Class / Patent application number | Description | Number of patent applications / Date published |
726032000 | Copy detection | 54 |
20080256647 | System and Method For Tracing Illegally Copied Contents on the Basis of Fingerprint - Disclosed is a system and method for tracing illegally copied contents on the basis of fingerprint. Purchaser information is inserted into digital contents that include image, audio or video data using a fingerprinting system when the digital contents are sold in the distribution process of the digital contents. If the contents purchaser has illegally copied and distributed the contents through the Internet or a P | 10-16-2008 |
20080320606 | Device for interfering with the pirating of movies and artistic mediums - The present invention is a system for discouraging the recording of a video image on a video recorder of a movie projected onto a display surface of a translucent movie screen. The system includes a plurality of IR projector lamps mounted behind the movie screen and adjacent to a back surface of the screen opposite the display surface. Each of the projector lamps is adapted and configured to generate an IR beam sufficient strong to transmit through the movie screen with sufficient intensity to create a bright spot of IR light on the display surface corresponding to the position of the IR projectors. The IR projectors are further adapted and configured such that the bright spots of IR light are sufficiently bright to appear clearly on the recorded video image. The IR projectors are releasably coupled to a control module contained in a housing via a plurality of connector elements and electrical lines. The IR projectors are preferably arranged in a grid pattern and the control module is adapted and configured to flash the IR projectors on in off such that a message can be displayed on the grid pattern. The system further includes a plurality of IR transmitting optical fibers coupled to an IR transmitter, the optical fibers being positioned over a display object, the IR transmitter and optical fibers being adapted and configured such that the optical fibers transmit IR ration over the display object. | 12-25-2008 |
20090013414 | System and Method for Monitoring Content - A method for processing media files includes receiving a request to download a first media file and, in response to receiving the request, generating a first signature that describes a first characteristic of the first media file. The method also includes determining whether the first signature matches any of a first plurality of stored signatures. The method also includes generating a second signature that describes a second characteristic of the first media file in response to determining that the first signature matches one of the first plurality of stored signatures. Additionally the method includes determining whether the second signature matches any of a second plurality of stored signatures and, in response to determining that the second signature matches one or more of the second plurality of stored signatures, denying the request to download the first media file. | 01-08-2009 |
20090025093 | OPTICAL WRITING APPARATUS, IMAGE FORMING APPARATUS AND COMPUTER READABLE INFORMATION RECORDING MEDIUM - An optical writing apparatus has a part configured to superpose an unauthorized copy protection pattern on image data; a control part configured to recognize the unauthorized copy protection pattern, correct image data of the unauthorized copy protection pattern in pixel unit, and control a size of an isolated dot included in the unauthorized copy protection pattern; and a writing part configured to write a corresponding image on a photosensitive body based on the thus-corrected image data. | 01-22-2009 |
20090049560 | System and Method for Tracing Tardos Fingerprint Codes - A system and method is provided for identifying the source of an unauthorized copy of content. The method includes embedding a unique user fingerprint code to into each of a plurality of authorized copies of content and identifying an unknown fingerprint code in an unauthorized copy of the content. Each member of the unknown fingerprint code is compared to each corresponding member in each of the user fingerprint codes. A score is assigned to each of the user fingerprint codes based on the comparison and users associated with scores exceeding a threshold are identified as a source of the unauthorized copy. | 02-19-2009 |
20090138975 | System and Method for Adjustable Licensing of Digital Products - Techniques are provided for adjusting the number of devices allowed to use a digital product (e.g., software) under a license. In one embodiment, the technique may involve setting the allowed number of devices to a first upper/lower limit for a first time period, and, after the first time period has expired, increasing/lowering the allowed number of devices to a second upper/lower limit for a second time period. The technique may involve, readjusting the allowed number for a third time period, thereby allowing for a changing number of device installations of the digital product. | 05-28-2009 |
20090158443 | PIRACY PREVENTION, DETECTION, AND CONTENT MANAGEMENT - A computing device is configured to receive media content and determine if the received media content includes a stego message. If the media content includes a stego message, then the computing device is further configured to decode at least a portion of the stego message, and perform a task based in part on the decoded portion of the stego message. | 06-18-2009 |
20090217388 | Apparatus for and a method of copy-protecting a content carrying recording medium - Recording data to be recorded on an optical disc such as a DVD has at least one video title set having content data files having a video object data set, a video title set information file for the video title set and video manager information. The recording data also has a volume file system information having data relating to file identification for enabling location of content data files. In order to inhibit copying by a file-by-file copying apparatus data relating to file identification in the volume information for at least one of the content data files is caused to be incorrect, for example altered The incorrect information may be at least one of a file start address, a file length, incorrect error detection data, a pointer to a corrupt video title set information file rather than the correct video title set information file. | 08-27-2009 |
20090235366 | METHODS, SYSTEMS, SIGNALS AND MEDIA FOR ENCOURAGING USERS OF COMPUTER READABLE CONTENT TO REGISTER - A method and system for encouraging users of computer readable content to register. The method involves embedding in the computer readable content, instruction codes operable to direct a processor circuit to automatically establish a connection to a server, when the content is in use by the processor circuit, to transmit registration information to the server and operable to control further use of the content by the processor circuit in response to a key received from the server. | 09-17-2009 |
20090328237 | Matching of Unknown Video Content To Protected Video Content - A system that stores plural reference measures, each reference measure corresponding to measured transitions of one or more video objects of plural successive pictures corresponding to a video scene, receives first and second measures of plural successive pictures corresponding to a first video scene received from a remote device, the first and second measures corresponding to measured transitions of a video object of the first video scene, compares the first and second measures with the stored plural reference measures, and indicates to the remote device whether a threshold percentage match exists between the first and second measures and one of the stored plural reference pictures. | 12-31-2009 |
20100071076 | SYSTEMS, METHODS, AND PROGRAM APPLICATIONS FOR SELECTIVELY RESTRICTING THE PLACESHIFTING OF COPY PROTECTED DIGITAL MEDIA CONTENT - Systems, methods, and program products are provided for selectively restricting the transmission of copy protected digital media content from a computer system, over a network, and to a remote display. In one embodiment, a method includes the steps of capturing digital media content rendered on the local display by a media player application executed by the computer system; determining whether the media player application is accessing copy protected digital media content; and, if the media player application is not accessing copy protected digital media content, converting the captured digital media content to a media stream and transmitting the media stream over a network for presentation on a remote display. | 03-18-2010 |
20100100971 | SYSTEM FOR EMBEDDING DATA - A method and system including receiving marking information, determining, at least in part, based on the marking information, a plurality of color element additives, adding the plurality of color element additives to at least one color element of a video frame, wherein the at least one color element includes a color element R, a color element G, and a color element B. Related methods and systems are also described. | 04-22-2010 |
20100212028 | ANTI-PIRACY SOFTWARE PROTECTION SYSTEM AND METHOD - A method and system for protecting software products from unauthorized use and distribution is described. The system comprises a client process executed on a client computer coupled to a producer computer over a network. The method comprises the steps of providing to a user a copy of the distributed software, the distributed software comprising an incomplete executable program requiring a security module to be installed prior to execution on the client computer. The user receives a registration code for use with the distributed software. Upon attempted execution of the distributed software the producer computer requests user registration from the user. Upon receipt of the registration information including the registration code from the user, the producer computer validates the registration code and constructing a security module for transmission to the client computer. The security module is integrated with the distributed software to allow execution of the executable program. | 08-19-2010 |
20100275273 | SYSTEM AND METHOD FOR THE PREVENTION OF MALICIOUS FILE COPYING - A system and method for the prevention of malicious file copying detects a file copy operation indicative of copying a file to an electronic clipboard. If the file copy operation is detected, the computer reads file contents of the copied file, and scrambles the file contents. If a file paste operation indicative of the copied file being pasted to a designated file system path, the computer pastes the scrambled file to the designated file system path. File attributes of the scrambled file are the same as file attributes of the copied file. | 10-28-2010 |
20100281546 | DATA LOSS AND THEFT PROTECTION METHOD - Files stored on a non-removable storage device of a computer system are susceptible to being deleted and to theft. The present invention ensures that vital data files are not lost and that removable storage devices are not used to steal data. | 11-04-2010 |
20100306859 | SECURE MEDIA COPYING AND/OR PLAYBACK IN A USAGE PROTECTED FRAME-BASED WORK - A system and method of secure copy and/or playback control of a usage protected frame-based work is disclosed. The method includes accessing serial copy management system information for the usage protected frame-based work. In addition, the method validates the serial copy management system information. Copy management information of the usage protected frame-based work is also accessed. In so doing, the copy management information is utilized to determine if a secure copy/playback application is authorized to generate a copy of the usage protected frame-based work. Thus the copy management information acts as a technological measure which “effectively controls access to a work” by requiring the application of information, with the authority of the copyright owner, to gain access to the work. | 12-02-2010 |
20110067118 | METHOD AND SYSTEM FOR PROTECTING DATA, STORAGE DEVICE, AND STORAGE DEVICE CONTROLLER - A method and a system for protecting data, a storage device, and a storage device controller are provided. In the present method, when a host accesses data in the storage device, whether the host performs a play operation or a copy operation on the data is first determined. If the host performs the play operation on the data, the storage device continues to execute the play operation so as to allow the host to access the data. On the other hand, if the host performs the copy operation on the data, the storage device executes an interference procedure so as to prevent or retard the data from being copied into the host. | 03-17-2011 |
20110138487 | Storage Device and Method for Using a Virtual File in a Public Memory Area to Access a Plurality of Protected Files in a Private Memory Area - A storage device and method for using a virtual file in a public memory area to access a plurality of protected files in a private memory area are disclosed. In one embodiment, a storage device receives a request from a host for access to a virtual file in the public memory area, wherein the virtual file is associated with a plurality of protected files stored in the private memory area. The storage device responds to the request by selecting and providing the host with access to one of the plurality of protected files stored in the private memory area. The storage device receives an additional request from the host for access to the virtual file and responds to the additional request by selecting and providing the host with access to a different one of the plurality of protected files stored in the private memory area. | 06-09-2011 |
20110252484 | INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM - An information processing apparatus includes: a data processing unit which performs copy processing for recording recorded data of a first medium in a second medium, wherein the data processing unit performs processing for referencing copy restriction information received from a management server, comparing the copy restriction information with apparatus setting information set in a memory of the information processing apparatus, determining whether or not the copy processing is permitted in accordance with the comparison result, and copying recorded data of the first medium to the second medium under the condition it is determined that the copy processing is permitted. | 10-13-2011 |
20120023598 | BIOS USB WRITE PREVENT - A basic input output system (BIOS) ( | 01-26-2012 |
20120124679 | SYSTEM FOR IDENTIFYING CONTENT OF DIGITAL DATA - A computing system selects a portion of data of an unknown work and detects each event in the portion of data of the unknown work. An event is a perceptual occurrence in a work successively positioned in time. The system determines an event metric between each successive event in the portion of data in the unknown work and generates a list of event metrics between the events for the unknown work. The system compares the list of event metrics for the unknown work to a list of event metrics for a known work and determines the unknown work is a copy of the known work responsive to a match between the list of event metrics of the unknown work and the list of event metrics for the known work. | 05-17-2012 |
20120131686 | METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED REPRODUCTION OF ELECTRONIC MEDIA - A method for selectively controlling access to electronic media disposed on a media storage device according to one embodiment is described. The method comprises creating a first list comprising a plurality of process identification values. Each of the plurality of process identification values of the first list is associated with a software application that is accessing the media disposed upon the media storage device. The method further includes creating a second list comprising a second plurality of process identification values. Each of the second plurality of process identification values is associated with a software application that is storing data. The method further includes determining that a particular software application is creating an unauthorized copy of the media disposed upon the media storage device. The method further includes preventing the particular software application from storing a usable copy of said electronic media. | 05-24-2012 |
20120144503 | METHOD AND DEVICE FOR IDENTIFYING OBJECTS OR DOCUMENTS - The document identification method comprises: a step of marking the document with an anti-copy mark that is identical for a plurality of documents; a step of reading an anti-copy mark; a step of generating an identification mark that can vary from one document to another and according to the reading of the anti-copy mark and; a step of marking said document to form said identification mark on said document. In embodiments the method comprises, in addition, a step of printing a uniform area and the step of marking the document to form the identification mark comprises a step of emitting light with a laser in the uniform area. In embodiments the method comprises, in addition, a step of invisibly marking the identification mark on said document. | 06-07-2012 |
20120185953 | METHOD AND SYSTEM FOR DESIGNATING AND HANDLING CONFIDENTIAL MEMORY ALLOCATIONS - Embodiments of the present invention provide methods and systems for designating and handling confidential memory allocations of virtual memory. In particular, the operating system provides a memory allocation flag that applications may use to indicate any arbitrary area of physical memory marked with this flag may contain confidential data and should be handled accordingly. The operating system also ensures that memory allocated with this flag can be placed in physical memory. When freeing up memory, the operating system protects any data in the memory allocated with this flag. For example, the operating system may prevent the confidential memory from being swapped out to storage or from being accessible to other applications, such as debuggers. Alternatively, the operating system may encrypt any data in the confidential memory before it is swapped out to storage. | 07-19-2012 |
20120246744 | OPERATION CONTROL DEVICE, OPERATION CONTROL METHOD, LICENSE PROVISION SYSTEM, OPERATION CONTROL PROGRAM, AND RECORDING MEDIUM - A license server ( | 09-27-2012 |
20120317661 | TERMINAL DEVICE, SERVER DEVICE, CONTENT RECORDING CONTROL SYSTEM, RECORDING METHOD, AND RECORDING PERMISSION CONTROL METHOD - A terminal device recording content onto a recording medium device, a permission to record the content onto the recording medium device being granted by a server device, the terminal device comprising: a generation unit generating a value calculated so as to represent subject content for which permission to record is requested; an information transmission unit requesting the permission from the server device by transmitting information indicating the value generated by the generation unit to the server device; a signature reception unit receiving subject content signature data from the server device, the subject content signature data being transmitted by the server device upon granting the permission; and a recording unit recording the subject content onto the recording medium device as one of plain-text data and encrypted data, as well as the subject content signature data received by the signature reception unit. | 12-13-2012 |
20130067602 | Copyrights with Post-Payments for P2P File Sharing - In accordance with an embodiment, a method, apparatus or tangible computer medium (which stores computer executable code or program code) performs or facilitates: determining one or more aspects of an unauthorized copy of electronic content accessible to or through a user device; and conducting a transaction between the user device and a legitimizing party to legitimize the electronic content in view of the determined aspect(s). The electronic content may be unsecured copyrighted content. | 03-14-2013 |
20130179995 | SYSTEMS AND METHODS FOR AUTHENTICATION OF DIGITAL CONTENT - Systems and methods for authenticating a digital file are provided. The systems and methods may operate independently or supplement existing copy protection systems, such as CSS, and help make them more robust. The digital file may be stored on a computer readable medium such as a physical disc, digital content downloaded from the Internet, or any other suitable digital content. In some aspects, the systems and methods described herein include identifying media content stored in a digital file that needs to be authenticated, and subsequently reading suitably chosen media blocks in encrypted (and unencrypted) form from the digital file for comparison with corresponding blocks (e.g., stored in a database) obtained from a genuine copy. The digital file will be authenticated only in the case of a successful match. | 07-11-2013 |
20130227714 | SYSTEM AND METHOD FOR USING FILE HASHES TO TRACK DATA LEAKAGE AND DOCUMENT PROPAGATION IN A NETWORK - The system and method described herein may use file hashes to track data leakage and document propagation in a network. For example, file systems associated with known reference systems and various user devices may be compared to classify the user devices into various groups based on differences between the respective file systems, identify files unique to the various groups, and detect potential data leakage or document propagation if user devices classified in certain groups include any files that are unique to other groups. Additionally, various algorithms may track locations, movements, changes, and other events that relate to normal or typical activity in the network, which may be used to generate statistics that can be compared to subsequent activities that occur in the network to detect potentially anomalous activity that may represent potential data leakage or document propagation. | 08-29-2013 |
20130312119 | METHOD TO DETECT CLONED SOFTWARE - Method to detect a cloned software to be used on a client user unit communicating with a server for requesting a service by sending a request from the user unit to the server, the latter being connected to a database comprising client records, each of these records comprising at least a tag value (t | 11-21-2013 |
20130318635 | COPYRIGHT SECURITY FOR ELECTRONIC BOOKS - A computerized method for deterring unauthorized distribution of an electronic book comprising the steps of receiving a request to purchase the electronic book, receiving a set of personal identifiers from a user, receiving a set of publisher identifiers from a publisher of the electronic book, embedding both sets of identifiers into the electronic book, and displaying the electronic book with the embedded identifiers. | 11-28-2013 |
20140013453 | DUPLICATION JUDGMENT DEVICE AND DUPLICATION MANAGEMENT SYSTEM - Each recording medium device includes a memory and a controller having controller information allocated thereto. Each recording medium device has a medium identifier allocated thereto. A duplication judgment device | 01-09-2014 |
20140053285 | METHODS FOR DETECTING PLAGIARISM IN SOFTWARE CODE AND DEVICES THEREOF - A non-transitory computer readable medium, plagiarism detection device, and method which generate an abstract syntax tree from software code in an computer readable source file, the software code comprising at least one class; identifies one or more method invocations in the source file by means of the abstract syntax tree, and resolves each of the one or more method invocations in the at least one class by acquiring source code associated with each of the one or more invoked methods, where acquiring source code involves identifying at least one node of the abstract syntax tree with which the source code is associated and copying the source code therein and replacing the one or more method invocations in the source file with the copied source code. The source file may be compared with predetermined data, in some embodiments. | 02-20-2014 |
20140082755 | DETECTION AND HANDLING OF AGGREGATED ONLINE CONTENT USING DECISION CRITERIA TO COMPARE SIMILAR OR IDENTICAL CONTENT ITEMS - A computer-implemented method is presented herein. The method obtains a first content item from an online source, and then generates a characterizing signature of the first content item. The method continues by finding a previously-saved instance of the characterizing signature and retrieving data associated with a second content item (the second content item is characterized by the characterizing signature). The method continues by analyzing the data associated with the second content item, corresponding data associated with the first content item, and decision criteria. Thereafter, either the first content item or the second content item is identified as an original content item, based on the analyzing. The other content item can be flagged as an aggregated content item. | 03-20-2014 |
20140137272 | Limiting Information Leakage and Piracy due to Virtual Machine Cloning - Techniques for detecting a cloned virtual machine instance. A method includes transmitting an identifier associated a virtual machine from an agent embedded in the virtual machine akin to a malware to a detection entity in a network, determining whether the identifier is a unique identifier or whether the identifier is a clone of an identifier associated with a separate virtual machine in the network, and initiating at least one remedial action with the agent embedded in the virtual machine if the identifier is determined to be a clone of an identifier associated with a separate virtual machine in the network. | 05-15-2014 |
20140137273 | SYSTEM AND METHOD FOR SECURING THE UPLOAD OF FILES FROM A SYSTEM SERVER - Embodiments of the invention include a system and method to prevent a user from copying and storing files on a third party storage device or a user's personal computer. To do this, the system and method may perform a process of connecting the authorized user to the company's computer storage to access computer files for modification and, if the authorized user attempts to copy the file to the user's computer or a third party storage site, determining whether the file should be copied. To determine whether the file should be copied, the system may use inspection modules that inspect the data files to determine whether or not the user has been restricted from copying the data file. | 05-15-2014 |
20140157439 | METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO ENCODE AUXILARY DATA INTO RELATIONAL DATABASE KEYS AND METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO OBTAIN ENCODED DATA FROM RELATIONAL DATABASE KEYS - Methods, apparatus, and articles of manufacture to encode auxiliary data into relational database keys and methods, apparatus, and articles of manufacture to obtain encoded data from relational database keys are disclosed. An example method to encode auxiliary data into relational data includes generating a code comprising a plurality of groups and representative of auxiliary data, determining incremental values for the plurality of groups, generating a first key based on the code, and generating a subsequent key by modifying the first key based on the value of the first key and the incremental values. | 06-05-2014 |
20140157440 | METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO ENCODE AUXILIARY DATA INTO NUMERIC DATA AND METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO OBTAIN ENCODED DATA FROM NUMERIC DATA - Methods, apparatus, and articles of manufacture to encode auxiliary data into numeric data and methods, apparatus, and articles of manufacture to obtain encoded data from numeric data are disclosed. An example method to embed auxiliary information into numeric data includes assigning source data to one of a plurality of groups, the source data comprising a numeric value, identifying a symbol to be added to the source data based on an assigned group of the source data, and generating encoded data by selectively modifying the numeric value of the source data to be representative of the symbol. | 06-05-2014 |
20140157441 | METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO ENCODE AUXILARY DATA INTO TEXT DATA AND METHODS, APPARATUS, AND ARTICLES OF MANUFACTURE TO OBTAIN ENCODED DATA FROM TEXT DATA - Methods, apparatus, and articles of manufacture to encode auxiliary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data are disclosed. An example method to embed auxiliary data into text data includes selecting a portion of auxiliary data to be encoded into text data, mapping the portion of auxiliary data to a first set of one or more encoded characters representative of the portion of the auxiliary data, mapping a position of the portion of auxiliary data within the auxiliary data to a second set of one or more encoded characters representative of the portion of the auxiliary data, and generating encoded data by including the first set of encoded characters and the second set of encoded characters in the text data. | 06-05-2014 |
20140157442 | DEVICE AND METHODS FOR DETECTING A CAMERA - A camera detector device for detecting the presence of an illegal camera inside a room. A camera takes multiple pictures of a room and identifies reflections in each still image. If a reflection with similar properties appears repeatedly overtime than the reflection is identified as an illegal camera positioned towards the camera detector device. | 06-05-2014 |
20140165218 | Method and System for a Hosted Digital Music Library Sharing Service - A hosted web service is provided to enable the legitimate sharing and reselling digital music among subscribers to the web service by leveraging the teachings of the first sale doctrine of copyright law. By maintaining a single copy of properly purchased song within the system that can be only accessed by one subscriber at a time, the web service preserves the rights of the copyright holder of the digital music while encouraging a community sharing. | 06-12-2014 |
20140173763 | COUNTERFEIT PREVENTION FOR OPTICAL MEDIA - A method and system are provided for counterfeit prevention for optical media. In one example, a system is provided for verifying authenticity information on an optical medium. The system receives the optical medium including a fingerprint having at least one probabilistic feature. A probabilistic feature is a physical feature having both a substantial chance to be read as a first value and a substantial chance to be read as a second value. The system receives an o-DNA signature-at-issuance. The system calculates an o-DNA signature-at-verification by reading each probabilistic feature plural times. The system calculates a vector-of-differences between the o-DNA signature-at-issuance and the o-DNA signature-at-verification. The vector-of-differences includes a maximum distance metric between the o-DNA signature-at-issuance and the o-DNA signature-at-verification. The vector-of-differences indicates the optical medium is authentic if the maximum distance metric is less than a threshold. | 06-19-2014 |
20140208446 | REPORTING INFORMATION ABOUT USERS WHO OBTAIN COPYRIGHTED MEDIA USING A NETWORK IN AN UNAUTHORIZED MANNER - Methods and systems for reporting information about users who obtain copyrighted media illegally using a network are provided. A particular copyrighted media from a source of copyrighted media may be associated with a user's computer. Copyright fees have not been paid for the particular copyrighted media. Information about the user of the computer is reported. | 07-24-2014 |
20140215643 | SYSTEM FOR IDENTIFYING CONTENT OF DIGITAL DATA - A computing system selects a portion of data of an unknown work and detects each event in the portion of data of the unknown work. An event is a perceptual occurrence in a work successively positioned in time. The system determines an event metric between each successive event in the portion of data in the unknown work and generates a list of event metrics between the events for the unknown work. The system compares the list of event metrics for the unknown work to a list of event metrics for a known work and determines the unknown work is a copy of the known work responsive to a match between the list of event metrics of the unknown work and the list of event metrics for the known work. | 07-31-2014 |
20140289874 | INTEGRATED CIRCUIT (IC) CHIP AND METHOD OF VERIFYING DATA THEREOF - Provided are an IC chip and a method of verifying data thereof. The present invention verifies integrity of data by comparing an integrity verifying value generated from data using an integrity verifying value generating algorithm before a write operation for storing data in a storing unit is performed and an integrity verifying value generated from data stored in the storing unit using the integrity verifying value generating algorithm after the write operation is completed. According to the present invention, the present invention can confirm whether data stored in the IC chip is normally stored when manufacturing/issuing the IC chip and whether data stored in the IC chip is normally stored during the IC chip is used. | 09-25-2014 |
20150040248 | ENCRYPTION-RESISTANT WATERMARKING - A method and system for processing data is described, the method and system including encoding a string of symbols, each having a respective symbol value, as a sequence of vectors, each vector including a respective number of repetitions of a sub-vector of a predefined length, such that the respective number of the repetitions in each vector in the sequence is indicative of the respective symbol value of a corresponding symbol in the string, and applying a watermark to an item of content including digital data by inserting the sequence of the vectors into the data. Related methods, systems and apparatus are also described. | 02-05-2015 |
20150067895 | SECURITY DEVICE HAVING PHYSICAL UNCLONABLE FUNCTION - The inventive concept provides a security device capable of reducing an area of a die required for implementation of a stable PUF by increasing the value of entropy from a predefined number of entropy sources and/or minimizing a blind zone of a validity checking module. The security device uses an asynchronous configuration to minimize a blind zone. | 03-05-2015 |
20150074833 | DETERMINATION OF ORIGINALITY OF CONTENT - This disclosure relates, e.g., to governing distribution of content on a web-based service. One claim recites a system comprising: an input to receive a content object posted to a web-based service, for distribution by the web-based service to the public; a hardware processing unit configured for: determining fingerprint data from a received content object, and by reference to the determined fingerprint data, determining that the received content object includes content that at least partially matches controlled content, and identifying the controlled content; obtaining usage rule data relating to the controlled content, the usage rule data having earlier been established by an owner of the controlled content, wherein application of at least certain of the usage rule data is conditioned on an owner-specified extent of copying between the received content object and the controlled content; determining an extent of copying between the received content object and the controlled content; and governing distribution of the content object based on the usage rule data and on the determined extent of copying; and an interface through which different owners can specify different extent of copying requirements to govern distribution of their respective content. A great variety of other claims, features and arrangements are also detailed. | 03-12-2015 |
20150106958 | METHODS, SYSTEMS, AND DEVICES FOR MONITORING PRIVACY BEACONS RELATED TO ENTITIES DEPICTED IN IMAGES - Computationally implemented methods and systems include monitoring a deployment of a privacy beacon associated with an entity, said privacy beacon configured to facilitate acquisition of one or more terms of service associated with said entity, and storing a record of the deployment of the privacy beacon associated with the entity, wherein said record is configured to be transmitted upon a particular request from a requestor entity. In addition to the foregoing, other aspects are described in the claims, drawings, and text. | 04-16-2015 |
20150121556 | INDUSTRIAL EQUIPMENT MANAGEMENT SYSTEM, INDUSTRIAL EQUIPMENT MANAGEMENT SERVER, INDUSTRIAL EQUIPMENT MANAGEMENT METHOD, AND INFORMATION STORAGE MEDIUM - An individual area controller of an industrial equipment management system controls access to an individual area which is a storage area that is associated with an individual ID on a server, based on the individual ID. A group area controller controls access to a group area which is a storage area that is associated with a group ID on a server, based on the individual ID that belongs to the group ID. A copy restrictor restricts copying of equipment information about an industrial equipment that is stored in the group area to the individual area. | 04-30-2015 |
20150294094 | SYSTEM AND METHOD FOR MULTIMEDIA CONTENT PROTECTION ON CLOUD INFRASTRUCTURES - A system and method for multimedia content protection on elastic cloud infrastructures is presented. The system can be used to protect various multi-media contents, including regular 2D videos, new 3D videos, animated graphics, images, audios clips, songs, and music clips. The system can run on private clouds, public clouds, or any combination of public-private clouds. The system is scalable and cost effective. | 10-15-2015 |
20150302886 | DETERMINATION OF ORIGINALITY OF CONTENT - Making a determination of originality of content is disclosed. At least one originality factor related to the content is analyzed, wherein the originality factor is independent of a time when the content is detected. Based on the analysis of the at least one originality factor, automatically the determination is automatically made. The determination is outputted. | 10-22-2015 |
20160132664 | SYSTEM FOR IDENTIFYING CONTENT OF DIGITAL DATA - A processor receives a first list comprising a plurality of events from a portion of digital data of an unknown work and one or more metrics between each pair of adjacent events from the plurality of events. The processor compares the first list to a second list comprising events and metrics between events for a known work to determine a first quantity of hits and a second quantity of misses. The processor determines whether the first list matches the second list based on the first quantity of hits and the second quantity of misses. The processor determines that the unknown work is a copy of the known work responsive to determining that the first list matches the second list. | 05-12-2016 |
20160253769 | Method of preserving secrecy during source code comparison | 09-01-2016 |