H04L2209/60

METHODS FOR SHUT-IN PRESSURE ESCALATION ANALYSIS
20230334204 · 2023-10-19 · ·

Methods for using shut-in pressures to determine uncertainties in a hydraulic fracturing process in a shale reservoir are described. Data commonly collected during multistage fracturing is used to calculate propped fracture height and induced stresses, as well as other variables, in the presence of horizontal stress anisotropy. These variables can then be incorporated into reservoir simulations to improve the fracturing monitoring, forecast hydrocarbon recoveries, or modify fracturing plans.

ELLIPTIC CURVE ISOGENY BASED KEY AGREEMENT PROTOCOL

An electronic key pre-distribution device (110) for configuring multiple network nodes (210, 211) with local key information is provided. The key pre-distribution device comprises applies at least a first hash function (147) and a second hash function (148) to a digital identifier of a network node. The first and second hash functions map the digital identifier to a first public point (141; H.sub.1(ID)) and a second public point (142; H.sub.2(ID)) on a first elliptic curve (131) and second elliptic curve (132). A first and second secret isogeny (135) is applied to the first and second public elliptic curve point (141, 142), to obtain a first private elliptic curve point (151) and second private elliptic curve point (152) being part of private key material (155) for the network node (210).

LINKING DIGITAL AND PHYSICAL NON-FUNGIBLE ITEMS

The technology relates to a technique for representing a unique physical asset such as a smartphone with a unique (singular) digital asset such as a non-fungible token (NFT). The NFT and related metadata can be stored on a blockchain to verify ownership of the digital asset. In one example, the NFT is produced based on a unique identifier (IMEI) for the smartphone. Other examples of physical assets with unique identifiers include automobiles, real property, etc.

TIME-BASED DIGITAL SIGNATURE

A method includes receiving an event, the event associated with a digital signature in a first time-based message comprising a first trusted time stamp token generated using a first hash of digitally signed content from a trusted timing authority; generating a first block on a distributed ledger; generating a second hash of the first trusted time stamp token; receiving a second trusted time stamp token from the trusted timing authority in response to transmitting the second hash to the trusted timing authority; and generating a second block on the distributed ledger; wherein verification of data integrity of the digitally signed content is provided via the first hash of the digitally signed content and second hash of the first trusted time stamp token and via the hash of the first block and a hash of the second block.

Methods, systems, and media for protecting and verifying video files
11750577 · 2023-09-05 · ·

Methods, systems, and media for protecting and verifying video files are provided. In some embodiments, a method for verifying video streams is provided, the method comprising: receiving, at a user device, a request to present a video that is associated with a video archive, wherein the video archive includes a file list, a signature corresponding to the file list, video metadata, a signature corresponding to the video metadata, and at least one encrypted video stream corresponding to the video, and wherein the file list indicates a plurality of files that are to be included in the video archive; verifying the signature corresponding to the file list; in response to determining that the signature corresponding to the file list has been verified, determining whether the plurality of files indicated in the file list are included in the video archive; in response to determining that the plurality of files indicated in the file list are included in the video archive, verifying the signature corresponding to the video metadata; in response to determining that the signature corresponding to the video metadata has been verified, requesting a decryption key corresponding to the video stream; in response to receiving the decryption key, decrypting the encrypted video stream; and causing the decrypted video stream to be presented on the user device.

PLATFORM AND METHOD FOR TOKENIZING A GAMING PROFILE

A system, method, device, and data platform for managing gaming data utilizing tokens. Gaming data associated with a player and one or more games are obtained. The gaming data is received by a data platform. The gaming data is inserted in a gaming profile. The gaming data is tokenized into one or more tokens. The gaming data is monetized based on preferences within the gaming profile.

CONTENT PROTECTION SYSTEM
20230283466 · 2023-09-07 · ·

An connection apparatus receives a purchase desire notification including a public key from another connection apparatus via a blockchain network and transmits an encrypted content key acquired by encrypting a content key using the public key to the other connection apparatus via the blockchain network. The other connection apparatus transmits the purchase desire notification to the one connection apparatus and transmits transmission source information representing a transfer destination of the content to the blockchain network. In addition, the other connection apparatus decrypts the encrypted content key from the one connection apparatus using the stored secret key. In a case in which the encrypted content key is received, the blockchain network changes an owner represented in owner management information to the transfer destination.

Validating primary subsets of received sensor data using computer cryptographic processing

A computer identifies capture device output that represents an aspect of a recorded event. The computer cryptographically processes the primary subsets of capture device output to produce a validatable master file which includes master file media data primary subset from the capture device output, master primary subset metadata of the master file media data primary subset, and master file blocktree data. The master file blocktree data includes a master file block history portion, a master file signature key portion, and a signed hash of the master file media data primary subset. The computer also modifies the master file media data primary subset to produce a reference file media data primary subset. reference files and distributable files. The computer verifies the authenticity of each of these files.

Linking digital and physical non-fungible items

The technology relates to a technique for representing a unique physical asset such as a smartphone with a unique (singular) digital asset such as a non-fungible token (NFT). The NFT and related metadata can be stored on a blockchain to verify ownership of the digital asset. In one example, the NFT is produced based on a unique identifier (IMEI) for the smartphone. Other examples of physical assets with unique identifiers include automobiles, real property, etc.

Prioritized content encryption for rapid breach response
11658802 · 2023-05-23 · ·

Techniques for rapid video on demand (VOD) media content breach response are described. In some embodiments, during content preparation, a server generates an encrypted media content item by generating a first encrypted portion using a first key derived from a first seed that is of a first type and generating a second encrypted portion using a second key derived from a second seed that is of a second type. In some embodiments, the server classifies the first portion in a first category (e.g., a prioritized category) and the second portion in a second category (e.g., a non-prioritized category). During a breach response, the server repairs the encrypted media content item by re-encrypting portions in the first category, e.g., re-encrypting the first encrypted portion using a replacement key derived from a replacement seed that is of the first type, and updating encryption metadata.