Patent classifications
G06F21/1073
CLOUD SERVER AND METHOD FOR APPLICATION LAYER-INDEPENDENT ACCELERATED TRIGGERING OF EVENTS IN A COMMUNICATION NETWORK
A cloud server obtains a defined signature from a first communication device, where the defined signature is associated with a digital asset at the first communication device. The cloud server validates the defined signature based on a search of the defined signature in a main action database in the cloud server. The cloud server determines that a copyright check is required for the digital asset associated with the defined signature. The cloud server determines an occurrence of copyright violation for digital asset based on resemblance search of the digital asset in copyright database. The cloud server interrupts data packets of the digital asset from being consumed at the first communication device based on the occurrence of copyright violation determined for the digital asset. The interruption of the data packets is executed at one or more layers different from an application layer of a network architecture at the first communication device.
SYSTEMS AND METHODS TO DELIVER CONTENT DURING CLIENT AUTHENTICATION PROCESS IN A DISTRIBUTED COMPUTING SYSTEM
A method includes receiving, by a content sharing platform, a request for content from a client device, the request for content comprising a session-based authentication token that pertains to a session between the client device and the content sharing platform. The content sharing platform can further validate the session-based authentication token and cause playback of the requested content to begin at the client device. Responsive to a valid content-based authentication token supplied by the client device, the content sharing platform can cause playback of the requested content to continue at the client device, wherein the valid content-based authentication token is based on an identifier of the requested content.
Library upgrade method, apparatus, and system
A method and apparatus are disclosed for upgrading libraries in a source code program by evaluating libraries in the source code program for predetermined selection criteria specifying library performance limitations to identify at least a first library which does not meet the plurality of predetermined selection criteria and then identifying a first alternative library that is suitable for substitution for the first library so that the source code program may be automatically modified to replace the first library with the first alternative library, thereby generating a modified source code program having an upgraded library functionality.
SYSTEMS AND METHODS FOR VALIDATING LICENSES
A method for license validation is disclosed herein, including receiving one or more strings of one or more parameters defining a license authorizing access to at least one or more portions of software, generating a first hash based on the one or more parameters defining the license and a key, storing parameters defining the generated first hash, storing the generated first hash, responsive to an element rendering on a web page, determining a version of an application program interface used to generate the first hash and the key used to generate the hash, by interpreting the hash, and integrating the one or more portions of software for use by a user. The one or more portions of software are integrated based on the one or more parameters defining the license embedded in the first hash.
BARCODE-BASED LICENSE CONFIGURATION FOR AIR-GAPPED SYSTEMS
Example implementations include a method, apparatus and computer-readable medium of configuring a license for a component configurable with a computer system, comprising storing the component on the computer system. The implementations further include encoding computer system information corresponding to the computer system into a barcode, such as a Quick Response (QR) code. Additionally, the implementations further include displaying the barcode and a license identifier field. Additionally, the implementations further include receiving a license identifier in the license identifier field, wherein the license identifier is based on the barcode. Additionally, the implementations further include decoding the license for the component based on the license identifier.
LICENSE MANAGEMENT DEVICE, PROGRAM EXECUTION DEVICE AND METHOD
A license issuing means issues a license file to an application program using a library containing a plurality of functions. The license file contains licensed function information for specifying a function allowed to be used among the plurality of functions contained in the library. An authentication means performs license authentication based on the license file. A function activation means activates a function specified by the licensed function information among the plurality of functions in the library based on a result of the license authentication. A program execution means executes the application program by using the activated function.
EFFICIENT ACCESS TO USER-RELATED DATA FOR DETERMINING USAGE OF ENTERPRISE RESOURCE SYSTEMS
An example embodiment may involve a method performed by a software application executable on a central enterprise resource planning (ERP) client of a plurality of ERP clients. The ERP clients may be contained within a managed network. Each ERP client may be associated with one or more computing devices of the managed network on which ERP software is executable. Each ERP client may include a database that stores user-related data for individual users of the managed network whom are authorized to access the ERP client. The method may involve communicating with other ERP clients of the plurality of ERP clients to retrieve the user-related data stored in databases of the other ERP clients, storing the user-related data from the other ERP clients, and transmitting the user-related data to a computing device of a computational instance contained in a remote network management platform associated with the managed network.
Method and system for persisting files
- Benjamin M. Schultz ,
- Balaji Balasubramanyan ,
- Giridhar Viswanathan ,
- Ankit SRIVASTAVA ,
- Margarit Simeonov Chenchev ,
- Hari R. Pulapaka ,
- Nived Kalappuraikal Sivadas ,
- Raphael Gianotti Serrano Dos Santo ,
- Narasimhan Ramasubramanian ,
- Frederick Justus Smith ,
- Matthew David Kurjanowicz ,
- Prakhar Srivastava ,
- Jonathan Schwartz
Securely performing file operations. A method includes determining a licensing characteristic assigned to a file. When the licensing characteristic assigned to the file meets or exceeds a predetermined licensing condition, then the method includes performing a file operation on the file in a host operating system while preventing the file operation from being performed in the guest operating system. When the licensing characteristic assigned to the file does not meet or exceed the predetermined licensing condition, then the method includes performing the file operation on the file in the guest operating system while preventing the file operation from being performed directly in the host operating system.
Presenting content protected by multiple DRMS
Examples are disclosed related to presenting on a client device configured for a first digital rights management technology (DRM-1) content that is protected by a second digital rights management technology (DRM-2). One example provides a computing device configured to receive a request from an application for a DRM-2 license acquisition challenge, forward the request to a DRM-2 license acquisition challenge generator, receive a DRM-2 license acquisition challenge and DRM-2 state information, send the DRM-2 license acquisition challenge to the application, receive, from the application, a DRM-2 license acquisition response, generate a DRM-1 license acquisition challenge incorporating the DRM-2 license acquisition challenge, the DRM-2 license acquisition response, and the DRM-2 state information, send the DRM-1 license acquisition challenge to a remote DRM-1 license acquisition server, receive a DRM-1 license acquisition response comprising a key and a license policy, enforce the license policy for content protection, and decrypt content using the key.
IMAGE FORMING APPARATUS
An image forming apparatus includes an image forming mechanism, a panel serving as a user interface of the image forming mechanism, a receiver that receives an image forming instruction for the image forming mechanism from a user of an information processing apparatus, and a display controller that controls the panel to display, in response to the receiver receiving the image forming instruction, a message about management of a license related to software installed in the information processing apparatus by referring to management information of the software.