$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure distribution of digital representations

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04N-017/00
출원번호 US-0021339 (1998-02-10)
발명자 / 주소
  • Zhao Jian
  • Koch Eckhard,DEX
  • Saito Makoto,JPX
출원인 / 주소
  • Mitsubishi Corporation, JPX
대리인 / 주소
    Nelson
인용정보 피인용 횟수 : 264  인용 특허 : 5

초록

Techniques for secure distribution of digital representations that combine encryption and watermarking. When a user at a client desires to download a digital representation, the user makes a request to a server for the digital representation, which encrypts the digital representation using a first k

대표청구항

[ What is claimed is:] [1.] Apparatus for manipulating an encrypted digital representation of a work that is received in the apparatus from an external source of digital representations, the apparatus comprising:a manipulator which causes the digital representation to be decrypted and further operat

이 특허에 인용된 특허 (5)

  1. Saito Makoto,JPX, Data management system.
  2. Houser Peter B. (Poway CA) Adler James M. (Ocean Beach CA), Electronic document verification system and method.
  3. Moskowitz Scott A. ; Cooperman Marc, Method and system for digital watermarking.
  4. Moskowitz Scott A. ; Cooperman Marc, Method for human-assisted random key generation and application for digital watermark system.
  5. Leighton Frank Thomson (15 Charlesden Park Newtonville MA 02160), Watermarking process resilient to collusion attacks.

이 특허를 인용한 특허 (264)

  1. Dorwin, David Kimbal; Colwell, Aaron James; Scherkus, Andrew Martin; Galligan, Francis, Allowing degraded play of protected content using scalable codecs when key/license is not obtained.
  2. Malone, Michael F., Apparatus and method for embedding searchable information into a file for transmission, storage and retrieval.
  3. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information into a file for transmission, storage and retrieval.
  4. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information into a file, encryption, transmission, storage and retrieval.
  5. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval.
  6. Malone, Michael F.; Murphy, Frederick J., Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval.
  7. Malone, Michael F.; Murphy, Frederick J., Apparatus and method to embed searchable information into a file, encryption, transmission, storage and retrieval.
  8. Malone, Michael F., Apparatus for personal voice assistant, location services, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatag(s)/ contextual tag(s), storage and search retrieval.
  9. Malone, Michael F., Apparatus for voice assistant, location tagging, multi-media capture, transmission, speech to text conversion, photo/video image/object recognition, creation of searchable metatags/contextual tags, storage and search retrieval.
  10. Dorwin, David Kimbal, Application-driven playback of offline encrypted content with unaware DRM module.
  11. Dorwin, David Kimbal, Application-driven playback of offline encrypted content with unaware DRM module.
  12. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  13. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  14. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  15. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  16. Hawes, Jonathan L., Associating media through encoding.
  17. Foygel, Dan A.; Lemkin, Jason M.; Zwelling, Jeffrey M., Automatic document exchange and execution management.
  18. Foygel, Dan A.; Lemkin, Jason M.; Zwelling, Jeffrey M., Automatic document exchange with archiving capability.
  19. Foygel, Dan A.; Lemkin, Jason M.; Zwelling, Jeffrey M., Automatic document exchange with document searching capability.
  20. Talmor, Eli; Talmor, Rita; Talmor, Alon, Biometric-based system and method for enabling authentication of electronic messages sent over a network.
  21. Vannier, Eric; Dorwin, David Kimbal, Browser/web apps access to secure surface.
  22. Evans, Gregory Morgan; Roberts, Thomas A., Client-side protection of broadcast or multicast content for non-real-time playback.
  23. Evans, Gregory Morgan; Roberts, Thomas A.; Adams, Cheryl, Client-side watermarking using hybrid I-Frames.
  24. Evans, Gregory Morgan; Roberts, Thomas A.; Adams, Cheryl, Client-side watermarking using hybrid I-frames.
  25. Evans, Gregory Morgan; Roberts, Thomas A.; Adams, Cheryl, Client-side watermarking using hybrid I-frames.
  26. Evans, Gregory Morgan; Roberts, Thomas A.; Adams, Cheryl, Client-side watermarking using hybrid I-frames.
  27. Reed,Alastair M.; Rhoads,Geoffrey B., Color adaptive watermarking.
  28. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  29. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  30. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  31. Reed, Alastair M; Rhoads, Geoffrey B, Color image or video processing.
  32. Liu, Zaide; Cinquini, Maurice Johnny, Content defacement protection system.
  33. Levy, Kenneth L.; Stager, Reed R.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Content sensitive connected content.
  34. Levy, Kenneth L.; Rhoads, Geoffrey B.; Stager, Reed R.; Rodriguez, Tony F., Context sensitive connected content.
  35. Fujii, Yoshihiro; Okada, Koji; Mayuzumi, Hiroyuki; Tajiri, Masahisa, Cooperation service providing system and server apparatus.
  36. Kato Taku,JPX ; Kato Takehisa,JPX ; Endoh Kenjiro,JPX ; Yamada Hisashi,JPX ; Endoh Naoki,JPX, Copy protection apparatus and information recording medium used in this copy protection apparatus.
  37. Taku Kato JP; Takehisa Kato JP; Kenjiro Endoh JP; Hisashi Yamada JP; Naoki Endoh JP, Copy protection apparatus and information recording medium used in this copy protection apparatus.
  38. Kim, Hyung Sun; Stechkine, Alexandre; Kim, Byung Jin; Um, Soung Hyun, Copy protection method and system for digital media.
  39. Morishita, Takuya, Cryptosystem key updating system and method for preventing illegal use of software.
  40. Dorwin, David Kimbal, DRM provider interoperability.
  41. Taniguchi,Masaaki; Shimuzu,Shuhichi; Kamijoh,Kohichi, Data processing apparatus, image processing apparatus, and method therefor.
  42. Moskowitz, Scott A., Data protection method and device.
  43. Moskowitz, Scott A., Data protection method and device.
  44. Moskowitz, Scott A., Data protection method and device.
  45. Moskowitz, Scott A., Data protection method and device.
  46. Jost, Uwe Helmut; Woodland, Philip Charles; Katz, Marcel; Shahid, Syed Raza; Vozila, Paul J.; Ganong, III, William F., Data shredding for speech recognition acoustic model training under data retention restrictions.
  47. Jost, Uwe Helmut; Woodland, Philip Charles; Katz, Marcel; Shahid, Syed Raza; Vozila, Paul J.; Ganong, III, William F., Data shredding for speech recognition language model training under data retention restrictions.
  48. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark or derived identifier proxy.
  49. Levy, Kenneth L.; Meyer, Joel R., Deriving multiple fingerprints from audio or video content.
  50. Dorwin, David Kimbal; Scherkus, Andrew Martin, Detecting supported digital rights management configurations on a client device.
  51. Jones,Kevin C.; Aggson,Cynthia K.; Rodriguez,Tony F.; Mosher,Brian; Levy,Kenneth L.; Hiatt,R. Stephen; Rhoads,Geoffrey B., Digital asset management and linking media signals with related data using watermarks.
  52. Iwamura,Keiichi, Digital watermark processing apparatus, and digital contents distribution system using the apparatus.
  53. Levy, Kenneth L., Digital watermarking and fingerprinting applications for copy protection.
  54. Alattar,Adnan M.; Levy,Kenneth L.; Stager,Reed R.; Rhoads,Geoffrey B.; Ellingson,Eric E., Digital watermarking and fingerprinting including synchronization, layering, version control, and compressed embedding.
  55. Alattar, Adnan M.; Lin, Eugene T.; Celik, Mehmet U., Digital watermarking of low bit rate video.
  56. Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  57. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  58. Tewfik,Ahmed, Digital watermarking with content dependent keys and autocorrelation properties for synchronization.
  59. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  60. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  61. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  62. Jones,Kevin C., Digital watermarks as a gateway and control mechanism.
  63. Diehl, Eric, Distribution of digital content protected by watermark-generating password.
  64. Smith, Mark D.; Simmons, John D., Document genealogy.
  65. Cheng, Ericson W.; Pradenas, Ricardo Dario; Russo, Anthony P.; Weigand, David L., Dynamic finger detection mechanism for a fingerprint sensor.
  66. Swildens, Eric Sven-Johan; Liu, Zaide; Day, Richard David; Chetal, Pradeep Kumar, Dynamic multimedia fingerprinting system.
  67. Dorwin, David Kimbal, Dynamically changing stream quality of protected content based on a determined change in a platform trust.
  68. Dorwin, David Kimbal, Dynamically changing stream quality when user is unlikely to notice to conserve resources.
  69. Thorwirth, Niels J., Efficient watermarking approaches of compressed media.
  70. Thorwirth, Niels J., Efficient watermarking approaches of compressed media.
  71. Shibuya,Akio; Watabe,Yuki, Electronic commerce information processing system and method.
  72. Iwamura, Keiichi, Electronic watermarking method, digital information distribution system using such method, and storage medium storing program of such method.
  73. Nakamura, Taiga; Tachibana, Ryuki; Shimizu, Shuichi; Kobayashi, Seiji, Embedding, processing and detection of digital content, information and data.
  74. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  75. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  76. Dorwin, David Kimbal, Extending browser functionality with dynamic on-the-fly downloading of untrusted browser components.
  77. Rhoads, Geoffrey B.; Levy, Kenneth L., Fingerprint methods and systems for media signals.
  78. Rhoads, Geoffrey B.; Rodriguez, Anthony, Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  79. Rhoads, Geoffrey B.; Rodriguez, Tony F., Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  80. Rhoads,Geoffrey B., Geographically watermarked imagery and methods.
  81. Evans, Gregory M., High-speed WAN to wireless LAN gateway.
  82. Evans, Gregory Morgan, High-speed WAN to wireless LAN gateway.
  83. Evans, Gregory Morgan, High-speed WAN to wireless LAN gateway.
  84. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  85. Patterson,Phillip R.; Clements,Lorie; Lofgren,Neil A.; Rhoads,Geoffrey B., Image management system and methods using digital watermarks.
  86. Sato, Hajime, Image processing apparatus, image processing method and storage.
  87. Weidenfeller, Thomas, Information presentation device and method.
  88. Hamada,Ichiro; Fujii,Asako, Information processing apparatus, information processing method and providing medium.
  89. Adams, Cheryl; Evans, Gregory Morgan; Roberts, Thomas A., Interconnect device to enable compliance with rights management restrictions.
  90. Evans, Gregory Morgan; Adams, Cheryl, Interconnect device to enable compliance with rights management restrictions.
  91. Evans, Gregory Morgan; Adams, Cheryl, Interconnect device to enable compliance with rights management restrictions.
  92. Venkatesan, Ramarathnam; Yacobi, Yacov, License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer.
  93. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  94. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  95. St. Jacques, Brian; Rogers, Michael, Low-profile or ultra-thin navigation pointing or haptic feedback device.
  96. Wehrenberg, Paul J., Method and apparatus for copy protection.
  97. Wehrenberg, Paul J., Method and apparatus for copy protection.
  98. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  99. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  100. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  101. Levy,Kenneth Lee, Method and apparatus for embedding auxiliary information within original data.
  102. Chandersekaran, Coimbatore S.; Gennaro, Rosario; Gupta, Sarbari; Matyas, Jr., Stephen M.; Safford, David R.; Zunic, Nevenko, Method and apparatus for providing interoperability between key recovery and non-key recovery systems.
  103. Vorbr��ggen,Jan C.; Kubbilun,Wolfgang; Koch,Eckhard; Kubbilun,Ingo A.; Bickenbach,Hans Joachim; Belke,Marcus, Method and device for confirming the authenticity of a document and a safe for storing data.
  104. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  105. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  106. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  107. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  108. Knox, Christopher R.; Lisiecki, Philip A.; Mutton, James; Bernard, Chuck; Lalwani, Ashok; Law, Will; Devanneaux, Thomas, Method and system for HTTP-based stream delivery.
  109. Hua, You-Wei, Method and system for adding and detecting watermark.
  110. Vatanen,Harri, Method and system for application of a safety marking.
  111. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  112. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  113. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  114. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  115. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  116. Rhoads,Geoffrey B., Method and system for managing and controlling electronic media.
  117. Rhoads,Geoffrey B., Method and system for managing, accessing and paying for the use of copyrighted electronic media.
  118. Sasaki, Ryuichi; Mineno, Yusuke; Washimi, Kazuo, Method and system for monitoring use of digital works.
  119. Herley, Cormac E., Method and system for processing digital objects.
  120. Chen, Sherman Xuemin; Rodgers, Stephane, Method and system for robust watermark insertion and extraction for digital set-top boxes.
  121. Chen, Xuemin; Rodgers, Stephane, Method and system for robust watermark insertion and extraction for digital set-top boxes.
  122. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  123. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  124. Malone, Michael F., Method for multi-media capture, transmission, conversion, metatags creation, storage and search retrieval.
  125. Malone, Michael F., Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval.
  126. Malone, Michael F., Method for multi-media recognition, data conversion, creation of metatags, storage and search retrieval.
  127. Dorwin, David Kimbal; Finnan, Hugh, Method for reducing time to first frame/seek frame of protected digital content streams.
  128. Un,Kang Chun, Method for securely managing information in database.
  129. Malone, Michael F., Method for voice command activation, multi-media capture, transmission, speech conversion, metatags creation, storage and search retrieval.
  130. Burns, Gregory, Method for watermarking computer programs.
  131. Burns,Gregory, Method for watermarking computer programs.
  132. Burns,Gregory, Method for watermarking computer programs.
  133. Silverstein,D. Amnon, Method of and system for edge watermarking of an image.
  134. Dunkeld, Bryan; Lambert, Edward, Method of providing a digital asset for distribution.
  135. Dorwin, David Kimbal; Scherkus, Andrew; Kaiser, Christian; Lacey, Stephen John, Method, manufacture, and apparatus for configuring multiple content protection systems.
  136. Dorwin, David Kimbal, Method, manufacture, and apparatus for content decryption module.
  137. Dorwin, David Kimbal; Scherkus, Andrew; Lacey, Stephen John; Kaiser, Christian, Method, manufacture, and apparatus for content protection for HTML media elements.
  138. Dorwin, David Kimbal; Scherkus, Andrew; Kaiser, Christian, Method, manufacture, and apparatus for content protection using authentication data.
  139. Dorwin, David Kimbal, Method, manufacture, and apparatus for instantiating plugin from within browser.
  140. Dorwin, David Kimbal; Scherkus, Andrew Martin, Method, manufacture, and apparatus for protection of media objects from the web application environment.
  141. Rhoads, Geoffrey B., Methods and devices responsive to ambient audio.
  142. Work, William; Work, Telford; Ito, Masashi, Methods and systems for clinical trial data management.
  143. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  144. Rhoads,Geoffrey B., Methods for steganographic encoding media.
  145. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  146. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  147. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  148. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  149. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  150. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  151. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  152. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  153. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  154. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  155. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  156. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  157. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  158. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  159. Adams, Cheryl; Evans, Gregory Morgan, Multiple watermarks for digital rights management (DRM) and content tracking.
  160. Rhoads, Geoffrey B., Music methods and systems.
  161. Ikeda, Takashi; Okamoto, Tetsuo; Yanase, Tsutomu, Music-content using apparatus capable of managing copying of music content, and program therefor.
  162. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  163. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  164. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  165. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  166. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  167. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  168. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  169. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  170. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  171. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  172. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  173. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  174. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  175. Shibuya,Akio; Watabe,Yuki, Order processing system and method.
  176. Venkatesan, Ramarathnam; Yacobi, Yacov, Passive and active software objects containing bore resistant watermarking.
  177. Evans, Gregory M.; Evans, James; Walsh, Richard J., Personalized broadcast system.
  178. Evans, Gregory Morgan; Evans, James; Walsh, Richard J., Personalized broadcast system.
  179. Zhuk, Oscar V.; Morten, Glenn A.; Hiar, Edward Charles, Preventing unauthorized modification or skipping of viewing of advertisements within content.
  180. Gilg, Thomas J., Printing of encrypted print content.
  181. Levy, Kenneth L.; Hiatt, R. Stephen; Rhoads, Geoffrey B., Processing audio or video content with multiple watermark layers.
  182. Kuzmich, Vsevolod M.; Ivanov, Igor O., Proprietary watermark system for secure digital media and content distribution.
  183. Ganong, III, William F.; Vozila, Paul J., Protection of private information in a client/server automatic speech recognition system.
  184. Brookins, Nicholas S.; Olugbile, Akinwale O.; So, Ronnie; Ludin, Stephen L., Proxy server with byte-based include interpreter.
  185. Dorwin, David Kimbal, Reducing time to first encrypted frame in a content stream.
  186. Evans, Gregory Morgan; Roberts, Thomas A.; Adams, Cheryl, Remote monitoring of media content that is associated with rights management restrictions.
  187. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  188. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  189. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  190. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  191. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  192. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  193. Rhoads,Geoffrey B., Securing media content with steganographic encoding.
  194. Ganong, III, William F.; Bisani, Maximilian, Securing speech recognition data.
  195. Ganong, III, William F.; Bisani, Maximilian, Securing speech recognition data.
  196. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  197. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  198. Roberts, Thomas A.; Evans, Gregory Morgan; Adams, Cheryl, Selection of I-frames for client-side watermarking.
  199. Roberts, Thomas A.; Evans, Gregory Morgan; Adams, Cheryl, Selection of I-frames for client-side watermarking.
  200. Rhoads, Geoffrey B.; Carr, J. Scott, Steganographic data hiding using a device clock.
  201. Carr, J. Scott; Lofgren, Neil E.; Seder, Phillip Andrew, Steganographic encoding methods and apparatus.
  202. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  203. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  204. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  205. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  206. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  207. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  208. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  209. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  210. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  211. Hughes, David, System and method for controlling the use and duplication of digital content distributed on removable media.
  212. Hughes, David, System and method for controlling the use and duplication of digital content distributed on removable media.
  213. Dunkeld, Bryan; Lambert, Edward, System and method for unique digital asset identification and transaction management.
  214. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  215. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  216. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  217. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  218. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  219. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  220. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  221. Russo, Anthony P.; Yang, Wayne, System for and method of assigning confidence values to fingerprint minutiae points.
  222. Howell, Mark J.; Russo, Anthony P.; Tsuchiya, Marcia; Chen, Frank H., System for and method of finger initiated actions.
  223. Russo, Anthony P.; Weigand, David L., System for and method of generating rotational inputs.
  224. Zabroda, Oleksiy; Cheng, Ericson W.; Ngo, Hung Xuan, System for and method of protecting an integrated circuit from over currents.
  225. Malone, Michael F.; Murphy, Frederick J., System for embedding searchable information, encryption, signing operation, transmission, storage and retrieval.
  226. Hyakutake, Shogo; Ishizuka, Hiroaki; Aoshima, Minoru; Kizawa, Akio; Kitada, Hiroshi, System, computer program product and method for managing documents.
  227. Hyakutake, Shogo; Ishizuka, Hiroaki; Aoshima, Minoru; Kizawa, Akio; Kitada, Hiroshi, System, computer program product and method for managing documents.
  228. Hyakutake,Shogo; Ishizuka,Hiroaki; Aoshima,Minoru; Kizawa,Akio; Kitada,Hiroshi, System, computer program product and method for managing documents.
  229. Morten, Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  230. Morten,Glenn A., System, method, and apparatus for securely providing content viewable on a secure device.
  231. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  232. Lunt,Teresa F.; Franklin,Matthew K., Systems and methods for policy based printing.
  233. Ramos, Daniel O.; Jones, Kevin C.; Rhoads, Geoffrey B., Systems and methods for processing content objects.
  234. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  235. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  236. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  237. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  238. Shear, Victor H.; Sibert, W. Olin; Van Wie, David M., Systems and methods using cryptography to protect secure computing environments.
  239. Levy, Kenneth L.; Meyer, Joel R.; Andrews, III, Hoyet Harrison, Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities.
  240. Yang, Wayne; Krishnapura, Rohini, Systems for and methods of providing inertial scrolling and navigation using a fingerprint sensor calculating swiping speed and length.
  241. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  242. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  243. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  244. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  245. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  246. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  247. Dorwin, David Kimbal; Sleevi, Ryan David; Scherkus, Andrew Martin, Use of generic (browser) encryption API to do key exchange (for media files and player).
  248. Landwehr, John; Hock, Chris, User discernible watermarking.
  249. Levy,Kenneth L., User-friendly rights management systems and methods.
  250. Levy, Kenneth L., Using embedded data with file sharing.
  251. Levy, Kenneth L., Using embedded data with file sharing.
  252. Levy, Kenneth L., Using embedded data with file sharing.
  253. Levy, Kenneth L., Using object identifiers with content distribution.
  254. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  255. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  256. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  257. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  258. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  259. Alattar, Adnan M., Video fingerprinting to identify video content.
  260. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  261. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  262. Zhao, Jian; Picard, Justin; Thorwirth, Niels, Visible authentication patterns for printed document.
  263. Hurtado, Marco M.; Milsted, Kenneth L.; Nguyen, Kha D., Watermarking system that executes received watermarking instructions to embed a watermark.
  264. Rodriguez,Ismael, Watermarks for secure distribution of digital data.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트