Abstract:
In various implementations, a digital media recording is received from a user for conversion into an authenticated instrument of an oral agreement. The digital media recording is embedded into an electronic agreement document that is configured to represent an instrument of the oral contract terms between two or more contracting parties. The digital media recording forms a content portion of the electronic agreement document, which is reviewed by each of the contracting parties. A playback status associated with the content portion is monitored to determine that each of the contracting parties have substantially reviewed the terms of the agreement. Upon determining that the content portion has been substantially reviewed by all parties, the contracting parties are requested to electronically sign the electronic agreement document.
Abstract:
Improved document processing workflows provide a secure electronic signature framework by reducing attack vectors that could be used to gain unauthorized access to digital assets. In one embodiment an electronically signed document is removed from an electronic signature server after signed copies of the document are distributed to all signatories. The electronic signature server optionally retains an encrypted copy of the signed document, but does not retain the decryption password. This limits the amount of data retained by the electronic signature server, making it a less attractive target for hackers. However, the electronic signature server still maintains audit data that can be used to identify a signed document and validate an electronic signature. For example, a hash of the document (or other document metadata) can be used to validate the authenticity of an electronically signed document based on a logical association between an electronic signature and the signed document.
Abstract:
Improved workflows allow delegation of authority to electronically sign a document according to a delegation rule. The delegation rule specifies a document criterion and a delegate who is authorized to sign documents meeting the criterion. The criterion may be based on subject matter, document originator, or receipt time. Delegation rules can also be invoked in response to specified conditions or events, such as receipt of an automated out-of-office notification, or failure to receive any response to a signature request within a certain time. When an electronic signature system processes a document meeting the specified criterion, or detects one of the specified conditions or events, the document is sent to the delegate for signature instead of the originally intended signatory. The workflow initiator and delegator are optionally notified of such delegation before the document is sent to the delegate, thus giving him/her a degree of control over the delegation.
Abstract:
A computer implemented method and apparatus for acquiring sentiment analysis information based on user reactions to displayable content. The method comprises receiving reaction data of at least one individual user viewing portions of displayable content, wherein the reaction data of each user includes indications representative of at least one of a time-varying emotional state of the user and a time-varying level of interest of the user captured during viewing of the displayable content; and performing sentiment analysis on the reaction data by at least one of: categorizing portions of the displayable content based on one of the reaction of one user or aggregated reactions of a plurality of users, and identifying at least one portion of the displayable content having one of a more favorable and a less favorable reaction by the at least one user, by comparison to one of a baseline and reactions to other portions of the displayable content.
Abstract:
A computer implemented method and apparatus for avoiding license storming during an unplanned regional blackout. The method comprises generating a leaf license for each geographic region of a plurality of geographic regions in a broadcast area, wherein each leaf license includes a first content encryption key for decrypting media content associated with the leaf license, and where each leaf license is bound to a root license for each geographic region in the plurality of geographic regions; and generating, in response to a blackout event, a new leaf license for each geographic region of the plurality of geographic regions that are located outside of a blackout area, wherein each new leaf license includes a second content encryption key different from the first content encryption key for decrypting protected media content, and wherein each new leaf license remains bound to the root license for each geographic region in the plurality of geographic regions.
Abstract:
Improved workflows allow delegation of authority to electronically sign a document according to a delegation rule. The delegation rule specifies a document criterion and a delegate who is authorized to sign documents meeting the criterion. The criterion may be based on subject matter, document originator, or receipt time. Delegation rules can also be invoked in response to specified conditions or events, such as receipt of an automated out-of-office notification, or failure to receive any response to a signature request within a certain time. When an electronic signature system processes a document meeting the specified criterion, or detects one of the specified conditions or events, the document is sent to the delegate for signature instead of the originally intended signatory. The workflow initiator and delegator are optionally notified of such delegation before the document is sent to the delegate, thus giving him/her a degree of control over the delegation.
Abstract:
A document originator establishes rules for authenticating an electronic signature. Such rules may require that any user who wishes to assent to the document terms provide biometric data in the form of an ocular image. In one implementation, such rules, as well as the document itself, are provided to a document recipient. If the document recipient assents to the document, an electronic signature is acquired from the document recipient, along with the required ocular image. The image is acquired using an infrared-enabled camera in the case of an iris image, or a retinal scanner in the case of a retina image. The acquired image can be authenticated by comparison to a trusted reference image, for example which may have been obtained from the document recipient during an initial registration process. If the comparison matches with a sufficiently high degree of confidence, then the electronic signature is considered authentic.