Patent classifications
H04L2209/60
Rights controlled communication
A computerized process is described for transferring content from a first entity to a second entity including first transferring separately and via a database entity for each content: a content identifier, content rights, a content encryption key, a content initialization vector, a content encryption count, and a first entity identifier. Included with the transferred content is a transfer identifier, which is encrypted. After transferred content is received by the second entity, the transfer identifier is used to retrieve the content rights, content encryption key, content encryption initialization vector, content encryption count, and first entity identifier from the database entity. After receiving the content, both actions taken on the content and disposition of the content at the second entity are controlled according to the content rights by the first entity and the status of the content is reported to the first entity via a database entity.
Methods for shut-in pressure escalation analysis
Methods for using shut-in pressures to determine uncertainties in a hydraulic fracturing process in a shale reservoir are described. Data commonly collected during multistage fracturing is used to calculate propped fracture height and induced stresses, as well as other variables, in the presence of horizontal stress anisotropy. These variables can then be incorporated into reservoir simulations to perform fracturing monitoring, forecast hydrocarbon recoveries, or modify fracturing plans.
Providing access for online content via secured URL
Exemplary embodiments are directed to a method for allowing a user at a first client device to provide access to restricted content on a content provider server to a user at a second client device without providing identifying information of the second client device or the user to the content provider. The content provider receives a request from a messaging app on a first client device for sharing of a content item with a second client device and generates a metadata block comprising at least a link to the content item. The metadata block is sent to the first client device and, in response, a public key of a private/public key pair of the second client device is received from the first client device. A request for the content item, is then received and contains a data item digitally signed using the private key of the private/public key pair of the second client device. The public key is then used to verify the digitally signed data item, thereby confirming the identity of the second client device. Thereafter, the requested content item is sent to the second client device.
ACCESS TO DATA BROADCAST IN ENCRYPTED FORM BASED ON BLOCKCHAIN
A solution is proposed for controlling access to data that are broadcast over a telecommunication medium. A corresponding method comprises validating by a plurality of validator devices an access request that is submitted by an access device for accessing the data. The validator devices update a blockchain by adding a new block comprising an indication of the access request in response to a positive result of its validation. A provider system transmits cryptographic information for decrypting the data to the access device in response to the new block. A corresponding method for broadcasting data by a provider system and a corresponding method for accessing broadcast data by an access device are proposed. Corresponding computer programs and computer program products for performing the methods are also proposed. Moreover, corresponding structure, provider system and access device are proposed.
Validating tracked portions of received sensor data using computer cryptographic processing
A computer identifies capture device output that represents an aspect of a recorded event. The computer cryptographically processes the tracked portions of capture device output to produce a validatable master file which includes master file media data tracked portion from the capture device output, master tracked portion metadata of said master file media data tracked portion, and master file blockchain data. The master file blockchain data includes a master file block history portion, a master file signature key portion, and a signed hash of said master file media data tracked portion. The computer also modifies the master file media data tracked portion to produce a reference file media data tracked portion. reference files and distributable files. The computer verifies the authenticity of each of these files.
CONTENT FORMAT CONVERSION VERIFICATION
Content conversion verification, includes: converting, at a first computer system, an original content file to a target format, generating a converted content file in the target format; generating a checksum for the converted content file; and sending the original content file and the checksum to a second computer system. Key words include content verification and checksum.
Hybrid Blockchains and Streamchains Using Non-Crypto Hashes for Securing Audio-, Video-, Image-, and Speech-Based Transactions and Contracts
A method of securing media-based transactions and contracts on a distributed ledger network comprising receiving a first media file, obtaining a fingerprint of the first media file, generating a non-cryptographic hash value for the fingerprint of the first media file, generating a block for the distributed ledger network comprising a block header comprising previous hash, a state root hash, a receipts root hash, and a transaction list root hash, defining block header hashes, recording the non-cryptographic fingerprint hash value for the fingerprint of the first media file to the block and recording the block to the distributed ledger network.
SYSTEM AND METHODS OF DE-CENTRALIZED CONTENT COLLECTION, DISTRIBUTION, AND CONTROL
A content distribution system configured to store first and second creator content generated respectively by first and second creators, receive first and second rules generated separately by the first and second creator, respectively, the first rules governing requirements for consumers to access the first content, the second rules governing requirements for consumers to access the second content, the first and second rules requiring that a potential consumer must be a member of the respective creator's group, the first rules further requiring that the potential consumer must pay to receive access to the first content, receive a content request from a first-third party system from a first consumer requesting access to the first content, confirm that the first user qualifies to receive access and that the first third-party system is permitted, and provide access to the first content.
MEASURING AND IMPROVING ORIGIN OFFLOAD AND RESOURCE UTILIZATION IN CACHING SYSTEMS
Origin offload is a key performance indicator of a content delivery network (CDN). This patent document presents unique methods and systems for measuring origin offload and applying those measurements to improve the offload. The techniques presented herein enable resource-efficient measurement of origin offload by individual servers and aggregation and analysis of such measurements to produce significant insights. The teachings hereof can be used to better identify root causes of suboptimal offload performance, to tune CDN settings and configurations, and to modify network operations, deployment and/or capacity planning. in addition, discussed herein are improved metrics showing offload in relation to the maximum achievable offload for the particular traffic being served.
Protections for unauthorized copying (anti-cloning) method and system
An object is protected from unauthorized copying by providing a key generator for the object, producing a first key, second key and a lock for the keys, storing the first key in the object, storing the second key in a database separate from the object, reading the first and second keys, opening the lock with the first and second keys, producing a third and fourth keys and a new lock for the object, invalidating the first and second keys, replacing the first key in the object with the third key, and replacing the second key in the database with the fourth key.