Abstract:
A device for use in a system for tracking a chain-of-manipulation (CoM) of audio-video (AV) content includes a hardware processor, and a system memory storing a CoM tagging software code and an AV processing application. The hardware processor executes the CoM tagging software code to detect manipulation of the AV content by the AV processing application that modifies at least one of video or audio of the AV content, and to generate, when the manipulation is detected, one or more CoM tag(s) including a device identification tag identifying the device used for modifying the AV content. The hardware processor also executes the CoM tagging software code to insert the CoM tag(s) in each modified segment of the AV content modified by the AV processing application, the inserted CoM tag(s) being human and machine imperceptible when the AV content is played back by a playback device on a display.
Abstract:
There is provided a system comprising a non-transitory memory and a hardware processor configured to determine elements of a performance in a video, identify one or more people to feature in the video based on the elements of the performance in the video, receive a user input selecting a person from the one or more people to feature in the video, retrieve performance data for featuring the selected person in the video based on actions performed by the actor in the video, create a personalized video by featuring the selected person in the video using the performance data, and display the personalized video on a user device.
Abstract:
An example system includes a database having a plurality of data structures, each of the plurality of data structures associated with a different business rule and one or more provider identifications, and a processor configured to receive one or more consumer identifications and one of the one or more provider identifications, search the plurality of data structures for one or more data structures associated with the one of the one or more provider identifications to identify authorized data structures, in the authorized data structures, determine entitlements associated with the one or more consumer identifications to identify consumer entitlements, generate a list of the consumer entitlements, and transmit the list of the consumer entitlements in response to the receiving.
Abstract:
There is presented a system and method for associating a domain transcendent identification (ID) of a user and a domain specific ID of the user, the system comprising an ID association server accessible by a plurality of secure domains over a network. The system also includes an ID associator application that when executed by ID association server is configured to receive a domain specific ID that associates the user to the secure domain, enter the domain specific ID in a domain transcendent ID record created for the user, generate a unique data associated with the domain transcendent ID record and identify a network location for submission of the unique data, send the unique data and the network location to the user, and associate the domain transcendent ID and the domain specific ID.
Abstract:
A system for performing authentication of content based on intrinsic attributes includes a computing platform having a hardware processor and a memory storing a content authentication software code. The hardware processor executes the content authentication software code to receive a content file including digital content and authentication data created based on a baseline version of the digital content, to generate validation data based on the digital content, to compare the validation data to the authentication data, and to identify the digital content as baseline digital content in response to determining that the validation data matches the authentication data based on the comparison. The hardware processor is also configured to execute the content authentication software code to identify the digital content as manipulated digital content in response to determining that the validation data does not match the authentication data based on the comparison.
Abstract:
A system for authenticating digital contents includes a computing platform having a hardware processor and a memory storing a software code. According to one implementation, the hardware processor executes the software code to receive digital content, identify an image of a person depicted in the digital content, determine an ear shape parameter of the person depicted in the image, determine another biometric parameter of the person depicted in the image, and calculate a ratio of the ear shape parameter of the person depicted in the image to the biometric parameter of the person depicted in the image. The hardware processor is also configured to execute the software code to perform a comparison of the calculated ratio with a predetermined value, and determine whether the person depicted in the image is an authentic depiction of the person based on the comparison of the calculated ratio with the predetermined value.
Abstract:
There is provided a system including a non-transitory memory storing a subscription entitlement database and a hardware processor configured to provide access to a media content to a user during an availability window for the media content, according to a subscription right associated with the media content in the subscription entitlement database, notify a user of the availability window for the media content, present the user with an option to extend access to the media content beyond the availability window for the media content, in response to a selection of the option to extend access from the user, extend access to the media content after the availability window.
Abstract:
There is presented a system and method for coordinating asset entitlements, the system comprising a server including a processor and a memory and accessible by multiple domains over a network, and an asset entitlement database searchable by the server, wherein an entry of the asset entitlement database links a domain transcendent user identification (ID) of a user and at least one asset entitlement acquired by the user from any of the domains. In one embodiment, the server is configured to receive an asset entitlement inquiry from one of the domains, search the asset entitlement database for asset entitlements acquired by the user from any of the domains, generate a search result identifying the asset entitlements acquired by the user from the domains, and send data corresponding to the search result to the domain from which the asset entitlement inquiry was received.
Abstract:
There is presented a system and method for coordinating asset entitlements, the system comprising a server including a processor and a memory and accessible by multiple domains over a network, and an asset entitlement database searchable by the server, wherein an entry of the asset entitlement database links a domain transcendent user identification (ID) of a user and at least one asset entitlement acquired by the user from any of the domains. In one embodiment, the server is configured to receive an asset entitlement inquiry from one of the domains, search the asset entitlement database for asset entitlements acquired by the user from any of the domains, generate a search result identifying the asset entitlements acquired by the user from the domains, and send data corresponding to the search result to the domain from which the asset entitlement inquiry was received.
Abstract:
There are provided systems and methods for digital purchase transfers between separate retailers. One method includes retrieving a receipt for the media content purchased from a first retailer, transmitting the receipt to a redemption server, receiving a token from the redemption server in response to the transmitting of the receipt to the redemption server, transmitting the token to the second retailer, and receiving the media content from the second retailer in response to the transmitting of the token to the second retailer.