G06F21/1085

Apparatus and method for persistent digital rights management

A machine has a network interface circuit to provide connectivity to networked machines. A processor is connected to the network interface circuit. A memory is connected to the processor and the network interface circuit. The memory stores instructions executed by the processor to record the purchase of a digital asset by a user at a client machine from a data source machine in network communication with the client machine. The location of the digital asset on one or more machines of the networked machines is archived. The location is separate from the data source machine. The digital asset is associated with a data access policy. A request for the digital asset is received. The data access policy is enforced through programmatic control utilized by one or more of the networked machines to form a consent state. Distribution of the digital asset to a networked machine is authorized in response to the consent state.

Systems and methods to transfer software entitlements between information handling systems

Embodiments of systems and computer implemented methods are provided to transfer software licenses and entitlements associated with a user account from a first information handling system (IHS) to a second IHS. A computer implemented method in accordance with the present disclosure may generally include executing an entitlement management service to reassign the software licenses and entitlements associated with the user account to the second IHS, executing at least one local validation service on the second IHS to validate the second IHS and the user's workspace, and if the second IHS and the user's workspace is successfully validated by the at least one local validation service, executing one or more cloud-based orchestration services to verify the user account, determine which software licenses and entitlements are associated with the user account, and acquire and validate the software licenses and entitlements before transferring the software licenses and entitlements to the second IHS.

TRANSPOSING VIRTUAL CONTENT BETWEEN COMPUTING ENVIRONMENTS
20240061696 · 2024-02-22 ·

A computerized method and processing system provides for transposing virtual content items between computing environments. The method and system includes receiving a transpose request to transpose a first item from the first computing environment to a second computing environment using intelligent transposition processing operations. including transpose rules relating to transposing the first item to the second computing environment and accessing environment data relating to the first computing environment and the second computing environment. The method and system includes determining a second item for utilization in the second computing environment, a virtual translation of the first item based on the transpose rules and the second computing environment data. The method and system includes transmitting an authorization command to the second computing environment to authorize utilization of the second item in the second computing environment.

Methods and Systems for Enabling Electronic Access to Electronic Content Offerings Over a Network

An example method includes dividing content into a normal set and an exclusive set, ranking content of the normal set based on a user preference vector, creating a prioritized list of tiers of content, publishing the prioritized list of tiers of content to the network and restricting access to certain tiers of the prioritized list of tiers of content, receiving a selection of a first content from a first tier (that is an unrestricted tier) associated with a first user account, determining a social engagement factor (SEF) for the first user account based on an amount of social media activity over the network associated with the first content and attributed to the first user account, and based on the SEF for the first user account, electronically enabling access to a higher priority tier of the prioritized list of tiers of content for the first user account.

Method and system for content and service sharing

In one embodiment, an instruction is received at a blockchain server from a first digital rights management (DRM) client, the instruction including an instruction to transfer a DRM license to an encrypted content item to a second DRM client. A block to be recorded in a blockchain, is created, the block including a content item ID of said encrypted content item, one of a device ID of a device including the second DRM client or a user ID of a user of the second DRM client, DRM license information for said DRM license, and a DRM decryption key for decrypting said encrypted content item. The block is recorded in the blockchain. A confirmation message is sent to the second DRM client confirming that the block was written to the blockchain. Related systems, methods, and apparatuses are also described.

SOFTWARE LICENSE DISTRIBUTION AND VALIDATION USING A DISTRIBUTED IMMUTABLE DATA STORE
20190318063 · 2019-10-17 ·

A license for software distributed to multiple users can be validated using a peer-to-peer network, asymmetrical cryptography and an essentially hack-proof public data store of licensing information, avoiding the need for a licensing server or central coordination by servers or host computers. Instances of the licensed software are implemented on the nodes of the peer-to-peer network. A distributed, immutable data store where each segment of data of the series of segments in the data store include a hash of the previous segment. Licensing transactions can be recorded and validated using the distributed, immutable data store. Licensing transactions can include but are not limited to provisioning, de-provisioning, activation and deactivation transactions. The license processing logic can be integrated into the licensed application software, so that once the licensed software is implemented on a user's computer, license generation, license revocation, license validation and license invalidation proceed automatically without the need for any intervention.

CONTENT PROVIDING APPARATUS, CONTENT PROVIDING METHOD, CONTENT PROVIDING PROGRAM, AND CONTENT PROVIDING SYSTEM
20240144217 · 2024-05-02 ·

In a content providing apparatus, a storage unit stores a virtual space generated based on geographical information of a real space, a structure object corresponding to a structure in the real space, owner information on a proven owner of the structure object, and content information associated with the owner information. The virtual space, the structure object, and the user object associated with position information on a user terminal in the real space are displayed on a display unit of the user terminal. When the position information on the user terminal indicates the user terminal's being present within a given range from the structure in the real space and a request for the content is made from the user terminal, a content providing unit provides the content in such a way as to allow the user terminal to use the content. An incentive giving unit gives an incentive to the owner.

Methods, systems, and apparatus for fragmented file sharing

Systems, methods, software, and apparatus are described for facilitating the distribution and management of fragmented content. In one embodiment, a packager packages content into fragments and generates a manifest including policies and metadata associated with the content. A downloader obtains the manifest, and uses it to obtain the content from one or more uploaders. For example, a downloader might forward a search request to one or more trackers, which, in turn, are operable to locate one or more uploaders that can meet the request, subject to any relevant policy limitations. The uploaders forward fragments to the downloader, subject to any relevant policy. The downloader assembles the content from the fragments. The operations and interactions of the entities can be subject to policy limitations associated with the fragments, the content as a whole, or the like.

System and method for securing and monetizing peer-to-peer digital content
10395253 · 2019-08-27 · ·

A system and method to select, secure, and monetize shared digital content by authenticating peers across digital networks and platforms, and independently controlling and monetizing access to said shared digital content with others across the same platforms from their mobile devices. Authors may privately control and authorize user mobile access to shared digital content according to device, location, behavior, time and knowledge authentication contexts and independently secure and monetize said content with one or more of those peers in real-time across any messaging or communication network, either by value or by reference. Recipients may perform required authentication and may execute required P2P payments to sender to gain access to said shared digital content on their mobile device.

Systems and techniques for certification of trusted media data

Methods, systems, and devices that support determining whether media data has been altered are described. Captured media data may be segmented into one or more subsets, and cryptographic representations (e.g., hashes) based on the subsets may be written to an immutable ledger, possibly along with metadata and other related data. A block of a blockchain may be created for each entry in the immutable ledger. A set of media data may be validated, if a corresponding immutable ledger exists, based on segmenting the set of media data into one or more subsets in accordance with the segmenting upon capture, creating candidate cryptographic representations (e.g., hashes) based on the subsets, and comparing the candidate cryptographic representations with contents of the corresponding immutable ledger.