H04L2463/101

Secure bridging of third-party digital rights management to local security

Encrypted content from a content provider is received at a central location of a multichannel video programming distributor (MVPD). The content provider is distinct from the MVPD. The content is decrypted and processed in a virtual set-top application associated with a set-top of a customer of the MVPD. The set-top of the customer is located in a customer premises remote from the central location. The processed content is provided over a secure data link to a conditional-access encoder at the central location. The conditional-access encoder encrypts the processed content, which is then transmitted to the set-top of the customer.

Configuration Of Server Using Stored Security Elements

In one implementation, a computing device includes a secure storage to store a plurality of security elements, a processor, and a storage medium including instructions. The instructions are executable by the processor to: receive a configuration request for a first server, the configuration request including one or more logical references to security settings of the first server; retrieve, from the secure storage, one or more security elements corresponding to the one or more logical references in the configuration request; and configure an operating system volume for the first server based on the configuration request and the one or more security elements.

METHOD AND APPARATUS FOR AUTHENTICATION OF RECORDED SOUND AND VIDEO
20200412547 · 2020-12-31 ·

A device includes a sensor configured to detect authentic audio and/or visual content. The device also includes a processor including an asymmetric cryptographic function using a mathematically paired private key and public key. The processor is configured to extract using a predetermined algorithm at least one predetermined parameter from the detected authentic audio and/or visual content, quantize the at least one extracted predetermined parameter into at least one first data sequence associated with the authentic audio and/or visual content, and encrypt using the asymmetric cryptographic function and the private key the at least one first data sequence to generate at least one signal. The device also includes a transmitter configured to transmit the at least one signal. The signal is embeddable as a digital signature in a recording of the authentic audio and/or visual content and is generated based on the authentic audio and/or visual content.

Verifying provenance of digital content

Embodiments regard determining provenance of digital content. A method of determining the provenance of digital content can include receiving, at processing circuitry, edited digital content and data indicating an entity that edited source digital content to generate the edited digital content, the source digital content, and a destination of the edited digital content, generating, by the processing circuitry, additional data detailing an edit history of the edited digital content, the additional data indicating the entity, an edit identification uniquely identifying the additional data in a ledger, the source digital content, and the destination of the edited digital content, and generating a request to cause the additional data to be stored in the ledger, the ledger operable to be queried so that a user can determine an authenticity of the edited digital content based on the additional data of an edit chain returned in response to a query.

METHOD AND APPARATUS FOR PROTECTING CONFIDENTIAL DATA IN AN OPEN SOFTWARE STACK

A method is provided for securely providing data for use in a consumer electronics device having a processor performing instructions defined in a software image. The method includes receiving the data encrypted according to a global key, further encrypting the data according to a device-unique hardware key, storing the further encrypted data in a secure memory of the consumer electronics device, providing the global key to a whitebox encoder for encoding according to a base key to generate a whitebox encoded global key, and transmitting the software image to the consumer electronics device for storage in an operating memory of the consumer electronics device, the software image having a whitebox decoder utility corresponding to the whitebox encoder and the whitebox encoded global key.

Software-Enabled Remote Licensing and Provisioning

Described herein are systems and methods for providing software provisioning of functionality in a wireless communications device. Software-enabling functionality may include systems for granting a license to intellectual property or other pre-embedded functionality within a device. Communications to and from the device may be used to send or receive activation messages and/or licensing messages. Network capabilities may be provisioned using activation messages sent over the network. Activation messages may be sent in-band or out-of-band, for a device connected to the Internet and/or a mobile operator core network. Licenses may be required for any functions or intellectual property present on a given device. Activation may enable logical modules of a system-on-chip (SOC), functions of a software-defined radio (SDR), baseband, or DSP core. The disclosed systems and methods could thereby provide a new, flexible paradigm, namely, Silicon as a Service (SaaS).

POOFster: a secure mobile text message and object sharing application, system, and method for same
10873852 · 2020-12-22 · ·

The invention described herein is directed to a secure text messaging and object sharing mobile application that provides encryption, digital rights management (DRM) of the text and of the attachments, the capability of sending SMS, RCS, MMS, IM or blockchain communications, the capability of attaching documents, photos and so forth, the capability of interfacing with a user's contacts application, and that operates in both Android and iOS environments. The secure text messaging and object sharing mobile application connects to DRM cloud service, and also connects to second secure text messaging and object sharing mobile app thru a P2P network that provides SMS, RCS, MMS, IM, and/or Blockchain communications. The invention also includes systems and methods related to the same.

Method for sharing and searching playlists

The present disclosure provides a method for making a playlist available to the public. In another embodiment, the present disclosure provides a method for creating a playlist comprising user-defined descriptor information. In another embodiment, the present disclosure provides a method for searching for such public playlists.

IDENTIFYING COPYRIGHTED MATERIAL USING EMBEDDED COPYRIGHT INFORMATION
20200372594 · 2020-11-26 · ·

A method includes generating, by a computing device, a unique identifier (ID) based on copyright information associated with textual content, wherein the copyright information and the textual content are recorded on a blockchain of a blockchain network; identifying, by the computing device, one or more attributes associated with punctuation marks included in the textual content; and embedding, by the computing device, the unique ID in the textual content by changing the one or more attributes associated with the punctuation marks in a manner representative of the unique ID, wherein the embedding produces information-embedded text configured to enable retrieval of the copyright information from the blockchain based on the unique ID, and wherein visual difference between the textual content and the information-embedded text is not apparent to an unaided human eye.

LOCATION VERIFICATION AND ENFORCEMENT FOR CONTENT ACCESS DEVICES

A system for location verification and enforcement receives an authorization request to access content from a content access device. The authorization request includes and/or is associated with location information obtained from a gateway device via a local area network and determined using multiple communication networks. The location information is compared to a record indicating that the content access device and the gateway device were both present at a location. When the location information matches the record, an authorization is transmitted to the content access device. The content access device may be operative to access the content upon receiving the authorization.