Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

30results about "Program/content distribution protection" patented technology

Information processing system, information processing method, computer program executed in information processing system

InactiveUS20070009232A1Television system detailsRecording carrier detailsInformation processingRelevant information
An information processing system includes a stream getting section for getting a data stream representing a content and a recording processing section for generating output control information and writing the data stream and the output control information on a medium. The output control information defines an appropriate output method, which is compatible with the output format of the content, following a rule that defines what type of processing should be done according to the type of input source of the content and the output format of the content and in accordance with source related information on the input source of the content. By reference to the output control information, a device that is going to play back the content from this medium can output the content without considering its input source.
Owner:PANASONIC CORP

System and Method for the Designation of Items in a Virtual Universe

InactiveUS20110055919A1Facilitates tracking and recoveryData processing applicationsDigital data processing detailsHuman–computer interactionVirtual universe
The present invention enables items in a Virtual Universe to be tagged as available for pickup by one or more designated users. The present invention permits a designated user to be alerted that there is an item designated for that user / avatar and available for pick-up at a location in the Virtual Universe. A user may designate another user (or user's avatar), for example, a minor for whom the designating user has responsibility, as an “item” to be tracked. For privacy and other reasons, this and other features may be implemented on an opt-in basis.
Owner:INT BUSINESS MASCH CORP

Program protection method and device

The embodiment of the invention discloses a program protection method and device. The method comprises the following steps of encryption at a program generation stage: acquiring a first secrete key; acquiring a second secrete key and a mark of a designated category; encrypting the designated category by utilizing the second secrete key; encrypting the attribute information of the second secrete key by utilizing a public key of the first secrete key; decryption at a program running stage: decrypting encrypted data of the attribute information of the second secrete key by utilizing a private key of the first secrete key; judging whether the to-be-loaded category belongs to the designated category or not according to the mark of the designated category, and decrypting the to-be-loaded category by utilizing the second secrete key if the to-be-loaded category belongs to the designated category. The first secrete key and the second secrete key are used for doubly encrypting the program, so that the source code of the program can be effectively protected; meanwhile, the program is also distinguished, and only the designated category is encrypted, so that the encryption and decryption efficiency can be improved; moreover, the mark of the encrypted category is further encrypted and protected by the second secrete key, so that the safety of the program is further protected.
Owner:BEIJING AUTONAVI YUNMAP TECH CO LTD

Copy protection built into a network infrastructure

InactiveUS7516322B1Copy protection is reinforcedPrevent easy circumventionMultiple digital computer combinationsProgram controlDigital contentDigital signature
A method for a network infrastructure copy protection system. The method includes the step of applying a digital signature to a digital content file prior to transmission. Digital content files that are to be legitimately transmitted across the distributed computer network are modified by the application of digital signatures corresponding to the sender. As content files are transmitted across a distributed computer network, the distributed computer network examines the content files to determine whether they include the digital signatures. The examining is performed by hardware comprising the infrastructure of the distributed computer network. When content files include respective digital signatures, the content files are transmitted by the infrastructure. When the content files do not include the digital signatures, transmission of those content files not having digital signatures is blocked. The digital signatures are configured to identify the senders of the digital content files. The digital signatures can be logged within the distributed computer network to maintain a record of the digital content files as they are transmitted. The hardware performing the examining can be a plurality of routers or a plurality of cache engines within the distributed computer network.
Owner:CISCO TECH INC

Apparatus and method for blocking ransome ware using access control to the contents file

The present application relates to the apparatus for blocking Ransome ware using access control to the contents file, it includes an access permission program checking unit for checking whether a program of a process detected as being started in an user's computer is a reliable program, checking whether a parent process of the program is a reliable program, and determining whether the program is the program that is allowed to access the contents file; a whitelist registration unit for registering information of the contents file to be protected; and a contents file access control unit for allowing the process to access the contents file registered in the whitelist registration unit when the program of the process is the program that is allowed to access the contents file determined by the access permission program checking unit, and blocking the process from accessing the contents file registered in the whitelist registration unit when the program of the process is not the program that is allowed to access the contents file determined by the access permission program checking unit.
Owner:WITHNETWORKS CO LTD

System and method for device authorization and remediation

ActiveUS20150281190A1Digital data processing detailsUser identity/authority verificationDiagnostic dataRestoration device
A method is provided for authorizing a device for consuming content. In method includes the steps of generating an authorization request, the authorization request for authorization data including device diagnostic data (instructions) an device remedial data (instructions), transmitting the authorization request from the device to an authorizing service, and authorizing or remediating the device according to an authorization response to the authorization request received from an authorization server.
Owner:ARRIS ENTERPRISES LLC

Remote payment system and remote payment method of application program

The invention provides a remote payment system of an application program. The remote payment system comprises a remote payment client side, a VNC (Virtual Network Computer) Server cluster, an application program scheduler and an application program cluster, wherein the VNC Server cluster and the application program scheduler are interconnected with the remote payment client side; the application program cluster is interconnected with the VNC Server cluster and the application program scheduler; the remote payment client side is used for sending an application program startup request to the application program scheduler, displaying an interface image of the application program pushed by the VNC Server cluster, receiving an operation instruction of a user and sending the operation instruction of the user to the VNC Server cluster; the application program scheduler is used for allocating an application server for the user and sending the IP (Internet Protocol) address of the application server to the VNC Server cluster; and the VNC Server cluster is used for starting the application program requested by the user in the application program cluster, receiving the interface image of the application program of the application program cluster and pushing the image to the remote payment client side. The invention also provides a corresponding remote payment method of an application program. The remote payment system and method can realize transformation to a cloud service mode from a traditional Linux application with a low cost.
Owner:INST OF COMPUTING TECH CHINESE ACAD OF SCI

Web page processing method and apparatus, and storage medium

ActiveUS20190205546A1Precise filterInterprogram communicationSoftware designWeb page
The present disclosure provides a web page processing method. The method includes obtaining web page elements after web page rendering is performed on a to-be-accessed web page; detecting whether an abnormal element exists in the web page elements; generating and displaying an interaction entrance on the to-be-accessed web page if an abnormal element exists in the web page elements; and obtaining a trigger operation on the interaction entrance and filtering out the abnormal element in response to the trigger operation.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Man-machine interaction multistage password setting method

ActiveCN111159655ARealization of interactive protectionRealization of delayed interactive protectionDigital data authenticationProgram/content distribution protectionPasswordTouchscreen
The invention discloses a man-machine interaction multi-level password setting method. The method comprises the steps that man-machine interaction protection is preset into a plurality of levels, level parameters and interface parameters through man-machine interaction upper configuration; an interactive touch screen acquires the interface parameters and displays an equipment interface according to the interface parameters; wherein the man-machine interaction upper configuration is in communication connection with a plurality of pieces of sub-equipment and acquires interaction time informationand state information of the plurality of pieces of sub-equipment in real time; if the interaction time is greater than the current level protection time, the man-machine interaction upper configuration sends a locking instruction to control the interaction touch screen to execute a locking operation so as to lock the interaction touch screen; through inputting an unlocking instruction or a time-delay instruction, unlocking or time-delay interaction locking protection is realized. According to the man-machine interaction multistage password setting method provided by the invention, multiple stages of interaction protection, delay interaction protection and multiple unlocking modes can be set, so that delay man-machine interaction protection is dynamically realized before the interaction protection is executed.
Owner:SHENZHEN CITY SAMKOON TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products