G06F21/1062

EFFICIENT MEDIA STREAM ENCRYPTION PROVIDING FULL CONTENT PROTECTION
20230252110 · 2023-08-10 ·

Various systems, methods and devices are presented for performing media encryption. A media stream comprising audio packets and video packets can be received. A chunk of the media stream can be sorted to create a first group of a plurality of audio packets with an I-frame header and a second group of a plurality of P-frames and an I-frame payload. The first group can be encrypted while the second group is not encrypted. A fully-protected output media stream that includes the encrypted first group and the second group can then be streamed to a remote device via a network for output.

SYSTEMS AND METHODS FOR CONTENT SECURITY
20230306089 · 2023-09-28 ·

Systems and methods are for content security may comprise transmitting a request for authorization to access secured content. A content key for the secured content may be received and stored to a restricted region of a memory. A device security module may have access to the restricted region and may decrypt, based on satisfaction of a use condition and using the content key, the secured content. An encryption key associated with a secure media system authorized to access the secured content may be received. The device security module may encrypt, using the encryption key, the secured content and route the secured content to the secure media system.

System and method for controlling and organizing metadata associated with on-line content
11232165 · 2022-01-25 · ·

A system and method are disclosed for controlling metadata associated with content on an electronic device that includes displaying interface screens for user entry of metadata control instructions, accepting user instructions, modifying metadata of applicable content, and associating the modified metadata with the applicable content. The system can export and/or store the applicable content along with modified metadata. The system can automatically modify metadata according to one or more profiles. Relevant profiles can be determined based on the export mechanism, destination or type of content. The system can add watermarks to indicate metadata modification. The system can display metadata for user modification. The content can include photos, videos or other content. The system can display metadata and geolocation indicators for each content item that indicate whether that item has associated metadata and geolocation information. The user can selectively modify metadata of selected content.

VIRTUAL MUSIC RIGHTS MANAGEMENT
20210365527 · 2021-11-25 ·

Management of virtual content rights of digital assets for a virtual environment, including: receiving data indicating a request from a user for assignment of virtual content rights of a digital asset; determining whether the requested virtual content rights are available for assignment to the user and a set of terms of the assignment for the requested virtual content rights; notifying the user of the availability and the set of terms for the assignment of the virtual content rights to the user; receiving data indicating agreement by the user to the assignment, including agreement to at least one term of the set of terms; and updating the virtual content rights database to indicate the assignment of the virtual content rights to the user.

System and method of detecting an unauthorized alteration in regards to a certificate store

Disclosed herein are systems and methods for detecting unauthorized alteration with regard to a certificate store. In one aspect, an exemplary method comprises, tracking changes in a file system or a system registry of an operating system of a device with regard to the certificate store, detecting an alteration or an attempted alteration with regard to the certificate and sending information about the alternation or the attempted alteration to an analysis module, obtaining information about at least one certificate with which a change in the file system or the system registry with regard to the certificate store is connected, and determining a class of the change, where the class of the change is determined from a portion of the respective system registry or the file system in which the change occurred and from an action associated with the change, and comparing the obtained information to similar information on known certificates.

CONTENT ENCRYPTION
20220004599 · 2022-01-06 ·

Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for securely publishing and accessing a media's premium content. Methods include a media that comprises premium content encrypted with a first cryptographic key. The media also comprises data structures that include this key and the access entitlements. These data structures are encrypted using the key for each entity that can authorize user access to the media. Methods further include verifying user access to the media and then providing the decrypted premium content. Methods include decrypting the data structure using the authorizing entity's key and providing the first cryptographic key in the decrypted data structure to the client device, after verifying that the user has the appropriate access entitlements for the media. Methods include decrypting the premium content using the first cryptographic key and then displaying the media, including the decrypted premium content, on the client device.

METHOD OF TRACKING SOURCE DISPLAY PANEL FROM WHICH ILLEGAL COPY OF IMAGE IS CAPTURED BY CAMERA AND ELECTRONIC APPARATUS FOR TRACKING ILLEGAL COPY OF IMAGE CAPTURED BY CAMERA FROM SOURCE DISPLAY PANEL OF ELECTRONIC APPARATUS
20220005144 · 2022-01-06 · ·

A method of tracking a source display panel from which an illegal copy of an image is captured by a camera is provided. The method includes generating a content image visible to human eyes using a visible light component integrated in an integrated light emitting source; generating a watermark image invisible to the human eyes in real time using an invisible light component integrated in the same integrated light emitting source; and simultaneously displaying the content image and the watermark image on the source display panel. Generating the watermark image includes generating an image of an identifier unique to the source display panel. The method further includes analyzing the image captured by the camera to extract the image of an identifier unique to the source display panel; and identifying the source display panel based on the identifier unique to the source display panel.

Runtime computer software product management system
11170120 · 2021-11-09 · ·

Runtime computer software product management systems that operate in a networked computing environment. A computer database or computer software product configuration/access management system includes a runtime subscription model including a hybrid entitlement-service state model that defines a hybrid state including first or entitlement state data specifying access to the computer software product by the customer and second or service state data specifying permissible customer actions given a pre-determined combination of entitlement state and service state data. Subscription model state changes may be executed in runtime in response to events published by an event generation system and processed by the configuration/access management system, and modifications to the hybrid state are communicated to an access control system. The access control system responds to customer requests based at least in part upon the received hybrid state data.

MEDIA AUTHENTICATION
20230325473 · 2023-10-12 ·

A content owner registers with an identity authority by providing information about the content owner and a public key of a public/private key pair. The content owner registers content to the identity authority and signs the multiple segments of the content with the private key of the public/private key pair. A system that receives the signed content determines an indicated content owner of the received media content and communicates with the identity authority to confirm that the media content was produced by the indicated content owner. The receiving system requests the public key of the content owner from the identity authority and uses the public key to verify the signature of each media content segment. Accordingly, the receiving system is able to determine if the media content was manipulated after being distributed by the content owner.

APPARATUS AND METHOD FOR AUTOMATED PRIVACY PROTECTION IN DISTRIBUTED IMAGES
20210342473 · 2021-11-04 ·

A method executed by a computer includes receiving an image from a client device. A facial recognition technique is executed against an individual face within the image to obtain a recognized face. Privacy rules are applied to the image, where the privacy rules are associated with privacy settings for a user associated with the recognized face. A privacy protected version of the image is distributed, where the privacy protected version of the image has an altered image feature.