摘要:
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the “electronic highway.”
摘要:
The present invention provides systems and methods for secure transaction management and electronic rights protection. Electronic appliances such as computers equipped in accordance with the present invention help to ensure that information is accessed and used only in authorized ways, and maintain the integrity, availability, and/or confidentiality of the information. Such electronic appliances provide a distributed virtual distribution environment (VDE) that may enforce a secure chain of handling and control, for example, to control and/or meter or otherwise monitor use of electronically stored or disseminated information. Such a virtual distribution environment may be used to protect rights of various participants in electronic commerce and other electronic or electronic-facilitated transactions. Distributed and other operating systems, environments and architectures, such as, for example, those using tamper-resistant hardware-based processors, may establish security at each node. These techniques may be used to support an all-electronic information distribution, for example, utilizing the "electronic highway."
摘要:
A system and method for operating a cryptocurrency, including generating, by first computing devices, raw data sets representative of activities performed by respective users while each of the users is using the Internet. A second computing device may determine an aggregate data value of at least a portion of an aggregate of the raw data sets. The at least a portion of the aggregate of the raw data sets being received from the users who contribute that portion of the raw data sets, the contributing users being data contributors. A basis value of a cryptocurrency as a function of the aggregate data value may be established. Total quantity of the cryptocurrency in circulation may be regulated as a function of the aggregate data value.
摘要:
In summary, the present invention, in some embodiments thereof, relates to digital and physical assets security and, more specifically, but not exclusively, to systems and methods for registration, validation, and distribution of assets digitally. The invention describes a system and method to establish an asset management system that registers, hosts, and validates submitted digital assets or digital representations of physical assets using cryptographically secured assets, such as digital non-fungible tokens (NFTs).
摘要:
In an aspect, an apparatus for managing smart contracts is presented. The apparatus includes at least a processor and a memory communicatively connected to the at least a processor. The memory contains instructions configured the at least a processor to generate a smart contract. The smart contract comprises at least a non-fungible token (NFT) having a unique token identification and a unique digital address. The at least a processor is configured to bridge the smart contract to a virtual machine. The at least a processor is configured to deploy the smart contract, wherein upon deployment a replica of the at least a NFT is generated. The replica has the same unique token identification as the at least a non-fungible token.
摘要:
A method and system for generating an augmented reality image includes a kiosk and mobile computing device executing an application for interacting with the kiosk. The kiosk switches from a first set of images to a second set of image when the mobile computing device is proximate to the kiosk. A user selects one of the second set of images and the mobile computing device receives an augmented reality image according to the user selection. The mobile computing device combines the augmented reality image with a live image from a camera of the mobile computing device.
摘要:
A user selection of one or more of a plurality of content is received. The selected content is encrypted by a first encryption key that is remote and unknown to the distribution server. Payment information associated with the user selection is also received and verified. The selected content from is retrieved from a remote database. The first encryption key corresponding to the selected content to decrypt the encrypted content corresponding to the user selection is obtained. Decryption is performed by a hardware-based engine of the distribution server that is isolated from a host processor of the distribution server. The content corresponding to the user selection is encrypted according to a second encryption key that is known to the distribution server.
摘要:
A method for preventing unauthorized recording of media content on an Apple operating system (OS). The present method registers a compliance mechanism on a client system having the Apple OS operating thereon. The compliance mechanism comprises a framework for validating the compliance mechanism on the client system, and a multimedia component opened by the framework. The present method uses the multimedia component for decrypting the media content on the client system. The present method also prevents decryption of the media content on the client system having the Apple OS operating thereon if a portion of the compliance mechanism is invalidated.
摘要:
Disclosed herein is an illegal copy prevention system and method. In short, an anti-copy prevention system of the present invention includes, a chipless RFID disk having a print layer distributed with metal fibers; an Optical Disk Drive (ODD) reading, recorded information when mounted with the chipless RFID disk; and a reader installed in the disk drive to sense whether metal fibers distributed at the printed layer exists and a unique ID contained in the metal fiber.