Patent classifications
H04L2209/603
ROBOTIC TATTOOING MACHINE WITH AN OPTICAL TATTOO ANALYZER TO ANALYZE TATTOOS ASSOCIATED WITH NON-FUNGIBLE TOKENS
Art Non-Fungible Tokens (NFTs) are typically associated with the ownership of the digital art. NFTs can be used in the field of tattooing to manage a tattoo client, art generation, art conversion into tattoo instructions, manage payment of stakeholders, allow a client to buy and sell tattoos in a secondary market, book/manage tattoo sessions, or combinations thereof. An NFT structure allows for the certification of ownership. For the context of tattooing, a smart contract may be used to track ownership of the digital design rendition of the tattoo and tattooing information. The NFT smart contract may contain the rights for the execution of the tattoo, which may allow one or many applications of a tattoo rendition of the NFT digital design, such right being consumed in the process of successive executions until the NFT may not contain any rights associated with tattooing.
Systems and Methods for Using a Non-Fungible Digital Asset to Facilitate Accessing an Access-Restricted Resource
An exemplary method includes an access management system receiving a signed message that is associated with a non-fungible digital asset and that includes a non-fungible digital asset identifier and a nonce. The non-fungible digital asset may be configured to provide access to an access-restricted resource. Based on the non-fungible digital asset identifier included in the signed message, the access management system may access a distributed record that is configured to store ownership information associated with the non-fungible digital asset. Based on the signed message and the ownership information stored in the distributed record, the access management system may verify that a user of the non-fungible digital asset is authorized to access the access-restricted resource.
Systems and methods for managing secure sharing of online data
Systems and methods are disclosed for managing online advertising data secure sharing. One method includes receiving, at a server, a request for proprietary data from a data consumer, the request including a data consumer identifier; retrieving, from a database of proprietary data, proprietary data based on the request; determining, by the server, whether the retrieved proprietary data is at least one of: designated to be processed and designated to have privileges set; processing, by the server, the proprietary data when the server determines the proprietary data is designated to be processed; setting one or more privileges to the proprietary data using the certificate associated with the data consumer identifier when the server determines the proprietary data is designated to have privileges set; encrypting the proprietary data using the certificate associated with the data consumer identifier; and transmitting the encrypted proprietary data to the data consumer.
SYSTEMS AND METHODS TO MANAGE DIGITAL ASSET FUNCTIONALITY BASED ON FULFILLMENT OF CRITERIA
Systems and methods to manage digital asset functionality based on fulfillment of criteria are disclosed. Exemplary implementations may: receive, from a digital asset distribution platform, an indication that a user is requesting to acquire or acquired a collectible digital asset in a digital wallet of the user, the collectible digital asset is correlated with an entity; determine whether condition(s) are fulfilled; upon determination that the condition(s) are not fulfilled, prevent the acquisition of the collectible digital asset by the digital wallet or restrict a set of rights to the correlated entity; and upon determination that the condition(s) are fulfilled, permit acquisition of the collectible digital asset or permit the set of rights.
CRYPTOGRAPHIC TOKEN RIGHTS MANAGEMENT SYSTEMS AND METHODS USING TRUSTED LEDGERS
The disclosure relates to, among other things, systems and methods for securely managing digital assets, products, and/or associated tokens in a dynamic way. Various embodiments disclosed herein may use trusted ledgers to securely record certain assertions relating to the digital assets, products, rightsholders, and/or various ecosystems participants. Such assertions may be used in connection with rights binding, content packaging, management, and/or protection operations in connection with a variety of transactions associated with digital assets, products, and/or associated tokens.
SYSTEMS AND METHODS FOR SECURELY PROCESSING CONTENT
A device may not trust another device with which it is in communication. To establish trust, a first device may send a second device an indication of signed code that is stored in a protected memory of the first device. Based on determining that the first device is a trusted device, the second device may send the first device an encrypted content asset, a decryption key associated with the content asset, and/or an encryption key associated with the content asset.
CRAFTING OF NON-FUNGIBLE TOKENS USING PRE-MINTED TOKENS
According to some embodiments, a method for awarding pre-minted NFTs using a crafting recipe is disclosed. The method includes receiving a crafting request that indicates a set of owned NFTs that are owned by a user, wherein each owned NFTs indicates a type of the owned NFT. The method includes determining a crafting recipe that is implicated by the set of owned NFTs indicated in the crafting request and determining a specified type of NFT based on the crafting recipe. When the specified type of NFT is a pre-minted NFT, the method includes randomly selecting a crafted NFT from a set of pre-minted NFTs of the specified type. When the specified type of NFT were not pre-minted, the method includes minting the crafted NFT. The method further includes assigning the crafted NFT to a user account of the user on the distributed ledger.
Decryption and variant processing
A plurality of byte ranges forms a sample for content output from a player device, and includes at least one double-encrypted byte range. The plurality of byte ranges is stored in a secured memory, and the at least one double-encrypted byte range is partially decrypted to generate at least one decrypted singe-encrypted byte range. The plurality of byte ranges is stored in an unsecured memory using the at least one decrypted single-encrypted byte range in place of the at least one double-encrypted byte range.
Method for Processing Application Program and Related Product
A method for processing an application program includes steps for a non-service system to obtain a first running instruction from a user for running a target first service system. Sending, by a terminal, a key acquiring request to a digital rights management (DRM) server using the non-service system, requesting key information corresponding to the target first service system. The key information is fed back by the DRM server when the user has use permission of the target first service system. Decrypting, by the terminal, the target first service system based on the key information using the non-service system, and executing a service function corresponding to the target first service system.
INFORMATION PROCESSING METHOD AND NON-TRANSITORY COMPUTER-READABLE STORAGE MEDIUM
An acquisition part acquires a per-unit license fee for use of the content from the blockchain and a public key issued by an execution management system used by the licensee, from a blockchain in which a contract function is implemented to realize a license agreement. The acquisition part acquires information including a number of pieces of content used by the licensee from the execution management system used by the licensee. A verification part verifies validity of a signature of content usage information. A calculation part calculates a royalty token corresponding to an amount obtained by multiplying the number of pieces of content used by the per-unit license fee, on condition that the signature is valid. A registration part registers the number of pieces of content used and the royalty token in the blockchain.