-
公开(公告)号:US20230205851A1
公开(公告)日:2023-06-29
申请号:US17926997
申请日:2021-05-10
Applicant: Microsoft Technology Licensing, LLC
Inventor: Xian Zhang , Xiaobing Guo , Yang Chen , Shuo Chen , Zhongxin Guo , Qiufeng Yin , Mao Yang , Lidong Zhou
IPC: G06F21/10
CPC classification number: G06F21/105
Abstract: According to implementations of the subject matter described herein, a solution is provided for pirated copy tracing based on a third party. In the solution, a report on a pirated copy of a digital content is received from a third party, wherein the report comprises first secret information for characterizing a first identification, time information and tracing information of the pirated copy. Subsequently, a request for verifying the report is received to determine whether the report is valid. When the report is determined as valid, a licensee associated with the report is marked as a first status to indicate that the pirated copy might be leaked by the licensee. Therefore, the pirated copy may be effectively traced based on third parties. The tracing information in the report can be hidden, and other third parties can therefore be prevented from using the tracing information for duplicate reports.
-
公开(公告)号:US10380008B2
公开(公告)日:2019-08-13
申请号:US15156223
申请日:2016-05-16
Applicant: Microsoft Technology Licensing, LLC
Inventor: Rui Wang , Yuchen Zhou , Shuo Chen , Shaz Qadeer , Yuri Gurevich
Abstract: A framework is described herein for identifying implicit assumptions associated with an SDK and its accompanying documentation (e.g., dev guide). An implicit assumption is information that is not expressly stated in the documentation, but which would be useful in assisting an application developer in building an application. The framework also describes a systematic approach for identifying one or more vulnerability patterns based on the identified implicit assumptions. An application developer may run a test on an application that is being developed to ensure that it does not have any deficiency which matches a vulnerability pattern.
-
公开(公告)号:US09825971B2
公开(公告)日:2017-11-21
申请号:US14779072
申请日:2013-04-24
Applicant: Microsoft Technology Licensing, LLC
Inventor: Shuo Chen , Zhenbin Xu , Boxin Li
IPC: G06F21/00 , H04L29/06 , G06F21/57 , G06F21/64 , G06F21/56 , G06F21/60 , H04N21/45 , H04N21/81 , H04N21/835
CPC classification number: H04L63/12 , G06F21/56 , G06F21/57 , G06F21/602 , G06F21/64 , G06F2221/2103 , H04L63/14 , H04N21/4532 , H04N21/8166 , H04N21/835
Abstract: Systems and methods for verifying an application data modification are described herein. In one example, a method includes detecting modified application data in a computing device and determining the modified application data did not originate from an automatic program. The method also includes sending an identifier and the modified application data to a signing server. Furthermore, the method includes receiving encrypted data comprising the identifier and the modified application data from the signing server. Additionally, the method includes storing the encrypted data in the computing device.
-
公开(公告)号:US20160050218A1
公开(公告)日:2016-02-18
申请号:US14779072
申请日:2013-04-24
Applicant: Shuo CHEN , Zhenbin XU , Boxin LI , MICROSOFT TECHNOLOGY LICENSING, LLC
Inventor: Shuo Chen , Zhenbin Xu , Boxin Li
CPC classification number: H04L63/12 , G06F21/56 , G06F21/57 , G06F21/602 , G06F21/64 , G06F2221/2103 , H04L63/14 , H04N21/4532 , H04N21/8166 , H04N21/835
Abstract: Systems and methods for verifying an application data modification are described herein. In one example, a method includes detecting modified application data in a computing device and determining the modified application data did not originate from an automatic program. The method also includes sending an identifier and the modified application data to a signing server. Furthermore, the method includes receiving encrypted data comprising the identifier and the modified application data from the signing server. Additionally, the method includes storing the encrypted data in the computing device.
Abstract translation: 本文描述了用于验证应用数据修改的系统和方法。 在一个示例中,一种方法包括检测计算设备中的修改的应用数据,并确定修改的应用数据不是源于自动程序。 该方法还包括将标识符和修改的应用数据发送到签名服务器。 此外,该方法包括从签名服务器接收包括标识符和修改的应用数据的加密数据。 此外,该方法包括将加密的数据存储在计算设备中。
-
-
-