Patent classifications
H04L2209/60
Accelerated encryption and decryption of files with shared secret and method therefor
A non-transitory computer-readable medium for sharing protected content, comprising instruction stored thereon. When executed on a processor, the instruction performs steps of deriving a shared secret, processing the shared secret using a secure hash algorithm 256 cryptographic hash to produce a primary encryption key, and encrypting a secondary encryption key using the primary encryption key. When the shared secret is derived between a private key and a public key of a first user, encrypting the protected content using the secondary encryption key, and transmitting the encrypted protected content to a server to be accessed by the second user. When the shared secret is derived between the private key of the first user and a public key of a second user, transmitting the secondary encryption key to the second user. The second user uses the secondary encryption key to decrypt the encrypted protected content on the server.
Methods and systems for processing an ephemeral con tent message
Exemplary embodiments relate to techniques for transmitting ephemeral content messages. A sending client may establish an end-to-end encrypted session with possible recipients of the message, using a first decryption key during initial session setup. The client may send an ephemeral content message, including encrypted content and a second key, to the recipients through a server. The server may be unable to retrieve the encrypted content due to a lack of the second key. The server may filter a list of intended recipients, and may forward the ephemeral content message to the recipients on the filtered list. The recipients may retrieve the second key from the message, and use the first and second keys to decrypt the encrypted content. The sending client may change the second key each time the recipient list changes from the perspective of the sending client, as determined at the time the ephemeral content message is transmitted.
Data access processing method for industrial internet cloud service platform
A data access processing method for an industrial Internet cloud service platform, comprising an industrial device with data to be accessed transmits a data access request to a data processing unit of the platform, and meanwhile uploads a device identifier capable of identifying the industrial device with data to be accessed, the data processing unit retrieves a data upload authentication tag matching the data to be accessed from a traceability unit according to the data access request, and a corresponding access strategy is selected for processing according to the data upload authentication tag, device representation, and the data access request. The data to be accessed can be processed flexibly and intelligently according to requirements of a data owner and an actual operation condition of the platform; and during data processing, various resources of the platform can be well regulated and controlled to process the data to be accessed.
SYSTEM AND METHOD OF DISPLAYING AND ON-DEMAND MINTING OF NFTS ACROSS MULTIPLE BLOCKCHAINS
An apparatus has a processor and a network interface circuit connected to the processor to provide connectivity to networked machines. A memory is connected to the processor. The memory stores instructions executed by the processor to establish a first network connection to a first proprietary block chain to obtain first non-fungible token (NFT) attributes associated with a first public key. A second network connection is created to a second proprietary block chain to obtain second NFT attributes associated with a second public key. A third network connection with a client machine supplies the first NFT attributes and the second NFT attributes.
Security of surveillance media
A media device receives a domain key from a service provider. The media device further encrypts media with a media key and encrypts the media key with the domain key to form an encrypted media token: the protected media key is encapsulated in an encrypted media token. The service provider may then receive the encrypted media token and one or more receiving entity identifiers relating to a receiving entity and ascertain whether the receiving entity is entitled to access media from the media device. If the receiving entity is entitled to access media from the media device, the service provider decrypts the cryptographic media token using the domain key to obtain the media key and providing the media key to the receiving entity. As such, an authenticated receiving entity may obtain the media key necessary to decrypt the media. Moreover, there is no requirement for any intermediate entity to have similar access and thus the encryption provided by the media key is in place throughout the transport of the media from media device to receiving entity.
PROVIDING CONTROLLED ACCESS TO CONTENT ON A CLIENT SYSTEM
Providing controlled access to content on a client system by providing protected content on a client system where the content is accessible with a token and providing a media file at the client system with the token embedded in association with the media file. The protected content is accessed by releasing the token to the client system when it is determined that an action condition of the media file has been met and using the token to enable access to the protected content on the client system.
Determining authenticity of digital content
A system, method, and computer readable medium for determining authenticity of digital content. The system includes obtaining a video including a plurality of intermediate video frames with respective digital signatures, each video frame of the plurality of intermediate video frames associated with a respective digital signature. The digital signature is generated based at least in part on the image content of the video frame and a hash value of a previous video frame in the same video. Based on using a cryptographic key associated with a recording device used to capture the video, the system can determine authenticity of the content and the ordering of the frames within a video.
System and method for generating a pepper's ghost artifice in a virtual three-dimensional environment
A three-dimensional (3D) appearing Pepper's Ghost artifice is created in a 3D virtual environment for viewing on at least one target device by using a source device that includes a database that stores a plurality of virtual screens of varying sizes and shapes, and an artifice processor. Motion metric data of a human is captured. Also, at least one two-dimensional (2D) live video feed of at least a portion of the human is captured. The artifice processor enables and stitches a Pepper's Ghost artifice of the human using the motion metric data of the human, the at least one 2D live video feed of the human, and a unique identifier of the human. At least one virtual screen is selected from the database using the Pepper's Ghost artifice of the human. The selected virtual screen is compatible with the at least one 2D live video feed of the human. The Pepper's Ghost artifice of the human and the selected at least one compatible virtual screen is transmitted to at least one target device for projection of the Pepper's Ghost artifice of the human onto the selected at least one compatible virtual screen, thereby creating a 3D appearing Pepper's Ghost artifice in a 3D virtual environment at the least one target device.
Method and system of computer graphics processing system validation for processing of encrypted image content
Methods, articles, and systems of computer graphics processing system validation for processing of encrypted image content are disclosed herein.
STREAMING CONTENT VIA BLOCKCHAIN TECHNOLOGY
An approach is disclosed for streaming content into a plurality of blobbers running on a blockchain storage platform. The streaming content is received, and the content is stored into a buffer. The buffered content is separated into fragments F (F1, F2, . . . , Fi, . . . , Fj . . . , Fn) where the each fragment Fi has a memory allocation different from other fragments Fj where j is not i while continuing to receive the streaming content until a blocking event occurs. Each fragment is split into a number of chunks determined by a fragment size divided by a chunk size. Each chunk is split into a fixed number of DABs where the number of DABs is the chunk size divided by the DAB size. A fixed Merkle tree is constructed suitable for sending to a number of blobbers for recording the DABs referenced by the leaf nodes of the fixed Merkle tree.