G06F21/1062

Method for managing transmission of a content protected against copying to a rendering device
20220382835 · 2022-12-01 ·

A method for managing transmission of a multimedia content protected against copying, referred to as the protected content, from a reader terminal to a rendering device via a communication link with a view to a rendition on the rendering device. The reader terminal includes a first protective module. The method includes verifying presence on the rendering device of a second protective module compatible with the first protective module, and, in the negative case, transmitting, via the communication link, a request to render an unprotected content instead of the protected content.

EFFICIENT SUPPORT FOR AUTOMATIC GENERATION OF A PARTIALLY-EDITABLE DATASET COPY

The present disclosure involves systems, software, and computer implemented methods for automatically generating a partially-editable dataset copy. One example method includes receiving an edit request from a user to edit a data set. A filter for the data set is determined, based on a context of the edit request. The filter is used to generate a partially-editable copy of the data set that includes the editable portion of the data set. An exposed view of the data set is generated that exposes the partially-editable copy of the data set and a non-editable portion of the data set. The exposed view of the data set is provided to the user and a change to a data item in the editable portion of the data set is received. The data item in the partially-editable copy of the data set is updated based on the change.

COMPILER ADD-ON FOR CODE, DATA AND EXECUTION FLOWS ATTESTATION IN A SECURE COMPUTING SYSTEM
20230090165 · 2023-03-23 · ·

A method and system for execution of a compiler add-on for securing code are provided. The method includes receiving from a compiler a code in machine language; generating at least one validator code for protection of the received code; generating at least one execution proof for protection of at least one execution flow of the received code; embedding the at least validator code and at least one execution proof into the received code to create a protected code; and storing the protected code in a storage.

SYSTEMS AND METHODS FOR ANONYMIZING MEDIA FILES FOR TESTING
20230075976 · 2023-03-09 ·

A computer-implemented method for anonymizing media files for testing may include (i) identifying a computing process that processes media files, (ii) identifying a media file with at least one characteristic expected to produce output usable for improving the computing process when used as input data to perform a test of the computing process, (iii) anonymizing the media file by replacing content in the media file with predetermined filler content while maintaining the at least one characteristic in a valid state for producing the output usable for improving the computing process, and (iv) initiating the test of the computing process using the anonymized media file as the input data such that the output of the test can be used to improve the computing process. Various other methods, systems, and computer-readable media are also disclosed.

Transfer via transaction app

Systems and methods may generally include sending an executable application, which when executed, automatically causes a monetary transfer. An example method may include performing, at a first user device, a handshake with a second user device, receiving, during the handshake, an operating capability of the second user device, and configuring, based on the operating capability of the second user device, an executable application, which when executed, automatically causes a monetary transfer to occur. The configured executable application may be sent to the second user device for execution.

Systems and methods for authenticating digital media content

The disclosed computer-implemented method for authenticating digital media content may include (i) receiving digital media content that has been captured by a capturing device and digitally signed through a cryptoprocessor embedded within the capturing device to provide an assurance of authenticity regarding how the capturing device captured the digital media content, and (ii) encoding an identifier of the received digital media content and a digital signature to an encrypted distributed ledger, the digital signature including at least one of a digital signature of the digital media content by the capturing device or a digital signature of the digital media content by an entity encoding the received digital media content such that the encoding becomes available for subsequent verification through the encrypted distributed ledger. Various other methods, systems, and computer-readable media are also disclosed.

Systems and methods for facilitating tokenization of modifiable game assets on a distributed blockchain

Systems and methods for facilitating tokenization of modifiable game assets on a distributed blockchain may: generate a smart contract configured to contain license keys associated with the modifiable game assets and to effectuate transfers of the license keys to purchasers; post the smart contract to a distributed blockchain; receive sales information describing a first game asset that is usable within the online gaming platform and intended to be offered for sale to gaming users of the online gaming platform; obtain verification information that indicates the first game asset has passed or failed a verification; tokenize the first game asset into a tokenized game asset on the distributed blockchain, responsive to the verification passing successfully; and offer the tokenized game asset for sale.

METHOD, APPARATUS AND SYSTEM FOR PROTECTING CONTENT BASED ON OPEN LICENCE
20170357785 · 2017-12-14 · ·

A method, apparatus and system for protecting content based on an open license is disclosed. The method for protecting content based on an open license performed by a content protecting device may include receiving content from a user terminal; selecting an open license corresponding to the received content; analyzing a plurality of license authority items corresponding to the selected open license; storing license data including a value of the plurality of license authority items which is analyzed in a database with being linked with a unique identifier of the content; generating a Digital Rights Management (DRM) authority matched to the open license based on the value of the plurality of license authority items which is analyzed; and requesting to encrypt the content based on the generated DRM authority to a DRM server. Accordingly, the copyright of the content can be easily protected.

System and method for a renewable secure boot
09842212 · 2017-12-12 · ·

Embodiments of systems and methods disclosed herein include renewable secure boot systems for renewing and booting a target device. Systems and methods include techniques by which a secure boot may be implemented in a renewable fashion on a reprogrammable device. More specifically, in certain embodiments, systems and methods are described where target devices securely receive an encrypted boot image and one or more authorization codes from a third party. The one or more authorization codes are derivatives of a target device hardware secret, allowing the authorization codes to be changed at will, thus increasing flexibility and security of the system.

Systems and methods for content security
11681781 · 2023-06-20 · ·

Systems and methods are for content security may comprise transmitting a request for authorization to access secured content. A content key for the secured content may be received and stored to a restricted region of a memory. A device security module may have access to the restricted region and may decrypt, based on satisfaction of a use condition and using the content key, the secured content. An encryption key associated with a secure media system authorized to access the secured content may be received. The device security module may encrypt, using the encryption key, the secured content and route the secured content to the secure media system.