G06F21/10

System and method for using unique device identifiers to enhance security

A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can transmit access data to a second electronic device. The access data can be associated with a first access code that can be generated based at least in part on data representing a device identifier of the first electronic device. A device identifier can uniquely identify the first electronic device from a plurality of electronic devices. Transferring the access data can involve transforming the first access code into a second access code that can include data representing a device identifier associated with the second electronic device. Transforming the first access code into the second access code can facilitate access to a resource associated with the access data for a second user, but not for a first user.

Verified-party content

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for uploading, by a verified party, verified-party content to a media platform, receiving requests by a client device for store content, and displaying the uploaded verified-party content along with store content on the client device.

Verified-party content

Disclosed herein are systems, methods, and non-transitory computer-readable storage media for uploading, by a verified party, verified-party content to a media platform, receiving requests by a client device for store content, and displaying the uploaded verified-party content along with store content on the client device.

Information processing method, apparatus, device, and storage medium

The present application discloses an information processing method. The method includes: acquiring a resource package parameter determined by a sender client; invoking an interface with a second server, and acquiring a current conversion rate that is between the first-type resource and a second-type resource and is issued by the second server; calculating a quantity of second-type resources equal in value to the first quantity of first-type resources according to the conversion rate, and using the quantity as a second quantity; deducting the second quantity of second-type resources from a second-type resource account of the sender client, and generating at least one resource package, a sum of quantities corresponding to the at least one resource package being equal to the first quantity; and distributing the at least one resource package to at least one receiver client by using the link information.

Device programming with system generation
11595371 · 2023-02-28 · ·

A secure programming system and method for provisioning and programming a target payload into a programmable device mounted in a programmer. The programmable device can be authenticated before programming to verify the device is a valid device produced by a silicon vendor. The authentication process can include a challenge-response validation. The target payload can be programmed into the programmable device and linked with an authorized manufacturer. The programmable device can be verified after programming the target payload by verifying the silicon vendor and the authorized manufacturer. The secure programming system can provision different content into different programmable devices simultaneously to create multiple final device types in a single pass.

Device programming with system generation
11595371 · 2023-02-28 · ·

A secure programming system and method for provisioning and programming a target payload into a programmable device mounted in a programmer. The programmable device can be authenticated before programming to verify the device is a valid device produced by a silicon vendor. The authentication process can include a challenge-response validation. The target payload can be programmed into the programmable device and linked with an authorized manufacturer. The programmable device can be verified after programming the target payload by verifying the silicon vendor and the authorized manufacturer. The secure programming system can provision different content into different programmable devices simultaneously to create multiple final device types in a single pass.

METHOD AND APPARATUS TO ENABLE A MARKET IN USED DIGITAL CONTENT
20180007018 · 2018-01-04 ·

Methods and apparatus to enable a distinction between “new” and “used” digital content and to enable a market in used digital content files between mobile phone terminals and an electronic store, securely, by means of a wireless telephony network and a server complex to handle contents right management, transaction reporting, inventory, content delivery, payment, and billing. A server receives a signal generated by a wireless user device that was sent over a wireless telephony network. The signal indicates an election for returning at least one previously purchased digital content item. The server deletes user rights for the at least one digital content item identified by the received signal and sends information to the user device that generated the signal. Access to the associated digital content item at the user device is removed according to the sent information.

METHOD AND APPARATUS TO ENABLE A MARKET IN USED DIGITAL CONTENT
20180007018 · 2018-01-04 ·

Methods and apparatus to enable a distinction between “new” and “used” digital content and to enable a market in used digital content files between mobile phone terminals and an electronic store, securely, by means of a wireless telephony network and a server complex to handle contents right management, transaction reporting, inventory, content delivery, payment, and billing. A server receives a signal generated by a wireless user device that was sent over a wireless telephony network. The signal indicates an election for returning at least one previously purchased digital content item. The server deletes user rights for the at least one digital content item identified by the received signal and sends information to the user device that generated the signal. Access to the associated digital content item at the user device is removed according to the sent information.

SECURE TRANSFER AND TRACKING OF DATA USING REMOVABLE NONVOLATILE MEMORY DEVICES
20180007016 · 2018-01-04 ·

A protected memory source device including removable non-volatile memory durably stores a signature such as a serial number or identifier, which is used to mark protected multimedia content legally stored on the protected memory device. The protected multimedia content is moved from the source device to another device, such as a target device used to aggregated protected content in a library. Moving the protected multimedia content involves replacing a source-specific header, comprising digital rights management metadata and/or other security metadata allowing only a device having the source device signature access to the content, with a target-specific header comprising digital rights management metadata and/or other security metadata allowing only a device having the target device signature access to the content. The transfer is done using one of a variety of transfer methods with either a trusted or un-trusted host system connecting the source device to the target device.

SECURE TRANSFER AND TRACKING OF DATA USING REMOVABLE NONVOLATILE MEMORY DEVICES
20180007016 · 2018-01-04 ·

A protected memory source device including removable non-volatile memory durably stores a signature such as a serial number or identifier, which is used to mark protected multimedia content legally stored on the protected memory device. The protected multimedia content is moved from the source device to another device, such as a target device used to aggregated protected content in a library. Moving the protected multimedia content involves replacing a source-specific header, comprising digital rights management metadata and/or other security metadata allowing only a device having the source device signature access to the content, with a target-specific header comprising digital rights management metadata and/or other security metadata allowing only a device having the target device signature access to the content. The transfer is done using one of a variety of transfer methods with either a trusted or un-trusted host system connecting the source device to the target device.