$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Self-clocking glyph code for encoding dual bit digital values robustly 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06K-007/10
  • G06K-019/06
출원번호 US-0814841 (1991-12-27)
발명자 / 주소
  • Zhang Xiao B. (Foster City CA)
출원인 / 주소
  • Xerox Corporation (Stamford CT 02)
인용정보 피인용 횟수 : 212  인용 특허 : 0

초록

A self-clocking glyph code is provided for encoding dual bit digital values in the cardinal rotations (0°, 90°, 180°and 270°) of a logically ordered sequence of wedge-shaped glyphs that are written, printed, or otherwise recorded on a hardcopy recording medium in accordance with a predetermined spat

대표청구항

A self-clocking glyph code for transferring dual bit digital values from a hardcopy recording to an electronic document processing system, said code comprising a logically ordered sequence of wedge-shaped glyphs written on said recording medium in accordance with a predetermined spatial formatting r

이 특허를 인용한 특허 (212)

  1. Chepaitis, Andrew J., Alphanumeric font.
  2. Chepaitis,Andrew J., Alphanumeric font.
  3. Jackson Warren B. ; Biegelsen David K. ; Jared David A. ; Stearns Richard G., Analog glyph detector and detector arrays.
  4. Harttig, Herbert; List, Hans; Roesicke, Bernd; Kocherscheidt, Gerrit; Thoes, Bruno; Asfour, Jean-Michel, Analyte disposable means and device for reading information.
  5. Ericson,Petter, Apparatus and methods relating to image coding.
  6. Ericson,Petter, Apparatus and methods relating to image coding.
  7. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  8. Rhoads Geoffrey B., Audio steganography.
  9. Rhoads, Geoffrey B., Audio steganography.
  10. Rhoads, Geoffrey B., Audio watermarking to convey auxiliary control information, and media embodying same.
  11. Rhoads,Geoffrey B., Audio watermarking to convey auxiliary information, and media embodying same.
  12. Rhoads, Geoffrey B., Audio with hidden in-band digital data.
  13. Carr, J. Scott; Perry, Burt W., Authenticating objects using embedded data.
  14. Perry, Burt W., Authentication watermarks for printed objects and related applications.
  15. Cass Todd A. (San Francisco CA) Marimont David H. (Palo Alto CA), Binary glyph codes based on color relationships.
  16. Lopresti Daniel P. ; Esakov Jeffrey ; Zhou Jiangying, Clock free two-dimensional barcode and method for printing and reading the same.
  17. Kanev, Kamen; Kimura, Shigeo, Clustering-scheme-encoded interfaces providing orientation feedback.
  18. Ericson, Petter; Bryborn, Mattias, Coding and decoding methods and apparatuses.
  19. Pettersson,Mats Petter; Ericson,Petter, Coding pattern.
  20. Pettersson, Mats Petter; Edso, Tomas, Coding pattern and apparatus and method for determining a value of at least one mark of a coding pattern.
  21. Pettersson,Mats Petter; Edso,Tomas, Coding pattern and apparatus and method for determining data values in the coding pattern.
  22. Pettersson,Mats Petter; Edso,Tomas, Coding pattern comprising a plurality of marks.
  23. Rubin, Kim T.; Blei, Keith; Haggis, John R., Compact matrix code and one-touch device and method for code reading.
  24. Rubin, Kim T.; Blei, Keith; Haggis, John R., Compact matrix code and one-touch device and method for code reading.
  25. Rhoads Geoffrey B., Computer system linked by using information in data objects.
  26. Rhoads, Geoffrey, Computer system linked by using information in data objects.
  27. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  28. Geoffrey B. Rhoads, Consumer audio appliance responsive to watermark data.
  29. Rhoads,Geoffrey B.; Gustafson,Ammon E., Data encoding using frail watermarks.
  30. Baiera,Steven M., Data glyph format.
  31. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark proxy.
  32. Cass Todd A. ; Tong Xin, Decoding data from patterned color modulated image regions in a color image.
  33. Rhoads, Geoffrey B., Detecting embedded signals in media content using coincidence metrics.
  34. Reed, Alastair M.; Brundage, Trent J.; Cattone, Jeremy, Detecting information hidden out-of-phase in color channels.
  35. Geoffrey B. Rhoads ; Ravi K. Sharma, Determining transformations of media signals with embedded code signals.
  36. Powell, Robert D.; Nitzberg, Mark, Determining whether two or more creative works correspond.
  37. Lynggaard, Stefan; Pettersson, Mats Petter, Devices method and computer program for position determination.
  38. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  39. Kanev, Kamen; Kimura, Shigeo, Digital information carrier.
  40. Rhoads, Geoffrey B., Digital watermark decoding method.
  41. Rhoads, Geoffrey B.; Sharma, Ravi K., Digital watermark screening and detection strategies.
  42. Ridl, Ray; Kocmick, David J., Display screen with icon.
  43. Haug, Ingrid, Display screen with icon set.
  44. Hecht David L. ; Petrie Glen W., Distributed dimensional labeling for dimensional characterization of embedded data blocks.
  45. Hilton, David; Tan, Weichao; Wells, Peter, Document printed with graphical symbols which encode information.
  46. Bloomberg Dan S., Embedding encoded information in an iconic version of a text image.
  47. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  48. Geoffrey B. Rhoads, Emulsion film media employing steganography.
  49. Rhoads, Geoffrey B., Emulsion products and imagery employing steganography.
  50. Chang Kenneth H. P., Encoding and decoding a message within an image.
  51. Chang, Kenneth H. P., Encoding and decoding a message within an image.
  52. Rhoads, Geoffrey B., Encoding and decoding media signals.
  53. Chang, Kenneth H. P., Encoding and recording a message within an image.
  54. Cass Todd A. ; Tong Xin, Encoding data in color images using patterned color modulated image regions.
  55. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  56. Meyer, Joel R.; Rhoads, Geoffrey B., Establishing and interacting with on-line media collections using identifiers in media signals.
  57. Rao, John; Bernstein, Jeffrey, Glyph encryption system and related methods.
  58. Byström, Tomas; Lynn, Dean; Jordan, Andy; Chase, Thomas; Vadher, Satyan, Hard copy protection and confirmation method.
  59. Powell, Robert D.; Nitzberg, Mark, Hiding codes in input data.
  60. Powell,Robert D.; Nitzberg,Mark, Hiding codes in input data.
  61. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  62. Reed,Alastair M., Hiding information to reduce or offset perceptible artifacts.
  63. Rhoads Geoffrey B., Identification/authentication system using robust, distributed coding.
  64. Powell, Robert D.; Nitzberg, Mark J., Image capture and marking.
  65. Powell, Robert D.; Nitzberg, Mark J., Image marking with pixel modification.
  66. Matsumoto, Kentaro; Uchio, Hirokazu, Image processing apparatus, method and recording medium therefor.
  67. Katoh Mitsutaka,JPX ; Ohmae Kouichi,JPX ; Sonoda Shinya,JPX ; Yanagida Masahito,JPX ; Senga Masanori,JPX, Image processing device and method for indentifying an input image, and copier scanner and printer including same.
  68. Miyazaki Mitsuhiro,JPX ; Usuda Hiroshi,JPX ; Kobayashi Motohiro,JPX, Information input method and apparatus using a target pattern and an access indication pattern.
  69. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  70. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  71. Reed, Alastair M.; Bradley, Brett A., Low visibility watermarks using an out-of-phase color.
  72. Hecht David L., Machine-readable record with a two-dimensional lattice of synchronization code interleaved with data code.
  73. Das Gupta, Mithun; Xiao, Jing, Mapping based message encoding for fast reliable visible watermarking.
  74. Rhoads, Geoffrey B., Method and apparatus for discerning image distortion by reference to encoded marker signals.
  75. Daly Scott J., Method and apparatus for hiding one image or pattern within another.
  76. Ta,Thanh; Lao,Guillermo; Wang,Xin; Raley,Michael C.; Gilliam,Charles P.; Ham,Manuel; Tadayon,Bijan, Method and apparatus for processing usage rights expressions.
  77. Olsson, Andreas; Petterson, Mats Petter, Method and device for data decoding.
  78. Olsson,Andreas; Pettersson,Mats Petter, Method and device for data decoding.
  79. Geoffrey B. Rhoads, Method and system for encoding image and audio content.
  80. Rhoads, Geoffrey B., Method and system for preventing reproduction of professional photographs.
  81. Fåhraeus, Christer; Lynggaard, Stefan; Burström, Stefan, Method for compressing a digital representation containing a page-describing code, which is sent from a computer to a printer.
  82. Daly Scott J. ; Squilla John R. ; Denber Michel ; Honsinger Chris W. ; Hamilton John, Method for embedding digital information in an image.
  83. Bulan, Orhan; Monga, Vishal; Sharma, Gaurav, Method for encoding and decoding data in a color barcode pattern.
  84. Bulan, Orhan; Monga, Vishal; Sharma, Gaurav, Method for encoding and decoding data in a color barcode pattern.
  85. Robert D. Powell ; Mark J. Nitzberg, Method for encoding auxiliary data within a source signal.
  86. Powell Robert D. ; Nitzberg Mark J., Method for image encoding.
  87. Mazaika, Paul K., Method for invisible embedded data using yellow glyphs.
  88. Ma Yue ; Kanai Junichi, Method for locating and reading a two-dimensional barcode.
  89. Ma, Yue, Method for locating and reading a two-dimensional barcode.
  90. Sahlberg, Björn; Fransson, Björn; Gustavsson, Johan; Sandström, Martin; Åström, Roger; Andersson, Jan B.; Ericson, Petter; Åsbrink, Danevert, Method for making a product.
  91. Rhoads,Geoffrey B., Method for monitoring internet dissemination of image, video and/or audio files.
  92. Ragnet, Francois; Moore, John A.; Saubat, Nicolas Raphaël; Cheminot, Eric H.; Lehoux, Thierry, Method for one-step document categorization and separation using stamped machine recognizable patterns.
  93. Yim, Raymond; Orlik, Philip; Brinkman, Dirk, Method for physically marking objects using continuous functions.
  94. Yue Ma ; Junichi Kanai, Method for reading a two-dimensional barcode.
  95. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  96. Weinstock Julian, Method of marking objects with code symbols.
  97. Rich, Travis; Lippman, Andrew, Methods and apparatus for encoded textures.
  98. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  99. Rhoads, Geoffrey B., Methods and arrangements for composing information-carrying artwork.
  100. Campbell, Richard John, Methods and systems for identifying digital image characteristics.
  101. Campbell, Richard John; Speigle, Jon M., Methods and systems for identifying digital image characteristics.
  102. Rhoads, Geoffrey B., Methods and systems for marking printed documents.
  103. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  104. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  105. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  106. Rhoads Geoffrey B., Methods for controlling systems using control signals embedded in empirical data.
  107. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  108. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  109. Rhoads, Geoffrey B., Methods for encoding security documents.
  110. Geoffrey B. Rhoads, Methods for hiding in-band digital data in images and video.
  111. Rhoads, Geoffrey B., Methods for marking images.
  112. Rhoads,Geoffrey B., Methods for marking images.
  113. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  114. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  115. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  116. Rhoads,Geoffrey B., Methods for monitoring audio and images on the internet.
  117. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  118. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  119. Rhoads, Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  120. Rhoads, Geoffrey B., Methods of producing security documents having digitally encoded data and documents employing same.
  121. Björklund, Andreas; Edsö, Tomas, Methods, apparatus, computer program and storage medium for position decoding.
  122. Lynggaard, Stefan, On-demand printing of coding patterns.
  123. Bloomberg Dan S., Performing document image management tasks using an iconic image having embedded encoded information.
  124. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  125. Chang,Kenneth H. P., Print user interface system and its applications.
  126. Ericson, Petter; Lundström, Tomas, Processing of documents.
  127. Pettersson, Mats Petter; Edso, Tomas, Product provided with a coding pattern and apparatus and method for reading the pattern.
  128. Pettersson, Mats Petter; Edso, Tomas, Product provided with a coding pattern and apparatus and method for reading the pattern.
  129. Pettersson, Mats Petter; Edso, Tomas, Product provided with a coding pattern and apparatus and method for reading the pattern.
  130. Powell,Robert D.; Nitzberg,Mark, Protecting images with image markings.
  131. Raley, Michael C.; Gilliam, Charles P.; Ham, Manual; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  132. Raley, Michael; Gilliam, Charles P.; Ham, Manuel; Lao, Guillermo; Tadayon, Bijan, Rights expression profile system and method using templates.
  133. Bradley, Brett A., Self-orienting watermarks.
  134. Bradley,Brett A., Self-orienting watermarks.
  135. Rhoads Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  136. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  137. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  138. Rhoads, Geoffrey B., Steganographic encoding and decoding of auxiliary codes in media signals.
  139. Rhoads Geoffrey B., Steganographic methods and media for photography.
  140. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  141. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  142. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  143. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  144. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  145. Geoffrey B. Rhoads, Steganographically encoding a first image in accordance with a second image.
  146. Sawaguchi Takashi,JPX, Stereo code.
  147. Evans, Douglas B.; Conwell, William Y., Substituting information based on watermark-enable linking.
  148. Evans,Douglas B.; Conwell,William Y., Substituting objects based on steganographic encoding.
  149. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in media objects based on steganographic encoding.
  150. Jancke, Gavin, System and method for encoding high density geometric symbol set.
  151. Goldberg, David; Rucklidge, William J.; Thornton, James D., System and method for generating a signed hardcopy document and authentication thereof.
  152. Tredoux, Gavan Leonard, System and method for optimizing data recovery for a partially destroyed document.
  153. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  154. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  155. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  156. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  157. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  158. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  159. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  160. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  161. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  162. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  163. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  164. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  165. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  166. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  167. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  168. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  169. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  170. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  171. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  172. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  173. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  174. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  175. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  176. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  177. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  178. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  179. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  180. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  181. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  182. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  183. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  184. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  185. Austera, John T.; Joseph, Abner D.; Riggles, Randall; Harttig, Herbert; List, Hans; Roesicke, Bernd; Kocherscheidt, Gerrit; Thoes, Bruno; Ashour, Jean-Michel, Test element coding apparatuses, systems and methods.
  186. Hecht David L. ; Petrie Glen W., Tilings of mono-code and dual-code embedded data pattern strips for robust asynchronous capture.
  187. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  188. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  189. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  190. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  191. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  192. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  193. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  194. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  195. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  196. Kramer Alicia Hungerford ; Hanley Deborah Ann ; Thomas Michael Robert ; Wade Geraldine, Type font.
  197. Reyes,August de los; Martinez,Michael A.; Nguyen,Vu Van; Hasbrook,Harmony D.; Baerwalde,L. Regina Volpi, Type font.
  198. Belelie, Jennifer L.; Chretien, Michelle N.; Chopra, Naveen; Keoshkerian, Barkev, Ultra-violet curable gellant inks for tactile and regular print applications for signature and document authentication.
  199. Stearns, Richard G.; Petrie, W. Glen; Flores, L. Noah; Hecht, David L.; Jared, David A., Use of correlation histograms for improved glyph decoding.
  200. Antognini Thomas Charles ; Antognini Walter Gerald, Variable formatting of digital data into a pattern.
  201. Antognini Thomas Charles ; Antognini Walter Gerard, Variable formatting of digital data into a pattern.
  202. Antognini, Thomas Charles; Antognini, Walter Gerard, Variable formatting of digital data into a pattern.
  203. Geoffrey B. Rhoads, Video copy-control with plural embedded signals.
  204. Rhoads Geoffrey B., Video steganography.
  205. Rhoads,Geoffrey B., Video steganography.
  206. Barker,Brian C.; Bunkofske,Raymond J.; Colt, Jr.,John Z.; Hartswick,Perry G.; Lewis,John W.; Pascoe,Nancy T., Wafer identification mark.
  207. Barker,Brian; Bunkofske,Raymond; Colt,John; Hartswick,Perry; Lewis,John; Pascoe,Nancy, Wafer identification mark.
  208. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
  209. Rhoads, Geoffrey B., Watermark embedder and reader.
  210. Rhoads, Geoffrey B.; Gustafson, Ammon E., Watermark embedder and reader.
  211. Geoffrey B. Rhoads, Watermark encoding method exploiting biases inherent in original signal.
  212. Rhoads, Geoffrey B., Watermarking methods and media.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로