G06Q2220/10

SCREEN SHARE FEATURE FOR ONLINE MEETINGS
20230052325 · 2023-02-16 ·

In one aspect, an example methodology implementing the disclosed techniques includes, by a computing device, storing one or more encrypted files that are to be presented during an online meeting and receiving an acceptance to an invitation of the online meeting by at least one invitee of the online meeting. The method also includes, by the computing device, responsive to the acceptance of the online meeting invitation by the at least one invitee, sending the one or more encrypted files that are to be presented during the online meeting, wherein the invitee is prevented from accessing contents of the one or more encrypted files prior to a start of the online meeting.

Method and apparatus for dynamic, real-time ad insertion based on meta-data within a hardware based root of trust

A client computing system inserts selected advertising into digital content. Ads may be inserted into content based on a dynamic advertising matching process that is securely implemented within a hardware-based root of trust. User profiles used in ad matching may be privacy protected and maintained with confidentiality protection in the client computing system and/or a service provider server, respectively. When a client computing system makes a request to the service provider server for content with specified ad slots, the request may be made with the client's EPID signature, which is inherently privacy protected. The hardware-based root of trust protects insertion of selected ads into the linear rendering flow of the content.

SYSTEM AND METHOD FOR MANAGING TRANSACTIONS IN DYNAMIC DIGITAL DOCUMENTS
20230045774 · 2023-02-09 · ·

A system software and method which relates to the field of computing technology or business process models or computer systems or distributed computer systems or computer networks relating to general purpose devices that can be programmed to carry out a set of data table or hash table updates, validations or modifications supporting, enabling or executing public and private services, financial transactions and commercial applications. More specifically, the present invention is directed to distributed and decentralized computing in which said distributed network is supported and encrypted by cryptographic technology, hash functions and distributed public or private keys or other related technology. System and methods for managing dynamic electronic documents on a private distributed ledger comprise establishing a dynamic electronic document comprising a first state object, wherein the state object references a prior approved first transaction; proposing a second transaction comprising as an input the first state object and as an output a transaction command to alter the state object as well as what parameters are required to validate the second transaction; validating the proposed second transaction; and updating the state object on a private distributed ledger to reference the second transaction.

SYSTEM AND METHOD FOR SECURE PEER-TO-PEER TRANSMISSION OF CONTENT IN DISTRIBUTED LEDGER NEWORKS
20230042916 · 2023-02-09 ·

Different aspects of the invention implement an enhanced DLT system, and corresponding method, that allows the peer-to-peer transmission of huge amounts of data packets of content between users, and to be stored in the DLT network, in a secure, trustworthy and efficient manner. By allowing the interface between any type of existing layer 1 DLT network, it does not require the complex, slow, costly and highly risk process involved in the generation of a new layer 1 DLT network. It opens up the range of possible applications of the DLT network to applications in Big Data, IOT, Web 3, MMOG, or any other environment that needs the trust provided by the immutability of data stored in the DLT network.

MULTI-MODAL ROUTING ENGINE AND PROCESSING ARCHITECTURE FOR CURRENCY ORCHESTRATION OF TRANSACTIONS

An integration system for a system of platforms includes an orchestration platform, a blockchain transactional platform, a digital transactional platform, a merchant system, a user trust platform, and one or more user devices connected to each other and a distributed ledger and/or a secondary mesh network via one or more networks. The blockchain transactional platform performs accesses and performs actions on the distributed ledger and/or the secondary mesh network. The digital transactional platform maintains transactional data indicative of an amount of first-domain value correlated to a user. The blockchain transactional platform maintains blockchain transactional data indicative of an amount of second-domain value correlated to the user. The orchestration platform manages data exchange, synthesis, fusion, analysis, and transformation between the components of the system, including for the orchestration of transactions.

Instant Messaging Private Tags

Systems for instant messaging private tags preferably comprise a parser for parsing an instant message for sensitive data and an encryption engine for encrypting the sensitive data. A modified uuencoder is also preferably included for converting the encrypted sensitive data into a data stream that complies with an XML format. Other systems and methods are also provided.

Digital rights management systems and methods for audience measurement
11520864 · 2022-12-06 · ·

Digital rights management systems and methods for audience measurement are disclosed. Example methods disclosed herein include enabling a media handler implemented by a media device to begin presenting first media based on a first digital license associated with the first media. Such example methods also include retrieving a second digital license different from the first digital license from a license server separate from the media device. Such example methods further include causing the media handler to perform a first media monitoring operation based on the second digital license, the first media monitoring operation being deactivated by default.

SECURE PORTABLE MEDICAL INFORMATION ACCESS SYSTEMS AND METHODS RELATED THERETO
20230230665 · 2023-07-20 ·

Using a secure portable reference to medical information, stored on a portable storage medium, various embodiments allow a patient to give to their doctor an easy-to-use access key that will enable access to desired medical information stored on a computer network. The secure portable reference provides greater transportability of medical records to a patient or medical data repository including a doctor's office, clinic, or hospital, while maintaining data security to satisfy medical data privacy regulations and expectations. Some described embodiments use encrypted information inside the secure portable reference to hide, for example, who is allowed access to the stored medical information, and the network location of the stored information. Some embodiments use a secret PIN to authenticate the user attempting access to the referenced medical information. The secure portable reference contains information on network resources used to enable download access to medical information, including medical records and medical images.

Crypto Wallet Configuration Data Retrieval

In various embodiments, a device can be configured to securely implement a wallet capable of displaying data based on a configuration file retrieved from a cloud storage using a seed. In an embodiment, the device can include a display; a network interface; memory; and a processor. The processor can be configured to: obtain a seed value; generate a path value based on the seed value; access a cloud storage location based on the path value; and receive a configuration file from the cloud storage location. The configuration file includes a configuration value. The processor further configured to display a user interface configuration based on the configuration value.

Systems and methods for metered automation controller functionality

Metering automation controller functionality includes accessing a project code that defines one or more operations of an industrial automation controller, analyzing the project code to identify one or more capabilities of the industrial automation controller that are utilized by the one or more operations, generating a file indicative of the one or more capabilities of the industrial automation controller, transmitting the file to a server that generates a certificate for authorizing the industrial automation controller to execute the project code, receiving the certificate from the server that identifies the file and an authorization for the industrial automation controller to execute the project code to perform the one or more operations, and transmitting the project code, the file, and the certificate to the industrial automation controller for execution.