H04L2463/103

Contents blockchain platform
10922384 · 2021-02-16 · ·

A platform and method for content management is disclosed. A content right management method includes receiving contents from a user, and generating a create key for a right for the contents by encrypting the contents using encryption information, in which the create key includes a copyright of the contents and a creation right of the contents.

Blockchain-based image processing method and apparatus
10922422 · 2021-02-16 · ·

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for blockchain-based image processing are provided. One of the methods comprises: obtaining, by a computing device, copyright-related information corresponding to an original image; sending, by the computing device, the copyright-related information to one or more blockchain nodes configured to obtain ciphertext information by encrypting the copyright-related information and to store the ciphertext information in the blockchain; obtaining, by the computing device, the ciphertext information from the blockchain; and performing, by the computing device, obfuscation on a pixel matrix of the original image based on the ciphertext information to generate a target image carrying the copyright-related information.

BLOCKCHAIN DIGITAL RIGHTS MANAGEMENT STREAMING LIBRARY
20210216612 · 2021-07-15 ·

A computer-implemented method includes: receiving, by a computer device, an artifact and a first token with a check-in request; applying, by the computer device, a first level fragile watermark to the artifact, wherein the first level fragile watermark includes ownership information from the first token; receiving, by the computer device, a second token with a check-out request; applying, by the computer device, a second level fragile watermark to a copy of the first level fragile watermarked artifact, wherein the second level fragile watermark includes authentication information from the second token; and transmitting, by the computer device, the second level fragile watermarked copy of the artifact to a client device.

CONTENT SECURITY ON IN-VEHICLE ENTERTAINMENT
20210019380 · 2021-01-21 ·

A system for providing entertainment on a vehicle for passengers is described. The system includes (a) a server storing media files and corresponding media keys and (b) monitors storing subsets of the media files and the corresponding media keys. The system includes a server disposed on the vehicle to store the media files and the media keys for the vehicle; monitors disposed on the vehicle to present media selections to passengers corresponding to the media files stored by the server, locally, or on other monitors disposed on the vehicle, and receive an input from a passenger for playing one of the selections. The system also includes selectively revoking the media keys on the server or the monitors. Program logic executed by the server and the monitors implements secure, digital rights management processes as they pertain to the media files presented on the vehicle.

Software-Enabled Remote Licensing and Provisioning

Described herein are systems and methods for providing software provisioning of functionality in a wireless communications device. Software-enabling functionality may include systems for granting a license to intellectual property or other pre-embedded functionality within a device. Communications to and from the device may be used to send or receive activation messages and/or licensing messages. Network capabilities may be provisioned using activation messages sent over the network. Activation messages may be sent in-band or out-of-band, for a device connected to the Internet and/or a mobile operator core network. Licenses may be required for any functions or intellectual property present on a given device. Activation may enable logical modules of a system-on-chip (SOC), functions of a software-defined radio (SDR), baseband, or DSP core. The disclosed systems and methods could thereby provide a new, flexible paradigm, namely, Silicon as a Service (SaaS).

Blockchain-based copyright distribution

This disclosure relates to blockchain-based copyright distribution. In one aspect, a method includes receiving, by a node device of a blockchain network, a target transaction including design data of a target work and an identity of a target copyright user corresponding to the target work. Design similarity comparison logic and copyright distribution logic are executed. The design data of the target work is compared with the design data of the existing work stored in the first smart contract to obtain a target similarity between the target work and the existing work. A copyright for the target work is distributed between the target copyright user and a copyright user corresponding to the existing work based on the target similarity. Copyright distribution data that specifies distribution of the copyright between the target copyright user and the copyright user corresponding to the existing work is stored in the first smart contract.

Image chain of title management

In an apparatus and method, a data packet structure for an image product is written to a node of a transaction processing network. The data packet structure includes a cryptographic hash of, altogether, an image from a base work and image metadata including an identification of the base work and provenance of the base work; and a transferor identification and a transferee identification for a transfer of the image product.

Third-party authorization support for interactive computing environment functions
10863359 · 2020-12-08 · ·

In some aspects, a computing system can obtain, from a host server, a data network identifier that identifies a mobile device involved in an online transaction within an interactive computing environment provided by the host server. The computing system can also obtain, from a telecommunication provider server, a credential corresponding to the data network identifier. The computing system can match the credential to a set of authorization elements. Each authorization element can allow the mobile device to access a function for advancing the online transaction within the interactive computing environment. The computing system can generate a dynamic authorization data structure that includes the authorization elements. The computing system can cause the host server to advance, responsive to receiving a selection from the mobile device identifying one of the authorization elements, the online transaction within the interactive computing environment.

Method and apparatus for controlled messages
10853898 · 2020-12-01 ·

The present invention is a method and apparatus for a first user to create intellectual property, in the form of digital media, then sell it to a second user. Users can collaborate to create intellectual property in an efficient manner by following a preferred procedure. The intellectual property can be distributed in an encrypted form which allows the intellectual property owner to specify the conditions of use that must be met for a specified intellectual property user to use the intellectual property. The user can authenticate the intellectual property in a distributed secure platform before final payment. The intellectual property owner can tag each copy of the intellectual property to trace the source of unauthorized copies.

Activation of an application based on prior activation of an isolated counterpart application

A system activates an application on a computing device based on a prior activation of an isolated counterpart application on the computing device. An application that is restricted from sharing a license with a counterpart application locally on the computing device is enabled to instead communicate with an application license manager to manage license data corresponding to the counterpart application. For example, when a license is obtained at the computing device for a container application, the application license manager may update license data in association with a native application so that a counterpart license can be obtained automatically by the native application, and vice versa. Thus, once a user has responded to an activation prompt for either one of the container application or the native application, whichever application the user has not manually activated will be automatically activated at the computing device based on communications with the application license manager.