Patent classifications
G06F2221/2135
METHOD AND APPARATUS TO ENABLE A MARKET IN USED DIGITAL CONTENT
Methods and apparatus to enable a distinction between “new” and “used” digital content and to enable a market in used digital content files between mobile phone terminals and an electronic store, securely, by means of a wireless telephony network and a server complex to handle contents right management, transaction reporting, inventory, content delivery, payment, and billing. A server receives a signal generated by a wireless user device that was sent over a wireless telephony network. The signal indicates an election for returning at least one previously purchased digital content item. The server deletes user rights for the at least one digital content item identified by the received signal and sends information to the user device that generated the signal. Access to the associated digital content item at the user device is removed according to the sent information.
DISTINGUISHING VERTICAL BRUTE FORCE ATTACKS FROM BENIGN ERRORS
Brute force attacks on a given account with various password attempts are a common threat to computer security. When a suspected brute force on an account is detected, systems may lock the account from access, which is frustrating to users and time consuming for administrators in the event of a false positive. To reduce the number of false positives, brute force counterattacks are taught in the present disclosure. A brute force counterattack is used to learn whether the login attempts change the passwords attempted, and are to be classified as malicious, or keep the attempted password the same in multiple attempts, and are to be classified as benign.
Generation and use of a modified protected file
Generating a modified protected file is disclosed, including: renaming a primary content object of a protected file; and creating a modified protected file based at least in part by inserting into the protected file a replacement object for the renamed primary content object. Using the modified protected file is disclosed, including: determining that a file includes a renamed primary content object; and redirecting a data access operation to the renamed primary content object.
System and Method for Providing Access to Streaming Multimedia Content to Devices From Servers
A method for delivery of primary media content in digital form is provided. The method includes establishing a communications link between a client computer and a server, where the client computer has storage. The establishing of the communications link includes authorization of user information. The method further includes receiving a request for a media among primary media content accessible to the server. The server associating the request with the user information maintained in a customer database that is accessible to the server. The user information is used to authorize access to specified content from among said primary media content for the user based on the user information in the customer database. The method also determines that the requested media is authorized for use by the user based on the user information. The method then streams the media to the storage of the client computer upon receiving a play request. The media received by streaming is configured for rendering on a display screen. The streaming data is one or more of video data including motion picture content, game data, music data, or combinations of two or more thereof.
METHOD FOR GENERATING AN EVALUATION OF THE ACTIVITIES OF A USER ON A VIRTUAL DOCUMENT
A method for generating an evaluation of a user's activities on a virtual document, includes: (a) providing a server system, having a server memory and server processing unit; (b) providing an electronic device, having a device memory, device processing unit, elements for connecting with the server system, elements for interacting with and allowing a user to create and modify a virtual document;
wherein the device processing unit: (s1) receives information relating the creation or opening of a virtual document; (s2) encrypts the virtual document at subsequent time intervals, to create a plurality of encrypted copies of the virtual documents, each encrypted copy associated with a different time interval; (s3) sends the encrypted copies to the server memory; (s4) interrupts steps (s2) and (s3) when the virtual document is closed; the server processing unit (s4) compares the encrypted copies; and (s5) generates a report containing the evaluation of the user's activities.
Content delivery apparatus, user terminal device, relief management method and computer program
A content delivery apparatus, when a content delivery request is outputted from a user terminal device, encrypts the requested content with an encryption key, adds a view period to it to deliver it to a request source and delivers a viewing key in response to a view request from the user terminal device within the view period. A user relief management unit monitors failure information notifying, grasps a delivery disabled period from the failure information, specifies a delivery destination user for a content of which the view period is overlapped with the delivery disabled period and issues a relief right with a relief period specified thereto to the specified user. A contract period processing unit manages the relief right and permits viewing within the relief period set by the relief right when a view right based on the relief right is output from the user terminal device.
Image forming apparatus and authentication method
An image forming apparatus including applications and system side software for providing system side services to the applications is provided, in which the image forming apparatus includes: an authentication module for displaying an authentication screen on an operation panel of the image forming apparatus, wherein the authentication module allows the image forming apparatus to display a screen for using the image forming apparatus instead of the authentication screen if authentication data input from the authentication screen satisfies an authentication condition, and wherein the authentication module is provided in the image forming apparatus separately from the system side software.
Non-resident metering and billing system for applications and devices
A licensing envelope provides use of an application or device on a metered basis. The licensing envelope can be used with or without a connection to a computer network. In one embodiment, an application is provided with a dynamically linked library for the licensing envelope. The dynamically linked library verifies that access is enabled and calls a local licensing server when the application is opened. The local licensing server connects to and transfers data to a remote licensing server on a periodic basis. The remote licensing server can provide authorization codes for additional use of the application, bill the user, and forward payment to the application vendor.
SYSTEM AND METHOD FOR PROTECTING A DEVICE AGAINST ATTACKS ON PROCESSING FLOW USING A CODE POINTER COMPLEMENT
A system, method and computer-readable storage medium with instructions for operating a processor of an electronic device to protect against unauthorized manipulation of the code pointer by maintaining and updating a code pointer complement against which the code pointer may be verified. Other systems and methods are disclosed.
METHOD AND DEVICE FOR VERIFYING A TRUSTED TERMINAL
Embodiments of the disclosure provide a method for verifying a trusted terminal, including: determining whether a login terminal of a user matches the trusted terminal of the user recorded locally; determining, when it is determined that the login terminal does not match the trusted terminal of the user recorded locally, whether a login account of the user is associated with a frequent-use login account of the login terminal; and determining that the login terminal is the trusted terminal of the user if Yes. By means of solutions of the disclosure, in an application scenario of a login terminal being exchanged between users, repetitively performing complicated verifying on the login terminal may be avoided.