1
Edgar Downs, George Gregory Gruse, Marco M Hurtado, Christopher T Lehman, Kenneth Louis Milsted, Jeffrey B Lotspiech: Electronic content delivery system. International Business Machines Corporation, Steven J Meyers, Steven J Soucar, Fleit Kain Gibbons Gutman & Bongini P L, May 1, 2001: US06226618 (1442 worldwide citation)

Disclosed is a method and apparatus of securely providing data to a user's system. The data is encrypted so as to only be decryptable by a data decrypting key, the data decrypting key being encrypted using a first public key, and the encrypted data being accessible to the user's system, th ...


2
Marco M Hurtado, Kenneth L Milsted, George G Gruse, Edgar Downs, Christopher T Lehman, Richard L Spagna, Jeffrey B Lotspiech: Secure electronic content distribution on CDS and DVDs. International Business Machines Corporation, Jon A Gibbons, David M Shofi, Fleit Kain Gibbons Gutman & Bongini P L, August 26, 2003: US06611812 (308 worldwide citation)

A method to delivery encrypted digital content to a end user system for playing the content comprising the steps of: reading from a computer readable medium metadata which has previously associated with the content. A user selects from the metadata associated content to decrypt and the end user syst ...


3
George Gregory Gruse, Marco M Hurtado, Kenneth Louis Milsted, Jeffrey B Lotspiech: Key management system for digital content player. International Business Machines Corporation, Steven J Meyers, David M Shofi, Fleit Kain Gibbons Gutman & Bongini P L, June 4, 2002: US06398245 (258 worldwide citation)

A method of managing keys used by a digital content player on a computer system. According to the method, digital content data encrypted with a first encrypting key is decrypted using a first decrypting key, and re-encrypted using a second encrypting key. A second decrypting key is encrypted using a ...


4
Jeffrey B Lotspiech: Method and apparatus for rotating the scan format of digital images. International Business Machines Corporation, Fraser and Bogucki, June 2, 1981: US04271476 (84 worldwide citation)

In a printer system non-coded digital images having a horizontal scan format are rotated into a vertical scan format for printing or other processing thereof. Rotation is accomplished by logically dividing the digital image into a plurality of sections, then rotating the scan direction of each secti ...


5
Jeffrey B Lotspiech, Wayne L Wohler: Algorithm for the segmentation of printed fixed pitch documents. International Business Machines Corporation, J G Cockburn, C M Wright, March 22, 1983: US04377803 (54 worldwide citation)

An apparatus and method is provided for segmenting characters generated by an optical scanner. The apparatus also identifies underscores. The underscores are then masked and subsequent processing devices are informed of the existence of said underscores. Input video raster scans representative of a ...


6
Hongxia Jin, Donald E Leake Jr, Jeffrey B Lotspiech, Sigfredo I Nin, Wilfred E Plouffe: Tamper-resistant trusted java virtual machine and method of using the same. International Business Machines Corporation, Cantor Colburn, Leonard Guzman, April 7, 2009: US07516331 (42 worldwide citation)

A trusted Java virtual machine provides a method for supporting tamper-resistant applications, ensuring the integrity of an application and its secrets such as keys. The trusted Java virtual machine verifies the integrity of the Java application, prevents debugging of the Java application, and allow ...


7
John W Decker, James C King, Ray A Larner, Jeffrey B Lotspiech: Method of controlling a bit-image printer. International Business Machines Corporation, Francis A Sirr, May 17, 1988: US04745560 (32 worldwide citation)

A bit-image printer is disclosed, having a page memory, a font memory and a font library. Fonts are selected from the library for use in composing a page image in the page memory. Loading of font characters into the page memory is controlled by the position of a cursor located within page memory. Th ...


8
Eric M Foster, Jeffrey B Lotspiech, Florian Pestoni, Wilfred E Plouffe Jr, Frank A Schaffa: Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient. International Business Machines Corporation, Kerry B Goodwin, Hoffman Warnick & D Alessandro, April 8, 2008: US07356147 (24 worldwide citation)

A method and system for attaching a title key to encrypted content for synchronized transmission to, or storage by, a recipient is provided. Specifically, under the present invention, an elementary media stream is parceled into content units that each include a content packet and a header. The conte ...


9
Micheal S Ripley, Jeffrey B Lotspiech, Atsushi Ishihara, Taku Kato, Yoshihisa Fukushima: Verifying the integrity of a media key block by storing validation data in a validation area of media. Intel Corporation, Libby H Hope, June 28, 2005: US06912634 (24 worldwide citation)

A method for verifying the integrity of a media key block (MKB) by storing validation data in a validation area of a medium, such as a DVD-R or a DVD-RW. In one embodiment, validation data comprises a hash function on a media key block. In another embodiment, validation data comprises the Verificati ...


10
Michael S Ripley, Jeffrey B Lotspiech, Atsushi Ishihara, Taku Kato, Yoshihisa Fukushima: Verifying the integrity of a media key block by storing validation data in the cutting area of media. Intel Corporation, International Business Machines Corporation, Toshiba Corporation, Matsushita Electric Industrial, Libby H Hope Esq, May 18, 2004: US06738878 (20 worldwide citation)

A method for verifying the integrity of a media key block (MKB) by storing validation data in a validation area of a medium, such as a DVD-R or a DVD-RW. In one embodiment, validation data comprises a hash function on a media key block. In another embodiment, validation data comprises the Verificati ...