27 patents
Utility
Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
14 Mar 23
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application.
John A. Nix
Filed: 12 Jan 22
Utility
Network supporting two-factor authentication for modules with embedded universal integrated circuit cards
27 Dec 22
A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC).
John A. Nix
Filed: 19 Dec 19
Utility
Systems and Methods for "Machine-to-Machine" (M2M) Communications Between Modules, Servers, and an Application using Public Key Infrastructure (PKI)
5 May 22
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application.
John A. Nix
Filed: 12 Jan 22
Utility
Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication
31 Mar 22
A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC.
John A. Nix
Filed: 10 Dec 21
Utility
Set of servers for “machine-to-machine” communications using public key infrastructure
22 Mar 22
A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller.
John A. Nix
Filed: 8 Apr 20
Utility
Systems and methods for “Machine-to-Machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
22 Feb 22
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application.
John A. Nix
Filed: 4 Oct 19
Utility
Embedded universal integrated circuit card supporting two-factor authentication
25 Jan 22
A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC.
John A. Nix
Filed: 26 Jun 19
Utility
Key Derivation for a Module Using an Embedded Universal Integrated Circuit Card
11 Nov 21
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms.
John A. Nix
Filed: 28 Jun 21
Utility
Key derivation for a module using an embedded universal integrated circuit card
3 Aug 21
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms.
John A. Nix
Filed: 20 May 20
Utility
Set of Servers for "Machine-to-Machine" Communications Using Public Key Infrastructure
17 Jun 21
A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller.
John A. Nix
Filed: 24 Feb 21
Utility
Key Derivation for a Module Using an Embedded Universal Integrated Circuit Card
2 Sep 20
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms.
John A. Nix
Filed: 19 May 20
Utility
Set of Servers for "Machine-to-Machine" Communications Using Public Key Infrastructure
22 Jul 20
A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller.
John A. Nix
Filed: 7 Apr 20
Utility
Key derivation for a module using an embedded universal integrated circuit card
29 Jun 20
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms.
John A. Nix
Filed: 26 Nov 18
Utility
Set of servers for “machine-to-machine” communications using public key infrastructure
11 May 20
A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller.
John A. Nix
Filed: 6 May 18
Utility
Network Supporting Two-factor Authentication for Modules with Embedded Universal Integrated Circuit Cards
22 Apr 20
A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC).
John A. Nix
Filed: 18 Dec 19
Utility
Methods for using extracted features to perform an action associated with selected identified image
13 Apr 20
Methods and systems to perform methods comprising receiving, at a computer system from a first electronic device a first electronic media work; extracting one or more features therefrom; determining that at least a portion of the first electronic media work corresponds to a first reference media work based on a matching of the extracted features against a database of reference features; receiving, from a second electronic device, a query related to the first electronic media work; linking the query to action information in an action database based upon determining that at least a portion of the first electronic media work corresponds to the first reference media work; generating machine-readable instructions associated with the action to be performed based at least in part on the linking of the query to the action information; transmitting, to the second electronic device, the machine-readable instructions; and logging an event associated with the machine-readable instructions.
Ingemar J. Cox
Filed: 27 Oct 19
Utility
Methods for using extracted features to perform an action
13 Apr 20
A computer system comprising one or more processors and computer-readable media operatively connected thereto, having stored thereon instructions for carrying out the steps of: maintaining one or more databases comprising first electronic data comprising digitally created reference compact electronic representations for each of a plurality of reference electronic works and second electronic data associated with the reference electronic works and related to action information corresponding thereto; obtaining a first digitally created compact electronic representation comprising one or more extracted feature vectors of a first electronic work; identifying a matching reference electronic work by comparing the first digitally created compact electronic representation of the first electronic work with the first electronic data using a sub-linear search of the first electronic data; determining the action information corresponding to the matching reference electronic work based on the second electronic data; and associating the determined action information with the first electronic work.
Ingemar J. Cox
Filed: 27 Oct 19
Utility
Network supporting two-factor authentication for modules with embedded universal integrated circuit cards
16 Mar 20
A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC).
John A. Nix
Filed: 7 Feb 19
Utility
Methods for using extracted features to perform an action
3 Feb 20
A method that extracts features from frames of a video signal to perform an action includes receiving a query related to one or more frames of a video signal; extracting one or more features of the one or more frames; identifying one or more annotations associated with the one or more frames; identifying one or more images related to the one or more frames by comparing the extracted features with reference features from a first plurality of reference works, the first plurality of reference works organized using a clustering technique based on annotations; providing the identified one or more images along with action information associated with the identified one or more images, wherein the action information is related to an action to be performed; receiving a selection of one of the identified one or more images and providing machine readable instructions to perform the action.
Ingemar J. Cox
Filed: 13 Sep 18
Utility
Systems and Methods for "Machine-to-Machine" (M2M) Communications Between Modules, Servers, and an Application using Public Key Infrastructure (PKI)
29 Jan 20
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application.
John A. Nix
Filed: 3 Oct 19