Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

58results about How to "Strengthen copyright protection" patented technology

Method and device to improve Java software jailbreak difficulty and copyright verification method

The invention discloses a method and a device to improve Java software jailbreak difficulty and a Java software copyright verification method based on the method and the device. After development for Java software is completed and before the Java software is published, code obfuscation is carried out on non-program entry classes and methods after compiling, digital summary information of a software copyright protective module is extracted to obtain first summary information, the first summary information is hard coded to a copyright verification class as constant data, digital summary information of the copyright protective module in operation is extracted at a position where key operation is carried out by the copyright verification class by means of a summary information extraction module to obtain second summary information, and the second summary information is compared with the first summary information. If the second summary information is the same with the first summary information, the fact that the copyright protective module is not interpolated after the software is published is proved, and the software is legal; and if the second summary information is different from the first summary information, the fact that the software copyright protective module is modified is proved, the software may be jailbroken, and a user uses the software illegally. The method and the device and the copyright verification method improve jailbreak difficulty of the Java software and improve copyright protective strength.
Owner:PEKING UNIV +2

Method for compiling and compiler

The invention discloses a method for compiling and a compiler, relates to the technical field of computers and solves the problem that the copyright of a compiled object program can not be protected securely in the prior art. The method for compiling comprises the following steps: confirming the insertion point of the authentication code of a safety device in the intermediate code of a source program; and inserting the authentication code of the safety device in the corresponding position of the inserting point in the object program during the process of converting the intermediate code of the source program into the assembly code to acquire the object program. The compiler module of the compiler comprises a confirming unit used for confirming the insertion point of the authentication code of the safety device in the intermediate code of the source program, and an inserting unit used for inserting the authentication code of the safety device in the corresponding position of the inserting point in the object program during the process of converting the intermediate code of the source program into the assembly code to acquire the object program. The embodiment of the invention is mainly applicable to computer programming, in particular to compiling of various advanced languages.
Owner:FEITIAN TECHNOLOGIES

General video digital watermark method

The invention discloses a general video digital watermark method mainly comprising analysis, embedding and extraction processes of a system design scheme. The analysis of the system design scheme comprises determination of a system function, watermark algorithms Ai to be embedded, embedding proportions of all algorithms and minimum extraction frame number Fmin; the watermark embedding process comprises frame distribution of a video file, watermark information pre-processing, embedding of watermark algorithms and formation of video files containing watermarks, wherein the embedding of watermark algorithms comprises the steps of: calculating embedding frame numbers, selecting embedding frames and embedding the watermark; and the watermark extracting process comprises frame distribution of the video file, selection of video frames to be detected, extraction of watermark information and calculation similarity. In the invention, the plurality of watermark algorithms are embedded at the same time and the embedding proportions can be selected, thereby the watermark method obviously enhances attack-resistant property; the watermark embedding ensures the appreciation and the embedding speed of the video file by using a non-frame-by-frame embedding way; in the watermark extracting process, the number of the detecting frames is less and the detection efficiency is improved; in addition, the general video digital watermark method also intensifies the capability of resisting frame edition.
Owner:SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN

Data storage method in CDN (Content Delivery Network) system, and CDN system

The invention discloses a data storage method in a CDN (Content Delivery Network) system, and the CDN system. In the method, after data to be stored is obtained, the data to be stored is sent to a first edge node to enable the first edge node to store the data; the data is copied to at least one second edge node except the first edge node to enable the at least one second edge node to store the data, and in addition, the data can not be sent to a core node. In addition, according to the load situation of the edge node, the data stored in the first edge node and the second edge node is copied or migrated to other edge nodes. In the above method, since the data to be stored is directly stored in the edge node but is not sent to each edge node to be stored after being firstly stored into thecore node, so that the stored data can not be stored in the core node which can be accessed by users, and data safety is increased so as to be more favorable for the copyright protection of the data.
Owner:深圳市优朋普乐传媒发展有限公司

Digital product permission management method and server

InactiveCN105184495AOptimize copyright protection measuresAvoid abuseResourcesTerminal equipmentComputer terminal
The invention provides a digital product permission management method and a digital product permission management server. When an embodiment of a digital product is purchased, state information of the digital product in a database of the digital product permission management server is marked as undistributed; the permission of the digital product can be transferred to arbitrary terminal equipment in which a purchaser is logged at the moment; the state information is marked as distributed when the permission is transferred to the terminal equipment; and the permission cannot be distributed to any terminal equipment at the moment. If the digital product is not used, a return command is fed back to the digital product permission management server, and the state information is reset to be undistributed; if the digital product is used, usage information is marked on the terminal equipment firstly, and the state information is marked as used when the terminal equipment establishes communication connection with the digital product permission management server; and the permission of the embodiment of the digital product is disabled. The digital product permission management method and the digital product permission management server provided by the invention can be used for protecting copyright of digital products, and effectively prevent theft phenomenon of the digital products.
Owner:ZHUHAI YOUTE SMART KITCHEN TECH CO LTD

Video detection method and device, storage medium and computer equipment

The embodiment of the invention discloses a video detection method and device, a storage medium and computer equipment. The method comprises the following steps: obtaining a target video image from the to-be-detected video, detecting a salient region of the target video image and a salient degree corresponding to the salient region; according to the salient region and the salient degree corresponding to the salient region, extracting global features and detail features of the target video image; according to the global features and the detail features, generating the video fingerprint featuresof the to-be-detected video, and finally performing similarity matching on the video fingerprint features and the template fingerprint features in the feature database, so that videos with frames, black edges, frosted glass and other complex scenes and videos with similar backgrounds and different main bodies can be effectively identified, and the video identification accuracy is improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Blockchain-based graphic design work copyright evidence storage method and device and medium

The invention discloses a blockchain-based graphic design work copyright evidence storage method and device, and a medium, and aims to solve the problems that the development of graphic design relatedtools and the circulation of graphic design works reduce the plagiarism difficulty of the graphic design works and are not beneficial to copyright protection of the graphic design works. The method comprises the following steps: receiving a graphic design work copyright authentication request of an author node and a work to be authenticated by an auditor node in a blockchain network; authenticating the work to be authenticated based on a preset intelligent contract; and correspondingly writing the authenticated work to be authenticated and the author node into a block chain. According to themethod, on the basis of ensuring that the graphic design works have certain originality, the correctness and authenticity of copyright ownership of the graphic design works can be ensured through thecharacteristics of safety and tamper resistance of data stored in the blockchain, and the copyright ownership of the graphic design works is used as a copyright ownership certificate of the graphic design works, so that subsequent data tracing is facilitated.
Owner:浪潮云洲工业互联网有限公司

Digital content copyright protection method and device based on block chain platform

The invention discloses a digital content copyright protection method and device based on a block chain. The method comprises the steps that a digital content encryption packaging tool encrypts digital content to generate a protected digital content work file; the blockchain platform registers the digital content, and writes copyright information and content decryption key information of the digital content into the blockchain; the digital content use tool obtains the protected digital content work file, and requests a digital license of the digital content from the blockchain platform; the block chain platform creates a digital license; the digital content use tool obtains a digital license and uses the digital content. Based on a super distribution principle method, the copyright information and the content decryption key are managed by adopting a block chain, so that the dependence of a traditional copyright protection system on a central server is overcome, and the credible management of the digital content copyright and the digital license is achieved.
Owner:PEKING UNIV

Block chain-based software development outsourcing control system and implementation method

The invention relates to a block chain-based software development outsourcing control system and an implementation method. The system comprises a demand release module, a test case generation module, an intelligent contract generation module, a software operation sandbox, a task generation module, a task confirmation distribution module and a block chain system. According to the method, all nodes participate in task generation, code verification and capability scoring on the basis of decentralization and non-tampering characteristics of a block chain technology, so that the authenticity of a software development outsourcing task, the fairness of software quality evaluation and the authority of software development outsourcing completion capability evaluation of a developer are improved, and therefore, a developer is effectively stimulated to improve the participation degree and the completion degree; and the characteristics of traceability and privacy protection of block chain account book data are utilized, each change of user currency and software copyright is encrypted and recorded, currency assets and software copyright are protected, and the data credibility is improved. The invention further discloses an implementation method of the block chain-based software development outsourcing control system.
Owner:SHANGHAI DEV CENT OF COMP SOFTWARE TECH

Method for designing network transmission structure of P2P streaming media with digital rights management

The invention discloses a method for designing the network transmission structure of P2P streaming media with digital rights management, comprising the following steps of using encryption technology to encrypt the steaming media in real time for realizing copyright protection of the digital content; using a certificate server to realize the Peer management, authentication, authorization of P2P network; using an index server to realize the Peer management, clustering, selection and shared service and so on; using Peer clustering technology to enable the heterogeneous Peers broadcasting the same program source to supply downloading and uploading service therebetween; using distributed Super Node to store the streaming media source; using Peer Buffer management technology to realize uploading and downloading service among heterogeneous Peers; and using scheduling algorithm to realize Block-stage parallel downloading. The Peer can be a client or a server, which can sufficiently utilize the resource among Peers and greatly reduce the load of the server, thereby realizing the real-time transmission of the streaming media with a better quality. The invention can meet streaming media network transmission service and real-time requirement for Peer of users.
Owner:XIAN LONGMEI COMM TECH

General video digital watermark method

The invention discloses a general video digital watermark method mainly comprising analysis, embedding and extraction processes of a system design scheme. The analysis of the system design scheme comprises determination of a system function, watermark algorithms Ai to be embedded, embedding proportions of all algorithms and minimum extraction frame number Fmin; the watermark embedding process comprises frame distribution of a video file, watermark information pre-processing, embedding of watermark algorithms and formation of video files containing watermarks, wherein the embedding of watermark algorithms comprises the steps of: calculating embedding frame numbers, selecting embedding frames and embedding the watermark; and the watermark extracting process comprises frame distribution of the video file, selection of video frames to be detected, extraction of watermark information and calculation similarity. In the invention, the plurality of watermark algorithms are embedded at the same time and the embedding proportions can be selected, thereby the watermark method obviously enhances attack-resistant property; the watermark embedding ensures the appreciation and the embedding speed of the video file by using a non-frame-by-frame embedding way; in the watermark extracting process, the number of the detecting frames is less and the detection efficiency is improved; in addition, the general video digital watermark method also intensifies the capability of resisting frame edition.
Owner:SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products