G11B20/00862

Secure Content Distribution System
20180218467 · 2018-08-02 ·

A user selection of one or more of a plurality of content is received. The selected content is encrypted by a first encryption key that is remote and unknown to the distribution server. Payment information associated with the user selection is also received and verified. The selected content from is retrieved from a remote database. The first encryption key corresponding to the selected content to decrypt the encrypted content corresponding to the user selection is obtained. Decryption is performed by a hardware-based engine of the distribution server that is isolated from a host processor of the distribution server. The content corresponding to the user selection is encrypted according to a second encryption key that is known to the distribution server.

ENHANCED CONTENT TRACKING SYSTEM AND METHOD

The invention, as shown by the system in FIG. 2, relates to a client-side content tracking system of media files, e.g. digital music files. Audio trackingor indeed multimedia trackingis shifted to a client-side perspective, with the client tasked with establishing use of a selected source audio track by trackingand then reporting uplink to the serverat least one of: entry and exit points associated with playing of at least one of said musical sections in the identified source audio track, and how the identified source audio track was used, performed or manipulated at the client device. Server functionality is designed, having regard to the reported tracking data and its link to a unique identifier to permit the media file (e.g. source audio track) to be selected and/or identified, to store or relaypossibly in the context of a subscription service and billing regime for content usetracking data related to use of at least a portion of the source audio track at or by the client device. In the context of audio, reporting of use at a client device can, in turn, cause streaming of related multi-media content from a third-party database to the client device. For music, reporting of entry and end points into and out of sections of complete audio tracks can coincide with musically seamless audio transitions between sections.

Secure content distribution system

A user selection of one or more of a plurality of content is received. The selected content is encrypted by a first encryption key that is remote and unknown to the distribution server. Payment information associated with the user selection is also received and verified. The selected content from is retrieved from a remote database. The first encryption key corresponding to the selected content to decrypt the encrypted content corresponding to the user selection is obtained. Decryption is performed by a hardware-based engine of the distribution server that is isolated from a host processor of the distribution server. The content corresponding to the user selection is encrypted according to a second encryption key that is known to the distribution server.

Physical Confirmation for Network-Provided Content

A computer-implemented method includes receiving, from a remote communication device and at a server system, information that indicates a unique identifier for a physical item that corresponds to media content, the identifier differing from identifiers for other physical items that correspond to the same content; associating the received information with an account of a first user of a hosted internet service; and subsequently providing, by the hosted internet service, content that matches the content that corresponds to the physical item, based on a determination that the received information authorizes the first user to obtain the content provided by the hosted internet service.

System and method for providing a secure content with revocable access
09911457 · 2018-03-06 · ·

There is provided a method for use by a media player to provide access to a media content. The method comprises receiving a request from a user for playing the media content, prompting a user for an authorization code, receiving the authorization code from the user, transmitting the authorization code to an authentication server over a network, receiving a valid authentication message from the authentication server over the network if the authorization code is confirmed to be valid, transmitting the valid authentication message to a content server over the network, retrieving the media content from the content server over the network, wherein the media content incorporates an identification information associating the media content with the user.

System and method for rules-based control of custody of electronic signature transactions

Techniques for electronic signature processes are described. Some embodiments provide an electronic signature service (ESS) configured to facilitate the creation, storage, and management of electronic signature documents. In one embodiment, an electronic signature document may be associated with custody transfer rules that facilitate transfers of custody of an electronic signature document from one user or party to another. A custody transfer may results in a transfer of rights or capabilities to operate upon (e.g., modify, view, send, delete) an electronic signature document and/or its associated data. A custody transfer rule may be trigged by the occurrence of a particular event, such as the receipt of an electronic signature.

Information processing apparatus, information processing method and program

An information processing apparatus includes a data processing section for reproducing contents stored in a medium having a general purpose area in which encrypted contents and corresponding utilization controlling information are stored and a protected area including a plurality of blocks having access limitation set thereto and including a block having an encryption key for decrypting the encrypted contents stored therein. The data processing section acquires utilization controlling information corresponding to a content from the general purpose area, decides, based on the utilization controlling information, whether validity period information indicative of a content utilization permission period is to be acquired from the utilization controlling information or the encryption key storage block, acquires the validity period information based on a result of the decision and then compares the acquired validity period information and current date information to decide permission or inhibition of content reproduction.

DATA STORAGE MANAGEMENT AND SCHEDULING SYSTEM
20170111695 · 2017-04-20 ·

A data storage management and scheduling system schedules the recording, storing, and deleting of television and Web page program material on a client system storage medium. A schedule of time versus available storage space is generated that is optimal for the viewer's scheduled program recordings. The programs include television broadcast programs and Universal Resource Locators (URLs). A program is recorded if at all times between when the recording would be initiated and when it expires, sufficient space is available to hold it. All scheduling conflicts are resolved as early as possible.

Method for generating a secure copy of media data

A system for transferring verified media data. The system comprising: an item of content storing the media data, and having an associated serial number; a computing device including a first storage device and a network interface; a secure copying application program; a secure copy of the media data generated by the secure copying application program and stored on the first storage device; a verification server including a serial number database and having a network connection to the computing device through the network interface, wherein the secure copying application program generates the secure copy after verifying the serial number is valid and active by communicating with the verification server; and a portable copy of the media data, including license information, generated from the secure copy by the secure copying application program.

Data storage management and scheduling system
09538243 · 2017-01-03 · ·

A data storage management and scheduling system schedules the recording, storing, and deleting of television and Web page program material on a client system storage medium. A schedule of time versus available storage space is generated that is optimal for the viewer's scheduled program recordings. The programs include television broadcast programs and Universal Resource Locators (URLs). A program is recorded if at all times between when the recording would be initiated and when it expires, sufficient space is available to hold it. All scheduling conflicts are resolved as early as possible.