H04L2209/60

Signal security in a satellite signal distribution environment

Certain embodiments provide a set top box, comprising: a processing entity configured to obtain data for a channel stacking switch, to obtain a security data element and to formulate a message for the channel stacking switch by combining the security data element with the data; a communications interface configured to send the message to channel stacking switch. Other embodiments provide a channel stacking switch, comprising: a communication interface configured to receive a message from a set top box; a processing entity configured to determine whether or not the message is legitimate and to take an action that depends on whether or not the message is legitimate. Still further embodiments provide a satellite signal receiving system comprising a channel stacking switch and at least one set top box in secure communication with the channel stacking switch.

METHODS, SYSTEMS, AND COMPUTER-READABLE STORAGE MEDIA FOR ORGANIZING AN ONLINE MEETING
20230198749 · 2023-06-22 ·

A method of organizing an end-to-end encrypted online meeting for a group of members including a creator. The method includes: maintaining, by each member in the online meeting including the creator, a group tree from which is derivable a group key required for communication between members in the online meeting; accessing, by the creator, a key package associated with a member of the group; adding to the online meeting, by the creator and based on the key package, the member associated with the key package; updating, by the creator, the group tree maintained by the creator; generating, by the creator and based on the updated group tree, one or more encrypted secret keys required for deriving the group key; and transmitting, by the creator and via a server, the updated group tree and the one or more encrypted secret keys to each other member in the online meeting.

SYSTEM AND METHOD FOR ASSOCIATING A NON-FUNGIBLE TOKEN (NFT) WITH A NETWORK DEVICE

An anonymous, decentralized, high speed, open source, data-only, wireless network is deployed in physical space. A server attached to the network generates a Non-Fungible Token (NFT) and associates the NFT with a first network device (e.g., a cellular antennae) before the first network device is deployed in the cellular network. After deployment of the first network device into the cellular network, a second network device (e.g., a network validator) can identify the first network device with information from the NFT. In this way, a digital token can identify a physical piece of hardware for communications within the cellular network.

Blockchain configuration for secure content delivery

There is provided a method including receiving a playback system identifier corresponding to a playback system, generating a blockchain corresponding to a content identifier identifying a content, wherein the blockchain is uniquely associated with the content identifier, establishing, in the blockchain, a block corresponding to the playback system identifier, sending an encrypted version of the content to the playback system, and in response to one or more updates to the blockchain by the playback system, providing a content encryption key to the playback system for decrypting the encrypted version of the content.

Access to data broadcast in encrypted form based on blockchain

A solution is proposed for controlling access to data that are broadcast over a telecommunication medium. A corresponding method comprises validating by a plurality of validator devices an access request that is submitted by an access device for accessing the data. The validator devices update a blockchain by adding a new block comprising an indication of the access request in response to a positive result of its validation. A provider system transmits cryptographic information for decrypting the data to the access device in response to the new block. A corresponding method for broadcasting data by a provider system and a corresponding method for accessing broadcast data by an access device are proposed. Corresponding computer programs and computer program products for performing the methods are also proposed. Moreover, corresponding structure, provider system and access device are proposed.

RESTRICTING DATA ACCESS
20230188358 · 2023-06-15 ·

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for validating an application's data access request. One of the methods includes receiving, for an application, a request for access to data collected by a device; determining an identifier for the application and a declared use of the data by the application based on contents of a twice-signed data usage token for the application; and controlling the application's access to the data, including: enabling access to the data when (i) both signatures of the twice-signed data usage token have been validated and (ii) the declared use of the data matches an authorized use of the data; and preventing the application from accessing the data when (i) either signature of the twice-signed data usage token has not been validated or (ii) the declared use of the data fails to match the authorized use of the data.

CONTENT RECORDING APPARATUS, CONTENT EDITING APPARATUS, CONTENT REPRODUCTION APPARATUS, CONTENT RECORDING METHOD, CONTENT EDITING METHOD, AND CONTENT REPRODUCTION METHOD

A content recording apparatus includes an obtaining unit which obtains a content having a variable-length packet structure, an encrypter which generates encrypted data by encrypting the content, and a recorder which records the encrypted data in a block unit having a fixed length in a recording medium. The encrypted data includes an invalidated region unnecessary for reproduction of the content. The recorder records a size of the invalidated region in the recording medium.

Methods, Systems and Computer Program Products for Generation and Transfer of Non-Fungible Tokens
20230188350 · 2023-06-15 ·

The invention provides solutions for generation and transfer of digital media based non-fungible tokens on a distributed blockchain ledger, for implementation with cloud based services systems, and even more particularly for implementation within cloud gaming systems. The invention relies on a cloud services server and a non-fungible token service platform for implementing the generation and/or transfer of digital media based non-fungible tokens on a distributed blockchain ledger, in accordance with the present invention.

USING A PUBLIC BENEFIT ASSETS SECURE TOKEN
20230188351 · 2023-06-15 · ·

A method executed by a computing entity includes obtaining a transaction token representing a first pending transaction associated with a transaction item and establishing a set of required public benefit asset information for subsequent acquisition of a set of public benefit credit assets based on the first pending transaction. The method further includes identifying, using a securely passing process, a secure first token on an object distributed ledger representing the set of public benefit credit assets based on the set of required public benefit asset information. The method further includes establishing, in accordance with the securely passing process, control over the secure first token representing the set of public benefit credit assets to produce an updated secure first token, where only a device possessing control over the secure first token may modify the secure first token.

SYSTEMS AND METHODS FOR ISSUANCE AND MANAGEMENT OF NON-FUNGIBLE TOKENS

Systems and methods for issuance and management of non-fungible tokens are disclosed. In one embodiment, a method for issuing non-fungible tokens may include: (1) receiving, by a computer program executed by a non-fungible token as a service (NFTaaS) computer program and from a NFTaaS user interface, a minting request to mint a non-fungible token (NFT), wherein the minting request comprises content for the NFT and a plurality of NFT attributes; (2) identifying, by the NFTaaS computer program, a deployed smart contract for the plurality of NFT attributes; (3) minting, by the NFTaaS computer program, the NFT according to the NFT attributes using the identified deployed smart contract; and (4) deploying, by the NFTaaS computer program, the NFT to a distributed ledger.