( 2 of 2 ) |
United States Patent | 7,062,500 |
Hall , et al. | June 13, 2006 |
A descriptive data structure provides an abstract representation of a rights management data structure such as a secure container. The abstract representation may describe, for example, the layout of the rights management data structure. It can also provide metadata describing or defining other characteristics of rights management data structure use and/or processing. For example, the descriptive data structure can provide integrity constraints that provide a way to state rules about associated information. The abstract representation can be used to create rights management data structures that are interoperable and compatible with one another. This arrangement preserves flexibility and ease of use without compromising security.
Inventors: | Hall; Edwin J. (San Jose, CA), Shear; Victor H. (Bethesda, MD), Tomasello; Luke S. (San Jose, CA), Van Wie; David M. (Sunnyvale, CA), Weber; Robert P. (Menlo Park, CA), Worsencroft; Kim (Los Gatos, CA), Xu; Xuejun (Fremont, CA) |
Assignee: |
Intertrust Technologies Corp.
(Sunnyvale,
CA)
|
Appl. No.: | 09/819,063 |
Filed: | September 28, 2000 |
Application Number | Filing Date | Patent Number | Issue Date | ||
09300778 | Mar., 1999 | 6138119 | |||
08805805 | Feb., 1997 | 5920861 | |||
Current U.S. Class: | 1/1 ; 707/999.102 |
Current International Class: | G06F 17/30 (20060101) |
Field of Search: | 707/102 |
3573747 | April 1971 | Adams et al. |
3609697 | September 1971 | Blevins |
3790700 | February 1974 | Callais et al. |
3796830 | March 1974 | Smith |
3798359 | March 1974 | Feistel |
3798360 | March 1974 | Feistel |
3798605 | March 1974 | Feistel |
3806874 | April 1974 | Ehrat |
3806882 | April 1974 | Clarke |
3829833 | August 1974 | Freeny |
3845391 | October 1974 | Crosby |
3906448 | September 1975 | Henriques |
3911397 | October 1975 | Freeny |
3924065 | December 1975 | Freeny |
3931504 | January 1976 | Jacoby |
3946200 | March 1976 | Juodikis |
3946220 | March 1976 | Brobeck et al. |
3956615 | May 1976 | Anderson et al. |
3958081 | May 1976 | Ehrsam et al. |
3970992 | July 1976 | Boothroyd et al. |
3996449 | December 1976 | Attanasio et al. |
4020326 | April 1977 | Coulthurst |
4048619 | September 1977 | Forman et al. |
4071911 | January 1978 | Mazur |
4104721 | August 1978 | Markstein et al. |
4112421 | September 1978 | Freeny |
4120030 | October 1978 | Johnstone |
4141005 | February 1979 | Bonner et al. |
4162483 | July 1979 | Entenman |
4163280 | July 1979 | Mori et al. |
4168396 | September 1979 | Best |
4183085 | January 1980 | Roberts et al. |
4196310 | April 1980 | Forman et al. |
4200913 | April 1980 | Kuhar et al. |
4209787 | June 1980 | Freeny |
4217588 | August 1980 | Freeny |
4220991 | September 1980 | Hamano et al. |
4232193 | November 1980 | Gerard |
4232317 | November 1980 | Freeny |
4236217 | November 1980 | Kennedy |
4246638 | January 1981 | Thomas |
4253157 | February 1981 | Kirschner et al. |
4259720 | March 1981 | Campbell |
4262329 | April 1981 | Bright et al. |
4265371 | May 1981 | Desai et al. |
4270182 | May 1981 | Asija |
4278837 | July 1981 | Best |
4305131 | December 1981 | Best |
4306289 | December 1981 | Lumley |
4309569 | January 1982 | Merkle |
4319079 | March 1982 | Best |
4321672 | March 1982 | Braun et al. |
4323921 | April 1982 | Guillou |
4328544 | May 1982 | Baldwin et al. |
4337483 | June 1982 | Guillou |
4361877 | November 1982 | Dyer et al. |
4375579 | March 1983 | Davida et al. |
4405829 | September 1983 | Rivest et al. |
4433207 | February 1984 | Best |
4434464 | February 1984 | Suzuki et al. |
4442484 | April 1984 | Childs, Jr. et al. |
4442486 | April 1984 | Mayer |
4446519 | May 1984 | Thomas |
4454594 | June 1984 | Heffron et al. |
4458315 | July 1984 | Uchenick |
4462076 | July 1984 | Smith |
4462078 | July 1984 | Ross |
4465901 | August 1984 | Best |
4471163 | September 1984 | Donald et al. |
4471216 | September 1984 | Herve |
4484217 | November 1984 | Block et al. |
4494156 | January 1985 | Kadison et al. |
4513174 | April 1985 | Herman |
4523271 | June 1985 | Levien |
4525599 | June 1985 | Curran et al. |
4528588 | July 1985 | Lofberg |
4528643 | July 1985 | Freeny |
4529870 | July 1985 | Chaum |
4553252 | November 1985 | Egendorf |
4558176 | December 1985 | Arnold et al. |
4558413 | December 1985 | Schmidt et al. |
4562305 | December 1985 | Gaffney, Jr. |
4562306 | December 1985 | Chou et al. |
4562495 | December 1985 | Bond et al. |
4573119 | February 1986 | Westheimer et al. |
4577289 | March 1986 | Comerford et al. |
4578530 | March 1986 | Zeidler |
4584639 | April 1986 | Hardy |
4584641 | April 1986 | Guglielmino |
4588991 | May 1986 | Atalla |
4589064 | May 1986 | Chiba et al. |
4590552 | May 1986 | Guttag et al. |
4593183 | June 1986 | Fukatsu |
4593353 | June 1986 | Pickholtz |
4593376 | June 1986 | Volk |
4595950 | June 1986 | Lofberg |
4597058 | June 1986 | Izumi et al. |
4598288 | July 1986 | Yarbrough et al. |
4599489 | July 1986 | Cargile |
4609777 | September 1986 | Cargile |
4609985 | September 1986 | Dozier |
4621321 | November 1986 | Boebert et al. |
4621334 | November 1986 | Garcia |
4622222 | November 1986 | Horvath et al. |
4634807 | January 1987 | Chorley et al. |
4644493 | February 1987 | Chandra et al. |
4646234 | February 1987 | Tolman et al. |
4652990 | March 1987 | Pailen et al. |
4658093 | April 1987 | Hellman |
4670857 | June 1987 | Rackman |
4672572 | June 1987 | Alsberg |
4672605 | June 1987 | Hustig et al. |
4677434 | June 1987 | Fascenda |
4677552 | June 1987 | Sibley, Jr. |
4680731 | July 1987 | Izumi et al. |
4683553 | July 1987 | Mollier |
4683968 | August 1987 | Appelbaum et al. |
4685056 | August 1987 | Barnsdale et al. |
4688169 | August 1987 | Joshi |
4691350 | September 1987 | Kleijne et al. |
4696034 | September 1987 | Wiedemer |
4700296 | October 1987 | Palmer, Jr. et al. |
4701846 | October 1987 | Ikeda et al. |
4712238 | December 1987 | Gilhousen et al. |
4713753 | December 1987 | Boebert et al. |
4727550 | February 1988 | Chang et al. |
4740890 | April 1988 | William |
4747139 | May 1988 | Taaffe |
4748561 | May 1988 | Brown |
4757533 | July 1988 | Allen et al. |
4757534 | July 1988 | Matyas et al. |
4757914 | July 1988 | Roth et al. |
4768087 | August 1988 | Taub et al. |
4780821 | October 1988 | Crossley |
4791565 | December 1988 | Dunham et al. |
4796181 | January 1989 | Wiedemer |
4796220 | January 1989 | Wolfe |
4798209 | January 1989 | Klingenbeck et al. |
4799156 | January 1989 | Shavit |
4807288 | February 1989 | Ugon et al. |
4816655 | March 1989 | Musyck et al. |
4817140 | March 1989 | Chandra et al. |
4823264 | April 1989 | Deming |
4827508 | May 1989 | Shear |
4858121 | August 1989 | Barber et al. |
4864494 | September 1989 | Kobus |
4864616 | September 1989 | Pond et al. |
4866769 | September 1989 | Karp |
4868736 | September 1989 | Walker |
4868877 | September 1989 | Fischer |
4881197 | November 1989 | Fischer |
4888798 | December 1989 | Earnest |
4893248 | January 1990 | Pitts et al. |
4893332 | January 1990 | Brown |
4903296 | February 1990 | Chandra et al. |
4919545 | April 1990 | Yu |
4924378 | May 1990 | Hershey et al. |
4926480 | May 1990 | Chaum |
4930073 | May 1990 | Cina |
4937863 | June 1990 | Robert et al. |
4941175 | July 1990 | Enescu et al. |
4949187 | August 1990 | Cohen |
4952082 | August 1990 | Sakakibara |
4953209 | August 1990 | Ryder, Sr. et al. |
4962533 | October 1990 | Krueger et al. |
4975647 | December 1990 | Downer et al. |
4975878 | December 1990 | Boddu et al. |
4977594 | December 1990 | Shear |
4995082 | February 1991 | Schnorr |
4999806 | March 1991 | Chernow et al. |
5001752 | March 1991 | Fischer |
5005122 | April 1991 | Griffin et al. |
5005200 | April 1991 | Fischer |
5010571 | April 1991 | Katznelson |
5014234 | May 1991 | Edwards, Jr. |
5022080 | June 1991 | Durst et al. |
5023907 | June 1991 | Johnson et al. |
5027397 | June 1991 | Double et al. |
5032979 | July 1991 | Hecht et al. |
5047928 | September 1991 | Wiedemer |
5048085 | September 1991 | Abraham et al. |
5050213 | September 1991 | Shear |
5058162 | October 1991 | Santon et al. |
5065429 | November 1991 | Lang |
5079648 | January 1992 | Maufe |
5091966 | February 1992 | Bloomberg et al. |
5103392 | April 1992 | Mori |
5103459 | April 1992 | Gilhousen et al. |
5103476 | April 1992 | Waite et al. |
5109413 | April 1992 | Comerford et al. |
5111390 | May 1992 | Ketcham |
5113518 | May 1992 | Durst, Jr. et al. |
5119493 | June 1992 | Janis et al. |
5126936 | June 1992 | Champion et al. |
5128525 | July 1992 | Stearns et al. |
5129084 | July 1992 | Kelly, Jr. et al. |
5136643 | August 1992 | Fischer |
5136646 | August 1992 | Haber et al. |
5136647 | August 1992 | Haber et al. |
5136716 | August 1992 | Harvey et al. |
5138712 | August 1992 | Corbin |
5146575 | September 1992 | Nolan |
5148481 | September 1992 | Abraham et al. |
5150407 | September 1992 | Chan |
5155680 | October 1992 | Wiedemer |
5163091 | November 1992 | Graziano et al. |
5164988 | November 1992 | Matyas et al. |
5168147 | December 1992 | Bloomberg |
5185717 | February 1993 | Mori |
5187787 | February 1993 | Skeen et al. |
5191573 | March 1993 | Hair |
5199066 | March 1993 | Logan |
5199074 | March 1993 | Thor |
5201046 | April 1993 | Goldberg et al. |
5201047 | April 1993 | Maki et al. |
5204897 | April 1993 | Wyman |
5206951 | April 1993 | Khoyi et al. |
5208748 | May 1993 | Flores et al. |
5214702 | May 1993 | Fischer |
5216603 | June 1993 | Flores et al. |
5218605 | June 1993 | Low et al. |
5221833 | June 1993 | Hecht |
5222134 | June 1993 | Waite et al. |
5224160 | June 1993 | Paulini et al. |
5224163 | June 1993 | Gasser et al. |
5227797 | July 1993 | Murphy |
5235642 | August 1993 | Wobber et al. |
5241671 | August 1993 | Reed et al. |
5245165 | September 1993 | Zhang |
5247575 | September 1993 | Sprague et al. |
5251294 | October 1993 | Abelow |
5257369 | October 1993 | Skeen et al. |
5260999 | November 1993 | Wyman |
5263157 | November 1993 | Janis |
5263158 | November 1993 | Janis |
5263165 | November 1993 | Janis |
5265164 | November 1993 | Matyas et al. |
5276735 | January 1994 | Boebert et al. |
5276901 | January 1994 | Howell et al. |
5280479 | January 1994 | Mary |
5283830 | February 1994 | Hinsley et al. |
5285494 | February 1994 | Sprecher et al. |
5287407 | February 1994 | Holmes |
5291598 | March 1994 | Grundy |
5301231 | April 1994 | Abraham et al. |
5301326 | April 1994 | Linnett et al. |
5311591 | May 1994 | Fischer |
5319705 | June 1994 | Halter et al. |
5319735 | June 1994 | Preuss et al. |
5319785 | June 1994 | Thaller |
5325524 | June 1994 | Black et al. |
5335169 | August 1994 | Chong |
5335346 | August 1994 | Fabbio |
5337357 | August 1994 | Chou et al. |
5337360 | August 1994 | Fischer |
5341429 | August 1994 | Stringer et al. |
5343526 | August 1994 | Lassers |
5343527 | August 1994 | Moore et al. |
5347579 | September 1994 | Blandford |
5349642 | September 1994 | Kingdon |
5351293 | September 1994 | Michener et al. |
5355474 | October 1994 | Thuraisngham et al. |
5359721 | October 1994 | Kempf et al. |
5361359 | November 1994 | Tajalli et al. |
5365587 | November 1994 | Campbell et al. |
5367621 | November 1994 | Cohen et al. |
5369702 | November 1994 | Shanton |
5369707 | November 1994 | Follendore, III |
5371792 | December 1994 | Asai et al. |
5373440 | December 1994 | Cohen et al. |
5373561 | December 1994 | Haber et al. |
5383113 | January 1995 | Kight et al. |
5388211 | February 1995 | Hornbuckle |
5390247 | February 1995 | Fischer |
5390297 | February 1995 | Barber et al. |
5390330 | February 1995 | Talati |
5392220 | February 1995 | van den Hamer et al. |
5392390 | February 1995 | Crozier |
5394469 | February 1995 | Nagel et al. |
5410598 | April 1995 | Shear |
5412717 | May 1995 | Fischer |
5418713 | May 1995 | Allen |
5420927 | May 1995 | Michali |
5421006 | May 1995 | Jablon |
5422953 | June 1995 | Fischer |
5428606 | June 1995 | Moskowitz |
5432851 | July 1995 | Scheidt et al. |
5432928 | July 1995 | Sherman |
5432950 | July 1995 | Sibigtroth |
5438508 | August 1995 | Wyman |
5440634 | August 1995 | Jones et al. |
5442645 | August 1995 | Ugon |
5444779 | August 1995 | Daniele |
5449895 | September 1995 | Hecht et al. |
5449896 | September 1995 | Hecht et al. |
5450490 | September 1995 | Jensen et al. |
5450493 | September 1995 | Maher |
5453601 | September 1995 | Rosen |
5453605 | September 1995 | Hecht et al. |
5455407 | October 1995 | Rosen |
5455861 | October 1995 | Faucher et al. |
5455953 | October 1995 | Russell |
5457746 | October 1995 | Dolphin |
5457747 | October 1995 | Drexler et al. |
5458494 | October 1995 | Krohn et al. |
5463565 | October 1995 | Cookson et al. |
5463772 | October 1995 | Thompson et al. |
5473687 | December 1995 | Lipscomb et al. |
5473692 | December 1995 | Davis |
5479509 | December 1995 | Ugon |
5485622 | January 1996 | Yamaki |
5490216 | February 1996 | Ricahrdson, III |
5491800 | February 1996 | Goldsmith et al. |
5497479 | March 1996 | Hornbuckle |
5497491 | March 1996 | Mitchell et al. |
5499298 | March 1996 | Narasimhalu et al. |
5504757 | April 1996 | Cook et al. |
5504818 | April 1996 | Okano |
5504837 | April 1996 | Griffeth et al. |
5508913 | April 1996 | Yamamoto et al. |
5509070 | April 1996 | Schull |
5513261 | April 1996 | Maher |
5517518 | May 1996 | Morson et al. |
5524933 | June 1996 | Kunt et al. |
5530235 | June 1996 | Stefik et al. |
5530752 | June 1996 | Rubin |
5533123 | July 1996 | Force et al. |
5534855 | July 1996 | Shockley et al. |
5534975 | July 1996 | Stefik et al. |
5535322 | July 1996 | Hecht |
5537526 | July 1996 | Anderson et al. |
5539735 | July 1996 | Moskowitz |
5539828 | July 1996 | Davis |
5550971 | August 1996 | Brunner et al. |
5553282 | September 1996 | Parrish et al. |
5557518 | September 1996 | Rosen |
5557798 | September 1996 | Skeen et al. |
5563946 | October 1996 | Cooper et al. |
5568552 | October 1996 | Davis |
5572673 | November 1996 | Shurts |
5574962 | November 1996 | Fardeau et al. |
5577209 | November 1996 | Boyle et al. |
5581686 | December 1996 | Koppolu et al. |
5581800 | December 1996 | Fardeau et al. |
5592549 | January 1997 | Nagel et al. |
5603031 | February 1997 | White et al. |
5606609 | February 1997 | Houser et al. |
5613004 | March 1997 | Cooperman et al. |
5621797 | April 1997 | Rosen |
5625693 | April 1997 | Rohatgi et al. |
5629770 | May 1997 | Brassil et al. |
5629980 | May 1997 | Stefik et al. |
5633932 | May 1997 | Davis et al. |
5634012 | May 1997 | Stefik et al. |
5636276 | June 1997 | Brugger |
5636292 | June 1997 | Rhoads |
5638443 | June 1997 | Stefik |
5638504 | June 1997 | Scott et al. |
5640546 | June 1997 | Gopinath et al. |
5649099 | July 1997 | Theimer et al. |
5655077 | August 1997 | Jones et al. |
5671279 | September 1997 | Elgamal |
5678170 | October 1997 | Grube et al. |
5687236 | November 1997 | Moskowitz et al. |
5689565 | November 1997 | Spies et al. |
5689566 | November 1997 | Nguyen |
5689587 | November 1997 | Bender et al. |
5692047 | November 1997 | McManis |
5692180 | November 1997 | Lee |
5699427 | December 1997 | Chow et al. |
5710834 | January 1998 | Rhoads |
5715314 | February 1998 | Payne et al. |
5715403 | February 1998 | Stefik |
5717923 | February 1998 | Dedrick |
5721788 | February 1998 | Powell et al. |
5724424 | March 1998 | Gifford |
5724425 | March 1998 | Chang et al. |
5732398 | March 1998 | Tagawa |
5740549 | April 1998 | Reilly et al. |
5745569 | April 1998 | Moskowitz et al. |
5745604 | April 1998 | Rhoads |
5745678 | April 1998 | Herzberg et al. |
5748763 | May 1998 | Rhoads |
5748783 | May 1998 | Rhoads |
5748960 | May 1998 | Fischer |
5754849 | May 1998 | Dyer et al. |
5757914 | May 1998 | McManis |
5758152 | May 1998 | LeTourneau |
5765152 | June 1998 | Erickson |
5768426 | June 1998 | Rhoads |
5774872 | June 1998 | Golden et al. |
5778385 | July 1998 | Pratt |
5787334 | July 1998 | Fardeau et al. |
5802590 | September 1998 | Draves |
5819263 | October 1998 | Bromley et al. |
5842173 | November 1998 | Strum et al. |
5845281 | December 1998 | Benson et al. |
5878421 | March 1999 | Ferrel et al. |
5892899 | April 1999 | Aucsmith et al. |
5892900 | April 1999 | Ginter et al. |
5896454 | April 1999 | Cookson et al. |
5910987 | June 1999 | Ginter et al. |
5913037 | June 1999 | Spofford et al. |
5915019 | June 1999 | Ginter et al. |
5917912 | June 1999 | Ginter et al. |
5920861 | July 1999 | Hall et al. |
5940504 | August 1999 | Griswold |
5940505 | August 1999 | Kanamaru |
5943422 | August 1999 | Van Wie et al. |
5949876 | September 1999 | Ginter et al. |
5956408 | September 1999 | Arnold |
5966440 | October 1999 | Hair |
5978484 | November 1999 | Apperson et al. |
5982891 | November 1999 | Ginter et al. |
5991876 | November 1999 | Johnson et al. |
5995756 | November 1999 | Herrmann |
5999949 | December 1999 | Crandall |
6009170 | December 1999 | Sako et al. |
6016393 | January 2000 | White et al. |
6044205 | March 2000 | Reed et al. |
6102965 | August 2000 | Dye et al. |
6112181 | August 2000 | Shear et al. |
6122403 | September 2000 | Rhoads |
6135646 | October 2000 | Kahn et al. |
6138119 | October 2000 | Hall et al. |
6157721 | December 2000 | Shear et al. |
6185683 | February 2001 | Ginter et al. |
6237786 | May 2001 | Ginter et al. |
6240185 | May 2001 | Van Wie et al. |
6253193 | June 2001 | Ginter et al. |
6292569 | September 2001 | Shear et al. |
6363488 | March 2002 | Ginter et al. |
6389402 | May 2002 | Ginter et al. |
6427140 | July 2002 | Ginter et al. |
6449367 | September 2002 | Van Wie et al. |
6618484 | September 2003 | Weber et al. |
6640304 | October 2003 | Ginter et al. |
6658568 | December 2003 | Ginter et al. |
6668325 | December 2003 | Collberg et al. |
711 733 | Sep., 1996 | AU | |||
A-36815/97 | Feb., 1998 | AU | |||
A-36816/97 | Feb., 1998 | AU | |||
A-36840/97 | Feb., 1998 | AU | |||
9 004 79 | Dec., 1984 | BE | |||
62-241061 | Dec., 1984 | BE | |||
29 43 436 | Oct., 1979 | DE | |||
3 803 982 | Jan., 1990 | DE | |||
3803982 | Jan., 1990 | DE | |||
0 084 441 | Jul., 1983 | EP | |||
0 128 672 | Dec., 1984 | EP | |||
0 135 422 | Mar., 1985 | EP | |||
0 180 460 | May., 1986 | EP | |||
0 370 146 | Nov., 1988 | EP | |||
0 367 700 | May., 1990 | EP | |||
0 398 645 | Nov., 1990 | EP | |||
0 399 822 A2 | Nov., 1990 | EP | |||
0 421 409 | Apr., 1991 | EP | |||
0 456 386 | Nov., 1991 | EP | |||
0 469 864 | Feb., 1992 | EP | |||
0 469 864 | Feb., 1992 | EP | |||
0 565 314 | Oct., 1993 | EP | |||
0 567 800 | Nov., 1993 | EP | |||
0 570 123 | Nov., 1993 | EP | |||
0 593 305 | Apr., 1994 | EP | |||
0 651 554 | May., 1995 | EP | |||
0 653 695 | May., 1995 | EP | |||
0 668 695 | Aug., 1995 | EP | |||
0 668 695 | Aug., 1995 | EP | |||
0 695 985 | Feb., 1996 | EP | |||
0 696 798 | Feb., 1996 | EP | |||
0 714 204 | May., 1996 | EP | |||
0 715 243 | Jun., 1996 | EP | |||
0 715 244 | Jun., 1996 | EP | |||
0 715 245 | Jun., 1996 | EP | |||
0 715 246 | Jun., 1996 | EP | |||
0 715 247 | Jun., 1996 | EP | |||
0 725 376 | Aug., 1996 | EP | |||
0 763 936 | Sep., 1996 | EP | |||
0 749 081 | Dec., 1996 | EP | |||
0 778 513 | Jun., 1997 | EP | |||
0 795 873 | Sep., 1997 | EP | |||
0 800 312 | Oct., 1997 | EP | |||
0 913 757 | May., 1999 | EP | |||
A2136175 | Sep., 1984 | GB | |||
2264796A (I | Sep., 1993 | GB | |||
2294348 | Apr., 1996 | GB | |||
2295947 | Jun., 1996 | GB | |||
57-726 | May., 1982 | JP | |||
61 121145 | Jun., 1986 | JP | |||
62-225059 | Aug., 1987 | JP | |||
62-241061 | Oct., 1987 | JP | |||
63 129564 | Jun., 1988 | JP | |||
63 289646 | Nov., 1988 | JP | |||
01-068835 | Mar., 1989 | JP | |||
64-68835 | Mar., 1989 | JP | |||
01 248891 | Oct., 1989 | JP | |||
01 296363 | Nov., 1989 | JP | |||
02-242352 | Sep., 1990 | JP | |||
02-247763 | Oct., 1990 | JP | |||
02-294855 | Dec., 1990 | JP | |||
04 117548 | Apr., 1992 | JP | |||
04 504794 | Aug., 1992 | JP | |||
04-369068 | Dec., 1992 | JP | |||
05 173892 | Jul., 1993 | JP | |||
05-181734 | Jul., 1993 | JP | |||
05-257783 | Oct., 1993 | JP | |||
05 258463 | Oct., 1993 | JP | |||
05-268415 | Oct., 1993 | JP | |||
06 501120 | Jan., 1994 | JP | |||
06 152585 | May., 1994 | JP | |||
06 161719 | Jun., 1994 | JP | |||
06-175794 | Jun., 1994 | JP | |||
06-215010 | Aug., 1994 | JP | |||
06-225059 | Aug., 1994 | JP | |||
06 250924 | Sep., 1994 | JP | |||
07-056794 | Mar., 1995 | JP | |||
07-084852 | Mar., 1995 | JP | |||
07-141138 | Jun., 1995 | JP | |||
07-200317 | Aug., 1995 | JP | |||
07-200492 | Aug., 1995 | JP | |||
07-244639 | Sep., 1995 | JP | |||
07 319681 | Dec., 1995 | JP | |||
08-137795 | May., 1996 | JP | |||
08-152990 | Jun., 1996 | JP | |||
08-185292 | Jul., 1996 | JP | |||
08-185298 | Jul., 1996 | JP | |||
01 68853 | Mar., 1999 | JP | |||
WO 85/02310 | May., 1985 | WO | |||
WO 85/03584 | Aug., 1985 | WO | |||
WO 90/02382 | Mar., 1990 | WO | |||
WO 92/06438 | Apr., 1992 | WO | |||
WO 92/22870 | Dec., 1992 | WO | |||
WO 93/01550 | Jan., 1993 | WO | |||
WO 94/01821 | Jan., 1994 | WO | |||
WO 94/03859 | Feb., 1994 | WO | |||
WO 94/06103 | Mar., 1994 | WO | |||
WO 94/16395 | Jul., 1994 | WO | |||
WO 94/18620 | Aug., 1994 | WO | |||
WO 94/22266 | Sep., 1994 | WO | |||
WO 94/27406 | Nov., 1994 | WO | |||
WO 95/14289 | May., 1995 | WO | |||
WO 96/00963 | Jan., 1996 | WO | |||
WO 96/03835 | Feb., 1996 | WO | |||
WO 96/05698 | Feb., 1996 | WO | |||
WO 96/06503 | Feb., 1996 | WO | |||
WO 96/13013 | May., 1996 | WO | |||
WO 96/21192 | Jul., 1996 | WO | |||
WO 96/24092 | Aug., 1996 | WO | |||
WO 96/27155 | Sep., 1996 | WO | |||
WO 97/03423 | Jan., 1997 | WO | |||
WO 97/07656 | Mar., 1997 | WO | |||
WO 97/25816 | Jul., 1997 | WO | |||
WO 97/32251 | Sep., 1997 | WO | |||
WO 97/43761 | Nov., 1997 | WO | |||
WO 97/48203 | Dec., 1997 | WO | |||
WO 98/09209 | Mar., 1998 | WO | |||
WO 98/10381 | Mar., 1998 | WO | |||
WO 98/37481 | Aug., 1998 | WO | |||
WO 98/45768 | Oct., 1998 | WO | |||
WO 99/01815 | Jan., 1999 | WO | |||
WO 99/24928 | May., 1999 | WO | |||
WO 99/48296 | Sep., 1999 | WO | |||
David Arneke and Donna Cunningham, Document from the Internet: AT&T encryption system protects information services, (News Release), Jan. 9, 1995, 1 page. cited by other . Claude Baggett, Cable's Emerging Role in the Information Superhighway, Cable Labs, (undated), 13 slides. cited by other . Theodore Sedgwick Barassi, Document from Internet: The Cybernotary: Public Key Registration and Certification and Authentication of International Legal Transactions, (undated), 4 pages. cited by other . Hugh Barnes, memo to Henry LaMuth, subject: George Gilder articles, May 31, 1994, 2 pages. cited by other . Comments in the Matter of Public Hearing and Request for Comments on the International Aspects of the National Information Infrastructure, Before the Department of Commerce, Aug. 12, 1994, pp. 1-15 (comments of Dan Bart). cited by other . Michael Baum, "Worldwide Electronic Commerce: Law, Policy and Controls Conference," Nov. 11, 1993, 18 pages. cited by other . Robert M. Best, Preventing Software Piracy With Crypto-Microprocessors, Digest of Papers, VLSI: New Architectural Horizons, Feb. 1980, pp. 466-469. cited by other . Richard L. Bisbey, II and Gerald J. Popek, Encapsulation: An Approach to Operating System Security, (USC/Information Science Institute, Marina Del Rey, CA), Oct. 1973, pp. 666-675. cited by other . Rolf Blom, Robert Forchheimer, et al., Encryption Methods in Data Networks, Ericsson Technics, No. 2, Stockholm, Sweden, 1978. cited by other . Rick E. Bruner, Document from the Internet: PowerAgent, NetBot help advertisers reach Internet shoppers, Aug. 1997, 3 pages. cited by other . Denise Caruso, Technology, Digital Commerce: 2 plans for watermarks, which can bind proof of authorship to electronic works, N.Y. Times, Aug. 7, 1995, p. D5. cited by other . A.K. Choudhury, N. F. Maxemchuck, et al., Copyright Protection for Electronic Publishing Over Computer Networks, (AT&T Bell Laboratories, Murray Hill, N. J.) Jun. 1994, 17 pages. cited by other . Tim Clark, Ad service gives cash back, Document from the Internet: <www.news.com,/News/Item/0,4,13050,00.html> (visited Aug. 4, 1997), 2 pages. cited by other . Donna Cunningham, David Arneke, et al., Document from the Internet: AT&T, VLSI Technology join to improve info highway security, ( News Release) Jan. 31, 1995, 3 pages. cited by other . Lorcan Dempsey and Stuart Weibel, The Warwick Metadata Workshop: A Framework for the Deployment of Resource Description, D-Lib Magazine, Jul. 15, 1996. cited by other . Dorothy E. Denning and Peter J. Denning, Data Security, 11 Computing Surveys No. 3, Sep. 1979, pp. 227-249. cited by other . Whitfield Diffie and Martin E. Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, vol. 22, No. 6, Nov. 1976, pp. 644-651. cited by other . Whitfield Diffie and Martin E. Hellman, Privacy and Authentication: An Introduction to Cryptography, Proceedings of the IEEE, vol. 67, No. 3, Mar. 1979, pp. 397-427. cited by other . Stephen R. Dusse and Burton S. Kaliski, A Cryptographic Library for the Motorola 56000, Advances in Cryptology-Proceedings of Eurocrypt 90, (I.M. Damgard, ed., Springer-Verlag) 1991, pp. 230-244. cited by other . Esther Dyson, Intellectual Value, WIRED Magazine, Jul. 1995, pp. 136-141 and 182-183. cited by other . Science, space and technology, Hearing before Subcomm. on Technology, Environment, and Aviation, May 26, 1994 (testimony of D. Linda Garcia). cited by other . James Gleick, Dead as a Dollar, The New York Times Magazine, Jun. 16, 1996, Sect. 6, pp. 26-30, 35, 42, 50, 54. cited by other . Fred Greguras, Document from Internet: Softic Symposium '95, Copyright Clearances and Moral Rights, Dec. 11, 1995, 3 pages. cited by other . Louis C. Guillou, Smart Cards and Conditional Access, Advances in Cryptography--Proceedings of EuroCrypt 84 (T. Beth et al, Ed., Springer-Verlag, 1985) pp. 480-490. cited by other . Harry H. Harman, Modern Factor Analysis, Third Edition Revised, University of Chicago Press, Chicago and London, 1976. cited by other . Amir Herzberg and Shlomit S. Pinter, Public Protection of Software, ACM Transactions on Computer Systems, vol. 5, No. 4, Nov. 1987, pp. 371-393. cited by other . Jud Hofmann, Interfacing the NII to User Homes, (Consumer Electronic Bus. Committee) NIST, Jul. 1994, 12 slides. cited by other . Jud Hofmann, Interfacing the NII to User Homes, Electronic Industries Association, (Consumer Electronic Bus Committee) (undated), 14 slides. cited by other . Stannie Holt, Document from the Internet: Start-up promises user confidentiality in Web marketing service, InfoWorld Electric News (updated Aug. 13, 1997). cited by other . Jay J. Jiang and David W. Conrath, A Concept-based Approach to Retrieval from an Electronic Industrial Directory, International Journal of Electronic Commerce, vol. 1, No. 1 (Fall 1996) pp. 51-72. cited by other . Debra Jones, Document from the Internet: Top Tech Stories, PowerAgent Introduces First Internet `Informediary` to Empower and Protect Consumers, (updated Aug. 13, 1997) 3 pages. cited by other . Kevin Kelly, E-Money, Whole Earth Review, Summer 1993, pp. 40-59. cited by other . Stephen Thomas Kent, Protecting Externally Supplied Software in Small Computers, (MIT/LCS/TR-255) Sep. 1980 254 pages. cited by other . David M. Kristol, Steven H. Low and Nicholas F. Maxemchuk, Anonymous Internet Mercantile Protocol, (AT&T Bell Laboratories, Murray Hill, NJ) Draft: Mar. 17, 1994. cited by other . Carl Lagoze, The Warwick Framework, A Container Architecture for Diverse Sets of Metadata, D-Lib Magazine, Jul./Aug. 1996. cited by other . Mike Lanza, e-mail, George Gilder's Fifth Article--Digital Darkhorse--Newspapers, Feb. 21, 1994. cited by other . Steven Levy, E-Money, That's What I want, WIRED, Dec. 1994, 10 pages. cited by other . Steven H. Low and Nicholas F. Maxemchuk, Anonymous Credit Cards, AT&T Bell Laboratories, Proceedings of the 2.sup.nd ACM Conference on Computer and Communication Security, Fairfax, VA, Nov. 2-4, 1994, 10 pages. cited by other . Steven H. Low, Nicholas F. Maxemchuk, and Sanjoy Paul, Anonymous Credit Cards and its Collusion Analysis (AT&T Bell Laboratories, Murray Hill, N.J.) Oct. 10, 1994, 18 pages. cited by other . S. H. Low, N.F. Maxemchuk, et al., Document Marking and Identification using both Line and word Shifting (AT&T Bell Laboratories, Murray Hill, N.J.) Jul. 29, 1994, 22 pages. cited by other . Malcolm Maclachlan, Document from the Internet: PowerAgent Debuts Spam-Free Marketing, TechWire, Aug. 13, 1997, 3 pages. cited by other . N.F. Maxemchuk, Electronic Document Distribution, (AT&T Bell Laboratories, Murray Hill, N.J.) (undated). cited by other . Eric Milbrandt, Document from the Internet: Steganography Info and Archive, 1996, 2 pages. cited by other . Ryoichi Mori and Masaji Kawahara, Superdistribution: The Concept and the Architecture, The Transactions of the EIEICE, V, E73, No. 7, Tokyo, Japan, Jul. 1990. cited by other . Walter S. Mossberg, Personal Technology, Threats to Privacy On-Line Become More Worrisome, The Wall Street Journal, Oct. 24, 1996. cited by other . Nicholas Negroponte, Some Thoughts on Likely and Expected Communications Scenarios: A Rebuttal, Telecommunications, Jan. 1993, pp. 41-42. cited by other . Nicholas Negroponte, Electronic Word of Mouth, WIRED, Oct. 1996, p. 218. cited by other . Peter G. Neumann, Robert S. Boyer, et al., A Provably Secure Operating System: The System, Its Applications, and Proofs, Computer Science Laboratory Report CSL-116, Second Edition, SRI International, Jun. 1980. cited by other . Joseph N. Pelton (Dr.), Why Nicholas Negroponte is Wrong About the Future of Telecommunication, Telecommunications, Jan. 1993, pp. 35-40. cited by other . Gordon Rankine (Dr.), Thomas--A Complete Single-Chip RSA Device, Advances in Cryptography, Proceedings of CRYPTO 86, (A.M. Odiyzko Ed., Springer-Verlag) 1987, pp. 480-487. cited by other . Arthur K. Reilly, Input to the International Telecommunications Hearings, Panel 1: Component Technologies of the NII/GII, Standards Committee T1-Telecommunications (undated). cited by other . Paul Resnick and Hal R. Varion, Recommender Systems, Communications of the ACM, vol. 40, No. 3, Mar. 1997 pp. 56-89. cited by other . Lance Rose, Cyberspace and the Legal Matrix: Laws or Confusion?, 1991. cited by other . Steve Rosenthal, Interactive Network: Viewers Get Involved, New Media, Dec. 1992, pp. 30-31. cited by other . Steve Rosenthal, Interactive TV: The Gold Rush is on, New Media, Dec. 1992, pp. 27-29. cited by other . Steve Rosenthal, Mega Channels, New Media, Sep. 1993, pp. 36-46. cited by other . Edward Rothstein, Technology, Connections, Making the Internet come to you through `push` technology, N. Y. Times, Jan. 20, 1997, p. D5. cited by other . Ken Rutkowski, Document from Internet: PowerAgent Introduces First Internet `Informediary` to Empower and Protect Consumers, Tech Talk News Story, Aug. 4, 1997, 1 page. cited by other . Ira Sager (Edited by), Bits & Bytes, Business Week, Sep. 23, 1996, p. 142E. cited by other . Schlosstein, Steven, America: The G7's Comeback Kid, International Economy , Jun./Jul. 1993, 5 pages. cited by other . Ingrid Scnaumueller-Bichl and Ernst Piller, A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques, (undated), 9 pages. cited by other . Jurgen Schurmann, Pattern Classification, A Unified View of Statistical and Neural Approaches, John Wiley & Sons, Inc., 1996. cited by other . Victor Shear, Solutions for CD-ROM Pricing and Data Security Problems, CD ROM Yearbook 1988-1989 (Microsoft Press 1988 or 1989) pp. 530-533. cited by other . Karl Siuda, Security Services in Telecommunications Networks, Seminar: Mapping New Applications Onto New Technologies, edited by B. Plattner and P Gunzburger; Zurich, Mar. 8-10, 1988, pp. 45-52, XP000215989. cited by other . Sean Smith and J.D. Tygar, Signed Vector Timestamps: A Secure Protocol for Partial Order Time, CMU-93-116, School of Computer Science Carnegie Mellon University, Pittsburgh, Pennsylvania, Oct. 1991; version of Feb. 1993, 15 pages. cited by other . Mark Stefik, Letting Loose the Light: Igniting Commerce in Electronic Publication, (Xerox PARC, Palo Alto, CA) 1994-1995, 35 pages. cited by other . Mark Stefik, Letting Loose the Light: Igniting Commerce In Electronic Publication, Internet Dreams: Archetypes, Myths, and Metaphors. Massachusetts Institute of Technology, 1996, pp. 219-253. cited by other . Mark Stefik, Chapter 7, Classification, Introduction to Knowledge Systems (Morgan Kaufmann Publishers, Inc., 1995) pp. 543-607. cited by other . Tom Stephenson, The Info Infrastructure Initiative: Data Super Highways and You, Advanced Imaging, May 1993, pp. 73-74. cited by other . Bruce Sterling, Literary freeware: Not for Commercial Use, remarks at Computers, Freedom and Private Conference IV, Chicago, IL, Mar. 26, 1994. cited by other . Bruno Struif, The Use of Chipcards for Electronic Signatures and Encryption, Proceedings for the 1989 Conference on VSLI and Computer Peripherals, IEEE Computer Society Press, 1989, pp. (4)155-(4)158. cited by other . J.D. Tygar and Bennet Yee, Cryptography: It's Not Just For Electronic Mail Anymore, CMU-CS-93-107, School of Computer Science Carnegie Mellon University, Pittsburgh, PA, Mar. 1, 1993, 21 pages. cited by other . J.D. Tygar and Bennet Yee, Dyad: A System for Using Physically Secure Coprocessors, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA (undated), 41 pages. cited by other . J.D. Tygar and Bennet Yee, Dyad: A System for Using Physically Secure Coprocessors, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, May 1991, 36 pages. cited by other . T. Valovic, The Role of Computer Networking in the Emerging Virtual Marketplace, Telecommunications, (undated), pp. 40-44. cited by other . Joan Voight, Beyond the Banner, Wired, Dec. 1996, pp. 196, 200, 204. cited by other . Steven Vonder Haar, Document from the Internet: PowerAgent Launches Commerical Service, Interactive Week, Aug. 4, 1997, 1 page. cited by other . Robert Weber, Metering Technologies for Digital Intellectual Property, A Report to the International Federation of Reproduction Rights Organisations (Boston, MA), Oct. 1994, pp. 1-29. cited by other . Robert Weber, Document from the Internet: Digital Rights Management Technologies, Oct. 1995, 21 pages. cited by other . Robert Weber, Digital Rights Management Technologies, A Report to the International Federation of Reproduction Rights Organisations, Northeast Consulting Resources, Inc., Oct. 1995, 49 pages. cited by other . Adele Weder, Life on the Infohighway, INSITE, (undated), pp. 23-25. cited by other . Steve H. Weingart, Physical Security for the ABYSS System, (IBM Thomas J. Watson Research Center, Yorktown Heights, NY), 1987, pp. 52-58. cited by other . Daniel J Weitzner, A Statement on EFF's Open Platform Campaign as of Nov., 1993, 3 pages. cited by other . Steve R. White, ABYSS: A Trusted Architecture for Software Protection, (IBM Thomas J. Watson Research Center, Yorktown Heights, NY), 1987, pp. 38-50. cited by other . Bennet Yee, Using Secure Coprocessors, CMU-CS-94-149, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, 1994, 94 pages. cited by other . Frank Yellin, Document from the Internet: Low Level Security in Java, Sun Microsystems, 1996, 8 pages. cited by other . Symposium: Applications Requirements for Innovative Video Programming; How to Foster (or Cripple) Program Development Opportunities for Interactive Video Programs Delivered on Optical Media: A Challenge for the Introduction of DVD (Digital Video Disc) (Oct. 19-20, 1995, Sheraton Universal Hotel, Universal City CA). cited by other . Argent Information, Q&A Sheet, Document from the Internet: <http://www.digital-watermark.com/>, Copyright 1995, The DICE Company, (last modified Jun. 16, 1996), 7 pages. cited by other . New Products, Systems and Services, AT&T Technology, vol. 9, No. 4, (undated), pp. 16-19. cited by other . Cable Televison and America's Telecommunications Infrastructure, (National Cable Television Association, Washington, D.C.), Apr. 1993, 19 pages. cited by other . CD ROM: Introducing . . . The Workflow CD-ROM Sampler (Creative Networks, MCIMail: Creative Networks, Inc.), (undated). cited by other . Codercard, Basic Coder Subsystem (Interstate Electronics Corp., Anaheim, CA), (undated) 4 pages. cited by other . Collection of documents including: Protecting Electronically Published Properties, Increasing Publishing Profits, (Electronic Publishing Resources Inc.,) Jan. 1993, 25 pages. cited by other . Communications of the ACM, vol. 39, No. 6, Jun. 1996, 130 pages. cited by other . Communications of the ACM, "Intelligent Agents," vol. 37, No. 7, Jul. 1994, 170 pages. cited by other . Computer Systems Policy Project (CSSP), Perspectives on the National Information Infrastructure: Ensuring Interoperability, Feb. 1994, 5 slides. cited by other . DiscStore (Electronic Publishing Resources, Chevy Chase, MD), 1991. cited by other . DSP56000/DSP56001 Digital Signal Processor User's Manual, (Motorola), 1990, p. 2-2. cited by other . A Supplement to Midrange Systems, Premenos Corp. White Paper: The Future of Electronic Commerce, Document from Internet: <[email protected]>, Aug. 1995, 4 pages. cited by other . CGI Common Gateway Interface, Document from the Internet: <[email protected]>, 1996, 1 page. cited by other . HotJava.TM.: The Security Story, Document from the Internet: (undated) 4 pages. cited by other . About the Digital Notary Service, Document from the Internet: <[email protected]>, (Surety Technologies), May 1994, 6 pages. cited by other . Templar Overview: Premenos, Document from the Internet: <[email protected]>, (undated), 4 pages. cited by other . Templar Software and Services, Secure, Reliable, Standards-Based EDI Over the Internet: Document from the Internet: <[email protected],> (Premenos) (undated), 1 page. cited by other . JAVASOFT, Frequently Asked Questions--Applet Security, Document from Internet: <[email protected]>, Jun. 7, 1996, 8 pages. cited by other . News from The Document Company XEROX, Xerox Announces Software Kit for Creating `Working Documents` with Dataglyphs Document from Internet: Nov. 6, 1995, 13 pages. cited by other . Premenos Announces Templar 2.0--Next Generation Software for Secure Internet EDI, Document from Internet: <[email protected]>, Jan. 17, 1996, 1 page. cited by other . WEPIN Store, Stenography (Hidden Writing), Document from Internet: (Common Law), 1995, 1 page. cited by other . Sag's durch die Blume, Document from Internet: <[email protected],> (German), (undated), 5 pages. cited by other . A Publication of the Electronic Frontier Foundation, EFFector Online vol. 6 No. 6., Dec. 6, 1993, 8 pages. cited by other . EIA and TIA White Paper on National Information Infrastructure, The Electronic Industries Association and the Telecommunications Industry Association, Washington, D.C., (undated). cited by other . Electronic Currency Requirements, XIWT (Cross Industry Working Group), (undated). cited by other . Electronic Publishing Resources Inc. Protecting Electronically Published Properties Increasing Publishing Profits (Electronic Publishing Resources, Chevy Chase, MD) 1991, 19 pages. cited by other . What is Firefly?, Document from the Internet: <www.ffly.com>, (Firefly Network, Inc.) Firefly revision: 41.4, (Copyright 1995, 1996), 1 page. cited by other . First CII Honeywell Bull International Symposium on Computer Security and Confidentiality, Conference Text, Jan. 26-28, 1981, pp. 1-21. cited by other . Framework for National Information Infrastructure Services, Draft, U.S. Department of Commerce, Jul. 1994. cited by other . Framework for National Information Infrastructure Services, NIST, Jul. 1994, 12 Slides. cited by other . Intellectual Property and the National Information Infrastructure, a Preliminary Draft of the Report of the Working Group on Intellectual Property Rights, Green paper, Jul. 1994, 141 pages. cited by other . Multimedia Mixed Object Envelopes Supporting a Graduated Fee Scheme Via Encryption, IBM Technical Disclosure Bulletin, vol. 37, No. 3, Mar. 1, 1994, pp. 413-417, XP000441522. cited by other . Transformer Rules Strategy for Software Distribution Mechanism-Support Products, IBM Technical Disclosure Bulletin, vol. 37, No. 48, Apr. 1994, pp. 523-525, XP000451335. cited by other . IISP Break Out Session Report for Group No. 3, Standards Development and Tracking System, (undated). cited by other . Information Infrastructure Standards Panel: NII "The Information Superhighway", NationsBank--HGDeal--ASC X9, (undated), 15 pages. cited by other . Invoice? What's an Invoice?, Business Week, Jun. 10, 1996, pp. 110-112. cited by other . Micro Card (Micro Card Technologies, Inc., Dallas, TX), (undated), 4 pages. cited by other . Background on the Administration's Telecommunications Policy Reform Initiative, News Release, The White House, Office of the President, Jan. 11, 1994, 7 pages. cited by other . NII, Architecture Requirements, XIWT, (undated). cited by other . Symposium: Open System Environment Architectural Framework for National Information Infrastructure Services and Standards, in Support of National Class Distributed Systems, Distributed System Engineering Program Sponsor Group, Draft 1.0, Aug. 5, 1994, 34 pages. cited by other . Proper Use of Consumer Information on the Internet, Document from the Internet, White Paper, (PowerAgent Inc., Menlo Park, CA) Jun. 1997, 9 pages. cited by other . What the Experts are Reporting on PowerAgent, Document from the Internet, PowerAgent Press Releases, Aug. 13, 1997, 6 pages. cited by other . What the Experts are Reporting on PowerAgent, Document from the Internet, PowerAgent Press Releases, Aug. 4, 1997, 5 pages. cited by other . Portland Software's Ziplock, Internet Information, Copyright Portland Software 1996-1997, 12 pages. cited by other . Press Release, National Semiconductor and EPR Partner for Information Metering/Data Security Cards (Mar. 4, 1994). cited by other . R01 (Personal Library Software, 1987 or 1988). cited by other . R01--Solving Critical Electronics Publishing Problems (Personal Library Software, 1987 or 1988). cited by other . Serving the Community: A Public Interest Vision of the National Information Infrastructure, Computer Professionals for Social Responsibility, Executive Summary (undated). cited by other . Special Report, The Internet: Fulfilling the Promise; Lynch, Clifford, The Internet Bringing Order From Chaos; Resnick, Paul, Search the Internet, Hearst, Marti A., Filtering Information on the Internet; Stefik, Mark, Interfaces for Searching the Web; Scientific American, Mar. 1997, pp. 49-56, 62-67, 68-72, 78-81. cited by other . The 1:1 Future of the Electronic Marketplace: Return to a Hunting and Gathering Society, (undated), 2 pages. cited by other . The Benefits of RDI for Database Protection and usage Based Billing (Personal Library Software, 1987 or 1988). cited by other . The New Alexandria No. 1, Alexandria Institute, Jul.-Aug. 1986, pp. 1-12. cited by other . Is Advertising Really Dead?, Wired 1.02, Part 2, 1994. cited by other . How Can I Put an Access Counter on My Home Page?, World Wide Web FAQ, 1996, 1 page. cited by other . XIWT Cross Industry Working Team, Jul. 1994, 5 pages. cited by other . Frederick B. Cohen, Operating System Protection Through Program Evolution, 8246 Computers & Security, No. 6, (Oxford, Great Britain) Oct. 1993, pp. 565-584. cited by other . Olin Sibert et al., DigiBox: A Self-Protecting Container for Information Commerce, Proceedings of the First USENIX Workshop on Electronic Commerce, New York, NY, Jul. 1995, 9 pages. cited by other . Olin Sibert et al., Securing the Content, Not the Wire, for Information Commerce, InterTrust Technologies Corporation, 1996, 12 pages. cited by other . Garrett et al., "Toward an electronic Copyright Management System," J. of the Amer. Soc. for Info., 44(8):468-473, 1993. cited by other . Kozuka et al., "Electronic Magazine Editing Software for 3DO," National Technical Report, Matsushita Electric Industrial Co., Ltd., 40(6):88-97, 1994. cited by other . Rozenblit, Moshe, "Secure Software Distribution," IEEE Network Operations and Management Symposium, 2:486-496, 1994. cited by other . Seki et al., "A Proposal for New Software Distribution System Using a Secret Code," Research Report of Information Processing Societies, 93(64):19-28, 1993. cited by other . Torii et al., "System Architecture for Super Distribution," Technical Research Report of Institute of Electronics, Information and Communication Engineers, 94(240):59-66, 1994. cited by other . Ueki et al., "Accounting Processing in Right Management Mechanism for Super Distribution," Study Report of Information Processing Societies, 90(1):1-10, 1990. cited by other . Abadi, M., et al., "A Calculus for Access Control in Distributed Systems", Digital Equipment Corporation, Feb. 28, 1991, revised Aug. 28, 1991. cited by other . Abadi, M. et al., "Authentication and Delegation with Smart-cards," Technical Report 67, DEC Systems Research Center, Oct. 1990, available at <http://citeseer.nj.nec.com/article/abadi92authentication.hmtl>, 22 pages. cited by other . Abrams, Marshall D, "Renewed Understanding of Access Control Policies", Proceedings of the 16.sup.th Computing Natioal Security Conference, 1993. cited by other . Aharonian, G., "Software Patents--Relative Comparison of EPO/PTO/JPO Software Searching Capacities," Source Translation & Optimization. cited by other . Antonelli et al, "Access Control in a Workstation-Based Distributed Computing Environment," CITI Technical Report 90-2 (Jul. 17, 1990). cited by other . Arms, W.Y., "Key Concepts in the Architecture of the Digital Library," D-Lib Magazine, (Jul. 1995). cited by other . Atkinson, R., "Security Architecture for the Internet Protocol," Network Working Group RFC 1825 (Aug. 1995). cited by other . Aucsmith, David, "Tamper Resistant Software: An Implementation", IAL. cited by other . Avery, et al., "Recommender Systems for Evaluating Computer Messages," Communications of the ACM, pp. 88-89 (Mar. 1997). cited by other . Bender et al. "Techniques for Data Hiding," IBM Systems Journal, vol. 35, Nos. 3&4 (1996). cited by other . Berghal et al., "Protecting Ownership Rights Through Digital Watermaking," IEEE Computing, vol. 29, No. 7 (Jul. 1996). cited by other . Bernstein et al., "Copyrights, Distribution Chains, Integrity, and Privacy: The Need for a Standards-Based Solution," Electronic Publishing Resources. cited by other . Bishop, M., "Privacy-Enhanced Electronic Mail," Privacy and Security research Group, IAB. cited by other . Blaze, Matt, "A Cryptographic File System for Unix," pre-print of paper for First ACM Conference on Computer and Communications Security, Fairfax, Virginia, Nov. 3-5, 1993, 8 pages. cited by other . Blaza, Matt, et al., "Decentralized Trust Management" Proc. IEEE Conference on Security and Privacy, May 1996. cited by other . Blaze, M., "Key Management in an Encrypting File Systems," Proc. Summer 1994 USENIX Technical Conference (Jun. 1994). cited by other . Blaze, Matt, et al., "The Architecture and Implementaiton of Network Layer Security Under Unix", Columbia University and AT&T Bell Laboratories, 1994. cited by other . Boisson, Jean-Francois, "How to CITEDise Application: Guidelines and Examples," CITED 5469. cited by other . Boisson, Jean-Francois, "1-Business Perspective and Requirements, 2-The CITED Project: Keys and Knowledge," CITED 5469. cited by other . Boisson, Jean-Francois, "Management of Intellectual Property Rights in the Electronic Commerce: Textile Design Sales and Other Similar Initatives," EURITIS. cited by other . Boisson, Jean-Francois, "Software Components; Deliverable Trial Offer," CITED 5469. cited by other . Bos et al., "SmartCash: a Practical electronic payment System," Center for Mathematics and Computer Science, Report CS-R9035. cited by other . Brassil et al., "Electronic Marking and Identification Techniques to Discourage Document Copying," AT&T Bell Laboratories, Proc. Infocom 94, 1994. cited by other . Brin, Sergey, et al., "Copy Detection Mechanism for Digital Documents", Stanford University. cited by other . Brunnstein et al., "Intellectual Property Rights and new Technologies," Proceedings of the KnowRight '95 Conference (Aug. 1995). cited by other . Burns, Christopher, "AAP Draft: Local Access and Usage Controls", Association of American Publishers Report, Apr. 13, 1995. cited by other . Case, J., "A Simple Network Management Protocol (SNMP)," Network Working Group, May 1990, pp. 1-21. cited by other . Castano, S. et al., Database Security, Addison-Wesley & Acm Press, 1995. cited by other . Chaum, David, "Achieving Electronic Privacy," Scientific American, Aug. 1992, pp. 96-101. cited by other . Chaum, D., "Privacy and Social Protection in Electronic Payment Systems," Chapter 12, The Future of Money in the Information Age. cited by other . Chaum, David, "Security Without Identification: Card Computers to Make Big Brother Obsolete," viewed on Aug. 23, 2002 at <http://www.chaum.com/articles/Security_Wthout_Identification.html> pp. 1-24. cited by other . Chaum, D., "Security Without Identification: Card Computers to Make Big Brother Obsolete," viewed on Aug. 23, 2002 at <http://www.chaum.com/articles/Security_Wthout_Identification.html> pp. 1-24. cited by other . Chaum, David, "Smart Card 2000," Selected Papers from the Second International Smart Card 2000 Conference, Oct. 4-6, 1989. cited by other . Chaum, David, SmartCard 2000, Elsevier Science Publishers, 1991. cited by other . Chaum, D., "Untraceable Electronic Cash," Extended Abstract, Center for Mathematics and Computer Science, 1988, pp. 319-327. cited by other . Chaum, et al., "Wallet Databases with Observers," CWI, Aarhus University, Advances in Cryptography, Proceedings of Crypto '92, pp. 89-105 (1992). cited by other . Chor et al., "Tracing Traitors," Crypto 94, p. 257 (1994). cited by other . Choudhury, A.K. et al., "Copyright Protection for Electronic Publishing Over Computer Networks," AT&T Bell Laboratories, Murray Hill, NJ, Jun. 1994, 18 pages. cited by other . Choy, D.M., et al., "A Digital Library System for Periodicals Distribution", May 1996. cited by other . Cina Jr. et al., "ABYSS: A Basic Yorktown Security System PC Software Asset Protection Concepts," IBM Research Report No. RC 12401, IBM Thomas J. Watson Research Center (Dec. 18, 1986). cited by other . Clarke et al., "Cryptography Issues in Plain Text," Privacy Law and Policy Reporter (1996). cited by other . Cousins, Steve B. et al., "InterPay: Managing Multiple Payment Mechanisms in Digital Libraries." cited by other . Coutrot, Francois, et al., "A Single FConditional Access System for Satellite-Cable and Terrestrial TV", IEEE Transactions on Consumer Electronics, vol. 35, No. 3, Aug. 1989. cited by other . Cox, Benjamin et al., "NetBill Security and Transaction Protocol," Carnegie Mellon University. cited by other . Cox, B., "Superdistribution," Wired, Sep. 1994, 2 pages. cited by other . Cox, Brad, "What If There is Silver Bullet and the Competition Gets it First?," Journal of Object-Oriented Programming, Jun. 1992. cited by other . Crocker et al., "MIME Object Security Services," Network Working Group RFC 1848 (Oct. 1995). cited by other . Curry, D.A., UNIX System Security: A Guide for Users and System Administrators, Addison-Wesley Publishing Company, Inc., 1992. cited by other . Custer, H. Inside Windows NT, Microsoft Press, Redmond WA, 1993. cited by other . Davies, D.W.; Price, W.L.; Security for Computer Networks, John Wiley & Sons, 1984. cited by other . Davin, J., et al., "SNMP Administrative Model," Network Working Group, Jul. 1992, pp. 1-22. cited by other . Deering, S.E., "Host Extensions for IP Multicasing," Network Working Group, RFC 1112 (Aug. 1989). cited by other . Dempsey, Lorcan, et al., "The Warwick Metadata Workshop: A Framework for the Deployment of Resource Description," Jul./Aug. 96. cited by other . Denning, Dorothy E.R., Cryptography and Data Security, Addison-Wesley Publishing Company, 1982, Reprinted with corrections, Jan. 1983. cited by other . Denning, D. E., "Secure Personal Computing in an Insecure Network," Communications of the ACM, Aug. 1979, vol. 22, No. 8, pp. 476-482. cited by other . Diffie, Whitfield, "Authentication and Authenticated Key Exchanges", Sun Microsystems and Bell-Northern Research, Mar. 6, 1992. cited by other . Diffie, Whitfield, et al., "New Directions in Cryptography", Stanford University, 1976. cited by other . Diffie, Whitfield, "The First Ten Years of Public-Key Cryptography", Proceedings of the IEEE, vol. 76, No. 5, May 1988. cited by other . Doster et al., "Third-Party Authentication in the Institutional File System," Center for Information Technology Integration. cited by other . Eastlake III, D., "Physical Link Security Type of Service," Network Working Group RFC 1455 (May, 1993). cited by other . Eastlake III et al., "Randomness Recommendations for Security," Network Working Group RFC 1750, Dec. 1994. cited by other . Ebersol, Joseph, "Protecting Intellectual Property Rights on the Information Superhighways," Mar. 1994. cited by other . Eizenberg, G., "Contribution of Information Technology Security to Intellectual Property Protection," CERT-DERI. cited by other . Epstein, J., "A Trusted X Window System Server for Trusted Mach," Usenix Association Proceedings, Mach Workshop, Oct. 4-5, 1990, Burlington, Vermont, pp. 141-155. cited by other . Erickson, John S., "A Copyright Management System for Networke Interactive Multimedia", Proceedings of the 1995 Dartmouth Institute for Advanced Graduate Studies, 1995. cited by other . Erickson, John S., "Rights Management Through Enhanced Attribution", Presented at INET 96 Proceedings, Jun. 1996. cited by other . Everett, David B., "Smart Card Tutorial--Part 1," Sep. 1992. cited by other . Feistel, H. "Cryptographic Coding for Data-Bank Privacy," IBM document RC 2827 (Mar. 18, 1970). cited by other . Fine, T., et al., "Assuring Distributed Trusted Mach," Secure Computing Corporation, 1993, 13 pages. cited by other . Finin et al., "A Language and Protocol to Support Intelligent Agent Interoperability," Proceedings of the CE & CALS, Washington '92 Conference (Apr. 1992). cited by other . Fuchsberger et al., "Public-key Cryptography on Smart Cards," Information Security Group. cited by other . Frederick, Keith P., "Certification and Accreditation Approach", Air Force Cryptologic Support Center (OL-FP). cited by other . Fugini, M.G., et al., "Authorization and Access Control in the Office-Net System," Computer Security in the Age of Information, 1989, pp. 147-162. cited by other . Galvin, J., et al., "SNMP Security Protocols," Network Working Group, Jul. 1992, pp. 1-26. cited by other . Galvin et al., "Security Protocols for verison 2 of the Simple Network Management Protocol (SNMPv2)," Network Working Group RFC 1446 (Apr. 1993). cited by other . Gamble, Todd, "Implementing Execution Controls in Unix," Usenix Association, Proceedings of the Seventh Systems Administration Conference, Nov. 1-5, 1993, Monterey, California, pp. 237-242. cited by other . Garfinkel, Simson, et al., Practical UNIX Security, O'Reilly & Associates, Inc., 1991. cited by other . Gasser, M., et al., "The Digital Distributed System Security Architecture," Reprint from the Proceedings of 1989 National Computer Security Conference, 1989, pp. 1-13. cited by other . Gaster, J. L., "Authors' Rights and Neighboring Rights in the Information Society," DG XV/E/4, European Commission. cited by other . Gilde, R., "DAT-Heads: Frequently Asked Questions," 1991, Release 3.1 (Sep. 2, 1992). cited by other . Gircys, G.R., Understanding and Using COFF, O'Reilly & Associates, Inc. (Nov. 1988). cited by other . Goodman, Bill, "Compactor Pro." cited by other . Gosler, James, "Software Protection: Myth or Reality", Lecture Notes in Computer Science, Advances in Cryptology--Crypto '85 Proceedings, 1985. cited by other . Gozani et al., "GAFFES: The Design of a Globally Distributed File System," Report No. UCB/CSD 87/361; Computer Science Division (EECS), U.C. Berkley (Jun. 1997). cited by other . Greenwald et al., "The Distributed Compartment Model for resource management and Access Control," Technical report No. TR94-035, The University of Florida (Oct. 1994). cited by other . Griswold, Gary N., "A Method for Protecting Copyright on Networks", IMA Intellectural Property Proceedings, vol. 1, Issue 1, Jan. 1994. cited by other . Guillou, Louis C.; "Smart Cards and Conditional Access", Springer-Verlag, 1988. cited by other . Haller, N., "The S/Key One-Time Password System," Network Working Group RFC 1760 (Feb. 1995). cited by other . Hardy, N., "The Keykos Architecture," Eighth Edition, Dec. 1990, pp. 1-8. cited by other . Harris, J., et al. "Bento Specification," Apple Computer, Inc., Jul. 15, 1993, 106 pages. cited by other . Harly, K. et al., "Case Study: The VISA Transaction Processing System," May 30, 1988, pp. 1-23. cited by other . Hauser, Ralf, "Control Information Distribution and Access," Dissertation Der Wirtschaftswissenschaftlichen Fakultat Der Universitat Zurich, May 31, 1995. cited by other . Hauser, Ralf, et al., "LTTP Protection--A Pragmatic Approach to Licenseing", Institut fur Informatik, Universitat Zurich, Jan. 13, 1994. cited by other . Hellman, "Multi-user Cryptographic Techniques". cited by other . Herzberg, Amir, et al., "On Software Protection", Proceedings of the 4.sup.th Jerusalem Conference on Information Technology (JCIT), IEE Computer Society Proes. Apr. 1984. cited by other . Herzberg, Amir, et al., "Public Protection of Software", ACM Transactions on Computer Systems, vol. 5, No. 4, Nov. 1987. cited by other . Hickman, Kipp, E.B., SSL 2.0 Protocol Specificatoin. cited by other . Hill, William et al., "Edit Wear and Read Wear," Computer Graphics and Interactive Media Research Group, ACM; May 3-7, 1992. cited by other . Hill, William et al., "History-Enriched Digital Objects," Computer Graphics and Interactive Media Research Group; Bell Communications Research, 1993. cited by other . Jones et al., "Credentials for Privacy and Interoperation," University of Illinois at Urbana-Champaign. cited by other . Johnson, H.L., et al., "A Secure Distributed Capacity Based System," ACM, 1985, pp. 392-402. cited by other . Kahn, Robert, et al., A Framework for Distgributed Digital Object Services, Corporation for National Research Initatives, May 13, 1995. cited by other . Kaliski, Jr., et al. "A Layman's Guide to a Subset of ASN.1, BER, and DER", RSA Laborato4ries Technical Note, 1991, Revised Nov. 1, 1993. cited by other . Kane, Cem et al., Testing Computer Software, Second Edition, Van Nostrand Reinhold, 1988. cited by other . Kaplan, M., "IBM Cryptolopes, Super Distribution and Digital Rights Management," viewed at <<http://www.research.ibm.com/people/k/kaplan/cryptolope-docs/crypa- p.html> on Dec. 30, 1996, pp. 1-10. cited by other . Kastenholz, F., "The Definitions of Managed Objects for the Security Protocols of the Point-to-Point Protocol," Network Working Group RFC 1472 (Jun. 1993). cited by other . Kelman, Alistair, "Electronic Copyright Management: Possibilities and Problems", Scientists for Labor Presentation, Nov. 14, 1996. cited by other . Kent, S., "U.S. Department of Defense Security Options for the Internet Protocol," Network Working Group RFC 1108 (Nov. 1991). cited by other . Kim, Gene H., et al. "Experiences with Tripwire: Using Integrity Checkers for Intrusion Detection," Purdue Technical Report CSD-TR-94-012, Feb. 21, 1994. cited by other . Kim, G.H., "The Design and Implementation of Tripwire: A File System Integrity Checker," Nov. 19, 1993. cited by other . Ketchpel, Steve P., et al. "Shopping Models: A Flexible Architecture for Information Commerce", Stanford University. cited by other . Kim, W., et al., "Features of the ORION Object-Oriented Database System," 1989, pp. 251-282. cited by other . Koenig, A., "Automatic Software Distribution," Usenix Association Software Tools Users Group, Summer Conference, Salt Lake City, Jun. 12-15, 1984, pp. 312-322. cited by other . Kohl et al., "Safeguarding Digital Library Contents and Users," IBM Research Division, D-Lib Magazine (Sep. 1997). cited by other . Kohl et al., "Safeguarding Digital Library Contents and Users," IBM research Division, D-Lib magazine, (Sep. 1997). cited by other . Kohl, J. et al., "The Kerberos Network Authentication Service (V 5)," Network Working Group Request for Comments RFC-1510, Sep. 1993, 104 pages. cited by other . Kohnfelder, Loren M., "Toward a Practical Public-Key Cryptosystem", May 1978. cited by other . Lacy, Jack, et al., "Music on the Internet and the Intellectual Property Protection Problem". cited by other . Lagoze et al., "A Design for Inter-Operable Secure Object Stores (ISOS)," Cornell University, NCSA, CNRI (Nov. 1995). cited by other . Lagoze, Carl, "A Secure Repository Design for Digital Libraries", D-Lib Magazine, Dec. 1995. cited by other . Lampson, Butler, et al., "Authentication in Distributed Systems: Theory and Practice", Digital Equipment Corporation, 1992. cited by other . Langelaar, G.C., "Overview of Protection Methods in Existing TV and Storage Devices," SMS-TUD-609-1, Final Ver. 1,2, Feb. 26, 1996. cited by other . Lesk, M., "Digital Libraries Meet Electronic Commerce: On-Screen Intellectural Property," (Dec. 15, 1998). cited by other . Lord et al., "Access Management in Multi-Administration Networks," IEE 2.sup.th International Conference on Secure Communication Systems (1986). cited by other . Low, S.H., et al., Document Marking and Identification Using Both Line and Word Shifting, Infocom 95, 1994. cited by other . Low, S.H., et al., "Document Marking and Identification Using Both Line and Word Shifting," AT&T Bell Laboratories Infocom 95, Jul. 29, 1994. cited by other . Mathy, Laurent, "Features of the ACCOPI Multimedia Transport Service", Lecture Notes in Computer Science No. 1045, Proc. of European Workshop IDMS' 96, Mar. 1996. cited by other . Maxemchuk, N.F., "Electronic Document Distribution", AT&T Bell Laboratories. cited by other . Merkle, Ralph C., "Protocols for Public Key Cryptosystems", IEEE, 1980. cited by other . Meyer, Carl H. et al., Cryptography: A New Dimension in Computer Security, John Wiley & Sons, New York, 1982. cited by other . Meyer, Carl H., et al., Cryptography: A New Dimension in Computer Data Security, John Wiley & Sons, Inc., 1982. cited by other . McCloghrie, K., et al., "Definitions of Managed Objects for Administration of SNMP Parties," Network Working Group, Jul. 1992, pp. 1-17. cited by other . McClogbrie et al., "Management Information Base for Network Management of TCP/IP-based Internets," Network Working Group, RFC 1156 (May 1990). cited by other . McCollum, C.J., et al., "Beyond the Pale of MAC and DAC-Defining New Forms of Access Control,", Unisys Defense Systems, 1990, pp. 190-200. cited by other . Millen, J.K., et al., "Security for Object-Oriented Database Systems," Proceedings of the 1992 IEREE Computer Society Symposium on Research in Security and Privacy, May 4-6, 1992, Oakland, California, pp. 260-272. cited by other . Moens, Jan, "Case of Application of the Generic CITED Model to the CITEDisation of a Directory Database on CD-ROM, Ver. 2.0," ESPIRIT II, Project 5469, The CITED Consortium, Nov. 30, 1992. cited by other . Moens, Jan, "Report on the Users Requirements, Ver. 1.0," ESPIRIT II, Project 5469, The CITED Consortium, Nov. 27, 1991. cited by other . Moffett, J. D., "Delegation of Authority Using Domain-Based Access Rules," thesis Imperial College of Science, Technology & Medicine, University of London (Jul. 1990). cited by other . Mori, R. et al., "Superdistribution: The Concept and the Architecture," THE TRANSACTIONS OF THE EIEICE, V, E73, No. 7, Tokyo, Japan, Jul. 1990, pp. 1133-1146. cited by other . Muftic, Sead, Security Mechanisms for Computer Networks, Ellis Horwood Limited, 1989. cited by other . Neuman, B.C., "Proxy-Based Authorization and Accounting for Distributed Systems," Information Sciences Institute, University of South California, 1993, pp. 283-291. cited by other . Neuman et al. "Kerberos: An Authentication Service for Computer Networks," IEEE Communications magazine (Sep. 1994). cited by other . Nguyen, Thanh et al., "Guidelines for Validation of a CITED System," CITED 5469, SA-21-40-003, Jul. 4, 1994. cited by other . O'Connor, MaryAnn, "New Distribution Option for Electronic Publishers," Information Access Co., Mar. 1994, pp. 1-6. cited by other . Olivier, M.S. et al., "A Taxonomy for Secure Object-oriented Databases," ACM Transactions on Database Systems, vol. 19, No. 1, Mar. 1994, pp. 3-46. cited by other . Olivier, M.S. et al., "Building a Secure Database using Self-protecting Objects," Computers & Security, vol. 11, No. 3, 1992, 14 pages. cited by other . Olivier, M.S. et al., "DISCO: A Discretionary Security Model for Object-oriented Databases," in GG Gable and WJ Caelii, Eds., IT Security: The Need for International Cooperation, pp. 345-357, Elsevier Science Publishers B.V. (North Holland), 1992, 14 pages. cited by other . Olivier, M.S. et al., "Secure Object-oriented Databases," Ph.D. Thesis, Rand Afrikaans University, Johannesburg, Dec. 1991, pp. I to xiv to 1-183. cited by other . Organick, E.I., The Multics System: An Examination of Its Structure, MIT Press, 1972. cited by other . Paepcke, Andreas, "Summary of Stanford's Digital Library Testbed and Status," Stanford University, D-Lib Magazine (Jul. 1996). cited by other . Paradinas, Pierre et al., "New Directions for Integrated Circuit Cards Operating Systems.". cited by other . Pijenborg, Mari, F.J., "Auteursrecht En De Digitale Bibliotheek," 195 Open, Jan. 1995. cited by other . Pijnenborg, Mari, F.J., "CITED Final Report," Elsevier Science B.V., Apr. 1994. cited by other . Perlman, Bill, "A Working Anti-Taping System for Cable Pay-Per View," IEEE Trans. On Consumer Electronics, vol. 35, No. 3 (Aug. 1989). cited by other . Pethia et al., "Guidelines for the Secure Operation of the Internet," Network Working Group, RFC 1281 (Nov. 1991). cited by other . Pietreck, M., Windows Internals: The Implementation of the Windows Operation Environment, Addison-Wesley (1993). cited by other . Popek, Gerald, J., et al., "Encryption and Secure Computer Networks," Computing Surveys, vol. 11, No. 4, Dec. 1979, pp. 331-356. cited by other . Press, Jim et al, "A New Approach to Crytographic Facility Design", ICL Mid-Range Systems Division Reading, Berks, UK. cited by other . Privacy and the NII: Safeguarding Telecommunications--Related Personal Infrmation, U.S> Dept. of Commerce, Oct. 1995. cited by other . Reali, Patti, "Copy Protection: The answer to pay per view's Prayers?", TVRO Dealer, Dec. 1994. cited by other . Reiher et al. "Truffles--Secure File Sharing With minimal system Administrator Intervention," UCLA, Trusted Information Systems. cited by other . Reiher et al., "Truffles--A Secure Service for Widespread File Sharing," UCLA, Trusted Information Systems. cited by other . Richardson, D.W., Electronic Money: Evolution of an Electronic Funds-Transfer System, The MIT Press (1970). cited by other . Rindfrey J., "Security in the World Wide Web," Fraunhofer Institute for Computer Graphics (Dec. 1996). cited by other . Rindfrey, Jochen, "Towards an Equitable System for Access Control and Copyright Protection in Broadcast Image Services; The Equicrypt Approach," Fraunhofer Institute for Computer Graphics. cited by other . Robinson et al., "Encoding Header Field for Internet Messages," Network Working Group RPC 1154 (Apr. 1990). cited by other . Rose et al., "Structure and Identification of management Information for TCP/IP-based Internets," Network Working Group RFC 1155 (May 1990). cited by other . Rosenbilt, Moshe, "Secure Software Distribution", IEEE 0-7803-1811-0/94, 1994. cited by other . Rosenthal, Doug, "EINet: A secure, Open Network for Electronic Commerce", IEEE, 1994. cited by other . Ross, P.E., "Cops versus robbers in cyberspace," Forbes (Sep. 9, 1996). cited by other . Rouaiz, F., "A Web Navigator with Applets in Caml," INRIA. cited by other . Rivest, Ronald L., et al., "SDSI--A Simple Distributed Security Infrastructure", MIT and Microsoft Corporation, Apr. 30, 1996. cited by other . Rubin et al., "Long Running Jobs in an Authenticated Environment," CITI Technical Report 93-1, Center for Information Technology Integration (Mar. 1993). cited by other . Rubin et al., "Formal Methods for he Analysis of Authentication Protocols CITI Technical Report 93-7," Center for Information Technology Integration (Nov. 8, 1993). cited by other . Sahuguet, A. "Piracy: the Dark Side of Electronic Commerce: CIS-700/2," Univ. of Pennsylvania (May 5, 1998). cited by other . Sandhu, Ravi, S., et al., "Implementation Considerations for the Typed Access Matrix Model in a Distributed Environment," Proceedings of the 15.sup.th NIST-SCSC National Computer Security Conference, Baltimore, Maryland, Oct. 1992, pp. 221-235. cited by other . Sammer et al., "New Tools for the Internet," Jeanneum Research, Graz University of Technology. cited by other . Schneier, Bruce, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, Inc., 1994. cited by other . Schulze, Dr. J., "Case of Application of the Generic CITED Model to the CITEDisation in the Software Distribution Process," ESPIRIT II, Project, Jan. 12, 1993. cited by other . Schutzer, D., "A Need for a Common Infrastructure: Digital Libraries and Electronic Commerce," Citibank, D-Lib Magazine (Apr. 1996). cited by other . Shear, Victor, "Solutions for CD-ROM Pricing and Data Security Problems". cited by other . Shneier, B., "Description of New Variable-Length Key, 64-bit block cipher (Blowfish)," Fast Software Encryption, Cambridge Security Workshop Proceedings (1994). cited by other . Sibert, O. et al., "DigiBox: A Self-Protecting Container for Information Commerce," Proceedings of the First USENIX Workshop on Electronic Commerce, New York, NY, Jul. 1995, 13 pages. cited by other . Simon et al., "Digital Images Protection Management in a Broadcast Framework: Overview/TALISMAN Solution," Thomson-CSF, RTBF, ART3000, UCL. cited by other . Sirbu et al., "NetBill: An Internet Commerce System Optimized for Network Delivered Services," Carnegie Mellon University. cited by other . Smith, Mary Grace, et al., "A New Set of Rules for Information Commerce: Rights-Protection Technologies and Personalized-Information Commerce Will Affect All Knowledge Workers", CommunicationsWeek, Nov. 6, 1995. cited by other . Solomon, A., PC Viruses: Detection, Analysis and Cure, Springer-Verlag, (undated). cited by other . St. Johns, M., "Draft Revised IP Security Option", Network Working Group, RFC, 1038, Jan. 1998. cited by other . Stefik, M., "Letting Loose the Light. Igniting Commerce in Electronic Publication," Internet Dreams: Archetypes, Myths, and Metaphors. Massachusetts Institute of Technology, 1996, pp. 219-53. cited by other . Stepney et al., "Formal specification of an Access Control System," Software-Practice and Experience, vol. 17, No. 9 (1987). cited by other . Strohm et al., "ABYSS: Tokens," IBM Research Report Number RC 12402 (Dec. 18, 1986). cited by other . Swedlow, Tracy, "2000: Interactive Enhanced Television: A Historical and Critical Perspective," Interactive TV Today. cited by other . Tanenbaum et al., "Amoeba System," Communications of the ACM, vol. 33, No. 12 (Dec. 1990). cited by other . Tanenbaum et al., "Experiences with the Amoeba Distributed Operating System," Vrije Universiteit and Centrum voor Wiskunde en Informatica. cited by other . Tanenbaum et al., "Using Sparse Capabilities in a Distributed Operating System," Vrije Universiteit and Centre for Mathematics and Computer Science. cited by other . Tardo et al., "Mobile Agent Security and Telescript," General Magic, Inc. cited by other . Thompson, Victoria P., et al., "A Concept for Certification of an Army MLS Management Information System", Proceedings of the 16.sup.th National Computer Security Conference, Sep. 20-23, 1993. cited by other . Thor, "A Distributed Object-Oriented Database System", MIT. cited by other . Thuraisingham, M.B., "Mandatory Security in Object-Oriented Database Systems," OOPSLA '89 Proceedings, Oct. 1-6, 1989, pp. 203-210. cited by other . Tuck, Bill, "Electronic Copyright Management Systems: Final Report of a Scoping Study for Elib," (Jul. 1996). cited by other . Tygar, J.D. et al., "Cryptography: It's Not Just for Electronic Mail Anymore," CMU-CS-93-107, School of Computer Science Carnegie Mellon University, Pittsburgh, PA, Mar. 1, 1993, 21 pages. cited by other . Tygar, J.D. et al. "Dyad: A System for Using Physically Secure Coprocessors," School of Computer Science, Carnegie Mellon University, Pittsburgh, PA, May 1991, 43 pages. cited by other . Tygar, J.D. et al., "Strongbox: A System for Self Securing Programs," CMU Computer Science: 25.sup.th Anniversary Commemorative, R. Rashid (ed.) Addison-Welsey, 1991, pp. 163-197. cited by other . Van Slype, Georges, "Draft CITED Interchage Formats, Ver. 1.0", ESPIRIT II, Project 5469, the CITED Consortium, Jan. 28, 1994. cited by other . Van Slype, Georges, "Knowledge Economy; Future Trends," CITED 5469. cited by other . Van Slype, Georges et al., "Natural Language Version of the Generic CITED Model, Ver. 4.2, vol. I: Presentation of the Generic Model," ESPIRIT II, Project 5469, The CITED Consortium, May 8, 1995. cited by other . Van Slype, Georges, "Natural Language Version of the Generic CITED Model, Ver. 2.1, vol. II ECMS (Electric Copyright Management System) Design for Computer Based Applications," ESPIRIT II, Project 5469, The CITED Consortium, May 8, 1995. cited by other . Van Slype, Georges, "Natural Language Version of the generic CITED model vol. I: Presentation of the generic model, ver. 3.0", and "vol. II: Citedf usage monitoring system design for computer based applications, ver. 1.0" Project 54659, The CITED Consortium, Sep. 6, 1993. cited by other . Van Slype, Georges, "PL4 RACE/ACCOPI Workshop on Conditional Access and Copyright Protection," ESPIRIT II, Project 5469, Presentation of the CITED, Nov. 9, 1994. cited by other . Van Slype, Georges, "PL4 RACE/ACCOPI Workshop on Conditional Access and Copyright Protection," ESPIRIT II, Project 5469, The CITED Consortium, Nov. 9, 1994. cited by other . Van Slype, Georges, "The CITED Approach, Ver. 4.0," ESPIRIT II, Project 5469, The Cited Consortium, Apr. 20, 1994. cited by other . Van Slype, Georges et al, "The Future of CITED; a Feasibility Study," ESPIRIT II, Project 5469, The CITED Consortium, Nov. 15, 1993. cited by other . Van Slype, Georges, "The Future of CITED: A Feasibility Study, Ver. 1.0, vol. I: Summary Report and and Recommendations," ESPIRIT II, Project 5469, The CITED Consoritum, Feb. 28, 1994. cited by other . Van Slype, Georges et al., "The Future of CITED: A Feasibility Study, Ver. 1.0, vol. II: Full Report," ESPIRIT II, Project 5469, The CITED Consortium, Feb. 28, 1994. cited by other . Van Slype, Georges, "The Future of CITED: A Feasibility Study, Ver. 1.1, vol. III: Draft CITED Interchange Formats," ESPIRIT II, Project 5469, The CITED Consortium, Feb. 28, 1994. cited by other . Van Slype, Georges, "The Future of CITED: A Feasibility Study, Ver. 1.1, vol. I: Summary Report and Recommendations," ESPIRIT II, Project 5469, The CITED Consortium, Mar. 28, 1994. cited by other . Van Slype, Georges, "The Future of CITED: A Feasibility Study, Ver. 1.1, vol. III: Draft CITED Interchange Formats," ESPIRIT II, Project 5469, The CITED Consortium, Mar. 28, 1994. cited by other . Wagner, N. "Fingerprinting," Drexel University, IEEE Symp. On Info. and Privacy (Apr. 1993). cited by other . Walker, S., "Notes from RSA Data Security Conference," Jan. 18, 1994, pp. 1-3. cited by other . Wayner, Peter Digital Copyright Protection, Academic Press, 1997. cited by other . Wayner, Peter, "Digital Copyright Protection", Academic Press 1997. cited by other . Winslet et al., "Formal Query Languages for Secure Relational Databases," ACM Transactions on Database Systems, vol. 19, No. 4 (Dec. 1994). cited by other . Weber, Robert, "Digital Rights Management Technologies--A Report to the International Federation of Reproduction Rights Organizations", Northeast Consulting Resources, Inc., Oct. 1995. cited by other . Weber, Robert; "Metering Technologies for Digital Intellectual Property--A Report to the International Federation of Reproduction Rights Organisations", International Federation of Reproduction on Rights Organisations, Northeast Consulting Resources, Inc., Oct. 1994. cited by other . Weber, Robert; "Digital Rights Management Technologies--A Report to the International Federation of Reproduction Rights Organisations", Northeast Consulting Resources, Inc., Oct. 1995. cited by other . Wells, Rob, Odyssey of Plastic Purchase: 20-Second Round Trip, Associated Press, Dec. 1993. cited by other . Weingart, S.H., "Physical Security for the uABYSS System", IEEE, 1987. cited by other . White Steve R.; Comeford, Liam; "ABYSS: An Architecture for Software Protection", IEEE Transactions on Software Engineering, vol. 16, No. 6, Jun. 1990. cited by other . White, James E., "Telescript: The Foundation for the Electronic Marketplace", Ver. 5.0, General Magic, Inc., Nov. 30, 1993. cited by other . Willett, S., "Metered PCs: Is Your System Watching You?, Wave Systems Beta Tests New Technology," IDG Communications, Inc., May 2, 1994, pp. 1-6. cited by other . Williams, Tony, "Microsoft Object Strategy", Microsoft PowerPoint Presentation, 1990. cited by other . Wobber, Edward, et al., "Authentication in the Taos Operating System", Digital Equipment Corporation, Dec. 10, 1993. cited by other . Woo, Thomas, Y.C., et al., "A Framework for Distributed Authorization," Proceedings of the 1.sup.st Conference Computer and Communication Security, Nov. 1993, pp. 112-118. cited by other . Yee, B., "Using Secure Coprocessors," CMU-CS-94-149, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA 1994, 94 pages. cited by other . "Access Control and Copyright Protection for Images Security Technology for Graphics and Communications Systems--RACE M1005; ACCOPI", webpage, Security Projects at Fraunhofer 1GD, 2002. cited by other . ACCOPI RACE Project M1005 Warning of ACCOPI web pages removal, UCL Laboratoire de telecommunications et teledetection. cited by other . A2b's Recent Press Coverage (1998). cited by other . "Achievements Archive," www.imprimatur.net/ web pages. cited by other . "American National Standard: Specification for Financial Message Exchange Between Card Acceptor and Acquire, X9.15,", American Banker's Association, 1990. cited by other . "An Introduction to Safety and Security in Telescript," (undated), 8 pages. cited by other . Automation of Securities Markets and Regulatory Implications, Financial Market Trends, No. 50, p.20-33, Oct. 1991. [File 148, Gale Group Trade & Industry DB, Dialog(R) commercial database]. cited by other . AT&T PersonaLink, Before Feb. 13, 1995. cited by other . "AT&T Smart Card Systems & Solutions," AT&T (1993). cited by other . Bureau Van Dijk Management Report for Task 4.5: Feasibility Study of the Cited Agency, 1992-1993. cited by other . Bureau Van Dijk: Gestion Des Contrats; 497C.C.C.E: CITED (SUITE), Feb. 1993. cited by other . Central Point Anti-Virus, Central Point Software, 1993. cited by other . "CITED: Copyright in Transmitted Electronic Documents, Special Interest Group," CITED Meeting, Heathrow, Sep. 22, 1993. cited by other . "CITED Final Report: A Guide to CITED Documentation," ESPIRIT, Project 5469, ISBN 0-7123-2115-2, The CITED Consortium, Sep. 1994. cited by other . "CITED Preparation of the CITED Model Functional Requirements Specifications; Discussion Paper (Revision 1)," Bureau Van Dijk, Jan. 16, 1991. cited by other . "CITED: Preparation of the CITED Model Functional Requirements Specifications; Reports of the Interviews with Five CITED Partners," (Partners: Sagem, Telesystemes, NTE, Elsevier, Oxford University Press), Bureau Van Dijk, Apr. 5, 1991. cited by other . Competitive Analysis AT&T/a2b music (Jun. 16, 1998). cited by other . "Copyright Ownership Projection in Computer-Assisted Training", COPICAT--8195, ESPRIT, Dec. 1993. cited by other . COPYSMART--20517: "CITED Based Multi-media IPR Management on Cost Effective Smart Device," European Information Technology for Information Science, start date Dec. 1, 1995. cited by other . "CopySmart (CSM) suit," European Information technology for Information Science. cited by other . "CREANET--Creative Rights European Agency NETwork--Project Profile," Information Society Technologies (Feb. 18, 2000). cited by other . "Cryptolope Containers Technology: A White Paper", IBM InfoMarket Business Development Group. cited by other . "Crytographic API Specification," Version 0.6, Microsoft, Mar. 1995. cited by other . CUPID, "Protocols and Services: An Architectural Overview", IP Workshop, Ver. 1, Last updated Nov. 20, 1997. cited by other . "Data Network and Open System Communications, Directory: Information Technology--Open Systems Interconnection--The Directory: Overview of Concepts, Models, and Services," ITU-T Recommendation X.500, International Telecommunication Union (Nov. 1993). cited by other . "Deliverable D3: Specification of the Infrastructure and Explanation of Trust and Confidence Building Solutions," Ver. 0.1, Telenet (Jul. 18, 2000). cited by other . "Digital Broadband Delivery System, Phase 1.0, System Overview," Revision 1.0, Scientific Atlanta, 1997. cited by other . "Digital Rights Enforcement and Management: SuperDistribution of Cryptolopes", IBM. cited by other . DOD Rainbow Series. cited by other . Dynamic linking of SunOS. cited by other . "EFT Network Data Book; 1993 Edition," Bank Network News, vol. 11, No. 13, Nov. 1992. cited by other . "Electronic Reverse Copyright Management System (ERCOMS)," International Institute for Electronic Library Research, website updated by Ramsden, Anne (Jul. 22, 1996). cited by other . Email from Chris Drost-Hansen re press release: "AT&T Launches A2B Music Trial for Delivering Songs Over the Internet," Business Wire (Nov. 3, 1997). cited by other . Email from Edmond Kouka to Jean-Francois Boisson re TELENET TELEtraining platform--Bogdan Lutkiewicz, Poland, Gdansk (Mar. 4, 2001). cited by other . ESPIRIT Project: 5469: Contract Amendment Number 2; Commission of the European Communities, Sep. 16, 1993. cited by other . "ESPIRIT Project 20676--IMPRIMATUR--Intellectual Multimedia Property Rights Model and Terminology for Universal Reference," IMPRIMATUR Consortium (Oct. 1988). cited by other . "ESPRIT Project 22226--MUSE--Developing Standardized Digital media Management, Signaling and encryption Systems for the European Music Sector," International Federation of the Phonographic Industry (Oct. 1998). cited by other . "ESPRIT Project 24378--MENHIR European Multimedia Network of High Quality Image Registration," Museums On Line (Feb. 1, 1997). cited by other . "Europe and The Global Information Society Recommendations to the European Council," Bamgemann Report, www.medicif.org web pages, Global Information Society (May 1994). cited by other . "Formun on Risks to the Public in Computers and Related Systems," The Risks Digest, vol. 15; Issue 39; Jan. 21, 1994, pp. 1-12. cited by other . "Forum on Technology-Based Intellectual Property Management--Electronic Commerce for Content", IMA Intellectual Property Proceedings, vol. 2, Jun. 1996. cited by other . FreeBSD System Manager's Manual "LDCONFIG", Oct. 3, 1993. cited by other . "Gemplus. MCOS: Multi Application Chip Operating System--Introduction," Gemplus Card International (1990). cited by other . Handwritten note re: GVS and AJL, Mar. 2, 1994. cited by other . "iOpener," Registered Trademark of National Semiconductor Corporation, Registration date Oct. 4, 1994. cited by other . "Imprimatur News,"iMPRIMATUR (Dec. 1998). cited by other . "Interchange Message Specification for Debit and Credit Card Message Exchange Among Financial Institutions," American National Standard, Accredited Standards Committee X9-Financial Services Committee, ANSI X9.2-1988, American Bankers Association, May 16, 1988. cited by other . International Infrastructure Standards Panel, "IISP Need #31-Containers or Secure Packaging," Electronic Publishing Research, Sep. 18, 1995, pp. 1-3. cited by other . International Infrastructure Standards Panel, "IISP Need #32-Authentication of Content," Electronic Publishing Research, Sep. 18, 1995, pp. 1-3. cited by other . International Infrastructure Standards Panel, "IISP Need #33-Control Enforcement," Electronic Publishing Research, Sep. 18, 1995, pp. 1-3. cited by other . International Infrastructure Standards Panel, "IISP Need #34-Billing and Payment," Electronic Publishing Research, Sep. 18, 1995, pp. 1-3. cited by other . International Infrastructure Standards Panel, "IISP Need #35-Reporting," Electronic Publishing Research, Sep. 18, 1995, pp. 1-3. cited by other . Introduction to Smart Cards v. 1.0, Gemplus Card Internatioal, Mar. 21, 1991. cited by other . "ISO 7813-1987 Identification Cards-Financial Transaction Cards," ISO, 1987. cited by other . ISO 7498/1: Open Systems Interconnection: Security Architecture (1988). cited by other . ISO 7498/2: Open Systems Interconnection: Security Architecture (1988). cited by other . ISO 8583-2: "Financial Transaction Card Originated Messages--Interchange Message Specifications--Part 2: Application and registration Procedures for Institition Identification Codes (IIC)," ISO (Jul. 1, 1998). cited by other . ISO 8583-3: "Financial Transaction Card Originated Messages--Interchange Message Specifications--Part 3: Maintenance Procedures for Codes," ISO (Jul. 1, 1998). cited by other . ISO 9564-1 & -2: "Personal Identification Number (PIN) management and security--Part 1: Basic Principles and Requirements for online PIN Handling in ATM and POS Systems; & -2 Approved Algorithm(s) for PIN Encipherment," ISO (Apr. 15, 2002 & Dec. 15, 1991). cited by other . ISO 9807: "Banking and related Financial Services--Requirements for Message Authenthication (retail)," ISO (Dec. 15, 1991). cited by other . ISO 11568-1 and -2, "Key Management (retail)--Part I: Introduction to Key Management; Part II: Key Management Techniques for Symmetric Ciphers," ISO (Dec. 1, 1994). cited by other . ISO 13491-1: "Secure Crytographic Devices (retail)--Part I: Concepts, Requirements and Evaluation Methods," ISO (Jun. 15, 1998). cited by other . "JUKEBOX--Music Across Borders," LIB-JUKEBOX/4-1049. cited by other . "Key Management Using ANSI X9.17," Federal Information Processing Standards Publication 171, U.S. Department of Commerce (Apr. 1992). cited by other . "KeyKOS Principles of Operation," Key Logic document KL002-04, 1985, Fourth Edition (Jan. 1987). cited by other . Letter re: ESPIRIT III-Project 5469 (CITED) from A. Stajano at Commission of the European Communities, Oct. 7, 1993. cited by other . Microsoft Internet Explorer v 2.0. cited by other . Miscellaneous letter from Georges Van Slype at Bureau Van Dijik, Feb. 28, 1994. cited by other . Miscellaneous Letter from Georges Van Slype at Bureau Van Dijik, Mar. 30, 1995. cited by other . Miscellaneous Letter from Georges Van Slype at Bureau Van Dijik, Feb. 13, 1995 and Nov. 2, 1994. cited by other . Miscellaneous Letter from Georges Van Slype at Bureau Van Dijik, Sep. 12, 1994, May 11, 1994, May 10, 1994, May 6, 1994, May 4, 1994, Apr. 21, 1994, Apr. 20, 1994. cited by other . Miscellaneous Letter from Georges Van Slype at Bureau Van Dijik, Apr. 19, 1994, Apr. 18, 1994, Apr. 11, 1994, Apr. 6, 1994. cited by other . Miscellaneous Letter from Georges Van Slype at Bureau Van Dijik, Mar. 30, 1994, Mar. 24, 1994, Feb. 10, 1994. cited by other . Miscellaneous Letter from Georges Van Slype at Bureau Van Dijik, Feb. 9, 1994, Jan. 27, 1994, Jan. 19, 1994, Jan. 12, 1994, Dec. 22, 1993, Nov. 30, 1993, Nov. 22, 1993, Dec. 6, 1993, Nov. 16, 1993, Oct. 15, 1993, Oct. 7, 1993, Oct. 4, 1993, Sep. 20, 1993, Sep. 7, 1993, May 19, 1993, Oct. 19, 1993. cited by other . "MSDN-INF: LAN Manager 2.1 Server Autotuning (Part2)," PSS ID No. 080078, Microsoft (Feb. 1993). cited by other . "MSDN-Licence Service Application Programming Interface," API Specification v.1.02, Microsoft (Jan. 1993). cited by other . Multimedia Mixed Object Envelopes Supporting a Graduated Fee Scheme via Encrytion; IBM Technical Disclosure BUlletin, vol. 37, No. 3, Mar. 1994. cited by other . "Multimedia System Services Ver. 1.0", Hewitt-POackard, IBM, & SunSoft, 1993. cited by other . OLE 2.0 Draft Content: Object Linking & embedding, Microsoft, Jun. 5, 1991. cited by other . "Payment Systems: Strategic Choices for the Future," Hitachi Research Institute; Instititute of Advanced Business Systems, Hitachi, Ltd., 1993. cited by other . "PKCS #1:RSA Encryption Standard," RSA Laboratories Technical Note, Ver. 1.5, revised Nov. 1, 1993. cited by other . "PKCS #3: Duffe-Hellman Key-Agreement Standard," RSA Laboratories Technical Note, Ver. 1.4, revised Nov. 1, 1993. cited by other . "PKCS #6: Extended-Certification Syntax Standard," RSA Laboratories Techincal Note, Ver. 1.5, revised Nov. 1, 1993. cited by other . "PKCS #9: Selected Attribute Types," RSA Laboratories Technical Note, Ver. 1.1, revised Nov. 1, 1993. cited by other . "PKCS #11: Cryptographic Token Interface Standard", An RSA Laboratories Technical Note, Ver. 2.0, Apr. 15, 1997. cited by other . "PKCS 12 v 1.0: Personal Information Exchange Syntax", RSA Laboratories, Jun. 24, 1999. cited by other . "PKCS #13: Elliptic Curve Crytography Standard", RSA Security, Jan. 12, 1998. cited by other . "PKCS #15 v 1.0: Cryptographic Token Information Format Standard", RSA Laboratories, Apr. 23, 1999. cited by other . "PKCS #5: Password-Based Encryption Standard," An RSA Laboratories Technical Note, Ver. 1.5, 1991-1993, Revised Nov. 1, 1993. cited by other . "PKCS #8: Private-Key Information Syntax Standard," An RSA Laboratories Technical Note, Ver. 1.2, 1991-1993, Revised Nov. 1, 1993. cited by other . "PKCS #10: Certification Request Syntax Stanard," An RSA Laboratories Technical Note, Ver. 1.0, Nov. 1, 1993. cited by other . PowerAgent Introduces First Internet `Infomediary` to Empower and Protect Consumers (Tech Talk Aug. 4, 1997). cited by other . PowerAgent Introduces First Internet `Infomediary` to Empower and Protect Consumers (Techmail.com Aug. 4, 1997). cited by other . "Request for Technology: Multimedia System Services", Draft, Ver. 1.1, Interactive Multimedia Association Compatibility Project, Oct. 16, 1992. cited by other . "Request for Technology: Multimedia System Services", Ver. 2.0, Interactive Multimedia Association Compatibility Project, Nov. 9, 1992. cited by other . "Requirements for the Software License Management System", System Management Work Group, Rev. 3, Unix International, Jul. 23, 1992. cited by other . Secure Electronic Transactions; Mastercard and Visa+ C345. cited by other . "Security in KeyKOS.". cited by other . "S/PAY: RSA's Developer's Suite for Secure Electronic transactions (SET)," RSA Data Security, Inc. (1997). cited by other . "STARFISH State of the Art Financial Services for the In Habitants of Isolated Areas--Project Profile," Information Society technologies, time schedule (Jan. 21, 2000-Jun. 30, 2002). cited by other . Stuffit Delux v 1.5, v 3.0, v. 3.5, Alladin Systems, 1988-1994. cited by other . Summaries of Project (FP III/IV)--Part I: "ESPIRIT Project 20517--COPYSMART CITED based multi-media IPR management on cost effective smart device," European Information technology for Information Science (Oct. 1998). cited by other . Symantec Anti-Virus for Macintosh (a.k.a. SAM), Symantec, 1993. cited by other . Symantec Corporation, "THINK Pascal: The Fastest Way to Finished Software," Symantec Corporation, 1990, pp. 93-123. cited by other . "TALISMAN--Tracing Authors' Rights by Labeling Image Services and Monitoring Access Network," ACTS Project No. AC019, Doc Reference AC019-THO-RGS-FR-P 001-b1 (Sep. 25, 1998). cited by other . "TALISMAN: Tracing Authors' Rights by Labeling Image Services and Monitoring Access Network," ACTS, Swiss Participation in European Research Programs (Sep. 1, 1995, Aug. 31, 1998). cited by other . "Technical Description: Pay-Per-View Copy Protection," Macrovision, Jun. 1994. cited by other . Technical Strategies for Protecting Intellectual Property in the Networked Multimedia Environment, IMA Intellectual Property Proceedings, vol. 1, Issue 1, Jan. 1994. cited by other . "TELENET TELEtraining Platform (on NETworks)--Project Profile," Information Society Technologies, time schedule (Mar. 6, 2000-Mar. 30, 2000). cited by other . "Telescript Security," BYTE.com (Oct. 1994). cited by other . "The Armide Products", web page. cited by other . "The Future of Cited: A Feasibility Study," ESPIRIT II, Project 5469, CITED Project Review, Apr. 15, 1994. cited by other . "The Future of Cited: A Feasibility Study," ESPIRIT II, Project 5469, The CITED Consortium, Apr. 15, 1994. cited by other . "The PowerTV White Paper", powertv.com website, Oct. 11, 1996. cited by other . "The Standard Business: Time for Change," European Commision DG111 Espirit Project 5.sup.th Consensus Formum (Nov. 3-4, 1998). cited by other . Think C: Object-Oriented Programming Manual, Symantec Corporation, 1989. cited by other . TULIP Final Report, ISBN 0-444-82540-1, 1991, revised Sep. 18, 1996. cited by other . UniverCD: The InterActive, Online Library of Product Information From Cisco Systems, Cisco Systems 1993. cited by other . Unix System v. Release 3.2, Programmer's Guide, Vol. II, AT&T, Prentice Hall (1989). cited by other . U.S. Patent and Trademark Prosecution History for National Semiconductor Corporation "iOpener" Trademark, Registration date Oct. 4, 1994, 27 pages. TULIP Final Report. cited by other . VirusCheck and VirusScan, McAfee, 1993. cited by other . "A Brief History of the Green Project," viewed on Mar. 12, 2002 at <http://java.sun.com/people/jag/green/index.hmtl> pp. 1-2. cited by other . Anderson, R., "Why Cryptosystems Fail," University Computer Laboratory, Cambridge, Massachusetts, (undated), pp. 1-34. cited by other . Aucsmith, D., et al., "Common Data Security Architecture," Intel Architecture Lab, Presentation Materail, Jan. 22, 1996, pp. 1-16. cited by other . Baker, R.H., The Computer Security Handbook, Tab Books, Inc., 1985. cited by other . Balbanovic, et al., Content-based, Collaborative Recommendation, Communications of the ACM, Mar. 1997, pp. 66-72. cited by other . Barlock, P.F., et al., "Guide to Securing Microsoft Windows NT Networks," National Security Agency, Sep. 18, 2001, pp. 1-132. cited by other . Bellare, M., "iKP-A Family of Secure Electronic Payment Protocols," Apr. 16, 1995, pp. 1-19. cited by other . Bell-Labs Secure Technologies, "Information Vending Encryption System (IVES).TM.," Lucent Technologies, May 31, 2002, pp. 1-16. cited by other . Bellovin, S.M., "Encrypted Key Exchange: Password-Based Protocols Secure Against Dictionary Attacks," Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, California, May 1992, 13 pages. cited by other . Bellovin, S.M., "There Be Dragons," AT&T Bell Laboratories, Aug. 15, 1992, 16 pages. cited by other . Berkovitz, S. et al., "Authentication of Mobile Agents," Mobile Agents and Security, Springer-Verlag, Giovanni Vigna, Ed., 1998, pp. 114-136. cited by other . Berners-Lee, T.J., et al., "Networked Information Services: The World-Wide Web," Computer Networks and ISDN Systems, 1992, pp. 454-459. cited by other . Bertino, Elisa, "Data Hiding and Security in Object-Oriented Databases," Dipartimento di Matematica, Universita di Genova, IEEE, 1992, pp.338-347. cited by other . Bickel, R., et al., "Guide to Securing Microsoft Windows XP," National Security Agency, Oct. 30, 2002, pp. 1-129. cited by other . Birrell, Andrew, D., et al., "A Global Authentication Service Without Global Trust," Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, Apr. 1986, pp. 1-11. cited by other . Boly, J.P., et al., "The ESPRIT Project CAFE: High Security Digital Payment Systems," ESCORICS 94, European Symposium on Research Computer Security, Springer-Verlas Berlin, 1994, pp. 217-230. cited by other . Boone, J.V., et al., "The Start of Digital Revolution: SIGSALY Secure Digital Voice Communications in World War II," Dec. 10, 2002. cited by other . Borenstein, N., "MIME Extensions for Mail-Enabled Applications: Application/Safe-Tel and Multipart/Enabled-Mail," Nov. 1993, 24 pages. cited by other . Born, E., et al., "Discretionary Access Control by Means of Usage Conditions," Computers & Security, vol. 13, No. 5, 1994, pp. 437-450. cited by other . Brands, S., "Untraceable Off-line Cash in Wallets with Observers," CWI, (undated), 17 pages. cited by other . Breon, R., et al., "Microsoft Office 97 Executable Content Security Risks and Countermeasures," National Security Agency, Dec. 20, 1999, pp. 1-44. cited by other . Brickell, E.F., et al., "The SKIPJACK Algorithm," Jul. 28, 1993, pp. 1-7. cited by other . Brockschmidt, K., "A Primer on Designing Custom Controls," Microsoft Systems Journal, Mar./Apr. 1992, pp. 87-101. cited by other . Brockschmidt, K., "Implementing OLE 2.0, Part III: Uniform Data Transfer with Data Objects," Microsoft Systems Journal, Dec. 1993, pp. 47-77. cited by other . Brockschmidt, K., "Introducing OLE 2.0, Part 1: Windows Objects and the Component Object Model," Microsoft Systems Journal, Aug. 1993, pp. 15-23. cited by other . Brockschmidt, K., "OLE 2.0 Part II: Implementing a Simple Windows Object Using Either C or C++," Microsoft Systems Journal, Oct. 1993, pp. 45-62. cited by other . Brockschmidt, Kraig, Inside OLE 2, Microsoft Press Programming Series, 1994. cited by other . Brown, C.W., "Security for Minicomputers and Microcomputers," (undated), pp. 285-298. cited by other . Brown, Patrick W., "Digital Signatures: Can They Be Accepted as Legal Signatures in EDI?," 1st Conference on Computer and Communication Security, Nov. 1993, pp. 86-92. cited by other . Brumm, P., et al., 80386/80486 Assembly Language Programming, Windcrest/McGraw-Hill, 1993. cited by other . Brunnstein et al., "Intellectual Property Rights and new Technologies," Proceedings of the KnowRight '95 Conference, Aug. 1995. cited by other . Byte.com, "Speaking the Same Language," May 1994, pp. 1-2. cited by other . Cabell, D., et al., "Software Protection," May 1985, pp. 35-37. cited by other . Calas, C., "Distributed File System Over a Multilevel Secure Architecture Problems and Solutions," Computer Security, ESCORICS 94, Brighton, United Kingdom, Nov. 7-9, 1994, pp. 281-297. cited by other . CardTech/SecurTech 94 Conference Proceedings, "Building Foundations for Innovation," CardTech/SecurTech, Inc., Apr. 1994, 1,301 pages. cited by other . Carnegie Mellon University, "Internet Billing Server," Prototype Scope Document, INI Tech Report, Oct. 14, 1993, pp. 1-29. cited by other . Champine, G., MIT Project Athena: A Model for Distributed Campus Computing, Digital Equipment Corporation, 1991, 22 introductory pages, Chapter 1 (pp. 3-18); Chapter 2 (pp. 19-33); Chapter 3, (pp. 37-68); Chapter 4 (pp. 69-75); Chapter 5 (pp. 79-107); C. cited by other . Chase, Chevy, M.D., "DiscStore", Electronic Publishing Resources, 1991. cited by other . Chaum, D.L., et al., "Implementing Capability-Based Protection Using Encryption," College of Engineering, University of California, Berkeley, Jul. 17, 1978, 12 pages. cited by other . Chess, D., "Security Issues in Mobile Code Systems," Mobile Agents and Security, Springer-Verlag, Giovanni Vigna, Ed., 1998, 14 pages. cited by other . Clark, Paul C., et al., "BITS: A Smartcard Protected Operating System," Communications of the ACM, vol. 37, No. 11, Nov. 1994, pp. 66-70 & 94. cited by other . Coad, Peter, "Object-Oriented Patterns," Communications of the ACM, vol. 35, No. 9, Sep. 1992, pp. 152-159. cited by other . Cohen, F.B., Protection and Security on the Information Superhighway, John Wiley & Sons, Inc., 1995. cited by other . Competitive Analysis AT&T/a2b music, Jun. 16, 1998. cited by other . Cook, S., "Net Results," PC World, Dec. 1985, pp. 270-238. cited by other . Corbato, F.J., et al., "Introduction and Overview of the Multics System," viewed on Nov. 13, 2001 at <http://www.multicians.org/fjcc1.html> pp. 1-18. cited by other . CUPID Protocols and Services (Version 1): "An Architectural Overview," Nov. 1992, available at <http://www.cni.org/projects/CUPID>, 25 pages. cited by other . Curry, David A., "Improving the Security of Your Unix System," Final Report Apr. 1990, pp. 1-74. cited by other . Custer, H., Inside the Windows NT File System, Microsoft Press, 1994. cited by other . Cybenko, G, et al., "Cognitive Hacking: A Battle for the Mind," Computer, Aug. 2002, 0018-9162/02a2002 IEEE, pp. 50-56. cited by other . Data Network and Open System Communications, Directory: Information Technology--Open Systems Interconnection--The Directory: Overview of Concepts, Models, and Services, ITU-T Recommedation X.500, Intermational Telecommunication Union, Nov. 1993. cited by other . Date, C.J., "An Introduction to Database Systems," 4th. Ed., vol. 1, Addison-Wesley Publishing Company, 1987. cited by other . Davis, D., et al., "Network Security via Private-Key Certificates," MIT Project Athena, (undated), pp. 1-4. cited by other . "DCE Technology at Work," Distribution Computing Environment, http://www.opengroup.org/tech/dca/tech/tech.htm, Nov. 7, 2000, pp. 1-3. cited by other . Dempsey, Lorcan, et al., The Warwick Metadata Workshop; A Framework for the Deployment of Resource Description, Jul./Aug. 96. cited by other . Denning, A., OLE Controls Inside Out, Microsoft Press, 1995. cited by other . Denning, D. E., et al., "Data Security," 11 Computing Surveys, No. 3, Sep. 1979, pp. 227-249. cited by other . Denning, D., Crytography and Data Security, Addison-Wesley Publishing Company, Inc., 1982. cited by other . Denning, P.J., Computer Under Attack: Intruders, Worms, and Viruses, ACM Press, 1990. cited by other . Department of Defense Computer Security Center, "Department of Defense Password Management Guideline," Department of Defense Computer Security Center, Apr. 12, 1985, pp. 1-34. cited by other . Department of Defense Standard, "Department of Defense Trusted Computer System Evaluation Criteria," Dec. 1985, pp. 1-72. cited by other . Deutsch, P., "GZIP File Format Specification Version 4.3," Network Working Group, May 1996, pp. 12. cited by other . Diffie, et al., Privacy on the Line: The Politics of Wiretapping and Encryption, Massachusetts Institute of Technology, 1998. cited by other . DiLascia, Paul, "OLE Made Almost Easy: Creating Containers and Servers Using MFC 2.5," Microsoft Systems Journal, Apr. 1994, pp. 13-33. cited by other . Dougherty, D., et al., The Mosaic Handbook for the X Window System, O'Reilly & Associates, 1994. cited by other . Downs, D.D., et al., "Issues in Discretionary Access Control," Proceedings of the 1985 Symposium on Security and Privacy, Apr. 22-24, 1985, Oakland, California, pp. 208-218. cited by other . Dukach, S., "SNPP: A Simple Network Payment Protocol," MIT Laboratory for Computer Science, (undated), 7 pages. cited by other . EFFector Online, vol. 6, No. 6, "A Publication of the Electronic Frontier Foundation," 8 pages, Dec. 6, 1993. cited by other . Ellison, C. et al., "SPKI Certificate Theory," Internet Engineering Task Force (IETF) RFC 2693, Sep. 1999, 38 pages, available at http://www.ietf.org/rfc/rfc26939.txt?number=2693. cited by other . Farmer, D., "The COPS Security Checker System," Jul. 10, 1992. cited by other . Ferraiolo, D., et al., "Role-Based Access Control," Reprinted from the Proceedings of the 15th National Computer Security Conference, 1992, pp. 1-11. cited by other . Forcht, K.A., Computer Security Management, Boyd & Fraser Publishing Company, 1994. cited by other . Franklin, M., et al., "An Overview of Secure Distribution Computing," Mar. 24, 1992, pp. 1-46. cited by other . Franz, M., "Technological Steps Toward a Software Component Industry," Institut fur Computersysteme, Zurich, Switzerland, (undated), 23 pages. cited by other . Fugini, M., et al., "Security Management in Office Information Systems," Computer Security: A Global Challenge, 1984, pp. 487-498. cited by other . Gifford, D., et al., "The Cirrus Banking Network," Communications of the ACM, vol. 28, No. 4, Aug. 1985, pp. 798-807. cited by other . Gifford, D.K., "Cryptographic Sealing for Information Secrecy and Authentication," Communications of the ACM, vol. 25, No. 4, Apr. 1982, pp. 274-286. cited by other . Glatzer, H., "The Promise of LANs MIS Back in Control," Software News, Mar. 1985, pp. 51-58. cited by other . Gligor, V.D., et al., "Object Migration and Authentication," IEEE Transactions on Software Engineering, vol. SE-5, No. 6, Nov. 1979, pp. 607-611. cited by other . Global Projects Group, "Smart Card Technology International: The Global Journal of Advanced Card Technology," undated, pp. 1-151. cited by other . Gong, L. et al., "Signing, Sealing and Guarding Java Objects," Mobile Agents and Security, G. Vigna, editor, Springer-Verlag, 1998, vol. 1419 of LNCS, pp. 206-216. cited by other . Gong, Li, "A Secure Identity-Based Capability System," University of Cambridge Computer Laboratory, Jan. 1989, pp. 1-15. cited by other . Gosling, J., "Oak Intermediate Bytecodes," 1995, 5 pages. cited by other . Gruber, R., et al., "Disconnected Operation in the Thor Object-Oriented Database System," Laboratory of Computer Science, Massachusetts Institute of Technology, (undated), pp. 1-6. cited by other . Guide to the Secure Configuration and Administration of Microsoft Exchange 5.x.RTM., National Security Agency, Jun. 20, 2002, pp. 1-58. cited by other . Halfhill, T.R., et al., "Agents on the Loose," Byte.com, Feb. 1994, pp. 1-2. cited by other . Halfhill, Tom, R., et al., "Just Like Magic?," Byte.com, Feb. 12, 1994, pp. 1-5. cited by other . Haller, N., "The S/KEY One-Time Password System," Network Working Group RFC 1760, Feb. 1995. cited by other . Hansen, S.E., et al., "Automated System Monitoring and Notification with Swatch," Proceedings of the 1993 LISA, Monterey, California, Nov. 1-5, 1993, pp. 101-108. cited by other . Hardjono, Thomas, "Record Encryption in Distributed Databases," Department of Computer Science, University of New South Wales, Jan. 1990, pp. 386-395. cited by other . Harn, Lein, et al., "A Software Authentication System for the Prevention of Computer Viruses," ACM, 1992, pp. 447-450. cited by other . Hauser, Ralf, C., "Does Licensing Require New Access Control Techniques?," Institut fur Informatik, University Zurich, Aug. 12, 1993, 9 pages. cited by other . Hawk, H.S., "RSA & General Magic," email to Good Guys, Jan. 6, 1994, 1 page. cited by other . Hewlett Packard Co., "Manager's Guide to MPE/iX Security," Hewlett-Packard Company, Apr. 1994. cited by other . Hoffman, L.J., Modern Methods for Computer Security and Privacy, Prentice-Hall, Inc., 1977. cited by other . Hohl, F., "Time Limited Blackbox Security: Protecting Mobile Agents from Malicious Hosts," Lecture Notes in Computer Science, vol. 1419: Mobile Agents and Security, Springer-Verlag, 1998, G. Vigna Ed., pp. 90-111. cited by other . Holsinger, E., How Music and Computers Works, Ziff-Davis Press, 1994. cited by other . Holzner, S., Heavy Metal OLE 2.0 Programming IDG Books Worldwide, Inc., 1994. cited by other . Honeyman, P., "Digest of the First UNSENIX Workshop on Electronic Commerce (EC 95)," Jul. 1995. cited by other . Horster, P., Communications and Multimedia Security II, Chapman & Hall, 1996. cited by other . Hsiao, D., et al., Computer Security, Academic Press, Inc., 1979. cited by other . Hutt, A.E., et al., Computer Security Handbook Second Edition, Macmillian Publishing Company, 1988, pp. 201-217. cited by other . IBM, "IBM Cryptolope Technology-Executive Summary," viewed on Mar. 13, 2002 at <http://www3.ibm.com/software/security/cryptolope.about.html&g- t; pp. 1-3. cited by other . IBM, "OpenDoc vs. OLE 2.0: Superior by Design," IBM, Jan. 1994, pp. 1-4. cited by other . Information Systems Audit and Control Association-Montreal Chapter, "Authentification dans les environments de traitement distributes," viewed on Mar. 25, 2002 at <http://www.apvcismontreal.ca/en/publications/contact133.html> pp. 1-15. cited by other . Ioannidis, J. et al., "The Architecture and Implementation of Network-Layer Security Under Unix," Fourth USENIX Security Symposium Proceedings (Oct.), USENIX, Berkeley, Calif. 1993, 11 pages. cited by other . Jaeger, T, et al., "Support for the File System Security Requirements of Computational E-Mail Systems," Nov. 1994, ACM 0-89791-732-4/94/0011, 9 pages. cited by other . Johnson, R., "Info on Telescript," Software Agents List Archieve, Dec. 6, 1994, pp. 1-4. cited by other . Kahn, D., The Codebreakers: The Story of Secret Writing, The Macmillan Company, 1967. cited by other . Kamens, J.I., "Retrofitting Network Security to Third-Party Applications-The SecureBase Experience," Symposium Proceedings, Unix Security IV, Oct. 4-6, 1993, Santa Clara, California, pp. 41-57. cited by other . Karger, P.A., et al., "A VMM Security Kernel for the VAX Architecture," CH2884-5/90/0000/0002, IEEE 1990, pp. 2-19. cited by other . Karger, P.A., et al., "Multics Security Evaluation: Vulnerability Analysis," HQ Electronic Systems Division, Hanscom AFB, Technical Report 19, Jun. 1974, 14 pages. cited by other . Kastenholz, F., "The Definitions of Managed Objects for the Security Protocols of the Point-to-Point Protocol," Network Working Group RFC 1472, Jun. 1993. cited by other . Katzan, Harry, Jr. Computer Data Security, Litton Educational Publishing Company, 1973. cited by other . Keefe, T.F., et al., "Prototyping the SODA Security Model," Department of Computer Science, University of Minnesota, 1990, pp. 211-235. cited by other . Kelter, U., "Discretionary Access Controls in a High-Performance Object Management System," 1991 IEEE Computer Society Symposium on Research in Security and Privacy, May 20-22, 1991, Oakland, California, pp. 288-299. cited by other . Kelter, U., et al., "Type Level Access Controls for Distributed Structurally Object-Oriented Database Systems," Computer Security, ESCORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, Nov. 23-25, 1992, pp. 21-40. cited by other . Kent, S., et al., "Privacy Enhancement for Internet Electronic Mail: Part II--Certificate-Based Key Management," Network Working Group, Aug. 1989, pp. 1-22. cited by other . Kim, L., et al., "Novell Cuisine," Proceedings of the ACM SIGUCCS User Services Conference XIX, Nov. 3-6, 1991, Seattle, Washington, pp. 183-184. cited by other . Klemond, P., "Investigating Object Linking and Embedding, Part II: Adding Server Support," Microsoft Systems Journal, May/Jun. 1992, pp. 87-94. cited by other . Klemond, P., "Taking the Bull by the Horns: Investigating Object Linking and Embedding, Part I," Microsoft Systems Journal, Mar./Apr. 1992, pp. 19-38. cited by other . Kluepfel, H.M., "Securing a Global Village and its Resources: Baseline Security for Interconnected Signaling System #7 Telecommunications Networks," 1993, pp. 195-212. cited by other . Kohl, J.T., et al., "The Evolution of the Kerberos Authentication Service," Digital Equipment Corporation, 1991, pp. 1-15. cited by other . Krajewski, Jr., M., "Applicability of Smart Cards to Network User Authentication," Computing Systems, vol. 7, No. 1, Winter 1994, pp. 75-89. cited by other . Krajewski, Jr., M., "Smart Card Augmentation of Kerberos,". The Mitre Corporation, (undated), 6 pages. cited by other . Krajewski, Jr., M., et al., "Concept for a Smart Card Kerberos," The Mitre Corporation, (undated), 7 pages. cited by other . Kramer, M., "Strength in Numbers," PC Week, Jul. 22, 1986, pp. 57-58. cited by other . Kreutzer, A.N., "An On-Line System for Controlling and Monitoring Software Usage in a Microcomputer Laboratory," SIGUCCS Newsletter, vol. 18, No. 2, 1988, pp. 29-32. cited by other . Krol, E., The Whole Internet User's Guide and Catalog, 2nd. Ed., O'Reilly & Associates, Inc., 1992. cited by other . Kurak, C., et al., "A Cautionary Note On Image Downgrading," Proceedings of the 1992 Computer Security Applications Conference, San Antonio, TX, Dec. 1992, 7 pages. cited by other . LaLonde Wilf, R., et al., Inside Smalltalk: Volume 1, Prentice-Hall, Inc., 1990. cited by other . Lampson, B., "Computer Security," Digital Equipment Corporation, 1991, pp. 1-54. cited by other . Lampson, B.W., "A Note on the Confinement Problem," Communications of the ACM, Oct. 1973, pp. 1-5. cited by other . Lampson, Butler, et al., "Authentication in Distributed Systems: Theory and Practice," ACM Trans. Computer Systems, vol. 10, No. 4, Nov. 1992, 46 pages. cited by other . Landwehr, C.E., et al., "A Taxonomy of Computer Program Security Flaws," ACM Computer Surveys, vol. 26, No. 3, Sep. 1994, pp. 211-254. cited by other . Landwehr, C.E., "Formal Models for Computer Security," Computer Surveys, vol. 13, No. 3, Sep. 1981, pp. 247-278. cited by other . Leary, P., "Are There Ciphers in Shakespeare?," 1995, pp. 1-18. cited by other . Lehman, B., "Intellectual Property and the National Information Infrastructure, A Preliminary Draft of the Report of the Working Group on Intellectual Property Rights," Jul. 1994, 4 introductory pages and pp. 1-141. cited by other . Leiss, E., "On Authorization Systems with Grantor-Controlled Propagation on Privileges," Compcon 83, Feb. 28-Mar. 3, 1983, San Francisco, California, pp. 499-502. cited by other . Levine, P.H., et al., "Network License Server," Apollo, Oct. 1987, pp. 1-19. cited by other . Lewontin, S., et al., "The DCE Web Project: Providing Authorization and Other Distributed Services to the World Wide Web," Feb. 22, 2002. cited by other . Lin, P., "The Encapsulated Security Services Interface (ESSI)," Computer Security (A-37), 1993, pp. 119-135. cited by other . Linn, J., "Privacy Enhancement for Internet Electronic Mall: Part I--Message Encipherment and Authentication Procedures," Network Working Group, Aug. 1989, pp. 1-30. cited by other . Lipson, S., "Little Black Box `Blocks` Illicit Software Copying," Stamford Advociate, Sep. 14, 1986, pp. E1-E2. cited by other . "List of Articles," <www.chaum.com/articles/list-of-articles.htm>, as on Aug. 23, 2002, 4 pages. cited by other . Lockhart, Jr., H.W., OSF DCE Guide to Developing Distributed Applications, McGraw-Hill, Inc., 1994. cited by other . Lunt, Teresa, "Multilevel Security for Object-Oriented Database Systems," SRI International Computer Science Laboratory, 1990, pp. 199-209. cited by other . "Mach Books," viewed on Feb. 6, 2002 at http://www2.cs.cmu.edu/afs/cs/project/mach/public/www/doc/books.html., pp. 1-3. cited by other . Mann, C.C., "Homeland Insecurity," Sep. 2002. cited by other . Maude, T., et al., "Hardware Protection Against Software Piracy," Communications of the ACM, vol. 27, No. 9, Sep. 1984, pp. 951-959. cited by other . McGraw, G., et al., Java Security, John Wiley & Sons, Inc., 1997. cited by other . Medvinsky, G., et al., "NetCash: A Design for Practical Electronic Currency on the Internet," 1st Conference on Computer and Communication Security, Nov. 1993, pp. 102-106. cited by other . "Microsoft Authenticode Technology," Microsoft Corporation, Oct. 1996. cited by other . Microsoft Press, OLE 2 Programmer's Reference; Volume 1, "Working with Windows Objects," 1994. cited by other . Miller, S.P., et al., "Kerberos Authentication and Authorization System," Massachusetts Institute of Technology, Oct. 27, 1998, pp. 1-36. cited by other . Minear, S.E., "Providing Policy Control Over Object Operations in a Mach Based System," Secure Computing Corporation, Apr. 28, 1995, 15 pages. cited by other . Moffett, J.D., "Delegation of Authority Using Domain-Based Access Rules," thesis Imperial College of Science, Technology & Medicine, University of London, Jul. 1990. cited by other . Moffett, J., et al., "Specifying Discretionary Access Control Policy for Distributed Systems," Computer Communications, vol. 13, No. 9, Nov. 1990, pp. 1-17. cited by other . Moffett, J.D., "Specification of Management Policies and Discretionary Access Control," Department of Computer Science, University of York, Jun. 28, 1994, pp. 1-28. cited by other . Moffett, J.D., et al., "The Representation of Policies as System Objects," Proceedings of the Conference on Organizational Computer Systems (COCS '91), Atlantia, Georgia, Nov. 5-8, 1991, 16 pages. cited by other . Moffett, J.D.,et al., "Policy Hierarchies for Distributed Systems Management," IEEE JSAC Special Issue on Network Management, vol. 11, No. 9, Dec. 1993, pp. 1-4. cited by other . Moffett, Jonathan, D., et al., "An Introduction to Security Distributed Systems," Department of Computer Science, University of York, England, Aug. 1993, pp. 1-14. cited by other . Montini, G, et al., "Access Control Models and Office Structures," Computer Security: A Global Challenge, 1984, pp. 473-485. cited by other . Motorola MC68030 Enhanced 32-bit Microprocessor User's Manual, 2nd Ed., Prentice-Hall, 1989. cited by other . Mullender, S., Distributed Systems, ACM Press, 1989. cited by other . Multics, Home; viewed on Nov. 12, 2001 at <http://www.multicians.org> pp. 1-3. cited by other . Multimedia Mixed Object Envelopes Supporting a Graduated Fee Scheme via Encryption; IBM Technical Disclosure BUlletin, vol. 37, No. 3, Mar. 1994. cited by other . National Computer Security Center, "Trusted Unix Working Group (TRUSIX) Rationale for Selecting Access Control List Features for the UNIX (R) System," Aug. 18, 1989. cited by other . National Institute of Standards and Technology, "History of Computer Security: Early Computer Security Papers, Part 1," viewed on Sep. 4, 2002 at <http://csrc.nist.gov/publications/history/index.html> pp. 1-27. cited by other . National Security Agency, "A Guide to Understanding Security Modeling in Trusted Systems," Oct. 1992, 122 pages. cited by other . National Semiconductor "iPower Technology," (undated), 11 pages. cited by other . Needham, R.M., "Ading Capability Access to Conventional File Servers," Xerox Palo Alto Research Center, (undated), pp. 3-4. cited by other . Netscape, "SSL 2.0 Protocol Specification," viewed at http://home.netscape.com/eng/security/SSL.2html Jan. 23, 2003. cited by other . NIST & NSA, "Federal Criteria for Information Technology Security," Vol. II, Version 1.0, National Institute of Standards and Technology and National Security Agency, Dec. 1992, 270 pages. cited by other . NSA Korean War 1950-1953 Commemoration, History Papers, National Security Agency, http://www.nsa.gov/korea/papers.htm, pp. 1-2. cited by other . Olivier, M.S., "A Multilevel Secure Federated Database," Database Security, VIII (A-60), 1994, pp. 183-198. cited by other . Olivier, MS, et al., "Building a Secure Database using Self-protecting Objects," Computers & Security, vol. 11, No. 3, 259-271, 1992. cited by other . Olson, M., et al., "Concurrent Access Licensing," vol. 6, No. 9, Unix Review, 1988, pp. 67-74. cited by other . OMG Security Working Group, "OMG White Paper on Security," OMG Security Working Group, Apr. 1994, pp. 1-24. cited by other . OOPSLA 1993: Addendum to the Proceedings, "Security for Object-Oriented Systems," Sep. 26-Oct. 1, 1993, pp. 77-78. cited by other . Open Software Foundation, OSF DCE Administration Guide-Core Components, PTR Prentice Hall, 1993. cited by other . Orfali, R., et al., The Essential Distributed Objects Survival Guide, John Wiley & Sons, Inc., 1996. cited by other . Park, J.S., AS/400 Security in a Client/Server Environment, John Wiley & Sons, Inc. 1995. cited by other . Picciotto, J., et al., "Extended Labeling Policies for Enhanced Application Support," Computers & Security, vol. 13, No. 7, 1994, pp. 587-599. cited by other . Polk, T.W., "Approximating Clark-Wilson "Access Triples" with Basic UNIX Controls," Symposium Proceedings, Unix Security IV, Oct. 4-6, 1993, Santa Clara, California, pp. 145-154. cited by other . Press, J., "Secure Transfer of Identity and Privilege Attributes in an Open Systems Environment," Computers & Security, vol. 10, No. 2, 1991, pp. 117-127. cited by other . "Privacy and the Nill: Safeguarding Telecommunications--Related Personal Infrmation", U.S> Dept. of Commerce, Oct. 1995. cited by other . "Proceedings: Technological Strategies for Protecting Intellectual Propertly in the Networked Multimedia Environment," 1994, Coalition for Networked Information, Interactive Multimedia Association, John F. Kennedy School of Government, Journal of the Inte. cited by other . Purdy, G.B., et al., "A Software Protection Scheme," Proceedings of the 1982 Symposium on Security and Privacy, Apr. 26-28, 1982, Oakland California, pp. 99-103. cited by other . Rashid, R.F., CMU Computer Science: A 25th Anniversity Commermorative, Addison-Welsey Publishing Company, 1991. cited by other . Rescorla, E., et al., "The Secure HyperText Transfer Protocol," Enterprise Integration Technologies, Jun. 1994, pp. 1-23. cited by other . Rivest, R., "The MD5 Message-Digest Algorithm," Network Working Group, Apr. 1992, pp. 1-21. cited by other . Roberts, R., et al., Compute!'s Computer Security, Compute! Publications, Inc., 1989. cited by other . Robinson et al., "Encoding Header Field for Internet Messages," Network Working Group RPC 1154, Apr. 1990. cited by other . Rosenberry, W., et al., "Distributing Applications Across DCE and Windows NT," 1993. cited by other . Rosenberry, W., et al., Understanding DCE, O'Reilly & Associates, Inc., 1992. cited by other . Ross, P.E., "Cops versus robbers in cyberspace," Forbes, Sep. 9, 1996. cited by other . RSA Security; News; "Enterprise Solutions Announces RSA Mail," <http://rsasecurity.com/news/pr/940112-2.html.>, dated Jan. 12, 1994, pp.1-2. cited by other . RSA Security; News; "Hewlett-Packard Chooses RSA," <http://rsasecurity.com/news/pr/940112-5.html>, dated Jan. 12, 1994, pp. 1-2. cited by other . RSA Security; News; "Hilgraeve Ships Secure Version of HyperACCESS/5," <http://rsasecurity.com/news/pr/940112-8.html.>, dated Jan. 12, 1994, pp. 1-2. cited by other . RSA Security; News; "iPower's Data Security Approach," <http://rsasecurity.com/news/pr/940112-10.html>, dated Jan. 12, 1994. cited by other . RSA Security; News; "RSA Enters Wireless Arena," <http://resasecurity.com/news/pr/940112-6.html>, dated Jan. 12, 1994, pp. 1-2. cited by other . RSA Security; News; <http://rsasecurity.com/news/pr/9401.html>, dated Jan. 12, 1994, pp. 1-2. cited by other . Rubin, A.D., "Trusted Distribution of Software Over the Internet," Bellcore, 1995, pp. 1-9. cited by other . Rushby, J.M., "Design and Verification of Secure Systems," ACM, 1981, pp. 12-21. cited by other . Russell, D., et al., Computer Security Basics, O'Reilly & Associates, Inc., 1991. cited by other . Russell, S., "Paradigms for Verification of Authorization at Source of Electronic Documents in an Integrated Environment," Computers & Security, vol. 12, No. 6, 1993, pp. 542-549. cited by other . Russell, S., "Planning for the EDI of Tomorrow Using Electronic Document Authorization," Computer Security (A-37), 1993, pp. 243-251. cited by other . Sander, T. et al., "Protecting Mobile Agents Against Malicious Hosts," Mobile Agents and Security: Lecture Notes in Computer Science, Springer-Verlag, G. Vigna, Ed., vol. 1419, Nov. 11, 1997, 16 pages. cited by other . Sander, T. et al., "Towards Mobile Cryptography," IEEE Proceedings of Security and Privacy, May 1998, 10 pages. cited by other . Sandhu, R.S., et al., "Data and Database Security and Controls," Handbook of Information Security Management, Auerbach Publishers, 1993, pp. 1-37. cited by other . Saydjari, O.S., et al., "LOCK Trek: Navigating Unchartered Space," National Computer security Center, 1989, pp. 167-175. cited by other . Schaumuller-Bichl, S., "IC-Cards in High-Security Applications," Voest-Alpine AG, (undated), pp. 177-199. cited by other . Schill, A., et al., "Mobility Aware Multimedia X. 400 e-mail: A Sample Application Based on a Support Platform for Distributed Mobile Computing," Dresden University of Technology, Faculty of Computer Science, (undated), pp. 1-7. cited by other . Schill, A.B., et al., "DC++: Distributed Object-Oriented System Support on top of OSF DCE," 1993. cited by other . Schill, A.B., et al., "DCE-The OSF Distributed Computing Environment Client Server Model and Beyond," Oct. 1993. cited by other . Sebes, E.J., "Overview of the Architecture of Distributed Trusted Mach," (undated), pp. 1-10. cited by other . Sebes, E.J., et al., "The Architecture of Triad: A Distributed, Real-Time, Trusted System," (undated), pp. 1-12. cited by other . Sebes, E.J., et al., "The Triad System: The Design of a Distributed, Real-Time, Trusted System," (undated), pp. 1-12. cited by other . Secure Computing, "Constructing a High Assurance Mail Guard," 1994, pp. 1-10. cited by other . "Security Enhanced LINUX," National Security Agent, http://www.nsa.gov/selinux/, pp. 1-2. cited by other . Shaffer, S.L., et al., Network Security, Academic Press, Inc., 1994. cited by other . Sheridan Software Systems, Data Widgets 2.0: Programmer's Guide, Sheridan Software Systems, Inc., 1993-1995. cited by other . Shirley, J., "Guide to Writing DCE Applications," 1st Ed. 1992. cited by other . Shirley, J., et al., "Guide to Writing DCE Applications," 2nd Ed. 1994. cited by other . Short, K.L., Microprocessors and Programmed Logic, Prentice-Hall, Inc., 1981. cited by other . Sibert, Olin, et al., DigiBox: A Self-Protecting Container for Information Commerce, Proceedings of the First USENIX Workshop on Electronic Commerce, New York, NY, Jul. 1995, 9 pages. cited by other . Sibert, Olin, et al., Securing the Content, Not the Wire, for Information Commerce, InterTrust Technologies Corporation, 1996, 12 pages. cited by other . Sibert, Olin, et al., "The Intel 80x86 Processor Architecture: Pitfalls for Secure Systems," (undated), 12 pages. cited by other . "SIGSALY Secure Digital Voice Communications in World War II," National Security Agency, http://www.nsa.gov/wwii/papers/sigsaly.htm, Oct. 13, 2000, pp. 1-2. cited by other . Smart Card 1993 Conference Proceedings, "Day 1: Communications and Marketing Systems & Market Overview," Lowndes Exhibition Organisers, Ltd., 1993, pp. 1-79. cited by other . Solomon, Daniel, J., "Processing Multilevel Secure Objects," Proceedings of the 1981 Symposium on Security and Privacy, Apr. 27-29, 1981, Oakland, California, pp. 56-61. cited by other . Stallings, W., Cryptography and Network Security: Principles and Practice, Prentice-Hall, Inc., 1999. cited by other . Stepney et al., "Formal specification of an Access Control System," Software-Practice and Experience, vol. 17, No. 9, 1987. cited by other . Strack, Hermann, "Extended Access Control in UNIX System V-ACLs and Context," Usenix Association, Proceedings of the Unix Security II Workshop, Aug. 27-28, 1990, Portland, Oregon, pp. 87-101. cited by other . Stubblebine, S.G., "Security Services for Multimedia Conferencing," Proceedings of the 16th National Computer Security Conference, Baltimore, Maryland, Sep. 20-23, 1993, pp. 1-5. cited by other . Tanenbaum, A.S., et al., "Distributed Operating Systems," Computing Surveys, vol. 17, No. 4, Dec. 1985, pp. 419-470. cited by other . Tanenbaum, A.S., et al., "The Amoeba Distributed Operating System," 1990. cited by other . Tanenbaum, A.S., et al., "The Amoeba Distributed Operating System-A Status Report," 1991. cited by other . Tanenbaum, A.S., Modern Operating Systems, Prentice-Hall, Inc. 1992. cited by other . Tanenbaum, A.S., Operating Systems: Design and Implementation, Prentice-Hall, Inc. 1987. cited by other . "Technical Rationle Behind CSC-STD-003-85: Computer Security Requirements," http://www.radium.ncsc.mil/tpep/library/rainbow/CSC-STD-004-85.html, Jun. 25, 1985, pp. 1-40. cited by other . The First USENIX Workshop on Electronic Commerce Proceedings, New York, New York, Jul. 11-12, 1995, Usenix Association. cited by other . The Risks Digest, "Forum on Risks to the Public in Computers and Related Systems," vol. 15; Issue 39, Jan. 21, 1994, pp. 1-12. cited by other . The Risks Digest, "Forum on Risks to the Public in Computers and Related Systems," vol. 15; Issue 47, Feb. 9, 1994, pp. 1-12. cited by other . Thomas, R.K., et al., "Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects," Proceedings of the IFIP Workshop on Database Security, Aug. 19-21, 1992, Vancouver, Canada, 21 pages. cited by other . Ting, T.C., et al., "Requirements, Capabilities and Functionalities of User Role Based Security for an Object-Oriented Design Model," Database Security, V: Status and Prospectus, 1992, pp. 275-297. cited by other . Tirkel, A.Z., et al., "Electronic Water Mark," (undated), 5 pages. cited by other . Toohey, J., Using OLE 2.X in Application Development, Que Corporation, 1994. cited by other . Townsend, J.E., "NIST on Internet Security," Mar. 22, 1994, pp. 1-15. cited by other . U.S. Department of Commerce (NIST), "Security Requirements for Crytopgraphic Modules," Jan. 11, 1994, pp. 1-53. cited by other . Uhler, Stephen A., "PhoneStation, Moving the Telephone onto the Virtual Desktop," 1993 Winter USENIX, San Diego, California, Jan. 25-29, 1993, pp. 131-140. cited by other . van Gilluwe, F., The Undocumented PC: A Programmer's Guide to I/O, Cpus, and Fixed Memory Areas, Addison-Wesley Publishing Company, 1994. cited by other . van Schyndel, R.G., et al., "A Digital Watermark," (undated), 3 pages. cited by other . Vickers Benzel, T.C., et al., "Identification of Subjects and Objects in a Trusted Extensible Client Server Architecture," (undated), pp. 1-17. cited by other . Vittal, J., "Active Message Processing: Messages as Messengers," Bolt, Beranek and Newman, Inc., 1980, pp. 175-195. cited by other . Voydock, V.L., et al., "Security Mechanisms in High-Level Network Protocols," Computing Surveys, vol. 15, No. 2, Jun. 1983, pp. 135-171. cited by other . Walker, Bruce. J., et al., Computer Security and Protection Structures, Dowden, Hutchinson, & Ross, Inc., 1977. cited by other . Ware, W., Chairman RAND Corporation "Panel: The InterTrust Commerce Architecture," 1997, 6 pages. cited by other . Weadon, P.D., "The SIGSALY Story," Dec. 10, 2002. cited by other . White, J.E., "Telescript Technology: The Foundation for the Electronic Marketplace," General Magic, 1994. cited by other . Williams, S., "An MSJ Interview with Microsoft's Chief Architect of OLE, Tony Williams," Microsoft Systems Journal, Oct. 1993, pp. 56-66. cited by other . Wong, R., et al., "The SIDOS System: A Secure Distributed Operating System Prototype," Odyssey Research Associates, Oct. 1989, pp. 172-183. cited by other . Wood, P.H., et al., UNIX System Security, Pipline Associates, Inc., 1985. cited by other . Yee, B., et al., "Secure Coprocessors in Electronic Commerce Applications," Proceedings of the First Usenix Workshop on Electronic Commerce, New York, New York, Jul. 1995, 16 pages. cited by other . Young, W.D., "Verifiable Computer Security and Hardware: Issues," Technical Report, Computational Logic Inc., Sep. 1991, 43 pages. cited by other . Zeleznick, M.P., "Security Design in Distributed Computing Applications," Department of Computer Science, University of Utah, Dec. 1993, 16 pages. cited by other . Zelnick, Nate, "Keeping Business Safe on the Internet," PC Magazine, Apr. 25, 1995, pp. 1-2. cited by other . Zurko, M.E., "Panels at the 1997 IEEE Symposium on Security and Privacy," Oakland, CA, May 1997, 12 pages. cited by other . Bancilhon, Francios, et al., "Building an Object-Oriented Database System: The Story of 0.sub.2," Morgan Kaufmann Publishers, San Mateo, California, 1992, 104 pages. cited by other . Goldfarb, Charles F., "The SGML Handbook," Oxford University Press, Inc., New York, New York, 1990, 134 pages. cited by other . Hardjono, Thomas, et al., "A New Approach to Database Authentication," Research and Practical Issues in Databases: Proceedings of the 3.sup.rd Australian Database Conference, Melbourne, Australia, Feb. 3-4, 1992, pp. 334-342. cited by other . Kaplan, Marc A., et al., "Digital Signatures for Software: Technical Requirements and a Proposal," IBM Research, T.J. Watson Research Center, Apr. 1996, 7 pages. cited by other . Kim, Won, "Object-Oriented Databases: Definition and Research Directions," IEEE Transactions on Knowledge and Data Engineering, vol. 2, No. 3, Sep. 1990, pp. 327-341. cited by other . Ledgard, Henry F., "The Little Book of Object-Oriented Programming," Prentice Hall, Upper Saddle River, New Jersey, 1996, 35 pages. cited by other . Nyanchama, G. Matunda, et al., "Mandatory Security in an Object-Oriented Database," The University of Western Ontario, London, Ontario, Canada, 1992, 35 pages. cited by other . Peterson, Gerald E., et al., "Object-Oriented Computing Volume I: Concepts," Computer Society Press of the IEEE, Washington, D.C. vol. I: Concepts, 1987, 34 pages. cited by other . Wade, Andrew E., "The ODBMS Role in 64 bit Distributed Client-Server Computing," Electro International, May 10-12, 1994, 7 pages. cited by other . "Information Processing--Text and Office Systems--Standard Generalized Markup Language (SMGL)," International Standard ISO 8879, First Edition, Oct. 15, 1986, 171 pages. cited by other . Goldfarb, C., Document from the Internet: "A Brief History of the Development of SGML," 1993, 7 pages. cited by other . Kim, W., et al., Object--Oriented Concepts, Databases, and Applications, ACM Press, New York, New York, 1989, 63 pages. cited by other . Lagoze, C. et al., "The Warwick Framework: A Container Architecture for Aggregating Sets of Metadata," Cornell University Computer Science Technical Report TR96-1593, Jun 28,. 1996, 26 pages. cited by other . Laplante, M., "Information Interoperability," May '96 Inform, pp. 16-18. cited by other . Lynch, C., "When Technology Leads Policy", ARL Proceedings of the 131.sup.st Annual Meeting (Preservation of Digital Information), Oct. 15-17, 1997, 6 pages. cited by other . McKenzie, M., "Copyright Protection: Understanding Your Options," The Seybold Report on Internet Publishing, vol. 1, No. 4, Dec. 1996, pp. 6-14. cited by other . Ward, N., "Networked Information Management," slideshow, DSTC, Canberra, Australia, Jul. 1997, 56 pages. cited by other . Weibel S., et al., "An Element Set to Support Resource Discovery," The State of the Dublin Core, Jan. 1997, available at http://www.cs.cornell.edu/lagoze/papers/jodl.hmtl, 15 pages. cited by other . DSTC's 1995/96 Annual Report, CRC for Distributed Systems Technology, 73 pages. cited by other. |