G06F21/1073

Method, manufacture, and apparatus for instantiating plugin from within browser
10572633 · 2020-02-25 · ·

A method, apparatus, and manufacture for instantiating a browser plugin is provided. A client web browser of a client is employed to instantiate a browser plugin for the client web browser. Next, the client web browser is employed to obtain a reference to the browser plugin. Then, a command is given to the browser plugin via the reference to the browser plugin. The browser plugin is used by the client web browser rather than the web page.

Threat-monitoring systems and related methods

Disclosed herein are methods, devices, systems and computer-executable instructions for managing software in threat-monitoring systems. One such method comprises receiving a plurality of licence identifiers identifying respective licences available for assignment to a threat monitoring system. The method further comprises receiving a selection of at least one of the licence identifiers. The method also comprises uploading, to the threat monitoring system, an activation tool for activating at least one operational function of the threat monitoring system, the at least one operational function corresponding to the selected at least one licence identifier.

Method and system for the delivery and storage of high definition audio-visual content
10560732 · 2020-02-11 · ·

A system for permitting temporary access for delivery of owned content to a location selected by a subscriber is provided. The system includes a central facility in communication with a plurality of local networks. Through one of the local networks, the subscriber can access a database in the central facility, which contains content owned by the subscriber. An enhanced progressive download system and method for high definition audio-visual content is also provided. This method uses the download speed of the subscriber, the run time of the content to be downloaded, the size of the content, and the amount of local storage in the appliance of the subscriber. A desired wait time for downloading the content is selected, and based on these parameters, the amount of local storage needed for the content is calculated. If a ratio of the local storage available to the local storage needed for the content is above a desired threshold, a download of the content can begin.

LICENSE MANAGEMENT SYSTEM AND LICENSE MANAGEMENT METHOD
20200042673 · 2020-02-06 ·

In accordance with an embodiment, a license management system installed in a multi-function peripheral is provided with an application or function for which confirmation of validity of a license by an external license management server which is the external device is required. The license management server sets a usage period if it is determined that a usage amount of the multi-function peripheral satisfies a permission condition. Within the usage period, the license of the desired application or function is set to be valid, and the desired application or function is set to be usable.

Method for Electronically Documenting License Information
20190384892 · 2019-12-19 ·

In a method for electronically documenting license information via the granting of a license and the use of said license in a network of several electronic data processing devices, the license information is added with a new transaction block to a decentralized transaction database and is managed using blockchain technology. When a license is granted to a licensee, a licensor generates new license information with a licensing input, the licensing input contains at least one license identification, and before, during or after use of the license granted by the licensor the licensee generates new license information with a license use input, and the license use input contains at least the license identification of the licensing input and a use identification. The licensing input can contain a license key encrypted with a public key of the licensee, with which the licensor and the licensee can generate and decrypt encrypted information.

INFORMATION MANAGEMENT PROGRAM, INFORMATION PROCESSING SYSTEM, AND INFORMATION MANAGEMENT METHOD

A non-transitory computer-readable storage medium storing therein an information management program for causing a computer to execute a process comprises: receiving property information indicating a reliability of a post uploaded on the Internet and a digital signature generated from the property information; and storing the property information, to which identification information of the post and the digital signature are added, in a storage.

SYSTEMS AND METHODS FOR MONITORING SOFTWARE ITEMS BASED ON GENERATED CONTRACTS
20240086499 · 2024-03-14 ·

Disclosed herein are systems and method for monitoring software items using a generated contract, the method including: transmitting a quote for viewing on a computing device associated with a first person, wherein the quote includes a list of software items included in a transaction; in response to receiving an approval of the quote by the first person, generating a contract governing the transaction by: extracting the list of software items from the quote; retrieving software item information for each of the list of software items; determining, based on the software item information and for inclusion in the contract, usage conditions that the first person has to comply with to access software items in the list of software items; and monitoring compliance with the usage conditions using the contract; and in response to detecting non-compliance, blocking access to a corresponding software item in the list of software items.

DRM addition authentication
10506288 · 2019-12-10 · ·

There is provided a client device comprising a content protection decoder according to a first standard, comprising: a receiver for receiving an asset associated with content protection; a creation module for creating a content protection for the asset in accordance with the first standard, and including a parameter identifying information additional to the information associated with said standard; an interface for transmitting a request for a license to a license server based on said standard, the request including that parameter, and for receiving a license in response; and a controller for accessing content associated with the asset using the license. There is also provided a license server configured to: receive a license key request in accordance with a standard from a client device; transmit the request to a processing function associated with the standard; receive a parameter associated with the standard from the processing function; parse the parameter to retrieve additional information; process the additional information; access a license in accordance with the standard based on the parsed information; and transmit the accessed license in accordance with the standard to the client device.

System and method for inter-program file control communication

A system for communication between two or more computer programs is disclosed. The system includes a memory, an interface, and a processor. The memory stores a first file, expected metadata for the first file, and expected metadata for one or more fields in the first file. The interface receives a file from a computer program. The file comprises fields that each comprise information provided by one or more sources. The processor executes a second computer program which extracts a first set of file metadata from the received file, compares the extracted first set of file metadata to the expected metadata, and determines if the extracted first set of file metadata corresponds to the expected metadata. If the extracted first set of file metadata corresponds to the expected metadata for the first file, then the processor performs analogous comparisons at a field level and stores the first file in the memory.

Method and apparatus for protection of media objects including HTML
10452759 · 2019-10-22 · ·

A method, apparatus, and manufacture for content protection for protecting some objects is provided. A content protection operation or license operation is performed for at least one media object of a web application. Some or all of the objects are then marked as protected. When an operation is performed that accesses a protected object, a user agent determines whether to deny the operation, to allow the operation and mark data exported by the operation and objects storing the exported data as protected objects, or to allow the operation and not mark data exported by the operation and objects storing the exported data as protected objects.