[go: up one dir, main page]

SG11202002417PA - Identifying copyrighted material using copyright information embedded in tables - Google Patents

Identifying copyrighted material using copyright information embedded in tables

Info

Publication number
SG11202002417PA
SG11202002417PA SG11202002417PA SG11202002417PA SG11202002417PA SG 11202002417P A SG11202002417P A SG 11202002417PA SG 11202002417P A SG11202002417P A SG 11202002417PA SG 11202002417P A SG11202002417P A SG 11202002417PA SG 11202002417P A SG11202002417P A SG 11202002417PA
Authority
SG
Singapore
Prior art keywords
tables
copyright information
information embedded
copyrighted material
identifying copyrighted
Prior art date
Application number
SG11202002417PA
Inventor
Zhiguo Li
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Publication of SG11202002417PA publication Critical patent/SG11202002417PA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • G06Q50/184Intellectual property management
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2282Tablespace storage structures; Management thereof
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1015Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • G06Q2220/10Usage protection of distributed data files

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Technology Law (AREA)
  • Software Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Data Mining & Analysis (AREA)
  • Marketing (AREA)
  • Computing Systems (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • General Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Primary Health Care (AREA)
  • Health & Medical Sciences (AREA)
  • Operations Research (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Power Engineering (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)
SG11202002417PA 2019-05-20 2019-05-20 Identifying copyrighted material using copyright information embedded in tables SG11202002417PA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2019/087635 WO2019141294A2 (en) 2019-05-20 2019-05-20 Identifying copyrighted material using copyright information embedded in tables

Publications (1)

Publication Number Publication Date
SG11202002417PA true SG11202002417PA (en) 2020-04-29

Family

ID=67301675

Family Applications (1)

Application Number Title Priority Date Filing Date
SG11202002417PA SG11202002417PA (en) 2019-05-20 2019-05-20 Identifying copyrighted material using copyright information embedded in tables

Country Status (5)

Country Link
US (2) US10949936B2 (en)
EP (1) EP3673453B1 (en)
CN (1) CN111164640B (en)
SG (1) SG11202002417PA (en)
WO (1) WO2019141294A2 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112119424A (en) * 2019-05-20 2020-12-22 创新先进技术有限公司 Identifying copyrighted material using embedded copyright information
CN111143375B (en) * 2020-01-14 2024-03-08 李文谦 Design system based on block chain
CN111881425B (en) * 2020-07-28 2024-09-24 平安科技(深圳)有限公司 Picture copyright authentication method, device and storage medium
CN112235345B (en) * 2020-09-08 2022-11-15 国网河北省电力有限公司雄安新区供电公司 Content distribution network active cache delivery method and system
CN111930809A (en) * 2020-09-17 2020-11-13 支付宝(杭州)信息技术有限公司 Data processing method, device and equipment
CN113872772B (en) * 2021-12-03 2022-07-15 杭州宇链科技有限公司 Video segment shooting device and time recording method and corresponding verification method

Family Cites Families (81)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5822436A (en) 1996-04-25 1998-10-13 Digimarc Corporation Photographic products and methods employing embedded information
US6522770B1 (en) 1999-05-19 2003-02-18 Digimarc Corporation Management of documents and other objects using optical devices
US7068787B1 (en) 1998-10-23 2006-06-27 Contentguard Holdings, Inc. System and method for protection of digital works
WO2001022652A2 (en) 1999-09-21 2001-03-29 Discovery Communications, Inc. Electronic book security and copyright protection system
US20050053258A1 (en) 2000-11-15 2005-03-10 Joe Pasqua System and method for watermarking a document
US8392827B2 (en) 2001-04-30 2013-03-05 International Business Machines Corporation Method for generation and assembly of web page content
JP2003230001A (en) 2002-02-01 2003-08-15 Canon Inc Digital watermark embedding device for document, digital watermark extracting device for document, and control method thereof
US20050172130A1 (en) 2002-03-27 2005-08-04 Roberts David K. Watermarking a digital object with a digital signature
US20040001606A1 (en) 2002-06-28 2004-01-01 Levy Kenneth L. Watermark fonts
US7307761B2 (en) 2002-12-12 2007-12-11 Electronics For Imaging, Inc. Methods and apparatus for watermarking digitally printed documents
JP3687675B2 (en) 2002-12-25 2005-08-24 株式会社ニコン Electronic camera having digital watermark function and image processing program
US20060072778A1 (en) 2004-09-28 2006-04-06 Xerox Corporation. Encoding invisible electronic information in a printed document
US7856116B2 (en) 2004-11-09 2010-12-21 Digimarc Corporation Authenticating identification and security documents
US8570586B2 (en) 2005-05-02 2013-10-29 Digimarc Corporation Active images through digital watermarking
US7570641B2 (en) 2005-08-23 2009-08-04 Macrovision Corporation Techniques for watermarking and distributing content
CN1933391A (en) 2005-09-16 2007-03-21 北京书生国际信息技术有限公司 A Stealth Code Embedding and Detection Method
US20080071929A1 (en) 2006-09-18 2008-03-20 Yann Emmanuel Motte Methods and apparatus for selection of information and web page generation
US8576425B2 (en) 2009-06-08 2013-11-05 Palo Alto Research Center Incorporated Method and system for printing documents from a portable device
US20110119293A1 (en) 2009-10-21 2011-05-19 Randy Gilbert Taylor Method And System For Reverse Pattern Recognition Matching
US9892661B2 (en) * 2009-12-11 2018-02-13 Digital Immunity Llc Steganographic embedding of hidden payload
US9053296B2 (en) * 2010-08-28 2015-06-09 Software Analysis And Forensic Engineering Corporation Detecting plagiarism in computer markup language files
CN102479297B (en) 2010-11-23 2015-07-08 工业和信息化部电信传输研究所 Copyright protection method based on public key system and digital watermarking
CN102495833B (en) 2011-11-30 2014-03-12 哈尔滨工业大学 Document watermark copyright information protection device based on Opentype vector outline fonts
CN102393892B (en) 2011-12-05 2014-04-02 西安科技大学 Word document copyright protection method
US9259955B1 (en) 2011-12-06 2016-02-16 Gary Dean Ragner Ergonomic binding system for large format images
US8965038B2 (en) 2012-02-01 2015-02-24 Sam Houston University Steganalysis with neighboring joint density
US10417667B1 (en) 2012-06-27 2019-09-17 Groupon, Inc. Method and apparatus for creating web content and identifying advertisements for users creating and viewing content
FR2993074B1 (en) 2012-07-03 2014-08-29 Viaccess Sa METHOD FOR TATOOTING DIGITAL BOOKS
CN103500296B (en) 2013-09-29 2017-01-18 北京溯源鸿业科技有限公司 Inlaying method and device of digital watermarks in text documents
US10839020B2 (en) 2014-04-14 2020-11-17 Netspective Communications Llc Multi-source user generated electronic data integration in a blockchain-based transactional system
KR101626276B1 (en) * 2014-06-17 2016-06-01 어준선 Method for creating, providing and replaying digital content by using information on digital currency and terminal and computer-readable recording medium using the same
KR101640902B1 (en) * 2014-12-24 2016-07-19 주식회사 파수닷컴 Apparatus and method for protecting contents included in a Hyper-text Markup Language document
US10678893B2 (en) 2015-01-18 2020-06-09 Frederic Scott Deaver Methods and related apparatus for managing access to digital assets
US9436923B1 (en) 2015-02-26 2016-09-06 Skuchain, Inc. Tracking unitization occurring in a supply chain
US20160283920A1 (en) 2015-03-28 2016-09-29 Justin Fisher Authentication and verification of digital data utilizing blockchain technology
SG11201708295XA (en) 2015-04-06 2017-11-29 Bitmark Inc System and method for decentralized title recordation and authentication
US10210527B2 (en) 2015-06-04 2019-02-19 Chronicled, Inc. Open registry for identity of things including social record feature
CN105184345A (en) 2015-10-13 2015-12-23 北京工业大学 Digital-watermark-based implicit two-dimensional code
EP4375908A1 (en) * 2015-10-17 2024-05-29 Banqu, Inc. Blockchain-based identity and transaction platform
US20170116693A1 (en) 2015-10-27 2017-04-27 Verimatrix, Inc. Systems and Methods for Decentralizing Commerce and Rights Management for Digital Assets Using a Blockchain Rights Ledger
US10108812B2 (en) 2016-01-28 2018-10-23 Nasdaq, Inc. Systems and methods for securing and disseminating time sensitive information using a blockchain
KR101637868B1 (en) 2016-02-22 2016-07-08 주식회사 코인플러그 Financial institution document verification system that is based on the block chain
CN107145768B (en) 2016-03-01 2021-02-12 华为技术有限公司 Copyright management method and system
US10529041B2 (en) 2016-04-18 2020-01-07 Rs Ltd. System and method for managing transactions in dynamic digital documents
JP6037078B1 (en) 2016-05-13 2016-11-30 富士ゼロックス株式会社 Information processing apparatus, transfer system, and program
US9635000B1 (en) * 2016-05-25 2017-04-25 Sead Muftic Blockchain identity management system based on public identities ledger
CN107679045B (en) * 2016-08-01 2021-08-31 华为技术有限公司 Copyright authorization management method and system
US10592639B2 (en) * 2016-09-06 2020-03-17 Intel Corporation Blockchain-based shadow images to facilitate copyright protection of digital content
CN107967416B (en) 2016-10-19 2021-07-09 华为技术有限公司 Method, device and system for detection of copyright protection
US20190386814A1 (en) 2016-11-07 2019-12-19 Sherjil Ahmed Systems and Methods for Implementing an Efficient, Scalable Homomorphic Transformation of Encrypted Data with Minimal Data Expansion and Improved Processing Efficiency
US20180205546A1 (en) 2016-12-31 2018-07-19 Assetvault Limited Systems, methods, apparatuses for secure management of legal documents
US10755375B2 (en) 2017-02-24 2020-08-25 The Trustees Of Columbia University In The City Of New York Systems and methods for steganography based on text fonts
US11188977B2 (en) 2017-03-08 2021-11-30 Stichting Ip-Oversight Method for creating commodity assets from unrefined commodity reserves utilizing blockchain and distributed ledger technology
WO2018187408A1 (en) 2017-04-07 2018-10-11 Walmart Apollo, Llc System for recording ownership of digital works and providing backup copies
US20180293670A1 (en) 2017-04-09 2018-10-11 Yi Fan Yin Architecture of social networking question and answer platform based on blockchain
US10140392B1 (en) 2017-06-29 2018-11-27 Best Apps, Llc Computer aided systems and methods for creating custom products
CN107659610B (en) 2017-08-02 2020-08-21 北京瑞卓喜投科技发展有限公司 Copyright protection method, device and system based on block chain technology
US11481786B2 (en) 2017-10-03 2022-10-25 Sony Group Corporation Genuine instance of digital goods
US11063744B2 (en) * 2017-10-20 2021-07-13 Sap Se Document flow tracking using blockchain
US20190155997A1 (en) 2017-11-17 2019-05-23 1969329 Ontario Inc. Content licensing platform, system, and method
CN108053359A (en) 2017-12-07 2018-05-18 北京泛融科技有限公司 A kind of block chain embedding grammar of wavelet field watermark in image
CN108182349B (en) 2017-12-11 2021-08-24 江苏大学附属医院 A kind of Word document watermark copyright information protection device and method
CN108090329B (en) 2018-01-17 2022-02-22 上海海笛数字出版科技有限公司 Method and device for carrying out digital watermark encryption protection on text content
WO2019152535A1 (en) 2018-01-31 2019-08-08 Walmart Apollo, Llc System and method for a physical device authorizing digital copies
US10769252B2 (en) 2018-03-20 2020-09-08 Markany Inc. Method and apparatus for watermarking of digital content, method for extracting information
CN108550037B (en) * 2018-04-11 2022-05-17 北京知金链网络技术有限公司 File processing method and device based on block chain
CN108776941B (en) * 2018-04-13 2022-06-17 深圳市元征科技股份有限公司 Digital work copyright management method and system and block chain link point equipment
WO2019204094A1 (en) 2018-04-19 2019-10-24 Walmart Apollo, Llc Systems and methods for decentralized content distribution
KR101897032B1 (en) 2018-04-26 2018-09-10 이준엽 Apparatus and method for digital rights management using block chain
US11163860B2 (en) 2018-06-04 2021-11-02 International Business Machines Corporation Protecting deep learning models using watermarking
US10885159B2 (en) 2018-07-09 2021-01-05 Dish Network L.L.C. Content anti-piracy management system and method
CN109102305B (en) 2018-08-06 2022-03-29 程昔恩 Article anti-counterfeiting and tracing method realized by block chain and intelligent contract thereof
CN109344568A (en) 2018-09-25 2019-02-15 众安信息技术服务有限公司 Document handling method and device based on block chain
CN109409030A (en) 2018-10-19 2019-03-01 微梦创科网络科技(中国)有限公司 A digital copyright generation method and device
CN109614775A (en) 2018-11-20 2019-04-12 安徽大学 A protection framework and method for copyright traceability based on blockchain
CN109635521A (en) 2018-12-06 2019-04-16 中链科技有限公司 A kind of copyright protection based on block chain, verification method and device
CN109767375B (en) 2018-12-06 2022-12-13 北京北信源信息安全技术有限公司 Image watermark embedding and tracing method and system
CN109711120A (en) * 2018-12-17 2019-05-03 浙江大学 A digital resource infringement tracking method and system based on blockchain digital watermarking
CN109727134B (en) * 2018-12-29 2024-04-05 三六零科技集团有限公司 Picture copyright trading method and device
CN109766673B (en) 2019-01-18 2019-12-10 四川大学 A consortium-style audio and video copyright blockchain system and audio and video copyright on-chain method
CN109657426B (en) 2019-01-30 2023-08-15 贵州大学 Data tracing method based on digital signature and digital watermark

Also Published As

Publication number Publication date
EP3673453A4 (en) 2020-10-07
WO2019141294A2 (en) 2019-07-25
EP3673453B1 (en) 2021-12-01
EP3673453A2 (en) 2020-07-01
US11216898B2 (en) 2022-01-04
US10949936B2 (en) 2021-03-16
WO2019141294A3 (en) 2020-04-02
CN111164640B (en) 2023-12-12
CN111164640A (en) 2020-05-15
US20200372595A1 (en) 2020-11-26
US20210201430A1 (en) 2021-07-01

Similar Documents

Publication Publication Date Title
SG11202002748XA (en) Identifying copyrighted material using embedded copyright information
SG11202002708TA (en) Identifying copyrighted material using embedded copyright information
SG11202002417PA (en) Identifying copyrighted material using copyright information embedded in tables
SG11202002013SA (en) Identifying copyrighted material using embedded copyright information
SG11202001999UA (en) Identifying copyrighted material using embedded timestamped copyright information
SG11202002616QA (en) Identifying copyrighted material using copyright information embedded in electronic files
SG11202002847XA (en) Identifying copyrighted material using embedded copyright information
SG11202002700PA (en) Copyright protection based on hidden copyright information
IL287977A (en) Separation moieties and methods and use thereof
SG11202006078RA (en) Blockchain-based copyright revenue allocation methods and apparatuses
SG11202101984PA (en) Compositions and methods for enhancing triplex and nuclease-based gene editing
IL191810A (en) Dll4 antagonists and vegf inhibitor for use in methods for inhibiting tumor development or growth
EP2061255A4 (en) Information processing device and method
EP2157540A4 (en) Information processing device and information processing method
EP3250609A4 (en) Il13ra alpha 2 binding agents and use thereof in cancer treatment
ZA202003640B (en) Method and system for identifying users in two domains
IL206610A0 (en) Information distribution system and program for the same
EP2224928A4 (en) Novel seh inhibitors and their use
EP2120447A4 (en) Information processing device and method
IL200018A0 (en) Information processing device and program
ZA201002465B (en) Novel seh inhibitors and their use
EP2249237A4 (en) Information processing apparatus and program
EP2116923A4 (en) Information processing device and program
EP2217068A4 (en) NOVEL sEH INHIBITORS AND THEIR USE
GB202019710D0 (en) Addressable assets in software development