Patent classifications
H04L2463/101
Collision avoidance in a distributed tokenization environment
A client receives sensitive data to be tokenized. The client queries a token table with a portion of the sensitive data to determine if the token table includes a token mapped to the value of the portion of the sensitive data. If the mapping table does not include a token mapped to the value of the portion of the sensitive data, a candidate token is generated. The client queries a central token management system to determine if the candidate token collides with a token generated by or stored at another client. In some embodiments, the candidate token includes a value from a unique set of values assigned by the central token management system to the client, guaranteeing that the candidate token does not cause a collision. The client then tokenizes the sensitive data with the candidate token and stores the candidate token in the token table.
Information processing apparatus and information processing method
The present disclosure relates to an information processing apparatus and an information processing method which facilitate reproduction of the data obtained by encrypting prepared multiple patterns regarding at least part of data of content with unique keys. An image acquiring unit receives an image file containing: encrypted data that is obtained by encrypting with unique keys multiple pieces of pattern data regarding forensic object data which is at least part of encoded image data of video content and that has an identical size; unencrypted data, of the encoded image data of video content, which is not encrypted with any one of the keys; size information that represents the size of the encrypted data; and position information that represents a position of the encrypted data in the file. The present disclosure can be applied to a video reproducing terminal and the like.
WEBSITE MONITORING SYSTEM AND MONITORING METHOD
The present invention relates to a website monitoring system. The website monitoring system according to the present invention monitors web information stored in a website using unique authority information having an access right to the website to detect various digital contents such as webtoons, sound sources, videos, and books which are illegally copied and circulated on the website and senses whether the unique authority information is blocked in real time. Further, when the unique authority information is blocked, the website monitoring system resumes the monitoring on the web information using the other unique authority information except the blocked unique authority information.
Enhanced content tracking system and method
The invention, as shown by the system in FIG. 2, relates to a client-side content tracking system of media files, e.g. digital music files. Audio trackingor indeed multimedia trackingis shifted to a client-side perspective, with the client tasked with establishing use of a selected source audio track by trackingand then reporting uplink to the serverat least one of: entry and exit points associated with playing of at least one of said musical sections in the identified source audio track, and how the identified source audio track was used, performed or manipulated at the client device. Server functionality is designed, having regard to the reported tracking data and its link to a unique identifier to permit the media file (e.g. source audio track) to be selected and/or identified, to store or relaypossibly in the context of a subscription service and billing regime for content usetracking data related to use of at least a portion of the source audio track at or by the client device. In the context of audio, reporting of use at a client device can, in turn, cause streaming of related multi-media content from a third-party database to the client device. For music, reporting of entry and end points into and out of sections of complete audio tracks can coincide with musically seamless audio transitions between sections.
METHODS AND APPARATUS FOR SHARING, TRANSFERRING AND REMOVING PREVIOUSLY OWNED DIGITAL MEDIA
The invention provide systems and methods for management of digital media objects, comprising first and second client digital data processors (e.g., personal (or private) computers, laptops, dedicated music devices, electronic book readers, and so forth) that are in communications coupling with one or more stores (e.g, dedicated disk drives, flash drives, cloud storage, etc.). At least one digital media object (DMO) or copy thereof is stored in one or more of those stores and is accessible by at least one of the first and second client digital data processors.
System And Method For Automatically Managing Media Content
A method, computer program product and computing device for receiving a request to load at least one new media content item on a personal media device. The size of the at least one new media content item is compared with the amount of storage space remaining on the personal media device to determine if the personal media device has sufficient available storage space. If the personal media device does not have sufficient available storage space, a relative weight associated with at least one old media content item stored on the personal media device is ascertained, the relative weight corresponding to a likelihood that the at least one old media content item will be rendered on the personal media device.
Methods and systems for purchasing, sharing and transferring ownership of digital music using authenticated data files from near field communication (NFC) chips
Methods for securely purchasing, sharing and transferring music files using NFC technology. Method of sharing a music playlist using near field communication (NFC), including assigning a playlist Identifier (playlist ID) to a playlist of music files; receiving an NFC Identifier (NFC ID) from an NFC chip using an NFC enabled device; writing the playlist ID to the NFC chip using the NFC enabled device; storing the NFC ID and playlist ID to a server system; receiving the NFC ID and playlist ID from the NFC chip using a subsequent NFC enabled device; authenticating the received NFC ID and playlist ID on the subsequent NFC enabled device with the server system; and if authenticated, streaming the copy of the music files through the subsequent NFC enabled device without downloading the music files into long-term memory.
Reconciling Entitlements in a Digital Rights Management (DRM) Environment
Introduced here are mechanisms and techniques for reconciling entitlements in a digital rights management (DRM) environment. Such technology can be used to discover compliant license positions for a licensee responsible for managing one or more computing devices. For example, a compliance platform may authenticate a computing device belonging to the licensee, apply a heuristic to discover an optimal compliant license position, and permit the computing device to use software resource(s) in accordance with certain permission(s). The heuristic may consider the contention of multiple license entitlements and the need of each possible assignment. The contention of a license entitlement generally increases as the number of possible assignments increases and as the number of available installations decreases. Meanwhile, the need of a possible assignment represents how important it is for a given installation to be assigned to a specific license entitlement.
Method of managing access to a service
The invention is a method for managing access to a service wherein the method comprises the following steps: a client application sends to an application server a request to access the service by using credentials and a first anti-clone code, the application server performs a verification of the credentials and said first anti-clone code, the application server sends a second anti-clone code to the client application and deactivates said first anti-clone code only in case of successful verification, said second anti-clone code being required for the next attempt to access the service.
DIGITAL RIGHTS MANAGEMENT FOR HTTP-BASED MEDIA STREAMING
Techniques and mechanisms described herein facilitate the management of digital rights for media content item presentation. According to various embodiments, a request for a content decryption key may be received at a media application implemented at a computing device. The request may be transmitted by a media content player implemented at the computing device. The request may be transmitted in accordance with a designated key exchange protocol. A license for an encrypted media content item corresponding with the requested content decryption key may be identified at the media application. Based on information included in the license, encrypted key material may be decrypted to create the requested content decryption key via a processor at the computing device. The requested content decryption key may be provided to the media content player.