Patent classifications
G06F21/1086
Permissions decisions in a service provider environment
Permissions can be delegated to enable access to resources associated with one or more different accounts, which might be associated with one or more different entities. Accordingly, approaches for delegating security rights and privileges for services and resources in an electronic and/or multi-tenant environment are provided. In particular, various embodiments provide approaches for dynamically determining and authorizing delegation of permissions to perform actions in, on, or against one or more secured accounts, where those accounts may be associated with a number of different entities and/or resource providers.
Devices, Methods, and Graphical User Interfaces for Automatically Providing Shared Content to Applications
An electronic device displays a representation of a content item in a first application of a plurality of applications, where the content item is of a first type. While displaying the representation of the content item in the first application, the electronic device receives an input highlighting the representation of the content item. The electronic device receives an instruction to display a second application that is associated with content of the first type. In response to receiving the instruction, the electronic device displays a representation of the content item in the second application.
INFORMATION PROCESSING DEVICE, INFORMATION PROCESSING METHOD, AND CONTENT SHARING SYSTEM
[Object] To enable information sharing of access-controlled content also with a user not having a use right becomes possible. [Solution] There is provided an information processing device including: a processing part adapted to, on a basis of a content sharing instruction from a user having a use right of content provided with the use right, place a use restriction to provide the content to a user not having the use right of the content.
Secure Bridging of Third-Party Digital Rights Management to Local Security
Encrypted content from a content provider is received at a central location of a multichannel video programming distributor (MVPD). The content provider is distinct from the MVPD. The content is decrypted and processed in a virtual set-top application associated with a set-top of a customer of the MVPD. The set-top of the customer is located in a customer premises remote from the central location. The processed content is provided over a secure data link to a conditional-access encoder at the central location. The conditional-access encoder encrypts the processed content, which is then transmitted to the set-top of the customer.
METHOD AND APPARATUS FOR PROVIDING CONTENT
Methods and systems for enabling content to be securely and conveniently distributed to authorized users are provided. More particularly, content is maintained in encrypted form on sending and receiving devices, and during transport. In addition, policies related to the use of, access to, and distribution of content can be enforced. Features are also provided for controlling the release of information related to users. The distribution and control of contents can be performed in association with a client application that presents content and that manages keys.
Method and system for verifying renamed content using manifests in a content centric network
One embodiment provides a system that facilitates redistribution of content objects with a different name without requiring re-computation of the original authentication information. During operation, the system determines, by a content producing device, an original manifest which indicates at least an original name associated with a content object, wherein the name is a hierarchically structured variable length identifier (HSVLI) which comprises contiguous name components ordered from a most general level to a most specific level. The system renames the content object with a new name. The system also creates a new manifest which indicates the new name, wherein the new manifest includes original authentication information associated with the original manifest.
MEDIA CONTENT MANAGEMENT
A system and method for media content management include creating, via a digital vault, a container file comprising media content submitted by a first user and content metadata; verifying, via the digital vault, a completeness of the content metadata associated with the media content in the container file; classifying, via the digital vault, the container file based on the completeness of the media content; capturing, via the digital vault, event metadata when a second user gains access to the container file, the event metadata comprising at least one of identification of the second user, an activation timestamp, a duration of access, portions of the container file accessed, and changes to the container file; and enabling a private communication channel between parties affiliated with the media content to permit messaging among the parties affiliated with the media content via the private communication channel.
Media authentication
A content owner registers with an identity authority by providing information about the content owner and a public key of a public/private key pair. The content owner registers content to the identity authority and signs the multiple segments of the content with the private key of the public/private key pair. A system that receives the signed content determines an indicated content owner of the received media content and communicates with the identity authority to confirm that the media content was produced by the indicated content owner. The receiving system requests the public key of the content owner from the identity authority and uses the public key to verify the signature of each media content segment. Accordingly, the receiving system is able to determine if the media content was manipulated after being distributed by the content owner.