Patent classifications
H04L2463/103
FLEXIBLE FEATURE ENABLING INTEGRATED CIRCUIT AND METHODS TO OPERATE THE INTEGRATED CIRCUIT
A method for enabling a circuit feature on an integrated circuit device having inactive circuit features includes a step to receive an encrypted message and a signed digital signature from a server using an input/output (I/O) terminal within the integrated circuit device. The method also includes a step to decrypt the encrypted message using a public key to obtain a decrypted message using a data decryption block within the integrated circuit device. Furthermore, the method also includes a step to enable one of the inactive circuit features on the integrated circuit device that corresponds to the decrypted message after decrypting the encrypted message. The method may be performed by a flexible feature enabling integrated circuit.
SYSTEMS AND METHODS FOR METERED AUTOMATION CONTROLLER FUNCTIONALITY
Metering automation controller functionality includes accessing a project code that defines one or more operations of an industrial automation controller, analyzing the project code to identify one or more capabilities of the industrial automation controller that are utilized by the one or more operations, generating a file indicative of the one or more capabilities of the industrial automation controller, transmitting the file to a server that generates a certificate for authorizing the industrial automation controller to execute the project code, receiving the certificate from the server that identifies the file and an authorization for the industrial automation controller to execute the project code to perform the one or more operations, and transmitting the project code, the file, and the certificate to the industrial automation controller for execution.
PROTECTING SECRET SOFTWARE AND CONFIDENTIAL DATA IN A SECURE ENCLAVE
A method of receiving and executing a secret software (G) on data in a secure enclave of a first device (DO) includes the following steps implemented in the secure enclave, that is to say a step of generating a public key (B), a step of receiving the encrypted secret software (G.sub.s) coming from a second device (AP), a step of decrypting the encrypted secret software (G.sub.s) from a key (K; P) depending of the public key (B, a step of receiving data; and a step of executing the secret software (G) using the data.
Blockchain-based image processing method and apparatus
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for blockchain-based image processing are provided. One of the methods comprises: obtaining, by a computing device, copyright-related information corresponding to an original image; sending, by the computing device, the copyright-related information to one or more blockchain nodes configured to obtain ciphertext information by encrypting the copyright-related information and to store the ciphertext information in the blockchain; obtaining, by the computing device, the ciphertext information from the blockchain; and performing, by the computing device, obfuscation on a pixel matrix of the original image based on the ciphertext information to generate a target image carrying the copyright-related information.
Decentralized content distribution
In one embodiment, a computing device includes: a media player operative to at least play a content item on the computing device, a blockchain-based wallet application operative to transfer a transaction amount to a publisher wallet ID via an associated blockchain-based transaction service, a secure digital rights management (DRM) client application operative to verify the transfer of the transaction amount to said publisher wallet ID according to a public transaction ledger associated with the associated blockchain-based transaction service and upon successful verification of the transfer of the transaction amount to the publisher wallet ID at least unlock a locked version of the content item, and a processor operative to execute the media player, the blockchain-based wallet application, and the DRM client application.
REAL-TIME FEATURE LEVEL SOFTWARE SECURITY
Systems and techniques for real-time feature level software security are described herein. A request may be received from a computing device for data from the feature of the software application. The request for data may include authorization information of a user of the computing device. It may be identified that the feature of the software application contains code containing a reference to a security configuration service. A security configuration may be determined for the feature of the software application by comparing a resource identifier and a feature identifier of the feature of the software application to a set of security configurations of the security configuration service. The security configuration may provide access rules for the feature of the software application. A response may be sent to the computing device based on a comparison of the received authorization information of the user of the computing device to the determined security configuration.
Systems and methods to secure publicly-hosted cloud applications to run only within the context of a trusted client application
Systems and methods are provided that may be implemented to secure a publicly-hosted web application so that it will render only within the determined context of a trusted client application. Such an authentication decision may be made, for example, using front-end web application code that is rendered in a client web view together with client application code to authenticate the client application context in which the web page is rendered. In this way, the web application may validate that it is being rendered in the context of a trusted and/or well-known client application rendering engine/environment.
Trusted transaction system for digital asset licensing
A licensing system and related methods are described utilizing aspects of distributed ledger technologies to facilitate trusted and verifiable licensing transactions for creative works. A client device can include an asset editing tool for incorporating an asset selected from a plurality of licensable assets into a new creative work. The selected asset can be downloaded for incorporation into the new creative work. The new creative work incorporating the selected asset can be analyzed to determine an amount that the selected asset contributed to the new creative work, or an amount that the new creative work is attributable to the selected asset. Based on the analysis, a smart contract associated with the new creative work can be generated to include license fees for licensing the new creative work, receive payment transactions for licensing the new creative work, and fairly disperse calculated portions of received payment transactions to a licensor of the new creative work and to another licensor of the incorporated selected asset.
Linked Account System Using Personal Digital Key (PDK-LAS)
One embodiment of the invention includes a system comprising: a personal digital key and a computer readable medium that is accessible when authenticated by the personal digital key.
Real-time feature level software security
Systems and techniques for real-time feature level software security are described herein. A request may be received from a computing device for data from the feature of the software application. The request for data may include authorization information of a user of the computing device. It may be identified that the feature of the software application contains code containing a reference to a security configuration service. A security configuration may be determined for the feature of the software application by comparing a resource identifier and a feature identifier of the feature of the software application to a set of security configurations of the security configuration service. The security configuration may provide access rules for the feature of the software application. A response may be sent to the computing device based on a comparison of the received authorization information of the user of the computing device to the determined security configuration.