G06F21/1083

SELF-VALIDATING DATA OBJECT LOCATOR FOR A MEDIA ASSET
20230281263 · 2023-09-07 ·

Aspects of the disclosure relate to validation of a request for an asset based on information in the request. Validation of the request can be processed by a network node in a network repository that contains the asset. In one aspect, validation of the request can comprise determining if the request is legitimate based at least on processing at least a portion of the information in the request. In response to a legitimate request, the network node can process the request and, as a result, a data object associated with the asset can be supplied to a device originating the request. In the alternative, the network node can yield an exception.

Self-validating data object locator for a media asset

Aspects of the disclosure relate to validation of a request for an asset based on information in the request. Validation of the request can be processed by a network node in a network repository that contains the asset. In one aspect, validation of the request can comprise determining if the request is legitimate based at least on processing at least a portion of the information in the request. In response to a legitimate request, the network node can process the request and, as a result, a data object associated with the asset can be supplied to a device originating the request. In the alternative, the network node can yield an exception.

SELF-VALIDATING DATA OBJECT LOCATOR FOR A MEDIA ASSET
20220284070 · 2022-09-08 ·

Aspects of the disclosure relate to validation of a request for an asset based on information in the request. Validation of the request can be processed by a network node in a network repository that contains the asset. In one aspect, validation of the request can comprise determining if the request is legitimate based at least on processing at least a portion of the information in the request. In response to a legitimate request, the network node can process the request and, as a result, a data object associated with the asset can be supplied to a device originating the request. In the alternative, the network node can yield an exception.

Method and apparatus for data obfuscation
11379563 · 2022-07-05 · ·

There is provided a computer-implemented method of enhancing data privacy. One or more tensors of numeric data are determined, at a processor, in dependence on input data. A transform is determined in dependence on user-associated data, which may be user input or biometric data. Each of the one or more tensors of numeric data are transformed into at least two fragments of data by applying the transform. Each of the fragments of data obfuscates the numeric data. Each of the at least two fragments of data are stored separately at a respective geographically separated storage system.

SYSTEMS AND METHODS TO DELIVER CONTENT DURING CLIENT AUTHENTICATION PROCESS IN A DISTRIBUTED COMPUTING SYSTEM

A method includes receiving, by a content sharing platform, a request for content from a client device, the request for content comprising a session-based authentication token that pertains to a session between the client device and the content sharing platform. The content sharing platform can further validate the session-based authentication token and cause playback of the requested content to begin at the client device. Responsive to a valid content-based authentication token supplied by the client device, the content sharing platform can cause playback of the requested content to continue at the client device, wherein the valid content-based authentication token is based on an identifier of the requested content.

SECURE REMOTE IMAGE ANALYSIS BASED ON RANDOMIZED DATA TRANSFORMATION
20210224403 · 2021-07-22 · ·

A non-transitory storage medium stores instructions readable and executable by a first computer (14) to perform an image processing method (100, 200, 400). The method includes: encrypting image data portions to generate encrypted image data portions; transmitting the encrypted image data portions from the first computer to a second server (16) different from the first computer; decrypting encrypted processed image data portions received at the first computer from the second server to produce processed image data portions and generating a processed image from the processed image data portions; and controlling a display device (24) to display the processed image or storing the processed image in a database (30).

SECURE FILE DISTRIBUTION
20210303659 · 2021-09-30 ·

Apparatuses, methods, systems, and program products are disclosed for secure file distribution. An apparatus includes a processor and a memory that stores code executable by the processor. The code is executable by the processor to divide a file that is intended for a recipient into a plurality of portions. The code is executable by the processor to associate each of the plurality of portions with a different one of the recipient's electronic devices. The code is executable by the processor to assemble the plurality of portions of the file for the recipient in response to authenticating the recipient on each of the recipient's electronic devices that is associated with a portion of the plurality of portions of the file.

METHOD AND APPARATUS FOR DATA OBFUSCATION
20210097154 · 2021-04-01 ·

There is provided a computer-implemented method of enhancing data privacy. One or more tensors of numeric data are determined, at a processor, in dependence on input data. A transform is determined in dependence on user-associated data, which may be user input or biometric data. Each of the one or more tensors of numeric data are transformed into at least two fragments of data by applying the transform. Each of the fragments of data obfuscates the numeric data. Each of the at least two fragments of data are stored separately at a respective geographically separated storage system.

Encoding identifiers into customized manifest data

Techniques are described for encoding information in manifest data in a way that enables identification of a version of media content. Such a capability may be used to identify dynamic content inserted into the media content for the purpose of tracking the effect of the dynamic content on user generated feedback. This capability might also be used to identify a user or device associated with a particular copy of the media content for anti-piracy purposes.

SYSTEM AND METHOD FOR SECURELY RETRIEVING AND PLAYING DIGITAL MEDIA USING PEER-TO-PEER DISTRIBUTION
20200042674 · 2020-02-06 ·

A system for securely streaming/downloading and playing coherent digital content such as music and preventing its play by unauthorized users. The system may include mass server/storage devices for receiving and storing digital content having predetermined gaps; and client devices communicating with the server/storage devices, and providing authorization to proceed. During playing of the digital content by the client devices, the removed components may be reinserted into the missing gaps at the appropriate places, to allow the play or cloning of the coherent digital content.