Weber, R., “Digital Rights Management Technology”, Oct. 1995 (European Search Report for corresponding European application 95308417.5.* |
Kahn, R.E., Deposit, Registration, and Recordation in an Electronic Copyright Management System, IMA Intellectual Property Project Proceedings, Jan. 1994, vol. 1, Issue 1, pp. 111-120.* |
Griswold, G. N., “A method for protecting copyright on networks” IMA Intellectual Property Project Proceedings, Jan. 1994, vol. 1, issue 1, pp. 169-178.* |
“Aladdin Knowledge Systems Partners with Rights Exchange, Inc. to Develop a Comprehensive Solution for Electronic Software Distribution,” Aug. 3, 1988, 5 pages. |
Amdur, D., “Metering Online Copyright,” Jan. 16, 1996, 2 pages. |
Amdur, D. (ed.), “InterTrust Challenges IBM Digital Content Metering,” Report On Electronic Commerce, Jul. 23, 1996, 3(15), 1-2 and 16-18. |
Armati, D., “Tools and standards for protection, control and presentation of data,” Apr. 3, 1996, 17 pages. |
Benjamin, R. et al., “Electronic markets and virtual value chains on the information superhighway,” Sloan Management Rev., Winter, 1995, 62-72. |
Cassidy, “A Web developers guide to content encapsulation technology,” Apr., 1997, 5 pages. |
Clark, T., “Software Secures Digital Content on Web,” Interactive Week, Sep. 25, 1995, 1 page. |
Cox, B., “Superdistribution,” Idees Fortes, Sep., 1994, 2 pages. |
Cox, B., “What if There Is A Silver Bullet,” J. Object Oriented Programm., Jun., 1992, 8-9 and 76. |
Griswold, G.N., “A Method for Protecting Copyright on Networks,” IMA Intell. Property Project Proceedings, Jan., 1994, 1(1), 169-178. |
Hauser, R.C., “Does licensing require new access control techniques?” Aug., 1993, 9 pages. |
Hudgins-Bonafield, C. “Selling Knowledge on the Net,” Network Computing, Jun. 1, 1995, 102-109. |
“IBM spearheading intellectual property protection technology for information on the Internet,” May, 1996, 3 pages. |
“Technological Solutions Rise to Complement Law's Small Stick Guarding Electronic Works,” Information Law Alert, Jun. 16, 1995, 3-4 and 7. |
Kaplan, M.A., “IBM Cryptolopes_, Super-Distribution and Digital Rights Management,” Dec., 1996, 7 pages. |
Kent, S.T., “Protecting externally supplied software in small computers,” Sep., 1980, 1-42 and 250-252. |
Kohl, U. et al., “Safeguarding Digital Library Contents and Users; Protecting Documents Rather Than Channels,” D-Lib Magazine, Sep., 1997, 9 pages. |
Linn, R.J., “Copyright and Information Services in the Context of the National Research and Education Network,” IMA Intell. Property Project Proceedings, Jan., 1994, 1(1), 1 and 10-20. |
McNab, L., “Super-distribution works better in practical applications,” Mar. 2, 1998, 2 pages. |
Moeller, M., “NetTrust lets Cyberspace Merchants Take Account,” PC Week, Nov. 20, 1995, 12(48), 1 page. |
Moeller, M., “IBM takes charge of E-commerce; Plans client, server apps based on SET,” Apr., 1996, 4 pages. |
Pemberton, J., “An ONLINE Interview with Jeff Crigler at IBM InfoMarket,” Jul., 1996, 6 pages. |
“LicensIt: kinder, gentler copyright? Copyright management system links content, authorship information,” Seybold Report on Desktop Publishing, 1996, 10(11), 2 pages. |
Sibert, O. et al., “The DigiBox: A Self-protecting Container for Information Commerce,” First USENIX Workshop on Electronic Commerce, Jul. 11-12, 1995, 171-183. |
Sibert, O. et al., “Securing the Content, Not the Wire, for Information Commerce,” Jul., 1995, 1-11. |
Smith, M.G. et al., “A New Set of Rules For Information Commerce,” Electronic Commerce, Nov. 6, 1995, 34-35. |
Stefik, M., “Trusted Systems,” Mar., 1997, 8 pages. |
Stefik, M., “Shifting the Possible: How Trusted Systems and Digital Property Rights Challenge Us to Rethink Digital Publishing,” Technical Perspective, 1997, 137-159. |
Tarter, J. (ed.), “The Superdistribution Model,” Soft Trends, Nov. 15, 1996, 3(6), 1-6. |
“Rights Management in the Digital Age: Trading in Bits, Not Atoms,” Spring, 1997, 4, 3 pages. |
Weber, R., “Digital Right Management Technology,” Oct., 1995, 35 pages. |
White, S.R. et al., “ABYSS: An Architecture for Software Protection,” IEEE Trans. On Software Engineering, Jun., 1990, 16(6), 619-629. |
White, S.R. et al., “ABYSS: A trusted architecture for software protection,” IEEE Symposium on Security and Privacy, Apr. 27-29, 1987, 38-51. |
“boxing Up Bytes,” 2 pages. |
Ramanujapuram, A. et al., “Digital Content & Intellectual Property Rights: A specification language and tools for rights management,” Dec., 1998, 20-23 and 26. |