G06F21/1062

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND PROGRAM
20230325475 · 2023-10-12 · ·

An information processing apparatus (1) includes at least one processor (C1) which carries out: a first acquisition process of acquiring information indicative of first data which is virtual space data and information indicative of a user of the first data; a retrieval process of retrieving second data which is virtual space data identical with or similar to the first data; a second acquisition process of acquiring information indicative of a purchaser of the second data; and a determination process of determining whether or not the purchaser of the second data is associated with the user of the first data.

SECURE AUDIO PLAYBACK

A method includes: providing a workstation having a playback app configured for audio playback; providing a decryption module having a decryption functionality communicatively connected to the playback app; encrypting, by a server using an encryption key associated with the decryption module, audio data; and decrypting, using the decryption module, the encrypted audio data. The decryption module having the decryption functionality is provided as part of the playback app, as part of firmware of a headphone, or as part of a phone app. The method can additionally include: i) authenticating, using a voice biometric authentication module, a transcriber; ii) enabling decryption by the decryption module only upon input of a decode PIN by the transcriber; and iii) a) modifying the audio data to spatialize speech component and noise component of the audio data at different angles using head-related transfer function (HRTF) filtering, and b) playing back the audio data binaurally.

System and method for blocking screenshots and screen recordings of premium user-generated content
11775620 · 2023-10-03 · ·

Methods, systems, and apparatus for blocking screenshots and screen recordings of content are disclosed. A first media content frame is received from a first computer device. It is determined that one or more user interface elements are present in the first media content frame. The user interface elements are extracted from the first media content frame. The user interface elements are converted to video. The video is encrypted to prevent screenshot capture of the one or more user interface elements present in the first media content frame by a second computer device lacking a decryption key when the video is played on a digital screen of the second computer device. A second media content frame is generated including the first media content frame overlaid by the video. The second media content frame is transmitted to the second computer device for the second media content frame to be played.

System and method for controlling and organizing metadata associated with on-line content
11748432 · 2023-09-05 ·

A system and method are disclosed for controlling metadata associated with content on an electronic device that includes displaying interface screens for user entry of metadata control instructions, accepting user instructions, modifying metadata of applicable content, and associating the modified metadata with the applicable content. The system can export and/or store the applicable content along with modified metadata. The system can automatically modify metadata according to one or more profiles. Relevant profiles can be determined based on the export mechanism, destination or type of content. The system can add watermarks to indicate metadata modification. The system can display metadata for user modification. The content can include photos, videos or other content. The system can display metadata and geolocation indicators for each content item that indicate whether that item has associated metadata and geolocation information. The user can selectively modify metadata of selected content.

Systems and methods for providing a visual content gallery within a controlled environment
11750723 · 2023-09-05 · ·

Methods and systems for providing a visual content gallery within a controlled environment are disclosed herein. A content gallery server receives a content submission from an inmate device within the controlled environment. Further, the content gallery server determines that the content submission does not include prohibited content based on comparing the content submission to a blacklist of prohibited information. When the content submission does not include prohibited content, the content gallery server adds the content submission to a network accessible content gallery corresponding to an inmate associated with the inmate device. Further, authorized friends and family of the inmate may view the content submission and provide comments on the content submission.

Method, system and product for verifying digital media
11755692 · 2023-09-12 · ·

Method, system and computer program product, the method comprising: during a streaming session of a media by a capturing device to the processing platform, transmitting to the capturing device an instruction to implement an operation mode when capturing a second portion of the media; receiving from the capturing device the media, wherein the media comprises at least a first portion and the second portion; and verifying authenticity of the media, wherein said verifying is based on a determination that the second portion of the media complies with the operation mode.

Procedural code generation for challenge code
11748460 · 2023-09-05 · ·

A method by one or more computing devices for obfuscating challenge code. The method includes obtaining challenge code for interrogating a client, inserting, into the challenge code, code for obfuscating outputs that are to be generated by the client, where the code for obfuscating the outputs includes code for applying a first chain of reversible transformations to the outputs using client-generated random values, interning strings appearing in the challenge code with obfuscated strings, inserting code for deobfuscating the obfuscated strings into the challenge code, inlining function calls in the challenge code, removing function definitions that are unused in the challenge code due to the inlining, reordering the challenge code without changing the functionality of the challenge code, and providing the challenge code for execution by the client.

Proactive privacy content hosting

A set of one or more media items is identified by a first computer system configured to host media items for various users. The set of media items has a first relationship. A content analysis is performed on the set of one or more media items. The content analysis is based on a first machine-learning model. A first content pattern contained within the set of media items is determined based on the content analysis. A first set of one or more altered media items is generated in response to the first content pattern.

APPARATUS AND METHOD FOR MAINTAINING SECURITY OF VIDEO DATA

Disclosed is a method for maintaining security of video data of a security device. The method comprises transmitting an access request to decryption server, receiving certificate information comprising a public key arbitrarily selected by the decryption server when the access request is approved, generating a symmetric key for encrypting video data, encrypting the symmetric key using the public key, and transmitting the encrypted symmetric key to the decryption server.

Terminal hardware configuration system
11809528 · 2023-11-07 · ·

Installing and running an application for a terminal are described. A method for installing and running the application includes uploading an application to an application store. The method further includes downloading, by a terminal, the application from the application store, wherein the terminal is connected to the application store by a network. Furthermore, the method includes authorizing, by a terminal management server (TMS) coupled to the terminal and the application store via the network, the terminal to install and run the downloaded application.