$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Confirming physical custody of objects

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06Q-099/00
출원번호 US-0530391 (2006-09-08)
등록번호 US-8626666 (2014-01-07)
발명자 / 주소
  • Lofgren, Neil E.
  • Seder, Phillip Andrew
  • MacIntosh, Brian T.
출원인 / 주소
  • Digimarc Corporation
인용정보 피인용 횟수 : 0  인용 특허 : 82

초록

The presently claimed invention relates generally to confirming that a user has physical custody of an article (e.g., credit card, identification document, etc.). One claim recites a method reciting: at a user's home, presenting a physical article to an input device; and, after the presenting, recei

대표청구항

1. A method comprising: indicating, by a computing device, that physical presentment of a physical article is required before a transaction can be approved;in response to the indication, receiving image data, from an image capture device, wherein the image data is based on the physical article;deriv

이 특허에 인용된 특허 (82)

  1. Sharma, Ravi K.; Miller, Marc D.; Levy, Kenneth L., Access control systems.
  2. DiMaria Peter C., Apparatus for controlling the rental and sale of age-controlled merchandise and for controlling access to age-controlled services.
  3. Swartz Jerome ; Joseph Eugene ; Katz Joseph, Apparatus for processing symbol-encoded credit card information.
  4. Berson William (Westport CT) Zemlok Kenneth C. (Shelton CT), Apparatus for verifying an identification card and identifying a person by means of a biometric characteristic.
  5. Thomas William L. (Clearwater FL) Lu Daozheng (Dunedin FL), Audience measurement system utilizing ancillary codes and passive signatures.
  6. Rhoads Geoffrey B., Audio- and graphics-based linking to internet.
  7. Messina Kevin M. ; Cohen Todd, Authentication system for driver licenses.
  8. Takai Kazuhito,JPX ; Fujihara Shiro,JPX, Card recording medium, certifying method and apparatus for the recording medium, forming system for recording medium, enciphering system, decoder therefor, and recording medium.
  9. Rhoads, Geoffrey B.; Livermore, Megan I., Cell phones with optical capabilities, and related applications.
  10. Rhoads, Geoffrey B., Content identification through deriving identifiers from video, images and audio.
  11. Kogan Dan D. ; Drews Paul C. ; Held James P. ; Larson James A., Creating and maintaining hypertext links among heterogeneous documents by the establishment of anchors and connections.
  12. Pearce ; Ralph Reginald, Credit cards and other security documents.
  13. Levy, Kenneth L.; Rhoads, Geoffrey B., Deriving attributes from images, audio or video to obtain metadata.
  14. Rhoads, Geoffrey B.; Levy, Kenneth L.; McKinley, Tyler J., Deriving or calculating identifying data from video signals.
  15. Gifford David K., Digital active advertising.
  16. Zhao Jian ; Koch Eckhard,DEX, Digital authentication with analog documents.
  17. Friedman Gary L. (Encino CA), Digital camera with apparatus for authentication of images produced from an image file.
  18. Carr, J. Scott; Rhoads, Geoffrey B., Digital watermarking of physical objects.
  19. McKinley,Tyler J.; Weaver,Matthew M.; Rodriguez,Tony F.; Sharma,Ravi K.; Miller,Marc D., Digital watermarking security systems.
  20. Lofgren,Neil; Seder,Phillip Andrew; MacIntosh,Brian T., Digital watermarking systems.
  21. Seder,Phillip Andrew, Digital watermarking systems.
  22. Geoffrey B. Rhoads, Digital watermarks and methods for security documents.
  23. Shi Shaw-Ben ; Ault Michael Bradford ; Plassmann Ernst Robert ; Rich Bruce Arland ; Rosiles Mickella Ann ; Shrader Theodore Jack London, Distributed file system web server user authentication with cookies.
  24. Mulla Altaf ; Sanders Robert ; Lert ; Jr. John ; Katz Joseph ; Tan Chinh ; Barkan Ed ; Shepard Howard, Down-loadable hand-held optical reader.
  25. Kloor, Harry Thomas, Dual transaction authorization system and method.
  26. Matsumori Kunihiko, Electronic shopping system having self-scanning price check and purchasing terminal.
  27. Bloomberg Dan S., Embedding encoded information in an iconic version of a text image.
  28. Graf Hans Peter ; Petajan Eric David, Face feature analysis for automatic lipreading and character animation.
  29. Colgate ; Jr. Gilbert (New York NY), Holographic enhancement of card security.
  30. Brundage,Trent J.; Hannigan,Brett T., Identification document including embedded data.
  31. Kawakami Haruko (Yokohama JPX) Sekizawa Hidekazu (Yokohama JPX) Yamamoto Naofumi (Tokyo JPX), Image processing apparatus using pattern generating circuits to process a color image.
  32. Jain Kanti (Briarcliff Manor NY), Increased-security identification card system.
  33. Kawaguchi, Eiji; Eason, Richard; Tsuda, Kunihiro, Information card and information card system.
  34. Guthery, Scott B., Integrated circuit devices with steganographic authentication, and steganographic authentication methods.
  35. Davis Virgil M. ; Cutino Suzanne C. ; Berg Michael J. ; Conklin Frederick Sidney ; Pringle Steven John, Internet loading system using smart card.
  36. Rhoads Geoffrey B., Linking of computers based on optical sensing of digital data.
  37. Rhoads, Geoffrey B., Linking of computers based on steganographically embedded digital data.
  38. Philyaw, Jeffry Jovan; Mathews, David Kent, Method and apparatus for accessing a remote location by scanning an optical code.
  39. Bartoli Paul D. ; Griesmer Stephen J. ; Lidor Gideon ; Ronen Yzhak ; Tessier Jean, Method and apparatus for billing for transactions conducted over the internet.
  40. Ray, Lawrence A.; Ellson, Richard N., Method and apparatus for credit card verification.
  41. Rowe Edward R. ; Priyadarshan Eswar ; Al-Shamma Nabeel A., Method and apparatus for displaying an electronic document with text over object.
  42. Barton James M. (101 Sund Ave. Los Gatos CA 95032), Method and apparatus for embedding authentication information within digital data.
  43. Levy,Kenneth Lee, Method and apparatus for embedding auxiliary information within original data.
  44. Brewer Jason M., Method and apparatus for extending security model to native code.
  45. Tsai Irving (435 E. 70th St. New York NY 10021), Method and apparatus for linking a document with associated reference information using pattern matching.
  46. Bender Walter ; Morimoto Norishige,JPX ; Gruhl Daniel, Method and apparatus for logo hiding in images.
  47. Ray Lawrence A. (Rochester NY) Ellson Richard N. (Rochester NY), Method and apparatus for transaction card verification.
  48. Blum Thomas L. ; Keislar Douglas F. ; Wheaton James A. ; Wold Erling H., Method and article of manufacture for content-based analysis, storage, retrieval, and segmentation of audio information.
  49. Schuster Guido M. ; Katsaggelos Aggelos ; Banham Mark R. ; Brailean James C., Method and device for optimal bit allocation between different sources of information in digital video compression.
  50. Powell Robert D. ; Nitzberg Mark J., Method and system for digital image signatures.
  51. Ingemar J. Cox ; Matthew L. Miller, Method for increasing the functionality of a media player/recorder device or an application program.
  52. Rothfjell Rolf E. (Kalix SEX), Method of securing simple codes.
  53. Geoffrey B. Rhoads, Methods and systems for watermark processing of line art images.
  54. Davis, Bruce L.; Rodriguez, Tony F., Methods employing topical subject criteria in video processing.
  55. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  56. Rhoads Geoffrey B., Network linking method using steganographically embedded data objects.
  57. Rhoads,Geoffrey B., Network linking using index modulated on data.
  58. Moskowitz Scott A. ; Cooperman Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  59. Carr,J. Scott; Perry,Burt W.; Rhoads,Geoffrey B., Physical objects and validation of physical objects.
  60. Houvener Robert C. (Nashua NH), Positive identification system and method.
  61. Wang Ynjiun P. (Stony Brook NY) Swartz Jerome (Old Field NY) McGlynn Daniel R. (Brooklyn NY), Record with encoded data.
  62. Gottfried Ofer,ILX, Remote credit card authentication system.
  63. Schwab Barry H., Secure identification system.
  64. Moore Steven Jerome, Security check method and apparatus.
  65. Rhoads, Geoffrey B., Security document with steganographically-encoded authentication data.
  66. Geoffrey B. Rhoads, Security documents with hidden digital data.
  67. Fukinuki Takahiko (Kokubunji JPX) Yoshigi Hiroshi (Hachioji JPX) Shimazaki Yumiko (Akikawa JPX), Signal processing system of facsimile.
  68. Boyles, Stephen L.; Leinecker, Richard C.; Fischer, Jochen E.; Moody, Jr., Clyde G.; McConnell, Troy; Wilkinson, Ken, Smart card controlled internet access.
  69. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  70. Rhoads Geoffrey B., Steganographic system.
  71. Rhoads Geoffrey B. (West Linn OR), Steganography methods employing embedded calibration data.
  72. Russell Garrett ; Wilz ; Sr. David M. ; Knowles Carl Harry, System and method for carrying out information-related transactions using web documents embodying transaction enabling a.
  73. Kenner Brian ; Gruber Harry, System and method for delivery of video data over a computer network.
  74. Houvener Robert C. ; Hoenisch Ian P., System and method of providing system integrity and positive audit capabilities to a positive identification system.
  75. Schumann Robert W. ; Iu Siu-Leong ; Bugwadia Kobad ; Mercier Guillaume ; Ramadoss Shiva ; Bergeron Michael ; Ehrhardt Jack, System and methodology for tracing to a source of unauthorized copying of prerecorded proprietary material, such as movies.
  76. Spinney Barry A. ; Poole Nigel T. ; Narayanaswamy Krishna ; Ross Theodore L. ; Szmauz Richard, System and process for application-level flow connection of data processing networks.
  77. Domenikos Steven D. ; Domenikos George C., Systems and methods for executing application programs from a memory device linked to a server.
  78. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  79. Alattar, Adnan M.; Rhoads, Geoffrey B., Tamper-resistant authentication techniques for identification documents.
  80. Sharma, Ravi K.; Rhoads, Geoffrey B.; Bradley, Brett A., Variable message coding protocols for encoding auxiliary data in media signals.
  81. Sharma,Ravi K.; Rhoads,Geoffrey B.; Bradley,Brett A., Variable message coding protocols for encoding auxiliary data in media signals.
  82. Rhoads, Geoffrey B.; Gustafson, Ammon E., Watermark embedder and reader.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트