H04L2463/101

Method for Sharing and Searching Playlists

A method for making a playlist available to the public, in which the playlist comprises user-defined descriptor information. The user-defined descriptor information is entered as free form text or prose.

Method and system for secure distribution of selected content to be protected

The present invention relates to data rights management and more particularly to a secured system and methodology and production system and methodology related thereto and to apparatus and methodology for production side systems and are consumer side systems for securely utilizing protected electronic data files of content (protected content), and further relates to controlled distribution, and regulating usage of the respective content on a recipient device (computing system) to be limited strictly to defined permitted uses, in accordance with usage rights (associated with the respective content to control usage of that respective content), on specifically restricted to a specific one particular recipient device (for a plurality of specific particular recipient devices), or usage on some or any authorized recipient device without restriction to any one in specific, to control use of the respective content as an application software program, exporting, modifying, executing as an application program, viewing, and/or printing of electronic data files.

Secure Bridging of Third-Party Digital Rights Management to Local Security
20210136431 · 2021-05-06 ·

Encrypted content from a content provider is received at a headend of a video programming distributor. The content provider is distinct from the video programming distributor. The content is decrypted and modified by blending a user-interface overlay with the content in a virtual set-top application associated with a set-top of a customer of the video programming distributor. The modified content is provided over a secure data link to a conditional-access encoder at the headend. The conditional-access encoder encrypts the processed content, which is then transmitted to a client device.

Secure application processing systems and methods

Systems and methods are described for securely and efficiently processing electronic content. In one embodiment, a first application running on a first computing system establishes a secure channel with a second computing system, the secure channel being secured by one or more cryptographic session keys. The first application obtains a license from the second computing system via the secure channel, the license being encrypted using at least one of the one or more cryptographic session keys, the license comprising a content decryption key, the content decryption key being further encrypted using at least one of the one or more cryptographic session keys or one or more keys derived therefrom. The first application invokes a second application to decrypt the license using at least one of the one or more cryptographic session keys, and further invokes the second application to decrypt the content decryption key using at least one of the one or more cryptographic session keys or one or more keys derived therefrom, and to decrypt a piece of content using the content decryption key. The first application then provides access to the decrypted piece of content in accordance with the license.

Cloud-based coordination of remote service appliances
11032284 · 2021-06-08 · ·

Systems, and methods are provided to provide cloud-based coordination of customer premise service appliances. A system can include a cloud-based service platform, which includes a coordination server and a cloud-based service appliance, and an on-premise service appliance. The coordination server is configured to establish a service session, select a service appliance, and control a sequence of operations on the selected service appliance. Establishing the service session can include establishing a service session with a first client in response to a service request received from the first client, the first client associated with an account including a service policy. Selecting the service appliance can include selecting the cloud-based service appliance or the on-premise service appliance, based on the service policy, to handle the service request. Upon selection of the on-premise service appliance, the coordination server controls a sequence of operations performed by the on-premise service appliance to satisfy the service request.

Method and apparatus for installing conditional access system information

Various exemplary embodiments of the present disclosure relate to method and an apparatus a broadcast receiver for a conditional access system (CAS) information download. The CAS information download method includes acquiring broadcast provider information. The method also includes, selecting a broadcast provider based on the broadcast provider information. The method further includes, transmitting a subscription request including identity information of the broadcast reception device to a broadcast provider server of the selected broadcast provider. The method also includes, downloading CAS information from a CAS server.

Front-end user interface for confidential transactions

The disclosed technology is generally directed to security technology. In one example of the technology, it is determined that an attempted function associated with an application has at least one requirement including at least particular security credentials for a user of the application. A transaction is caused to be sent to each node in a permissioned blockchain that stores an access level block corresponding to the user. The transaction is associated with a real-time determination as to whether the at least one requirement for the attempted function is met. A transaction result is received from the permissioned blockchain. The attempted function is selectively allowed based on the transaction result.

Backend service integration

A method for providing an integrated service includes assigning a digital credential to a user account; receiving a request to schedule an integrated service in relation to the scheduled presentation of the digital content item; identifying, based on the digital credential assigned to the user account, the scheduled presentation of the digital content item; determining, based on the scheduled presentation of the digital content item, a set of available integrated services; providing, to the computing device, data identifying the set of available integrated services; receiving, from the computing device, a user selection of a first integrated service from the set of available integrated services; generating, based on data associated with the scheduled presentation of the digital content item, a service request to provide the first integrated service; and transmitting, to a remote server that provides the first integrated service, the service request to provide the first integrated service.

METHODS AND APPARATUS TO MONITOR STREAMING MEDIA CONTENT
20210168445 · 2021-06-03 ·

Methods, apparatus, systems and articles of manufacture are disclosed to monitor streaming media content. An example apparatus to monitor streaming media content includes a flag detector to determine if a streaming media flag is asserted in a content of a watermark associated with a media exposure event, the media exposure event included in panel data from a panel meter, the panel meter to monitor a media presentation device via an audio output channel of the media presentation device. A data selector to, when the streaming media flag is asserted: discard the media exposure event associated with the streaming media flag from the panel data and select the media exposure event from network traffic reports to credit media presented by the media presentation device, the network traffic reports obtained from a meter that monitors network traffic to and from the media presentation device.

Distributing digital-works and usage-rights to user-devices
10970368 · 2021-04-06 ·

Method for automatically distributing, as needed, a user's digital-works and usage-rights to one or more user-devices. A definition of the usage-rights for a digital-work may be stored at one or more locations on a network. A version of said digital-work suitable for a user-device may be provided by one or more locations on said network. When a user who is authorized to utilize said digital-work is active at a user-device, a version of said digital-work and authorization to utilize is automatically transferred when needed to a user-device. The digital-work and authorization may be automatically transferred as needed to any user-device where an authorized user is active. The usage-rights may only be valid for one or more specific users. The usage authorization at each user-device may be less than defined in the full usage-rights maintained on the network. Authorization to utilize said digital-work at a user-device may be extended from time to time by exchanging user-device status across the network. Digital-works are automatically provided as needed to any user-device that an authorized user is using.