SYSTEM, METHOD, AND SERVICE FOR TRACING TRAITORS FROM CONTENT PROTECTION CIRCUMVENTION DEVICES
    4.
    发明申请
    SYSTEM, METHOD, AND SERVICE FOR TRACING TRAITORS FROM CONTENT PROTECTION CIRCUMVENTION DEVICES 有权
    用于跟踪内容保护环境设备的系统,方法和服务

    公开(公告)号:US20090327717A1

    公开(公告)日:2009-12-31

    申请号:US12134113

    申请日:2008-06-05

    IPC分类号: H04L9/32 G06G7/62 G06N5/02

    摘要: A traitor tracing system generates a hypothesized model of the circumvention device that models a hypothesized set of device keys compromised by the circumvention device. The system iteratively invokes a subset tracing system to identify a compromised device key until substantially all the compromised device keys in the set of compromised device keys are identified so as to disable the circumvention device. A subset tracing system generates a circumvention device model that models behavior of a circumvention device using prior knowledge and The system iteratively selects and applies to the circumvention device a test based on the hypothesized model and the circumvention device model and receives a response from the circumvention device indicating a success of the test in playing protected content on the circumvention device. The system updates the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model to focus the test selecting process in determining the device keys obtained from the traitor.

    摘要翻译: 叛逆者追踪系统产生对避开装置的假设模型,以模拟被规避装置损害的假设的一组装置钥匙。 系统迭代地调用子集跟踪系统以识别受损的设备密钥,直到被识别的设备密钥集中的基本上所有受损设备密钥被识别为禁用规避设备。 子集跟踪系统生成规避设备模型,其使用先验知识对规避设备的行为进行建模,并且系统基于假设模型和规避设备模型迭代地选择并应用到规避设备的测试,并且接收来自规避设备的响应 表明在规避设备上播放受保护内容的测试成功。 系统使用接收到的响应,所选择的测试,假设模型的当前版本和规避设备模型的当前版本来更新假设模型,以将测试选择过程集中在确定从叛徒获得的设备密钥。

    Sponsored stories application programming interface (API)
    5.
    发明授权
    Sponsored stories application programming interface (API) 有权
    赞助的故事应用程序编程接口(API)

    公开(公告)号:US08892650B2

    公开(公告)日:2014-11-18

    申请号:US13539399

    申请日:2012-06-30

    IPC分类号: G06Q30/00 G06F15/16

    摘要: To provide a sponsored story unit, the social networking system receives a story request from an advertiser. The story request specifies properties of content used to generate the sponsored story. When the social networking system stores an object or an action performed on an object, properties associated with, and describing, the object or the action are also stored. For example, properties of an object include an object type, an object identifier, metadata describing the object or other suitable information. The social networking system identifies actions or objects associated with users connected to a viewing user having one or more properties included in a story request. A sponsored story is generated from the identified actions or objects and presented to a viewing user.

    摘要翻译: 为了提供一个赞助的故事单元,社交网络系统收到广告商的故事请求。 故事要求指定用于生成赞助故事的内容的属性。 当社交网络系统存储对象或对对象执行的动作时,还存储与对象或动作相关联并描述对象或动作的属性。 例如,对象的属性包括对象类型,对象标识符,描述对象的元数据或其他合适的信息。 社交网络系统识别与连接到具有包括在故事请求中的一个或多个属性的观看用户的用户相关联的动作或对象。 从所识别的动作或对象产生赞助故事并呈现给观看用户。

    System, method, and service for tracing traitors from content protection circumvention devices

    公开(公告)号:US07986787B2

    公开(公告)日:2011-07-26

    申请号:US11608268

    申请日:2006-12-08

    IPC分类号: H04L9/00

    摘要: A traitor tracing system generates a hypothesized model of the circumvention device that models a hypothesized set of device keys compromised by the circumvention device. The system iteratively invokes a subset tracing system to identify a compromised device key until substantially all the compromised device keys in the set of compromised device keys are identified so as to disable the circumvention device. A subset tracing system generates a circumvention device model that models behavior of a circumvention device using prior knowledge and The system iteratively selects and applies to the circumvention device a test based on the hypothesized model and the circumvention device model and receives a response from the circumvention device indicating a success of the test in playing protected content on the circumvention device. The system updates the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model to focus the test selecting process in determining the device keys obtained from the traitor.

    SPONSORED STORIES APPLICATION PROGRAMMING INTERFACE (API)
    8.
    发明申请
    SPONSORED STORIES APPLICATION PROGRAMMING INTERFACE (API) 有权
    赞助的故事应用编程界面(API)

    公开(公告)号:US20140006501A1

    公开(公告)日:2014-01-02

    申请号:US13539399

    申请日:2012-06-30

    IPC分类号: G06F15/16

    摘要: To provide a sponsored story unit, the social networking system receives a story request from an advertiser. The story request specifies properties of content used to generate the sponsored story. When the social networking system stores an object or an action performed on an object, properties associated with, and describing, the object or the action are also stored. For example, properties of an object include an object type, an object identifier, metadata describing the object or other suitable information. The social networking system identifies actions or objects associated with users connected to a viewing user having one or more properties included in a story request. A sponsored story is generated from the identified actions or objects and presented to a viewing user.

    摘要翻译: 为了提供一个赞助的故事单元,社交网络系统收到广告商的故事请求。 故事要求指定用于生成赞助故事的内容的属性。 当社交网络系统存储对象或对对象执行的动作时,还存储与对象或动作相关联并描述对象或动作的属性。 例如,对象的属性包括对象类型,对象标识符,描述对象的元数据或其他合适的信息。 社交网络系统识别与连接到具有包括在故事请求中的一个或多个属性的观看用户的用户相关联的动作或对象。 从所识别的动作或对象产生赞助故事并呈现给观看用户。

    Targeting Advertisements Based on User Interactions
    9.
    发明申请
    Targeting Advertisements Based on User Interactions 审中-公开
    基于用户交互的目标广告

    公开(公告)号:US20130085859A1

    公开(公告)日:2013-04-04

    申请号:US13447099

    申请日:2012-04-13

    IPC分类号: G06Q30/02

    摘要: In a social networking system, users may perform different types of actions with respect to objects (e.g., for a song, a user can buy, listen to, recommend, or like the song). Objects on the social networking system may include object properties (e.g., for a song, an artist, genre, and album are the song's object properties). Each type of action performed on a type of object may be aggregated in a different way. Actions may be performed on objects by users through the social networking system, a third-party application installed on the social networking system, and systems external to the social networking system. An advertiser may specify targeting criteria based on multiple different action types and aggregations of an action with respect to a particular object. Users may be categorized based on their interactions with objects having a common element. Ads may then be targeted to the categorized users.

    摘要翻译: 在社交网络系统中,用户可以对对象执行不同类型的动作(例如,对于歌曲,用户可以购买,收听,推荐或喜欢歌曲)。 社交网络系统上的对象可以包括对象属性(例如,对于歌曲,艺术家,类型和专辑是歌曲的对象属性)。 可以以不同的方式聚合对一种对象执行的每种类型的动作。 用户可以通过社交网络系统,社交网络系统上安装的第三方应用程序和社交网络系统外部的系统对对象执行操作。 广告商可以基于针对特定对象的动作的多种不同动作类型和聚合来指定定向条件。 用户可以根据与具有共同元素的对象的交互进行分类。 然后可以将广告定位到分类用户。

    System, method, and service for tracing traitors from content protection circumvention devices
    10.
    发明授权
    System, method, and service for tracing traitors from content protection circumvention devices 有权
    从内容保护规避设备跟踪叛徒的系统,方法和服务

    公开(公告)号:US08023655B2

    公开(公告)日:2011-09-20

    申请号:US12134113

    申请日:2008-06-05

    IPC分类号: H04L9/00

    摘要: A traitor tracing system generates a hypothesized model of the circumvention device that models a hypothesized set of device keys compromised by the circumvention device. The system iteratively invokes a subset tracing system to identify a compromised device key until substantially all the compromised device keys in the set of compromised device keys are identified so as to disable the circumvention device. A subset tracing system generates a circumvention device model that models behavior of a circumvention device using prior knowledge and The system iteratively selects and applies to the circumvention device a test based on the hypothesized model and the circumvention device model and receives a response from the circumvention device indicating a success of the test in playing protected content on the circumvention device. The system updates the hypothesized model using the received response, the selected test, a current version of the hypothesized model, and a current version of the circumvention device model to focus the test selecting process in determining the device keys obtained from the traitor.

    摘要翻译: 叛逆者追踪系统产生对避开装置的假设模型,以模拟被规避装置损害的假设的一组装置钥匙。 系统迭代地调用子集跟踪系统以识别受损的设备密钥,直到被识别的设备密钥集中的基本上所有受损设备密钥被识别为禁用规避设备。 子集跟踪系统生成规避设备模型,其使用先验知识对规避设备的行为进行建模,并且系统基于假设模型和规避设备模型迭代地选择并应用到规避设备的测试,并且接收来自规避设备的响应 表明在规避设备上播放受保护内容的测试成功。 系统使用接收到的响应,所选择的测试,假设模型的当前版本和规避设备模型的当前版本来更新假设模型,以将测试选择过程集中在确定从叛徒获得的设备密钥。