G06F21/1015

CONTENT PROVISION DEVICE, CONTENT PROVISION METHOD, PROGRAM, AND RECORDING MEDIUM
20230252111 · 2023-08-10 · ·

A content provision device, a content provision method, a program, and a recording medium capable of opening content, which is provided to a user, to others while protecting the content are realized.

In the present invention, a processor executes a step of providing first content to a first user in a case in which a provision request for the first content is received from the first user, and a step of providing second content lacking a part of data from the first content to the first user in a case in which predetermined processing for the provided first content is executed by a device used by the first user.

PROGRAM, HEAD-MOUNTED DISPLAY, AND INFORMATION PROCESSING DEVICE
20230244318 · 2023-08-03 · ·

A program executed by a head-mounted display or an information processing device connected to the head-mounted display to provide virtual reality on the head-mounted display, the program causing the head-mounted display or the information processing device to function as: a determination unit that determines a capture range in a virtual space using a hand gesture by a hand of a user in a real space or a hand gesture by an object of a hand in a virtual space; and a capture unit that acquires, as image data, content displayed in the capture range determined in the virtual space.

SYSTEMS AND METHODS FOR OPERATING A BRIDGE SERVER TO SUPPORT MULTIPLE SHARDS OF A BLOCKCHAIN
20220118365 · 2022-04-21 ·

Systems and methods for operating a bridge server to support multiple shards of blockchains are disclosed. The multiple shards may be used to record ownership rights of in-game digital assets. The in-game digital assets may be usable in an online gaming platform. Exemplary implementations may: execute an instance of a game; maintain user accounts for the users of a blockchain on a first and a second decentralized ledger server; record sets of rights pertaining to sets of digital assets; receive an exchange request for a first digital asset; receive transferal information for the first digital asset; transfer sets of instructions to the first and second decentralized ledger servers such that the first decentralized ledger server removes the first digital asset from the first set of digital assets and the second decentralized ledger server adds the first digital asset to the second set of digital assets.

Method and system for avoiding spurious signalling in a communication system

In a method for managing access by a user device to multimedia services delivered by a communication system, the user device accesses the multimedia services through a Radio Access Technology (RAT). An information element sent to the user device from the communication system includes restriction information that indicates the types of RAT that the user device may use to access the multimedia services. The restriction information also includes the types of RAT that the user device cannot use to access the multimedia services. The information element also includes additional restriction information indicating the multimedia services that can be accessed by the user device, and the multimedia services that cannot be accessed by the user device. The additional restriction information is based on subscription information for the user device.

Technologies for object-oriented memory management with extended segmentation

Technologies for memory management with memory protection extension include a computing device having a processor with one or more protection extensions. The processor may load a logical address including a segment base, effective limit, and effective address and generate a linear address as a function of the logical address with the effective limit as a mask. The processor may switch to a new task described by a task state segment extension. The task state extension may specify a low-latency segmentation mode. The processor may prohibit access to a descriptor in a local descriptor table with a descriptor privilege level lower than the current privilege level of the processor. The computing device may load a secure enclave using secure enclave support of the processor. The secure enclave may load an unsandbox and a sandboxed application in a user privilege level of the processor. Other embodiments are described and claimed.

Media transactions consent management

A system for providing permissioned images in media transactions is described. The system processes images in an image set for a media transaction to identify the image owner and other persons depicted in the image and determines use permissions for the images. Various images in the image set are processed to remove or anonymize various persons in order to meet use conditions. The processed images are compiled and provided to an entity requesting the image set.

SERVER AND METHOD FOR PROVIDING USER-SOVEREIGN MEDICAL DATA SHARING AND TRANSACTION SERVICE
20230298712 · 2023-09-21 ·

There is provided a server for providing a user-sovereign medical data sharing and transaction service. The server includes a medical data collection unit configured to collect medical data generated from at least one of a user and a medical institution, a blockchain unit configured to store the collected medical data in a blockchain network while operating in conjunction with the blockchain network, and an artificial intelligence unit configured to read, from the blockchain network, medical data corresponding to the use request when receiving a use request for the stored medical data from another user, de-identify the read medical data, and provide the de-identified medical data to the other user.

Protection of electronic designs

Removing protections on a session-key protected design include receiving a double encrypted vendor private key and an encrypted session key. The double encrypted vendor private key is decrypted into a single encrypted vendor-private key using a user private key, and the single encrypted vendor-private key is decrypted into a vendor private key using a vendor pass phrase. The encrypted session key is decrypted into a session key using the vendor private key, and the session-key protected design is decrypted into a plain design using the session key.

VIRTUAL MUSIC RIGHTS MANAGEMENT
20210365527 · 2021-11-25 ·

Management of virtual content rights of digital assets for a virtual environment, including: receiving data indicating a request from a user for assignment of virtual content rights of a digital asset; determining whether the requested virtual content rights are available for assignment to the user and a set of terms of the assignment for the requested virtual content rights; notifying the user of the availability and the set of terms for the assignment of the virtual content rights to the user; receiving data indicating agreement by the user to the assignment, including agreement to at least one term of the set of terms; and updating the virtual content rights database to indicate the assignment of the virtual content rights to the user.

HASH-BASED DYNAMIC RESTRICTION OF CONTENT ON INFORMATION RESOURCES
20210349976 · 2021-11-11 · ·

Systems and methods for restricting content inserted into information resources are provided herein. A computing device can identify a content element included in an information resource. The computing device can identify a bit stream corresponding to the content element included in the information resource. The computing device can hash the identified bit stream to generate an element identifier corresponding to the content element. The computing device can access a restricted content database using the element identifier. The computing device can modify, responsive to finding the element identifier in the restricted content database, the presentation of the content element on the information resource in accordance with the content restriction policy.