G06F21/1077

Licensing authority controlled modification of http headers in a proxy-based system

A proxy is modified, to form an enhanced proxy, wherein the proxy is configured to inspect a header portion of a Hypertext Transfer Protocol (http) message, the modifying enabling the enhanced proxy to identify, at the enhanced proxy, a set of http header types in the http message received from a system. An external licensing authority (LA) is modified, to form an enhanced LA, wherein the enhanced LA is configured to verify a header parameter corresponding to a header type in the set of header types and return a license information corresponding to the system. The http message is modified by modifying the header portion in the http message according to the header type and a threshold corresponding to the header type, the header type and the threshold being identified in the license information. The modified http message is transmitted.

CONTROL OF APPLICATIONS BASED ON LICENSING OBJECTS

An example of a computer-readable medium to store machine-readable instructions. The instructions may cause a processor to verify a licensing object and determine a license has expired. An application may be controlled based on an expiration parameter specific to the licensing object.

Licensing in the cloud

At least one machine readable medium comprising a plurality of instructions that in response to being executed by a system cause the system to send a unique identifier to a license server, establish a secure channel based on the unique identifier, request a license for activating an appliance from a license server over the secure channel, receive license data from the license server over the secure channel; determine whether the license is valid, and activate the appliance in response to a determination that the license data is valid.

SYSTEMS AND METHODS FOR INTEGRATING COMPUTER APPLICATIONS

Systems and methods for integrating computer applications is disclosed. The method includes receiving, at a primary client associated with a primary server, a request to interact with an object hosted by a secondary server independent of the primary server; initializing, by the primary client, an embedded component associated with the secondary server that is embedded in the primary client; and passing, by the primary client, a content identifier of the object to the embedded component. The embedded component configured to: request the secondary server to provide the object based on the content identifier; receive the object from the secondary server; and render the object for display in the primary client.

IMPORTING AGENT PERSONALIZATION DATA TO INSTANTIATE A PERSONALIZED AGENT IN A USER GAME SESSION

Aspects of the present disclosure relate to a personalized agent service that generates and evolves customized agents that can be instantiated in-game to play with users. Machine learning models are trained to control the agent's interactions with the game environment and the user during gameplay. A user may request that a personalized agent join the user's gameplay session. The user device sends a request for the personalized agent to a game platform. The game platform determines whether the user has a license to execute a second instance of the game. When the user has a license to execute a second instance of the game, the second instance of the game may be executed on the user device. Information received from a personalized agent service is used to instantiate a personalized agent in the second instance of the game.

DELIVERING DIGITAL CONTENT FOR AN APPLICATION

The present disclosure relates to systems, methods, and computer-readable media for providing digital content for an application to users. For example, systems described herein can provide a license for the digital content during a rental time. Systems disclosed herein may additionally track a duration of use of an application and compare the tracked use against an amount of rental time purchased (e.g., rented) by a user. The systems described herein may further extend a license or terminate the license based on a determination of whether the amount of use exceeds a rental time. Features and functionality described herein provide a flexible and efficient mechanism that enables users having a variety of content-consuming preferences to receive affordable content while ensuring that use of an application is efficiently and accurately tracked.

System and method for interapplication communications
11424943 · 2022-08-23 · ·

A first executable program on a computer system is enabled to exchange communications with a second executable program on the computer system by determining that the first executable program requests to exchange information with the second executable program, using the second executable program to challenge the first executable program for a digital certificate, and using the second executable program to exchange information with the first executable program when the digital certificate is verified.

Enclave handling on an execution platform

There are provided mechanisms for handling instances of enclaves on an execution platform. The execution platform comprises a secure component. The secure component serves as a trusted interface between a trusted platform module of the execution platform and enclaves of an enclave environment on the execution platform. Only a single enclave, denoted base enclave, in the enclave environment is enabled to communicate with the secure component. A method comprises receiving, by the base enclave, an indication from another enclave in the enclave environment upon start-up of a new instance of the so-called another enclave. The method comprises determining, by the base enclave, to enable continued running of the new instance only when number of currently running instances of the so-called another enclave is within an interval of allowed number of running instances of the so-called another enclave.

Systems and methods for license analysis
11379560 · 2022-07-05 · ·

In accordance with the present approach, a license analysis system may receive user activity data for a software program from an enterprise or client, including a client-specific association between license types and user assignments. The user assignments may include roles, profiles, and/or authorization objects assigned to each user within the software program. The license analysis system may analyze the user activity data to generate one or more 1:m relationships of each license type to a number of user assignments within the enterprise. The license analysis system may then compare the 1:m relationships to the user activity data to identify an acceptable license type assignment for each user that provides appropriate software authorizations according to their historic software usage. By providing the acceptable license type assignments to the enterprise, the license analysis system enables the enterprise to improve or optimize its license distribution by closely matching users with appropriate license types.

Automatically detecting misuse of licensed software
11403370 · 2022-08-02 · ·

An example embodiment may involve communicating with a server to separately access first and second records of sessions between the server and computing devices of a network, the first record including a first set of fields not present in the second record and the second record includes a second set of fields not present in the first record; identifying a common field present the first and second records; correlating information across the first and second records using the common field; using a set of license misuse criteria to identify, from the correlated information, (i) a set of the sessions that meets the set of criteria and (ii) a network address of a target device involved in the set of sessions; identifying the target device using the network address; and storing an indication identifying the target device as a potential source of misuse of licensed software executable on the server.