Copy Detection Patents (Class 726/32)
-
Publication number: 20140157441Abstract: Methods, apparatus, and articles of manufacture to encode auxiliary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data are disclosed. An example method to embed auxiliary data into text data includes selecting a portion of auxiliary data to be encoded into text data, mapping the portion of auxiliary data to a first set of one or more encoded characters representative of the portion of the auxiliary data, mapping a position of the portion of auxiliary data within the auxiliary data to a second set of one or more encoded characters representative of the portion of the auxiliary data, and generating encoded data by including the first set of encoded characters and the second set of encoded characters in the text data.Type: ApplicationFiled: November 30, 2012Publication date: June 5, 2014Inventors: Nikolay Georgiev, Leonid Ayzenshtat
-
Publication number: 20140157439Abstract: Methods, apparatus, and articles of manufacture to encode auxiliary data into relational database keys and methods, apparatus, and articles of manufacture to obtain encoded data from relational database keys are disclosed. An example method to encode auxiliary data into relational data includes generating a code comprising a plurality of groups and representative of auxiliary data, determining incremental values for the plurality of groups, generating a first key based on the code, and generating a subsequent key by modifying the first key based on the value of the first key and the incremental values.Type: ApplicationFiled: November 30, 2012Publication date: June 5, 2014Inventors: Leonid Ayzenshtat, Nikolay Georgiev, Kalyanaraman Rajamani
-
Publication number: 20140157440Abstract: Methods, apparatus, and articles of manufacture to encode auxiliary data into numeric data and methods, apparatus, and articles of manufacture to obtain encoded data from numeric data are disclosed. An example method to embed auxiliary information into numeric data includes assigning source data to one of a plurality of groups, the source data comprising a numeric value, identifying a symbol to be added to the source data based on an assigned group of the source data, and generating encoded data by selectively modifying the numeric value of the source data to be representative of the symbol.Type: ApplicationFiled: November 30, 2012Publication date: June 5, 2014Inventors: Nikolay Georgiev, Leonid Ayzenshtat
-
Patent number: 8745399Abstract: A method for sharing and updating a key using a watermark is disclosed. The method includes receiving an image to be encoded from an image input device encoding the image, and inserting a master key value as a watermark into the encoded image, for use as an input of a key derivation function.Type: GrantFiled: May 25, 2010Date of Patent: June 3, 2014Assignee: Electronics and Telecommunications Research InstituteInventors: Jin Hee Han, Young Sae Kim, Geon Woo Kim, Hong Il Ju, Su Gil Choi
-
Patent number: 8745696Abstract: There are provided an apparatus and a method for privacy protection in association rule mining among data mining technologies. An apparatus for privacy protection in association rule mining according to an embodiment of the present invention comprises: a fake transaction inserter that generates fake transactions of a predetermined number each having a predetermined length and inserts the fake transactions between a plurality of transactions comprised in an original data set to generate a first virtual data set; and a distortion transaction generator that generates a second virtual data set by converting data of the transaction of the first virtual data set with a predetermined probability.Type: GrantFiled: December 15, 2010Date of Patent: June 3, 2014Assignee: Electronics and Telecommunications Research InstituteInventors: Nam-Su Jho, Abedelaziz Mohaisen, Do-Won Hong
-
Patent number: 8745760Abstract: Devices, methods and instructions encoded on computer readable medium are provided herein for implementation of classification techniques in order to determine if an unknown executable file is malware. In accordance with one example method, an unknown executable file comprising a sequence of operation codes (opcodes) is received. Based on the operation codes of the unknown executable, a subset of executable files in a training set is identified in which each of the files in the subset have the same beginning sequence of operation codes as the unknown executable. After the subset is identified, a feature set extracted from the unknown executable file is compared to one or more feature sets extracted from each of executable files in the identified subset. A determination is made, based on the feature set comparison, whether the unknown executable file is malware.Type: GrantFiled: January 30, 2012Date of Patent: June 3, 2014Assignee: Cisco Technology, Inc.Inventor: Steven Robert Poulson
-
Patent number: 8739308Abstract: Systems and methods for authentication generate keys from secret credentials shared between authenticating parties and authenticators. Generation of the keys may involve utilizing specialized information in the form of parameters that are used to specialize keys. Keys and/or information derived from keys held by multiple authorities may be used to generate other keys such that signatures requiring such keys and/or information can be verified without access to the keys. Keys may also be derived to form a hierarchy of keys that are distributed such that a key holder's ability to decrypt data depends on the key's position in the hierarchy relative to the position of a key used to encrypt the data. Key hierarchies may also be used to distribute key sets to content processing devices to enable the devices to decrypt content such that sources or potential sources of unauthorized content are identifiable from the decrypted content.Type: GrantFiled: March 27, 2012Date of Patent: May 27, 2014Assignee: Amazon Technologies, Inc.Inventors: Gregory B. Roth, Marc R. Barbour, Bradley Jeffery Behm, Cristian M. Ilac, Eric Jason Brandwine
-
Patent number: 8732468Abstract: Techniques are able to lock and unlock and integrated circuit (IC) based device by encrypting/decrypting a bus on the device. The bus may be a system bus for the IC, a bus within the IC, or an external input/output bus. A shared secret protocol is used between an IC designer and a fabrication facility building the IC. The IC at the fabrication facility scrambles the bus on the IC using an encryption key generated from unique identification data received from the IC designer. With the IC bus locked by the encryption key, only the IC designer may be able to determine and communicate the appropriate activation key required to unlock (e.g., unscramble) the bus and thus make the integrated circuit usable.Type: GrantFiled: March 9, 2010Date of Patent: May 20, 2014Assignees: The Regents of the University of Michigan, William Marsh Rice UniversityInventors: Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
-
Patent number: 8732858Abstract: A computing system selects a portion of data of an unknown work and detects each event in the portion of data of the unknown work. An event is a perceptual occurrence in a work successively positioned in time. The system determines an event metric between each successive event in the portion of data in the unknown work and generates a list of event metrics between the events for the unknown work. The system compares the list of event metrics for the unknown work to a list of event metrics for a known work and determines the unknown work is a copy of the known work responsive to a match between the list of event metrics of the unknown work and the list of event metrics for the known work.Type: GrantFiled: January 20, 2012Date of Patent: May 20, 2014Assignee: Audible Magic CorporationInventor: Erling Wold
-
Patent number: 8732854Abstract: Apparatus and methods for protected content access, browsing and transfer over a network. In one embodiment, the network comprises a premises (e.g., residential) LAN, and the apparatus comprises a server and renderer consumer premise equipment (CPE). The renderer CPE scans the network to search for a server CPE that implement a compatible security framework. The renderer authenticates itself with the server, and the server allows content browsing and selection access only to an authorized and authenticated renderer. A negotiation and exchange protocol comprises messages exchanged between the renderer and the server that include one or more of device identification, encryption key exchange, digital certificates and information regarding security package used by each CPE.Type: GrantFiled: November 1, 2006Date of Patent: May 20, 2014Assignee: Time Warner Cable Enterprises LLCInventors: Chris Cholas, William L. Helms, John B. Carlucci, Jeffrey P. Markley
-
Publication number: 20140137272Abstract: Techniques for detecting a cloned virtual machine instance. A method includes transmitting an identifier associated a virtual machine from an agent embedded in the virtual machine akin to a malware to a detection entity in a network, determining whether the identifier is a unique identifier or whether the identifier is a clone of an identifier associated with a separate virtual machine in the network, and initiating at least one remedial action with the agent embedded in the virtual machine if the identifier is determined to be a clone of an identifier associated with a separate virtual machine in the network.Type: ApplicationFiled: November 9, 2012Publication date: May 15, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Salman A. Baset, Ashish Kundu, Sambit Sahu
-
Publication number: 20140137273Abstract: Embodiments of the invention include a system and method to prevent a user from copying and storing files on a third party storage device or a user's personal computer. To do this, the system and method may perform a process of connecting the authorized user to the company's computer storage to access computer files for modification and, if the authorized user attempts to copy the file to the user's computer or a third party storage site, determining whether the file should be copied. To determine whether the file should be copied, the system may use inspection modules that inspect the data files to determine whether or not the user has been restricted from copying the data file.Type: ApplicationFiled: November 13, 2012Publication date: May 15, 2014Applicant: APPSENSE LIMITEDInventor: Antony WORKMAN
-
Patent number: 8726005Abstract: A website fingerprint is generated that characterizes network traffic associated with a website as a website traffic fingerprint that includes size description(s), order description(s), and timing description(s) of packet traffic for the website. A website monitor generates website trace(s) of packet statistics. A correlation processor correlates a sequence of packet statistics from the website trace(s) with the size description, the order description, and timing description found in the website traffic fingerprint(s).Type: GrantFiled: December 10, 2010Date of Patent: May 13, 2014Assignee: George Mason Intellectual Properties, Inc.Inventors: Angelos Stavrou, Mohammed A. Alhussein, Brian Sanders
-
Patent number: 8719956Abstract: A method and an apparatus for moving a license between SRMs. A DRM agent obtains the license from a first SRM, and sets the license to a forwarding state locally; the DRM agent deducts one permission of moving the license; and the DRM agent sends the license to a second SRM.Type: GrantFiled: December 19, 2012Date of Patent: May 6, 2014Assignee: Huawei Technologies Co., Ltd.Inventors: Chen Huang, Renzhou Zhang, Zhipeng Zhou, Weizhong Yuan
-
Patent number: 8719528Abstract: A storage device in which file data is divided into multiple blocks for storage on a recording medium is provided. The storage device includes an additional data storing section for storing additional data to be recorded on the recording medium in association with the data to be written, a position determining section for determining recording positions on the recording medium where the blocks should be respectively written, based on the additional data, and a block writing section for writing the respective blocks on the recording positions on the recording medium determined by the recording position determining section. The additional data this defines a gap length between blocks of recorded data. During a read operation, if the gap length does not comport with the additional data, then an error is assumed.Type: GrantFiled: July 9, 2013Date of Patent: May 6, 2014Assignee: International Business Machines CorporationInventors: Tomoaki Kimura, Satoshi Tohji
-
Patent number: 8713708Abstract: Techniques for controlling the use of data stored on a media or integrated circuit sample are provided. A sample identifier is created at the point of sample use. The type of sample could range from storage media, such as a Digital Video Disc, or DVD, on which, for example, data representing a motion picture is recorded, to an integrated circuit in which computer code is stored. The sample identifier is stored at a location that is different from where the data is to be employed, and compared with other sample identifiers. The use of the data is controlled based on the results of the comparison.Type: GrantFiled: March 3, 2009Date of Patent: April 29, 2014Assignee: CSR Technology Inc.Inventor: Paul R. Goldberg
-
Patent number: 8712048Abstract: There are provided an information recording medium, an information processing apparatus, an information processing method, and a computer program, which can realize users' convenience for using content in accordance with a license and copyright protection. An information recording medium stores an encrypted content file including encrypted content, usage right information of the encrypted content, and encryption key information necessary for a decrypting process for the encrypted content. Thus, a user can acquire a license (usage right information) and key information necessary for decryption of the content, together with the content, from the information recording medium, without acquiring the license (usage rights) by connection to a license provider.Type: GrantFiled: May 21, 2010Date of Patent: April 29, 2014Assignee: Sony CorporationInventors: Tsuyoshi Nakayama, Chikako Mori, Yoshimichi Kitaya, Yoshikazu Kouno
-
Patent number: 8713709Abstract: A computer program product for secure key management is provided. The computer program product includes a tangible storage medium readable by a processing circuit and storing instructions for execution by the processing circuit for performing a method. The method includes creating a token and populating the token with key material, and binding key control information to the key material. The key control information includes information relating to management of the key material populating one or more key management fields that define attributes that limit distribution of the key material.Type: GrantFiled: October 17, 2012Date of Patent: April 29, 2014Assignee: International Business Machines CorporationInventors: Todd W. Arnold, Elizabeth A. Dames, Carsten D. Frehr, Michael J. Kelly, Kenneth B. Kerr, Richard V. Kisley, Eric D. Rossman, Eric B. Smith
-
Patent number: 8707459Abstract: Making a determination of originality of content is disclosed. At least one originality factor related to the content is analyzed, wherein the originality factor is independent of a time when the content is detected. Based on the analysis of the at least one originality factor, automatically the determination is automatically made. The determination is outputted.Type: GrantFiled: January 19, 2007Date of Patent: April 22, 2014Assignee: Digimarc CorporationInventors: James L. Brock, James E. Pitkow
-
Patent number: 8700991Abstract: A method and system for protecting content presented in a web browser is provided. The method may include modifying a content item to obfuscate content, and then causing obfuscation to be dynamically removed when the content item is presented in the web browser.Type: GrantFiled: July 19, 2011Date of Patent: April 15, 2014Assignee: Amazon Technologies, Inc.Inventors: Samuel S. Gigliotti, Ryan J. Snodgrass, Charles P. Vaughn, Noah L. Callaway
-
Patent number: 8690049Abstract: The present invention is related to a method for generating an image file for forgery verification and a method for forgery verification. A method for generating an image file for forgery verification according to the present invention consists of a generating a bit map of the image file, a generating a horizontal check logic, a vertical check logic, and a check logic of each region from the bit map, a generating a two-dimensional bar code from the horizontal check logic, the vertical check logic, and the check logic of each region, and a generating an image file for forgery verification into which the two-dimensional bar code is inserted.Type: GrantFiled: April 1, 2010Date of Patent: April 8, 2014Assignee: Digitalzone Co., Ltd.Inventor: Chang Hun Yoo
-
Patent number: 8689346Abstract: An authentication system and method is presented for authenticating a first party to a second party, where an operation is performed on condition that the authentication succeeds. The authentication method verifies whether the first party is authenticated. If the first party is not authenticated, then it is determined if the first party qualifies for a sub-authorization. The sub-authorization depends on a value of a grace-counter associated with a number of times that first parties have been qualified for the sub-authorization. If the first party qualifies for the sub-authorization, the operation is performed and the grace counter is decremented. If the first party is authenticated, then the grace counter is set to a predetermined number.Type: GrantFiled: May 30, 2005Date of Patent: April 1, 2014Assignee: Koninklijke Philips N.V.Inventors: Maurice Jerome Justin Jean-Baptiste Maes, Boris Skoric, Antonius Adriaan Maria Staring, Johan Cornelis Talstra
-
Publication number: 20140082755Abstract: A computer-implemented method is presented herein. The method obtains a first content item from an online source, and then generates a characterizing signature of the first content item. The method continues by finding a previously-saved instance of the characterizing signature and retrieving data associated with a second content item (the second content item is characterized by the characterizing signature). The method continues by analyzing the data associated with the second content item, corresponding data associated with the first content item, and decision criteria. Thereafter, either the first content item or the second content item is identified as an original content item, based on the analyzing. The other content item can be flagged as an aggregated content item.Type: ApplicationFiled: September 9, 2013Publication date: March 20, 2014Applicant: salesforce.com, inc.Inventor: Dai Duong Doan
-
Patent number: 8677149Abstract: A system and method for modifying material related to computer software. The system receives an original disclosure for a software system. A masquerading algorithm is applied to the original disclosure to generate a new disclosure. The subject matter of the new disclosure is different from the original disclosure but has the same functionality. The system also receives original source code for the software system and applies a camouflaging algorithm to the original source code to generate modified source code and conversion data for converting between the modified source code and the original source code.Type: GrantFiled: December 12, 2011Date of Patent: March 18, 2014Assignee: C3S Pte. Ltd.Inventors: Ta Chun Yun, Viet Thang Nguyen
-
Patent number: 8667609Abstract: Various embodiments of the present invention generally relate to trademark searching and notification systems. More specifically, various embodiments of the present invention relate to systems and methods for informing requesters about trademarks similar to a provided input. Some embodiments of the present invention provide for a proactive system in which users are notified of similar trademarks before using specific term(s) and users proceed after understanding which trademarks actually exist and what areas those trademarks actually entail, and possibly being notified of newly applied trademarks and modified trademarks at later times that are similar to the specific term(s) being used.Type: GrantFiled: March 14, 2013Date of Patent: March 4, 2014Assignee: Sky Castle Global LimitedInventors: Edwin Tan, Michael E St. John, Jr.
-
Patent number: 8667598Abstract: When a viewer views content, it is reproduced by a reproduction procedure depending on a dynamic condition set in the content. Here, a content object data input unit obtains an externally-input content object. The content object is stored in a content object data retention unit, if necessary. The content object includes a reproduction rule and a content data. A reproduction rule evaluation and execution unit obtains the reproduction rule in the content object and performs processing in accordance with the reproduction rule. The reproduction unit reproduces a reproducible data specified by the reproduction rule evaluation and execution unit. An identifier management unit retains an identifier of a content object reproduction device and provides the identifier upon request. It is thus possible to reproduce in accordance with the reproduction rule set in the content object data and to control the reproduction procedure depending on the dynamic condition.Type: GrantFiled: March 3, 2008Date of Patent: March 4, 2014Assignee: NEC CorporationInventors: Takao Takenouchi, Takeaki Minamizawa, Naoko Ito
-
Patent number: 8661430Abstract: A device and a portable storage device which are capable of transferring a rights object (RO) and a method of transferring an RO are provided. The method includes enabling a device to transmit an installation request message to a portable storage device for installing a copy of an original RO present in the device in the portable storage device, enabling the device to install the copy of the original RO in the portable storage device, and enabling the device to receive an installation response message indicating that the copy of the original RO has been successfully installed in the portable storage device from the portable storage device.Type: GrantFiled: November 29, 2007Date of Patent: February 25, 2014Assignee: Samsung Electronics Co., Ltd.Inventors: Yun-Sang Oh, Sang-Gyoo Sim, Yeo-Jin Kim
-
Publication number: 20140053285Abstract: A non-transitory computer readable medium, plagiarism detection device, and method which generate an abstract syntax tree from software code in an computer readable source file, the software code comprising at least one class; identifies one or more method invocations in the source file by means of the abstract syntax tree, and resolves each of the one or more method invocations in the at least one class by acquiring source code associated with each of the one or more invoked methods, where acquiring source code involves identifying at least one node of the abstract syntax tree with which the source code is associated and copying the source code therein and replacing the one or more method invocations in the source file with the copied source code. The source file may be compared with predetermined data, in some embodiments.Type: ApplicationFiled: August 9, 2013Publication date: February 20, 2014Applicant: Infosys LimitedInventors: Allahbaksh M. Asadullah, Srinivas Padmanabhuni, Basava Raju Muddu, Vasudev Damodar Bhat
-
Patent number: 8656183Abstract: Federated systems for issuing playback certifications granting access to technically protected content are described. One embodiment of the system includes a registration server connected to a network, a content server connected to the network and to a trusted system, a first device including a non-volatile memory that is connected to the network and a second device including a non-volatile memory that is connected to the network. In addition, the registration server is configured to provide the first device with a first set of activation information in a first format, the first device is configured to store the first set of activation information in non-volatile memory, the registration server is configured to provide the second device with a second set of activation information in a second format, and the second device is configured to store the second set of activation information in non-volatile memory.Type: GrantFiled: June 5, 2012Date of Patent: February 18, 2014Assignee: Sonic IP, Inc.Inventors: Eric William Grab, Chris Russell, Francis Yee-Dug Chan, Michael George Kiefer
-
Patent number: 8656461Abstract: Various embodiments are disclosed relating to performing a trusted copy and paste operations between a source application and a target application. For example, a trust system may receive a paste request for pasting copied source content, and may compare a source trust level associated with the source content to a target trust level associated with a target application. In this way, for example, harmful or disruptive code may be prevented from being pasted into the target application.Type: GrantFiled: July 28, 2006Date of Patent: February 18, 2014Assignee: Microsoft CorporationInventors: Akhilesh Kaza, Benjamin M. Westbrook, Jeffrey M. Cooperstein, Karen E. Corby, Mark A. Alcazar
-
Patent number: 8646102Abstract: One embodiment of the present invention provides a system that facilitates issuing rights in a digital rights management system. The system operates by sending a request to perform an operation on an item of content from a client to a rights-management server, wherein the request includes a usage parameter which specifies constraints involved in performing the operation. Next, the system receives a response from the rights-management server, wherein the response indicates whether or not the client has rights to perform the operation in accordance with the constraints specified by the usage parameter. Note that the response may also include a hint that facilitates generating subsequent requests to perform the operation. Finally, if the client has rights to perform the operation, the system performs the operation on the item of content.Type: GrantFiled: September 15, 2006Date of Patent: February 4, 2014Assignee: Oracle America, Inc.Inventors: Gerard M. Fernando, Viswanathan Swaminathan, Thomas W. Jacobs, William J. Keenan
-
Patent number: 8646042Abstract: A hybrid device includes a personal digital key (PDK) and a receiver-decoder circuit (RDC). In one embodiment, the hybrid device also provides a physical interconnect for connecting to other devices to send and receive control signals and data, and receive power. The hybrid device operates in one of several modes including, PDK only, RDC only, or PDK and RDC. This allows a variety of system configurations for mixed operation including: PDK/RDC, RDC/RDC or PDK/PDK. The disclosure also includes a number of system configurations for use of the hybrid device including: use of the hybrid device in a cell phone; simultaneous use of the PDK and the RDC functionality of hybrid device; use of multiple links of hybrid device to generate an authorization signal, use of multiple PDK links to the hybrid device to generate an authorization signal; and use of the hybrid device for authorization inheritance.Type: GrantFiled: April 12, 2012Date of Patent: February 4, 2014Assignee: Proxense, LLCInventor: David L. Brown
-
Patent number: 8640193Abstract: An image processing apparatus for providing at least a service to a service requester receives a service execution request and authentication information of a service requester from the service requester and issues a request for authenticating the service requester to an authentication service. Also, the image processing apparatus executes the requested service based on an authentication result transmitted from the authentication service. Further, the image processing apparatus manages an execution state of the executed service and an authentication state of the service requestor by associating the execution state with the authentication state.Type: GrantFiled: December 20, 2005Date of Patent: January 28, 2014Assignee: Canon Kabushiki KaishaInventor: Nobuyuki Shigeeda
-
Patent number: 8631250Abstract: Designating and handling confidential memory allocations of virtual memory. An operating system provides a memory allocation flag that applications may use to indicate any arbitrary area of physical memory marked with this flag may contain confidential data and should be handled accordingly. The operating system also ensures that memory allocated with this flag can be placed in physical memory. When freeing up memory, the operating system protects any data in the memory allocated with this flag. For example, the operating system may prevent the confidential memory from being swapped out to storage or from being accessible to other applications, such as debuggers. Alternatively, the operating system may encrypt any data in the confidential memory before it is swapped out to storage.Type: GrantFiled: March 28, 2012Date of Patent: January 14, 2014Assignee: Red Hat, Inc.Inventors: Henri Han Van Riel, Alan Cox
-
Publication number: 20140013453Abstract: Each recording medium device includes a memory and a controller having controller information allocated thereto. Each recording medium device has a medium identifier allocated thereto. A duplication judgment device 500c comprises: an acquisition unit 521c acquiring first and second medium identifiers and first and second controller information of first and second recording medium devices; a judgment unit 522c judging whether the first medium identifier matches the second medium identifier, and whether the first controller information matches the second controller information; and an output unit 523c outputting duplication information indicating that the first medium identifier and the second medium identifier are duplicates, when the first medium identifier matches the second medium identifier and the first controller information does not match the second controller information.Type: ApplicationFiled: May 10, 2012Publication date: January 9, 2014Inventors: Yuichi Futa, Takahiro Yamaguchi, Masaya Yamamoto
-
Patent number: 8627509Abstract: A method for processing media files includes receiving a request to download a first media file and, in response to receiving the request, generating a first signature that describes a first characteristic of the first media file. The method also includes determining whether the first signature matches any of a first plurality of stored signatures. The method also includes generating a second signature that describes a second characteristic of the first media file in response to determining that the first signature matches one of the first plurality of stored signatures. Additionally the method includes determining whether the second signature matches any of a second plurality of stored signatures and, in response to determining that the second signature matches one or more of the second plurality of stored signatures, denying the request to download the first media file.Type: GrantFiled: July 2, 2007Date of Patent: January 7, 2014Assignee: RGB Networks, Inc.Inventors: Richard G. Washingon, Clifford L. Hall, III
-
Patent number: 8619981Abstract: Arbitrary numerical distributions are presented for use in devices having limited processing and storage capabilities by having the device accept strings of arbitrarily distributed numbers from a source outside of the device. In one embodiment, a master controller creates a table of values which follow the desired minimum, maximum, mean, and standard deviation, etc. of the particular desired statistical distribution required. The created table is then communicated to the limited capacity device and can be used whenever a distribution of random values is required. The master controller could have one of several slave devices associated with it in the system. In another embodiment, where the storage capability of the device is large enough to store a table of values with sufficient different entries to create a distribution of satisfactory “randomness” for the particular application, a random number generator within the device is used to select the order of presentation of the table of values.Type: GrantFiled: May 12, 2005Date of Patent: December 31, 2013Assignee: JDS Uniphase CorporationInventors: Slawomir K. Ilnicki, Valery Kanevsky, Martin Curran-Gray
-
Patent number: 8620818Abstract: Techniques are described for generating a license for software installed on a device. An entitlement certificate is generated including one or more entitlements describing license characteristics of the software. The one or more entitlements are determined in accordance with first information about the software. The first information includes at least one of a purchase token and package information. A binding certificate in accordance with a binding type for the software is generated. A license in accordance with said binding certificate and said entitlement certificate is generated. The binding certificate identifies an entity to which the license is bound.Type: GrantFiled: June 25, 2007Date of Patent: December 31, 2013Assignee: Microsoft CorporationInventors: Aidan T. Hughes, Alexander V. Baxter, Mark Kenworthy, Alexander Frank, Oliver Szimmetat
-
Patent number: 8613110Abstract: A system and method for preventing piracy of a given software application limits the number of times that such software application is activated. A given software application must be activated in order to become fully functional. The user must provide a unique software identification code, relating to the specific software which the user is attempting to activate, to a remote provider. The remote provider determines the number of times that such specific software has already been activated, and provides an activation code to the user unless the number of activations exceeds a predetermined threshold. Once activated, the software becomes fully operational, and the user is allowed complete access to its functions.Type: GrantFiled: April 19, 2012Date of Patent: December 17, 2013Assignee: Uniloc Luxembourg S.A.Inventor: Reuben Bahar
-
Patent number: 8607052Abstract: The management apparatus 105a manages copying of information from an original recording medium 101a to a copy recording medium 102a. The management apparatus 105a comprises: a transmission/reception unit 701a configured to receive an original-medium identifier from the copying apparatus 104a and to transmit permission information to the copying apparatus 104a, the original-medium identifier identifying the original recording medium, and the permission information indicating permission for the copying of the information; and a control unit 708a configured to determine whether to permit the copying of the information based on the received original-medium identifier and a registered original-medium identifier that identifies a registered original recording medium, and to allow the transmission/reception unit 701a to transmit the permission information when determining to permit the copying.Type: GrantFiled: February 23, 2011Date of Patent: December 10, 2013Assignee: Panasonic CorporationInventors: Toshihisa Nakano, Masataka Minami, Masaya Yamamoto, Takahiro Yamaguchi, Kaoru Murase
-
Patent number: 8601503Abstract: A system and method is disclosed for detecting distribution of multimedia content. The volume level of data traffic is monitored for a plurality of users to select any users with high-bandwidth usage. The time of day and the day of the week may be considered when determining whether a user is a high-bandwidth user. Upon selecting a user as one with high-bandwidth usage, such user may be subject to packet inspections of data traffic streams. In some embodiments, content identification parameters or watermarks are added to one or more packets in a data traffic stream carrying multimedia content.Type: GrantFiled: November 30, 2012Date of Patent: December 3, 2013Assignee: AT&T Intellectual Property I, L.P.Inventors: Zhi Li, Dipak Ghosal, Canhui Ou, Raghvendra Savoor
-
Patent number: 8601590Abstract: A content distribution system for transferring contents between transmission device and reception device. The transmission device includes: key obtaining unit that obtains, from reception device, public keys and public key identifiers; watermark embedding unit that embeds a different public key identifier, as electronic watermark, into each of contents that are identical in substance; an encryption unit that encrypts contents using public keys to generate encrypted contents; and transmission unit that transmits encrypted contents to reception device. The reception device includes: key storage unit storing public keys, public key identifiers, and a private key that makes a pair with one of the public keys; key transmission unit that transmits public keys and public key identifiers to the transmission device; content receiving unit that receives encrypted contents from transmission device; and decryption unit that obtains a content from the received encrypted contents, using the private key.Type: GrantFiled: April 26, 2007Date of Patent: December 3, 2013Assignee: Panasonic CorporationInventors: Toshihisa Nakano, Masao Nonaka, Yuichi Futa, Motoji Ohmori, Ryo Nojima, Kazukuni Kobara, Hideki Imai
-
Publication number: 20130318635Abstract: A computerized method for deterring unauthorized distribution of an electronic book comprising the steps of receiving a request to purchase the electronic book, receiving a set of personal identifiers from a user, receiving a set of publisher identifiers from a publisher of the electronic book, embedding both sets of identifiers into the electronic book, and displaying the electronic book with the embedded identifiers.Type: ApplicationFiled: May 25, 2012Publication date: November 28, 2013Applicant: eCHRTISTIAN, INC.Inventor: Cory Verner
-
Publication number: 20130312119Abstract: Method to detect a cloned software to be used on a client user unit communicating with a server for requesting a service by sending a request from the user unit to the server, the latter being connected to a database comprising client records, each of these records comprising at least a tag value (tc) as history of client requests, said method comprising an initialization phase and a operating phase, a) the initialization phase comprising the steps of: defining said tag value (tc) as being equal to an initial random value, then opening a new record storing said tag value (tc) in the database and introducing said tag value into the client user unit, b) the operating phase comprising the steps of: preparing, on the user unit side, a client message for the server comprising said request and a value depending on said tag value (tc), then sending this client message, from the user unit to the server, then checking, on the server side, an access condition by checking if the tag value (tc) of said client message isType: ApplicationFiled: November 15, 2011Publication date: November 21, 2013Applicant: NAGRAVISION S.A.Inventors: Jean-Bernard Fischer, Patrik Marcacci, Christian Schwarz, Brecht Wyseur
-
Patent number: 8590055Abstract: A digital content protection apparatus and method for digital rights management (DRM) are provided in which a content file including a plurality of content parts is imported such that a header is included which stores location information required for decoding each of the content parts. Therefore, the number of content parts constituting the content file can be recognized, and a license that is required for the use of each of the content parts can be acquired by analyzing header information without necessitating the parsing of the transport packets of the content file. Accordingly, preparation time for using content can be reduced.Type: GrantFiled: April 24, 2007Date of Patent: November 19, 2013Assignee: Samsung Electronics Co., Ltd.Inventors: Young-sun Yoon, Bong-seon Kim
-
Patent number: 8584253Abstract: Access to content may be administered by storing content, the content comprising one or more selections, accessing a passive optical out-of-band token associated with the content, determining an access right for the content based on the passive optical out-of-band token, and enabling access to the content in accordance with the access right.Type: GrantFiled: August 29, 2011Date of Patent: November 12, 2013Assignee: Time Warner Inc.Inventors: Steven M. Blumenfeld, William J. Raduchel
-
Patent number: 8583941Abstract: A computer checking tool that can repeatedly process a plurality of data sets including data distributed according to a statistical rule may include an estimator that can establish, for a data set, a value characterizing the reproduction of a criterion concerning the data contained therein. The tool may also include a driver that calls the estimator with a plurality of data sets in order to determine a plurality of values, establish a new plurality of sets from the plurality of values, and repeat the estimator call with a new previously established plurality of sets until a condition is verified that involves an extremum of the plurality of values and/or number of repetitions. In addition, the tool may include a mixer that establishes a new set of data on the basis of an existing data set while maintaining the distribution according to the statistical rule.Type: GrantFiled: July 10, 2009Date of Patent: November 12, 2013Assignee: Inria Institut National de Recherche en Informatique et en AutomatiqueInventors: Frederic Cerou, Teddy Furon, Arnaud Guyader
-
Patent number: 8583559Abstract: An application program or an extended application program is installed that extends the functionality of this application program. If the application program is installed, a license file used in this application program is stored in a storage unit. If the extended application is installed, then control is executed so as to install the extended application using the license file stored in the storage unit and used in installing the application program corresponding to the extended application program.Type: GrantFiled: June 15, 2010Date of Patent: November 12, 2013Assignee: Canon Kabushiki KaishaInventor: Kousuke Nakashima
-
Patent number: 8584260Abstract: A storage medium includes an ID registration area for storing therein a main body ID which is an ID unique to an information processing apparatus. The information processing apparatus has the main body ID stored therein. The information processing apparatus includes copying means for, when the storage medium is attached thereto, copying a program stored in the storage medium thereinto in the case where the main body ID has not yet been registered. When the copy is made, the main body ID is stored into the ID registration area of the storage medium. The information processing apparatus also includes execution program selecting means for selecting, from the copied program and from the program stored in the storage medium, a program to be executed.Type: GrantFiled: June 10, 2008Date of Patent: November 12, 2013Assignee: Nintendo Co., Ltd.Inventor: Ryuji Umezu
-
Patent number: 8583933Abstract: The present disclosure involves a method of verifying user check-ins to a venue. The method includes initializing a digital check-in chain for a venue. The method includes expanding, electronically by a processor, the check-in chain with a plurality of check-in entries that each correspond to a visit to the venue by a respective user. Each check-in entry on the check-in chain is generated in response to one or more preceding check-in entries on the check-in chain. The method includes detecting fraudulent check-in entries in response to a split in the check-in chain. The method includes removing the fraudulent check-in entries from the check-in chain.Type: GrantFiled: December 23, 2011Date of Patent: November 12, 2013Assignee: eBay Inc.Inventor: John Hastings Granbery