1
Bahman Qawami
Fabrice Jogand Coulomb, Michael Holtzman, Bahman Qawami, Ron Barzilai: Method for versatile content control with partitioning. SanDisk Technologies, Brinks Gilson & Lione, December 3, 2013: US08601283 (1 worldwide citation)

In some applications, it may be more convenient to the user to be able to log in the memory system using one application, and then be able to use different applications to access protected content without having to log in again. In such event, all of the content that the user wishes to access in thi ...


2
Bahman Qawami
Fabrice Jogand Coulomb, Bahman Qawami, Farshid Sabet Sharghi: System and method for receiving digital content. Sandisk Technologies, Toler Law Group PC, April 23, 2013: US08429755

A method and system for conducting a transaction involving digital content is provided. The system includes, a first user of a first mobile device connected to a network; a second user of a second mobile device connected to the network; a MNO that is functionally coupled to the first mobile device a ...


3
William H. Gates III
Henricus Johannes Maria Meijer, William H Gates III, Thomas F Bergstraesser, Lili Cheng, Nishant V Dani, Daniel S Glasser, Ira L Snyder Jr, Melora Zaner Godsey: Remote management of resource license. Microsoft Corporation, Lee & Hayes PLLC, June 25, 2013: US08474027 (8 worldwide citation)

A user-centric or identity-centric resource licensing system that manages access to ‘cloud-based’ resources (e.g., applications and services) is provided. A ‘cloud’ refers to a collection of resources (e.g., hardware and/or software) provided and maintained by an off-site or off-premise party (e.g., ...


4
Bruce Schneier, Jay Walker, James Jorasch: Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols. Walker Asset Management Partnership, Jeffrey L Brandt, Morgan & Finnegan, June 16, 1998: US05768382 (1027 worldwide citation)

A computer device and method for encoding a message corresponding to an outcome of a computer game, and a computer device and method for decoding the message to detect a fraudulent outcome. The computer device used to generate the encoded message includes (1) a memory device containing encoding cont ...


5
Marvin M Theimer, Michael J Spreitzer, Mark D Weiser, Richard J Goldstein, Douglas B Terry, William N Schilit, Roy Want: Selective delivery of electronic messages in a multiple computer system based on context and environment of a user. Xerox Corporation, R Christine Jacobs, Tracy L Hurt, February 20, 1996: US05493692 (989 worldwide citation)

The present invention describes a method for selectively delivering electronic messages to an identified user or users in a system of mobile and fixed devices, including multiple display devices and multiple users, based on the context of the system and the environment of the identified user. Electr ...


6
Karl L Ginter, Victor H Shear, Francis J Spahn, David M Van Wie: Systems and methods for secure transaction management and electronic rights protection. InterTrust Technologies, Nixon & Vanderhye P C, June 8, 1999: US05910987 (926 worldwide citation)

The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain ...


7
Karl L Ginter, Victor H Shear, Francis J Spahn, David M Van Wie: Systems and methods for the secure transaction management and electronic rights protection. InterTrust Technologies Corporation, Finnegan Henderson Farabow Garrett & Dunner L, June 26, 2001: US06253193 (733 worldwide citation)

The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain ...


8
Bruce Schneier, Jay S Walker, James Jorasch: Remote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system using cryptographic and other protocols. Walker Asset Management, Dean Alderucci, Morgan & Finnegan, October 19, 1999: US05970143 (730 worldwide citation)

A computer device and method for encoding a message corresponding to an outcome of a computer game, and a computer device and method for decoding the message to detect a fraudulent outcome. The computer device used to generate the encoded message includes (1) a memory device containing encoding cont ...


9
Victor H Shear: Database usage metering and protection system and method. Electronic Publishing Resources, Nixon & Vanderhye, September 17, 1991: US05050213 (682 worldwide citation)

A "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program system resident in the hardware device. One or more data ba ...


10
Stephane Herman Maes, Jan Sedivy: Portable information and transaction processing system and method utilizing biometric authorization and digital certificate security. International Business Machines Corporation, F Chau & Associates, January 18, 2000: US06016476 (659 worldwide citation)

The present invention is a portable client PDA with a touch screen or other equivalent user interface and having a microphone and local central processing unit (CPU) for processing voice commands and for processing biometric data to provide user verification. The PDA also includes a memory for stori ...