WO2013131134A2 - Méthode, système et outil de détection de violation de droits de propriété intellectuelle - Google Patents
Méthode, système et outil de détection de violation de droits de propriété intellectuelle Download PDFInfo
- Publication number
- WO2013131134A2 WO2013131134A2 PCT/AU2013/000211 AU2013000211W WO2013131134A2 WO 2013131134 A2 WO2013131134 A2 WO 2013131134A2 AU 2013000211 W AU2013000211 W AU 2013000211W WO 2013131134 A2 WO2013131134 A2 WO 2013131134A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- ipr
- event data
- infringement
- squealrs
- squeair
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6272—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database by registering files or documents with a third party
Definitions
- the present invention relates to a system, method and device to harness the resources of individual in a network (termed a crowd). Specifically, a crowdsourcing platform is used to detect, collect and substantiate potential intellectual property right(s) infringements.
- I PRs intellectual property rights
- the problem in protecting copyrighted content and other IPRs is tracking use and reporting on - as close to real-time as possible - any alleged infringement.
- Crossing the evidential burden forensically that an alleged infringement has taken place is a difficult task. That is, establishing that an infringement of I PRs is difficult for IPR owners. This is often the case despite best efforts on the part of I PR owners to place restrictions on usage, such as limitations on market type, placement, duration of use and geographic distribution.
- Associations and organised bodies representing IPR owners' interests are losing their voice despite their IPRs still driving interest.
- Social portals and search engines are dominating and taxing distribution, thereby making the ability to find often more important than the content itself, and thus eating away at income streams back to the I PR owner.
- WebSpy markets in developing analysis and reporting software to provide organisations with a transparent view of their employees' internet, email and 10 network usage. WebSpy is used by government departments, educational institutions and commercial organisations in more than 120 countries worldwide.
- Peer Media Technologies uses a range of non-invasive monitoring and reporting mechanisms on peer-to-peer (P2P) file sharing networks, like BitTorrent and others, to frustrate would-be pirates' attempts to trade copyrighted content.
- P2P peer-to-peer
- MarkMonitor's anti-piracy service protects an enterprise's revenues by pinpointing, monitoring and stopping illegal distribution and promotion of pirated digital content— movies, music, software, games and eBooks. It detects illegal download activity and related promotional activity across an array of internet channels, including peer-to-peer (P2P) networks, user- generated content sites, blogs, video streaming sites, search engines, social media and other websites.
- P2P peer-to-peer
- an infringement detection method, system and tool According to an aspect of the invention there is provided an infringement detection method, system and tool.
- the invention provides an infringement detection method, system and tool that provide a useful alternative to existing methods by utilising a crowding sourcing application, method and system.
- FIGURE 1 illustrates an example of the I PI DS which contains:
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Entrepreneurship & Innovation (AREA)
- Technology Law (AREA)
- Strategic Management (AREA)
- Multimedia (AREA)
- Human Resources & Organizations (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Marketing (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2012900921A AU2012900921A0 (en) | 2012-03-07 | Infringement detection method, system and tool | |
| AU2012900921 | 2012-03-07 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2013131134A2 true WO2013131134A2 (fr) | 2013-09-12 |
Family
ID=49117440
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/AU2013/000211 Ceased WO2013131134A2 (fr) | 2012-03-07 | 2013-03-07 | Méthode, système et outil de détection de violation de droits de propriété intellectuelle |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2013131134A2 (fr) |
Cited By (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104408146A (zh) * | 2014-12-03 | 2015-03-11 | 滨州市知识产权维权援助中心 | 一种知识产权服务平台及其实现方法 |
| US20150169782A1 (en) * | 2013-12-18 | 2015-06-18 | Dassault Systems Enovia Corp. | Component Obsolescence Registry |
| US10728443B1 (en) | 2019-03-27 | 2020-07-28 | On Time Staffing Inc. | Automatic camera angle switching to create combined audiovisual file |
| CN111814428A (zh) * | 2020-06-29 | 2020-10-23 | 远光软件股份有限公司 | 一种检测字体版权信息的方法、装置、终端及存储介质 |
| CN112000928A (zh) * | 2020-07-15 | 2020-11-27 | 西安电子科技大学 | 图片分布式侵权确权方法、系统、存储介质及计算机设备 |
| US10963841B2 (en) | 2019-03-27 | 2021-03-30 | On Time Staffing Inc. | Employment candidate empathy scoring system |
| US11023735B1 (en) | 2020-04-02 | 2021-06-01 | On Time Staffing, Inc. | Automatic versioning of video presentations |
| US11127232B2 (en) | 2019-11-26 | 2021-09-21 | On Time Staffing Inc. | Multi-camera, multi-sensor panel data extraction system and method |
| US11144882B1 (en) | 2020-09-18 | 2021-10-12 | On Time Staffing Inc. | Systems and methods for evaluating actions over a computer network and establishing live network connections |
| US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
| US11423071B1 (en) | 2021-08-31 | 2022-08-23 | On Time Staffing, Inc. | Candidate data ranking method using previously selected candidate data |
| CN115801605A (zh) * | 2022-11-28 | 2023-03-14 | 上海叠念信息科技有限公司 | 基于权重网络模型的深度包检测方法 |
| US11727040B2 (en) | 2021-08-06 | 2023-08-15 | On Time Staffing, Inc. | Monitoring third-party forum contributions to improve searching through time-to-live data assignments |
| US11907652B2 (en) | 2022-06-02 | 2024-02-20 | On Time Staffing, Inc. | User interface and systems for document creation |
| CN119135454A (zh) * | 2024-11-14 | 2024-12-13 | 联一信息技术(北京)有限公司 | 一种分布式IoT的安全认证方法、系统及智慧终端设备 |
| CN119232719A (zh) * | 2024-11-29 | 2024-12-31 | 长城信息股份有限公司 | 一种金融机具设备多渠道远程运维控制系统 |
-
2013
- 2013-03-07 WO PCT/AU2013/000211 patent/WO2013131134A2/fr not_active Ceased
Cited By (27)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20150169782A1 (en) * | 2013-12-18 | 2015-06-18 | Dassault Systems Enovia Corp. | Component Obsolescence Registry |
| US9703888B2 (en) * | 2013-12-18 | 2017-07-11 | Dassault Systemes Americas Corp. | Component obsolescence registry |
| CN104408146A (zh) * | 2014-12-03 | 2015-03-11 | 滨州市知识产权维权援助中心 | 一种知识产权服务平台及其实现方法 |
| US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
| US10728443B1 (en) | 2019-03-27 | 2020-07-28 | On Time Staffing Inc. | Automatic camera angle switching to create combined audiovisual file |
| US11961044B2 (en) | 2019-03-27 | 2024-04-16 | On Time Staffing, Inc. | Behavioral data analysis and scoring system |
| US11863858B2 (en) | 2019-03-27 | 2024-01-02 | On Time Staffing Inc. | Automatic camera angle switching in response to low noise audio to create combined audiovisual file |
| US10963841B2 (en) | 2019-03-27 | 2021-03-30 | On Time Staffing Inc. | Employment candidate empathy scoring system |
| US11457140B2 (en) | 2019-03-27 | 2022-09-27 | On Time Staffing Inc. | Automatic camera angle switching in response to low noise audio to create combined audiovisual file |
| US11783645B2 (en) | 2019-11-26 | 2023-10-10 | On Time Staffing Inc. | Multi-camera, multi-sensor panel data extraction system and method |
| US11127232B2 (en) | 2019-11-26 | 2021-09-21 | On Time Staffing Inc. | Multi-camera, multi-sensor panel data extraction system and method |
| US11636678B2 (en) | 2020-04-02 | 2023-04-25 | On Time Staffing Inc. | Audio and video recording and streaming in a three-computer booth |
| US11184578B2 (en) | 2020-04-02 | 2021-11-23 | On Time Staffing, Inc. | Audio and video recording and streaming in a three-computer booth |
| US11861904B2 (en) | 2020-04-02 | 2024-01-02 | On Time Staffing, Inc. | Automatic versioning of video presentations |
| US11023735B1 (en) | 2020-04-02 | 2021-06-01 | On Time Staffing, Inc. | Automatic versioning of video presentations |
| CN111814428A (zh) * | 2020-06-29 | 2020-10-23 | 远光软件股份有限公司 | 一种检测字体版权信息的方法、装置、终端及存储介质 |
| CN112000928A (zh) * | 2020-07-15 | 2020-11-27 | 西安电子科技大学 | 图片分布式侵权确权方法、系统、存储介质及计算机设备 |
| US11720859B2 (en) | 2020-09-18 | 2023-08-08 | On Time Staffing Inc. | Systems and methods for evaluating actions over a computer network and establishing live network connections |
| US11144882B1 (en) | 2020-09-18 | 2021-10-12 | On Time Staffing Inc. | Systems and methods for evaluating actions over a computer network and establishing live network connections |
| US11727040B2 (en) | 2021-08-06 | 2023-08-15 | On Time Staffing, Inc. | Monitoring third-party forum contributions to improve searching through time-to-live data assignments |
| US11966429B2 (en) | 2021-08-06 | 2024-04-23 | On Time Staffing Inc. | Monitoring third-party forum contributions to improve searching through time-to-live data assignments |
| US11423071B1 (en) | 2021-08-31 | 2022-08-23 | On Time Staffing, Inc. | Candidate data ranking method using previously selected candidate data |
| US11907652B2 (en) | 2022-06-02 | 2024-02-20 | On Time Staffing, Inc. | User interface and systems for document creation |
| US12321694B2 (en) | 2022-06-02 | 2025-06-03 | On Time Staffing Inc. | User interface and systems for document creation |
| CN115801605A (zh) * | 2022-11-28 | 2023-03-14 | 上海叠念信息科技有限公司 | 基于权重网络模型的深度包检测方法 |
| CN119135454A (zh) * | 2024-11-14 | 2024-12-13 | 联一信息技术(北京)有限公司 | 一种分布式IoT的安全认证方法、系统及智慧终端设备 |
| CN119232719A (zh) * | 2024-11-29 | 2024-12-31 | 长城信息股份有限公司 | 一种金融机具设备多渠道远程运维控制系统 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2013131134A2 (fr) | Méthode, système et outil de détection de violation de droits de propriété intellectuelle | |
| US11356479B2 (en) | Systems and methods for takedown of counterfeit websites | |
| Shao et al. | The spread of low-credibility content by social bots | |
| US10402545B2 (en) | Systems and methods for managing data assets associated with peer-to-peer networks | |
| Holt et al. | An assessment of the current state of cybercrime scholarship | |
| Seng | The state of the discordant union: An empirical analysis of DMCA takedown notices | |
| Subrahmanian et al. | The global cyber-vulnerability report | |
| Sartor et al. | The Italian Google-case: Privacy, freedom of speech and responsibility of providers for user-generated contents | |
| Hunn et al. | How to implement online warnings to prevent the use of child sexual abuse material | |
| WO2014153419A1 (fr) | Systèmes et procédés de gestion d'actifs de données associés à des réseaux poste à poste | |
| Watters | A systematic approach to measuring advertising transparency online: An Australian case study | |
| Lockett et al. | Investigating IPTV malware in the wild | |
| Smyth | The new social media paradox: A symbol of self-determination or a boon for big brother? | |
| Minnaar | An examination of early international and national efforts to combat online child pornography and child sexual exploitation and abuse material on the Internet | |
| Watters et al. | Maximising eyeballs but facilitating cybercrime? ethical challenges for online advertising in new zealand | |
| Dorotic et al. | Child Sexual Abuse on the Internet: Report on the analysis of technological factors that affect the creation and sharing of child sexual abuse material on the Internet | |
| Turner | When Big Data Meets Big Brother: Why Courts Should Apply United States v. Jones to Protect People's Data | |
| Khera et al. | Open source intelligence (osint)–a practical introduction: A field manual | |
| Ramwell et al. | Use cases and best practices for LEAs | |
| Burruss et al. | 10 The criminality of digital piracy | |
| Mäkitalo | Tracking the stolen video product on the internet: focus on illicit streaming of copyrighted content | |
| Sundani | Human Trafficking and Cyberspace in South Africa | |
| Spencer | The Challenges Facing Law Enforcement In Live-Streamed Child Sexual Abuse Cases | |
| Jung et al. | From grassroots advocacy to AI governance: lessons from South Korea’s 2024 deepfake sexual abuse crisis on democratising knowledge and policy | |
| Nichols | Digital Piracy Adoption: A Quantitative Study Among College Students in Michigan |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13758099 Country of ref document: EP Kind code of ref document: A2 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 13758099 Country of ref document: EP Kind code of ref document: A2 |