Patent classifications
G06F2221/0737
STREAMING PIRACY DETECTION METHOD AND SYSTEM
In one embodiment, a command is received from a video provider at a media rendering device, the command being a command to embed a subscriber ID in at least one video frame in a video stream. A random key, k is also received from the video provider at the media rendering device. An injective transformation is invoked for k and the subscriber ID, the injective transformation generating a sequence of pairs of: near-transparent patterns and corresponding time periods. Logical blocks of the at least one video frame in the video stream are overlaid with one of the near-transparent patterns for its one of the corresponding time periods. Related apparatus, systems, and methods are also described.
IMAGE PROCESSING SYSTEM, INFORMATION PROCESSING METHOD, AND NON-TRANSITORY COMPUTER-READABLE MEDIUM
An image processing system includes circuitry. The circuitry accepts, from a user, an input of information to be registered. The circuitry registers the inputted information as registered information. The circuitry generates tracing data to be used for tracing the registered information. The circuitry outputs the tracing data. The circuitry associates access authorization to an access log for the registered information with the tracing data. The circuitry accepts an input of the tracing data. The circuitry acquires the access log that is associated with the inputted tracing data, and displays the acquired access log.
Input system
An input system is provided which is capable of mitigating certain inconveniences that may arise due to data processing performed by a host processor. The input system includes a first signal path, a second signal path, and a switch section. The first signal path is used for transmitting a signal from a sensor controller to a display controller through the host processor. The second signal path is used for transmitting a signal from the sensor controller to the display controller without passing the signal through the host processor. The switch section is configured to be able to switch between the first signal path and the second signal path.
CONTENT ANTI-PIRACY MANAGEMENT SYSTEM AND METHOD
A software and/or hardware facility that can be used by content owners to assert ownership of content so that copyright friendly websites and services can take action against copyright piracy effectively, efficiently and is scalable is disclosed. The facility makes available to all content owners watermarking/fingerprinting technology so an identifier (e.g., a unique code) can be embedded in the content (e.g., video/audio portion of each video content asset). The facility utilizes blockchain technology to add information related to each unique identifier in a database and allows an authorized user (e.g., the owner) to update the information through a blockchain transaction.
Systems and Methods for Associating Digital Media Files with External Commodities
A computer-implemented system for associating digital media files with external commodities wherein a digital media file such as digital art is provided. An external commodity that is unique and has a unique identifier is provided, such as a carbon credit. Ownership of the external commodity is transferred to a buyer when the digital media file is acquired by the buyer. The digital media file is associated with the external commodity by generating a digital signature using a private key from data that includes a hash of the digital media file and the unique commodity identifier. A new, unique digital file is created containing the digital signature as metadata.
System, device, and method of providing authenticity and rights verification mechanism for media content and for its derived versions
System, device, and method of providing authenticity and rights verification mechanism for media content and for its derived versions. A media authenticity server is configured to receive a content item, and to generate for it a record having a unique content identifier and indications of permitted modifications, and optionally also copyright information usage restrictions. The media authenticity server authorizes or blocks modifications requests regarding the content item. The media authenticity server tracks and logs the permitted modifications performed on the content item, and makes this log available for inspection to end-user devices via a web browser or via a content consumption application. Optionally, playback or consumption of a modified version of the content item is blocked, or is accompanied by a warning message, if the modified version is not associated with an authenticated log of permitted modifications.
SYSTEM AND METHOD FOR FACILITATING A VIRTUAL SCREENING
A system for facilitating a virtual screening is disclosed. The system identifies a user for participating in a virtual screening of media content. The system generates a unique link for the user to facilitate access to the media content. When the user interacts with the link, the system prompts the user to authenticate with the system and determines whether the authentication was successful. If authentication is successful, the link is associated with an identifier of the user and/or a user device. A request for a key for decrypting the media content and a request for a digitally signed file accessing the media content pursuant to parameters are made. If the digitally signed file is valid, the system applies a watermark to the media content to track the use of the media content and streams the media content to the user. Feedback on the media content is obtained from the user.
DISSEMINATION AND TRACKING OF DOCUMENTS WITH DOWNSTREAM CONTROL
Disclosed herein are system, method, and computer program product embodiments for managing the dissemination of documents using downstream control. A document linking system may facilitate the creation of a document link, graphical document link, and/or a corresponding document token. This link may be distributed downstream via messages, emails, or other applications. The document linking system may track document interactions, trace locations, and/or control individualized downstream access. The document linking system may provide instructions to a document delivery system to integrate a plugin or widget into its corresponding application (e.g., a messaging or email application). A user using the application may select a GUI object to access the document linking system and generate a document link. This link may then be embedded into a message or email and disseminated. The document linking system may also generate graphical document links that may be scanned with a camera to access the document.
VALIDATING PRIMARY SUBSETS OF RECEIVED SENSOR DATA USING COMPUTER CRYPTOGRAPHIC PROCESSING
A computer identifies capture device output that represents an aspect of a recorded event. The computer cryptographically processes the primary subsets of capture device output to produce a validatable master file which includes master file media data primary subset from the capture device output, master primary subset metadata of the master file media data primary subset, and master file blocktree data. The master file blocktree data includes a master file block history portion, a master file signature key portion, and a signed hash of the master file media data primary subset. The computer also modifies the master file media data primary subset to produce a reference file media data primary subset. reference files and distributable files. The computer verifies the authenticity of each of these files.
Encoding machine-learning models and determining ownership of machine-learning models
Methods, systems, and non-transitory computer readable storage media are disclosed for generating a machine-learning model and encoding ownership information in the machine-learning model. For example, the disclosed system can generate parameters of a machine-learning model utilizing digital content items modified by a filter. The disclosed system can then process digital content items modified by the filter to generate first outputs based on the digital content items being modified by the filter. The disclosed system can also process digital content items unmodified by the filter to generate second outputs based on the digital content items not being modified by the filter. The disclosed system can determine that the second outputs are degraded relative to the first outputs. Accordingly, the disclosed system can determine ownership of the machine-learning model based on detecting that information about the filter is embedded in parameters of the machine-learning model.