H04L2209/603

KEY IDENTIFIER DERIVATION AND MANAGEMENT SYSTEMS AND METHODS

This disclosure relates to, among other things, systems and methods for deriving key identifiers and managing mapping between keys and key identifiers. Consistent with embodiments disclosed herein, the disclosed systems and methods may provide a mechanism that allows multiple parties to reconstruct unique identifiers given a set of known inputs that may be used to look up, identify, and/or otherwise access services and/or data objects. In some embodiments, this may allow for a service provider and a rights management service to independently derive key identification information based on information that both entities share (e.g., a content document such as a Content Protection Information Exchange Format document), thereby reducing requirements to maintain such mappings.

METHOD AND APPARATUS FOR MANAGING NON-FUNGIBLE TOKEN FOR DIGITAL CONTENT
20230045546 · 2023-02-09 ·

An electronic device and method are disclosed for managing a non-fungible token (NFT). The electronic device includes: a memory configured to store computer-executable instructions, and a processor. The processor implements the method, including: generating, a NFT for target content in response to receiving a request to register the target content from a first external electronic device, generating, for the NFT, a certification authority (CA) signature indicating that the NFT is generated by the server, and transmitting, via a communication circuitry, the NFT to the first external electronic device, wherein an ownership signature is added to the NFT, together with the CA signature, the ownership signature based on a private key of a user to which ownership of the NFT is assigned.

METHOD AND APPARATUS TO ENABLE A MARKET IN USED DIGITAL CONTENT
20180007018 · 2018-01-04 ·

Methods and apparatus to enable a distinction between “new” and “used” digital content and to enable a market in used digital content files between mobile phone terminals and an electronic store, securely, by means of a wireless telephony network and a server complex to handle contents right management, transaction reporting, inventory, content delivery, payment, and billing. A server receives a signal generated by a wireless user device that was sent over a wireless telephony network. The signal indicates an election for returning at least one previously purchased digital content item. The server deletes user rights for the at least one digital content item identified by the received signal and sends information to the user device that generated the signal. Access to the associated digital content item at the user device is removed according to the sent information.

Enhanced secure encryption and decryption system

Methods are described for a data creator to securely send a data payload to another device in a transient symmetric key technology (TSKT) system, and for the other device to securely receive the payload data. One method includes receiving a first seed and a formula from a command and control server. A second seed is generated, and the first seed and the second seed are combined using the formula to create a data seed. A first key is generated using the first seed, and the second seed is encrypted using the first key to form an encrypted second seed. A second key is generated using the data seed, and the data payload is encrypted using the second key to form an encrypted data payload. The encrypted data payload and the encrypted second seed are combined in a secure container, and subsequently all keys and seeds and the formula are destroyed.

DECENTRALIZED INFORMATION MANAGEMENT DATABASE SYSTEM
20230239348 · 2023-07-27 · ·

A request to present digital content at a client machine associated with a designated network identifier may be received. For each of a plurality of preference characteristics, a respective characteristic query message may be transmitted via a network to a respective plurality of identity nodes via a gossip communication protocol defining a peer-to-peer procedure for transmitting information among the plurality of identity nodes. For each of the plurality of preference characteristics, a respective preference identification response message that includes a respective preference value corresponding with the respective preference characteristic may be received. The designated network identifier may be stored in a trust ledger shared among the plurality of identity nodes. A digital content item may be selected based at least in part on the preference values.

CERTIFICATION OF FAN STATUS AND CORRESPONDING MARKETPLACE FOR DIGITAL COLLECTIBLES
20230026561 · 2023-01-26 · ·

The present invention is related to systems and methods for creating, validating, updating, and certifying fan status. The present invention is directed to creating a platform for fan communications and engagement. The present invention also includes a marketplace for transacting digital collectibles of interest to fans. Fan status in the present invention is a metric of social interaction, engagement, time spent, money spent, events attended, and/or other ways of measuring support and interest. Both quantitative and qualitative measures of fan status are compatible with the present invention. Preferably, the fan status is used for fans of sports teams.

SYSTEMS AND METHODS FOR CUSTOMIZED NON-FUNGIBLE TOKENS CORRESPONDING TO AN AMUSEMENT PARK ATTRACTION
20230022844 · 2023-01-26 ·

An attraction system of an amusement park includes a sensor configured to detect an activity of a user in an interactive attraction area. The attraction system also includes a controller including one or more processors. The one or more processors is configured to receive an indication of the activity from the sensor. The one or more processors is also configured to initiate capture of a piece of digital media via the sensor or a separate sensor in response to receiving the indication, and mint a non-fungible token (NFT) associated with the piece of digital media.

UTILIZING ENCRYPTED DIGITAL COMMUNICATIONS TO DYNAMICALLY SECURE DIGITAL RIGHTS LICENSING DURING AUTHENTICATION SYSTEM DISRUPTIONS

The present disclosure relates to systems, non-transitory computer-readable media, and methods for implementing asymmetric cryptography for digital rights licensing during system disruptions. In particular embodiments, the disclosed systems transmit, to a licensing device that issues digital licenses, a digital communication indicating a system outage of an identity server that verifies digital licenses of client devices. Based on the digital communication, the disclosed systems call a monitoring device using a licensing device identifier. In response to the call, one or more embodiments of the disclosed systems use the monitoring device to encrypt and transmit a verification token back to the licensing device. In certain implementations, the disclosed systems then verify the system outage by decrypting the encrypted verification token and validating a corresponding digital signature. Upon validation, the disclosed systems can trigger a failover mechanism for issuing a grace digital license to one or more client devices during the system outage.

ELECTRONIC DEVICE FOR MANAGING RIGHT BY USING DECENTRALIZED NETWORK, AND OPERATION METHOD THEREOF
20230231701 · 2023-07-20 ·

An electronic device is provided. The electronic device includes a communication module, a memory for storing instructions, and a processor, wherein the processor is configured to execute the instructions such that the electronic device identifies owner information of first content in response to a content ownership transfer request, transmits, to a blockchain network, transaction data for transferring the ownership of the first content, on the basis of the owner information of the first content, and transmits the first content to an external electronic device, wherein the transaction data may be regarding a transaction of transferring the ownership of a token related to the first content.

RE-ENCRYPTION-BASED DIGITAL RIGHTS MANAGEMENT
20230229743 · 2023-07-20 ·

Encrypting a document, including: generating first and second nonces; combining the first and second nonces to generate a secret key that is deterministically defined by the first and second nonces; encrypting the document using the secret key to produce an encrypted document; delivering the first nonce to a license manager; and delivering the second nonce to a rights manager.