H04L2463/103

SYSTEM AND METHOD FOR PROTECTING CONTENT
20210240847 · 2021-08-05 ·

A method for protecting content, comprising receiving, from a client device, a request for an encryption key for encrypting the content comprising a reference associated with the client device, identifying a set of supported security capabilities corresponding to the reference associated with the client device, identifying a set of required security capabilities corresponding to the content associated with the key request, determining if the set of supported security capabilities satisfy the set of required security capabilities, and in response to determining that the supported security capabilities satisfy the set of required security capabilities, transmitting the encryption key to the client device.

Automatically detecting misuse of licensed software
11100199 · 2021-08-24 · ·

An example embodiment may be performed by a software application executable on a computing device and may involve communicating with a server to access records of sessions between the server and computing devices of a managed network. The managed network may contain the server and a database associated with licensed software executable on the server. The database may store the records, and the records may include network addresses of the computing devices. The example embodiment may also involve: using a set of license misuse criteria to identify, within the records, (i) a set of the sessions that meets the set of criteria and (ii) a network address of a target device involved in the set of sessions; based on the network address of the target device, identifying the target device; and storing in memory an indication identifying the target device as a potential source of misuse of the licensed software.

Blockchain-based copyright distribution

This disclosure relates to blockchain-based copyright distribution. In one aspect, a method includes receiving, by a node device of a blockchain network, a target transaction including design data of a target work and an identity of a target copyright user corresponding to the target work. Design similarity comparison logic and copyright distribution logic are executed. The design data of the target work is compared with the design data of the existing work stored in the first smart contract to obtain a target similarity between the target work and the existing work. A copyright for the target work is distributed between the target copyright user and a copyright user corresponding to the existing work based on the target similarity. Copyright distribution data that specifies distribution of the copyright between the target copyright user and the copyright user corresponding to the existing work is stored in the first smart contract.

Non-fungible token (NFT) based digital rights management in a decentralized data delivery network
11075891 · 2021-07-27 · ·

Methods and systems are described for implementing decentralized digital rights management (DRM) within a decentralized network, satisfying an important need of content owners. First, the method implemented by a source cacher node includes broadcasting, to one or more viewer peer nodes in the decentralized network, a notification of the source cacher node's intent to transmit a data stream. Then, recording a smart contract on a blockchain associated with the decentralized network, the smart contract associated with the data stream and allowing the authentication of a viewer peer node through the smart contract by an ownership of a non-fungible token (NFT) in order to receive a data key to decrypt the data stream. Next, receiving a request from an authenticated viewer peer node for receiving the data stream. Finally, generating an encrypted data stream based on the data stream and the data key to decrypt the data stream, and transmitting the encrypted data stream and the data key to the authenticated viewer peer node.

System, Device, and Method of Providing Authenticity and Rights Verification Mechanism for Media Content and for its Derived Versions
20210224357 · 2021-07-22 ·

System, device, and method of providing authenticity and rights verification mechanism for media content and for its derived versions. A media authenticity server is configured to receive a content item, and to generate for it a record having a unique content identifier and indications of permitted modifications, and optionally also copyright information usage restrictions. The media authenticity server authorizes or blocks modifications requests regarding the content item. The media authenticity server tracks and logs the permitted modifications performed on the content item, and makes this log available for inspection to end-user devices via a web browser or via a content consumption application. Optionally, playback or consumption of a modified version of the content item is blocked, or is accompanied by a warning message, if the modified version is not associated with an authenticated log of permitted modifications.

Method for Managing Soft IP Licenses on a Partially Reconfigurable Hardware System

A method for managing licenses for soft IP on a partially reconfigurable hardware system, in particular an FPGA, wherein a license manager is provided in the non-configurable part of the hardware system, or is accessible only for the non-configurable part of the hardware system, where the license manager has exclusive access to a non-volatile memory in which license data having a time restriction of the useful life of at least one soft IP is stored, where before activating a particular soft IP, the license manager checks whether the useful life has expired, where the license manager only releases use of the soft IP if the useful life has not yet expired, where the license data is changed using a key, which is stored in a non-volatile memory for license data, and where a new key is stored and the preceding key is deleted when the license data is changed.

System and method to limit content distribution

A content distribution system that groups assets sharing the same required security capabilities in digital rights management service instances. Assets are encrypted with the help of media keys, effectively grouping media keys sharing the same required security capabilities. Digital rights management service instances are organized to cover different geographical areas, and asset groups are configured to migrate according to a configurable distribution range.

Temporarily providing a software product access to a resource

Functionality is disclosed herein for providing temporary access to a resource. A software product that is executing in response to a request from a customer may access one or more resources of a software provider. The resources that may be accessed by a software product may be identified within an access policy. The customer is prevented from accessing the resource when the software product is not executing.

Efficient access to user-related data for determining usage of enterprise resource systems
11044171 · 2021-06-22 · ·

An example embodiment may involve a method performed by a software application executable on a central enterprise resource planning (ERP) client of a plurality of ERP clients. The ERP clients may be contained within a managed network. Each ERP client may be associated with one or more computing devices of the managed network on which ERP software is executable. Each ERP client may include a database that stores user-related data for individual users of the managed network whom are authorized to access the ERP client. The method may involve communicating with other ERP clients of the plurality of ERP clients to retrieve the user-related data stored in databases of the other ERP clients, storing the user-related data from the other ERP clients, and transmitting the user-related data to a computing device of a computational instance contained in a remote network management platform associated with the managed network.

ENHANCED ACCESS TO MEDIA, SYSTEMS AND METHODS

A system and method are described. An illustrative method includes receiving content associated with a digital original work from a user device, where the associated content includes an object contained therein; determining an attribute-value pair for the content or the object contained within the content; linking the attribute-value pair to the associated content or the object contained within; determining that a second user is interested in the associated content; and causing the associated content to be transmitted to a second user device.