G06F21/105

METHOD AND SYSTEM FOR PERMITTING ONE OR MORE FEATURES ON A COMPUTER PROGRAM
20230013780 · 2023-01-19 ·

There is provided a method of permitting one or more features on a computer program. The computer program executing on a hardware with a hardware identifier. The method comprises, at the authentication server, receiving an authentication key indicating authorised features of the computer program, generating a server key based on the hardware identifier and a feature list, and comparing the authentication key with the server key. The method further comprises, at the authentication client, receiving a feature request comprising one or more features to be permitted on the computer program, generating a feature verification message based on the one or more features, and transmitting the feature verification message to the authentication server. The method further comprises, at the authentication server, receiving the feature verification message, verifying that the one or more features are within the feature list, generating a response key if the one more or more features are within the feature list and the authentication key matches the server key, and transmitting the response key to the authentication client. The method further comprises, at the authentication client, receiving the response key, and permitting the one or more features on the computer program.

SYSTEMS AND METHODS FOR ASSET OWNER VERIFICATION IN A DIGITAL ENVIRONMENT
20230222186 · 2023-07-13 ·

Using various embodiments, methods and systems for verification of a digital asset owner in a digital environment are described. In one embodiment, a system is configured to receive a non-fungible token (NFT) associated with a digital asset, the NFT providing proof of ownership of the digital asset through a cryptographic public key and retrieve the digital asset. The system then retrieves a secret pattern from the digital asset, wherein the secret pattern was previously embedded into the digital asset, the secret pattern associated with the cryptographic public key and computes a first identification hash value using a hash function, the hash function receiving a parameter value derived from the secret pattern. The system then receives a second identification hash value and compares the first identification hash value to the second identification hash value. If the first and second identification hash values are identical, then the digital asset is determined to be authentic.

Systems and methods for validating licenses
11698948 · 2023-07-11 · ·

A method for license validation is disclosed herein, including receiving one or more strings of one or more parameters defining a license authorizing access to at least one or more portions of software, generating a first hash based on the one or more parameters defining the license and a key, storing parameters defining the generated first hash, storing the generated first hash, responsive to an element rendering on a web page, determining a version of an application program interface used to generate the first hash and the key used to generate the hash, by interpreting the hash, and integrating the one or more portions of software for use by a user. The one or more portions of software are integrated based on the one or more parameters defining the license embedded in the first hash.

Unified Workspace for Thin, Remote, and SAAS Applications

Application-manager software authenticates a user of a client device over a channel. The authentication operation is performed using a directory service. The application-manager software presents a plurality of applications in a GUI displayed by the client device. The plurality of applications depends on the authentication, the client device, and the channel. And the plurality of applications includes a thin application and a software-as-a-service (SaaS) application. The application-manager software receives a selection as to an application from the user. If the selection is for the SaaS application, the application-manager software provisions the SaaS application. The provision includes automatically logging the user onto an account with a provider of the SaaS application using a single sign-on and connecting the user to the account so that the user can interact with the SaaS application. If the selection is for the thin application, the application manager software launches the thin application.

SECURE PROCESSING SYSTEMS AND METHODS

This disclosure relates to systems and methods for enabling the use of secret digital or electronic information without exposing the sensitive information to unsecured applications. In certain embodiments, the methods may include invoking, by a client application executing in an open processing domain, a secure abstraction layer configured to interface with secret data protected by a secure processing domain. Secure operations may be securely performed on the secret data by the secure abstraction layer in the secure processing domain based on an invocation from a client application running in the open processing domain.

DIGITAL RIGHTS MANAGEMENT FOR HTTP-BASED MEDIA STREAMING
20230214459 · 2023-07-06 ·

Techniques and mechanisms described herein facilitate the management of digital rights for media content item presentation. According to various embodiments, a request for a content decryption key may be received at a media application implemented at a computing device. The request may be transmitted by a media content player implemented at the computing device. The request may be transmitted in accordance with a designated key exchange protocol. A license for an encrypted media content item corresponding with the requested content decryption key may be identified at the media application. Based on information included in the license, encrypted key material may be decrypted to create the requested content decryption key via a processor at the computing device. The requested content decryption key may be provided to the media content player.

Method for managing soft IP licenses on a partially reconfigurable hardware system

A method for managing licenses for soft IP on a partially reconfigurable hardware system, in particular an FPGA, wherein a license manager is provided in the non-configurable part of the hardware system, or is accessible only for the non-configurable part of the hardware system, where the license manager has exclusive access to a non-volatile memory in which license data having a time restriction of the useful life of at least one soft IP is stored, where before activating a particular soft IP, the license manager checks whether the useful life has expired, where the license manager only releases use of the soft IP if the useful life has not yet expired, where the license data is changed using a key, which is stored in a non-volatile memory for license data, and where a new key is stored and the preceding key is deleted when the license data is changed.

Method for controlling execution of an application
11550880 · 2023-01-10 · ·

The invention is a method for controlling execution of an application. The method comprising: installing and activating a software license unit including License terms and a secure repository comprising both an applet and parameters, providing a virtual USB dongle including a command gate, a License validator, a VM controller and a VM engine initially devoid of applet, verifying the License terms and only if the verification of the License terms is successful: loading said applet and parameters to the VM engine and enabling the Command gate, initializing configuration data and secret data in the VM engine by using the parameters stored in the VM engine then exchanging, between the applet and said hardware function driver, USB messages to control execution of said application.

SYSTEM AND PROCESS FOR GENERATING CODE SNIPPETS TO LICENSE DIGITAL CONTENT
20230214461 · 2023-07-06 ·

A method and system for generating code snippets to license content are disclosed. In some embodiments, the method includes acquiring a digital asset in a software-as-a-service (SaaS) interface. The method further includes generating metadata and an access uniform resource locator (URL) for the digital asset. The method additionally includes generating a primary JavaScript object notation (JSON) file to create one or more code snippets in different formats for the digital asset. The method further includes activating an abstraction process to automatically generate a truncated embeddable code snippet after detection of a licensing of the digital asset.

Utilizing machine learning to concurrently optimize computing resources and licenses in a high-performance computing environment

A device may receive a job request that requests performance of one or more operations by resources of a high-performance computing environment, and may process the job request, with a policy execution model trained with policy parameters, to identify policies to apply during execution of the job request. The device may process the job request, with a forecast object model trained with job data and profile data, to generate a forecast of resources and licenses required from the high-performance computing environment. The device may process the job request, other job requests, the one or more of the policies, and the forecast, with a heuristic model, to determine a schedule for the job request, and may process the schedule and current constraints on the resources and the licenses, with a linear programming model, to determine an optimized schedule for the job request.