H04L2209/605

Storing and verification of derivative work data on blockchain with original work data

Disclosed is technology for storing original work data on a derivative work data blockchain along with code for verifying that derivative work data is derivative of the original work data. The technology involves receiving derivative work data from a submitting entity along with proof data showing that the derivative work is derivative of the original work. If the derivative work data is verified as derivative, then the derivative work data is appended to the derivative work data blockchain.

IDENTIFYING COPYRIGHTED MATERIAL USING EMBEDDED COPYRIGHT INFORMATION
20210312019 · 2021-10-07 · ·

A method includes generating, by a computing device, a unique identifier (ID) based on copyright information associated with digital content, wherein the copyright information and the digital content are recorded on a blockchain of a blockchain network; identifying a plurality of color values associated with one or more color attributes of at least a portion of the digital content; and embedding the unique ID in the digital content by changing one or more color values of the plurality of color values to be representative of the unique ID, wherein the embedding produces information-embedded digital content that enables retrieval of the copyright information from the blockchain based on the unique ID, and wherein a visual difference between the digital content and the information-embedded digital content is not apparent to an unaided human eye.

SYSTEMS AND METHODS FOR DATA PROCESSING, STORAGE, AND RETRIEVAL FROM A SERVER
20210385529 · 2021-12-09 · ·

A method of selectively decrypting encrypted data may include selecting a plurality of encrypted data bits between and including a first encrypted data bit and a last encrypted data bit; for each encrypted data bit from the plurality of encrypted data bits: determining a corresponding encrypted block and a block number that contains the encrypted data bit, determining a corresponding counter for the determined block number, determining a bit position of the encrypted data bit within the determined encrypted block, selecting a counter bit at the bit position within the counter, encrypting the counter, and executing an XOR operation between the encrypted data bit and the corresponding encrypted counter bit.

SYSTEMS AND METHODS FOR DATA PROCESSING, STORAGE, AND RETRIEVAL FROM A SERVER
20210385530 · 2021-12-09 · ·

A method of authenticating data received from a user device by a service provider may include receiving user credentials from the user device via a secure communication channel; upon verifying the user credentials, providing to the user device via the secure channel a permission token, where the permission token includes at least a shared secret, where a data within the permission token is not observable to the user device and a shared secret data outside the data of the permission token, the shared secret data observable to the user device; and receiving a request from the user device via a non secure communication channel, where the request may include at least the permission token and a hash digest formed using at least a portion of the shared secret data.

SYSTEMS AND METHODS FOR DATA PROCESSING, STORAGE, AND RETRIEVAL FROM A SERVER
20210377599 · 2021-12-02 ·

A method for identifying a data segment includes receiving a first data segment associated with a first recording time; receiving a second data segment associated with a second recording time, comparing: the first recording time with the second recording time, a first time reference value with a second time reference value, and a first length enumeration for first data packets with a second length enumeration for second data packets; determining, based on the comparing, a match between the first data segment and the second data segment; and identifying the first data segment as the same as the second data segment based on the determining.

SECURE HARDWARE SIGNATURE AND RELATED METHODS AND APPLICATIONS

This disclosure provides techniques for recovering a root key from measurement of a circuit function. In some embodiments, a checkpointing feature is used to periodically mark measurements of this function and thereby track drift in the value of the root key over the life of a digital device; the checkpointing feature permits rollback of any measurement of the function in a manner that negates incremental drift and permits recovery of the root key for the life of a device (e.g., an IC circuit or product in which the IC is embedded). This disclosure also provides novel PUF designs and applications.

Method of hashing vector data based on multi-scale curvature for vector content authentication

The present invention relates to a method of hashing a perceptual vector model based on a multi-scale curvature. According to a first aspect, there is provided a method of hashing a perceptual vector model based on a multi-scale curvature including: generating a multi-dimensional feature coefficient matrix, and obtaining a multi-dimensional intermediate hash coefficient matrix; and obtaining a final binary hash matrix, and enabling the multi-dimensional binary hash matrix to be hierarchically authenticated. In addition, according to a second aspect, there is provided a method of hashing a perceptual vector model based on a multi-scale curvature including: generating a hash by using a hash function; and authenticating a vector model. In addition, an error detection probability for an object attack can be lower by about 2×10.sup.−5˜2.8×10.sup.−2, and a uniqueness probability is raised by about 0.014. In addition, an entropy can be raised by about 0.875˜2.149.

Electronic system and method for managing digital content relating to works of art
11093622 · 2021-08-17 · ·

The present invention concerns an electronic system and a method for managing digital content relating to works of art adapted for preventing the uncontrolled diffusion thereof. The electronic system (10) for managing digital content relating to works of art is characterised in that it comprises at least one importing unit (11) of files comprising digital content relating to works of art associated with at least one display unit (12) of digital content relating to works of art, wherein the importing unit (11) comprises encrypting/decrypting means (11a) of the files comprising digital content relating to works of art, the encrypting/decrypting means comprising means for generating a unique encryption key based on at least one identification code associated in a unique manner with the display unit (12,12′) and/or with at least one electronic part (12a,14a;12a′,14a′) comprised in the same (12,12′). The method (100) for managing digital content relating to works of art is characterised in that it comprises the steps consisting of importing (110) at least one file comprising digital content relating to works of art; acquiring (150) at least one identification code associated in a unique manner with a display unit (12,12′) and/or with at least one electronic part (12a,14a;12a′,14a′) comprised in the same (12,12′); generating (160) a unique encryption key based on the at least one identification code acquired; encrypting (170) the at least one imported file with the unique key generated; and storing (180) the encrypted file.

Secure probabilistic one-time program by quantum state distribution

Method and system for executing a one-time program comprising at least one instruction operating on at least one input value (a, b) and returning at least one output value (O), wherein each instruction of the one-time program is encoded onto a state of an elementary quantum system, comprising: encoding the at least one input value (a, b) onto a quantum gate according to a pre-defined input-encoding scheme; applying the quantum gate to the at least one elementary quantum system; making a measurement of a resulting state of the at least one elementary quantum system after the quantum gate; and determining the at least one output value from a result of the measurement.

Cloud authentication
11075899 · 2021-07-27 · ·

A cloud authentication system is disclosed. A request for an authentication setup for a first user of a first service provider is received. Additional information, such as authentication criteria, can further be received, such as from the first service provider. A set of stimuli to associate with a first user profile of the first user of the first service provider is stored.