Patent classifications
H04L2209/605
Identifying copyrighted material using embedded copyright information
A method includes generating, by a computing device, a unique identifier (ID) based on copyright information associated with textual content, wherein the copyright information and the textual content are recorded on a blockchain of a blockchain network; identifying, by the computing device, one or more attributes associated with punctuation marks included in the textual content; and embedding, by the computing device, the unique ID in the textual content by changing the one or more attributes associated with the punctuation marks in a manner representative of the unique ID, wherein the embedding produces information-embedded text configured to enable retrieval of the copyright information from the blockchain based on the unique ID, and wherein visual difference between the textual content and the information-embedded text is not apparent to an unaided human eye.
Blu-ray copy service
An example operation may include one or more of receiving, by a validation node, a copy request from a user node over a blockchain network, the request contains a copy token, invoking, by the validation node, a smart contract associated with the copy token to verify the copy token, in response to a verification, generating, by the validation node, media copy keys for generation of a Blu-ray copy, and recording, by the validation node, the copy token on a ledger of the blockchain network to indicate that the copy token is spent.
Service providing method performed by server of music platform using blockchain-based NFT
A service providing method of the present invention includes receiving sound source information on a sound source to be registered to the music platform and issuing a blockchain-based NFT that represents an ownership for the sound source; receiving a request for using a service related to the sound source registered to the music platform from at least one at least one service use terminal connected to the blockchain-based network; and in response to the received request, providing a service related to the sound source based on the blockchain-based NFT issued in advance for the sound source to the at least one service use terminal.
SECURE HARDWARE SIGNATURE AND RELATED METHODS AND APPLICATIONS
This disclosure provides techniques for recovering a root key from measurement of a circuit function. In some embodiments, a checkpointing feature is used to periodically mark measurements of this function and thereby track drift in the value of the root key over the life of a digital device; the checkpointing feature permits rollback of any measurement of the function in a manner that negates incremental drift and permits recovery of the root key for the life of a device (e.g., an IC circuit or product in which the IC is embedded). This disclosure also provides novel PUF designs and applications.
PERFORMING AUTHENTICATION
Preference data is received. The received preference data is compared to stored preference data associated with a user with which the received preference data is associated. A determination is made whether to authorize an action based at least on the comparison. The preference data is received as a selection.
Downloadable security and protection methods and apparatus
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional access (CA), digital rights management (DRM), and trusted domain (TD) security policies are delivered, configured and enforced with respect to consumer premises equipment (CPE) within a cable television network. A trusted domain is established within the user's premises within which content access, distribution, and reproduction can be controlled remotely by the network operator. The content may be distributed to secure or non-secure “output” domains consistent with the security policies enforced by secure CA, DRM, and TD clients running within the trusted domain. Legacy and retail CPE models are also supported. A network security architecture comprising an authentication proxy (AP), provisioning system (MPS), and conditional access system (CAS) is also disclosed, which can interface with a trusted authority (TA) for cryptographic element management and CPE/user device authentication.
STORING AND VERIFICATION OF DERIVATIVE WORK DATA ON BLOCKCHAIN WITH ORIGINAL WORK DATA
Disclosed is technology for storing original work data on a derivative work data blockchain along with code for verifying that derivative work data is derivative of the original work data. The technology involves receiving derivative work data from a submitting entity along with proof data showing that the derivative work is derivative of the original work. If the derivative work data is verified as derivative, then the derivative work data is appended to the derivative work data blockchain.
Identifying copyrighted material using embedded copyright information
A method includes generating, by a computing device, a unique identifier (ID) based on copyright information associated with digital content, wherein the copyright information and the digital content are recorded on a blockchain of a blockchain network; identifying a plurality of color values associated with one or more color attributes of at least a portion of the digital content; and embedding the unique ID in the digital content by changing one or more color values of the plurality of color values to be representative of the unique ID, wherein the embedding produces information-embedded digital content that enables retrieval of the copyright information from the blockchain based on the unique ID, and wherein a visual difference between the digital content and the information-embedded digital content is not apparent to an unaided human eye.
Systems and methods for data processing, storage, and retrieval from a server
A method of splitting a data stream into a set of data segments may include receiving the data stream, wherein the data stream may include data packets; selecting a segment time period and a time domain; subdividing the time domain into a set of time blocks, each one of the set of time blocks having a duration of the segment time period; identifying a set of starting data packets corresponding to the set of time blocks; identifying a set of finishing data packets corresponding to the set of starting data packets; identifying a last one of the set of finishing data packets being a last data packet of a last one of the set of time blocks; and identifying the set of data segments based on the corresponding set of starting data packets and the corresponding set of finishing data packets.
Performing authentication
Preference data is received. The received preference data is compared to stored preference data associated with a user with which the received preference data is associated. A determination is made whether to authorize an action based at least on the comparison. The preference data is received as a selection.