Abstract:
:Proposed are concepts for checking the locality of devices to determine if data (e.g. media content) can be shared between the devices, which may therefore aid secure sharing of data or media content between the devices. In particular, it is proposed that a simple way to check if two devices are in/at the same location (i.e. in close vicinity of each other) is to check if they are visible to each other. By one device displaying information to the other device, the displayed information can be used to confirm that the devices are visible to each and thus infer a shared locality. Such information may comprise (or be based on) information that should only be known to the two devices, thereby facilitating verification of the devices.
Abstract:
A decoding device includes a communication interface and a processor operably coupled to the communication interface. The communication interface receives at least a portion of a broadcast stream including media data, which includes media samples. The processor identifies information elements containing DRM processing information in the broadcast stream. Each information element is associated with a respective one media sample of the media data. For each information element, the processor also identifies the one media sample that is associated with the information element. The processor further identifies, based on the information element, the DRM processing information for the one media sample. In addition, the processor decodes the one media sample based on the DRM processing information.
Abstract:
Various embodiments set forth systems and techniques for securing media content capture capabilities on a device. The techniques include receiving a frame of a media content item; determining whether the frame of the media content item is signed based on an analysis of one or more pixels of the frame; and when the media content is signed, removing one or more restrictions on one or more functions on the device based on whether the one or more pixels on the frame meet one or more conditions, wherein the one or more functions enable the device to perform one or more operations on the frame of the media content item.
Abstract:
Systems and methods are disclosed herein for distributing content over a local area network (LAN) between a first device within the LAN and a second device within the LAN. A first device multicasts a LAN-specific content beacon over the LAN. The LAN-specific content beacon includes an identifier uniquely identifying the first device. A second device sends a response to the LAN-specific content beacon requesting secondary content to be integrated into a display of the second device. The first device generates the secondary content based on profile information associated with the second device and unicasts the secondary content to the second device for integration into primary content being generated for display at the second device.
Abstract:
The described technology is directed towards evaluating client-specific information and possibly other information to determine whether to return less data than is available for a data item in response to a request for graph node data to a data service, and/or return expanded graph node data. When a request for graph data is received, client-specific information is used at least in part by a data service in determining whether to return a virtual graph node comprising a relatively lightweight set of information relative to the full set of information maintained in a main (graph) node. The client-specific information is also used in determining whether to return expanded data beyond that requested, e.g., for caching at the client in anticipation of it likely being needed by the client.
Abstract:
Embodiments of the present disclosure provide methods, systems, apparatuses, and computer program products for digital content auditing in a group based communication repository, where the group based communication repository comprises a plurality of enterprise- based digital content objects organized among a plurality of group-based communication channels. In one embodiment, a computing entity or apparatus is configured to receive an enterprise audit request, where the enterprise audit request comprises an audit credential and digital content object retrieval parameters. The apparatus is further configured to determine if the audit credential satisfies an enterprise authentication protocol. In circumstances where the audit credential satisfies the enterprise authentication protocol, the apparatus is configured to retrieve and output digital content objects based on the digital content object retrieval parameters, receive a violating digital content object identifier, and replace a violating digital content object with a temporary digital content object based on the violating digital content object identifier.
Abstract:
Different clients encrypt secrets using a server's public RSA key, blind them using randomly generated onetime use blinding factors, and bind them to unique identifiers of corresponding client policies. Encrypted, blinded secrets bound to unique policy ids are transmitted to the server. The server processes different encrypted, blinded secrets received from different clients according to the bound policies. Processing an encrypted blinded secret can involve decrypting it using the corresponding policy id and the server' s private key, resulting in a decrypted but still blinded secret which is not readable by the server. The server can then transmit the decrypted blinded secret to one or more clients according to the policy. A client that receives the decrypted blinded secret can unblind and read the secret as plaintext, provided the client has the policy id and the unblinding factor.