$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Methods and systems for encoding and protecting data using digital signature and watermarking techniques

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-001/26
출원번호 US-0588652 (2000-06-07)
발명자 / 주소
  • Serret-Avila, Xavier
  • Boccon-Gibod, Gilles
출원인 / 주소
  • InterTrust Technologies Corp.
대리인 / 주소
    Finnegan, Henderson, Farabow, Garrett & Dunner, L.L.P.
인용정보 피인용 횟수 : 391  인용 특허 : 28

초록

Systems and methods are provided for protecting and managing electronic data signals that are registered in accordance with a predefined encoding scheme, while allowing access to unregistered data signals. In one embodiment a relatively hard-to-remove, easy-to-detect, strong watermark is inserted in

대표청구항

1. A method for protecting a digital file against unauthorized modification, the method including:encoding the file, the encoding including:inserting a first watermark into the file;inserting a plurality of signature-containing watermarks into the file, each signature-containing watermark containing

이 특허에 인용된 특허 (28)

  1. Saliba George A. (Northboro MA), Adaptive compression caching for tape recording.
  2. Petrovic Rade ; Winograd Joseph M. ; Jemili Kanaan ; Metois Eric, Apparatus and method for encoding and decoding information in analog signals.
  3. Wolosewicz Jack ; Jemili Kanaan, Apparatus and method for encoding and decoding information in analog signals.
  4. Wolosewicz Jack, Apparatus and method for encoding and decoding information in audio signals.
  5. Wolosewicz Jack, Apparatus and method for encoding and decoding information in audio signals.
  6. Copeland Gregory C., Apparatus for inserting blanked formatted fingerprint data (source ID, time/date) in to a video signal.
  7. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  8. Bhaskaran Vasudev ; Ratnakar Viresh, Fragile watermarks for detecting tampering in images.
  9. Kanamaru Hitoshi,JPX, Information recording method and apparatus, function recording method and apparatus, and information reproducing method.
  10. Griswold Gary N., Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a.
  11. Ryan John O. (Cupertino CA), Method and apparatus for copy protection for various recording media.
  12. Copeland Gregory C. (San Jose CA) Ryan John O. (Cupertino CA), Method and apparatus for copy protection for various recording media using a video finger print.
  13. Barton James M., Method and apparatus for embedding authentication information within digital data.
  14. Winograd Joseph M. ; Petrovic Rade ; Metois Eric ; Jemili Kanaan, Method and apparatus for preventing removal of embedded information in cover signals.
  15. Sako Yoichiro,JPX ; Osawa Yoshitomo,JPX ; Kurihara Akira,JPX ; Kawashima Isao,JPX ; Yoneyama Shigeyuki,JPX, Method for appending a signal with ciphered playback mode information.
  16. Moskowitz Scott A. ; Cooperman Marc, Method for human-assisted random key generation and application for digital watermark system.
  17. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  18. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  19. Rhoads Geoffrey B. (West Linn OR), Steganography methods employing embedded calibration data.
  20. Cookson Christopher J. ; Ostrover Lewis S., System and method for controlling copying and playing of digital programs.
  21. Shear Victor H. ; Van Wie David M. ; Weber Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  22. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  23. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  24. Shear Victor H. ; Sibert W. Olin ; Van Wie David M., Systems and methods using cryptography to protect secure computing environments.
  25. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  26. Crandall Gary E., Text file compression system utilizing word terminators.
  27. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  28. Girod Bernd,DEX ; Hartung Frank H. D.,DEX, Watermarking method and apparatus for compressed digital video.

이 특허를 인용한 특허 (391)

  1. Stolfo, Salvatore J; Wang, Ke, Apparatus method and medium for detecting payload anomaly using N-gram distribution of normal data.
  2. Stolfo, Salvatore J; Wang, Ke, Apparatus method and medium for detecting payload anomaly using N-gram distribution of normal data.
  3. Stolfo, Salvatore J.; Wang, Ke, Apparatus method and medium for detecting payload anomaly using n-gram distribution of normal data.
  4. Stolfo, Salvatore J., Apparatus method and medium for tracing the origin of network transmissions using N-gram distribution of data.
  5. Stolfo, Salvatore J., Apparatus method and medium for tracing the origin of network transmissions using N-gram distribution of data.
  6. Stolfo, Salvatore J., Apparatus method and medium for tracing the origin of network transmissions using n-gram distribution of data.
  7. Rhoads, Geoffrey B.; Gustafson, Ammon E., Apparatus to process images and video.
  8. Davis, Bruce L.; Rhoads, Geoffrey B.; Conwell, William Y., Associating metadata with media signals, and searching for media signals using metadata.
  9. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Asymmetric watermark embedding/extraction.
  10. Ahuja, Ratinder Paul Singh; Deninger, William; de la Iglesia, Erik; Lowe, Rick, Attributes of captured objects in a capture system.
  11. Ahuja, Ratinder Paul Singh; Deninger, William; de la Iglesia, Erik; Lowe, Rick, Attributes of captured objects in a capture system.
  12. Deninger, William; de la Iglesia, Erik, Attributes of captured objects in a capture system.
  13. Deninger, William; de la Iglesia, Erik, Attributes of captured objects in a capture system.
  14. Deninger, William; de la Iglesia, Erik, Attributes of captured objects in a capture system.
  15. Nam,Su hyun; Kim,Yun sang; Choi,Yang lim, Audio/video stream processing system and method for data copy protection.
  16. Levy,Kenneth L.; Tian,Jun, Authenticating media signals by adjusting frequency characteristics to reference values.
  17. Rodriguez, Tony F.; Reed, Alastair M.; Sharma, Ravi K.; Alattar, Osama M.; Hannigan, Brett T.; Levy, Kenneth L.; Brunk, Hugh L.; Rhoads, Geoffrey B.; Gustafson, Ammon E., Automated methods for distinguishing copies from original printed objects.
  18. Appelman, Barry, Caching signatures.
  19. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Circumvention of watermark analysis in a host content.
  20. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Circumvention of watermark analysis in a host content.
  21. Silverbrook, Kia; Lapstun, Paul, Computer system incorporating a target and symbol data sensing arrangement.
  22. Petrovic, Rade; Zhao, Jian; Winograd, Joseph M., Conditional access using embedded watermarks.
  23. Reed, Alastair M.; Bradley, Brett A., Conditioning imagery to better receive steganographic encoding.
  24. Gaitonde, Jitendra B., Configuration management for a capture/registration system.
  25. Levy, Kenneth L.; Rhoads, Geoffrey B.; Brunk, Hugh L., Connected audio and other media objects.
  26. Winograd, Joseph M.; Petrovic, Rade; Zhao, Jian, Content access management using extracted watermark information.
  27. Maher, David P.; Khambete, Prasad; Sanagavarapu, Prasad; Tenneti, Sanjeev; Grandhomme, Laurent, Content delivery systems and methods.
  28. Conwell, William Y.; Bradley, Brett A.; Rhoads, Geoffrey B., Content identifiers.
  29. Conwell,William Y.; Bradley,Brett A.; Rhoads,Geoffrey B., Content identifiers triggering corresponding responses through collaborative processing.
  30. Zhao, Jian; Winograd, Joseph M., Content management using multiple abstraction layers.
  31. Khambete, Prasad, Content sharing systems and methods.
  32. Petrovic, Rade; Zhao, Jian; Winograd, Joseph M., Coordinated watermarking.
  33. Ahuja, Ratinder Paul Singh; Coleman, Shaun; de la Iglesia, Erik, Cryptographic policy enforcement.
  34. Khambete, Prasad M.; Tenneti, Sanjeev, Data collection and targeted advertising systems and methods.
  35. Yu,Hong Heather; Yin,Peng, Data hiding in communication.
  36. Calhoon, Sean; Carr, J. Scott; Rodriguez, Tony F., Data processing systems and methods.
  37. Moskowitz, Scott A., Data protection method and device.
  38. Moskowitz, Scott A., Data protection method and device.
  39. Moskowitz, Scott A., Data protection method and device.
  40. Moskowitz, Scott A., Data protection method and device.
  41. Ignomirello, Brian, Data storage and retrieval mediation system and methods for using same.
  42. Abe,Miki; Yoshida,Tadao, Data transfer system, data transfer apparatus, data recording apparatus, data transfer method, and recording medium.
  43. Lowe, Rick; Brocker, Stephen, Database for a capture system.
  44. Ramos, Daniel O.; Jones, Kevin C.; Rhoads, Geoffrey B., Decoding a watermark and processing in response thereto.
  45. Levy, Kenneth L.; Meyer, Joel R., Deriving multiple fingerprints from audio or video content.
  46. Levy, Kenneth L.; Hannigan, Brett T.; Bradley, Brett A.; Rhoads, Geoffrey B., Deriving multiple identifiers from multimedia content.
  47. Cheng, Gang; Chu, Rufeng; Zhang, Lun, Detecting specified image identifiers on objects.
  48. Langer,Randy, Deterring reverse-engineering of software systems by randomizing the siting of stack-based data.
  49. Dietl, Josef; Verlaan, Theo, Differentiated proxy digital signatures.
  50. Boccon-Gibod, Gilles; Boeuf, Julien G., Digital rights management engine systems and methods.
  51. Boccon-Gibod, Gilles; Boeuf, Julien G., Digital rights management engine systems and methods.
  52. Boccon-Gibod, Gilles; Boeuf, Julien G.; Manente, Michael G.; Bradley, William B., Digital rights management engine systems and methods.
  53. Rhoads,Geoffrey B., Digital watermark and steganographic decoding.
  54. Rhoads,Geoffrey B., Digital watermark embedding and decoding using encryption keys.
  55. Okada,Takanori; Yoshida,Shuichi, Digital watermarking apparatus and application apparatus using the same.
  56. Levy, Kenneth L.; Stager, Reed R., Digital watermarking applications.
  57. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  58. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  59. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  60. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  61. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  62. Rodriguez, Tony F.; Haynes, Mark E.; Brunk, Hugh L.; Rhoads, Geoffrey B., Digital watermarks for checking authenticity of printed objects.
  63. Rodriguez,Tony F.; Haynes,Mark E.; Brunk,Hugh L.; Rhoads,Geoffrey B., Digital watermarks for checking authenticity of printed objects.
  64. Ahuja, Ratinder Paul Singh; Howard, Matthew; Lowe, Rick; de la Iglesia, Erik; Deninger, William, Document de-registration.
  65. Ahuja, Ratinder Paul Singh; Howard, Matthew; Lowe, Rick; de la Iglesia, Erik; Deninger, William, Document de-registration.
  66. Chaudhury, Krish; Pravetz, James D., Document digest allowing selective changes to a document.
  67. Ahuja, Ratinder Paul Singh; Howard, Matthew; Lowe, Rick; de la Iglesia, Erik; Deninger, William, Document registration.
  68. Ahuja, Ratinder Paul Singh; Howard, Matthew; Lowe, Rick; de la Iglesia, Erik; Deninger, William, Document registration.
  69. Rhoads, Geoffrey B.; Gustafson, Ammon E., Documents and methods involving multiple watermarks.
  70. Petrovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed.
  71. Petriovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed domain.
  72. Petrovic, Rade; Yang, Dai, Efficient and secure forensic marking in compressed domain.
  73. Petrovic, Rade; Atti, Venkatraman, Efficient extraction of embedded watermarks in the presence of host content distortions.
  74. Zhao, Jian, Enhanced content distribution using advertisements.
  75. Petrovic, Rade, Enhanced content management based on watermark extraction records.
  76. Kirovski, Darko, Enhancing software integrity through installation and verification.
  77. Pinkas, Binyamin; Haber, Stuart A.; Tarjan, Robert E.; Sander, Tomas, Establishing a secure channel with a human user.
  78. Pinkas, Binyamin; Haber, Stuart A.; Tarjan, Robert E.; Sander, Tomas, Establishing a secure channel with a human user.
  79. Pinkas,Binyamin; Haber,Stuart A.; Tarjan,Robert E.; Sander,Tomas, Establishing a secure channel with a human user.
  80. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  81. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  82. Petrovic, Rade; Atti, Venkatraman, Extraction of embedded watermarks from a host content based on extrapolation techniques.
  83. Petrovic, Rade; Atti, Venkatraman, Extraction of embedded watermarks from a host content using a plurality of tentative watermarks.
  84. Ignomirello, Brian M.; Liang, Suihong, Fast system state cloning.
  85. Ignomirello, Brian M.; Liang, Suihong, Fast system state cloning.
  86. Levy,Kenneth L.; Decker,Stephen K., Feature-based watermarks and watermark detection strategies.
  87. Lowe, Rick; Broeker, Stephen; Liu, Weimin, File system for a capture system.
  88. Rhoads, Geoffrey B.; Levy, Kenneth L., Fingerprint methods and systems for media signals.
  89. Winograd, Joseph M., Forensic marking using a common customization function.
  90. Winograd, Joseph M., Forensic marking using a common customization function.
  91. Reed, Alastair M.; Rodriguez, Tony F.; Sharma, Ravi K., Fragile and emerging digital watermarks.
  92. Ahuja,Ratinder Paul Singh; de la Iglesia,Erik; Lowe,Rick; Howard,Matthew; Deninger,William, Generating signatures over a document.
  93. Silverbrook, Kia; Lapstun, Paul, Handheld security document scanner.
  94. Liu, Weimin; de la Iglesia, Erik; Deninger, William; Lowe, Rick; Broeker, Stephen, High speed packet capture.
  95. Kumnick, Phil; Chandra, Sonika, Hosted thin-client interface in a payment authorization system.
  96. Brundage, Trent J.; Sher-Jan, Mahmood; Hannigan, Brett T.; Durst, Jr., Robert T., Identification document and related methods.
  97. Deninger, William; de la Iglesia, Erik, Identifying image type in a capture system.
  98. Deninger, William; de la Iglesia, Erik, Identifying image type in a capture system.
  99. David, Morgan William Amos; Stone, Jonathan James, Identifying material using a watermark and a signature.
  100. Terasaki, Hiroshi, Image transmission system, method of the same, and recording medium.
  101. Oostveen,Job Cornelis; Kalker,Antonius Adrianus Cornelis Maria, Increasing integrity of watermarks using robust features.
  102. Takashima, Yoshikazu, Information processing apparatus and method, information recording medium, and computer program.
  103. Yamamoto, Kazuo; Ueda, Kenjiro, Information processing apparatus, information recording medium, information processing method, and information processing program.
  104. Ezaki,Tadashi, Information processing device and method and program storage medium.
  105. Carey, W. Knox; Nilsson, Jarl, Information security systems and methods.
  106. Carey, W. Knox; Nilsson, Jarl, Information security systems and methods.
  107. Levy,Kenneth L.; Hannigan,Brett T.; Bradley,Brett Alan; Rhoads,Geoffrey B., Integrating digital watermarks in multimedia content.
  108. Levy,Kenneth L.; Hannigan,Brett T.; Bradley,Brett A.; Rhoads,Geoffrey B., Integrating steganographic encoding in multimedia content.
  109. Winograd, Joseph M.; Zhao, Jian; Petrovic, Rade, Interactive content acquisition using embedded codes.
  110. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  111. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  112. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  113. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  114. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  115. Bradley, William; Maher, David; Boccon-Gibod, Gilles, Interoperable systems and methods for peer-to-peer service orchestration.
  116. Barr, John Kennedy; Bradley, Brett A.; Hannigan, Brett T.; Alattar, Adnan M.; Durst, Robert, Layered security in digital watermarking.
  117. Bradley, Brett A.; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  118. Bradley, Brett Alan; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  119. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  120. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  121. Deninger, William; Ahuja, Ratinder Paul Singh; de la Iglesia, Erik, Locational tagging in a capture system.
  122. Buhler, Peter; Kursawe, Klaus; Maeder, Roman; Osborne, Michael, Long-term secure digital signatures.
  123. Petrovic, Rade; Tehranchi, Babak; Jemili, Kanaan; Winograd, Joseph M.; Angelico, Dean, Media monitoring, management and information system.
  124. Petrovic, Rade; Tehranchi, Babak; Jemili, Kanaan; Winograd, Joseph M.; Angelico, Dean, Media monitoring, management and information system.
  125. Petrovic, Rade; Tehranchi, Babak; Jemili, Kanaan; Winograd, Joseph M.; Angelico, Dean-Anthony, Media monitoring, management and information system.
  126. Butterfield, Bruce D.; Fu, Jack Shenghong; Wrobel, Charles C., Message file editing process.
  127. Troyansky, Lidror; Carny, Ofir; Peled, Ariel, Method and a system for embedding textual forensic information.
  128. de la Iglesia, Erik; Lowe, Rick; Ahuja, Ratinder Paul Singh; Deninger, William; King, Samuel; Khasgiwala, Ashish; Massaro, Donald J., Method and apparatus for data capture and analysis system.
  129. de la Iglesia, Erik; Lowe, Rick; Ahuja, Ratinder Paul Singh; Deninger, William; King, Samuel; Khasgiwala, Ashish; Massaro, Donald J., Method and apparatus for data capture and analysis system.
  130. Ignomirello, Brian M., Method and apparatus for dense hyper IO digital retention.
  131. Ignomirello, Brian M., Method and apparatus for dense hyper IO digital retention.
  132. Ignomirello, Brian M., Method and apparatus for dense hyper IO digital retention.
  133. Ignomirello, Brian M., Method and apparatus for dense hyper IO digital retention.
  134. Haritaoglu, Ismail, Method and apparatus for detecting near duplicate videos using perceptual video signatures.
  135. Haritaoglu, Ismail, Method and apparatus for detecting near-duplicate videos using perceptual video signatures.
  136. Gruba, Joseph F.; Fisher, Gilford C.; Rigg, Christopher D., Method and apparatus for encrypting and decrypting data to/from an ESCON tape system.
  137. Kiehtreiber, Perry; Brouwer, Michael, Method and apparatus for incremental code signing.
  138. Kiehtreiber, Peter; Brouwer, Michael, Method and apparatus for incremental code signing.
  139. Epstein, Michael, Method and apparatus for overcoming a watermark security system.
  140. Silverbrook, Kia; Lapstun, Paul, Method and apparatus for security document tracking.
  141. Jajodia, Sushil; Guo, Huiping; Li, YingJiu, Method and apparatus for watermarking stream data.
  142. Oostveen, Job Cornelis; Ten Kate, Warner Rudolph Theophile; Denissen, Adrianus Johannes Maria; Roberts, David K., Method and device for generating and detecting a fingerprint functioning as a trigger marker in a multimedia signal.
  143. Oostveen, Job Cornelis; Ten Kate, Warner Rudolph Theophile; Denissen, Adrianus Johannes Maria; Roberts, David K., Method and device for generating and detecting a fingerprint functioning as a trigger marker in a multimedia signal.
  144. Oostveen, Job Cornelis; Ten Kate, Warner Rudolph Theophile; Denissen, Adrianus Johannes Maria; Roberts, David K., Method and device for generating and detecting a fingerprint functioning as a trigger marker in a multimedia signal.
  145. Oostveen, Job Cornelis; Ten Kate, Warner Rudolph Theophile; Denissen, Adrianus Johannes Maria; Roberts, David K., Method and device for generating and detecting a fingerprint functioning as a trigger marker in a multimedia signal.
  146. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  147. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  148. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  149. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  150. Ehrmann Patin,Fr챕d챕rique; Donescu,Ioana, Method and device for sending and receiving digital images using an image watermark for decoding.
  151. Krislov, Clinton A., Method and system for automated document registration.
  152. Krislov, Clinton A., Method and system for automated document registration with cloud computing.
  153. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  154. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  155. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  156. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  157. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  158. Krislov, Clinton A., Method and system for secure automated document registration from social media networks.
  159. Khoo, Kei Yong; Lin, Chih Chang, Method and system for verification of circuits with encoded signals.
  160. Patterson, Barbara E., Method and system using universal ID and biometrics.
  161. Patterson, Barbara E.; Kumnick, Phillip L., Method and system using universal ID and biometrics.
  162. de Queiroz,Ricardo L, Method for authentication of JPEG image data.
  163. Henocque, Laurent, Method for checking the integrity of a digital data block.
  164. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  165. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  166. Silverbrook, Kia; Lapstun, Paul, Method of counting currency.
  167. Silverbrook,Kia; Lapstun,Paul, Method of identifying a copied security document.
  168. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Methods and apparatus for enhancing the robustness of watermark extraction from digital host content.
  169. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Methods and apparatus for enhancing the robustness of watermark extraction from digital host content.
  170. Shamoon, Talal G.; Hill, Ralph D.; Radcliffe, Chris D.; Hwa, John P.; Sibert, W. Olin; Van Wie, David M., Methods and apparatus for persistent control and protection of content.
  171. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M.; Jemili, Kanaan, Methods and apparatus for thwarting watermark detection circumvention.
  172. Rhoads, Geoffrey B.; Rodriguez, Tony F., Methods and devices employing content identifiers.
  173. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  174. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  175. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  176. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  177. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  178. Ignomirello, Brian, Methods and systems for storing and retrieving data.
  179. Ignomirello, Brian, Methods and systems for storing and retrieving data.
  180. Chaugule, Ravindra Ramkrishna; Ghanekar, Sachin P., Methods for selecting an initial quantization step size in audio encoders and systems using the same.
  181. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  182. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  183. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  184. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  185. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  186. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  187. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  188. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  189. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  190. Krishnamachari,Santhana, Multimedia watermarking system and method.
  191. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  192. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  193. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  194. Janes,Sherman M., Network communications security agent.
  195. Janes,Sherman M., Network communications security agent.
  196. Baugher,Mark J.; Farnham,Stu; Hemminger,Stephen C.; Marshall,Robert A.; Tait,Mark, Network content management.
  197. Silverbrook, Kia; Lapstun, Paul, Object authentication from a signature part.
  198. Deninger, William; de la Iglesia, Erik, Object classification in a capture system.
  199. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  200. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  201. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  202. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  203. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  204. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  205. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  206. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  207. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  208. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  209. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  210. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  211. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  212. Farrugia, Augustin J.; Riendeau, Jean-Francois, Optimized integrity verification procedures.
  213. Farrugia, Augustin J.; Riendeau, Melanie, Optimized integrity verification procedures.
  214. Aaraj, Najwa; Christodorescu, Mihai; Pendarakis, Dimitrios; Sailer, Reiner; Schales, Douglas L., Optimizing performance of integrity monitoring.
  215. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M; Wong, Douglas, Pre-processed information embedding system.
  216. Wong, Douglas; Lee, Chong, Pre-processed information embedding system.
  217. Levy, Kenneth L.; Hiatt, R. Stephen; Rhoads, Geoffrey B., Processing audio or video content with multiple watermark layers.
  218. England,Paul; Peinado,Marcus; Sankaranarayan,Mukund, Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client.
  219. de la Iglesia, Erik; Deninger, William; Ahuja, Ratinder Paul Singh, Query generation for a capture system.
  220. de la Iglesia, Erik; Deninger, William; Ahuja, Ratinder Paul Singh, Query generation for a capture system.
  221. de la Iglesia, Erik; Deninger, William; Ahuja, Ratinder Paul Singh, Query generation for a capture system.
  222. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  223. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  224. Petrovic, Rade; Winograd, Joseph M., Remote control signaling using audio watermarks.
  225. de la Iglesia, Erik; Deninger, William, Rule parser.
  226. de la Iglesia, Erik; Deninger, William J., Rule parser.
  227. Winograd, Joseph M.; Johnson, Peter Russell; Houle, William Carl, Second screen content.
  228. Winograd, Joseph M.; Petrovic, Rade; Zhao, Jian, Secure and efficient content screening in a networked environment.
  229. Pinkas,Binyamin; Sander,Tomas, Secure authentication systems and methods.
  230. Suominen, Edwin A., Secure messaging with disposable keys.
  231. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  232. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  233. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  234. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  235. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  236. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  237. Stone, Chris L.; Garen, Scott, Secure tracking system and method for video program content.
  238. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  239. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  240. Henson, Robert Ray, Security system and method of in-flight entertainment device rentals having self-contained audiovisual presentations.
  241. Goldman, Oliver, Self-signing electronic documents.
  242. Goldman,Oliver, Self-signing electronic documents.
  243. Carson, Douglas M., Sequencing data blocks to provide hidden data on a recording medium.
  244. Tehranchi, Babak; Petrovic, Rade; Winograd, Joseph M.; Angelico, Dean Anthony, Signal continuity assessment using embedded watermarks.
  245. de la Iglesia, Erik; Ahuja, Ratinder Paul Singh; Deninger, William; King, Sam, Signature distribution in a document registration system.
  246. Winograd, Joseph M., Social media viewing system.
  247. Goldman, Oliver; Chou, Michael; Bansod, Aditya, Software installation package with digital signatures.
  248. Home, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  249. Home, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  250. Horne, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  251. Horne, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  252. Horne, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  253. Horne, William G.; Matheson, Lesley R.; Sheehan, Casey; Tarjan, Robert E., Software self-checking systems and methods.
  254. Homing, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Home, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  255. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  256. Horning, James J.; Sibert, W. Olin; Tarjan, Robert E.; Maheshwari, Umesh; Horne, William G.; Wright, Andrew K.; Matheson, Lesley R.; Owicki, Susan, Software self-defense systems and methods.
  257. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  258. Reed, Alastair M.; Sharma, Ravi K.; Rodriguez, Tony F., Steganographic encoding and decoding.
  259. Reed, Alastair M.; Sharma, Ravi K.; Rodriguez, Tony F., Steganographic encoding and decoding.
  260. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  261. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  262. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  263. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  264. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  265. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  266. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  267. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  268. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  269. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  270. Shevade, Ravindra Waman, System and method for authenticating documents.
  271. Shevade, Ravindra Waman, System and method for authenticating documents.
  272. de Queiroz,Ricardo L., System and method for authentication of JPEG image data.
  273. de Queiroz,Ricardo L., System and method for authentication of JPEG image data.
  274. Ahuja, Ratinder Paul Singh; Deninger, William; Lakhani, Faizel; Christner, Joel, System and method for concept building.
  275. Ahuja, Ratinder Paul Singh; Lakhani, Faizel, System and method for data mining and security policy management.
  276. Ahuja, Ratinder; Lakhani, Faizel, System and method for data mining and security policy management.
  277. Ahuja, Ratinder; Lakhani, Faizel, System and method for data mining and security policy management.
  278. Liu, Weimin, System and method for data mining and security policy management.
  279. Liu, Weimin, System and method for data mining and security policy management.
  280. Liu, Weimin, System and method for data mining and security policy management.
  281. Oh, Weon-Geun, System and method for evaluating and certifying video pat software.
  282. Deninger, William; Ahuja, Ratinder Paul Singh; Cheung, Lee C., System and method for intelligent state management.
  283. Deninger, William; Ahuja, Ratinder Paul Singh; Cheung, Lee C., System and method for intelligent state management.
  284. Deninger, William; Ahuja, Ratinder Paul Singh; Cheung, Lee C., System and method for intelligent state management.
  285. Ahuja, Ratinder Paul Singh; Deninger, William, System and method for intelligent term grouping.
  286. Ahuja, Ratinder Paul Singh; Christener, Joel; Gaitonde, Jitendra; Ganti, Sirisha; Haridasa, Sridevi; Hegde, Damodar K.; Jayaram, Chaitra; Kasim, Rahila; Lakhani, Faizel; Patil, Swati; Sandhu, Harsimran S., System and method for managing data and policies.
  287. Ahuja, Ratinder Paul Singh; Deninger, William J., System and method for protecting specified data combinations.
  288. Ahuja, Ratinder Paul Singh; Deninger, William J., System and method for protecting specified data combinations.
  289. Ahuja, Ratinder Paul Singh; Jha, Bimalesh; Maini, Nitin; Patel, Sujata; Jain, Ankit R.; Hegde, Damodar K.; Nanganure, Rajaram V.; Pawar, Avinash Vishnu, System and method for providing data protection workflows in a network environment.
  290. Ahuja, Ratinder Paul Singh; Jha, Bimalesh; Maini, Nitin; Patel, Sujata; Jain, Ankit R.; Hegde, Damodar K.; Nanganure, Rajaram V.; Pawar, Avinash Vishnu, System and method for providing data protection workflows in a network environment.
  291. Yagawa,Yuichi, System and method for watermarking in accessed data in a storage system.
  292. Deninger, William; de la Iglesia, Erik, System and method for word indexing in a capture system and querying thereof.
  293. Deninger, William; de la Iglesia, Erik, System and method for word indexing in a capture system and querying thereof.
  294. De Atley, Dallas; Panther, Heiko; Adler, Mitchell; Cooper, Simon; Brouwer, Michael; Reda, Matt, System and method of authorizing execution of software code based on at least one installed profile.
  295. Rudd, James M., System and methods for managing the distribution of electronic content.
  296. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  297. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  298. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  299. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  300. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  301. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  302. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  303. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  304. de Queiroz, Ricardo L., System for authentication of JPEG image data.
  305. Silverbrook, Kia; Lapstun, Paul, System for identifying counterfeit security document.
  306. Tomkow, Terrence A., System for, and method of, authenticating an electronic message to a recipient.
  307. Tomkow, Terrance A., System for, and method of, providing the transmission, receipt and content of an E-mail message to a recipient.
  308. Tomkow, Terrance A., System for, and method of, providing the transmission, receipt and content of an e-mail message.
  309. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph, System reactions to the detection of embedded watermarks in a digital host content.
  310. Petrovic, Rade; Tehranchi, Babak; Winograd, Joseph M., System reactions to the detection of embedded watermarks in a digital host content.
  311. Petrovic,Rade; Tehranchi,Babak; Winograd,Joseph M., System reactions to the detection of embedded watermarks in a digital host content.
  312. DeLuca, Lisa Seacat; Nesbitt, Pamela A; Travis, Amy D, System, method, and apparatus for management of media objects.
  313. Lee, John; Levy, Nir, System, method, and computer program for validating receipt of digital content by a client device.
  314. Serret Avila,Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  315. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  316. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  317. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  318. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  319. Pinkas, Binyamin; Sander, Tomas; Home, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  320. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  321. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  322. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  323. Pinkas, Binyamin; Sander, Tomas; Horne, William G., Systems and methods for conducting transactions and communications using a trusted third party.
  324. Pinkas,Binyamin; Sander,Tomas; Horne,William G., Systems and methods for conducting transactions and communications using a trusted third party.
  325. MacKay, Michael K.; Maher, David P., Systems and methods for governing content rendering, protection, and management applications.
  326. MacKay, Michael K.; Maher, David P., Systems and methods for governing content rendering, protection, and management applications.
  327. MacKay, Michael K.; Maher, David P., Systems and methods for governing content rendering, protection, and management applications.
  328. MacKay,Michael K.; Maher,David P., Systems and methods for governing content rendering, protection, and management applications.
  329. Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
  330. Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
  331. Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
  332. Maher, David P.; Rudd, James M.; Swenson, Eric J.; Landsman, Richard A., Systems and methods for managing and protecting electronic content and applications.
  333. Maher,David P.; Rudd,James M.; Swenson,Eric J.; Landsman,Richard A., Systems and methods for managing and protecting electronic content and applications.
  334. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  335. Ramos, Daniel O.; Jones, Kevin C.; Rhoads, Geoffrey B., Systems and methods for processing content objects.
  336. Sibert, W. Olin, Systems and methods for protecting data secrecy and integrity.
  337. Sibert,W. Olin, Systems and methods for protecting data secrecy and integrity.
  338. Shah, Mehul; Krishnan, Harshini Ramnath; Goyal, Neel, Systems and methods for providing access to resources through enhanced audio signals.
  339. Shah, Mehul; Ramnath Krishnan, Harshini; Goyal, Neel, Systems and methods for providing access to resources through enhanced audio signals.
  340. Shah, Mehul; Ramnath Krishnan, Harshini; Goyal, Neel, Systems and methods for providing access to resources through enhanced signals.
  341. Shamoon, Talal G., Systems and methods for retrofitting electronic appliances to accept different content formats.
  342. Shamoon,Talal G., Systems and methods for retrofitting electronic appliances to accept different content formats.
  343. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  344. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  345. Home, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  346. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Homing, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan, Systems and methods for watermarking software and other media.
  347. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  348. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  349. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  350. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  351. Horne, William G.; Maheshwari, Umesh; Tarjan, Robert E.; Horning, James J.; Sibert, W. Olin; Matheson, Lesley R.; Wright, Andrew K.; Owicki, Susan S., Systems and methods for watermarking software and other media.
  352. Levy, Kenneth L.; Meyer, Joel R.; Andrews, III, Hoyet Harrison, Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities.
  353. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  354. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  355. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  356. de la Iglesia, Erik; Lowe, Rick; Ahuja, Ratinder Paul Singh; Coleman, Shaun; King, Samuel; Khasgiwala, Ashish, Tag data structure for maintaining relational data over captured objects.
  357. de la Iglesia, Erik; Lowe, Rick; Ahuja, Ratinder Paul Singh; Coleman, Shaun; King, Samuel; Khasgiwala, Ashish, Tag data structure for maintaining relational data over captured objects.
  358. Epstein, Michael, Temporal proximity to verify physical proximity.
  359. Epstein, Michael, Temporal proximity to verify physical proximity.
  360. Epstein, Michael, Temporal proximity to verify physical proximity.
  361. Petrovic, Rade; Downes, Patrick George, Time varying evaluation of multimedia content.
  362. Silverbrook, Kia; Lapstun, Paul, Transaction recordal method.
  363. Silverbrook, Kia; Lapstun, Paul, Transaction recordal system.
  364. Zhao, Jian; Mercier, Guillaume, Transactional video marking system.
  365. Ebrahimi, Armin; Khot, Gaurav, Transferring data files using a series of visual codes.
  366. Weeks, Stephen P.; Serret-Avila, Xavier, Trust management systems and methods.
  367. Weeks, Stephen P.; Serret-Avila, Xavier, Trust management systems and methods.
  368. Weeks, Stephen P.; Serret-Avila, Xavier, Trust management systems and methods.
  369. Weeks,Stephen P.; Serret Avila,Xavier, Trust management systems and methods.
  370. Weeks,Stephen P.; Serret Avila,Xavier, Trust management systems and methods.
  371. Weeks, Stephen P.; Serret-Avila, Xavier, Trust-management systems and methods.
  372. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  373. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  374. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  375. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  376. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  377. Pearson,Siani Lynne; Chen,Liqun, Trusted system.
  378. Levy,Kenneth L., User-friendly rights management systems and methods.
  379. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  380. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  381. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  382. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  383. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  384. Suominen, Edwin A., Verification of signed video streams.
  385. Lowe, Rick; Coleman, Shaun; de la Iglesia, Erik; King, Samuel; Khasgiwala, Ashish, Verifying captured objects before presentation.
  386. Lowe, Rick; Coleman, Shaun; de la Iglesia, Erik; King, Samuel; Khasgiwala, Ashish, Verifying captured objects before presentation.
  387. Maas, Martijn; Celik, Mehmet, Watermark detection with payload.
  388. Winograd, Joseph M.; Petrovic, Rade; Zhao, Jian, Watermark extraction and content screening in a networked environment.
  389. Petrovic, Rade; Atti, Venkatraman, Watermark extraction based on tentative watermarks.
  390. Petrovic, Rade; Winograd, Joseph M.; Downes, Patrick George, Watermark extractor enhancements based on payload ranking.
  391. Tehranchi, Babak; Petrovic, Rade, Watermarking in an encrypted domain.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트