Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

75 results about "Content integrity" patented technology

Defining Content Integrity. Content specialists have historically defined content integrity as quality content created and delivered in a timely way, with alignment to audience intentions and actions. While this is a good start, the definition assumes there is a simple audience and company relationship that functions in isolation.

Selective website vulnerability and infection testing

In embodiments of the present invention improved capabilities are described for selective website vulnerability and infection testing and intelligently paced rigorous direct website testing. By providing robust website content integrity checking while only lightly loading the website hosting server, visitor bandwidth availability is maintained through selective testing and intelligently paced external website exercising. A modular pod-based computing architecture of interconnected severs configured with a sharded database facilitates selective website testing and intelligent direct website test pacing while providing scalability to support large numbers of website testing subscribers.
Owner:SITELOCK

Information hiding method facing to H.264/AVC (automatic volume control) video

The invention discloses an information hiding method facing to an H.264 / AVC (automatic volume control) video. The embedding of watermark information is realized through modifying a data communication terminal (DCT) coefficient of a frame I, but for a frame B and a frame P, the embedding of the hiding information is realized through modifying motion vector data (MVD), thus on one hand, the embedded watermark information can be used for authenticating the integrity of the content of the video streaming, and on the other hand, whether the video is attacked is judged, and whether the extracted information is credible and the like at an information detection end according to the integrity of the extracted watermark information, thus ensuring the safety of the private information; as the frame P and frame B in a video sequence are divided into a motion subblocks from the size range of 16*16 to 4*4; the smaller subblock division provides a large amount of MVD data which can provide for hiding the private information, thus the video has larger information hiding capacity; and the process extracting the information is simple and rapid, does not need an original video file for reference, and only needs to decode the DCT coefficient of the frame I and the MVD data of the frame B and frame P, thereby effectively improving the instantaneity and the practicability.
Owner:NINGBO UNIV

Multipoint safe videoconference system with IP set-top box based on H.323 protocol

The invention discloses a multipoint safe videoconference system with an IP set-top box based on an H.323 protocol, which comprises a videoconference client module, a videoconference transmission module and a videoconference server module; the videoconference client module comprises the IP set-top box, a digital television and an audio / video acquisition and playing device and is used for realizing the identity verification of a videoconference user and the functions of acquiring, receiving and playing an audio / video content; the videoconference server module consists of a multipoint control unit (MCU) based on the H.323 protocol and is used for realizing functions of conference management, the integrity verification of the audio / video content, the identity verification of a user at a client, and the distribution and the processing of the audio / video content; and the videoconference transmission module realizes the transmission of the audio / video content between the user participating in a conference and a videoconference server by using a digital television network. According to the invention, a digital television user can realize a safe videoconference by the digital television with higher safety.
Owner:SUN YAT SEN UNIV

Fine particulate matter removal device and method with combined action of acoustic agglomeration and cyclone separation

The invention discloses a fine particulate matter removal device and method with combined action of acoustic agglomeration and cyclone separation. The device is embedded in each terminal workstation in an MIS system, is used for adding an invisible watermark to an acquired new image, and also provides integrity detection and tampering localization analysis for terminal work management and image processing. The technical method is embedded and integrated into a management information system for authenticating image content integrity and locating a tampered image region, and the method can be expressed as integrated external hardware when in concrete realization. The realization of the whole device scheme is divided into two parts: one, image characteristic information as the watermark is generated by the original image, the watermark information is subjected to chaotic encryption and then embedded into the original image, and the invisibility of the watermark information is realized under a condition without increasing the bandwidth; and two, a watermark-containing medical image is subjected to watermark extraction on a receiving end, the image can be subjected to integrity detection, the tampered image region is located, and thus a strong support is provided for further decision.
Owner:CENT SOUTH UNIV

An encryption method for data file distribution

InactiveCN102300093ATo achieve the effect of encryptionBandwidth occupancy is acceptableUser identity/authority verificationTelevision systemsComputer hardwareOriginal data
The invention provides an encryption method for data file distribution, which is characterized in that: the data file is divided into sensitive data and main data, and the two kinds of data are propagated and distributed through different ways, and then the data is synthesized when used at the destination, Revert to the original data file. The encryption method of the present invention has the advantages of adopting the data segmentation technology, breaking the integrity of the content, and better protecting the copyright; saving network bandwidth and making the copyright information instantly controllable.
Owner:HUAZHONG UNIV OF SCI & TECH

Method and device for assessing browsing quality

ActiveCN103544170AAchieving Typesetting QualityAchieve presentation speedCharacter and pattern recognitionSpecial data processing applicationsThird partyCombining rules
The invention discloses a method for assessing browsing quality. The method includes the steps that a page, to be detected, of a third party station is obtained, and the page to be detected is analyzed so that a first original characteristic set can be obtained; code transforming is performed on the page to be detected so that a page to be detected after the code transforming can be generated, and a structural characteristic set of the page to be detected is obtained; the page to be detected after the code transforming is analyzed so that a second original characteristic set can be obtained; according to a preset combined rule, the first original characteristic set, the second original characteristic set and the structural characteristic set are combined to generate a combined characteristic set; according to a preset assessment model and the combined characteristic set, the quality of the page to be detected is assessed. The method can be used for assessing the layout quality, content completeness, presentation speed and the like of the page, so that an instruction is provided for a user to get access to the page, and the experience degree of user access can be improved more easily. The invention further discloses a system for assessing the browsing quality.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD

Automatic intelligent substation information sheet generating system

InactiveCN103793370AExcellent collection integrityEffectively control the preparation qualitySpecial data processing applicationsSmart substationRemote control
The invention relates to an automatic intelligent substation information sheet generating system. The generating system comprises an equipment separating list inputting module, a type inputting module connected with the equipment separating list inputting module in a communication mode and an information sheet generating module connected with the equipment separating list inputting module and the type inputting module in a communication mode. An intelligent substation primary equipment separating list and an intelligent substation secondary equipment separating list are input respectively and combined with all configured separating remote measuring, remote signaling and remote control types, and information is automatically extracted from remote measuring, remote signaling and remote control module libraries to generate full-substation remote measuring, remote signaling and remote control information sheets. The automatic intelligent substation information sheet generating system has the advantages that it is only required that dispatching and naming lists of substation equipment separating are input and equipment attributes are selected, the remote measuring, remote signaling and remote control information sheets can be automatically generated, working efficiency is greatly improved, integrity and correctness of content and standardability of text description of the information sheets are ensured, and the automatic intelligent substation information sheet generating system can be widely applied to compilation of telecontrol information of an infrastructural project and a new expansion project of an intelligent substation at all voltage levels in an electric system.
Owner:STATE GRID CORP OF CHINA +1

Method, device and system for processing terminal information

ActiveCN105577738AReliably Verified Source AuthenticityReliably Verify IntegrityTransmissionComputer hardwareWeb service
The invention provides a method, device and system for processing terminal information. According to the prior art, when a web service provider obtains terminal information through an intermediate device, the overhead of the intermediate device will be increased when processing HTTP messages, and as a result, the problems of decrease of the concurrent capacity of the intermediate device and information terminal counterfeiting on a transmission path may be brought about, and while, with the method, device and system of the invention adopted, the problems in the prior art can be solved. The method includes the following steps that: after establishing a connection, a transmission control protocol obtains a client handshake request sent by a terminal in a TLS authentication negotiation process; a message fingerprint corresponding to insertion information is generated according to the insertion information related to the terminal, and the generated message fingerprint is signed; and the insertion information, the message fingerprint and the signature of the message fingerprint are inserted into the client handshake request, and the client handshake request is sent to a server. According to the method provided by the embodiment of the invention, the terminal information is carried in a TLS protocol field, a one-way authentication mechanism of the intermediate device and the server is additionally adopted, and it can be ensured that the server end can reliably verify the authenticity of the source of the terminal information and completeness of the content of the information terminal.
Owner:CHINA MOBILE COMM GRP CO LTD

Video content integrity identification method and device, equipment and storage medium

The invention discloses a video content integrity identification method, and device, equipment and a storage medium, and relates to the field of deep learning. A video integrity identification model is constructed through an artificial intelligence technology, and a function of identifying video integrity is realized by utilizing computer equipment. The method comprises the steps of obtaining a video file and video publishing information of the video file, wherein the video publishing information represents information provided when video content corresponding to the video file is published; separating audio data from the video file; extracting audio features from the audio data, and extracting text features from the video release information; splicing the audio features and the text features to obtain spliced features; and identifying the spliced features to obtain the integrity of the video content corresponding to the video file. By identifying the vector after the audio feature andthe text feature corresponding to the video file are spliced, the integrity of the video content is determined by integrating the features of multiple dimensions, so that the accuracy of video integrity auditing is improved.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Method of implementing reliable service on complementary structure information network

The invention discloses method for implementing credible service in complemental configurable information network. The said credible services include the credible service of information transmission from information content provider of No.i (iCP) to Data Process Center (DPC), and the credible service provided by DPC to users. The credible service from iCP to DPC includes functions of digital signature, integrality of information content, security, and anti denial capability etc for information content provided by iCP. Content of the credible service from DPC to user includes integrality and security etc. the disclosed credible services guarantee security and confidence level of complemental configurable information network.
Owner:马建国 +1

Content Integrity Management System

A method and system are provided for efficiently verifying the integrity of file-based video audio and other essence in a content production system. The method involves creating a sequence of hash codes for the editable units of the essence, which are stored as metadata apart from the content (either in a separate file or in a separate portion of the same file), and are correlated to the content by a time label (which may be an offset or a timecode number). Upon retrieval from storage, the hash codes are generated for the retrieved essence and compared to the stored hash codes to verify that the content has not been modified.
Owner:METAGLUE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products