$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Electronic watermark system electronic information distribution system and image filing apparatus 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/00
  • G06F-017/60
출원번호 US-0134516 (1998-08-14)
우선권정보 JP-0223929 (1997-08-20); JP-0223930 (1997-08-20); JP-0223931 (1997-08-20); JP-0223932 (1997-08-20)
발명자 / 주소
  • Keiichi Iwamura JP
출원인 / 주소
  • Canon Kabushiki Kaisha JP
대리인 / 주소
    Fitzpatrick, Cella, Harper & Scinto
인용정보 피인용 횟수 : 241  인용 특허 : 6

초록

Disclosed is an electronic watermark method, used for a network, comprising a plurality of entities, wherein provided weparately are an entity for embedding an electronic watermark in encrypted data that are exchanged by said plurality of entities, and an entity for performing an encryption process

대표청구항

1. An electronic watermark method used for a network system that includes a plurality of entities, wherein for the exchange of digital information by at least a first entity and a second entity of the plurality of entities,the first entity embeds an electronic watermark in the digital information, p

이 특허에 인용된 특허 (6)

  1. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  2. Saito Makoto,JPX, Data management system.
  3. Oishi Kazuomi,JPX, Digital signature method and communication system.
  4. Iwamura Keiichi (Kawasaki JPX) Yamamoto Takahisa (Kawasaki JPX), Encryption apparatus, communication system using the same and method therefor.
  5. Yamamoto Takahisa (Kawasaki JPX) Iwamura Keiichi (Kawasaki JPX), Encryption device and communication apparatus using same.
  6. Choudhury Abhijit K. (Scotch Plains NJ) Maxemchuk Nicholas F. (Mountainside NJ) Paul Sanjoy (Scotch Plains NJ) Schulzrinne Henning G. (Sterling NJ), Method of protecting electronically published materials using cryptographic protocols.

이 특허를 인용한 특허 (241)

  1. Kim, Yeo-jin; Oh, Yun-sang; Jung, Kyung-im, Apparatus and method for managing rights object.
  2. Hori,Koichi, Apparatus for preventing unauthorized use of a copyrighted medium.
  3. Rhoads, Geoffrey B.; Gustafson, Ammon E., Apparatus to process images and video.
  4. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  5. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  6. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  7. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  8. Davis, Bruce L.; Rhoads, Geoffrey B.; Conwell, William Y., Associating metadata with media signals, and searching for media signals using metadata.
  9. Hyser, Chris D., Authenticating and verifying an authenticable and verifiable module.
  10. Durst, David I.; Kaish, Norman; Fraser, Jay, Authentication method and system.
  11. Fraser, Jay, Authentication method and system.
  12. Fraser, Jay; Weber, Lawrence, Authentication method and system.
  13. Alattar, Adnan M., Authentication of physical and electronic media objects using digital watermarks.
  14. Alattar,Adnan M.; Carr,J. Scott; Seder,Phillip Andrew; Lofgren,Neil; Rhoads,Geoffrey B., Authentication of physical and electronic media objects using digital watermarks.
  15. Dabbish,Ezzat A.; Puhl,Larry C., Authentication of vehicle components.
  16. Rhoads, Geoffrey B., Authentication using a digital watermark.
  17. Rhoads,Geoffrey B.; Levy,Kenneth L., Content identifiers triggering corresponding responses.
  18. Tian, Jun; Stach, John, Content processing methods using reversible watermarking.
  19. Levy, Kenneth L.; Stager, Reed R.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Content sensitive connected content.
  20. Levy, Kenneth L.; Rhoads, Geoffrey B.; Stager, Reed R.; Rodriguez, Tony F., Context sensitive connected content.
  21. Schmelzer, Richard A., Copyright detection and protection system and method.
  22. Schmelzer, Richard A., Copyright detection and protection system and method.
  23. Schmelzer, Richard A., Copyright detection and protection system and method.
  24. Yoshida, Jun; Iwamura, Keiichi, Data processing apparatus and method and storage medium.
  25. Iwamura,Keiichi, Data processing method and apparatus.
  26. Iwamura,Keiichi, Data processing method and apparatus.
  27. Moskowitz, Scott A., Data protection method and device.
  28. Moskowitz, Scott A., Data protection method and device.
  29. Moskowitz, Scott A., Data protection method and device.
  30. Moskowitz, Scott A., Data protection method and device.
  31. Ramos, Daniel O.; Jones, Kevin C.; Rhoads, Geoffrey B., Decoding a watermark and processing in response thereto.
  32. Levy, Kenneth L.; Hannigan, Brett T.; Bradley, Brett A.; Rhoads, Geoffrey B., Deriving multiple identifiers from multimedia content.
  33. Wen, Xin; Honsinger, Chris W., Detecting embedded information in images.
  34. Emura, Koichi; Miyazaki, Seiya, Device for sharing anonymized information, and method for sharing anonymized information.
  35. Rhoads,Geoffrey B., Digital watermark and steganographic decoding.
  36. Rhoads,Geoffrey B., Digital watermark embedding and decoding using encryption keys.
  37. Iwamura,Keiichi; Kaneda,Kitahiro; Tamaru,Jun; Eguchi,Takami, Digital watermark embedding apparatus, digital watermark extraction apparatus, and methods thereof.
  38. Tamaru,Jun; Iwamura,Keiichi, Digital watermark extracting method, apparatus, program and storage medium.
  39. Iwamura,Keiichi, Digital watermark processing apparatus, and digital contents distribution system using the apparatus.
  40. Alattar,Adnan M.; Levy,Kenneth L.; Stager,Reed R.; Rhoads,Geoffrey B.; Ellingson,Eric E., Digital watermarking and fingerprinting including synchronization, layering, version control, and compressed embedding.
  41. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  42. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  43. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  44. Lofgren,Neil; Seder,Phillip Andrew; MacIntosh,Brian T., Digital watermarking systems.
  45. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  46. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  47. Levy, Kenneth L., Digital watermarking with variable orientation and protocols.
  48. Levy,Kenneth L., Digital watermarking with variable orientation and protocols.
  49. Brundage, Trent J.; Hannigan, Brett T.; Sharma, Ravi K., Distributed content identification.
  50. Rhoads, Geoffrey B.; Gustafson, Ammon E., Documents and methods involving multiple watermarks.
  51. Deguchi,Yuichiro, E-marker find music.
  52. Deguchi, Yuichiro, Electronic music marker device delayed notification.
  53. Deguchi,Yuichiro, Electronic music marker device delayed notification.
  54. Sharma, Ravi K.; Stach, John, Encoding and decoding auxiliary signals.
  55. Sharma, Ravi K.; Stach, John, Encoding and decoding auxiliary signals.
  56. Sharma,Ravi K.; Stach,John, Encoding and decoding signals for digital watermarking.
  57. Yokose, Taro, Encoding device, decoding device, encoding method, decoding method, and program therefor.
  58. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  59. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  60. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  61. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  62. Levy,Kenneth L.; Decker,Stephen K., Feature-based watermarks and watermark detection strategies.
  63. Levy,Kenneth L., Forensic digital watermarking with variable orientation and protocols.
  64. Deguchi, Yuichiro, GPS e-marker.
  65. Reed, Alastair M.; Brundage, Trent J., Hiding information out-of-phase in color channels.
  66. Wakao, Satoru; Iwamura, Keiichi; Nakamoto, Yasuhiro, Image data verification.
  67. Kaneda, Kitahiro; Iwamura, Keiichi; Ohta, Ken ichi; Ishida, Yoshihiro; Kato, Shinichi; Hayashi, Junichi; Tamaru, Jun; Eguchi, Takami, Image processing apparatus and method.
  68. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  69. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  70. Rhoads,Geoffrey B.; Gustafson,Ammon E., Inferring object status based on detected watermark data.
  71. Ogawa,Shigeho; Watanabe,Hiromasa, Information playback apparatus method and recording medium.
  72. Iwamura, Keiichi; Murakami, Tomochika; Wakao, Satoru, Information processing apparatus, information processing system, information processing method, storage medium and program.
  73. Iwamura,Keiichi; Murakami,Tomochika; Wakao,Satoru, Information processing apparatus, information processing system, information processing method, storage medium and program.
  74. Iwamura,Keiichi, Information processing system, information processing apparatus, and computer-readable recording medium.
  75. Levy,Kenneth L.; Hannigan,Brett T.; Bradley,Brett Alan; Rhoads,Geoffrey B., Integrating digital watermarks in multimedia content.
  76. Levy,Kenneth L.; Hannigan,Brett T.; Bradley,Brett A.; Rhoads,Geoffrey B., Integrating steganographic encoding in multimedia content.
  77. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  78. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  79. Kawaguchi,Yuichi; Shimizu,Yuji; Tsumori,Shinichi; Katsura,Takashi; Inoue,Hisashi, Justification authenticating system, personal certificate issuing system, and personal certificate.
  80. Barr, John Kennedy; Bradley, Brett A.; Hannigan, Brett T.; Alattar, Adnan M.; Durst, Robert, Layered security in digital watermarking.
  81. Bradley, Brett A.; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  82. Bradley, Brett Alan; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  83. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  84. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  85. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  86. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  87. Levy, Kenneth L., Method and apparatus for embedding auxiliary information within original data.
  88. Levy,Kenneth Lee, Method and apparatus for embedding auxiliary information within original data.
  89. Ikezoye, Vance E.; Schrempp, James B., Method and apparatus for identifying media content presented on a media playing device.
  90. Ikezoye, Vance E.; Schrempp, James B., Method and apparatus for identifying media content presented on a media playing device.
  91. Okayama, Nobuya; Orimo, Masayuki; Koike, Hiroshi; Onimaru, Hiroya; Ichihara, Seiji, Method and apparatus for selling digital contents, processing program thereof and recording medium for the program.
  92. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  93. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  94. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  95. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  96. Fehr,Walton L.; Dabbish,Ezzat A.; Levenson,Samuel M.; Puhl,Larry C.; Reinold,Jurgen, Method and system for authorizing reconfiguration of a vehicle.
  97. Levenson,Samuel M.; Bruner,John D.; Dabbish,Ezzat A.; Fehr,Walton L.; Puhl,Larry C.; Reinold,Jurgen, Method and system for component authentication of a vehicle.
  98. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  99. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  100. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  101. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  102. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  103. Deguchi,Yuichiro, Method and system for identifying a time specific event.
  104. Chui, Charles K., Method and system for secure key exchange.
  105. Dabbish,Ezzat A.; Fehr,Walton L.; Levenson,Samuel M.; Puhl,Larry C.; Reinold,Jurgen, Method and system for technician authentication of a vehicle.
  106. Dabbish,Ezzat A.; Puhl,Larry C., Method and system for vehicle authentication of a component class.
  107. Fehr,Walton L.; Levenson,Samuel M.; Reinold,Jurgen, Method and system for vehicle authentication of a remote access device.
  108. Reinold, Jurgen; Fehr, Walton L.; Levenson, Samuel M., Method and system for vehicle authentication of another vehicle.
  109. Fehr, Walton L.; Dabbish, Ezzat A.; Levenson, Samuel M.; Puhl, Larry C.; Reinold, Jurgen, Method and system for vehicle authorization of a service technician.
  110. Fransdonk,Robert, Method and system to provide secure key selection using a secure device in a watercrypting environment.
  111. White,Mark Andrew George; Wajs,Andrew Augustine, Method and system to uniquely associate multicast content with each of multiple recipients.
  112. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  113. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  114. Honsinger, Chris W., Method for generating a dispersed message for data embedding.
  115. Rhoads,Geoffrey B.; Gustafson,Ammon E., Method for utilizing fragile watermark for enhanced security.
  116. Burns,Gregory, Method for watermarking computer programs.
  117. Burns,Gregory, Method for watermarking computer programs.
  118. Dunkeld, Bryan; Lambert, Edward, Method of providing a digital asset for distribution.
  119. Hamid, Laurence; Krahn, Darren, Method of providing assured transactions by watermarked file display verification.
  120. Hamid, Laurence, Method of providing assured transactions using secure transaction appliance and watermark verification.
  121. Hamid, Laurence; Krahn, Darren, Method of providing transactions employing advertising based verification.
  122. Brunk,Hugh L.; Levy,Kenneth L., Method, apparatus and programs for generating and utilizing content signatures.
  123. Iwamura,Keiichi, Method, apparatus, and system for processing information by attaching information to digital data, and storage medium storing computer-readable program codes to carry out the method.
  124. Chen, Jianming; Zheng, Xiaosheng, Method, device, and system for encrypting and decrypting image.
  125. Rhoads, Geoffrey B.; Rodriguez, Tony F., Methods and devices employing content identifiers.
  126. Rhoads, Geoffrey B., Methods and devices responsive to ambient audio.
  127. Rhoads, Geoffrey B., Methods and systems employing digital content.
  128. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  129. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  130. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  131. Rhoads, Geoffrey B.; Hein, III, William C.; Levy, Kenneth L., Methods for linking from objects to remote resources.
  132. Rhoads,Geoffrey B.; Gustafson,Ammon E., Methods to evaluate images, video and documents.
  133. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  134. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  135. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  136. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  137. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  138. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  139. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  140. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  141. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  142. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  143. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  144. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  145. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  146. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  147. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  148. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  149. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  150. Rhoads,Geoffrey B.; Gustafson,Ammon E., Multiple watermarks in content.
  151. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  152. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  153. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  154. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  155. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  156. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  157. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  158. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  159. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  160. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  161. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  162. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  163. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  164. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  165. Schrempp, James B.; Ikezoye, Vance; Wold, Erling H.; Blum, Thomas L.; Keislar, Douglas F.; Wheaton, James A., Play list generation method and apparatus.
  166. Schrempp, James B.; Ikezoye, Vance; Wold, Erling H.; Blum, Thomas L.; Keislar, Douglas F.; Wheaton, James A., Playlist generation method and apparatus.
  167. Levy, Kenneth L.; Hiatt, R. Stephen; Rhoads, Geoffrey B., Processing audio or video content with multiple watermark layers.
  168. Tian, Jun; Stach, John, Progressive image quality control using watermarking.
  169. Brundage,Trent J.; Hannigan,Brett T.; Sharma,Ravi K., Progressive watermark decoding on a distributed computing platform.
  170. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  171. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  172. Peinado, Marcus; England, Paul; Yerrace, Frank, Releasing decrypted digital content to an authenticated path.
  173. Peinado,Marcus; England,Paul; Yerrace,Frank, Releasing decrypted digital content to an authenticated path.
  174. Beck, Robert L.; Fullerton, Benjamin K.; Scott, Eric W., Request linked digital watermarking.
  175. Wuidart,Luc; Balthazar,Pierre, Secure multimedia data transmission method.
  176. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  177. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  178. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  179. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  180. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  181. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  182. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  183. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  184. Moskowitz,Scott A., Security based on subliminal and supraliminal channels for data objects.
  185. Rowe, Michelle M.; Odhner, Matthew C.; Thomas, Michael W.; Multerer, Boyd C.; Cox, Tom A.; Nace, Eric W., Server stress-testing response verification.
  186. Levine,Earl; Wiser,Philip R., Server-side watermark data writing method and apparatus for digital signals.
  187. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifiying security for an element by assigning a scaled value representative of the relative security thereof.
  188. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  189. Peinado, Marcus; Abburi, Rajasekhar; Bell, Jeffrey R. C., Specifying security for an element by assigning a scaled value representative of the relative security thereof.
  190. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  191. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  192. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  193. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  194. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  195. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  196. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  197. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  198. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  199. Shasa, Shaheen, System and method for associating device information with digital images.
  200. Halsema, Aillil I.; Onaga, May G.; Lin, Jie; Manchala, Daniel W., System and method for controlling access to personal identification information contained in documents.
  201. Sun, Zhaohui Harry; Graichen, Catherine Mary; Bufi, Corey Nicholas; Hoogs, Anthony James; Markham, Aaron Shaw; Deb, Budhaditya; Collins, Roderic Greene; Wilkinson, Michael Shane; Anderson, Anthony Christopher; Weisenberg Williams, Jenny Marie, System and method for forensic analysis of media works.
  202. Sun, Zhaohui; Graichen, Catherine Mary; Bufi, Corey Nicholas; Hoogs, Anthony James; Markham, Aaron Shaw; Deb, Budhaditya; Collins, Roderic Greene; Wilkinson, Michael Shane; Anderson, Anthony Christopher; Weisenberg, Jenny Marie, System and method for forensic analysis of media works.
  203. Dunkeld, Bryan; Lambert, Edward, System and method for unique digital asset identification and transaction management.
  204. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  205. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  206. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  207. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  208. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  209. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  210. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  211. Wold, Erling, System for identifying content of digital data.
  212. Wold, Erling, System for identifying content of digital data.
  213. Wold, Erling, System for identifying content of digital data.
  214. Wold, Erling, System for identifying content of digital data.
  215. Gruse, George Gregory; Dorak, Jr., Jonn J.; Milsted, Kenneth Louis, System for tracking end-user electronic content usage.
  216. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  217. Ramos, Daniel O.; Jones, Kevin C.; Rhoads, Geoffrey B., Systems and methods for processing content objects.
  218. Home, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  219. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Homing, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan, Systems and methods for watermarking software and other media.
  220. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  221. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  222. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  223. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  224. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  225. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  226. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  227. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  228. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  229. Tewfik, Ahmed; Swanson, Mitchell D.; Zhu, Bin, Transactional watermarking.
  230. Levy, Kenneth L., Transmarking of multimedia signals.
  231. Levy,Kenneth L., Transmarking of multimedia signals.
  232. Garside, Vic; Friedman, Jay; Schrempp, James; Williams, Robert, Using digital fingerprints to associate data with a work.
  233. Garside, Vic; Friedman, Jay; Schrempp, James; Williams, Robert, Using digital fingerprints to associate data with a work.
  234. Levy, Kenneth L., Using embedded data with file sharing.
  235. Levy, Kenneth L., Using object identifiers with content distribution.
  236. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  237. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  238. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  239. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  240. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  241. Anglin, Hugh W., Watermark systems and methods.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로