Patent classifications
H04L2209/60
SYSTEMS AND METHODS FOR AUTHENTICATED CONTROL OF CONTENT DELIVERY
The present disclosure provides systems and methods for authenticated control of content delivery. The method includes receiving a request for an item of content from a computing device, the request comprising a security token associated with the computing device and an identifier of a group of domains, identifying the group of domains from the identifier, and retrieving a security key associated with the group of domains. The method further includes decrypting a signature of the security token, identifying an authentication string, determining that the authentication string matches a server authentication string, and identifying characteristics of the security token. The characteristics of the security token include a confidence score. The method further includes comparing the confidence score of the security token to a threshold, determining that the confidence score does not exceed the threshold, and preventing transmission of content to the computing device.
INTEGRITY VERIFICATION OF PRE-COMPILED ARTIFICIAL INTELLIGENCE MODEL BLOBS USING MODEL SIGNATURES
Systems, apparatuses and methods include technology that generates a signature based on one or more characteristics of an artificial intelligence (AI) model. The AI model is in a source code. The technology generates a compiled blob based on the AI model and embeds an identifier based on the signature into a metadata field of the compiled blob.
Methods, apparatuses, computer programs, computer program products and systems for sharing content
This disclosure aims to overcome at least some of the drawbacks associated with today's content sharing applications. In one aspect, this disclosure enables decentralized sharing of content based on crypto protocols and distributed database technology (e.g., blockchain technology). In one aspect, the content to be shared is encrypted and included in a session document that is stored in a distributed database that can be shared without requiring a central administrator.
Prioritized Content Encryption for Rapid Breach Response
Techniques for rapid video on demand (VOD) media content breach response are described. In some embodiments, during content preparation, a server generates an encrypted media content item by generating a first encrypted portion using a first key derived from a first seed that is of a first type and generating a second encrypted portion using a second key derived from a second seed that is of a second type. In some embodiments, the server classifies the first portion in a first category (e.g., a prioritized category) and the second portion in a second category (e.g., a non-prioritized category). During a breach response, the server repairs the encrypted media content item by re-encrypting portions in the first category, e.g., re-encrypting the first encrypted portion using a replacement key derived from a replacement seed that is of the first type, and updating encryption metadata.
Method and apparatus for delivering encoded content
A method and system for delivering encoded content are provided. A holdback representing a portion of the encoded content is extracted, thereby damaging the encoded content. The damaged encoded content is distributed. The holdback is transmitted to enable reintegration of the holdback with the damaged encoded content to restore the encoded content.
Methods, systems, and media for protecting and verifying video files
Methods, systems, and media for protecting and verifying video files are provided. In some embodiments, a method for verifying video streams is provided, the method comprising: receiving, at a user device, a request to present a video that is associated with a video archive, wherein the video archive includes a file list, a signature corresponding to the file list, video metadata, a signature corresponding to the video metadata, and at least one encrypted video stream corresponding to the video, and wherein the file list indicates a plurality of files that are to be included in the video archive; verifying the signature corresponding to the file list; in response to determining that the signature corresponding to the file list has been verified, determining whether the plurality of files indicated in the file list are included in the video archive; in response to determining that the plurality of files indicated in the file list are included in the video archive, verifying the signature corresponding to the video metadata; in response to determining that the signature corresponding to the video metadata has been verified, requesting a decryption key corresponding to the video stream; in response to receiving the decryption key, decrypting the encrypted video stream; and causing the decrypted video stream to be presented on the user device.
Collaborative video non-fungible tokens and uses thereof
One example computer-implemented collaborative NFT method involves receiving and digitally storing a set of files, each file comprising digital content; programmatically associating the set of files with a corresponding unique project identifier; receiving digital input specifying a final digital composition comprising information from the set of files; digitally storing the final digital composition as a digital object in a database; receiving digital input specifying an allocation of authorship shares representing a distribution of ownership rights in the digital object; minting, on a blockchain, an NFT comprising a reference to the digital object; creating, on the blockchain, a smart contract specifying a fractional ownership of the digital object, the smart contract comprising a pointer to a metadata file associated with the NFT, the metadata file comprising one or more links to one or more corresponding digital assets associated with the NFT, each digital asset comprising a representation of the NFT.
Video registration and authentication using blockchain
A system includes a registration server and an authentication server. The registration server receives a source video and splits it into a series of segments that includes a first segment. The registration server generates a first hash from the first segment and stores it in a block in a blockchain. The registration server stores an identifier for the block in the first set of metadata. The authentication server receives a request to authenticate a target video and splits it into a series of segments that includes a first segment, corresponding to the first segment of the source video. The authentication server generates a second hash from the first segment. The authentication server determines that the second set of metadata includes the identifier and uses it to locate the block in the blockchain. The authentication server determines that the second hash does not match the first hash and transmits an alert.
METHOD AND SYSTEM FOR WHOLE-PROCESS TRACE LEAVING OF VIDEO MANUSCRIPT GATHERING, EDITING, AND CHECK
The present invention provides a method for whole-process trace leaving of video manuscript gathering, editing, and check, including: extracting a key frame from video clipping information, generating histogram data by using the key frame, and obtaining video modification information based on the histogram data; and on-chaining, by using timestamps as blockchain nodes, the video modification information completed at different time points to form a trace chain arranged according to the timestamp, to implement whole-process trace leaving for video clipping. The technical solutions of the present invention resolve a difficulty in whole-process trace leaving for video manuscript editing and issuing, and in addition, by using the blockchain techniques, implement tamper-proofing and security of trace information, thereby effectively improving security of gathering and editing in the media industry.
Secure Transport of Content Via Content Delivery Service
Devices and techniques for secure transmission of content over third-party networks are provided. Keys are established for secure transport of content between a source and recipient via a third party. The source generates a content package that includes an encrypted payload, and a payload handler. In some instances, the content package may also include user interface code for obtaining a secret from the recipient. The content package may be signed (e.g., the message content hashed and the result of the hash added to the content package). The content package is transmitted over a connection to a content delivery service for delivery to recipient(s) via another connection. The content delivery service receives the package and forwards the package to recipient(s) without decrypting the payload. A recipient receives the package from the content delivery service, validates the package and decrypts the payload. The payload may be presented to a display application.