which is more commonly known as MP3, defines how digital audio can
- These electronic devices typically store the MP3 encoded audio in a flash memory that allows non-volatile storage of the audio and allows
- the MP3 encoded audio to be erased or over written.
- Digital medial technologies such as MP3 facilitate the ability to distribute audio
- WWW Wood Wave
- music is distributed in album format which includes multiple tracks. There is no effective
- the present invention is directed to a method and system for distributing goods and audio, video and text works over a network, such as the Internet.
- the method and system is directed to a method and system for distributing goods and audio, video and text works over a network, such as the Internet.
- the system according to the present invention includes a server system which
- the server system can include storage memory for storing copies of the works to be distributed or alternatively the server system
- the server system can also include an electronic commerce system which is adapted for receiving value (payment) from the consumer or
- the electronic commerce system can receive
- the server system can also include an encryption system which allows the distributor to uniquely encrypt the works distributed to a consumer.
- the works can also include an encryption system which allows the distributor to uniquely encrypt the works distributed to a consumer.
- the server system can include an encryption key database which
- the unique key can also serve to allow the
- the client system according to the present invention can be adapted to interface
- system can include an encryption system which is uniquely adapted to decrypt the work
- the client system can incorporate the unique key from the server system.
- the client system can incorporate the unique key from the server system.
- the client system according to the present invention can be adapted to interface
- the server system maintains a unique encryption key which is embedded (or hard coded) into the client system.
- server system can verify the identity of the client system by requesting the client system to
- the server system can use the
- the same message can include other information such as
- verification methods can be used to verify the client system.
- a public key encryption system can be used to encrypt the
- system can further include a public key server which is adapted to transmit the server system's public key to the client and the client system's
- Digital signatures can be used by both the client system
- the client system can also include a media player adapted to
- the client could be a book. Alternatively, a separate media player could be used. As used herein, the client
- the client system can reside on a personal computer or the client system can be a combination of hardware and software that is configured or adapted to perform the functions described,
- the client and server systems can be part of a universal electronic commerce system.
- the client system can be a universal electronic commerce client to facilitate electronic
- the client can be any suitable client that can be used to satisfy resource requests.
- a network such as the Internet.
- the client can be any suitable network.
- the client can be any suitable client.
- the universal electronic commerce system can include several server systems which can reside on a single system or be distributed over a network, such as a virtual private network or the internet.
- This embodiment can include a retailer or distributor server which is adapted to interface with the client to
- the system can also include a key
- the key server is managed by an independent company, trusted industry organization, or the government.
- the system can further include a credit or debit account
- server which manages the various accounts, including the consumer account, the retailer
- debit account server can be managed by a credit card company, a bank or similar organization.
- key distribution and credit/debit functions can be
- the method according to the present invention can include the following steps:
- the consumer or customer can use the client system to establish a connection with the
- server system and the owner, distributor or retailer
- client system and server
- the server system interact to enable the consumer to register with the distributor or retailer such as providing the customer name, address, telephone and even credit card information.
- the server system generates a unique key for the client system and transmits the unique key to
- the client system to use in connection with transactions with the server system.
- the unique key is embedded into the software and/or hardware which makes up part of the client system, and is transmitted or delivered to the consumer.
- the client system which contains the unique key is now used in all subsequent transactions with the distributor or retailer server.
- the consumer uses the client system to purchase a work
- the client system can
- buttons typing a letter or word or transmitting information (such as credit/debit card or
- system can utilize the electronic commerce system to affect the transfer of value to the
- server system can encrypt the work using the consumer's unique key and transmit the work to the client system or in the case of hard goods or services, interact with other
- the method and system of the invention can use a public key encryption
- server system uses the consumer's public key to encrypt the work to
- the client system uses the client's private key to decrypt and use and enjoy the work.
- FIGURE 1 is a diagrammatic view of a system for distributing works over a
- FIGURE 2 is a diagrammatic view of an alternate system for distributing works over a network according to the present invention
- FIGURE 3 is a diagrammatic view of a method of operating a media server in
- FIGURE 4 is a diagrammatic view of a method of distributing low quality copies of a work according to the present invention:
- FIGURE 5 is a diagrammatic view of a method of distributing high quality copies
- FIGURE 6 is a diagrammatic view of a method of using a media player to decrypt
- FIGURE 7 is a diagrammatic view of a method of searching a database for a work
- FIGURE 8 is a diagrammatic view of a method of demonstrating a low quality
- FIGURE 9 is a diagrammatic view of a method of downloading a high quality copy
- FIGURE 10 is a diagrammatic view of method of purchasing a copy of a work
- FIGURE 11 is a diagrammatic view of a method of uploading music to a
- FIGURE 12 is a diagrammatic view of a method of transferring value in exchange
- FIGURE 13 is a diagrammatic view of a method of registering a client system with
- FIGURE 14 is a diagrammatic view of method of browsing a server system
- FIGURE 15 is a diagrammatic view of a universal electronic commerce for
- the present invention is directed to a method and system for conducting secure
- the method and system according to the invention allow customers to browse a list
- a Media Server a Media Server
- a Remote or client system customer
- a website and associated backend system a website and associated backend system.
- media server is primarily responsible for distributing music to users across the Internet.
- system server can be a physical machine connected to the Internet and the media server can include a computer program software that runs on one or more system servers.
- the remote or client system can include any device (such as, a computer, personal digital assistant or portable MP3 player) that can be used for searching, playing,
- the web site has a multi-purpose role.
- the web site is used for database maintenance and searching, credit card processing, and song playback.
- Each of these components utilize a database of information centrally stored on the system servers.
- Figure 1 shows a system 100 for distributing music over a network such as the
- the system 100 includes a media
- web server 110 such a Unix or LINUX based web server, for example Slackware Linux, installed on an Intel Corp. (Santa Clara, CA) or Digital Equipment Corporation/Compaq
- the media web server 110 is connected to the internet 105, for example by a Tl connection.
- the media web server 110 can include a database 114, such as a SQL compatible database
- media web server 110 can include a media server engine 112 which includes software
- the media web server which enables the media web server to distribute encoded music.
- an electronic commerce engine 116 such as a CyberCash CashRegister
- the media web server 110 can further include an encoding/decoding engine such as an MPEG
- encoding/decoding engine for converting audio such as music to various levels of quality
- MPEG encoding/decoding engine is Xaudio available from MPEGTV of San Francisco, California.
- Encryption engine is
- Another encryption/decryption engine can be a public key - private key system such as Pretty Good
- the system 100 can also include a customer computer system 120 to enable the customer/consumer to transfer payment to the distributor or owner and download music, videos or text.
- the customer computer system 120 can be any personal computer 122, such as an Apple Macintosh or an IBM compatible personal computer. In one
- the customer computer system 120 is an IBM compatible personal computer
- the customer computer system 120 can also include Netscape
- the browser can be equipped with a media
- the media player 124 can decrypt and decode the encrypted, MP3 encoded work (music, video or text stream) to allow the user to utilize the work.
- the media player 124 can be a stand
- the system 100 can further include an author/artist system 130 which can permit
- This function can be incorporated in the media player 124 on the same system that is
- the author/artist system 130 can be any computer, such as an Apple Macintosh or an IBM compatible
- Figure 2 shows an alternative system 200 for distributing music (audio, video or
- the functions of the media web server described above can be distributed over several server systems 210 and 211.
- the an incoming media server 211 can be provided for uploading works such as music, videos and text to a common database 214 and an
- outgoing media web server 210 can be provided for distributing low quality music (for browsing) and high quality music (for purchases) to customers.
- server 210 can include a media server engine 212 to distribute music and an electronic commerce engine 216 to facilitate electronic transactions.
- the outgoing media server 210 can include a media server engine 212 to distribute music and an electronic commerce engine 216 to facilitate electronic transactions.
- the encryption engine 218 can also include the encryption engine 218 and a key database which allows the high quality music to be encrypted prior to being transferred to the customer system 220 to
- the media server is a central
- the media server is primarily responsible for distributing music to
- the media server can run on one or more system servers connected to the Internet.
- the media server is continuously running; it waits for requests from
- the media server determines whether the received request is a request to browse or preview a song (low quality) or a request to purchase a song (high quality) at step 312.
- the media server will initiate a process to transmit a high quality stream at step 316 or a low quality stream at step 318.
- the media server will initiate a process to transmit a high quality stream at step 316 or a low quality stream at step 318.
- the media server will initiate a process to transmit a high quality stream at step 316 or a low quality stream at step 318.
- the media server will initiate a process to transmit a high quality stream at step 316 or a low quality stream at step 318.
- the media server will initiate a process to transmit a high quality stream at step 316 or a low quality stream at step 318.
- the media server seems to be limited only by the available hardware.
- the media server responds by creating a new process to serve the request at
- step 412. This process identifies the stream requested and opens the appropriate low
- the media server then begins to send the file in packets across the Internet to the remote client at step 416. This process continues
- the server reacts responds in a similar manner.
- the server again creates a new process to handle the request at step 512. Because this file will be written to disk for
- the file is opened at step 514 and the file is encrypted so it can not be
- the remote client can be a program that resides on the user's computer.
- remote client can include the functionality to play MPEG or any other encoded music file, search the music database at the website, request music streams from the media server,
- a custom version of the registered player client is downloaded to the user's computer.
- Song playback is handled by song lists at the remote client.
- a customer can create
- the remote client checks to see if the file is a local file at step 612 and if so, the remote opens the file at step 622, and passes it to the MPEG decoder.
- the decoder takes the file and decompresses it for playback, and then plays it. If the song is a purchased audio file
- the file is first decrypted at step 620 and then passed to the decoder at step 618.
- the remote client initializes a process to download a low quality stream at step 614.
- the MPEG encoder/decoder is the X audio MPEG audio engine available from MPEGTV, LLC of
- the song lists used by the remote client can be created from local files, or streams
- the remote client When a customer enters a query, by band name for example, the remote client must pass the request to the system server.
- the remote client connects to
- the media server can establish a separate connection to the remote client for the purpose of transmitting the music data to the remote client.
- the remote client receives the information from the media server, it is passed to the MPEG
- the low quality stream is a
- step 918 from the media server, the process is similar to a browse.
- a high quality stream is initiated in step 912 and the song is downloaded.
- a purchased song is
- step 914 This allows the customer to listen to the file without the need to be connected to the Internet.
- the high quality stream is a 128kb/ s , 44.1KHz MP3 encoded stream or better quality.
- customers can purchase songs with the remote client.
- Customers must first purchase points from the web site before purchasing songs.
- the remote handles the transaction.
- a connection is established to the database on the system server in step 1012.
- the remote client checks the database for points to purchase the song at step 1014. If a customer has points
- the number of points is automatically updated in the database at step 1016.
- step 1020 the database connection is closed at step 1022, and the remote client initiates a high quality stream from the media server at step 1024. If the customer doesn't have
- step 1016 the customer is informed of the deficiency and the process is terminated at step 1018.
- the musician needs only a high quality audio file such as a 128 kb/s,
- the musician can be prompted to select the items to be uploaded at step 1110 and to input
- This information can be stored and later used in
- the remote client then connects to the database at step 1114, updates the information in the database at step 1116, and uploads the file to the system server at step 1118. After the song upload is complete, the database connection is closed
- step 1120 Once the file is saved on the server, a separate process can be used to create
- the low quality file at step 1122.
- the high quality file is decoded into .wav
- the web site provides a range of functionality to both customers and musicians.
- Some of the functions the web site can perform are: (1) To collect a variety of user information, (2) Credit card processing, (3) Client registration, and (4) Generating listings from search of the database. Information can be collected throughout the web site using
- Client registration provides the customer with a fully functional remote client that can be used to purchase music.
- One portion of the e-commerce system is credit card processing. As shown in
- FIGURE 12 when the customer purchases points, the customer must select a payment
- step 1210 and enter the transaction information such as credit card information to complete the transaction at step 1212.
- Points can be used to purchase songs.
- the credit card processing pages use secure sockets (SSL) to handle the SSL.
- SSL secure sockets
- the web site sends the appropriate information to a 3 rd party service for authentication at step 1214.
- a response is received from the authentication service,
- the program updates the database at step 1220
- a customer must have a registered remote client to purchase high quality files. As shown in FIGURE 13, when a customer wishes to register at step 1310, they provide
- a custom registered remote client program is then created with the appropriate registration information and sent to the customer at step 1318.
- the artist and band listings provide the customer with the ability to locate artists and bands based upon a variety of criteria.
- the artist/band listing is maintained by the
- the backend sends the request to the database.
- a customer can also initialize a browse
- the web backend sends a file associated with the remote to the user's web browser at step 1410.
- step 1412. When the web browser receives this file, it automatically launches the remote
- This file contains instructions that initiate a low quality stream of the song selected from the web site.
- Figure 15 shows a system 1500 for conducting electronic commerce over the
- the client 1550 can include a web browser 1554 which is configured to include a unique encryption key or other unique identifier 1556 which is used for all
- the retail web server 1530 can include any computer server coupled to a retailer/distributor database 1532 that is used in electronic transactions for the sale of goods, services or the distribution of audio, video or
- the system 1500 can also include a key encryption system in which the client's unique private key is stored in an independent, trusted public key server 1520 and associated key database 1522 which can only accessed by authorized retailer or distributor servers.
- the system 1500 can also include a credit/debit web server 1510 which permits the customer to establish an account and provides for the transfer of value (payment) in exchange for works downloaded.
- the credit/debit web server 1510 can include a credit/debit database 1512 in which customer, retailer, distributor and owner accounts can
- the system of the present invention can be used to distribute works (audio, video or text) in a business to business context as well as a business to consumer or customer context.
- music can be distributed for use in offices, waiting rooms and elevators using the above identified system.
- the music can be downloaded as needed based on a predefined program or downloaded and stored for later playback according to a predefined program.
- the browse mode can be used to receive predefined or random streams of music for use in offices, waiting rooms or elevators, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Software Systems (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Economics (AREA)
- Marketing (AREA)
- Computing Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Priority Applications (5)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| HK03104800.9A HK1052568A1 (en) | 1999-04-12 | 2000-04-12 | Secure electronic commerce system |
| EP00922112A EP1272948A1 (en) | 1999-04-12 | 2000-04-12 | Secure electronic commerce system |
| CA002368858A CA2368858A1 (en) | 1999-04-12 | 2000-04-12 | Secure electronic commerce system |
| AU42348/00A AU4234800A (en) | 1999-04-12 | 2000-04-12 | Secure electronic commerce system |
| JP2000611226A JP2004500613A (en) | 1999-04-12 | 2000-04-12 | Secure e-commerce system |
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12884699P | 1999-04-12 | 1999-04-12 | |
| US60/128,846 | 1999-04-12 | ||
| US54681300A | 2000-04-11 | 2000-04-11 | |
| US09/546,813 | 2000-04-11 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2000062232A1 true WO2000062232A1 (en) | 2000-10-19 |
Family
ID=26826999
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2000/009774 WO2000062232A1 (en) | 1999-04-12 | 2000-04-12 | Secure electronic commerce system |
Country Status (6)
| Country | Link |
|---|---|
| EP (1) | EP1272948A1 (en) |
| JP (1) | JP2004500613A (en) |
| AU (1) | AU4234800A (en) |
| CA (1) | CA2368858A1 (en) |
| HK (1) | HK1052568A1 (en) |
| WO (1) | WO2000062232A1 (en) |
Cited By (86)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2001088675A1 (en) * | 2000-05-12 | 2001-11-22 | Clark James R | Secured internet media player |
| GB2366640A (en) * | 2000-03-30 | 2002-03-13 | Ibm | Distribution of security and/or vulnerability information |
| WO2001055810A3 (en) * | 2000-01-25 | 2002-03-14 | Alan M Metcalfe | Electronic activity and business system and method |
| WO2001075563A3 (en) * | 2000-03-31 | 2002-05-23 | Intel Corp | Generating a key hierarchy for use in an isolated execution environment |
| GB2371898A (en) * | 2001-02-02 | 2002-08-07 | Stom C & C Inc | Preventing unauthorised distribution of digital material (eg music) through a communication network by encryption or watermarking of any material found |
| WO2002023311A3 (en) * | 2000-09-12 | 2002-09-12 | Nokia Corp | Method and system for managing rights in digital information over a network |
| GB2373609A (en) * | 2001-03-19 | 2002-09-25 | Stom C & C Inc | Sharing of digital literary works over a network with protection against illegal copying. |
| GB2377042A (en) * | 2001-06-26 | 2002-12-31 | Nokia Corp | Identification of a data entity |
| US6507904B1 (en) | 2000-03-31 | 2003-01-14 | Intel Corporation | Executing isolated mode instructions in a secure system running in privilege rings |
| WO2002035331A3 (en) * | 2000-10-27 | 2003-01-23 | James R Clark | Copy-protection system and method |
| WO2002046979A3 (en) * | 2000-12-04 | 2003-08-14 | David Beran | Method of use of a system solution for e-business and access to data stream sources |
| US6633963B1 (en) | 2000-03-31 | 2003-10-14 | Intel Corporation | Controlling access to multiple memory zones in an isolated execution environment |
| US6678825B1 (en) | 2000-03-31 | 2004-01-13 | Intel Corporation | Controlling access to multiple isolated memories in an isolated execution environment |
| US6795905B1 (en) | 2000-03-31 | 2004-09-21 | Intel Corporation | Controlling accesses to isolated memory using a memory controller for isolated execution |
| EP1421513A4 (en) * | 2001-07-19 | 2004-10-20 | Gregg S Homer | Rechargeable media distribution and play system |
| US6907600B2 (en) | 2000-12-27 | 2005-06-14 | Intel Corporation | Virtual translation lookaside buffer |
| US6934817B2 (en) | 2000-03-31 | 2005-08-23 | Intel Corporation | Controlling access to multiple memory zones in an isolated execution environment |
| US6941458B1 (en) | 2000-03-31 | 2005-09-06 | Intel Corporation | Managing a secure platform using a hierarchical executive architecture in isolated execution mode |
| US6976162B1 (en) | 2000-06-28 | 2005-12-13 | Intel Corporation | Platform and method for establishing provable identities while maintaining privacy |
| WO2006000029A1 (en) * | 2004-06-23 | 2006-01-05 | Telstra Corporation Limited | Content delivery system and player |
| US6986052B1 (en) | 2000-06-30 | 2006-01-10 | Intel Corporation | Method and apparatus for secure execution using a secure memory partition |
| US6990579B1 (en) | 2000-03-31 | 2006-01-24 | Intel Corporation | Platform and method for remote attestation of a platform |
| US6996748B2 (en) | 2002-06-29 | 2006-02-07 | Intel Corporation | Handling faults associated with operation of guest software in the virtual-machine architecture |
| US6996710B1 (en) | 2000-03-31 | 2006-02-07 | Intel Corporation | Platform and method for issuing and certifying a hardware-protected attestation key |
| EP1632943A2 (en) | 2004-09-02 | 2006-03-08 | LG Electronics Inc. | Method of preventing multimedia copy |
| US7013484B1 (en) | 2000-03-31 | 2006-03-14 | Intel Corporation | Managing a secure environment using a chipset in isolated execution mode |
| US7013481B1 (en) | 2000-03-31 | 2006-03-14 | Intel Corporation | Attestation key memory device and bus |
| US7020738B2 (en) | 2000-12-27 | 2006-03-28 | Intel Corporation | Method for resolving address space conflicts between a virtual machine monitor and a guest operating system |
| US7024555B2 (en) | 2001-11-01 | 2006-04-04 | Intel Corporation | Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment |
| US7028149B2 (en) | 2002-03-29 | 2006-04-11 | Intel Corporation | System and method for resetting a platform configuration register |
| US7058807B2 (en) | 2002-04-15 | 2006-06-06 | Intel Corporation | Validation of inclusion of a platform within a data center |
| US7069442B2 (en) | 2002-03-29 | 2006-06-27 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
| US7073042B2 (en) | 2002-12-12 | 2006-07-04 | Intel Corporation | Reclaiming existing fields in address translation data structures to extend control over memory accesses |
| US7073071B1 (en) | 2000-03-31 | 2006-07-04 | Intel Corporation | Platform and method for generating and utilizing a protected audit log |
| US7076669B2 (en) | 2002-04-15 | 2006-07-11 | Intel Corporation | Method and apparatus for communicating securely with a token |
| US7076802B2 (en) | 2002-12-31 | 2006-07-11 | Intel Corporation | Trusted system clock |
| WO2005101965A3 (en) * | 2004-03-25 | 2006-07-20 | Nat Univ Ireland | Secure digital content reproduction using biometrically derived hybrid encryption techniques |
| US7082615B1 (en) | 2000-03-31 | 2006-07-25 | Intel Corporation | Protecting software environment in isolated execution |
| US7089418B1 (en) | 2000-03-31 | 2006-08-08 | Intel Corporation | Managing accesses in a processor for isolated execution |
| US7096497B2 (en) | 2001-03-30 | 2006-08-22 | Intel Corporation | File checking using remote signing authority via a network |
| US7103771B2 (en) | 2001-12-17 | 2006-09-05 | Intel Corporation | Connecting a virtual token to a physical token |
| US7111176B1 (en) | 2000-03-31 | 2006-09-19 | Intel Corporation | Generating isolated bus cycles for isolated execution |
| US7117376B2 (en) | 2000-12-28 | 2006-10-03 | Intel Corporation | Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations |
| US7124327B2 (en) | 2002-06-29 | 2006-10-17 | Intel Corporation | Control over faults occurring during the operation of guest software in the virtual-machine architecture |
| US7127548B2 (en) | 2002-04-16 | 2006-10-24 | Intel Corporation | Control register access virtualization performance improvement in the virtual-machine architecture |
| US7139890B2 (en) | 2002-04-30 | 2006-11-21 | Intel Corporation | Methods and arrangements to interface memory |
| US7142674B2 (en) | 2002-06-18 | 2006-11-28 | Intel Corporation | Method of confirming a secure key exchange |
| US7165181B2 (en) | 2002-11-27 | 2007-01-16 | Intel Corporation | System and method for establishing trust without revealing identity |
| US7177967B2 (en) | 2003-09-30 | 2007-02-13 | Intel Corporation | Chipset support for managing hardware interrupts in a virtual machine system |
| US7191440B2 (en) | 2001-08-15 | 2007-03-13 | Intel Corporation | Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor |
| US7194634B2 (en) | 2000-03-31 | 2007-03-20 | Intel Corporation | Attestation key memory device and bus |
| US7215781B2 (en) | 2000-12-22 | 2007-05-08 | Intel Corporation | Creation and distribution of a secret value between two devices |
| US7225441B2 (en) | 2000-12-27 | 2007-05-29 | Intel Corporation | Mechanism for providing power management through virtualization |
| US7237051B2 (en) | 2003-09-30 | 2007-06-26 | Intel Corporation | Mechanism to control hardware interrupt acknowledgement in a virtual machine system |
| US7272831B2 (en) | 2001-03-30 | 2007-09-18 | Intel Corporation | Method and apparatus for constructing host processor soft devices independent of the host processor operating system |
| US7287197B2 (en) | 2003-09-15 | 2007-10-23 | Intel Corporation | Vectoring an interrupt or exception upon resuming operation of a virtual machine |
| US7296267B2 (en) | 2002-07-12 | 2007-11-13 | Intel Corporation | System and method for binding virtual machines to hardware contexts |
| US7305592B2 (en) | 2004-06-30 | 2007-12-04 | Intel Corporation | Support for nested fault in a virtual machine environment |
| US7308576B2 (en) | 2001-12-31 | 2007-12-11 | Intel Corporation | Authenticated code module |
| US7318235B2 (en) | 2002-12-16 | 2008-01-08 | Intel Corporation | Attestation using both fixed token and portable token |
| US7318141B2 (en) | 2002-12-17 | 2008-01-08 | Intel Corporation | Methods and systems to control virtual machines |
| US7356817B1 (en) | 2000-03-31 | 2008-04-08 | Intel Corporation | Real-time scheduling of virtual machines |
| US7356735B2 (en) | 2004-03-30 | 2008-04-08 | Intel Corporation | Providing support for single stepping a virtual machine in a virtual machine environment |
| US7366849B2 (en) | 2002-06-12 | 2008-04-29 | Intel Corporation | Protected configuration space in a protected environment |
| US7389427B1 (en) | 2000-09-28 | 2008-06-17 | Intel Corporation | Mechanism to secure computer output from software attack using isolated execution |
| US7392415B2 (en) | 2002-06-26 | 2008-06-24 | Intel Corporation | Sleep protection |
| US7395405B2 (en) | 2005-01-28 | 2008-07-01 | Intel Corporation | Method and apparatus for supporting address translation in a virtual machine environment |
| US7415708B2 (en) | 2003-06-26 | 2008-08-19 | Intel Corporation | Virtual machine management using processor state information |
| US7424709B2 (en) | 2003-09-15 | 2008-09-09 | Intel Corporation | Use of multiple virtual machine monitors to handle privileged events |
| US7480806B2 (en) | 2002-02-22 | 2009-01-20 | Intel Corporation | Multi-token seal and unseal |
| US7490070B2 (en) | 2004-06-10 | 2009-02-10 | Intel Corporation | Apparatus and method for proving the denial of a direct proof signature |
| CN100483392C (en) * | 2002-11-21 | 2009-04-29 | 株式会社Ntt都科摩 | System and Method for Electronic Purchase |
| US7610611B2 (en) | 2003-09-19 | 2009-10-27 | Moran Douglas R | Prioritized address decoder |
| US7620949B2 (en) | 2004-03-31 | 2009-11-17 | Intel Corporation | Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment |
| US20090290024A1 (en) * | 2008-05-21 | 2009-11-26 | Larson Bradley R | Providing live event media content to spectators |
| US7631196B2 (en) | 2002-02-25 | 2009-12-08 | Intel Corporation | Method and apparatus for loading a trustable operating system |
| US7636844B2 (en) | 2003-11-17 | 2009-12-22 | Intel Corporation | Method and system to provide a trusted channel within a computer system for a SIM device |
| US7809957B2 (en) | 2005-09-29 | 2010-10-05 | Intel Corporation | Trusted platform module for generating sealed data |
| CN101933287A (en) * | 2007-08-08 | 2010-12-29 | 黄金富 | Encryption authentication device and method for anti-trojan horse program disposable one-time key |
| US8458464B2 (en) | 2000-09-28 | 2013-06-04 | Intel Corporation | Mechanism to handle events in a machine with isolated execution |
| US8533777B2 (en) | 2004-12-29 | 2013-09-10 | Intel Corporation | Mechanism to determine trust of out-of-band management agents |
| US8543772B2 (en) | 2003-09-30 | 2013-09-24 | Intel Corporation | Invalidating translation lookaside buffer entries in a virtual machine (VM) system |
| US8924728B2 (en) | 2004-11-30 | 2014-12-30 | Intel Corporation | Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information |
| US9009483B2 (en) | 2003-12-22 | 2015-04-14 | Intel Corporation | Replacing blinded authentication authority |
| US9087000B2 (en) | 2003-11-26 | 2015-07-21 | Intel Corporation | Accessing private data about the state of a data processing machine from storage that is publicly accessible |
| US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4390122B2 (en) * | 2001-03-14 | 2009-12-24 | 富士通株式会社 | User authentication system using biometric information |
| CN106161523B (en) * | 2015-04-02 | 2019-11-22 | 腾讯科技(深圳)有限公司 | A kind of data processing method and equipment |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0843449A2 (en) * | 1996-11-08 | 1998-05-20 | Sunhawk Corporation, Inc. | Encryption system with transaction coded decryption key |
-
2000
- 2000-04-12 HK HK03104800.9A patent/HK1052568A1/en unknown
- 2000-04-12 AU AU42348/00A patent/AU4234800A/en not_active Abandoned
- 2000-04-12 JP JP2000611226A patent/JP2004500613A/en not_active Withdrawn
- 2000-04-12 CA CA002368858A patent/CA2368858A1/en not_active Abandoned
- 2000-04-12 WO PCT/US2000/009774 patent/WO2000062232A1/en not_active Application Discontinuation
- 2000-04-12 EP EP00922112A patent/EP1272948A1/en not_active Withdrawn
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP0843449A2 (en) * | 1996-11-08 | 1998-05-20 | Sunhawk Corporation, Inc. | Encryption system with transaction coded decryption key |
Non-Patent Citations (5)
| Title |
|---|
| BALASUBRAMANIAN R ET AL: "TOWARD OBJECT-WEB BASED SERVICE PROVIDER INFRASTRUCTURE FOR E-COMMERCE TRANSACTIONS", ISS. WORLD TELECOMMUNICATIONS CONGRESS. (INTERNATIONAL SWITCHING SYMPOSIUM),CA,TORONTO, PINNACLE GROUP, 21 September 1997 (1997-09-21), pages 105 - 112, XP000704461 * |
| CHOUDHURY A K ET AL: "COPYRIGHT PROTECTION FOR ELECTRONIC PUBLISHING OVER COMPUTER NETWORKS", IEEE NETWORK: THE MAGAZINE OF COMPUTER COMMUNICATIONS,US,IEEE INC. NEW YORK, vol. 9, no. 3, 1 May 1995 (1995-05-01), pages 12 - 20, XP000505280, ISSN: 0890-8044 * |
| ME L ET AL: "LE COMMERCE ELECTRONIQUE: UN ETAT DE L'ART", ANNALES DES TELECOMMUNICATIONS - ANNALS OF TELECOMMUNICATIONS,CH,PRE SSES POLYTECHNIQUES ET UNIVERSITAIRES ROMANDES, LAUSANNE, vol. 53, no. 9/10, 1 September 1998 (1998-09-01), pages 361 - 376, XP000791619, ISSN: 0003-4347 * |
| NAGASAKA A ET AL: "GENERAL PURPOSE MEDIA SERVER CONFORMING TO DAVIC: OKI MEDIA SERVER V2", OKI TECHNICAL REVIEW,JP,OKI ELECTRIC INDUSTRY, TOKYO, vol. 63, no. 159, 1 July 1997 (1997-07-01), pages 11 - 16, XP000699912, ISSN: 0912-5566 * |
| SOMOGYI S: "MP3: A NEW AUDIO POWER - BUT WHOSE ?", AUDIO,US,AUDIO. PHILADELPHIA, vol. 82, no. 11, November 1998 (1998-11-01), pages 20,22, XP000791991, ISSN: 0004-752X * |
Cited By (128)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7877412B2 (en) | 2000-01-18 | 2011-01-25 | Homer Gregg S | Rechargeable media distribution and play system |
| US8832149B2 (en) | 2000-01-18 | 2014-09-09 | Gregg S. Homer | Method for subscription media on-demand |
| US9031985B2 (en) | 2000-01-18 | 2015-05-12 | B# On Demand, Llc | More subscription media on demand |
| US9330242B2 (en) | 2000-01-18 | 2016-05-03 | Gregg S. Homer | Even more subscription media on demand |
| WO2001055810A3 (en) * | 2000-01-25 | 2002-03-14 | Alan M Metcalfe | Electronic activity and business system and method |
| US7496529B2 (en) | 2000-01-25 | 2009-02-24 | Alan Metcalfe | Electronic activity and business system and method |
| US7233915B2 (en) | 2000-01-25 | 2007-06-19 | Alan Metcalfe | Electronic activity and business system and method |
| GB2366640B (en) * | 2000-03-30 | 2004-12-29 | Ibm | Distribution of activation information |
| GB2366640A (en) * | 2000-03-30 | 2002-03-13 | Ibm | Distribution of security and/or vulnerability information |
| US7516490B2 (en) | 2000-03-30 | 2009-04-07 | International Business Machines Corporation | System, method and software for supplying activation information to a subsystem |
| US7085935B1 (en) | 2000-03-31 | 2006-08-01 | Intel Corporation | Managing a secure environment using a chipset in isolated execution mode |
| US7356817B1 (en) | 2000-03-31 | 2008-04-08 | Intel Corporation | Real-time scheduling of virtual machines |
| WO2001075563A3 (en) * | 2000-03-31 | 2002-05-23 | Intel Corp | Generating a key hierarchy for use in an isolated execution environment |
| US6633963B1 (en) | 2000-03-31 | 2003-10-14 | Intel Corporation | Controlling access to multiple memory zones in an isolated execution environment |
| US6678825B1 (en) | 2000-03-31 | 2004-01-13 | Intel Corporation | Controlling access to multiple isolated memories in an isolated execution environment |
| GB2378794B (en) * | 2000-03-31 | 2004-07-28 | Intel Corp | Generating a key hierarchy for use in an isolated execution environment |
| US6795905B1 (en) | 2000-03-31 | 2004-09-21 | Intel Corporation | Controlling accesses to isolated memory using a memory controller for isolated execution |
| US6507904B1 (en) | 2000-03-31 | 2003-01-14 | Intel Corporation | Executing isolated mode instructions in a secure system running in privilege rings |
| GB2378794A (en) * | 2000-03-31 | 2003-02-19 | Intel Corp | Generating a key hierarchy for use in an isolated execution environment |
| US7194634B2 (en) | 2000-03-31 | 2007-03-20 | Intel Corporation | Attestation key memory device and bus |
| US6934817B2 (en) | 2000-03-31 | 2005-08-23 | Intel Corporation | Controlling access to multiple memory zones in an isolated execution environment |
| US6941458B1 (en) | 2000-03-31 | 2005-09-06 | Intel Corporation | Managing a secure platform using a hierarchical executive architecture in isolated execution mode |
| US6957332B1 (en) | 2000-03-31 | 2005-10-18 | Intel Corporation | Managing a secure platform using a hierarchical executive architecture in isolated execution mode |
| US7111176B1 (en) | 2000-03-31 | 2006-09-19 | Intel Corporation | Generating isolated bus cycles for isolated execution |
| US7089418B1 (en) | 2000-03-31 | 2006-08-08 | Intel Corporation | Managing accesses in a processor for isolated execution |
| US7082615B1 (en) | 2000-03-31 | 2006-07-25 | Intel Corporation | Protecting software environment in isolated execution |
| US6990579B1 (en) | 2000-03-31 | 2006-01-24 | Intel Corporation | Platform and method for remote attestation of a platform |
| US7073071B1 (en) | 2000-03-31 | 2006-07-04 | Intel Corporation | Platform and method for generating and utilizing a protected audit log |
| US7013481B1 (en) | 2000-03-31 | 2006-03-14 | Intel Corporation | Attestation key memory device and bus |
| US6996710B1 (en) | 2000-03-31 | 2006-02-07 | Intel Corporation | Platform and method for issuing and certifying a hardware-protected attestation key |
| US7013484B1 (en) | 2000-03-31 | 2006-03-14 | Intel Corporation | Managing a secure environment using a chipset in isolated execution mode |
| WO2001088675A1 (en) * | 2000-05-12 | 2001-11-22 | Clark James R | Secured internet media player |
| US6976162B1 (en) | 2000-06-28 | 2005-12-13 | Intel Corporation | Platform and method for establishing provable identities while maintaining privacy |
| US7516330B2 (en) | 2000-06-28 | 2009-04-07 | Intel Corporation | Platform and method for establishing provable identities while maintaining privacy |
| US9323954B2 (en) | 2000-06-30 | 2016-04-26 | Intel Corporation | Method and apparatus for secure execution using a secure memory partition |
| US9547779B2 (en) | 2000-06-30 | 2017-01-17 | Intel Corporation | Method and apparatus for secure execution using a secure memory partition |
| US9619672B2 (en) | 2000-06-30 | 2017-04-11 | Intel Corporation | Method and apparatus for secure execution using a secure memory partition |
| US9971909B2 (en) | 2000-06-30 | 2018-05-15 | Intel Corporation | Method and apparatus for secure execution using a secure memory partition |
| US7822979B2 (en) | 2000-06-30 | 2010-10-26 | Intel Corporation | Method and apparatus for secure execution using a secure memory partition |
| US6986052B1 (en) | 2000-06-30 | 2006-01-10 | Intel Corporation | Method and apparatus for secure execution using a secure memory partition |
| US9507962B2 (en) | 2000-06-30 | 2016-11-29 | Intel Corporation | Method and apparatus for secure execution using a secure memory partition |
| US9305183B2 (en) | 2000-06-30 | 2016-04-05 | Intel Corporation | Method and apparatus for secure execution using a secure memory partition |
| US8549275B2 (en) | 2000-06-30 | 2013-10-01 | Intel Corporation | Method and apparatus for secure execution using a secure memory partition |
| US9507963B2 (en) | 2000-06-30 | 2016-11-29 | Intel Corporation | Method and apparatus for secure execution using a secure memory partition |
| US10572689B2 (en) | 2000-06-30 | 2020-02-25 | Intel Corporation | Method and apparatus for secure execution using a secure memory partition |
| US6993131B1 (en) | 2000-09-12 | 2006-01-31 | Nokia Corporation | Method and system for managing rights in digital information over a network |
| US7986782B2 (en) | 2000-09-12 | 2011-07-26 | Nokia Corporation | Method and system for managing rights in digital information over a network |
| WO2002023311A3 (en) * | 2000-09-12 | 2002-09-12 | Nokia Corp | Method and system for managing rights in digital information over a network |
| US7389427B1 (en) | 2000-09-28 | 2008-06-17 | Intel Corporation | Mechanism to secure computer output from software attack using isolated execution |
| US8458464B2 (en) | 2000-09-28 | 2013-06-04 | Intel Corporation | Mechanism to handle events in a machine with isolated execution |
| WO2002035331A3 (en) * | 2000-10-27 | 2003-01-23 | James R Clark | Copy-protection system and method |
| WO2002046979A3 (en) * | 2000-12-04 | 2003-08-14 | David Beran | Method of use of a system solution for e-business and access to data stream sources |
| US7215781B2 (en) | 2000-12-22 | 2007-05-08 | Intel Corporation | Creation and distribution of a secret value between two devices |
| US6907600B2 (en) | 2000-12-27 | 2005-06-14 | Intel Corporation | Virtual translation lookaside buffer |
| US7035963B2 (en) | 2000-12-27 | 2006-04-25 | Intel Corporation | Method for resolving address space conflicts between a virtual machine monitor and a guest operating system |
| US7313669B2 (en) | 2000-12-27 | 2007-12-25 | Intel Corporation | Virtual translation lookaside buffer |
| US7020738B2 (en) | 2000-12-27 | 2006-03-28 | Intel Corporation | Method for resolving address space conflicts between a virtual machine monitor and a guest operating system |
| US7225441B2 (en) | 2000-12-27 | 2007-05-29 | Intel Corporation | Mechanism for providing power management through virtualization |
| US7117376B2 (en) | 2000-12-28 | 2006-10-03 | Intel Corporation | Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations |
| GB2371898B (en) * | 2001-02-02 | 2003-05-07 | Stom C & C Inc | Method of preventing reduction of record sales due to digital music files being illegally distributed through a communication network |
| GB2371898A (en) * | 2001-02-02 | 2002-08-07 | Stom C & C Inc | Preventing unauthorised distribution of digital material (eg music) through a communication network by encryption or watermarking of any material found |
| GB2373609A (en) * | 2001-03-19 | 2002-09-25 | Stom C & C Inc | Sharing of digital literary works over a network with protection against illegal copying. |
| US7096497B2 (en) | 2001-03-30 | 2006-08-22 | Intel Corporation | File checking using remote signing authority via a network |
| US7272831B2 (en) | 2001-03-30 | 2007-09-18 | Intel Corporation | Method and apparatus for constructing host processor soft devices independent of the host processor operating system |
| GB2377042A (en) * | 2001-06-26 | 2002-12-31 | Nokia Corp | Identification of a data entity |
| EP1421513A4 (en) * | 2001-07-19 | 2004-10-20 | Gregg S Homer | Rechargeable media distribution and play system |
| US7191440B2 (en) | 2001-08-15 | 2007-03-13 | Intel Corporation | Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor |
| US7024555B2 (en) | 2001-11-01 | 2006-04-04 | Intel Corporation | Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment |
| US7103771B2 (en) | 2001-12-17 | 2006-09-05 | Intel Corporation | Connecting a virtual token to a physical token |
| US7308576B2 (en) | 2001-12-31 | 2007-12-11 | Intel Corporation | Authenticated code module |
| US7480806B2 (en) | 2002-02-22 | 2009-01-20 | Intel Corporation | Multi-token seal and unseal |
| US7631196B2 (en) | 2002-02-25 | 2009-12-08 | Intel Corporation | Method and apparatus for loading a trustable operating system |
| US7069442B2 (en) | 2002-03-29 | 2006-06-27 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
| US9361121B2 (en) | 2002-03-29 | 2016-06-07 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
| US7028149B2 (en) | 2002-03-29 | 2006-04-11 | Intel Corporation | System and method for resetting a platform configuration register |
| US9990208B2 (en) | 2002-03-29 | 2018-06-05 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
| US8185734B2 (en) | 2002-03-29 | 2012-05-22 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
| US7546457B2 (en) | 2002-03-29 | 2009-06-09 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
| US10042649B2 (en) | 2002-03-29 | 2018-08-07 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
| US10031759B2 (en) | 2002-03-29 | 2018-07-24 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
| US8645688B2 (en) | 2002-03-29 | 2014-02-04 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
| US10175994B2 (en) | 2002-03-29 | 2019-01-08 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
| US7058807B2 (en) | 2002-04-15 | 2006-06-06 | Intel Corporation | Validation of inclusion of a platform within a data center |
| US7076669B2 (en) | 2002-04-15 | 2006-07-11 | Intel Corporation | Method and apparatus for communicating securely with a token |
| US7127548B2 (en) | 2002-04-16 | 2006-10-24 | Intel Corporation | Control register access virtualization performance improvement in the virtual-machine architecture |
| US7139890B2 (en) | 2002-04-30 | 2006-11-21 | Intel Corporation | Methods and arrangements to interface memory |
| US7366849B2 (en) | 2002-06-12 | 2008-04-29 | Intel Corporation | Protected configuration space in a protected environment |
| US7142674B2 (en) | 2002-06-18 | 2006-11-28 | Intel Corporation | Method of confirming a secure key exchange |
| US7392415B2 (en) | 2002-06-26 | 2008-06-24 | Intel Corporation | Sleep protection |
| US7124327B2 (en) | 2002-06-29 | 2006-10-17 | Intel Corporation | Control over faults occurring during the operation of guest software in the virtual-machine architecture |
| US6996748B2 (en) | 2002-06-29 | 2006-02-07 | Intel Corporation | Handling faults associated with operation of guest software in the virtual-machine architecture |
| US7296267B2 (en) | 2002-07-12 | 2007-11-13 | Intel Corporation | System and method for binding virtual machines to hardware contexts |
| CN100483392C (en) * | 2002-11-21 | 2009-04-29 | 株式会社Ntt都科摩 | System and Method for Electronic Purchase |
| US7454611B2 (en) | 2002-11-27 | 2008-11-18 | Intel Corporation | System and method for establishing trust without revealing identity |
| US7165181B2 (en) | 2002-11-27 | 2007-01-16 | Intel Corporation | System and method for establishing trust without revealing identity |
| US7073042B2 (en) | 2002-12-12 | 2006-07-04 | Intel Corporation | Reclaiming existing fields in address translation data structures to extend control over memory accesses |
| US7318235B2 (en) | 2002-12-16 | 2008-01-08 | Intel Corporation | Attestation using both fixed token and portable token |
| US7318141B2 (en) | 2002-12-17 | 2008-01-08 | Intel Corporation | Methods and systems to control virtual machines |
| US7076802B2 (en) | 2002-12-31 | 2006-07-11 | Intel Corporation | Trusted system clock |
| US7415708B2 (en) | 2003-06-26 | 2008-08-19 | Intel Corporation | Virtual machine management using processor state information |
| US7424709B2 (en) | 2003-09-15 | 2008-09-09 | Intel Corporation | Use of multiple virtual machine monitors to handle privileged events |
| US7287197B2 (en) | 2003-09-15 | 2007-10-23 | Intel Corporation | Vectoring an interrupt or exception upon resuming operation of a virtual machine |
| US7610611B2 (en) | 2003-09-19 | 2009-10-27 | Moran Douglas R | Prioritized address decoder |
| US7302511B2 (en) | 2003-09-30 | 2007-11-27 | Intel Corporation | Chipset support for managing hardware interrupts in a virtual machine system |
| US8543772B2 (en) | 2003-09-30 | 2013-09-24 | Intel Corporation | Invalidating translation lookaside buffer entries in a virtual machine (VM) system |
| US8751752B2 (en) | 2003-09-30 | 2014-06-10 | Intel Corporation | Invalidating translation lookaside buffer entries in a virtual machine system |
| US7237051B2 (en) | 2003-09-30 | 2007-06-26 | Intel Corporation | Mechanism to control hardware interrupt acknowledgement in a virtual machine system |
| US7177967B2 (en) | 2003-09-30 | 2007-02-13 | Intel Corporation | Chipset support for managing hardware interrupts in a virtual machine system |
| US7636844B2 (en) | 2003-11-17 | 2009-12-22 | Intel Corporation | Method and system to provide a trusted channel within a computer system for a SIM device |
| US9087000B2 (en) | 2003-11-26 | 2015-07-21 | Intel Corporation | Accessing private data about the state of a data processing machine from storage that is publicly accessible |
| US9348767B2 (en) | 2003-11-26 | 2016-05-24 | Intel Corporation | Accessing private data about the state of a data processing machine from storage that is publicly accessible |
| US9009483B2 (en) | 2003-12-22 | 2015-04-14 | Intel Corporation | Replacing blinded authentication authority |
| WO2005101965A3 (en) * | 2004-03-25 | 2006-07-20 | Nat Univ Ireland | Secure digital content reproduction using biometrically derived hybrid encryption techniques |
| US7356735B2 (en) | 2004-03-30 | 2008-04-08 | Intel Corporation | Providing support for single stepping a virtual machine in a virtual machine environment |
| US7620949B2 (en) | 2004-03-31 | 2009-11-17 | Intel Corporation | Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment |
| US7490070B2 (en) | 2004-06-10 | 2009-02-10 | Intel Corporation | Apparatus and method for proving the denial of a direct proof signature |
| WO2006000029A1 (en) * | 2004-06-23 | 2006-01-05 | Telstra Corporation Limited | Content delivery system and player |
| US7305592B2 (en) | 2004-06-30 | 2007-12-04 | Intel Corporation | Support for nested fault in a virtual machine environment |
| EP1632943A3 (en) * | 2004-09-02 | 2011-05-18 | LG Electronics Inc. | Method of preventing multimedia copy |
| EP1632943A2 (en) | 2004-09-02 | 2006-03-08 | LG Electronics Inc. | Method of preventing multimedia copy |
| US8924728B2 (en) | 2004-11-30 | 2014-12-30 | Intel Corporation | Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information |
| US8533777B2 (en) | 2004-12-29 | 2013-09-10 | Intel Corporation | Mechanism to determine trust of out-of-band management agents |
| US7395405B2 (en) | 2005-01-28 | 2008-07-01 | Intel Corporation | Method and apparatus for supporting address translation in a virtual machine environment |
| US7809957B2 (en) | 2005-09-29 | 2010-10-05 | Intel Corporation | Trusted platform module for generating sealed data |
| CN101933287A (en) * | 2007-08-08 | 2010-12-29 | 黄金富 | Encryption authentication device and method for anti-trojan horse program disposable one-time key |
| CN101933287B (en) * | 2007-08-08 | 2015-11-25 | 黄金富 | Encryption authentication device and method for anti-trojan horse program disposable one-time key |
| US20090290024A1 (en) * | 2008-05-21 | 2009-11-26 | Larson Bradley R | Providing live event media content to spectators |
| US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
Also Published As
| Publication number | Publication date |
|---|---|
| CA2368858A1 (en) | 2000-10-19 |
| JP2004500613A (en) | 2004-01-08 |
| HK1052568A1 (en) | 2003-09-19 |
| AU4234800A (en) | 2000-11-14 |
| EP1272948A1 (en) | 2003-01-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1272948A1 (en) | Secure electronic commerce system | |
| EP1618453B1 (en) | Methods and system for secure network-based distribution of content | |
| US7444306B2 (en) | Method and apparatus for the rental or sale, and secure distribution of digital content | |
| US7076468B2 (en) | Method and system for licensing digital works | |
| US8117463B2 (en) | Information device, information server, information processing system, information processing program method, and information processing program | |
| US6385596B1 (en) | Secure online music distribution system | |
| US20010032312A1 (en) | System and method for secure electronic digital rights management, secure transaction management and content distribution | |
| US20040125957A1 (en) | Method and system for secure distribution | |
| JP4463998B2 (en) | Protected online music distribution system | |
| US7263497B1 (en) | Secure online music distribution system | |
| US8504652B2 (en) | Method and system for selectively supplying media content to a user and media storage device for use therein | |
| US6609105B2 (en) | System and method for providing access to electronic works | |
| TW563037B (en) | Digital content distribution using web broadcasting services | |
| US20010016836A1 (en) | Method and apparatus for distributing multimedia information over a network | |
| US20060059560A1 (en) | Systems and methods for detecting music sharing | |
| WO2004027622A2 (en) | Method and system for secure distribution | |
| CA2299946A1 (en) | Digital media distribution method and system | |
| US20030233563A1 (en) | Method and system for securely transmitting and distributing information and for producing a physical instantiation of the transmitted information in an intermediate, information-storage medium | |
| WO2001041027A1 (en) | System and method for secure electronic digital rights management, secure transaction management and content distribution | |
| US20060155647A1 (en) | Method for distributing information content | |
| AU2005200002A1 (en) | Secure Electronic Commerce System | |
| WO2001052141A1 (en) | System and method for providing access to electronic works | |
| HK1080187B (en) | Methods and system for secure network-based distribution of content |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
| AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
| DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
| ENP | Entry into the national phase |
Ref document number: 2368858 Country of ref document: CA Ref country code: CA Ref document number: 2368858 Kind code of ref document: A Format of ref document f/p: F |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2000922112 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref country code: JP Ref document number: 2000 611226 Kind code of ref document: A Format of ref document f/p: F |
|
| REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
| WWP | Wipo information: published in national office |
Ref document number: 2000922112 Country of ref document: EP |
|
| WWW | Wipo information: withdrawn in national office |
Ref document number: 2000922112 Country of ref document: EP |