G06F21/1077

Per instance core control in accelerated computing environments
11403429 · 2022-08-02 · ·

Controlling functionality of a core on a per-instance basis can include implementing, within an accelerator, an instance of a core by configuring the accelerator using configuration data, receiving, within the instance of the core, encrypted authorization data for the instance of the core, generating, using control circuitry of the instance of the core, decrypted authorization data for the instance of the core by decrypting the encrypted authorization data using a core instance identifier stored in a first control register of the instance of the core, and writing the decrypted authorization data to a second control register in the instance of the core, wherein the instance of the core enables core functionality therein based on the decrypted authorization data in the second control register.

LICENSE SCAN TRIGGERING SYSTEM

A method, system and computer program product for light-weight software license compliance management. One embodiment of the method comprises accessing a set of software logs from a target device, analyzing the set of software logs to generate a license violation probability score, determining the license violation probability score satisfies a predetermined threshold, and notifying a user of a need to scan the target device for software license compliance.

CLOUD MANAGEMENT SERVER, CLOUD SYSTEM, AND RECORDING MEDIUM
20220292165 · 2022-09-15 · ·

A cloud management server comprises processing circuitry configured to access a device database storing information identifying a storage device in association with information identifying an owner thereof; access a license database storing license information of a license for a cloud storage, information identifying a license subscriber of the license, and information identifying a license sharer; receive setting information about a first license from a first license subscriber; refer to the device database to acquire information identifying a first storage device; set an update authority of the setting information to at least one of the first license subscriber and a first license sharer; and receive update instructions of the setting information, to refer to the update authority of the setting information, to confirm that the update instructions are given by the first license subscriber or the first license sharer having the update authority, and update the setting information.

Method and system for data license agreements and licensee auditability
11294990 · 2022-04-05 · ·

A method for managing data use operations in accordance with one or more embodiments of the invention includes sending, by a licensed data transfer engine executing on a local data manager, a license verification request to a data management system, obtaining a license verification response, providing licensed data to a client, and sending a ledger entry to a ledger service based on the licensed data provided to the client.

Method and devices for intracorporeal bonding of implants with thermal energy

The present invention provides a method for stabilizing a fractured bone. The method includes positioning an elongate rod in the medullary canal of the fractured bone and forming a passageway through the cortex of the bone. The passageway extends from the exterior surface of the bone to the medullary canal of the bone. The method also includes creating a bonding region on the elongate rod. The bonding region generally aligned with the passageway of the cortex. Furthermore, the method includes positioning a fastener in the passageway of the cortex and on the bonding region of the elongate rod and thermally bonding the fastener to the bonding region of the elongate rod while the fastener is positioned in the passageway of the cortex.

SYSTEMS AND METHODS FOR PROVIDING ACCESS TO WIRELESS GAMING DEVICES

Systems and methods for controlling access to wireless gaming devices and networks are provided. For example, access is controlled through one or more levels of security check, such as a hard security check instead of or in addition to a soft security check. In a hard security check, the user employs an apparatus such as a card or other physical token that can be used to access the wireless gaming device. Such an apparatus may communicate information that identifies the user to the device or may simply be used to produce a signal without which the device is locked to users.

Authentication device, terminal device, image forming system, and non-transitory computer readable medium
11100198 · 2021-08-24 · ·

An authentication device includes an input unit that inputs specific information of an application to be installed and specific information of an image forming device which is an installation destination, and a controller that collates the specific information of the application and the specific information of the image forming device with a database to output an authentication result indicating that authentication has been performed or has not been performed.

SECURE COUNT IN CLOUD COMPUTING NETWORKS
20210176141 · 2021-06-10 ·

Inducements are provided to customers to regularly connect back to a service provider and report usage that is expressed using a count of requests from a local computing device for cloud-based operations such as packet routing, container instantiation, virtual machine (VM) utilization, calls to a service or application, and the like. The count information is reported within a secure context, such as a trusted execution environment (TEE), using public-private key pair cryptography by which key derivation is dependent on some form of counting. For example, a customer computing device that is subject to a usage license encrypts an operation count and reports it to the service provider.

Systems and methods for transaction-based licensing

The present disclosure relates to a transaction licensing system (TLS) for managing transactions and entitlements in a cloud-based system, wherein a transaction is a communication with an external server. The TLS includes at least one transaction licensing database (TLDB) that is configure to store entitlement and transaction data. The entitlements may include a general entitlement pool, as well as specialized entitlement pools with entitlements for executing particular transactions. The TLS is configured to determine identifying information for a transaction and then use this information to determine whether the general or specialized entitlement pools associated with the transaction has entitlements available in the TLDB to execute the transaction. When a suitable entitlement is determined to be available, the transaction is executed and the general or specialized entitlement pool is appropriately decremented. When no suitable entitlements are available, the TLS returns an exception.

GEOGRAPHICALLY LOCAL LICENSE SHARING
20210173900 · 2021-06-10 ·

Various aspects of the subject technology relate to systems, methods, and machine-readable media for geographically local license sharing. The method includes transmitting, from a media server, a shared secret to a licensed client, the licensed client broadcasting a wireless signal comprising a unique identifier associated with the licensed client. The method also includes receiving, at the media server, an access token and the unique identifier of the licensed client from an unlicensed client, the access token and the unique identifier received by the unlicensed client from the licensed client based on a proximity of the unlicensed client to the licensed client. The method also includes validating, by the media server, the access token based on the unique identifier and the shared secret with the licensed client. The method also includes enabling the unlicensed client to access media content of the media server upon validation of the access token.