Patent classifications
H04L2209/60
Blockchain architecture, system, method and device for automated cybersecurity and data privacy law compliance with proprietary off-chain storage mechanism
A transaction platform including at least one or more public, public-private and/or private distributed ledgers or blockchains that together enable the secure effectuation and recordation of one or more transactions while maintaining transaction party confidentiality. The private distributed ledgers or blockchains are able to store, maintain and provide information about the parties related to the transactions which the distributed blockchains or databases are able to utilize in order to securely and quickly validate, execute and record the transactions in a manner that is GDPR and other data privacy law complaint.
ENCRYPTION KEY MANAGEMENT METHOD IN DATA SUBSCRIPTION SYSTEM
An encryption key management method includes: receiving a data registration request from a supplier terminal, determining a data identifier associated with the content data, encrypting a master key with a public key of the supplier terminal, and providing the supplier terminal with the master key encrypted with the public key of the supplier terminal, the data identifier, and a key update count value; receiving a subscription application related to the data identifier from a first subscriber terminal, encrypting the master key with a public key of the first subscriber terminal, and providing the first subscriber terminal with the master key encrypted with the public key of the first subscriber terminal and the key update count value; receiving encrypted content data encrypted with the symmetric key and a hash for the content data from the supplier terminal; and transmitting the encrypted content data and the hash to the first subscriber terminal.
Rights transfers using block chain transactions
Systems and methods for managing media, such as digital content, using block chain technology are described. In some embodiments, the systems and methods perform multiple digital currency transfers between address nodes to register a collection of rights to a digital content item to a block chain, and perform a digital currency transfer transaction between address nodes to register the collection of rights to the block chain.
SYSTEMS AND METHODS FOR HIERARCHICAL ORGANIZATION OF DATA WITHIN A NON-FUNGIBLE TOKENS OR CHAIN-BASED DECENTRALIZED SYSTEMS
Systems and methods for controlling access to resources. The methods comprise a data structure (e.g., a blockchain, etc.) using a parent NFT or child NFTs to control access to resources and recording data in a block indicating performance of a transaction or activity in relation to the resources. At least one block comprises the parent NFT with the child NFTs nested therein. The parent NFT may comprise a first smart contract defining a main policy for accessing or using the resources. The child NFT may comprise a second smart contract defining a sub-policy for accessing or using the resources.
MIXD CONTENT DEVICE INCLUDING NON-FUNGIBLE TOKENS (NFTs) AND SYSTEMS FOR PUBLICATION AND DISTRIBUTION
A computer-implemented method includes creating a digital media list or collection or digital media files; storing the created digital media list or collection or digital media files on a content device; assigning the content device a unique digital encrypted identification code and store in a database; receiving payment confirmation from a payment processing computing device that a consumer has purchased the content device with the created digital media list or collection or digital media files; and creating shipping information for the purchased content device.
Document verification
An example operation may include one or more of marking a document, by a user node, to be included into a collection of documents, determining, by the user node, a business process step associated with the document based on a user mark, and executing a transaction to store a hash of the document onto a ledger of a blockchain, wherein a Merkle tree hash is generated and tagged on the ledger with details of the business process step.
Stateless system to restore access
A method including determining, by a first user device, encrypted content by encrypting content based on a first private key; encrypting, by the first user device, the first private key based on utilizing a second public key associated with a second user device; transmitting, by the first user device to a storage device, the encrypted content and the encrypted first private key for storage in association with a first account; receiving, by the second user device from storage device, the encrypted content and the encrypted first private key when the first user device is unable to access the encrypted content; decrypting, by the second user device, the encrypted first private key and the encrypted content based on a second private key; and transmitting, by the second user device to the first user device, the content to restore access to the content by the first user device is disclosed.
DISTRIBUTED SYSTEM, METHOD, COMPUTER PROGRAM, AND COMPUTER-READABLE MEDIUM DIRECTED TO USER INTERACTION WITH MEDIA CONTENT
The invention relates to a distributed system including a plurality of first nodes and a plurality of second nodes. At least one first node of the plurality of first nodes includes at least one data portion including encrypted information related to user interaction with media content of a user of a plurality of users. Each data portion of the at least one data portion is cryptographically hashed. At least one second node of the plurality of second nodes includes a first distributed ledger including a first account of the user and at least one non-fungible token, NFT. The distributed system includes at least one third node including a media player.
PRIVACY PRESERVING MACHINE LEARNING FOR CONTENT DISTRIBUTION AND ANALYSIS
This disclosure relates to systems and techniques that can be implemented by content platforms to optimize (a) demographic-based digital component distribution used to categorize each user into a particular demographic so as to appropriately target that user for purposes of maximizing the efficacy of digital components shown to that user, and (b) demographic reporting used to report to digital component providers the effectiveness of the digital component.
Intercepting Secure Session upon Receipt of Untrusted Certificate
A method for intercepting, by a security gateway, a secure data session comprises the steps of establishing a first secure data session between a client device and a server device, intercepting the first secure data session by the security gateway, establishing a second secure data session between the server device and the security gateway, receiving a first secure session request from the client device, generating a second secure session request based on the first secure session request, receiving a server certificate from the server device, sending the second secure session request to the server device, receiving first secure content from the client device over the first secure data session, creating first encrypted secure content using the first secure content and the server certificate, and sending the first encrypted secure content to the server device over the second secure data session.