G06F21/108

Using Watermarks to Identify a Chain of Title in Media
20250045362 · 2025-02-06 · ·

A watermark is generated. The generated watermark is specific to an individual owner of a media. The media may be any type of electronic media, such as, an image, a document, a movie, an audio file, a software application, and/or the like. The watermark is inserted into the media. The watermark in the media is changed when ownership of the media is changed. For example, as the media is sold to a new owner, the new owner's watermark is added to the media so that a chain of title can be verified directly from the media. In addition, the chain of title may also be verified via a blockchain.

Systems and methods for management of non-fungible tokens and corresponding digital assets

Systems and techniques are described for token device transfer management. A system identifies, in a payload of at least one block of a distributed ledger, a token corresponding to media content. A parameter of the token in the distributed ledger indicates that the token is associated with a first user. The system identifies a device that is associated with the token and the media content. The device is also associated with the first user. The system identifies that the device has been relocated to an area associated with a second user. In response to identifying that the device has been relocated to the area, the system causes the parameter of the token in the distributed ledger to be modified from indicating that the token is associated with the first user to indicating that the token is associated with the second user.

ELECTRONIC DEVICE, METHOD FOR CONTROLLING ELECTRONIC DEVICE, AND RECORDING MEDIUM
20250097360 · 2025-03-20 ·

To enable processing related to user permission, to be performed appropriately. An electronic device includes a processing unit configured to perform processing in such a manner that a permission state indicating whether an operation representing user agreement with a permission matter regarding transmission of information from the electronic device to a transmission destination has been received is stored, an acquisition unit configured to acquire first information indicating whether the permission matter that corresponds to a region of the electronic device has been updated, and a control unit configured to, in a case where update about the permission matter has not been executed, perform control to transmit information to the transmission destination without displaying a reception screen for receiving agreement with the permission matter from a user, and in a case where update about the permission matter has been executed, perform control to display the reception screen.

AUTOMATED CONFIGURATION TRANSFER FOR CONTAINERIZED APPLICATIONS

In one embodiment, a computer program product is described. The computer program product includes a non-transitory computer-readable storage medium storing instructions, which when performed by processing circuitry of a set of one or more computing devices, cause the set of computing devices to configure a new containerized application operating in a first container to replace an old containerized application operating in a second container. This configuration includes (a) the new containerized application receiving a license identifier (ID) of a licensing service, the license ID being associated with the old containerized application; (b) sending an instruction directing the old containerized application to dissociate with the license ID; and (c) in response to the old containerized application dissociating with the license ID, associating the new containerized application with the license ID to become licensed with the licensing service. A related method, apparatus, and system are also described.

METHOD AND APPARATUS FOR DATA PROCESSING BASED ON INTERNET OF THINGS
20250077630 · 2025-03-06 ·

Embodiments of the present application provide a method and an apparatus for data processing based on Internet of Things, and the method includes that an Internet of Things platform: receives an authorization request message sent by an Internet of Things device, where the Internet of Things device is deployed with encrypted target content, and the authorization request message carries a device identification and an authentication code of the Internet of Things device; performs verification on the Internet of Things device according to the device identification and the authentication code, and generates a first authorization license for the Internet of Things device after the verification of the Internet of Things device is passed; sends the first authorization license to the Internet of Things device to enable the Internet of Things device to adopt the first authorization license to decrypt the encrypted target content and use decrypted target content.

Method and system for automation and role-based control in marketplace

A method and system for automated and role-based control of a centralized marketplace for products. The method includes: mapping a first role, from among a plurality of predetermined roles of marketplace participants, to a first user based on first registration information, mapping a second role, from among the plurality of predetermined roles of marketplace participants, to a second user based on second registration information; executing, for the first user, a first microservice based on the first role of the first user, the first role being a developer role; and executing, for the second user, a second microservice based on the second role of the second user, the second role being a customer role, wherein the first microservice comprises a publishing process for publishing a product of the first user in the centralized marketplace, and wherein the second microservice comprises a deployment process for deploying the product to an infrastructure of the second user.

Method, apparatus, and computer-readable medium for confederated rights and hierarchical key management
12321469 · 2025-06-03 · ·

A method and apparatus for secured, peer-to-peer transfer of data rights over a computer network, the method being accomplished by a distributed computing system including a distributed ledger platform. Root rights are defined and delegated to wallets in a multilevel manner to thereby isolate wallets associated with the root right from cyber risk.

SYSTEM AND METHOD OF CLAIMING, VERIFYING, RECORDING, AND ENFORCING DIGITAL AIR RIGHTS
20250200148 · 2025-06-19 ·

A computing system and computer-implemented method for facilitating an assertion of virtual rights associated with a real property for an assertive entity. The computing system broadly comprises a processing element and a communications element. The computer-implemented method broadly comprises steps of, via the computing system, maintaining a database of virtual rights associated with real properties including the real property, creating a user account corresponding to a virtual rights claimant, associating the user account with the real property, and generating a notice representing the assertion of virtual rights by the assertive entity of the real property.

DISTRIBUTION MANAGEMENT SYSTEM, SERVER SYSTEM, TERMINAL DEVICE, AND DISTRIBUTION MANAGEMENT METHOD
20250209142 · 2025-06-26 ·

The distribution management server that is configured to: manage license information of an original product that inheres in a customized item, and user information of an item user who utilizes the customized item; and perform a transfer-related process. The transfer-related process includes: a transfer detection process of detecting the transfer of the license of the customized item from a transfer request user to a transfer destination user; a value setting process of setting the value of the original product that inheres in the customized item in the case where the license is transferred; and a license information update process of updating the license information and the user information of the customized item which is a target of the transfer when detecting the license is transferred from the transfer request user to the transfer destination user.

A CRYPTOGRAPHICALLY SECURE PROTECTION AND MANAGEMENT SYSTEM FOR ART DATA AND ART ASSETS
20250209434 · 2025-06-26 ·

Embodiments of the disclosed technology are directed to protecting and managing art data and art assets. The described embodiments bring trust to the entire art ecosystem by securely connecting physical (and digital) art to its verified provenance and due diligence data. An example method for authenticating an art asset includes receiving images and documents associated with the art asset, generating, based on the image and document, a non-interchangeable cryptographic asset associated with an authenticity of the art asset, generating, based on the non-interchangeable cryptographic asset, a smart contract for a transaction involving the art asset, and performing, based on the smart contract and the non-interchangeable cryptographic asset, the transaction.