Sign In to Follow Application
View All Documents & Correspondence

System And Method For Determining Ownership, And Regulating Digital Content Thereof

Abstract: The present subject matter refers to a system and method for determining an ownership and regulating a digital content in a social networking platform. The present subject matter includes receiving the digital content and a metadata associated with the digital content published by a first user at the social networking platform. Further, the digital content and the metadata is stored in a centralized database. The present subject matter includes generating an ownership chain of the digital content. Further, a copy of the digital content and the metadata associated with the copy of the digital content published by a second user at the social networking platform received and determined if the copy of the digital content is similar to the digital content already stored in the centralized database. The present subject matter provides determining the ownership of the digital content based on the ownership chain and regulating the digital content on the social networking platform, based on addition of the blocking tag. Figure 1

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
03 February 2022
Publication Number
31/2023
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

Comviva Technologies Limited
A-26, Info City, Sector 34, Gurgaon-122001, Haryana, India

Inventors

1. JAIN, Manish
43, Vasudha Enclave, Pitampura, Delhi – 110034, India
2. GOYAL, Gaurav
T8-001, CHD Avenue, Sector-71, Gurgaon – 122001, Haryana, India

Specification

The present disclosure relates to a system and method for determining ownership and regulating a digital content. In particular, the present invention relates to a method and system for regulating the digital content on a social media platform.
BACKGROUND
The use of internet and social media as tools for content delivery has dramatically increased in recent years. Therefore, the delivery of a digital content materials, for example music, videos, software, books, multi-media presentations, images, and other electronic media, over a network to one or more consumers has likewise increased dramatically. Users throughout the world are able to create the digital content, share digital content and earn money by creating and sharing such digital contents. The relationship between a social media platform such as Facebook, Twitter, Snapchat, etc. and the digital content is very symbiotic. The social media platforms may be like an empty book without the digital content and similarly, the digital content may lose its outreach in absence of the social media platforms. The digital content forms a main reason for users to access and perform meaningful actions on the social media platform. User behavior on the social media platform is by largely driven by the digital content. As said, the user may create, publish and propagate the digital content via the social media platform to increase outreach and widely circulate the digital content on the internet.
Apart from growing legit economic benefits of the digital content, there are several downsides of publishing, circulating and propagating the digital content too. There might be restrictive, unethical digital content which may form a root cause of social evils, such as fake news, insisting hatred in communities, hate speeches, explicit content, anti-national agendas, etc.
Once the user decides to circulate the digital content on social media platform, there is no stopping. This eventually creates a risk in popularizing even the restrictive digital content, which is against the moral, ethical standards of the society. The users may just keep pushing the restrictive digital content on internet via social media platforms with or without even realizing that the restrictive digital content is causing more social evil than adding any true value. The identification

and the decision to not to publish and popularize such restrictive digital content solely lies with the user and is a very manual driven process.
In the prior arts, generally, authorities, such as tribunals, government agencies, aware citizens, may choose to report the restrictive digital content. The social media platforms upon receiving reports from the users aware of the restrictive digital content, or government/ regulating agencies may choose to block publication of such restrictive digital content.
However, the process is manually driven that, the users may publish and propagate the restrictive digital content on any other social media platform, evading from the social media platform where it's currently blocked. Thus, government/regulating agencies must individually approach each social media platform to block such restrictive digital content. Thus, making it an intensely laborious, prone to mistakes tasks.
Also, there does not exist any technical solutions aiming to provide the government/regulating agencies about the real owner or creator or the first user publishing such restrictive digital content. This puts government/regulating agencies in a tight spot as the real culprit user creating and publishing restrictive digital content goes scot-free and might repeat restrictive activities.
Therefore, there exist a need to create a centralized, robust, system and method which may determine an ownership of the digital content and also provides techniques to regulate the digital contents being published, circulated on social media platform.
SUMMARY
This summary is provided to introduce a selection of concepts in a simplified format that are further described in the detailed description of the invention. This summary is not intended to identify key or essential inventive concepts of the invention, nor is it intended for determining the scope of the invention.
In an implementation, the present subject matter refers to a method for determining an ownership and regulating a digital content in a social networking platform. The method includes receiving the digital content and a metadata associated with the digital content published by a first user at the social networking platform. The method includes storing the digital content and the metadata in a centralized database. The method includes generating an ownership chain of the digital content based on addition of the first user in the ownership chain. The method includes receiving a copy of the digital content and the metadata associated with the copy of the digital

content published by a second user at the social networking platform. The method includes determining whether the copy of the digital content is similar to the digital content already stored in the centralized database. The method includes updating ownership chain of the digital content based on addition of the second user in the ownership chain upon determining similarity in the digital content and the copy of the digital content. The method includes determining the ownership of the digital content based on the ownership chain. The method further includes adding a blocking tag to the digital content if the digital content includes a restrictive content; and regulating the digital content on the social networking platform, based on addition of the blocking tag.
In an implementation, the present subject matter refers to a system for determining an ownership and regulating a digital content in a social networking platform. The system includes a centralized database in communication with a plurality of user devices. The system includes one or more processors is operatively coupled with a memory and in communication with the centralized database for receiving data. The system includes the one or more processors is configured to receive the digital content and a metadata associated with the digital content published by a first user at the social networking platform. The system includes the one or more processors is configured to store the digital content and the metadata in a centralized database; generate an ownership chain of the digital content based on addition of the first user in the ownership chain. Further, the system includes the one or more processors configured to receive a copy of the digital content and the metadata associated with the copy of the digital content published by a second user at the social networking platform. The system includes the one or more processors configured to determine whether the copy of the digital content is similar to the digital content already stored in the centralized database and update ownership chain of the digital content based on addition of the second user in the ownership chain upon determining similarity in the digital content and the copy of the digital content. The system includes the one or more processors is configured to determine the ownership of the digital content based on the generated ownership chain, add a blocking tag to the digital content if the digital content includes a restrictive content; and regulate the digital content on the social networking platform, based on addition of the blocking tag.
To further clarify the advantages and features of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawing. It is appreciated that these drawings depict only typical

embodiments of the invention and are therefore not to be considered limiting its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS
These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
Figure 1 illustrates a block diagram depicting an environment of implementation of a system for determining an ownership and regulating a digital content on a social media platform, according to an embodiment of the present disclosure;
Figure 2 illustrates method-steps for determining the ownership and regulating the digital content on the social media platform in accordance with an embodiment of the present disclosure;
Figure 3 illustrates an example implementation flow of a method of Fig. 2, in accordance with an embodiment of the present disclosure;
Figure 4 illustrates a system architecture in accordance with an embodiment of the present disclosure; and
Figure 5 illustrates another system architecture, in accordance with an embodiment of the present disclosure.
Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have been necessarily been drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the present invention. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having benefit of the description herein.
DETAILED DESCRIPTION
It should be understood at the outset that although illustrative implementations of the embodiments of the present disclosure are illustrated below, the present invention may be

implemented using any number of techniques, whether currently known or in existence. The present disclosure should in no way be limited to the illustrative implementations, drawings, and techniques illustrated below, including the exemplary design and implementation illustrated and described herein, but may be modified within the scope of the appended claims along with their full scope of equivalents.
The term "some" as used herein is defined as "none, or one, or more than one, or all." Accordingly, the terms "none," "one," "more than one," "more than one, but not all" or "all" would all fall under the definition of "some." The term "some embodiments" may refer to no embodiments or to one embodiment or to several embodiments or to all embodiments. Accordingly, the term "some embodiments" is defined as meaning "no embodiment, or one embodiment, or more than one embodiment, or all embodiments."
The terminology and structure employed herein is for describing, teaching and illuminating some embodiments and their specific features and elements and does not limit, restrict or reduce the spirit and scope of the claims or their equivalents.
More specifically, any terms used herein such as but not limited to "includes," "comprises," "has," "consists," and grammatical variants thereof do NOT specify an exact limitation or restriction and certainly do NOT exclude the possible addition of one or more features or elements, unless otherwise stated, and furthermore must NOT be taken to exclude the possible removal of one or more of the listed features and elements, unless otherwise stated with the limiting language "MUST comprise" or "NEEDS TO include."
Whether or not a certain feature or element was limited to being used only once, either way it may still be referred to as "one or more features" or "one or more elements" or "at least one feature" or "at least one element." Furthermore, the use of the terms "one or more" or "at least one" feature or element do NOT preclude there being none of that feature or element, unless otherwise specified by limiting language such as "there NEEDS to be one or more ..." or "one or more element is REQUIRED."
Unless otherwise defined, all terms, and especially any technical and/or scientific terms, used herein may be taken to have the same meaning as commonly understood by one having an ordinary skill in the art.

The present invention discloses a system and method for adjusting brightness on digital displays for optimum visibility and power consumption. In particular, the present invention relates to a method and system of optimum brightness calculation for displays with hindrance objects thereupon based on reflectance and transmittance through the hindrance surface as measured based on RNN based learning model. In a further embodiment, the present disclosure also allows display content adjustment with respect to a device moment in order to perform techniques such as Trace Drawing.
Embodiments of the present invention will be described below in detail with reference to the accompanying drawings.
Figure 1 illustrates a block diagram depicting an environment 100 of implementation of a system 110 for determining an ownership and regulating a digital content, according to an embodiment of the present disclosure. For the sake of brevity, the system 110 for determining an ownership and regulating a digital content is hereinafter interchangeably referred to as the system 110. Referring to Figure 1, the system 110 may be implemented between a social networking platform 108, 118 and an authorized user 122.
In an embodiment, the social networking platform 108, 118 are websites, applications or online platforms- operated by users. Users may interact and operate the social networking platform 108, 118 via user devices such as a desktop, a mobile, a laptop. Users may create and publish the digital content on the social networking platform 108, 118.
In an example, a first user 102 may publish the digital content 104 on the social networking platform 108. The social networking platform 108 may receive the user input through an application. The social networking platform 108 may include an application adapted to be installed in a communication device 106 of the first user 102. The communication device 106 may include, but is not limited to, a tablet PC, a Personal Digital Assistant (PDA), a mobile-device, a palmtop computer, a laptop computer, a desktop computer, a server, a cloud server, a remote server, a communications device, a wireless-telephone, or any other machine controllable through the wireless-network and capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
In the example, similarly a second user 112 may publish a copy of the digital content 114 on the social networking platform 118. The social networking platform 118 may include the application adapted to be installed in a user device 116 of the second user 112. The user device 116 may include, but is not limited to, the tablet PC, the Personal Digital Assistant (PDA), the

mobile-device, the palmtop computer, the laptop computer, the desktop computer, the server, the cloud server, the remote server, the communications device, the wireless-telephone, or any other machine controllable through the wireless-network and capable of executing the set of instructions (sequential or otherwise) that specify actions to be taken by that machine. In the example, the social networking platform 108, 118 may relate to the similar platform or may also relate to different platforms.
The social networking platform 108, 118 may be in communication with the system 110. The system 110 is configured to receive the digital content 104, the metadata associated with the digital content, the copy of the digital content 114 and the metadata associated with the copy of the digital content. In an embodiment, the system 110 may include a centralized database 120 configured to store the digital content 104, the copy of the digital content 114 and the associated metadata. In the embodiment, the system 110 is configured to optimize a memory-space of the centralized database 120 and may not store the copy of the digital content 114 upon finding similarity in the digital content 104 and the copy of the digital content 114.
In an example embodiment, the system 110 is in communication with an authorized user 122. The authorized user 122 is configured to access the system 110 and identify the digital content 104 for blocking. In the example, the authorized user 122 may add a blocking tag on the digital content 104 in the system 110. The system 110 thus in-turn communicate to the social networking platform 108, not to publish the digital content 104 on the social networking platform 108. In the example, upon finding similarity between the digital content 104 and the copy of the digital content 114 the system 110 may communicate the social networking platform 118 not to publish the copy of the digital content 114. In the example, the system 110 generates an ownership chain of the digital content 104. The ownership chain may indicate the first user 102 and its associated metadata to be included in the ownership chain. Further, the ownership chain is updated with the second user 112 and its associated metadata upon finding similarity between the digital content 104 and the copy of the digital content 114. In the example, the system 110 may determine ownership based on the ownership chain. The authorized user 122 may be able to view the determined ownership chain. The implementation details of the determining ownership and regulating the digital content 104 on the social networking platform 108, 118 shall be discussed in detail in the forthcoming paragraphs.
Figure 2 illustrates method-steps in accordance with an embodiment of the present disclosure.

In an implementation as depicted in Figure 2, the present subject matter refers to a method 200 for determining the ownership and regulating the digital content 104 in the social networking platform 108, 118 in the communication device 106, 116. The method 200 may be a computer-implemented method executed, for example, by the system 110. For the sake of brevity, constructional and operational features of the system 110 are already explained in the description of Figure 4, and Figure 5.
At step 202, the method 200 includes receiving the digital content 104 and the metadata associated with the digital content 104 published by the first user 102 on the social networking platform 108. In an example, the method 200 includes the first user 102 being desirous of publishing the digital content 104 on the social networking platform 108. The first user 102 may be a member of the social networking platform 108 and able to access the social networking platform 108 for publishing the digital content 104. The first user 102 may publish the digital content 104 thus making the digital content 104 visible to other users in network of the social networking platform 108.
In an embodiment, the method 200 includes the social networking platform 108 to send a notification to the first user 102. The notification sent to the first user 102 may include obtaining a permission from the first user 102 for storing and sharing the metadata associated with the digital content 104. The first user 102 may interact with the application installed on the first user device 106 to provide the permission or decline the permission. In an example, the first user 102 may not be able to publish the digital content 104 on the social networking platform 108 in case the first user 102 declines the permission for storing and sharing the metadata associated with the digital content 104. Further, once the permission is obtained from the first user 102, the digital content 104 may be published on the social networking platform 108 and the social networking platform 108 may communicate details to the system 110. In the example, the social networking platform 108 may always notify each of the user for obtaining the permission from each of the user for storing and sharing the metadata associated with the digital content 104.
At step 204, the method 200 includes storing the digital content 104 and the metadata in the centralized database 120. In an example, the method 200 includes the digital content 104 and the metadata associated with the digital content 104 which may be published by the first user 102 on the social networking platform 108 to be stored in the centralized database 120. In the example,

the centralized database 120 may be a distributed ledger network, a cloud storage to receive and store the digital content 104 and its associated metadata.
At step 206, the method 200 includes generating the ownership chain of the digital content 104 based on addition of the first user 102 in the ownership chain. In an example, the ownership chain is indicative of attributes associated with the first user 102 responsible for publishing the digital content 104 on the social networking platform 108. Such attributes in the ownership chain may establish that the first user 102 is connected with the digital content 102, say is responsible for publishing the digital content 104 on the social networking platform 108. In the example, publishing may include, posting the digital content 104, circulating the digital content 104, or dissemination of the digital content 104 on the social networking platform 108. In the example, the ownership chain is also stored in the centralized database 120. The ownership chain is associated with the digital content 104 and every other digital content may have its ownership chain thus, indicating users responsible and associated with publishing the respective digital content. In an example, the ownership chain associated with the digital content 104 may identify the first user 102 as the original publisher of the digital content 104 on the social networking platform 108. The ownership chain associated with the digital content 104 may also be updated with each user re-publishing the digital content 104 on the social networking platform 108. In an example, the ownership chain may be indicative of sequence of users and associated metadata of each user responsible for publishing the digital content 104 on the social networking platform 108, 118.
At step 208, the method 200 includes receiving the copy of the digital content 114. In an embodiment, the second user 112 may publish the copy of the digital content 114 on the social networking platform 118. In an example, the social networking platform 108, 118 may be similar platform or may be dissimilar. Similar to step of 202, the method 200 includes, notifying the second user 112 to obtain permission for storing and sharing the metadata associated with the copy of the digital content 114.
Thereafter, at step 210, the method 200 includes determining whether the copy of the digital content 114 is similar to the digital content 104. In an example, as the digital content 104 is stored in the centralized database 120, the copy of the digital content 114 received is matched with the digital content 104 stored in the centralized database 120. In an embodiment, content-matching techniques are implemented in the system 110 to find similarity between the digital

content 104 and the copy of the digital content 104. The method 200 includes, optimizing the memory space of the centralized database 120 and does not store multiple copies of the digital content 104. Therefore, the centralized database 120 may contain only a unique digital content 104. In an example, upon finding similarity between the digital content 104 and the copy of the digital content 114, the method 200 includes not storing the copy of the digital content 114 in the centralized database 120.
Thereafter, at step 212, the method 200 includes updating the ownership chain of the digital content 104. In an example, upon determining similarity in the digital content 104 and the copy of the digital content 114, the ownership chain of the digital content 104 is updated. In the example, the second user 112 is added to the ownership chain similar to the Step 206. In the example, the ownership chain now may include:
i) The attributes associated with the first user 102 responsible for publishing the
digital content 104 on the social networking platform 108; and
ii) The attributes associated with the second user 112 responsible for publishing the copy of the digital content 114, being similar to the digital content 104.
In the example, the updated ownership chain is stored in the centralized database 120. Further, the ownership chain associated with the digital content 104 may identify the second user 112 as the second publisher of the digital content 104 on the social networking platform 118. Similarly, the ownership chain associated with the digital content 104 may be updated with each user publishing the digital content 104 on the social networking platform 118.
In an example, the ownership chain may include each of the user in a sequential order indicating the first user 102 as the true first owner responsible for publishing the digital content 104 on the social networking platform 108. In another example, the ownership chain may include the second user 112 in the sequence, placed second to the first user 102 and responsible for publishing the copy of the digital content 114, wherein the copy of the digital content 114 being similar to the digital content 104, on the social networking platform 118.
At step 214, the method 200 includes determining the ownership of the digital content 104. In an example, the ownership of the digital content 104 may be indicative of each user associated with the digital content 104. In the example, each user responsible for publishing the digital

content 104 on the social networking platform 108, 118 may be indicated in the ownership of the digital content 104.
In an embodiment, the method 200 includes determination of the ownership of the digital content 104 on the basis of the ownership chain. In an example, the ownership chain includes attributes of each user responsible for publishing the digital content 104 on the social networking platform 108, 118 and is continuously updated in real-time with each user publishing the digital content 104, the ownership may be determined by values present in the ownership chain.
In an embodiment, the method 200 includes determining a number of time, the digital content 104 is downloaded and forwarded by each of the user associated with the digital content 104 based on the ownership chain. In an example, the digital content 104 may be downloaded and forwarded by each of the user from the social networking platform 108.
In the example, the number of time, the digital content 104 is downloaded and forwarded by each of the user from the social networking platform 108 is stored in the centralized database 120. Further, the centralized database 120 may transmit the number of time, the digital content 104 is downloaded and forwarded on real-time basis to the social networking platform 108, 118 respectively.
Further in an example, the social networking platform 108, 118 may provide an information icon to each of the user. In the example, the information icon may be provided on the digital content 104 published on the social networking platform 108, 118. In the example, the method 200 includes selecting the information icon and displaying a count indicative of the number of time the digital content is downloaded by each of the user associated with the digital content 104. In another example, the method 200 includes selecting the information icon and displaying a count indicative of the number of time the digital content is forwarded by each of the user associated with the digital content 104.
At step 216, the method 200 includes adding the blocking tag to the digital content 104. In an example, the authorized user 122 may add the blocking tag to the digital content 104 for notifying the social networking platform 108, 118, indicating that the digital content 104 may be a restrictive content. Thus, representing that the digital content 104 may not be published on the social networking platform 108, 118. In the example, the blocking tag may be indicative of a mark to prevent the digital content 104 from being published on the social networking platform 108,

118. In the example, the blocking tag may include the authorized user 122 providing an instruction indicative of restricting the publication of the digital content 104 on the social networking platform 108, 118.
In an embodiment, the method 200 includes the social networking platform 108, 118 upon receiving the blocking tag from the authorized user 122, notify each of the user that the digital content 104 is restrictive for publication. In an example, the method 200 includes the authorized user 122 adding the blocking tag on the digital content 104. Thus, the social networking platform 108, 118 receives request that said digital content 104 is restrictive content and not to be published. In the example, if the second user 112 attempts to publish the digital content 104, say on the social networking platform 118, the method 200 includes determining whether the digital content 104 exists in the centralized database 120. In the example, the method 200 includes upon identifying that the digital content 104 exists in the centralized database 120 and determining that the blocking tag is added by the authorized user 122, the second user 112 may not be able to publish said digital content 104, say on the social networking platform 118. In the example, the social networking platform 118 may send notification to the second user 112 indicating that said digital content 104 is restrictive and may not be published.
Thereafter, at step 218, the method 200 includes regulating the digital content 104 on the social networking platform 108, 118. In an example, the regulation of the digital content 104 is based on addition of the blocking tag by the authorized user 122.
In an embodiment, the method 200 includes restricting publication of the digital content 104 on the social networking platform 108, 118 based on the addition of the blocking tag. In an example, a communication is sent to the social networking platform 108, 118, indicating that the blocking tag is associated with said digital content 104. In an example, the social networking platform 108, 118 is thus instructed to restrict publication/re-publication of the digital content 104. In an example, the social networking platform 108, 118 may restrict the first user 102, and the second user 112 respectively, from publication of the digital content 104 with the blocking tag.
In another embodiment, the method 200 includes regulating the copy of the digital content 114 on the social networking platform 118. In an example, the method 200 includes determining similarity between the digital content 104 and the copy of the digital content 114 using content-matching techniques. In the example, if the digital content 104 is determined as similar with the

copy of the digital content 114, then further it is determined if the blocking tag is added on said digital content 104. In the example, re-publishing of the copy of the digital content 114 may be restricted on the social networking platform 118 upon determining that the blocking tag is associated with the digital content 104.
Figure 3 illustrates an example implementation flow of the method 200 of Fig. 2, in accordance with an embodiment of the present disclosure. Accordingly, the method 200 may be implemented in an interaction of four major blocks of implementation. Block 1 represents a userl 102 and a user_2 112, block 2 represents the social networking platform 108, 118, block 3 represents the authorized user 122 and the block 4 represents the system 110. The Implementation details of each of the blocks is shown in a system architecture at following figure 4 and 5. An explanation will be made with respect to figures 3. Further, similar reference numerals denoting corresponding features are consistently used throughout the figures for the sake of brevity in the preferred embodiment.
Referring to Figure 3, at step 302 includes the userl corresponding to the first user 102 desirous of publishing the digital content 104 on the social networking platform 108.
At step 304, the social networking platform 108 communicates with the system 110. The system 110 sends a notification to the social networking platform 108 to obtain permission from theuser_102.
At step 306, the system 110 may determine if the digital content 104 is similar to any other stored digital content in the centralized database 120. The system 110 may also determine if the received digital content 104 may include any blocking tag.
At step 308, the social networking platform 108 sends the notification to the userl 102 seeking permission for storing and sharing the metadata associated with the digital content 104.
At step 310, the userl 102 provides permission for storing and sharing the metadata associated with the digital content 104.
Thereafter the digital content 104 is published on the social networking platform 108.

At step 312, the system 110 receives the digital content 104 and its associated metadata published by the userl 102 on the social media platform 108. Also, at step 312, the social networking platform 108 may on the real-time basis keep sending information about publishing of the digital content 104 by each of the user.
At step 316, the authorized user 122 may validate the digital content 104 stored in the centralized database 120 of the system 110. The authorized user 122 may add the blocking tag on the digital content 104. In another example, the authorized user 122, may have user-based access to the system 110. In the example, the authorized user 122 may communicate with the system 110 and configured to upload the digital content 104, say the digital content 104 may be widely circulating over internet and the authorized user 122 may be inclined to add the blocking tag on said digital content 104 in the system 110. In the example, the system 110 receives the digital content 104, the associated blocking tag from the authorized user 122, and store in the centralized database 120. In the example, the system 110 may be configured to use the content-matching techniques and determine if the digital content 104 with the associated blocking tag is similar to the stored digital content in the centralized database 120. The system 110 upon identifying similarity between the stored digital content and the digital content 104 with the blocking tag as uploaded by the authorized user 122, may associate the blocking tag with the stored digital content. In the example, the system 110 may not store multiple copies of the digital content 104.
At step 318, the system 110 may send the communication to the social networking platform 108 indicating that the digital content 104 posted by the userl 102 contains the blocking tag. The system 110 may instruct the social networking platform 108 to restrict the publishing of the digital content 104 upon receiving instructions indicating addition of the blocking tag.
Now, at step 320, the user_2 112 may publish the digital content 104 the social networking platform 108.
At step 322, the social networking platform 108 sends the digital content 104 published by the user_2 112, on the system 110.
At step 324, the system 110 may determine if the digital content 104 exist in the centralized database or if there is any blocking tag added to the digital content 104.

At step 326, the system 110 may send the communication to the social networking platform 108 that the digital content 104 published by the user_2 112 contains the blocking tag added by the authorized user 122. In response, the social networking platform 108 may restrict the digital content 104 from re-publication.
At step 328, the social networking platform 108 may send a notification to the user_2 112 indicating that the digital content 104 contains the blocking tag and thus may not be published.
In another implementation, the social networking platform 118 may receive the copy of the digital content 114 from the user_2 112.
At step 332, the social networking platform 118 sends the copy of the digital content 114 to the system 110 for checking if the copy of the digital content 114 is already stored in the centralized database 120 of the system 110 or if any blocking tags are added to the copy of the digital content 114.
At step 334, the system 110 upon determining the copy of the digital content 114 is similar to the digital content 104, also determines that the blocking tag is added on the digital content 104. Thus, the system 110 sends the communication to the social networking platform 118 indicative of the blocking tag associated with the digital content 104. The system 110 further instructs the social networking platform 118 to restrict publication of the copy of the digital content 114 as it is similar to the digital content 104 with the blocking tag.
Thereafter, at step 336, the social networking platform 118 restricts the user_2 112 from publishing the copy of the digital content 114. Also, the social networking platform 118 may notify the user_2 112 that the copy of the digital content 114 is similar to digital content 104 and the blocking tag is associated with the digital content 104 as added by the authorized user 122, thus preventing it from publication.
In another implementation, at step 338, the userl 102 and user_2 112 may be provided with the information icon. The information icon may be provided in association with the digital content 104. The information icon may include the number of time, the digital content 104 is downloaded or forwarded by each of the user associated with the digital content 104. The userl 102 or the user_2 112 may select the information icon to view number of time, the digital content 104 is downloaded or forwarded on the social networking platform 108, 118 respectively. The

system may transmit number of time, the digital content 104 is downloaded or forwarded to the social networking platform 108, 118 respectively. Then, the social networking platform 108 provides the information icon to the userl 102 for viewing the number of times of download or forward over the social networking platform 108.
Similarly, the social networking platform 118 provides the information to user_2 112 for viewing the number of times of download or forward over the social networking platform 118.
Figure 4 illustrates a representative architecture 400 to provide tools and implementation environment described herein for a technical realization of the system 110 through a computing machine 402. Figure 4 is merely a non-limiting example, and it will be appreciated that many other architectures may be implemented to facilitate the functionality described herein. The architecture 400 may be executing on hardware such as the computing machine 402 of Fig. 4 that includes, among other things, processors, memory, and various application-specific hardware components.
The architecture 400 may include an operating-system, libraries, frameworks or middleware. The operating system may manage hardware resources and provide common services. The operating system may include, for example, a kernel, services, and drivers defining a hardware interface layer. The drivers may be responsible for controlling or interfacing with the underlying hardware. For instance, the drivers may include display drivers, camera drivers, Bluetooth® drivers, flash memory drivers, serial communication drivers (e.g., Universal Serial Bus (USB) drivers), Wi-Fi® drivers, audio drivers, power management drivers, and so forth depending on the hardware configuration.
A hardware interface layer includes libraries which may include system libraries such as filesystem (e.g., C standard library) that may provide functions such as memory allocation functions, string manipulation functions, mathematic functions, and the like. In addition, the libraries may include API libraries such as audio-visual media libraries (e.g., multimedia data libraries to support presentation and manipulation of various media format such as MPEG4, H.264, MP3, AAC, AMR, JPG, PNG), database libraries (e.g., SQLite that may provide various relational database functions), web libraries (e.g., WebKit that may provide web browsing functionality), and the like.
A middleware may provide a higher-level common infrastructure such as various graphic user interface (GUI) functions, high-level resource management, high-level location services, and

so forth. The middleware may provide a broad spectrum of other APIs that may be utilized by the applications or other software components/modules, some of which may be specific to a particular operating system or platform.
The term "module" used in this disclosure may refer to a certain unit that includes one of hardware, software and firmware or any combination thereof. The module may be interchangeably used with unit, logic, logical block, component, or circuit, for example. The module may be the minimum unit, or part thereof, which performs one or more particular functions. The module may be formed mechanically or electronically. For example, the module disclosed herein may include at least one of ASIC (Application-Specific Integrated Circuit) chip, FPGAs (Field-Programmable Gate Arrays), and programmable-logic device, which have been known or are to be developed.
Further, the architecture 400 includes the system 110 implemented in the computing machine 402. The computing machine 402 may include the centralized database 120 in communication with plurality of the user devices 106, 116. The computing machine 402 may include the processor 406 in communication with the centralized database 120 and operatively coupled with a memory. The processor 406 is configured to receive the digital content 104 and the metadata associated with the digital content 104 published by the first user 102 at the social networking platform 106.
In an example, the processor 406 is configured to store the digital content 104 and the metadata in the centralized database 120. In the example, the centralized database 120 may be in communication with a cloud 408 for storing the digital content 104. In the example, the processor 406 is configured to send a notification to the user to obtain a permission from each of the user for storing and sharing the metadata associated with the digital content 104. In the example, the permission is obtained from each of the user and the digital content 104 is published on the social networking platform 108, 118 respectively.
In an example, the processor 406 is configured to generate an ownership chain of the digital content 104. In the example, the ownership chain is generated based on addition of the first user 102 in the ownership chain.
In an example, the processor 406 is configured to receive a copy of the digital content 114 and the metadata associated with the copy of the digital content 114 published by the second user 112 at the social networking platform 118.

In an example, the processor 406 is configured to determine whether the copy of the digital 114 content is similar to the digital content 104 already stored in the centralized database 120. In the example, the processor 406 is configured to determine similarity in the digital content 104 and the copy of the digital content 114 and update ownership chain of the digital content 104 based on addition of the second user 112 in the ownership chain. In the example, the processor 406 is configured to add the metadata associated with each of the user publishing the digital content 104 on the social networking platform 108, 118 in the ownership chain. Further, the ownership chain of the digital content 104 is updated based on each of the user publishing the digital content 104.
In an example, the processor 406 is configured to optimize the memory-space of the centralized database 120. In the example the copy of the digital content 114 is rejected to be stored upon finding similarity in the digital content 104 and the copy of the digital content 114.
In an example, the processor 406 is configured to determine the ownership of the digital content 104 based on the generated ownership chain. In the example, the processor 406 is further configured to determine the number of time, the digital content is downloaded or forwarded by each of the user associated with the digital content 104 based on the ownership chain. In the example, the processor 406 is configured to transmit the number of time, the digital content is downloaded and forwarded on real-time basis to the social networking platform 108, 118 respectively. In the example the transmission includes providing an information icon on the digital content 104 published on the social networking platform 108, 118. Further, the information icon may be selected thus displaying a count indicative of the number of time the digital content is downloaded or forwarded by each of the user associated with the digital content 104.
In an example, the processor 406 is configured to add the blocking tag to the digital content 104 if the digital content includes a restrictive content may regulate the digital content 104 on the social networking platform 108, 118, based on addition of the blocking tag. In the example, the authorized user 120 may add the blocking tag to the digital content 104. The system 110 may receive the blocking tag from the authorized user 120 through the application 402. The blocking tag may be indicative of the instruction for restricting the publication of the digital content on the social networking platform. The system 110 may include the application 402 adapted to be installed in the computing machine 402. The application 402 may be adapted to provide the authorized user 120 an interface scheming the centralized database 120 and provide the processor 406 with necessary instructions. The application 402 is in communication with the processor 406.

In an example, the processor 406 is configured to regulate the digital content 104. In the example, the digital content 104 is restricted to be published on the social networking platform 108, 118 based on the addition of the blocking tag associated with the digital content 104. In the example, the processor 406 is configured to send the communication to the social networking platform 108, 118, indicative of the blocking tag associated with the digital content 108 and instruct the social networking platform 108, 118 to restrict re-publication of the digital content 104, on the social networking platform 108, 118.
In another example, the processor 406 is configured to determine similarity between the digital content 104 and the copy of the digital content 114 using content-matching techniques. Further, the processor 406 determines if the blocking tag is added on the digital content 104 and restrict re-publishing of the copy of the digital content 114.
Figure 5 illustrates another system architecture of the system 110 in the form of a computer system 5500. The computer system 5500 can include a set of instructions that can be executed to cause the computer system 5500 to perform any one or more of the methods disclosed. The computer system 5500 may operate as a standalone device or may be connected, e.g., using a network, to other computer systems or peripheral devices.
In a networked deployment, the computer system 5500 may operate in the capacity of a server or as a client user computer in a server-client user network environment, or as a peer computer system in a peer-to-peer (or distributed) network environment. The computer system 5500 can also be implemented as or incorporated across various devices, such as a personal computer (PC), a tablet PC, a personal digital assistant (PDA), a mobile device, a palmtop computer, a laptop computer, a desktop computer, a communications device, a wireless telephone, a land-line telephone, a web appliance, a network router, switch or bridge, or any other machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. Further, while a single computer system 5500 is illustrated, the term "system" shall also be taken to include any collection of systems or sub-systems that individually or jointly execute a set, or multiple sets, of instructions to perform one or more computer functions.
The computer system 5500 may include the processor 406 e.g., a central processing unit (CPU), a graphics processing unit (GPU), or both. The processor 406 may be a component in a variety of systems. For example, the processor 406 may be part of a standard personal computer

or a workstation. The processor 406 may be one or more general processors, digital signal processors, application-specific integrated circuits, field-programmable gate arrays, servers, networks, digital circuits, analog circuits, combinations thereof, or other now known or later developed devices for analyzing and processing data. The processor 406 may implement a software program, such as code generated manually (i.e., programmed).
The computer system 5500 may include a memory 5504, such as a memory 5504 that can communicate via a bus 5508. The memory 5504 may include but is not limited to computer-readable storage media such as various types of volatile and non-volatile storage media, including but not limited to random access memory, read-only memory, programmable read-only memory, electrically programmable read-only memory, electrically erasable read-only memory, flash memory, magnetic tape or disk, optical media and the like. In one example, memory 5504 includes a cache or random-access memory for the processor 406. In alternative examples, the memory 5504 is separate from the processor 406, such as a cache memory of a processor, the system memory, or other memory. The memory 5504 may be an external storage device or database for storing data. The memory 5504 is operable to store instructions executable by the processor 406. The functions, acts or tasks illustrated in the figures or described may be performed by the programmed processor 406 for executing the instructions stored in the memory 5504. The functions, acts or tasks are independent of the particular type of instructions set, storage media, processor or processing strategy and may be performed by software, hardware, integrated circuits, firmware, micro-code and the like, operating alone or in combination. Likewise, processing strategies may include multiprocessing, multitasking, parallel processing and the like.
As shown, the computer system 5500 may or may not further include a display unit 5510, such as a liquid crystal display (LCD), an organic light-emitting diode (OLED), a flat panel display, a solid-state display, a cathode ray tube (CRT), a projector, a printer or other now known or later developed display device for outputting determined information. The display 5510 may act as an interface for the user to see the functioning of the processor 406, or specifically as an interface with the software stored in the memory 5504 or the drive unit 5516.
Additionally, the computer system 5500 may include an input device 5512 configured to allow the user to interact with any of the components of system 5500. The computer system 5500 may also include a disk or optical drive unit 5516. The disk drive unit 5516 may include a computer-readable medium 5522 in which one or more sets of instructions 5524, e.g., software,

can be embedded. Further, the instructions 5524 may embody one or more of the methods or logic as described. In a particular example, the instructions 5524 may reside completely, or at least partially, within the memory 5504 or within the processor 406 during execution by the computer system 5500.
The present invention contemplates a computer-readable medium that includes instructions 5524 or receives and executes instructions 5524 responsive to a propagated signal so that a device connected to a network 5526 can communicate voice, video, audio, images, or any other data over the network 5526. Further, the instructions 5524 may be transmitted or received over the network 5526 via a communication port or interface 5520 or using a bus 5508. The communication port or interface 5520 may be a part of the processor 406 or maybe a separate component. The communication port 5520 may be created in software or maybe a physical connection in hardware. The communication port 5520 may be configured to connect with a network 5526, external media, the display 5510, or any other components in system 5500, or combinations thereof. The connection with the network 5526 may be a physical connection, such as a wired Ethernet connection or may be established wirelessly as discussed later. Likewise, the additional connections with other components of the system 5500 may be physical or may be established wirelessly. The network 5526 may alternatively be directly connected to the bus 5508.
The network 5526 may include wired networks, wireless networks, Ethernet AVB networks, or combinations thereof. The wireless network may be a cellular telephone network, an 802.11, 802.16, 802.20, 802.1Q or WiMax network. Further, the network 5526 may be a public network, such as the Internet, a private network, such as an intranet, or combinations thereof, and may utilize a variety of networking protocols now available or later developed including, but not limited to TCP/IP based networking protocols. The system is not limited to operation with any particular standards and protocols. For example, standards for Internet and other packet-switched network transmissions (e.g., TCP/IP, UDP/IP, HTML, and HTTP) may be used.
While specific language has been used to describe the disclosure, any limitations arising on account of the same are not intended. As would be apparent to a person in the art, various working modifications may be made to the method in order to implement the inventive concept as taught herein.

The drawings and the forgoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, orders of processes described herein may be changed and are not limited to the manner described herein.
Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts necessarily need to be performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples. Numerous variations, whether explicitly given in the specification or not, such as differences in structure, dimension, and use of material, are possible. The scope of embodiments is at least as broad as given by the following claims.
Benefits, other advantages, and solutions to problems have been described above with regard to specific embodiments. However, the benefits, advantages, solutions to problems, and any component(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential feature or component of any or all the.

claims.

The present invention provides following advantages:
1. The authorities such as government, legal institutions may stop restricted digital contents from circulating on the web.
2. The authorities may be able to determine the true and first owner responsible for creating and propagating the restricted digital content.
3. The authorities may be able to stop the restricted digital content from being circulated on multiple social networking platforms.
4. The authorities do not require to keep a manual check on the circulation of the restricted digital content. Once, the system identifies the restricted digital content it may not allow such restricted digital content to be ever published on any social networking platforms.
5. Other users become aware of the restricted digital content.

CLAIM:
1. A method (200) for determining an ownership, and regulating a digital content in a social
networking platform, the method comprising:
receiving the digital content and a metadata associated with the digital content published by a first user at the social networking platform;
storing the digital content and the metadata in a centralized database;
generating an ownership chain of the digital content based on addition of the first user in the ownership chain;
receiving a copy of the digital content and the metadata associated with the copy of the digital content published by a second user at the social networking platform;
determining whether the copy of the digital content is similar to the digital content already stored in the centralized database;
updating ownership chain of the digital content based on addition of the second user in the ownership chain upon determining similarity in the digital content and the copy of the digital content;
determining the ownership of the digital content based on the ownership chain;
adding a blocking tag to the digital content if the digital content includes a restrictive content; and
regulating the digital content on the social networking platform, based on addition of the blocking tag.
2. The method (200) as claimed in claim 1, wherein publishing the digital content on the
social networking platform comprises:
sending a notification to the social networking platform to obtain a permission from each of the user for storing and sharing the metadata associated with the digital content;
obtaining by the social networking platform, the permission from each of the user;

receiving the permission from the social networking platform; and
publishing the digital content on the social networking platform upon obtaining the permission.
The method (200) as claimed in claim 1, wherein generating the ownership chain of the digital content comprises:
adding in the ownership chain, the metadata associated with each of the user publishing the digital content on the social networking platform; and
updating the ownership chain of the digital content based on each of the user publishing the digital content on the social networking platform.
The method (200) as claimed in claim 1, further comprises:
determining a number of time, the digital content is downloaded by each of the user associated with the digital content based on the ownership chain;
determining a number of time, the digital content is forwarded by each of the user associated with the digital content based on the ownership chain;
transmitting the number of time, the digital content is downloaded and forwarded on real-time basis to the social networking platform, the transmission comprises:
providing an information icon on the digital content published on the social networking platform;
selecting the information icon;
displaying a count indicative of the number of time the digital content is downloaded by each of the user associated with the digital content;
displaying a count indicative of the number of time the digital content is forwarded by each of the user associated with the digital content.
The method (200) as claimed in claim 1, wherein adding the blocking tag associated with the digital content comprises:
receiving from an authorized user an instruction indicative of restricting the publication of the digital content on the social networking platform.

6. The method (200) as claimed in claim 1, wherein regulating the digital content
comprises:
restricting publication of the digital content on the social networking platform based on the addition of the blocking tag associated with the digital content comprises;
sending a communication, to the social networking platform, indicative of the blocking tag associated with the digital content; and
instructing the social networking platform to restrict re-publication of the digital content, on the social networking platform.
7. The method (200) as claimed in claim 6, wherein the social networking platform further comprises: restricting re-publication of the digital content, by each of the user based on the addition of the blocking tag associated with the digital content.
8. The method (200) as claimed in claim 7, further comprises:
sending a notification to the second user by the social networking platform, upon determining similarity in the digital content and the copy of the digital content.
9. The method (200) as claimed in claim 1, wherein regulating the copy of the digital
content on the social networking platform comprises:
determining similarity between the digital content and the copy of the digital content using content-matching techniques;
determining if the blocking tag is added on the digital content, if the digital content is determined as similar with the copy of the digital content; and
restricting re-publishing of the copy of the digital content upon determining the blocking tag associated with the digital content.
10. The method (200) as claimed in claim 1, further comprises optimizing a memory-space
of the centralized database, the optimizing the memory-space comprises:
rejecting to store the copy of the digital content upon finding similarity in the digital content and copy of the digital content.
11. A system (110) for determining an ownership, and regulating a digital content in a social
networking platform, the system (110) comprising:

a centralized database (120) in communication with a plurality of user devices (106,116);
one or more processors (406) is operatively coupled with a memory and in communication with the centralized database (120) for receiving data, the one or more processors (406) is configured to:
receive the digital content and a metadata associated with the digital content published by a first user at the social networking platform;
store the digital content and the metadata in a centralized database;
generate an ownership chain of the digital content based on addition of the first user in the ownership chain;
receive a copy of the digital content and the metadata associated with the copy of the digital content published by a second user at the social networking platform;
determine whether the copy of the digital content is similar to the digital content already stored in the centralized database;
update ownership chain of the digital content based on addition of the second user in the ownership chain upon determining similarity in the digital content and the copy of the digital content;
determine the ownership of the digital content based on the generated ownership chain;
add a blocking tag to the digital content if the digital content includes a restrictive content; and
regulate the digital content on the social networking platform, based on addition of the blocking tag.
12. The system (110) as claimed in claim 11, wherein the one or more processors (406) for publishing the digital content on the social networking platform is configured to:
send a notification to the social networking platform, to obtain a permission from each of the user for storing and sharing the metadata associated with the digital content;

the social networking platform obtain the permission from each of the user;
receive the permission from the social networking platform; and
publish the digital content on the social networking platform upon receiving the permission.
13. The system (110) as claimed in claim 11, wherein the one or more processors (406) for
generating the ownership chain of the digital content is configured to:
add in the ownership chain, the metadata associated with each of the user publishing the digital content on the social networking platform; and
update the ownership chain of the digital content based on each of the user publishing the digital content on the social networking platform.
14. The system (110) as claimed in claim 11, wherein the one or more processors (406) is
further configured to:
determine a number of time, the digital content is downloaded by each of the user associated with the digital content based on the ownership chain;
determine a number of time, the digital content is forwarded by each of the user associated with the digital content based on the ownership chain;
transmit the number of time, the digital content is downloaded and forwarded on real-time basis to the social networking platform, the transmission comprising:
provide an information icon on the digital content published on the social networking platform;
select the information icon;
display a count indicative of the number of time the digital content is downloaded by each of the user associated with the digital content;
display a count indicative of the number of time the digital content is forwarded by each of the user associated with the digital content.

15. The system (110) as claimed in claim 11, wherein the one or more processors (406) is
configured for adding the blocking tag associated with the digital content is configured
to:
receive from an authorized user an instruction indicative of restricting the publication of the digital content on the social networking platform.
16. The system (110) as claimed in claim 11, wherein the one or more processors (406) is
configured for regulating the digital content is configured to:
restrict publication of the digital content on the social networking platform based on the addition of the blocking tag associated with the digital content;
send a communication, to the social networking platform, indicative of the blocking tag associated with the digital content; and
instruct the social networking platform to restrict re-publication of the digital content, on the social networking platform.
17. The system (110) as claimed in claim 16, wherein the one or more processors (406) is
further configured to:
send a notification to the second user by the social networking platform, upon determining similarity in the digital content and the copy of the digital content.
18. The system (110) as claimed in claim 11, wherein the one or more processors (406) is
configured to regulate the copy of the digital content on the social networking platform,
comprising:
determine similarity between the digital content and the copy of the digital content using content-matching techniques;
determine if the blocking tag is added on the digital content, if the digital content is determined as similar with the copy of the digital content; and
restrict re-publishing of the copy of the digital content upon determining the blocking tag associated with the digital content.
19. The system (110) as claimed in claim 11, wherein the one or more processors (406) is
further configured to optimize a memory-space of the centralized database comprising:

reject to store the copy of the digital content upon finding similarity in the digital content and copy of the digital content.

The present subject matter refers to a system and method for determining an ownership and regulating a digital content in a social networking platform. The present subject matter includes receiving the digital content and a metadata associated with the digital content published by a first user at the social networking platform. Further, the digital content and the metadata is stored in a centralized database. The present subject matter includes generating an ownership chain of the digital content. Further, a copy of the digital content and the metadata associated with the copy of the digital content published by a second user at the social networking platform received and determined if the copy of the digital content is similar to the digital content already stored in the centralized database. The present subject matter provides determining the ownership of the digital content based on the ownership chain and regulating the digital content on the social networking platform, based on addition of the blocking tag.

Documents

Application Documents

# Name Date
1 202211005885-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [03-02-2022(online)].pdf 2022-02-03
2 202211005885-STATEMENT OF UNDERTAKING (FORM 3) [03-02-2022(online)].pdf 2022-02-03
3 202211005885-POWER OF AUTHORITY [03-02-2022(online)].pdf 2022-02-03
4 202211005885-FORM 1 [03-02-2022(online)].pdf 2022-02-03
5 202211005885-DRAWINGS [03-02-2022(online)].pdf 2022-02-03
6 202211005885-DECLARATION OF INVENTORSHIP (FORM 5) [03-02-2022(online)].pdf 2022-02-03
7 202211005885-COMPLETE SPECIFICATION [03-02-2022(online)].pdf 2022-02-03
8 202211005885-Proof of Right [02-08-2022(online)].pdf 2022-08-02
9 202211005885-REQUEST FOR CERTIFIED COPY [01-02-2023(online)].pdf 2023-02-01
10 202211005885-FORM 3 [24-04-2023(online)].pdf 2023-04-24
11 202211005885-FORM-8 [09-08-2023(online)].pdf 2023-08-09
12 202211005885-FORM 18 [26-10-2023(online)].pdf 2023-10-26
13 202211005885-FER.pdf 2025-04-01
14 202211005885-FORM 3 [04-04-2025(online)].pdf 2025-04-04
15 202211005885-OTHERS [12-06-2025(online)].pdf 2025-06-12
16 202211005885-FER_SER_REPLY [12-06-2025(online)].pdf 2025-06-12
17 202211005885-DRAWING [12-06-2025(online)].pdf 2025-06-12
18 202211005885-CLAIMS [12-06-2025(online)].pdf 2025-06-12

Search Strategy

1 Search_202211005885E_22-03-2024.pdf