30 patents
Utility
Key Derivation for a Module Using an Embedded Universal Integrated Circuit Card
23 Nov 23
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms.
John A. Nix
Filed: 3 Aug 23
Utility
Key derivation for a module using an embedded universal integrated circuit card
22 Aug 23
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms.
John A. Nix
Filed: 28 Jun 21
Utility
Systems and Methods for "Machine-to-Machine" (M2M) Communications Between Modules, Servers, and an Application using Public Key Infrastructure (PKI)
29 Jun 23
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application.
John A. Nix
Filed: 20 Feb 23
Utility
Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
14 Mar 23
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application.
John A. Nix
Filed: 12 Jan 22
Utility
Network supporting two-factor authentication for modules with embedded universal integrated circuit cards
27 Dec 22
A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC).
John A. Nix
Filed: 19 Dec 19
Utility
Systems and Methods for "Machine-to-Machine" (M2M) Communications Between Modules, Servers, and an Application using Public Key Infrastructure (PKI)
5 May 22
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application.
John A. Nix
Filed: 12 Jan 22
Utility
Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication
31 Mar 22
A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC.
John A. Nix
Filed: 10 Dec 21
Utility
Set of servers for “machine-to-machine” communications using public key infrastructure
22 Mar 22
A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller.
John A. Nix
Filed: 8 Apr 20
Utility
Systems and methods for “Machine-to-Machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
22 Feb 22
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application.
John A. Nix
Filed: 4 Oct 19
Utility
Embedded universal integrated circuit card supporting two-factor authentication
25 Jan 22
A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC.
John A. Nix
Filed: 26 Jun 19
Utility
Key Derivation for a Module Using an Embedded Universal Integrated Circuit Card
11 Nov 21
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms.
John A. Nix
Filed: 28 Jun 21
Utility
Key derivation for a module using an embedded universal integrated circuit card
3 Aug 21
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms.
John A. Nix
Filed: 20 May 20
Utility
Set of Servers for "Machine-to-Machine" Communications Using Public Key Infrastructure
17 Jun 21
A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller.
John A. Nix
Filed: 24 Feb 21
Utility
Key Derivation for a Module Using an Embedded Universal Integrated Circuit Card
2 Sep 20
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms.
John A. Nix
Filed: 19 May 20
Utility
Set of Servers for "Machine-to-Machine" Communications Using Public Key Infrastructure
22 Jul 20
A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller.
John A. Nix
Filed: 7 Apr 20
Utility
Key derivation for a module using an embedded universal integrated circuit card
29 Jun 20
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms.
John A. Nix
Filed: 26 Nov 18
Utility
Set of servers for “machine-to-machine” communications using public key infrastructure
11 May 20
A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller.
John A. Nix
Filed: 6 May 18
Utility
Network Supporting Two-factor Authentication for Modules with Embedded Universal Integrated Circuit Cards
22 Apr 20
A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC).
John A. Nix
Filed: 18 Dec 19
Utility
Methods for using extracted features to perform an action associated with selected identified image
13 Apr 20
Methods and systems to perform methods comprising receiving, at a computer system from a first electronic device a first electronic media work; extracting one or more features therefrom; determining that at least a portion of the first electronic media work corresponds to a first reference media work based on a matching of the extracted features against a database of reference features; receiving, from a second electronic device, a query related to the first electronic media work; linking the query to action information in an action database based upon determining that at least a portion of the first electronic media work corresponds to the first reference media work; generating machine-readable instructions associated with the action to be performed based at least in part on the linking of the query to the action information; transmitting, to the second electronic device, the machine-readable instructions; and logging an event associated with the machine-readable instructions.
Ingemar J. Cox
Filed: 27 Oct 19
Utility
Methods for using extracted features to perform an action
13 Apr 20
A computer system comprising one or more processors and computer-readable media operatively connected thereto, having stored thereon instructions for carrying out the steps of: maintaining one or more databases comprising first electronic data comprising digitally created reference compact electronic representations for each of a plurality of reference electronic works and second electronic data associated with the reference electronic works and related to action information corresponding thereto; obtaining a first digitally created compact electronic representation comprising one or more extracted feature vectors of a first electronic work; identifying a matching reference electronic work by comparing the first digitally created compact electronic representation of the first electronic work with the first electronic data using a sub-linear search of the first electronic data; determining the action information corresponding to the matching reference electronic work based on the second electronic data; and associating the determined action information with the first electronic work.
Ingemar J. Cox
Filed: 27 Oct 19