Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

303results about How to "Copyright protection" patented technology

Data processing apparatus and data recording media

A data processing apparatus is provided with a data obtaining unit which receives a network signal sn on a network N and obtains distributed audio data Dau in which copyright information or the like is embedded, and a control unit which obtains information indicating a watermarking method which has been used when embedding the copyright information or the like in the audio data. The embedded information is extracted by an appropriate watermarking method according to the obtained information indicating the used watermarking method. The extracted information is again embedded in the distributed audio data Dau by using a predetermined watermarking method, and thus obtained audio data is recorded on a recording medium. Therefore, regardless of the watermarking method used for embedding the copyright information or the like in the distributed audio data Dau, the distributed audio data Dau can be appropriately reproduced by reproduction apparatuses as domestic electrical equipment, according to the embedded information.
Owner:PANASONIC INTELLECTUAL PROPERTY CORP OF AMERICA

Binocular stereoscopic vision-based stereo matching method

InactiveCN106340036AHigh precisionAlleviate weak and repetitive texturesImage enhancementImage analysisGaussian pyramidA-weighting
The invention relates to a binocular stereoscopic vision-based stereo matching method. The method includes the following six stages: Gaussian pyramid construction; cost calculation matching and cost aggregation; cost fusion matching; disparity computation; disparity map repair and void filling; and disparity refinement. Laplacian pyramid transformation is additionally adopted in the cost aggregation stage. An edge-protection-based interpolation algorithm is used in the disparity map repair and hole filling stage. A weighting and bilateral filtering combination-based disparity refinement method is additionally adopted in the disparity refinement stage, so that a high-accuracy disparity map can be obtained. The calculation amount of the method of the invention is moderate; matching results at different scales are fused, improvement is made in the cost aggregation stage and the disparity refinement stage, and therefore, a better disparity map can be obtained; and the method has certain robustness to illumination, external noises and the like.
Owner:SOUTHEAST UNIV

Method, client and system for software access control

The invention relates to a method, a client and a system for software access control. The method comprises the following steps: when a user starts the client, the client encrypts a character string consisting of a local unique identification code and a set date and generates an authorization and authentication ciphertext; and the software access of the client is controlled by combining an offline authentication mode and an online authentication mode according to the authorization and authentication ciphertext generated by the client and an authorization and authentication ciphertext which is stored in an authorization and authentication file by the client. According to the method, the client and the system, the copyright of software is effective protected in a mode that the online authentication is combined with the offline authentication, and the authorized user can conveniently use the software. In the network environment specified by the user, registration and login are not required, and the software can be used without limit; in the environment besides the specified environment, the software is conditionally limited; and the software which is allowed to normally operated in the specified environment can be operated for a preset time in the same computer off the specified network operating environment, and the software is effectively limited to be copied and used among computers.
Owner:SLICONGO MICROELECTRONICS INC

Content transmission apparatus, content reception apparatus and content transmission method

A copyright of a content is protected by preventing creation of illegal copies of the content and the content is prevented from being transmitted beyond a range of personal use in a process to transmit the content through a LAN. Before transmission of a content, a content transmission apparatus and a content reception apparatus perform a determination of authentication information available in a predetermined command accompanying authentication information, or an authentication determination based on a time until reception of a response to a predetermined command request accompanying predetermined authentication information. If the authentication is unsuccessful, the requested content is not transmitted to the content reception apparatus. With such arrangement, it is possible to effectively protect a copyright when a content is transmitted by way of a network.
Owner:MAXELL HLDG LTD

File processing method and device based on block chain

The invention provides a file processing method based on a block chain. The method comprises the following steps: editing a file in an editor; Enabling the specified plug-in in the editor to generatea chunk chain account; hash-calculating At least a portion of that content of the file by a specified plug-in to generate corresponding hash information. The invention utilizes the plug-in of the associated block technology to obtain the hash information related to the file in real time, and utilizes the characteristic of block chain anti-tampering to confirm the right of the file edited by the editor, thereby effectively protecting the copyright of the creator.
Owner:ZHONGAN INFORMATION TECH SERVICES CO LTD

Content transmission apparatus and content reception apparatus

InactiveUS20050160274A1Avoid creatingData quality of the content hardly deterioratesKey distribution for secure communicationMultiple keys/algorithms usageWireless lanTimer
It is an object of the present invention to protect a copyright of a content by suppressing creation of illegal copies of the content and prevent a content from being transmitted beyond a range of personal use in a process to transmit the content through a wire or wireless LAN. Before transmitting a content from a content transmission apparatus to a content reception apparatus, the content transmission apparatus and the content reception apparatus authenticate each other. In the authentication, a timer measures a time interval between a transmission of an authentication request and a reception of an acknowledgement of a reception of the request or between a transmission of a response to a received authentication request and a reception of an acknowledgement of a reception of the response. If the time interval does not exceed an upper limit, a content encrypted by using a shared key is transmitted from the content transmission apparatus to the content reception apparatus, and the address of the content reception apparatus as well as apparatus information unique to the content reception apparatus are cataloged in the content transmission apparatus. Thus, in order to transmit another content, the content is merely encrypted prior to the transmission without measuring a time interval.
Owner:HITACHI LTD

Pirated video monitoring method and system

The invention discloses a pirated video monitoring method and system. The method comprises the following steps of constructing a characteristic configuration table for a copyrighted video, performing preliminary network retrieval according to the characteristic configuration table, and taking a source video link obtained by the retrieval as a link to be detected; extracting source video characteristic information in a webpage content corresponding to the link to be detected, and writing the source video characteristic information as a line record into a log table to be detected; comparing a record in the characteristic configuration table with a corresponding record in the log table and analyzing, and judging whether the source video pirates the copyrighted video or not; and if the source video pirates the copyrighted video, marking an address of the source video as a pirated link, and storing the address into a pirate information table. According to the pirated video monitoring method and system, relevant data of network videos is regularly acquired from a network for comparison analysis, so that the existence of the pirated video in the network can be judged.
Owner:ALIBABA (CHINA) CO LTD

Electronic digital information copyright protection method and system as well as electronic terminal

The invention provides an electronic digital information copyright protection method and system as well as an electronic terminal. The method comprises: the electronic terminal transmits an electronic digital information downloading request to a server; the server encrypts the electronic digital information by use of an encryption key to obtain encrypted digital information; the server transmits the encrypted digital information to the electronic terminal; the electronic terminal receives and stores the encrypted digital information; and the electronic terminal determines whether to decrypt the encrypted digital information by use of a decryption key, and if yes, displaying the decrypted electronic digital information or forwarding the decrypted electronic digital information meeting a preset forwarding condition or a user-defined forwarding condition. Because the electronic digital information to be distributed or stored is encrypted by the encryption key, the encrypted electronic digital information has to be decrypted before being displayed for forwarded by a user, so that only the authorized user can process the electronic digital information, thereby protecting the copyright of the electronic digital information occupier.
Owner:YINGHUADA (SHANGHAI) ELECTRONIC CO LTD

P2P (Point-to-Point) streaming media system, P2P user equipment and streaming media data transmitting method

The invention discloses a P2P (Point-to-Point) streaming media system which comprises a source server, a caching server, a streaming media key application server and an IMS (IP Multimedia Subsystem) key network element, wherein the source server stores streaming media contents; the caching server caches streaming media data and sends to P2P user equipment; the streaming media key application server is interacted with the caching server to generate program information, obtains owned streaming media data information and current state information reported by the P2P user equipment through the IMS key network element, and provides corresponding program information and resource information for the P2P user equipment requesting streaming media service; and the IMS key network element accesses the P2P user equipment into an IMS network and controls the connection negotiation among the P2P user equipment, the caching server providing the downloading of the corresponding streaming media data and other P2P user equipment. The invention also provides the P2P user equipment and a streaming media data transmitting method. The invention realizes that the P2P user equipment is accessed into the IMS network through the IMS key network element for controlling the streaming media service.
Owner:CHINA MOBILE COMM GRP CO LTD

Music player

A portable music player downloads a musical composition data from a distribution server. When this musical composition data is played back, a sample musical composition data composing a part of the musical composition data is distributed to a surrounding player by wireless. At this time, a terminal identification number IDa of the supplier player is included in tag information of the sample musical composition data, and the user of the surrounding player can download the musical composition data related to the sample musical composition data for value from the distribution server. A part of its sold price is refunded to the user of the supplier player.
Owner:YAMAHA CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products