$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and apparatus for secure document timestamping 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
출원번호 US-0622034 (1996-03-21)
발명자 / 주소
  • Walker Jay S.
  • Schneier Bruce
  • Jorasch James A.
출원인 / 주소
  • Walker Asset Management Limited Partnership
대리인 / 주소
    Fitzpatrick, Cella, Harper & Scinto
인용정보 피인용 횟수 : 199  인용 특허 : 16

초록

The invention relates devices and methods for creating a cryptographically assured timestamp that can be verified by a party that was not present during the creation of the timestamp. The timestamp is applied to physical documents, and other substrates capable of receiving an optically detectable ma

대표청구항

[ What is claimed is:] [61.] A device for secure document timestamping, comprising:a time generator for transmitting a representation of a time;a computing device, including a computer processor and a memory, the memory storing a device identification, the computer processor and the memory coupled t

이 특허에 인용된 특허 (16)

  1. Daniele Joseph J. (Pittsford NY), Data handling and archiving system.
  2. Anderson Richard J. (Morristown NJ) Goodman Bruce J. (Livingston NJ) Riggio Robert T. (Staten Island NY) Kopolovics Solomon (Brooklyn NY) Hernandez Lisa C. (New York NY) Chen Chengkuo (Somerset NJ) R, Data-locking system.
  3. Blandford Robert R. (1809 Paul Spring Rd. Alexandria VA 22307), Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents.
  4. Friedman Gary L. (Encino CA), Digital camera with apparatus for authentication of images produced from an image file.
  5. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Digital document time-stamping with catenate certificate.
  6. Merkle Ralph C. (Sunnyvale CA) Bloomberg Dan S. (Palo Alto CA) Brown John S. (San Francisco CA), Document copy authentication.
  7. Durst Robert T. (83 Harwich Rd. Fairfield CT 06430) Hunter Kevin D. (440 Allwyndale Dr. Stratford CT 06497), Electronic notary.
  8. Bellman ; Jr. Alfred H. (Germantown MD) Fowler Mark A. (Leesburg VA) Christ Stewart H. (Herndon VA), Electronic surveillance system.
  9. Ehrat Kurt (Zurich CH), Method and apparatus for preparing and assessing payment documents.
  10. Hill Brian R. (Los Angeles CA), Method and apparatus for recording sensor data.
  11. Hill Brian R. (Los Angeles CA), Method and apparatus for recording sensor data.
  12. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Method for secure time-stamping of digital documents.
  13. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Method for secure time-stamping of digital documents.
  14. Blandford Robert R. (1809 Paul Spring Rd. Alexandria VA 22307), Personal computer diary.
  15. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public/key date-time notary facility.
  16. Doeberl Terrence M. (West Redding CT) Taylor Michael P. (Norwalk CT), System for printing value indicia with diagrammatic data representation.

이 특허를 인용한 특허 (199)

  1. Feldbau Ofra,ILX ; Feldbau Michael,ILX, Apparatus and method for authenticating the dispatch and contents of documents.
  2. Kocher Paul C., Apparatus and method for confirming, timestamping, and archiving printer and telecopier transmissions.
  3. Currans, Kevin G., Assured printing of documents of value.
  4. Benson Glenn,DEX, Computer system for protecting software and a method for protecting software.
  5. Rouse, John D.; Delaney, Raymond P., Confidence-based authentication.
  6. Ma, Jiyong; Thompson, Stephen Michael; Amtrup, Jan W., Content-based detection and three dimensional geometric reconstruction of objects in image and video data.
  7. Moskowitz, Scott A., Data protection method and device.
  8. Moskowitz, Scott A., Data protection method and device.
  9. Moskowitz, Scott A., Data protection method and device.
  10. Moskowitz, Scott A., Data protection method and device.
  11. Dalton, Christopher I., Demonstrating integrity of a compartment of a compartmented operating system.
  12. Macciola, Anthony; Ma, Jiyong; Shustorovich, Alexander; Thrasher, Christopher; Amtrup, Jan W., Determining distance between an object and a capture device based on captured image data.
  13. Keronen, Seppo Reino; Demetriou, Stamatios, Device and method for authenticating and certifying printed documents.
  14. Borrowman,Colin D., Digital file management and imaging system and method including secure file marking.
  15. Wickes, William C., Digital imaging device with image authentication capability.
  16. Yeung,Mike; Shahindoust,Amir, Document audit trail system and method.
  17. Chamberlain,Charles R., Electronic postmarking without directly utilizing an electronic postmark server.
  18. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  19. Burke,James, Fax confirmation device.
  20. Thompson, Stephen Michael; Amtrup, Jan W.; Macciola, Anthony, Global geographic information retrieval, validation, and normalization.
  21. Faris, Sadeg M.; Hamlin, Gregory; Flannery, James P., Global synchronization unit (GSU) for time and space (TS) stamping of input data elements.
  22. Ebrahimi, Armin, Identity management service using a blockchain providing identity transactions between devices.
  23. Felsher, David Paul, Information record infrastructure, system and method.
  24. Feller, Todd Stacy Leo, Initiating operating system commands based on browser cookies.
  25. Thrasher, Christopher W.; Shustorovich, Alexander; Thompson, Stephen Michael; Amtrup, Jan W.; Macciola, Anthony, Iterative recognition-guided thresholding and data extraction.
  26. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  27. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  28. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for authenticating a document.
  29. Walker, Jay S.; Jorasch, James A.; Packes, Jr., John M.; Tedesco, Robert C., Method and apparatus for outputting a result of a game via a container.
  30. Walker, Jay S.; Jorasch, James A.; Packes, Jr., John M.; Tedesco, Robert C., Method and apparatus for outputting a result of a game via a container.
  31. Walker, Jay S.; Jorasch, James A.; Packes, Jr., John M.; Tedesco, Robert C., Method and apparatus for outputting a result of a game via a container.
  32. Walker, Jay S.; Jorasch, James A.; Packes, Jr., John M.; Tedesco, Robert C., Method and apparatus for outputting a result of a game via a container.
  33. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for secure document timestamping.
  34. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for secure measurement certification.
  35. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for secure measurement certification.
  36. Labaton, Isaac J, Method and apparatus for the secure authentication of a web site.
  37. Labaton, Isaac J., Method and apparatus for the secure authentication of a web-site.
  38. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for verifying secure document timestamping.
  39. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for verifying secure document timestamping.
  40. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for verifying secure document timestamping.
  41. Walker, Jay S.; Schneier, Bruce; Jorasch, James A.; Alderucci, Dean P., Method and apparatus for verifying secure document timestamping.
  42. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  43. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  44. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  45. Bunn, Michael George, Method and system for cryptographically authenticating a printed document by a trusted party.
  46. Mikhail,Grinshetyn; Chang,Matthias E.; Wong,Hok Yee; Chao,Anthony; Graham,Mark, Method and system for data capture with hidden applets.
  47. Miller,Lawrence; Deans,William; Moore,Mike, Method and system for delayed cookie transmission in a client-server architecture.
  48. Teppler, Steven W., Method and system for determining and maintaining trust in digital data files with certifiable time.
  49. Teppler, Steven W., Method and system for determining and maintaining trust in digital image files with certifiable time.
  50. Miller,Lawrence; Deans,William; Moore,Mike, Method and system for determining receipt of a delayed cookie in a client-server architecture.
  51. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  52. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  53. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  54. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  55. O'Leary, Denis; D'Agostino, Vincent; Re, S. Richard; Burney, Jessica; Hoffman, Adam, Method and system for processing internet payments.
  56. Couillard,Bruno, Method and system for securely timestamping digital data.
  57. Hwang, L. James, Method and system for time-stamping and managing electronic documents.
  58. Pockrandt, Wolfgang, Method for authorization checking and configuration for carrying out the method.
  59. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  60. Narayanan,Lakshmi, Method for controlled and audited access to privileged accounts on computer systems.
  61. Tervo,Vesa, Method for verifying time data, a system and a terminal.
  62. Buck, Robert D., Method, apparatus and article for off-line certification in mobile applications.
  63. Buck, Robert D., Method, apparatus and article for off-line certification in mobile applications.
  64. Buck,Robert D., Method, apparatus and article for off-line certification in mobile applications.
  65. Walker, Jay S.; Mik, Magdalena; Kobayashi, Michiko; Sammon, Russell Pratt; Golden, Andrew P.; Gelman, Geoffrey M.; Mayfield, Terry E., Methods and apparatus for increasing and/or for monitoring a party's compliance with a schedule for taking medicines.
  66. Walker, Jay S.; Mik, Magdalena; Kobayashi, Michiko; Sammon, Russell Pratt; Golden, Andrew P.; Gelman, Geoffrey M.; Mayfield, Terry E., Methods and apparatus for increasing and/or for monitoring a party's compliance with a schedule for taking medicines.
  67. Walker, Jay S.; Mik, Magdalena; Kobayashi, Michiko; Sammon, Russell Pratt; Golden, Andrew P.; Gelman, Geoffrey M.; Mayfield, Terry E., Methods and apparatus for increasing and/or monitoring a party's compliance with a schedule for taking medicines.
  68. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  69. Bowie Britton,Simon, Methods and systems for managing successful completion of a network of processes.
  70. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  71. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  72. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  73. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  74. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  75. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  76. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  77. Ji, Lusheng; Chang, Hisao; Miller, II, Robert R., Methods, systems, and products for measuring health.
  78. Ji, Lusheng; Miller, II, Robert R.; Worstell, Harry R., Methods, systems, and products for measuring health.
  79. Shustorovich, Alexander; Thrasher, Christopher W.; Ma, Jiyong; Macciola, Anthony; Amtrup, Jan W., Mobile document detection and orientation based on reference object characteristics.
  80. Hoffberg, Steven M., Multifactorial optimization system and method.
  81. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  82. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  83. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  84. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  85. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  86. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  87. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  88. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  89. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  90. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  91. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  92. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  93. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  94. Gullo, John F.; Wilkerson, Wayne A.; Gordon, Roy R.; Lord, Dan, PC postage™ service indicia design for shipping label.
  95. Gullo, John F.; Wilkerson, Wayne A.; Gordon, Roy R.; Lord, Dan, PC postage™ service indicia design for shipping label.
  96. Teppler, Steven W., Personal computer system and methods for proving dates in digital data files.
  97. Benson, Glenn Stuart; Calaceto, Joseph R.; Logar, Russell M., Portable security transaction protocol.
  98. Salomaki Ari,FIX, Scrambling of digital media objects in connection with transmission and storage.
  99. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  100. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  101. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  102. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  103. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  104. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  105. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  106. Currans, Kevin G., Serialized original print.
  107. Teppler, Steven W., Smart card system and methods for proving dates in digital files.
  108. Kilby, Steven; Macciola, Anthony; Amtrup, Jan W.; Orcutt, Bruce, Smart mobile application development platform.
  109. Macciola, Anthony; Amtrup, Jan W., Smart optical input/output (I/O) extension for context-dependent workflows.
  110. Benson Glenn,DEX, Software rental system and method for renting software.
  111. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  112. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  113. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  114. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  115. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  116. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  117. Benson, Glenn S., System and method for anti-phishing authentication.
  118. Benson, Glenn S., System and method for anti-phishing authentication.
  119. Benson, Glenn S., System and method for anti-phishing authentication.
  120. Benson, Glenn S., System and method for anti-phishing authentication.
  121. Decime,Jerry, System and method for authenticating digital content.
  122. Gendler, Joseph, System and method for automatic financial project management.
  123. Hoffberg, Steven M., System and method for determining contingent relevance.
  124. Teppler,Steven W., System and method for distributing trusted time.
  125. Warren, Mary Carter; Barrett, Donna M.; Schmitt, Donald H.; Ehemann, Karen R., System and method for establishing or modifying an account with user selectable terms.
  126. Warren, Mary Carter; Fredman, Marc L.; Hoechst, Kimberly L.; Filak, Douglas A.; Steckart, James C.; Blossom, George W.; Jacobs, Ron E.; Barrett, Donna M.; Schmitt, Donald H.; Strock, Bradley R.; Witsil, Kathleen H.; Ehemann, Karen R.; Dowidchuck, Katrina, System and method for establishing or modifying an account with user selectable terms.
  127. Warren, Mary Carter; Fredman, Marc L.; Hoechst, Kimberly L.; Filak, Douglas A.; Steckart, James C.; Blossom, George W.; Jacobs, Ron E.; Barrett, Donna M.; Schmitt, Donald H.; Strock, Bradley R.; Witsil, Kathleen H.; Ehemann, Karen R.; Dowidchuck, Katrina, System and method for establishing or modifying an account with user selectable terms.
  128. Read, Matthew J.; Ames, Craig S.; Nangia, Vinit; Lobashov, Pavel; Lam, Josiah, System and method for generating and managing administrator passwords.
  129. Read, Matthew J.; Ames, Craig S.; Nangia, Vinit; Lobashov, Pavel; Lam, Josiah, System and method for generating and managing administrator passwords.
  130. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  131. Scott, Kelly W., System and method for network-based project management.
  132. Benson, Glenn Stuart; Croston, Sean, System and method for partner key management.
  133. Skingle, Bruce James, System and method for portal infrastructure tracking.
  134. Skingle,Bruce James, System and method for portal infrastructure tracking.
  135. Everhart, Glenn C., System and method for preventing identity theft or misuse by restricting access.
  136. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  137. Rosko, Robert; Gudipati, Jayashree, System and method for providing customers with seamless entry to a remote server.
  138. Rosko, Robert; Gudipati, Jayashree, System and method for providing customers with seamless entry to a remote server.
  139. Rosko,Robert; Ampani,Kumar, System and method for providing customers with seamless entry to a remote server.
  140. Bowers, Theodore J; Ilijasic, Dean; Sanders, Shelley F., System and method for providing discriminated content to network users.
  141. Bowers,Theodore J.; Ilijasic,Dean; Sanders,Shelley F., System and method for providing discriminated content to network users.
  142. Gendler,Joseph, System and method for providing funding approval associated with a project based on a document collection.
  143. Sanders, Shelley F.; Bowers, Theodore; Ilijasic, Dean, System and method for providing incentives to consumers to share information.
  144. Fei, Huchen; Yang, Dong; Hong, Xiao, System and method for rapid updating of credit information.
  145. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  146. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  147. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  148. Lehman, Dean K.; McCullough, Joseph R.; Orth, Nancy A., System and method for sending money via E-mail over the internet.
  149. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  150. Skingle,Bruce James, System and method for single session sign-on with cryptography.
  151. Ellmore, Kimberly, System and method for single sign on process for websites with multiple applications and services.
  152. Ellmore,Kimberly, System and method for single sign on process for websites with multiple applications and services.
  153. Ellmore,Kimberly, System and method for single sign on process for websites with multiple applications and services.
  154. Ellmore,Kimberly, System and method for single sign on process for websites with multiples applications and services.
  155. Colcord, Brian, System and method for testing applications.
  156. Teppler, Steven W., System and methods for distributing trusted time.
  157. Erik H. van der Kaay ; David Tyo ; David Robinson ; Gregory L. Dowd, System and methods for generating trusted and authenticatable time stamps for electronic documents.
  158. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  159. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  160. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  161. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  162. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  163. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  164. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  165. Mann, III, William Frederick; Hirka, Jeffrey L., System for providing cardless payment.
  166. Mann, III, William Frederick; Hirka, Jeffrey L., System for providing cardless payment.
  167. Amtrup, Jan W.; Macciola, Anthony; Thompson, Steve; Ma, Jiyong; Shustorovich, Alexander; Thrasher, Christopher W., Systems and methods for classifying objects in digital images captured using mobile devices.
  168. Amtrup, Jan W.; Macciola, Anthony; Thompson, Steve; Ma, Jiyong; Shustorovich, Alexander; Thrasher, Christopher W., Systems and methods for classifying objects in digital images captured using mobile devices.
  169. Amtrup, Jan W.; Ma, Jiyong; Macciola, Anthony, Systems and methods for detecting and classifying objects in video captured using mobile devices.
  170. Ma, Jiyong; Macciola, Anthony; Amtrup, Jan W., Systems and methods for generating composite images of long documents using mobile video data.
  171. Walker, Jay S.; Jorasch, James A.; Nee, Jr., Patrick W.; Fincham, Carson C. K.; Walker, Evan; Bean, David; Maniam, Rajivan, Systems and methods for improved health care compliance.
  172. Walker, Jay S.; Jorasch, James A.; Nee, Jr., Patrick W.; Fincham, Carson C. K.; Walker, Evan; Bean, David; Maniam, Rajivan, Systems and methods for improved health care compliance.
  173. Walker, Jay S.; Jorasch, James A.; Nee, Jr., Patrick W.; Fincham, Carson C. K.; Walker, Evan; Bean, David; Maniam, Rajivan, Systems and methods for improved health care compliance.
  174. Jarvie, Jay C.; Vayner, Leonid; Payne, Clive Anthony, Systems and methods for managing digital certificates.
  175. Jarvie, Jay C.; Vayner, Leonid; Payne, Clive Anthony, Systems and methods for managing digital certificates.
  176. Macciola, Anthony; Amtrup, Jan W., Systems and methods for mobile image capture and processing.
  177. Szwalbenest, Stanley A., Systems and methods for multifactor authentication.
  178. Szwalbenest, Stanley A., Systems and methods for multifactor authentication.
  179. Szwalbenest, Stanley A., Systems and methods for multifactor authentication.
  180. Thrasher, Christopher W.; Shustorovich, Alexander; Thompson, Stephen Michael; Amtrup, Jan W.; Macciola, Anthony; Borrey, Roland G.; Schmidtler, Mauritius A. R.; Taylor, Robert A.; Fechter, Joel S.; Asuri, Hari S., Systems and methods of processing scanned data.
  181. Amtrup, Jan W.; Thompson, Stephen Michael, Systems, methods and computer program products for determining document validity.
  182. Amtrup, Jan; Macciola, Anthony; Thompson, Steve, Systems, methods and computer program products for determining document validity.
  183. Macciola, Anthony; Amtrup, Jan W., Systems, methods and computer program products for determining document validity.
  184. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  185. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  186. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  187. Hind,John R.; Peters,Marcia L., Technique for digitally notarizing a collection of data streams.
  188. Harvey, Ian Nigel, Time stamping system.
  189. Hyde, Roderick A.; Pan, Tony S., Time-dependent identification systems, methods, and uses thereof.
  190. Hyde, Roderick A.; Pan, Tony S., Time-dependent identification systems, methods, and uses thereof.
  191. Hyde, Roderick A.; Pan, Tony S., Time-dependent identification systems, methods, and uses thereof.
  192. Hyde, Roderick A.; Pan, Tony S., Time-dependent identification systems, methods, and uses thereof.
  193. Johannes Hecht DE; Dietbert Kollbach DE, Transponder arrangement.
  194. Engberg,Sten Olov; Jonsson,Ake, Use of personal communication devices for user authentication.
  195. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  196. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  197. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  198. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  199. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로