会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 51. 发明授权
    • Collusion-resistant watermarking and fingerprinting
    • 防欺骗水印和指纹识别
    • US07047413B2
    • 2006-05-16
    • US09841159
    • 2001-04-23
    • Yacov YacobiHenrique MalvarDarko Kirovski
    • Yacov YacobiHenrique MalvarDarko Kirovski
    • H04L9/00H04L9/32G06F7/04G06F17/30G06F17/60G06K9/00H03M1/68
    • G06T1/005G06T2201/0063G06T2201/0065H04N1/32144H04N2201/3205H04N2201/3233H04N2201/3236
    • An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish. However, in this scenario each member of the malicious coalition leaves a fingerprint in every digital good from which the estimated watermark is subtracted. [DKI]Thus, like a burglar without gloves, the digital pirate leaves her fingerprints only when she commits a crime. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    • 这里描述了一种使用水印来促进数字商品的权利实施的技术的实现。 更具体地说,它是通过检测串通作为恶意攻击并识别参与的共谋者来保护数字商品的指纹技术。 如果数字盗版打破了一个客户端,并且使得该客户端能够避免水印检测,则所有内容(无标记/免费标记/保护)只能在该特定客户端上被标记为无标记。 然而,为了使其他客户端能够以无标记的方式播放内容,数字盗版者需要从许多客户端中抽出提取的检测密钥,以创建可以避免所有客户端上的水印检测的内容。 所描述的实现通过指纹机制显着地提高了共谋阻力,其可以识别恶意联盟的成员,即使它们的数量比常规串谋保护方案可以实现的数量级大几个数量级。 然而,在这种情况下,恶意联盟的每个成员在每个数字商品中留下指纹,从中减去估计的水印。 [DKI] 因此,像无防手套的盗贼一样,数码盗版者只有在犯罪时才会留下指纹。 本摘要本身并不旨在限制本专利的范围。 在所附权利要求中指出了本发明的范围。
    • 53. 发明申请
    • Collusion-resistant watermarking and fingerprinting
    • 防欺骗水印和指纹识别
    • US20050086486A1
    • 2005-04-21
    • US10975735
    • 2004-10-28
    • Yacov YacobiHenrique MalvarDarko Kirovski
    • Yacov YacobiHenrique MalvarDarko Kirovski
    • G06T1/00H04N1/32H04L9/00
    • G06T1/005G06T2201/0063G06T2201/0065H04N1/32144H04N2201/3205H04N2201/3233H04N2201/3236
    • An implementation of a technology is described herein that facilitates rights enforcement of digital goods using watermarks. More particularly, it is a fingerprinting technology for protecting digital goods by detecting collusion as a malicious attack and identifying the participating colluders. If a digital pirate breaks one client and enables this client to avoid watermark detection, all content (both marked/protected an unmarked/free) can be played as unmarked only on that particular client. However, to enable other clients to play content as unmarked, the digital pirate needs to collude the extracted detection keys from many clients in order to create content that can evade watermark detection on all clients. The described implementation significantly improves collusion resistance through a fingerprinting mechanism that can identify the members of a malicious coalition even when their numbers are several orders of magnitude greater than what conventional collusion-protection schemes can accomplish. However, in this scenario each member of the malicious coalition leaves a fingerprint in every digital good from which the estimated watermark is subtracted. Thus, like a burglar without gloves, the digital pirate leaves her fingerprints only when she commits a crime. This abstract itself is not intended to limit the scope of this patent. The scope of the present invention is pointed out in the appending claims.
    • 本文描述了一种使用水印来促进数字商品的权利实施的技术的实现。 更具体地说,它是通过检测串通作为恶意攻击并识别参与的共谋者来保护数字商品的指纹技术。 如果数字盗版打破了一个客户端,并且使得该客户端能够避免水印检测,则所有内容(无标记/免费标记/保护)只能在该特定客户端上被标记为无标记。 然而,为了使其他客户端能够以无标记的方式播放内容,数字盗版者需要从许多客户端中抽出提取的检测密钥,以创建可以避免所有客户端上的水印检测的内容。 所描述的实现通过指纹机制显着地提高了共谋阻力,该指纹机制可以识别恶意联盟的成员,即使它们的数量比常规串谋保护方案可以完成多几个数量级。 然而,在这种情况下,恶意联盟的每个成员在每个数字商品中留下指纹,从中减去估计的水印。 因此,像没有手套的防盗器一样,数字盗版者只有在犯罪时才会留下指纹。 本摘要本身并不旨在限制本专利的范围。 在所附权利要求中指出了本发明的范围。
    • 55. 发明授权
    • Keyed human interactive proof players
    • 关键的人类互动证明球员
    • US08984292B2
    • 2015-03-17
    • US12822181
    • 2010-06-24
    • Jesper B. LindDarko KirovskiChristopher A. Meek
    • Jesper B. LindDarko KirovskiChristopher A. Meek
    • G06F21/00G06F21/31
    • G06F21/316G06F2221/2103
    • A human interactive puzzle (HIP) authorization architecture where keyed and animated puzzles are executed by HIP players which are distinct and obfuscated to the point where breaking a single player is a relatively costly operation. A key is created in response to a request for a service, a HIP player is created based on the key, and a small installation executable is created that expands during installation to produce a computationally expensive data structure on the client relative to verification of the solution at the server. Thus, copying of the player or relay of the puzzle to a third system requires more time than allowed to receive the solution at the server.
    • 一个人类交互式拼图(HIP)授权架构,其中键盘和动画拼图由HIP玩家执行,这些玩家是不同的和模糊的,打破单个玩家是一个相对昂贵的操作。 响应于对服务的请求而创建密钥,基于密钥创建HIP播放器,并且创建在安装期间扩展的小型安装可执行文件以在客户端上产生计算上昂贵的数据结构,以相对于解决方案的验证 在服务器上 因此,将拼图的播放器或继电器复制到第三系统需要比允许在服务器处接收解决方案更多的时间。
    • 58. 发明授权
    • Factoring middleware for anti-piracy
    • 为打击盗版打劫中间件
    • US08635635B2
    • 2014-01-21
    • US13013567
    • 2011-01-25
    • Kenneth RayGennady MedvinskyVijay GajjalaDarko KirovskiBenjamin Livshits
    • Kenneth RayGennady MedvinskyVijay GajjalaDarko KirovskiBenjamin Livshits
    • G06F9/44H04L9/28
    • G06F21/121G06F2221/2115
    • Embodiments are disclosed that relate to hindering unauthorized use or distribution of a middleware program contained within an application. One example embodiment provides a method for hindering unauthorized use or distribution of a middleware program contained within an application. The method comprises acquiring factored middleware code, the factored middleware code having a missing function residing on a remote computing device, and building an application around the factored middleware code such that the application is configured to call to the remote computing device for execution of the missing function during use. The application may be configured to send a call to the remote computing device for execution of the missing function during use.
    • 公开了涉及阻止未经授权的使用或分发包含在应用程序内的中间件程序的实施例。 一个示例性实施例提供了一种阻止未授权使用或分发包含在应用程序内的中间件程序的方法。 该方法包括获取因子分解的中间件代码,具有驻留在远程计算设备上的缺失功能的因特网中间件代码,以及围绕因子中间件代码构建应用,使得应用被配置为调用远程计算设备来执行丢失的 使用时功能。 该应用可以被配置成在使用期间向远程计算设备发送呼叫以执行丢失的功能。
    • 59. 发明申请
    • MOTION RECOGNITION
    • 运动识别
    • US20120214594A1
    • 2012-08-23
    • US13030154
    • 2011-02-18
    • Darko KirovskiMichail Raptis
    • Darko KirovskiMichail Raptis
    • A63F9/24
    • A63F13/42A63F13/213A63F2300/1093A63F2300/6045A63F2300/6607G06K9/00208G06K9/00342G06K9/00355G06K9/2018
    • Human body motion is represented by a skeletal model derived from image data of a user. Skeletal model data may be used to perform motion recognition and/or similarity analysis of body motion. An example method of motion recognition includes receiving skeletal motion data representative of a user data motion feature from a capture device relating to a position of a user within a scene. A cross-correlation of the received skeletal motion data relative to a plurality of prototype motion features from a prototype motion feature database is determined. Likelihoods that the skeletal motion data corresponds to each of the plurality of prototype motion features are ranked. The likelihoods are determined using the cross-correlation. A classifying operation is performed on a subset of the plurality of prototype motion features. The subset of the plurality of prototype motion features is chosen because its members have the relatively highest likelihoods of corresponding to the skeletal motion data.
    • 人体运动由来自用户的图像数据的骨骼模型表示。 骨骼模型数据可用于执行身体运动的运动识别和/或相似性分析。 运动识别的示例性方法包括:从与捕获装置相关的用户在场景中的位置的表示用户数据运动特征的骨架运动数据。 确定从原型运动特征数据库接收到的骨架运动数据相对于多个原型运动特征的互相关。 骨骼运动数据对应于多个原型运动特征中的每一个的可能性被排序。 使用互相关确定似然性。 对多个原型运动特征的子集执行分类操作。 选择多个原型运动特征的子集,因为其成员具有对应于骨骼运动数据的相对较高的可能性。
    • 60. 发明申请
    • IDENTIFYING FACTORABLE CODE
    • 识别有效的代码
    • US20120167061A1
    • 2012-06-28
    • US12979933
    • 2010-12-28
    • Darko KirovskiBenjamin LivshitsGennady MedvinskyVijay GajjalaKenneth RayJesper Lind
    • Darko KirovskiBenjamin LivshitsGennady MedvinskyVijay GajjalaKenneth RayJesper Lind
    • G06F9/44
    • G06F21/125G06F2221/2115
    • Various embodiments are disclosed that relate to the automated identification of one or more computer program functions for potentially placing on a remote computing device in a split-computational computing environment. For example, one disclosed embodiment provides, on a computing device, a method of determining a factorable portion of code to locate remotely from other portions of the code of a program to hinder unauthorized use and/or distribution of the program. The method includes, on a computing device, receiving an input of a representation of the code of the program, performing analysis on the representation of the code, the analysis comprising one or more of static analysis and dynamic analysis, and based upon the analysis of the code, outputting a list of one or more functions determined from the analysis to be candidates for locating remotely.
    • 公开了涉及自动识别一个或多个计算机程序功能以用于潜在地放置在分离计算计算环境中的远程计算设备上的各种实施例。 例如,一个公开的实施例在计算设备上提供了一种确定代码的有代数部分以从程序的代码的其他部分远程定位以阻止未经授权的使用和/或分发程序的方法。 该方法包括在计算设备上接收程序代码的表示的输入,对代码的表示执行分析,所述分析包括静态分析和动态分析中的一个或多个,并且基于对 该代码,输出从分析确定的一个或多个功能的列表,以作为远程定位的候选。