Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Intertrust Technologies Corp patents (2016 archive)


Recent patent applications related to Intertrust Technologies Corp. Intertrust Technologies Corp is listed as an Agent/Assignee. Note: Intertrust Technologies Corp may have other listings under different names/spellings. We're not affiliated with Intertrust Technologies Corp, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "I" | Intertrust Technologies Corp-related inventors


Systems and methods for calibrating speakers

Systems and method are disclosed for facilitating efficient calibration of filters for correcting room and/or speaker-based distortion and/or binaural imbalances in audio reproduction, and/or for producing three-dimensional sound in stereo system environments. According to some embodiments, using a portable device such as a smartphone or tablet, a user can calibrate speakers by initiating playback of a test signal, detecting playback of the test signal with the portable device's microphone, and repeating this process for a number of speakers and/or device positions (e.g., next to each of the user's ears). ... Intertrust Technologies Corp

Tethered device systems and methods

Systems and methods are described for applying digital rights management techniques to tethered devices. In one embodiment, a host device is operable to translate a relatively sophisticated license into a simpler format for use on a relatively low-capability device. ... Intertrust Technologies Corp

Systems and methods for watermarking software and other media

Systems and methods are disclosed for embedding information in software and/or other electronic content such that the information is difficult for an unauthorized party to detect, remove, insert, forge, and/or corrupt. The embedded information can be used to protect electronic content by identifying the content's source, thus enabling unauthorized copies or derivatives to be reliably traced, and thus facilitating effective legal recourse by the content owner. ... Intertrust Technologies Corp

Systems and methods for managing and protecting electronic content and applications

Systems and methods are disclosed for managing and protecting electronic content and applications. Applications, content, and/or users can be given credentials by one or more credentialing authorities upon satisfaction of a set of requirements. ... Intertrust Technologies Corp

Method, systems, and apparatus for fragmented file sharing

Systems, methods, software, and apparatus are described for facilitating the distribution and management of fragmented content. In one embodiment, a packager packages content into fragments and generates a manifest including policies and metadata associated with the content. ... Intertrust Technologies Corp

Systems and methods for authenticating and protecting the integrity of data streams and other data

Systems and methods are disclosed for enabling a recipient of a cryptographically-signed electronic communication to verify the authenticity of the communication on-the-fly using a signed chain of check values, the chain being constructed from the original content of the communication, and each check value in the chain being at least partially dependent on the signed root of the chain and a portion of the communication. Fault tolerance can be provided by including error-check values in the communication that enable a decoding device to maintain the chain's security in the face of communication errors. ... Intertrust Technologies Corp

Systems and methods for vehicle policy enforcement

This disclosure relates to systems and methods for vehicle policy management and enforcement. In certain embodiments, a method for enforcing a policy may include receiving policy information at a device including one or more conditions relating to a policy-managed location in a vehicle. ... Intertrust Technologies Corp

Establishing a secure channel with a human user

A method of establishing a secure channel between a human user and a computer application is described. A secret unique identifier (“pin”) is shared between a user and an application. ... Intertrust Technologies Corp

Bioinformatic processing systems and methods

The present disclosure relates to systems and methods for facilitating trusted handling of genomic and/or other bioinformatic information. Certain embodiments may facilitate policy-based governance of access to and/or use of bioinformatic information, improved interaction with and/or use of distributed bioinformatic information, parallelization of various processes involving bioinformatic information, and/or reduced user involvement in bioinformatic workflow processes, and/or the like. ... Intertrust Technologies Corp

Secure processing systems and methods

This disclosure relates to systems and methods for enabling the use of secret digital or electronic information without exposing the sensitive information to unsecured applications. In certain embodiments, the methods may include invoking, by a client application executing in an open processing domain, a secure abstraction layer configured to interface with secret data protected by a secure processing domain. ... Intertrust Technologies Corp

Information targeting systems and methods

The present disclosure relates generally to systems and methods for the secure management of electronic information relating to a user. In certain embodiments, systems and methods disclosed herein may allow for personal information related to a user to be used in connection with information targeting systems and methods configured to match and/or target information for delivery to a user based on the user's interests. ... Intertrust Technologies Corp

Trusted storage systems and methods

Systems and methods are disclosed for providing a trusted database system that leverages a small amount of trusted storage to secure a larger amount of untrusted storage. Data are encrypted and validated to prevent unauthorized modification or access. ... Intertrust Technologies Corp

Digital rights management engine systems and methods

Systems and methods are described for performing digital rights management. In one embodiment, a digital rights management engine is provided that evaluates license associated with protected content to determine if a requested access or other use of the content is authorized. ... Intertrust Technologies Corp

Systems and methods for governing content rendering, protection, and management applications

System and methods are disclosed for governing digital rights management systems and other applications through the use of supervisory governance applications and keying mechanisms. Governance is provided by enabling the supervisory applications to revoke access keys and/or to block certain file system calls, thus preventing governed applications from accessing protected electronic content.. ... Intertrust Technologies Corp

07/14/16 / #20160205074

Cryptographic systems and methods

Systems and methods are described that use cryptographic techniques to improve the security of applications executing in a potentially untrusted environment associated with a software application. Embodiments of the disclosed systems and methods may, among other things, facilitate cryptographic operations within an execution environment associated with browser software of a client system while maintaining security of cryptographic keys imported into the environment. ... Intertrust Technologies Corp

06/02/16 / #20160155119

Systems and methods for conducting transactions and communications using a trusted third party

Systems and methods are provided for performing transactions and managing communications using a trusted third party. In one embodiment, a sender transfers an encrypted version of a file (such as a digitally encoded audio track, movie, document, or the like) to someone who wishes to receive it. ... Intertrust Technologies Corp

05/12/16 / #20160132317

Secure application distribution systems and methods

Systems and methods are described that use software diversification techniques to improve the security of mobile applications. Embodiments of the disclosed systems and methods may, among other things, facilitate secure application distribution through deployment of diverse of applications in an application distribution channel. ... Intertrust Technologies Corp








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Intertrust Technologies Corp in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Intertrust Technologies Corp with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###