$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Digital data authentication method 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/32
  • H04L-009/28
  • H04L-009/30
출원번호 US-0090419 (1998-06-04)
우선권정보 JP-0348860 (1997-12-18)
발명자 / 주소
  • Yoshiura Hiroshi,JPX
  • Takaragi Kazuo,JPX
  • Sasaki Ryoichi,JPX
  • Susaki Seiichi,JPX
  • Toyoshima Hisashi,JPX
  • Saito Tsukasa,JPX
출원인 / 주소
  • Hitachi Ltd., JPX
대리인 / 주소
    Antonelli, Terry, Stout & Kraus, LLP
인용정보 피인용 횟수 : 233  인용 특허 : 5

초록

This invention provides a method for identifying a purchaser who purchased content from which an illegal copy was produced. A provider system encrypts a content purchased by the purchaser using a public key of a purchaser system and sends the encrypted content to the purchaser system. The purchaser

대표청구항

[ What is claimed is:] [1.] An embed-in-content information processing method for embedding information on k (k is an integer equal to or larger than 2) content-handling persons using an electronic computer, the method comprising the steps of:creating a digital signature of a first content-handling

이 특허에 인용된 특허 (5)

  1. Atkinson Robert G. ; Price Robert M. ; Contorer Aaron M., Code certification for network transmission.
  2. Braudaway Gordon W. (Yorktown Heights NY) Magerlein Karen A. (Ossining NY) Mintzer Frederick C. (Shrub Oak NY), Color correct digital watermarking of images.
  3. Vynne Thorbjorn,DKX ; Jordan Frederic,CHX, Embedding a digital signature in a video sequence.
  4. Romney Gordon ; Zubeldia Pedro (Kepa), Method and apparatus for witnessed authentication of electronic documents.
  5. Squilla John R. ; Moghadam Omid A. ; Rabbani Majid, Photograhic system with selected area image authentication.

이 특허를 인용한 특허 (233)

  1. Pasternak, Michael, Accessing and processing monitoring data resulting from customized monitoring of system activities.
  2. Palliyil,Sudarshan; Venkateshamurthy,Shivakumara; Aswathanarayana,Tejasvi, Apparatus, methods and computer programs for controlling performance of operations within a data processing system or network.
  3. Delgosha, Farshid; Fekri, Faramarz, Asymmetric cryptosystem employing paraunitary matrices.
  4. Kirovski, Darko; Malvar, Henrique, Audio watermarking with covert channel and permutations.
  5. Kirovski, Darko; Malvar, Henrique; Jakubowski, Mariusz H., Audio watermarking with dual watermarks.
  6. Kirovski,Darko; Malvar,Henrique; Jakubowski,Mariusz H., Audio watermarking with dual watermarks.
  7. Kirovski,Darko; Malvar,Henrique; Jakubowski,Mariusz H., Audio watermarking with dual watermarks.
  8. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D.; Wood, Jr., Lowell L., Authenticatable displayed content.
  9. Bishop, Fred; Domenica, Danielle R.; Mendivil, Vicki R.; Villalobos, Hermes H., Authenticating electronic content.
  10. Bishop, Fred; Domenica, Danielle R.; Mendivil, Vicki R.; Villalobos, Hermes H., Authenticating electronic content.
  11. Alattar, Adnan M., Authentication of physical and electronic media objects using digital watermarks.
  12. Alattar, Adnan M., Authentication of physical and electronic media objects using digital watermarks.
  13. Alattar,Adnan M.; Carr,J. Scott; Seder,Phillip Andrew; Lofgren,Neil; Rhoads,Geoffrey B., Authentication of physical and electronic media objects using digital watermarks.
  14. Palliyil, Sudarshan; Venkateshamurthy, Shivakumara; Aswathanarayana, Tejasvi, Computer program product and computer system for controlling performance of operations within a data processing system or networks.
  15. Levy, Kenneth L.; Rhoads, Geoffrey B.; Brunk, Hugh L., Connected audio and other media objects.
  16. Conwell,William Y.; Bradley,Brett A.; Rhoads,Geoffrey B., Content identifiers triggering corresponding responses through collaborative processing.
  17. Levy, Kenneth L.; Stager, Reed R.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Content sensitive connected content.
  18. Levy, Kenneth L.; Rhoads, Geoffrey B.; Stager, Reed R.; Rodriguez, Tony F., Context sensitive connected content.
  19. Cohen, Alexander J.; Cohen, B. Isaac; Harlow, Ed; Leuthardt, Eric C.; Levien, Royce A.; Malamud, Mark A., Contextual information encoded in a formed expression.
  20. Cohen, Alexander J.; Cohen, B. Isaac; Harlow, Ed; Leuthardt, Eric C.; Levien, Royce A.; Malamud, Mark A., Contextual information encoded in a formed expression.
  21. Carlson, Gerard J.; Skurdal, Vincent C., Copy protecting documents.
  22. Morito, Hajime, Copy protection apparatus and method.
  23. Berringer, Ryan R.; Hougaard, Todd R.; Andrus, Richard S., Creating and verifying electronic documents.
  24. Berringer,Ryan R.; Hougaard,Todd R.; Andrus,Richard S., Creating and verifying electronic documents.
  25. Pasternak, Michael, Customized monitoring of system activities.
  26. Yamazaki, Takeshi; Iwamura, Keiichi, Data processing apparatus and method, and storage medium.
  27. Moskowitz, Scott A., Data protection method and device.
  28. Moskowitz, Scott A., Data protection method and device.
  29. Moskowitz, Scott A., Data protection method and device.
  30. Moskowitz, Scott A., Data protection method and device.
  31. Hatanaka,Masayuki; Kamada,Jun; Hatakeyama,Takahisa; Hasebe,Takayuki; Kotani,Seigou; Furuta,Shigeki; Anazawa,Takeaki; Hioki,Toshiaki; Kanamori,Miwa; Hori,Yoshihiro, Data reproduction apparatus and data reproduction module.
  32. Cohen, Alexander J.; Cohen, B. Isaac; Harlow, Ed; Leuthardt, Eric C.; Levien, Royce A.; Malamud, Mark A., Decoding digital information included in a hand-formed expression.
  33. Hillis, W. Daniel; Ferren, Bran, Delegated authority evaluation system.
  34. Hills, W. Daniel; Ferren, Bran, Delegated authority to evaluate content.
  35. Hillis, W. Daniel; Ferren, Bran, Delegating authority to evaluate content.
  36. Mihcak, M Kivanc; Venkatesan, Ramarathnam; Jakubowski, Mariusz H., Derivation and quantization of robust non-local characteristics for blind watermarking.
  37. Mihcak, M. Kivanc; Venkatesan, Ramarathnam; Jakubowski, Mariusz H., Derivation and quantization of robust non-local characteristics for blind watermarking.
  38. Mihcak, M. Kivanc; Venkatesan, Ramarathnam; Jakubowski, Mariusz H., Derivation and quantization of robust non-local characteristics for blind watermarking.
  39. Mihcak, M. Kivanc; Venkatesan, Ramarathnam; Jakubowski, Mariusz H., Derivation and quantization of robust non-local characteristics for blind watermarking.
  40. Attias, Hagai T.; Kirovski, Darko, Detecting beat information using a diverse set of correlations.
  41. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  42. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  43. Ochiai, Masato, Device, device control method, and program.
  44. Terada,Koichi; Fujii,Yukio; Fujikawa,Yoshifumi; Iwagaki,Taruhi, Digital content protection using invisible and visible watermarks.
  45. Hiroshi Yoshiura JP; Kazuo Takaragi JP; Ryoichi Sasaki JP; Seiichi Susaki JP; Hisashi Toyoshima JP; Tsukasa Saito JP, Digital data authentication method.
  46. Kozat, S. Serdar; Mihcak, M. Kivanc; Venkatesan, Ramarathnam, Digital goods representation based upon matrix invariances.
  47. Mihcak, M. Kivanc; Venkatesan, Ramarathnam, Digital signal watermaker.
  48. Brundage, Trent J.; Hannigan, Brett T.; Sharma, Ravi K., Distributed content identification.
  49. Suominen, Edwin A, Encryption and authentication systems and methods.
  50. Suominen, Edwin A., Encryption and authentication systems and methods.
  51. Suominen, Edwin A., Encryption and authentication systems and methods.
  52. Suominen,Edwin A., Encryption and authentication systems and methods.
  53. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  54. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  55. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  56. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  57. Hidalgo, Llius Mora; Lleonart, Xabier Panadero, Firewalls for providing security in HTTP networks and applications.
  58. Abdulhayoglu, Melih, Hallmarking verification process and system and corresponding method of and system for communication.
  59. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D.; Wood, Jr., Lowell L., Handling masquerading elements.
  60. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D.; Wood, Jr., Lowell L., Handling masquerading elements.
  61. Palliyil, Sudarshan; Venkateshamurthy, Shivakumara; Vijayaraghavan, Srinivas Belur; Aswathanarayana, Tejasvi, Hash-based access to resources in a data processing network.
  62. David, Morgan William Amos; Stone, Jonathan James, Identifying material stored using a signature as a retrieval index.
  63. David, Morgan William Amos; Stone, Jonathan James, Identifying material using a watermark and a signature.
  64. Moroo,Jun; Noda,Tsugio, Image data processing apparatus and method.
  65. Kasai,Kazuhiro, Image processing system and method, memory card, and storage medium.
  66. Ferlitsch, Andrew Rodney, Imaging job authorization.
  67. Cohen, Alexander J.; Cohen, B. Isaac; Harlow, Ed; Leuthardt, Eric C.; Levien, Royce A.; Malamud, Mark A., Including contextual information with a formed expression.
  68. Cohen, Alexander J.; Cohen, B. Isaac; Harlow, Ed; Leuthardt, Eric C.; Levien, Royce A.; Malamud, Mark A., Including environmental information in a manual expression.
  69. Usami, Yoshinori; Ito, Wataru; Yoda, Akira, Information embedding method and apparatus.
  70. Cohen, Alexander J.; Cohen, B. Isaac; Harlow, Ed; Leuthardt, Eric C.; Levien, Royce A.; Malamud, Mark A., Information encoded in an expression.
  71. Nakano, Takehiko, Information processing apparatus and method.
  72. Nakano, Takehiko, Information processing apparatus and method.
  73. Nakano, Takehiko, Information processing apparatus and method.
  74. Nakano, Takehiko, Information processing apparatus and method.
  75. Nakano, Takehiko, Information processing apparatus and method.
  76. Nakano,Takehiko, Information processing apparatus and method.
  77. Naito, Kikuo; Noguchi, Toshiyuki, Information processing apparatus enabling electronic watermarking, and communication network connectable to such information processing apparatus.
  78. Hamada, Noboru, Information processing apparatus, image processing apparatus, information processing method, control method for image processing apparatus, computer program, and storage medium.
  79. Hamada, Noboru, Information processing apparatus, information processing method, and storage medium.
  80. Fujita,Takeshi; Endoh,Hitoshi; Hatta,Nariaki; Fujikawa,Yasufumi, Information providing system and identification information adding device.
  81. Shinoda, Takashi; Youda, Akihiro; Kato, Tsutomo; Kikuta, Atsushi, Information search method and system for registering and searching for associated multimedia data using embedded information.
  82. Pasternak, Michael, Installing monitoring utilities using universal performance monitor.
  83. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  84. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  85. Hillis,W. Daniel; Ferren,Bran, Knowledge web.
  86. Barr, John Kennedy; Bradley, Brett A.; Hannigan, Brett T.; Alattar, Adnan M.; Durst, Robert, Layered security in digital watermarking.
  87. Bradley, Brett A.; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  88. Bradley, Brett Alan; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  89. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  90. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  91. Ramos, Daniel O.; MacIntosh, Brian T.; Rhoads, Geoffrey B., Managing and indexing content on a network with image bookmarks and digital watermarks.
  92. Riddick,Christopher J.; Tran,Lan Huu, Media protection system and method.
  93. Hillis, W. Daniel; Ferren, Bran, Meta-Web.
  94. Hogeboom, David A.; Koenig, William; Wright, David, Method and apparatus for enabling authentication of e-mail messages.
  95. Hogeboom, David A.; Koenig, William; Wright, David; Phillips, Richard Wade; MacLean, Rhonda; Parra, William A., Method and apparatus for enabling authentication of on-line communications.
  96. Rabin, Michael O.; Shasha, Dennis E.; Beinart, Yossi; Caceres, Ramon; Karia, Timir; Molnar, David; Rolinson, Sean, Method and apparatus for protecting information and privacy.
  97. Rabin, Michael O.; Shasha, Dennis E.; Beinart, Yossi; Caceres, Ramon; Karia, Timir; Molnar, David; Rolinson, Sean, Method and apparatus for protecting information and privacy.
  98. Levy,Kenneth Lee, Method and apparatus for robust embedded data.
  99. Palliyil, Sudarshan; Venkateshamurthy, Shivakumara; Aswathanarayana, Tejasvi, Method and computer program product for identifying or managing vulnerabilities within a data processing network.
  100. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  101. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  102. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  103. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  104. Felske, Kent; Aweya, James; Montuno, Delfin; Ouellette, Michel, Method and system for content detection and interception in communication networks.
  105. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  106. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  107. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  108. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  109. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  110. Epstein, Michael; Pasieka, Michael, Method and system for preventing unauthorized playback of broadcasted digital data streams.
  111. Miyazaki, Kunihiko; Yoshiura, Hiroshi; Susaki, Seiichi; Sasaki, Ryoichi; Takaragi, Kazuo; Toyoshima, Hisashi; Matsuki, Takeshi, Method and system for recovering the validity of cryptographically signed digital data.
  112. Miyazaki,Kunihiko; Yoshiura,Hiroshi; Susaki,Seiichi; Sasaki,Ryoichi; Takaragi,Kazuo; Toyoshima,Hisashi; Matsuki,Takeshi, Method and system for recovering the validity of cryptographically signed digital data.
  113. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  114. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  115. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  116. Blinn, Arnold N.; Jones, Thomas C., Method for interdependently validating a digital content package and a corresponding digital license.
  117. Iwamura,Keiichi, Method of using plural watermarks to prevent unauthorized image copying.
  118. Martin,Robert; Dubin,Jared; Williamson,Jeff; Tio,Cathy, Methods and apparatus for call service processing by instantiating an object that executes a compiled representation of a mark-up language description of operations for performing a call feature or s.
  119. Levy, Kenneth L., Methods and apparatus for robust embedded data.
  120. Rhoads, Geoffrey B., Methods and devices responsive to ambient audio.
  121. Rhoads, Geoffrey B., Methods and systems employing digital content.
  122. Rhoads, Geoffrey B.; Levy, Kenneth L., Methods and systems employing digital content.
  123. Beattie, Douglas D.; Creighton, Jr., Neal Lewis; Bailey, Christopher T. M.; Remy, David L.; Hamandi, Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  124. Beattie, Douglas D.; Creighton, Jr., Neal Lewis; Bailey, Christopher T. M.; Remy, David L.; Hamandi, Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  125. Beattie,Douglas D.; Creighton, Jr.,Neal Lewis; Bailey,Christopher T. M.; Remy,David L.; Hamandi,Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  126. Beattie,Douglas; Creighton, Jr.,Neal; Bailey,Christopher; Remy,David; Hamandi,Hani, Methods and systems for automated authentication, processing and issuance of digital certificates.
  127. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  128. Abdulhayoglu, Melih, Methods of accessing and using web-pages.
  129. Carr, J. Scott; Davis, Bruce L.; Rhoads, Geoffrey B., Methods utilizing steganography.
  130. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  131. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  132. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  133. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  134. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  135. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  136. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  137. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  138. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  139. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  140. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  141. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  142. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  143. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  144. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  145. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  146. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  147. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  148. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  149. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  150. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  151. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  152. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  153. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  154. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  155. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  156. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  157. Mastie, Scott D.; Mitchell, Joan L., Point-of-sale bill authentication.
  158. Mitchell, Joan L.; Mastie, Scott D., Point-of-sale electronic receipt generation.
  159. Granados, Axel Aguado; Fox, Benjamin A.; Gibbs, Nathaniel J.; Kuesel, Jamie R.; Maki, Andrew B.; Timpane, Trevor J., Preventing execution of pirated software.
  160. Kobayashi,Toru; Yanagimachi,Noriyuki; Inai,Masayuki; Nakazawa,Toshihiko; Yamazaki,Hirohiko, Print system, service system, data server, master server, print client system and printer.
  161. Ohsone, Atsuo, Printing management system, printing management method, and program.
  162. Brundage, Trent J.; Hannigan, Brett T., Progressive watermark decoding on a distributed computing platform.
  163. Brundage,Trent J.; Hannigan,Brett T.; Sharma,Ravi K., Progressive watermark decoding on a distributed computing platform.
  164. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  165. Venkatesan, Ramarathnam; Malkin, Michael T., Randomized signal transforms and their applications.
  166. Venkatesan, Ramarathnam; Malkin, Michael T., Randomized signal transforms and their applications.
  167. Mihcak, M. Kivanc; Venkatesan, Ramarathnam, Recognizer of content of digital signals.
  168. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D.; Wood, Jr., Lowell L., Screening for masquerading content.
  169. Berke, Andrew, Search engine.
  170. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  171. Suominen, Edwin A., Secure messaging with disposable keys.
  172. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  173. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  174. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  175. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  176. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  177. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  178. Davis Derek L., Secure public digital watermark.
  179. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  180. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  181. Moskowitz,Scott A., Security based on subliminal and supraliminal channels for data objects.
  182. Rowan, Michael J.; Bailey, Christopher T. M.; Chen, Kefeng; Creighton, Neal, Security systems and services to provide identity and uniform resource identifier verification.
  183. Ellison,Carl M.; Dohrmann,Stephen H.; Epp,Edward C., Sensory verification of shared data.
  184. Frendo,Michael; Graham,Philip R., Set top to internet device communication and use.
  185. Daniel O. Ramos ; Brian T. MacIntosh ; Geoffrey B. Rhoads, Smart images and image bookmarking for an internet browser.
  186. Kirovski,Darko; Malvar,Henrique, Stealthy audio watermarking.
  187. Kirovski,Darko; Malvar,Henrique, Stealthy audio watermarking.
  188. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  189. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  190. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  191. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  192. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  193. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  194. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  195. Carro, Fernando Incertis, System and method for securely hyperlinking graphic objects.
  196. Lee,Cheol Woong; Lee,Chang Young, System and method of sharing digital literary works while protecting against illegal reproduction through communication network.
  197. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  198. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  199. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  200. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  201. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  202. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  203. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  204. Ramos, Daniel O.; MacIntosh, Brian T.; Rhoads, Geoffrey B., System for managing display and retrieval of image content on a network with image identification and linking to network content.
  205. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  206. Graves,Richard C.; Liu,Song; Lin,Hua, Systems and processes for call and call feature administration on a telecommunications network.
  207. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  208. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  209. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  210. Martin,Robert; Tio,Cathy, Telecommunications portal capable of interpreting messages from an external device.
  211. Ellison,Carl M.; Dohrmann,Stephen H., Time varying presentation of items based on a key hash.
  212. Safa,John Aram, Transaction verification.
  213. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  214. Takagi, Tsuyoshi; Biehl, Ingrid; Paulus, Sachar, Undeniable digital signature scheme based on quadratic field.
  215. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  216. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  217. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  218. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  219. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  220. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  221. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  222. Suominen, Edwin A., Verification of signed digital documents.
  223. Suominen, Edwin A., Verification of signed video streams.
  224. Pasternak, Michael, Verification of template integrity of monitoring templates used for customized monitoring of system activities.
  225. Cohen, Alexander J.; Cohen, B. Isaac; Harlow, Ed; Leuthardt, Eric C.; Levien, Royce A.; Malamud, Mark A., Verifying a written expression.
  226. Hillis, W. Daniel; Ferren, Bran, Video game controller hub with control input reduction and combination schemes.
  227. Kirovski, Darko; Malvar, Henrique, Watermark detection via cardinality-scaled correlation.
  228. Anglin, Hugh W., Watermark systems and methods.
  229. Stone, Jonathan James; Pelly, Jason Charles; Gugenheim, Paul; DeLacour, Isabel; Foster, Richard; Collins, Andrew, Watermarking and transferring material.
  230. Stone,Jonathan James; Pelly,Jason Charles; Gugenheim,Paul; Delacour,Isabel; Foster,Richard; Collins,Andrew, Watermarking and transferring material.
  231. Kirovski, Darko; Malvar, Henrique, Watermarking with covert channel and permutations.
  232. Rosenberg, Jonathan B.; Harrison, John; Remy, David L.; Creighton, Neal L., Web site identity assurance.
  233. Rosenberg,Jonathan B.; Harrison,John C.; Remy,David L.; Creighton, Jr.,Neal L., Web site identity assurance.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로