摘要:
Systems, computer program products, and methods are described herein for augmented hash-based portioning of non-fungible electronic resources for detection of unauthorized duplicates. The present invention is configured to receive an unauthorized duplication detection request for a first NFT from a first user; segment the first digital resource into a first set of resource portions; generate a first set of hash values corresponding to the first set of resource portions; retrieve a second digital resource, wherein the second digital resource is associated with a second NFT; segment the second digital resource into a second set of resource portions; generate a second set of hash values corresponding to the second set of resource portions; determine that the second digital resource is similar to the first digital resource; determine that the second NFT is an unauthorized duplication of the first NFT; and trigger one or more responsive actions.
摘要:
A method to protect content within protected data areas on a target optical record carrier against unauthorized reading and/or copying with a computer, comprises the steps of—determining whether a target optical record carrier or a non-target optical record carrier is inserted into a drive of the computer, and—in case a target optical record carrier is inserted into the drive of the computer—modifying read requests to the protected data areas so that no data is read or the read data is useless, and/or—modifying write commands in respect to the data within the protected data areas to a recordable record carrier or other storage so that the written data is useless.
摘要:
Various systems and methods for of generating a user profile for use in providing targeted-content-messages to a wireless access terminal (W-AT) are disclosed. For example, a user profile with at least one profile element may be provided to the W-AT, and a profile confidence level for the profile element may be also provided.
摘要:
What is disclosed is a method of creating and distributing works of art that takes advantage of the possibilities of duplication and distribution offered by modern computing and telecommunication, while preserving the rights of the authors. Unique versions of a work of art are generated from a source variable work of art such that each unique version is perceptibly different from all other unique versions of the work of art. Unique versions can then be distributed to specific users so that specific unique versions are associated with specific unique versions. In the event a unique version is improperly shared, the user associated with the improperly shared unique version can be identified.
摘要:
The present invention provides a licensing mechanism allowing for different forms of license for use in an environment of interconnected servers providing content. The invention comprises both methods and a system for licensing individual content based upon the nature of the use, thus facilitating the distribution of content without a license for non-commercial purposes and content with a license for commercial purposes. The system utilizes a special form placed within the content, the form containing either a legal assertion of the non-commercial nature of the use, or an identification of the licensee and other related data. If the form includes an identification of the licensee, a license server may be contacted to validate the license. The invention also includes a licensing tool or server to generate the appropriate form for insertion within the content.
摘要:
In general, in one aspect, the disclosure describes a method of processing content for distribution over a computer network. The method includes receiving submitted electronic content, accessing identification of at least one of a set of more than one electronic book digital rights management (DRM) systems, and automatically generating an electronic book from the received electronic content for distribution in accordance with the identified electronic book digital rights management system(s).
摘要:
Apparatus and method for preventing reproduction/distribution of digital goods by use of physical goods uses an inherent ID given to the physical goods. A first encrypted ID and an assignable identification name are also given to the goods. A second encrypted ID is generated when the assignable identification name registered upon the purchases of digital goods coincides with an inputted identification name. The present invention transfers, upon the purchase of the digital goods, the second encrypted ID and the purchased digital goods or the second encrypted ID and encrypted digital goods generated by encrypting the purchased digital goods according to the first encryption algorithm, and extracts the first encrypted ID from the second encrypted ID upon executing the digital goods. The extracted first encrypted ID is compared with the first encrypted ID given to the physical goods, and executes at least a part of the digital goods if the extracted first encrypted ID coincides with the first encrypted ID given to the physical goods.
摘要:
A system and method that allows client devices with different characteristics and users with different preferences to receive customized content from servers in an open, networked environment, regardless of the server's prior knowledge of the clients' configurations or the users' preferences. The embodiments allow the implementation of a secure, for-pay content delivery system wherein content providers can deliver paid content in an appropriate format over an open, networked environment, such as the Internet, to their subscribers without the fear of copyright violation. In particular, these embodiments prevent an authorized user from transferring to non-authorized users a key or other embodiment of a right that would allow the non-authorized users to access the for-pay content. In one embodiment, each client is associated with a universal mobile ID (UMID) that designates the client's characteristics and a user's preferences. In one embodiment the UMID consists of two major parts: the User ID (UID) and the Device ID (DID). The UID includes information that is relevant to a user, including a unique, public personal identification number (PIN), preferences (e.g., what kind of news, sports, etc. the user is interested in) and access rights. The DID includes information that is relevant to a client device, including device attributes (e.g., display, processor type, multimedia capabilities, available memory size) and client date of birth (DOB). This information, which is transmitted by a client to a server with a content request, enables servers to customize content for clients about which they have no prior knowledge.
摘要:
A method and apparatus for detecting unauthorized copies of software. Each copy of software is uniquely identified by a license number. Each use of each copy is termed a session. Each copy's sessions are numbered sequentially. Each session is assigned a random session stamp when it begins. For each copy, a stamp history is kept, giving the next session number and the session stamps for prior sessions. If software copies having the same license number are used on two different computers, their stamp histories will show different next-session numbers and/or different session stamps for prior sessions, indicating two copies of the software exist, which may be, e.g., a license violation. Each software copy maintains a stamp history database (SHD) comprising a stamp history for itself and for other copies of software for which it has received a stamp history. When a software copy creates data files or transmits information over a network, it attaches all or part of its SHD to the files or information, in order to relay stamp history data to other copies of software. When another software copy receives the data files or information, it updates its own SHD using the attached SHD information. In addition to protection of a software copy, the present method can be applied to protection of a data set, detecting old versions of software that remain in use after newer versions have been installed, and to limit the number of times a copy of software is executed.
摘要:
A method and apparatus is disclosed for using the remanent noise of a magnetic medium as a fingerprint for benchmark testing of the magnetic medium as it is both manufactured and used. A cross-correlation is made between the fingerprint at various times as the magnetic medium is manipulated and is indicative of the integrity thereof. This cross-correlation media may be used to control manufacturing and recording processes, including tape tensioning and channel equalization. This cross-correlation between fingerprints can be used to control the tension applied to a thin film magnetic medium during record and/or playback.