Patent classifications
H04L2209/603
SECURE PROCESSING SYSTEMS AND METHODS
This disclosure relates to systems and methods for enabling the use of secret digital or electronic information without exposing the sensitive information to unsecured applications. In certain embodiments, the methods may include invoking, by a client application executing in an open processing domain, a secure abstraction layer configured to interface with secret data protected by a secure processing domain. Secure operations may be securely performed on the secret data by the secure abstraction layer in the secure processing domain based on an invocation from a client application running in the open processing domain.
Systems and Methods for Token Management in Augmented and Virtual Environments
Systems and techniques to apply NFT content to immersive environment generation within an NFT platform are illustrated. One embodiment includes a method for rendering content. The method receives, from one or more sensory instruments, sensory input. The method processes the sensory input into a background source. The method receives a non-fungible token (NFT), wherein the NFT includes one or more character modeling elements. The method processes the one or more character modeling elements from the NFT into a character source. The method produces an immersive environment including features from the background source and features from the character source.
System, device, and method of providing authenticity and rights verification mechanism for media content and for its derived versions
System, device, and method of providing authenticity and rights verification mechanism for media content and for its derived versions. A media authenticity server is configured to receive a content item, and to generate for it a record having a unique content identifier and indications of permitted modifications, and optionally also copyright information usage restrictions. The media authenticity server authorizes or blocks modifications requests regarding the content item. The media authenticity server tracks and logs the permitted modifications performed on the content item, and makes this log available for inspection to end-user devices via a web browser or via a content consumption application. Optionally, playback or consumption of a modified version of the content item is blocked, or is accompanied by a warning message, if the modified version is not associated with an authenticated log of permitted modifications.
Secure processing systems and methods
This disclosure relates to systems and methods for enabling the use of secret digital or electronic information without exposing the sensitive information to unsecured applications. In certain embodiments, the methods may include invoking, by a client application executing in an open processing domain, a secure abstraction layer configured to interface with secret data protected by a secure processing domain. Secure operations may be securely performed on the secret data by the secure abstraction layer in the secure processing domain based on an invocation from a client application running in the open processing domain.
Grinding Resistant Cryptographic Systems and Cryptographic Systems Based on Certified Miners
Certified miners can be miners associated with certified public identifiers. In some embodiments, the certified public identifiers can be associated with a Trusted Execution Environment (TEE). In several embodiments mining can be based on a quality function. In various embodiments, to reduce grinding, the challenge can be based on an already closed collection of ledger entries. A device can be configured to close a ledger maintained by a cryptographic system. In an embodiment, the device includes a network interface, memory, and a processor configured to obtain a challenge using a cryptographic system, wherein the challenge is based on a closed collection of ledger entries on a ledger, to determine a quality value based on the challenge and a value; and to transmit a mining attempt to securely close a second collection of ledger entries on the ledger. The mining attempt is capable of being validated by using the cryptographic system.
Encryption management, content recording management, and playback management in a network environment
Management of key information as described herein enables a respective service provider to distribute encrypted content to subscribers, preventing improper use of the content without authorization. For example, the service provider can distribute encrypted content for recording by a subscriber at a remote location. At or around a time of recording the encrypted content, and on behalf of the user, the service provider initiates storage of the corresponding decryption information that is needed to decrypt the recorded encrypted content. In order to play back the recorded segments of the encrypted content, the subscriber communicates with a server resource to be authenticated. Subsequent to being authenticated, the server resource distributes a copy of decryption information needed to decrypt the previously recorded segments of encrypted content to the subscriber. Accordingly, the service provider retains control of playing back content via controlled distribution of the corresponding copy of decryption information.
CONTEXTUAL CONTROL OF DIGITAL FILES BUILT ON THE BLOCKCHAIN & PROJECTED IN AUGMENTED REALITY
Provided is a process including: identifying, with a computing system, a blockchain-based token mapped to an asset configured to be presented in an augmented reality application; obtaining, with the computing system, contextual information indicative of a physical context of a physical geolocation of a display upon which the augmented reality application is to present the asset; causing, with the computing system, visual attributes or audio attributes of the asset to be determined based on the contextual information; and causing, with the computing system, the asset to be presented with the display according to the visual attributes or the audio attributes.
MULTIMEDIA CONTENT SECURE ACCESS
A method is disclosed for providing secure access to multimedia content to a user of a content service at a first user device configured to enable the user to consume the multimedia content. The method comprises: providing, from a second user device, a user identifier to a service provider of the content service, the second user device being provided with a subscriber identity module enabling the second user device to connect to a cellular communication network, the user identifier comprising an identifier of the subscriber identity module; at the second user device, receiving an access key from the service provider, through the cellular communication network, the access key being associated with the user identifier; providing the access key from the second user device to the first user device through a short-range connection, and at the first user device, using the access key to access the multimedia content.
METHOD AND APPARATUS FOR SUPPORTING DIGITAL RIGHTS MANAGEMENT IN MACHINE-TO-MACHINE SYSTEM
Digital rights management (DRM) in a machine-to-machine (M2M) system, and a method for operating a first device may include: receiving, from a second device, a first message for requesting to create a resource associated with a content under digital rights management (DRM); creating the resource based on the first message; obtaining the content and right information on usage of the content from at least one external server; storing the content and the right information in the resource; and transmitting, to the second device, a second message for notifying creation of the resource.
DIGITAL ASSET MANAGEMENT
Methods and systems for digital asset management are discussed herein. Physical assets, such as a seat or group of seats in a venue (e.g., sports stadium, concert hall, movie theater, etc.) or a housing unit or group of housing units (e.g., apartment, condominium, hotel room, etc.) may be tokenized and associated with a minted non-fungible token (NFT). The NFT may be entered into a distributed ledger such that, when the asset is involved in a transaction (e.g., rented, purchased, etc.), a record of the transaction is securely and permanently entered into the distributed ledger. By utilizing the NFT and the distributed ledger during the transaction of the asset, all participants involved can be assured that proper and secure compensation is being provided for use of the asset.