1
Steven T Ansell, Andrew R Cherenson, Mark E Paley, Steven B Katz, John Michael Kelsey Jr, Bruce Schneier: Copy security for portable music players. Liquid Audio, James D Ivey, April 2, 2002: US06367019 (257 worldwide citation)

Data such as a musical track is stored as a secure portable track (SPT) which can be bound to one or more players and can be bound to a particular storage medium, restricting playback of the SPT to the specific players and ensuring that playback is only from the original storage medium. The SPT is b ...


2
Gerard Chauvel, Serge Lasserre, Mario Giani, Tiemen Spits, Gerard Benbassat, Frank L Laczko Sr, Y Paul Chiang, Karen L Walker, Mark E Paley, Brian O Chae: Audio and video decoder circuit and system. Texas Instruments Incorporated, Gerald E Laws, W James Brady III, Frederick J Telecky Jr, April 9, 2002: US06369855 (181 worldwide citation)

An improved audio-visual circuit is provided that includes a transport packet parsing circuit for receiving a transport data packet stream, a CPU circuit for initializing said integrated circuit and for processing portions of said data packet stream, a ROM circuit for storing data, a RAM circuit for ...


3
Gerard Chauvel, Serge Lasserre, Mario Giani, Tiemen Spits, Gerard Benbassat, Frank L Laczko Sr, Y Paul Chiang, Karen L Walker, Mark E Paley, Brian O Chae: Real time window address calculation for on-screen display. Texas Instruments Incorporated, Gerald E Laws, W James Brady III, Frederick J Telecky Jr, October 30, 2001: US06310657 (11 worldwide citation)

An on-screen display system in which a CPU generates windows in a working memory space also provides for real time calculation of window addresses in the working memory space. This can eliminate the need for a separate frame buffer memory.


4
Clifford P Strom, Stephen P DiAcetis, Mark E Paley: Policy for digital rights management. MICROSOFT TECHNOLOGY LICENSING, Gregg Wisdom, Judy Yee, Micky Minhas, March 7, 2017: US09589114 (3 worldwide citation)

This document describes policies for digital rights management that enable distribution of full-function versions of applications that, while fully functional, have functions limited by an associated policy. A policy may be replaced or updated, thereby enabling use of previously limited functions wi ...


5
Mark E Paley, Stephen P DiAcetis, Clifford P Strom, Kedarnath A Dubhashi: Associating policy with unencrypted digital content. Microsoft Corporation, Micah Goldsmith, Glen Johnson, Micky Minhas, June 17, 2014: US08756433

A content license associated with unencrypted digital content is generated, the content license including both an identifier of the unencrypted digital content and a content policy. At a user device, a determination is made as to whether the content license corresponds to particular unencrypted digi ...


6
Mark E Paley, Stephen P DiAcetis, Clifford P Strom, Kedarnath A Dubhashi: Associating policy with unencrypted digital content. Microsoft Corporation, July 14, 2011: US20110173454-A1

A content license associated with unencrypted digital content is generated, the content license including both an identifier of the unencrypted digital content and a content policy. At a user device, a determination is made as to whether the content license corresponds to particular unencrypted digi ...


7
Clifford P Strom, Mark E Paley, Suntian Song: Protecting applications with key and usage policy. Microsoft Corporation, July 21, 2011: US20110179268-A1

One or more files of an application are obtained and configured as a virtual storage volume. An application package is generated by encrypting, using a key, the one or more files configured as a virtual storage volume. A license generation module generates a license including both a usage policy for ...


8
Clifford P Strom, Stephen P DiAcetis, Mark E Paley: Policy For Digital Rights Management. Microsoft Corporation, July 7, 2011: US20110167499-A1

This document describes policies for digital rights management that enable distribution of full-function versions of applications that, while fully functional, have functions limited by an associated policy. A policy may be replaced or updated, thereby enabling use of previously limited functions wi ...