G06F21/10

SYSTEM FOR ELECTRONIC STORAGE OF ELECTRONIC DIGITAL CERTIFICATES ASSOCIATED WITH UNIQUE RESOURCES
20230008345 · 2023-01-12 · ·

Systems, computer program products, and methods are described herein for storing electronic digital certificates associated with unique resources on a digital platform. The present invention is configured to electronically receive, from a computing device of a user, unique resource data, wherein the unique resource is either digital or physical, retrieve one or more electronic digital certificates associated with the unique resource, receive a request for rights to the electronic digital certificate associated with the unique resource from a second user, initiate a resource transfer, and update the electronic digital certificate on a distributed ledger to record the rights of the second user to the unique resource.

Secure DRM-agnostic key rotation
11550882 · 2023-01-10 · ·

Systems and methods for managing provisioning of keys prior to a key rotation are provided. A license server generates a license that is associated with a renewal time. The renewal time is a time that is prior to a key rotation time, and triggers a receiver device to send a renewal request prior to the key rotation time. The renewal time may be a randomized time prior to the key rotation time that differs for different receiver devices. The license is transmitted to the receiver device. The license server then receives a renewal request from the receiver device that is triggered at the renewal time. The license server generates a next license that comprises a next key, whereby the next key is a decryption key for decrypting the encrypted signal after the key rotation time. The next license is transmitted to the receiver device prior to the key rotation time.

Secure DRM-agnostic key rotation
11550882 · 2023-01-10 · ·

Systems and methods for managing provisioning of keys prior to a key rotation are provided. A license server generates a license that is associated with a renewal time. The renewal time is a time that is prior to a key rotation time, and triggers a receiver device to send a renewal request prior to the key rotation time. The renewal time may be a randomized time prior to the key rotation time that differs for different receiver devices. The license is transmitted to the receiver device. The license server then receives a renewal request from the receiver device that is triggered at the renewal time. The license server generates a next license that comprises a next key, whereby the next key is a decryption key for decrypting the encrypted signal after the key rotation time. The next license is transmitted to the receiver device prior to the key rotation time.

Image tracing system and method
11574002 · 2023-02-07 · ·

A method includes tagging, by at least one processor, one or more three-dimensional assets with a unique identifier and storing the one or more three-dimensional assets in a database, creating, by the at least one processor, a three-dimensional model based on the one or more three-dimensional assets and loading the three-dimensional model in a simulator, generating, by the at least one processor, a two-dimensional image that is a representation of the three-dimensional model in the simulator, the two-dimensional image comprising metadata that includes each unique identifier for each three-dimensional asset of the three-dimensional model displayed in the two-dimensional image, and assigning, by the at least one processor, the two-dimensional image with a unique identifier and storing each unique identifier for each three-dimensional asset of the three-dimensional model displayed in the two-dimensional image in metadata for the two-dimensional image.

User-Configured Music Room Digital Assets in Virtual Environments
20230037657 · 2023-02-09 ·

Managing access to digital content in a virtual environment using virtual content rights, including: providing a virtual content rights database comprising data associating a user of the virtual environment with the virtual content rights acquired with respect to the digital content; receiving, at a processor, a request from a device of the user for assignment of the virtual content rights of the digital content, wherein the user uses the device to interface with the processor; updating the virtual content rights database to indicate the assignment of the virtual content rights to the user; receiving, at the processor, data from the device of the user holding the virtual content rights to digital content including songs to create a virtual user-configured music room having at least one of the songs; and updating the virtual content rights database to indicate sharing of the virtual user-configured music room by the user within the virtual environment.

User-Configured Music Room Digital Assets in Virtual Environments
20230037657 · 2023-02-09 ·

Managing access to digital content in a virtual environment using virtual content rights, including: providing a virtual content rights database comprising data associating a user of the virtual environment with the virtual content rights acquired with respect to the digital content; receiving, at a processor, a request from a device of the user for assignment of the virtual content rights of the digital content, wherein the user uses the device to interface with the processor; updating the virtual content rights database to indicate the assignment of the virtual content rights to the user; receiving, at the processor, data from the device of the user holding the virtual content rights to digital content including songs to create a virtual user-configured music room having at least one of the songs; and updating the virtual content rights database to indicate sharing of the virtual user-configured music room by the user within the virtual environment.

Baseboard management controller firmware security system

A BMC firmware security system includes a BMC coupled to a programmable circuit device and a first storage subsystem. In response to BMC initialization, the BMC uses a system identifier to verify that a license in the first storage subsystem authorizes the BMC to use BMC firmware in the BMC, uses branding identity information in the BMC to verify that the BMC is branded for the BMC firmware, determines that the programmable circuit device identifies the BMC firmware and, in response, the performs BMC initialization operations using the BMC firmware. A BIOS is coupled to the programmable circuit device and a second storage system. In response to BIOS initialization, the BIOS uses the branding identity information in the second storage subsystem to identify the BMC firmware, determines that the programmable circuit device identifies the BMC firmware and, in response, performs BIOS initialization operations.

Selective screen sharing
11593055 · 2023-02-28 · ·

Disclosed are various examples for selective screen sharing. In one example, a computing device can generate a video stream based on a screen capture and transmit the video stream to a destination device. The computing device can also obtain a user-specified modification to an area of the screen capture within the video stream. The computing device can also update the video stream by application of a transformation to the screen capture based at least in part on the user-specified modification, after the video stream started transmission to the destination device. In some cases, a user-specified modification to the area is also obtained. The video stream can be updated by applying an updated transformation to the screen capture that obscures the updated area within the video stream.

Selective screen sharing
11593055 · 2023-02-28 · ·

Disclosed are various examples for selective screen sharing. In one example, a computing device can generate a video stream based on a screen capture and transmit the video stream to a destination device. The computing device can also obtain a user-specified modification to an area of the screen capture within the video stream. The computing device can also update the video stream by application of a transformation to the screen capture based at least in part on the user-specified modification, after the video stream started transmission to the destination device. In some cases, a user-specified modification to the area is also obtained. The video stream can be updated by applying an updated transformation to the screen capture that obscures the updated area within the video stream.

System and method for using unique device identifiers to enhance security

A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can transmit access data to a second electronic device. The access data can be associated with a first access code that can be generated based at least in part on data representing a device identifier of the first electronic device. A device identifier can uniquely identify the first electronic device from a plurality of electronic devices. Transferring the access data can involve transforming the first access code into a second access code that can include data representing a device identifier associated with the second electronic device. Transforming the first access code into the second access code can facilitate access to a resource associated with the access data for a second user, but not for a first user.