$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure personal content server 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-029/06
  • G06F-021/62
  • G06F-021/10
  • H04N-007/167
  • H04N-021/418
  • H04N-021/4627
  • H04N-021/8358
  • H04L-029/08
출원번호 US-0869279 (2015-09-29)
등록번호 US-9710669 (2017-07-18)
발명자 / 주소
  • Moskowitz, Scott A.
  • Berry, Mike W.
출원인 / 주소
  • Wistaria Trading Ltd
대리인 / 주소
    Neifeld IP Law, PC
인용정보 피인용 횟수 : 0  인용 특허 : 430

초록

A local content server system (LCS) for creating a secure environment for digital content is disclosed, which system comprises: a communications port in communication for connecting the LCS via a network to at least one Secure Electronic Content Distributor (SECD), which SECD is capable of storing a

대표청구항

1. A method for storing, degrading and storing, or not storing data, comprising: providing a device comprising a local content server (LCS);wherein said LCS comprises a communication port, non-transient LCS storage media, and an LCS domain processor for processing digital data;wherein said LCS is co

이 특허에 인용된 특허 (430)

  1. Magnotti Joseph C. ; Nelson Larry A., 32N +D bit key encryption-decryption system using chaos.
  2. Cassada Thomas Edward (Lexington KY), Abstracting system for index search machine.
  3. Zhao, Jian, Active watermarks and watermark agents.
  4. Beutnagel,Mark Charles; Ostermann,Joern; Quackenbush,Schuyler Reynier, Advance TTS for facial animation.
  5. Allen Richard (111 E. Myrna La. Tempe AZ 85284), Apparatus and method for an on demand data delivery system for the preview, selection, retrieval and reproduction at a r.
  6. Yamadaji Shinji,JPX, Apparatus and method for embedding/unembedding supplemental information.
  7. Wolosewicz Jack ; Jemili Kanaan, Apparatus and method for encoding and decoding information in analog signals.
  8. Wolosewicz Jack, Apparatus and method for encoding and decoding information in audio signals.
  9. Berners-Lee Charles Peter,GBX, Apparatus and method for encoding data.
  10. Yamakawa Takeshi (781-300 Ohaza Koubukuro ; Iizuka-shi ; Fukuoka JPX), Apparatus and method for generating chaotic signals and chaos device.
  11. Sakai Yorihiko,JPX ; Ota Osamu,JPX ; Sakura Kouhei,JPX, Apparatus and method for managing picture data.
  12. Davis Derek L. (Phoenix AZ) Smith Lionel (Queen Creek AZ), Apparatus and method for preventing disclosure through user-authentication at a printing node.
  13. Robbins Clyde (Maple Glen PA), Apparatus and method for providing digital audio in the cable television band.
  14. Senoh Takanori,JPX, Apparatus and method for watermark data insertion and apparatus and method for watermark data detection.
  15. Jensen James M. (Columbia MD) Graybill Robert B. (Ellicott City MD) Hassan Sayed (Clarksville MD) Lynch Wendell D. (Silver Spring MD) Sabin Wayne (Baldwin MD), Apparatus and methods for including codes in audio signals and decoding.
  16. Muehrcke Eric B. (Middletown NJ), Arrangement for reserving and allocating a plurality of competing demands for an ordered bus communication network.
  17. Fujisaki Masataka (Machida JPX), Auction information transmission processing.
  18. Clearwater Scott H. (Woodside CA), Auction-based control system for energy resource management in a building.
  19. Rhoads Geoffrey B., Audio steganography.
  20. Kirovski,Darko; Malvar,Henrique; Jakubowski,Mariusz H., Audio watermarking with dual watermarks.
  21. Deo Vinay ; Seidensticker Robert B. ; Simon Daniel R., Authentication system and method for smart card transactions.
  22. Larcher Philippe (Avon FRX) Irigoin-Guichandut Francois (Chailly-en-Biere FRX) Vassy Daniel (Bourron-Marlotte FRX) Lenci Michel (Moret-Sur-Loing FRX) Longepierre Patrick (Avon FRX) Didier Bernard (He, Automatic fingerprint identification system including processes and apparatus for matching fingerprints.
  23. Fleet David J.,CAX ; Heeger David J. ; Cass Todd A. ; Hecht David L., Automatic geometric image transformations using embedded signals.
  24. Bauerle, Paul A.; Odell, Thomas W., Automatic reactivation of passenger-activated functions for short engine run cycle times.
  25. Freeny, Jr., Charles C., Automatic stock trading system.
  26. Daugman John G. (Huntingdon GB2), Biometric personal identification system based on iris analysis.
  27. Kiyosaki Robert T. ; Parta Rolf H., Board game for teaching fundamental aspects of personal finance, investing and accounting.
  28. Karl Heinz Koppen DE, Broadband loudspeaker.
  29. Pitkin Richard P. (Lowell MA) Morency John P. (Chelmsford MA), Broker for computer network server selection.
  30. Naumovich,Gleb; Yalcin,Ezgi; Memon,Nasir D.; Yu,Hong Heather; Sosonkin,Mikhail, Class coalescence for obfuscation of object-oriented software.
  31. Druyvesteyn Willem F. (Eindhoven NLX) Hoogendoorn Abraham (Eindhoven NLX) Van De Kerkhof Leon M. (Eindhoven NLX) Veldhuis Raymond N. J. (Eindhoven NLX), Coder for incorporating an auxiliary information signal in a digital audio signal, decoder for recovering such signals f.
  32. Uwe Gbur DE; Martin Dietz DE; Karlheinz Brandenburg DE; Heinz Gerhauser DE; Jurgen Herre DE; Schuyler Quackenbush, Coding and decoding of audio signals by using intensity stereo and prediction processes.
  33. Katto, Jiro, Coding/decoding apparatus, coding/decoding system and multiplexed bit stream.
  34. Reed, Alastair M.; Rhoads, Geoffrey B., Color adaptive watermarking.
  35. Braudaway Gordon W. (Yorktown Heights NY) Magerlein Karen A. (Ossining NY) Mintzer Frederick C. (Shrub Oak NY), Color correct digital watermarking of images.
  36. Soumiya Toshio,JPX ; Kawasaki Takeshi,JPX ; Katoh Masafumi,JPX, Communication service quality control system.
  37. Ostrovsky Rafail (Acton MA) Goldreich Oded (Tel Aviv ILX), Comprehensive software protection system.
  38. Ausubel Lawrence M., Computer implemented methods and apparatus for auctions.
  39. Colvin, David S., Computer readable storage medium for providing repeated contact with software end-user.
  40. David S. Colvin, Computer readable storage medium for providing repeated contact with software end-user.
  41. Colvin, David S., Computer readable storage medium for securing software to reduce unauthorized use.
  42. Holmes Keith (Dublin IEX), Computer software protection.
  43. Yu,Hong Heather; Li,Xin, Computer-implemented method and apparatus for audio data hiding.
  44. Belzberg Sydney H.,CAX, Computerized stock exchange trading system automatically formatting orders from a spreadsheet to an order entry system.
  45. Ouyang Jing-Zheng ; Lin Nan-Sheng, Concatenation compression method.
  46. Atick Joseph J. ; Griffin Paul A. ; Redlich A. Norman, Continuous video monitoring using face recognition for access control.
  47. Wirtz,Gijsbrecht Carel; Kalker,Antonius Adrianus Cornelis Maria; Staring,Antonius Adriaan Maria; Haitsma,Jaap Andre; Linnartz,Johan Paul Marie Gerald, Copy control using digital speed bumps.
  48. Kato Taku,JPX ; Kato Takehisa,JPX ; Endoh Kenjiro,JPX ; Yamada Hisashi,JPX ; Endoh Naoki,JPX, Copy protection apparatus and information recording medium used in this copy protection apparatus.
  49. Lee, Chang-Hyi; Chung, Ho-Suk; Kang, Eun-Seong, Copy protection system for portable storage media.
  50. Schmelzer,Richard A.; Pellom,Bryan L., Copyright detection and protection system and method.
  51. Auerbach Joshua Seth (Ridgefield CT) Chow Chee-Seng (Cupertino CA) Kaplan Marc Adam (Katonah NY) Crigler Jeffrey Charles (McLean VA), Creation and distribution of cryptographic envelope.
  52. Togher Michael (New York City NY) Dunne Michael F. (Boonton NJ) Hartheimer Richard (Morris Plains NJ), Credit management for electronic brokerage system.
  53. Lupien William A. ; Rickard John T., Crossing network utilizing satisfaction density profile with price discovery features.
  54. Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA), Cryptographic apparatus and method.
  55. Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA), Cryptographic communications system and method.
  56. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Cryptographic identification, financial transaction, and credential device.
  57. Bjorn Vance, Cryptographic key generation using biometric data.
  58. Lacy John Blakeway ; Quackenbush Schuyler Reynier ; Snyder James H., Custom character-coding compression for encoding and watermarking media content.
  59. Lacy, John Blakeway; Quackenbush, Schuyler Reynier; Snyder, James H., Custom character-coding compression for encoding and watermarking media content.
  60. Lacy,John Blakeway; Quackenbush,Schuyler Reynier; Snyder,James H., Custom character-coding compression for encoding and watermarking media content.
  61. Dolganow, Andrew; Rusmisel, Jason, DPI-driven bearer termination for short-lived applications.
  62. Hustig Charles H. (Hudson WI) Ward Jeffrey L. (Hudson WI) Moses Donald W. (Minneapolis MN) Bradford Robert S. (Woodland Hills CA), Data and voice communications system.
  63. Her Sung-min (Seoul KRX) Choi Yang-hun (Seoul KRX) Choi Dong-soo (Seoul KRX) Kim In (Seoul KRX), Data communication apparatus and method having concurrent image overlay function.
  64. Miwa Kunihiko,JPX ; Morimoto Norishige,JPX ; Shimizu Shuichi,JPX, Data control system.
  65. Sandford ; II Maxwell T. (160 Monte Rey S. Los Alamos NM 87544) Handel Theodore G. (316 Bryce Ave. Los Alamos NM 87544), Data embedding.
  66. Saito Makoto,JPX, Data management system.
  67. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  68. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  69. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  70. Shear Victor H. (Bethesda MD), Database usage metering and protection system and method.
  71. Dorward Sean Matthew ; Jayant Nuggehally Sampath ; Johnston James David ; Quackenbush Schuyler Reynier ; Thompson Kenneth Lane, Device and method for efficient utilization of allocated transmission medium bandwidth.
  72. Brugger Rolf (Keistenweg 1 CH-4310 Rheinfelden CHX), Device for the distribution of music information in digital form.
  73. Kutaragi Ken (Kanagawa JPX) Furuhashi Makoto (Kanagawa JPX) Ishibashi Toshiya (Tokyo JPX), Digital audio signal generating apparatus.
  74. Schumann,Robert Wilhelm; Whittemore,Richard; Goldschlag,David Mosche; Kravitz,David William; Iu,Siu Leong; Mercier,Guillaume; Bergeron,Michael; Ehrhardt,Jack; Vitkus,Richard, Digital content distribution system and method.
  75. Yoshiura Hiroshi,JPX ; Takaragi Kazuo,JPX ; Sasaki Ryoichi,JPX ; Susaki Seiichi,JPX ; Toyoshima Hisashi,JPX ; Saito Tsukasa,JPX, Digital data authentication method.
  76. Thompson John R. (La Quinta CA) Hunting C. J. (Altadena CA) Phipps William L. (Bermuda Dunes CA) Raynesford Steven J. (Cathedral City CA) Rittmueller Philip H. (St. Charles IL), Digital data cryptographic system.
  77. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Digital document time-stamping with catenate certificate.
  78. Kim,Jason Seung Min, Digital entroping for digital audio reproductions.
  79. Moskowitz Scott A. (#503 City Fukazawa 3-5-10 Fukazawa Setagaya-ku Tokyo 158 JPX), Digital information commodities exchange.
  80. Moskowitz Scott A. (3-5-10 Fukazawa Setagaya-ku ; Tokyo 158 JPX), Digital information commodities exchange.
  81. Adelson Edward H. (Cambridge MA), Digital signal encoding and decoding apparatus.
  82. Sasamoto, Manabu; Okamoto, Hiroo; Takeuchi, Toshifumi; Takahashi, Masaru, Digital signal recording/reproducing apparatus.
  83. Ryoma Oami JP; Yoshihiro Miyamoto JP; Mutsumi Ohta JP, Digital watermark insertion system and digital watermark characteristic table creating device.
  84. Cox Ingemar J. ; Miller Matthew L.,LTX ; Tanaka Kazuyoshi,JPX ; Wakasu Yutaka,JPX, Digital watermarking.
  85. Lewis, Arianne M.; Basch, Evert, Digital watermarking.
  86. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin, Digital watermarking to resolve multiple claims of ownership.
  87. Knox Keith T., Digital watermarking using stochastic screen patterns.
  88. Troeller Mark W. ; Fuccio Michael L. ; Gardner Linda S. ; Moreton Henry P. ; Nielsen Michael J. K., Direct memory access apparatus for transferring a block of data having discontinous addresses using an address calculating circuit.
  89. Cates ; Jr. Henry J. (De Kalb County ; near Atlanta GA) Rosenberg Tom (East Point GA) Entrekin Harvey E. (Dalton GA), Disposal feeding system including selective container control.
  90. Silverman David L. (Nesconset NY) Scholldorf Alfred H. (Port Jefferson Station NY) Keller Norman (Mt. Sinai NY), Distributed matching system.
  91. Miller Mark S. (Los Altos CA) Tribble E. Dean (Los Altos CA) Hardy Norman (Portola Valley CA) Hibbert Christopher T. (Mountain View CA), Diverse goods arbitration system and method for allocating resources in a distributed computer system.
  92. Philibert Alex C. (3001 Mockingbird Dr. Sierra Vista AZ 85635) Smith Jack W. (1831 Exeter Dr. Sierra Vista AZ 85635) Fox James W. (172 Andrea Dr. Sierra Vista AZ 85635), Document reproduction security system.
  93. Hendricks, John S.; Asmussen, Michael L., Electronic book with restricted access features.
  94. Macheel Gary W. (Anaheim CA), Electronic card game.
  95. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  96. Houser Peter B. (Poway CA) Adler James M. (Ocean Beach CA), Electronic document verification system and method.
  97. Keiichi Iwamura JP, Electronic watermark system electronic information distribution system and image filing apparatus.
  98. Schuyler Reynier Quackenbush ; Amy Ruth Reibman ; David Hilton Shur ; James H. Snyder, Electronic watermarking in the compressed domain utilizing perceptual coding.
  99. Morris Dale C. (Menlo Park CA), Embedded hidden identification codes in digital objects.
  100. Preuss Robert D. (Boston MA) Roukos Salim E. (Scarsdale NY) Huggins A. W. F. (Arlington MA) Gish Herbert (Newton MA) Bergamo Marcos A. (Wellesley MA) Peterson Patrick M. (Cambridge MA) Derr Alan G. (, Embedded signalling.
  101. Mark D. Conover ; Fleming M. Oliver, Embedding watermarks into compressed video data.
  102. Gross Gary (Apt. 203 2721 Victoria Pk. Ave. Agincourt ; Ontario CAX M1T 3N6) Dale James (65 Huntley St. Toronto CAX M44 2L2), Encoding system.
  103. Brothers Harlan Jay ; Genly Chris Hind, Event verification system.
  104. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  105. Hellman Martin E. (Stanford CA) Pohlig Stephen C. (Acton MA), Exponentiation cryptographic apparatus and method.
  106. Turk Matthew (Cambridge MA) Pentland Alex P. (Cambridge MA), Face recognition system.
  107. Terry, Kent Bennett; Radhakrishnan, Regunathan, Feature optimization and reliability for audio and video signature generation and detection.
  108. Cox Ingemar J. ; Miller Matthew L., Field-based watermark insertion and detection.
  109. Rade Petrovic, Formation and analysis of signals with common and transaction watermarks.
  110. Jackson Brian H. (Litchfield NH), Full page graphics image display data reduction.
  111. Fox,Barbara L.; LaMacchia,Brian A.; Beckman,Brian C., GUMP: grand unified meta-protocol for simple standards-based electronic commerce transactions.
  112. Lu, Lie; Zhang, Hong-Jiang; Yuan, Po, Generating a music snippet.
  113. Woolston, Thomas G.; Kavitz, Paul Andrew; McEachern, Cameron David John, Generating and navigating streaming dynamic pricing information.
  114. Balogh Aristotle (Bowie MD) Blejer Hatte (Alexandria VA) Chen Eugene (Arlington VA) Flank Sharon (Washington DC) Iannacone Carmen (Fairfax VA) Maloney John (Upper Marlboro MD) Martin Patrick (Arlingt, Generation, archiving, and retrieval of digital images with evoked suggestion-set captions and natural language interfac.
  115. Yamamoto,Hiroki; Namekawa,Takashi; Naito,Takashi; Suzuki,Yasutaka; Kato,Akira; Takeo,Noriyuki; Akamatsu,Kiyoshi; Inomata,Youichi; Terakado,Masatomo; Takahashi,Ken, Glass substrate for a magnetic disk, a magnetic disk which can be formed with a stable texture and a magnetic disk device.
  116. Mihcak,M. Kivanc; Venkatesan,Ramarathnam, Hash value computer of content of digital signals.
  117. Poole Nigel T. ; Spinney Barry A., Hash-based translation method and apparatus with multiple level collision resolution.
  118. Mercier, Guillaume, High definition media storage structure and playback mechanism.
  119. Enns, Frederick; Moura, Eduardo J.; Gronski, Jan Maksymilian; Neelmegh, Ramesh; Kim, Jong C., High-speed internet access system.
  120. Gennaro Rosario ; Rohatgi Pankaj, How to sign digital streams.
  121. Jones Paul W. (Churchville NY) Melnychuck Paul W. (West Henrietta NY), Hybrid residual-based hierarchical storage and display method for high resolution digital images in a multiuse environme.
  122. Blank Arthur M. (San Diego CA), Image editing system including masking capability.
  123. Nagashima Takayuki,JPX ; Suzuki Toshiaki,JPX ; Iwamura Keiichi,JPX, Image transmission apparatus, image transmission system, and communication apparatus.
  124. Miller Samuel Lee (Albuquerque NM) Miller William Michael (Tijeras NM) McWhorter Paul Jackson (Albuquerque NM), Information encoder/decoder using chaotic systems.
  125. Choy David M., Integrated method and system for controlling information access and distribution.
  126. Kerman Edward (9882 Century Dr. Ellicott City MD 21043), Interactive audio teaching aid.
  127. Duvall William S. ; Kendall Matthew, Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering a.
  128. Maher David P. (Windham NH), Key management scheme for use with electronic cards.
  129. George Gregory Gruse ; Marco M. Hurtado ; Kenneth Louis Milsted ; Jeffrey B. Lotspiech, Key management system for digital content player.
  130. Wegener Albert William, Lossless and loss-limited compression of sampled data signals.
  131. Honsinger Chris W. ; Jones Paul W. ; Rabbani Majid ; Stoffel James C., Lossless recovery of an original image containing embedded data.
  132. Chung Tae-yun,KRX ; Oh Young-nam,KRX, MPEG2 moving picture encoding/decoding system.
  133. Okada Akihiro (Kawasaki JPX) Kino Tooru (Kawasaki JPX), Mail center management system.
  134. Wirtz Gijsbrecht C.,NLX, Marking a video and/or audio signal.
  135. Xie, Liehua; Lewis, Arianne M.; Basch, Evert; Arce, Gonzalo, Message authentication code using image histograms.
  136. J?ndel, Magnus; Larsson, Mathias, Method and a device for encryption of images.
  137. Lee Cyril Arthur (Maidenhead EN), Method and apparatus for authenticating a record medium consisting of applying two different strength magnetizing fields.
  138. Cohen,Ron; Snir,Yoram; Schnizlein,John, Method and apparatus for automatically establishing bi-directional differentiated services treatment of flows in a network.
  139. Jeffrey Allen Jones ; Michael Wayne Brown, Method and apparatus for autosynchronizing distributed versions of documents.
  140. Wehrenberg, Paul J., Method and apparatus for copy protection.
  141. John O. Ryan ; Patrice Capitant ; Clayton L. Davidson ; James Holzgrafe ; Kordian J Kurowski ; Andrew Mellows ; Tony Forrest Rodriquez, Method and apparatus for copy-once watermark for video recording.
  142. Bender Walter (Auburndale MA) Morimoto Norishige (Tokyo JPX) Gruhl Daniel (Cambridge MA), Method and apparatus for data hiding in images.
  143. Yanovsky,Boris, Method and apparatus for datastream analysis and blocking.
  144. Metois,Eric; Petrovic,Rade; Jemili,Kanaan, Method and apparatus for detecting processing stages applied to a signal.
  145. Nelson ; Jr. Douglas Valmore (916 Spring Creek La. Atlanta GA 30350), Method and apparatus for digital encryption.
  146. Pearson, Terry; Colley, Tom; Manor, Larry; Kidder, Joe; Cabeca, Linda, Method and apparatus for discarding data packets.
  147. Achilles, Heather; Pearson, Terry; Gallo, Paul; Manor, Larry, Method and apparatus for discarding data packets through the use of descriptors.
  148. Bender Walter ; Gruhl Daniel ; Morimoto Norishige,JPX, Method and apparatus for echo data hiding in audio signals.
  149. Barton James M., Method and apparatus for embedding authentication information within digital data.
  150. Barton James M. (101 Sund Ave. Los Gatos CA 95032), Method and apparatus for embedding authentication information within digital data.
  151. Tewfik Ahmed H. ; Swanson Mitchell D. ; Zhu Bin ; Boney Laurence,FRX, Method and apparatus for embedding data, including watermarks, in human perceptible sounds.
  152. Wallman, Steven M. H., Method and apparatus for enabling individual or smaller investors or others to create and manage a portfolio of securities or other assets or liabilities on a cost effective basis.
  153. Cooper Thomas E. (Louisville CO) Philips Hudson W. (Boulder CO) Pryor Robert F. (Longmont CO), Method and apparatus for enabling trial period use of software products: Method and apparatus for utilizing a decryption.
  154. Cooper Thomas Edward ; Phillips Hudson Wayne ; Pryor Robert Franklin, Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption.
  155. Aijala Victor A. (Arnold MD) Cohen Gerald B. (Gaithersburg MD) Jensen James M. (Columbia MD) Lynch Wendell D. (Silver Spring MD) Urbi Juan C. (Laurel MD), Method and apparatus for encoding/decoding broadcast or recorded segments and monitoring audience exposure thereto.
  156. Indeck Ronald S. (Olivette MO) Muller Marcel W. (St. Louis MO), Method and apparatus for fingerprinting magnetic media.
  157. Man Bae Kim KR, Method and apparatus for generating steroscopic image using MPEG data.
  158. Ikezoye, Vance E.; Schrempp, James B., Method and apparatus for identifying media content presented on a media playing device.
  159. Florencio Dinei A. ; Isnardi Michael A., Method and apparatus for imbedding a watermark into a bitstream representation of a digital image sequence.
  160. Indeck Ronald Scott ; Muller Marcel Wettstein ; Engel George Lawrence ; Hege Alan Lee, Method and apparatus for improved fingerprinting and authenticating various magnetic media.
  161. Lfberg Bo (Vindragarvgen 12 S-117 40 Stockholm SEX), Method and apparatus for marking the information content of an information carrying signal.
  162. David Colvin, Method and apparatus for monitoring software using encryption.
  163. Indeck Ronald S. (Olivette MO) Muller Marcel W. (St. Louis MO), Method and apparatus for process control, tension control, and testing of magnetic media.
  164. Herre,J��rgen; Allamanche,Eric; Hellmuth,Oliver; Kastner,Thorsten; Cremer,Markus, Method and apparatus for producing a fingerprint, and method and apparatus for identifying an audio signal.
  165. Nagata Atsushi (Hirakata JPX) Uekawa Yutaka (Ashiya JPX) Senoo Takanori (Hirakata JPX) Takahashi Kenichi (Kyoto JPX), Method and apparatus for protection of signal copy.
  166. Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
  167. Lamb Robert G. (3121 U.S. Highway 64 Apex NC 27502) Economos Andrew M. (2 Edgemont Scarsdale NY 10583) Mazer Elliot F. (6501 Farallon Way Oakland CA 94611), Method and apparatus for recognizing broadcast information using multi-frequency magnitude detection.
  168. Hill Brian R. (Los Angeles CA), Method and apparatus for recording sensor data.
  169. Rabbani Majid (Pittsford NY), Method and apparatus for reducing quantization artifacts in a hierarchical image storage and retrieval system.
  170. Colvin, David S., Method and apparatus for repeated contact of software end-user.
  171. Baugher Mark J. (Austin TX) Chang Philip Y. (Austin TX) Morris Gregory L. (Round Rock TX) Stephens Alan P. (Austin TX), Method and apparatus for reserving system resources to assure quality of service.
  172. Rhoads Geoffrey B., Method and apparatus for robust information coding.
  173. Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for secure document timestamping.
  174. Colvin David S., Method and apparatus for securing software to reduce unauthorized use.
  175. Greenberg Burton L. (New York NY), Method and apparatus for the processing of encoded data in conjunction with an audio broadcast.
  176. Nagata Atsushi (Hirakata JPX) Uekawa Yutaka (Ashiya JPX) Senoo Takanori (Hirakata JPX) Takahashi Kenichi (Kyoto JPX), Method and apparatus for the protection of signal copy.
  177. Hawkins John G. ; Jacobs Dave M. ; Fitzpatrick Rick, Method and apparatus for trading securities electronically.
  178. John J. Dorak, Jr., Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system.
  179. Lee Sherman ; MacDonald James R. ; Wisor Michael T., Method and apparatus for upgrading the software lock of microprocessor.
  180. Shur David Hilton, Method and apparatus for watermarking digital bitstreams.
  181. Milsted Kenneth Louis ; Nguyen Kha Dinh ; Gong Qing, Method and apparatus to create encoded digital content.
  182. Hekstra, Andries Pieter; Beerends, John Gerard; Koenen, Robert Hendrik; De Caluwe, Franciscus Elisabeth, Method and arrangement for objective assessment of video quality.
  183. Blum Thomas L. ; Keislar Douglas F. ; Wheaton James A. ; Wold Erling H., Method and article of manufacture for content-based analysis, storage, retrieval, and segmentation of audio information.
  184. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  185. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  186. Saito,Makoto, Method and device for protecting digital data by double re-encryption.
  187. Todd R. Collart, Method and program product for preventing unauthorized users from using the content of an electronic storage medium.
  188. Veil Leonard Scott, Method and system for authenticating and utilizing secure resources in a computer system.
  189. Brachman, Ronald J.; Driessen, Peter F.; Crandall, Evan S.; Greenspan, Steven L.; Kretschmer, Mathias; Quackenbush, Schuyler; Weinman, Jr., Joseph B., Method and system for communicating multimedia content in a unicast, multicast, simulcast or broadcast environment.
  190. Kocher, Paul C., Method and system for copy-prevention of digital copyright works.
  191. Yavatkar, Rajenda; Putzolu, David M., Method and system for diagnosing network intrusion.
  192. Powell Robert D. ; Nitzberg Mark J., Method and system for digital image signatures.
  193. Moskowitz Scott A. ; Cooperman Marc, Method and system for digital watermarking.
  194. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  195. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  196. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  197. Moskowitz,Scott A.; Cooperman,Marc, Method and system for digital watermarking.
  198. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  199. Vermeulen, Allan H.; Bezos, Jeffrey P., Method and system for dynamic pricing of web services utilization.
  200. Callen, Kevin, Method and system for e-commerce and related data management, analysis and reporting.
  201. Allen Jonathon Brandon, Method and system for ensuring royalty payments for data delivered over a network.
  202. Gulati, Sandeep, Method and system for facilitating opportunistic transactions using auto-probes.
  203. Geiner Robert V. (Poughkeepsie NY) Jensen David L. (Peekskill NY), Method and system for global optimization of device allocation.
  204. Walker, Paul; Des Pallieres, Bertrand, Method and system for optimizing bandwidth cost via caching and other network transmission delaying techniques.
  205. Epstein, Michael; Pasieka, Michael, Method and system for preventing unauthorized playback of broadcasted digital data streams.
  206. Cox, Ingemar J.; Miller, Matthew L., Method and system for protecting digital data from unauthorized copying.
  207. Galant, Paul S., Method and system for providing financial information and evaluating securities of a financial debt instrument.
  208. Eller Marlin Jay, Method and system for searching compressed data.
  209. Hughes, James P., Method and system for secure information handling.
  210. Sixtus Timothy, Method and system for secure online transaction processing.
  211. Goldstein Gary Allan ; Sumner Terence Edward, Method and system for securely transferring a data set in a data communications system.
  212. Guedalia Isaac David,ILX ; Hashkes Jonathan,ILX, Method and system for server access control and tracking.
  213. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  214. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  215. Burk Phil L. (San Rafael CA) Mical Robert J. (Redwood City CA) Hayes Steven E. (Half Moon Bay CA) Platt David C. (Mountain View CA), Method for communicating a value over a transmission medium and for decoding same.
  216. Toru Ichien JP; Junichi Kimura JP; Tadashi Saitoh JP; Yutaka Okunoki JP, Method for compressing and decompressing moving picture information and video signal processing system.
  217. Peter J. Wonfor ; Derek T. Nelson, Method for controlling copy protection in digital video networks.
  218. Spagna, Richard; Milsted, Kenneth Louis; Lybrand, David P.; Downs, Edgar, Method for delivering electronic content from an online store.
  219. Daly Scott J. ; Squilla John R. ; Denber Michel ; Honsinger Chris W. ; Hamilton John, Method for embedding digital information in an image.
  220. Powell Robert D. ; Nitzberg Mark J., Method for encoding auxiliary data within a source signal.
  221. Borgelt Kenneth B. (Rolling Meadows IL) Mayer Glenn N. (Elgin IL), Method for generating a password using public key cryptography.
  222. Martin Vorbach DE; Robert Munch DE, Method for hierarchical caching of configuration data having dataflow processors and modules having two-or multidimensional programmable cell structure (FPGAs, DPGAs, etc.)--.
  223. Moskowitz Scott A. ; Cooperman Marc, Method for human-assisted random key generation and application for digital watermark system.
  224. Tomiyama Hiroshi (Himeji JPX) Naito Seishi (Himeji JPX), Method for identifying certification identifying media.
  225. Powell Robert D. ; Nitzberg Mark J., Method for image encoding.
  226. Odom Paul S. ; Massey Michael J., Method for modeling, storing, and transferring data in neutral form.
  227. Garcia Crisostomo B., Method for monitoring and trading stocks via the internet displaying bid/ask trade bars.
  228. Colvin,David S., Method for monitoring software using encryption including digital signatures/certificates.
  229. Colvin, David S., Method for providing repeated contact with software end-user using authorized administrator.
  230. David S. Colvin, Method for providing repeated contact with software end-user using authorized administrator.
  231. Macy, William W.; Holliman, Matthew J.; Yeung, Minerva Ming-Yee, Method for robust watermarking of content.
  232. Haber Stuart A. (New York NY) Stornetta ; Jr. Wakefield S. (Morristown NJ), Method for secure time-stamping of digital documents.
  233. Colvin, David S., Method for securing software to decrease software piracy.
  234. Colvin, David S., Method for securing software to increase license compliance.
  235. Colvin, David S., Method for securing software to reduce unauthorized use.
  236. Moskowitz Scott A. ; Cooperman Marc, Method for stega-cipher protection of computer code.
  237. Montanari Danny J. (Arvada CO) Coleman Glenn M. (Saguache CO), Method for tracking the production history of food products.
  238. Narasimhalu Arcot D. (Singapore SGX) Wang Weiguo (Singapore SGX) Kankanhalli Mohan S. (Singapore SGX), Method for utilizing medium nonuniformities to minimize unauthorized duplication of digital information.
  239. Burns,Gregory, Method for watermarking computer programs.
  240. Shimada Michio,JPX, Method of and an apparatus for generating internal crypto-keys.
  241. Fukuoka,Yoshihide; Matsui,Kineo, Method of embedding digital watermark, storage medium in which the method is stored, method of identifying embedded digital watermark, and apparatus for embedding digital watermark.
  242. Paterson Thomas S. ; Holtzman Samuel ; Bangs Alex L., Method of generating a display for a dynamic simulation model utilizing node and link representations.
  243. Koopman ; Jr. Philip J., Method of generating secret identification numbers.
  244. Yarom Yuval,ILX, Method of relocating the stack in a computer system for preventing overrate by an exploit program.
  245. Chen Juin-Hwey (Neshanic Station NJ), Method of use of voice message coder/decoder.
  246. Blakley ; III George R. (Austin TX) Rogaway Phillip W. (Davis CA), Method to protect information on a computer storage device.
  247. Shamir Adi (Rehovot ILX) Fiat Amos (Rehovot ILX), Method, apparatus and article for identification and signature.
  248. Brunk,Hugh L.; Levy,Kenneth L., Method, apparatus and programs for generating and utilizing content signatures.
  249. Gateva, Ralitsa; Phu, Thinh Nguyen, Method, system, and devices for transmitting information between a user equipment and an IP packet gateway.
  250. Diamant,Nimrod, Method, system, and program for handling device interrupts.
  251. Shamoon,Talal G.; Hill,Ralph D.; Radcliffe,Chris D.; Hwa,John P.; Sibert,W. Olin; Van Wie,David M., Methods and apparatus for persistent control and protection of content.
  252. Torrubia-Saez, Andres, Methods and apparatus for secure distribution of software.
  253. Logan James D. ; Goessling Daniel F. ; Goldhor Richard S., Methods and apparatus for selectively reproducing segments of broadcast programming.
  254. Serret-Avila, Xavier; Boccon-Gibod, Gilles, Methods and systems for encoding and protecting data using digital signature and watermarking techniques.
  255. Ellis, Daniel P. W., Methods and systems for identifying similar songs.
  256. Srinivasan Keshav, Methods and systems for performing article authentication.
  257. Rhoads Geoffrey B., Methods for controlling systems using control signals embedded in empirical data.
  258. Rhoads Geoffrey B., Methods for surveying dissemination of proprietary empirical data.
  259. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  260. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  261. Poliner, Graham E.; Mandel, Michael I.; Ellis, Daniel P. W., Methods, systems, and media for music classification.
  262. Reyes Jason A. ; Manning Frank B. ; Manning Terence J. ; McDonald Eric L. ; Gilbride Michael T., Modem with ring detection/modem processing capability.
  263. Eyres Kevin W. ; Lee Michael H., Modified license key entry for pre-installation of software.
  264. Borza Stephen J.,CAX ; Borza Michael A.,CAX ; Teitelbaum Neil,CAX, Mouse adapted to scan biometric data.
  265. Warren Robert L. ; Lee Chong U. ; Moallemi Kamran, Multi-media copy management system.
  266. Warren Robert L. ; Lee Chong U. ; Moallemi Kamran, Multi-media copy management system.
  267. Yeung, Minerva Ming-Yee; Holliman, Matthew J.; Liu, Robert G.; Macy, William W.; Yeo, Boon-Lock, Multimedia data delivery and playback system with multi-level content and privacy protection.
  268. Ahmed Tewfik ; Mitchell D. Swanson ; Bin Zhu, Multimedia data embedding.
  269. Marco M. Hurtado ; George Gregory Gruse ; Edgar Downs ; Kenneth Louis Milsted, Multimedia player for an electronic content delivery system.
  270. Stifle John E. (Urbana IL) Lee Donald A. (Urbana IL) Bitzer Donald L. (Urbana IL), Multiple access communication on a CATV reverse channel.
  271. Moskowitz Scott A., Multiple transform utilization and applications for secure digital watermarking.
  272. Moskowitz,Scott A., Multiple transform utilization and applications for secure digital watermarking.
  273. Yoshinobu Hitoshi (Kanagawa JPX), Multiplex broadcasting system.
  274. Whitman, Brian; Nesbit, Andrew; Ellis, Daniel, Musical fingerprinting.
  275. Luft, Siegfried Johannes; Chiang, Ping, Network element architecture for deep packet inspection.
  276. Harkins Larry E. (Rochester NY) Hayward Ken (Brockport NY) Herceg Thomas J. (Pittsford NY) Levine Jonathan D. (Rochester NY) Parsons David M. (Fairport NY), Network having selectively accessible recipient prioritized communication channel profiles.
  277. Hu Wei-Ming, Network request distribution based on static rules and dynamic performance data.
  278. Daniel Ullum ; Thomas J. Edsall ; Soei-Shin Hang, Network switch with hash table look up.
  279. Hirotaka Tachibana JP; Seiichi Urita JP; Seigo Kotani JP; Takehiko Hayashi JP, Network system for transporting security-protected data.
  280. Hermansky,Hynek; Sharma,Sangita; Ellis,Daniel, Nonlinear mapping for feature extraction in automatic speech recognition.
  281. Suzanne Marie Pietropaolo ; Phillip T. DiBello ; Anthony M. Scotto, Jr., Nonlinear video editing system.
  282. Collberg, Christian Sven; Thomborson, Clark David; Low, Douglas Wai Kok, Obfuscation techniques for enhancing software security.
  283. Sone Takurou,JPX, Online karaoke system with flying start performance.
  284. Breen, Peter E.; Macleod, Michael D.; Tudisco, Geoffrey M., Online trade aggregating system.
  285. Nagano Hirofumi (Yokohama JPX), Optical disc and a recording and/or reproducing apparatus having copy-protection function.
  286. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  287. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  288. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  289. Moskowitz Scott A. ; Cooperman Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  290. Moskowitz, Scott A.; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  291. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  292. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  293. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  294. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  295. Miller Mark S. ; Hardy Norman ; Tribble E. Dean ; Hibbert Christopher T. ; Hill Eric C., Persistent distributed capabilities.
  296. Rhoads Geoffrey B., Photographic products and methods employing embedded information.
  297. Binding, Carl; Hild, Stefan Georg; O'Connor, Luke James; Singhal, Sandeep K.; Shoup, Victor John; Steiner, Michael, Piggy-backed key exchange protocol for providing secure low-overhead browser connections from a client to a server using a trusted third party.
  298. Cambier, James L.; Siedlarz, John E., Portable authentication device and method using iris patterns.
  299. Lee Chong U. ; Moallemi Kamran ; Hinderling Jurg, Post-compression hidden data transport for video.
  300. Jean Laroche, Process for identifying audio content.
  301. Harada, Shunji; Kozuka, Masayuki; Minami, Masataka; Tatebayashi, Makoto, Production protection system dealing with contents that are digital production.
  302. Briggs Robert (Annandale VA) Iannacone Carmen (Fairfax VA) Rothey James (Fairfax VA) Evans David (Falls Church VA), Protection of an electronically stored image in a first color space by the alteration of a digital component in a second.
  303. Sala Nicola R. (61 Hyannis Avenue Nepean ; Ontario CAX K2J 3G2 ) Sala Rocco L. (62 Palsen Street Nepean ; Ontario CAX K2G 2W4 ), Proximity alarm system.
  304. Herz Frederick S. M. ; Eisner Jason M. ; Salganicoff Marcos, Pseudonymous server for system for customized electronic identification of desirable objects.
  305. Koopman ; Jr. Philip J. (Hebron CT) Finn Alan M. (Amston CT), Pseudorandom number generation and cryptographic authentication.
  306. Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA), Public key cryptographic apparatus and method.
  307. Hoffstein Jeffrey ; Pipher Jill ; Silverman Joseph H., Public key cryptosystem method and apparatus.
  308. Collar James K. (Portland OR) Gaskill Garold B. (Tualatin OR) Park Daniel J. (Portland OR) Shanks Carl D. (Aloha OR) Wells Rick T. (Aloha OR), Radio signal data transmission synchronization.
  309. Koopman ; Jr. Philip J. (Hebron CT), Random number generating system and process based on chaos.
  310. Wasserman Steve C. ; Williams Gregory G. ; Bucher Timothy P. ; Pansegrau Curtis ; Cassareau Philippe M. ; Wallace Gregory K., Real time decompression and post-decompress manipulation of compressed full motion video.
  311. Kimura, Hiroyuki; Arai, Takao; Takeuchi, Toshifumi, Receiving device, recording and reproducing device and receiving/recording-reproducing system for digital broadcast signal.
  312. Rhoads, Geoffrey B.; Davis, Bruce L.; Carr, J. Scott, Reconfiguring a watermark detector.
  313. Wang Ynjiun P. (Stony Brook NY) Swartz Jerome (Old Field NY) McGlynn Daniel R. (Brooklyn NY), Record with encoded data.
  314. Wong Simon ; Wilson Stewart ; Tilli Marco, Report server caching.
  315. Haga, Masayasu, Rewritable display sheet, image forming apparatus for displaying image on rewritable display sheet, and image displaying method.
  316. Cox Ingemar J. ; Miller Matthew L. ; Oami Ryoma,JPX, Robust digital watermarking.
  317. Earl Levine, Robust watermark method and apparatus for digital signals.
  318. Bloom Jeffrey A. ; Cox Ingemar J. ; Miller Matthew L. ; Wu Min ; Lin Ching-Yung ; Lui Yui Man, Rotation, scale, and translation resilient public watermarking for images using a log-polar fourier transform.
  319. Ray Kenneth S. ; Koelsch George Richard ; Ray Carol Andrews, S.E.C. registered individual account investment advisor expert system.
  320. Malvar Henrique S., Scalable audio coder and decoder.
  321. Hirose Masaki,JPX, Scramble/descramble method and apparatus for data broadcasting.
  322. Chang, Tzu-Chieh; Quackenbush, Schuyler Reynier; Snyder, James H, Scrambling a compression-coded signal.
  323. Bond John A. (Ottawa CAX) Li Yuan-Lu (Ottawa CAX) Crane Leslie J. (Nepean CAX), Scrambling and unscrambling video signals in a pay TV system.
  324. Zhao Jian ; Koch Eckhard,DEX ; Saito Makoto,JPX, Secure distribution of digital representations.
  325. Schwab Barry H., Secure identification system.
  326. Follendore ; III Roy D. (Manassas VA), Secure network method and apparatus.
  327. Philip R. Wiser ; Andrew R. Cherenson ; Steven T. Ansell ; Susan A. Cannon, Secure online music distribution system.
  328. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  329. Davis Derek L., Secure public digital watermark.
  330. Cox Ingemar J. ; Kilian Joseph J. ; Shamoon Talal G., Secure spread spectrum watermarking for multimedia data.
  331. Lee Wayne M. (200 Deer Creek Dr. Matthews NC 28105), Secure teleprocessing bidding system.
  332. Kane Richard L., Securities and commodities trading system.
  333. Trojan Donald R. (New Canaan CT) Keenan ; III Edward F. (Franklin Square NY) Hyatt Henry (Glendale NY), Securities trading workstation.
  334. Moskowitz,Scott A., Security based on subliminal and supraliminal channels for data objects.
  335. Danieli, Damon V., Security services and policy enforcement for electronic data.
  336. Fu Chi-Yung ; Petrich Loren I., Selective document image data compression technique.
  337. Candelore,Brant L., Selective encryption to enable multiple decryption keys.
  338. Datta,Sanchaita; Ragula,Bhaskar, Selective encryption with parallel networks.
  339. Best Stuart J. (Hayes GB2) Willard Reginald A. (Hayes GB2), Signal identification.
  340. Best Stuart J. (Harlington GB2) Johnson Nigel (Windlesham GB2) Sandford Adrian M. (Hayes GB2), Signal identification system.
  341. Tymes LaRoy (Palo Alto CA), Signal quality measure in packet data communication.
  342. Kenyon Stephen C. (Stafford VA), Signal recognition system and method.
  343. Yuval,Gideon A., Software anti-piracy systems and methods utilizing certificates with digital content.
  344. Michel Alan D. (Fishers IN) Reinke Robert E. (Indianapolis IN), Software pay per use system.
  345. Ginkel Peter (1275 Northcliff Trace Roswell GA 30076), Software protection and identification system.
  346. Moore Steven Jerome, Software security system using remove function to restrict unauthorized duplicating and installation of an application program.
  347. DeJean Jean P. (Cincinnati OH) Lu Daozheng (Buffalo Grove IL) Weissman Robert (Westport CT), Spread spectrum digital data transmission over TV video.
  348. Boncelet, Jr., Charles G.; Marvel, Lisa M.; Retter, Charles T., Spread spectrum image steganography.
  349. Cox Ingemar J., Spread spectrum watermark for embedded signalling.
  350. Kirovski,Darko; Malvar,Henrique, Stealthy audio watermarking.
  351. Kirovski,Darko; Malvar,Henrique, Stealthy audio watermarking.
  352. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  353. Moskowitz Scott A. (Tokyo JPX) Cooperman Marc (Palo Alto CA), Steganographic method and device.
  354. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  355. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  356. Rhoads Geoffrey B., Steganographic system.
  357. Van Wie David M. ; Weber Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure.
  358. Geoffrey B. Rhoads, Steganographically encoding a first image in accordance with a second image.
  359. Rhoads Geoffrey B. (West Linn OR), Steganography methods employing embedded calibration data.
  360. Milios Ioannis ; Oppedahl Carl, Stored program system with protected memory and secure signature extraction.
  361. Lacy, John Blakeway; Quackenbush, Schuyler Reynier; Snyder, James H, System and method for decompressing and making publically available received media content.
  362. Conley Ralph F., System and method for encrypting sensitive information.
  363. Burns, Randal Chilton; Long, Darrell, System and method for managing authentication and coherency in a storage area network.
  364. Erickson John S., System and method for managing copyrighted electronic media.
  365. Jay S. Walker ; Sanjay K. Jindal ; Bruce Schneier ; Toby Weir-Jones, System and method for managing third-party input to a conditional purchase offer (CPO).
  366. Colvin, David S., System and method for monitoring software.
  367. Buckman,Charles R.; Cox,Dennis J.; Kolbly,Donovan M.; Cantrell,Craig S.; Smith,Brian C.; Werner,Jon H.; Willebeek LeMair,Marc; Blackard,Joe Wayne; Webster, III,Francis S., System and method for processing network packet flows.
  368. Wilson Donald W.,CAX, System and method for providing an information gateway.
  369. Johnson,James David; Quackenbush,Schuyler Reynier, System and method for representing compressed information.
  370. Johnston, James David; Quackenbush, Schuyler Reynier, System and method for representing compressed information.
  371. Johnston, James David; Quackenbush, Schuyler Reynier, System and method for representing compressed information.
  372. Fox Barbara L. ; Waters Lester L. ; Spelman Jeffrey F. ; Seidensticker Robert B. ; Thomlinson Matthew W., System and method for secure electronic commerce transactions.
  373. Jian,Jian Ming, System and method for sign mask encryption and decryption.
  374. Jojic, Nebojsa; Turk, Matthew A., System and method for visually tracking occluded objects in real time.
  375. Johnston, James David; Kuo, Shyh Shiaw; Quackenbush, Schuyler Reynier; Turin, William, System and method of retrieving a watermark within a signal.
  376. Johnston, James David; Kuo, Shyh-Shiaw; Quackenbush, Schuyler Reynier; Turin, William, System and method of retrieving a watermark within a signal.
  377. Johnston,James David; Kuo,Shyh Shiaw; Quackenbush,Schuyler Reynier; Turin,William, System and method of retrieving a watermark within a signal.
  378. Johnston, James David; Kuo, Shyh-Shiaw; Quackenbush, Schuyler Reynier; Turin, William, System and method of watermarking a signal.
  379. Johnston,James David; Kuo,Shyh Shiaw; Quackenbush,Schuyler Reynier; Turin,William, System and method of watermarking a signal.
  380. Johnston,James David; Kuo,Shyh Shiaw; Quackenbush,Schuyler Reynier; Turin,William, System and method of watermarking signal.
  381. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  382. Moskowitz,Scott A.; Berry,Michael W., System and methods for permitting open access to data objects and for securing data within the data objects.
  383. Wang,Avery Li Chun; Smith, III,Julius O., System and methods for recognizing sound and music signals in high noise and distortion.
  384. Driessen, Peter Frank; Kretschmer, Mathias R.; Quackenbush, Schuyler Reynier; Snyder, James H, System and methods for transmitting data.
  385. Driessen, Peter Frank; Kretschmer, Mathias R.; Quackenbush, Schuyler Reynier; Snyder, James H., System and methods for transmitting data.
  386. Driessen,Peter Frank; Kretschmer,Mathias R.; Quackenbush,Schuyler Reynier; Snyder,James H, System and methods for transmitting data.
  387. Stefik Mark J. (Woodside CA) Casey Michalene M. (Morgan Hill CA), System for controlling the distribution and use of digital works.
  388. Stefik Mark J. ; Petrie Glen W. ; Okamoto Steve A. ; Briggs Nicholas H., System for controlling the distribution and use of rendered digital works through watermaking.
  389. Herz Frederick S. M., System for customized electronic identification of desirable objects.
  390. Lebrun Eric (Saint Jeannet FRX) Francois Pascal (Vence FRX) Raimbault Frederic (Cagnes-Sur-Mer FRX) Warren Jeff (Apex NC), System for effective allocation of network-wide bandwidth.
  391. Iwamura Keiichi,JPX, System for enabling access to a body of information based on a credit value, and system for allocating fees.
  392. Nadan Joseph S. (New York City NY), System for securely providing restricted video information.
  393. Atkins Charles Agee, System for the operation and management of one or more financial accounts through the use of a digital communication a.
  394. Atkins Charles Agee (Charleston SC), System for the operation and management of one or more financial accounts through the use of a digital communication and.
  395. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  396. Chen Brian ; Wornell Gregory W., System method, and product for information embedding using an ensemble of non-intersecting embedding generators.
  397. Collart, Todd R., System, method and article of manufacturing for authorizing the use of electronic content utilizing a laser-centric medium and a network server.
  398. Levine David A. ; Levine Monica L. ; Minton Gabriel D. ; Poletti Jon ; Sondregger Dean, System, method and computer program product for online financial products trading.
  399. Morishita, Isao; Zhang, Hongwen; Kinawi, Husam, Systems and methods for improved network based content inspection.
  400. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  401. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  402. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  403. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  404. Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
  405. Athineos, Marios; Hermansky, Hynek; Ellis, Daniel P. W., Systems and methods for speech recognition using frequency domain linear prediction polynomials to form temporal and spectral envelopes from frequency domain representations of signals.
  406. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
  407. Parry, Beau Robertson; Boddeti, Yasodekshna; Parupati, Srikanth, Systems, methods and apparatus for multivariate authentication.
  408. Moskowitz,Scott A., Systems, methods and devices for trusted transactions.
  409. Dorward Sean M. (Somerville NJ) Jayant Nuggehally S. (Gillette NJ) Johnston James D. (Warren NJ) Quackenbush Schuyler R. (Westfield NJ) Seshadri Nambirajan (Chatham NJ) Sundberg Carl-Erik W. (Chatham, Tailored error protection.
  410. Chow, Stanley T.; Johnson, Harold J.; Gu, Yuan, Tamper resistant software encoding.
  411. Robert Daniel Buch ; Ryan Brice Cunningham, Targeted network video download interface.
  412. Venkatesan,Ramarathnam; Vazirani,Vijay, Technique for producing through watermarking highly tamper-resistant executable code and resulting "watermarked" code so formed.
  413. Stringer John W. (Santa Cruz CA) Richards Theodore S. (Los Gatos CA), Transformation of ephemeral material.
  414. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M. ; Weber Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  415. Lancaster, Roger, Universal contract exchange.
  416. Harkins Larry E. (Rochester NY) Hayward Ken (Brockport NY) Herceg Thomas J. (Pittsford NY) Levine Jonathan D. (Rochester NY) Parsons David M. (Fairport NY), User interface for defining and automatically transmitting data according to preferred communication channels.
  417. Moskowitz,Scott; Berry,Michael, Utilizing data reduction in stegnographic and cryptographic systems.
  418. Cawley Robin A. (Burghclere GB2) Stapleton Alan L. (Newbury GB2) Brown Ian M. (Caversham GB2), Video image processing system having variable data compression.
  419. Waggener William N. (Sarasota FL), Video system for conveying digital and analog information.
  420. Rodriguez, Tony F.; Rhoads, Geoffrey B.; Davis, Bruce L.; Carr, J. Scott, Watermarked business cards and methods.
  421. Girod Bernd,DEX ; Hartung Frank H. D.,DEX, Watermarking method and apparatus for compressed digital video.
  422. Natarajan, Balas K., Watermarking of digital object.
  423. Cox Ingemar J., Watermarking of image data using MPEG/JPEG coefficients.
  424. Leighton Frank Thomson (15 Charlesden Park Newtonville MA 02160), Watermarking process resilient to collusion attacks.
  425. Wu Min ; Liu Bede, Watermarking scheme for image authentication.
  426. Ravi K. Sharma ; Adnan M. Alattar ; Farid Ahmed ; Geoffrey B. Rhoads, Wavelet domain watermarks.
  427. Dahod, Shabbir M.; Gurwitz, Robert F.; Marcuvitz, Andrew; Olsen, Allen E.; Spellman, Peter J., Web-based system for connecting buyers and sellers.
  428. Moskowitz Scott A. ; Cooperman Marc S., Z-transform implementation of digital watermarks.
  429. Moskowitz, Scott A.; Cooperman, Marc, Z-transform implementation of digital watermarks.
  430. Moskowitz,Scott A.; Cooperman,Marc, Z-transform implementation of digital watermarks.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로