Patent classifications
H04L2209/60
Location-Based NFT Minting and Distribution
A system includes a hardware processor and a memory storing software code, the software code is executed to receive an assembly message for a plurality of users including first and second users to assemble at a same physical or virtual location, confirm that the first and second users are present at the same physical or virtual location, verify that each of those users is an owner of a respective NFT related to the assembly message, and generate a smart contract governing minting of variant NFTs. The software is further executed to mint, based on the smart contract, a first variant NFT based on the NFT of the first user and a second variant NFT based on the NFT of the second user, and distribute the first or second variant NFTs to the first user and the other of the first or second variant NFTs to the second user.
Photo sharing method and electronic device
A method includes: When a first electronic device does not initiate synchronization with a second electronic device, the first electronic device detects a first operation of a user. In response to the first operation, the first electronic device adds first photo information to a first shared album of the first electronic device. When the first electronic device initiates synchronization with the second electronic device, the first electronic device sends, to the second electronic device, a first request message for adding the first photo information. In this way, after receiving a first request response message that is sent by the second electronic device and that is used for refusing to add the first photo information, the first electronic device deletes the first photo information from the first shared album.
ENTITY AUTHENTICATION FOR PRE-AUTHENTICATED LINKS
Techniques for increasing security for pre-authenticated links are disclosed herein. Computing systems that generate pre-authenticated links are configured to assign an entity identifier to pre-authenticated links to specify an entity permitted to access respective data through the pre-authenticated link. When activating a respective pre-authenticated link, an entity attaches an entity token to the request to prove an identity of the requesting entity. If the identity from the entity token matches the entity identifier, the computing system may grant access to the respective data.
SYSTEM AND METHOD OF ASSIGNING CRYPTOGRAPHICALLY SECURED DIGITAL ASSETS TO A VERIFIED INDIVIDUAL AND LINKING ADDITIONAL USER GENERATED CONTENTS
A method for verifying an individual and associating a unique cryptographically secured digital asset (CSDA) with the verified individual can involve verifying the individual, creating a parent cryptographically secured digital asset for that individual, creating child CSDA's for each UGC created by the verified individual and linking the child CSDA to the parent CSDA.
Multi-tier Encryption Non-Fungible Token System
In certain embodiments, one aspect provides a method of securely distributing multi-tier multimedia contents on the Internet, using Non-Fungible Token (NFT) Blockchain and comprising the steps of: signal processing data splitting phase, converting an original multimedia file into multiple data portions; access control encryption phase, converting each of the multiple data portions into an encrypted data portion and uploading the encrypted data portion to a storage cloud; access control storage phase, storing the encrypted data portion on the storage cloud; access control decryption phase, downloading the encrypted data portion from the storage cloud and reconstructing each of the encrypted data portions into each of said multiple data portions; and signal processing data merging phase, reconstructing appropriate multimedia data content depending on a user's tier level.
Systems and methods for authenticating digital media content
The disclosed computer-implemented method for authenticating digital media content may include (i) receiving digital media content that has been captured by a capturing device and digitally signed through a cryptoprocessor embedded within the capturing device to provide an assurance of authenticity regarding how the capturing device captured the digital media content, and (ii) encoding an identifier of the received digital media content and a digital signature to an encrypted distributed ledger, the digital signature including at least one of a digital signature of the digital media content by the capturing device or a digital signature of the digital media content by an entity encoding the received digital media content such that the encoding becomes available for subsequent verification through the encrypted distributed ledger. Various other methods, systems, and computer-readable media are also disclosed.
SYSTEMS AND METHODS OF FACILITATING DIGITAL RATINGS AND SECURED SALES OF DIGITAL WORKS OF ART
Blockchain systems and methods for digital ratings and secured sales of digital works of art are provided. The systems include a platform for posting art, an interface, an auction module, and an artificial intelligence unit. The platform enables artists to post digital works of art on their personal pages. The interface enables users to become followers of the digital works of art and post likes or dislikes for the digital works of art, and the platform assigns a monetary value to the like. Each digital work of art is assigned a purchase price equal to the monetary value assigned to the like multiplied by the number of likes for the first digital work of art. When a user offers the purchase price the auction module transfers payment to the first artist and the first work of art to the user. The interface includes an opinionated share button, which may comprise a combination like-share button and a combination dislike-share button.
Delivering digital identity documents that are vetted as trusted in a secured manner
A method, system and computer program product for delivering a digital identity document. A request is received to purchase a digital identity document from a user by a system. An acquisition uniform resource locator (URL) with parameters corresponding to the identity of the user and the requested digital identity document is created and provided to the user. The user utilizes the received URL to communicate with an issuer to request the digital identity document. The system then receives the requested digital identity document in encrypted form from the issuer. The system then delivers the encrypted digital identity document to the user. In this manner, the system can deliver to the user an identity document in digital form that has been vetted as trusted in a secure manner thereby reducing the number of occurrences in providing improper identity documents as well as lessening the ability to generate falsified identity documents.
Blockchain digest augmentation of group-of-pictures video streams
The present specification is directed toward the use of hash digests and blockchain technology to secure the integrity of a media file having Group-Of-Picture (GOP) video streams, audio streams, and data streams. For GOP video streams, the use of hash digests and blockchain technology may take the form of an H-Frame that appends a GOP of I, P, and B frames. For audio streams, the use of hash digests and blockchain technology may take the form of an AH-Frame that appends an audio block of information. For data streams, the use of hash digests and blockchain technology may take the form of a DH-Frame that appends a data block of information.
Protocol and architecture for the decentralization of content delivery
Systems, methods, and devices of the various embodiments disclosed herein may provide a protocol and architecture for decentralization of content delivery. Various embodiments may provide a client based method for content delivery from content delivery networks (CDNs) via tiered caches of content hosted by Internet Service Providers (ISPs). In various embodiments, content delivery protocol (CDP) messages may enable clients to discover local cache network topologies and request content from a CDN based on a discovered local cache network topology. In various embodiments, security may be provided for the content delivery by the use of key encryption and/or file hashing.