Patent classifications
G06F2221/0711
UTILIZING ENCRYPTED DIGITAL COMMUNICATIONS TO DYNAMICALLY SECURE DIGITAL RIGHTS LICENSING DURING AUTHENTICATION SYSTEM DISRUPTIONS
The present disclosure relates to systems, non-transitory computer-readable media, and methods for implementing asymmetric cryptography for digital rights licensing during system disruptions. In particular embodiments, the disclosed systems transmit, to a licensing device that issues digital licenses, a digital communication indicating a system outage of an identity server that verifies digital licenses of client devices. Based on the digital communication, the disclosed systems call a monitoring device using a licensing device identifier. In response to the call, one or more embodiments of the disclosed systems use the monitoring device to encrypt and transmit a verification token back to the licensing device. In certain implementations, the disclosed systems then verify the system outage by decrypting the encrypted verification token and validating a corresponding digital signature. Upon validation, the disclosed systems can trigger a failover mechanism for issuing a grace digital license to one or more client devices during the system outage.
Systems and methods for facilitating secure streaming of electronic gaming content
A game identifier of an encrypted streaming electronic game to be streamed to a playback device may be received. The game identifier may comprise a title of the encrypted streaming electronic game. An electronic ticket for access by the playback device to a secured portion of the encrypted streaming electronic game may be gathered. The electronic ticket may specify a first gameplay state. The electronic ticket may be used to access the secured portion of the encrypted streaming electronic game at the first gameplay state. One or more gameplay actions to transform the encrypted streaming electronic game to a second gameplay state may be received. The second gameplay state may be provided to a state server, where the state server configured to instruct a license server to modify the electronic ticket to specify the second gameplay state for the encrypted streaming electronic game.
Secure count in cloud computing networks
Inducements are provided to customers to regularly connect back to a service provider and report usage that is expressed using a count of requests from a local computing device for cloud-based operations such as packet routing, container instantiation, virtual machine (VM) utilization, calls to a service or application, and the like. The count information is reported within a secure context, such as a trusted execution environment (TEE), using public-private key pair cryptography by which key derivation is dependent on some form of counting. For example, a customer computing device that is subject to a usage license encrypts an operation count and reports it to the service provider.
TOKENIZATION OF DIGITAL MEDIA FILES AND ASSOCIATED DERIVATIVES
Managing digital media files in a computer network by storing a set of derivative files and a logical association of the derivative files with the first digital media file; generating a first cryptographic token; associating the first cryptographic token with the first digital media file; associating the first cryptographic token with a first wallet address corresponding to a first wallet; generating a serialized set of non-fungible tokens and associating individual ones of the non-fungible tokens with individual ones of the derivative files; and associating individual ones of the non-fungible tokens with individual wallet addresses of a second set of wallets; and limiting the initial transferability of the first cryptographic token from the first wallet to one of the second set of wallets.