$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Electronic document verification system and method

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0306447 (1994-09-19)
발명자 / 주소
  • Houser Peter B. (Poway CA) Adler James M. (Ocean Beach CA)
출원인 / 주소
  • Scientific-Atlanta (Norcross GA 02)
인용정보 피인용 횟수 : 661  인용 특허 : 0

초록

The integrity or the signator of an electronic document can be verified by embedding a security object, for example, supported by an object linking and embedding (OLE) capability, in the electronic document at a location selected by the signator. The embedded security object includes security inform

대표청구항

An apparatus for embedding select information in an electronic document, comprising: an information assembler, responsive to a user\s request, for assembling said select information into a predetermined format; and an object embedder for embedding said select information and information for invoking

이 특허를 인용한 특허 (661)

  1. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  2. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  3. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  4. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  5. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  6. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  7. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  8. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  9. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  10. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  11. Obata,Kenji C; Meyerzon,Dmitriy, Adaptive web crawling using a statistical model.
  12. Turbin, Pavel; Fialkin, Yuri, Anti-virus trusted files database.
  13. Waldin Ray ; Nachenberg Carey, Antivirus accelerator for computer networks.
  14. Lablans, Peter, Apparatus and methods to display a modified image.
  15. Rhoads, Geoffrey B., Apparatus and methods to process video or audio.
  16. Saito, Makoto, Apparatus for data copyright management system.
  17. Narin, Attila; DeMello, Marco A.; Yaacovi, Yoram; Alger, Jeffrey A.; Keely, Leroy B.; Silver, David Michael; Madonna, Christopher Robert Richard; Beezer, John; Hughes, Kathryn E., Architecture for an electronic shopping service integratable with a software application.
  18. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  19. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  20. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  21. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  22. Davis, Bruce L.; Rhoads, Geoffrey B.; Conwell, William Y., Associating metadata with media signals, and searching for media signals using metadata.
  23. Rhoads, Geoffrey B.; Rodriguez, Tony F.; McKinley, Tyler J.; Miller, Marc D.; Hierholzer, Kirstin, Associating objects with corresponding behaviors.
  24. Delgosha, Farshid; Fekri, Faramarz, Asymmetric cryptosystem employing paraunitary matrices.
  25. Rhoads, Geoffrey B., Audio monitoring using steganographic information.
  26. Rhoads Geoffrey B., Audio steganography.
  27. Rhoads, Geoffrey B., Audio steganography.
  28. Rhoads, Geoffrey B., Audio with hidden in-band digital data.
  29. Wu, Ju; Dong, Yan; Shet, Prashantha Ramachandra; Cheng, Patrick Yee Cheuk, Augmenting a report with metadata for export to a non-report document.
  30. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D.; Wood, Jr., Lowell L., Authenticatable displayed content.
  31. Bishop, Fred; Domenica, Danielle R.; Mendivil, Vicki R.; Villalobos, Hermes H., Authenticating electronic content.
  32. Bishop, Fred; Domenica, Danielle R.; Mendivil, Vicki R.; Villalobos, Hermes H., Authenticating electronic content.
  33. Luo,Chenghui; Zhao,Jian, Authenticating executable code and executions thereof.
  34. Carr, J. Scott; Perry, Burt W., Authenticating objects using embedded data.
  35. Durst, David I.; Kaish, Norman; Fraser, Jay, Authentication method and system.
  36. Durst, David I.; Kaish, Norman; Fraser, Jay, Authentication method and system.
  37. Durst, David I.; Kaish, Norman; Fraser, Jay; Hoffberg, Michael; Rodricks, Brian, Authentication method and system.
  38. Durst,David I.; Kaish,Norman; Fraser,Jay, Authentication method and system.
  39. Durst,David I.; Kaish,Norman; Fraser,Jay; Hoffberg,Michael; Rodricks,Brian, Authentication method and system.
  40. Fraser, Jay, Authentication method and system.
  41. Fraser, Jay, Authentication method and system.
  42. Fraser, Jay; Weber, Larry, Authentication method and system.
  43. Fraser, Jay; Weber, Larry, Authentication method and system.
  44. Fraser, Jay; Weber, Lawrence, Authentication method and system.
  45. Mizrah, Len L., Authentication method of random partial digitized path recognition with a challenge built into the path.
  46. Perry, Burt W., Authentication watermarks for printed objects and related applications.
  47. Foygel, Dan A.; Lemkin, Jason M.; Zwelling, Jeffrey M., Automatic document exchange and execution management.
  48. Foygel, Dan A.; Lemkin, Jason M.; Zwelling, Jeffrey M., Automatic document exchange with archiving capability.
  49. Foygel, Dan A.; Lemkin, Jason M.; Zwelling, Jeffrey M., Automatic document exchange with document searching capability.
  50. Rhoads, Geoffrey B., Background watermark processing.
  51. Tomita, Hiroshi, Barcode and decreased-resolution reproduction of a document image.
  52. Tomita, Hiroshi, Barcode for two-way verification of a document.
  53. Hein, III, William C.; McKinley, Tyler J., Batch identifier registration and embedding in media signals.
  54. Lu, Larry L., Calendar overlays.
  55. Lu, Larry L., Calendar overlays.
  56. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  57. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  58. Petriuc, Mihai, Click distance determination.
  59. Bleicher, Paul A.; Stamos, Nicholas; Klofft, Jeffrey P.; Dale, Richard M., Clinical trial data management system and method.
  60. Ming, Wei; Tomita, Hiroshi, Color barcode producing method and apparatus, color barcode reading method and apparatus and color barcode reproducing method and apparatus.
  61. Ming, Wei, Color barcode producing, reading and/or reproducing method and apparatus.
  62. Ming, Wei, Color barcode producing, reading and/or reproducing method and apparatus.
  63. Ming, Wei, Color barcode producing, reading and/or reproducing method and apparatus.
  64. Massand, Deepak, Comparing the content between corresponding cells of two tables separate from form and structure.
  65. Massand, Deepak, Comparing the content of tables containing merged or split cells.
  66. Millard John, Computer file integrity verification.
  67. Tomkow, Terrance A., Computer implemented system and method for authenticating a sender of electronic data to a recipient.
  68. Drake Christopher Nathan,AUX, Computer software authentication, protection, and security system.
  69. Rhoads Geoffrey B., Computer system linked by using information in data objects.
  70. Rhoads, Geoffrey, Computer system linked by using information in data objects.
  71. Rhoads, Geoffrey B., Computer system linked by using information in data objects.
  72. Bell Lewis, Computerized verification form processing system and method.
  73. Johnson, Thomas V., Computing device communication with replay protection.
  74. Walker Jay S. ; Lech Robert R. ; Van Luchene Andrew S. ; Sparico Thomas M. ; Jorasch James A. ; Schneier Bruce, Conditional purchase offer management system for event tickets.
  75. Geoffrey B. Rhoads, Consumer audio appliance responsive to watermark data.
  76. Hannigan, Brett T.; McKinley, Tyler J., Content identification and electronic tickets, coupons and credits.
  77. Hannigan, Brett T.; McKinley, Tyler J., Content identification and electronic tickets, coupons and credits.
  78. Levy, Kenneth L., Content identification and management in content distribution networks.
  79. Rhoads, Geoffrey B., Content identification through deriving identifiers from video, images and audio.
  80. Levy, Kenneth L.; Stager, Reed R.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Content sensitive connected content.
  81. Ishibashi,Yoshihito; Oishi,Tateo; Asano,Tomoyuki; Osawa,Yoshitomo, Contents processing system.
  82. Cohen, Alexander J.; Cohen, B. Isaac; Harlow, Ed; Leuthardt, Eric C.; Levien, Royce A.; Malamud, Mark A., Contextual information encoded in a formed expression.
  83. Cohen, Alexander J.; Cohen, B. Isaac; Harlow, Ed; Leuthardt, Eric C.; Levien, Royce A.; Malamud, Mark A., Contextual information encoded in a formed expression.
  84. Rhoads, Geoffrey B.; Levy, Kenneth L.; McKinley, Tyler J., Control signals in streaming audio or video indicating a watermark.
  85. Brown, John Carl; Russell, Larry Arnise, Controlled transmissions across packet networks.
  86. Saito, Makoto, Controlling database copyrights.
  87. Saito, Makoto, Controlling database copyrights.
  88. Saito, Makoto, Controlling database copyrights.
  89. Rhoads, Geoffrey B., Controlling use of audio or image content.
  90. Rhoads, Geoffrey B., Controlling use of audio or image content.
  91. Carlson, Gerard J.; Skurdal, Vincent C., Copy protecting documents.
  92. Ikegawa,Yoshiharu, Copying apparatus, method of controlling the same, and program for implementing the method.
  93. Saito, Makoto, Data copyright management.
  94. Saito, Makoto, Data copyright management.
  95. Saito, Makoto, Data copyright management system.
  96. Saito,Makoto, Data copyright management system.
  97. Rhoads,Geoffrey B.; Gustafson,Ammon E., Data encoding using frail watermarks.
  98. Smeets,Ben, Data integrity mechanisms for static and dynamic data.
  99. Saito, Makoto, Data management.
  100. Saito, Makoto, Data management system.
  101. Saito, Makoto, Data management system.
  102. Saito, Makoto, Data management system.
  103. Saito, Makoto, Data management system.
  104. Moskowitz, Scott A., Data protection method and device.
  105. Moskowitz, Scott A., Data protection method and device.
  106. Moskowitz, Scott A., Data protection method and device.
  107. Moskowitz, Scott A., Data protection method and device.
  108. Lambert, Howard Shelton; Orchard, James Ronald Lewis, Data transfer across a network.
  109. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark or derived identifier proxy.
  110. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark proxy.
  111. Kawamae,Osamu; Takeuchi,Toshifumi; Yoshiura,Hiroshi; Arai,Takao, Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefor.
  112. Kawamae,Osamu; Takeuchi,Toshifumi; Yoshiura,Hiroshi; Arai,Takao, Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefor.
  113. Osamu Kawamae JP; Toshifumi Takeuchi JP; Hiroshi Yoshiura JP; Takao Arai JP, Data transmission method for embedded data, data transmitting and reproducing apparatuses and information recording medium therefor.
  114. Ramos, Daniel O.; Jones, Kevin C.; Rhoads, Geoffrey B., Decoding a watermark and processing in response thereto.
  115. Cohen, Alexander J.; Cohen, B. Isaac; Harlow, Ed; Leuthardt, Eric C.; Levien, Royce A.; Malamud, Mark A., Decoding digital information included in a hand-formed expression.
  116. Levy, Kenneth L.; Rhoads, Geoffrey B., Deriving attributes from images, audio or video to obtain metadata.
  117. Rhoads, Geoffrey B., Deriving identifying data from video and audio.
  118. Sallam,Ahmed, Detecting computer worms as they arrive at local computers through open network shares.
  119. Reed, Alastair M.; Brundage, Trent J.; Cattone, Jeremy, Detecting information hidden out-of-phase in color channels.
  120. Tankovich, Vladimir; Meyerzon, Dmitriy; Poznanski, Victor, Detection of junk in search result ranking.
  121. Safadi, Reem, Detection of suspect software objects and signatures after failed authentication.
  122. Geoffrey B. Rhoads ; Ravi K. Sharma, Determining transformations of media signals with embedded code signals.
  123. Johan P. M. G. Linnartz NL; Maurice J. J. J-B. Maes NL; Antonius A. C. M. Kalker NL; Geert F. G. Depovere NL; Peter M. J. Rongen NL; Christianus W. F. Vriens NL; Marten E. Van Dijk NL, Device for optically scanning a record carrier.
  124. Rodriguez,Tony F.; Calhoon,Sean; Rhoads,Geoffrey B.; Carr,J. Scott, Digital asset management, targeted searching and desktop searching using digital watermarks.
  125. Rhoads, Geoffrey B., Digital authentication with analog documents.
  126. Jian Zhao, Digital authentication with digital and analog documents.
  127. Ohmura, Akira, Digital camera capable of embedding an electronic watermark into image data.
  128. Nakajima,Yasumasa; Mogami,Kazuto, Digital camera, and system for detecting falsification of an image.
  129. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  130. Saito, Makoto, Digital content management system and apparatus.
  131. Saito, Makoto, Digital content management system and apparatus.
  132. Saito, Makoto, Digital content management system and apparatus.
  133. Rhoads,Geoffrey B., Digital watermark and steganographic decoding.
  134. Rhoads, Geoffrey B., Digital watermark decoding method.
  135. Rhoads,Geoffrey B., Digital watermark embedding and decoding using encryption keys.
  136. Taguchi, Jun'ichi; Yoshiura, Hiroshi; Echizen, Isao; Maeda, Akira; Arai, Takao; Takeuchi, Toshifumi, Digital watermark image processing method.
  137. Rhoads, Geoffrey B.; Sharma, Ravi K., Digital watermark screening and detection strategies.
  138. Alattar,Adnan M.; Levy,Kenneth L.; Stager,Reed R.; Rhoads,Geoffrey B.; Ellingson,Eric E., Digital watermarking and fingerprinting including synchronization, layering, version control, and compressed embedding.
  139. Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  140. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Digital watermarking to resolve multiple claims of ownership.
  141. Jonathan Clark, Distributed execution software license server.
  142. Han, Shocky; Ku, Pon Chun, Document authentication using electronic signature.
  143. Tankovich, Vladimir; Meyerzon, Dmitriy; Taylor, Michael James, Document length as a static relevance feature for ranking search results.
  144. Hirose, Takashi, Document management system.
  145. Mizuno, Takafumi, Document verification apparatus and method.
  146. Sallam,Ahmed, Duplicating handles of target processes without having debug privileges.
  147. Geoffrey, Mohammed Alawi, Electronic certification and authentication system.
  148. Peach,Nicholas Anthony John, Electronic contracts.
  149. Yoshihiro,Takuji, Electronic data management system and method.
  150. Adachi, Masaharu, Electronic document having authentication function.
  151. Fukuzaki Yasuhiro,JPX, Electronic document security system, affixed electronic seal security system and electronic signature security system.
  152. Geidl,Erik M.; Dain,Robert A.; Karlov,Donald D., Electronic ink as a software object.
  153. Taku Shiono JP, Electronic mail apparatus and computer readable record medium having electronic mail program recorded thereon.
  154. Landrock,Peter, Electronic negotiable documents.
  155. Dryer,Joseph Ernest, Electronic signature management method.
  156. Dietl,Josef, Electronic signatures.
  157. Dietl, Josef, Electronic signing apparatus and methods.
  158. Dietl, Josef, Electronic signing apparatus and methods.
  159. Pelly, Jason Charles; Keating, Stephen Mark, Embedding data in material.
  160. Rhoads,Geoffrey B., Embedding hidden auxiliary code signals in media.
  161. Geoffrey B. Rhoads, Emulsion film media employing steganography.
  162. Rhoads, Geoffrey B., Emulsion products and imagery employing steganography.
  163. Suominen, Edwin A, Encryption and authentication systems and methods.
  164. Suominen, Edwin A., Encryption and authentication systems and methods.
  165. Suominen, Edwin A., Encryption and authentication systems and methods.
  166. Suominen,Edwin A., Encryption and authentication systems and methods.
  167. Michel M. Ranger CA; Paul C. Van Oorschot CA, Encryption and decryption system and method with content analysis provision.
  168. Detrick, Mark Steven; Fetkovich, John Edward; Wilhelm, Jr., George William, Encryption/decryption of stored data using non-accessible, unique encryption key.
  169. Detrick,Mark Steven; Fetkovich,John Edward; Wilhelm, Jr.,George William, Encryption/decryption of stored data using non-accessible, unique encryption key.
  170. Meyerzon, Dmitriy; Shnitko, Yauhen; Burges, Chris J. C.; Taylor, Michael James, Enterprise relevancy ranking using a neural network.
  171. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  172. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  173. Meyer, Joel R.; Rhoads, Geoffrey B., Establishing and interacting with on-line media collections using identifiers in media signals.
  174. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  175. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  176. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  177. Robertson, Stephen; Zaragoza, Hugo; Taylor, Michael; Larimore, Stefan Isbein; Petriuc, Mihai, Field weighting in text searching.
  178. Bhaskaran Vasudev ; Ratnakar Viresh, Fragile watermarks for detecting tampering in images.
  179. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  180. Rhoads,Geoffrey B.; Lofgren,Neil E.; Patterson,Philip R., Geographic information systems using digital watermarks.
  181. Silverbrook, Kia; Lapstun, Paul, Handheld security document scanner.
  182. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D.; Wood, Jr., Lowell L., Handling masquerading elements.
  183. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D.; Wood, Jr., Lowell L., Handling masquerading elements.
  184. Rhoads, Geoffrey B., Hiding encrypted messages in information carriers.
  185. Reed,Alastair M., Hiding information to reduce or offset perceptible artifacts.
  186. Rhoads Geoffrey B., Identification/authentication system using robust, distributed coding.
  187. Watkins, Robert G.; Wick, Andrew L., Identifying unauthorized communication systems based on their memory contents.
  188. Watkins, Robert G.; Wick, Andrew L., Identifying unauthorized communication systems based on their memory contents.
  189. Watkins,Robert G., Identifying unauthorized communication systems using a system-specific identifier.
  190. Rhoads, Geoffrey B., Image capture device with steganographic data embedding.
  191. Narayanaswami,Chandrasekhar; Kirkpatrick,Edward Scott, Image capturing system and method for automatically watermarking recorded parameters for providing digital image verification.
  192. Suzuki, Tadaomi; Adachi, Shintaro; Kita, Hiromi; Kimura, Tsutomu; Furuyama, Takeshi; Yamada, Kenji; Kanda, Masakatsu; Hayashi, Hiroshi; Hanaoka, Shinji, Image forming apparatus, image forming system, computer readable recording medium, and image forming method.
  193. Nakajima, Kouki, Image forming system and image forming apparatus.
  194. Ohta, Takatoshi; Arai, Ryuichi; Ohta, Munehiko; Sugiura, Hiroaki; Nakazawa, Toshihiro; Yamazaki, Takeshi, Image processing apparatus, method, and medium for adding identification information.
  195. Rhoads Geoffrey B., Image steganography system featuring perceptually adaptive and globally scalable signal embedding.
  196. Cohen, Alexander J.; Cohen, B. Isaac; Harlow, Ed; Leuthardt, Eric C.; Levien, Royce A.; Malamud, Mark A., Including contextual information with a formed expression.
  197. Cohen, Alexander J.; Cohen, B. Isaac; Harlow, Ed; Leuthardt, Eric C.; Levien, Royce A.; Malamud, Mark A., Including environmental information in a manual expression.
  198. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  199. Oostveen,Job Cornelis; Kalker,Antonius Adrianus Cornelis Maria, Increasing integrity of watermarks using robust features.
  200. Usami, Yoshinori; Yoda, Akira, Information embedding method, apparatus and recording medium.
  201. Cohen, Alexander J.; Cohen, B. Isaac; Harlow, Ed; Leuthardt, Eric C.; Levien, Royce A.; Malamud, Mark A., Information encoded in an expression.
  202. Hayashi, Junichi, Information processing apparatus and its control method, computer program and storage medium.
  203. Hayashi,Junichi, Information processing apparatus and its control method, computer program, and storage medium.
  204. Felsher, David Paul, Information record infrastructure, system and method.
  205. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  206. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  207. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  208. Barr, John Kennedy; Bradley, Brett A.; Hannigan, Brett T.; Alattar, Adnan M.; Durst, Robert, Layered security in digital watermarking.
  209. Bradley, Brett A.; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  210. Sallam, Ahmed S., Lightweight hooking mechanism for kernel level operations.
  211. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  212. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  213. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  214. Reed, Alastair M.; Bradley, Brett A., Low visibility watermarks using an out-of-phase color.
  215. Lamplough, Jeremy, Management of physical security credentials at a multi-function device.
  216. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  217. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  218. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  219. Malik, Nadeem; Pearsall, Katherine June, Managing icon integrity.
  220. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  221. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  222. Fausse, Arnaud, Message authentication device.
  223. Dengler, Patrick M.; Krishnan, Arvind K.; Singh, Jagdish; Sanchez, Lawrence M.; Shankar, Sai; Chittamuru, Satish Kumar; Pekic, Zoltan; Mondal, Nabarun; Kumar, Namendra; i Dalfó, Ricard Roma, Metadata driven user interface.
  224. Villadsen, Peter; Chen, Zhaoqi; Gottumukkala, Ramakanthachary S.; Calderon, Marcos, Metadata-based eventing supporting operations on data.
  225. Salzmann, Lee; Mincone, Joseph; Mincone, John; Hollinger, Andre J., Method & system for managing and preparing documentation for real estate transactions.
  226. Wallace, Colleen; Friman, Harry; Chou, Gee Kin; Devin, Beth; Chapman, Janet, Method and apparatus for a new accounts program.
  227. Iverson, Vaughn Scott; Richardson, John Whitley, Method and apparatus for authenticating information.
  228. Shabbir A. Khan ; Saeed A. Rajput ; Basit Hussain, Method and apparatus for binding electronic impressions made by digital identities to documents.
  229. Westerman, Larry; Davis, Thomas, Method and apparatus for determining the identity of a digital printer from its output.
  230. Rhoads, Geoffrey B., Method and apparatus for discerning image distortion by reference to encoded marker signals.
  231. Barton James M., Method and apparatus for embedding authentication information within digital data.
  232. Barton James M., Method and apparatus for embedding authentication information within digital data.
  233. Barton James M., Method and apparatus for embedding authentication information within digital data.
  234. Barton James M., Method and apparatus for embedding authentication information within digital data.
  235. Barton James M., Method and apparatus for embedding authentication information within digital data.
  236. Barton, James M., Method and apparatus for embedding authentication information within digital data.
  237. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Method and apparatus for embedding data, including watermarks, in human perceptible images.
  238. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin ; Boney Laurence,FRX, Method and apparatus for embedding data, including watermarks, in human perceptible sounds.
  239. Garst Blaine ; Serlet Bertrand, Method and apparatus for enforcing software licenses.
  240. Bender Walter ; Morimoto Norishige,JPX ; Gruhl Daniel, Method and apparatus for logo hiding in images.
  241. Wallace, Colleen; Friman, Harry; Chou, Gee Kin; Devin, Beth; Chapman, Janet, Method and apparatus for new accounts program.
  242. Saito, Makoto, Method and apparatus for protecting digital data by double re-encryption.
  243. Wu, Jiankang; Sun, Qibin; Deng, Huijie Robert, Method and apparatus for protecting the legitimacy of an article.
  244. Lloyd, James Steven; Boeyen, Sharon M.; Vandergeest, Ronald J., Method and apparatus for providing access isolation of requested security related information from a security related information source.
  245. Lewis, David Otto; Remfert, Jeffrey Earl, Method and apparatus for providing cellular telephone service using an authenticating cellular telephone device.
  246. Kiliccote, Han, Method and apparatus for providing secure document distribution.
  247. Kiliccote, Han, Method and apparatus for providing secure document distribution.
  248. Kiliccote,Han, Method and apparatus for providing secure document distribution.
  249. Kiliccote,Han, Method and apparatus for providing secure document distribution.
  250. Lewis, David Otto; Remfert, Jeffrey Earl, Method and apparatus for providing television services using an authenticating television receiver device.
  251. Rhoads Geoffrey B., Method and apparatus for robust information coding.
  252. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Method and apparatus for scene-based video watermarking.
  253. Silverbrook, Kia; Lapstun, Paul, Method and apparatus for security document tracking.
  254. Labaton, Isaac J, Method and apparatus for the secure authentication of a web site.
  255. Labaton, Isaac J, Method and apparatus for the secure identification of the owner of a portable device.
  256. Labaton, Isaac J., Method and apparatus for the secure identification of the owner of a portable device.
  257. Seshadri, Harish; Ruane, Noel, Method and apparatus for trusted branded email.
  258. Seshadri,Harish; Ruane,Noel, Method and apparatus for trusted branded email.
  259. Lewis, David Otto; Remfert, Jeffrey Earl, Method and apparatus for uniquely and authoritatively identifying tangible objects.
  260. Lewis,David Otto; Remfert,Jeffrey Earl, Method and apparatus for uniquely and authoritatively identifying tangible objects.
  261. Fischer Addison M., Method and apparatus for validating travelling object-oriented programs with digital signatures.
  262. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Method and apparatus for video watermarking using perceptual masks.
  263. Vorbr��ggen,Jan C.; Kubbilun,Wolfgang; Koch,Eckhard; Kubbilun,Ingo A.; Bickenbach,Hans Joachim; Belke,Marcus, Method and device for confirming the authenticity of a document and a safe for storing data.
  264. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  265. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  266. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  267. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  268. Meyer,Bernd; Lang,J��rgen, Method and device for the generation of checkable forgery-proof documents.
  269. Robert T. Durst, Jr. ; Kevin D. Hunter, Method and system for accessing electronic resources via machine-readable data on intelligent documents.
  270. Atkinson, Robert G.; Williams, Antony S.; Wittenberg, Craig H.; Koppolu, Srinivasa R.; Hodges, C. Douglas, Method and system for caching presentation data.
  271. Nanette Brown ; Victor Girardi ; Paul A. Kovlakas, Method and system for capturing destination addresses from label data.
  272. TeSelle, John, Method and system for composing a digital signature graphic appearance and specifying a document display location thereof.
  273. Nance, Kara L.; Henley, J. Douglas, Method and system for controlling access to software features in an electronic device.
  274. Le Pennec,Jean Francois; Hericourt,Olivier, Method and system for controlling and filtering files using a virus-free certificate.
  275. Kiliccote, Han, Method and system for creating and using barcodes.
  276. Kiliccote, Han, Method and system for creating and using barcodes.
  277. Kiliccote, Han, Method and system for creating and using barcodes.
  278. Kiliccote, Han, Method and system for creating and using redundant and high capacity barcodes.
  279. Moskowitz Scott A. ; Cooperman Marc, Method and system for digital watermarking.
  280. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  281. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  282. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  283. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  284. Moskowitz,Scott A.; Cooperman,Marc, Method and system for digital watermarking.
  285. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  286. Yoshiura, Hiroshi; Echizen, Isao; Taguchi, Junichi; Maeda, Akira; Arai, Takao; Takeuchi, Toshifumi, Method and system for embedding information into contents.
  287. Geoffrey B. Rhoads, Method and system for encoding image and audio content.
  288. Weaver, III,J. Dewey; Leech,Douglas K., Method and system for encrypting and storing content to a user.
  289. Le Pennec,Jean Fran챌ois; Hericourt,Olivier; Fieschi,Jacques, Method and system for generating and using a virus free file certificate integrated within a file.
  290. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined condition for usage.
  291. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  292. Benson, Greg; Urich, Gregory H.; Knauft, Christopher L., Method and system for managing a data object so as to comply with predetermined conditions for usage.
  293. Salzmann, Lee; Mincone, John V.; Mincone, Joseph; Hollinger, Andre, Method and system for managing and preparing documentation for real estate transactions.
  294. Salzmann, Lee; Mincone, John V.; Mincone, Joseph; Hollinger, Andre, Method and system for managing and preparing documentation for real estate transactions.
  295. Salzmann, Lee; Mincone, John V.; Mincone, Joseph; Hollinger, Andre, Method and system for managing and preparing documentation for real estate transactions.
  296. Salzmann, Lee; Mincone, Joseph; Mincone, John; Hollinger, Andre J., Method and system for managing and preparing documentation for real estate transactions.
  297. Rhoads,Geoffrey B., Method and system for managing, accessing and paying for the use of copyrighted electronic media.
  298. Bratsanos,James S.; Clemens,Daniel J.; Girardi,Victor; Rolling,Patrick, Method and system for modifying print stream data to allow printing over a single I/O port.
  299. Rhoads, Geoffrey B., Method and system for preventing reproduction of professional photographs.
  300. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  301. Shaath, Kamel, Method and system for providing restricted access to a storage medium.
  302. Rosenberg,Greg, Method and system for signing and authenticating electronic documents.
  303. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  304. David Feinstein ; Victor Girardi ; Allen L. Kramer, Method and system of displaying database contents in envelope data fields.
  305. Kramer Allen L., Method and system of printing postage indicia from an envelope design application.
  306. Kramer, Allen L., Method and system of printing postage indicia from an envelope design application.
  307. Schull,Jonathan, Method for adapting a software product to an environment.
  308. DeMello,Marco A.; Narin,Attila; Yaacovi,Yoram, Method for authenticating and securing integrated bookstore entries.
  309. Schull,Jonathan, Method for causing a digital product to revert to a demo mode.
  310. Immonen, Olli, Method for checking the integrity of data, system and mobile terminal.
  311. Immonen, Olli, Method for checking the integrity of data, system and mobile terminal.
  312. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  313. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  314. Cvetkovic, Slobodan; Alasia, Thomas C.; Alasia, Alfred J., Method for constructing a composite image incorporating a hidden authentication image.
  315. Saito, Makoto, Method for controlling database copyrights.
  316. Saito,Makoto, Method for controlling database copyrights.
  317. Saito,Makoto, Method for controlling database copyrights.
  318. Ramos, Daniel O.; MacIntosh, Brian T.; Rhoads, Geoffrey B., Method for enhancing content using persistent content identification.
  319. Silverbrook,Kia; Lapstun,Paul, Method for identifying a counterfeit security document.
  320. Rhoads,Geoffrey B., Method for monitoring internet dissemination of image, video and/or audio files.
  321. Lang,J?rgen; Meyer,Bernd, Method for producing and checking forge-proof documents.
  322. Schull,Jonathan, Method for selling, protecting, and redistributing digital goods.
  323. Moskowitz Scott A. ; Cooperman Marc, Method for stega-cipher protection of computer code.
  324. Coley, Christopher D.; Wesinger, Ralph E., Method for synchronous encryption between a client and a licensing agent.
  325. Gardner David P. ; Pierce Jeffrey D., Method for utilizing the postal service address as an object in an object oriented environment.
  326. Dresevic Bodin ; Chinn Donald D. ; Hitchcock Gregory C., Method for validating a signed program prior to execution time or an unsigned program at execution time.
  327. Schull,Jonathan, Method of altering a software product in response to predetermined events.
  328. Silverstein,D. Amnon, Method of and system for edge watermarking of an image.
  329. Silverbrook,Kia; Lapstun,Paul, Method of authenticating security documents.
  330. Massand, Deepak, Method of compound document comparison.
  331. Massand, Deepak, Method of compound document comparison.
  332. Silverbrook, Kia; Lapstun, Paul, Method of counting currency.
  333. Silverbrook,Kia; Lapstun,Paul, Method of identifying a copied security document.
  334. Silverbrook, Kia; Lapstun, Paul, Method of printing security documents.
  335. Srinivasan, Venugopal; Topchy, Alexander, Methods and apparatus for identifying media.
  336. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  337. Roever, Stefan; Collins, Kevin; Ding, Josh C.; Clark, Alex F.; Bruce, James, Methods and apparatus for title protocol, authentication, and sharing.
  338. Roever, Stefan; Collins, Kevin; Ding, Josh C.; Clark, Alex F.; Bruce, James, Methods and apparatus for title structure and management.
  339. Roever, Stefan; Collins, Kevin; Ding, Josh C.; Clark, Alex F.; Bruce, James, Methods and apparatus for title structure and management.
  340. Rhoads, Geoffrey B., Methods and apparatus to process imagery or audio content.
  341. Rhoads, Geoffrey B., Methods and apparatus to process video and audio media.
  342. Rhoads, Geoffrey B., Methods and arrangements employing digital content items.
  343. Rhoads, Geoffrey B.; Rodriguez, Tony F., Methods and devices employing content identifiers.
  344. Rhoads, Geoffrey B., Methods and devices responsive to ambient audio.
  345. Rhoads, Geoffrey B., Methods and systems employing digital content.
  346. Merchant,Raj; Taylor,Brandon V.; Cupala,Shiraz J.; Barac,Dragos, Methods and systems for creating document schema.
  347. Taylor, Brandon V.; Saliba, Hani; Merchant, Raj; Jones, Brian M., Methods and systems for incorporating meta-data in document content.
  348. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  349. Taylor, Brandon V.; Jones, Brian M.; Saliba, Hani; Johnson, Jeffrey J.; Antonoff, Lauren N.; Christiansen, Michael B.; Merchant, Raj; Sinofsky, Steven J., Methods and systems for providing a customized user interface for viewing and editing meta-data.
  350. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  351. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  352. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  353. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  354. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  355. Rhoads Geoffrey B., Methods for controlling systems using control signals embedded in empirical data.
  356. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  357. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for determining contents of media.
  358. Rhoads, Geoffrey B., Methods for encoding security documents.
  359. Geoffrey B. Rhoads, Methods for hiding in-band digital data in images and video.
  360. Rhoads, Geoffrey B.; Hein, III, William C.; Levy, Kenneth L., Methods for linking from objects to remote resources.
  361. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  362. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  363. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  364. Rhoads,Geoffrey B., Methods for monitoring audio and images on the internet.
  365. Seder, Phillip Andrew; Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Methods for opening file on computer via optical sensing.
  366. Rhoads,Geoffrey B., Methods for steganographic encoding media.
  367. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  368. Rhoads, Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  369. Roever, Stefan; Collins, Kevin; Ding, Josh C.; Clark, Alex F.; Bruce, James, Methods of facilitating merchant transactions using a computerized system including a set of titles.
  370. Roever, Stefan; Collins, Kevin; Ding, Josh C.; Clark, Alex F.; Bruce, James, Methods of facilitating merchant transactions using a computerized system including a set of titles.
  371. Rhoads, Geoffrey B.; Conwell, William Y., Methods of interacting with audio and ambient music.
  372. Rhoads, Geoffrey B., Methods of producing security documents having digitally encoded data and documents employing same.
  373. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  374. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  375. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  376. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  377. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  378. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  379. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  380. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  381. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  382. Sallam, Ahmed, Monitoring and controlling services.
  383. Rhoads,Geoffrey B., Monitoring of video or audio based on in-band and out-of-band data.
  384. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  385. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  386. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  387. Ali, Alnur; Kim, Hyong Guk; Malek, Alexander, Natural visualization and routing of digital signatures.
  388. Victor Girardi ; Michael Kelley ; Paul A. Kovlakas, OLE automation server for manipulation of mail piece data.
  389. Melkote, Anuradha Narasimhaswamy; Porcari, Damian; Slank, Kelly Anne, On-line invention disclosure system.
  390. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  391. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  392. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  393. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  394. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  395. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  396. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  397. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  398. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  399. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  400. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  401. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  402. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  403. McKinley, Tyler J.; Hein, III, William C.; Rodriguez, Tony F.; Reed, Alastair M.; Rhoads, Geoffrey B., Parallel processing of digital watermarking operations.
  404. Davis Derek L., Peripheral device preventing post-scan modification.
  405. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  406. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  407. Silverbrook, Kia; Lapstun, Paul, Printing currency documents.
  408. Ohsone, Atsuo, Printing management system, printing management method, and program.
  409. Rhoads, Geoffrey B., Processing data representing video and audio and methods and apparatus related thereto.
  410. Rhoads,Geoffrey B., Providing reports associated with video and audio content.
  411. Obata, Kenji; Meyerzon, Dmitriy, Proxy server using a statistical model.
  412. Meyerzon, Dmitriy; Zaragoza, Hugo, Ranking search results using biased click distance.
  413. Meyerzon, Dmitriy; Li, Hang, Ranking search results using feature extraction.
  414. Meyerzon, Dmitriy; Zaragoza, Hugo, Ranking search results using language types.
  415. Poznanski, Victor; Wang, Oivind; Holm, Fredrik; Bodd, Nicolai; Tankovich, Vladimir; Meyerzon, Dmitriy, Re-ranking search results.
  416. Sallam, Ahmed, Regulating remote registry access over a computer network.
  417. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  418. Hiroyuki Kimura JP; Takao Arai JP; Toshifumi Takeuchi JP, Reproducing method and apparatus, for a video signal having copy control information.
  419. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  420. Roever, Stefan; Watson, David, Rights based system.
  421. Roever, Stefan; Watson, David, Rights-based system.
  422. Sallam, Ahmed, Robustly regulating access to executable class registry entries.
  423. Hein, III, William C., Routing networks for use with content linking systems.
  424. Hein, III, William C., Routing networks for use with content linking systems.
  425. Hein, III,William C., Routing networks for use with content linking systems.
  426. Hein, III, William C., Routing networks for use with watermark systems.
  427. Hartmann,Al, Scan-on-read.
  428. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D.; Wood, Jr., Lowell L., Screening for masquerading content.
  429. Tankovich, Vladimir; Li, Hang; Meyerzon, Dmitriy; Xu, Jun, Search results ranking using editing distance and document information.
  430. Toh, Eng Whatt; Teo, Kok Hoon, Secure and reliable document delivery using routing lists.
  431. Pinchen, Stephen Paul; Rasmussen, Jens Jacob Juul, Secure barcode.
  432. Zhao Jian ; Koch Eckhard,DEX ; Saito Makoto,JPX, Secure distribution of digital representations.
  433. Nguyen, Julien T., Secure graphical objects in web documents.
  434. Suominen, Edwin A., Secure messaging with disposable keys.
  435. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  436. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  437. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  438. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  439. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  440. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  441. Schwartz, Jonathan D.; Perlin, Eric C.; Hong, James H.; Scallen, Stephen F.; Iskin, Sermet, Secure privilege elevation by way of secure desktop on computing device.
  442. Dietl, Josef, Securing documents with electronic signatures.
  443. Rhoads,Geoffrey B., Securing media content with steganographic encoding.
  444. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  445. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  446. Schneider,Walter, Security element.
  447. Bradley, Brett A., Self-orienting watermarks.
  448. Bradley,Brett A., Self-orienting watermarks.
  449. Goldman, Oliver, Self-signing electronic documents.
  450. Goldman,Oliver, Self-signing electronic documents.
  451. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  452. Wheeler, Henry Lynn; Wheeler, Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  453. DeMello,Marco A.; Narin,Attila; Madonna,Christopher Robert Richard, Server controlled branding of client software deployed over computer networks.
  454. Rhoads Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  455. Rhoads, Geoffrey B., Signal processing to hide plural-bit information in image, video, and audio data.
  456. Toh,Eng Whatt; Sim,Peng Toh, Simplified addressing for private communications.
  457. Bhattacharjya,Anoop K.; Bhaskaran,Vasudev, Smart copying for variable cost, editable printouts.
  458. Goldman, Oliver; Chou, Michael; Bansod, Aditya, Software installation package with digital signatures.
  459. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  460. Collins, Kevin; Haven, Richard C.; Kintzer, Eric; Olsen, Jeremy; Roever, Stefan; Thrasher, Shannon; Leano, Rhandee; OKelley, Brian, Software, systems, and methods for processing digital bearer instruments.
  461. Collins, Kevin; Haven, Richard; Kintzer, Eric; Olsen, Jeremy; Roever, Stefan; Thrasher, Shannon; Leano, Rhandee; O'Kelly, Brian, Software, systems, and methods for processing digital bearer instruments.
  462. Carr, J. Scott; Lofgren, Neil E.; Seder, Phillip Andrew, Steganographic encoding methods and apparatus.
  463. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  464. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  465. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  466. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  467. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  468. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  469. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  470. Rhoads Geoffrey B., Steganographic methods and media for photography.
  471. Rhoads Geoffrey B., Steganographic system.
  472. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  473. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  474. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  475. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  476. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  477. Rhoads, Geoffrey B.; Levy, Kenneth L.; McKinley, Tyler J., Steganographically encoded video, deriving or calculating identifiers from video, and related methods.
  478. Geoffrey B. Rhoads, Steganographically encoding a first image in accordance with a second image.
  479. Togawa, Yoshifusa; Miyamoto, Takayuki; Ando, Kuriko, Storage device having function for coping with computer virus.
  480. Evans, Douglas B.; Conwell, William Y., Substituting information based on watermark-enable linking.
  481. Evans,Douglas B.; Conwell,William Y., Substituting objects based on steganographic encoding.
  482. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in media objects based on steganographic encoding.
  483. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Synchronizing rendering of multimedia content.
  484. Glazer, Elliott; White, Dirk; Armes, David; Bishop, Fred Alan; Barrett, Michael, System and method for authenticating a web page.
  485. Glazer,Elliott; White,Dirk; Armes,David; Bishop,Fred Alan; Barrett,Michael, System and method for authenticating a web page.
  486. Walker Jay S. ; Tedesco Daniel E. ; Jorasch James A., System and method for controlling access to a venue using alterable tickets.
  487. Schull,Jonathan, System and method for controlling access to protected information.
  488. Schull,Jonathan, System and method for creating and running protected information.
  489. Hurmiz,Charles Samuel; Hunsberger,Peter David; Kothapali,Rajani Kala; Zhao,Xingyan, System and method for defining and collecting data in an information management system having a shared database.
  490. Chess, David Michael; Ford, Richard; Kephart, Jeffrey Owen; Swimmer, Morton Gregory, System and method for detecting and repairing document-infecting viruses using dynamic heuristics.
  491. Hoffberg, Steven M., System and method for determining contingent relevance.
  492. Schull, Jonathan, System and method for distributing protected information.
  493. Easttom, II, William Charles, System and method for document tracking.
  494. Brown, Bruce E.; Israelsen, D. Brent, System and method for document-driven processing of digitally-signed electronic documents.
  495. Geoffrey, Mohammed Alawi, System and method for electronic certification and authentication of data.
  496. Daniels, Shawn; Kubon, Petr; Radisavljevic, Goran, System and method for generating agreements.
  497. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  498. Wade, Michael; Nelson, Robert, System and method for indexing electronic discovery data.
  499. Stratigos William N. ; Mann Richard L., System and method for integrating paper-based business documents with computer-readable data entered via a computer network.
  500. Stratigos, William N.; Mann, Richard L., System and method for integrating paper-based business documents with computer-readable data entered via a computer network.
  501. Schull,Jonathan, System and method for operating a licensing server.
  502. Lloyd, Michael; Shepley, Christopher; Stidman, Sean; Browne, H. Lee; Generous, Curtis; Lycas, John, System and method for personalizing electronic mail messages.
  503. Schull,Jonathan, System and method for processing protected audio information.
  504. Schull, Jonathan, System and method for processing protected text information.
  505. Schull,Jonathan, System and method for processing protected video information.
  506. Nagel,Robert H., System and method for production and authentication of original documents.
  507. Nagel,Robert H., System and method for production and authentication of original documents.
  508. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  509. Vasnani, Vinod; Jhingan, Nikhil; Ng, Soo Ying; Sim, HanSeah; Lim, Chee Siang; Lee, Kelvin Wee Ming; Legrand, Mathieu, System and method for providing secure communication between computer systems.
  510. Meyerzon, Dmitriy; Zaragoza, Hugo, System and method for ranking search results using click distance.
  511. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  512. Schull, Jonathan, System and method for redistributing and licensing access to protected information among a plurality of devices.
  513. Merrigan, Chadd Creighton; Peltonen, Kyle G.; Meyerzon, Dmitriy; Lee, David J., System and method for scoping searches using index keys.
  514. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  515. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  516. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  517. Schull, Jonathan, System and method for selectively changing parameter settings based on lineage analysis of digital information.
  518. Schull,Jonathan, System and method for selectively enabling access based on lineage analysis of digital information.
  519. Schull,Jonathan, System and method for selling protected information in an oem context.
  520. Tomkow, Terrance A., System and method for verifying delivery and integrity of electronic messages.
  521. Tomkow, Terrance A., System and method for verifying delivery and integrity of electronic messages.
  522. Tomkow, Terrance A., System and method for verifying delivery and integrity of electronic messages.
  523. Tomkow, Terrance A., System and method for verifying delivery and integrity of electronic messages.
  524. Tomkow, Terrance A., System and method for verifying delivery and integrity of electronic messages.
  525. Tomkow, Terrance A., System and method for verifying delivery and integrity of electronic messages.
  526. Tomkow, Terrance A., System and method for verifying delivery and integrity of electronic messages.
  527. Tomkow, Terrance A., System and method for verifying delivery and integrity of electronic messages.
  528. Tomkow, Terrance A., System and method for verifying delivery and integrity of electronic messages.
  529. Tomkow, Terrance A., System and method for verifying delivery and integrity of electronic messages.
  530. Komura Masahiro,JPX ; Ono Etsuo,JPX ; Kuroda Yasutsugu,JPX ; Torii Satoru,JPX, System and method of authentication of digital information.
  531. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  532. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  533. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  534. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  535. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  536. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  537. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  538. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  539. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  540. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  541. Simpson, Shell S., System for controlled printing of a signature using web-based imaging.
  542. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  543. Stefik, Mark J.; Petrie, Glen W.; Okamoto, Steve A.; Briggs, Nicholas H., System for controlling the distribution and use of rendered digital works through watermarking.
  544. Silverbrook, Kia; Lapstun, Paul, System for identifying counterfeit security document.
  545. Ramos, Daniel O.; MacIntosh, Brian T.; Rhoads, Geoffrey B., System for managing display and retrieval of image content on a network with image identification and linking to network content.
  546. Yossef Tsuria IL; Yishai Sered IL, System for preventing playback of unauthorized digital video recordings.
  547. Hyakutake, Shogo; Ishizuka, Hiroaki; Aoshima, Minoru; Kizawa, Akio; Kitada, Hiroshi, System, computer program product and method for managing documents.
  548. Hyakutake, Shogo; Ishizuka, Hiroaki; Aoshima, Minoru; Kizawa, Akio; Kitada, Hiroshi, System, computer program product and method for managing documents.
  549. Hyakutake,Shogo; Ishizuka,Hiroaki; Aoshima,Minoru; Kizawa,Akio; Kitada,Hiroshi, System, computer program product and method for managing documents.
  550. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C.; Cvetkovic, Slobodan, Systems and methods for authenticating objects using multiple-level image encoding and decoding.
  551. DeVries, Jon T., Systems and methods for independent assessment of image data.
  552. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  553. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  554. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  555. Tomita, Hiroshi, Systems and methods for preserving and maintaining document integrity.
  556. Tomita, Hiroshi, Systems and methods for preserving and maintaining document integrity.
  557. Tomita, Hiroshi, Systems and methods for preserving and maintaining document integrity.
  558. Parry, Travis J., Systems and methods for printing documents containing electronic signatures.
  559. Drucker, Steven J., Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier.
  560. Drucker, Steven J., Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier.
  561. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  562. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  563. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  564. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  565. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  566. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  567. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  568. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  569. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  570. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  571. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  572. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  573. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  574. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  575. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  576. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  577. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  578. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  579. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  580. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  581. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  582. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  583. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  584. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  585. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  586. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  587. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  588. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  589. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  590. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  591. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  592. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  593. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  594. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  595. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  596. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  597. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  598. Sibert,W. Olin, Systems and methods for using cryptography to protect secure and insecure computing environments.
  599. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  600. Spencer, Gregory Reeves, Systems and methods for verifying an electronic documents provenance date.
  601. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  602. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  603. Levy, Kenneth L.; Meyer, Joel R.; Andrews, III, Hoyet Harrison, Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities.
  604. Rhoads, Geoffrey B.; Lofgren, Neil E.; Patterson, Philip R., Systems and methods using identifying data derived or extracted from video, audio or images.
  605. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  606. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  607. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  608. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  609. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining, using and manipulating rights management data structures.
  610. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  611. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  612. Collins, Kevin; Roever, Stefan; Wray, Kevin; Clark, Alex F.; Ginter, Karl, Title materials embedded within media formats and related applications.
  613. Roever, Stefan; Ginter, Karl, Title-enabled networking.
  614. Silverbrook, Kia; Lapstun, Paul, Transaction recordal method.
  615. Silverbrook, Kia; Lapstun, Paul, Transaction recordal system.
  616. Pasieka, Michael S., Transmitting reviews with digital signatures.
  617. Hirata,Shinichi, Transmitting/receiving apparatus and a transmitting/receiving method.
  618. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  619. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  620. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  621. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  622. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  623. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
  624. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  625. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  626. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  627. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  628. Rhoads,Geoffrey B.; Rodriguez,Tony F.; McKinley,Tyler J.; Miller,Marc D.; Hierholzer,Kirstin, User control and activation of watermark enabled objects.
  629. Sallam, Ahmed, Using behavior blocking mobility tokens to facilitate distributed worm detection.
  630. Sallam,Ahmed, Using mobility tokens to observe malicious mobile code.
  631. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  632. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  633. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  634. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  635. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  636. Brown,Bruce E; Brown,Aaron M; Brown, II,Bruce Eric, Variable trust levels for authentication.
  637. Diwan, Arif, Verification of content stored in a network.
  638. Suominen, Edwin A., Verification of signed digital documents.
  639. Suominen, Edwin A., Verification of signed video streams.
  640. Cohen, Alexander J.; Cohen, B. Isaac; Harlow, Ed; Leuthardt, Eric C.; Levien, Royce A.; Malamud, Mark A., Verifying a written expression.
  641. Geoffrey B. Rhoads, Video copy-control with plural embedded signals.
  642. Rhoads Geoffrey B., Video steganography.
  643. Rhoads,Geoffrey B., Video steganography.
  644. Graubart, Richard; Abramowitz, Beth, Voice signature with strong binding.
  645. Echizen, Isao; Yoshiura, Hiroshi; Nakamura, Masafumi; Arai, Takao; Takeuchi, Toshifumi, Water-mark embedding method and system.
  646. Geoffrey B. Rhoads ; Ravi K. Sharma, Watermark detection using a fourier mellin transform.
  647. Rhoads, Geoffrey B., Watermark embedder and reader.
  648. Rhoads, Geoffrey B.; Gustafson, Ammon E., Watermark embedder and reader.
  649. Geoffrey B. Rhoads, Watermark enabled video objects.
  650. Rhoads,Geoffrey B.; Levy,Kenneth L.; McKinley,Tyler J., Watermark encoded video, and related methods.
  651. Geoffrey B. Rhoads, Watermark encoding method exploiting biases inherent in original signal.
  652. Tsuria, Yossef, Watermark system.
  653. Tsuria,Yossef, Watermark system.
  654. Tsuria,Yossef, Watermark system.
  655. Evans, Douglas B.; Conwell, William Y., Watermark-based object linking and embedding.
  656. Rhoads, Geoffrey B., Watermarking methods and media.
  657. Natarajan, Balas K., Watermarking of digital object.
  658. Rhoads, Geoffrey B., Watermarking to convey auxiliary information, and media embodying same.
  659. Ratnakar, Viresh, Watermarking with random zero-mean patches for copyright protection.
  660. Ratnakar, Viresh, Watermarking with random zero-mean patches for printer tracking.
  661. Petrogiannis, Tommy; Laurie, Michael; Leblanc, François; Goudreault-Emond, Benoit, Web-based method and system for applying a legally enforceable signature on an electronic document.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트