G06F21/1085

Highly available and reliable secret distribution infrastructure

The techniques discussed herein relate to providing a highly available and reliable secret distribution infrastructure. In an implementation, a key master service (KMS) system is disclosed. The KMS system includes one or more computer readable storage media having program instructions stored thereon which, when executed by one or more processing systems, direct the one or more processing systems to identify a hydration event and, responsive to the hydration event, determine if other KMS systems are running in a secret distribution infrastructure. The program instructions, when executed by one or more processing systems, further direct the KMS system to hydrate the KMS system with secret information obtained from the one or more of the other KMS systems when the other KMS systems are running in the secret distribution infrastructure.

Peer to peer (P2P) encrypted data transfer/offload system and method

A peer to peer (P2P) system and method for sharing encrypted digital content may be used in a content delivery network system.

Peer storage devices supporting protection information

Example storage systems, storage devices, and methods provide secure transfer of data between peer storage devices using protection information. Data operation commands may be received that use a protection information data block format for transferring a target data block between peer storage devices. A local data operation may operate on the target data block in a first storage device and compare at least one protection information tag value to a first data check value. At least one destination verification protection information tag value and the target data block may be transferred to a second storage device through a peer communication channel. The destination verification protection information tag value may be compared to a destination data block protection information tag value by the second storage device. The second storage device may then execute a data operation on the target data block. Protection information tag values may include guard tag values, reference tag values, and application tag values managed by the peer storage devices.

Software license distribution and validation using a distributed immutable data store

A license for software distributed to multiple users can be validated using a peer-to-peer network, asymmetrical cryptography and an essentially hack-proof public data store of licensing information, avoiding the need for a licensing server or central coordination by servers or host computers. Instances of the licensed software are implemented on the nodes of the peer-to-peer network. A distributed, immutable data store where each segment of data of the series of segments in the data store include a hash of the previous segment. Licensing transactions can be recorded and validated using the distributed, immutable data store. Licensing transactions can include but are not limited to provisioning, de-provisioning, activation and deactivation transactions. The license processing logic can be integrated into the licensed application software, so that once the licensed software is implemented on a user's computer, license generation, license revocation, license validation and license invalidation proceed automatically without the need for any intervention.

Recovery of tree data in a geographically distributed environment

The described technology is generally directed towards recovery of an impacted (damaged) tree in an impacted zone in a geographically distributed data storage environment, using a peer tree in a remote zone. A peer zone is selected for recovery, and updated to have current data. Logic at the impacted zone requests recovery of an impacted tree, identifying one or more recovery ranges for which recovery data is needed. Logic at the peer zone locates missing objects via the peer tree, and provides recovery information to the impacted zone, by which recovery of the impacted tree is able to be accomplished. For example, a replication journal may be returned as a tree recovery journal comprising add leaf (object) instructions, whereby the impacted zone processes the journal with respect to a reduced representation of the impacted tree to obtain a recovered tree.

Systems and methods of content transaction consensus

A method of content transaction consensus includes receiving a request to initiate a transaction for play of video or audio content, the request being received from a data network connected device having a native player. The transaction is validated by consensus in a peer-to-peer network that maintains a distributed ledger, and a record of the transaction is stored in the distributed ledger only when the transaction is validated. The record including a reference file for the video or audio content with a plurality of player control parameter values and linking data for one or more designated content sources outside the peer-to-peer network. And the method includes providing access to the reference file by the data network connected device to enable the data network connected device to play the video or audio content using the reference file and a content data file.

Peer Storage Devices Supporting Protection Information

Example storage systems, storage devices, and methods provide secure transfer of data between peer storage devices using protection information. Data operation commands may be received that use a protection information data block format for transferring a target data block between peer storage devices. A local data operation may operate on the target data block in a first storage device and compare at least one protection information tag value to a first data check value. At least one destination verification protection information tag value and the target data block may be transferred to a second storage device through a peer communication channel. The destination verification protection information tag value may be compared to a destination data block protection information tag value by the second storage device. The second storage device may then execute a data operation on the target data block. Protection information tag values may include guard tag values, reference tag values, and application tag values managed by the peer storage devices.

Authentication of compressed media data based on immutable ledgers

Methods, systems, and devices that support determining whether media data has been altered are described. Captured media data may be segmented into one or more subsets, and cryptographic representations (e.g., hashes) based on the subsets may be written to an immutable ledger, possibly along with metadata and other related data. A block of a blockchain may be created for each entry in the immutable ledger. A set of media data may be validated, if a corresponding immutable ledger exists, based on segmenting the set of media data into one or more subsets in accordance with the segmenting upon capture, creating candidate cryptographic representations (e.g., hashes) based on the subsets, and comparing the candidate cryptographic representations with contents of the corresponding immutable ledger.

Encoding alteration metadata within media data

Methods, systems, and devices that support determining whether media data has been altered are described. Captured media data may be segmented into one or more subsets, and cryptographic representations (e.g., hashes) based on the subsets may be written to an immutable ledger, possibly along with metadata and other related data. A block of a blockchain may be created for each entry in the immutable ledger. A set of media data may be validated, if a corresponding immutable ledger exists, based on segmenting the set of media data into one or more subsets in accordance with the segmenting upon capture, creating candidate cryptographic representations (e.g., hashes) based on the subsets, and comparing the candidate cryptographic representations with contents of the corresponding immutable ledger.

User-Controllable AV-Artwork Steaming Data Structure with Conjunctive Configurable NFTs and Landscape-Portrait Coding
20240095313 · 2024-03-21 ·

Streaming artwork data structure/method with selection and temporal controls operates accessing artwork/audio datastores (visual, AV art, and audio). View-display and acoustic-player presents art and audio. Data structure uses display-side controller (DSC) operative on view/acoustic-player and uses streaming controller (SC) accessing art/audio datastores. User selects art/audio (a play-one), he/she applies temporal play (TP) command (cmd) on play-one via DSC. If an AV art, then SC applies audio override. A user personal profile (UPP) stores play-ones, TP, audio selection, selected audio play one, display link, and for AV art, the audio override. Upon user-actuated play-cmd from DSC, SC obtains art/audio/override, then downloads to DSC for view/acoustic-play. Enhancements include art with portrait/landscape format labels activating DSC to change art displayed on viewer to portrait/landscape. DSC accepts artwork playlist and TP has: single, uniform, per-playlist, repeat and random playtimes. Artwork may be on NFT datastore with access provided via NFT art token.