Patent classifications
G06F21/1075
Integrated multi-provider compute platform
The present invention includes embodiments of systems and methods for addressing the interdependencies that result from integrating the computing resources of multiple hardware and software providers. The integrated, multi-provider cloud-based platform of the present invention employs abstraction layers for communicating with and integrating the resources of multiple back-end hardware providers, multiple software providers and multiple license servers. These abstraction layers and associated functionality free users not only from having to implement and configure provider-specific protocols, but also from having to address interdependencies among selected hardware, software and license servers on a job-level basis or at other levels of granularity.
Information processing apparatus, information processing method, electronic device, and information processing system for period management of a license used in the electronic device
Provided is a system capable of appropriately performing period management of a license provided by an information processing apparatus. The information processing apparatus includes a data generation unit that generates first license communication information using first device information, the first device information being information including a first reference date and time and a device unique key, the first reference date and time being a date and time set using a hardware clock of an electronic device and being a date and time used for period management of a license, the device unique key being a key unique to the electronic device, and the first license communication information being information including at least one of an effective term or an expiration time of the license and the first reference date and time and used for installing the license in the electronic device.
TOKENIZED MEDIA CONTENT MANAGEMENT
A system and method for media content management include creating, via a digital vault, a container file comprising media content submitted by a user and content metadata; verifying, via the digital vault, a completeness of the content metadata associated with the media content in the container file; classifying, via the digital vault, the container file based on the completeness of the media content; and capturing, via the digital vault, event metadata when a second user gains access to the container file, the event metadata comprising identification of the second user, an activation timestamp, a duration of access, portions of the container file accessed, and changes to the container file.
License usage management
A method may include obtaining a state diagram of a software management system, wherein the software management system manages at least a first software and configuring a license usage management system based on the state diagram.
Method and System for Secure Container Application Framework
An edge device may be configured to generate a secure container to perform a software application on the edge device. A security daemon operating on a processor of the edge device may receive a configure host request message from a container manager. In response, the security daemon may determine integrity of metadata, extract licenses from the metadata, determine image permissions, create a user or group account, and update one or more system service access-control lists (ACLs). The security daemon may generate and send a configure host response message to the container manager, which may create and/or start the container.
Method and System for Secure Container Application Framework
An edge device may be configured to generate a secure container to perform a software application on the edge device. A security daemon operating on a processor of the edge device may receive a security policy for the software application from a secure container platform, retrieve a license associated with the software application, and determine permissions of the software application based on the retrieved license. The edge device may create a user or group account and updating a system service access-control list (ACL) based on the received security policy and the determined permissions, and generate and send a policy ready message to the secure container platform in response to creating the user or group account and updating the system service ACL.
SYSTEM AND METHOD FOR CAPTURING COMPLEX RIGHTS RELATING TO DATA LICENSES
An embodiment of the present invention is directed to a tool that captures the meaning of the agreement in an effective and efficient manner. An embodiment of the present invention is directed to a complex data rights capturing tool. The complex data rights capturing tool may enable users to select usage rights, define the asset (e.g., dataset) and define the scope of use for the defined dataset.
LICENSE VERIFICATION SYSTEM AND METHOD FOR WORKSPACE-BASED APPLICATIONS
According to one embodiment, an Information Handling System (IHS) includes executable instructions for receiving a request to execute an application that has been deployed in the workspace by a workspace that has been instantiated on the IHS. In response, the instructions communicate with the IHS to obtain a license entity associated with the application, and execute the application in the workspace according to the obtained license entity associated with the application.
Device, system, and method of policy enforcement for rich execution environment
Device, system, and method of policy enforcement for rich execution environment. An electronic device includes a Trusted Execution Environment (TEE), a Rich Execution Environment (REE), and a hardware-based secure sub-system which includes a cryptographic engine. The REE includes a cryptographic driver configured to initiate a request for TEE authorization to perform a particular cryptographic operation by the cryptographic engine on a data-item that is stored in a memory region that is accessible by the REE. The TEE includes a policies manager to determine whether the request from the REE is approved or rejected, and if approved, to inject data-items into the secure sub-system to enable performance of the requested cryptographic operation by the cryptographic engine.
SYSTEMS, METHODS, AND APPARATUS FOR SOFTWARE DEFINED SILICON SECURITY
Methods, apparatus, systems and articles of manufacture (e.g., physical storage media) for software defined silicon security are disclosed. Example apparatus include a trusted agent determiner to (i) determine respective reputation scores associated with a plurality of agents in a mesh network, the plurality of agents associated with a plurality of semiconductor devices, respective ones of the semiconductor devices including circuitry configurable to provide one or more features, and (ii) select, based on the respective reputation scores, a first agent from the plurality of the agents to transmit a request to activate or deactivate at least one of the one or more features. Example apparatus also include an agent interface to, in response to the request, broadcast an activation or deactivation of the least one of the one or more features to the mesh network to cause the trusted agent determiner to update the reputation score of the first agent.