$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for managing, accessing and paying for the use of copyrighted electronic media 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
출원번호 US-0821414 (2004-04-09)
발명자 / 주소
  • Rhoads,Geoffrey B.
출원인 / 주소
  • Digimarc Corporation
대리인 / 주소
    Digimarc Corporation
인용정보 피인용 횟수 : 212  인용 특허 : 78

초록

The present invention provides a method for identifying copyrighted content on a network to help ensure legal uses of the copyrighted content. The method includes searching a network for steganographically embedded content based on predetermined information; comparing data extracted from located con

대표청구항

I claim: 1. A method comprising: analyzing media content to obtain auxiliary data steganographically embedded therein, wherein the auxiliary data is embedded through subtle alterations of data representing at least a portion of the media content; communicating the auxiliary data to a network resour

이 특허에 인용된 특허 (78)

  1. Corbin John R. (Sunnyvale CA), Apparatus and method for licensing software on a network of computers.
  2. Peterson Alan R. ; Spohrer James C., Authoring tool comprising nested state machines for use in a computer system.
  3. Watanabe Takashi (Kyoto JPX), Charge detection device, a method for producing the same, and a charge transfer and detection apparatus including such a.
  4. Plum Thomas (Kamuela HI), Computer software licensing authentication method and apparatus.
  5. Saito Makoto (Tokyo JPX), Data coypright management method.
  6. Saito Makoto,JPX, Data management system.
  7. Scheinkman Luiz ; Agassi Shai, Data navigator interface with navigation as a function of draggable elements and drop targets.
  8. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  9. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  10. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  11. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  12. Brugger Rolf (Keistenweg 1 CH-4310 Rheinfelden CHX), Device for the distribution of music information in digital form.
  13. Saito Makoto,JPX, Digital content management system using electronic watermark.
  14. Tsevdos James T. ; Cook Ross L. ; Ring Nancy Lee ; Barnhill Robert S. ; Hamblin Glen E. ; Milsted Kenneth L. ; Kindell Craig N. ; Waefler Susan Elizabeth ; Portela Carlos ; Anderson Brent C., Digital information accessing, delivery and production system.
  15. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  16. Sudia Frank W. ; Asay Alan ; Brickell Ernest F. ; Ankney Richard ; Freund Peter C. ; Yung Marcel M. ; Kravitz David W., Electronic cryptographic packing.
  17. Houser Peter B. (Poway CA) Adler James M. (Ocean Beach CA), Electronic document verification system and method.
  18. Johnson Woodrow W. ; Atkins Christine J. ; Yoh Jon, Electronic rights management and authorization system.
  19. Rhoads, Geoffrey B., Encoding and decoding in accordance with steganographically-conveyed data.
  20. Rhoads, Geoffrey B., Encoding and decoding methods in which decryption data is conveyed steganographically within audio or visual content.
  21. Kawakami Haruko (Yokohama JPX) Sekizawa Hidekazu (Yokohama JPX) Yamamoto Naofumi (Tokyo JPX), Image processing apparatus using pattern generating circuits to process a color image.
  22. Rhoads Geoffrey B., Image steganography system featuring perceptually adaptive and globally scalable signal embedding.
  23. Powers ; III John R. (Monte Sereno CA), Interactive multimedia delivery engine.
  24. Mintzer Frederick Cole ; Yeung Minerva Ming-Yee, Invisible image watermark for image verification.
  25. George Gregory Gruse ; Marco M. Hurtado ; Kenneth Louis Milsted ; Jeffrey B. Lotspiech, Key management system for digital content player.
  26. Griswold Gary N., Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a.
  27. Peterson Alan R. (Palo Alto CA) Spohrer James C. (Santa Clara CA), Method and apparatus for capturing transient events in a multimedia product using an authoring tool on a computer system.
  28. Brouwer James R. (Cincinnati OH) Miller Mitchell Scott (West Chester OH) Simula Stephen Elwood (Cincinnati OH), Method and apparatus for displaying animated characters upon a computer screen in which a composite video display is mer.
  29. Ross Cliff D. (Pleasant Grove UT) Taylor Neil W. (Springville UT) Kingdon Kevin W. (Orem UT) Davis Howard R. (Salem UT) Major Drew (Orem UT), Method and apparatus for electronic licensing.
  30. Barton James M. (101 Sund Ave. Los Gatos CA 95032), Method and apparatus for embedding authentication information within digital data.
  31. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Method and apparatus for marking the information content of an information carrying signal.
  32. Benson Greg,SEX ; Urich Gregory H.,SEX, Method and system for managing a data object so as to comply with predetermined conditions for usage.
  33. Lafer John P. ; Faust John E. ; Williams Michael D., Method and system for managing multimedia assets for proper deployment on interactive networks.
  34. Halter Bernard J. (Longmont CO) Bracco Alphonse M. (Reston VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Prymak ; deceased Rostislaw (late of Dumfries VA , Method and system for multimedia access control enablement.
  35. Durst ; Jr. Robert T. (212 Shelton Rd. Monroe CT 06468) Hunter Kevin D. (440 Allyndale Dr. Stratford CT 06497), Method and system for preventing unauthorized use of software.
  36. Matyas Stephen M. (Kingston NY) Meyer Carl H. W. (Kingston NY), Method for authenticating the identity of a user of an information system.
  37. Leighton Frank T. (459 Chestnut Hill Ave. Newtonville MA) Micali Silvio (459 Chestnut Hill Ave. Brookline MA 02146), Method for enabling users of a cryptosystem to generate and use a private pair key for enciphering communications betwee.
  38. Powell Robert D. ; Nitzberg Mark J., Method for encoding auxiliary data within a source signal.
  39. Young Fredric S., Method for general image manipulation and composition.
  40. DeMont Jason Paul, Method for hiding a binary encoded message in an electronic document by modulating the case of the characters in a case-.
  41. Moskowitz Scott A. ; Cooperman Marc, Method for human-assisted random key generation and application for digital watermark system.
  42. Moskowitz Scott A. ; Cooperman Marc, Method for stega-cipher protection of computer code.
  43. France Gordon Scott ; Lee Steven S., Method for streaming transmission of compressed music.
  44. Rhoads, Geoffrey B., Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith.
  45. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  46. Earnest Lester D. (Los Altos Hills CA), Modular software security.
  47. Syeda-Mahmood Tanveer F., Multimedia database for use over networks.
  48. Johnson Herrick J. (Marblehead MA) Olson Margaret (Nashua NH) Jones Stuart (Cambridge MA) Bodoff Stephanie (Somerville MA) Bertrand Stephen C. (Waltham MA) Levine Paul H. (Carlisle MA), Network license server.
  49. Siefert David M. (Englewood OH), Ordering and downloading resources from computerized repositories.
  50. Bloomberg Dan S., Performing document image management tasks using an iconic image having embedded encoded information.
  51. Hewlett William E.,GB2, Programmable light beam shape altering device using programmable micromirrors.
  52. Briggs Robert (Annandale VA) Iannacone Carmen (Fairfax VA) Rothey James (Fairfax VA) Evans David (Falls Church VA), Protection of an electronically stored image in a first color space by the alteration of a digital component in a second.
  53. Davis Derek L. (Phoenix AZ), Roving software license for a hardware agent.
  54. Zhao Jian ; Koch Eckhard,DEX ; Saito Makoto,JPX, Secure distribution of digital representations.
  55. Lahmi Paul,FRX, Secure method for duplicating sensitive documents.
  56. Ananda Mohan (15910 Ventura Blvd. ; Ste. 800 Encino CA 91436), Secure software rental system using continuous asynchronous password verification.
  57. Ananda Mohan (15910 Ventura Blvd. ; Suite 800 Eucino CA 91436), Secure software rental system using distributed software.
  58. Waite David P. (Fairfax VA) Riddell Horace G. (Chantilly VA), Secure system for activating personal computer software at remote locations.
  59. Chernow Fred (360 Kiowa Pl. Boulder CO 80303) Peterson Randy J. (1330 Arapahoe St. Boulder CO 80302), Software distribution system.
  60. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  61. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  62. David M. Van Wie ; Robert P. Weber, Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  63. Medveczky Geza (5395 Greenrich Rd. Castro Valley CA 94552) Lunsford Kelvin (36156 Bayonne Dr. Newark CA 94560) ..UC: 380/4 380/25 380/49 340/82534, System and apparatus for protecting computer software.
  64. Erickson John S., System and method for managing copyrighted electronic media.
  65. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  66. Stefik Mark J. (Woodside CA) Bobrow Daniel G. (Palo Alto CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of composite digital works.
  67. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  68. Stefik Mark J. (Woodside CA) Merkle Ralph C. (Sunnyvale CA) Pirolli Peter L. T. (El Cerrito CA), System for controlling the distribution and use of digital works having a fee reporting mechanism.
  69. Stefik Mark J., System for controlling the distribution and use of digital works having attached usage rights where the usage rights are.
  70. Stefik Mark J. ; Pirolli Peter L. T., System for controlling the distribution and use of digital works using digital tickets.
  71. Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
  72. East, Jeffrey A.; Walker, James J.; Jenness, Steven M.; Ozur, Mark C.; Kelly, Jr., James W., System for determining the rights of object access for a server process by combining them with the rights of the client process.
  73. Freeny ; Jr. Charles C. (Fort Worth TX), System for reproducing information in material objects at a point of sale location.
  74. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  75. Enescu Michael A. (Sunnyvale CA) Lum James (Redwood City CA), Tamper-resistant method for authorizing access to data between a host and a predetermined number of attached workstation.
  76. Hall Edwin J. ; Shear Victor H. ; Tomasello Luke S. ; Van Wie David M. ; Weber Robert P. ; Worsencroft Kim ; Xu Xuejun, Techniques for defining using and manipulating rights management data structures.
  77. Garman Mark B., Transformation of real time data into times series and filtered real time data within a spreadsheet application.
  78. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.

이 특허를 인용한 특허 (212)

  1. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  2. Rhoads, Geoffrey B., Analyzing audio, including analyzing streaming audio signals.
  3. Reed, Alastair M.; Jones, Robert L., Apparatus to analyze security features on objects.
  4. Rhoads, Geoffrey B., Associating data with media signals in media signal systems through auxiliary data steganographically embedded in the media signals.
  5. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  6. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  7. Levy, Kenneth L., Associating first and second watermarks with audio or video content.
  8. Rhoads, Geoffrey B.; Rodriguez, Tony F.; McKinley, Tyler J.; Miller, Marc D.; Hierholzer, Kirstin, Associating objects with corresponding behaviors.
  9. Rhoads, Geoffrey B., Audio encoding to convey auxiliary information, and decoding of same.
  10. Rhoads, Geoffrey B., Audio encoding to convey auxiliary information, and media embodying same.
  11. Rhoads, Geoffrey B., Background watermark processing.
  12. Ellingson, Eric E., Bi-directional image capture methods and apparatuses.
  13. Kanev, Kamen; Kimura, Shigeo, Clustering-scheme-encoded interfaces providing orientation feedback.
  14. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  15. Reed, Alastair M.; Rhoads, Geoffrey B., Color image or video processing.
  16. Reed, Alastair M; Rhoads, Geoffrey B, Color image or video processing.
  17. Levy, Kenneth L.; Rhoads, Geoffrey B., Connected audio and other media objects.
  18. Levy, Kenneth L., Content identification and management in content distribution networks.
  19. Levy, Kenneth L.; Stager, Reed R.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Content sensitive connected content.
  20. Levy, Kenneth L.; Rhoads, Geoffrey B.; Stager, Reed R.; Rodriguez, Tony F., Context sensitive connected content.
  21. Rhoads, Geoffrey B., Controlling use of audio or image content.
  22. Rhoads, Geoffrey B., Controlling use of audio or image content.
  23. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D.; Tegreene, Clarence T., Data services outsourcing verification.
  24. Davis, Bruce L.; Conwell, William Y.; Rhoads, Geoffrey B.; Evans, Douglas B., Data transmission by watermark or derived identifier proxy.
  25. Ramos, Daniel O.; Jones, Kevin C.; Rhoads, Geoffrey B., Decoding a watermark and processing in response thereto.
  26. Levy, Kenneth L.; Rhoads, Geoffrey B., Deriving attributes from images, audio or video to obtain metadata.
  27. Rhoads, Geoffrey B., Deriving identifying data from video and audio.
  28. Levy, Kenneth L.; Meyer, Joel R., Deriving multiple fingerprints from audio or video content.
  29. Kanev, Kamen; Kimura, Shigeo, Digital information carrier.
  30. Johnson, Andrew; Biggar, Michael, Digital watermark systems and methods.
  31. Levy, Kenneth L., Digital watermarking and fingerprinting applications for copy protection.
  32. Levy, Kenneth L.; Stager, Reed R., Digital watermarking applications.
  33. Carr, J. Scott; Sher-Jan, Mahmood; Levy, Kenneth L.; Miller, Marc D.; McKinley, Tyler J., Digital watermarking for identification documents.
  34. Levy, Kenneth L., Digital watermarking for workflow by tracking content or content identifiers with respect to time.
  35. Rodriguez, Tony F.; Brundage, Trent J., Digital watermarking image signals on-chip.
  36. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  37. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  38. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  39. Levy, Kenneth L.; Hiatt, R. Stephen; Rhoads, Geoffrey B., Digital watermarking methods and apparatus for use with audio and video content.
  40. Levy, Kenneth L.; Rhoads, Geoffrey B., Digital watermarking systems and methods.
  41. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  42. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  43. Rhoads, Geoffrey B.; Carr, J. Scott, Digital watermarks.
  44. Davis, Bruce L.; Rhoads, Geoffrey B., Digitally marked objects and promotional methods.
  45. Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott; Rhoads, Geoffrey B.; Lofgren, Neil E., Digitally watermarking holograms.
  46. Davis, Bruce L.; Rhoads, Geoffrey B., Embedding and reading codes on objects.
  47. Rhoads, Geoffrey B., Encoding and decoding media signals.
  48. Rhoads, Geoffrey B., Error processing of steganographic message signals.
  49. Rhoads, Geoffrey B.; Rodriguez, Anthony, Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  50. Rhoads, Geoffrey B.; Rodriguez, Tony F., Fingerprints and machine-readable codes combined with user characteristics to obtain content or information.
  51. Reed, Alastair M.; Rodriguez, Tony F.; Sharma, Ravi K., Fragile and emerging digital watermarks.
  52. Rhoads, Geoffrey B.; Rodriguez, Tony F., Gestural techniques with wireless mobile phone devices.
  53. Rhoads, Geoffrey B., Hiding and detecting messages in media signals.
  54. Rhoads, Geoffrey B.; Sharma, Ravi K., Image processing using embedded registration data to determine and compensate for geometric transformation.
  55. Rhoads, Geoffrey B., Inserting watermarks into portions of digital signals.
  56. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Integrating digital watermarks in multimedia content.
  57. Commons, Michael Lamport, Intelligent control with hierarchical stacked neural networks.
  58. Commons, Michael Lamport, Intelligent control with hierarchical stacked neural networks.
  59. Rhoads, Geoffrey B.; Rodriguez, Tony F., Interactive systems and methods employing wireless mobile devices.
  60. Rodriguez, Tony F., Internet and database searching with handheld devices.
  61. Rodriguez, Tony F.; Stewart, Steven W., Internet and database searching with handheld devices.
  62. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  63. Rhoads,Geoffrey B., Internet linking from audio and image content.
  64. Rhoads, Geoffrey B.; Rodriguez, Tony F., Location-based arrangements employing mobile devices.
  65. Rodriguez, Tony F., Machine-readable features for objects.
  66. Levy, Kenneth L., Media methods and systems.
  67. Rodriguez, Tony F.; Calhoon, Sean; Reed, Alastair M., Metadata management and generation using perceptual features.
  68. Rhoads, Geoffrey B., Method and apparatus for associating identifiers with content.
  69. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K. R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  70. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan K.R., Bharath; Kumar, Anil, Method and device for performing caching of dynamically generated objects in a data communication network.
  71. Khemani, Prakash; Sundarrajan, Prabakar; Kumar, Lakshmi; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravanakumar, Method and device for performing integrated caching in a data communication network.
  72. Sartor, Piergiorgio; Freiburg, Volker, Method and device for providing a content stream, content stream, method and device for processing a content stream.
  73. Rhoads,Geoffrey B., Method and system for managing and controlling electronic media.
  74. Ryman, Paul; Croft, Richard; Low, Tony, Method and system for real-time seeking during playback of remote presentation protocols.
  75. Safa, John, Method and system for shared document approval.
  76. Zheng, Joe, Method and system for updating business cards.
  77. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  78. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for routing packets from a gateway to an endpoint.
  79. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  80. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Method and systems for securing remote access to private networks.
  81. McKeeth, James, Method for controlling user access to an electronic device.
  82. Ramos, Daniel O.; MacIntosh, Brian T.; Rhoads, Geoffrey B., Method for enhancing content using persistent content identification.
  83. Mehta, Sachin; Varadharajan, Vijayaraghavan; Nallusamy, Rajarathnam, Method, system, and computer-readable medium for embedding and extracting a watermark in a video.
  84. Rhoads, Geoffrey B., Methods and apparatus to process imagery or audio content.
  85. Rhoads, Geoffrey B., Methods and arrangements employing digital content items.
  86. Rhoads, Geoffrey B., Methods and arrangements employing digital content items.
  87. Rhoads, Geoffrey B.; Rodriguez, Tony F., Methods and devices employing content identifiers.
  88. Rhoads, Geoffrey B.; Rodriguez, Tony F., Methods and devices employing content identifiers.
  89. Rhoads, Geoffrey B.; Rodriguez, Tony F., Methods and devices involving imagery and gestures.
  90. Rhoads, Geoffrey B., Methods and devices responsive to ambient audio.
  91. Rhoads, Geoffrey B., Methods and devices responsive to ambient audio.
  92. Hannigan, Brett T; Sharma, Ravi K; Rodriguez, Tony F, Methods and related toy and game applications using encoded information.
  93. Rhoads, Geoffrey B., Methods and systems employing digital content.
  94. Gritton, Charles; Simpkins, Daniel; Morgan, Tom, Methods and systems for analyzing parts of an electronic file.
  95. Ryman, Paul; Feijoo, Ricardo Fernando; Nagubadi, Anil, Methods and systems for cataloging text in a recorded session.
  96. Glover, Robin Wallace, Methods and systems for comparing presentation slide decks.
  97. More, Scott; Beyer, Ilya, Methods and systems for exact data match filtering.
  98. Mazzaferri, Richard James, Methods and systems for generating playback instructions for playback of a recorded computer session.
  99. Mazzaferri, Richard James, Methods and systems for generating playback instructions for rendering of a recorded computer session.
  100. More, Scott, Methods and systems for image fingerprinting.
  101. More, Scott, Methods and systems for image fingerprinting.
  102. Corbett, Tim; Petrov, Julian; Rivera, Juan, Methods and systems for improving resource utilization by delaying rendering of three dimensional graphics.
  103. Ryman, Paul Adam, Methods and systems for in-session playback on a local machine of remotely-stored and real time presentation layer protocol data.
  104. Rhoads, Geoffrey B., Methods and systems for inserting watermarks in digital signals.
  105. Rhoads, Geoffrey B., Methods and systems for interacting with physical objects.
  106. Ryman, Paul, Methods and systems for joining a real-time session of presentation layer protocol data.
  107. Mulder, Samuel Peter Matthew, Methods and systems for monitoring documents exchanged over email applications.
  108. More, Scott, Methods and systems for preventing unauthorized disclosure of secure information using image fingerprinting.
  109. More, Scott; Beyer, Ilya; Sweeting, Daniel Christopher John, Methods and systems for protect agents using distributed lightweight fingerprints.
  110. Ryman, Paul Adam, Methods and systems for real-time seeking during real-time playback of a presentation layer protocol data stream.
  111. Rivera, Juan; Corbett, Tim; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  112. Rivera, Juan; Corbett, Timothy J.; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  113. Rivera, Juan; Corbett, Timothy J.; Petrov, Julian, Methods and systems for remoting three dimensional graphics.
  114. Rhoads, Geoffrey B.; Rodriguez, Tony F., Methods and systems for user-association of visual stimuli with corresponding responses.
  115. More, Scott; Beyer, Ilya, Methods and systems to fingerprint textual information using word runs.
  116. More, Scott; Beyer, Ilya; Sweeting, Daniel Christopher John, Methods and systems to implement fingerprint lookups across remote agents.
  117. More, Scott; Beyer, Ilya; Sweeting, Daniel Christopher John, Methods and systems to implement fingerprint lookups across remote agents.
  118. Rhoads, Geoffrey B., Methods and systems useful in linking from objects to remote resources.
  119. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  120. Rhoads, Geoffrey B., Methods for analyzing electronic media including video and audio.
  121. Rhoads, Geoffrey B., Methods for audio watermarking and decoding.
  122. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  123. Rhoads, Geoffrey B.; Hein, III, William C.; Levy, Kenneth L., Methods for linking from objects to remote resources.
  124. Rhoads, Geoffrey B., Methods for managing content using intentional degradation and insertion of steganographic codes.
  125. Rhoads, Geoffrey B., Methods for steganographic encoding media.
  126. Rhoads,Geoffrey B., Methods for steganographic encoding media.
  127. Rodriguez, Tony F.; Brundage, Trent J.; Shovoly, Steven Michael, Methods involving maps, imagery, video and steganography.
  128. Rodriguez, Tony F.; Brundage, Trent J.; Shovoly, Steven Michael, Methods involving maps, imagery, video and steganography.
  129. Rodriguez, Tony F.; Brundage, Trent J.; Shovoly, Steven Michael, Methods involving maps, imagery, video and steganography.
  130. Rhoads, Geoffrey B.; Conwell, William Y., Methods of interacting with audio and ambient music.
  131. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  132. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  133. Brunk, Hugh L.; Levy, Kenneth L., Methods, apparatus and programs for generating and utilizing content signatures.
  134. Rhoads, Geoffrey B., Music methods and systems.
  135. Rhoads, Geoffrey B, Network linking methods and apparatus.
  136. Rodriguez, Tony F.; Brundage, Trent J., Noise influenced watermarking methods and apparatus.
  137. McKinley, Tyler J.; Hein, III, William C.; Rodriguez, Tony F.; Reed, Alastair M.; Rhoads, Geoffrey B., Parallel processing of digital watermarking operations.
  138. Rhoads,Geoffrey B.; Davis,Bruce L.; Evans,Douglas B., Portable devices and methods employing digital watermarking.
  139. Inoue, Hiroshi; Tawa, Kazutomo; Sakui, Masato; Omata, Masaki; Nomura, Hiroki, Printing service system and printing service program.
  140. Levy, Kenneth L.; Hiatt, R. Stephen; Rhoads, Geoffrey B., Processing audio or video content with multiple watermark layers.
  141. Rhoads, Geoffrey B., Processing data representing video and audio and methods and apparatus related thereto.
  142. Rhoads,Geoffrey B., Providing reports associated with video and audio content.
  143. Levy, Kenneth L.; Rhoads, Geoffrey B.; Hiatt, R. Stephen, Rights management system and methods.
  144. Hein, III, William C., Routing networks for use with content linking systems.
  145. Hein, III, William C., Routing networks for use with content linking systems.
  146. Rhoads,Geoffrey B., Securing media content with steganographic encoding.
  147. Ramnani, Subash, Simulating multi-monitor functionality in a single monitor environment.
  148. Rhoads, Geoffrey B., Steganographic encoding for video and images.
  149. Carr, J. Scott; Lofgren, Neil E.; Seder, Phillip Andrew, Steganographic encoding methods and apparatus.
  150. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  151. Evans, Douglas B.; Conwell, William Y., Substituting or replacing components in sound based on steganographic encoding.
  152. Davis, Bruce L.; Rodriguez, Tony F.; Rhoads, Geoffrey B., Synchronizing rendering of multimedia content.
  153. McKeeth, James, System and method for controlling user access to an electronic device.
  154. McKeeth, James, System and method for controlling user access to an electronic device.
  155. McKeeth, James, System and method for controlling user access to an electronic device.
  156. McKeeth, James, System and method for controlling user access to an electronic device.
  157. McKeeth, James, System and method for controlling user access to an electronic device.
  158. McKeeth, James, System and method for controlling user access to an electronic device.
  159. Glover, Robin, System and method for determining document version geneology.
  160. Farkash, Eyal, System and method for embedding data in video.
  161. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  162. Sundarrajan, Prabakar; He, Junxiao; Soni, Ajay; Nanjundaswamy, Shashidhara; Kumar, Arkesh, System and method for establishing a virtual private network.
  163. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  164. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; K.R., Bharat Bhushan; Kumar, Anil, System and method for performing flash caching of dynamically generated objects in a data communication network.
  165. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bushan K. R., Bharath; Kumar, Anil, System and method for performing flash crowd caching of dynamically generated objects in a data communication network.
  166. Sundarrajan, Prabakar; Khemani, Prakash; Kailash, Kailash; Soni, Ajay; Sinha, Rajiv; Annamalaisami, Saravana; Bhushan KR, Bharath; Kumar, Anil, System and method for performing granular invalidation of cached dynamically generated objects in a data communication network.
  167. Mulder, Matthew, System and method for securing documents prior to transmission.
  168. Mazzaferri, Richard James, System and methods for automatic time-warped playback in rendering a recorded computer session.
  169. Rhoads, Geoffrey B.; Davis, Bruce L.; Hein, III, William C.; Rosenthol, Joshua A.; MacIntosh, Brian T.; Levy, Kenneth L., System for linking from objects to remote resources.
  170. Ramos, Daniel O.; MacIntosh, Brian T.; Rhoads, Geoffrey B., System for managing display and retrieval of image content on a network with image identification and linking to network content.
  171. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for automatic installation and execution of a client-side acceleration program.
  172. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for client-side application-aware prioritization of network communications.
  173. Rao, Goutham P.; Rodriguez, Robert A.; Brueggemann, Eric R., Systems and methods for communicating a lossy protocol via a lossless protocol.
  174. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements.
  175. Plamondon, Robert, Systems and methods for identifying long matches of data in a compression history.
  176. Plamondon, Robert, Systems and methods for identifying long matches of data in a compression history.
  177. Plamondon, Robert D., Systems and methods for identifying long matches of data in a compression history.
  178. Barton, Gary Lee; Feijoo, Ricardo Fernando, Systems and methods for managing printer settings in a networked computing environment.
  179. Ramos, Daniel O.; Jones, Kevin C.; Rhoads, Geoffrey B., Systems and methods for processing content objects.
  180. Rao, Goutham P.; Rodriguez, Robert; Brueggemann, Eric, Systems and methods for providing a VPN solution.
  181. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP buffering.
  182. Sundarrajan, Prabakar; He, Junxiao; Nanjundaswamy, Shashi; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil, Systems and methods for providing client-side accelerated access to remote applications via TCP multiplexing.
  183. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Nanjundaswamy, Shashi, Systems and methods for providing client-side accelerated access to remote applications via TCP pooling.
  184. Sundarrajan, Prabakar; He, Junxiao; Verzunov, Sergey; Venkatraman, Charu; Shetty, Anil; Suganthi, Josephine, Systems and methods for providing client-side dynamic redirection to bypass an intermediary.
  185. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Osviannikov, Michael; Plamondon, Robert, Systems and methods for providing dynamic ad hoc proxy-cache hierarchies.
  186. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods for providing dynamic ad hoc proxy-cache hierarchies.
  187. Samuels, Allen R.; Collins, Henry, Systems and methods for real-time endpoint application flow control with network structure component.
  188. Samuels, Allen R.; Collins, Henry, Systems and methods for real-time endpoint application flow control with network structure component.
  189. Samuels, Allen R.; Jensen, Richard; Dittia, Zubin; Decasper, Dan S.; Ovsiannikov, Michael; Plamondon, Robert D., Systems and methods for sharing compression histories between multiple devices.
  190. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods for sharing compression histories between multiple devices.
  191. Ryman, Paul, Systems and methods for single stack shadowing.
  192. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods of compression history expiration and synchronization.
  193. Meyer, Joel R.; Rhoads, Geoffrey B., Systems and methods of managing audio and other media.
  194. Verzunov, Sergey; Venkatraman, Charu; He, Junxiao; Nanjundaswamy, Shashi; Bhushan, Bharath; Annamalaisami, Saravana; Suganthi, Josephine; Shetty, Anil, Systems and methods of symmetric transport control protocol compression.
  195. Samuels, Allen; Jensen, Richard; Dittia, Zubin; Decasper, Dan; Ovsiannikov, Michael; Plamondon, Robert, Systems and methods of using application and protocol specific parsing for compression.
  196. Levy, Kenneth L.; Meyer, Joel R.; Andrews, III, Hoyet Harrison, Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities.
  197. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  198. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  199. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques for item delivery and execution.
  200. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  201. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  202. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  203. Levy,Kenneth L., User-friendly rights management systems and methods.
  204. Levy, Kenneth L., Using object identifiers with content distribution.
  205. Levy, Kenneth L.; Perry, Burt W., Watermark and fingerprint systems for media.
  206. Davidson, Clayton L.; Kumar, Aruna B., Watermark decoding from streaming media.
  207. Levy, Kenneth L., Watermark embedding functions adapted for transmission channels.
  208. Sharma, Ravi K., Watermark synchronization signals conveying payload data.
  209. Sharma, Ravi K.; Alattar, Adnan M.; Ahmed, Farid; Rhoads, Geoffrey B., Wavelet domain watermarks.
  210. Rhoads, Geoffrey B., Wireless methods and devices employing plural-bit data derived from audio information.
  211. Rhoads, Geoffrey B., Wireless methods and devices employing plural-bit data derived from audio information.
  212. Rhoads, Geoffrey B.; Rodriguez, Tony F., Wireless mobile phone methods.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로