Abstract:
One embodiment provides a system that facilitates encryption of manifest content based on permutation. During operation, the system partitions, by a computer system, a collection of data into a first set of content objects, wherein a content object is a chunk comprised of a plurality of bytes. The system performs a first permutation function on the first set of content objects to obtain a first set of permuted content objects. The system creates a manifest based on the permuted content objects, wherein a manifest is a content object which indicates a second set of content objects, wherein a respective content object of the second set is a data object or another manifest. The system encodes the first permutation function and the permuted content objects in the manifest, thereby facilitating an authorized entity that receives the manifest to reassemble the manifest contents based on the permutation function.
Abstract:
A computer-implemented method and related system controls access to protected content with certificate-based access authorization. Protected content stored in a memory of a computer is enciphered using a content key to produce a quantity of enciphered, protected content, wherein the content key is derived from a content encryption algorithm. A user key is derived from user credentials using a credential encryption algorithm. The content key is enciphered with the user key using a content key encryption algorithm to produce a certificate, wherein the certificate contains the enciphered content key. Access to the protected content is controlled by the user credentials and the certificate containing a second enciphered content key. A decryption user key is generated and access authorization to the protected content is determined based on the decryption user key in response to a match of the decryption user key with the user key.
Abstract:
Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands of transactions per second. Further, in particular embodiments, the systems and methods herein are scalable, such that many thousands of transactions can be processed per second upon replicating particular architectural components.
Abstract:
A system and associated methods for managing digital content in an extensible media format ("EMF") are disclosed. In at least one embodiment, an initial request server is located in memory on a computing device and configured for receiving and processing content requests from an at least one client device in the possession of a user. A content server is also located in memory on a computing device and is configured for storing and selectively distributing the content. The content server stores the content in an at least one EMF file, each EMF file comprising a frame page containing a frame page identifier and an at least one frame; each frame containing at least a portion of the content along with a frame identifier. Upon the initial request server receiving a content request from the user via the associated client device, the content server transmits the associated EMF files.
Abstract:
A system and associated methods for managing digital content in an extensible media format ("EMF") are disclosed. In at least one embodiment, an initial request server is located in memory on a computing device and configured for receiving and processing content requests from an at least one client device in the possession of a user. A content server is also located in memory on a computing device and is configured for storing and selectively distributing the content. The content server stores the content in an at least one EMF file, each EMF file comprising a frame page containing a frame page identifier and an at least one frame; each frame containing at least a portion of the content along with a frame identifier. Upon the initial request server receiving a content request from the user via the associated client device, the content server transmits the associated EMF files.
Abstract:
A method for DTCP to HLS conversion is provided that starts with a standard DTCP Protected Content Packet (PCP) structure. The PCP payload data is chunked at defined chunk boundaries. Each chunk is then appended with a pad to be compatible with HLS. An HLS playlist is then provided using the PCP header with identification of the chunks and a keytag. The chunk is encrypted with a DTCP key calculated by the DTCP standard using: (a) copy control bits; (b) a nonce, and (c) an exchange key ID. Relevant PCP header fields are provided in the keytag for the HLS playlist supporting the transaction that enables calculation of the DTCP content key to enable later decryption of the chunks. The system further provides a revised HLS GET for DLNA to enable trick play seek operations to be performed on the converted HLS.
Abstract:
The present disclosure is directed to an end-to-end secure communication system wherein, in addition to encrypting transmissions between clients, communication-related operations occurring within each client may also be secured. Each client may comprise a secure processing environment to process encrypted communication information received from other clients and locally-captured media information for transmission to other clients. The secure processing environment may include resources to decrypt received encrypted communication information and to process the communication information into media information for presentation by the client. The secure processing environment may also operate in reverse to provide locally recorded audio, image, video, etc. to other clients. Encryption protocols may be employed at various stages of information processing in the client to help ensure that information being transferred between the processing resources cannot be read, copied, altered, etc. In one example implementation, a server may manage interaction between clients, provision encryption keys, etc.
Abstract:
Example embodiments relate to ad-hoc, face-recognition-driven content sharing. In example embodiments, a system matches a face in a face image extracted from a video stream from a sharing device to a face profile of a receiving user, where the face profile of the receiving user is generated based on a training face image that is extracted from a training video stream of a training device of the receiving user. In response to generating a temporary token that is associated with the face profile, the system sends the temporary token and an arbitrary handle from the face profile to the sharing device. At this stage, the system receives a context identifier from the sharing device and provides the context identifier to the receiving device of the receiving user.
Abstract:
Technologies for de-duplicating encrypted content include fragmenting a file into blocks on a computing device, encrypting each block, and storing each encrypted block on a content data server with associated keyed hashes and member identifications. The computing device additionally transmits each encrypted block with an associated member encryption key and member identification to a key server. As part of the de-duplication process, the content data server stores only one copy of the encrypted data for a particular associated keyed hash, and the key server similarly associates a single member encryption key with the keyed hash. To retrieve the file, the computing device receives the encrypted blocks with their associated keyed hashes and member identifications from the content data server and receives the corresponding member decryption key from the key server. The computing device decrypts each block using the member decryption keys and combines to blocks to generate the file.