Patent classifications
G06F21/106
ILLEGAL CONTENT SEARCH DEVICE, ILLEGAL CONTENT SEARCH METHOD, AND PROGRAM
An illegitimate content search device 10 according to the present invention includes a previously detected illegitimate content removing unit 19 configured to detect, based on profiles of pieces of possible content, which are possibly the illegitimate content, presumed illegitimate content, which is content whose profile is identical to a profile of previously detected illegitimate content.
SYSTEMS AND METHODS FOR IDENTIFYING AND MAPPING SENSITIVE DATA ON AN ENTERPRISE
Embodiments of the present invention provide techniques, systems, and methods for remote, agent-less enterprise computer threat data collection, malicious threat analysis, and identification and reporting of potential and real threats present on an enterprise computer system. Specifically, embodiments are directed to a system that securely identifies and maps sensitive information from computers across the enterprise. Secure and sensitive information may be internally encrypted and analyzed for indicators of compromise, threatening behavior, and known vulnerabilities. The remote, agent-less collection, analysis, and identification process can be repeated periodically to detect and map additional sensitive information over time, and may delete itself after completion to avoid detection.
Systems and Methods for Authenticating Music Credits
Systems and methods for crediting a profile for a musical work through authentication of a credit is provided. The system comprises a processor in communication with a database. The processor receives a selection of a credit for a musical work to be attributed to an invited profile from an authorized administrator for the musical work, or a request for a credit from an administrator of a profile. The processor updates the database to include the credit as a pending credit, and generates an electronic credit invitation or a credit request including the pending credit. The credit invitation or credit request is transmitted to the invited profile administrator or the musical work administrator, respectively. The processor determines whether the invited profile administrator or the musical work administrator authorizes the pending credit and updates a status of the pending credit in the database based on the determination.
Systems and methods for identifying and mapping sensitive data on an enterprise
Embodiments of the present invention provide techniques, systems, and methods for remote, agent-less enterprise computer threat data collection, malicious threat analysis, and identification and reporting of potential and real threats present on an enterprise computer system. Specifically, embodiments are directed to a system that securely identifies and maps sensitive information from computers across the enterprise. Secure and sensitive information may be internally encrypted and analyzed for indicators of compromise, threatening behavior, and known vulnerabilities. The remote, agent-less collection, analysis, and identification process can be repeated periodically to detect and map additional sensitive information over time, and may delete itself after completion to avoid detection.
METHOD FOR MANAGING DOCUMENT TO BE CLEANED BASED ON METADATA OF SECURE DOCUMENT, APPARATUS FOR THE SAME, COMPUTER PROGRAM FOR THE SAME, AND RECORDING MEDIUM STORING COMPUTER PROGRAM THEREOF
The present disclosure relates to managing a document to be cleaned, includes processing a request, in response to the request to store document data of a first document in a database, based on at least one of whether the first document is duplicate or whether substantive contents of the first document are a same in a relationship with a second document pre-stored in the database, whether the first document is duplicate may be determined by comparing a unique identification value and version information of the first document with a unique identification value and version information of the second document, and whether substantive contents of the first document are the same may be determined by comparing hash data of the first document with hash data of the second document.
SYSTEMS AND METHODS FOR IDENTIFYING AND MAPPING SENSITIVE DATA ON AN ENTERPRISE
Embodiments of the present invention provide techniques, systems, and methods for remote, agent-less enterprise computer threat data collection, malicious threat analysis, and identification and reporting of potential and real threats present on an enterprise computer system. Specifically, embodiments are directed to a system that securely identifies and maps sensitive information from computers across the enterprise. Secure and sensitive information may be internally encrypted and analyzed for indicators of compromise, threatening behavior, and known vulnerabilities. The remote, agent-less collection, analysis, and identification process can be repeated periodically to detect and map additional sensitive information over time, and may delete itself after completion to avoid detection.
Contextualized Content Identification
A computer-implemented method for identifying proprietary content in composite media comprising a plurality of media components, the method comprising: identifying a first media component of the composite media as proprietary content; identifying a second media component of the composite media as a context indicator; and determining a context for the proprietary content based on the context indicator.
METHOD, APPARATUS, AND SYSTEM FOR COPYRIGHT RIGHTS DEFENSE DETECTION
A method, an apparatus, and a system for copyright rights defense detection are provided. The method includes: sending a metadata query request to a copyright handling apparatus; receiving a metadata query response that is sent by the copyright handling apparatus and that includes feature metadata; obtaining a rights-to-be-defended content feature corresponding to the feature metadata from a feature database; sending a license query request to a license processing apparatus; receiving a license query response that is sent by the license processing apparatus and that includes license information; and performing rights defense detection for a copyright based on the obtained rights-to-be-defended content feature and the license information. Rights defense detection can be performed for a copyright by any rights defense detection service apparatus.
Enabling secure storage and sharing of images
The disclosed technology relates to using a blockchain to manage files and ownership thereof for a file sharing and storage service. The blockchain can also record and track edits to the files. The file sharing and storage service can automatically analyze the files to identify various visual features and subjects, and record metadata thereof to the blockchain.
Apparatus, a method and a computer program for volumetric video
A method including projecting a 3D representation of at least one object onto at least one 2D patch; generating a geometry image, a texture image, an occupancy map and auxiliary patch information from 5 the 2D patch, wherein the auxiliary patch information includes metadata indicating whether a filtering process shall be applied on said 2D patch upon reconstruction of the 3D representation of said at least one object; and encoding the auxiliary patch information and zero or more of the following: the geometry image, the texture image and the 10 occupancy map in or along a bitstream.