Patent classifications
G06F21/1012
Method, apparatus, and electronic device for blockchain-based infringement evidence storage
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for blockchain-based infringement evidence storage are provided. One of the methods include: obtaining a request for collecting evidence of infringement by an online resource, wherein the request comprises an address of the online resource; obtaining the evidence of infringement from the address of the online resource; storing verification information of the evidence of infringement on a blockchain; and storing the evidence of infringement in a cloud storage space.
Method to track the dissemination of a data set
The present invention concerns the field of data dissemination tracking, in particular aims at keeping track of the various devices in which a given data was used. It is proposed a method to track the dissemination of a first data set carried out by a first tracking server (CS1), a first device and a second device, said data set comprising a data management section and a data payload, said data management section comprising a data identifier and data usage information defining a security conformance level, said method comprising the steps of:receiving by the first tricking server (CS1) from the first device (d0), a first device identification and at least a data management section of a first set of data, said data management section comprising at least a security conformance level and a first data identifier,identifying or creating in the database, a current graph data set corresponding to the first data identifier, said current graph data set comprising a common section, edges and nodes,storing in the current graph data set, said first data management section in the common section and said first identifier as a first node,receiving by the first tracking server (CS1) a request to transfer the first data set from the first device to the second device, said request comprising at least a second device identification of the second device and the first data identifier,retrieving by the first tracking server (CS1) second device security conformance level, based on the second device identification,verifying by the first tracking server (CS1) that the second device security conformance level meets the security conformance level of the first data set as identifier by the first data identifier,in the positive event, responding by granting authorisation to the transfer at least the data payload of the first data set to the second device,recording in tire database, in respect with the current graph data set, the second device identifier as a second graph data node,recording in the database, in respect with the current graph data set, a transaction from the first device to second device as an edge in the current graph data set linking the first graph node and the second graph node.
System and method for using unique device identifiers to enhance security
A method for detection and use of device identifiers to enhance the security of data transfers between electronic devices. A first electronic device can transmit access data to a second electronic device. The access data can be associated with a first access code that can be generated based at least in part on data representing a device identifier of the first electronic device. A device identifier can uniquely identify the first electronic device from a plurality of electronic devices. Transferring the access data can involve transforming the first access code into a second access code that can include data representing a device identifier associated with the second electronic device. Transforming the first access code into the second access code can facilitate access to a resource associated with the access data for a second user, but not for a first user.
Publicly providing web content of a tenant using a multi-tenant on-demand database service
In accordance with embodiments, there are provided mechanisms and methods for publicly providing web content of a tenant using a multi-tenant on-demand database service. These mechanisms and methods for publicly providing web content of a tenant using a multi-tenant on-demand database service can allow the web content to be published by a tenant using the multi-tenant on-demand database service for use by non-tenants of the multi-tenant on-demand database service.
MONITORING LICENSE CONSTRAINTS IN A CONTAINER ORCHESTRATION SYSTEM
Embodiments described herein are generally directed to a cloud-native approach to software license enforcement in a container orchestration system. According to an example, information indicative of a number of sets of containers that are making use of one or more components of an application is received. The application is licensed by the tenant and the sets of containers are running within a namespace of the tenant within a cluster of a container orchestration system. Overuse of the application by the tenant is determined based on whether the number exceeds a licensing constraint for the application specified within an Application Programming Interface (API) object of the container orchestration system corresponding to the application. Responsive to a determination that the application is being overused by the tenant, the tenant is caused to be notified regarding the overuse.
METHOD, APPARATUS, AND ELECTRONIC DEVICE FOR BLOCKCHAIN-BASED INFRINGEMENT EVIDENCE STORAGE
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for blockchain-based infringement evidence storage are provided. One of the methods include: obtaining a request for collecting evidence of infringement by an online resource, wherein the request comprises an address of the online resource; obtaining the evidence of infringement from the address of the online resource; storing verification information of the evidence of infringement on a blockchain; and storing the evidence of infringement in a cloud storage space.
SYSTEMS AND METHODS FOR LICENSE MANAGEMENT IN A DOMAIN-SEPARATED ARCHITECTURE
Present embodiments are directed toward a domain-separated license management system (DSLMS) for managing software license compliance in a domain-separated architecture, such as a domain-separated client instance. The DSLMS populates a domain tree structure with a determined number of software licenses assigned to, and a determined number of software licenses in use by, each granular domain of the instance, and this information is stored in the leaf nodes of the domain tree structure. The domain tree structure may be further populated to include a number of software licenses assigned to, and a number of software licenses in use by, each non-leaf node of the domain tree structure. Once populated, the domain tree structure is used to determine whether the represented domain-separated client instance is fully-compliant, partially-compliant, or non-compliant. Further, software licenses are rebalanced between the granular domains of a partially-compliant instance domain-separated client instance to bring the instance into full compliance.
ZERO SIGN-ON AUTHENTICATION
An authenticating system and process for authenticating user devices to a access a service where access to certain portions of the service may be limited according to a access point or other device used by a user device to facilitate interfacing a user with the service. The authentication may be achieved without directly assessing a trustworthiness of the user devices, and optionally, without requiring a user thereof to complete a sign-on operation.
METHOD TO TRACK THE DISSEMINATION OF A DATA SET
The present invention concerns the field of data dissemination tracking, in particular aims at keeping track of the various devices in which a given data was used. It Ls proposed a method to track the dissemination of a first data set carried out by a first tracking server (CS1), a first device and a second device, said data set comprising a data management section and a data payload, said data management section comprising a data identifier and data usage information defining a security conformance level, said method comprising the steps of:receiving by the first tricking server (CS1) from the first device (d0), a first device identification and at least a data management section of a first set of data, said data management section comprising at least a security conformance level and a first data identifier,identifying or creating in the database, a current graph data set corresponding to the first data identifier, said current graph data set comprising a common section, edges and nodes,storing in the current graph data set, said first data management section in the common section and said first identifier as a first node,receiving by the first tracking server (CS1) a request to transfer the first data set from the first device to the second device, said request comprising at least a second device identification of the second device and the first data identifier.retrieving by the first tracking server (CS1) second device security conformance level, based on the second device identification,verifying by the first tracking server (CS1) that the second device security conformance level meets the security conformance level of the first data set as identifier by the first data identifier.in the positive event, responding by granting authorisation to the transfer at least the data payload of the first data set to the second device,recording in tire database, in respect with the current graph data set, the second device identifier as a second graph data node,recording in the database, in respect with the current graph data set, a transaction from the first device to second device as an edge in the current graph data set linking the first graph node and the second graph node.
MULTI-PLATFORM DIGITAL RIGHTS MANAGEMENT FOR PLACESHIFTING OF MULTIMEDIA CONTENT
Devices, methods, and program products are provided, which support multiple Digital Rights Management (DRM) schemes or platforms during the placeshifting of media content. A given placeshifting session may be initiated between a placeshifting device and a user-controlled client media receiver executing a browser player. In one embodiment, the DRM placeshifting method includes storing, in a memory associated with the placeshifting device, DRM-protected content; receiving a request from the client media receiver over a communications network to stream the DRM-protected content to the device; and obtaining a placeshifting key and initialization instructions for the DRM-protected content. The DRM-protected content is streamed to the client media receiver in an encrypted format accessible with a placeshifting decryption key. In conjunction with streaming the DRM-protected content, initialization instructions is transmitted to the client media receiver containing information utilized by the browser player to obtain the DRM license from a first license server.