H04L2463/101

System for automatic management and depositing of documents (images) hash in block-chain technology
11893055 · 2024-02-06 ·

The system for automatic management and depositing of documents' (images') hash in the block-chain technology comprises of at least one device for documents' recording, and/or for the conversion of documents into digital photography (1), at least one device through which communication and encoding are performed (2), at least one device through which user authentication is performed (3), at least one device on which the block-chain base is located (4) and at least one device on which the hash base is located (5). The device (1) comprises at least a digital camera, a communication system, an image processing system and the GPS, and it may additionally include an adequate software application. The communication system is a virtual VPN specifically dedicated to the device (1), and communication among the devices within the system is carried out through the Internet and it is encoded. In the device (5), the hash base is divided per tables into blocks that can be fast searched by searching the tables linked to the blocks A1, A and A+1 first, and the hash table determines the actual address of the document in the block-chain through the hash value.

Method and apparatus for limiting access to data by process or computer function with stateless encryption
10503880 · 2019-12-10 ·

Systems and methods related to DRM content usage mechanisms for both online and offline usage of content are disclosed, including systems providing secure access to data regardless of network state or connectivity state to the networked access control mechanism. An access control mechanism having a secondary offline access control mechanism is presented, further including multiple implementations for data encapsulation, as well as providing a method for writes to files and to the filesystem itself by externally created applications with no API or modification to their operation.

Method and apparatus for deterrence and detection of leakage during remote interactive sessions
10504201 · 2019-12-10 · ·

A server includes a hardware platform, a hypervisor platform, and a virtual machine operating as an independent guest computing device. The virtual machine executes a remote graphics generation protocol to generate a bitmap to be transmitted for display on a client machine associated with the virtual machine, determine a protection label to be inserted within the bitmap, and determine an optimization technique to be performed on the bitmap. The remote graphics generation protocol also determines if the optimization technique, if performed, alters the protection label. If yes, then the protection label is inserted within the bitmap without performing the optimization technique. If no, then the optimization technique is performed and the protection label is inserted within the bitmap.

INFORMATION PROCESSING SYSTEM, SERVICE PROVIDING APPARATUS AND METHOD, INFORMATION PROCESSING APPARATUS AND METHOD, RECORDING MEDIUM, AND PROGRAM
20190362099 · 2019-11-28 · ·

The present invention is related to an information processing system that simultaneously shares content data in private virtual spaces. A home server is arranged at a user's home. A portable user terminal can access the home server and a virtual home DB server supplies the layout information about virtual home to the portable user terminal. An authentication server executes authentication processing on the portable user terminal. An inter-user-terminal communication relay server executes the processing associated with the communication between a plurality of users. A user information holding server stores the personal data of each user and the content data, which are shared with other users. This system thus realizes realtime communication via the Internet.

Security and trust framework for virtualized networks
10491594 · 2019-11-26 · ·

A framework, apparatus, system and method for realizing security and trust management for virtualized networks. A computing platform for implementation in a networking device of a virtualized network comprises a root-trusted module layer, which includes a root trust module for providing root trust; and a middleware layer, which includes system-level components configured to manage security and trust of virtualized network functions by verifying, establishing or maintaining trust with regard to the virtualized network functions based on the root trust. The computing platform can further comprise a number of virtualized security and trust functions that can be flexibly deployed in the virtualized network function infrastructure supported by the above two layers.

End-to-end encryption of a block storage device with protected key

A method for protecting an encryption key for a block storage device is provided. The includes reading from a superblock of the block storage device a secure key, referring to a clear key only accessible by a hardware security module, and a type indicator indicating that the secure key refers to the clear key which is only accessible by the hardware security module. The method also includes associating the block storage device with the hardware security module and converting the secure key into a protected clear key using the hardware security module, wherein the protected key refers to the clear key accessible by a central processing unit of a related computer system.

SYSTEM TO ESTABLISH A NETWORK OF NODES AND PARTICIPANTS FOR DYNAMIC MANAGEMENT OF MEDIA CONTENT RIGHTS
20240114210 · 2024-04-04 ·

The present disclosure discloses a system and method for establishing a network of nodes and participants for dynamic management of media content rights. The system comprises a plurality of nodes configured to interact with each other in accordance with a defined protocol, and a plurality of instances of a distributed media rights transaction ledger associated with a respective node in a communication network. At least one node associated with a corresponding participant interacts with one of remaining nodes of the plurality of nodes associated with a participant which owns media content and maintains control over enforcement of media content rights associated with the media content. A plurality of media content rights transactions between the plurality of nodes is managed by the plurality of nodes in accordance with the defined protocol and categorized and defined based on the defined protocol in each instance of the distributed media rights transaction ledger.

Personal digital server (PDS)
10484469 · 2019-11-19 ·

Personal Digital Server (PDS) is a unique computer application for the storage, updating, management and sharing of all types of digital media files, including audio, video, images and documents, irrespective of their format. PDS provides users with a single location to store and access, both locally and remotely, all of their digital media. It also provides the user total control of the overall management of these assets.

FRONT-END USER INTERFACE FOR CONFIDENTIAL TRANSACTIONS
20190349343 · 2019-11-14 ·

The disclosed technology is generally directed to security technology. In one example of the technology, it is determined that an attempted function associated with an application has at least one requirement including at least particular security credentials for a user of the application. A transaction is caused to be sent to each node in a permissioned blockchain that stores an access level block corresponding to the user. The transaction is associated with a real-time determination as to whether the at least one requirement for the attempted function is met. A transaction result is received from the permissioned blockchain. The attempted function is selectively allowed based on the transaction result.

System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state

A system and method is disclosed for allowing content providers to protect against widespread copying of their content, while enabling them to give their customers more freedom in the way they use the content. In accordance with one embodiment, content providers identify their content as protected by watermarking the content. Consumers use compliant devices to access protected content. All of a user's compliant devices, or all of a family's devices, can be organized into an authorized domain. This authorized domain is used by content providers to create a logical boundary in which they can allow users increased freedom to use their content.