Patent classifications
H04L2209/60
PHYSICAL ASSET CORRESPONDING TO A DIGITAL ASSET
A physical asset corresponding to a digital asset is provided. The physical asset includes one or more components manufactured in accordance with one or more parameters for customizing the physical asset based on information associated with the digital asset. The physical asset also includes a tag associated with the physical asset, wherein the tag includes information comprising a uniform resource locater (URL) and encrypted information, wherein the encrypted information corresponds to a cryptographic token on a distributed ledger and information about the physical asset.
Methods and systems for revealing information in content selectively
Methods and systems with “selective-information-revealing” features are described. The features enable a user of an online platform such as an online forum or online publishing platform to post content with one or more elements masked. With the features, an automatically generated suggestion of one or more elements of the content to mask is presented with the suggested elements visually differentiated from the other elements of the content. User interface elements are also provided enabling the user to modify the set of elements to be masked. Further described are additional earn-from-content features enabling a user to be rewarded by disclosing his masked content or selling the privilege of exclusive capabilities regarding his content to another user, and “share-revenue” features enabling revenue earned via earn-from-content features to be shared among a plurality of users.
STREAM-BASED KEY MANAGEMENT
Techniques for stream-based key management are disclosed. A system obtains a first payload to be published to a first set of one or more subscribers, encrypts the first payload using a symmetric key, to obtain a first payload ciphertext, encrypts the symmetric key using an attribute-based encryption (ABE) policy associated with the first payload, to obtain a key ciphertext, and publishes the first payload ciphertext and the key ciphertext. The system obtains a second payload to be published to a second set of one or more subscribers. Responsive at least to determining that each subscriber in the second set of one more subscribers is in the first set of one or more subscribers and the ABE policy is associated with the second payload, the system encrypts the second payload using the symmetric key, to obtain a second payload ciphertext, and publishes the second payload ciphertext without republishing the key ciphertext.
SYSTEMS AND METHODS FOR MONITORING CONTENT CONSUMPTION
Systems and methods are described for monitoring content consumption. A method may comprise determining, by a device, content accessed by one or more user devices. The method may comprise causing a distributed ledger record to be generated. The distributed ledger record may comprise an indication of the content. The distributed ledger record may be stored on a distributed ledger. The distributed ledger may comprise other records indicating content accessed by a plurality of other devices.
SYSTEM AND METHOD FOR ENCRYPTION IN A CONTENT MANAGEMENT ENVIRONMENT
Embodiments of content management systems that utilize encryption are disclosed. An object management module of a content management system is adapted to encrypt an object using a data key that is generated based on the content. The data key is encrypted using a tenant key associated with a tenant of the system. The encrypted object is stored in an object store, and a storage record for the stored encrypted object is stored in a data store, along with the encrypted data key and a tenant key identifier.
SYSTEM FOR EMBEDDING SEARCHABLE INFORMATION, ENCRYPTION, SIGNING OPERATION, TRANSMISSION, STORAGE AND RETRIEVAL
A cell phone is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from an external source. A processor is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and time information in association with the captured information forms augmented captured information. The processor also places the augmented captured information in association with subscriber information in a transmission of the augmented captured information to a receiving facility requiring such subscriber information. A transmitter transmits the transmission including the augmented captured information and the subscriber information to the receiving facility. An encryptor encrypts the augmented captured information with a symmetrical encryption algorithm to provide encrypted augmented captured information in the transmission with the subscriber information.
PORTIONED VIDEO STREAMING CONCEPTS
Portion- or tile-based video streaming concepts are described.
Encrypted purging of data from content node storage
Described herein are methods, systems, and software for encrypting and erasing data objects in a content node. In one example, a method of operating a content node that caches content divided into one or more data objects includes encrypting the one or more data objects using separate encryption keys for each of the one or more data objects, the separate encryption keys comprising a common portion shared by the one or more data objects and an individualized portion unique to each data object. The method further provides receiving a purge request to erase at least one data object and, responsive to the purge request, erasing at least one of the common portion or the individualized portion for the at least one data object based on the purge request.
System and method for encryption in a content management environment
Embodiments of content management systems that utilize encryption are disclosed. An object management module of a content management system is adapted to encrypt an object using a data key that is generated based on the content. The data key is encrypted using a tenant key associated with a tenant of the system. The encrypted object is stored in an object store, and a storage record for the stored encrypted object is stored in a data store, along with the encrypted data key and a tenant key identifier.
Methods for shut-in pressure escalation analysis
Methods for using shut-in pressures to determine uncertainties in a hydraulic fracturing process in a shale reservoir are described. Data commonly collected during multistage fracturing is used to calculate propped fracture height and induced stresses, as well as other variables, in the presence of horizontal stress anisotropy. These variables can then be incorporated into reservoir simulations to improve the fracturing monitoring, forecast hydrocarbon recoveries, or modify fracturing plans.