THIRD PARTY BASED PIRATED COPY TRACING
    1.
    发明公开

    公开(公告)号:US20230205851A1

    公开(公告)日:2023-06-29

    申请号:US17926997

    申请日:2021-05-10

    CPC classification number: G06F21/105

    Abstract: According to implementations of the subject matter described herein, a solution is provided for pirated copy tracing based on a third party. In the solution, a report on a pirated copy of a digital content is received from a third party, wherein the report comprises first secret information for characterizing a first identification, time information and tracing information of the pirated copy. Subsequently, a request for verifying the report is received to determine whether the report is valid. When the report is determined as valid, a licensee associated with the report is marked as a first status to indicate that the pirated copy might be leaked by the licensee. Therefore, the pirated copy may be effectively traced based on third parties. The tracing information in the report can be hidden, and other third parties can therefore be prevented from using the tracing information for duplicate reports.

    Anonymous Server Based User Settings Protection
    4.
    发明申请
    Anonymous Server Based User Settings Protection 有权
    基于匿名服务器的用户设置保护

    公开(公告)号:US20160050218A1

    公开(公告)日:2016-02-18

    申请号:US14779072

    申请日:2013-04-24

    Abstract: Systems and methods for verifying an application data modification are described herein. In one example, a method includes detecting modified application data in a computing device and determining the modified application data did not originate from an automatic program. The method also includes sending an identifier and the modified application data to a signing server. Furthermore, the method includes receiving encrypted data comprising the identifier and the modified application data from the signing server. Additionally, the method includes storing the encrypted data in the computing device.

    Abstract translation: 本文描述了用于验证应用数据修改的系统和方法。 在一个示例中,一种方法包括检测计算设备中的修改的应用数据,并确定修改的应用数据不是源于自动程序。 该方法还包括将标识符和修改的应用数据发送到签名服务器。 此外,该方法包括从签名服务器接收包括标识符和修改的应用数据的加密数据。 此外,该方法包括将加密的数据存储在计算设备中。

Patent Agency Ranking