Patent classifications
H04L2463/101
METHODS OF DISTRIBUTING DIGITAL PUBLICATIONS INCORPORATING USER GENERATED AND ENCRYPTED CONTENT WITH UNIQUE FINGERPRINTS
Electronic publications are increasingly replacing physical media but to date standards have evolved to mimic these physical media. Accordingly it is beneficial to provide electronic publication software systems and/or software applications to enable new paradigms that provide consumers, authors, publishers, retailers, and others with new models for releasing digital content from editorial and authorship viewpoints; new models for providing digital rights management with licensing, re-assignable rights and the ability to issue sub-rights or issue partial licenses with predetermined validity; new models for publishers to release revised editions, errata, new additions, etc; engaging social network type collaborative behavior within work and private environments with associated content (annotations) to the original release content; and supporting discussion and information dissemination within a wide variety of environments from education to business to book clubs etc. The invention also supports distributing electronic content with fingerprinting allowing unique identification of sources of non-authorised content.
Digital rights management for HTTP-based media streaming
Techniques and mechanisms described herein facilitate the management of digital rights for media content item presentation. According to various embodiments, a request for a content decryption key may be received at a media application implemented at a computing device. The request may be transmitted by a media content player implemented at the computing device. The request may be transmitted in accordance with a designated key exchange protocol. A license for an encrypted media content item corresponding with the requested content decryption key may be identified at the media application. Based on information included in the license, encrypted key material may be decrypted to create the requested content decryption key via a processor at the computing device. The requested content decryption key may be provided to the media content player.
BLOCKCHAIN-BASED COPYRIGHT PROTECTION METHOD AND APPARATUS, AND ELECTRONIC DEVICE
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a blockchain-based right protection. One of the methods includes: sending, to a blockchain network, a request for verifying a right to access a digital product, the request comprising identity information associated with a target user; receiving, from the blockchain network, a response comprising a result of verifying the right to access the digital product based on the identity information associated with the target user; in response to the result being that the verifying the right to access the digital product is successful, determining identification information for tracing the target user; and embedding the identification information for tracing the target user in content associated with the digital product.
RIGHTS MANAGEMENT USING DIGITAL FINGERPRINTS
A system comprises a combination of digital fingerprint authentication techniques, processes, programs, and hardware that facilitate the assignment, management, and enforcement of rights related to the usage of a physical object and associated digital objects or a digital object itself. An unspoofable, secure linkage is created between a physical key object through its digital fingerprint to one or more digital, physical, or hybrid objects (protected assets), where there need be no other relationship between the key object and the protected assets than the key object digital fingerprint. The digital fingerprint must be unambiguously derived from the key object. It should remain matchable with high confidence even as the key object ages or wears. A rights server or platform qualifies access to a protected asset based on the linked digital fingerprint and manages distribution and usage of the asset according to policies and rights stored in or associated to the digital fingerprint.
Method and apparatus for deterrence and detection of leakage during remote interactive sessions
A server includes a virtual machine to execute a remote graphics generation protocol. Execution of the remote graphics generation protocol determines a protection label to be inserted within a bitmap that is to be transmitted for display on a client machine associated with the virtual machine, and determines at least one optimization technique to be performed on the bitmap. A determination is made on if the at least one optimization technique, if performed, alters the at least one protection label when inserted within the bitmap. The protection label is inserted within the bitmap.
Method and apparatus for providing trust-based media services
Provided are a method and an apparatus for providing a trust-based media service. First user related data and second user related data are collected from a media service and other service, the trust is analyzed based on the collected data, trust information including the trust index of the first user or the second user is obtained, and the trust information is provided. The trust index is calculated based on a value of trustworthiness for a user obtained based on a first individual measurement index calculated based on the collected data and a value of relationship between the first user and the second user obtained based on a second individual measurement index calculated based on the collected data.
System and method for protecting content
A method for protecting content, comprising receiving, from a client device, a request for an encryption key for encrypting the content comprising a reference associated with the client device, identifying a set of supported security capabilities corresponding to the reference associated with the client device, identifying a set of required security capabilities corresponding to the content associated with the key request, determining if the set of supported security capabilities satisfy the set of required security capabilities, and in response to determining that the supported security capabilities satisfy the set of required security capabilities, transmitting the encryption key to the client device.
APPARATUS, SYSTEMS, AND METHODS FOR ASSIGNING ACCESS PERMISSION TO SOCIAL MEDIA
Methods that can assign access permission to social media are disclosed herein. One method includes determining, by a processor, an impact of a plurality of impacts on an owner of a social media post, the impact based on a follower of the social media post, and assigning a permission of a plurality of permissions to the follower for accessing the social media post based on the determined impact. Apparatus, systems, and computer program products that can include, perform, and/or implement the methods are also disclosed herein.
SYSTEM AND METHODS OF DE-CENTRALIZED CONTENT COLLECTION, DISTRIBUTION, AND CONTROL
A content distribution system configured to store first and second creator content generated respectively by first and second creators, receive first and second rules generated separately by the first and second creator, respectively, the first rules governing requirements for consumers to access the first content, the second rules governing requirements for consumers to access the second content, the first and second rules requiring that a potential consumer must be a member of the respective creator's group, the first rules further requiring that the potential consumer must pay to receive access to the first content, receive a content request from a first-third party system from a first consumer requesting access to the first content, confirm that the first user qualifies to receive access and that the first third-party system is permitted, and provide access to the first content.
DIGITAL WATERMARKING SYSTEM AND METHOD
A computer implemented method and a system configured to receive digital content; draw the digital content onto a drawing board; draw a watermark on the drawing board over the digital content, the watermark comprising a series of non-linear lines with the lines having random spacing therebetween in the x and y axes, and save the content of the drawing board in a desired file format.