Patent classifications
H04L2209/605
IDENTIFYING COPYRIGHTED MATERIAL USING EMBEDDED COPYRIGHT INFORMATION
A method includes generating, by a computing device, a unique identifier (ID) based on copyright information associated with textual content, wherein the copyright information and the textual content are recorded on a blockchain of a blockchain network; identifying, by the computing device, one or more attributes associated with punctuation marks included in the textual content; and embedding, by the computing device, the unique ID in the textual content by changing the one or more attributes associated with the punctuation marks in a manner representative of the unique ID, wherein the embedding produces information-embedded text configured to enable retrieval of the copyright information from the blockchain based on the unique ID, and wherein visual difference between the textual content and the information-embedded text is not apparent to an unaided human eye.
APPARATUS AND METHOD FOR PROTECTING CONTENT IN VIRTUALIZED AND GRAPHICS ENVIRONMENTS
An apparatus and method for protecting content in a graphics processor. For example, one embodiment of an apparatus comprises: encode/decode circuitry to decode protected audio and/or video content to generate decoded audio and/or video content; a graphics cache of a graphics processing unit (GPU) to store the decoded audio and/or video content; first protection circuitry to set a protection attribute for each cache line containing the decoded audio and/or video data in the graphics cache; a cache coherency controller to generate a coherent read request to the graphics cache; second protection circuitry to read the protection attribute to determine whether the cache line identified in the read request is protected, wherein if it is protected, the second protection circuitry to refrain from including at least some of the data from the cache line in a response.
Performing authentication
Preference data is received. The received preference data is compared to stored preference data associated with a user with which the received preference data is associated. A determination is made whether to authorize an action based at least on the comparison. The preference data is received as a selection.
Method and system for providing secure codecs
A system and method is arranged to provide compression and decompression of digital content in a secure manner. The system is configured to authenticate a source of the digital content, and to further determine a consumer's entitlements and rights for access to the digital content. Based upon the determined entitlements and rights for access, the system is directed to decrypt, and decompress the digital content. In one embodiment, a component of the system is enabled to establish a trust relationship with at least one other component of the system, to minimize an opportunity for piracy of the digital content. In another embodiment, a secure clock is directed to provide protection against hackers that may employ an in-circuit emulator, or the like.
STORING AND VERIFICATION OF DERIVATIVE WORK DATA ON BLOCKCHAIN WITH ORIGINAL WORK DATA
Disclosed is technology for storing original work data on a derivative work data blockchain along with code for verifying that derivative work data is derivative of the original work data. The technology involves receiving derivative work data from a submitting entity along with proof data showing that the derivative work is derivative of the original work. If the derivative work data is verified as derivative, then the derivative work data is appended to the derivative work data blockchain.
Systems, methods and apparatuses To Perform Self-Authentication
Systems, methods and apparatuses to perform self-authentication are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, to perform authentication using a tag. The method can further include retrieving a unique identifier from the tag. A second unique identifier is used to determine lighting parameters to be used by the mobile device to illuminate the tag. The method can include, illuminating the tag using the lighting parameters determined and capturing an image generated from the tag in response to illumination of the tag using the lighting parameters. A mathematical representation derived from the image can then use used to generate a hashing function used in authentication.
Apparatus and method for protecting content in virtualized and graphics environments
An apparatus and method for protecting content in a graphics processor. For example, one embodiment of an apparatus comprises: encode/decode circuitry to decode protected audio and/or video content to generate decoded audio and/or video content; a graphics cache of a graphics processing unit (GPU) to store the decoded audio and/or video content; first protection circuitry to set a protection attribute for each cache line containing the decoded audio and/or video data in the graphics cache; a cache coherency controller to generate a coherent read request to the graphics cache; second protection circuitry to read the protection attribute to determine whether the cache line identified in the read request is protected, wherein if it is protected, the second protection circuitry to refrain from including at least some of the data from the cache line in a response.
DOWNLOADABLE SECURITY AND PROTECTION METHODS AND APPARATUS
Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional access (CA), digital rights management (DRM), and trusted domain (TD) security policies are delivered, configured and enforced with respect to consumer premises equipment (CPE) within a cable television network. A trusted domain is established within the user's premises within which content access, distribution, and reproduction can be controlled remotely by the network operator. The content may be distributed to secure or non-secure output domains consistent with the security policies enforced by secure CA, DRM, and TD clients running within the trusted domain. Legacy and retail CPE models are also supported. A network security architecture comprising an authentication proxy (AP), provisioning system (MPS), and conditional access system (CAS) is also disclosed, which can interface with a trusted authority (TA) for cryptographic element management and CPE/user device authentication.
Systems and methods for data processing, storage, and retrieval from a server
A method for identifying a data segment includes receiving a first data segment associated with a first recording time; receiving a second data segment associated with a second recording time, comparing: the first recording time with the second recording time, a first time reference value with a second time reference value, and a first length enumeration for first data packets with a second length enumeration for second data packets; determining, based on the comparing, a match between the first data segment and the second data segment; and identifying the first data segment as the same as the second data segment based on the determining.
CLOUD AUTHENTICATION
A cloud authentication system is disclosed. A request for an authentication setup for a first user of a first service provider is received. Additional information, such as authentication criteria, can further be received, such as from the first service provider. A set of stimuli to associate with a first user profile of the first user of the first service provider is stored.