H04L2209/60

SYSTEM AND METHOD FOR SCALABLY TRACKING MEDIA PLAYBACK USING BLOCKCHAIN
20230083052 · 2023-03-16 · ·

Systems and methods for tracking media file playback are provided. A request to upload a media file and metadata associated with the media file is received. Next, the media file and metadata is uploaded via a blockchain protocol. Next, a request to play the media file is received from a client device or a digital service provider (DSP) platform. The request to play the media file is validated via the blockchain protocol. Upon validating the request to play the media file, the media file is transmitted for playback at the client device or DSP platform. Last, the number of times the media file is played is tracked via the blockchain protocol.

RIGHTS-ENABLED TOKENS FOR BLOCKCHAIN APPLICATIONS
20220337439 · 2022-10-20 ·

Systems and methods for managing media, such as digital content, using blockchain technology are described. For example, the systems and methods provide rights-enabled tokens, such as non-fungible tokens (NFTs), which include information identifying content represented by the tokens as well as information or data that identifies the rights assigned or associated with the content represented by the tokens.

Artificial Reality Content Management

Some aspects of the disclosed technology can create a virtual object based on user container selections. Further aspects of the disclosed technology can provide one or more product recommendations corresponding to a current context of user activity. Additional aspects of the disclosed technology can generate and export non-fungible tokens using object recognition. Yet further aspects of the disclosed technology can augment a digital environment with NFT content corresponding to an NFT wallet.

COMPONENT TRACKING FOR INFORMATION HANDLING SYSTEMS

Systems and procedures are provided for tracking hardware components of an IHS (Information Handling System). During factory provisioning of an IHS, an inventory certificate to the IHS is stored to the IHS that includes an inventory identifying factory-installed hardware components of the IHS. Also during the factory provisioning, a record is stored in a component datastore of the factory-installed hardware specified in the inventory certificate. Upon initialization of the delivered IHS, a pre-boot validation environment is initialized on the IHS and the stored inventory certificate is retrieved and used to validate the detected hardware components of the IHS. The results of the validation are then reported to a component datastore, where they are used to identify any transfer of a factory-installed hardware component. The factory datastore is updated in subsequent validations to reflect any detected modifications to the IHS in tracking genuine components.

TOKENIZATION OF COLLECTIBLES AND RELATED METHODS
20230126016 · 2023-04-27 · ·

A system and method for generating non-fungible tokens for collectibles. The system authenticates physical ownership of a collectible before allowing a requesting entity to generate a non-fungible token for the collectible. The system generates a fiat currency value for the non-fungible token based on the total number of non-fungible tokens already generated for the collectible and the current value of the collectible. The system tracks non-fungible tokens generated for the collectible to ensure that the proportional cost of generating a non-fungible token strictly increases as the total number of non-fungible tokens generated for the collectible increases.

System and method for management of confidential data

A management request is received by a system for carrying out one or more data management operations (including, but not limited to, adding data, merging data or searching for data). The management request is received from a requesting entity. The system comprises a representation database, which comprises at least one secure element. The at least one secure element is a representation of at least one dataset containing confidential data elements stored in at least one database owned or operated by a third party entity. The management request is processed by performing at least one operation, for example by a processing component in the system, on the representation database. In a third step, a processing result is provided, which comprises any suitable information or data content. The processing result is dependent on the contents of the management request.

Content recording apparatus, content editing apparatus, content reproduction apparatus, content recording method, content editing method, and content reproduction method

A content recording apparatus includes an obtaining unit which obtains a content having a variable-length packet structure, an encrypter which generates encrypted data by encrypting the content, and a recorder which records the encrypted data in a block unit having a fixed length in a recording medium. The encrypted data includes an invalidated region unnecessary for reproduction of the content. The recorder records a size of the invalidated region in the recording medium.

Private data sharing system
11637802 · 2023-04-25 ·

A novel architecture for a data sharing system (DSS) is disclosed and seeks to ensure the privacy and security of users' personal information. In this type of network, a user's personally identifiable information is stored and transmitted in an encrypted form, with few exceptions. The only key with which that encrypted data can be decrypted, and thus viewed, remains in the sole possession of the user and the user's friends/contacts within the system. This arrangement ensures that a user's personally identifiable information cannot be examined by anyone other than the user or his friends/contacts. This arrangement also makes it more difficult for the web site or service hosting the DSS to exploit its users' personally identifiable information. Such a system facilitates the encryption, storage, exchange and decryption of personal, confidential and/or proprietary data.

METHOD AND SYSTEM FOR ANONYMOUS USER DATA STORAGE AND CONTROLLED DATA ACCESS
20230124967 · 2023-04-20 ·

Methods and systems are configured to store user data and control access to the user data, wherein the data is stored remotely from the user (such as external to a user's computing device) and the user's data is maintained anonymously. Content is stored in association with a user identifier and access by third parties is controlled by linked third party identifiers.

TOKENIZED MEDIA CONTENT MANAGEMENT

A system and method for media content management include determining, via a digital vault, that a first stakeholder is authorized to sell a salable content item by holding rights in the salable content item; determining, via the digital vault, whether consent for a nonfungible token (NFT) transaction of any of the stakeholders other than the first stakeholder is required; and the digital vault preventing the sale of the salable content item until consent for the sale is received from the stakeholders from whom consent is required.