G06F21/105

Methods and systems for the reservation and registration of internet of things device licenses from authorized licenses associated with vendor software

Novel tools and techniques for an IoT shell are provided. A system includes an internet of things (IoT) device, a database, and a license manager. The database may include one or more sets of authorized licenses, each set of authorized licenses associated with a respective vendor software. The license manager may be in communication with the IoT device and the database, and further include a processor and a non-transitory computer readable medium comprising instructions executable by the processor. The license manager may be configured to receive a request to reserve a license for a first vendor software, determine an availability of the license associated with the first vendor software, register a unique identifier of the IoT device in association with the license, and grant the license to the IoT device.

Electronic device, information processing apparatus, information processing method, and information processing system
11693929 · 2023-07-04 · ·

Provided is an electronic device, an information processing apparatus, an information processing method, and an information processing system capable of improving convenience in a case where a floating license is used in an electronic device that does not directly communicate with an information processing apparatus providing the floating license. The information processing apparatus includes a storage control unit that controls a storage unit to store a combination of a device unique key and an installation key, the device unique key being a key unique to an electronic device, and the installation key being a key for installing a license to the electronic device; and a license management unit that updates information regarding a status of the license in a case where a combination of the device unique key corresponding to license return information and the installation key corresponding to installation key information in the license return information coincides with a combination stored in the storage unit, the license return information being information including the installation key information corresponding to the installation key and generated by the electronic device.

Secure count in cloud computing networks

Inducements are provided to customers to regularly connect back to a service provider and report usage that is expressed using a count of requests from a local computing device for cloud-based operations such as packet routing, container instantiation, virtual machine (VM) utilization, calls to a service or application, and the like. The count information is reported within a secure context, such as a trusted execution environment (TEE), using public-private key pair cryptography by which key derivation is dependent on some form of counting. For example, a customer computing device that is subject to a usage license encrypts an operation count and reports it to the service provider.

3D printer and inventory control and distribution system for 3D designs
11693933 · 2023-07-04 · ·

A computer system is configured for digital rights management for distributing and tracking downloadable proprietary source code defining a 3-D object and being usable to print the object on a 3D printer and protect the 3D object data from unauthorized printing. The computer system stores an inventory of proprietary source code corresponding to designs of a plurality of 3D objects, and enables a user to see the inventory of designs of the plurality of 3D objects in an online store, and permits the user to securely purchase use of the source code of a desired 3D object viewed therein. The computer system sends the proprietary source code defining the desired 3D object to a 3D printer, and controls printing of the desired 3D object made by the 3D printer to prevent further use of the source code when the purchased use in completed, using one of three different typologies.

Remote software usage monitoring and entitlement analysis
11693930 · 2023-07-04 · ·

A computational instance of a remote network management platform may execute a remote access call for a license consolidation server. The remote access call may contain instructions for obtaining concurrent license usage statistics from the license consolidation server. In response to obtaining the concurrent license usage statistics, the computational instance may update a software configuration with the concurrent license usage statistics, where the software configuration contains a license rights allocation for the concurrent software application. Based on the concurrent license usage statistics and the license rights allocations, the computational instance may generate a representation of a graphical user interface that contains an overview pane indicating a utilization of the concurrent software application. Then the computational instance may transmit, to a client device, the representation of the graphical user interface.

Vendor software activation using distributed ledger
11693932 · 2023-07-04 · ·

Techniques for managing activation of software, e.g., an operating system, in an information processing system are provided. For example, a method comprises the following steps. A data object is obtained for a system having an un-activated computer program stored thereon. The data object comprises information about the system encrypted by a private value. The method then causes the data object to be securely stored on a distributed ledger for subsequent access during a process to activate the computer program.

SYSTEMS AND METHODS FOR MANAGEMENT OF NON-FUNGIBLE TOKENS AND CORRESPONDING DIGITAL ASSETS

Systems and techniques are described for token device transfer management. A system identifies, in a payload of at least one block of a distributed ledger, a token corresponding to media content. A parameter of the token in the distributed ledger indicates that the token is associated with a first user. The system identifies a device that is associated with the token and the media content. The device is also associated with the first user. The system identifies that the device has been relocated to an area associated with a second user. In response to identifying that the device has been relocated to the area, the system causes the parameter of the token in the distributed ledger to be modified from indicating that the token is associated with the first user to indicating that the token is associated with the second user.

Secure processing systems and methods

This disclosure relates to systems and methods for enabling the use of secret digital or electronic information without exposing the sensitive information to unsecured applications. In certain embodiments, the methods may include invoking, by a client application executing in an open processing domain, a secure abstraction layer configured to interface with secret data protected by a secure processing domain. Secure operations may be securely performed on the secret data by the secure abstraction layer in the secure processing domain based on an invocation from a client application running in the open processing domain.

System for secure provisioning and enforcement of system-on-chip (SOC) features

A system and method are disclosed for provisioning IP features in a system-on-chip. A plurality of identical chips are fabricated, each of which is capable of have a number of features enabled or disabled. As a default, all features are disabled. A production process is later carried out, in which the chip is installed in a greater device. During this process, the manufacturer requests a license the IP owner for enablement of various features. Using secure communications, a license is granted identifying the features to be enabled, and a volume of units permitted to be manufactured. The license information is encrypted using a key already known to the chip, and sent to the manufacturer. The chip receives the license information during provisioning, extracts relevant provisioning information using the key, and a secure processing system provisions the relevant features. Log information is generated to allow the IP owner to verify license compliance.

Configuration of server using stored security elements

In one implementation, a computing device includes a secure storage to store a plurality of security elements, a processor, and a storage medium including instructions. The instructions are executable by the processor to: receive a configuration request for a first server, the configuration request including one or more logical references to security settings of the first server; retrieve, from the secure storage, one or more security elements corresponding to the one or more logical references in the configuration request; and configure an operating system volume for the first server based on the configuration request and the one or more security elements.