H04L2209/60

SYSTEM AND METHOD FOR CONFIDENTIALITY-PRESERVING RANK-ORDERED SEARCH

A confidentiality preserving system and method for performing a rank-ordered search and retrieval of contents of a data collection. The system includes at least one computer system including a search and retrieval algorithm using term frequency and/or similar features for rank-ordering selective contents of the data collection, and enabling secure retrieval of the selective contents based on the rank-order. The search and retrieval algorithm includes a baseline algorithm, a partially server oriented algorithm, and/or a fully server oriented algorithm. The partially and/or fully server oriented algorithms use homomorphic and/or order preserving encryption for enabling search capability from a user other than an owner of the contents of the data collection. The confidentiality preserving method includes using term frequency for rank-ordering selective contents of the data collection, and retrieving the selective contents based on the rank-order.

ACCESS TO DATA BROADCAST IN ENCRYPTED FORM BASED ON BLOCKCHAIN

A solution is proposed for controlling access to data that are broadcast over a telecommunication medium. A corresponding method comprises validating by a plurality of validator devices an access request that is submitted by an access device for accessing the data. The validator devices update a blockchain by adding a new block comprising an indication of the access request in response to a positive result of its validation. A provider system transmits cryptographic information for decrypting the data to the access device in response to the new block. A corresponding method for broadcasting data by a provider system and a corresponding method for accessing broadcast data by an access device are proposed. Corresponding computer programs and computer program products for performing the methods are also proposed. Moreover, corresponding structure, provider system and access device are proposed.

System and method for secure transmission of media content

A system that incorporates teachings of the present disclosure may include, for example, a gateway comprising a controller to receive from a communication device a request for media content, receive a key and a record associated with the communications device from an interactive television system, wherein the record comprises a list of entitled media content, determine whether the requested media content is in the list of entitled media content, retrieve the requested media content from the interactive television system when the requested media content is determined to be in the list of entitled media content, encrypt the retrieved media content utilizing the key, and transmit the encrypted media content to the communications device. Other embodiments are disclosed.

Information processing apparatus, information processing system, information processing method, and program

Disclosed is a structure that includes: an information processing apparatus that stores content into an information storage device such as a memory card including an access allowed block based on an access right check made on each block, and uses the content; a content usage managing server that provides content usage permission information to the information processing apparatus; and a content correspondence information providing server that provides the encryption key to be used in decrypting the encrypted content stored in the information storage device. The content usage managing server determines the block for storing the encryption key and notifies the content correspondence information providing server of a block identifier that is the identifier of the determined block, and the content correspondence information providing server performs a process to write the encryption key into the block corresponding to the received block identifier.

Shared electronic device management device and method

A shared electronic device management method is implemented in a shared electronic device management device. The method includes receiving a function instruction, obtaining verification information, linking the obtained verification information to verification information in a database, determining whether the obtained verification information meets a first preset condition, implementing the function instruction if the obtained verification information meets the first preset condition, and outputting a prompt if the obtained verification information does not meet the first preset condition. The function instruction includes any one of retrieving, depositing, and repairing a shared electronic device. The verification information includes user verification information and shared electronic device verification information.

CONTENT REPRODUCTION METHOD AND DEVICE

Disclosed herein is a method and apparatus for managing license information for playing secure high definition content. The method includes receiving a certificate revision list (CRL) from a license server, receiving encrypted license information allowing a playback of the content through a first session established between a storage device and the license server wherein the first session is identified by session identification information, and playing the content based on the license information.

VALIDATING TRACKED PORTIONS OF RECEIVED SENSOR DATA USING COMPUTER CRYPTOGRAPHIC PROCESSING
20220038288 · 2022-02-03 ·

A computer identifies capture device output that represents an aspect of a recorded event. The computer cryptographically processes the tracked portions of capture device output to produce a validatable master file which includes master file media data tracked portion from the capture device output, master tracked portion metadata of said master file media data tracked portion, and master file blockchain data. The master file blockchain data includes a master file block history portion, a master file signature key portion, and a signed hash of said master file media data tracked portion. The computer also modifies the master file media data tracked portion to produce a reference file media data tracked portion. reference files and distributable files. The computer verifies the authenticity of each of these files.

INFORMATION PROCESSING DEVICE, INFORMATION RECORDING MEDIUM, AND INFORMATION PROCESSING METHOD, AND PROGRAM
20170220783 · 2017-08-03 · ·

A configuration in which a reliable source of illegal copy content is analyzed using content in which a reproduction path can be set is realized. Content which has a segment area including a plurality of items of variation data which can be decrypted using different keys and in which a reproduction path corresponding to the selected variation data can be set is used. Each item of variation data is configured such that embedded information such as a digital watermark can be acquired from decrypted data. Each item of variation data includes a 192-byte source packet or a 6144-byte aligned unit. A reproduction device selects and reproduces one item of variation data from each segment area on the basis of a variation data identifier recorded in the variation data.

Method and system for anonymous user data storage and controlled data access
11455414 · 2022-09-27 · ·

Methods and systems are configured to store user data and control access to the user data, wherein the data is stored remotely from the user (such as external to a user's computing device) and the user's data is maintained anonymously. Content is stored in association with a user identifier and access by third parties is controlled by linked third party identifiers.

File encryption method, file decryption method, electronic device, and storage medium

A method performed by at least one computer processor, the method comprising: obtaining an original file to be encrypted; encrypting header data of the original file to obtain encrypted header data, the header data comprising metadata of the original file; storing the encrypted header data; recording, to correspond to a file identifier of the original file, a first storage path of the encrypted header data; partitioning file data other than the header data in the original file, into segments; storing the segments in a disordered fragment sequence; and recording, to correspond to the file identifier, second storage paths of the segments along with an actual sequence of the segments in the original file.