Sélection de la langue

Search

Sommaire du brevet 3165583 

Énoncé de désistement de responsabilité concernant l'information provenant de tiers

Une partie des informations de ce site Web a été fournie par des sources externes. Le gouvernement du Canada n'assume aucune responsabilité concernant la précision, l'actualité ou la fiabilité des informations fournies par les sources externes. Les utilisateurs qui désirent employer cette information devraient consulter directement la source des informations. Le contenu fourni par les sources externes n'est pas assujetti aux exigences sur les langues officielles, la protection des renseignements personnels et l'accessibilité.

Disponibilité de l'Abrégé et des Revendications

L'apparition de différences dans le texte et l'image des Revendications et de l'Abrégé dépend du moment auquel le document est publié. Les textes des Revendications et de l'Abrégé sont affichés :

  • lorsque la demande peut être examinée par le public;
  • lorsque le brevet est émis (délivrance).
(12) Demande de brevet: (11) CA 3165583
(54) Titre français: METHODE D'AJOUT DE FILIGRANE INVISIBLE TRACABLE A LA SOURCE ET APPAREIL CONNEXE
(54) Titre anglais: BACKTRACEABLE INVISIBLE WATERMARK ADDING METHOD AND APPARATUS THEREOF
Statut: Examen
Données bibliographiques
(51) Classification internationale des brevets (CIB):
  • G6T 1/00 (2006.01)
(72) Inventeurs :
  • CHENG, CHONG (Chine)
  • HU, MIN (Chine)
  • YANG, CHAOWEI (Chine)
(73) Titulaires :
  • 10353744 CANADA LTD.
(71) Demandeurs :
  • 10353744 CANADA LTD. (Canada)
(74) Agent: JAMES W. HINTONHINTON, JAMES W.
(74) Co-agent:
(45) Délivré:
(86) Date de dépôt PCT: 2019-09-20
(87) Mise à la disponibilité du public: 2020-06-25
Requête d'examen: 2022-09-16
Licence disponible: S.O.
Cédé au domaine public: S.O.
(25) Langue des documents déposés: Anglais

Traité de coopération en matière de brevets (PCT): Oui
(86) Numéro de la demande PCT: PCT/CN2019/106859
(87) Numéro de publication internationale PCT: CN2019106859
(85) Entrée nationale: 2022-06-21

(30) Données de priorité de la demande:
Numéro de la demande Pays / territoire Date
201811581075.8 (Chine) 2018-12-21

Abrégés

Abrégé français

L'invention concerne un procédé et un dispositif permettant d'ajouter un filigrane implicite traçable. Ledit procédé consiste : à sélectionner, sur une interface logicielle à laquelle doit être ajouté un filigrane, au moins une position à laquelle le filigrane doit être ajouté (S1); à construire de manière correspondante au moins un motif de filigrane implicite pour la position à laquelle le filigrane doit être ajouté, le motif de filigrane implicite comprenant des informations concernant un utilisateur de logiciel (S2); et à incorporer le motif de filigrane implicite dans la position à laquelle le filigrane doit être ajouté, de façon à acquérir une interface dans laquelle un filigrane implicite est intégré (S3). Ledit procédé génère un motif de filigrane implicite se conformant à une scène d'interface par la conception graphique d'un nombre ou d'une lettre prédéfini(e), cache celui-ci/celle-ci dans des éléments de scène existants dans l'interface, et affiche celui-ci/celle-ci avec la scène conjointement dans l'interface, de telle sorte que le filigrane implicite n'est pas perçu par un utilisateur. En outre, le motif de filigrane implicite comprend des informations concernant l'utilisateur de logiciel, un développeur peut identifier la source d'une fuite de confidentialité et trouver l'auteur de la fuite selon le motif de filigrane implicite, ce qui améliore l'efficacité de l'identification de source de fuite de confidentialité.


Abrégé anglais

A method and a device for adding a traceable implicit watermark. Said method comprises: selecting, on a software interface to which a watermark is to be added, at least one position to which the watermark is to be added (S1); correspondingly constructing at least one implicit watermark pattern for the position to which the watermark is to be added, the implicit watermark pattern comprising information about a software user (S2); and embedding the implicit watermark pattern into the position to which the watermark is to be added, so as to acquire an interface in which an implicit watermark is embedded (S3). Said method generates an implicit watermark pattern conforming to an interface scene by graphically designing a preset number or letter, hides same in existing scene elements in the interface, and displays same with the scene together in the interface, so that the implicit watermark is not perceived by a user. Furthermore, the implicit watermark pattern comprises information about the software user, a developer can trace to the source of privacy leakage and find the leaker according to the implicit watermark pattern, improving the efficiency of tracing to the source of privacy leakage.

Revendications

Note : Les revendications sont présentées dans la langue officielle dans laquelle elles ont été soumises.


CLAIMS
What is claimed is:
1. A backtraceable invisible watermark adding method, wherein comprising:
in a software interface to which a watermark is to be added, selecting at
least one location for the
watermark to be placed;
for the location for the watermark to be placed, building at least one
invisible watermark pattern
correspondingly, wherein the invisible watermark pattern includes information
of a software user;
and
embedding the invisible watermark pattern to the location for the watermark to
be placed, so as
to obtain the interface with the invisible watermark embedded therein.
2. The backtraceable invisible watermark adding method of claim 1, wherein the
step of in a
software interface to which a watermark is to be added, selecting at least one
location for the
watermark to be placed comprises:
selecting a background pattern of the software interface as the location for
the watermark to be
placed; and/or,
selecting a button in the software interface as the location for the watermark
to be placed; and/or,
selecting an icon in the software interface as the location for the watermark
to be placed.
3. The backtraceable invisible watermark adding method of claim 1 or 2,
wherein the step of for
the location for the watermark to be placed, building at least one invisible
watermark pattern
correspondingly comprises:
extracting the information of the software user, graphing the information of
the software user so
as to generate the invisible watermark pattern.
4. The backtraceable invisible watermark adding method of claim 3, wherein the
information of
the software user includes digits that forms a worker identification number of
the user, and the
14
Date Recue/Date Received 2022-06-21

step of graphing the information of the software user so as to generate the
invisible watermark
pattern comprises:
graphing digits 0 through 9 differently, so as to generate different first
images; and
according to a sequence of the digits of the worker identification number of
the user, rearranging
the first images, so as to generate the invisible watermark pattern
corresponding to the digits of
the worker identification number of the user.
5. The backtraceable invisible watermark adding method of claim 4, wherein the
step of graphing
the information of the software user further comprises:
predefining a second image for general use, rearranging the first images
according to the
sequence of the digits of the worker identification number of the user, and
adding the second
image into the rearranged images, so as to generate the invisible watermark
pattern corresponding
to the digits of the worker identification number of the user.
6. A backtraceable invisible watermark adding apparatus, wherein comprising:
a location acquiring module, for in a software interface to which a watermark
is to be added,
selecting at least one location for the watermark to be placed;
a watermark generating module, for the location for the watermark to be
placed, building at least
one invisible watermark pattern correspondingly, wherein the invisible
watermark pattern
includes information of a software user; and
a watermark embedding module, for embedding the invisible watermark pattern to
the location
for the watermark to be placed, so as to obtain the interface with the
invisible watermark
embedded therein.
7. The backtraceable invisible watermark adding apparatus of claim 6, wherein
the location
acquiring module is for:
selecting a background pattern of the software interface as the location for
the watermark to be
placed; and/or,
selecting a button in the software interface as the location for the watermark
to be placed; and/or,
Date Recue/Date Received 2022-06-21

selecting an icon in the software interface as the location for the watermark
to be placed.
8. The backtraceable invisible watermark adding apparatus of claim 6 or 7,
wherein the
watermark generating module comprises:
an information extracting unit, for extracting the information of the software
user;
a graphing unit, for graphing the information of the software user.
9. The backtraceable invisible watermark adding apparatus of claim 8, wherein
the graphing unit
comprises:
a converting sub-unit, for graphing digits 0 through 9 differently, so as to
generate different first
images; and
a rearranging sub-unit, for according to a sequence of the digits of the
worker identification
number of the user, rearranging the first images, so as to generate the
invisible watermark pattern
corresponding to the digits of the worker identification number of the user.
10. The backtraceable invisible watermark adding apparatus of claim 9, wherein
the graphing
unit further comprises:
a filling sub-unit, for predefining a second image for general use,
rearranging the first images
according to the sequence of the digits of the worker identification number of
the user, and adding
the second image into the rearranged images.
16
Date Recue/Date Received 2022-06-21

Description

Note : Les descriptions sont présentées dans la langue officielle dans laquelle elles ont été soumises.


CA 03165583 2022-06-21
BACKTRACEABLE INVISIBLE WATERMARK ADDING METHOD AND
APPARATUS THEREOF
BACKGROUND OF THE INVENTION
Technical Field
[0001] The present invention relates to the technical field of computers, and
more particularly to
a backtraceable invisible watermark adding method and an apparatus thereof.
Description of Related Art
[0002] Generally, for protecting sensitive privacy information, it is a common
practice that a
brand adds its exclusive watermarks into images or interfaces directly or
indirectly, so as
to prevent unauthorized use. In the event of unauthorized use or
dissemination, the
watermark can be helpful to identify the responsible disseminator. Without
such a
watermark, the responsible disseminator can only be identified through its
user name. If
the dissemination was made anonymously, more investigation has to be conducted
by
specialists at the back end.
[0003] However, adding such a watermark directly in the content can form
interference with
information display and thus is adverse in terms of esthetics. In addition, a
user anyway
wanting to avoid the tracking mechanism of the watermark may electronically
remove
the watermark. Even if the brand can track back to the initial disseminator
through IP
search, the process is time- and effort-consuming and costly. While the brand
may use a
watermark to carry a user ID so as to further deter a user from disseminating
sensitive
information, once the user removes the watermark in some manner before
dissemination,
it is still impossible for the brand to directly identify the information
disseminator. In this
case, to identify the initial disseminator, all involved parties have to be
questioned or all
1
Date Recue/Date Received 2022-06-21

CA 03165583 2022-06-21
involved IPs have to be checked, which process is also time- and effort-
consuming and
costly.
SUMMARY OF THE INVENTION
[0004] To solve the problems in the prior art, the present invention
embodiment provides a
backtraceable invisible watermark adding method and an apparatus thereof to
overcome
the shortcoming of the conventional solution of adding watermarks directly
into images
or software interfaces that the watermarks can esthetically interfere display
of information
and when removed by users can lead to a time- and effort-consuming and costly
process
of tracking unauthorized dissemination.
[0005] To solve the foregoing technical issues, the present invention adopts
the following
technical schemes.
[0006] In one aspect, the present invention provides a backtraceable invisible
watermark adding
method, which comprises the following steps:
[0007] in a software interface to which a watermark is to be added, selecting
at least one location
for the watermark to be placed;
[0008] for the location for the watermark to be placed, building at least one
invisible watermark
pattern correspondingly, wherein the invisible watermark pattern includes
information of
a software user; and
[0009] embedding the invisible watermark pattern to the location for the
watermark to be placed,
so as to obtain the interface with the invisible watermark embedded therein.
[0010] Further, the step of in a software interface to which a watermark is to
be added, selecting
at least one location for the watermark to be placed comprises:
[0011] selecting a background pattern of the software interface as the
location for the watermark
to be placed; and/or,
2
Date Recue/Date Received 2022-06-21

CA 03165583 2022-06-21
[0012] selecting a button in the software interface as the location for the
watermark to be placed;
and/or,
[0013] selecting an icon in the software interface as the location for the
watermark to be placed.
[0014] Further, the step of for the location for the watermark to be placed,
building at least one
invisible watermark pattern correspondingly comprises:
[0015] extracting the information of the software user, graphing the
information of the software
user so as to generate the invisible watermark pattern.
[0016] Further, the information of the software user includes digits that
forms a worker
identification number of the user, and the step of graphing the information of
the software
user so as to generate the invisible watermark pattern comprises:
[0017] graphing digits 0 through 9 differently, so as to generate different
first images; and
[0018] according to a sequence of the digits of the worker identification
number of the user,
rearranging the first images, so as to generate the invisible watermark
pattern
corresponding to the digits of the worker identification number of the user.
[0019] Further, the step of graphing the information of the software user
further comprises:
[0020] predefining a second image for general use, rearranging the first
images according to the
sequence of the digits of the worker identification number of the user, and
adding the
second image into the rearranged images, so as to generate the invisible
watermark
pattern corresponding to the digits of the worker identification number of the
user.
[0021] In another aspect, the present invention provides a backtraceable
invisible watermark
adding apparatus, which comprises:
[0022] a location acquiring module, for in a software interface to which a
watermark is to be
added, selecting at least one location for the watermark to be placed;
[0023] a watermark generating module, for the location for the watermark to be
placed, building
at least one invisible watermark pattern correspondingly, wherein the
invisible watermark
3
Date Recue/Date Received 2022-06-21

CA 03165583 2022-06-21
pattern includes information of a software user; and
[0024] a watermark embedding module, for embedding the invisible watermark
pattern to the
location for the watermark to be placed, so as to obtain the interface with
the invisible
watermark embedded therein.
[0025] Further, the location acquiring module is for:
[0026] selecting a background pattern of the software interface as the
location for the watermark
to be placed; and/or,
[0027] selecting a button in the software interface as the location for the
watermark to be placed;
and/or,
[0028] selecting an icon in the software interface as the location for the
watermark to be placed.
[0029] Further, the watermark generating module comprises:
[0030] an information extracting unit, for extracting the information of the
software user;
[0031] a graphing unit, for graphing the information of the software user.
[0032] Further, the graphing unit comprises:
[0033] a converting sub-unit, for graphing digits 0 through 9 differently, so
as to generate
different first images; and
[0034] a rearranging sub-unit, for according to a sequence of the digits of
the worker
identification number of the user, rearranging the first images, so as to
generate the
invisible watermark pattern corresponding to the digits of the worker
identification
number of the user.
[0035] Further, the graphing unit further comprises:
[0036] a filling sub-unit, for predefining a second image for general use,
rearranging the first
images according to the sequence of the digits of the worker identification
number of the
user, and adding the second image into the rearranged images.
4
Date Recue/Date Received 2022-06-21

CA 03165583 2022-06-21
[0037] The technical schemes of the embodiments of the present invention
provide the following
beneficial effects:
[0038] 1. The backtraceable invisible watermark adding method and its
apparatus of the
embodiments of the present invention graph predetermined digits or letters to
generate an
invisible watermark adapted to the interface scene, so that the watermark can
be hidden
in scene elements pre-existing in the interface and displayed with the scene
as a whole in
the interface in a manner that the invisible watermark is unperceivable to
users; and
[0039] 2. The backtraceable invisible watermark adding method and its
apparatus of the
embodiments of the present invention build invisible watermarks that can be
used in the
scene of interface of any software and hidden in the interface scene from user
perception,
and the invisible watermark patterns can carry information of software users,
so that in
the event of information privacy breach, the developer can backtrack the
breacher
according to invisible watermark pattern, thereby making privacy breach
backtracking
much more efficient.
BRIEF DESCRIPTION OF THE DRAWINGS
[0040] The accompanying drawings are provided herein for better understanding
of the present
invention and form a part of this disclosure. The illustrative embodiments and
their
descriptions are for explaining the present invention and by no means form any
improper
limitation to the present invention, wherein:
[0041] FIG. 1 is a flowchart of a backtraceable invisible watermark adding
method according to
one exemplary embodiment of the present invention; and
[0042] FIG. 2 is a structural diagram of a backtraceable invisible watermark
adding apparatus
according to one exemplary embodiment of the present invention.
Date Recue/Date Received 2022-06-21

CA 03165583 2022-06-21
DETAILED DESCRIPTION OF THE INVENTION
[0043] To make the foregoing objectives, features, and advantages of the
present invention
clearer and more understandable, the following description will be directed to
some
embodiments as depicted in the accompanying drawings to detail the technical
schemes
disclosed in these embodiments. It is, however, to be understood that the
embodiments
referred herein are only a part of all possible embodiments and thus not
exhaustive. Based
on the embodiments of the present invention, all the other embodiments can be
conceived
without creative labor by people of ordinary skill in the art, and all these
and other
embodiments shall be encompassed in the scope of the present invention.
[0044] FIG. 1 is a flowchart of a backtraceable invisible watermark adding
method according to
one exemplary embodiment of the present invention. As show, the method
comprises the
following steps.
[0045] Si: in a software interface to which a watermark is to be added,
selecting at least one
location for the watermark to be placed.
[0046] Specifically, the software interface for the watermark to be added is
analyzed so as to
properly select at least one location for the watermark to be placed in the
software
interface for the watermark to be added.
[0047] As a more preferred implementation, in the embodiment of the present
invention, one of
the following locations may be selected in the software interface for the
watermark to be
added as the location for the watermark to be placed:
[0048] selecting a background pattern of the software interface as the
location for the watermark
to be placed; and/or,
[0049] selecting a button in the software interface as the location for the
watermark to be placed;
6
Date Recue/Date Received 2022-06-21

CA 03165583 2022-06-21
and/or,
[0050] selecting an icon in the software interface as the location for the
watermark to be placed.
[0051] It is to be noted herein that, in the embodiment of the present
invention, the location for
the watermark to be placed is not limited to the foregoing three alternatives
and may be
any location in the software interface.
[0052] S2: for the location for the watermark to be placed, building at least
one invisible
watermark pattern correspondingly, wherein the invisible watermark pattern
includes
information of a software user.
[0053] Specifically, corresponding to the selected location for the watermark
to be placed, at
least one invisible watermark pattern is built. In particular, predetermined
digits or letters
or the like are graphically designed to generate a watermark form adapted to
the scene
elements of the software interface. The watermark form can be displayed
together with
the scene of the software interface in a manner that the watermark is
unperceivable to
users.
[0054] As a more preferred implementation, in the embodiment of the present
invention, the
information of the software user is first extracted and then graphed, so as to
generate the
invisible watermark pattern.
[0055] As a more preferred implementation, in the embodiment of the present
invention, the
information of the software user includes a worker identification number of
the user, and
the step of graphing the information of the software user so as to generate
the invisible
watermark pattern comprises:
[0056] graphing digits 0 through 9 differently, so as to generate different
first images; and
[0057] according to a sequence of the digits of the worker identification
number of the user,
rearranging the first images, so as to generate the invisible watermark
pattern
7
Date Recue/Date Received 2022-06-21

CA 03165583 2022-06-21
corresponding to the digits of the worker identification number of the user.
[0058] As a more preferred implementation, in the embodiment of the present
invention, the step
of graphing the information of the software user further comprises:
[0059] predefining a second image for general use, rearranging the first
images according to the
sequence of the digits of the worker identification number of the user, and
adding the
second image into the rearranged images, so as to generate the invisible
watermark
pattern corresponding to the digits of the worker identification number of the
user. It is to
be noted herein that the second image may be added to a specific location
according to
practical needs (for example, as a prefix or a suffix of the rearranged
images), or may be
added at any other location.
[0060] For example, for a scan-and-shop software, the invisible watermark
pattern of the present
invention may be designed into the form of a two-dimensional code. Assuming
that the
worker identification number of a user is a combination of 8 digits, each of
the digits is
first graphed depending on which it is in 0 through 9, so as to generate
different first
images. Then according to the sequence of the digits in the worker
identification number
of the user, the corresponding first images are rearranged into the form of a
two-
dimensional code. To be specific, the first images corresponding to the digits
in the
worker identification number of the user are arranged into a 3x3 matrix, so as
to generate
a combined image like a nine-square combination. Since the worker
identification
number of the user has only 8 digits, there will be a void image location.
Because a two-
dimensional code icon always includes an irregular image form at its lower
right corner,
an image for general use (i.e., the second image) may be designed and affixed
to the nine-
square combination images at the tail to join the combination, so that the
generated
invisible watermark pattern looks very similar to a two-dimensional code icon
to the
extent that the difference therebetween is basically unperceivable to naked
eyes.
Alternatively, the generated invisible watermark pattern may be sized to a
button in the
software interface and then added to a button to form a two-dimensional code
button.
8
Date Recue/Date Received 2022-06-21

CA 03165583 2022-06-21
[0061] When a user screenshots a page and shares the image to others, the
invisible watermark
pattern in the two-dimensional code will be sent out simultaneously, and the
user will
think it as a button of the two-dimensional code without awareness that there
is a
watermark. When an administrator finds that someone hold the unauthorized
screenshot
image containing product prices, the administrator can track back to the user
who shared
this image through the invisible watermark pattern in the two-dimensional code
in the
screenshot image, thereby conducing privacy breach backtracking.
[0062] The step S3 is about embedding the invisible watermark pattern to the
location for the
watermark to be placed, so as to obtain the interface with the invisible
watermark
embedded therein.
[0063] Specifically, the invisible watermark pattern is such hidden in the
existing scene of the
scene of the software interface that it is unperceivable to users.
Nevertheless, the
developer can easily recognize it. In the prior art, a backtracking process
after a privacy
breach can take hours or even days. By contrast, with the technical schemes of
the
embodiments of the present invention, such a process can be done in 1 to 2
minutes. In a
software interface, there may be plural locations for the watermark to be
placed. For
different locations for the watermark to be placed, the invisible watermark
pattern may
be embedded in different ways as further described below.
[0064] If the background pattern of the software interface is taken as the
location for the
watermark to be placed, the color of the invisible watermark pattern is
adjusted according
to the color of the background pattern, and the adjusted invisible watermark
pattern is
embedded into the background pattern, so that the invisible watermark pattern
is hidden
in the background pattern to the extent that the invisible watermark pattern
and the
background pattern fit in each other. For example, the color of the background
pattern is
of a solid color value #F8F8F8, and the color of the invisible watermark
pattern may be
9
Date Recue/Date Received 2022-06-21

CA 03165583 2022-06-21
adjusted to #F6F6F6, so when the invisible watermark pattern is embedded into
the
background pattern, users cannot tell the two apart with their eyes, yet the
watermark can
be easily read by a machine.
[0065] If a button in software interface is taken as the location for the
watermark to be placed,
the invisible watermark pattern is sized to the button, and the invisible
watermark pattern
is added to the array of buttons. For example, the digits in the worker
identification
number of the user are graphed to generate an invisible watermark pattern in
the form of
a two-dimensional code, and properly sized before placed into a button
location in the
software interface.
[0066] If an icon in software interface is taken as the location for the
watermark to be placed, the
invisible watermark pattern is adapted to the pattern form of an icon, so that
the invisible
watermark pattern can be hidden in the icon and become unperceivable to
general users.
The invisible watermark pattern carries the information of the registered
user. Therefore,
once the user involves privacy breach, he/she can be easily identified through
the invisible
watermark pattern. Therein, for practical implementations, the form of the
invisible
watermark pattern may be designed with one or more icons blended therein.
[0067] FIG. 2 is a structural diagram of a backtraceable invisible watermark
adding apparatus
according to one exemplary embodiment of the present invention. As shown, the
apparatus comprises:
[0068] a location acquiring module, for in a software interface to which a
watermark is to be
added, selecting at least one location for the watermark to be placed;
[0069] a watermark generating module, for the location for the watermark to be
placed, building
at least one invisible watermark pattern correspondingly, wherein the
invisible watermark
pattern includes information of a software user; and
[0070] a watermark embedding module, for embedding the invisible watermark
pattern to the
location for the watermark to be placed, so as to obtain the interface with
the invisible
Date Recue/Date Received 2022-06-21

CA 03165583 2022-06-21
watermark embedded therein.
[0071] As a more preferred implementation, in the embodiment of the present
invention, the
location acquiring module is specifically for:
[0072] selecting a background pattern of the software interface as the
location for the watermark
to be placed; and/or,
[0073] selecting a button in the software interface as the location for the
watermark to be placed;
and/or,
[0074] selecting an icon in the software interface as the location for the
watermark to be placed.
[0075] As a more preferred implementation, in the embodiment of the present
invention, the
watermark generating module comprises:
[0076] an information extracting unit, for extracting the information of the
software user; and
[0077] a graphing unit, for graphing the information of the software user.
[0078] As a more preferred implementation, in the embodiment of the present
invention, the
graphing unit comprises:
[0079] a converting sub-unit, for graphing digits 0 through 9 differently, so
as to generate
different first images; and
[0080] a rearranging sub-unit, for according to a sequence of the digits of
the worker
identification number of the user, rearranging the first images, so as to
generate the
invisible watermark pattern corresponding to the digits of the worker
identification
number of the user.
[0081] As a more preferred implementation, in the embodiment of the present
invention, the
graphing unit further comprises:
[0082] a filling sub-unit, for predefining a second image for general use,
rearranging the first
images according to the sequence of the digits of the worker identification
number of the
user, and adding the second image into the rearranged images.
11
Date Recue/Date Received 2022-06-21

CA 03165583 2022-06-21
[0083] To sum up, technical schemes of the embodiments of the present
invention provide the
following beneficial effects:
[0084] 1. The backtraceable invisible watermark adding method and its
apparatus of the
embodiments of the present invention graph predetermined digits or letters to
generate an
invisible watermark adapted to the interface scene, so that the watermark can
be hidden
in scene elements pre-existing in the interface and displayed with the scene
as a whole in
the interface in a manner that the invisible watermark is unperceivable to
users; and
[0085] 2. The backtraceable invisible watermark adding method and its
apparatus of the
embodiments of the present invention build invisible watermarks that can be
used in the
scene of interface of any software and hidden in the interface scene from user
perception,
and the invisible watermark patterns can carry information of software users,
so that in
the event of information privacy breach, the developer can backtrack the
breacher
according to invisible watermark pattern, thereby making privacy breach
backtracking
much more efficient.
[0086] It is to be noted that work division among the foregoing functional
modules for the
backtraceable invisible watermark adding apparatus of the present embodiment
to add
watermarks is merely exemplary. In practical implementations, the work
division may be
made among different functional modules. In other words, the internal
architecture of the
order-based phoning system may be reconfigured with different functional
modules to
perform all or a part of the functions as described previously. In addition,
since the
backtraceable invisible watermark adding apparatus of the present embodiment
and the
disclosed backtraceable invisible watermark adding method in the previous
embodiment
stem from the same conception, the details of its implementation can be
learned from the
description made to the method of the previous embodiment, and no repetition
is made
herein.
12
Date Recue/Date Received 2022-06-21

CA 03165583 2022-06-21
[0087] As will be appreciated by people of ordinary skill in the art,
implementation of all or a
part of the steps of the method of the present invention as described
previously may be
realized by having a program instruct related hardware components. The program
may
be stored in a computer-readable storage medium, and the program is about
performing
the individual steps of the methods described in the foregoing embodiments.
The storage
medium may be a ROM, a hard drive, an optical disk, or the like.
[0088] The preferred embodiments of the present invention described previously
are not intended
to limit the present invention. Any modification, equivalent replacement, and
improvement made under the spirit and principle of the present invention shall
be
embraces in the scope of the present invention.
13
Date Recue/Date Received 2022-06-21

Dessin représentatif
Une figure unique qui représente un dessin illustrant l'invention.
États administratifs

2024-08-01 : Dans le cadre de la transition vers les Brevets de nouvelle génération (BNG), la base de données sur les brevets canadiens (BDBC) contient désormais un Historique d'événement plus détaillé, qui reproduit le Journal des événements de notre nouvelle solution interne.

Veuillez noter que les événements débutant par « Inactive : » se réfèrent à des événements qui ne sont plus utilisés dans notre nouvelle solution interne.

Pour une meilleure compréhension de l'état de la demande ou brevet qui figure sur cette page, la rubrique Mise en garde , et les descriptions de Brevet , Historique d'événement , Taxes périodiques et Historique des paiements devraient être consultées.

Historique d'événement

Description Date
Modification reçue - modification volontaire 2024-04-29
Modification reçue - réponse à une demande de l'examinateur 2024-04-29
Inactive : Dem. de l'exam. art.85 Règles-Corr envoyée 2023-12-27
Rapport d'examen 2023-12-27
Inactive : Rapport - Aucun CQ 2023-12-21
Lettre envoyée 2023-02-08
Inactive : Correspondance - Poursuite 2022-12-23
Toutes les exigences pour l'examen - jugée conforme 2022-09-16
Requête d'examen reçue 2022-09-16
Exigences pour une requête d'examen - jugée conforme 2022-09-16
Lettre envoyée 2022-07-22
Demande reçue - PCT 2022-07-21
Exigences applicables à la revendication de priorité - jugée conforme 2022-07-21
Demande de priorité reçue 2022-07-21
Inactive : CIB attribuée 2022-07-21
Inactive : CIB en 1re position 2022-07-21
Exigences pour l'entrée dans la phase nationale - jugée conforme 2022-06-21
Demande publiée (accessible au public) 2020-06-25

Historique d'abandonnement

Il n'y a pas d'historique d'abandonnement

Taxes périodiques

Le dernier paiement a été reçu le 2023-12-15

Avis : Si le paiement en totalité n'a pas été reçu au plus tard à la date indiquée, une taxe supplémentaire peut être imposée, soit une des taxes suivantes :

  • taxe de rétablissement ;
  • taxe pour paiement en souffrance ; ou
  • taxe additionnelle pour le renversement d'une péremption réputée.

Les taxes sur les brevets sont ajustées au 1er janvier de chaque année. Les montants ci-dessus sont les montants actuels s'ils sont reçus au plus tard le 31 décembre de l'année en cours.
Veuillez vous référer à la page web des taxes sur les brevets de l'OPIC pour voir tous les montants actuels des taxes.

Historique des taxes

Type de taxes Anniversaire Échéance Date payée
TM (demande, 3e anniv.) - générale 03 2022-09-20 2022-06-21
Taxe nationale de base - générale 2022-06-21 2022-06-21
Rétablissement (phase nationale) 2022-06-21 2022-06-21
TM (demande, 2e anniv.) - générale 02 2021-09-20 2022-06-21
TM (demande, 4e anniv.) - générale 04 2023-09-20 2022-06-21
Requête d'examen - générale 2024-09-20 2022-09-16
TM (demande, 5e anniv.) - générale 05 2024-09-20 2023-12-15
Titulaires au dossier

Les titulaires actuels et antérieures au dossier sont affichés en ordre alphabétique.

Titulaires actuels au dossier
10353744 CANADA LTD.
Titulaires antérieures au dossier
CHAOWEI YANG
CHONG CHENG
MIN HU
Les propriétaires antérieurs qui ne figurent pas dans la liste des « Propriétaires au dossier » apparaîtront dans d'autres documents au dossier.
Documents

Pour visionner les fichiers sélectionnés, entrer le code reCAPTCHA :



Pour visualiser une image, cliquer sur un lien dans la colonne description du document (Temporairement non-disponible). Pour télécharger l'image (les images), cliquer l'une ou plusieurs cases à cocher dans la première colonne et ensuite cliquer sur le bouton "Télécharger sélection en format PDF (archive Zip)" ou le bouton "Télécharger sélection (en un fichier PDF fusionné)".

Liste des documents de brevet publiés et non publiés sur la BDBC .

Si vous avez des difficultés à accéder au contenu, veuillez communiquer avec le Centre de services à la clientèle au 1-866-997-1936, ou envoyer un courriel au Centre de service à la clientèle de l'OPIC.


Description du
Document 
Date
(yyyy-mm-dd) 
Nombre de pages   Taille de l'image (Ko) 
Revendications 2024-04-28 24 1 535
Page couverture 2022-10-17 1 61
Description 2022-06-20 13 547
Dessins 2022-06-20 1 46
Revendications 2022-06-20 3 115
Abrégé 2022-06-20 1 25
Dessin représentatif 2022-10-17 1 22
Modification / réponse à un rapport 2024-04-28 32 1 419
Courtoisie - Lettre confirmant l'entrée en phase nationale en vertu du PCT 2022-07-21 1 591
Courtoisie - Réception de la requête d'examen 2023-02-07 1 423
Demande de l'examinateur 2023-12-26 4 204
Demande d'entrée en phase nationale 2022-06-20 13 1 276
Rapport de recherche internationale 2022-06-20 9 310
Modification - Abrégé 2022-06-20 2 114
Traité de coopération en matière de brevets (PCT) 2022-06-20 1 40
Requête d'examen 2022-09-15 9 320
Correspondance de la poursuite 2022-12-22 4 151