G06F21/1015

SYSTEM AND METHOD FOR PROVIDING SERVICE, AND RECORDING MEDIUM
20210349974 · 2021-11-11 · ·

A system includes circuitry that determines whether a license for an application has been issued to both a user and an electronic device, assigns use permission of an application to each of the user and the electronic device, based on a determination that a license for the application has been issued to both the user and the electronic device, and when use permission of the application has been assigned to both the user and the electronic device, permits the user who has logged in to the electronic device to use the application.

NON-TRANSITORY COMPUTER READABLE MEDIUM STORING ELECTRONIC MUSICAL INSTRUMENT PROGRAM, METHOD FOR MUSICAL SOUND GENERATION PROCESS AND ELECTRONIC MUSICAL INSTRUMENT
20210349969 · 2021-11-11 · ·

An electronic musical instrument, method for a musical sound generation process and a non-transitory computer readable medium that stores an electronic musical instrument program are provided. The program causes a computer provided with a storage part to execute a musical sound generation process using sound data. The program causes the computer to execute:

acquiring, from the storage part, first sound data and first user identification information indicating a user who has acquired the first sound data from a distribution server; acquiring second user identification information indicating a user who causes the musical sound generation process to be executed using the first sound data; determining whether or not the first user identification information matches the second user identification information; and inhibiting execution of the musical sound generation process using the first sound data in a case when the first user identification information does not match the second user identification information.

DETERMINING SOFTWARE APPLICATION LICENSE USAGE

Provided are techniques for automated software application license usage. Global detection results that indicate, for each of a plurality of end user computers, one or more installed software applications, one or more running software applications, and a user account. Unique pairs are identified using the global detection results, wherein each pair of the unique pairs comprises a software application name for a software application and a user name for a user. For a unique pair, a query is run against a user registry to get a list of user groups that the user name is a member of, a user group is selected that corresponds to the software application name, and a number of users in the selected user group is designated as a license demand for authorized users for the software application. Then, based on the global detection results and the license demand, one or more recommendations are provided.

Access to an electronic asset using content augmentation

Methods, computer program products, and systems are presented and can include for instance: crowdsourcing data from a plurality of users via a computer network, the data including feedback data regarding digital rights click through documents, wherein each of the users is a party to at least one of the digital rights click through documents; storing the data obtained by the crowdsourcing into a digital rights history repository; examining a digital rights click through document of a certain user, wherein the digital rights click through document controls access to a digital asset, wherein the examining includes using at least a portion of the feedback data of the digital rights history repository; and augmenting content of the digital rights click through document based on a result of the examining.

SYSTEM AND METHODS FOR USING CIPHER OBJECTS TO PROTECT DATA

Systems, methods, and devices configured to build and utilize an intelligent cipher transfer object are provided. The. intelligent cipher transfer object includes a set of participants protected by cloaking patterns. A portable dynamic rule set, which includes executable code for managing access to the protected set of participants, is included within the intelligent cipher transfer object. For a given user, the intelligent cipher transfer object may provide access to some of the participants while preventing access to other participants, based on the portable dynamic rule set therein.

Identifying copyrighted material using copyright information embedded in tables
11216898 · 2022-01-04 · ·

A method includes generating, by a computing device, a unique identifier (ID) based on copyright information associated with the digital content, wherein the copyright information and the digital content are recorded on a blockchain of a blockchain network; identifying, by the computing device, one or more attributes associated with a table; embedding, by the computing device, the unique ID in the table by changing one or more attributes associated with the table to be representative of the unique ID, wherein the embedding produces an information-embedded table that enables retrieval of the copyright information from the blockchain based on the unique ID, and wherein a visual difference between the table and the information-embedded table is not apparent to an unaided human eye; allocating, by the computer device, the digital content to the information-embedded table; and distributing the information-embedded table allocated with the digital content to the blockchain network.

Collaborative public user profile

A system to generate a graphical user interface to display a presentation of a set of shared user groups between users of a social networking service is described. Embodiments of the present disclosure relate generally to systems for: receiving an identification of a second user from a user account of a first user; identifying a user group that includes the first user and the second user in response to the identification of the second user from the user account of the first user; retrieving user identifiers of the first user and the second user, wherein the user identifiers may include graphical avatars; generating a group identifier based on the user identifiers; and causing display of a presentation of the user group at a client device.

Systems and methods for providing a digital content item to an authorized user
11790052 · 2023-10-17 · ·

Systems and methods for providing a digital content item to an authorized user are described. A system for providing access to a digital content item comprises a network interface, a memory, and one or more processors, the one or more processors to process a user request to obtain a digital resource identifier corresponding to a user-requested digital content item; select a digital resource provisioning platform to provide the user-requested digital content item, the selection based on holdings availability data; generate a link to the user-requested digital content item on the selected digital resource provisioning platform based on one or more rules specific to the selected digital resource provisioning platform; and provide to the user's computing device the link to the user-requested digital content item on the selected digital resource provisioning platform, the link to navigate a user interface directly to a view of the digital content item responsive to a selection of the link.

BUNDLED ENTERPRISE APPLICATION USERS
20210342419 · 2021-11-04 ·

A system and method for providing enterprise software applications to a plurality of bundled users is disclosed.

SYSTEMS AND METHODS FOR OPERATING A BRIDGE SERVER TO SUPPORT MULTIPLE SHARDS OF A BLOCKCHAIN
20230316248 · 2023-10-05 ·

Systems and methods for operating a bridge server to support multiple shards of blockchains are disclosed. The multiple shards may be used to record ownership rights of in-game digital assets. The in-game digital assets may be usable in an online gaming platform. Exemplary implementations may: execute an instance of a game; maintain user accounts for the users of a blockchain on a first and a second decentralized ledger server; record sets of rights pertaining to sets of digital assets; receive an exchange request for a first digital asset; receive transferal information for the first digital asset; transfer sets of instructions to the first and second decentralized ledger servers such that the first decentralized ledger server removes the first digital asset from the first set of digital assets and the second decentralized ledger server adds the first digital asset to the second set of digital assets.