Patent classifications
G06F21/1086
TOKENIZED MEDIA CONTENT MANAGEMENT
A system and method for media content management include creating, via a digital vault, a container file comprising media content submitted by a user and content metadata; verifying, via the digital vault, a completeness of the content metadata associated with the media content in the container file; classifying, via the digital vault, the container file based on the completeness of the media content; and capturing, via the digital vault, event metadata when a second user gains access to the container file, the event metadata comprising identification of the second user, an activation timestamp, a duration of access, portions of the container file accessed, and changes to the container file.
Sheet Music Distribution System
A system that enables digital distribution of copyrighted sheet music—and allows musician to view the copyrighted sheet music on personal computing devices—while preventing the unauthorized distribution of copyrighted sheet music. An electronic commerce platform provides functionality to purchase copies of copyrighted sheet music. A network security module provides login credentials for purchasers and musicians (and, in some embodiments, limits the number of simultaneous logins). A graphical user interface provides functionality for each purchaser to distribute each purchased copy to one—and only one—musician. In some embodiments, the system allows purchasers to recall sheet music distributed to a first musician and distribute the recalled sheet music to a second musician (without providing functionality for the first musician to view the recalled sheet music).
MEDIA AUTHENTICATION
A content owner registers with an identity authority by providing information about the content owner and a public key of a public/private key pair. The content owner registers content to the identity authority and signs the multiple segments of the content with the private key of the public/private key pair. A system that receives the signed content determines an indicated content owner of the received media content and communicates with the identity authority to confirm that the media content was produced by the indicated content owner. The receiving system requests the public key of the content owner from the identity authority and uses the public key to verify the signature of each media content segment. Accordingly, the receiving system is able to determine if the media content was manipulated after being distributed by the content owner.
Devices, Methods, and Graphical User Interfaces for Automatically Providing Shared Content to Applications
While displaying a view of a first application of a plurality of applications stored in the memory, an electronic device displays a representation of a first shared content item that upon selection is invoked by the first application, and a selectable attribution affordance that provides a link to a location in a second application where information identifying the first shared content item was initially shared.
Tokenized media content management
A system and method for media content management include creating, via a digital vault, a container file comprising media content submitted by a user and content metadata; verifying, via the digital vault, a completeness of the content metadata associated with the media content in the container file; classifying, via the digital vault, the container file based on the completeness of the media content; and capturing, via the digital vault, event metadata when a second user gains access to the container file, the event metadata comprising identification of the second user, an activation timestamp, a duration of access, portions of the container file accessed, and changes to the container file.
DELIVERING DIGITAL CONTENT FOR AN APPLICATION
The present disclosure relates to systems, methods, and computer-readable media for providing digital content for an application to users. For example, systems described herein can provide a license for the digital content during a rental time. Systems disclosed herein may additionally track a duration of use of an application and compare the tracked use against an amount of rental time purchased (e.g., rented) by a user. The systems described herein may further extend a license or terminate the license based on a determination of whether the amount of use exceeds a rental time. Features and functionality described herein provide a flexible and efficient mechanism that enables users having a variety of content-consuming preferences to receive affordable content while ensuring that use of an application is efficiently and accurately tracked.
Devices, Methods, and Graphical User Interfaces for Automatically Providing Shared Content to Applications
A computer system receives, by a messaging application, information identifying a first shared content item as shared content. The first shared content item is of a first type. In response to receiving the information identifying the first shared content item as shared content and in accordance with a determination that a first application of the plurality of applications can open content of the first type, in accordance with a determination that providing the information identifying the first shared content item as shared content to the first application has been authorized, computer system device automatically makes the first shared content item available within the first application, and in accordance with a determination that providing information identifying the first shared content item as shared content to the first application has not been authorized, the computer system does not make the first shared content item automatically available within the first application.
TOKENIZED MEDIA CONTENT MANAGEMENT
A system and method for media content management include creating, via a digital vault, a container file comprising media content submitted by a user and content metadata; verifying, via the digital vault, a completeness of the content metadata associated with the media content in the container file; classifying, via the digital vault, the container file based on the completeness of the media content; and capturing, via the digital vault, event metadata when a second user gains access to the container file, the event metadata comprising identification of the second user, an activation timestamp, a duration of access, portions of the container file accessed, and changes to the container file.
TOKENIZED MEDIA CONTENT MANAGEMENT
A system and method for media content management include creating, via a digital vault, a container file comprising media content submitted by a user and content metadata; verifying, via the digital vault, a completeness of the content metadata associated with the media content in the container file; classifying, via the digital vault, the container file based on the completeness of the media content; and capturing, via the digital vault, event metadata when a second user gains access to the container file, the event metadata comprising identification of the second user, an activation timestamp, a duration of access, portions of the container file accessed, and changes to the container file.
TERMINAL DEVICE SECURITY MANAGEMENT DEVICE, METHOD, AND TERMINAL DEVICE
A terminal device security management device and method are involved a terminal device management field. By grading network level, a level of functions being forbidden to be invoked, formed by obtaining a network connected by the terminal device, is sent to the terminal device for managing invoking operations of the functions. The terminal devices in different management domains are managed based on different connected networks for licensing the terminal device to invoke different function sets in different management domains. Work efficiency is improved, and a risk of leaks is reduced. A terminal device and a method of the terminal device are also disclosed. By responding information of a management device, a licensed function set is displayed in a display, or an invoking of the function is forbidden based on an invoking request for avoiding the specified function to be invoked in the management domain. The leak risk is further reduced.