H04L2209/60

Obfuscation for protection of streaming media and other data flows
11269621 · 2022-03-08 · ·

A method is provided for obfuscating program code to prevent unauthorized users from accessing video. The method includes receiving an original program code that provides functionality. The original program code is transformed into obfuscated program code defining a randomized branch encoded version of the original program code. The obfuscated program code is then stored, and a processor receiving input video data flow uses the obfuscated program code to generate an output data flow.

Apparatus/system for voice assistant, multi-media capture, speech to text conversion, photo/video image/object recognition, creation of searchable metatags/contextual tags, transmission, storage and search retrieval
11271737 · 2022-03-08 · ·

This invention relates to a network interface device. A first capture device interfaces with a first external information source to capture first external information. A processor processes the captured first external information and stores it in a first media. The processor initiates the storage of the first captured information at an initial time and completes storage of the first captured information at a completion time, thus providing a stored defined set of first captured information. A transmitter transmits the defined set of stored captured information to a remote location on a network. A remote processing system is disposed at the remote node on the network and includes a database and a receiver for receiving the transmitted defined set of first captured information. A data converter is operable to convert the received defined set of first captured information to a second format. The database stores the set of converted captured information.

METHOD AND APPARATUS FOR STORING EVIDENCE COLLECTION PROCESS VIDEO SEGMENT
20220069978 · 2022-03-03 ·

A method for storing an evidence collection process video segment includes: obtaining a clip-for-storage request initiated by a user, the clip-for-storage request specifying a to-be-clipped evidence collection process video and clipping range information, and the evidence collection process video being obtained by the evidence collection service device by recording evidence collection processes for at least two web pages; determining whether the evidence collection process video is stored in a blockchain, and clipping a video segment from the evidence collection process video based on the clipping range information in response to determining that the evidence collection process video is stored in the blockchain, the video segment recording an evidence collection process corresponding to any one of the at least two web pages; and committing the video segment to the blockchain for storage.

VIDEO COMMUNICATION DATA SECURITY
20220078173 · 2022-03-10 ·

A processing system including at least one processor may obtain a portion of a video stream, identify a first region of the portion of the video stream that contains a first item that is designated for obscuring, replace the first item in the first region of the portion of the video stream with an obscured version of the first item, and encrypt the portion of the video stream with a first encryption key. The processing system may further generate an executable package comprising the first item in the first region of the portion of the video, where the executable package is encrypted with a second encryption key, and transmit the portion of the video stream that is encrypted with the first encryption key and the executable package that is encrypted with the second encryption key to a recipient device.

METHOD FOR DISTRIBUTING CERTIFICATE OF RIGHT TO USE DIGITAL CONTENT, AND COMPUTER PROGRAM STORED IN MEDIUM IN ORDER TO CARRY OUT METHOD
20220067125 · 2022-03-03 ·

A method of distributing a amount of issuance of digital content includes: determining the amount of issuance corresponding to a certificate of right to use digital content; generating blocks corresponding to the amount of issuance in accordance with the certificate of right to use the digital content and adding the blocks to a block chain system; generating an authentication certificate including a key value of the generated blocks in connection with the certificate of right to use the digital content; receiving a purchase request for the certificate of right to use of the digital content from a first user terminal; transmitting the digital content to the first user terminal such that the digital content is stored in a content folder of the first user terminal; transmitting a first authentication certificate corresponding to a remaining amount among the amount of issuance to the first user terminal, and storing the first authentication certificate in connection with the certificate of right to use the digital content; and transmitting a first authentication value included in the first authentication certificate and device information of the first user terminal to an ownership information database and updating owner information of the certificate of right to use of the digital content.

COMPUTER AIDED SYSTEMS AND METHODS FOR CREATING CUSTOM PRODUCTS
20220075845 · 2022-03-10 ·

A computer-aided design (CAD) system utilizes an image analysis engine to identify objects in a video frame. Customization rules and object identifiers assigned by the image analysis engine and associated with the frame are used to determine if the frame is permitted to be used to customize a product. If the frame is not permitted to be used, an indicator is stored configured to inhibit the frame from being used to customize the product and/or cause the frame to be edited to obscure frame objects. A user request is received for the product. A determination is made as to what frames have been used to customize instances of the product. A first frame is selected that has not been used to customize physical instances of the product. The first frame is printed on the product. The first frame is inhibited from being used to customize other instances of the product.

ENCRYPTION TO LIMIT DIGITALLY ALTERED IMAGING DATA
20220067129 · 2022-03-03 ·

Systems, methods, and software described herein manage the verification of video data from end user computing elements. In one implementation, a computing element obtains a frame of video data from a video source. Once received, the system applies at least one encryption key or hash to the frame to encode authentication information for the video data in the frame and communicates the frame with the encoded authentication information to a video processing system.

Secure transport of content via content delivery service
11271750 · 2022-03-08 · ·

Devices and techniques for secure transmission of content over third-party networks are provided. Keys are established for secure transport of content between a source and recipient via a third party. The source generates a content package that includes an encrypted payload, and a payload handler. In some instances, the content package may also include user interface code for obtaining a secret from the recipient. The content package may be signed (e.g., the message content hashed and the result of the hash added to the content package). The content package is transmitted over a connection to a content delivery service for delivery to recipient(s) via another connection. The content delivery service receives the package and forwards the package to recipient(s) without decrypting the payload. A recipient receives the package from the content delivery service, validates the package and decrypts the payload. The payload may be presented to a display application.

GENERATING AND MANAGING TOKENIZED ASSETS UTILIZING BLOCKCHAIN MINTING AND A DIGITAL PASSPORT

The present disclosure is directed toward systems, methods, and non-transitory computer readable media for generating and maintaining tokenized assets associated with a user account of a content management system. In particular, the disclosed systems can facilitate generating tokenized assets from content items within a content management system. In addition, the disclosed systems can identify tokenized assets associated with a user account within a content management system for facilitating access to gated content. For example, the disclosed systems can generate and provide a digital passport that serves as a centralized location for accessing and managing tokenized assets associated with a user account.

GENERATING AND MANAGING TOKENIZED ASSETS UTILIZING BLOCKCHAIN MINTING AND A DIGITAL PASSPORT

The present disclosure is directed toward systems, methods, and non-transitory computer readable media for generating and maintaining tokenized assets associated with a user account of a content management system. In particular, the disclosed systems can facilitate generating tokenized assets from content items within a content management system. In addition, the disclosed systems can identify tokenized assets associated with a user account within a content management system for facilitating access to gated content. For example, the disclosed systems can generate and provide a digital passport that serves as a centralized location for accessing and managing tokenized assets associated with a user account.