Patent classifications
G06F21/16
INTEGRATING SECURE WATERMARKS INTO CONTENT
A method includes receiving, by a content server including one or more processors and from a client device, one or more characteristics of a particular content delivery opportunity, obtaining, by the content server, a watermarked digital component that is stenographed with a watermark representing (i) a payload that triggers an action by a client device that detects the watermark and (ii) a reporting location that is contacted by a client device in response to detecting the watermark, generating, by the content server, combined content by combining the watermarked digital component with content from a source that differs from a source of the digital component, and providing, by the content server and to the client device, the combined content.
INTEGRATING SECURE WATERMARKS INTO CONTENT
A method includes receiving, by a content server including one or more processors and from a client device, one or more characteristics of a particular content delivery opportunity, obtaining, by the content server, a watermarked digital component that is stenographed with a watermark representing (i) a payload that triggers an action by a client device that detects the watermark and (ii) a reporting location that is contacted by a client device in response to detecting the watermark, generating, by the content server, combined content by combining the watermarked digital component with content from a source that differs from a source of the digital component, and providing, by the content server and to the client device, the combined content.
Blockchain-based Authentication of Artwork
A system and method for linking authentication documents to a piece of artwork using blockchain. The method includes maintaining a blockchain with a plurality of computing devices; obtaining one or more documents comprising data corresponding to a piece of artwork; generating a document hash for each of the one or more documents based on text contained in the respective documents; generating a frequency hash based on a light wave frequency; appending a block instance to the blockchain by generating a block address based on the document hashes for the one or more documents, the frequency hash, and an identification of the piece of artwork; and transmitting instructions to a seal coating device, receipt of the instructions causing the seal coating device to apply a seal coating to the piece of artwork and a certificate containing the document hashes for the one or more documents.
Blockchain-based data evidence storage method and apparatus
Embodiments of the present application provide a blockchain-based data evidence storage method, a blockchain-based data check method, and relevant apparatuses. The data evidence storage method comprises: performing irreversible encryption on data content of a target file to obtain irreversibly encrypted data of the target file; storing the irreversibly encrypted data in a blockchain and obtaining on-chain evidence storage information of the irreversibly encrypted data; generating a digital watermark of the on-chain evidence storage information; embedding the digital watermark into the target file; and storing the target file embedded with the digital watermark of the on-chain evidence storage information.
Blockchain-based data evidence storage method and apparatus
Embodiments of the present application provide a blockchain-based data evidence storage method, a blockchain-based data check method, and relevant apparatuses. The data evidence storage method comprises: performing irreversible encryption on data content of a target file to obtain irreversibly encrypted data of the target file; storing the irreversibly encrypted data in a blockchain and obtaining on-chain evidence storage information of the irreversibly encrypted data; generating a digital watermark of the on-chain evidence storage information; embedding the digital watermark into the target file; and storing the target file embedded with the digital watermark of the on-chain evidence storage information.
Data privacy plug-in for enterprise instant messaging platform
A plug-in module, which, in combination with a host module, prevents unauthorized copying—like screen captures, screenshots, or screen recordings—of the streaming content provided to a participant in an online content-sharing session via an Instant Messenger (IM) service. The plug-in module may be a part of an IM application running on the participant's system or the host module may transmit a self-installing plug-in module to the participant's system upon receiving an indication that a user is hosting the online session. The plug-in module provides kernel-specific interface of the participant system's Operating System (OS) to the host module, which, then sends an OS-specific instruction to the plug-in module to trigger the OS to disable or control the copying of the streaming content as specified in a privacy preference received from the user hosting the online session. In this manner, sensitive and critical business data may be conveniently and securely shared online.
Data privacy plug-in for enterprise instant messaging platform
A plug-in module, which, in combination with a host module, prevents unauthorized copying—like screen captures, screenshots, or screen recordings—of the streaming content provided to a participant in an online content-sharing session via an Instant Messenger (IM) service. The plug-in module may be a part of an IM application running on the participant's system or the host module may transmit a self-installing plug-in module to the participant's system upon receiving an indication that a user is hosting the online session. The plug-in module provides kernel-specific interface of the participant system's Operating System (OS) to the host module, which, then sends an OS-specific instruction to the plug-in module to trigger the OS to disable or control the copying of the streaming content as specified in a privacy preference received from the user hosting the online session. In this manner, sensitive and critical business data may be conveniently and securely shared online.
Machine learning model with watermarked weights
In some examples, a system includes storage storing a machine learning model, wherein the machine learning model comprises a plurality of layers comprising multiple weights. The system also includes a processing unit coupled to the storage and operable to group the weights in each layer into a plurality of partitions; determine a number of least significant bits to be used for watermarking in each of the plurality of partitions; insert one or more watermark bits into the determined least significant bits for each of the plurality of partitions; and scramble one or more of the weight bits to produce watermarked and scrambled weights. The system also includes an output device to provide the watermarked and scrambled weights to another device.
Machine learning model with watermarked weights
In some examples, a system includes storage storing a machine learning model, wherein the machine learning model comprises a plurality of layers comprising multiple weights. The system also includes a processing unit coupled to the storage and operable to group the weights in each layer into a plurality of partitions; determine a number of least significant bits to be used for watermarking in each of the plurality of partitions; insert one or more watermark bits into the determined least significant bits for each of the plurality of partitions; and scramble one or more of the weight bits to produce watermarked and scrambled weights. The system also includes an output device to provide the watermarked and scrambled weights to another device.
Encoding and decoding visual information
A method and computer software for creating an encoded image and which can optionally include a method for decoding the encoded image. The encoded image is preferably formed from at least one symmetric image but can be formed from a plurality of symmetric images. Embodiments of the present invention can be performed with physical paper and writing utensils or can be performed via computer software. Embodiments of the present invention can be used for art authentication based on results obtained by decoding an image. In one embodiment, one or more encoded image elements can be revealed simultaneously. Optionally, however, encoded image elements can be caused to be revealed in a series that gives a sense of motion in a manner similar to that of motion picture animation.