Patent classifications
H04L2209/60
MATHEMATICAL METHOD FOR PERFORMING HOMOMORPHIC OPERATIONS
The present invention relates generally to a system and method of querying an anonymized database. More particularly, the invention provides a method and system for querying an anonymized database without the need to decrypt queried data while it's processed. Even more specifically, the invention provides a method and system of anonymizing a database such that it may be queried efficiently in near real time while still retaining the ability to not decrypt requested data while it's being processed.
Systems and methods for creating and activating a license
Systems and methods for creating a license during a purchasing process between a customer and a vendor are provided. In one implementation, a method may be executable by a vendor system in communication with a customer device in a decentralized computing infrastructure. The method may include the steps of receiving a purchase order from a customer to initiate a purchase of a software or hardware product, where the customer is associated with the customer device, and receiving a public key from the customer. Additionally, the method may include the steps of creating a smart contract for controlling a license related to the purchase of the software or hardware product and sending a contract address associated with the smart contract to the customer to enable the customer to activate the software or hardware product.
TECHNIQUES FOR PREVENTING COLLUSION USING SIMULTANEOUS KEY RELEASE
Described herein are a system and techniques for enabling user control over usage of their information by data consumers, even when untrusted parties are involved, while also preventing collusion between the untrusted party and a data consumer. A user's information may be collected by a client device and provided to a host server. An encrypted version of the user'information may be stored at the host server so that it is processed on a private enclave of the host server. When the data is to be provided to multiple data consumers, the data may be encrypted for each of the data consumers and may be released to each of those data consumers simultaneously once confirmation has been received that the data has been made available to each of the data consumers.
Method of defining and performing dynamic user-computer interaction, computer guided navigation, and application integration for any procedure, instructions, instructional manual, or fillable form
Various embodiments described in this disclosure relate to methods and computer-based systems that implement those methods for overlaying or superimposing computer-user interaction widgets and application interface widgets on top of content blocks contained within digitized documents which represent written procedures or instructions, instructional manuals and fillable forms, in order to support means of providing dynamic user-computer interaction and computer guided navigation, as well as application functions and data integration, driven through structured interaction and integration metadata definitions, as it relates to said content blocks, during job performance.
Video communication data security
A processing system including at least one processor may obtain a portion of a video stream, identify a first region of the portion of the video stream that contains a first item that is designated for obscuring, replace the first item in the first region of the portion of the video stream with an obscured version of the first item, and encrypt the portion of the video stream with a first encryption key. The processing system may further generate an executable package comprising the first item in the first region of the portion of the video, where the executable package is encrypted with a second encryption key, and transmit the portion of the video stream that is encrypted with the first encryption key and the executable package that is encrypted with the second encryption key to a recipient device.
Controlling access to encrypted data
Enabling access to encrypted information by providing a master key and a public key to a partial content owner, generating a ciphertext of content according to a complete content data, at least one content data partition and the public key, wherein the content data partition comprises a portion of the complete content data, providing the ciphertext of the content data and the public key to a validator, receiving a validation result from the validator, and acting upon the validation result.
Hybrid blockchains and streamchains using non-crypto hashes for securing audio-, video-, image-, and speech-based transactions and contracts
A method of securing media-based transactions and contracts on a distributed ledger network comprising receiving a first media file, obtaining a fingerprint of the first media file, generating a non-cryptographic hash value for the fingerprint of the first media file, generating a block for the distributed ledger network comprising a block header comprising previous hash, a state root hash, a receipts root hash, and a transaction list root hash, defining block header hashes, recording the non-cryptographic fingerprint hash value for the fingerprint of the first media file to the block and recording the block to the distributed ledger network.
IN-VEHICLE CONTENT DELIVERY SYSTEM OPERABLE IN AUTONOMOUS MODE AND NON-AUTONOMOUS MODE
Multimedia content may be delivered to content consumer devices via a content-delivery network. Encrypted content and cryptography keys for decrypting the content may be distributed from a data center to various nodes of the content-delivery network, each node acting as a semi-independent content-delivery system. Each content-delivery system is capable of delivering received content to end-users and implementing a key-management scheme to facilitate secure content-delivery and usage tracking, even when the content-delivery system is disconnected from the data center. In other words, the disclosed systems and methods facilitate the operation of nodes which may operate in “autonomous mode” when disconnected from a larger content-delivery network, thus maintaining content-delivery capabilities despite having little if any connectivity to external networks.
User Terminal, Permission Information Management Method, and Permission Information Management Program
A user terminal generates a first key pair and a second key pair, transmits a permission request including a public encryption key of the second key pair after electronically signing the permission request with a secret encryption key, and acquires, from permission information transmitted from a right-holder terminal, a content decryption key by using a secret decryption key of the second key pair and uses the content. The right-holder terminal stores a third key pair and the content decryption key, verifies the permission request received, and encrypts the content decryption key by using the public encryption key of the second key pair included in the permission request and transmits the permission information including the encrypted content decryption key after electronically signing the permission information with a secret encryption key of the third key pair. The permission request and the permission information are transmitted and received via a blockchain.
Portioned video streaming concepts
Portion- or tile-based video streaming concepts are described. In one example aspect, a server includes a processor that is configured to provide a manifest file to a client. The manifest file includes first parameter sets each defining one of picture-portion specific adaptation sets of representations. Each first parameter set comprises a quality level for each representation of the picture-portion specific adaptation set defined by the respective first parameter set. The manifest file also includes at least one second parameter set defining a preselection adaptation set which assigns to each of regions of an output picture area one of the picture-portion specific adaptation sets.