G06F21/1076

Secure hardware for cross-device trusted applications

Various technologies described herein pertain to a computing device that includes secure hardware (e.g., a TPM, a secure processor of a processing platform, protected memory that includes a software-based TPM, etc.). The secure hardware includes a shared secret, which is shared by the secure hardware and a server computing system. The shared secret is provisioned by the server computing system or a provisioning computing system of a party affiliated with the server computing system. The secure hardware further includes a cryptographic engine that can execute a cryptographic algorithm using the shared secret or a key generated from the shared secret. The cryptographic engine can execute the cryptographic algorithm to perform encryption, decryption, authentication, and/or attestation.

SYSTEMS AND METHODS FOR MANAGING SECURE SHARING OF ONLINE DATA
20190245846 · 2019-08-08 ·

Systems and methods are disclosed for managing online advertising data secure sharing. One method includes receiving, at a server, a request for proprietary data from a data consumer, the request including a data consumer identifier; retrieving, from a database of proprietary data, proprietary data based on the request; determining, by the server, whether the retrieved proprietary data is at least one of: designated to be processed and designated to have privileges set; processing, by the server, the proprietary data when the server determines the proprietary data is designated to be processed; setting one or more privileges to the proprietary data using the certificate associated with the data consumer identifier when the server determines the proprietary data is designated to have privileges set; encrypting the proprietary data using the certificate associated with the data consumer identifier; and transmitting the encrypted proprietary data to the data consumer.

License system, license management server, method, and storage medium
10354052 · 2019-07-16 · ·

A license management server generates a license including information about update confirmation date and usage period. An image forming apparatus tries to communicate with the license management server until the usage period elapses since the update confirmation date.

Systems and methods for managing secure sharing of online advertising data

Systems and methods are disclosed for managing online advertising data secure sharing. One method includes receiving, at a server, a request for proprietary data from a data consumer, the request including a data consumer identifier; retrieving, from a database of proprietary data, proprietary data based on the request; determining, by the server, whether the retrieved proprietary data is at least one of: designated to be processed and designated to have privileges set; processing, by the server, the proprietary data when the server determines the proprietary data is designated to be processed; setting one or more privileges to the proprietary data using the certificate associated with the data consumer identifier when the server determines the proprietary data is designated to have privileges set; encrypting the proprietary data using the certificate associated with the data consumer identifier; and transmitting the encrypted proprietary data to the data consumer.

Borrowing software licenses in a license management system for time based usage

According to one embodiment, a method for borrowing licenses. The method may include retrieving a license file associated with a software program from a data storage device, whereby the license file includes a plurality of borrowing information. The method may also include recording a plurality of usage information to the data storage device based on a plurality of user interactions with the software program. The method may further include updating the plurality of borrowing information within the retrieved license file using the recorded plurality of usage information. The method may also include revoking the retrieved license file based on the updated plurality of borrowing information expiring.

Building Resilient Models to Address Dynamic Customer Data Use Rights
20190155996 · 2019-05-23 ·

A system and method of building a decision or prediction model used for analyzing and scoring behavioral transactions is disclosed. A customer dataset in a model development store is used to build an original model is subject to a data right usage withdrawal, the original model having coverage over the customer dataset extract, using data sampling, a portion of the customer dataset to generate a model surrogate dataset. The system and method discretize vectors present in both the model surrogate dataset and the customer dataset, and receive data representing the data right usage withdrawal from the customer dataset. The system and method determine a depletion of the model surrogate dataset according to the data right usage withdrawal, and compute an estimated mean time to coverage failure of the original model based on the depletion of the model surrogate dataset according to the data right usage withdrawal.

SOFTWARE LICENSE MANAGEMENT SYSTEM AND MANAGEMENT METHOD
20190147145 · 2019-05-16 · ·

When upgrading a software installed in an analysis device PC (1) that is not connected to the Internet (4), a user performs a predetermined operation with the analysis device PC (1) to acquire a license authentication cancellation key. When the user accesses a server (5) from a user terminal (2) with a predetermined account and enters the license authentication cancellation key, a license authentication cancellation unit (52) cancels authentication of a license for a previous version. Furthermore, when the user enters a product serial number of an upgrade version software 3 and the like, an upgrade verification unit (53) confirms that the user owns the license for the previous version and that the authentication has been canceled, and an activation key issue unit (54) issues an activation key for an upgrade license. Using this, a device user activates the upgraded software installed in the analysis device PC (1). In this way, when upgrading the software on the offline PC, license authentication can be simply performed.

Delivering digital content for an application

The present disclosure relates to systems, methods, and computer-readable media for providing digital content for an application to users. For example, systems described herein can provide a license for the digital content during a rental time. Systems disclosed herein may additionally track a duration of use of an application and compare the tracked use against an amount of rental time purchased (e.g., rented) by a user. The systems described herein may further extend a license or terminate the license based on a determination of whether the amount of use exceeds a rental time. Features and functionality described herein provide a flexible and efficient mechanism that enables users having a variety of content-consuming preferences to receive affordable content while ensuring that use of an application is efficiently and accurately tracked.

Device of licensing program, program transaction device and method of licensing program
10223509 · 2019-03-05 · ·

A device for licensing a program including a header includes a storage device, a file system and a license verification component. The storage device is in a local terminal having a random access memory (RAM). The file system is configured in the storage device. The operating system (OS) receives a starting-program command to activate the program and stores the header into the storage device. The license verification component prevents the OS from loading the program in the RAM, and works with at least one of the OS and a remote server to perform a license verification, wherein after there is a license verification pass, the license verification component allows the program to be loaded in the RAM.

APPARATUS AND METHOD OF LAYERED LICENSING

A methodology and apparatus for layered licensing is described. A licensable item is detected on a device. A legacy license associated with the licensable item is accessed, wherein the legacy license corresponds to a legacy licensing policy. A layered license associated with the licensable item is accessed, wherein the layered license corresponds to a layered licensing policy. The legacy licensing policy and the layered licensing policy are integrated into an integrated license, and the integrated license is enforced.