Patent classifications
H04L2463/103
Information processing device, medium storing information processing program, and image forming device for protecting against fraudulent authentication of license for application
An information processing device not connected to a communication line includes a processor configured to measure an accumulated number of execution counts for specific processing repeatedly performed by an application, and perform control so that after the accumulated number of execution counts reaches an allowable number, the application is not started up.
TRANSLATING PROTECTED CONTENT IN A VIDEO PROCESSING SERVER
A method and system provide the ability to process video content on a headend. A video processing server authenticates with a key server and public keys are exchanged. The key server generates and places a content key into a document that is signed with the public key. A client on the video processing server receives the document, extracts the content key, and saves the content key to a database. The video content is encrypted using the content key and DRM signaling elements are added to a manifest. The encrypted video content and manifest are received in the head end, a key ID is extracted from the manifest and provided to the CPIX client to retrieve the content key from the CPIX document. The encrypted video content is decrypted using the content key resulting in clear content that is provided to a downstream packager that encrypts and repackages the content for transmission to recipients.
Aggregated media rights platform with media item identification across media sharing platforms
In one embodiment, a processing device receives a request to claim ownership of a first hosted media item on a first media sharing platform, wherein the request is received from a rights holder that holds one or more rights to a claimed media item that is incorporated into the first hosted media item. The processing device adds an indicator of the ownership of the rights holder to a first entry for the first hosted media item in a data store. The processing device determines that a second hosted media item having a threshold similarity to the first hosted media item is hosted by a second media sharing platform. The processing device automatically adds an indicator of the ownership of the rights holder to a second entry for the second hosted media item without receiving a separate request to claim ownership of the second hosted media item.
Digital content delivery system
A centralized content management service may facilitate streaming providers obtaining rights to digital content associated with content providers. The content management service may maintain a site in which the content providers and streaming providers may negotiate for rights to digital content items. Upon receiving a request from a streaming provider to stream a digital content item to a customer, the content management service may authenticate the customer and validate the streaming provider to confirm that the streaming provider is authorized to stream the digital content item to the customer. The digital content item may be encrypted, decrypted, and re-encrypted prior using various encryption keys prior to streaming the digital content item to the customer. The content management service may cause the digital content item to be streamed to a customer device of the customer without providing a copy of the digital content item to the streaming provider.
PROTECTING SECRET SOFTWARE AND CONFIDENTIAL DATA IN A SECURE ENCLAVE
A method of receiving and executing a secret software (G) on data in a secure enclave of a first device (DO) includes the following steps implemented in the secure enclave, that is to say a step of generating a public key (B), a step of receiving the encrypted secret software (G.sub.s) coming from a second device (AP), a step of decrypting the encrypted secret software (G.sub.s) from a key (K; P) depending of the public key (B, a step of receiving data; and a step of executing the secret software (G) using the data.
Content security on in-vehicle entertainment
A system for providing entertainment on a vehicle for passengers is described. The system includes (a) a server storing media files and corresponding media keys and (b) monitors storing subsets of the media files and the corresponding media keys. The system includes a server disposed on the vehicle to store the media files and the media keys for the vehicle; monitors disposed on the vehicle to present media selections to passengers corresponding to the media files stored by the server, locally, or on other monitors disposed on the vehicle, and receive an input from a passenger for playing one of the selections. The system also includes selectively revoking the media keys on the server or the monitors. Program logic executed by the server and the monitors implements secure, digital rights management processes as they pertain to the media files presented on the vehicle.
Trusted transaction system for digital asset licensing
A licensing system and related methods are described utilizing aspects of distributed ledger technologies to facilitate trusted and verifiable licensing transactions for creative works. A client device can include an asset editing tool for incorporating an asset selected from a plurality of licensable assets into a new creative work. The selected asset can be downloaded for incorporation into the new creative work. The new creative work incorporating the selected asset can be analyzed to determine an amount that the selected asset contributed to the new creative work, or an amount that the new creative work is attributable to the selected asset. Based on the analysis, a smart contract associated with the new creative work can be generated to include license fees for licensing the new creative work, receive payment transactions for licensing the new creative work, and fairly disperse calculated portions of received payment transactions to a licensor of the new creative work and to another licensor of the incorporated selected asset.
Digital rights list for device groups
In one example, a device directory server may maintain a digital rights management list for a user device belonging to a device group associated with a user. The device directory server may maintain a primary digital rights management list associating a user device with a primary online account for a user having a content license for a digital content item. The device director server may receive a status update indicating the user device is still in use by the user if sent by the user device. The device directory server may determine whether a status update has been received from the user device. The device directory server may deactivate the user device on the primary digital rights management list when no status update has been received within a pruning period for the user device to be associated with the primary online account.
Real-time feature level software security
Systems and techniques for real-time feature level software security are described herein. A request may be received from a computing device for data from the feature of the software application. The request for data may include authorization information of a user of the computing device. It may be identified that the feature of the software application contains code containing a reference to a security configuration service. A security configuration may be determined for the feature of the software application by comparing a resource identifier and a feature identifier of the feature of the software application to a set of security configurations of the security configuration service. The security configuration may provide access rules for the feature of the software application. A response may be sent to the computing device based on a comparison of the received authorization information of the user of the computing device to the determined security configuration.
EFFICIENT ACCESS TO USER-RELATED DATA FOR DETERMINING USAGE OF ENTERPRISE RESOURCE SYSTEMS
An example embodiment may involve a method performed by a software application executable on a central enterprise resource planning (ERP) client of a plurality of ERP clients. The ERP clients may be contained within a managed network. Each ERP client may be associated with one or more computing devices of the managed network on which ERP software is executable. Each ERP client may include a database that stores user-related data for individual users of the managed network whom are authorized to access the ERP client. The method may involve communicating with other ERP clients of the plurality of ERP clients to retrieve the user-related data stored in databases of the other ERP clients, storing the user-related data from the other ERP clients, and transmitting the user-related data to a computing device of a computational instance contained in a remote network management platform associated with the managed network.