H04L2463/101

MEDIA CONTENT ENCRYPTION AND DISTRIBUTION SYSTEM AND METHOD BASED ON UNIQUE IDENTIFICATION OF USER
20180068092 · 2018-03-08 ·

A method and apparatus to identify user who purchased/downloaded audio/video content. When an audio/video content is purchased/downloaded the content is encrypted for the user and a unique identification code is added as part of the purchase/download. When the encrypted content is decrypted and assembled the identification code is converted to a spatial or time domain vector and added to the original content. The identification code can be split into individual digits/bytes to represent in spatial or time domain vector. The identification code can be visible or invisible. By examining the encoded original content, the user who purchased/downloaded the content can be identified from the unique identification code.

System, method, and device for delivering communications and storing and delivering data
09910969 · 2018-03-06 ·

A system, method, and device includes a platform data storage that stores a wrap that secures an executable controller and executable sensors. The wrap is verified, optionally through a downloaded authentication driver. After verifying the wrap, the wrap is opened and a sister of the executable controller is installed into the platform memory to cooperate with the executable controller. Additionally or alternatively, the authentication driver may cooperate with the executable controller. The executable controller allows the platform processor to access data secured in a vault and/or verify the platform to create a connection to an application server.

METHOD AND AN INFORMATION APPLIANCE DEVICE FOR PREVENTING SECURITY BREACH IN INFORMATION APPLIANCE DEVICE

Embodiments herein relate to a method and an information appliance device having a unique access card for preventing security breach in the information appliance device. A multimedia content server transmits a one-time access key to both the information appliance device and a user of the information appliance device. The user must input the access key to the information appliance device. The information appliance device verifies the access key and provides access to the user for the multimedia services, by activating a periodic activation key upon successful verification of the access key. Therefore, even if unauthorized user tries to skip the access key verification process through modification of access cards used in information appliance device, the unauthorized user cannot access the multimedia service due to lack of the periodic activation key required for activating multimedia service. Hence, security breach such as, cloning or duplication of the access cards will be minimized.

Method for offline DRM authentication and a system thereof
09906509 · 2018-02-27 · ·

A method for offline DRM authentication and a system thereof relates to the information security field. In order to solve the problem that a license must be requested from the server in the process of DRM authentication, the invention provides a method for offline DRM authentication, in which, the method comprises: a content provider encrypts the data file with DRM standard and stores the internal information in an authentication device, the authentication device is connected to the local computer, the software program on the local computer opens and reads the data file. A system for offline DRM authentication, in which, the system comprises an authentication device, a client PC and content provider side, the authentication device comprises the DRM service module and authentication communication module. Compared with the prior art, the present invention allows the user to use the DRM protected information without a network connection.

Informing recipient device of message content properties
09906926 · 2018-02-27 · ·

According to one aspect of the present invention, a content class of a data set for a message to be transmitted to the recipient device is defined. A network element transferring messages to the recipient device specifies at least one information element in a message to the recipient terminal such that the information element includes an indication of the content class. The message is transmitted to the recipient device.

Device authentication for secure key retrieval for streaming media players

Systems and methods are disclosed that authenticate devices or users, and enable playback of secured streaming content through a media player. In one embodiment, the invention is a system for receiving secure content over an unmanaged network, including a security application configured operate on a user device with access to a network, where the security application is configured to receive a request for playlist data from the media player, send a playlist request to a content server, receive playlist data from the content server, send playlist data to a media player, receive a security access request from the media player, send a security access request to a security server, receive security access data from the security server; and send security access data to a media player.

METHOD AND APPARATUS FOR INSTALLING CAS INFORMATION
20180048919 · 2018-02-15 ·

Various exemplary embodiments of the present disclosure relate to method and an apparatus a broadcast receiver for a conditional access system (CAS) information download. The CAS information download method includes acquiring broadcast provider information. The method also includes, selecting a broadcast provider based on the broadcast provider information. The method further includes, transmitting a subscription request including identity information of the broadcast reception device to a broadcast provider server of the selected broadcast provider. The method also includes, downloading CAS information from a CAS server.

Digital rights management for HTTP-based media streaming

Techniques and mechanisms described herein facilitate the management of digital rights for media content item presentation. According to various embodiments, a request for a content decryption key may be received at a media application implemented at a computing device. The request may be transmitted by a media content player implemented at the computing device. The request may be transmitted in accordance with a designated key exchange protocol. A license for an encrypted media content item corresponding with the requested content decryption key may be identified at the media application. Based on information included in the license, encrypted key material may be decrypted to create the requested content decryption key via a processor at the computing device. The requested content decryption key may be provided to the media content player.

System and method for rules-based control of custody of electronic signature transactions

Techniques for electronic signature processes are described. Some embodiments provide an electronic signature service (ESS) configured to facilitate the creation, storage, and management of electronic signature documents. In one embodiment, an electronic signature document may be associated with custody transfer rules that facilitate transfers of custody of an electronic signature document from one user or party to another. A custody transfer may results in a transfer of rights or capabilities to operate upon (e.g., modify, view, send, delete) an electronic signature document and/or its associated data. A custody transfer rule may be trigged by the occurrence of a particular event, such as the receipt of an electronic signature.

Digital content distribution and subscription system

Digital content distribution systems and methods are provided for distributing for digital data files, such as digital audio and video data files. In accordance with one implementation, a token-based authentication system is provided that does not require knowledge of the individual user requesting the download of digital content data or real-time access to user account information. Instead, the token-based authentication system embeds the authentication information, or token, in the download request information itself. In this way, the download or content server authenticates the download request using the token contained in the download request information and therefore does not require any additional information to carry out this authentication, such as access to user account information.