Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

61 results about "Copyright infringement" patented technology

Copyright infringement (colloquially referred to as piracy) is the use of works protected by copyright law without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works. The copyright holder is typically the work's creator, or a publisher or other business to whom copyright has been assigned. Copyright holders routinely invoke legal and technological measures to prevent and penalize copyright infringement.

A method and a server for software backend authentication

The present invention discloses a method and a server for software backend authentication, and a terminal. The method for software backend authentication comprises: MAC filing, an authentication server establishes a filing database of the built-in network card physical address MAC of the terminal in a storage module in advance; MAC resolution and determination, when an authentication request from the terminal is received, a resolution module of the authentication server resolves the physical address of the built-in network card physical address MAC of the terminal, a match query with information in the filing database is performed, and based on the obtained matching result, a response module of the authentication server is instructed to give the terminal a corresponding response instruction; and response instruction, based on the decision of the resolution module, the response module sends the corresponding response instruction to the terminal. By adopting the technical solution of the present invention, conflicts of network card physical addresses MAC of terminals are prevented at the application level, possible software troubleshooting cost is directly reduced to zero, and at the same time, software copyright infringement acts damaging the interests of software vendors are completely eradicated.
Owner:HAIMEN BIWEI INTPROP SERVICE CO LTD

Video content similarity discrimination method and system based on computer vision

InactiveCN110427895ATo achieve the purpose of determining copyright infringementPoor resolutionVideo data indexingCharacter and pattern recognitionCluster algorithmCopyright infringement
The embodiment of the invention discloses a video content similarity discrimination method and a system based on computer vision, and relates to the technical field of video image processing, and themethod comprises the following steps: respectively extracting key frames of a video A and a video B through an unsupervised learning clustering algorithm based on an HSV model; respectively calculating a hash value in each key frame of the video A and the video B through a perceptual hash algorithm; and based on the hash value in each key frame of the video A and the video B, judging the similarity of the video A and the video B through a Hamming distance algorithm. According to the method and the system, the problems that the representativeness of key frames is not enough, the accuracy can begreatly reduced under the condition that the content change amplitude between the frames is relatively small, and the effect of the existing picture local feature value processing technology is poorunder the condition of image brightness change are effectively solved; hash value comparison is carried out through the Hamming distance, similarity judgment is carried out on videos of different channels, and therefore the purpose of video copyright infringement judgment is achieved.
Owner:李震

System and Method for Determining Copyright Infringement and Collecting Royalties

InactiveUS20110276449A1RelievingPrevents from maliciously modifyingComplete banking machinesTelephonic communicationPaymentData validation
The present invention describes methods for obtaining compensation for copyright infringement wherein in one embodiment the invention comprises the steps of obtaining infringement data related to a copyright infringement; extracting infringement information from the infringement data; sending an infringement notice to an Internet Service Provider, wherein the Internet Service Provider verifies that an infringer has committed copyright infringement based upon the infringement data that was provided to the Internet Service Provider; and sending a notice to the infringer regarding the infringement information, wherein the notice includes a payment option for reconciling the copyright infringement. Additionally, the present invention discloses a computer-readable storage medium containing a set of instructions for a general purpose computer comprising the set of instructions including: obtaining infringement data; extracting infringement information from the infringement data; sending an infringement notice to an Internet Service Provider, wherein the Internet Service Provider verifies that an infringer has committed copyright infringement based upon the infringement data that was provided to the Internet Service Provider; and sending a notice to the infringer regarding the infringement information, wherein the notice includes a payment option for reconciling the copyright infringement.
Owner:PAYARTISTS

Content simulcast terminal, system thereof and simulcast method

The invention relates to a content simulcast terminal, a system thereof and a simulcast method. Terminal information which is in a single wireless access point network environment and spreads in a broadcast mode is adopted for identifying an adjacent terminal, a share environment which simulcasts content for setting and permitting with any adjacent terminal needs is stipulated, so that one-to-one content sharing and simulcasting can be achieved among terminals, simultaneous watching the same content can just be achieved without the need for a complex share process between every two adjacent terminals, and meanwhile, a simple share process of network environment identifying, searching and adjacent terminal choosing is used for achieving simulcast content. Therefore, an individual management server which is needed by content share and terminal confirmation is of no need, share and simulcast content between the adjacent terminals are convenient. When content needs to be shared on two terminals which are in one-to-one connection, a terminal on one side transmits in an information stream mode, a terminal on the other side receives transmitted content and simulcasts between the adjacent terminals, so that the content can disappear after broadcasting of the adjacent terminals, and thereby copyright infringement legal disputes can be prevented.
Owner:M SERVICE

Method for protecting linux operation system on loongson hardware platform

The invention discloses a method for protecting a linux operation system on a loongson hardware platform. According to the method for protecting linux operation system on the loongson hardware platform, a core encryption method and a file system encryption method are used. Core encryption is implemented by encrypting a Linux initial RAM (random-access memory) magnetic disk. The core encryption method comprises the following steps of encrypting the Linux initial RAM magnetic disk at a core generation stage; and decoding the Linux initial RAM magnetic disk when the system is started. File system encryption is implemented by using a linux equipment mapping technology, after file system encryption is implemented, file system mounting cannot be carried out directly, an encrypted file system requires to be mapped, and data of the file system can be read or written after mounting the mapped file system. By the method for protecting the linux operation system on the loongson hardware platform, a Linux core process is improved, and the inner operation mechanism, the procedure principle and key data of the Linux core process are protected fundamentally. The method not only can be used for preventing software copyright infringement and protecting intellectual property rights in a business environment, but also can be used for an environment requiring encryption such as defense and military, and has an anti-cracking function and an information leakage preventing function.
Owner:SHANDONG CHAOYUE DATA CONTROL ELECTRONICS CO LTD

Network audio-visual management supporting copyright service sub-system

The invention provides a network audio-visual management supporting copyright service sub-system. According to the sub-system, real-name registration is performed on a copyright owner, a video sourceis uploaded and is automatically confirmed as a legal copy according to an automatic acquisition principle of Berne Convention; the uploaded video source needs to be hashed and encrypted to obtain a hash value as a unique identifier ID of the video and simultaneously obtain an encrypted video source; the unique identifier and the encrypted video source are finally packaged to complete the step ofcopyright confirmation. After completion of the copyright confirmation, the copyright owner and an authorized party can obtain online services such as viewership checking and suspected copyright infringement checking and offline legal services such as copyright protection and copyright infringement protection by virtue of the sub-system. Through the abovementioned sub-system, the safety and stability of copyright video encryption package can be effectively improved, and the copyright registration record service, the copyright checking service and the management service of supervision departments are organically combined so as to provide a supervision service for the network video copyright efficiently and accurately.
Owner:ZHONGGUANG REDIANYUN TECH CO LTD +1

Porcelain product body copyright protection method with embedded invisible identification image

PendingCN111882746ADoes not affect normal readingReduced color contrastPaper-money testing devicesEngineeringComputer vision
The invention relates to a porcelain product body copyright protection method with an embedded invisible identification image, which comprises the following steps of: embedding the copyright identification image into a porcelain product body with copyright to form an invisible image, hiding the invisible image on the surface of porcelain, observing the embedded position through auxiliary equipment, and judging whether a product or a product has copyright information according to whether the invisible image can be obtained or not; judging whether copyright exists or not according to whether copyright identification image information exists or not. The copyright identification image used in the method is a portrait or LOGO of a copyright owner, information transmission is clear and visual, and an observation method is simple and clear at a glance; the invisible image is attached to the porcelain body and cannot be separated; and the invisible image is invisible, so that the method has copy resistance and high identification conclusion credibility. The method can effectively solve the problem of copyright infringement identification of porcelain and other crafts, is suitable for porcelain works or products with different processes, different categories, different shapes, different curved surfaces and different sizes, and does not influence the effect due to different shapes, curved surfaces and sizes.
Owner:周晓明

Method for extracting fingerprint of publication, apparatus for extracting fingerprint of publication, system for identifying publication using fingerprint, and method for identifying publication using fingerprint

Disclosed are a method for extracting a fingerprint of a publication, an apparatus for extracting a fingerprint of a publication, a system for identifying a publication using a fingerprint, and a method for identifying a publication using a fingerprint which can easily identify copyright infringement and can effectively protect copyrights. The system for identifying the publication using the fingerprint includes: a fingerprint extraction unit for extracting fingerprints for collected query publications to identify the copyright infringement; a fingerprint query unit for querying fingerprints of original publications corresponding to the fingerprints for the query publications provided from the fingerprint extraction unit; a DBMS for storing the fingerprints extracted from the original publications and additional information from the original publications, and providing a search result candidate group which is composed of fingerprints of at least one of the original publications corresponding to the queries of the fingerprint query unit; and a candidate group verification unit for determining copyright infringement for the query publications by verifying the search result candidate group provided from the DBMS. Consequently, the present invention can easily identify copyright infringement for the publications and can thereby prevent copyright infringement.
Owner:ELECTRONICS & TELECOMM RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products