Patent classifications
G06F21/1014
MULTIMEDIA CONTENT SECURE ACCESS
A method is disclosed for providing secure access to multimedia content to a user of a content service at a first user device configured to enable the user to consume the multimedia content. The method comprises: providing, from a second user device, a user identifier to a service provider of the content service, the second user device being provided with a subscriber identity module enabling the second user device to connect to a cellular communication network, the user identifier comprising an identifier of the subscriber identity module; at the second user device, receiving an access key from the service provider, through the cellular communication network, the access key being associated with the user identifier; providing the access key from the second user device to the first user device through a short-range connection, and at the first user device, using the access key to access the multimedia content.
Licensing in the cloud
At least one machine readable medium comprising a plurality of instructions that in response to being executed by a system cause the system to send a unique identifier to a license server, establish a secure channel based on the unique identifier, request a license for activating an appliance from a license server over the secure channel, receive license data from the license server over the secure channel; determine whether the license is valid, and activate the appliance in response to a determination that the license data is valid.
LICENSING IN THE CLOUD
At least one machine readable medium comprising a plurality of instructions that in response to being executed by a system cause the system to send a unique identifier to a license server, establish a secure channel based on the unique identifier, request a license for activating an appliance from a license server over the secure channel, receive license data from the license server over the secure channel; determine whether the license is valid, and activate the appliance in response to a determination that the license data is valid.
SYSTEMS AND METHODS OF FACILITATING DIGITAL RATINGS AND SECURED SALES OF DIGITAL WORKS OF ART
Blockchain systems and methods for digital ratings and secured sales of digital works of art are provided. The systems include a platform for posting art, an interface, an auction module, and an artificial intelligence unit. The platform enables artists to post digital works of art on their personal pages. The interface enables users to become followers of the digital works of art and post likes for the digital works of art, and the platform assigns a monetary value to the like. The auction module enables users to bid on the digital works of art. Each digital work of art is assigned a purchase price equal to the monetary value assigned to the like multiplied by the number of likes for the first digital work of art. When a user offers the purchase price the auction module transfers payment to the first artist and the first work of art to the user. All payments may be stored in a blockchain. An artificial intelligence unit provides robust digital security and learns features of the digital works of art to prevent unauthorized copying.
USER INTERFACE-BASED RESTRICTION ON CONTENT ACCESS
The subject disclosure provides systems and methods for providing access to media content from a server based on a user interface of a client device through which the access is requested. A user may access certain media content, such as a song, album, playlist, a radio station, etc., only if a request for that content is initiated via a specific user interface, and when the user is a subscriber to a reduced subscription tier to a service of the server. To restrict the access in this way, an interface-specific token is generated at a server for each media content. The interface-specific token is received by a user device and is used for further access to the media content from the server.
Signatures of updates exchanged in a binary data synchronization protocol
In a distributed system, data is shared between three or more electronic devices. The first device generates and signs an object that includes the data. A second device receives the signed object and determines whether the signed object is valid. If valid, the second device will generate a validated signed object and send it to a third device. The third device will validate the object by determining whether the object includes valid signatures of both the first and second devices.
Secure Content Distribution and Trusted Recording of Content Consumption
Techniques for a trusted system for secure content distribution and trusted recording of content consumption are described. In some embodiments, the trusted system transcodes and transcrypts a media content item using a key obtained from a content provider and one or more keys based on an entitlement from a service provider to generate an encrypted media content item. The trusted system further receives a request to provide the media content item to a client device. The trusted system also obtains a signed audit token recording the request upon an authorization by the service provider based on the entitlement and a confirmation by the content provider, where the signed audit token is signed by the content provider and the service provider. The trusted system additionally provides the one or more keys for decrypting the encrypted media content item and reports the signed audit token.
System and method for distributing media via portable storage
A system and method for securely delivering and updating media using portable storage. In one embodiment, field-modifiable storage presents itself to the host system as a read-only standardized media player, where the user adds, replaces, or updates media onto that storage. A further embodiment establishes encrypted streaming from field-modifiable storage directly into the graphics processor of the viewing host, bypassing the general-purpose computing infrastructure.
Music-content using apparatus capable of managing copying of music content, and program therefor
When new music content is generated on the basis of replication of original music content, additional information including information indicating that the generated new music content is based on replication and replication source information identifying a replicated-from source of the replicated content is generated and added to the new music content based on the replication. When the new (i.e., replicated) music content is to be used, a search is made for original music content on the basis of information identifying a replicated-from source and use of the new (replicated) music content is permitted only when the c original music content has been successfully found. Such arrangements reliably allow the replicated content to be used by a given person only when the person possesses the original music content.
Secure storage of and access to files through a web application
The invention relates to a method for cryptographically secure storing a file (101) using a web application executed by a web browser (106) on a user computer system (104, 162, 168) of a user (102, 160). The method comprises: encrypting the file (101) on the user computer system (104, 162, 168) by the web application, providing a distribution plan by the web application, fragmenting the encrypted file (101) on the user computer system (104, 162, 168) by the web application into a plurality of file fragments (F1-F4) according to the distribution plan, sending the resulting file fragments (F1-F4) by the web application over the network (178) to the storage services identified by the distribution plan (SD1-SD6).