$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Convolution filtering for decoding self-clocking glyph shape codes 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06K-007/10
  • G06K-007/14
출원번호 US-0560654 (1990-07-31)
발명자 / 주소
  • Stearns Richard G. (Mountain View CA) Hecht David L. (Palo Alto CA) Bloomberg Dan S. (Palo Alto CA)
출원인 / 주소
  • Xerox Corporation (Stamford CT 02)
인용정보 피인용 횟수 : 232  인용 특허 : 0

초록

Weighted and unweighted convolution filtering processes are provided for decoding bitmap image space representations of self-clocking glyph shape codes and for tracking the number and locations of the ambiquities or “errors”that are encountered during the decoding. This error detection may be linked

대표청구항

A process for decoding a bitmap image space representation of a self-clocking glyph shape code composed of glyphs having shapes that encode digital values, such that every distinct digital value that is encoded by said code is represented by the shape of a respective glyph; said glyphs being selecte

이 특허를 인용한 특허 (232)

  1. Steven M. Hoffberg ; Linda I. Hoffberg-Borghesani, Adaptive pattern recognition based control system and method.
  2. Hoffberg,Linda Irene; Hoffberg,Steven M., Adaptive pattern recognition based controller apparatus and method and human-factored interface therefore.
  3. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  4. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  5. Jackson Warren B. ; Biegelsen David K. ; Jared David A. ; Stearns Richard G., Analog glyph detector and detector arrays.
  6. Butler, Roger David; Doubleday, Alan Gordon; Duggan, Matthew Christian, Anti-tamper using barcode degradation.
  7. Mori,Toshihiro, Apparatus and method for detecting a pattern.
  8. Cohen Nathan ; van de Wetering Edwin,NLX, Apparatus and method for rapidly convergent parallel processed deconvolution.
  9. Ericson,Petter, Apparatus and methods relating to image coding.
  10. Ericson,Petter, Apparatus and methods relating to image coding.
  11. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  12. Rhoads Geoffrey B., Audio steganography.
  13. Rhoads, Geoffrey B., Audio steganography.
  14. Rhoads, Geoffrey B., Audio watermarking to convey auxiliary control information, and media embodying same.
  15. Rhoads,Geoffrey B., Audio watermarking to convey auxiliary information, and media embodying same.
  16. Rhoads, Geoffrey B., Audio with hidden in-band digital data.
  17. Carr, J. Scott; Perry, Burt W., Authenticating objects using embedded data.
  18. Perry, Burt W., Authentication watermarks for printed objects and related applications.
  19. Lopresti Daniel P. ; Esakov Jeffrey ; Zhou Jiangying, Clock free two-dimensional barcode and method for printing and reading the same.
  20. Pettersson,Mats Petter; Edso,Tomas, Coding pattern and apparatus and method for determining data values in the coding pattern.
  21. Rhoads Geoffrey B., Computer system linked by using information in data objects.
  22. Rhoads, Geoffrey, Computer system linked by using information in data objects.
  23. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  24. Geoffrey B. Rhoads, Consumer audio appliance responsive to watermark data.
  25. Zajac, Edward J; Goris, Robert, Cyphometry consisting of ciferglifs, chaotiglyphs and word auras.
  26. Maybaum, William H.; Stewart, Robert L.; Conant, George E., Data encoding and decoding.
  27. Rhoads,Geoffrey B.; Gustafson,Ammon E., Data encoding using frail watermarks.
  28. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark proxy.
  29. Rhoads, Geoffrey B., Decoding steganographic messages embedded in media signals.
  30. Rhoads, Geoffrey B., Detecting embedded signals in media content using coincidence metrics.
  31. Reed, Alastair M.; Brundage, Trent J.; Cattone, Jeremy, Detecting information hidden out-of-phase in color channels.
  32. Geoffrey B. Rhoads ; Ravi K. Sharma, Determining transformations of media signals with embedded code signals.
  33. Powell, Robert D.; Nitzberg, Mark, Determining whether two or more creative works correspond.
  34. Daniel D. Thaxton ; William H. Mowry, Jr., Device for authenticating a security document.
  35. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  36. Rhoads, Geoffrey B., Digital watermark decoding method.
  37. Rhoads, Geoffrey B.; Sharma, Ravi K., Digital watermark screening and detection strategies.
  38. Petrie Glen W., Distributed dimensional labeling for dimensional characterization of border-type embedded data blocks.
  39. Hecht David L. ; Petrie Glen W., Distributed dimensional labeling for dimensional characterization of embedded data blocks.
  40. Yoshioka Kenji,JPX, Dot code and code reading apparatus.
  41. Bloomberg Dan S., Embedding encoded information in an iconic version of a text image.
  42. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  43. Geoffrey B. Rhoads, Emulsion film media employing steganography.
  44. Rhoads, Geoffrey B., Emulsion products and imagery employing steganography.
  45. Chang Kenneth H. P., Encoding and decoding a message within an image.
  46. Chang, Kenneth H. P., Encoding and decoding a message within an image.
  47. Crookham, David M.; Skogg, Nicole S., Encoding and decoding data in an image.
  48. Crookham, David M.; Skogg, Nicole, Encoding and decoding data in an image for social networking communication.
  49. Skogg, Nicole S.; Crookham, David M., Encoding and decoding data into an image using identifiable marks and encoded elements.
  50. Rhoads, Geoffrey B., Encoding and decoding media signals.
  51. Chang, Kenneth H. P., Encoding and recording a message within an image.
  52. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  53. Hoffberg Steven M. ; Hoffberg-Borghesani Linda I., Ergonomic man-machine interface incorporating adaptive pattern recognition based control system.
  54. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda Irene, Ergonomic man-machine interface incorporating adaptive pattern recognition based control system.
  55. Steven M. Hoffberg ; Linda I. Hoffberg-Borghesani, Ergonomic man-machine interface incorporating adaptive pattern recognition based control system.
  56. Meyer, Joel R.; Rhoads, Geoffrey B., Establishing and interacting with on-line media collections using identifiers in media signals.
  57. David L. Hecht, Exclusive or cross-coupled framing codes for self-clocking glyphs.
  58. Rao, John; Bernstein, Jeffrey, Glyph encryption system and related methods.
  59. Powell, Robert D.; Nitzberg, Mark, Hiding codes in input data.
  60. Powell,Robert D.; Nitzberg,Mark, Hiding codes in input data.
  61. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  62. Reed,Alastair M., Hiding information to reduce or offset perceptible artifacts.
  63. Dan S. Bloomberg ; Robert E. Weltman, High frequency masking of embedded digital data to improve appearance.
  64. Crookham, David M.; Jass, Nicole, Identification and purchasing platform.
  65. Rhoads Geoffrey B., Identification/authentication system using robust, distributed coding.
  66. Powell, Robert D.; Nitzberg, Mark J., Image capture and marking.
  67. Powell, Robert D.; Nitzberg, Mark J., Image marking with pixel modification.
  68. Takahashi,Akihiko, Image signal analysis for watermark detection and decoding.
  69. Jennings Carol A. (Etobicoke CAX) Breton Marcel P. (Mississauga CAX) Isabella MaryAnna (Mississauga CAX) Johnson Eric G. (Plant City FL) Martin Trevor I. (Burlington CAX) Oliver John F. (Calgary CAX), Ink compositions with liposomes containing photochromic compounds.
  70. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  71. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  72. Hoffberg, Steven Mark, Intelligent electronic appliance system and method.
  73. Wellner Pierre D.,GBX ; Flynn Michael J.,GBX ; Carter Kathleen A.,GBX ; Newman William M.,GBX, Interactive desktop display system for automatically adjusting pan and zoom functions in response to user adjustment of a feedback image.
  74. Wood, Michael C.; Jedrzejek, Tracey Hope; Freeman, Richard Glenn; Flowers, Mark; Shuler, Eric Thomas; Grunert, Margaret E.; Avery, Jason, Interactive references to related application.
  75. Hecht David L. (Palo Alto CA), Interleaved and interlaced sync codes and address codes for self-clocking glyph codes.
  76. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  77. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  78. Iftime, Gabriel; Moffat, Karen A.; Wosnick, Jordan H.; Rotberg, Eric; Vong, Cuong; Veregin, Richard P. N.; Kazmaier, Peter M., Low melt color toners with fluorescence agents.
  79. Reed, Alastair M.; Bradley, Brett A., Low visibility watermarks using an out-of-phase color.
  80. Iftime, Gabriel; Kazmaier, Peter M.; Smith, Paul F.; Wagner, Christopher A.; Mahabadi, Hadi K.; Norsten, Tyler B., Machine-readable code format.
  81. Iftime,Gariel; Kazmaier,Peter M.; Smith,Paul F.; Wagner,Christopher A.; Odell,Peter G.; Belelie,Jennifer L.; Chopra,Naveen, Machine-readable code format.
  82. Hecht David L., Machine-readable record with a two-dimensional lattice of synchronization code interleaved with data code.
  83. Crookham, David M.; Skogg, Nicole, Marketing campaign platform.
  84. Dymetman, Marc; Copperman, Max, Marking medium area with encoded identifier for producing action through network.
  85. Daniel A. Foucher ; Raj D. Patel CA; Naveen Chopra CA; Peter M. Kazmaier CA, Marking particles.
  86. Daniel A. Foucher ; Raj D. Patel CA; Naveen Chopra CA; Peter M. Kazmaier CA; James Wojtyk CA; Erwin Buncel CA, Marking particles.
  87. Daniel A. Foucher ; Raj D. Patel CA; Naveen Chopra CA; Peter M. Kazmaier CA; James Wojtyk CA; Erwin Buncel CA, Marking particles.
  88. Foucher, Daniel A.; Patel, Raj D.; Chopra, Naveen; Kazmaier, Peter M., Marking particles.
  89. Chen,Liyong; Dang,Yingnong; Ma,Xiaoxu; Wang,Jian; Wang,Qiang, Maze pattern analysis.
  90. Hoffberg, Steven; Hoffberg-Borghesani, Linda, Media recording device with packet data interface.
  91. Rhoads, Geoffrey B., Method and apparatus for discerning image distortion by reference to encoded marker signals.
  92. Daly Scott J., Method and apparatus for hiding one image or pattern within another.
  93. Hecht, David L.; Flores, L. Noah; Petrie, Glen W.; Karlsson, Sven, Method and apparatus for implementing a camera mouse.
  94. Ta,Thanh; Lao,Guillermo; Wang,Xin; Raley,Michael C.; Gilliam,Charles P.; Ham,Manuel; Tadayon,Bijan, Method and apparatus for processing usage rights expressions.
  95. Marggraff, James, Method and device for audibly instructing a user to interact with a function.
  96. Geoffrey B. Rhoads, Method and system for encoding image and audio content.
  97. Marggraff, James; Chisholm, Alexander; Edgecomb, Tracy L., Method and system for implementing a user interface for a device employing written graphical elements.
  98. Rhoads, Geoffrey B., Method and system for preventing reproduction of professional photographs.
  99. Martin Trevor I.,CAX ; Oliver John F.,CAX, Method for embedding and recovering machine-readable information.
  100. Daly Scott J. ; Squilla John R. ; Denber Michel ; Honsinger Chris W. ; Hamilton John, Method for embedding digital information in an image.
  101. Daly Scott J. ; Squilla John R. ; Denber Michel ; Honsinger Chris W. ; Hamilton John, Method for embedding digital information in an image.
  102. Iftime, Gabriel; Kazmaier, Peter M.; Smith, Paul F.; Wagner, Christopher A.; Odell, Peter G.; Belelie, Jennifer L.; Chopra, Naveen, Method for embedding machine-readable information with fluorescent materials.
  103. Robert D. Powell ; Mark J. Nitzberg, Method for encoding auxiliary data within a source signal.
  104. Powell Robert D. ; Nitzberg Mark J., Method for image encoding.
  105. Ma Yue ; Kanai Junichi, Method for locating and reading a two-dimensional barcode.
  106. Ma, Yue, Method for locating and reading a two-dimensional barcode.
  107. Chen,Jindong, Method for maintaining uniform spatial frequency over a dataglyph block.
  108. Rhoads,Geoffrey B., Method for monitoring internet dissemination of image, video and/or audio files.
  109. Ragnet, Francois; Moore, John A.; Saubat, Nicolas Raphaël; Cheminot, Eric H.; Lehoux, Thierry, Method for one-step document categorization and separation using stamped machine recognizable patterns.
  110. Yue Ma ; Junichi Kanai, Method for reading a two-dimensional barcode.
  111. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  112. Brassell Lenox H. (Seattle WA) Pathe Peter D. (Kirkland WA) Kohen Eliyezer (Mercer Island WA), Method of font rendering employing grayscale processing of grid fitted fonts.
  113. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  114. Rhoads, Geoffrey B., Methods and systems for marking printed documents.
  115. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  116. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  117. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  118. Rhoads Geoffrey B., Methods for controlling systems using control signals embedded in empirical data.
  119. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  120. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  121. Rhoads, Geoffrey B., Methods for encoding security documents.
  122. Geoffrey B. Rhoads, Methods for hiding in-band digital data in images and video.
  123. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  124. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  125. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  126. Rhoads,Geoffrey B., Methods for monitoring audio and images on the internet.
  127. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  128. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  129. Rhoads, Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  130. Rhoads, Geoffrey B., Methods of producing security documents having digitally encoded data and documents employing same.
  131. Hoffberg Steven M. ; Hoffberg-Borghesani Linda I., Morphological pattern recognition based controller system.
  132. Chopra,Naveen; Foucher,Daniel A.; Patel,Raj D., Multicolored photochromic display.
  133. Copperman, Max; Dymetman, Marc, Obtaining and using data associating annotating activities with portions of recordings.
  134. Bloomberg Dan S., Performing document image management tasks using an iconic image having embedded encoded information.
  135. Martin Trevor I.,CAX ; Jennings Carol A.,CAX ; Johnson Eric G. ; Oliver John F.,CAX, Photochromic electrostatic toner compositions.
  136. Oliver John F. (Calgary CAX) Martin Trevor I. (Burlington CAX) Jennings Carol A. (Etobicoke CAX) Johnson Eric G. (Plant City FL) Drappel Stephan V. (Toronto CAX), Photochromic hot melt ink compositions.
  137. Stephen L. Shaffer ; John R. Squilla ; John K. McBride, Photocollage generation and modification.
  138. Stephen L. Shaffer ; John R. Squilla ; John K. McBride, Photocollage generation and modification using image recognition.
  139. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  140. Chang,Kenneth H. P., Print user interface system and its applications.
  141. Pettersson, Mats Petter; Edso, Tomas, Product provided with a coding pattern and apparatus and method for reading the pattern.
  142. Pettersson, Mats Petter; Edso, Tomas, Product provided with a coding pattern and apparatus and method for reading the pattern.
  143. Powell,Robert D.; Nitzberg,Mark, Protecting images with image markings.
  144. Hecht David L., Quasi-reprographics with variable embedded data with applications to copyright management, and distribution control.
  145. Hecht,David L.; Lennon,John; Merkle,Ralph, Record and related method for storing encoded information using overt code characteristics to identify covert code characteristics.
  146. Raley, Michael C.; Gilliam, Charles P.; Ham, Manual; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  147. Raley, Michael; Gilliam, Charles P.; Ham, Manuel; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  148. Mowry ; Jr. William H., Security document containing encoded data block.
  149. Bloomberg, Dan S.; Hecht, David L.; Tow, Robert F.; Flores, L. Prasadam, Self-clocking glyph shape codes.
  150. Bradley, Brett A., Self-orienting watermarks.
  151. Bradley,Brett A., Self-orienting watermarks.
  152. Cummings, Eric B.; Even, Jr., William R., Self-registering spread-spectrum barcode method.
  153. Rhoads Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  154. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  155. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  156. Kazmaier, Peter M.; Iftime, Gabriel; Wagner, Christopher A.; Wang, Shen-ge; Eschbach, Reiner, Solid phase change fluorescent ink and ink sets.
  157. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  158. Rhoads Geoffrey B., Steganographic methods and media for photography.
  159. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  160. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  161. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  162. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  163. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  164. Geoffrey B. Rhoads, Steganographically encoding a first image in accordance with a second image.
  165. Evans, Douglas B.; Conwell, William Y., Substituting information based on watermark-enable linking.
  166. Evans,Douglas B.; Conwell,William Y., Substituting objects based on steganographic encoding.
  167. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in media objects based on steganographic encoding.
  168. Hecht, David L., System and method for calibrating a document processing device from a composite document.
  169. Goldberg, David; Rucklidge, William J.; Thornton, James D., System and method for generating a signed hardcopy document and authentication thereof.
  170. Chen, Jindong, System and method for improving an appearance of a raster image comprising glyph shapes.
  171. John R. Squilla ; John K. McBride ; Stephen L. Shaffer, System and method of constructing a photo album.
  172. Squilla John R. ; Shaffer Stephen L. ; McBride John K., System and method of constructing a photo album.
  173. Squilla, John R.; Shaffer, Stephen L.; McBride, John K., System and method of constructing a photo album.
  174. Squilla, John R.; Shaffer, Stephen L.; McBride, John K.; Fitter, Jr., Charles F., System and method of constructing a photo album.
  175. Stephen L. Shaffer ; John K. Mcbride ; John R. Squilla, System and method of constructing a photo album.
  176. Squilla John R. ; Shaffer Stephen L. ; McBride John K., System and method of constructing a photo collage.
  177. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  178. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  179. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  180. Iftime, Gabriel; Kazmaier, Peter M.; Smith, Paul F.; Wagner, Christopher A.; Odell, Peter G.; Belelie, Jennifer L.; Chopra, Naveen, System for embedding machine-readable information with fluorescent materials.
  181. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  182. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  183. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  184. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  185. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  186. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  187. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  188. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  189. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  190. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  191. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  192. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  193. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  194. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  195. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  196. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  197. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  198. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  199. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  200. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  201. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  202. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  203. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  204. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  205. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  206. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  207. Cummings, Eric B.; Even, Jr., William R.; Simmons, Blake A.; Dentinger, Paul Michael, Tamper-indicating barcode and method.
  208. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  209. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  210. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  211. Long, Greg; Harden, Taya; Spiegelman, Michael, Techniques for interactively coupling electronic content with printed media.
  212. Hecht David L. ; Petrie Glen W., Tilings of mono-code and dual-code embedded data pattern strips for robust asynchronous capture.
  213. Kazmaier, Peter M.; Iftime, Gabriel; Vanbesien, Daryl W.; Zwartz, Edward G.; Wang, Shen-ge; Eschbach, Reiner, Toners with fluorescence agent and toner sets including the toners.
  214. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  215. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  216. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  217. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  218. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  219. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  220. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  221. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  222. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  223. Mizoguchi, Satoshi, Two-dimensional code.
  224. Geoffrey B. Rhoads, Video copy-control with plural embedded signals.
  225. Rhoads Geoffrey B., Video steganography.
  226. Rhoads,Geoffrey B., Video steganography.
  227. Beardsley Paul, Vision-enabled vending machine.
  228. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
  229. Rhoads, Geoffrey B., Watermark embedder and reader.
  230. Rhoads, Geoffrey B.; Gustafson, Ammon E., Watermark embedder and reader.
  231. Geoffrey B. Rhoads, Watermark encoding method exploiting biases inherent in original signal.
  232. Rhoads, Geoffrey B., Watermarking methods and media.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로