AU2002219973A1 - Method and apparatus for protecting information and privacy - Google Patents

Method and apparatus for protecting information and privacy

Info

Publication number
AU2002219973A1
AU2002219973A1 AU2002219973A AU1997302A AU2002219973A1 AU 2002219973 A1 AU2002219973 A1 AU 2002219973A1 AU 2002219973 A AU2002219973 A AU 2002219973A AU 1997302 A AU1997302 A AU 1997302A AU 2002219973 A1 AU2002219973 A1 AU 2002219973A1
Authority
AU
Australia
Prior art keywords
message
software
tag
tag table
purchaser
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2002219973A
Inventor
Michael O. Rabin
Dennis E. Shasha
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of AU2002219973A1 publication Critical patent/AU2002219973A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44521Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading

Abstract

A system for protecting software comprising one or more computer processors executing computer readable instructions for: creating, by a purchaser device, a data structure including a tag table identifier value associated with a tag table in a user device and an identification of said software; computing, by said purchaser device, a hash function value of said data structure; sending by said purchaser device, a message to a vendor device, said message comprising said hash function value and said identification of said software; after receiving said message, said vendor device digitally signing said message and returning said signed message to said purchaser device; verifying by a supervising program on said user device said digital signature on said signed message by use of said vendor device's public key; and storing, by said supervising program, a tag for said software in said tag table wherein said tag includes said tag table identifier value and said signed message.
AU2002219973A 2000-11-03 2001-11-01 Method and apparatus for protecting information and privacy Abandoned AU2002219973A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US09/706,074 US6889209B1 (en) 2000-11-03 2000-11-03 Method and apparatus for protecting information and privacy
US09/706,074 2000-11-03
PCT/US2001/044971 WO2002037245A2 (en) 2000-11-03 2001-11-01 Method and apparatus for protecting information and privacy

Publications (1)

Publication Number Publication Date
AU2002219973A1 true AU2002219973A1 (en) 2002-05-15

Family

ID=24836120

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2002219973A Abandoned AU2002219973A1 (en) 2000-11-03 2001-11-01 Method and apparatus for protecting information and privacy

Country Status (8)

Country Link
US (2) US6889209B1 (en)
EP (2) EP1342149B1 (en)
CN (1) CN1592875A (en)
AT (1) ATE444510T1 (en)
AU (1) AU2002219973A1 (en)
CA (1) CA2426425A1 (en)
DE (1) DE60140075D1 (en)
WO (1) WO2002037245A2 (en)

Families Citing this family (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6697948B1 (en) * 1999-05-05 2004-02-24 Michael O. Rabin Methods and apparatus for protecting information
US7076445B1 (en) 2000-06-20 2006-07-11 Cartwright Shawn D System and methods for obtaining advantages and transacting the same in a computer gaming environment
US6889209B1 (en) * 2000-11-03 2005-05-03 Shieldip, Inc. Method and apparatus for protecting information and privacy
JP2002297452A (en) * 2001-03-30 2002-10-11 Matsushita Electric Ind Co Ltd Record regenerating device, controlling method, and unfairness preventing system
US7979914B2 (en) * 2001-06-25 2011-07-12 Audible, Inc. Time-based digital content authorization
JP3939977B2 (en) * 2001-12-20 2007-07-04 富士通株式会社 Access right contradiction detection device and analysis rule creation device
US7251730B2 (en) * 2001-12-21 2007-07-31 Qualcomm Incorporated Method and apparatus for simplified audio authentication
US7356845B2 (en) * 2002-01-30 2008-04-08 Lucent Technologies Inc. Method and apparatus for identification tagging documents in a computer system
CA2372034A1 (en) * 2002-02-14 2003-08-14 Cloakware Corporation Foiling buffer-overflow and alien-code attacks by encoding
US7966497B2 (en) * 2002-02-15 2011-06-21 Qualcomm Incorporated System and method for acoustic two factor authentication
US7305704B2 (en) * 2002-03-16 2007-12-04 Trustedflow Systems, Inc. Management of trusted flow system
EP1509830A2 (en) * 2002-05-02 2005-03-02 Shieldip, Inc. Method and apparatus for protecting information and privacy
US7454169B2 (en) * 2002-05-08 2008-11-18 Mediatek Inc. Method and apparatus for use in securing an electronic device such as a cell phone
US7401224B2 (en) * 2002-05-15 2008-07-15 Qualcomm Incorporated System and method for managing sonic token verifiers
US7599976B1 (en) * 2002-11-13 2009-10-06 Metrowerks Corporation System and method for cryptographic key generation
JP4343542B2 (en) * 2003-01-30 2009-10-14 ソニー株式会社 Information processing system, information processing apparatus, information processing method, program, and recording medium
US20040163131A1 (en) * 2003-01-31 2004-08-19 Benco David S. Telecommunication feature activation and billing support from a centralized server
JP2006523995A (en) * 2003-03-21 2006-10-19 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Privacy of user identity in authorization certificate
US7788724B2 (en) * 2003-04-10 2010-08-31 Symantec Corporation System and method for detecting malicious applications
US7600108B2 (en) * 2003-06-17 2009-10-06 Wms Gaming Inc. Gaming machine having reduced-read software authentication
US7287159B2 (en) * 2004-04-01 2007-10-23 Shieldip, Inc. Detection and identification methods for software
JP2005316890A (en) * 2004-04-30 2005-11-10 Sony Corp Program, computer, data processing method, communication system, and method therefor
WO2005117481A1 (en) * 2004-05-28 2005-12-08 Koninklijke Philips Electronics N.V., Privacy-preserving information distributing system
EP1643402A3 (en) * 2004-09-30 2007-01-10 Sap Ag Long-term authenticity proof of electronic documents
SG121908A1 (en) * 2004-10-13 2006-05-26 Encentuate Pte Ltd A predictive method for multi-party strengthening of authentication credentials with non-real time synchronization
US7716139B2 (en) 2004-10-29 2010-05-11 Research In Motion Limited System and method for verifying digital signatures on certificates
DE602004003503T2 (en) * 2004-10-29 2007-05-03 Research In Motion Ltd., Waterloo System and method for verification of digital signatures of certificates
US7337147B2 (en) * 2005-06-30 2008-02-26 Microsoft Corporation Dynamic digital content licensing
US8340289B2 (en) 2005-09-29 2012-12-25 Research In Motion Limited System and method for providing an indication of randomness quality of random number data generated by a random data service
WO2007041501A2 (en) * 2005-09-30 2007-04-12 Phoenix Technologies Ltd. Secure execution environment by preventing execution of unauthorized boot loaders
US8484632B2 (en) * 2005-12-22 2013-07-09 Sandisk Technologies Inc. System for program code execution with memory storage controller participation
US8479186B2 (en) * 2005-12-22 2013-07-02 Sandisk Technologies Inc. Method for program code execution with memory storage controller participation
US20070174196A1 (en) * 2006-01-26 2007-07-26 Christoph Becker System and method for verifying authenticity
GB2432934B (en) * 2006-03-14 2007-12-19 Streamshield Networks Ltd A method and apparatus for providing network security
US8010803B2 (en) * 2006-10-12 2011-08-30 Black Duck Software, Inc. Methods and apparatus for automated export compliance
US8997054B2 (en) * 2007-11-30 2015-03-31 Red Hat, Inc. Software application certification service
US20090204856A1 (en) * 2008-02-08 2009-08-13 Sinclair Colin A Self-service terminal
US20090313171A1 (en) * 2008-06-17 2009-12-17 Microsoft Corporation Electronic transaction verification
KR101048439B1 (en) * 2009-04-24 2011-07-11 (주)엠더블유스토리 The server that stores the game execution authority authentication method, the recording medium on which the game execution authority authentication program is recorded, and the game execution authority authentication program.
US20130304818A1 (en) * 2009-12-01 2013-11-14 Topsy Labs, Inc. Systems and methods for discovery of related terms for social media content collection over social networks
US11113299B2 (en) 2009-12-01 2021-09-07 Apple Inc. System and method for metadata transfer among search entities
US8914908B2 (en) * 2010-09-08 2014-12-16 Quick Heal Technologies (P) Ltd. Completely automated computer implemented system and method for piracy control based on update requests
IL210169A0 (en) 2010-12-22 2011-03-31 Yehuda Binder System and method for routing-based internet security
US8627097B2 (en) 2012-03-27 2014-01-07 Igt System and method enabling parallel processing of hash functions using authentication checkpoint hashes
US9298925B1 (en) * 2013-03-08 2016-03-29 Ca, Inc. Supply chain cyber security auditing systems, methods and computer program products
US9304657B2 (en) 2013-12-31 2016-04-05 Abbyy Development Llc Audio tagging
GB201405755D0 (en) * 2014-03-31 2014-05-14 Irdeto Bv Optimizing and protecting software
US11048778B2 (en) * 2014-06-13 2021-06-29 Artis Solutions Co., Ltd Application program
US8978153B1 (en) 2014-08-01 2015-03-10 Datalogix, Inc. Apparatus and method for data matching and anonymization
US10120766B2 (en) * 2015-10-16 2018-11-06 Business Objects Software Limited Model-based system and method for undoing actions in an application
US20220309132A1 (en) * 2021-03-24 2022-09-29 EMC IP Holding Company LLC System Protection Using Verification of Software Digital Identity Values
CN112926039A (en) * 2021-04-08 2021-06-08 深圳市优服信息技术有限公司 Computing device management software with high safety

Family Cites Families (79)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US594696A (en) * 1897-11-30 Roller pulverizing-svsill
US3609697A (en) 1968-10-21 1971-09-28 Ibm Program security device
US3996449A (en) 1975-08-25 1976-12-07 International Business Machines Corporation Operating system authenticator
US4458315A (en) 1982-02-25 1984-07-03 Penta, Inc. Apparatus and method for preventing unauthorized use of computer programs
US4658093A (en) 1983-07-11 1987-04-14 Hellman Martin E Software distribution system
US5109413A (en) 1986-11-05 1992-04-28 International Business Machines Corporation Manipulating rights-to-execute in connection with a software copy protection mechanism
US4866769A (en) 1987-08-05 1989-09-12 Ibm Corporation Hardware assist for protecting PC software
US5023907A (en) 1988-09-30 1991-06-11 Apollo Computer, Inc. Network license server
JP2515891B2 (en) 1989-09-20 1996-07-10 株式会社日立製作所 Angle sensor, torque sensor, and electric power steering device controlled according to the outputs of the sensors
US5138712A (en) 1989-10-02 1992-08-11 Sun Microsystems, Inc. Apparatus and method for licensing software on a network of computers
US5132992A (en) 1991-01-07 1992-07-21 Paul Yurt Audio and video transmission and receiving system
JP3270102B2 (en) 1991-03-11 2002-04-02 ヒューレット・パッカード・カンパニー Licensing method and system
US5260999A (en) 1991-06-28 1993-11-09 Digital Equipment Corporation Filters in license management system
WO1993011480A1 (en) 1991-11-27 1993-06-10 Intergraph Corporation System and method for network license administration
US5483658A (en) 1993-02-26 1996-01-09 Grube; Gary W. Detection of unauthorized use of software applications in processing devices
JP2596361B2 (en) * 1993-12-24 1997-04-02 日本電気株式会社 Password update method
US5598470A (en) 1994-04-25 1997-01-28 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: Method and apparatus for utilizing a decryption block
US5724425A (en) 1994-06-10 1998-03-03 Sun Microsystems, Inc. Method and apparatus for enhancing software security and distributing software
JP3531978B2 (en) 1994-08-10 2004-05-31 富士通株式会社 Software billing system
US5715403A (en) 1994-11-23 1998-02-03 Xerox Corporation System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
US5634012A (en) 1994-11-23 1997-05-27 Xerox Corporation System for controlling the distribution and use of digital works having a fee reporting mechanism
JPH08263438A (en) 1994-11-23 1996-10-11 Xerox Corp Distribution and use control system of digital work and access control method to digital work
US6963859B2 (en) 1994-11-23 2005-11-08 Contentguard Holdings, Inc. Content rendering repository
US5629980A (en) 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5638443A (en) 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
US5646997A (en) 1994-12-14 1997-07-08 Barton; James M. Method and apparatus for embedding authentication information within digital data
US5745569A (en) 1996-01-17 1998-04-28 The Dice Company Method for stega-cipher protection of computer code
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US5943422A (en) 1996-08-12 1999-08-24 Intertrust Technologies Corp. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
DE69638018D1 (en) 1995-02-13 2009-10-15 Intertrust Tech Corp Systems and procedures for managing secure transactions and protecting electronic rights
US6948070B1 (en) 1995-02-13 2005-09-20 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US5613004A (en) * 1995-06-07 1997-03-18 The Dice Company Steganographic method and device
NL1000530C2 (en) 1995-06-08 1996-12-10 Defil N V Holland Intertrust A Filtering method.
US5671412A (en) 1995-07-28 1997-09-23 Globetrotter Software, Incorporated License management system for software applications
US5748740A (en) 1995-09-29 1998-05-05 Dallas Semiconductor Corporation Method, apparatus, system and firmware for secure transactions
US5805702A (en) 1995-09-29 1998-09-08 Dallas Semiconductor Corporation Method, apparatus, and system for transferring units of value
US6115802A (en) * 1995-10-13 2000-09-05 Sun Mircrosystems, Inc. Efficient hash table for use in multi-threaded environments
US5825883A (en) 1995-10-31 1998-10-20 Interval Systems, Inc. Method and apparatus that accounts for usage of digital applications
JP2000503154A (en) 1996-01-11 2000-03-14 エムアールジェイ インコーポレイテッド System for controlling access and distribution of digital ownership
US5719941A (en) * 1996-01-12 1998-02-17 Microsoft Corporation Method for changing passwords on a remote computer
JP3486043B2 (en) * 1996-03-11 2004-01-13 株式会社東芝 Operating method of software distribution system and software system
US7159116B2 (en) 1999-12-07 2007-01-02 Blue Spike, Inc. Systems, methods and devices for trusted transactions
US6052780A (en) 1996-09-12 2000-04-18 Open Security Solutions, Llc Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information
US5926624A (en) 1996-09-12 1999-07-20 Audible, Inc. Digital information library and delivery system with logic for generating files targeted to the playback device
US20050010475A1 (en) 1996-10-25 2005-01-13 Ipf, Inc. Internet-based brand management and marketing communication instrumentation network for deploying, installing and remotely programming brand-building server-side driven multi-mode virtual Kiosks on the World Wide Web (WWW), and methods of brand marketing communication between brand marketers and consumers using the same
US5924094A (en) 1996-11-01 1999-07-13 Current Network Technologies Corporation Independent distributed database system
US5872844A (en) 1996-11-18 1999-02-16 Microsoft Corporation System and method for detecting fraudulent expenditure of transferable electronic assets
US5920861A (en) 1997-02-25 1999-07-06 Intertrust Technologies Corp. Techniques for defining using and manipulating rights management data structures
WO1998042098A1 (en) * 1997-03-14 1998-09-24 Cryptoworks, Inc. Digital product rights management technique
US6108420A (en) * 1997-04-10 2000-08-22 Channelware Inc. Method and system for networked installation of uniquely customized, authenticable, and traceable software application
JP4456185B2 (en) * 1997-08-29 2010-04-28 富士通株式会社 Visible watermarked video recording medium with copy protection function and its creation / detection and recording / playback device
US6030288A (en) 1997-09-02 2000-02-29 Quixotic Solutions Inc. Apparatus and process for verifying honest gaming transactions over a communications network
US6240184B1 (en) * 1997-09-05 2001-05-29 Rsa Security Inc. Password synchronization
US6170060B1 (en) 1997-10-03 2001-01-02 Audible, Inc. Method and apparatus for targeting a digital information playback device
US6134327A (en) 1997-10-24 2000-10-17 Entrust Technologies Ltd. Method and apparatus for creating communities of trust in a secure communication system
US5982892A (en) 1997-12-22 1999-11-09 Hicks; Christian Bielefeldt System and method for remote authorization for unlocking electronic data
US6170058B1 (en) * 1997-12-23 2001-01-02 Arcot Systems, Inc. Method and apparatus for cryptographically camouflaged cryptographic key storage, certification and use
US6108644A (en) * 1998-02-19 2000-08-22 At&T Corp. System and method for electronic transactions
US6341352B1 (en) * 1998-10-15 2002-01-22 International Business Machines Corporation Method for changing a security policy during processing of a transaction request
US6173446B1 (en) 1999-02-02 2001-01-09 Ultimus, Inc. Apparatus for licensing software applications
US6920567B1 (en) 1999-04-07 2005-07-19 Viatech Technologies Inc. System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files
US6889325B1 (en) 1999-04-28 2005-05-03 Unicate Bv Transaction method and system for data networks, like internet
US6697948B1 (en) 1999-05-05 2004-02-24 Michael O. Rabin Methods and apparatus for protecting information
GB2350030B (en) 1999-05-10 2001-06-13 3Com Corp Network mamagement apparatus and method
US6959291B1 (en) 1999-05-19 2005-10-25 International Business Machines Corporation Management of a concurrent use license in a logically-partitioned computer
US6691229B1 (en) 2000-03-06 2004-02-10 Matsushita Electric Industrial Co., Ltd. Method and apparatus for rendering unauthorized copies of digital content traceable to authorized copies
US6871276B1 (en) * 2000-04-05 2005-03-22 Microsoft Corporation Controlled-content recoverable blinded certificates
US20030018613A1 (en) 2000-07-31 2003-01-23 Engin Oytac Privacy-protecting user tracking and targeted marketing
US6925497B1 (en) 2000-09-26 2005-08-02 Microsoft Corporation Systems and methods for controlling the number of clients that access a server
DE10051864A1 (en) 2000-10-19 2002-04-25 Zahnradfabrik Friedrichshafen Steering system for motor vehicles with calculation of two manipulated regulation deviations to calculate steering wheel momentum
US6889209B1 (en) 2000-11-03 2005-05-03 Shieldip, Inc. Method and apparatus for protecting information and privacy
WO2002054341A1 (en) 2001-01-08 2002-07-11 Stefaan De Schrijver, Incorporated Commersign: systems and methods for secure electronic business transactions
US6658423B1 (en) 2001-01-24 2003-12-02 Google, Inc. Detecting duplicate and near-duplicate files
US6979266B2 (en) 2001-03-30 2005-12-27 Igt Method and apparatus for downloading peripheral code
US7194439B2 (en) 2001-04-30 2007-03-20 International Business Machines Corporation Method and system for correlating job accounting information with software license information
US7110982B2 (en) 2001-08-27 2006-09-19 Dphi Acquisitions, Inc. Secure access method and system
US7346780B2 (en) 2002-04-03 2008-03-18 Microsoft Corporation Integrity ordainment and ascertainment of computer-executable instructions
EP1509830A2 (en) 2002-05-02 2005-03-02 Shieldip, Inc. Method and apparatus for protecting information and privacy
US7287159B2 (en) 2004-04-01 2007-10-23 Shieldip, Inc. Detection and identification methods for software

Also Published As

Publication number Publication date
US20050216760A1 (en) 2005-09-29
US6889209B1 (en) 2005-05-03
EP2110772A2 (en) 2009-10-21
WO2002037245A2 (en) 2002-05-10
CA2426425A1 (en) 2002-05-10
US7747873B2 (en) 2010-06-29
EP1342149A2 (en) 2003-09-10
EP1342149B1 (en) 2009-09-30
ATE444510T1 (en) 2009-10-15
WO2002037245A8 (en) 2003-06-26
CN1592875A (en) 2005-03-09
DE60140075D1 (en) 2009-11-12

Similar Documents

Publication Publication Date Title
WO2002037245A8 (en) Method and apparatus for protecting information and privacy
EP1331818A4 (en) Information processing device, electronic device, information processing method, and medium
ATE555584T1 (en) SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR GUARANTEEING ELECTRONIC TRANSACTIONS
DE60232803D1 (en) VIRUS DETECTION SYSTEM
KR20060006770A (en) Long-term secure digital signatures
DE69834406D1 (en) GENERALIZED USER IDENTIFICATION AND AUTHENTICATION SYSTEM
EP0816968A3 (en) Mechanism for locating objects in a secure fashion
TW200631374A (en) Digital rights management system based on hardware identification
DE60138609D1 (en) INTERACTION WITH A DATA NETWORK USING A TELEPHONE APPARATUS
ATE329426T1 (en) METHOD AND DATA CARRIER FOR REGISTERING USERS OF A PUBLIC KEY INFRASTRUCTURE AND REGISTRATION SYSTEM
HK1113623A1 (en) System and method of accessing keys for secure messaging
EP1243999A3 (en) Method and system for recovering and validating cryptographically signed digital data
CA2479601A1 (en) System and method for transmitting and utilizing attachments
AU2724700A (en) Protecting information in a system
CA2641215A1 (en) Cryptographic co-processor
CN111797430A (en) Data verification method, device, server and storage medium
TW200506719A (en) Security message authentication control instruction
EP1603000A3 (en) Information processor, method, and program for preventing tampering
JP2001331104A5 (en)
JP2006184980A (en) Information distribution system
EP1083529A3 (en) Data storing system, issuing apparatus, data providing apparatus and computer readable medium storing data storing program
DE602004025622D1 (en) ELECTRONIC SIGNALING DEVICE AND METHOD
BR0206703A (en) Method to provide automatically verifiable confidence in a content resolution process, and device (pdr)
HK1043001A1 (en) A method of and apparatus for generating data for charging a user for access over a communications network link
SE9701894L (en) Method and apparatus for computer systems