Patent classifications
H04L2463/101
Systems and methods for facilitating secure streaming of electronic gaming content
A game identifier of an encrypted streaming electronic game to be streamed to a playback device may be received. The game identifier may comprise a title of the encrypted streaming electronic game. An electronic ticket for access by the playback device to a secured portion of the encrypted streaming electronic game may be gathered. The electronic ticket may specify a first gameplay state. The electronic ticket may be used to access the secured portion of the encrypted streaming electronic game at the first gameplay state. One or more gameplay actions to transform the encrypted streaming electronic game to a second gameplay state may be received. The second gameplay state may be provided to a state server, where the state server configured to instruct a license server to modify the electronic ticket to specify the second gameplay state for the encrypted streaming electronic game.
DIGITAL RIGHTS MANAGEMENT FOR HTTP-BASED MEDIA STREAMING
Techniques and mechanisms described herein facilitate the management of digital rights for media content item presentation. According to various embodiments, a request for a content decryption key may be received at a media application implemented at a computing device. The request may be transmitted by a media content player implemented at the computing device. The request may be transmitted in accordance with a designated key exchange protocol. A license for an encrypted media content item corresponding with the requested content decryption key may be identified at the media application. Based on information included in the license, encrypted key material may be decrypted to create the requested content decryption key via a processor at the computing device. The requested content decryption key may be provided to the media content player.
System, device, and method of providing authenticity and rights verification mechanism for media content and for its derived versions
System, device, and method of providing authenticity and rights verification mechanism for media content and for its derived versions. A media authenticity server is configured to receive a content item, and to generate for it a record having a unique content identifier and indications of permitted modifications, and optionally also copyright information usage restrictions. The media authenticity server authorizes or blocks modifications requests regarding the content item. The media authenticity server tracks and logs the permitted modifications performed on the content item, and makes this log available for inspection to end-user devices via a web browser or via a content consumption application. Optionally, playback or consumption of a modified version of the content item is blocked, or is accompanied by a warning message, if the modified version is not associated with an authenticated log of permitted modifications.
SYSTEM AND METHOD FOR FACILITATING A VIRTUAL SCREENING
A system for facilitating a virtual screening is disclosed. The system identifies a user for participating in a virtual screening of media content. The system generates a unique link for the user to facilitate access to the media content. When the user interacts with the link, the system prompts the user to authenticate with the system and determines whether the authentication was successful. If authentication is successful, the link is associated with an identifier of the user and/or a user device. A request for a key for decrypting the media content and a request for a digitally signed file accessing the media content pursuant to parameters are made. If the digitally signed file is valid, the system applies a watermark to the media content to track the use of the media content and streams the media content to the user. Feedback on the media content is obtained from the user.
Configuration of server using stored security elements
In one implementation, a computing device includes a secure storage to store a plurality of security elements, a processor, and a storage medium including instructions. The instructions are executable by the processor to: receive a configuration request for a first server, the configuration request including one or more logical references to security settings of the first server; retrieve, from the secure storage, one or more security elements corresponding to the one or more logical references in the configuration request; and configure an operating system volume for the first server based on the configuration request and the one or more security elements.
Methods and systems for restricting data access based on properties of at least one of a process and a machine executing the process
A method of restricting data access based on properties of at least one of a process and a machine executing the process includes receiving, by an access control management system, from a first computing device, information associated with an encrypted data object. The method includes requesting, by the access control management system, from a verifier, verification that a second computing device executes a process in accordance with a process attribute identified in the information associated with the encrypted data object. The method includes sending, by the access control management system, to the second computing device, the received information associated with the encrypted data object, responsive to the verification of the process attribute.
Encryption management, content recording management, and playback management in a network environment
Management of key information as described herein enables a respective service provider to distribute encrypted content to subscribers, preventing improper use of the content without authorization. For example, the service provider can distribute encrypted content for recording by a subscriber at a remote location. At or around a time of recording the encrypted content, and on behalf of the user, the service provider initiates storage of the corresponding decryption information that is needed to decrypt the recorded encrypted content. In order to play back the recorded segments of the encrypted content, the subscriber communicates with a server resource to be authenticated. Subsequent to being authenticated, the server resource distributes a copy of decryption information needed to decrypt the previously recorded segments of encrypted content to the subscriber. Accordingly, the service provider retains control of playing back content via controlled distribution of the corresponding copy of decryption information.
Apparatus, systems, and methods for assigning access permission to social media
Methods that can assign access permission to social media are disclosed herein. One method includes determining, by a processor, an impact of a plurality of impacts on an owner of a social media post, the impact based on a follower of the social media post, and assigning a permission of a plurality of permissions to the follower for accessing the social media post based on the determined impact. Apparatus, systems, and computer program products that can include, perform, and/or implement the methods are also disclosed herein.
METHOD AND APPARATUS FOR SUPPORTING DIGITAL RIGHTS MANAGEMENT IN MACHINE-TO-MACHINE SYSTEM
Digital rights management (DRM) in a machine-to-machine (M2M) system, and a method for operating a first device may include: receiving, from a second device, a first message for requesting to create a resource associated with a content under digital rights management (DRM); creating the resource based on the first message; obtaining the content and right information on usage of the content from at least one external server; storing the content and the right information in the resource; and transmitting, to the second device, a second message for notifying creation of the resource.
BLOCKCHAIN POWERED ROYALTY DISTRIBUTION
A system and method for automatically distributing value received from the client for access to the media content is disclosed. The method comprises: defining a blockchain network, accepting a request for a media content transaction from the client, determining if the requested media content transaction complies with the value distribution agreement, and executing the requested media content transaction of the smart contract according to the determined compliance of the transaction with the value distribution agreement.