Patent classifications
G06F21/106
SYSTEMS AND METHODS FOR MONITORING A DIGITAL RIGHTS MANAGEMENT TECHNOLOGY
A method may include receiving, using a computing device, a video from an application server. The video may include an image frame representing a first color, and may be associated with a digital rights management technology and a resolution of one pixel by one pixel. The method may include forming, using a browser module of the computing device, an HTML element including the video received from the application server. The method may include outputting, using the computing device, the video of the HTML element to a pixel of a display screen associated with the computing device. The method may include detecting, using the browser module, that the pixel is presenting the first color. The detection may represent that the digital rights management technology is disabled on the computing device; and. The method may further include transmitting, using the computing device, a notification based on the detection to the application server.
SYSTEMS AND METHODS FOR PROTECTING A DIGITAL RIGHTS MANAGEMENT ("DRM")-PROTECTED CONTENT ELEMENT
Described are systems and methods for dynamically protecting a digital rights management (DRM)-protected content element, including monitoring, via a browser module, on a first interval, DRM-protected media for impairment, the DRM-protected media having been caused to be output via a graphical user interface (GUI), wherein the DRM-protected media is associated with the DRM-protected content element, upon detecting impairment of the DRM-protected media, generating an indication of impairment via the browser module, based on the indication of impairment, obfuscating the DRM-protected content element via the browser module, and causing to output, via the GUI, the obfuscated DRM-protected content element.
SYSTEMS AND METHODS FOR GENERATING DIGITAL RIGHTS MANAGEMENT ("DRM")-PROTECTED MEDIA VIA LAYERED MEDIA
Described are systems and methods for generating digital rights management (DRM)-protected layered media, including receiving an indication of sensitive information, based on the indication of sensitive information, causing to output at least two layered security elements associated with the sensitive information, the at least two layered security elements including at least a first layer associated with a first security element and a second layer associated with a second security element, determining, via a browser module, digital extraction is indicated, upon determining digital extraction is indicated, modifying the first layer such that the first layer and the associated first security element are substantially transparent, and causing to output, via a first graphical user interface (GUI), the at least two layered security elements with the modified first layer, such that the second layer and the associated second security element are substantially visible.
SYSTEMS AND METHODS FOR SECURING AND STORING CONTENT
A method may include receiving, using a browser module of a computing device, a first webpage, wherein the first webpage is associated with a content element. The method may include receiving, using the browser module, a video, wherein the video is associated with the content element and a digital rights management technology. The method may include forming, using the browser module, an HTML element including the video. The method may include outputting, using the browser module, at least a portion of the first webpage to a display screen. The method may include outputting, using an operating system of the computing device, the video of the HTML element to the display screen, wherein the video is configured to be overlaid on the at least a portion of the first webpage on the display screen. The method may include storing, using a storage component of the computing device, the outputted video.
Method, apparatus, and computer-readable medium for confederated rights and hierarchical key management
A method and apparatus for secured, peer-to-peer transfer of data rights over a computer network, the method being accomplished by a distributed computing system including a distributed ledger platform. Root rights are defined and delegated to wallets in a multilevel manner to thereby isolate wallets associated with the root right from cyber risk.
Large Language Model(s) System for Capturing, Maintaining, and Separating Copyrighted Information Within a Blockchain Network with Automatic Output of Information
Tracking data input to a generative artificial intelligence model (generative AI) or a large language model (LLM) involves receiving a plurality of objects comprising the data input to the model, generating a corresponding non-fungible token (NFT) for each object, assigning a corresponding smart contract to each NFT to control interactions with the NFT and its corresponding object, recording the NFT and corresponding smart contract to a block for writing to a blockchain, and writing the block to the blockchain.
INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND STORAGE MEDIUM
A control method includes, in a case where, although processing for activating a first application program has been performed by the second application program after predetermined processing including processing for the first search processing has been performed by the second application program launched based on the launch processing having been performed, a predetermined setting is not enabled in the information processing apparatus, disabling a specific setting for performing a predetermined function, which is a function of the first application program and is a function including processing for the first search processing.
MULTI-STAGE APPROVAL AND CONTROLLED DISTRIBUTION OF AI-GENERATED DERIVATIVE CONTENT
Herein disclosed is receiving predetermined content, receiving a request to transform the predetermined content into a derivative work, receiving a requested theme for the derivative work, using generative artificial intelligence to create the derivative work generated as a function of the predetermined content and the requested theme, determining if the generated derivative work is approved, in response to determining the generated derivative work is approved, applying a digital watermark to the approved derivative work, configuring an authorization server to govern use of the approved derivative work based on the digital watermark and providing user access to the authorized derivative work. The requested theme may be determined using a Large Language Model (LLM) and a chatbot interview. The generative artificial intelligence may comprise a diffusion model. The content may comprise music.
METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR CONFEDERATED RIGHTS AND HIERARCHICAL KEY MANAGEMENT
A method and apparatus for secured, peer-to-peer transfer of data rights over a computer network, the method being accomplished by a distributed computing system including a distributed ledger platform. Root rights are defined and delegated to wallets in a multilevel manner to thereby isolate wallets associated with the root right from cyber risk.
Third party based pirated copy tracing
According to implementations of the subject matter described herein, a solution is provided for pirated copy tracing based on a third party. In the solution, a report on a pirated copy of a digital content is received from a third party, wherein the report comprises first secret information for characterizing a first identification, time information and tracing information of the pirated copy. Subsequently, a request for verifying the report is received to determine whether the report is valid. When the report is determined as valid, a licensee associated with the report is marked as a first status to indicate that the pirated copy might be leaked by the licensee. Therefore, the pirated copy may be effectively traced based on third parties. The tracing information in the report can be hidden, and other third parties can therefore be prevented from using the tracing information for duplicate reports.