Patent classifications
H04L2463/103
Systems and Methods for Protecting Against Token-Based Malicious Scripts
Non-fungible token (NFT) platforms in accordance with various embodiments of the invention are described. In an embodiment of the NFT platform includes storing several tokens, where a token includes several data elements and associated access control settings for accessing the several data elements; identifying a script to execute that is associated with a first token, where the script includes at least one instruction for accessing data from at least one data element of a second token; determining, based on access control settings of the second token, that the first token has particular access rights to the at least one data element of the second token; and executing the script based on the particular access rights of the first token.
AGGREGATED MEDIA RIGHTS PLATFORM
In one embodiment, a processing device receives a first digital fingerprint of a media item along with a first content management rule. The processing device separately receives a second digital fingerprint of the media item along with a second content management rule. The processing device determines that the received digital fingerprints are for the same media item based upon a match between the first digital fingerprint and the second digital fingerprint. The processing device determines that all rights to the media item have been accounted for, and then determines a set of actions to be performed for hosted media items comprising the media item based at least in part upon the first content management rule and the second content management rule. Processing logic may also perform a conflict resolution process for conflicting rights claims to the media item.
METHOD AND APPARATUS FOR PROVIDING SERVICES IN VIRTUAL DESKTOP ENVIRONMENT
Disclosed are a method and an apparatus for providing services in a virtual desktop environment. A method for providing services in a virtual desktop environment according to an exemplary embodiment of the present invention may include: (a) receiving a VDI service request for a virtual desktop infrastructure (VDI); (b) determining component information of a basic VDI image in response to the VDI service request; (c) receiving external service related information associated with the basic VDI image from a content management system (CMS) server; and (d) generating a final VDI image for the VDI service by reflecting the component information and the external service related information to the basic VDI image.
Enhanced access to media, systems and methods
A system and method are described. An illustrative method includes receiving content associated with a digital original work from a user device, where the associated content includes an object contained therein; determining an attribute-value pair for the content or the object contained within the content; linking the attribute-value pair to the associated content or the object contained within; determining that a second user is interested in the associated content; and causing the associated content to be transmitted to a second user device.
Blockchain digital rights management streaming library
A computer-implemented method includes: receiving, by a computer device, an artifact and a first token with a check-in request; applying, by the computer device, a first level fragile watermark to the artifact, wherein the first level fragile watermark includes ownership information from the first token; receiving, by the computer device, a second token with a check-out request; applying, by the computer device, a second level fragile watermark to a copy of the first level fragile watermarked artifact, wherein the second level fragile watermark includes authentication information from the second token; and transmitting, by the computer device, the second level fragile watermarked copy of the artifact to a client device.
Contents blockchain platform
A platform and method for content management is disclosed. A content right management method includes receiving contents from a user, and generating a create key for a right for the contents by encrypting the contents using encryption information, in which the create key includes a copyright of the contents and a creation right of the contents.
PORTFOLIO OPTIMIZED OFFERS FOR MOBILE DEVICE
Described herein is a system for optimizing transactions conducted using a portfolio of payment devices by providing strategic content. In particular, content are assigned to payment devices in a portfolio of payment devices based on a frequency of a transaction type and a frequency with which a payment device is used. In some embodiments, a content may be generated for a payment device upon determining that a frequency of use associated with the payment device is below a usage frequency threshold. In some embodiments, a number of transactions associated with a portfolio of payment devices may be maximized by assigning content associated with transaction types that are frequently conducted to payment devices that are infrequently used as well as assigning content associated with transaction types that are infrequently conducted to payment devices that are frequently used.
SYSTEM AND METHOD TO ALLOW THIRD-PARTY DEVELOPER TO DEBUG CODE IN CUSTOMER ENVIRONMENT
A platform is provided to allow the developer to log into a subscriber's computer system by using the credential of the developer or the subscriber to view and to debug at least a portion of executable code that is used by the subscriber. The executable code used by the subscriber may be part of managed package code, at least portions of which are customized for various subscribers. Cooperative debugging may be provided between developer and subscriber with lifting of code encapsulation for the developer in the subscriber implementation. The developer and the subscriber may be granted debugging licenses each authorizing a limited number of debugging sessions, and each debugging session run by the developer may be counted against the debugging license of either the developer or the subscriber. Debugging licenses may be transferred between the developer and the subscriber.
Fine-Granularity Resource Control Method and Apparatus
Disclosed are a fine-grained resource control method and apparatus. The method includes: defining, for a function of which resource usage is needed to be restricted, a license item in a license file, wherein the license item is used for representing a resource restriction number for supporting the function; and judging whether a preferential support command is preset for resources of the function, if presetting, controlling the resources of the function according to the preferential support command, a value of the license item and an actual resource number for supporting the function, otherwise, controlling the resources of the function directly according to the value of the license item and the actual resource number for supporting the function.
SEARCH ENGINE FOR AUTHENTICATED NETWORK RESOURCES
A method and corresponding computer system for authenticating a network resource are disclosed. The method comprises receiving an input at a computer system over a network, the input comprising a network resource identifier and information indicative of an authentication entity associated with the network resource; automatically identifying stored data using the information indicative of the authentication entity, the stored data comprising contact information associated with the authentication entity; automatically transmitting an electronic message to the authentication entity using the identified contact information, the electronic message providing the authentication entity with the network resource identifier and means for authenticating the network resource; and automatically storing the network resource identifier. A search engine for authenticated network resources and a method and corresponding computer system for authenticating an entity are also disclosed.