H04L2463/101

SYSTEMS AND METHODS FOR SUBSCRIPTION AND IDENTITY AUTHENTICATION MANAGEMENT

Systems and methods can use subscription and identity authentication management to remove paywalls from websites. Login information for access to an application can be received from a user. The application can verify that the login information is associated with a subscriber account associated with a subscriber to the application. Instructions can be received to access a provider site from the user through the application. The application can determine that the provider site is associated with the subscriber account and the user; and then determine access credentials to the provider site based on a predetermined access scheme associated with the provider site. The access credentials can be injected into a paywall associated with the provider site.

INTEGRATED CONTENT PORTAL FOR ACCESSING AGGREGATED CONTENT
20240089244 · 2024-03-14 ·

Described herein are techniques for providing one or more users with access to content obtained from a plurality of content providers. In some embodiments, such techniques may comprise maintaining a number of access credentials associated with a plurality of different content providers, obtaining access to a plurality of media content libraries, each of the plurality of media content libraries managed by a content provider of the plurality of different content providers, and providing the plurality of media content libraries to at least one user device as a single library of media content. Such techniques may further comprise receiving, from the user device, a selection of a media content from the single library of media content and providing, to the user device, access to the selected media content within a corresponding media content library of the plurality of media content libraries using an access credential.

Method and apparatus for protecting confidential data in an open software stack

A method is provided for securely providing data for use in a consumer electronics device having a processor performing instructions defined in a software image. The method includes receiving the data encrypted according to a global key, further encrypting the data according to a device-unique hardware key, storing the further encrypted data in a secure memory of the consumer electronics device, providing the global key to a whitebox encoder for encoding according to a base key to generate a whitebox encoded global key, and transmitting the software image to the consumer electronics device for storage in an operating memory of the consumer electronics device, the software image having a whitebox decoder utility corresponding to the whitebox encoder and the whitebox encoded global key.

Linked account system using personal digital key (PDK-LAS)
11922395 · 2024-03-05 · ·

One embodiment of the invention includes a system comprising: a personal digital key and a computer readable medium that is accessible when authenticated by the personal digital key.

System and method for protecting content

A method for protecting content, comprising receiving, from a client device, a request for an encryption key for encrypting the content comprising a reference associated with the client device, identifying a set of supported security capabilities corresponding to the reference associated with the client device, identifying a set of required security capabilities corresponding to the content associated with the key request, determining if the set of supported security capabilities satisfy the set of required security capabilities, and in response to determining that the supported security capabilities satisfy the set of required security capabilities, transmitting the encryption key to the client device.

Providing media content to content consumers for playback and consumption

A system is provided that includes a plurality of nodes and a plurality of instances of a distributed media rights transaction ledger associated with the plurality of the nodes. The plurality of nodes includes a first node associated with a first participant and a second node associated with a second participant. The first node interacts with the second node based on a defined protocol in a communication network. The first node receives a request for playback of a media content from a content consumer associated with a consumer device. The second node provides media content rights associated with media content to at least one of the first participant or the content consumer. Each instance of the distributed media rights transaction ledger includes a plurality of media content rights transactions corresponding to at least an acquisition of the media content rights by the first participant or the content consumer.

System and method for facilitating a virtual screening

A system for facilitating a virtual screening is disclosed. The system identifies a user for participating in a virtual screening of media content. The system generates a unique link for the user to facilitate access to the media content. When the user interacts with the link, the system prompts the user to authenticate with the system and determines whether the authentication was successful. If authentication is successful, the link is associated with an identifier of the user and/or a user device. A request for a key for decrypting the media content and a request for a digitally signed file accessing the media content pursuant to parameters are made. If the digitally signed file is valid, the system applies a watermark to the media content to track the use of the media content and streams the media content to the user. Feedback on the media content is obtained from the user.

Secure messaging service with digital rights management using blockchain technology
11914684 · 2024-02-27 · ·

The invention described herein is directed to a secure text messaging and object sharing mobile application connected to a DRM cloud service that provides encryption, digital rights management (DRM) of the text and of the attachments, blockchain transactions, the capability of attaching documents, photos and so forth, the capability of interfacing with a user's contacts application, and that operates in both Android and iOS environments.

Network resource access control methods and systems using transactional artifacts
11909728 · 2024-02-20 · ·

Methods and systems are provided for use with digital data processing systems to control or otherwise limit access to networked resources based, at least in part, on transactional artifacts and/or derived artifacts.

METHODS AND APPARATUS TO MONITOR STREAMING MEDIA CONTENT
20240048801 · 2024-02-08 ·

Methods, apparatus, systems and articles of manufacture are disclosed to monitor streaming media content. Example apparatus disclosed herein include means for determining whether a streaming media flag is asserted in a payload of a watermark detected in media presented by a media presentation device, the streaming media flag to indicate whether the media was distributed to the media presentation device as streaming media. Disclosed example apparatus also include means for discarding the detected watermark from collected data in response to a determination that the streaming media flag is asserted. Disclosed example apparatus further include means for reporting the collected data to a remote server via a network.