H04L2463/101

Multi-application-oriented user data management method and system

Disclosed in the present invention are a multi-application-oriented user data management method and system. The method comprises a first application module receives an access instruction input by a first user, the first application module generates an authority request information according to the access instruction, wherein the authority request information includes information of the first application corresponding to the first application module, a platform server or an authority data storage server calls a user authority data of the first application according to the authority request information, and return the user authority data to the first application module, and the first application module obtains user data orienting to the first user of the first application according to the user authority data and user information of the first user.

Process for reinforcing the security of a pay television system based on periodic mandatory back-communication

The invention relates to a process for transmitting streaming digital content to a client device for access to digital content. The inventive process makes it possible, in particular, to apply an access control system to the protection of direct-mode video streams. The process also makes it possible to significantly improve the security and safety of the system, based on a periodic mandatory back-communication on the part of the client device.

Cloud-based coordination of customer premise service appliances
10778683 · 2020-09-15 · ·

Devices, systems, and methods are provided to provide cloud-based coordination of customer premise service appliances. A system can include a computing device comprising a communication module, a policy module, an appliance selection module, and a coordination module. The communication module receives a document request from a first client over a network connection, establishes a session with the first client in response to the document request, and receives metadata representing collected signatures at after completion of the electronic signature operation portion of the document request. The policy module manages a policy associate with a first account corresponding to the document request. The appliance selection module selects one of a plurality of document appliances. The coordination module controls a sequence of operations performed on the on-premise document appliance to service the document request, and instructs the on-premise document appliance to communicate results at the completion of the document request.

Software-enabled remote licensing and provisioning

Described herein are systems and methods for providing software provisioning of functionality in a wireless communications device. Software-enabling functionality may include systems for granting a license to intellectual property or other pre-embedded functionality within a device. Communications to and from the device may be used to send or receive activation messages and/or licensing messages. Network capabilities may be provisioned using activation messages sent over the network. Activation messages may be sent in-band or out-of-band, for a device connected to the Internet and/or a mobile operator core network. Licenses may be required for any functions or intellectual property present on a given device. Activation may enable logical modules of a system-on-chip (SOC), functions of a software-defined radio (SDR), baseband, or DSP core. The disclosed systems and methods could thereby provide a new, flexible paradigm, namely, Silicon as a Service (SaaS).

Method and an information appliance device for preventing security breach in information appliance device

Embodiments herein relate to a method and an information appliance device having a unique access card for preventing security breach in the information appliance device. A multimedia content server transmits a one-time access key to both the information appliance device and a user of the information appliance device. The user must input the access key to the information appliance device. The information appliance device verifies the access key and provides access to the user for the multimedia services, by activating a periodic activation key upon successful verification of the access key. Therefore, even if unauthorized user tries to skip the access key verification process through modification of access cards used in information appliance device, the unauthorized user cannot access the multimedia service due to lack of the periodic activation key required for activating multimedia service. Hence, security breach such as, cloning or duplication of the access cards will be minimized.

VERIFYING PROVENANCE OF DIGITAL CONTENT
20200275166 · 2020-08-27 ·

Embodiments regard determining provenance of digital content. A method of determining the provenance of digital content can include receiving, at processing circuitry, edited digital content and data indicating an entity that edited source digital content to generate the edited digital content, the source digital content, and a destination of the edited digital content, generating, by the processing circuitry, additional data detailing an edit history of the edited digital content, the additional data indicating the entity, an edit identification uniquely identifying the additional data in a ledger, the source digital content, and the destination of the edited digital content, and generating a request to cause the additional data to be stored in the ledger, the ledger operable to be queried so that a user can determine an authenticity of the edited digital content based on the additional data of an edit chain returned in response to a query.

BLOCKCHAIN-BASED COPYRIGHT PROTECTION METHOD AND APPARATUS, AND ELECTRONIC DEVICE
20200274872 · 2020-08-27 ·

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a blockchain-based right protection. One of the methods includes: sending, to a blockchain network, a request for verifying a right to access a digital product, the request comprising identity information associated with a target user; receiving, from the blockchain network, a response comprising a result of verifying the right to access the digital product based on the identity information associated with the target user; in response to the result being that the verifying the right to access the digital product is successful, determining identification information for tracing the target user; and embedding the identification information for tracing the target user in content associated with the digital product.

Information processing apparatus, computer-readable recording medium, and information processing system
10757108 · 2020-08-25 · ·

An information processing apparatus includes a memory and at least one processor. The memory stores correspondence information associating application identification information, identifying installed applications, with usage authorization information, related to usage authorization of the applications. The processor, upon a request being received from an application requesting the usage authorization information, can specify usage authorization information associated with the application identification information included in the request. The processor can then notify the application of the requesting source, requesting the usage authorization information.

Access control in a content management system

Systems and methods for controlling object/document access in a content management system. The content management system may have several layers of access controls, which may include a layer of access control at the object level, a layer of access control at the row level and a layer of access control at the field level. Access may be controlled at the object level by a user's security profile, at the object record level (or row level) by the user's role, and/or at the object field level by the user's role or a state in a document lifecycle. In other words, the object level access control may grant access (e.g., Create, Read, Edit and Delete) on objects, the object record level access control may grant access (e.g., Read, Edit and Delete) on object records, and field level access control may grant access (e.g., Read, Edit and Hidden) on object field level.

USING SECURE WEB SOCKETS TO EXTEND REACH OF CONDITIONAL ACCESS SYSTEMS
20200267185 · 2020-08-20 · ·

A system and method for securely and bi-directionally transmitting information including conditional access private data between a client and a headend is disclosed. In an exemplary embodiment, the method includes: establishing a hypertext transfer protocol secure (HTTPs) connection, establishing a hypertext transfer protocol secure (HTTPs) connection; upgrading the HTTPs connection to a persistent bi-directional connection, accepting a first message from a client via the web socket connection, wherein the first message comprises an identifier of the client, parsing the message for the identifier of the client, associating the identifier of the client with the secure web socket connection, and transmitting a second message notifying the headend of the secure web site that connection, the message comprising the identifier of the client.