Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Markany Inc patents


Recent patent applications related to Markany Inc. Markany Inc is listed as an Agent/Assignee. Note: Markany Inc may have other listings under different names/spellings. We're not affiliated with Markany Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "M" | Markany Inc-related inventors


Apparatus for protecting copyright of 3d object model and method therefor

Disclosed is an apparatus for protecting a copyright of a 3d object model and method therefor, the apparatus including: a first module generating an original 3d object model by combining voxels in a 3d space of x, y, and z axes; a second module calculating voxel lengths of the axes and based on a voxel length of a longest axis among the lengths, the second module extending lengths of the remaining axes, thereby obtaining a 3d space area; a third module generating an obfuscation unique key; a fourth module generating at least one rotation axis position, rotation voxel range, and rotation frequency based on the key; and a fifth module axially rotating at least one voxel structure included in each rotation voxel range at a rotation angle by each rotation frequency to distort a shape of the model, thereby performing obfuscation. Accordingly, the copyright can be effectively protected.. ... Markany Inc

Method, apparatus and system for protecting content based on open licence

A method, apparatus and system for protecting content based on an open license is disclosed. The method for protecting content based on an open license performed by a content protecting device may include receiving content from a user terminal; selecting an open license corresponding to the received content; analyzing a plurality of license authority items corresponding to the selected open license; storing license data including a value of the plurality of license authority items which is analyzed in a database with being linked with a unique identifier of the content; generating a digital rights management (drm) authority matched to the open license based on the value of the plurality of license authority items which is analyzed; and requesting to encrypt the content based on the generated drm authority to a drm server. ... Markany Inc

Method and apparatus for embedding and extracting text watermark

One aspect of the present invention discloses a watermark insertion method. The method includes: segmenting target text into pieces of page content; obtaining a watermark variable comprising a line alternation value indicative of a watermark mode changed for each line of the segmented page content and a watermark mode setting value; and applying a flip-flop component insertion algorithm for inserting a watermark into each of the pieces of segmented page content based on the obtained watermark variable.. ... Markany Inc

Method and apparatus of drm systems for protecting enterprise confidentiality

One aspect of the present invention discloses a device for content security. The device includes: an application execution unit configured to generate and control content in response to a content control command requested by a user; and a drm agent configured to communicate with the application execution unit, to detect the content control command generated by the application execution unit, and to perform control on the content, and the drm agent comprises a tracing module configured to insert security information into the content in order to prevent and trace content leakage.. ... Markany Inc

Method and apparatus of drm systems for protecting enterprise confidentiality

One aspect of the present invention discloses a client device for content security. The device includes: an application execution unit configured to control content in response to a content control command requested in a user level; a drm agent configured to communicate with a drm server and the application execution unit in the user level, to detect the content control command, to receive an encryption/decryption key and security policy for content from the drm server, to provide the received encryption/decryption key and security policy to a client kernel module, and to transmit an encryption/decryption request; and the client kernel module configured to receive the encryption/decryption key and the security policy, to store the encryption/decryption key and security policy in a secure box of a kernel level, and to perform encryption or decryption on the content based on the encryption/decryption key and security policy in response to the encryption/decryption request.. ... Markany Inc

Apparatus and method for detecting scene cut frame

Provided are an apparatus and a method for detecting a scene cut frame. The apparatus and a method for detecting a scene cut frame includes an image selector configured to select input images by n image frames while shifting an input image at h frame intervals; a candidate frame detector configured to detect a candidate frame from the selected n image frames using at least one of a plurality of codecs and a plurality of scene cut detecting algorithms; and a final frame detector configured to detect a frame having a count value higher than a threshold value as a final scene cut frame by performing histogram analysis based on the detected candidate frame, wherein the h and the n are a real number greater than zero and the h is smaller than the n.. ... Markany Inc

Method and apparatus for inserting additional data into video stream without degrading picture quality

A method of inserting additional data into a moving image stream, according to some embodiments of the present invention, includes receiving a first coded bitstream, electing a first picture pa into which additional data is to be inserted from the first coded bitstream, generating a first picture pa′ by inserting the additional data into the selected first picture pa, selecting a second picture pb directly referring to the first picture pa, generating a second picture pb′ by transforming and coding the selected second picture pb in a manner that decoding the second picture pb′ obtains the second picture pb with reference to the first picture pa′ and generating a data sequence based on the first picture pa′ and the second picture pb.. . ... Markany Inc

Authentication system, method, client and recording medium using tcp sync packet

Disclosed is an authentication method using a tcp sync packet. The authentication method includes: generating, by a client, a single packet authentication (spa) packet (first step); sending, by the client, the spa packet generated in the first step in a tcp sync packet to a server (second step); analyzing, by the server, the spa packet included in the tcp sync packet to determine whether the spa packet is valid (third step); and establishing a communication session between the server and the client by the server sending the tcp acknowledgment (ack) packet to the client (fourth step).. ... Markany Inc

Method and apparatus for automatically splitting object and method, apparatus, and system for registering file

Provided are a method and apparatus for automatically splitting an object and a method, apparatus, and system for registering a file. The method for splitting an object includes receiving the data of a stereolithography (stl) file representing a 3d image, tagging vertex coordinates corresponding to objects included in the 3d image so that the vertex coordinates are classified for each object, and splitting each of the objects included in the 3d image based on the tagged vertex coordinates.. ... Markany Inc

Large-scale simultaneous digital signature service system based on hash function and method thereof

Disclosed are a system and method of a large-scale simultaneous digital signature service based on a hash function. According to the system and method, the main agent that requires the generation of a digital signature does not itself generate the digital signature, and digital signatures may be simultaneously and stably generated for large-scale data such as multiple electronic documents and digital data, using a hash function and a hash tree, which are known as a simple and secure method, to guarantee the integrity of the data in a digital signature-based structure based on multiple servers.. ... Markany Inc

Digital signature service system based on hash function and method thereof

Disclosed is a digital signature service system and method based on a hash function in which a main agent, who requires the generation of a digital signature, does not personally generate the digital signature, and wherein digital signatures may be simultaneously and stably generated for large-scale data such as multiple electronic documents and digital data using a hash function and a hash tree, which are known as a simple and secure method, to guarantee the integrity of the data in a digital signature-based structure based on a server.. . ... Markany Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Markany Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Markany Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###