Patent classifications
G06F21/1012
Multimedia data processing method, apparatus, system, and storage medium
Embodiments of the present disclosure disclose a multimedia data processing method, apparatus, and a storage medium. In the embodiments of the present disclosure, a playing request carrying an identifier of multimedia data is received. A valid single-use verification parameter is generated according to the playing request. A link address of the corresponding multimedia data is obtained according to the identifier of the multimedia data. A playing address is generated according to the verification parameter and the link address. The multimedia data is played based on the playing address. This present disclosure improves the data security technology and prevent a user from capturing, by means of data packet capturing or by using third party software, a source file of the multimedia data used within a website.
User Account Access Management
A user account access management system includes a computing platform having a hardware processor and a system memory storing a user account access software code. The hardware processor executes the user account access software code to receive, from a first user device, a secondary account profile data for generating a secondary account associated with a primary user account registered with a web based service, and to receive, from a second user device, a sign up request for using the web based service. The hardware processor further executes the user account access software code to transmit an authentication token to one of the first user device and the second user device, receive the authentication token from the other of the first user device and the second user device, and link the secondary account with the second user device based on receiving the authentication code.
Zero sign-on authentication
An authenticating system and process for authenticating user devices to a access a service where access to certain portions of the service may be limited according to a access point or other device used by a user device to facilitate interfacing a user with the service. The authentication may be achieved without directly assessing a trustworthiness of the user devices, and optionally, without requiring a user thereof to complete a sign-on operation.
Multi-platform digital rights management for placeshifting of multimedia content
Devices, methods, and program products are provided, which support multiple Digital Rights Management (DRM) schemes or platforms during the placeshifting of media content. A given placeshifting session may be initiated between a placeshifting device and a user-controlled client media receiver executing a browser player. In one embodiment, the DRM placeshifting method includes storing, in a memory associated with the placeshifting device, DRM-protected content; receiving a request from the client media receiver over a communications network to stream the DRM-protected content to the device; and obtaining a placeshifting key and initialization instructions for the DRM-protected content. The DRM-protected content is streamed to the client media receiver in an encrypted format accessible with a placeshifting decryption key. In conjunction with streaming the DRM-protected content, initialization instructions is transmitted to the client media receiver containing information utilized by the browser player to obtain the DRM license from a first license server.
SYSTEM AND METHOD FOR USING UNIQUE DEVICE IDENTIFIERS TO ENHANCE SECURITY
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can transmit access data to a second electronic device. The access data can be associated with a first access code that can be generated based at least in part on data representing a device identifier of the first electronic device. A device identifier can uniquely identify the first electronic device from a plurality of electronic devices. Transferring the access data can involve transforming the first access code into a second access code that can include data representing a device identifier associated with the second electronic device. Transforming the first access code into the second access code can facilitate access to a resource associated with the access data for a second user, but not for a first user.
Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme
A secure and fault-tolerant, or variation-tolerant, method and system to turn a set of N shares into an identifier even when only M shares from this set have a correct value. A secret sharing algorithm is used to generate a number of candidate identifiers from subsets of shares associated with asset parameters of a collection of assets. The most frequently occurring candidate identifier is then determined to be the final identifier. The method has particular applicability in the fields of node locking and fingerprinting.
Technologies for secure mediated reality content publishing
Technologies for secure mediated reality content publishing includes one or more mediated reality servers, multiple mediated reality listeners, and multiple mediated reality creators. The mediated reality server performs an attestation procedure with each listener based on a pre-provisioned attestation credential of that listener and provisions a session encryption key to each validated listener. The attestation procedure may validate a trusted execution environment of each listener. The mediated reality server generates aggregated mediated reality content based on protected mediated reality content received from the creators and generates an associated license that defines one or more content usage restrictions of the aggregated mediated reality content. The server sends the aggregated mediated reality content to the listeners, protected by the corresponding session encryption key. The server may provision each of the listeners with a back-channel encryption key to protect feedback data generated by sensors of the listeners. Other embodiments are described and claimed.
METHOD AND APPARATUS FOR SUPPORTING MULTIPLE BROADCASTERS INDEPENDENTLY USING A SINGLE CONDITIONAL ACCESS SYSTEM
A method and apparatus for brokering the enablement of the communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers is disclosed. The system makes use of a pairing key for each provided service, which is differently encrypted by a pairing server and by the broadcaster providing the service. The encrypted versions of the pairing key are decrypted in a first receiver module using information known to the pairing service but not the broadcaster and in a second receiver module using information known to the broadcaster. The pairing key is used to cryptographically bind the first and second receiver modules.
METHOD AND APPARATUS FOR SUPPORTING MULTIPLE BROADCASTERS INDEPENDENTLY USING A SINGLE CONDITIONAL ACCESS SYSTEM
A method and apparatus for brokering the enablement of the communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers is disclosed. The system makes use of a pairing key for each provided service, which is differently encrypted by a pairing server and by the broadcaster providing the service. The encrypted versions of the pairing key are decrypted in a first receiver module using information known to the pairing service but not the broadcaster and in a second receiver module using information known to the broadcaster. The pairing key is used to cryptographically bind the first and second receiver modules.
User account access management
A user account access management system includes a computing platform having a hardware processor and a system memory storing a user account access software code. The hardware processor executes the user account access software code to receive, from a first user device, a secondary account profile data for generating a secondary account associated with a primary user account registered with a web based service, and to receive, from a second user device, a sign up request for using the web based service. The hardware processor further executes the user account access software code to transmit an authentication token to one of the first user device and the second user device, receive the authentication token from the other of the first user device and the second user device, and link the secondary account with the second user device based on receiving the authentication code.