G06F21/1012

Sheet Music Distribution System

A system that enables digital distribution of copyrighted sheet music—and allows musician to view the copyrighted sheet music on personal computing devices—while preventing the unauthorized distribution of copyrighted sheet music. An electronic commerce platform provides functionality to purchase copies of copyrighted sheet music. A network security module provides login credentials for purchasers and musicians (and, in some embodiments, limits the number of simultaneous logins). A graphical user interface provides functionality for each purchaser to distribute each purchased copy to one—and only one—musician. In some embodiments, the system allows purchasers to recall sheet music distributed to a first musician and distribute the recalled sheet music to a second musician (without providing functionality for the first musician to view the recalled sheet music).

System and method for using unique device identifiers to enhance security

A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can transmit access data to a second electronic device. The access data can be associated with a first access code that can be generated based at least in part on data representing a device identifier of the first electronic device. A device identifier can uniquely identify the first electronic device from a plurality of electronic devices. Transferring the access data can involve transforming the first access code into a second access code that can include data representing a device identifier associated with the second electronic device. Transforming the first access code into the second access code can facilitate access to a resource associated with the access data for a second user, but not for a first user.

Information processing apparatus and image forming apparatus

An information processing apparatus includes a processor and memory. The memory stores information on multiple image forming apparatuses capable of making an image forming request. The processor is configured to: install license-managed software; select an image forming apparatus serving as a license management server of the software from the multiple image forming apparatuses; and set the selected image forming apparatus as a license management server.

Monitoring license constraints in a container orchestration system

Embodiments described herein are generally directed to a cloud-native approach to software license enforcement in a container orchestration system. According to an example, information indicative of a number of sets of containers that are making use of one or more components of an application is received. The application is licensed by the tenant and the sets of containers are running within a namespace of the tenant within a cluster of a container orchestration system. Overuse of the application by the tenant is determined based on whether the number exceeds a licensing constraint for the application specified within an Application Programming Interface (API) object of the container orchestration system corresponding to the application. Responsive to a determination that the application is being overused by the tenant, the tenant is caused to be notified regarding the overuse.

SYSTEM AND METHODS FOR USING CIPHER OBJECTS TO PROTECT DATA

Systems, methods, and devices configured to build and utilize an intelligent cipher transfer object are provided. The. intelligent cipher transfer object includes a set of participants protected by cloaking patterns. A portable dynamic rule set, which includes executable code for managing access to the protected set of participants, is included within the intelligent cipher transfer object. For a given user, the intelligent cipher transfer object may provide access to some of the participants while preventing access to other participants, based on the portable dynamic rule set therein.

Zero sign-on authentication

An authenticating system and process for authenticating user devices to a access a service where access to certain portions of the service may be limited according to a access point or other device used by a user device to facilitate interfacing a user with the service. The authentication may be achieved without directly assessing a trustworthiness of the user devices, and optionally, without requiring a user thereof to complete a sign-on operation.

Multi-chamber hosted computing environment for collaborative development between untrusted partners

A collaboration computing environment can be established for facilitating collaboration among multiple users where is distrust between them. The collaboration computing environment comprises one or more chambers that provide data security by limiting data access pathways, deactivating data access functionality and providing an indirect data upload path. Individual users, or defined groups of users, such as users associated with a specific entity, can utilize computing functionality provided within the confines of a single chamber to execute computer-executable instructions and, thereby, consume existing data and generate modified and/or new data. To facilitate collaboration, a shared storage can be enabled in the collaboration computing environment to which multiple chambers can be provided at least some form of access. Further collaboration is facilitated through a collaboration chamber, which can comprise computing environments, such as virtual machines, that can be established to require multiple simultaneous logins.

Systems and methods for license management in a domain-separated architecture
11409844 · 2022-08-09 · ·

Present embodiments are directed toward a domain-separated license management system (DSLMS) for managing software license compliance in a domain-separated architecture, such as a domain-separated client instance. The DSLMS populates a domain tree structure with a determined number of software licenses assigned to, and a determined number of software licenses in use by, each granular domain of the instance, and this information is stored in the leaf nodes of the domain tree structure. The domain tree structure may be further populated to include a number of software licenses assigned to, and a number of software licenses in use by, each non-leaf node of the domain tree structure. Once populated, the domain tree structure is used to determine whether the represented domain-separated client instance is fully-compliant, partially-compliant, or non-compliant. Further, software licenses are rebalanced between the granular domains of a partially-compliant instance domain-separated client instance to bring the instance into full compliance.

ZERO SIGN-ON AUTHENTICATION

An authenticating system and process for authenticating user devices to a access a service where access to certain portions of the service may be limited according to a access point or other device used by a user device to facilitate interfacing a user with the service. The authentication may be achieved without directly assessing a trustworthiness of the user devices, and optionally, without requiring a user thereof to complete a sign-on operation.

MONITORING LICENSE CONSTRAINTS IN A CONTAINER ORCHESTRATION SYSTEM
20220083629 · 2022-03-17 ·

Embodiments described herein are generally directed to a cloud-native approach to software license enforcement in a container orchestration system. According to an example, information indicative of a number of sets of containers that are making use of one or more components of an application is received. The application is licensed by the tenant and the sets of containers are running within a namespace of the tenant within a cluster of a container orchestration system. Overuse of the application by the tenant is determined based on whether the number exceeds a licensing constraint for the application specified within an Application Programming Interface (API) object of the container orchestration system corresponding to the application. Responsive to a determination that the application is being overused by the tenant, the tenant is caused to be notified regarding the overuse.