Sunny Isles Beach, Florida
United States
58
2015-09-17
The entities that hold a legal rights for patent applications filed by inventor Moskowitz Scott A.:
Scott A. Moskowitz from Sunny Isles Beach, US has applied for patents for these inventions. The list has both pending applications and granted patents:
Method and device for monitoring and analyzing signals
#2 | 2015-07-09Systems, methods and devices for trusted transactions
#3 | 2015-03-12Data protection method and device
#4 | 2014-08-14Multiple transform utilization and application for secure digital watermarking
#5 | 2014-08-14Multiple transform utilization and application for secure digital watermarking
#6 | 2014-04-03Method and device for monitoring and analyzing signals
#7 | 2013-12-19Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
#8 | 2013-11-07Multiple transform utilization and application for secure digital watermarking
#9 | 2013-08-08Data protection method and device
#10 | 2013-08-08Method and device for monitoring and analyzing signals
#11 | 2013-08-01Systems, methods and devices for trusted transactions
#12 | 2013-08-01Systems, methods and devices for trusted transactions
#13 | 2013-08-01System and methods for permitting open access to data objects and for securing data within the data objects
#14 | 2013-08-01STEGANOGRAPHIC METHOD AND DEVICE
#15 | 2013-07-25Utilizing data reduction in steganographic and cryptographic systems
#16 | 2013-07-18Secure personal content server
#17 | 2013-01-31Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
#18 | 2013-01-10Data protection method and device
#19 | 2012-11-01Security based on subliminal and supraliminal channels for data objects
#20 | 2012-08-16Secure personal content server
#21 | 2012-08-16Utilizing data reduction in steganographic and cryptographic systems
#22 | 2012-03-15Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
#23 | 2011-01-13Method and system for digital watermarking
#24 | 2010-12-09Steganographic method and device
#25 | 2010-11-18Method and system for digital watermarking
#26 | 2010-09-02Multiple transform utilization and application for secure digital watermarking
#27 | 2010-08-12Linear predictive coding implementation of digital watermarks
#28 | 2010-06-17Utilizing data reduction in steganographic and cryptographic system
#29 | 2010-04-29Method and device for monitoring and analyzing signals
#30 | 2010-04-22Method for combining transfer functions and predetermined key creation
#31 | 2010-03-25Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
#32 | 2010-03-25Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
#33 | 2010-03-11Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
#34 | 2010-01-07Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
#35 | 2010-01-07Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
#36 | 2009-09-03Steganographic method and device
#37 | 2009-08-20Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
#38 | 2009-07-30System and methods for permitting open access to data objects and for securing data within the data objects
#39 | 2009-04-02Secure personal content server
#40 | 2008-06-26Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments
#41 | 2008-06-05Method and system for digital watermarking
#42 | 2008-05-08Method and device for monitoring and analyzing signals
#43 | 2008-03-27Steganographic method and device
#44 | 2008-02-21Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
#45 | 2008-01-31Security based on subliminal and supraliminal channels for data objects
#46 | 2008-01-24Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
#47 | 2008-01-24Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
#48 | 2008-01-17Data protection method and device
#49 | 2008-01-03Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
#50 | 2008-01-03Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
#51 | 2007-12-27Optimization methods for the insertion, projection, and detection of digital watermarks in digital data
#52 | 2007-12-27Optimization methods for the insertion, protection and detection of digital watermarks in digital data
#53 | 2007-12-20Steganographic method and device
#54 | 2007-09-27Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
#55 | 2007-05-17Method and system for digital watermarking
#56 | 2007-05-17Systems and methods for permitting open access to data objects and for securing data within the data objects
#57 | 2007-04-05Linear predictive coding implementation of digital watermarks
#58 | 2007-02-01Systems, methods and devices for trusted transactions