Patent classifications
G06F21/1014
SYSTEM AND METHOD FOR CONTROLLING ACCESS TO AN IN-VEHICLE COMMUNICATION NETWORK
A system or method may include an in-vehicle network including an interface port for connecting an external device to the in-vehicle network; and a security unit connected to the in-vehicle network, the security unit adapted to enable an external device to communicate with the in-vehicle network, over the interface port, based on a security token received from the external device. A system or method may, based on a token, prevent an external device from at least one of: communicating with a selected set of components on in an in-vehicle network, communicating with a selected set of network segments in the in-vehicle network and performing a selected set of operations.
Linked account system using personal digital key (PDK-LAS)
One embodiment of the invention includes a system comprising: a personal digital key and a computer readable medium that is accessible when authenticated by the personal digital key.
System for data access token management
A method may include, receiving, at a server device and from a requesting computing device associated with a requesting user, a request for a data item. The data item configured may be configured as a data structure and include an encrypted data payload; metadata identifying a source of the payload and when the data payload was captured; and a token identifying an owner of the data item and access rights to the data item. The method may include parsing he token to identify the owner of the data item; transmitting the request for the data item to a computing device associated with the owner; receiving a response from the computing device. The response may indicate the requesting user may access the data item, and in response, transmit a decryption key to the requesting computing device for the encrypted data payload. The method may include updating the token.
CONTROLLING ACCESS TO SECURED MEDIA CONTENT
A technique includes controlling access to secured media content. The access control includes, in response to a principal attempting to access secured media content, challenging authentication of the principal to access the secured media. Challenging the authentication includes launching an authentication agent in response to the content of an electronic label associated with the secured media content and using the authentication agent to provide a result indicating whether the principal has permission to access the secured media content. The technique includes based on the result, selectively allowing the principal to access the secured media content.
Systems, Methods and Devices for Trusted Transactions
The invention discloses a system for enhancing trust in transactions, most particularly in remote transactions between a plurality of transactional parties, for instance a seller and buyer(s) of goods and/or services over a public computer network such as the internet. Trust is disclosed to be a multivalent commodity, in that the trust that is to be enhanced relates to information about the subject matter of the transactions (e.g., the suitability of the goods and services sold), the bona fides of the supplier of the goods and services, the appropriateness of a pricing structure for a particular transaction or series of transactions, a quantum of additional transactional value that may be imparted to the transactional relationship, security of information exchange, etc.
SYSTEMS AND METHODS TO SUPPORT CUSTOM BUNDLING OF VIRTUAL ITEMS WITHIN AN ONLINE GAME
Systems and methods to support custom bundling of virtual items within an online gaming platform are disclosed. Exemplary implementations may: facilitate entry and/or selection of virtual items that are owned by a first user; initiate bundling of the virtual items into a custom item bundle; create a digital asset that represents rights pertaining to the custom item bundle; record the digital asset of a decentralized ledger; transfer to rights to other users; distribute amounts of consideration to the user who owns particular rights pertaining to the custom item bundle.
Distributing digital-works and usage-rights via limited authorization to user-devices
Method for automatically distributing, as needed, a user's digital-works and usage-rights to one or more user-devices. A definition of the usage-rights for a digital-work may be stored at one or more locations on a network. A version of said digital-work suitable for a user-device may be provided by one or more locations on said network. When a user who is authorized to utilize said digital-work is active at a user-device, a version of said digital-work and authorization to utilize is automatically transferred when needed to a user-device. The digital-work and authorization may be automatically transferred as needed to any user-device where an authorized user is active. The usage-rights may only be valid for one or more specific users. The usage authorization at each user-device may be less than defined in the full usage-rights maintained on the network. Authorization to utilize said digital-work at a user-device may be extended from time to time by exchanging user-device status across the network. Digital-works are automatically provided as needed to any user-device that an authorized user is using.
Information processing apparatus and non-transitory computer readable medium
An information processing apparatus includes a processor configured to: obtain first authority information indicating possession of authority over a server, the first authority information being associated with user's identification information, and second authority information indicating possession of authority over the server that is different from authority indicated by the first authority information; accept a request for the server; in a case where the request is executable with authority based on the first authority information identified by the identification information, add the first authority information to the request and send the request with the first authority information to the server; and in a case where the request is not executable with authority based on the first authority information and is executable with authority based on the second authority information, add the second authority information to the request and send the request with the second authority information to the server.
System and method for controlling access to an in-vehicle communication network
A system or method may include an in-vehicle network including an interface port for connecting an external device to the in-vehicle network; and a security unit connected to the in-vehicle network, the security unit adapted to enable an external device to communicate with the in-vehicle network, over the interface port, based on a security token received from the external device. A system or method may, based on a token, prevent an external device from at least one of: communicating with a selected set of components on in an in-vehicle network, communicating with a selected set of network segments in the in-vehicle network and performing a selected set of operations.
HANDLING MANAGEMENT DEVICE
A system is provided, with which various information relating to a traded object can be managed efficiently.
An object certification information issuing unit 51 issues, with respect to an object to be distributed, information that relates to certification of the object and includes artwork basic information relating to elements for increasing the value of the object and constraint condition information relating to a constraint condition applied to distribution of the object, as object certification information. A distributor information issuing unit 52 issues, with respect to a distributor, distributor certification information that relates to certification of the distributor and includes provision condition information that relating to a provision condition applied to distribution of the object. A distribution permission unit 53 compares the object certification information with the distributor certification information when the object is to be distributed, and permits distribution in a case where determination has been made that the constraint condition indicated by the constraint condition information matches the provision condition indicated by the provision condition information.