Abstract: The present disclosure generally relates to a system for face-off opinion management (also referred hereinbelow as ‘Face-Off system’); wherein involving its digital platform on user gadgets present in internet or telecommunication network, including computers and smart phones; said system provides an effective means to the users towards creating their opinion, preferably in the form of video contents, and making it available in the network of said system or for circulating it to the other users. Said system for face-off opinion management will enable the user to capture, store and analyse opinion videos of products from users and influencers by category and automate the entire process of products and service opinion management using AI, which in turn will help the original equipment manufacturers (OEMs) and Service Provides to better market their products and service lines.
FIELD OF THE INVENTION:
The present invention generally relates to a system for creating, transferring/sending and managing videos on a digital platform involving publically used wired/wireless internet or telecommunication network; wherein said system is referred herein as ‘System For Face-Off Video Opinion Management’ or the ‘Face-Off system’.Said Face-Off system comprises a novel digital platform on user gadgets present in internet or telecommunication network, including computers and smart phones and the said system provides an effective means to the users towards creating their opinion, preferably in the form of video contents, and making it available in the network of said system or for circulating it to the other users.
Said system for face-off opinion management will enable the user to capture, store and analyse opinion videos of products from users and influencers by category and automate the entire process of products and service opinion management using AI, which in turn will help the original equipment manufacturers (OEMs) and Service Provides to better market their products and service lines. Face-off is not a generic term but brand name of the applicant.
The most preferred embodiment of the System For Face-Off Video Opinion Managementcomprises 5G mobile network based holographic communication, whereby it is provisioned for real time capturing of videos, encoding, transporting and rendering of 3D representations of Opinion Presenters, anchored in space, stereoscopic images or 3D videos in extended reality (XR) headsets that will deliver a visual effect similar to a hologram.
BACKGROUND AND OBJECT OF THE INVENTION:
There are internet based systems for making and circulating videos/text and other digital contents by the user in a particular network. However there is a genuine requirement for such a specific internet based system, which allow third parties to make their original and unbiased opinion about a particular product and/or service, made available in the market by one or another Brand, OEMs or service providers. Usually, some social networking platforms or the website(s) of certain marketing agency or the website of the concerned Brand, OEMs or service provider allow their users/consumers to make their opinion about certain product or services;
3
wherein the user/consumer can make their opinions generally in the form of text comments, reviews and blogs.
Further there are some non-specific literatures and information available, which does not address the issue addressed by the instant invention, as being disclosed herein.
Prior Patent US7284032 B2 describes a method for sharing information in a network, comprising steps of: (i) enabling a first user to define a data segment; (ii) recording the defined data segment at a first of a plurality of user systems connected to the network; (iii) transmitting first information identifying the recorded data segment to a remote location, said first information being data other than the recorded data segment and said transmission precluding the transmission of said recorded data; and (iv) receiving, at the first of the plurality of user systems, from a second of plurality of user systems via the remote location, second information identifying said defined data segment within said recorded data segment located at said first user system connected to the network, said second information being data other than the recorded data segment and precluding the transmission of said recorded data.
US patent US8521655 discloses an engine, system and method for providing cloud-based business intelligence data, responsively to received company information, including a local front end comprising a graphical user interface capable of locally querying a user for an electronic location of the received company information, and ones of the business intelligence data to be displayed on the graphical user interface upon upload of the received company information from the electronic location, and further including an at least partially remote back end, comprising an accessing engine capable of accessing the electronic location for uploading to the cloud of only ones of the received company information indicative of the ones of the business data intelligence to be displayed, and a charging engine for charging an account of a user of the front end $1 per the ones of the business intelligence data to be displayed.
Another US patent US9514231 describes a computer-based system to facilitate providing advisory services to clients, comprising a networked server computer having a data accumulation engine that accepts user information, client information of clients of the users, and a plurality of user-defined tags. The data accumulation engine is operable to accumulate data regarding actions of the user and information associated with the user's clients in accordance with the clients' respective associated tags. The server also has a filtering engine that filters the data responsive to user requests; and a service engine for use in providing services targeted to clients based on the filtered data.
4
One other prior art US20200151815A1 describes a hybrid trading and social media platform enables users to execute trades in a collaborative manner, benefiting from the collective knowledge of the platform community. To this end, leader-follower relationships are established in a dynamic manner among the platform users and a directed graph is created and maintained in real time to detect inconsistent relationships that may result in unintended or undesired trades. Users can exchange trading ideas and/or actual trades, and comments and feedback on such ideas/trades. One or more followers are provided with performance and/or social metrics of the leader(s) allowing the followers to make informed decisions about the relationships.
Similarly, another art US20160366389A1 provides a method for performing video analytics comprises capturing video data using a video source disposed at an acquisition end. The captured video data is stored at the acquisition end, and non-adjacent single frames of the captured video data are transmitted from the acquisition end to a server via an IP network. The non-adjacent single frames of captured video data are transmitted one at a time at known time intervals, or a burst of a plurality of non-adjacent single frames is transmitted at another known time interval. At the server, video analytics is performed on a current one of the non-adjacent single frames for detecting an actionable event relative to a previous one of the non-adjacent single frames. In response to detecting an actionable event, a signal for requesting previously stored video data captured between the current one of the non-adjacent single frames and the previous one of the non-adjacent single frames is transmitted to the acquisition end via the IP network.
Unlike the available information and various web-based facilities, as indicated in above mentioned prior arts, the present invention is a novel effort towards providing a specific internet based system and a digital platform to third party users, so that they can easily and comprehensively express their opinion, to internet connected present/future users, about a particular product and/or service in the form of audio-visual content, created in their internet connected device, namely computer and/or smart phone.
Prime object of the present invention is to provide a specific system, termed herein as “System For Face-Off Video Opinion Management”, and a digital platform to third party users, so that they can easily and comprehensively express their opinion, to the internet connected present/future users, about a particular product and/or service in the form of audio-visual content, created in their internet connected device, namely computer and/or smart phone.
5
Other prime object of the present invention is to provide a Face-Off System for creating, transferring/sending and managing videos, preferably in real-time using the state-of-the-art user-devices, backend devices and publically used wired/wireless internet or telecommunication network.
Another object of the present invention is to provide a Face-Off System for creating, transferring/sending and managing videos, preferably in real-time using the state-of-the-art user-devices, backend devices and publically used wired/wireless internet or telecommunication network; wherein the most preferred embodiment of the said system involves:-
? 1st User devices (sender device), provisioned for digital authentication in the network of the instant invented system; wherein this 1st user device is the real-time video making and transmitting device;
? Backend devices, equipped with digital/software based mechanisms for processing the data/video sent by the 1st user device towards analyzing, storing, managing and transmitting to the other user devices (2nd user device(s)), present in the wired/wireless network of the publically used internet or telecommunication network, preferably the fifth generation (5G) mobile network; and
? 2nd user device(s) (or receiver device(s)), provisioned to receive the video communication, preferably in real time, sent by the 1st user device (sender device), duly processed by the Backend device.
Another object of the present invention is to provide a System For Face-Off Video Opinion Management, involving a digital platform on internet/telecommunication network connected gadgets including computer and smart phone; wherein said system will provide an effective means to the users towards making their opinion and making it available or for circulating it to the other users.
Another object of the present invention is to provide such a System For Face-Off Video Opinion Management, which will enable the user to capture, store and analyse opinion videos of products from users and influencers by category and automate the entire process of products and service opinion management using AI, which in turn will help the original equipment manufacturers (OEMs) and Service Provides to better market their products and service lines.
Another object of the present invention is to provide a System For Face-Off Video Opinion Management, comprising of a novel configuration ofa server, database and control module, involving internet and AI based mechanism, provisioned for handling contents created and
6
transmitted from/to the wire/wirelessly connected user devices, particularly by way of receiving, analysing, categorizing, storing and transmitting video contents in real time or in future time.
Another object of the present invention is to design such a backend administrator mechanism which monitors, reviews and filters the inflowing contents, created by the users of said System For Face-Off Video Opinion Management.
Another object of the present invention is to provide a preferred embodiment of theSystem For Face-Off Video Opinion Management,comprises 5G mobile network based holographic communication, whereby it is provisioned for real time capturing of videos, encoding, transporting and rendering of 3D representations of Opinion Presenters, anchored in space, stereoscopic images or 3D videos in extended reality (XR) headsets that will deliver a visual effect similar to a hologram.
SUMMARY OF THE INVENTION:
The term ‘user’ indicates adigital device, namely computer, laptop, smart phone etc. present in internet or telecommunication network and being operated by a person from any remote digital location.
Said System For Face-Off Video Opinion Management, comprises of a novel configuration of a server, database and control module, involving internet and AI based mechanism, provisioned for handling contents created and transmitted from/to the wire/wirelessly connected user devices, particularly by way of receiving, analysing, categorizing, storing and transmitting video contents in real time or in future time.
The invented Face-Off Systemmay be considered herein as a system for creating, transferring/sending and managing videos, preferably in real-time using the state-of-the-art user-devices, backend devices and publically used wired/wireless internet or telecommunication network.
This system involves:-
? 1st User devices (sender device), provisioned for digital authentication in the network of the instant invented system; wherein this 1st user device is the real-time video making and transmitting device;
? Backend devices, equipped with digital/software based mechanisms for processing the data/video sent by the 1st user device towards analyzing, storing, managing and
7
transmitting to the other user devices (2nd user device(s)), present in the wired/wireless network of the publically used internet or telecommunication network, preferably the fifth generation (5G) mobile network; and
? 2nd user device(s) (or receiver device(s)), provisioned to receive the video communication, preferably in real time, sent by the 1st user device (sender device), duly processed by the Backend device.
Said System For Face-Off Video Opinion Management enables the user to capture, store and analyse opinion videos of products from users and influencers by category and automate the entire process of products and service opinion management using AI, which in turn will help the original equipment manufacturers (OEMs) and Service Provides to better market their products and service lines.
The user, by accessing the digital platform of the system for face-off opinion management of the present invention will create certain content, preferably certain original video content or certain downloaded/edited video content, and will either save the said created content in the database of the system to be accessed by any real time/future user or will circulate the said content into the network of other users.
The backend administrator mechanism of the instant system for face-off opinion management is so designed that it monitors, reviews and filters the inflowing contents, created by the users of said system for face-off opinion management.
With the advent of 5G mobile network, the most preferred embodiment of the invented system herein is provisioned for performing holographic communication, whereby it is provisioned for real time capturing of videos, encoding, transporting and rendering of 3D representations of Opinion Presenters, anchored in space, stereoscopic images or 3D videos in extended reality (XR) headsets that will deliver a visual effect similar to a hologram.
SHORT DETAILS OF THE DRAWINGS:
Figure 1:Represents the complete Schematic plan of the instant System for Face-Off Vidoe Management, showing the entire process of holographic communication
Figure 2: Represents the integration and involvement of receiver devices, sender devices and the service provider networks towards operating the instant System for Face-Off Video Opinion Management.
8
Figure 3: Represents the exploded view of the LiDAR camera, which is an important device for the Holographic Communication through the instant System for Face-Off Video Opinion Management.
Figure 4: Represents schematic scheme for the user to sign-in in the face-off platform.
Figure 5(a) & 5(b): Schematic representation of the Multi Access feature for multiple backend logins according to the tasks allotted to the Faceoff backend; wherein there will be a Super Admin facility to control all the admin end /backend features and modules with full access.
Figure 6: Represents the architecture of the Ad management platform of the instant System for Face-Off Video Opinion Management
Figure 7:-In the review a thumbnail of an image of the registered Face-Off user and reviewer will be there, along with his text review.
Figure 8:Schematic architecture diagram, highlightingthat the system is hosted in cloud with all the components working in tandem.
DESCRIPTION OF THE INVENTION WITH THE HELP OF DRAWINGS:
The most preferred embodiment of the invented concept of the system for face-off opinion management and its digital platform is described hereinbelow with the help of certain drawings.
The present invention mainly discloses the System For Face-Off Video Opinion Management (also referred hereinbelow as ‘Face-Off system’)for creating, transferring/sending and managing videos on a digital platform involving publically used wired/wireless internet or telecommunication network; wherein said system involves sender device (or 1st user device) namely 3D Camera (on PC, tablet with inbuilt 3D camera), receiver devices (or 2nd user devices) namely AR Glasses, 5G phone, light weight App etc. and the backend devices & service provides namely compression pipeline (5G SA network, Network slicing, Edge computing).
With the advent of 5G, Faceoff app needs to have holographic communication, whereby it is provisioned for real time capturing of videos, encoding, transporting and rendering of 3D representations of Opinion Presenters, anchored in space, stereoscopic images or 3D videos in extended reality (XR) headsets that will deliver a visual effect similar to a hologram.
The Figure 1 shows the entire process for holographic communication.
9
The architecture of the said Face-Off System is so designed to support holographic communication is depicted in the figure 1, whereinthe capturing sensors provide a real-time representation of the human face and body. Format conversion and filtering is applied before encoding to reduce the bit rate requirements on the network. The compressed hologram is transmitted to an XR device over a low latency reliable transport network such as 5G. On the XR device, the compressed hologram is decoded and processed before rendering in the consumer environment. The rendering engine considers positioning and semantic information of the device and the rendered scene. The virtual human representation is displayed on the XR device.
Capturing Realtime Videos of Opinion Presenters
Holographic capturing is the process of creating a measurable 3D representation of an object, person or environment. This process is divided into four steps:
? Acquisition
? Depth estimation
? Data fusion
? Post-processing.
The acquisition step makes use of visual sensors to capture a volume of interest. Here it is preferred to use LiDAR sensor-based cameras for Acquisition/3D capturing.
In the depth estimation step, sensor streams are used to compute depth. LiDAR sensors provide depth information directly, while stereo cameras and multi-camera systems estimate depth by capturing the person from different angles.
In the data fusion step, the depth information or depth map from different perspectives is fused into a single stream of 3D points by matching key points and calculating the optimal geometric transformation from the different views.
The post-processing step reduces the data size of the stream of 3D points by cleaning up redundant points, noise and outliers. The resulting 3D representation can be delivered in various visual media formats such as point clouds or meshes.
Rendering and display
Rendering is the process of generating an image of a scene or a model from a given viewpoint using computations. A scene is a container object describing a volume and its contents. Sources areobjects located in the scene to be rendered. A camera is an instance that renders the viewpoint and consists of a location, focus, orientation and resolution.
10
Engines render the content based on rendering pipelines. The rendering pipelines take care of culling, rendering and post-processing. There are several types of pipelines with different capabilities and performance characteristics that are suitable for different applications and platforms. A general- purpose render pipeline is optimized to process graphics across a wide range of platforms, while a high-fidelity graphics pipeline is suitable for high- end platforms.
Additional techniques and approaches are available to improve the rendering process in various ways, such as enabling faster rendering with better QoE, smoothing squared edges or increasing the quality of objects in a scene. Furthermore, AI algorithms can recreate an object of a scene or create a photorealistic representation such as an avatar. The photorealistic representation contains a model: a visual representation or mesh model and configurations. Configurations are the bones or access points of a model. These points are animated during the rendering process with preloaded animations.
Real-time data captured from a depth camera takes more computation for rendering compared with an avatar representation. The rendering of all parts of the mesh is needed for every frame for a hologram, compared with rendering a difference for an avatar, such as updating facial expressions like the blinking of an eye on an existing avatar model.
Split rendering is an approach that offloads rendering capabilities to an edge cloud. The key idea is that the six degrees of freedom position andorientation of the XR device in a scene are tracked, and constant feedback is provided to the edge in real time. The rendering of a 3D scene happens in a cloud. Based on the position of a user, the cloud streams back a 2D video to a scene from the user’s angle. For this approach, an end-user device does not need to have high-end characteristics. However, good QoE in this scenario requires low latency communication between the edge and the device.
When it is ready, the rendered stream is transmitted to a device with the ability to provide users with a holographic experience. There are four device types: handheld devices (such as smartphones and tablets), holographic displays, AR glasses and virtual reality glasses. Using these devices, it is possible to place a hologram in a room and move around it.
Media formats and codecs
The delivery of holographic communication will require the processing and transfer of various visual media formats. Those formats aim to represent more realistic and interactive visual representations of humans and/or an environment than established 2D video formats used in
11
traditional videoconferencing, yet the increased informational load may put high pressure on transmission bitrates across the whole communication chain.
For example, point cloud data representing a single human can typically consist of 100,000 to 1 million points and beyond per single time instance (video frame). Streaming such data with 30 frames per second (fps) – the typical videoconferencing streaming rate – would require roughly between 300Mbps to 3Gbps of available bandwidth. Such uncompressed bitrates are not feasible today, and current real-life videoconferencing systems employ media codecs to reduce the bandwidth requirements to single Mbps (1-6Mbps) offering compression ratios from 250:1 up to 1000:1.
Methods to offer similar compression ratios for immersive 3D representations such as point clouds are therefore needed to enable the deployment of holographic communication services. In terms of handling 3D visual formats and their decoding onXR devices, two scenarios can be considered.
In the first, which is typically applied in the case of split rendering, the processing and decoding of 3D formats is done at the edge, while XR devices decode pre-rendered 2D video with traditional 2D video codecs such as ITU-T (International Telecommunication Union Telecommunication Standardization Sector) and ISO/IEC (International Organization for Standardization/International Electro-technical Commission) MPEG (Moving Picture Experts Group) High Efficiency Video Coding/H.265 or Versatile Video Coding/H.266 codecs.
In the second scenario, the processing and decoding of 3D formats is done on XR devices requiring the support of additional immersive decoders on the device itself. One approach standardized in ISO/IEC MPEG-I visual volumetric video-based coding (V3C) and video-based point cloud compression (V-PCC) employs 3D to 2D projection algorithms that create intermediate 2D video representations. These representations can be decoded with multiple instances of 2D video codecs such as H.265 or H.266.
An alternative approach would be to employ “native” 3D codecs such as the ISO/IEC MPEG-I geometry-based point cloud compression. In this codec, compression tools operate directly on a 3D point cloud representation. Unlike for the V3C/V- PCC codec, this approach would require adding support for such native point cloud codec(s) in mobile hardware chipsets.
In short Holographic communication in the instant System for Faceoff Video Opinion Management can preferably be done using devices like LiDAR (3D) camera in mobile phones and commercially available AR glasses. The key technology is to perform the compression in
12
real time in the network. The figure 2 below shows the glimpse of the working of said System for Faceoff Video Opinion Management
In one of the preferred system of the instant invention, the Intel® LiDAR Camera L515 (Figure 3) is used, which enables highly accurate depth sensing in a small form factor.
Small enough to fit in the palm of an user’s hand, the L515 is 61mm in diameter and 26mm in height. At approximately 100g, it’s designed to be easily situated on any system, or attached to a tablet or phone. It also runs at less than 3.5W. All depth calculations run on the device resulting in true platform independence.
With a short exposure time of <100ns per depth point, even rapidly moving objects can be captured with minimal motion blur. Optimized for indoor lighting, the L515 processes over 23 million depth points per second via a custom-made ASIC. The product has been designed for use case flexibility with the inclusion of an RGB camera and an inertial measurement unit.
The Intel® LiDAR Camera L515 uses an IR laser, a MEMS, an IR photodiode, an RGB imager, a MEMS controller, and a vison ASIC. The MEMS is used to scan the IR laser beam over the entire field-of-view (FOV). The L515 vision ASIC will process the data from the reflected beam captured by the photodiode and will output a depth point representing the accurate distance of a specific point in the scene from the camera. Aggregation of the depth points will generate a point cloud depth data representing the full scene.
Referring to the Figures hereinbelow, the invented concept is described further wherein the System for the Face-Off Video Opinion Management as well as the method of operation of the sender device (1st User device), receiver device (2nd User device) and the Backend devices will be discussed in detailed.
After the sign-up using the digital platform of the said Face-Off system of the present invention, the user will have option to create videos using the Round Red Button therein, as shown in Figure-4. The camera module of the user device can be used in the digital platform of the Face-Off system, for both android and IOS.
Said Face-Off system provides following operational features in its digital platform, to be configured within the internet connected user devices:-
? There is option for language selection for videos;
? There is an option to upload existing videos of certain specific duration, preferably of a length equal to or less than 30 seconds;
13
? The user is able to tag the video with a particular product or service category or tagging a video to a problem category (product issue, service issue etc.);
? There are search options available for users to tag a created video with a particular product or service category or tagging a video to problem category (product issue, service issue, ideal situations, user friendlyness, etc.);
? There are search options for searching Face-Off videos by different parameters, such as by product, by category or other parameters as required;
? There is provision for flipping videos for using front or back cameras for taking videos;
? There is provision for uploading captured videos;
? The system provides option for sharing videos in social media;
? The system provides an option to the user to report a video;
? There is a provision of comment section in the digital platform, preferably for creating text content by the user.
The digital platform of the Face-Off system depicts the number of video-views.
The user will also have the option to select either Face-Off Videos or News.
If the user selects NEWS OPTION in a toggle button, he or she will be able to view different categories and sub-categories of News.
Similarly, if he selects OPINION, then he will be able to view different categories and sub-categories of opinion.
The user has the option for selecting trending news - manual entry
There is provision for tagging the News with Products & Services.
Further, the digital platform of the said Face-Off system provides an option to the user to Select and Search for Categories of News and Opinions on Products and Services, Brands etc., based upon pre-defined parameters.
In an exemplary scenario, the digital platform of the said Face-Off system provides following Categories of News and Opinions:-
? Laptop and Desktop;
? Projector;
? Smart Phone;
? Tablet;
14
? Headphone;
? Smart watch;
? Speakers;
? Printer and Scanner;
? Camera;
? Electric Vehicles/EVs
? CCTV;
? UPS;
? Gaming Devices;
? 4G/5G Services;
? Power Bank;
? View related News of a Product or Service.
List of Opinion/Content Created by the Content Creator under his registered Account Section: My Account.
This module will have various operational aspects, made available to the user on the digital platform of the said Face-Off system, some of which are as under:
? Edit profile,
? Set profile picture
? Set interests selection
? View videos posted by self
The administrator side of the said Face-Off System (Figure 5(a) and 5(b)), having the customized hardware architechture especialized for effective functioning of this Face-Off System in the internet/telecommunication network, involves several technical features. Major aspects of the administrator side of the said Face-Off System are as under:
? Multi Access feature for multiple backend logins according to the tasks allotted to the Face-Off backend by virtue of their task and job profile. Selective or full access can be enabled to individual backend team member as per authorizations allotted to them;
? There will be a Super Admin facility to control all the admin end/backend features and modules with full access;
? The backend team will have users and multiple users, can be put into user teams and groups;
15
? Password security and Multifactor authentication facility for Admin Users;
? User and Group role setting;
? Access Permissions for Users and Groups;
? Backend Users will have categories such as Moderators, Content Authorizers etc. There will be option to create New Backend User, User Category, User Group, Policies, Authorizations &Roles;
? Secure Sign in using User ID and Password via Okta Cloud based identies Management Platform and their data management by Backend Faceoff team;
? Social login/Social Sign-in with supported platforms like Goole, Linkedin, Twitter, Facebook using Okta for end users and their data management by Backend Faceoff team.
Moderator will be responsible for approving or disapproving a user content before being made live, Flagging a content based on Objectionable/wrong information, Hate & Harassment, Drug use etc. Comprehensive Flag Management System will inform user about the reason, his/her content has not been uploaded.
One of the preferred embodiments of the said Face-Off System, as it is primarily intended to involve large number of internet connected users, its database and controller module are designed for Ad Management Program, mainly for certain specific user namely Corporate institutions which are product manufacturers/marketers, Service providers and Support/Consumer portals for Ad Metrics (Figure 6).
? The Opinion regarding Products, Services & Support has to be tagged with a particular Brand, OEM or a Service Provider;
? Tracking of the number of views and shares of the Tagged opinion;
? Customer Dashboard Module has to be created to represent the Brand-wise, OEM wise, Service Provider wise, Product wise impression on “Opinion” of particular product or Service Support;
? Custom designed Customer Ad Portal has to be designed so that OEMs and Service & Support Providers can track the Opinion about their Products, Service Support at the Portal in a dashboard format.
One of the preferred embodiments of the said Face-Off System, at its backend, is provided with a Loyalist Management System Module, which is a specialized mechanism for Revenue sharing with the users/content creators. This module has following major aspects:
16
? MIS or number of published videos by Content Creators, which can be viewed from Admin end;
? Content Creator can see the number of Approved Videos, that are running live and can see the information on minimum requirement of live approved videos on the platforms that can provide them revenue;
? Revenue slabs as per approved videos of a Content Creator, can be optionally administered by the Face-Off System’s Backend team;
? Backend team of the Face-Off System can adjust the value of each approved video or a content creator, that is running live on the Face-Off Platform and accordingly the Controller module of the said system can be customized at any point of time;
? Content Creator category can be defined by Face-Off Backend Team;
? Approved video category can be defined by Face-Off Backend team;
? Defining payment slabs for content creators based on number of approved videos of each content creator running on the platform;
? Defining minimum viewership criteria of a video and tagging payment structure with it by the Backend team of the Face-Off System;
? Integration with Paytm, Google Pay, mobile Wallets for payment transfer;
? Content creator account dashboard with the amount paid details;
? Total payment made as per particular duration and on the Loyalty, Points accumulated by the Content Creator.
One of the preferred embodiments of the said Face-Off System is provided with a dedicated module for controlling and regulating the integration with third party content providers/news sites at designated news section, preferably as the mobile app through API. Third party news site has to give access to API stack.
One of the preferred embodiments of the said Face-Off System is also provided with following features:-
? Administrator of the Face-Off System can create new categories of News and Opinion and also edit the existing ones;
? Administrator of the Face-Off System can create tagging criteria and parameters;
? Administrator of the Face-Off System can create new brands and services for tagging;
? Each category of news or opinion or groups of opinion will have different tagging/connecting parameters and they will be arranged in templates;
17
? Administrator will be able to extract information from the tagging parameters used by users during voicing their opinion or viewing news contents;
? Administrator will be able to gather data on the viewership statistics of the Content Creators and their individual contents;
? Backend category creation for notifications and their management.
Following features can optionally be implemented with SlightEngine Moderation API and Deep AI:-
? Image Moderation - Detection and filtering of unwanted images
? Video Moderation Detection and Removal of:
? adult content such as no weapon, no alcohol, no drug, no gore content;
? Offensive Contents
? Face attributes with single face, no minor, no sunglasses
? Selection or deselection of particular type of colour;
? Celebrity - No celebrity detection;
? Image property selection or deselection such as blurry, dark etc.
? Text Moderation - detect and filter unwanted text-based content
? Nudity detection with deep AI.
The digital platform of the said Face-Off System has certain provisions for the users,namely:-
? After the user logs in to the Face-Off system, he/she will have the option of either selecting Opinions or News through a toggle switch;
? After selecting the opinions option, the user will be able to develop either video contentsor textural contents;
? The Content creator page, apart from the Video Contents, will also have Textural contents and ratings assigned by the content creator against particular products or services etc. The category of items where a content creator can put his opinion can be managed from Face-Off Backend. There will be a limit on the number of characters in the textual contents that can be uploaded on the Face-Off system by the user as a single event.
? Any objectionable content in the textual review will be filtered by SlightEngine API.
The textual contents can also be manually moderated apart from the moderation done by Deep AI and SlightEngine API. The view statistics of the textual contents can be checked by the Face-Off backend team in a dashboard. The team will be able to see the MIS on content category wise
18
and Content provider wise. Custom MIS reports and analytics can be designed, as per a business strategy/requirements optionally relating to the Face-Off system herein.
API integration for importing Reviews to Third Party Web Applications and Websites:- Face-Off System will give API access to third parties for importing of reviews. Using the API’s online properties will be able to show their Face-Off reviews. The Face-Off System is so designed that it is provided with the feature of API access structure as well as optional feature of Plugin/Widget for easy import of reviews. In the review a thumbnail of an image of the registered Face-Off user and reviewer will be there, along with his text review (Figure 7).
Towards designing the architecture of the said Face-Off System and its user friendly features, the most preferred embodiment of the instant Face-Off System also involves a similar architechture, that is available in AWS for video on Demand Application (VOD). The same architecture is replicated in non-AWS environment. The architecture diagram in Figure 8 highlights how the system will be hosted in cloud with all the components working in tandem. The Application Stack will contain a secure and scalable PHP, React Native application fully redundant using Auto scaling. In the front using Load Balancer and, in the background, integrated with apache 2.4.38 and php7.4. In the Database using MySQL Replication across multiple-Regions.
For the Code Resease GitHub is used for Cloud Security, as indicated in Figure 8. Service Quantity Dimensions
Server
1
V-Core 4, RAM -16 GB, Storage -1 TB, Bandwidth – 1 TB
CDN
NA
1,000 concurrent users would cost approximately:
Backup Storage
1 TB
1000 Users
Notifications – SMS, Email
NA
1000 Users
Public IP
1
NA
Firewall
1
Included With Server Infra
19
The Faceoff portal will be a custom CMS built on PHP, MySQL & React Native. The portal will consist of various sections for News from Faceoff Own Journalism Team and also from Third Party News sites.
The News Module will have:
? Categories
? Multiple Sections
The Portal will have the section of Opinion where Videos will be stored. Those videos will be the Faceoff Videos captured from Mobile Apps. The Faceoff platform will import the videos from the Storage of the System’s Server referred in Figure 8.
It will also highlight the Text Reviews as indicated and discussed relating Figure 7. The System’s digital platform will use the Hosting infrastructure as mentioned hereinabove, using Figure 8.
Apart from the News Module the other sections that will be available are:
? Newsletters
? Advertisement Banners
? Community Connect – In the community Connect section there will be Bulk Upload section for putting up Bulk Data with respect to:
? CXO’s of India
? VARs of India
? Portal Access Features (Login /Logoff)
Technology Stack to Be Used in the most preferred embodiment of the System for the Face-Off Video Opinion Management:
Module Technology
Camera Module
Custom built from Envato Marketplace
RAW Source Code
React Native
Mobile App
20
MySQL
Database
React, CakePHP
Web Portal, CMS Development
Sign on, Access control, Social Login
Okta
Ad Management
Revive Ad Server, Kevel
Image Moderation
SlightEngine, DeepAI
Cloud
ESDS, Tata Cloud
CDN
Tata Cloud, ESDS
Reporting
Google Firebase
The key architectural aspects for the Portal/Website & Mobile App solution that would be deployed at Faceoff Cloud Servers are as under: Acets Description
Integration Approach
Integration is key to enabling seamless End to End Business Process Fulfilment. The Integration Architecture should enable complete integrity of data across all systems and also enable single view of customer.
Flexibility
The system can support introduction of new products and services with minimal configuration/customization effort. The layered architecture allows easier maintenance and support in future.
Calability
The system can support increasing volumes of customer data and users.
Configurable
The system’s key components can be extended and re-used even with the increasing scope of the system without a compromise on maintenance.
Component Based
Component-based architecture is built using some of the best-of-the-breed applications to meet end-to-end business functionality.
Open Standards
The system is built using open standards.
Data Integrity
The data is managed consistency and with integrity across the system – avoiding master data duplications.
21
Provisions of Security Standards, optionally selected towards effective operations of theinstant System for the Face-off Video Opinion Management:
Requirement Analysis & Threat Modelling
The first step is to Identify Regulatory and Compliance Assumptions: This could vary from country to country and domain to domain. The requirements specifications of the intended product need to be studied and co-related with country specific regulatory requirements /ICT security guidelines, standards and policies.
The next step is to Identify Risks, Threats and Create Threat Modelling: Categorization the application into high/low risk depends on the application placement, exposure to Internal and external networks, user volumes and business criticality. Based on the application risk factors, the application shall undergo security checks. The application architecture, data storage, retrieval and programming technology need to be studied and all known threats need to be listed down for analysis. With this, a threat model document (threat profile) captures the security strength of a system. It identifies threats and vulnerabilities and helps in providing a more accurate sense of security of the system.
Design Review
Application security requirements should not be limited to functional requirements, but should also be developed as part of the technical requirements. Technical requirements define the features of the system that are not user defined. This includes requirements such as server configuration, capacity, performance, scalability, and security. Technical requirements that define application-level security should focus on items that will help protect the application from intrusive forms of attacks.
Update Regulatory and Compliance Assumptions:
Update the regulatory ICT security guidelines, standards, policies and compliance assumptions and document them in the functional design document.
Data classification:
Data classification is a crucial step. Based on the sensitivity of data being collected, stored and transmitted, the data should be classified based on the client’s requirements. The results determine to what extent the data needs to be secured.
22
Interfaces:
This section identifies the boundary where the control is transferred to or from the external system. Also identifies areas where extra security controls need to be put in place. This can also provide and take inputs from the threat modelling document.
Security Patterns:
Security patterns are like design patterns that are applied toward information security. These patterns encapsulate security expertise in the form of identified solutions and present issues and trade-offs in the usage of the pattern. Architects might want to look at these patterns to see if they can use some of the existing solutions, saving time and effort.
Data Backup Strategies:
It is important to capture the data backup strategies in the design phase. But if this will be taken care by the client’s overall Backup policy, probably we can add it here with the exception. Otherwise, for example, frequency of data backup, details of backup media, access privileges to the backup and whether the backup be encrypted. These points will help maintain the confidentiality, availability and integrity of the data.
Data Transmission Strategies:
This is where we capture details around the data transmission. Depending on the data classification, should the data be encrypted during transmission? Is the data being decrypted and re-encrypted at any point? If yes, then what kinds of security controls are in place at that point? Is the customer critical information partially masked? This will prevent the data from being stolen in most kinds of attacks.
Data Storage Security Requirements:
These are influenced by the type of data. Names and addresses can be stored in clear text, but sensitive data should be encrypted in the database. Data required for authentication should be given more thought, such as applying one-way encryption.
Authentication Strategy:
This is a critical step, as this is the entry point of the system. If this is compromised, the attacker will have unauthorized entry into the system and can do a lot of harm. Some of the things to consider are strong password policy, two-factor authentication for critical features input
23
validation strategies, account inactivity period, account locking, password retrieval mechanism, and a username/password storage strategy.
Session Management Strategy:
Some of the things that need to be identified are details around the session creation:
? Session ID should be stored in a secure cookie
? Session ID should be encrypted
? Cookie should expire when the session is invalidated or the browser is closed
? Application should force the browser to be closed when the user logs out or session is invalidated.
These details should be captured in the design phase and should be documented in the design document.
Error Handling:
In most cases, a standard error page should be displayed in any error situation. The application should trap all the system errors (such as missing configuration file, ODBC error, database not working, etc.) or application errors (such as invalid username/password) and redirect them to one standard error page. Ideally, the list of possible error situations and the corresponding error messages should be identified, and a generic error message for unknown or unidentified errors with
no technical information should be displayed to the user. Also, an entry in the logs should be created with the time stamp and other relevant information.
Code Review
Adding security to standard coding practices can provide an organization with immediate payback in terms of producing more secure applications. Examples of these practices include:
o Never trust incoming data to the system and apply checks to this data.
o Never rely on the client to store sensitive data no matter how trivial.
o Error messages must be generic to the user but documented for support purposes.
o Use object inheritance, encapsulation, and polymorphism wherever possible.
o Use environment variables prudently and always check boundaries and buffers.
24
Once secure coding practices are established, they must be enforced. The primary method is the code walkthrough, where some one reviews code written by another person. The reviewer generally audits the code from the perspective of security to ensure it conforms to the organization’s generally accepted coding standards. Code that does not conform to the security standards must be corrected before it is passed into the testing cycle.
Guidelines for known threats are published in OWASP (Open Web Application Security Project) website to help the developers to understand the known threats.
Vulnerability Assessment
Review Infrastructure Security Best Practices Prior to Pen Testing: The document prepared during the design phase should be enforced in the QA environment before pen testing. Pen testing should be done on the system that will simulate the production environment.
Code review for secure coding guidelines:
Whereas most organizations already conduct code review, reviewing the code for secure coding guidelines is not always adequately emphasized. This can lead to vulnerabilities in the code that can be exploited by attackers. There are some automated tools available in the market to do a security code review described in the earlier section.
Vulnerability assessment/pen testing/ethical hack:
It helps identify a lot of security vulnerabilities applications before putting them into production. Faceoff Management can leverage this testing to strengthen the application.
Encryption testing:
There is no point using encryption if it is not secure enough. With tools such as rainbow tables, it is becoming relatively easier to break encryption. Hence, the companies should test for the strength of the encryption being used. Secure key management is equally important. Encryption testing is time-consuming and resource intensive exercise.
Test cases targeting security:
This can be derived from misuse cases, as these test cases will test how a system should not behave. These test cases should be run against the application in QA environment to ensure the implementation of misuse cases.
25
Establishing patterns in logs and audit trail review:
Some attack testing should be done in order to test if a pattern can be established from the logs in the QA environment. This will help determine and capture information on attacks in your production environment.
Maintenance & Audit Trail
Any applications especially Web Applications by their nature shall not be static. Content gets altered and new features are added, in some instances on a continual basis. Each time the Web application is changed, a risk is imposed that the application will not be secure. Even the simplest of changes could produce a vulnerability that could pose a major threat to the assets of the company or, just as important, information about a company’s customers. Therefore, by including the proper security checks and balances in all aspects of the development process and maintaining a constant mindset toward security, a development organization minimizes its risk of deploying applications with security vulnerabilities.
Still, security vulnerabilities may creep into an application even in the most secure organizations. To mitigate this risk, periodic random penetration testing and scanning through audit trails should be conducted against the Web& Mobile application cloud server.
It will be apparent to those skilled in the art that various modifications and variations can be made in the scheme(s), programming of various software based instructions involved, modules provisioned for data analysis and transmission/storage involved, or other possible arrangements and rearrangements within the present invention, without departing from the spirit or scope of the invention. Thus, it is intended that the present invention covers the modifications and variations of this invention provided they come within the scope of the description, illustrations, drawings, appended claims and their equivalents.
We Claims :
A system for face-off video opinion management (also referred herein below as ‘Face-Off system’)for creating, transferring/sending and managing videos on a digital platform involving publically used wired/wireless internet or telecommunication network; wherein said system involves sender device (or 1st user device) namely 3D Camera (on PC, tablet with inbuilt 3D camera), receiver devices (or 2nd user devices) namely AR Glasses, 5G phone, light weight App etc. and the backend devices& service provides namely compression pipeline (5G SA network, Network slicing, Edge computing);
and
the said system is characterized in its digital platform on user gadgets present in internet or telecommunication network, including computers and smart phones; said system provides an effective means to the users towards creating their opinion, preferably in the form of video contents, and making it available in the network of said system or for circulating it to the other users.
2. The System For Face-Off Video Opinion Management, as claimed in claim 1, wherein the system is for creating, transferring/sending and managing videos, preferably in real-time using the state-of-the-art user-devices, backend devices and publically used wired/wireless internet or telecommunication network; this system involves:-
? 1st User devices (sender device), provisioned for digital authentication in the network of the instant invented system; wherein this 1st user device is the real-time video making and transmitting device;
? Backend devices, equipped with digital/software based mechanisms for processing the data/video sent by the 1st user device towards analyzing, storing, managing and transmitting to the other user devices (2nd user device(s)), present in the wired/wireless network of the publically used internet or telecommunication network, preferably the fifth generation (5G) mobile network; and
? 2nd user device(s) (or receiver device(s)), provisioned to receive the video communication, preferably in real time, sent by the 1st user device (sender device), duly processed by the Backend device.
3. The System For Face-Off Video Opinion Management, as claimed in claim 1, wherein it is provisioned to enable the 1stuser (sender device) to capture, store and analyse opinion
27
videos of products from users and influencers by category and automate the entire process of products and service opinion management using AI, which in turn will help the original equipment manufacturers (OEMs) and Service Provides to better market their products and service lines.
4. The System For Face-Off Video Opinion Management, as claimed in claim 1, involving a digital platform on internet/telecommunication network connected gadgets including computer and smart phone; wherein said system will provide an effective means to the users towards making their opinion and making it available or for circulating it to the other users.
5. The System For Face-Off Video Opinion Management, as claimed in claim 1, wherein the most preferred embodiment of the System For Face-Off Video Opinion Management comprises 5G mobile network based holographic communication, whereby it is provisioned for real time capturing of videos, encoding, transporting and rendering of 3D representations of Opinion Presenters, anchored in space, stereoscopic images or 3D videos in extended reality (XR) headsets that will deliver a visual effect similar to a hologram.
6. The System For Face-Off Video Opinion Management, as claimed in claim 1, wherein said system comprising of a novel configuration of a server, database and control module, involving internet and AI based mechanism, provisioned for handling contents created and transmitted from/to the wire/wirelessly connected user devices, particularly by way of receiving, analysing, categorizing, storing and transmitting video contents in real time or in future time.
7. The System For Face-Off Video Opinion Management, as claimed in claim 1, wherein said system is designed with such a backend administrator mechanism which monitors, reviews and filters the inflowing contents, created by the users of said system for face-off opinion management.
8. The System For Face-Off Video Opinion Management, as claimed in claim 1, whereinthe architecture of the said Face-Off System is supports holographic communication, asdepicted in the figure 1, wherein:-
? the capturing sensors provide a real-time representation of the human face and body. Format conversion and filtering is applied before encoding to reduce the bit rate requirements on the network;
28
? the compressed hologram is transmitted to an XR device over a low latency reliable transport network such as 5G. On the XR device, the compressed hologram is decoded and processed before rendering in the consumer environment;
? the rendering engine considers positioning and semantic information of the device and the rendered scene. The virtual human representation is displayed on the XR device.
9. Method for operating the said System For Face-Off Video Opinion Management, as claimed in claim 1, which includes the followings:
? Holographic capturing is the process of creating a measurable 3D representation of an object, person or environment. This process is divided into four steps:
? Acquisition
? Depth estimation
? Data fusion
? Post-processing.
? The acquisition step makes use of visual sensors to capture a volume of interest. Here it is preferred to use LiDAR sensor-based cameras for Acquisition/3D capturing.
? In the depth estimation step, sensor streams are used to compute depth. LiDAR sensors provide depth information directly, while stereo cameras and multi-camera systems estimate depth by capturing the person from different angles.
? In the data fusion step, the depth information or depth map from different perspectives is fused into a single stream of 3D points by matching key points and calculating the optimal geometric transformation from the different views.
? The post-processing step reduces the data size of the stream of 3D points by cleaning up redundant points, noise and outliers. The resulting 3D representation can be delivered in various visual media formats such as point clouds or meshes.
? Rendering and display:Rendering is the process of generating an image of a scene or a model from a given viewpoint using computations. A scene is a container object describing a volume and its contents. Sources are objects located in the scene to be rendered. A camera is an instance that renders the viewpoint and consists of a location, focus, orientation and resolution.
? Engines render the content based on rendering pipelines. The rendering pipelines take care of culling, rendering and post-processing. There are several types of pipelines with different capabilities and performance characteristics that are suitable
29
for different applications and platforms. A general- purpose render pipeline is optimized to process graphics across a wide range of platforms, while a high-fidelity graphics pipeline is suitable for high- end platforms.
? Additional techniques and approaches are available to improve the rendering process in various ways, such as enabling faster rendering with better QoE, smoothing squared edges or increasing the quality of objects in a scene. Furthermore, AI algorithms can recreate an object of a scene or create a photorealistic representation such as an avatar. The photorealistic representation contains a model: a visual representation or mesh model and configurations. Configurations are the bones or access points of a model. These points are animated during the rendering process with preloaded animations.
? Real-time data captured from a depth camera takes more computation for rendering compared with an avatar representation. The rendering of all parts of the mesh is needed for every frame for a hologram, compared with rendering a difference for an avatar, such as updating facial expressions like the blinking of an eye on an existing avatar model.
? Split rendering is an approach that offloads rendering capabilities to an edge cloud. The key idea is that the six degrees of freedom position andorientation of the XR device in a scene are tracked, and constant feedback is provided to the edge in real time. The rendering of a 3D scene happens in a cloud. Based on the position of a user, the cloud streams back a 2D video to a scene from the user’s angle. For this approach, an end-user device does not need to have high-end characteristics. However, good QoE in this scenario requires low latency communication between the edge and the device.
? When it is ready, the rendered stream is transmitted to a device with the ability to provide users with a holographic experience. There are four device types: handheld devices (such as smartphones and tablets), holographic displays, AR glasses and virtual reality glasses. Using these devices, it is possible to place a hologram in a room and move around it.
10. The System For Face-Off Video Opinion Management, as claimed in claim 1, wherein said system comprises an effective camera, preferably the LiDAR camera, which enables the Face-Off System towards highly accurate depth sensing in a small form factor; wherein said camera is characterized in at least one of the followings:
30
? Small enough to fit in the palm of user’s hand, the L515 is 61mm in diameter and 26mm in height,
? At approximately 100g, it’s designed to be easily situated on any system, or attached to a tablet or phone;
? It also runs at less than 3.5W, all depth calculations run on the device resulting in true platform independence;
? With a short exposure time of <100ns per depth point, even rapidly moving objects can be captured with minimal motion blur;
? Optimized for indoor lighting, the L515 processes over 23 million depth points per second via a custom-made ASIC;
? The camera has been designed for use case flexibility with the inclusion of an RGB camera and an inertial measurement unit.
? The Camera uses an IR laser, a MEMS, an IR photodiode, an RGB imager, a MEMS controller, and a vison ASIC;
? The MEMS is used to scan the IR laser beam over the entire field-of-view (FOV);
? The L515 vision ASIC will process the data from the reflected beam captured by the photodiode and will output a depth point representing the accurate distance of a specific point in the scene from the camera;
? Aggregation of the depth points will generate a point cloud depth data representing the full scene.
11. The System For Face-Off Video Opinion Management, as claimed in claim 1, wherein said system constructed in such a way that:
? After the sign-up using the digital platform of the said Face-Off system of the present invention, the user will have option to create videos using the Round Red Button therein, as shown in Figure-4.
? The camera module of the user device can be used in the digital platform of the Face-Off system, for both android and IOS.
And
Wherein said Face-Off system provides following optional operational features in its digital platform, to be configured within the internet connected user devices (sender and receiver devices):-
? option for language selection for videos;
31
? option to upload existing videos of certain specific duration, preferably of a length equal to or less than 30 seconds;
? The user is able to tag the video with a particular product or service category or tagging a video to a problem category (product issue, service issue etc.);
? There are search options available for users to tag a created video with a particular product or service category or tagging a video to problem category (product issue, service issue, ideal situations, user friendlyness, etc.);
? There are search options for searching Face-Off videos by different parameters, such as by product, by category or other parameters as required;
? There is provision for flipping videos for using front or back cameras for taking videos;
? There is provision for uploading captured videos;
? The system provides option for sharing videos in social media;
? The system provides an option to the user to report a video;
? There is a provision of comment section in the digital platform, preferably for creating text content by the user;
? The digital platform of the Face-Off system depicts the number of video-views;
? The user will also have the option to select either Face-Off Videos or News;
? once the user selects NEWS OPTION in a toggle button, he or she will be able to view different categories and sub-categories of News.
12. The System For Face-Off Video Opinion Management, as claimed in claim 1, wherein said system comprises devices to be used in or within the user devices, 1st user device (sender device) and 2nd user devices (receiver devices), optionally selected from the followings :-
? Laptop and Desktop;
? Projector;
? Smart Phone;
? Tablet;
? Headphone;
? Smart watch;
? Speakers;
? Printer and Scanner;
32
? Camera;
? Electric Vehicles/EVs
? CCTV;
? UPS;
? Gaming Devices;
? 4G/5G Services;
? Power Bank;
? View related News of a Product or Service.
13. The System For Face-Off Video Opinion Management, as claimed in claim 1, wherein said system has the administrator side of the said Face-Off System (Figure 5(a) and 5(b)), having the customized hardware architechture especialized for effective functioning of this Face-Off System in the internet/telecommunication network, involves several technical features; major aspects of the administrator side of the said Face-Off System are as under:
? Multi Access feature for multiple backend logins according to the tasks allotted to the Face-Off backend by virtue of their task and job profile. Selective or full access can be enabled to individual backend team member as per authorizations allotted to them;
? There will be a Super Admin facility to control all the admin end/backend features and modules with full access;
? The backend team will have users and multiple users, can be put into user teams and groups;
? Password security and Multifactor authentication facility for Admin Users;
? User and Group role setting;
? Access Permissions for Users and Groups;
? Backend Users will have categories such as Moderators, Content Authorizers etc. There will be option to create New Backend User, User Category, User Group, Policies, Authorizations &Roles;
? Secure Sign in using User ID and Password via Okta Cloud based identies Management Platform and their data management by Backend Faceoff team;
33
? Social login/Social Sign-in with supported platforms like Goole, Linkedin, Twitter, Facebook using Okta for end users and their data management by Backend Faceoff team.
14. The System For Face-Off Video Opinion Management, as claimed in claim 1, wherein said system is so provisioned that the moderator will be responsible for approving or disapproving a user content before being made live, Flagging a content based on Objectionable/wrong information, Hate & Harassment, Drug use etc. Comprehensive Flag Management System will inform user about the reason, his/her content has not been uploaded.
15. The System For Face-Off Video Opinion Management, as claimed in claim 1, wherein one of the preferred embodiments of the said Face-Off System is provided with a dedicated module for controlling and regulating the integration with third party content providers/news sites at designated news section, preferably as the mobile app through API; and wherein one of the preferred embodiments of the said Face-Off System is also provided with following features:-
? Administrator of the Face-Off System can create new categories of News and Opinion and also edit the existing ones;
? Administrator of the Face-Off System can create tagging criteria and parameters;
? Administrator of the Face-Off System can create new brands and services for tagging;
? Each category of news or opinion or groups of opinion will have different tagging/connecting parameters and they will be arranged in templates;
? Administrator will be able to extract information from the tagging parameters used by users during voicing their opinion or viewing news contents;
? Administrator will be able to gather data on the viewership statistics of the Content Creators and their individual contents;
? Backend category creation for notifications and their management.
16. The System For Face-Off Video Opinion Management, as claimed in claim 1, wherein said system is optionally implemented with Slight Engine Moderation API and Deep AI:-
? Image Moderation - Detection and filtering of unwanted images
? Video Moderation Detection and Removal of:
34
? adult content such as no weapon, no alcohol, no drug, no gore content;
? Offensive Contents
? Face attributes with single face, no minor, no sunglasses
? Selection or deselection of particular type of colour;
? Celebrity - No celebrity detection;
? Image property selection or deselection such as blurry, dark etc.
? Text Moderation - detect and filter unwanted text-based content
? Nudity detection with deep AI.
17. The System For Face-Off Video Opinion Management, as claimed in claim 1, whereinthe Code Resease GitHub is used in the said Face-Off System for Cloud Security, as indicated in Figure 8 and in the following table: Service Quantity Dimensions Cost Per Month Max
Server
1
V-Core 4, RAM -16 GB, Storage -1 TB, Bandwidth – 1 TB
300 USD
CDN
NA
1,000 concurrent users would cost approximately:
100 USD
Backup Storage
1 TB
1000 Users
100 USD
Notifications – SMS, Email
NA
1000 Users
50 USD
Public IP
1
NA
Vendor Dependent
Firewall
1
Included With Server Infra
Vendor Dependent Total Cost
500 – 600 USD Per Month
18. The System For Face-Off Video Opinion Management, as claimed in claim 1, wherein the architecture of the most preferred embodiment of the said system comprises following charactering features: Module Technology
Camera Module
Custom built from Envato Marketplace
35
RAW Source Code
React Native
Mobile App
MySQL
Database
React, CakePHP
Web Portal, CMS Development
Sign on, Access control, Social Login
Okta
Ad Management
Revive Ad Server, Kevel
Image Moderation
SlightEngine, DeepAI
Cloud
ESDS, Tata Cloud
CDN
Tata Cloud, ESDS
Reporting
Google Firebase
19. The System For Face-Off Video Opinion Management, as claimed in claim 1, wherein said systemcomprises optionally selectedprovisions of Security Standards in the instant System for the Face-off Video Opinion Management:
Requirement Analysis & Threat Modelling
The first step is to Identify Regulatory and Compliance Assumptions: This could vary from country to country and domain to domain. The requirements specifications of the intended product need to be studied and co-related with country specific regulatory requirements /ICT security guidelines, standards and policies.
The next step is to Identify Risks, Threats and Create Threat Modelling: Categorization the application into high/low risk depends on the application placement, exposure to Internal and external networks, user volumes and business criticality. Based on the application risk factors, the application shall undergo security checks. The application architecture, data storage, retrieval and programming technology need to be studied and all known threats need to be listed down for analysis. With this, a threat model document (threat profile) captures the security strength of a system. It identifies threats and vulnerabilities and helps in providing a more accurate sense of security of the system.
Design Review
Application security requirements should not be limited to functional requirements, but should also be developed as part of the technical requirements. Technical requirements
36
define the features of the system that are not user defined. This includes requirements such as server configuration, capacity, performance, scalability, and security. Technical requirements that define application-level security should focus on items that will help protect the application from intrusive forms of attacks.
Update Regulatory and Compliance Assumptions:
Update the regulatory ICT security guidelines, standards, policies and compliance assumptions and document them in the functional design document.
Data classification:
Data classification is a crucial step. Based on the sensitivity of data being collected, stored and transmitted, the data should be classified based on the client’s requirements. The results determine to what extent the data needs to be secured.
Interfaces:
This section identifies the boundary where the control is transferred to or from the external system. Also identifies areas where extra security controls need to be put in place. This can also provide and take inputs from the threat modelling document.
Security Patterns:
Security patterns are like design patterns that are applied toward information security. These patterns encapsulate security expertise in the form of identified solutions and present issues and trade-offs in the usage of the pattern. Architects might want to look at these patterns to see if they can use some of the existing solutions, saving time and effort.
Data Backup Strategies:
It is important to capture the data backup strategies in the design phase. But if this will be taken care by the client’s overall Backup policy, probably we can add it here with the exception. Otherwise, for example, frequency of data backup, details of backup media, access privileges to the backup and whether the backup be encrypted. These points will help maintain the confidentiality, availability and integrity of the data.
Data Transmission Strategies:
This is where we capture details around the data transmission. Depending on the data classification, should the data be encrypted during transmission? Is the data being
37
decrypted and re-encrypted at any point? If yes, then what kinds of security controls are in place at that point? Is the customer critical information partially masked? This will prevent the data from being stolen in most kinds of attacks.
Data Storage Security Requirements:
These are influenced by the type of data. Names and addresses can be stored in clear text, but sensitive data should be encrypted in the database. Data required for authentication should be given more thought, such as applying one-way encryption.
Authentication Strategy:
This is a critical step, as this is the entry point of the system. If this is compromised, the attacker will have unauthorized entry into the system and can do a lot of harm. Some of the things to consider are strong password policy, two-factor authentication for critical features input validation strategies, account inactivity period, account locking, password retrieval mechanism, and a username/password storage strategy.
Session Management Strategy:
Some of the things that need to be identified are details around the session creation:
? Session ID should be stored in a secure cookie
? Session ID should be encrypted
? Cookie should expire when the session is invalidated or the browser is closed
? Application should force the browser to be closed when the user logs out or session is invalidated.
These details should be captured in the design phase and should be documented in the design document.
Error Handling:
In most cases, a standard error page should be displayed in any error situation. The application should trap all the system errors (such as missing configuration file, ODBC error, database not working, etc.) or application errors (such as invalid username/password) and redirect them to one standard error page. Ideally, the list of possible error situations and the corresponding error messages should be identified, and a generic error message for unknown or unidentified errors with
38
no technical information should be displayed to the user. Also, an entry in the logs should be created with the time stamp and other relevant information.
Code Review
Adding security to standard coding practices can provide an organization with immediate payback in terms of producing more secure applications. Examples of these practices include:
o Never trust incoming data to the system and apply checks to this data.
o Never rely on the client to store sensitive data no matter how trivial.
o Error messages must be generic to the user but documented for support purposes.
o Use object inheritance, encapsulation, and polymorphism wherever possible.
o Use environment variables prudently and always check boundaries and buffers.
Once secure coding practices are established, they must be enforced. The primary method is the code walkthrough, where some one reviews code written by another person. The reviewer generally audits the code from the perspective of security to ensure it conforms to the organization’s generally accepted coding standards. Code that does not conform to the security standards must be corrected before it is passed into the testing cycle.
Guidelines for known threats are published in OWASP (Open Web Application Security Project) website to help the developers to understand the known threats.
Vulnerability Assessment
Review Infrastructure Security Best Practices Prior to Pen Testing: The document prepared during the design phase should be enforced in the QA environment before pen testing. Pen testing should be done on the system that will simulate the production environment.
Code review for secure coding guidelines:
Whereas most organizations already conduct code review, reviewing the code for secure coding guidelines is not always adequately emphasized. This can lead to vulnerabilities in the code that can be exploited by attackers. There are some automated tools available in the market to do a security code review described in the earlier section.
39
Vulnerability assessment/pen testing/ethical hack:
It helps identify a lot of security vulnerabilities applications before putting them into production. Faceoff Management can leverage this testing to strengthen the application.
Encryption testing:
There is no point using encryption if it is not secure enough. With tools such as rainbow tables, it is becoming relatively easier to break encryption. Hence, the companies should test for the strength of the encryption being used. Secure key management is equally important. Encryption testing is time-consuming and resource intensive exercise.
Test cases targeting security:
This can be derived from misuse cases, as these test cases will test how a system should not behave. These test cases should be run against the application in QA environment to ensure the implementation of misuse cases.
Establishing patterns in logs and audit trail review:
Some attack testing should be done in order to test if a pattern can be established from the logs in the QA environment. This will help determine and capture information on attacks in your production environment.
Maintenance & Audit Trail
Any applications especially Web Applications by their nature shall not be static. Content gets altered and new features are added, in some instances on a continual basis. Each time the Web application is changed, a risk is imposed that the application will not be secure. Even the simplest of changes could produce a vulnerability that could pose a major threat to the assets of the company or, just as important, information about a company’s customers. Therefore, by including the proper security checks and balances in all aspects of the development process and maintaining a constant mindset toward security, a development organization minimizes its risk of deploying applications with security vulnerabilities.
| # | Name | Date |
|---|---|---|
| 1 | 202211065158-STATEMENT OF UNDERTAKING (FORM 3) [14-11-2022(online)].pdf | 2022-11-14 |
| 2 | 202211065158-POWER OF AUTHORITY [14-11-2022(online)].pdf | 2022-11-14 |
| 3 | 202211065158-FORM 1 [14-11-2022(online)].pdf | 2022-11-14 |
| 4 | 202211065158-FIGURE OF ABSTRACT [14-11-2022(online)].pdf | 2022-11-14 |
| 5 | 202211065158-DRAWINGS [14-11-2022(online)].pdf | 2022-11-14 |
| 6 | 202211065158-DECLARATION OF INVENTORSHIP (FORM 5) [14-11-2022(online)].pdf | 2022-11-14 |
| 7 | 202211065158-COMPLETE SPECIFICATION [14-11-2022(online)].pdf | 2022-11-14 |
| 8 | 202211065158-Others-231122.pdf | 2022-12-08 |
| 9 | 202211065158-GPA-231122.pdf | 2022-12-08 |
| 10 | 202211065158-Correspondence-231122.pdf | 2022-12-08 |
| 11 | 202211065158-FORM-9 [24-02-2023(online)].pdf | 2023-02-24 |
| 12 | 202211065158-FORM 18 [24-02-2023(online)].pdf | 2023-02-24 |
| 13 | 202211065158-Covering Letter [03-05-2023(online)].pdf | 2023-05-03 |
| 14 | 202211065158-FORM 18A [16-05-2023(online)].pdf | 2023-05-16 |
| 15 | 202211065158-FER.pdf | 2023-06-16 |
| 16 | 202211065158-OTHERS [31-12-2023(online)].pdf | 2023-12-31 |
| 17 | 202211065158-FER_SER_REPLY [31-12-2023(online)].pdf | 2023-12-31 |
| 18 | 202211065158-CORRESPONDENCE [31-12-2023(online)].pdf | 2023-12-31 |
| 19 | 202211065158-CLAIMS [31-12-2023(online)].pdf | 2023-12-31 |
| 20 | 202211065158-US(14)-HearingNotice-(HearingDate-01-04-2024).pdf | 2024-03-21 |
| 21 | 202211065158-Correspondence to notify the Controller [28-03-2024(online)].pdf | 2024-03-28 |
| 22 | 202211065158-REQUEST FOR ADJOURNMENT OF HEARING UNDER RULE 129A [01-04-2024(online)].pdf | 2024-04-01 |
| 23 | 202211065158-US(14)-ExtendedHearingNotice-(HearingDate-01-05-2024).pdf | 2024-04-02 |
| 24 | 202211065158-REQUEST FOR ADJOURNMENT OF HEARING UNDER RULE 129A [02-05-2024(online)].pdf | 2024-05-02 |
| 25 | 202211065158-US(14)-ExtendedHearingNotice-(HearingDate-29-05-2024).pdf | 2024-05-20 |
| 26 | 202211065158-Correspondence to notify the Controller [27-05-2024(online)].pdf | 2024-05-27 |
| 27 | 202211065158-Written submissions and relevant documents [13-06-2024(online)].pdf | 2024-06-13 |
| 28 | 202211065158-Retyped Pages under Rule 14(1) [13-06-2024(online)].pdf | 2024-06-13 |
| 29 | 202211065158-Annexure [13-06-2024(online)].pdf | 2024-06-13 |
| 30 | 202211065158-2. Marked Copy under Rule 14(2) [13-06-2024(online)].pdf | 2024-06-13 |
| 31 | 202211065158-US(14)-ExtendedHearingNotice-(HearingDate-04-09-2024)-1030.pdf | 2024-08-01 |
| 32 | 202211065158-Correspondence to notify the Controller [29-08-2024(online)].pdf | 2024-08-29 |
| 33 | 202211065158-Written submissions and relevant documents [19-09-2024(online)].pdf | 2024-09-19 |
| 34 | 202211065158-Retyped Pages under Rule 14(1) [19-09-2024(online)].pdf | 2024-09-19 |
| 35 | 202211065158-PETITION UNDER RULE 137 [19-09-2024(online)].pdf | 2024-09-19 |
| 36 | 202211065158-Annexure [19-09-2024(online)].pdf | 2024-09-19 |
| 37 | 202211065158-2. Marked Copy under Rule 14(2) [19-09-2024(online)].pdf | 2024-09-19 |
| 38 | 202211065158-US(14)-ExtendedHearingNotice-(HearingDate-18-11-2024)-1130.pdf | 2024-10-14 |
| 39 | 202211065158-Correspondence to notify the Controller [15-11-2024(online)].pdf | 2024-11-15 |
| 40 | 202211065158-Written submissions and relevant documents [02-12-2024(online)].pdf | 2024-12-02 |
| 41 | 202211065158-Annexure [02-12-2024(online)].pdf | 2024-12-02 |
| 42 | 202211065158-RELEVANT DOCUMENTS [03-12-2024(online)].pdf | 2024-12-03 |
| 43 | 202211065158-POA [03-12-2024(online)].pdf | 2024-12-03 |
| 44 | 202211065158-MARKED COPIES OF AMENDEMENTS [03-12-2024(online)].pdf | 2024-12-03 |
| 45 | 202211065158-FORM 13 [03-12-2024(online)].pdf | 2024-12-03 |
| 46 | 202211065158-AMMENDED DOCUMENTS [03-12-2024(online)].pdf | 2024-12-03 |
| 47 | 202211065158-PatentCertificate20-12-2024.pdf | 2024-12-20 |
| 48 | 202211065158-IntimationOfGrant20-12-2024.pdf | 2024-12-20 |
| 1 | SearchHistoryE_07-06-2023.pdf |