G06F21/1085

Systems and techniques for validation of media data

Methods, systems, and devices that support determining whether media data has been altered are described. Captured media data may be segmented into one or more subsets, and cryptographic representations (e.g., hashes) based on the subsets may be written to an immutable ledger, possibly along with metadata and other related data. A block of a blockchain may be created for each entry in the immutable ledger. A set of media data may be validated, if a corresponding immutable ledger exists, based on segmenting the set of media data into one or more subsets in accordance with the segmenting upon capture, creating candidate cryptographic representations (e.g., hashes) based on the subsets, and comparing the candidate cryptographic representations with contents of the corresponding immutable ledger.

PORTING DIGITAL ENTITLEMENTS ACROSS APPLICATIONS

Methods, systems, and storage media for managing digital entitlements are disclosed. Exemplary implementations may: determine at least one digital entitlement; generate a digital backpack; select a third party platform; generate an application program interface (API) call associated with the at least one digital entitlement to a third party application; and store the at least one entitlement in the digital backpack.

COMPUTER-READABLE RECORDING MEDIUM STORING TRADE PROCESSING PROGRAM, METHOD FOR PROCESSING TRADE, AND INFORMATION PROCESSING APPARATUS
20240221002 · 2024-07-04 · ·

A recording medium stores a program causing a computer to execute a process including: registering, in a distributed ledger, authorization transactions, the authorization transactions each including a transfer source account, a transfer destination account, a transfer amount of the financial asset, and a transfer time of the financial asset, and the authorization transactions each authorizing transfer of the financial asset, requesting a first other node to verify the authorization transaction after a management time managed by the self node has reached a transfer time, and issuing a request transaction that requests transfer of a financial asset related to the authorization transaction based on a result of the verification, and returning, in a case where a request for verification of the authorization transaction is accepted from a second other node, to the second other node a result of the verification of whether the transfer time is later than the management time.

Electronic media distribution system

A system and method for sharing electronic content. A sending user can specify one or more criteria that a recipient memory device must have to store the content. The sending user can also specify a digital rights management control that can be associated with the content. The content can be transferred to the recipient if the recipient memory device has the specified properties. Software at the recipient can ensure that the content is handled in accordance with the digital rights management controls specified by the sender.

METHOD, SYSTEMS, AND APPARATUS FOR FRAGMENTED FILE SHARING

Systems, methods, software, and apparatus are described for facilitating the distribution and management of fragmented content. In one embodiment, a packager packages content into fragments and generates a manifest including policies and metadata associated with the content. A downloader obtains the manifest, and uses it to obtain the content from one or more uploaders. For example, a downloader might forward a search request to one or more trackers, which, in turn, are operable to locate one or more uploaders that can meet the request, subject to any relevant policy limitations. The uploaders forward fragments to the downloader, subject to any relevant policy. The downloader assembles the content from the fragments. The operations and interactions of the entities can be subject to policy limitations associated with the fragments, the content as a whole, or the like.

SYSTEM FOR REGULATING ACCESS TO AND DISTRIBUTING CONTENT IN A NETWORK
20190068600 · 2019-02-28 ·

There is provided a system for regulating access and managing distribution of content in a network, such as the Internet. The system includes communication gateways, installed at a subscriber site, internet control points, installed remotely, and various network elements installed throughout the network. The communication gateways and network elements operate in conjunction with the internet control points to restrict or allow access to specified Internet sites and to manage efficient distribution of content such as music, video, games, broadband data, real-time audio and voice applications, and software to subscribers.

UTILIZING VIDEO AND INPUT PIPELINES TO PROTECT VIRTUAL DESKTOP INFRASTRUCTURE SESSIONS

Methods and systems are described which facilitate protecting a virtual desktop infrastructure (VDI) session. A first communication channel is established between a first cryptographic element and a VDI service. The first cryptographic element decrypts a video stream from the VDI service and overlays the decrypted video stream on a user's display. A second communication channel is established between a second cryptographic element and the VDI service. The second cryptographic element encrypts input received at a user's input device and sends the encrypted input to the cloud VDI service.

UTILIZING VIDEO AND INPUT PIPELINES TO PROTECT VIRTUAL DESKTOP INFRASTRUCTURE SESSIONS

Methods and systems are described which facilitate protecting a virtual desktop infrastructure (VDI) session. A first communication channel is established between a DRM component and a VDI service. The DRM component decrypts a video stream from the VDI service and overlays the decrypted video stream on a user's display. A second communication channel is established between an inputs protection component and the VDI service. The inputs protection component encrypts input received at a user's input device and sends the encrypted input to the cloud VDI service.

VERIFYING TRUST OF A SECURE WORKSPACE THAT IS FORMED OF MULTIPLE LAYERS WITH DISTRIBUTED OWNERSHIP
20240265070 · 2024-08-08 ·

Trust of a secure workspace that has multiple layers with distributed ownership can be verified. A management service can maintain a repository of layers for secure workspaces and a certificate vault storing certificates of the owners of the layers. The management service can also maintain workspace metadata defining secure workspaces that pertain to a particular user and the layers that form the secure workspaces. When a secure workspace is to be deployed on a user computing device, the management service can send the layers that form the secure workspace and the workspace metadata for the secure workspace to a host agent on the user computing device. The host agent can then leverage the certificates of the owners of the layers to verify the trust of each layer and, if trust is verified for all layers that form the secure workspace, can deploy the secure workspace on the user computing device.

SYSTEMS AND MEHTODS OF CONTENT TRANSACTION CONSENSUS

A method of content transaction consensus includes receiving a request to initiate a transaction for play of video or audio content, the request being received from a data network connected device having a native player. The transaction is validated by consensus in a peer-to-peer network that maintains a distributed ledger, and a record of the transaction is stored in the distributed ledger only when the transaction is validated. The record including a reference file for the video or audio content with a plurality of player control parameter values and linking data for one or more designated content sources outside the peer-to-peer network. And the method includes providing access to the reference file by the data network connected device to enable the data network connected device to play the video or audio content using the reference file and a content data file.