Patent classifications
G06F21/1012
SHARED PURCHASES
One or more user accounts can be linked together to form a group of linked user accounts to access content items assigned to the other user accounts in the group of linked user accounts. Prior to completing a purchase for a content item, a requesting user can be alerted that a member of the group of linked user accounts has access to the content item. Content items assigned to a member of a group of linked user accounts can be downloaded by one or more other members of the group of linked user accounts along with a Digital Rights Management (DRM) key that enables use of the content item. The DRM key can represent the group relationship between the downloading user account and the content owner's user account to which the content item is assigned.
Method, apparatus, and electronic device for blockchain-based infringement evidence storage
Methods, systems, and apparatus, including computer programs encoded on computer storage media are provided. One of the methods include: obtaining a request for collecting information associated with an Internet address; obtaining, in response to the request, the information from the Internet address; encrypting the information to obtain a digest; storing the digest in a block on a blockchain and the information in a cloud storage space associated with an access address; and sending, to a sender of the request, the digest and the access address associated with the cloud storage space.
Digital rights list for device groups
In one example, a device directory server may maintain a digital rights management list for a user device belonging to a device group associated with a user. The device directory server may maintain a primary digital rights management list associating a user device with a primary online account for a user having a content license for a digital content item. The device director server may receive a status update indicating the user device is still in use by the user if sent by the user device. The device directory server may determine whether a status update has been received from the user device. The device directory server may deactivate the user device on the primary digital rights management list when no status update has been received within a pruning period for the user device to be associated with the primary online account.
SYSTEM AND METHOD FOR USING UNIQUE DEVICE IDENTIFIERS TO ENHANCE SECURITY
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can transmit access data to a second electronic device. The access data can be associated with a first access code that can be generated based at least in part on data representing a device identifier of the first electronic device. A device identifier can uniquely identify the first electronic device from a plurality of electronic devices. Transferring the access data can involve transforming the first access code into a second access code that can include data representing a device identifier associated with the second electronic device. Transforming the first access code into the second access code can facilitate access to a resource associated with the access data for a second user, but not for a first user.
Multi-platform digital rights management for placeshifting of multimedia content
Devices, methods, and program products are provided, which support multiple Digital Rights Management (DRM) schemes or platforms during the placeshifting of media content. A given placeshifting session may be initiated between a placeshifting device and a user-controlled client media receiver executing a browser player. In one embodiment, the DRM placeshifting method includes storing, in a memory associated with the placeshifting device, DRM-protected content; receiving a request from the client media receiver over a communications network to stream the DRM-protected content to the device; and obtaining a placeshifting key and initialization instructions for the DRM-protected content. The DRM-protected content is streamed to the client media receiver in an encrypted format accessible with a placeshifting decryption key. In conjunction with streaming the DRM-protected content, initialization instructions is transmitted to the client media receiver containing information utilized by the browser player to obtain the DRM license from a first license server.
Global secure service provider directory
Systems and methods enable members of a secure transaction network to readily identify the appropriate trusted service manager (TSM) to support a particular transaction. A global directory of TSM providers is provided that a secure service provider can use for determining which TSM provider is the authorized manager of a security domain for the particular transaction. In aspect the directory of TSM providers may be stored within a mobile device secure element. In another aspect, the directory of TSM providers may be stored in a central TSM repository. In a further aspect, the directory of TSM providers may be distributed among a number of secondary TSM repositories. The appropriate TSM may be identified based upon a secure element identifier and an application identifier provided by a secure element as part of the transaction. Communication of the identifiers from mobile devices may be via cellular or near field communication links.
INFORMATION PROCESSING APPARATUS AND IMAGE FORMING APPARATUS
An information processing apparatus includes a processor and memory. The memory stores information on multiple image forming apparatuses capable of making an image forming request. The processor is configured to: install license-managed software; select an image forming apparatus serving as a license management server of the software from the multiple image forming apparatuses; and set the selected image forming apparatus as a license management server.
System and protocol for integrating multiple service providers across various domains using a platform
A system and protocol for integrating a plurality of service providers across a plurality of domains with an application using a hosted platform have been described. The system involves registration of metadata corresponding to the service providers, their services, their types and their set of parameters. When a new integrating application is provided, then it also includes a wrapper protocol. The wrapper protocol includes six predefined methods. The hosted platform in turn can execute the request of the “integrating application” by internally connecting with the plurality of service providers across a plurality of domains and provide the output in a standard format. Since the wrapper protocol standardizes the format of communication (input & output), hence it reduces effort substantially at the end of the integrating application. The ability of the platform to increase the list of service providers is augmented as it relies on metadata for request generation and invocation.
METHOD, APPARATUS, AND ELECTRONIC DEVICE FOR BLOCKCHAIN-BASED INFRINGEMENT EVIDENCE STORAGE
Methods, systems, and apparatus, including computer programs encoded on computer storage media are provided. One of the methods include: obtaining a request for collecting information associated with an Internet address; obtaining, in response to the request, the information from the Internet address; encrypting the information to obtain a digest; storing the digest in a block on a blockchain and the information in a cloud storage space associated with an access address; and sending, to a sender of the request, the digest and the access address associated with the cloud storage space.
METHODS, SYSTEMS, AND DEVICES FOR EFFICIENT REUSE OF INTERNET OF THINGS (IOT) DEVICES DEPLOYED IN TEMPORARY APPLICATIONS
Disclosed herein are methods, systems, and devices for solving the problem of efficient reuse of internet-of-things (IoT) devices deployed in temporary applications. According to one embodiment, a method is implemented on a computing device. The method includes receiving, over a wide area network (WAN) from a mobile device, a device identification (ID) associated with an IoT device. The method further includes determining first digital rights management (DRM) privileges for the IoT device based on the device ID. The first DRM privileges are associated with a first entity and a first timestamp. The method further includes receiving, over the WAN from the mobile device, a first request to provide second DRM privileges for the IoT device. The second DRM privileges are associated with a second entity and a second timestamp. The method further includes granting the second DRM privileges based at least partially on a permission from the first entity.