G06F21/1086

Management of digital assets

An example operation may include one or more of connecting, by a recipient node, to a blockchain network configured to store links to digital assets of an owner, selecting, by the recipient node, an asset from a ledger of the owner, executing, by the recipient node, a smart contract to determine a time frame of the asset use, executing, by the recipient node, a smart contract to download the asset to the recipient node, checking, by the recipient node, if the asset is downloaded successfully, and in response to the successful download of the asset, executing, by the recipient node, a smart contract to log an asset transfer transaction onto the blockchain.

TOKENIZED MEDIA CONTENT MANAGEMENT

A system and method for media content management include creating, via a digital vault, a container file comprising media content submitted by a user and content metadata; verifying, via the digital vault, a completeness of the content metadata associated with the media content in the container file; classifying, via the digital vault, the container file based on the completeness of the media content; identifying a salable content item that is to be put up for sale; creating, via the digital vault, a nonfungible token (NFT) container file and populating the NFT container file with the salable content item and NFT metadata; offering the specified ownership rights to the salable content item for sale via an NFT transaction; and updating the NFT container file to reflect a new owner of the ownership rights to the salable content after sale of the salable content item.

MEDIA CONTENT MANAGEMENT

A system and method for media content management include creating, via a digital vault, a container file comprising media content submitted by a first user and content metadata; verifying, via the digital vault, a completeness of the content metadata associated with the media content in the container file; classifying, via the digital vault, the container file based on the completeness of the media content; capturing, via the digital vault, event metadata when a second user gains access to the container file, the event metadata comprising at least one of identification of the second user, an activation timestamp, a duration of access, portions of the container file accessed, and changes to the container file; and enabling a private communication channel between parties affiliated with the media content to permit messaging among the parties affiliated with the media content via the private communication channel.

TOKENIZED MEDIA CONTENT MANAGEMENT

A system and method for media content management include creating, via a digital vault, a container file comprising media content submitted by a user and content metadata; verifying, via the digital vault, a completeness of the content metadata associated with the media content in the container file; classifying, via the digital vault, the container file based on the completeness of the media content; identifying a salable content item that is to be put up for sale via a nonfungible token (NFT) transaction; determining, via the digital vault, whether other stakeholders of the salable content item hold rights in the salable content item and whether consent for the NFT transaction of any such other stakeholder is required; and the digital vault prohibiting the sale of the salable content item until consent for the sale is received from each stakeholder from whom consent is required.

Secure Bridging of Third-Party Digital Rights Management to Local Security
20210136431 · 2021-05-06 ·

Encrypted content from a content provider is received at a headend of a video programming distributor. The content provider is distinct from the video programming distributor. The content is decrypted and modified by blending a user-interface overlay with the content in a virtual set-top application associated with a set-top of a customer of the video programming distributor. The modified content is provided over a secure data link to a conditional-access encoder at the headend. The conditional-access encoder encrypts the processed content, which is then transmitted to a client device.

DELIVERING DIGITAL CONTENT FOR AN APPLICATION

The present disclosure relates to systems, methods, and computer-readable media for providing digital content for an application to users. For example, systems described herein can provide a license for the digital content during a rental time. Systems disclosed herein may additionally track a duration of use of an application and compare the tracked use against an amount of rental time purchased (e.g., rented) by a user. The systems described herein may further extend a license or terminate the license based on a determination of whether the amount of use exceeds a rental time. Features and functionality described herein provide a flexible and efficient mechanism that enables users having a variety of content-consuming preferences to receive affordable content while ensuring that use of an application is efficiently and accurately tracked.

Method to track the dissemination of a data set
10902139 · 2021-01-26 · ·

The present invention concerns the field of data dissemination tracking, in particular aims at keeping track of the various devices in which a given data was used. It is proposed a method to track the dissemination of a first data set carried out by a first tracking server (CS1), a first device and a second device, said data set comprising a data management section and a data payload, said data management section comprising a data identifier and data usage information defining a security conformance level, said method comprising the steps of:receiving by the first tricking server (CS1) from the first device (d0), a first device identification and at least a data management section of a first set of data, said data management section comprising at least a security conformance level and a first data identifier,identifying or creating in the database, a current graph data set corresponding to the first data identifier, said current graph data set comprising a common section, edges and nodes,storing in the current graph data set, said first data management section in the common section and said first identifier as a first node,receiving by the first tracking server (CS1) a request to transfer the first data set from the first device to the second device, said request comprising at least a second device identification of the second device and the first data identifier,retrieving by the first tracking server (CS1) second device security conformance level, based on the second device identification,verifying by the first tracking server (CS1) that the second device security conformance level meets the security conformance level of the first data set as identifier by the first data identifier,in the positive event, responding by granting authorisation to the transfer at least the data payload of the first data set to the second device,recording in tire database, in respect with the current graph data set, the second device identifier as a second graph data node,recording in the database, in respect with the current graph data set, a transaction from the first device to second device as an edge in the current graph data set linking the first graph node and the second graph node.

Digital rights management for anonymous digital content sharing
10902093 · 2021-01-26 · ·

Embodiments of the present disclosure relate to digital rights management. A method for managing rights transfer of using digital content from a first device (120) to a second device (130) is proposed, comprising generating at an authentication device (110) a first authentication dataset C by encrypting a first verification code R1 using at least one public key for at least one device blacklisted by the authentication device (110). The first authentication dataset C and a second verification code R2 are provided from the authentication device 110 to the first device (120) and a response message M is returned from the second device (130) to the authentication device (110). The method also comprises verifying validity of the second device (130) at the authentication device (110) based on the received response message M. In accordance with embodiments of the present disclosure, the DRM protected digital content can be shared with high security, while the recipient is kept anonymous to the DRM server.

Secure bridging of third-party digital rights management to local security

Encrypted content from a content provider is received at a central location of a multichannel video programming distributor (MVPD). The content provider is distinct from the MVPD. The content is decrypted and processed in a virtual set-top application associated with a set-top of a customer of the MVPD. The set-top of the customer is located in a customer premises remote from the central location. The processed content is provided over a secure data link to a conditional-access encoder at the central location. The conditional-access encoder encrypts the processed content, which is then transmitted to the set-top of the customer.

METHOD TO TRACK THE DISSEMINATION OF A DATA SET
20200202025 · 2020-06-25 ·

The present invention concerns the field of data dissemination tracking, in particular aims at keeping track of the various devices in which a given data was used. It Ls proposed a method to track the dissemination of a first data set carried out by a first tracking server (CS1), a first device and a second device, said data set comprising a data management section and a data payload, said data management section comprising a data identifier and data usage information defining a security conformance level, said method comprising the steps of:receiving by the first tricking server (CS1) from the first device (d0), a first device identification and at least a data management section of a first set of data, said data management section comprising at least a security conformance level and a first data identifier,identifying or creating in the database, a current graph data set corresponding to the first data identifier, said current graph data set comprising a common section, edges and nodes,storing in the current graph data set, said first data management section in the common section and said first identifier as a first node,receiving by the first tracking server (CS1) a request to transfer the first data set from the first device to the second device, said request comprising at least a second device identification of the second device and the first data identifier.retrieving by the first tracking server (CS1) second device security conformance level, based on the second device identification,verifying by the first tracking server (CS1) that the second device security conformance level meets the security conformance level of the first data set as identifier by the first data identifier.in the positive event, responding by granting authorisation to the transfer at least the data payload of the first data set to the second device,recording in tire database, in respect with the current graph data set, the second device identifier as a second graph data node,recording in the database, in respect with the current graph data set, a transaction from the first device to second device as an edge in the current graph data set linking the first graph node and the second graph node.