G06F21/101

SERVER-SIDE AUDIO RENDERING LICENSING
20220391475 · 2022-12-08 ·

A content server system is provided that includes at least one processor configured to store a user account for a user at a content server of the content server system that is configured to serve server-side rendered content to a client computing device of the user. Audio is played out via a sound output device associated with the client computing device. The at least one processor is further configured to determine a licensing identifier associated with a device of the user or the user account of the user, send the licensing identifier to a third-party licensing server device, receive an indication that an active license is associated with the licensing identifier, determine that the user is authorized to access a digital rights managed audio rendering software, and cause audio of the server-side rendered content to be rendered using audio rendering algorithms of the digital rights managed audio rendering software.

System, method, and apparatus for a digital trading card platform

An approach is provided for trading card platform. The approach involves, for example, initiating a reading of a machine readable code from a trading card to determine a card identifier. The approach also involves querying for one or more attribute data records associated with the trading card based on the card identifier. The approach further involves computing a value metric based on the one or more attribute data records and presenting a user interface displaying a digital representation of the trading card, the one or more sponsorship data records, the value metric, or a combination thereof.

System, method and program for preventing unauthorized copies of webcomics and tracking replicated webcomics
11409849 · 2022-08-09 · ·

The present invention relates to a system, a method, and a program for preventing unauthorized copies of webcomics and tracking replicated webcomics. A method for preventing unauthorized copies of webcomics according to one embodiment of the present invention comprises: a step (S100) in which a service server separates and stores webcomic images and dialogue text which are included in general webcomic data; a step (S110) of recognizing a user operation for a user client and recognizing a point on a webcomic that has moved from an initial position; and a step (S120) of providing final webcomic data that combines the webcomic images and the dialogue text with respect to an area displayed in real time on a screen of the user client.

MODULAR SYSTEMS AND METHODS FOR SELECTIVELY ENABLING CLOUD-BASED ASSISTIVE TECHNOLOGIES

Systems and methods are disclosed for manually and programmatically remediating websites to thereby facilitate website navigation by people with diverse abilities. For example, an administrator portal is provided for simplified, form-based creation and deployment of remediation code, and a machine learning system is utilized to create and suggest remediations based on past remediation history. Voice command systems and portable document format (PDF) remediation techniques are also provided for improving the accessibility of such websites.

SYSTEM FOR AUGMENTED HASH-BASED PORTIONING OF NON-FUNGIBLE ELECTRONIC RESOURCES FOR DETECTION OF UNAUTHORIZED DUPLICATES

Systems, computer program products, and methods are described herein for augmented hash-based portioning of non-fungible electronic resources for detection of unauthorized duplicates. The present invention is configured to receive an unauthorized duplication detection request for a first NFT from a first user; segment the first digital resource into a first set of resource portions; generate a first set of hash values corresponding to the first set of resource portions; retrieve a second digital resource, wherein the second digital resource is associated with a second NFT; segment the second digital resource into a second set of resource portions; generate a second set of hash values corresponding to the second set of resource portions; determine that the second digital resource is similar to the first digital resource; determine that the second NFT is an unauthorized duplication of the first NFT; and trigger one or more responsive actions.

SYSTEM FOR AUGMENTED HASH-BASED PORTIONING OF NON-FUNGIBLE ELECTRONIC RESOURCES FOR DETECTION OF UNAUTHORIZED DUPLICATES

Systems, computer program products, and methods are described herein for augmented hash-based portioning of non-fungible electronic resources for detection of unauthorized duplicates. The present invention is configured to receive an unauthorized duplication detection request for a first NFT from a first user; segment the first digital resource into a first set of resource portions; generate a first set of hash values corresponding to the first set of resource portions; retrieve a second digital resource, wherein the second digital resource is associated with a second NFT; segment the second digital resource into a second set of resource portions; generate a second set of hash values corresponding to the second set of resource portions; determine that the second digital resource is similar to the first digital resource; determine that the second NFT is an unauthorized duplication of the first NFT; and trigger one or more responsive actions.

Modular systems and methods for selectively enabling cloud-based assistive technologies

Systems and methods are disclosed for manually and programmatically remediating websites to thereby facilitate website navigation by people with diverse abilities. For example, an administrator portal is provided for simplified, form-based creation and deployment of remediation code, and a machine learning system is utilized to create and suggest remediations based on past remediation history. Voice command systems and portable document format (PDF) remediation techniques are also provided for improving the accessibility of such websites.

SYSTEM AND METHOD FOR SOFTWARE MODULE BINDING
20210250185 · 2021-08-12 ·

Embodiments of the invention are directed to methods and systems for software module binding. Cryptographic keys and challenge elements can be exchanged between a first software module and a second software module to create a binding between the first software module and the second software module. As a result, a first software module can securely and authentically access sensitive data and functionality at a second software module, while unauthorized software modules can be prevented from accessing the sensitive data and functionality.

System and method to limit content distribution

A content distribution system that groups assets sharing the same required security capabilities in digital rights management service instances. Assets are encrypted with the help of media keys, effectively grouping media keys sharing the same required security capabilities. Digital rights management service instances are organized to cover different geographical areas, and asset groups are configured to migrate according to a configurable distribution range.

System and method for software module binding

Embodiments of the invention are directed to methods and systems for software module binding. Cryptographic keys and challenge elements can be exchanged between a first software module and a second software module to create a binding between the first software module and the second software module. As a result, a first software module can securely and authentically access sensitive data and functionality at a second software module, while unauthorized software modules can be prevented from accessing the sensitive data and functionality.