Docoh
Loading...

NTIP Network-1

APP
Utility
Key Derivation for a Module Using an Embedded Universal Integrated Circuit Card
11 Nov 21
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms.
John A. Nix
Filed: 28 Jun 21
GRANT
Utility
Key derivation for a module using an embedded universal integrated circuit card
3 Aug 21
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms.
John A. Nix
Filed: 20 May 20
APP
Utility
Set of Servers for "Machine-to-Machine" Communications Using Public Key Infrastructure
17 Jun 21
A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller.
John A. Nix
Filed: 24 Feb 21
APP
Utility
Key Derivation for a Module Using an Embedded Universal Integrated Circuit Card
2 Sep 20
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms.
John A. Nix
Filed: 19 May 20
APP
Utility
Set of Servers for "Machine-to-Machine" Communications Using Public Key Infrastructure
22 Jul 20
A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller.
John A. Nix
Filed: 7 Apr 20
GRANT
Utility
Key derivation for a module using an embedded universal integrated circuit card
29 Jun 20
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms.
John A. Nix
Filed: 26 Nov 18
GRANT
Utility
Set of servers for “machine-to-machine” communications using public key infrastructure
11 May 20
A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller.
John A. Nix
Filed: 6 May 18
APP
Utility
Network Supporting Two-factor Authentication for Modules with Embedded Universal Integrated Circuit Cards
22 Apr 20
A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC).
John A. Nix
Filed: 18 Dec 19
GRANT
Utility
Methods for using extracted features to perform an action associated with selected identified image
13 Apr 20
Methods and systems to perform methods comprising receiving, at a computer system from a first electronic device a first electronic media work; extracting one or more features therefrom; determining that at least a portion of the first electronic media work corresponds to a first reference media work based on a matching of the extracted features against a database of reference features; receiving, from a second electronic device, a query related to the first electronic media work; linking the query to action information in an action database based upon determining that at least a portion of the first electronic media work corresponds to the first reference media work; generating machine-readable instructions associated with the action to be performed based at least in part on the linking of the query to the action information; transmitting, to the second electronic device, the machine-readable instructions; and logging an event associated with the machine-readable instructions.
Ingemar J. Cox
Filed: 27 Oct 19
GRANT
Utility
Methods for using extracted features to perform an action
13 Apr 20
A computer system comprising one or more processors and computer-readable media operatively connected thereto, having stored thereon instructions for carrying out the steps of: maintaining one or more databases comprising first electronic data comprising digitally created reference compact electronic representations for each of a plurality of reference electronic works and second electronic data associated with the reference electronic works and related to action information corresponding thereto; obtaining a first digitally created compact electronic representation comprising one or more extracted feature vectors of a first electronic work; identifying a matching reference electronic work by comparing the first digitally created compact electronic representation of the first electronic work with the first electronic data using a sub-linear search of the first electronic data; determining the action information corresponding to the matching reference electronic work based on the second electronic data; and associating the determined action information with the first electronic work.
Ingemar J. Cox
Filed: 27 Oct 19
GRANT
Utility
Network supporting two-factor authentication for modules with embedded universal integrated circuit cards
16 Mar 20
A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC).
John A. Nix
Filed: 7 Feb 19
GRANT
Utility
Methods for using extracted features to perform an action
3 Feb 20
A method that extracts features from frames of a video signal to perform an action includes receiving a query related to one or more frames of a video signal; extracting one or more features of the one or more frames; identifying one or more annotations associated with the one or more frames; identifying one or more images related to the one or more frames by comparing the extracted features with reference features from a first plurality of reference works, the first plurality of reference works organized using a clustering technique based on annotations; providing the identified one or more images along with action information associated with the identified one or more images, wherein the action information is related to an action to be performed; receiving a selection of one of the identified one or more images and providing machine readable instructions to perform the action.
Ingemar J. Cox
Filed: 13 Sep 18
APP
Utility
Systems and Methods for "Machine-to-Machine" (M2M) Communications Between Modules, Servers, and an Application using Public Key Infrastructure (PKI)
29 Jan 20
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application.
John A. Nix
Filed: 3 Oct 19
GRANT
Utility
Methods for using extracted features to perform an action
20 Jan 20
A computer system comprising one or more processors and computer-readable media operatively connected thereto, having stored thereon instructions for carrying out the steps of: maintaining one or more databases comprising first electronic data comprising digitally created reference compact electronic representations for each of a plurality of reference electronic works and second electronic data associated with the reference electronic works and related to action information corresponding thereto; obtaining a first digitally created compact electronic representation comprising one or more extracted feature vectors of a first electronic work; identifying a matching reference electronic work by comparing the first digitally created compact electronic representation of the first electronic work with the first electronic data using a sub-linear search of the first electronic data; determining the action information corresponding to the matching reference electronic work based on the second electronic data; and associating the determined action information with the first electronic work.
Ingemar J. Cox
Filed: 13 Sep 18
GRANT
Utility
Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
6 Jan 20
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application.
John A. Nix
Filed: 15 Jul 18
GRANT
Utility
Methods for using extracted features to perform an action associated with selected identified image
30 Dec 19
Methods and systems to perform methods comprising receiving, at a computer system from a first electronic device a first electronic media work; extracting one or more features therefrom; determining that at least a portion of the first electronic media work corresponds to a first reference media work based on a matching of the extracted features against a database of reference features; receiving, from a second electronic device, a query related to the first electronic media work; linking the query to action information in an action database based upon determining that at least a portion of the first electronic media work corresponds to the first reference media work; generating machine-readable instructions associated with the action to be performed based at least in part on the linking of the query to the action information; transmitting, to the second electronic device, the machine-readable instructions; and logging an event associated with the machine-readable instructions.
Ingemar J. Cox
Filed: 6 Sep 18
GRANT
Utility
Method for using extracted features to perform an action associated with selected identified image
30 Dec 19
Methods and systems to perform methods comprising receiving, at a computer system from a first electronic device a first electronic media work; extracting one or more features therefrom; determining that at least a portion of the first electronic media work corresponds to a first reference media work based on a matching of the extracted features against a database of reference features; receiving, from a second electronic device, a query related to the first electronic media work; linking the query to action information in an action database based upon determining that at least a portion of the first electronic media work corresponds to the first reference media work; generating machine-readable instructions associated with the action to be performed based at least in part on the linking of the query to the action information; transmitting, to the second electronic device, the machine-readable instructions; and logging an event associated with the machine-readable instructions.
Ingemar J. Cox
Filed: 13 Sep 18
GRANT
Utility
Power management and security for wireless modules in “machine-to-machine” communications
30 Dec 19
Methods and systems are provided for power management and security for wireless modules in “Machine-to-Machine” communications.
John A. Nix
Filed: 7 Feb 19
GRANT
Utility
Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys
2 Dec 19
Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers.
John A. Nix
Filed: 25 Nov 18
APP
Utility
Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication
16 Oct 19
A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC.
John A. Nix
Filed: 25 Jun 19
  • 1
Patents are sorted by USPTO publication date, most recent first