1
Paul England, John D DeTreville, Butler W Lampson: Digital rights management operating system. Microsoft Corporation, Lee & Hayes PLLC, December 11, 2001: US06330670 (502 worldwide citation)

A digital rights management operating system protects rights-managed data, such as downloaded content, from access by untrusted programs while the data is loaded into memory or on a page file as a result of the execution of a trusted application that accesses the memory. To protect the rights-manage ...


2
Paul England: System and method for managing interactions between users in a browser-based telecommunications network. Telcordia Technologies, Joseph Giordano, November 7, 2000: US06144991 (481 worldwide citation)

A software system which allows a guide/specialist to interact with a client on a real-time, interactive basis over the World Wide Web. The methodology includes configuring a guide system with a special-purpose browser displaying both locally displayable frames and remotely displayable frames; the cl ...


3
Paul England, John D DeTreville, Butler W Lampson: Loading and identifying a digital rights management operating system. Microsoft Corporation, Lee & Hayes PLLC, December 4, 2001: US06327652 (452 worldwide citation)

The identity of an operating system running on a computer is determined from an identity associated with an initial component for the operating system, combined with identities of additional components that are loaded afterwards. Loading of a digital rights management operating system on a subscribe ...


4
Marcus Peinado, Rajasekhar Abburi, Arnold N Blinn, Thomas C Jones, John L Manferdelli, Jeffrey R C Bell, Ramaranthnam Venkatesan, Paul England, Mariusz H Jakubowski, Hai Ying: Enforcement architecture and method for digital rights management. Microsoft Corporation, Woodcock Washburn, September 5, 2006: US07103574 (256 worldwide citation)

An enforcement architecture and method for implementing digital rights management are disclosed. Digital content is distributed from a content server to a computing device of a user and received, and an attempt is made to render the digital content by way of a rendering application. The rendering ap ...


5
Paul England, Butler W Lampson: Secure execution of program code. Microsoft Corporation, Lee & Hayes PLLC, November 18, 2003: US06651171 (182 worldwide citation)

Curtained operation provides trusted execution of code and secrecy of data in a secure memory. Curtained code can only be executed from within certain address ranges of a curtained memory region secure against access by code from without the region. Code entry points are restricted, and atomic execu ...


6
Marcus Peinado, Rajasekhar Abburi, Paul England, Krishnamurthy Ganesan, Jeffrey R C Bell, Arnold N Blinn, Thomas C Jones: Digital license and method for obtaining/providing a digital license. Microsoft Corporation, Woodcock Washburn, November 14, 2006: US07136838 (164 worldwide citation)

To obtain a digital license for rendering a piece of digital content, a license requester contacts a license provider and sends a license request. The license provider checks the license request for validity and negotiates with the license requestor terms and conditions for the requested license. Th ...


7
Paul England, Butler W Lampson: Hierarchical trusted code for content protection in computers. Microsoft Corporation, Lee & Hayes PLLC, August 10, 2004: US06775779 (134 worldwide citation)

An architecture for protecting premium content in a nonsecure computer environment executes only a small number of code modules in a secure memory. The modules are arranged in a hierarchy of trust, where a module names other modules that it is willing to trust, and those modules in turn name other m ...


8
Paul England, John D DeTreville, Butler W Lampson: Controlling access to content based on certificates and access predicates. Microsoft Corporation, Lee & Hayes PLLC, November 16, 2004: US06820063 (121 worldwide citation)

Digital rights for content downloaded to a subscriber computer from a provider are specified in an access predicate. The access predicate is compared with a rights manager certificate associated with an entity, such as an application, that wants access to the content. If the rights manager certifica ...


9
Benjamin Armstrong, Paul England, Scott A Field, Jason Garms, Michael Kramer, Kenneth D Ray: Computer security management, such as in a virtual machine or hardened operating system. Microsoft Corporation, Woodcock Washburn, August 5, 2008: US07409719 (71 worldwide citation)

A security scheme provides security to one or more self-contained operating environment instances executing on a computer. The security scheme may include implementing a set of security applications that may be controlled by a supervisory process, or the like. Both the set of security applications a ...


10
Marcus Peinado, Paul England: Secure processor architecture for use with a digital rights management (DRM) system on a computing device. Microsoft Corporation, Woodcock Washburn, May 29, 2007: US07225333 (69 worldwide citation)

A secure processor is operable in normal and preferred modes, and includes a security kernel instantiated when the processor enters into preferred mode and a security key accessible by the security kernel during preferred mode. The security kernel employs the accessed security key to authenticate a ...