Patent classifications
H04L2209/60
AUTHENTICATION METHOD, NOTIFICATION METHOD, SOURCE DEVICE, AND SINK DEVICE
A method for use in a source device includes: acquiring a random number; transmitting the random number to a sink device through a High Definition Multimedia Interface-Consumer Electronics Control (HDMI-CEC) bus; receiving first signature information and capability information from the sink device through the HDMI-CEC bus, the first signature information being information in which the random number is encrypted with a first secret key of the sink device, the capability information being information about a display capability of the sink device; acquiring a result of a first determination whether first decrypted information is compatible with the transmitted random number, the first decrypted information being obtained by decrypting the first signature information with a first public key paired with the first secret key; determining that the received capability information is correct information when the result of the first determination is that the first decrypted information is compatible with the transmitted random number; and outputting video corresponding to the capability information to sink device.
SCHEMATIZED ACCESS CONTROL IN A CONTENT CENTRIC NETWORK
One embodiment provides a system that facilitates schematized access control in a content centric network. During operation, the system generates, by a content producing device, a secret key for a user based on a schema, wherein the schema is a regular expression which corresponds to one or more names and allows a user access to content associated with the names, wherein a name is a hierarchically structured variable length identifier that includes contiguous name components ordered from a most general level to a most specific level. The system receives an interest with a name that corresponds to the schema. The system encrypts a payload of a responsive content object based on the interest name. The system transmits the responsive content object with the encrypted payload to the user, which allows the user to decrypt the encrypted payload with the secret key.
Information processing device, information storage device, server, information processing system, information processing method and medium for reproduction of encrypted content
An information storage device including one or more processors configured to store an encrypted content and to control access of an external device to the information storage device is provided. The one or more processors are further configured to store a converted title key obtained by converting a title key which is an encryption key to be applied to decryption of the encrypted content, and a user token obtained by converting binding secret information to be applied to calculate the title key from the converted title key. The one or more processors are further configured to allow the external device having a confirmed access right to the information storage device to read out the user token.
Remote access to shared media
Remote media access is facilitated. According to an example embodiment, remote-user media access is facilitated using media provided by a subscriber media source, over a packet-based network. This access is facilitated in an environment involving subscriber users that provide media for transfer over a packet-based network to a remote device. A host server receives a request for access to media content provided by a subscriber. The request is authorized as a function of authorization criteria. In response to the request being authorized, a media source associated with the subscriber is controlled to provide requested media for access at a remote device. A media player is displayed at the remote device, and the media is provided for access via the media player.
Electronic name registry type
Digital signatures may be verified by maintaining a database of information of digital signatures and documents to which they were applied. Verification of electronically signed documents may be requested, with verification performed by comparing information of the electronically signed document with information in the database. The digital signatures may include graphic images, and may be transferred from one party to another.
Cryptographic method and system of protecting digital content and recovery of same through unique user identification
A computer-implemented method and related system controls access to protected content with certificate-based access authorization. Protected content stored in a memory of a computer is enciphered using a content key to produce a quantity of enciphered, protected content, wherein the content key is derived from a content encryption algorithm. A user key is derived from user credentials using a credential encryption algorithm. The content key is enciphered with the user key using a content key encryption algorithm to produce a certificate, wherein the certificate contains the enciphered content key. Access to the protected content is controlled by the user credentials and the certificate containing a second enciphered content key. A decryption user key is generated and access authorization to the protected content is determined based on the decryption user key in response to a match of the decryption user key with the user key.
SYSTEM AND METHOD OF TOKENIZATION
The present invention is a system and method of tokenization, functioning as a distribution model for IP title and validity insurance. The present invention provides numerous solutions to problems associated with current IP ownership models, including the ability to have divisible ownership of IP. Through divisible ownership, applicants or inventors are able to buy and sell interests in the IP at any time. Additional solutions offered by the present invention include: title and validity insurance that can be based on machine metrics; simplified financing; facilitating cooperation between multiple parties for IP development; and a streamlined user friendly IP transactional platform. The present invention offers securitization & digitization of the IP space, which will allow organizations to maximize monetization of their IP and facilitate transactions through increased transparency & streamlined contractual processes.
DEIDENTIFIED ACCESS OF DATA
Generally, embodiments of the invention are directed to methods, computer readable medium, servers, and systems for deidentified access of data. The deidentified access is permitted with the use of an identifier that uniquely indicates an outcome, the coding of the identifier obscures unaided human interpretation of the outcome, and the identifier uniquely identifies data for remediating performance associated with future outcomes.
ENHANCED REMOTE KEY MANAGEMENT FOR AN ENTERPRISE IN A CLOUD-BASED ENVIRONMENT
Systems and methods are disclosed for facilitating remote key management services in a collaborative cloud-based environment. In one embodiment, the remote key management architecture and techniques described herein provide for local key encryption and automatic generation of a reason code associated with content access. The reason code is logged by a hardware security module which is monitored by a remote client device (e.g., an enterprise client) to control a second (remote) layer of key encryption. The remote client device provides client-side control and configurability of the second layer of key encryption.
METHOD AND SYSTEM FOR ROUTING WITH MINIMUM NAME DISCLOSURE IN A CONTENT CENTRIC NETWORK
One embodiment provides a system that facilitates routing with minimum name disclosure in a CCN. During operation, the system adds a first entry to a local forwarding information base for a first name prefix and a corresponding first suffix encryption key indicated in a first advertisement. In response to receiving a first interest with a name that includes the first name prefix, the system performs a lookup in the forwarding information base for the first interest name to obtain the first entry. The system encrypts a suffix of the first interest name based on the first suffix encryption key, wherein the suffix begins from a name component following the first name prefix. The system forwards the first interest to one or more interfaces indicated in the first entry, thereby facilitating routing with minimum name disclosure in a content centric network.