Patent classifications
H04L2209/60
SYSTEM AND METHOD FOR APPLYING RICARDIAN CONTRACT PRINCIPLES TO AGREEMENTS
The present invention is a system and method that applies Ricardian Contract Principles to agreements. Ricardian contracts are designed for the hyper ledger, and are comprised of three main components: contract, metadata, and ledger. The present invention collects data from a confidentiality agreement, and can draft the agreement to ensure high accuracy in data extraction. Contract terms can be organized in a hierarchy of importance that ranks contract statement in the general order, such as: obligations; restrictions; rights; and conditional statements. The present invention tracks episodic and conditional terms, such as a monthly payment or a disclosure requiring notification. The present invention connects agreement terms to an immutable contract ledger. A ledger of contract statements associated with the events or circumstances triggering such contract obligations, restrictions, and rights processed by an immutable historical log recording all events.
APPARATUS AND METHOD FOR MAINTAINING SECURITY OF VIDEO DATA
Disclosed is a method for maintaining security of video data of a security device. The method comprises transmitting an access request to decryption server, receiving certificate information comprising a public key arbitrarily selected by the decryption server when the access request is approved, generating a symmetric key for encrypting video data, encrypting the symmetric key using the public key, and transmitting the encrypted symmetric key to the decryption server.
METHOD AND SYSTEM FOR SECURE DISTRIBUTION OF SELECTED CONTENT TO BE PROTECTED
The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related thereto and to apparatus and methodology for production side systems and are consumer side systems for securely utilizing protected electronic data files of content (protected content), and further relates to controlled distribution, and regulating usage of the respective content on a recipient device (computing system) to be limited strictly to defined permitted uses, in accordance with usage rights (associated with the respective content to control usage of that respective content), on specifically restricted to a specific one particular recipient device (for a plurality of specific particular recipient devices), or usage on some or any authorized recipient device without restriction to any one in specific, to control use of the respective content as an application software program, exporting, modifying, executing as an application program, viewing, and/or printing of electronic data files.
Obfuscation for protection of streaming media and other data flows
A method is provided for obfuscating program code to prevent unauthorized users from accessing video. The method includes receiving an original program code that provides functionality. The original program code is transformed into obfuscated program code defining a randomized branch encoded version of the original program code. The obfuscated program code is then stored, and a processor receiving input video data flow uses the obfuscated program code to generate an output data flow.
SYSTEM AND METHOD FOR HANDLING DIGITAL CONTENT GOVERNANCE IN AN ORGANIZATION
Products, systems and methods for removing a first item from a client computing system, in response to detecting the first item is declared as belonging to a first class in a database; preventing editing of a second item by the client computing system, in response to detecting the second item is declared as belonging to a second class in the database, a record declared as belonging to the first class or the second class by an application executed on the client computing system, the client computing system remotely connected, via a communications network, to a content management system associated with the database; and queuing a third item for transfer to the client computing system over the communications network, in response to detecting a synchronization event initiated by the client computing system or a server computing system connected to the client computing system over the communications network.
ENTITY AUTHENTICATION FOR PRE-AUTHENTICATED LINKS
Techniques for increasing security for pre-authenticated links are disclosed herein. Computing systems that generate pre-authenticated links are configured to assign an entity identifier to pre-authenticated links to specify an entity permitted to access respective data through the pre-authenticated link. When activating a respective pre-authenticated link, an entity attaches an entity token to the request to prove an identity of the requesting entity. If the identity from the entity token matches the entity identifier, the computing system may grant access to the respective data.
METHOD AND SYSTEM FOR SECURE DISTRIBUTION OF SELECTED CONTENT TO BE PROTECTED ON AN APPLIANCE-SPECIFIC BASIS WITH DEFINABLE PERMITTED ASSOCIATED USAGE RIGHTS FOR THE SELECTED CONTENT
The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related thereto and to apparatus and methodology for production side systems and are consumer side systems for securely utilizing protected electronic data files of content (protected content), and further relates to controlled distribution, and regulating usage of the respective content on a recipient device (computing system) to be limited strictly to defined permitted uses, in accordance with usage rights (associated with the respective content to control usage of that respective content), on specifically restricted to a specific one particular recipient device (for a plurality of specific particular recipient devices), or usage on some or any authorized recipient device without restriction to any one in specific, to control use of the respective content as an application software program, exporting, modifying, executing as an application program, viewing, and/or printing of electronic data files.
RIGHTS CONTROLLED COMMUNICATION
A system for exchanging secure and controlled messages between a first entity and a second entity is described. The system includes a data transport mechanism, software operating on one or more processors wherein said software allows for composing, saving, encrypting, decrypting, and streaming messages and associated message rights. The system includes an input means for the first entity and the second entity. To send a secure and controlled message, the sender composes a message and associated message rights, and makes the message along with the associated message rights available to the recipient. The system allows the recipient to receive message rights, and the system allows the recipient to receive message elements for display, if permitted by the message rights associated with the message elements.
Systems and methods of digital content certification and verification using cryptography and blockchain
A verification computer system is provided that provides for content certification and verification using cryptography and a blockchain.
Tracking and certification of digital media via distributed ledger
Copies of a distributed ledger with multiple blocks are stored on multiple computing devices and a secure server that stores a plurality of authenticated digital media asset. A first computing device with an authenticated digital media asset generates a new block to the distributed ledger, and each subsequent computing devices with modifications made to the digital media asset adds a new block identifying modification made to the digital media asset and appends a hash of at least a portion of a previous block of the distributed ledger.