Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

129results about How to "Prevent piracy" patented technology

Information transmission system, transmitter, and transmission method as well as information reception system, receiver and reception method

Content data encrypted with a content key, the content key encrypted with an individual key specific to an information sending device, and the individual key encrypted with a distribution key that is updated in a predetermined cycle, and supplied are sent to an information receiving device, and the information receiving device decrypts the individual key with the distribution key, decrypts the content key with the individual key, and decrypts the content data with the content key. Thus, the information sending device does not have the distribution key, and accordingly piracy of content data can be prevented with a simple configuration. Also, the information receiving device sends the content key and a playback command to other apparatuses. Thus, other apparatuses can play back contents using the playback command and the content key. Furthermore, the information sending device decrypts the content key with the distribution key before being updated, and stores the same. Thus, contents purchased by an advance order can be actually purchased regardless of expiration dates of the distribution key. Furthermore, usage right is passed from a first information receiving device to a second information receiving device different in registration information at the tome of using contents. Thus, contents can be used among information receiving devices different from each other in registration information.
Owner:SONY CORP

Multimedia platform synchronizer

A karaoke home entertainment center for streamlining karaoke show; reduce stress, problems and time pressure on the KJ & to prevent piracy. The inventive device includes Ultimate Karaoke Book, Karaoke Rental Systems, ProPlayer, Karaoke Shoppe Download Center, Karaoke Burning Station, Downloadable Karaoke CD+G Player, Video Library Pro, DRM and Licensing encryption engine, Pre-manufactured CD DRM. The Book eliminates the majority of KJ typing when creating or updating their book. Book with minimal player forms the Karaoke Rental System. ProPlayer incorporates super encryption Dongle or soft encryption, which permits “back-up” copy but can only be used with the original dongle. Karaoke Shoppe Download Center consists of basic computer system that can access our on-line database or come pre-loaded with encrypted songs. Karaoke burning Station Kiosk is either counter-top or stand-alone kiosks that can contain and deliver cds. Downloadable Karaoke CD+G Player is a quality karaoke player that doesn't require a special piece of hardware (other than a personal computer). It can download and play karaoke songs and be given away for free. Video Library Pro is an adaption of the book and player above designed for video professionals. There are two forms of DRM and Licensing encryption engine that perform the function of file protection. Together they form the Karaoke Home Entertainment Center.
Owner:SEIFLEIN PHIL +1

Information sending system, information sending device, information receiving device, information distribution system, information receiving system, information sending method, information receiving method, information distribution method, apparatus, sending method of information receiving device, playback method of apparatus, method of using contents and program storing medium

Content data encrypted with a content key, the content key encrypted with an individual key specific to an information sending device, and the individual key encrypted with a distribution key that is updated in a predetermined cycle, and supplied are sent to an information receiving device, and the information receiving device decrypts the individual key with the distribution key, decrypts the content key with the individual key, and decrypts the content data with the content key. Thus, the information sending device does not have the distribution key, and accordingly piracy of content data can be prevented with a simple configuration. Also, the information receiving device sends the content key and a playback command to other apparatuses. Thus, other apparatuses can play back contents using the playback command and the content key. Furthermore, the information sending device decrypts the content key with the distribution key before being updated, and stores the same. Thus, contents purchased by an advance order can be actually purchased regardless of expiration dates of the distribution key. Furthermore, usage right is passed from a first information receiving device to a second information receiving device different in registration information at the tome of using contents. Thus, contents can be used among information receiving devices different from each other in registration information.
Owner:SONY CORP

Software aging method and apparatus for discouraging software piracy

InactiveUS7003110B1Discourages unauthorized useIncreasing tracingKey distribution for secure communicationMultiple keys/algorithms usageComputer hardwareSoftware
A software program is configured in accordance with a software aging process such that one or more files generated by the program are at least partially encrypted using a cryptographic key associated with a current time interval for which the files are generated. The cryptographic key may be a symmetric key used for both encryption and decryption operations, such that cryptographic key used for encryption in a given interval is also required to decrypt files encrypted during that interval. Periodic updates of the software program are provided to a legitimate user of the software program, with a given one of the updates including a different cryptographic key associated with a subsequent time interval. The cryptographic key associated with a particular one of the time intervals may be common to each of a set of legitimate copies of the software program that have received the corresponding version of the periodic update. The variation of the cryptographic keys from one interval to another discourages unauthorized use of the software program by deliberately requiring both legitimate and illegitimate users to request unusually frequent updates, thereby substantially increasing the tracing and prosecution risks borne by software pirates.
Owner:ALCATEL-LUCENT USA INC

Design method for interactive server integrated with copyright management and its network structure

A design method and network architecture for an integrated copyright management mutual server belong to the computer field. The network architecture includes an authority server: providing copyright customization services; the Peer side applies to the authority server for purchase, and the authority server deducts fees and issues authority certificates; certificate server: issues identity certificates to P2P clients; user server: responsible for providing user login verification , password modification, personal account recharge service; multiple user nodes; database server: provide data storage support function, used to support intelligent nodes and authority servers, provide network information, user information data storage, query analysis. In this design method, DRM is built into a module of P2P downloading software; the DRM module is divided into applying for a personal identity certificate; viewing the authority list; purchasing authority certificate; these three parts interact with the authority server and the certificate server. The invention realizes high-speed download and upload in the P2P network, and also integrates the DRM authentication and decryption function.
Owner:COMMUNICATION UNIVERSITY OF CHINA

Software installation control method and system based on cloud computing

The invention provides a software installation control method and system based on cloud computing, relates to the technical field of cloud systems, wherein the method comprises the following steps: obtaining a user equipment identifier or a user identifier; querying the software installation authority of the user equipment identifier or the user identifier, obtaining a software identifier matched with the authority of the user equipment identifier or the user identifier; transmitting the software identifier to user equipment corresponding to the user equipment identifier or the user identifier, displaying the software identifier by the user equipment through a human-machine interface; responding a selection instruction input by the user through the human-machine interface, determining a software data packet designated according to the selection instruction, and transmitting the software data packet to the user equipment. According to the invention, the installation software is managed in a unified way on a server side, the corresponding installation authority is set for the terminal equipment or user identifier, so as to avoid the piracy, viruses and other risks caused by personal download and installation, and help IT support departments of enterprises to deploy and manage the software.
Owner:GUANGDONG MICROCLOUD TECH INC

Smart card mating protocol

A system is described for uniquely mating components of a communication network such as a smartcard and a set-top box. When mated, the smartcard and set-top box are tied together and have a single identity. Further, the smartcard operates properly only when inserted into an authorized set-top box. Exchanges of information between both components are secured by encryption and authentication to guard against piracy of the exchanged information. The system provides the same authentication key to the set-top box and the smartcard. This key is used for authenticating communication between the set-top box and the smartcard. First, the authentication key is encrypted by a set-top box mating key. The set-top box employs this mating key to decrypt the authentication key. After it is derived, the authentication key is stored in the set-top box's memory. Further, the same authentication key is encrypted by a smartcard mating key. Thereafter, the smartcard employs the smartcard mating key to extract the authentication key. The clear authentication key is stored in the smartcard's memory as well. In this manner, the authentication key is used for securing all communication between the set-top box and the smart-card. For example, the set-top box may request control words from the smartcard. Only after authenticating the request, are the control words for decrypting digital content provided to the set-top box. If the smartcard authentication key is different from the set-top box key, the request for control words is denied.
Owner:GOOGLE TECH HLDG LLC

Cloud platform dynamic watermark generation system and control method thereof

The invention relates to a cloud platform dynamic watermark generation system and a control method thereof. The system comprises a virtual machine connection module, a watermark generation module in bidirectional connection with the virtual machine connection module and a data module in unidirectional connection with the virtual machine connection module, wherein the watermark generation module is also in unidirectional connection with the data module; the watermark generation module generates a dynamic watermark according to basic information, stored in the data module, of a virtual machine and dynamic watermark generation switch and static watermark configuration information selection, and the dynamic watermark is interposed into to-be-sent data flow through the virtual machine connection module; and the virtual machine connection module can also immediately notify the watermark generation module to generate a new dynamic watermark according to specific information of a client to adapt to the client connected with the virtual machine connection module. Through the cloud platform dynamic watermark generation system and the control method thereof, watermarks can be dynamically generated according to different virtual machine configuration information, and copyright protection can be realized when the dynamic watermarks are interposed into the data flow sent to the client by the virtual machine.
Owner:OWTWARE (SHANGHAI) TECHNOLOGY LIMITED
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products