Patent classifications
G06F21/12
ANTI-PIRACY PROTECTION SERVICE-BASED SOFTWARE LICENSE MANAGEMENT SYSTEM TO PREVENT USAGE OF UNLICENSED SOFTWARE AFTER THE TRIAL PERIOD
One example method, includes checking, by an intelligent time detector service running on a computing system, a trial period duration of software on the computing system, starting, by the intelligent time detector service, a counter for the software, and the counter is operable to generate a counter value based on a clock of the computing system, storing, by the intelligent time detector service, a counter value of the counter, and decommissioning, by the intelligent time detector service, the software after the trial period has expired.
IN-VEHICLE INFORMATION PROCESSING APPARATUS, PROGRAM EXECUTION RESTRICTION METHOD, AND COMPUTER PROGRAM
Provided are an in-vehicle information processing apparatus, a program execution restriction method and a computer program that can be expected to provide users with an opportunity to fully use the trial version of an application program. An in-vehicle information processing apparatus according to one embodiment is an in-vehicle information processing apparatus to be mounted in a vehicle and for executing a program, the apparatus including a processing unit, whereby the processing unit determines whether the travel distance of the vehicle from when usage of the program is started exceeds a threshold value, and, if it is determined that the travel distance exceeds the threshold value, restricts subsequent execution of the program. The processing unit of the in-vehicle information processing apparatus may acquire the program and information relating to the threshold value from a device provided externally to the vehicle.
Vendor software activation using distributed ledger
Techniques for managing activation of software, e.g., an operating system, in an information processing system are provided. For example, a method comprises the following steps. A data object is obtained for a system having an un-activated computer program stored thereon. The data object comprises information about the system encrypted by a private value. The method then causes the data object to be securely stored on a distributed ledger for subsequent access during a process to activate the computer program.
Vendor software activation using distributed ledger
Techniques for managing activation of software, e.g., an operating system, in an information processing system are provided. For example, a method comprises the following steps. A data object is obtained for a system having an un-activated computer program stored thereon. The data object comprises information about the system encrypted by a private value. The method then causes the data object to be securely stored on a distributed ledger for subsequent access during a process to activate the computer program.
INTER SYSTEM POLICY FEDERATION IN A DATA-DRIVEN SECURE AND SAFE COMPUTING ENVIRONMENT
System and methods for the processing of data in a secure and safe manner are disclosed. Embodiments of such system and methods may ensure the operation of cross compartment policies in a manner that is dependent on the inherent properties of the data being operated on as well as the operations that are performed on that data.
FAIL-SAFE SOFTWARE ACCESS LICENSING CONTROL ON A PER PROJECT BASIS WITHOUT A PRIORI KNOWLEDGE OF PROJECT DETAILS
A request may be received to use a software on a first project. A first set of values may be extracted for a set of features of the first project. A classifier may be used to classify the first project based on the first set of values. It may be determined whether to grant the request to use the software on the first project based on an output of the classifier.
Template-based software discovery and management in virtual desktop infrastructure (VDI) environments
A technique to manage software licensing in an environment that provides virtual desktop infrastructure (VDI). A license manager is configured to receive first information identifying software applications associated with a virtual machine template used in the infrastructure, as well as second information that a user has logged into the VDI from a client device, thereby creating a VDI session. For a particular time period of interest, the license manager calculates software application usage information from the first and second information. Preferably, the software application usage information represents an application count that is based on the user and the client device “pair” when the user has the VDI session during at least some portion of the time period. The software application usage information is provided to one or more other computing systems to take a given action, such as tracking, managing, auditing, enforcing and accounting for software usage in the VDI environment.
Self-management of devices using personal mobile device management
An operating system of a mobile device defines an interface for an MDM to ensure security of the device. A private personal MDM (PPMDM) instead interfaces with the operating systems and one or more enterprise MDMs (EMDM) implement security policies through the PPMDM subject to user control. Data may be flagged as associated with an EMDM based on source or location to enable deletion due to theft or disassociation with an enterprise. Blocks or threat detection according to an EMDM policy may be reported to an EMDM in a non-invasive manner.
Controlling processor instruction execution
Improving execution of application program instructions by receiving code having a security classification, determining that the code is untrusted according to the security classification and inserting instructions for a cache flush associated with executing the code.
Encoding machine-learning models and determining ownership of machine-learning models
Methods, systems, and non-transitory computer readable storage media are disclosed for generating a machine-learning model and encoding ownership information in the machine-learning model. For example, the disclosed system can generate parameters of a machine-learning model utilizing digital content items modified by a filter. The disclosed system can then process digital content items modified by the filter to generate first outputs based on the digital content items being modified by the filter. The disclosed system can also process digital content items unmodified by the filter to generate second outputs based on the digital content items not being modified by the filter. The disclosed system can determine that the second outputs are degraded relative to the first outputs. Accordingly, the disclosed system can determine ownership of the machine-learning model based on detecting that information about the filter is embedded in parameters of the machine-learning model.