Patent classifications
H04L2209/60
SYSTEM AND METHOD FOR GENERATING A PEPPER'S GHOST ARTIFICE IN A VIRTUAL THREE-DIMENSIONAL ENVIRONMENT
A system, method, and device for generating Pepper's Ghost artifices from two-dimensional sources including Augmented Reality (“AR”) or Virtual Reality (“VR”) environments such that the Pepper's Ghost artifices appear to be a natural addition to a three-dimensional virtual environment. By employing virtual Pepper's Ghost projections onto varying size and shaped screens in the virtual three-dimensional environment, a reduction in bandwidth and costs are realized particularly when displaying humanoid characters in an AR and/or VR environment. While the methods disclosed with the present invention could be of utility to any type of virtual environment, the benefits are particularly acute for dynamic VR environments.
Pixel streamed NFT-based living artwork and queue-based live event viewing
A method provides a set of credentials for accessing a live event as a spectator. The credentials includes tiered credentials with respect to access privileges from a queue imposed to access the live event. The access privileges specify a queued order based spectator access time and a spectator access duration. The method evaluates the credentials received from users seeking to access the live event as spectators including determining whether a provided credential pertains to a non-owning viewer or an owning viewer of a subject of the live event. The method controls, by a real-time visual media generation engine of a streaming server, the spectator access time and the spectator access duration of each of the users to the live event as the spectators based on the credentials by placing the users in predetermined queuing positions associated with corresponding levels of the credentials. The live event is a living artwork.
DATABASE LAYER CACHING FOR VIDEO COMMUNICATIONS
An apparatus includes a network interface and a processor. The network interface receives event data that identifies a content ID and a message authentication code. The content ID identifies a content within a webcast or a virtual event. The processor generates a content hash, at least in part based on the content ID. The network interface transmits a content request and receives the content. The content request identifies the content hash and the message authentication code.
DATABASE LAYER CACHING FOR VIDEO COMMUNICATIONS
An apparatus includes a network interface and a processor. The network interface receives event data that identifies a content ID and a message authentication code. The content ID identifies a content within a webcast or a virtual event. The processor generates a content hash, at least in part based on the content ID. The network interface transmits a content request and receives the content. The content request identifies the content hash and the message authentication code.
SYSTEMS AND METHODS FOR MANAGEMENT OF NON-FUNGIBLE TOKENS AND CORRESPONDING DIGITAL ASSETS
Systems and techniques are described for situational token generation. A system receives media content that is based on sensor data captured by at least one sensor of a media device. The system determines a position of the media device. The system determines that the position of the media device is within a geographic area. In response to determining that the position of the media device is within the geographic area, the system generates a token corresponding to the media content. A payload of at least one block of a distributed ledger identifies the token.
Methods, Systems, and Devices for Server Control of Client Authorization Proof of Possession
Techniques for server control of client authorization proof of possession are described herein. In various embodiments, a first server provisions client authorization proof of possession for a client device a real-world time, a client public key, and a client private key. The first server generates provisioning response message(s) including the client public key, the client private key, the real-world time, and/or an assertion object, and sends the message(s) to the client device. In various embodiments, a client device obtains an authorization proof token generated based on a client public key, a client private key, and a real-world time provisioned by a first server. The client device generates a request and sends the request to a second server, the request includes the authorization proof token and an assertion object from the first server signed by a server private key and an expiration time and a reference to the client public key.
METHODS, SYSTEMS, AND MEDIA FOR PROTECTING AND VERIFYING VIDEO FILES
Methods, systems, and media for protecting and verifying video files are provided. In some embodiments, a method for verifying video streams is provided, the method comprising: receiving, at a user device, a request to present a video that is associated with a video archive, wherein the video archive includes a file list, a signature corresponding to the file list, video metadata, a signature corresponding to the video metadata, and at least one encrypted video stream corresponding to the video, and wherein the file list indicates a plurality of files that are to be included in the video archive; verifying the signature corresponding to the file list; in response to determining that the signature corresponding to the file list has been verified, determining whether the plurality of files indicated in the file list are included in the video archive; in response to determining that the plurality of files indicated in the file list are included in the video archive, verifying the signature corresponding to the video metadata; in response to determining that the signature corresponding to the video metadata has been verified, requesting a decryption key corresponding to the video stream; in response to receiving the decryption key, decrypting the encrypted video stream; and causing the decrypted video stream to be presented on the user device.
SYSTEMS AND METHODS FOR AUTHENTICATED CONTROL OF CONTENT DELIVERY
The present disclosure provides systems and methods for authenticated control of content delivery. The method includes receiving a request for an item of content from a computing device, the request comprising a security token associated with the computing device and an identifier of a group of domains, identifying the group of domains from the identifier, and retrieving a security key associated with the group of domains. The method further includes decrypting a signature of the security token, identifying an authentication string, determining that the authentication string matches a server authentication string, and identifying characteristics of the security token. The characteristics of the security token include a confidence score. The method further includes comparing the confidence score of the security token to a threshold, determining that the confidence score does not exceed the threshold, and preventing transmission of content to the computing device.
SYSTEM AND METHOD FOR SCALABLY TRACKING MEDIA PLAYBACK USING BLOCKCHAIN
Systems and methods for tracking media file playback are provided. A request to upload a media file and metadata associated with the media file is received. Next, the media file and metadata is uploaded via a blockchain protocol. Next, a request to play the media file is received from a client device or a digital service provider (DSP) platform. The request to play the media file is validated via the blockchain protocol. Upon validating the request to play the media file, the media file is transmitted for playback at the client device or DSP platform. Last, the number of times the media file is played is tracked via the blockchain protocol.
ELECTRONIC DEVICE FOR SPEECH SECURITY WITH LESS ENVIRONMENTAL SOUND DISTORTION AND OPERATING METHOD THEREOF
An electronic device and an operating method thereof according to various example embodiments may be configured to acquire video data and audio data, to scramble audio data of a time interval (ΔT) in non-time order, and to store the video data and the scrambled audio data together. According to an example embodiment, the time interval (ΔT) may be fixed to be the same with respect to continuous audio data. According to another example embodiment, the time interval (ΔT) may vary using a function of receiving an input of a secret key and order and outputting a unique value, such as a Hash-based Message Authentication Codes (HMAC)-based One-time Password (HOTP) algorithm.