Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

32 results about "Derivative work" patented technology

In copyright law, a derivative work is an expressive creation that includes major copyrightable elements of an original, previously created first work (the underlying work). The derivative work becomes a second, separate work independent in form from the first. The transformation, modification or adaptation of the work must be substantial and bear its author's personality sufficiently to be original and thus protected by copyright. Translations, cinematic adaptations and musical arrangements are common types of derivative works.

Generating a stream of media data containing portions of media files using location tags

A system and method are provided for identifying discrete locations and / or sections within a pre-existing media file without modifying the media file. The discrete locations and / or sections can be associated with one or more user-selected descriptors. The system and method allows for the identifying information to be communicated to consumers of the media file and the media file to be selectively rendered by the consumer using the identifying information, thus allowing a consumer to render only the portion of the media file identified or render from a given discrete location in the media file. In an embodiment, the system and method can be performed without modifying the media file itself and thus no derivative work is created.
Owner:OATH INC

Methods and systems to fingerprint textual information using word runs

ActiveUS20100017850A1Fast and efficient and scalable meanEfficiently fingerprintDigital data processing detailsMultiprogramming arrangementsDerivative workResource efficiency
The present invention provides methods and systems to enable fast, efficient, and scalable means for fingerprinting textual information using word runs. The present system receives textual information and provides algorithms to convert the information into representative fingerprints. In one embodiment, the fingerprints are recorded in a repository to maintain a database of an organization's secure data. In another embodiment, textual information entered by a user is verified against the repository of fingerprints to prevent unauthorized disclosure of secure data. This invention provides approaches to allow derivative works (e.g., different ordering of words, substitution of words with synonyms, etc.) of the original information to be detected at the sentence level or even at the paragraph level. This invention also provides means for enhancing storage and resource efficiencies by providing approaches to optimize the number of fingerprints generated for the textual information.
Owner:FREEDOM SOLUTIONS GROUP

System for obfuscating computer code upon disassembly

A system for preventing accurate disassembly of computer code. Such code masking, referred to as “obfuscation,” is useful to prevent unwanted parties from making copies of an original author's software, obtaining valuable information from the software for purposes of breaking into a program, stealing secrets, making derivative works, etc. The present invention uses assembly-language instructions so as to confuse the disassembler to produce results that are not an accurate representation of the original assembly code. In one embodiment, a method is provided where an interrupt, or software exception instruction, is used to mask several subsequent instructions. The instruction used can be any instruction that causes the disassembler to assume that one or more subsequent words, or bytes, are associated with the instruction. The method, instead, jumps directly to the bytes assumed associated with the instruction and executes those bytes for a different purpose. A preferred embodiment works with a popular Microsoft “ASM” assembler language and “DASM” disassembler. The instructions used to achieve the obfuscation include “INT” instructions. Using this approach up to 17 bytes of obfuscation can be achieved with five instructions. Each instruction remains obfuscated until executed and returns to an obfuscated state afterwards.
Owner:SAFENET DATA SECURITY ISRAEL

System and automate the licensing, re-use and royalties of authored content in derivative works

InactiveUS20050043960A1Safely included in derivativeEquitable financial participationComputer security arrangementsMarketingDerivative workComputer science
A system and method which allows authors to automate the licensing and distribution process to enable their works to be safely included in derivative works, regardless of the industry.
Owner:DISTRIBUTED ENG

System for obfuscating computer code upon disassembly

A system for preventing accurate disassembly of computer code. Such code masking, referred to as “obfuscation,” is useful to prevent unwanted parties from making copies of an original author's software, obtaining valuable information from the software for purposes of breaking into a program, stealing secrets, making derivative works, etc. The present invention uses assembly-language instructions so as to confuse the disassembler to produce results that are not an accurate representation of the original assembly code. In one embodiment, a method is provided where an interrupt, or software exception instruction, is used to mask several subsequent instructions. The instruction used can be any instruction that causes the disassembler to assume that one or more subsequent words, or bytes, are associated with the instruction. The method, instead, jumps directly to the bytes assumed associated with the instruction and executes those bytes for a different purpose. A preferred embodiment works with a popular Microsoft “ASM” assembler language and “DASM” disassembler. The instructions used to achieve the obfuscation include “INT” instructions. Using this approach up to 17 bytes of obfuscation can be achieved with five instructions. Each instruction remains obfuscated until executed and returns to an obfuscated state afterwards.
Owner:ALADDIN KNOWLEDGE SYSTEMS

Collaboration platform

Example embodiments described herein relate to an online social content collaboration platform that allows user devices to access content and create derivative works of content. A graph structure defines content and derivative works as nodes and relationships or links between the content and derivative works as edges. The content and relationships for the content may be displayed to user device as an interface of visual elements in the form of the graph structure of nodes and edges. Example embodiments described herein relate to an online social content collaboration platform that allows user devices to access content and create derivative works of content and get rewarded. The rewards can be cryptographic tokens.
Owner:INERSI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products