1
Marcus Peinado, Rajasekhar Abburi, Arnold N Blinn, Thomas C Jones, John L Manferdelli, Jeffrey R C Bell, Ramaranthnam Venkatesan, Paul England, Mariusz H Jakubowski, Hai Ying: Enforcement architecture and method for digital rights management. Microsoft Corporation, Woodcock Washburn, September 5, 2006: US07103574 (256 worldwide citation)

An enforcement architecture and method for implementing digital rights management are disclosed. Digital content is distributed from a content server to a computing device of a user and received, and an attempt is made to render the digital content by way of a rendering application. The rendering ap ...


2
Darko Kirovski, Henrique Malvar, Mariusz H Jakubowski: Audio watermarking with dual watermarks. Microsoft Corporation, Lee & Hayes PLLC, April 17, 2007: US07206649 (138 worldwide citation)

A watermark encoding system encodes an audio signal with both a strong and a weak watermark. The strong watermark identifies the content producer and is designed to survive all typical kinds of processing and malicious attacks. The weak watermark identifies the content as an original and is designed ...


3
John L Manferdelli, Michael David Marr, Vinay Krishnaswamy, Mariusz H Jakubowski: System and method for interfacing a software process to secure repositories. Microsoft Corporation, Woodcock Washburn, May 23, 2006: US07051200 (80 worldwide citation)

A secure repository individualized for a hardware environment and a method and system for providing the same. The secure repository includes a hidden cryptographic key and code that applies the key without requiring access to a copy of the key. The code that implements the secure repository is gener ...


4
Darko Kirovski, Henrique Malvar, Mariusz H Jakubowski: Audio watermarking with dual watermarks. Microsoft Corporation, Lee & Hayes PLLC, October 4, 2005: US06952774 (73 worldwide citation)

A watermark encoding system encodes an audio signal with both a strong and a weak watermark. The strong watermark identifies the content producer and is designed to survive all typical kinds of processing and malicious attacks. The weak watermark identifies the content as an original and is designed ...


5
Mariusz H Jakubowski, Ramarathnam Venkatesan, Saurabh Sinha: System and method for protecting digital goods using random and automatic code obfuscation. Microsoft Corporation, Lee & Hayes PLLC, May 30, 2006: US07054443 (63 worldwide citation)

A digital rights management (DRM) distribution architecture produces and distributes digital goods (e.g., software, audio, video, and other content) in a fashion that renders the digital goods resistant to many known forms of attacks. The DRM distribution architecture protects digital goods by autom ...


6
Marcus Peinado, Rajasekhar Abburi, Arnold N Blinn, Thomas C Jones, John L Manferdelli, Jeffrey R C Bell, Ramaranthnam Venkatesan, Paul England, Mariusz H Jakubowski, Hai Ying: Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system. Microsoft Corporation, Woodcock Washburn, May 23, 2006: US07051005 (59 worldwide citation)

A digital rights management (DRM) system operates on a computing device and requires a black box for performing decryption and encryption functions. To obtain the black box from a black box server, the DRM system requests such black box from such black box server. The black box server in response ge ...


7
Mariusz H Jakubowski, Ramarathnam Venkatesan: Cryptographic technique that provides fast encryption and decryption and assures integrity of a ciphertext message through use of a message authentication code formed through cipher block chaining of the plaintext message. Microsoft Corporation, Peter L Michaelson, Michaelson & Wallace, May 1, 2001: US06226742 (54 worldwide citation)

A cryptographic technique that not only provides fast and extremely secure encryption and decryption but also assures integrity of a ciphertext message. This technique involves, during message encryption: generating, in response to an incoming plaintext message, an intermediate stream—such as by cha ...


8
Darko Kirovski, Henrique Malvar, Mariusz H Jakubowski: Audio watermarking with dual watermarks. Microsoft Corporation, Lee & Hayes PLLC, March 27, 2007: US07197368 (41 worldwide citation)

A watermark encoding system encodes an audio signal with both a strong and a weak watermark. The strong watermark identifies the content producer and is designed to survive all typical kinds of processing and malicious attacks. The weak watermark identifies the content as an original and is designed ...


9
Mariusz H Jakubowski, Ramarathnam Venkatesan: Method and apparatus for producing a message authentication code in a cipher block chaining operation by using linear combinations of an encryption key. Microsoft Corporation, Peter L Michaelson, Michaelson & Wallace, October 3, 2000: US06128737 (29 worldwide citation)

A cryptographic technique that not only provides fast and extremely secure encryption and decryption but also assures integrity of a ciphertext message. This technique involves, during message encryption: generating, in response to an incoming plaintext message, an intermediate stream--such as by ch ...


10
Mariusz H Jakubowski, Ramarathnam Venkatesan: Protecting digital goods using oblivious checking. Microsoft Corporation, Lee & Hayes PLLC, July 18, 2006: US07080257 (28 worldwide citation)

Oblivious checking of a digital good is performed by identifying a plurality of key instructions within a function of a digital good. Each key instruction is an instruction that possibly modifies a register or a flag. An extra instruction is then inserted into the function for each of the key instru ...