Patent classifications
H04L2209/60
Digital content integrity verification systems and methods
The disclosure relates to, among other things, systems and methods for facilitating the verification of the integrity of digital content. Embodiments of the disclosed systems and methods may provide mechanisms for generating a secure and unambiguous record of the creation and/or modification of digital content and/or other media associated with events. Further embodiments may provide for a ledger configured to capture a record of creation and/or modification actions performed in connection with digital content.
Database layer caching for video communications
An apparatus includes a network interface and a processor. The network interface receives event data that identifies a content ID and a message authentication code. The content ID identifies a content within a webcast or a virtual event. The processor generates a content hash, at least in part based on the content ID. The network interface transmits a content request and receives the content. The content request identifies the content hash and the message authentication code.
SYSTEM AND METHOD FOR PAIRING TRANSMITTER AND RECEIVER DEVICES USING HDCP KSV KEYS
Exemplary embodiments of the present disclosure are directed to pairing HDCP-compatible transmitter and receiver devices. A transmitter device can scan one or more of its multimedia interfaces for a connected receiver device. When a connected receiver device is detected, the transmitter device determines whether the transmitter device is currently paired with the connected receiver device. If there is no current pairing, the transmitter device obtains at least a receiver KSV key from the receiver device and reads at least a transmitter KSV key from its memory. The pairing operation is either completed or terminated based on a user authentication process. If completed, the transmitter device encrypts at least the transmitter KSV key and the receiver KSV key. If terminated, the transmitter device disables the connected receiver device. Whether the pairing operation is terminated or completed, the transmitter device completes the bootup sequence.
Mathematical method for performing homomorphic operations
The present invention relates generally to a system and method of querying an anonymized database. More particularly, the invention provides a method and system for querying an anonymized database without the need to decrypt queried data while it's processed. Even more specifically, the invention provides a method and system of anonymizing a database such that it may be queried efficiently in near real time while still retaining the ability to not decrypt requested data while it's being processed.
Blockchain-based license management
Blockchain-based license management provides capabilities for managing licensable aspects of a plurality of IHSs (Information Handling Systems) participating in the blockchain comprised of individual license blocks that record licensing transactions. A licensing authority initiates the blockchain and modifies licensable aspects of a specific participating target IHS by distributing license blocks that include one or more license tokens and license logic specifying instructions for the target's evaluation of the license tokens. Each participating IHS validates the received license blocks and adds them to a local copy of the blockchain. If a participating IHS is the target, that IHS uses the license logic to determine licensing modifications indicated by the licensing token. Licensable aspects of the IHS may then be modified based on the determined licensing modifications. A participating IHSs may directly transfer licenses to another IHS through the transfer of license tokens and the corresponding license logic.
Blockchain architecture, system, method and device for automated cybersecurity and data privacy law compliance with proprietary off-chain storage mechanism
A transaction platform including at least one or more public, public-private and/or private distributed ledgers or blockchains that together enable the secure effectuation and recordation of one or more transactions while maintaining transaction party confidentiality. The private distributed ledgers or blockchains are able to store, maintain and provide information about the parties related to the transactions which the distributed blockchains or databases are able to utilize in order to securely and quickly validate, execute and record the transactions in a manner that is GDPR and other data privacy law complaint.
SYSTEM AND METHOD FOR CLAIMING NON-FUNGIBLE TOKENS
Aspects relate to providing an efficient way to claim a non-fungible token (NFT) associated with a physical object, such as a merchandise item. A user device may scan, using a scanning device, for access information of a physical object, and determine a link to an NFT associated with the physical object based on the scanned access information. Subsequently, the user device may transmit, to an NFT server device, an NFT command indicating the link and a user account of a user to cause the NFT to be claimed by the user account. Other aspects, embodiments, and features are also claimed and described.
Methods, Systems, and Devices for Detecting Over-the-Top Piracy
Techniques for detection over-the-top piracy are described. In some embodiments, a piracy detection method is performed at a server by a piracy detector. The piracy detector obtains records associated with requests for access from a plurality of client devices. The piracy detector further distributes the records to a plurality of nodes according to distribution keys extracted from the records, where each of the plurality of nodes receives a respective set of records associated with a respective distribution key and generates a set of respective watch session records based on the respective set of records. The piracy detector also generates watch session records associated with the distribution keys by aggregating the respective watch session records from the plurality of nodes. The piracy detector additionally identifies one or more pirated client devices among the plurality of client devices based on clusters established from the watch session records.
IN-BAND METADATA FOR AUTHENTICITY AND ROLE-BASED ACCESS IN ENTERPRISE VIDEO STREAMING SERVICES
In various embodiments, a device receives a video stream. One or more frames of the video stream include embedded metadata that is embedded directly into the one or more frames. The device extracts the embedded metadata from the one or more frames. The device makes an authentication determination regarding the video stream, based on whether the embedded metadata includes a digital signature associated with a sender of the video stream. The device controls, based on the authentication determination, presentation of the video stream to a recipient user.
Method and system for secure over-the-top live video delivery
A method is provided for managing key rotation (use of series of keys) and secure key distribution in over-the-top content delivery. The method provided supports supplying a first content encryption key to a content packaging engine for encryption of a first portion of a video stream. Once the first content encryption key has expired, a second content encryption key is provided to the content packaging engine for encryption of a second portion of a video stream. The method further provides for notification of client devices of imminent key changes, as well as support for secure retrieval of new keys by client devices. A system is also specified for implementing a client and server infrastructure in accordance with the provisions of the method.