H04L2463/101

PLATFORM-IN-PLATFORM CONTENT DISTRIBUTION

A platform-in-platform (PIP) system allows for the access of multimedia content from different platforms on a single platform. The PIP system includes a first content platform configured to operate a PIP front-end module; a PIP back-end module configured to authenticate a user according to a user credential and to generate a session token in response to authenticating the user; and a content delivery back-end module configured to store multimedia content not available via the first content platform. The PIP front-end module is configured to provide a user credential to the

PIP back-end module, to receive the session token, and to provide the session token to the content delivery back-end module. The content delivery back-end module is configured to verify the session token and to provide access to the multimedia content to the PIP front-end module.

BLOCKCHAIN INFRASTRUCTURE FOR SECURING AND/OR MANAGING ELECTRONIC ARTIFACTS
20200007513 · 2020-01-02 ·

Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, to facilitate and/or support one or more operations and/or techniques for blockchain infrastructure for securing and/or managing electronic artifacts, such as implemented in connection with one or more computing and/or communication networks and/or protocols.

Method and apparatus for transmitting, activating, purchasing and accessing protected content and services from connected devices

An approach is provided for providing digital rights management within a connected service and content ecosystem. The approach involves receiving a request for content for use at a least one device, wherein the request originates from at least one companion device. The approach also involves causing at least in part, a packaging of the content according to at least one digital rights management format based, at least in part, on identification information associated with at least one of: the at least one device; the at least one companion device; at least one user associated with the at least one device, the at least one companion device, or a combination thereof; and the content. The approach further involves causing, at least in part, a transmission of the packaged content, at least one link to the packaged content, or a combination thereof to the at least one device, the at least one companion device, or a combination thereof. The approach also involves causing, at least in part, an activation of the packaged content for use at the at least one device.

Method and system for exploring similarities

A method and computer readable medium for exploring similar users and items of a media service. In one aspect, a user can explore for similar users iteratively. In one aspect, a user interface is generated that displays a user selectable indicia representing a similar member function for allowing a user to search a media service for at least one other user which has a degree of similarity with respect to the searching user. In another aspect, a method facilitates the search of such a similar user within a media service.

Systems and methods for entitlement management

Systems and methods for managing data are disclosed. One method can comprise receiving a first request for a service, wherein the first request is associated with a first rights package. The first rights package can be processed to determine access to the service. An evaluation key can be generated, wherein the evaluation key represents the determination of access relating to the processing of the first rights package. A second request for a service can be received, wherein the second request is associated with a second rights package. The second rights package can be processed using the evaluation key.

Mobile Machine
20190394621 · 2019-12-26 · ·

A system for providing mobile content to a mobile communication device includes a first computing system including one or more servers to cause a graphical user interface to be displayed at a second computing system, the graphical user interface (i) enabling a user of the second computing system to edit a digital file to create the mobile content and (ii) enabling the user of the second computing system to provide a phone number associated with the mobile communication device, the mobile communication device being separate and remote from the first computing system and the second computing system. The one or more servers of the first computing system receive, from the second computing system via the communications network, the mobile content and the phone number associated with the mobile communication device. The one or more servers of the first computing system use the phone number received from the second computing system to cause the delivery of the mobile content to the mobile communication device via a wireless communications network in a format compatible with one or more operational parameters of the mobile communication device, the one or more operational parameters including at least one of a mobile communication device type and a software platform type, wherein using the received phone number to cause the delivery of the mobile content to the mobile communication device is performed without the mobile communication device identifying the one or more operational parameters to the first computing system or the second computing system.

Blockchain Version Control
20190392118 · 2019-12-26 ·

A method, computer system, and computer program product are provided for controlling access to a licensed software application. A blockchain-based version control system receives an access request from a user that requests access to the licensed software application. The version control system determines whether a user has accepted license terms for a current version of the licensed software application by querying a version control blockchain. Responsive To determining that the user has not accepted the license terms for the current version of the licensed software application, the version control system presents the user with a clickwrap agreement requiring the user to accept license terms for the current version of the licensed software application. Responsive to receiving acceptance of the license terms from the user, the user's acceptance of the license terms for the current version of the licensed software application is recorded in the version control blockchain.

System and method for authorized digital content distribution

A digital content distribution system uses a Digital Rights Management Controller that performs a set of arbitrary tests against the transfer request from one user to another such as user A to user B. Assuming these tests are successful, the DRM sends an encryption key to transferring user A. This encryption key E is taken from a table of encryption key/hash pairs which have been provided to the DRM Controller by an external authority such as the content rights holder. User A encrypts the content using they key provided by the DRM controller and then optionally calculates a hash over the encrypted form of the content E(X) and returns this value to the DRM Controller. On checking the returned hash against the hash from the table the DRM controller knows that user A does indeed have the digital content X in good condition. The DRM Controller then instructs both users A and B that the transfer may proceed. The encrypted form of the content E(X) is transferred from A to B. Once the content transfer has completed B ensures that the received content has been physically written to non-volatile storage (to account for crashes etc. during the next step). B then calculates a hash over the received content and returns this value to the DRM Controller. If this value matches the value previously given then the transfer has been successful and the DRM Controller updates whatever central records are appropriate, while also returning a decrypt key to B to allow it to decrypt the content.

ROBOTIC CATHETER SYSTEM WITH VARIABLE DRIVE MECHANISM
20240090960 · 2024-03-21 ·

A robotic catheter procedure system is provided. The robotic catheter procedure system includes a bedside system and a remote workstation. The bedside system includes a percutaneous device and a drive mechanism configured to engage and to impart an axial force to the percutaneous device and to advance and retract the percutaneous device. The bedside system includes an actuator providing torque to the drive mechanism to impart the axial force to the percutaneous device, and the torque provided by the actuator is variable. The remote workstation includes a user interface configured to receive a first user input and a control system operatively coupled to the user interface. The control system is configured to communicate a control signal to the actuator. The control signal is based upon the first user input and a second input, and the actuator provides torque to the drive mechanism in response to the control signal.

METHOD AND APPARATUS FOR SIMULTANEOUS KEY GENERATION ON DEVICE AND SERVER FOR SECURE COMMUNICATION
20240086498 · 2024-03-14 ·

A secure communication system is disclosed for communication between first and second party devices. An input interface is provided for receiving from an external host a unique host factor in addition to a user input interface for receiving from a user a unique PIN for a user and a selection input for selecting one of the plurality of stored entropy stores as a user selected entropy store A first private key generator is operable for generating a private key using a key generation algorithm requiring the selected entropy store, the host factor and the unique user PIN. The second party device includes a second storage device for storing a plurality of entropy stores. An input interface is provided for receiving the same unique host factor as received by the first party device. A communication interface facilitates communication with the first party device to receive from the first party device a user PIN and an indication of the user selected entropy store. A second private key generator is operable for generating a private key using the predetermined key generation algorithm with the received user PIN, the received host factor, and an extracted entropy store corresponding to user selected entropy store, wherein the private key generated by both the first and second private key generators are identical. The session is initiated to cause the generation of the identical private keys at both of the first and second private key generators and allow secure communication between the first and second devices. The private key at least one of the first and second devices is deleted at the end of the session.