Patent classifications
G06F21/1063
Identifying copyrighted material using embedded copyright information
Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for identifying copyrighted material based on embedded copyright information. One of the methods includes generating, by a computing device, a unique identifier (ID) based on copyright information associated with the textual content, wherein the text and the copyright information are recorded on a blockchain of a blockchain network; adding, by the computing device, one or more function words to the textual content without altering a meaning of the textual content; and embedding, by the computing device, the unique ID in the function words to produce an information-embedded textual content that enables retrieval of the copyright information from the blockchain based on the unique ID.
WATERMARKING INPUT AND OUTPUT OF A WHITE-BOX IMPLEMENTATION
A method of mapping an input message to an output message by a keyed cryptographic encryption operation, wherein the keyed cryptographic encryption operation includes a first round, including: performing a substitution function on a first portion of the input message to produce an output, wherein the substitution function incorporates a portion of a cryptographic key; and performing a watermarking function on the output, wherein the watermarking function produces a watermark output when the first input portion has a specific predetermined value, wherein the watermark output uniquely identifies the keyed cryptographic encryption operation.
DIGITAL WATERMARKING OF MACHINE-LEARNING MODELS
In one embodiment, a method includes by a computing device, detecting a sensory input, identifying, using a machine-learning model, one or more attributes associated with the machine-learning model, wherein the attributes are identified based on the sensory input in accordance with the model's training, and presenting the attributes as output. The identifying may be performed at least in part by an inference engine that interacts with the model. The sensory input may include an input image received from a camera, and the model may identify the attributes based on an input object in the input image in accordance with the model's training. The model may include a convolutional neural network trained using training data that associates training sensory input with the attributes. The training sensory input may include a training image of a training object, and the input object may be classified in the same class as the training object.
Digital imaging apparatus and digital imaging method
According to an embodiment, a digital imaging apparatus includes: a camera module and a controller. The controller detects, on a basis of data of a captured image captured by the camera module, whether or not there is a distance difference between an object and a background included in the captured image. The controller adds, where it has been detected that there is the distance difference, authentication information to the data of the captured image, and stores, in a memory, the captured image to which the authentication information has been added.
Personalized audio content device for gifting audio content
This invention is directed to a computerized audio content gifting device. The ability to send audio content to a recipient as a gift allows the personalization of gifts such as flowers and candy to be made. The invention includes a housing with a circuit board, operational buttons, a communication port, a speaker, an attachment member and, a set of computer readable instructions stored on the computer readable medium that, when executed by the processor, provides for: receiving audio content from a server in electronic communications with the circuit board using the communications port, playing the audio content when an operational button is placed in the “on” position. The invention can also determine if there are copyright restrictions on the audio content and manage the number of authorized copies.
Telematics Authentication
Systems and methods for determining the authenticity of vehicle operational data provided by telematics or other devices are provided. Vehicle performance and/or operational data may be collected and the authenticity of the data stream may be determined based on the whether the data stream includes a watermark in a predetermined location of the data stream or whether the data stream includes a data key comprising a predetermined false vehicle performance data reading. A second data recording device may also record vehicle performance and/or operational data. Both the first and second data recording devices may provide the respective vehicle performance data to a computing device. The computing device may compare the vehicle performance data from the first and second data recording devices to determine authenticity of the vehicle measurement data.
Trusted Indicators To Secure Visual Outputs
Providing secure graphics outputs by performing at least the following: receive secure output data corresponding to a digital image, obtain one or more security keys, create a secure output marker for the secure output data, wherein the secure output marker comprises location information corresponding to a trusted output area of the digital image and data information that represents data content found within the trusted output area of the digital image, encrypt the secure output marker using the one or more security keys, embed the secure output marker within the graphics image to create a trusted graphics image; and render the trusted graphics image for exposure onto the display device.
SYSTEMS AND METHODS FOR MEDIA VERIFICATION, ORGANIZATION, SEARCH, AND EXCHANGE
Systems and methods are disclosed herein for providing reliable, verified media content. Media content may be verified at the source, creator credentials vetted and associated with media content, and metadata for efficient organization, searching, and verification of content may be processed.
Audio watermarking for people monitoring
Methods, apparatus, systems and articles of manufacture (e.g., physical storage media) to utilize audio watermarking for people monitoring are disclosed. Example people monitoring methods disclosed herein include determining, at a user device, whether a first trigger condition for emitting an audio watermark identifying at least one of the user device or a user of the user device is satisfied. Such example methods also include, in response to determining that the first trigger condition is satisfied, providing a first audio signal including the audio watermark to an audio circuit that is to output an acoustic signal from the user device.
METHOD AND APPARATUS OF DRM SYSTEMS FOR PROTECTING ENTERPRISE CONFIDENTIALITY
One aspect of the present invention discloses a device for content security. The device includes: an application execution unit configured to generate and control content in response to a content control command requested by a user; and a DRM agent configured to communicate with the application execution unit, to detect the content control command generated by the application execution unit, and to perform control on the content, and the DRM agent comprises a tracing module configured to insert security information into the content in order to prevent and trace content leakage.