G06F21/12

PACKAGE DISTRIBUTION AND INSTALLATION IN RESPONSE TO USER LOGON

Disclosed are various implementations for distributing and installing packages in response to user logon events. A logon event associated with a user account is detected for a client device. A query containing a respective user account identifier is sent to a provisioning service to retrieve a set of packages to install on the client device. The set of packages are received from the provisioning service and installed on the client device.

MUSIC AND DIGITAL RIGHTS MANAGEMENT SYSTEMS AND METHODS

A method and associated system for matching and delivering digital work metadata to one or more digital service providers including modifying one or more digital work metadata files, which includes removing non-critical data or segment-erroneous data or performing a language translation; reformatting the one or more digital work metadata files for compatibility with a transformer model-based AI matching operation; performing a block grouping operation on the one or more digital work metadata files, where data associated with the one or more digital work metadata files is grouped in blocks and analyzed for one or more pairs of data records; performing the transformer model-based AI matching operation to determine whether each pair of the one or more pairs of data records comprise a matching pair of data records; and transmitting output data from the transformer model-based artificial intelligence matching operation to the one or more digital service providers.

MUSIC AND DIGITAL RIGHTS MANAGEMENT SYSTEMS AND METHODS

A method and associated system for matching and delivering digital work metadata to one or more digital service providers including modifying one or more digital work metadata files, which includes removing non-critical data or segment-erroneous data or performing a language translation; reformatting the one or more digital work metadata files for compatibility with a transformer model-based AI matching operation; performing a block grouping operation on the one or more digital work metadata files, where data associated with the one or more digital work metadata files is grouped in blocks and analyzed for one or more pairs of data records; performing the transformer model-based AI matching operation to determine whether each pair of the one or more pairs of data records comprise a matching pair of data records; and transmitting output data from the transformer model-based artificial intelligence matching operation to the one or more digital service providers.

License authentication device and license authentication method
11568027 · 2023-01-31 · ·

A license authentication device includes a memory that stores a license file including a license expiration date of an application that adjusts a parameter of a semiconductor manufacturing apparatus in a semiconductor factory; and a processor coupled to the memory. The processor acquires log data when the semiconductor manufacturing apparatus executes a processing; and determines whether or not a time included in the log data has passed the license expiration date stored in the license information storage.

License authentication device and license authentication method
11568027 · 2023-01-31 · ·

A license authentication device includes a memory that stores a license file including a license expiration date of an application that adjusts a parameter of a semiconductor manufacturing apparatus in a semiconductor factory; and a processor coupled to the memory. The processor acquires log data when the semiconductor manufacturing apparatus executes a processing; and determines whether or not a time included in the log data has passed the license expiration date stored in the license information storage.

Secure cloud-based system, and security application distribution method to be automatically executed therein

Described are various embodiments of a secure cloud-based system. In one such embodiment, the secure cloud-based system includes a distribution of digital network processing resources and a central digital processing environment. The central processing environment includes a secure network interface to each of said digital processing resources; a digital hardware processor; and a deployment engine operable to serially deploy a unique ephemeral machine executable code instance, via said secure network interface, to a given one of said digital processing resources to be executed thereon for a predetermined runtime period, wherein execution of each said unique ephemeral machine executable code instance is automatically terminated after said predetermined runtime period to be operatively replaced by a subsequent unique ephemeral machine executable code instance.

OPERATING SYSTEM-LEVEL ASSISTIVE FEATURES FOR CONTEXTUAL PRIVACY

Systems and methods are described that include operations such as detecting a plurality of computing devices configured as a distributed ambient computing system, receiving a request to execute a computing task, obtaining, from the distributed ambient computing system, data representing a device context for at least two of the plurality of devices, generating a combined context corresponding to the distributed ambient computing system, the combined context representing a combination of the device context for the at least two devices, generating and providing at least one decision request based on the computing task and the combined context, receiving a response to the at least one decision request, and triggering execution of the computing task based on the response and the combined context.

System for advanced protection of consumable or detachable elements
11701893 · 2023-07-18 · ·

A method of authenticating a consumable or detachable element of a continuous inkjet printer comprising: the controller of the printer generating a 1.sup.st item of random information that is dispatched to an authentication circuit of the element; encrypting the 1.sup.st item of information by the authentication circuit using a 1.sup.st encryption algorithm and a 1.sup.st secret key to form a 1.sup.st item of encrypted random information; dispatching the 1.sup.st item of information to the controller; encrypting the 1.sup.st item of information by the controller using a 2.sup.nd encryption algorithm and a 2.sup.nd secret key to form a 2.sup.nd item of encrypted random information; comparing the 1.sup.st item of encrypted random information with the 2.sup.nd encrypted item of random information to authenticate the consumable element; and if the consumable element is authenticated, dispatching at least one part of a 3.sup.rd key, termed the shared key, by the element to the printer.

System for advanced protection of consumable or detachable elements
11701893 · 2023-07-18 · ·

A method of authenticating a consumable or detachable element of a continuous inkjet printer comprising: the controller of the printer generating a 1.sup.st item of random information that is dispatched to an authentication circuit of the element; encrypting the 1.sup.st item of information by the authentication circuit using a 1.sup.st encryption algorithm and a 1.sup.st secret key to form a 1.sup.st item of encrypted random information; dispatching the 1.sup.st item of information to the controller; encrypting the 1.sup.st item of information by the controller using a 2.sup.nd encryption algorithm and a 2.sup.nd secret key to form a 2.sup.nd item of encrypted random information; comparing the 1.sup.st item of encrypted random information with the 2.sup.nd encrypted item of random information to authenticate the consumable element; and if the consumable element is authenticated, dispatching at least one part of a 3.sup.rd key, termed the shared key, by the element to the printer.

Controlling access to digital assets
11704389 · 2023-07-18 ·

The apparatus disclosed herein, in various aspects, includes a digital asset, and an amulet that comprises an encrypted self-validating string. The amulet may be external to the digital asset. The apparatus may include a manager that cooperates securely with the digital asset and cooperates securely with the amulet to control access to the digital asset as specified by the amulet. In some aspects, the manager cooperates with the digital asset and with the amulet, at least in part, through shared memory in process space. In other aspects, the manager cooperates with the digital asset and with the amulet, at least in part, through a RAM drive in memory, the RAM drive at least partially hidden from an operating system of the computer. In yet other aspects, the manager cooperates with the digital asset and with the amulet, at least in part, through a virtual machine accessible only by said apparatus. The amulet, the manager, and the digital asset are either operably receivable by a computer or are operably received by the computer, in various aspects. Related methods and compositions of matter are also disclosed.