Patent classifications
H04L2209/60
Electronic device for speech security with less environmental sound distortion and operating method thereof
An electronic device and an operating method thereof according to various example embodiments may be configured to acquire video data and audio data, to scramble audio data of a time interval (ΔT) in non-time order, and to store the video data and the scrambled audio data together. According to an example embodiment, the time interval (ΔT) may be fixed to be the same with respect to continuous audio data. According to another example embodiment, the time interval (ΔT) may vary using a function of receiving an input of a secret key and order and outputting a unique value, such as a Hash-based Message Authentication Codes (HMAC)-based One-time Password (HOTP) algorithm.
SYSTEM AND METHOD FOR GENERATING A PEPPER'S GHOST ARTIFICE IN A VIRTUAL THREE-DIMENSIONAL ENVIRONMENT
A system, method, and device for generating Pepper's Ghost artifices from two-dimensional sources including Augmented Reality (“AR”) or Virtual Reality (“VR”) environments such that the Pepper's Ghost artifices appear to be a natural addition to a three-dimensional virtual environment. By employing virtual Pepper's Ghost projections onto varying size and shaped screens in the virtual three-dimensional environment, a reduction in bandwidth and costs are realized particularly when displaying humanoid characters in an AR and/or VR environment. While the methods disclosed with the present invention could be of utility to any type of virtual environment, the benefits are particularly acute for dynamic VR environments.
Pixel streamed NFT-based living artwork and queue-based live event viewing
A method, program storage device, and computer processing system are provided. The method includes providing a set of credentials for accessing a live event. The set of credentials include tiered credentials with respect to access privileges from a queue imposed to access the live event. The access privileges specify a queued order based access time and an access duration. The method further includes evaluating the credentials received from users seeking to access the live event. The method also includes controlling, by a real-time visual media generation engine of a streaming server, the access time and the access duration of each of the users to the live event based on the credentials by placing the users in predetermined queuing positions associated with corresponding levels of the credentials.
System and method for generating a pepper's ghost artifice in a virtual three-dimensional environment
A system, method, and device for generating Pepper's Ghost artifices from two-dimensional sources including Augmented Reality (“AR”) or Virtual Reality (“VR”) environments such that the Pepper's Ghost artifices appear to be a natural addition to a three-dimensional virtual environment. By employing virtual Pepper's Ghost projections onto varying size and shaped screens in the virtual three-dimensional environment, a reduction in bandwidth and costs are realized particularly when displaying humanoid characters in an AR and/or VR environment. While the methods disclosed with the present invention could be of utility to any type of virtual environment, the benefits are particularly acute for dynamic VR environments.
AUTOMATED DISTRIBUTED VERACITY EVALUATION AND VERIFICATION SYSTEM
Systems and methods for verifying and/or challenging the veracity and/or objectivity of media content are provided. In some examples, a warranty system stores, in a distributed ledger, a warranty of veracity of an aspect of a media asset. The warranty includes a smart contract specifying that an action is to be performed in response to a condition being met. The warranty system receives a challenge from a challenger device. The challenge disputes the veracity of the aspect of the media asset. The warranty system verifies that the challenge accurately disputes the veracity of the aspect of the media asset. The warranty system identifies that the condition is met based on verification that the challenge accurately challenges the veracity of the aspect of the media asset. The warranty system automatically triggers performance of the action in response to identifying that the condition is met.
METHODS FOR SHUT-IN PRESSURE ESCALATION ANALYSIS
Methods for using shut-in pressures to determine uncertainties in a hydraulic fracturing process in a shale reservoir are described. Data commonly collected during multistage fracturing is used to calculate propped fracture height and induced stresses, as well as other variables, in the presence of horizontal stress anisotropy. These variables can then be incorporated into reservoir simulations to improve the fracturing monitoring, forecast hydrocarbon recoveries, or modify fracturing plans.
Measuring and improving origin offload and resource utilization in caching systems
Origin offload is a key performance indicator of a content delivery network (CDN). This patent document presents unique methods and systems for measuring origin offload and applying those measurements to improve the offload. The techniques presented herein enable resource-efficient measurement of origin offload by individual servers and aggregation and analysis of such measurements to produce significant insights. The teachings hereof can be used to better identify root causes of suboptimal offload performance, to tune CDN settings and configurations, and to modify network operations, deployment and/or capacity planning. In addition, discussed herein are improved metrics showing offload in relation to the maximum achievable offload for the particular traffic being served.
METHODS AND APPARATUSES FOR REDEEMING A DIGITAL ASSET FOR A PHYSICAL ASSET
A method and apparatus for redeeming a digital asset for a physical asset is provided. The method includes receiving a first request to redeem a physical asset corresponding to a digital asset, wherein the first request comprises an indication of a cryptographic token on a distributed ledger corresponding to the digital asset. The method further includes validating the request. The method further includes updating the cryptographic token on the distributed ledger to include information regarding the physical asset.
METHODS AND APPARATUSES FOR GENERATING AND PURCHASING A DIGITAL ASSET
A method and apparatus for generating a digital asset for purchase by a user is provided. The method includes generating a digital asset comprising a plurality of digital files, wherein each digital file of the plurality of digital files includes a digital representation of the digital asset in a respective file format for rendering the digital asset in a respective computing environment. The method further includes recording information related to the digital asset as a cryptographic token on a decentralized distributed ledger, said information including at least a cryptographic hash representing the digital asset, ownership information associated with the digital asset, and metadata identifying the location of the plurality of digital files associated with the digital asset. The method further includes receiving a request to purchase the digital asset comprising transaction information identifying the cryptographic token and a digital wallet associated with the user. The method further includes transmitting, upon validation of the request, to the digital wallet associated with the user information linking the user with the cryptographic token.
METHODS AND APPARATUSES FOR AUTHENTICATING A PHYSICAL ASSET
A method and apparatus for authenticating a physical asset is provided. The method includes obtaining information from a tag associated with the physical asset, wherein the information includes a uniform resource locater (URL) and encrypted information, wherein the encrypted information corresponds to a cryptographic token on a distributed ledger and information about the physical asset. The method further includes transmitting a first message towards an authentication server based on the URL, wherein the first message comprises the encrypted information. The method further includes receiving a second message from the authentication server, the second message comprising an indication of authenticity of the physical asset.