1
yuan xing Lee
Ivana Djurdjevic, Bruce Alexander Wilson, Mario Blaum, Richard Leo Galbraith, Ksenija Lakovic, Yuan Xing Lee, Zongwang Li, Travis Roger Oenning: Techniques For Generating Bit Reliability Information In A Post-Processor Using An Error Correction Constraint. Hitachi Global Storage Technologies Netherlands, Steven J Cahill Hitachi Gst, January 1, 2009: US20090006931-A1

Techniques are provided that generate bit reliabilities for a detected sequence. A detector generates the detected sequence. According to one embodiment, a post-processor finds a first set of combinations of one or more error events in the detected sequence satisfying a complete set or a subset of e ...


2
Mark J Stefik, Michalene M Casey: System for controlling the distribution and use of digital works. Xerox Corporation, Richard B Domingo, May 13, 1997: US05629980 (1220 worldwide citation)

A system for controlling use and distribution of digital works. In the present invention, the owner of a digital work attaches usage rights to that work. Usage rights are granted by the "owner" of a digital work to "buyers" of the digital work. The usage rights define how a digital work may be used ...


3
Mark J Stefik, Ralph C Merkle, Peter L T Pirolli: System for controlling the distribution and use of digital works having a fee reporting mechanism. Xerox Corporation, Richard B Domingo, May 27, 1997: US05634012 (876 worldwide citation)

A fee accounting mechanism for reporting fees associated with the distribution and use of digital works. Usage rights and fees are attached to digital works. The usage rights define how the digital work may be used or further distributed. Usage fees are specified as part of a usage right. The digita ...


4
Paul B Schneck, Marshall D Abrams: System for controlling access and distribution of digital property. MRJ, Pillsbury Madison & Sutro, August 3, 1999: US05933498 (865 worldwide citation)

A method and device are provided for controlling access to data. Portions of the data are protected and rules concerning access rights to the data are determined. Access to the protected portions of the data is prevented, other than in a non-useable form; and users are provided access to the data on ...


5
Mark J Stefik, Daniel G Bobrow, Peter L T Pirolli: System for controlling the distribution and use of composite digital works. Xerox Corporation, Richard B Domingo, June 10, 1997: US05638443 (828 worldwide citation)

A system for controlling use and distribution of composite digital works. A digital work is comprised of a description part and a content part. The description part contains control information for the composite digital work. The content part stores the actual digital data comprising the composite d ...


6
ReiJane Huai, Robert Daly, Walter Curti, Deepak Mohan, James Kuang Ru Chueh, Larry Louie: System and parallel streaming and data stripping to back-up a network. Cheyenne Software International Sales, Kenyon & Kenyon, September 30, 1997: US05673381 (563 worldwide citation)

A method and system for parallel back-up of a plurality of client computers on a network, in particular, a local area network or wide area network. Each client computer has a local storage device that stores files. A number of back-up storage devices are organized into groups, with each back-up stor ...


7
Michael Man Hak Tso, Bikram Singh Bakshi: System for virus-checking network data during download to a client device. Intel Corporation, Kenyon & Kenyon, July 11, 2000: US06088803 (395 worldwide citation)

A system for virus checking a data object to be downloaded to a client device is implemented in a method including the steps of retrieving a data object to be downloaded, scanning the data object for a computer virus, and downloading the data object to the client device if no computer virus is detec ...


8
Joseph J Daniele: Electronic copyright royalty accounting system using glyphs. Xerox Corporation, Duane C Basch, August 22, 1995: US05444779 (391 worldwide citation)

The present invention is a system for utilizing a printable, yet unobtrusive glyph or similar two-dimensionally encoded mark to identify copyrighted documents. Upon attempting to reproduce such a document, the glyph is detected, decoded and used to accurately collect and/or record a copyright royalt ...


9
Brian Kenner, Arnold Karush: System and method for optimized storage and retrieval of data on a distributed computer network. InterVu, Darby & Darby P C, December 14, 1999: US06003030 (347 worldwide citation)

A system and method for the optimized storage and retrieval of video data at distributed sites calls for the deployment of "Smart Mirror" sites throughout a network, each of which maintains a copy of certain data managed by the system. Every user is assigned to a specific delivery site based on an a ...


10
Stephen E Smaha, Steven R Snapp: Method and system for detecting intrusion into and misuse of a data processing system. Haystack Labs, J Nevin Shaffer & Culbertson Shaffer, September 17, 1996: US05557742 (344 worldwide citation)

A processing system intrusion and misuse detection system and method utilizes instructions for and steps of processing system inputs into events and processing the events with reference to a set of selectable misuses in a misuse engine to produce one or more misuse outputs. The system and method con ...