30 patents
Page 2 of 2
Utility
Network supporting two-factor authentication for modules with embedded universal integrated circuit cards
16 Mar 20
A network with a set of servers can support authentication from a module, where the module includes an embedded universal integrated circuit card (eUICC).
John A. Nix
Filed: 7 Feb 19
Utility
Methods for using extracted features to perform an action
3 Feb 20
A method that extracts features from frames of a video signal to perform an action includes receiving a query related to one or more frames of a video signal; extracting one or more features of the one or more frames; identifying one or more annotations associated with the one or more frames; identifying one or more images related to the one or more frames by comparing the extracted features with reference features from a first plurality of reference works, the first plurality of reference works organized using a clustering technique based on annotations; providing the identified one or more images along with action information associated with the identified one or more images, wherein the action information is related to an action to be performed; receiving a selection of one of the identified one or more images and providing machine readable instructions to perform the action.
Ingemar J. Cox
Filed: 13 Sep 18
Utility
Systems and Methods for "Machine-to-Machine" (M2M) Communications Between Modules, Servers, and an Application using Public Key Infrastructure (PKI)
29 Jan 20
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application.
John A. Nix
Filed: 3 Oct 19
Utility
Methods for using extracted features to perform an action
20 Jan 20
A computer system comprising one or more processors and computer-readable media operatively connected thereto, having stored thereon instructions for carrying out the steps of: maintaining one or more databases comprising first electronic data comprising digitally created reference compact electronic representations for each of a plurality of reference electronic works and second electronic data associated with the reference electronic works and related to action information corresponding thereto; obtaining a first digitally created compact electronic representation comprising one or more extracted feature vectors of a first electronic work; identifying a matching reference electronic work by comparing the first digitally created compact electronic representation of the first electronic work with the first electronic data using a sub-linear search of the first electronic data; determining the action information corresponding to the matching reference electronic work based on the second electronic data; and associating the determined action information with the first electronic work.
Ingemar J. Cox
Filed: 13 Sep 18
Utility
Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
6 Jan 20
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application.
John A. Nix
Filed: 15 Jul 18
Utility
Methods for using extracted features to perform an action associated with selected identified image
30 Dec 19
Methods and systems to perform methods comprising receiving, at a computer system from a first electronic device a first electronic media work; extracting one or more features therefrom; determining that at least a portion of the first electronic media work corresponds to a first reference media work based on a matching of the extracted features against a database of reference features; receiving, from a second electronic device, a query related to the first electronic media work; linking the query to action information in an action database based upon determining that at least a portion of the first electronic media work corresponds to the first reference media work; generating machine-readable instructions associated with the action to be performed based at least in part on the linking of the query to the action information; transmitting, to the second electronic device, the machine-readable instructions; and logging an event associated with the machine-readable instructions.
Ingemar J. Cox
Filed: 6 Sep 18
Utility
Method for using extracted features to perform an action associated with selected identified image
30 Dec 19
Methods and systems to perform methods comprising receiving, at a computer system from a first electronic device a first electronic media work; extracting one or more features therefrom; determining that at least a portion of the first electronic media work corresponds to a first reference media work based on a matching of the extracted features against a database of reference features; receiving, from a second electronic device, a query related to the first electronic media work; linking the query to action information in an action database based upon determining that at least a portion of the first electronic media work corresponds to the first reference media work; generating machine-readable instructions associated with the action to be performed based at least in part on the linking of the query to the action information; transmitting, to the second electronic device, the machine-readable instructions; and logging an event associated with the machine-readable instructions.
Ingemar J. Cox
Filed: 13 Sep 18
Utility
Power management and security for wireless modules in “machine-to-machine” communications
30 Dec 19
Methods and systems are provided for power management and security for wireless modules in “Machine-to-Machine” communications.
John A. Nix
Filed: 7 Feb 19
Utility
Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys
2 Dec 19
Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers.
John A. Nix
Filed: 25 Nov 18
Utility
Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication
16 Oct 19
A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC.
John A. Nix
Filed: 25 Jun 19