Patent classifications
H04L2209/608
Securing Communication in a Playback Device with a Control Module Using a Key Contribution
Systems and methods for securing communications in a playback device using a key base and at least one key contribution in accordance with embodiments of the invention are disclosed. In one embodiment, a process includes generating a key base using a decryption key and at least one key contribution, where the decryption key can be recovered using the key base and the at least one key contribution, receiving the key base, receiving the at least one key contribution, sending the key base to a decryption module, sending the key contribution to a control module, performing a control feature on the piece of content using the control module, providing the key contribution to the decryption module when the control feature is performed, generating the decryption key using the key base and the at least one key contribution, and accessing at least a portion of the piece of content.
Method and system for the supply of data, transactions and electronic voting
A method and system for supply of data, including generating a first digital certificate referred (empowerment certificate) signed with a first signing entity's electronic signature. The empowerment certificate includes attributes of the described entity, information identifying the first signing entity, indication of data relating to the described entity, indication of a source of the data, and identification of a relying entity to which the data can be supplied. The relying entity forwards the empowerment certificate to a source supplying the data indicated in the empowerment certificate. The data may be supplied to the relying entity by a second digital certificate (custom certificate), signed with a second signing entity's electronic signature. Custom certificates may appear in custom certificate revocation lists. A system and method for transfer of ownership of electronic property from a first entity to a second entity, and a method and system for electronic voting are also provided.
WATERMARKING INPUT AND OUTPUT OF A WHITE-BOX IMPLEMENTATION
A method of mapping an input message to an output message by a keyed cryptographic encryption operation, wherein the keyed cryptographic encryption operation includes a first round, including: performing a substitution function on a first portion of the input message to produce an output, wherein the substitution function incorporates a portion of a cryptographic key; and performing a watermarking function on the output, wherein the watermarking function produces a watermark output when the first input portion has a specific predetermined value, wherein the watermark output uniquely identifies the keyed cryptographic encryption operation.
SYSTEM AND METHOD FOR AUTOMATIC DETECTION AND REPORTING OF GROUP WATERMARKING DATA
A method, apparatus, article of manufacture, and a memory structure for managing media content having group watermarking data is disclosed. The method comprises transmitting a request to receive the media content from a content playback device, receiving a response to the transmitted request, fetching, by the content playback device according to the response, the requested media content and a watermark schema, the watermark schema fetched from cloud-based storage, identifying, by the content playback device, the group watermarking data in the media content according to the fetched watermarking schema, determining, by the content playback device if the media content is authorized for provision according to the group watermarking data and the fetched watermarking schema, and providing the media content for playback according to the determined authorization.
Method for watermarking content
The disclosure relates to processing content with watermarks to generate watermarked versions. In some aspects, each version may be different. Groups of fragments may be combined to generate a unique stream by pulling fragments from two or more of the groups of fragments. Further, fragmenting may be performed before watermarking, and fragments may be pulled and watermarked upon request.
Systems, Methods and Devices for Trusted Transactions
The invention discloses a system for enhancing trust in transactions, most particularly in remote transactions between a plurality of transactional parties, for instance a seller and buyer(s) of goods and/or services over a public computer network such as the internet. Trust is disclosed to be a multivalent commodity, in that the trust that is to be enhanced relates to information about the subject matter of the transactions (e.g., the suitability of the goods and services sold), the bona fides of the supplier of the goods and services, the appropriateness of a pricing structure for a particular transaction or series of transactions, a quantum of additional transactional value that may be imparted to the transactional relationship, security of information exchange, etc.
CONTENT VALIDATION USING BLOCKCHAIN
A device may receive content data from a content provider, the content data including: data identifying content, and data for verifying that the content has not changed. The device may access a blockchain associated with the content data, the blockchain including validation information specifying instructions for validating the content. In addition, the device may perform, based on the validation information, validation of the content to determine a measure of confidence that the content is accurate and store results of the validation in the blockchain as a transaction. Based on the validation results, the device may perform an action.
Document certification and authentication system
This invention safeguards the integrity of a machine-printed paper document by entangling a characteristic signature derived from the document's paper grain structure with the identities of the printing device and the person or organization which issued the document. This protection is achieved using a certification phase performed by an augmented document printer and an authentication phase performed by an augmented document scanner. In the certification phase, the grain structure of a specific area of the original paper is imaged and processed to generate a unique signature for the paper. This signature is doubly encrypted using the private keys of the augmented printer and the certifier. These encryption steps entangle the signature of the paper with its source information in a way that thwarts counterfeiting attacks which either copy the document or falsely attribute its source to a specific printer and/or certifier.
Authentication method and system
The present invention provides a method and apparatus for the production and labeling of objects in a manner suitable for the prevention and detection of counterfeiting. Thus, the system incorporates a variety of features that make unauthorized reproduction difficult. In addition, the present invention provides a system and method for providing a dynamically reconfigurable watermark, and the use of the watermark to encode a stochastically variable property of the carrier medium for self-authentication purposes.
VIDEO IMAGE VERIFICATION SYSTEM UTILIZING INTEGRATED WIRELESS ROUTER AND WIRE-BASED COMMUNICATIONS
A system and methods of digital image capture, video surveillance and, in particular, to a method for verification of integrity and validity of live or recorded images, video(s) and surveillance images and video(s), both real-time and delayed. The method, in accordance with a principle embodiment, employs the use of additional light (photonic water marks) added to images of objects and scenes The photonic water marks reflect or refract, scatter or entangle with the real objects and scenes to then be digitized with the object or scene image.