H04L2463/101

ENHANCED CONTENT TRACKING SYSTEM AND METHOD

The invention, as shown by the system in FIG. 2, relates to a client-side content tracking system of media files, e.g. digital music files. Audio trackingor indeed multimedia trackingis shifted to a client-side perspective, with the client tasked with establishing use of a selected source audio track by trackingand then reporting uplink to the serverat least one of: entry and exit points associated with playing of at least one of said musical sections in the identified source audio track, and how the identified source audio track was used, performed or manipulated at the client device. Server functionality is designed, having regard to the reported tracking data and its link to a unique identifier to permit the media file (e.g. source audio track) to be selected and/or identified, to store or relaypossibly in the context of a subscription service and billing regime for content usetracking data related to use of at least a portion of the source audio track at or by the client device. In the context of audio, reporting of use at a client device can, in turn, cause streaming of related multi-media content from a third-party database to the client device. For music, reporting of entry and end points into and out of sections of complete audio tracks can coincide with musically seamless audio transitions between sections.

Method and architecture for accessing digitally protected web content

The present disclosure provides method for accessing digital web content. It provides for selective access rights for users, to a web content. When the user tries to retrieve the data, the system checks for the rights available to the user, and accordingly implements the access before providing the content.

License-based access control of computing resources
10372885 · 2019-08-06 · ·

The disclosure is directed to an access permission system that manages provisioning of access to an electronic resource through various types of access permissions. The access permission system provisions access by provisioning a license entitlement of a specified type. A provisioning optimization technique determines a combination of different types of license entitlements to be provisioned according to an optimization criterion associated with an attribute of a license entitlement. For example, the optimization criterion can based on a unit cost associated with a license entitlement, and the provisioning optimization technique can determine various types of license entitlements to be obtained (and therefore to be provisioned) in order to minimize a total cost of the license incurred in satisfying the consumption demand requests.

SECURE AUTHENTICATED DISTANCE MEASUREMENT
20190238530 · 2019-08-01 ·

The invention relates to a method for a first communication device to perform authenticated distance measurement between the first communication device and a second communication device, wherein the first and the second communication device share a common secret and the common secret is used for performing the distance measurement between the first and the second communication device. The invention also relates to a method of determining whether data stored on a first communication device are to be accessed by a second communication device. Moreover, the invention relates to a communication device for performing authenticated distance measurement to a second communication device. The invention also relates to an apparatus for playing back multimedia content comprising a communication device.

Access Control in a Content Management System

Systems and methods for controlling object/document access in a content management system. The content management system may have several layers of access controls, which may include a layer of access control at the object level, a layer of access control at the row level and a layer of access control at the field level. Access may be controlled at the object level by a user's security profile, at the object record level (or row level) by the user's role, and/or at the object field level by the user's role or a state in a document lifecycle. In other words, the object level access control may grant access (e.g., Create, Read, Edit and Delete) on objects, the object record level access control may grant access (e.g., Read, Edit and Delete) on object records, and field level access control may grant access (e.g., Read, Edit and Hidden) on object field level.

Contents sharing method between mobile terminal and local server

Provided is a contents sharing method between a mobile terminal and a local server. The contents sharing method between a client terminal storing metadata and a server terminal storing the metadata, the method comprising requesting the server terminal for a contents share service; and receiving information on contents corresponding to matching metadata as a result of comparing the metadata stored in the client terminal and the metadata stored in the server terminal, thereby sharing contents desired by the user without the user's intervention. Also, the user can communicate desired contents information with people in a bus, subway, library, etc., which forms a social network, and produces a contents flow between mobile terminals, thereby creating a new business model such as contents resale, promotion, etc.

METHODS AND SYSTEMS FOR PURCHASING, SHARING AND TRANSFERRING OWNERSHIP OF DIGITAL MUSIC USING AUTHENTICATED DATA FILES FROM NEAR FIELD COMMUNICATION (NFC) CHIPS
20190230487 · 2019-07-25 ·

Methods for sharing and transferring music files using near field communication (NFC), which include storing a playlist of music files on a server system and assigning the music files or the playlist to an NFC Identifier (NFC ID); receiving the NFC ID using an NFC enabled device and authenticating the received NFC ID with the server system using the NFC enabled device; and if authenticated, permitting the server system to share or transfer the music files for playing through the NFC enabled device.

Downloadable security and protection methods and apparatus

Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional access (CA), digital rights management (DRM), and trusted domain (TD) security policies are delivered, configured and enforced with respect to consumer premises equipment (CPE) within a cable television network. A trusted domain is established within the user's premises within which content access, distribution, and reproduction can be controlled remotely by the network operator. The content may be distributed to secure or non-secure output domains consistent with the security policies enforced by secure CA, DRM, and TD clients running within the trusted domain. Legacy and retail CPE models are also supported. A network security architecture comprising an authentication proxy (AP), provisioning system (MPS), and conditional access system (CAS) is also disclosed, which can interface with a trusted authority (TA) for cryptographic element management and CPE/user device authentication.

System and method for secured communications between a mobile device and a server

The present systems and methods provide for secured communication between a mobile device and a server/gateway. The systems and methods can be used, for example, as a way to confirm whether or not a transaction was actually authorized by the user, thereby settling a chargeback dispute for a previously executed transaction. The method comprises receiving the dispute regarding the transaction including associated transaction data, and retrieving a digital signature associated with the transaction data, the digital signature computed by signing the transaction data. The digital signature is then verified using a public key, wherein the public key corresponds to a private key stored on a mobile device. It is then determined whether or not the transaction is fraudulent based on a verification result of the digital signature.

MULTI-APPLICATION-ORIENTED USER DATA MANAGEMENT METHOD AND SYSTEM
20190220329 · 2019-07-18 ·

Disclosed in the present invention are a multi-application-oriented user data management method and system. The method comprises a first application module receives an access instruction input by a first user, the first application module generates an authority request information according to the access instruction, wherein the authority request information includes information of the first application corresponding to the first application module, a platform server or an authority data storage server calls a user authority data of the first application according to the authority request information, and return the user authority data to the first application module, and the first application module obtains user data orienting to the first user of the first application according to the user authority data and user information of the first user.