$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and device for monitoring and analyzing signals 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-019/00
출원번호 US-0657181 (2000-09-07)
등록번호 US-7346472 (2008-03-18)
발명자 / 주소
  • Moskowitz,Scott A.
  • Berry,Michael W.
출원인 / 주소
  • Blue Spike, Inc.
인용정보 피인용 횟수 : 219  인용 특허 : 196

초록

A method and system for monitoring and analyzing at least one signal are disclosed. An abstract of at least one reference signal is generated and stored in a reference database. An abstract of a query signal to be analyzed is then generated so that the abstract of the query signal can be compared to

대표청구항

What is claimed is: 1. A method for monitoring and analyzing at least one signal comprising: receiving at least one reference signal to be monitored; creating an abstract of said at least one reference signal wherein the step of creating an abstract of said at least one reference signal comprises:

이 특허에 인용된 특허 (196)

  1. Magnotti Joseph C. ; Nelson Larry A., 32N +D bit key encryption-decryption system using chaos.
  2. Cassada Thomas Edward (Lexington KY), Abstracting system for index search machine.
  3. Zhao, Jian, Active watermarks and watermark agents.
  4. Allen Richard (111 E. Myrna La. Tempe AZ 85284), Apparatus and method for an on demand data delivery system for the preview, selection, retrieval and reproduction at a r.
  5. Wolosewicz Jack ; Jemili Kanaan, Apparatus and method for encoding and decoding information in analog signals.
  6. Wolosewicz Jack, Apparatus and method for encoding and decoding information in audio signals.
  7. Berners-Lee Charles Peter,GBX, Apparatus and method for encoding data.
  8. Yamakawa Takeshi (781-300 Ohaza Koubukuro ; Iizuka-shi ; Fukuoka JPX), Apparatus and method for generating chaotic signals and chaos device.
  9. Sakai Yorihiko,JPX ; Ota Osamu,JPX ; Sakura Kouhei,JPX, Apparatus and method for managing picture data.
  10. Davis Derek L. (Phoenix AZ) Smith Lionel (Queen Creek AZ), Apparatus and method for preventing disclosure through user-authentication at a printing node.
  11. Senoh Takanori,JPX, Apparatus and method for watermark data insertion and apparatus and method for watermark data detection.
  12. Jensen James M. (Columbia MD) Graybill Robert B. (Ellicott City MD) Hassan Sayed (Clarksville MD) Lynch Wendell D. (Silver Spring MD) Sabin Wayne (Baldwin MD), Apparatus and methods for including codes in audio signals and decoding.
  13. Muehrcke Eric B. (Middletown NJ), Arrangement for reserving and allocating a plurality of competing demands for an ordered bus communication network.
  14. Fujisaki Masataka (Machida JPX), Auction information transmission processing.
  15. Clearwater Scott H. (Woodside CA), Auction-based control system for energy resource management in a building.
  16. Rhoads Geoffrey B., Audio steganography.
  17. Pitkin Richard P. (Lowell MA) Morency John P. (Chelmsford MA), Broker for computer network server selection.
  18. Druyvesteyn Willem F. (Eindhoven NLX) Hoogendoorn Abraham (Eindhoven NLX) Van De Kerkhof Leon M. (Eindhoven NLX) Veldhuis Raymond N. J. (Eindhoven NLX), Coder for incorporating an auxiliary information signal in a digital audio signal, decoder for recovering such signals f.
  19. Katto, Jiro, Coding/decoding apparatus, coding/decoding system and multiplexed bit stream.
  20. Braudaway Gordon W. (Yorktown Heights NY) Magerlein Karen A. (Ossining NY) Mintzer Frederick C. (Shrub Oak NY), Color correct digital watermarking of images.
  21. Ausubel Lawrence M., Computer implemented methods and apparatus for auctions.
  22. Holmes Keith (Dublin IEX), Computer software protection.
  23. Yu,Hong Heather; Li,Xin, Computer-implemented method and apparatus for audio data hiding.
  24. Kato Taku,JPX ; Kato Takehisa,JPX ; Endoh Kenjiro,JPX ; Yamada Hisashi,JPX ; Endoh Naoki,JPX, Copy protection apparatus and information recording medium used in this copy protection apparatus.
  25. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  26. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  27. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  28. Hustig Charles H. (Hudson WI) Ward Jeffrey L. (Hudson WI) Moses Donald W. (Minneapolis MN) Bradford Robert S. (Woodland Hills CA), Data and voice communications system.
  29. Her Sung-min (Seoul KRX) Choi Yang-hun (Seoul KRX) Choi Dong-soo (Seoul KRX) Kim In (Seoul KRX), Data communication apparatus and method having concurrent image overlay function.
  30. Miwa Kunihiko,JPX ; Morimoto Norishige,JPX ; Shimizu Shuichi,JPX, Data control system.
  31. Sandford ; II Maxwell T. (160 Monte Rey S. Los Alamos NM 87544) Handel Theodore G. (316 Bryce Ave. Los Alamos NM 87544), Data embedding.
  32. Saito Makoto,JPX, Data management system.
  33. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  34. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  35. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  36. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  37. Brugger Rolf (Keistenweg 1 CH-4310 Rheinfelden CHX), Device for the distribution of music information in digital form.
  38. Yoshiura Hiroshi,JPX ; Takaragi Kazuo,JPX ; Sasaki Ryoichi,JPX ; Susaki Seiichi,JPX ; Toyoshima Hisashi,JPX ; Saito Tsukasa,JPX, Digital data authentication method.
  39. Thompson John R. (La Quinta CA) Hunting C. J. (Altadena CA) Phipps William L. (Bermuda Dunes CA) Raynesford Steven J. (Cathedral City CA) Rittmueller Philip H. (St. Charles IL), Digital data cryptographic system.
  40. Moskowitz Scott A. (#503 City Fukazawa 3-5-10 Fukazawa Setagaya-ku Tokyo 158 JPX), Digital information commodities exchange.
  41. Moskowitz Scott A. (3-5-10 Fukazawa Setagaya-ku ; Tokyo 158 JPX), Digital information commodities exchange.
  42. Adelson Edward H. (Cambridge MA), Digital signal encoding and decoding apparatus.
  43. Ryoma Oami JP; Yoshihiro Miyamoto JP; Mutsumi Ohta JP, Digital watermark insertion system and digital watermark characteristic table creating device.
  44. Cox Ingemar J. ; Miller Matthew L.,LTX ; Tanaka Kazuyoshi,JPX ; Wakasu Yutaka,JPX, Digital watermarking.
  45. Lewis, Arianne M.; Basch, Evert, Digital watermarking.
  46. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Digital watermarking to resolve multiple claims of ownership.
  47. Knox Keith T., Digital watermarking using stochastic screen patterns.
  48. Cates ; Jr. Henry J. (De Kalb County ; near Atlanta GA) Rosenberg Tom (East Point GA) Entrekin Harvey E. (Dalton GA), Disposal feeding system including selective container control.
  49. Silverman David L. (Nesconset NY) Scholldorf Alfred H. (Port Jefferson Station NY) Keller Norman (Mt. Sinai NY), Distributed matching system.
  50. Miller Mark S. (Los Altos CA) Tribble E. Dean (Los Altos CA) Hardy Norman (Portola Valley CA) Hibbert Christopher T. (Mountain View CA), Diverse goods arbitration system and method for allocating resources in a distributed computer system.
  51. Philibert Alex C. (3001 Mockingbird Dr. Sierra Vista AZ 85635) Smith Jack W. (1831 Exeter Dr. Sierra Vista AZ 85635) Fox James W. (172 Andrea Dr. Sierra Vista AZ 85635), Document reproduction security system.
  52. Macheel Gary W. (Anaheim CA), Electronic card game.
  53. Houser Peter B. (Poway CA) Adler James M. (Ocean Beach CA), Electronic document verification system and method.
  54. Keiichi Iwamura JP, Electronic watermark system electronic information distribution system and image filing apparatus.
  55. Schuyler Reynier Quackenbush ; Amy Ruth Reibman ; David Hilton Shur ; James H. Snyder, Electronic watermarking in the compressed domain utilizing perceptual coding.
  56. Morris Dale C. (Menlo Park CA), Embedded hidden identification codes in digital objects.
  57. Preuss Robert D. (Boston MA) Roukos Salim E. (Scarsdale NY) Huggins A. W. F. (Arlington MA) Gish Herbert (Newton MA) Bergamo Marcos A. (Wellesley MA) Peterson Patrick M. (Cambridge MA) Derr Alan G. (, Embedded signalling.
  58. Gross Gary (Apt. 203 2721 Victoria Pk. Ave. Agincourt ; Ontario CAX M1T 3N6) Dale James (65 Huntley St. Toronto CAX M44 2L2), Encoding system.
  59. Brothers Harlan Jay ; Genly Chris Hind, Event verification system.
  60. Hellman Martin E. (Stanford CA) Pohlig Stephen C. (Acton MA), Exponentiation cryptographic apparatus and method.
  61. Cox Ingemar J. ; Miller Matthew L., Field-based watermark insertion and detection.
  62. Jackson Brian H. (Litchfield NH), Full page graphics image display data reduction.
  63. Balogh Aristotle (Bowie MD) Blejer Hatte (Alexandria VA) Chen Eugene (Arlington VA) Flank Sharon (Washington DC) Iannacone Carmen (Fairfax VA) Maloney John (Upper Marlboro MD) Martin Patrick (Arlingt, Generation, archiving, and retrieval of digital images with evoked suggestion-set captions and natural language interfac.
  64. Poole Nigel T. ; Spinney Barry A., Hash-based translation method and apparatus with multiple level collision resolution.
  65. Gennaro Rosario ; Rohatgi Pankaj, How to sign digital streams.
  66. Jones Paul W. (Churchville NY) Melnychuck Paul W. (West Henrietta NY), Hybrid residual-based hierarchical storage and display method for high resolution digital images in a multiuse environme.
  67. Blank Arthur M. (San Diego CA), Image editing system including masking capability.
  68. Nagashima Takayuki,JPX ; Suzuki Toshiaki,JPX ; Iwamura Keiichi,JPX, Image transmission apparatus, image transmission system, and communication apparatus.
  69. Miller Samuel Lee (Albuquerque NM) Miller William Michael (Tijeras NM) McWhorter Paul Jackson (Albuquerque NM), Information encoder/decoder using chaotic systems.
  70. Choy David M., Integrated method and system for controlling information access and distribution.
  71. Duvall William S. ; Kendall Matthew, Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering a.
  72. Maher David P. (Windham NH), Key management scheme for use with electronic cards.
  73. Honsinger Chris W. ; Jones Paul W. ; Rabbani Majid ; Stoffel James C., Lossless recovery of an original image containing embedded data.
  74. Chung Tae-yun,KRX ; Oh Young-nam,KRX, MPEG2 moving picture encoding/decoding system.
  75. Okada Akihiro (Kawasaki JPX) Kino Tooru (Kawasaki JPX), Mail center management system.
  76. Wirtz Gijsbrecht C.,NLX, Marking a video and/or audio signal.
  77. Xie, Liehua; Lewis, Arianne M.; Basch, Evert; Arce, Gonzalo, Message authentication code using image histograms.
  78. Lee Cyril Arthur (Maidenhead EN), Method and apparatus for authenticating a record medium consisting of applying two different strength magnetizing fields.
  79. Jeffrey Allen Jones ; Michael Wayne Brown, Method and apparatus for autosynchronizing distributed versions of documents.
  80. Wehrenberg, Paul J., Method and apparatus for copy protection.
  81. Bender Walter (Auburndale MA) Morimoto Norishige (Tokyo JPX) Gruhl Daniel (Cambridge MA), Method and apparatus for data hiding in images.
  82. Pearson, Terry; Colley, Tom; Manor, Larry; Kidder, Joe; Cabeca, Linda, Method and apparatus for discarding data packets.
  83. Achilles, Heather; Pearson, Terry; Gallo, Paul; Manor, Larry, Method and apparatus for discarding data packets through the use of descriptors.
  84. Bender Walter ; Gruhl Daniel ; Morimoto Norishige,JPX, Method and apparatus for echo data hiding in audio signals.
  85. Barton James M., Method and apparatus for embedding authentication information within digital data.
  86. Barton James M. (101 Sund Ave. Los Gatos CA 95032), Method and apparatus for embedding authentication information within digital data.
  87. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin ; Boney Laurence,FRX, Method and apparatus for embedding data, including watermarks, in human perceptible sounds.
  88. Cooper Thomas E. (Louisville CO) Philips Hudson W. (Boulder CO) Pryor Robert F. (Longmont CO), Method and apparatus for enabling trial period use of software products: Method and apparatus for utilizing a decryption.
  89. Cooper Thomas Edward ; Phillips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption.
  90. Aijala Victor A. (Arnold MD) Cohen Gerald B. (Gaithersburg MD) Jensen James M. (Columbia MD) Lynch Wendell D. (Silver Spring MD) Urbi Juan C. (Laurel MD), Method and apparatus for encoding/decoding broadcast or recorded segments and monitoring audience exposure thereto.
  91. Indeck Ronald S. (Olivette MO) Muller Marcel W. (St. Louis MO), Method and apparatus for fingerprinting magnetic media.
  92. Man Bae Kim KR, Method and apparatus for generating steroscopic image using MPEG data.
  93. Florencio Dinei A. ; Isnardi Michael A., Method and apparatus for imbedding a watermark into a bitstream representation of a digital image sequence.
  94. Indeck Ronald Scott ; Muller Marcel Wettstein ; Engel George Lawrence ; Hege Alan Lee, Method and apparatus for improved fingerprinting and authenticating various magnetic media.
  95. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Method and apparatus for marking the information content of an information carrying signal.
  96. Indeck Ronald S. (Olivette MO) Muller Marcel W. (St. Louis MO), Method and apparatus for process control, tension control, and testing of magnetic media.
  97. Nagata Atsushi (Hirakata JPX) Uekawa Yutaka (Ashiya JPX) Senoo Takanori (Hirakata JPX) Takahashi Kenichi (Kyoto JPX), Method and apparatus for protection of signal copy.
  98. Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
  99. Hill Brian R. (Los Angeles CA), Method and apparatus for recording sensor data.
  100. Rabbani Majid (Pittsford NY), Method and apparatus for reducing quantization artifacts in a hierarchical image storage and retrieval system.
  101. Baugher Mark J. (Austin TX) Chang Philip Y. (Austin TX) Morris Gregory L. (Round Rock TX) Stephens Alan P. (Austin TX), Method and apparatus for reserving system resources to assure quality of service.
  102. Rhoads Geoffrey B., Method and apparatus for robust information coding.
  103. Greenberg Burton L. (New York NY), Method and apparatus for the processing of encoded data in conjunction with an audio broadcast.
  104. Nagata Atsushi (Hirakata JPX) Uekawa Yutaka (Ashiya JPX) Senoo Takanori (Hirakata JPX) Takahashi Kenichi (Kyoto JPX), Method and apparatus for the protection of signal copy.
  105. Shur David Hilton, Method and apparatus for watermarking digital bitstreams.
  106. Todd R. Collart, Method and program product for preventing unauthorized users from using the content of an electronic storage medium.
  107. Kocher, Paul C., Method and system for copy-prevention of digital copyright works.
  108. Powell Robert D. ; Nitzberg Mark J., Method and system for digital image signatures.
  109. Moskowitz Scott A. ; Cooperman Marc, Method and system for digital watermarking.
  110. Allen Jonathon Brandon, Method and system for ensuring royalty payments for data delivered over a network.
  111. Geiner Robert V. (Poughkeepsie NY) Jensen David L. (Peekskill NY), Method and system for global optimization of device allocation.
  112. Epstein, Michael; Pasieka, Michael, Method and system for preventing unauthorized playback of broadcasted digital data streams.
  113. Cox, Ingemar J.; Miller, Matthew L., Method and system for protecting digital data from unauthorized copying.
  114. Eller Marlin Jay, Method and system for searching compressed data.
  115. Sixtus Timothy, Method and system for secure online transaction processing.
  116. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  117. Toru Ichien JP; Junichi Kimura JP; Tadashi Saitoh JP; Yutaka Okunoki JP, Method for compressing and decompressing moving picture information and video signal processing system.
  118. Peter J. Wonfor ; Derek T. Nelson, Method for controlling copy protection in digital video networks.
  119. Daly Scott J. ; Squilla John R. ; Denber Michel ; Honsinger Chris W. ; Hamilton John, Method for embedding digital information in an image.
  120. Powell Robert D. ; Nitzberg Mark J., Method for encoding auxiliary data within a source signal.
  121. Borgelt Kenneth B. (Rolling Meadows IL) Mayer Glenn N. (Elgin IL), Method for generating a password using public key cryptography.
  122. Moskowitz Scott A. ; Cooperman Marc, Method for human-assisted random key generation and application for digital watermark system.
  123. Powell Robert D. ; Nitzberg Mark J., Method for image encoding.
  124. Macy, William W.; Holliman, Matthew J.; Yeung, Minerva Ming-Yee, Method for robust watermarking of content.
  125. Moskowitz Scott A. ; Cooperman Marc, Method for stega-cipher protection of computer code.
  126. Montanari Danny J. (Arvada CO) Coleman Glenn M. (Saguache CO), Method for tracking the production history of food products.
  127. Narasimhalu Arcot D. (Singapore SGX) Wang Weiguo (Singapore SGX) Kankanhalli Mohan S. (Singapore SGX), Method for utilizing medium nonuniformities to minimize unauthorized duplication of digital information.
  128. Shimada Michio,JPX, Method of and an apparatus for generating internal crypto-keys.
  129. Paterson Thomas S. ; Holtzman Samuel ; Bangs Alex L., Method of generating a display for a dynamic simulation model utilizing node and link representations.
  130. Koopman ; Jr. Philip J., Method of generating secret identification numbers.
  131. Shamir Adi (Rehovot ILX) Fiat Amos (Rehovot ILX), Method, apparatus and article for identification and signature.
  132. Logan James D. ; Goessling Daniel F. ; Goldhor Richard S., Methods and apparatus for selectively reproducing segments of broadcast programming.
  133. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  134. Rhoads Geoffrey B., Methods for controlling systems using control signals embedded in empirical data.
  135. Warren Robert L. ; Lee Chong U. ; Moallemi Kamran, Multi-media copy management system.
  136. Warren Robert L. ; Lee Chong U. ; Moallemi Kamran, Multi-media copy management system.
  137. Yeung, Minerva Ming-Yee; Holliman, Matthew J.; Liu, Robert G.; Macy, William W.; Yeo, Boon-Lock, Multimedia data delivery and playback system with multi-level content and privacy protection.
  138. Ahmed Tewfik ; Mitchell D. Swanson ; Bin Zhu, Multimedia data embedding.
  139. Moskowitz Scott A., Multiple transform utilization and applications for secure digital watermarking.
  140. Daniel Ullum ; Thomas J. Edsall ; Soei-Shin Hang, Network switch with hash table look up.
  141. Suzanne Marie Pietropaolo ; Phillip T. DiBello ; Anthony M. Scotto, Jr., Nonlinear video editing system.
  142. Moskowitz Scott A. ; Cooperman Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  143. Moskowitz, Scott A.; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  144. Miller Mark S. ; Hardy Norman ; Tribble E. Dean ; Hibbert Christopher T. ; Hill Eric C., Persistent distributed capabilities.
  145. Binding, Carl; Hild, Stefan Georg; O'Connor, Luke James; Singhal, Sandeep K.; Shoup, Victor John; Steiner, Michael, Piggy-backed key exchange protocol for providing secure low-overhead browser connections from a client to a server using a trusted third party.
  146. Jean Laroche, Process for identifying audio content.
  147. Harada, Shunji; Kozuka, Masayuki; Minami, Masataka; Tatebayashi, Makoto, Production protection system dealing with contents that are digital production.
  148. Briggs Robert (Annandale VA) Iannacone Carmen (Fairfax VA) Rothey James (Fairfax VA) Evans David (Falls Church VA), Protection of an electronically stored image in a first color space by the alteration of a digital component in a second.
  149. Sala Nicola R. (61 Hyannis Avenue Nepean ; Ontario CAX K2J 3G2 ) Sala Rocco L. (62 Palsen Street Nepean ; Ontario CAX K2G 2W4 ), Proximity alarm system.
  150. Koopman ; Jr. Philip J. (Hebron CT) Finn Alan M. (Amston CT), Pseudorandom number generation and cryptographic authentication.
  151. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  152. Hoffstein Jeffrey ; Pipher Jill ; Silverman Joseph H., Public key cryptosystem method and apparatus.
  153. Koopman ; Jr. Philip J. (Hebron CT), Random number generating system and process based on chaos.
  154. Rhoads, Geoffrey B.; Davis, Bruce L.; Carr, J. Scott, Reconfiguring a watermark detector.
  155. Wong Simon ; Wilson Stewart ; Tilli Marco, Report server caching.
  156. Cox Ingemar J. ; Miller Matthew L. ; Oami Ryoma,JPX, Robust digital watermarking.
  157. Bloom Jeffrey A. ; Cox Ingemar J. ; Miller Matthew L. ; Wu Min ; Lin Ching-Yung ; Lui Yui Man, Rotation, scale, and translation resilient public watermarking for images using a log-polar fourier transform.
  158. Malvar Henrique S., Scalable audio coder and decoder.
  159. Hirose Masaki,JPX, Scramble/descramble method and apparatus for data broadcasting.
  160. Zhao Jian ; Koch Eckhard,DEX ; Saito Makoto,JPX, Secure distribution of digital representations.
  161. Schwab Barry H., Secure identification system.
  162. Follendore ; III Roy D. (Manassas VA), Secure network method and apparatus.
  163. Davis Derek L., Secure public digital watermark.
  164. Cox Ingemar J. ; Kilian Joseph J. ; Shamoon Talal G., Secure spread spectrum watermarking for multimedia data.
  165. Lee Wayne M. (200 Deer Creek Dr. Matthews NC 28105), Secure teleprocessing bidding system.
  166. Fu Chi-Yung ; Petrich Loren I., Selective document image data compression technique.
  167. Best Stuart J. (Hayes GB2) Willard Reginald A. (Hayes GB2), Signal identification.
  168. Best Stuart J. (Harlington GB2) Johnson Nigel (Windlesham GB2) Sandford Adrian M. (Hayes GB2), Signal identification system.
  169. Yuval,Gideon A., Software anti-piracy systems and methods utilizing certificates with digital content.
  170. Michel Alan D. (Fishers IN) Reinke Robert E. (Indianapolis IN), Software pay per use system.
  171. Ginkel Peter (1275 Northcliff Trace Roswell GA 30076), Software protection and identification system.
  172. DeJean Jean P. (Cincinnati OH) Lu Daozheng (Buffalo Grove IL) Weissman Robert (Westport CT), Spread spectrum digital data transmission over TV video.
  173. Boncelet, Jr., Charles G.; Marvel, Lisa M.; Retter, Charles T., Spread spectrum image steganography.
  174. Cox Ingemar J., Spread spectrum watermark for embedded signalling.
  175. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  176. Moskowitz Scott A. (Tokyo JPX) Cooperman Marc (Palo Alto CA), Steganographic method and device.
  177. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  178. Geoffrey B. Rhoads, Steganographically encoding a first image in accordance with a second image.
  179. Rhoads Geoffrey B. (West Linn OR), Steganography methods employing embedded calibration data.
  180. Conley Ralph F., System and method for encrypting sensitive information.
  181. Erickson John S., System and method for managing copyrighted electronic media.
  182. Fox Barbara L. ; Waters Lester L. ; Spelman Jeffrey F. ; Seidensticker Robert B. ; Thomlinson Matthew W., System and method for secure electronic commerce transactions.
  183. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  184. Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
  185. Lebrun Eric (Saint Jeannet FRX) Francois Pascal (Vence FRX) Raimbault Frederic (Cagnes-Sur-Mer FRX) Warren Jeff (Apex NC), System for effective allocation of network-wide bandwidth.
  186. Chen Brian ; Wornell Gregory W., System method, and product for information embedding using an ensemble of non-intersecting embedding generators.
  187. Collart, Todd R., System, method and article of manufacturing for authorizing the use of electronic content utilizing a laser-centric medium and a network server.
  188. Stringer John W. (Santa Cruz CA) Richards Theodore S. (Los Gatos CA), Transformation of ephemeral material.
  189. Cawley Robin A. (Burghclere GB2) Stapleton Alan L. (Newbury GB2) Brown Ian M. (Caversham GB2), Video image processing system having variable data compression.
  190. Waggener William N. (Sarasota FL), Video system for conveying digital and analog information.
  191. Girod Bernd,DEX ; Hartung Frank H. D.,DEX, Watermarking method and apparatus for compressed digital video.
  192. Cox Ingemar J., Watermarking of image data using MPEG/JPEG coefficients.
  193. Leighton Frank Thomson (15 Charlesden Park Newtonville MA 02160), Watermarking process resilient to collusion attacks.
  194. Wu Min ; Liu Bede, Watermarking scheme for image authentication.
  195. Ravi K. Sharma ; Adnan M. Alattar ; Farid Ahmed ; Geoffrey B. Rhoads, Wavelet domain watermarks.
  196. Moskowitz Scott A. ; Cooperman Marc S., Z-transform implementation of digital watermarks.

이 특허를 인용한 특허 (219)

  1. Kates, Lawrence, Air filter monitoring system.
  2. Glitsch, Hans M.; Shah, Ajay, Audio-based synchronization to media.
  3. Applewhite, Douglas Robert; Foster, Christopher Joseph; Stoddard, Joshua Forrest; Dubrofsky, Sylvain, Biasing a musical performance input to a part.
  4. Sharma, Ravi K., Combined watermarking and fingerprinting.
  5. Hanna, Keith J.; Hoyos, Hector T., Compact biometric acquisition system and method.
  6. Hanna, Keith J.; Hoyos, Hector T., Compact biometric acquisition system and method.
  7. Pham, Hung M.; Jayanth, Nagaraj, Compressor data module.
  8. Pham, Hung M., Compressor diagnostic and protection system and method.
  9. Pham, Hung M., Compressor diagnostic and protection system and method.
  10. Pham, Hung M.; Alsaleem, Fadi M., Compressor having a control and diagnostic module.
  11. Pham, Hung M.; Alsaleem, Fadi M., Compressor having a control and diagnostic module.
  12. Jayanth, Nagaraj; Renken, Troy W., Compressor sensor module.
  13. Jayanth, Nagaraj; Renken, Troy W., Compressor sensor module.
  14. Rhoads,Geoffrey B., Content identification, and securing media content with steganographic encoding.
  15. Brock, James L.; Pitkow, James E., Content monitoring and compliance enforcement.
  16. Brock, James L.; Pitkow, James E., Content monitoring and host compliance evaluation.
  17. Brock, James L.; Pitkow, James E., Content monitoring and host compliance evaluation.
  18. MacIntosh, Brian T.; Rodriguez, Tony F.; Sharma, Ravi K.; Weaver, Matthew M., Content recognition and synchronization using local caching.
  19. MacIntosh, Brian T.; Rodriguez, Tony F.; Sharma, Ravi K.; Weaver, Matthew M., Content recognition and synchronization using local caching.
  20. Sharma, Ravi K., Content recognition employing fingerprinting at different resolutions.
  21. Challinor, Ryan; Boch, Matthew C., Dance competition game.
  22. Flury, Marc A.; Crooker, Kasson D.; Boch, Matthew C.; Egozy, Eran B.; Tate, Dean N.; Goldstein, Seth; Adams, Isaac; Carriuolo, Adam, Dance game and tutorial.
  23. Moskowitz, Scott A., Data protection method and device.
  24. Moskowitz, Scott A., Data protection method and device.
  25. Moskowitz, Scott A., Data protection method and device.
  26. Moskowitz, Scott A., Data protection method and device.
  27. Brock, James L.; Pitkow, James E., Determination of copied content, including attribution.
  28. Levy, Kenneth L.; Rhoads, Geoffrey B., Digital watermarking systems and methods.
  29. Stoddard, Joshua Forrest; Foster, Christopher Joseph; Dubrofsky, Sylvain, Displaying song lyrics and vocal cues.
  30. Beveridge, Robert Allen; Whalen, Jr., Richard J., Dynamic matrix control of steam temperature with prevention of saturated steam entry into superheater.
  31. Beveridge, Robert A.; Whalen, Jr., Richard J., Dynamic tuning of dynamic matrix control of steam temperature.
  32. Hanna, Keith J., Efficient method and system for the acquisition of scene imagery and iris imagery using a single sensor.
  33. Hanna, Keith J., Efficient method and system for the acquisition of scene imagery and iris imagery using a single sensor.
  34. Powell, Therron L.; Carter-Schwendler, Carl M.; Golds, David P., Electronic labeling for offline management of storage devices.
  35. Hanna, Keith J., Ensuring the provenance of passengers at a transportation facility.
  36. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  37. Rhoads, Geoffrey B.; Levy, Kenneth L., Fingerprint methods and systems for media signals.
  38. Hoyos, Hector T.; Hanna, Keith J., Fraud resistant biometric financial transaction system and method.
  39. Hoyos, Hector T.; Hanna, Keith J., Fraud resistant biometric financial transaction system and method.
  40. Hoyos, Hector T.; Hanna, Keith J., Fraud resistant biometric financial transaction system and method.
  41. Arensmeier, Jeffrey N.; Hemmelgarn, Gregg M.; Alsaleem, Fadi M.; Abiprojo, Priotomo, HVAC system remote monitoring and diagnosis.
  42. Arensmeier, Jeffrey N.; Hemmelgarn, Gregg M.; Alsaleem, Fadi M.; Abiprojo, Priotomo, HVAC system remote monitoring and diagnosis.
  43. Alsaleem, Fadi M.; Hemmelgarn, Gregg M., Heat pump system with refrigerant charge diagnostics.
  44. Alsaleem, Fadi M.; Hemmelgarn, Gregg M., Heat-pump system with refrigerant charge diagnostics.
  45. Kawamoto, Yoji, Information processing apparatus and method, information processing system, and transmission medium.
  46. Kawamoto, Yoji, Information processing apparatus and method, information processing system, and transmission medium.
  47. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  48. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  49. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Invariant biohash security system and method.
  50. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  51. Hodgkinson, Charles; Zavieh, Kirk, Metadata record generation.
  52. Hodgkinson, Charles; Zavieh, Kirk, Metadata record generation.
  53. Hodgkinson, Charles; Zavieh, Kirk, Metadata record generation.
  54. Koplar, Edward J., Method and System for encoded information processing.
  55. Kates, Lawrence, Method and apparatus for monitoring a refrigeration-cycle system.
  56. Kates, Lawrence, Method and apparatus for monitoring a refrigeration-cycle system.
  57. Kates, Lawrence, Method and apparatus for monitoring a refrigeration-cycle system.
  58. Kates, Lawrence, Method and apparatus for monitoring a refrigeration-cycle system.
  59. Kates, Lawrence, Method and apparatus for monitoring a refrigeration-cycle system.
  60. Kates, Lawrence, Method and apparatus for monitoring a refrigeration-cycle system.
  61. Kates, Lawrence, Method and apparatus for monitoring refrigeration-cycle systems.
  62. Kates, Lawrence, Method and apparatus for monitoring refrigeration-cycle systems.
  63. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  64. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  65. Koplar, Edward J., Method and system for auxiliary data detection and delivery.
  66. Hanna, Keith J., Method and system for biometric recognition.
  67. Hanna, Keith J., Method and system for biometric recognition.
  68. Hanna, Keith J., Method and system for biometric recognition.
  69. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  70. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  71. Au, Oscar Chi Lim; Zhou, Jiantao, Method and system for encoding multimedia content based on secure coding schemes using stream cipher.
  72. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  73. Hanna, Keith J., Method for confirming the identity of an individual while shielding that individual's personal data.
  74. Cox, Ingemar J., Method for linking an electronic media work to perform an action.
  75. Cox, Ingemar J., Method for tagging an electronic media work to perform an action.
  76. Cox, Ingemar J., Method for taking action based on a request related to an electronic media work.
  77. Cox, Ingemar J., Method for taking action with respect to an electronic media work.
  78. Cox, Ingemar J., Method for using extracted features from an electronic work.
  79. Hanna, Keith J., Method of reducing visibility of pulsed illumination while acquiring high quality imagery.
  80. Thagadur Shivappa, Shankar; Rodriguez, Tony F.; Eaton, Kurt M., Methods and apparatus for facilitating ambient content recognition using digital watermarks, and related arrangements.
  81. Rhoads, Geoffrey B., Methods and devices responsive to ambient audio.
  82. Wang, Avery Li-Chun, Methods and systems for disambiguation of an identification of a sample of a media stream.
  83. Rhoads, Geoffrey B., Methods and systems for interacting with physical objects.
  84. Koplar, Edward J., Methods and systems for processing gaming data.
  85. Wang, Avery Li-Chun; Powar, Rahul; Mills, William Michael; Barton, Christopher Jacques Penrose; Inghelbrecht, Philip Georges; Mukherjee, Dheeraj Shankar, Methods and systems for synchronizing media.
  86. Rhoads, Geoffrey B., Methods and systems useful in linking from objects to remote resources.
  87. Rhoads, Geoffrey B., Methods for controlling rendering of images and video.
  88. Conwell, William Y., Methods for identifying audio or video content.
  89. Conwell, William Y., Methods for identifying audio or video content.
  90. Conwell, William Y., Methods for identifying audio or video content.
  91. Conwell, William Y., Methods for identifying audio or video content.
  92. Cox, Ingemar J., Methods for linking an electronic media work to perform an action.
  93. Cox, Ingemar J., Methods for linking an electronic media work to perform an action.
  94. Hanna, Keith J.; Hoyos, Hector T., Methods for performing biometric recognition of a human eye and corroboration of same.
  95. Hanna, Keith J.; Hoyos, Hector T., Methods for performing biometric recognition of a human eye and corroboration of same.
  96. Hanna, Keith J.; Hoyos, Hector T., Methods for performing biometric recognition of a human eye and corroboration of same.
  97. Hanna, Keith J.; Hoyos, Hector T., Methods for performing biometric recognition of a human eye and corroboration of same.
  98. Hanna, Keith J.; Hoyos, Hector T., Methods for performing biometric recognition of a human eye and corroboration of same.
  99. Hanna, Keith J.; Hoyos, Hector T., Methods for performing biometric recognition of a human eye and corroboration of same.
  100. Hanna, Keith J.; Hoyos, Hector T., Methods for performing biometric recognition of a human eye and corroboration of same.
  101. Hanna, Keith J.; Hoyos, Hector T., Methods for performing biometric recognition of a human eye and corroboration of same.
  102. Cox, Ingemar J., Methods for using extracted feature vectors to perform an action associated with a product.
  103. Cox, Ingemar J., Methods for using extracted feature vectors to perform an action associated with a product.
  104. Cox, Ingemar J., Methods for using extracted feature vectors to perform an action associated with a work identifier.
  105. Cox, Ingemar J., Methods for using extracted feature vectors to perform an action associated with a work identifier.
  106. Cox, Ingemar J., Methods for using extracted features and annotations associated with an electronic media work to perform an action.
  107. Cox, Ingemar J., Methods for using extracted features and annotations associated with an electronic media work to perform an action.
  108. Cox, Ingemar J., Methods for using extracted features to perform an action associated with identified action information.
  109. Cox, Ingemar J., Methods for using extracted features to perform an action associated with identified action information.
  110. Cox, Ingemar J., Methods for using extracted features to perform an action associated with selected identified image.
  111. Cox, Ingemar J., Methods for using extracted features to perform an action associated with selected identified image.
  112. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  113. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  114. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  115. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  116. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  117. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  118. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  119. Hanna, Keith J.; Riddle, George Herbert Needham; Hirvonen, David James; Sliney, David Hammond, Mirror system and method for acquiring biometric data.
  120. Hanna, Keith J.; Riddle, George Herbert Needham; Hirvonen, David James; Sliney, David Hammond, Mirror system and method for acquiring biometric data.
  121. Hanna, Keith J.; Greene, Gary Alan; Hirvonen, David James; Hoyos, Hector T.; Riddle, George Herbert Needham, Mobile identity platform.
  122. Hanna, Keith J.; Greene, Gary Alan; Hirvonen, David James; Riddle, George Herbert Needham, Mobile identity platform.
  123. Hanna, Keith J.; Greene, Gary Alan; Hirvonen, David James; Riddle, George Herbert Needham, Mobile identity platform.
  124. Hanna, Keith J.; Greene, Gary Alan; Hirvonen, David James; Riddle, George Herbert Needham, Mobile identity platform.
  125. Hanna, Keith J.; Greene, Gary Alan; Hirvonen, David James; Riddle, George Herbert Needham, Mobility identity platform.
  126. Beveridge, Robert Allen, Model-based load demand control.
  127. Beveridge, Robert Allen, Model-based load demand control.
  128. Adams, Isaac; Boch, Matthew C.; Flury, Marc A., Movement based recognition and evaluation.
  129. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  130. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  131. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  132. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  133. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  134. Bent, II, Bruce R.; Buarque de Macedo, Charles R., Notification system and method.
  135. Powell, Therron L.; Carter Schwendler, Carl M.; Golds, David P., Offline caching of control transactions for storage devices.
  136. Manfredi, Charles, Operational qualification by independent reanalysis of data reduction patch.
  137. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  138. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  139. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  140. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  141. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  142. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  143. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  144. Kates, Lawrence, Portable method and apparatus for monitoring refrigerant-cycle systems.
  145. Ramos, Aurelio R., Preventing subtractive track separation.
  146. Boch, Matthew C.; Crooker, Kasson D.; Tate, Dean N.; Adams, Isaac; Carriuolo, Adam; Glinert, Eitan, Prompting a player of a dance game.
  147. Boch, Matthew C.; Crooker, Kasson D.; Tate, Dean N.; Carriuolo, Adam; Adams, Isaac; Glinert, Eitan, Prompting a player of a dance game.
  148. Pham, Hung M., Protection and diagnostic module for a refrigeration system.
  149. Rhoads,Geoffrey B., Providing reports associated with video and audio content.
  150. Arensmeier, Jeffrey N., Remote HVAC monitoring and diagnosis.
  151. Arensmeier, Jeffrey N., Remote HVAC monitoring and diagnosis.
  152. Arensmeier, Jeffrey N., Residential solutions HVAC monitoring and diagnosis.
  153. Hanna, Keith J.; Hoyos, Hector T., Scalable searching of biometric databases using dynamic selection of data subsets.
  154. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  155. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  156. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  157. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  158. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  159. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  160. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  161. Shah, Ajay, Server for presenting interactive content synchronized to time-based media.
  162. Applewhite, Douglas R.; Bennett, Bryn; Dubrofsky, Sylvain; Monsalvatge, Michael; Schmidt, Daniel A.; Sharpe, Matthew J.; Teasdale, Daniel C., Simulating musical instruments.
  163. Bennett, Bryn; Booth, Jason D.; Dubrofsky, Sylvain, Simulating musical instruments.
  164. Bennett, Bryn; Booth, Jason D.; Dubrofsky, Sylvain, Simulating musical instruments.
  165. Booth, Jason D.; Bennett, Bryn; Dubrofsky, Sylvain; Monsalvatge, Michael; Sharpe, Matthew J.; Stoddard, Joshua F.; Teasdale, Daniel C., Simulating musical instruments.
  166. Dubrofsky, Sylvain; Applewhite, Douglas R.; Monsalvatge, Michael; Schmidt, Daniel A.; Teasdale, Daniel C., Simulating musical instruments.
  167. Potash, Marc; Gowda, Preetham, Source device and systems and methods of verifying an authentication using dynamic scoring.
  168. Potash, Marc; Gowda, Preetham, Source device and systems and methods of verifying an identification using dynamic scoring.
  169. Potash, Marc; Gowda, Preetham, Source device and systems and methods of verifying an identity using dynamic scoring.
  170. Potash, Marc; Gowda, Preetham, Source device for systems and methods of verifying an authentication using dynamic scoring.
  171. Beveridge, Robert A.; Whalen, Jr., Richard J., Steam temperature control using dynamic matrix control.
  172. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  173. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  174. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  175. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  176. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  177. Wallis, Frank S.; Rozsnaki, Joseph James, System and method for compressor motor protection.
  178. Wallis, Frank S.; Rozsnaki, Joseph James, System and method for compressor motor protection.
  179. Wallis, Frank S.; Rozsnaki, Joseph James, System and method for compressor motor protection.
  180. Hanna, Keith J., System and method for iris data acquisition for biometric identification.
  181. Hanna, Keith J., System and method for iris data acquisition for biometric identification.
  182. Hanna, Keith J., System and method for iris data acquisition for biometric identification.
  183. Hanna, Keith J., System and method for iris data acquisition for biometric identification.
  184. Selby, Alexander Paul; Owen, Mark St John, System and method for media recognition.
  185. Cox, Ingemar J., System and method for taking action with respect to an electronic media work.
  186. Cox, Ingemar J., System and method for taking action with respect to an electronic media work and logging event information related thereto.
  187. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  188. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  189. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  190. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  191. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  192. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  193. Pham, Hung M., System for refrigerant charge verification using two condenser coil temperatures.
  194. Cox, Ingemar J., System for taking action based on a request related to an electronic media work.
  195. Cox, Ingemar J., System for taking action with respect to a media work.
  196. Cox, Ingemar J., System for taking action with respect to a media work.
  197. Cox, Ingemar J., System for using extracted feature vectors to perform an action associated with a work identifier.
  198. Cox, Ingemar J., System for using extracted feature vectors to perform an action associated with a work identifier.
  199. Cox, Ingemar J., System for using extracted features from an electronic work.
  200. Pitsch, Geoff; Teasdale, Daniel Charles; Brakeley, Daniel Asher; Schmidt, Daniel, Systems and methods for asynchronous band interaction in a rhythm action game.
  201. Hanna, Keith J., Systems and methods for illuminating an iris with visible light for biometric acquisition.
  202. Kay, Robert; LoPiccolo, Greg; Schmidt, Daniel; Rigopulos, Alexander, Systems and methods for indicating input actions in a rhythm-action game.
  203. Kay, Robert; LoPiccolo, Greg; Schmidt, Daniel; Rigopulos, Alexander, Systems and methods for indicating input actions in a rhythm-action game.
  204. Teasdale, Daniel Charles; Pitsch, Geoff; Brakeley, Daniel Asher; Schmidt, Daniel, Systems and methods for online band matching in a rhythm action game.
  205. Wang, Avery Li-Chun; Smith, III, Julius O., Systems and methods for recognizing sound and music signals in high noise and distortion.
  206. Wang, Avery Li-Chun; Smith, III, Julius O., Systems and methods for recognizing sound and music signals in high noise and distortion.
  207. Kay, Robert; Teasdale, Daniel; Foster, Chris; Schmidt, Dan, Systems and methods for reinstating a player within a rhythm-action game.
  208. Egozy, Eran B.; Teasdale, Daniel; Stephens, Brian Thomas; Schmidt, Daniel; Eskew, John R.; Baptista, Rafael; Crooker, Kasson, Systems and methods for simulating a rock band experience.
  209. Kay, Robert; Lesser, Ryan; LoPiccolo, Gregory B.; Schmidt, Daniel; McGinnis, Kevin Morris; Wright, Nathan H., Systems and methods for simulating a rock band experience.
  210. Potash, Marc; Gowda, Preetham, Systems and methods of generating an authenticated document biosignature.
  211. Potash, Marc; Gowda, Preetham, Systems and methods of verifying an authenticated document biosignature.
  212. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  213. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  214. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  215. Shah, Ajay, Tracking time-based selection of search results.
  216. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  217. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  218. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  219. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로