Patent classifications
G06F21/1084
Secure Onboarding of a Component in a Network
A method for providing a secure onboarding of a component from at least one first host device into a second host device includes verifying the integrity, authenticity and/or execution environment of the first host device by an orchestrator; providing a trusted root certificate to the second host device by the orchestrator; providing an onboarding identity by the orchestrator to the first host device, when the integrity, the authenticity and/or the execution environment of the first host device has been verified; receiving the onboarding identity from the orchestrator by the first host device and assigning the onboarding identity to the component; providing the assigned onboarding identity to the second host device; and securely onboarding the component from the first host device into the second host device based on the assigned onboarding identity and the provided trusted root certificate.
MULTI-STAGE APPROVAL AND CONTROLLED DISTRIBUTION OF AI-GENERATED DERIVATIVE CONTENT
Herein disclosed is receiving predetermined content, receiving a request to transform the predetermined content into a derivative work, receiving a requested theme for the derivative work, using generative artificial intelligence to create the derivative work generated as a function of the predetermined content and the requested theme, determining if the generated derivative work is approved, in response to determining the generated derivative work is approved, applying a digital watermark to the approved derivative work, configuring an authorization server to govern use of the approved derivative work based on the digital watermark and providing user access to the authorized derivative work. The requested theme may be determined using a Large Language Model (LLM) and a chatbot interview. The generative artificial intelligence may comprise a diffusion model. The content may comprise music.
Multi-stage approval and controlled distribution of AI-generated derivative content
Herein disclosed is receiving predetermined content, receiving a request to transform the predetermined content into a derivative work, receiving a requested theme for the derivative work, using generative artificial intelligence to create the derivative work generated as a function of the predetermined content and the requested theme, determining if the generated derivative work is approved, in response to determining the generated derivative work is approved, applying a digital watermark to the approved derivative work, configuring an authorization server to govern use of the approved derivative work based on the digital watermark and providing user access to the authorized derivative work. The requested theme may be determined using a Large Language Model (LLM) and a chatbot interview. The generative artificial intelligence may comprise a diffusion model. The content may comprise music.
LINK SERVICE FOR PROVIDING ACCESS TO CONTENT UNDER AGREED POLICY TERMS ASSOCIATED WITH CUSTOMIZED LINKS
The present technology pertains to managing digital content access and distribution under dynamically enforceable policy terms. The present technology includes a link service that enables rights holders to control access to their content through smart links, which serve as policy-governed access points rather than direct content transfers. A Smart link configuration user interface allows rights holders to define policy terms, including licensing conditions, attribution requirements, and access restrictions. The system integrates with a content management system, where content is stored with embedded metadata containing access control configurations. A Smart link-management user interface enables real-time monitoring, modification, and revocation of smart links, allowing rights holders to dynamically enforce content usage terms even after content has been shared.
MULTIMEDIA CONTAINER FOR PHYSICAL OBJECT AUTHENTICATION AND VERIFICATION OF ATTENDANCE
A method, server, system, and computer program product creates a three-dimensional (3D) virtual certificate of authenticity (COA) that is a multimedia container having a media file that provides for an experiential presentation in the 3D COA itself. The multimedia container with media file lends credibility to the authenticity of the 3D COA. The ownership of the 3D COA can be stored in a blockchain as a non-fungible token, and easily transferred from one claimant of the 3D COA to another.
AI-GENERATED MUSIC DERIVATIVE WORKS
A system and method for creating AI-generated derivative works from predetermined content with copyright compliance and content owner control. In some aspects, the system receives predetermined content and a user-requested transformation theme, then employs generative artificial intelligence to create a derivative work. The system may enable scalable rights management for AI-generated content across music, video, text, and other media formats.
MULTI-STAGE APPROVAL AND CONTROLLED DISTRIBUTION OF AI-GENERATED DERIVATIVE CONTENT
Herein disclosed is receiving predetermined content, receiving a request to transform the predetermined content into a derivative work, receiving a requested theme for the derivative work, using generative artificial intelligence to create the derivative work generated as a function of the predetermined content and the requested theme, determining if the generated derivative work is approved, in response to determining the generated derivative work is approved, applying a digital watermark to the approved derivative work, configuring an authorization server to govern use of the approved derivative work based on the digital watermark and providing user access to the authorized derivative work. The requested theme may be determined using a Large Language Model (LLM) and a chatbot interview. The generative artificial intelligence may comprise a diffusion model. The content may comprise music.
AI-GENERATED MUSIC DERIVATIVE WORKS
A system for generating derivative works comprises a content derivation platform with at least one processor configured to receive predetermined content and a request to transform it into a derivative work with a requested theme. The system uses generative artificial intelligence to create the derivative work comprising audio, video, or images based on the requested theme. A content approval machine learning model with a neural network determines an approval score based on content owner preferences and text embeddings identifying items in the derivative work. When the score exceeds a predetermined minimum, the system applies a digital watermark, configures an authorization server to govern use based on the digital watermark, and provides access to the approved derivative work. The requested theme may be determined through a chatbot interview using a Large Language Model. The generative artificial intelligence may comprise a diffusion model. The content may comprise music or audio.
System and method for providing secure, verified, and authenticated identification for an individual
A system for providing secure, verified, and authenticated identification for an individual is disclosed, including a cyphered byte array for storing identifying information associated with an individual. An ID card includes at least one code associated with the individual's associated identifying information. The ID card is scanned by a computing device associated with an authority or a third-party via an API web server interface to permit the authority or the third-party to verify the identity of the individual.
Secure onboarding of a component in a network
A method for providing a secure onboarding of a component from at least one first host device into a second host device includes verifying the integrity, authenticity and/or execution environment of the first host device by an orchestrator; providing a trusted root certificate to the second host device by the orchestrator; providing an onboarding identity by the orchestrator to the first host device, when the integrity, the authenticity and/or the execution environment of the first host device has been verified; receiving the onboarding identity from the orchestrator by the first host device and assigning the onboarding identity to the component; providing the assigned onboarding identity to the second host device; and securely onboarding the component from the first host device into the second host device based on the assigned onboarding identity and the provided trusted root certificate.