Methods and systems for identifying an area of interest in protectable content
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-007/00
G06F-017/30
출원번호
UP-0084063
(2005-03-18)
등록번호
US-7797245
(2010-10-04)
발명자
/ 주소
Pedersen, Palle Martin
출원인 / 주소
Black Duck Software, Inc.
대리인 / 주소
Goodwin Procter LLP
인용정보
피인용 횟수 :
6인용 특허 :
48
초록
A protectable content is inspected using both a first technique and a second technique that is different from the first technique. An area of interest in the protectable content is then identified based on the inspections.
대표청구항▼
What is claimed is: 1. An article of manufacture storing computer readable instructions thereon to identify copied content, the article of manufacture comprising: instructions to inspect content in a first source of protectable content using a first technique; instructions to inspect the content in
What is claimed is: 1. An article of manufacture storing computer readable instructions thereon to identify copied content, the article of manufacture comprising: instructions to inspect content in a first source of protectable content using a first technique; instructions to inspect the content in the first source of protectable content using a second technique different than the first technique; and instructions to identify the inspected content as a partial copy of a second source of content based on the inspection using the first technique and the inspection using the second technique, wherein the first technique and second technique do not rely on a digital watermark added to the second source specifically for the tracking of the content of the second source. 2. The article of manufacture of claim 1 further comprising instructions to determine supplemental information for the content identified as a partial copy of a second source of content. 3. The article of manufacture of claim 2, wherein the supplemental information is one or more of adjacent text, adjacent content, adjacent code, file header information, project information, product information, component information, directory information, and licensing information. 4. The article of manufacture of claim 2 further comprising instructions to determine the content identified as a partial copy of a second source of content to have been copied from a specific source. 5. The article of manufacture of claim 4, wherein the supplemental information is one or more of an identification of the specific source, project information associated with the content identified as a partial copy of a second source of content or the specific source, licenses associated with the content identified as a partial copy of a second source of content or the specific source, and licensing information associated with the content identified as a partial copy of a second source of content or the specific source. 6. The article of manufacture of claim 2 further comprising instructions to take an action based on one or more of the content identified as a partial copy of a second source of content and the supplemental information. 7. The article of manufacture of claim 6, wherein the action comprises instructions to group the content identified as a partial copy of a second source of content and the supplemental information. 8. The article of manufacture of claim 6, wherein the action is one or more of instructions to display information for a user and instructions to prompt a user for supplemental information. 9. The article of manufacture of claim 1, wherein the inspected content is source code. 10. The article of manufacture of claim 1, wherein the inspected content is object code. 11. The article of manufacture of claim 1, wherein one of the instructions to inspect using the first technique and instructions to inspect using the second technique are instructions to inspect tokens in the protectable content. 12. The article of manufacture of claim 1, wherein one of the instructions to inspect using the first technique and instructions to inspect using the second technique are instructions to inspect the structure of the protectable content. 13. The article of manufacture of claim 1, wherein one of the instructions to inspect using the first technique and instructions to inspect using the second technique are instructions to inspect the flow of execution of the protectable content. 14. The article of manufacture of claim 1, wherein one of the instructions to inspect using the first technique and instructions to inspect using the second technique are instructions to identify copyright notices in the protectable content. 15. The article of manufacture of claim 1, wherein one of the instructions to inspect using the first technique and instructions to inspect using the second technique are instructions to determine the absence of copyright notices in the protectable content. 16. The article of manufacture of claim 1, wherein one of the instructions to inspect using the first technique and instructions to inspect using the second technique are instructions to identify license information in the protectable content. 17. The article of manufacture of claim 1, wherein one of the instructions to inspect using the first technique and instructions to inspect using the second technique are instructions to determine the absence of license information in the protectable content. 18. The article of manufacture of claim 1, wherein one of the instructions to inspect using the first technique and instructions to inspect using the second technique are instructions to identify license text in the protectable content. 19. The article of manufacture of claim 1, wherein one of the instructions to inspect using the first technique and instructions to inspect using the second technique are instructions to determine the absence of license text in the protectable content. 20. The article of manufacture of claim 1, wherein one of the instructions to inspect using the first technique and instructions to inspect using the second technique are instructions to inspect sections of text in the protectable content. 21. The article of manufacture of claim 1, wherein one of the instructions to inspect using the first technique and instructions to inspect using the second technique are instructions to inspect the protectable content for specific text strings. 22. The article of manufacture of claim 21, wherein one of the instructions to inspect using the first technique and instructions to inspect using the second technique are instructions to filter the inspection of the protectable content for specific text strings. 23. The article of manufacture of claim 1, wherein one of the instructions to inspect using the first technique and instructions to inspect using the second technique are instructions to inspect the protectable content for certain file names. 24. The article of manufacture of claim 1, wherein one of the instructions to inspect using the first technique and instructions to inspect using the second technique are instructions to inspect the protectable content for certain file types. 25. The article of manufacture of claim 1, wherein one of the instructions to inspect using the first technique and instructions to inspect using the second technique are instructions to inspect symbol tables in the protectable content. 26. The article of manufacture of claim 1 further comprising instructions to generate the protectable content by decompiling object code. 27. The article of manufacture of claim 1 further comprising instructions to generate the protectable content by compiling source code. 28. The article of manufacture of claim 1 further comprising instructions to generate the protectable content by decompressing compressed content. 29. The article of manufacture of claim 1, wherein the protectable content comprises one or more of a multimedia presentation, a video segment, an audio segment, a textual representation, a work of art, a visual representation, a technological know-how, a business know-how, and a contract right. 30. The article of manufacture of claim 1 further comprising instructions to inspect the protectable content using a third technique different than the first technique and the second technique, and wherein instructions to identify the content identified as a partial copy of a second source of content are further based on the inspection using the third technique. 31. The article of manufacture of claim 30 further comprising instructions to inspect the protectable content using a fourth technique different than the first technique, the second technique, and the third technique, and wherein instructions to identify the content identified as a partial copy of a second source of content are further based on the inspection using the fourth technique.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (48)
Tardo, Joseph John; Frailong, Jean-Marc; Mendoza, Harold Lee; Haris, Shiv, Apparatus and method for cryptographic-based license management.
Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
Johnson Donald Byron ; Karger Paul Ashley ; Kaufman ; Jr. Charles William ; Matyas ; Jr. Stephen Michael ; Safford David Robert ; Yung Marcel Mordechay ; Zunic Nevenko, Interoperable cryptographic key recovery system.
Afifi Ashraf ; Chan Dominic ; Comuzzi Joseph J. ; Hart Johnson M. ; Pizzarello Antonio, Method and apparatus for analyzing computer code using weakest precondition.
Lee,Chris Guo; Matada,Anmol Neelammna; Wang,Ningning, Method and apparatus for determining relative relevance between portions of large electronic documents.
Cline David C. (San Jose CA) Silverman Andrew P. (Los Gatos CA) Wymore Farrell W. (Mountain View CA), Method for analyzing calls of application program by inserting monitoring routines into the executable version and redir.
Califano Andrea (New York NY), Method for finding a reference token sequence in an original token string within a database of token strings using appen.
Ruffin Michael ; Jayaram Kristin R. ; Merenda Ann C. ; Morrison Timothy I. ; Ordonez Carlos A. ; Preston Allen H. ; Temple ; III Joseph L. ; Yan Eva L., Method, system and program product for evaluating the business requirements of an enterprise for generating business solution deliverables.
Davis, Mark C.; Hind, John R.; Peters, Marcia L.; Topol, Brad B., Selective data encryption using style sheet processing for decryption by a group clerk.
Jain Ramesh ; Horowitz Bradley ; Fuller Charles E. ; Gupta Amarnath ; Bach Jeffrey R. ; Shu Chiao-fe, Similarity engine for content-based retrieval of images.
Driskell Dwight D. ; Greenspan Michael ; Henley Vivian C. ; Lane Nancy C. ; MacFarlane Lloyd ; Nielsen Betty J., System and method for associating services information with selected elements of an organization.
Devanbu Premkumar Thomas ; Stubblebine Stuart Gerald, System and method for providing assurance to a host that a piece of software possesses a particular property.
Premkumar Thomas Devanbu ; Stuart Gerald Stubblebine, System and method for providing assurance to a host that a piece of software possesses a particular property.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Lattner, Christopher Arthur; Lattner, Tanya Michelle; Lerouge, Julien; Myles, Ginger M.; Farrugia, Augustin J.; Betouin, Pierre, System and method for obfuscation by common function and common function prototype.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.