H04L2209/60

Systems and methods for creating and activating a license

Systems and methods for creating a license during a purchasing process between a customer and a vendor are provided. In one implementation, a method may be executable by a vendor system in communication with a customer device in a decentralized computing infrastructure. The method may include the steps of receiving a purchase order from a customer to initiate a purchase of a software or hardware product, where the customer is associated with the customer device, and receiving a public key from the customer. Additionally, the method may include the steps of creating a smart contract for controlling a license related to the purchase of the software or hardware product and sending a contract address associated with the smart contract to the customer to enable the customer to activate the software or hardware product.

SYSTEM AND METHOD FOR STORING, DELIVERING AND SCREENING VISUAL MEDIA
20220179925 · 2022-06-09 · ·

In a computer system connected to Internet and operative for storing, delivering and screening a visual media one or more database services are provided, one or more graphical user interfaces are served, one or more application programming interfaces are provided, and the graphical user interfaces are formed so that identification of an uploaded content and a proxy storage are made possible by serving the graphical user interface.

System and method for handling digital content governance in an organization

A system and method for records management and classification of files in a content management system having a server system that stores the files. A system detects when at least one of the files is classified by a user of a client computing system as a classified file, and based on the detecting of the classification of the one or more files, each classified file is removed from the client computing system. The system further detects when at least one of the files is declared as a permanent record by the user of the client computing system, and based on the detecting of the declaration as a permanent record, prevents editing by the client computing system of each file declared as a permanent record.

OBFUSCATION FOR PROTECTION OF STREAMING MEDIA AND OTHER DATA FLOWS
20220171618 · 2022-06-02 · ·

A method is provided for obfuscating program code to prevent unauthorized users from accessing video. The method includes receiving an original program code that provides functionality. The original program code is transformed into obfuscated program code defining a randomized branch encoded version of the original program code. The obfuscated program code is then stored, and a processor receiving input video data flow uses the obfuscated program code to generate an output data flow.

SECURING BROWSER COOKIES
20220166780 · 2022-05-26 ·

Methods, systems, and apparatus, including an apparatus for verifying the integrity of requests. In some aspects, a method includes receiving, from an application, a request including an attestation token of the application. The attestation token includes a set of data that includes at least a public key of the application and a token creation time that indicates a time at which the attestation token was created. The attestation also includes a signature of the set of data. The signature is generated using a private key that corresponds to the public key. The integrity of the request is verified using the attestation token. The verification includes determining that the integrity of the request is valid based on a determination that the token creation time is within a threshold duration of the time at which the request was received and a determination that the set of data has not been.

METHOD AND SYSTEM FOR ENHANCING AUTHENTICITY DETAIL OF CAPTURED VIDEO
20230274546 · 2023-08-31 ·

A method and system for enhancing authenticity detail of captured video is disclosed. Objects within a physical environment (and visible within a camera field of view) are captured in video, and by way of video analytics these objects and their respective metadata are employed as part of the method and system for enhancing the authenticity detail of the captured video. Also, rather than the audio/video stream(s) being modified, the actual video scene itself may be modified.

Systems and methods for monitoring content consumption

Systems and methods are described for monitoring content consumption. A method may comprise determining, by a device, content accessed by one or more user devices. The method may comprise causing a distributed ledger record to be generated. The distributed ledger record may comprise an indication of the content. The distributed ledger record may be stored on a distributed ledger. The distributed ledger may comprise other records indicating content accessed by a plurality of other devices.

Threshold encryption for broadcast content

An example operation may include one or more of splitting a session key into a plurality of partial shares, distributing the plurality partial shares to a plurality of content providers, respectively, where each content provider receives a different partial share of the session key, encrypting a stream of media content based on the session key, and transmitting the encrypted stream of digital content to a user device which has one or more partial shares among the plurality of partial shares.

METHOD AND SYSTEM OF COMPUTER GRAPHICS PROCESSING SYSTEM VALIDATION FOR PROCESSING OF ENCRYPTED IMAGE CONTENT
20220156386 · 2022-05-19 · ·

Methods, articles, and systems of computer graphics processing system validation for processing of encrypted image content are disclosed herein.

Measuring and improving origin offload and resource utilization in caching systems

Origin offload is a key performance indicator of a content delivery network (CDN). This patent document presents unique methods and systems for measuring origin offload and applying those measurements to improve the offload. The techniques presented herein enable resource-efficient measurement of origin offload by individual servers and aggregation and analysis of such measurements to produce significant insights. The teachings hereof can be used to better identify root causes of suboptimal offload performance, to tune CDN settings and configurations, and to modify network operations, deployment and/or capacity planning. In addition, discussed herein are improved metrics showing offload in relation to the maximum achievable offload for the particular traffic being served.