$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Multi-media copy management system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • H04L-009/14
출원번호 US-0977719 (1997-11-25)
발명자 / 주소
  • Warren Robert L.
  • Lee Chong U.
  • Moallemi Kamran
출원인 / 주소
  • Solana Technology Development Corporation
대리인 / 주소
    Lipsitz
인용정보 피인용 횟수 : 332  인용 특허 : 17

초록

Reproduction of a multi-media data signal which is stored on a source media or distributed via a communication network is controlled by inserting master tag data and control tag data into the data signal. A player/recorder inserts an additional generation of control tag information each time a copy

대표청구항

[ What is claimed is:] [49.] Apparatus for controlling the reproduction of a primary multi-media data signal using an auxiliary multi-media data signal, where master tag information is embedded in at least one of said primary and auxiliary multi-media data signals, and at least one of said primary a

이 특허에 인용된 특허 (17)

  1. Bedini John C. (Sylmar CA), Anti-copy system.
  2. Kahn Leonard R. (137 E. 36th St. New York NY 10016), Anti-copy system utilizing audible and inaudible protection signals.
  3. Endoh Kenjiro (Tokyo JPX), Apparatus for releasing a restriction on the recording of an information signal on a recording medium.
  4. Mahieux Yannick (Begard FRX), Bit allocation device for transformed digital audio broadcasting signals with adaptive quantization based on psychoaudit.
  5. Druyvesteyn Willem F. (Eindhoven NLX) Hoogendoorn Abraham (Eindhoven NLX) Van De Kerkhof Leon M. (Eindhoven NLX) Veldhuis Raymond N. J. (Eindhoven NLX), Coder for incorporating an auxiliary information signal in a digital audio signal, decoder for recovering such signals f.
  6. Akagiri Kenzo (Kanagawa JPX) Tsutsui Kyoya (Kanagawa JPX), Coding apparatus for digital signal.
  7. Preuss Robert D. (Boston MA) Roukos Salim E. (Scarsdale NY) Huggins A. W. F. (Arlington MA) Gish Herbert (Newton MA) Bergamo Marcos A. (Wellesley MA) Peterson Patrick M. (Cambridge MA) Derr Alan G. (, Embedded signalling.
  8. Bocci Paul M. (Roselle IL) Wilson Alan L. (Hoffman Estates IL) Anderson Walter F. (Chicago IL), Layered session data unit frame.
  9. Nagata Atsushi (Hirakata JPX) Uekawa Yutaka (Ashiya JPX) Senoo Takanori (Hirakata JPX) Takahashi Kenichi (Kyoto JPX), Method and apparatus for protection of signal copy.
  10. Rackman Michael I. (1710 Glenwood Rd. Brooklyn NY 11230), Method and system for limiting multi-user play of video game cartridges.
  11. Wasilewski Anthony J. (Alpharetta GA), Methods for providing conditional access information to decoders in a packet-based multiplexed communications system.
  12. Veldhuis Hindrik (Eindhoven NLX) Roth Rudolf (Eindhoven NLX) Heemskerk Jacobus P. J. (Eindhoven NLX), Methods of and information recording devices for recording and/or inhibiting recording of an information signal having c.
  13. Warren Robert L. ; Lee Chong U. ; Moallemi Kamran, Multi-media copy management system.
  14. Lee Chong U. (San Diego CA) Moallemi Kamran (Del Mar CA) Hinderling Jurg (San Diego CA), Post-compression hidden data transport.
  15. Shimada Hiromichi (Amagasaki JPX), Recording and reproducing apparatus with limited digital copying.
  16. Takahashi Ryutaro (Higashihiroshima JPX), Repeater of digital audio interface signal.
  17. Best Stuart J. (Harlington GB2) Johnson Nigel (Windlesham GB2) Sandford Adrian M. (Hayes GB2), Signal identification system.

이 특허를 인용한 특허 (332)

  1. Bartlett,David; Hommel,Scott; Reynolds,Michael; Butler,David Alexander; Kelly,Peter John, Acoustic communication system.
  2. Yu, Hong Heather; Gelman, Alexander D.; Fish, Robert S., Active data hiding for secure electronic media distribution.
  3. Landsman Rick W. ; Lee Wei-Yeh, Ad controller for use in implementing user-transparent network-distributed advertising and for interstitially displaying an advertisement so distributed.
  4. Landsman, Rick W.; Lee, Wei-Yeh, Agent-based technique for implementing browser-initiated user-transparent interstitial web advertising in a client computer.
  5. Hodge, Stephen L.; Darring-Collins, Catherine Rose; Marino, Dominick, Alarm control for inmate call monitoring.
  6. Landsman, Rick W.; Lee, Wei-Yeh, Apparatus and accompanying methods for implementing a network distribution server for use in providing interstitial web advertisements to a client computer.
  7. Landsman, Rick W.; Lee, Wei-Yeh, Apparatus and accompanying methods for implementing network servers for use in providing interstitial web advertisements to a client computer.
  8. Landsman, Rick W.; Lee, Wei-Yeh, Apparatus and accompanying methods for network distribution and interstitial rendering of information objects to client computers.
  9. Landsman,Rick W.; Lee,Wei Yeh, Apparatus and accompanying methods for network distribution and interstitial rendering of information objects to client computers.
  10. Rick W. Landsman ; Wei-Yeh Lee, Apparatus and accompanying methods for network distribution and interstitial rendering of information objects to client computers.
  11. Perlman,Stephen G.; Nichols,James B., Apparatus and method for intelligent multimedia compression and distribution.
  12. Sako, Yoichiro; Furukawa, Shunsuke; Inokuchi, Tatsuya; Kihara, Takashi, Apparatus for, and method of, recording/playing audio data having additional information embedded therein.
  13. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  14. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  15. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  16. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  17. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Asymmetric watermark embedding/extraction.
  18. Evans, Glenn F.; England, Paul, Auxiliary functionality for pixel data.
  19. Cao,Adrean T., Auxiliary program association table.
  20. Pedlow, Jr.,Leo M.; Agnihotri,Davender, Batch mode session-based encryption of video on demand content.
  21. Pedlow, Jr., Leo M.; Agnihotri, Davender, Bi-directional indices for trick mode video-on-demand.
  22. Srinivasan Venugopal, Broadcast encoding system and method.
  23. Srinivasan, Venugopal, Broadcast encoding system and method.
  24. Srinivasan, Venugopal, Broadcast encoding system and method.
  25. Srinivasan, Venugopal, Broadcast encoding system and method.
  26. Hosking, Ian Michael; Jones, Aled Wynne; Reynolds, Michael Raymond; Kelly, Peter John; Emmens, Michael David, Captioning system.
  27. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Circumvention of watermark analysis in a host content.
  28. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Circumvention of watermark analysis in a host content.
  29. Pedlow, Jr.,Leo M., Composite session-based encryption of video on demand content.
  30. Petrovic, Rade; Zhao, Jian; Winograd, Joseph M., Conditional access using embedded watermarks.
  31. Winograd, Joseph M.; Petrovic, Rade; Zhao, Jian, Content access management using extracted watermark information.
  32. Zhao, Jian; Winograd, Joseph M., Content management using multiple abstraction layers.
  33. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, Jon D., Content replacement by PID mapping.
  34. Bonan,James; Candelore,Brant L.; Eyer,Mark Kenneth, Content scrambling with minimal impact on legacy devices.
  35. Kamibayashi,Toru; Kato,Taku; Toma,Hideyuki; Tatebayashi,Makoto; Harada,Shunji; Yamada,Hisashi, Contents management method, content management apparatus, and recording medium.
  36. Kamibayashi,Toru; Kato,Taku; Toma,Hideyuki; Tatebayashi,Makoto; Harada,Shunji; Yamada,Hisashi, Contents management method, contents management apparatus, and recording medium.
  37. Geoffrey B. Rhoads ; Bruce L. Davis ; J. Scott Carr, Controlling operation of a device using a re-configurable watermark detector.
  38. Petrovic, Rade; Zhao, Jian; Winograd, Joseph M., Coordinated watermarking.
  39. Dawson, Thomas Patrick, Copy protection arrangement.
  40. Dawson,Thomas Patrick, Copy protection arrangement.
  41. Seung, Heung-Chan, Copy-protected optical recording medium, method for driving thereof and method for manufacturing thereof.
  42. Unger,Robert Allan; Candelore,Brant L., Critical packet partial encryption.
  43. Kelly, Peter; Reynolds, Michael Raymond; Sutton, Christopher John Joseph, Data embedding system.
  44. Yu, Hong Heather, Data hiding in digital multimedia.
  45. Moskowitz, Scott A., Data protection method and device.
  46. Moskowitz, Scott A., Data protection method and device.
  47. Moskowitz, Scott A., Data protection method and device.
  48. Moskowitz, Scott A., Data protection method and device.
  49. Komura,Teruyoshi; Takada,Yasuhiro, Data recording apparatus.
  50. Ryal,Kim Annon, Decryption system.
  51. Levy, Kenneth L.; Hannigan, Brett T.; Bradley, Brett A.; Rhoads, Geoffrey B., Deriving multiple identifiers from multimedia content.
  52. Candelore, Brant L., Descrambler.
  53. Srinivasan,Venugopal, Detection of signal modifications in audio streams with embedded code.
  54. Iverson, Vaughn; Schwartz, Todd, Digital content distribution.
  55. Feig,Ephriam; Chen,Shu Chun Jeane, Digital media delivery with local cache and streaming tokens.
  56. Candelore, Brant L., Digital rights management of a digital device.
  57. Hannah,Eric C.; Vannier,David S.; Jacobson,Carol A., Digital video display system.
  58. Alattar,Adnan M.; Levy,Kenneth L.; Stager,Reed R.; Rhoads,Geoffrey B.; Ellingson,Eric E., Digital watermarking and fingerprinting including synchronization, layering, version control, and compressed embedding.
  59. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  60. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  61. Tewfik,Ahmed, Digital watermarking with content dependent keys and autocorrelation properties for synchronization.
  62. Levy, Kenneth L., Digital watermarking with variable orientation and protocols.
  63. Levy,Kenneth L., Digital watermarking with variable orientation and protocols.
  64. Pedlow, Jr.,Leo M.; Agnihotri,Davender, Dynamic composition of pre-encrypted video on demand content.
  65. Graham, Todd D.; Hudson, Jonathan C., Dynamic file access control and management.
  66. Petrovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed.
  67. Petriovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed domain.
  68. Petrovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed domain.
  69. Petrovic, Rade; Atti, Venkatraman, Efficient extraction of embedded watermarks in the presence of host content distortions.
  70. Rhoads, Geoffrey B., Embedding hidden auxiliary information in media.
  71. Tehranchi,Babak, Encryption apparatus and method for synchronizing multiple encryption keys with a data stream.
  72. Raike, William Michael, Encryption processing for streaming media.
  73. Zhao, Jian, Enhanced content distribution using advertisements.
  74. Petrovic, Rade, Enhanced content management based on watermark extraction records.
  75. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  76. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  77. Petrovic, Rade; Atti, Venkatraman, Extraction of embedded watermarks from a host content based on extrapolation techniques.
  78. Petrovic, Rade; Atti, Venkatraman, Extraction of embedded watermarks from a host content using a plurality of tentative watermarks.
  79. Levy,Kenneth L., Forensic digital watermarking with variable orientation and protocols.
  80. Winograd, Joseph M., Forensic marking using a common customization function.
  81. Winograd, Joseph M., Forensic marking using a common customization function.
  82. Geagan, III, John Bernard; Ponceleon, Dulce B., Forensics in multi-channel media content.
  83. Candelore, Brant L., IP delivery of secure digital content.
  84. Hirano,Tetsuya; Tajima,Hiroshi, Image processing apparatus and system and method of same.
  85. Takehiro Sugita JP; Akira Ogino JP; Takashi Usui JP, Information output device, information recording device, information duplication control system and recording medium of the same.
  86. Takehiro Sugita JP; Akira Ogino JP; Takashi Usui JP, Information output device, information recording device, information duplication control system and recording medium of the same.
  87. Yoshio Junichi,JPX ; Yoshimura Ryuichiro,JPX ; Sawabe Takao,JPX ; Moriyama Yoshiaki,JPX ; Yamamoto Kaoru,JPX ; Tozaki Akihiro,JPX ; Nakamura Hiroshi,JPX, Information record medium, apparatus for recording the same and apparatus for reproducing the same.
  88. Yoshio, Junichi; Yoshimura, Ryuichiro; Sawabe, Takao; Moriyama, Yoshiaki; Yamamoto, Kaoru; Tozaki, Akihiro; Nakamura, Hiroshi, Information record medium, apparatus for recording the same and apparatus for reproducing the same.
  89. Yoshio,Junichi; Yoshimura,Ryuichiro; Sawabe,Takao; Moriyama,Yoshiaki; Yamamoto,Kaoru; Tozaki,Akihiro; Nakamura,Hiroshi, Information record medium, apparatus for recording the same and apparatus for reproducing the same.
  90. Ito,Motoshi; Fukushima,Yoshihisa; Sasaki,Shinji, Information update count managing method, information update count managing apparatus, contents usage count managing method, and content usage count storing apparatus.
  91. Rhoads, Geoffrey B., Inserting watermarks into portions of digital signals.
  92. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  93. Levy,Kenneth L.; Hannigan,Brett T.; Bradley,Brett Alan; Rhoads,Geoffrey B., Integrating digital watermarks in multimedia content.
  94. Levy,Kenneth L.; Hannigan,Brett T.; Bradley,Brett A.; Rhoads,Geoffrey B., Integrating steganographic encoding in multimedia content.
  95. Winograd, Joseph M.; Zhao, Jian; Petrovic, Rade, Interactive content acquisition using embedded codes.
  96. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  97. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  98. Candelore, Brant L.; Pedlow, Jr., Leo M.; Garrett, John, Macro-block based content replacement by PID mapping.
  99. Deolalikar, Vinay; Eshghi, Kave, Managing storage of data in a data structure.
  100. Kuroiwa,Toshio, Master digital data creation device and digital data reproduction device.
  101. Candelore, Brant L., Mechanism for protecting the transfer of digital content.
  102. Petrovic, Rade; Tehranchi, Babak; Jemili, Kanaan; Winograd, Joseph M.; Angelico, Dean, Media monitoring, management and information system.
  103. Petrovic, Rade; Tehranchi, Babak; Jemili, Kanaan; Winograd, Joseph M.; Angelico, Dean-Anthony, Media monitoring, management and information system.
  104. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  105. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  106. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  107. Levy,Kenneth Lee, Method and apparatus for embedding auxiliary information within original data.
  108. Candelore, Brant L.; Eyer, Mark, Method and apparatus for implementing revocation in broadcast networks.
  109. Duncan, David, Method and apparatus for packing and decoding audio and other data.
  110. Candelore, Brant L., Method and apparatus for protecting the transfer of data.
  111. Bennett, Dominic; Paczkowski, Remigiusz K., Method and apparatus for responding to request for information-personalization.
  112. Candelore,Brant L., Method and apparatus for securing control words.
  113. Dawson, Thomas Patrick, Method and apparatus for synchronizing dynamic graphics.
  114. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  115. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  116. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  117. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  118. Martin, Anthony; Goulden, David L.; Bennett, Dominic V.; Petersen, Roger; Paczkowski, Remigiusz K., Method and device for publishing cross-network user behavioral data.
  119. Martin, Anthony; Goulden, David L.; Bennett, Dominic V.; Petersen, Roger; Paczkowski, Remigiusz K., Method and device for publishing cross-network user behavioral data.
  120. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  121. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  122. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  123. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  124. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  125. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  126. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  127. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  128. Stockhammer, Thomas, Method for decoding a data stream and a receiver.
  129. Srinivasan, Venugopal, Method for encoding an input signal.
  130. Candelore, Brant L., Method for simulcrypting scrambled data to a plurality of conditional access devices.
  131. Candelore, Brant L., Method for simulcrypting scrambled data to a plurality of conditional access devices.
  132. Ogino Akira,JPX ; Ikeda Nozomu,JPX, Method for superimposing and detecting additional information signal, method for detecting additional information signal, device for detecting additional information signal, and device for recording .
  133. Marque Pucheu, Gérard, Method for transmitting encrypted data, associated decrypting method, device for carrying out said methods and a mobile terminal for the incorporation thereof.
  134. Arnold, Matt; Barton, James M., Method of sharing personal media using a digital recorder.
  135. Arnold, Matt; Barton, James M., Method of sharing personal media using a digital recorder.
  136. Arnold, Matt; Barton, Jim, Method of sharing personal media using a digital recorder.
  137. Fisch, Perry Joseph; Pelletier, Seth Alan, Methods and apparatus for metering portable media players.
  138. Mears, Paul M.; Luff, Robert A.; Stokes, Robert Joel; Ramaswamy, Arun; Conklin, Charles Clinton; Mello, Brian Scott; Pelletier, Seth Alan; Fisch, Perry Joseph, Methods and apparatus for metering portable media players.
  139. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P., Methods and apparatus for persistent control and protection of content.
  140. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P., Methods and apparatus for persistent control and protection of content.
  141. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P.; Sibert, W. Olin; Van Wie, David M., Methods and apparatus for persistent control and protection of content.
  142. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P.; Sibert, W. Olin; Van Wie, David M., Methods and apparatus for persistent control and protection of content.
  143. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P.; Sibert, W. Olin; Van Wie, David M., Methods and apparatus for persistent control and protection of content.
  144. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Methods and apparatus for thwarting watermark detection circumvention.
  145. Rhoads, Geoffrey B., Methods and systems for inserting watermarks in digital signals.
  146. Evans,Glenn F.; England,Paul, Methods and systems for maintaining an encrypted video memory subsystem.
  147. Evans,Glenn F.; England,Paul; Wilt,Nicholas P., Methods and systems for maintaining an encrypted video memory subsystem.
  148. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  149. Rhoads, Geoffrey B., Methods and systems for steganographic processing.
  150. Evans,Glenn F.; England,Paul, Methods and systems providing per pixel security and functionality.
  151. Rhoads,Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  152. Rhoads, Geoffrey B., Methods for managing content using intentional degradation and insertion of steganographic codes.
  153. Gutierrez, Alejandro, Methods, apparatus and articles of manufacture to monitor mobile devices.
  154. Gutierrez, Alejandro, Methods, apparatus and articles of manufacture to monitor mobile devices.
  155. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  156. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  157. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  158. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  159. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  160. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  161. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  162. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  163. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  164. Ishibashi Yasuhiro,JPX, Motion picture data encrypting method and computer system and motion picture data encoding/decoding apparatus to which encrypting method is applied.
  165. Mitsuhiko Ohta JP; Tadayoshi Kono JP; Masanori Ishizuka JP; Hirohiko Inagaki JP; Koichi Yamashita JP, Moving picture decoding apparatus and method.
  166. Candelore,Brant L., Multi-process descrambler.
  167. Nobuo Suzuki JP, Multimedia information audiovisual apparatus.
  168. Perlman, Stephen G., Multimedia system with selectable protocol module including MPEG logic and docsis logic sharing a single tuner.
  169. Candelore, Brant L., Multiple DRM management.
  170. Candelore,Brant L., Multiple partial encryption using retuning.
  171. Scullin,Will, Multiple source proxy management system.
  172. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  173. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  174. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  175. Hart, III,John J.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G., Optical storage medium having distortion regions, and a method of modifying an optical storage medium to include distortion regions.
  176. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  177. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  178. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  179. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  180. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  181. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  182. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  183. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  184. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  185. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  186. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  187. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  188. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  189. Rodriguez, Tony F., Orchestrated encoding and decoding.
  190. Rodriguez, Tony F., Orchestrated encoding and decoding multimedia content having plural digital watermarks.
  191. Candelore, Brant L., Parental control of displayed content using closed captioning.
  192. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M., Partial encryption and PID mapping.
  193. Candelore,Brant L.; Unger,Robert Allan; Pedlow, Jr.,Leo M., Partial encryption and PID mapping.
  194. Nagao,Takeshi, Playback apparatus, playback method, and program product with playback processing program.
  195. Siegel, Jaime A., Portable music player with pay per play usage and method for purchase of credits for usage.
  196. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Wong, Douglas, Pre-processed information embedding system.
  197. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M; Wong, Douglas, Pre-processed information embedding system.
  198. Wong, Douglas; Lee, Chong, Pre-processed information embedding system.
  199. Wong, Douglas; Lee, Chong U., Pre-processed information embedding system.
  200. Wong, Douglas; Lee, Chong U., Pre-processed information embedding system.
  201. Pedlow, Jr., Leo M.; Agnihotri, Davender, Preparation of content for multiple conditional access methods in video on demand.
  202. Levy, Kenneth L.; Hiatt, R. Stephen; Rhoads, Geoffrey B., Processing audio or video content with multiple watermark layers.
  203. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Progressive video refresh slice detection.
  204. Roberts, David Keith; Klijn, Jan; Schirris, Johan Leon, Real-time signature embedding in video.
  205. Rhoads, Geoffrey B.; Davis, Bruce L.; Carr, J. Scott, Reconfiguring a watermark detector.
  206. Matsumoto, Kissei, Recording apparatus.
  207. Levy, Kenneth L., Recoverable digital content degradation.
  208. Levy, Kenneth L., Recoverable digital content degradation: method and apparatus.
  209. Levy, Kenneth L., Recoverable digital content degradation: method and apparatus.
  210. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  211. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  212. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  213. Martin, Anthony G., Search engine for a computer network.
  214. Winograd, Joseph M.; Johnson, Peter Russell; Houle, William Carl, Second screen content.
  215. Winograd, Joseph M.; Petrovic, Rade; Zhao, Jian, Secure and efficient content screening in a networked environment.
  216. Wong, Terrence L.; Harvey, Ian E.; Lee, David C.; Lewis, Greg S.; Spielman, Steven R.; Tan, Christopher C.; Warland, David K., Secure data storage.
  217. Barton, James M.; Platt, David, Secure multimedia transfer system.
  218. Barton, James M.; Platt, David C., Secure multimedia transfer system.
  219. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  220. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  221. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  222. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  223. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  224. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  225. Evans,Glenn F., Secure video card methods and systems.
  226. Evans,Glenn F., Secure video card methods and systems.
  227. Evans,Glenn F., Secure video card methods and systems.
  228. Evans,Glenn F., Secure video card methods and systems.
  229. Evans,Glenn F., Secure video card methods and systems.
  230. Evans,Glenn F., Secure video card methods and systems.
  231. Evans,Glenn F., Secure video card methods and systems.
  232. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  233. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  234. Rhoads, Geoffrey B.; Rodriguez, Tony F., Security document carrying machine readable pattern.
  235. Candelore, Brant L., Selective encryption with coverage encryption.
  236. Barclay, Michael John, Signalling system.
  237. Barclay, Michael John, Signalling system.
  238. Candelore, Brant L.; Derovanessian, Henry; Pedlow, Jr., Leo M., Slice mask and moat pattern partial encryption.
  239. Winograd, Joseph M., Social media viewing system.
  240. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Star pattern partial encryption.
  241. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  242. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  243. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  244. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  245. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  246. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  247. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  248. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  249. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  250. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Synchronizing rendering of multimedia content.
  251. Gillon,William M.; Perlman,Stephen G., System and method for conditional access key encryption.
  252. Hughes, David, System and method for controlling the use and duplication of digital content distributed on removable media.
  253. Hughes, David, System and method for controlling the use and duplication of digital content distributed on removable media.
  254. Young, Steven J.; Krein, Todd; Perlman, Stephen G., System and method for coordinating between multiple telephony channels.
  255. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  256. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  257. Hodge, Stephen L.; Kesterson, Fred; Seyfetdinov, Serge, System and method for detecting three-way call circumvention attempts.
  258. Fitzhardinge,Jeremy; Perlman,Stephen G., System and method for efficiently storing and processing multimedia content.
  259. Chapman, Peter, System and method for generating a non-repudiatable record of a data stream.
  260. Dunn, Chris A.; Cooke, Jawhny X.; Aziz, Zaheer; Sagy, Ravid, System and method for identifying encrypted conference media traffic.
  261. Perlman, Stephen G., System and method for improved multi-stream multimedia transmission and processing.
  262. Barton, James M.; Platt, David C., System and method for internet access to a personal television service.
  263. Barton, James M.; Platt, David C., System and method for internet access to a personal television service.
  264. Barton, James M.; Platt, David C., System and method for internet access to a personal television service.
  265. Barton, James M.; Platt, David C., System and method for internet access to a personal television service.
  266. Olligschlaeger, Andreas M.; Rokosky, James P., System and method for multi-modal audio mining of telephone conversations.
  267. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  268. Olligschlaeger, Andreas M.; Rokosky, Jim, System and method for multi-modal audio mining of telephone conversations.
  269. Perlman,Stephen G., System and method for multimedia content simulcast.
  270. Perlman, Stephen G.; Sleator, Michael, System and method for processing multiple broadcast multimedia streams.
  271. Fetkovich,John E., System and method for secure distribution and evaluation of compressed digital information.
  272. McFarland, Rowan L.; Tighe, James Rodgers, System and method for securely transmitting video over a network.
  273. Jones,Aled Wynne; Reynolds,Michael Raymond; Bartlett,David; Hosking,Ian Michael; Guy,Donald Glenn; Kelly,Peter John; Timson,Daniel Reginald Ewart; Vasilopolous,Nicolas; Hart,Alan Michael; Morland,Robert John, System and method for shaping a data signal for embedding within an audio signal.
  274. Candelore, Brant L.; Pedlow, Jr., Leo M., System and method for the creation, synchronization and delivery of alternate content.
  275. Hodge, Stephen Lee, System and method for third party monitoring of voice and video calls.
  276. Olligschlaeger, Andreas M., System and method for three-way call detection.
  277. Olligschlaeger, Andreas M., System and method for three-way call detection.
  278. Olligschlaeger, Andreas M., System and method for three-way call detection.
  279. Olligschlaeger, Andreas M., System and method for three-way call detection.
  280. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  281. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  282. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  283. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  284. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  285. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  286. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  287. Candelore, Brant L., System, method and apparatus for secure digital content transmission.
  288. Howard, Daniel G.; Pagliarulo, Jeffrey A.; Crowley, John R.; Lee, Andrew R.; Hart, III, John J.; Merkle, Jr., James A.; LeVine, Richard B., Systems and methods for media authentication.
  289. Howard, Daniel G.; Pagliarulo, Jeffrey A.; Crowley, John R.; Lee, Andrew R.; Hart, III, John J.; Merkle, Jr., James A.; Levine, Richard B., Systems and methods for media authentication.
  290. Merkle, Jr., James A.; LeVine, Richard B.; Howard, Daniel G.; Lee, Andrew R., Systems and methods for media authentication.
  291. Hart, III, John J.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G., Systems and methods for optical media modification.
  292. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  293. Evans, Glenn F.; England, Paul, Systems and methods for securing video card output.
  294. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  295. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  296. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  297. Landsman,Rick W.; Lee,Wei Yeh, TECHNIQUE FOR IMPLEMENTING BROWSER-INITIATED USER-TRANSPARENT NETWORK-DISTRIBUTED ADVERTISING AND FOR INTERSTITIALLY DISPLAYING AN ADVERTISEMENT, SO DISTRIBUTED, THROUGH A WEB BROWSER IN RESPONSE TO .
  298. Landsman Rick W. ; Lee Wei-Yeh, Technique for implementing browser-initiated user-transparent advertising and for interstitially displaying an advertisement, so distributed, through a web browser in response to a user click-stream.
  299. Landsman,Rick W.; Lee,Wei Yeh, Technique for implementing browser-initiated user-transparent network-distributed advertising and for interstitially displaying an advertisement, so distributed, through a web browser in response to .
  300. Landsman,Rick W.; Lee,Wei Yeh, Technique for implementing browser-initiated user-transparent network-distributed advertising and for interstitially displaying an advertisement, so distributed, through a web browser in response to .
  301. Goulden, David L.; Shevach, Matthew A.; Bennett, Dominic, Techniques for displaying impressions in documents delivered over a computer network.
  302. Walker, Brian R.; Baker, Daniel G., Temporal synchronization of video watermark decoding.
  303. Hodge, Stephen Lee, Third party monitoring of a activity within a monitoring platform.
  304. Martin, Thomas J., Three-way call detection using steganography.
  305. Martin,Thomas J., Three-way call detection using steganography.
  306. Candelore, Brant L.; Unger, Robert Allan; Derovanessian, Henry, Time division partial encryption.
  307. Petrovic, Rade; Downes, Patrick George, Time varying evaluation of multimedia content.
  308. Zhao, Jian; Mercier, Guillaume, Transactional video marking system.
  309. Levy, Kenneth L., Transmarking of multimedia signals.
  310. Levy,Kenneth L., Transmarking of multimedia signals.
  311. Zou, Han; Yu, Hong Heather, Universal multimedia optic disc player and its application for revocable copy protection.
  312. Zou, Han; Yu, Hong Heather, Universal multimedia optic disc player and its application for revocable copy protection.
  313. Zou,Han; Yu,Hong Heather, Universal multimedia optic disc player and its application for revocable copy protection.
  314. Zou,Han; Yu,Hong Heather, Universal multimedia optic disc player and its application for revocable copy protection.
  315. Zou,Han; Yu,Hong Heather, Universal multimedia optic disc player and its application for revocable copy protection.
  316. Martin, Anthony G.; Vandevelde, Scott; Goulden, David L., Updating content of presentation vehicle in a computer network.
  317. Candelore,Brant L.; Derovanessian,Henry, Upgrading of encryption.
  318. Hodge, Stephen, Utilizing VoIP codec negotiation during a controlled environment call.
  319. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  320. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  321. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  322. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  323. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  324. Wing, Daniel G.; Jennings, Cullen F., Verifying cryptographic identity during media session initialization.
  325. Wing, Daniel G.; Jennings, Cullen F., Verifying cryptographic identity during media session initialization.
  326. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Video scene change detection.
  327. Candelore,Brant L.; Derovanessian,Henry; Pedlow, Jr.,Leo M., Video slice and active region based multiple partial encryption.
  328. Winograd, Joseph M.; Petrovic, Rade; Zhao, Jian, Watermark extraction and content screening in a networked environment.
  329. Petrovic, Rade; Atti, Venkatraman, Watermark extraction based on tentative watermarks.
  330. Petrovic, Rade; Winograd, Joseph M.; Downes, Patrick George, Watermark extractor enhancements based on payload ranking.
  331. Tehranchi, Babak; Petrovic, Rade, Watermarking in an encrypted domain.
  332. Rhoads, Geoffrey B., Wireless methods using signature codes.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로