G06F21/1077

DETECTING AND TRACKING VIRTUAL CONTAINERS

Examples of techniques for detecting and tracking virtual containers are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes detecting a virtual container. The method further includes collecting virtual container data for the virtual container. The method also includes associating, by a processing device, the virtual container to at least one of a plurality of images. Additionally, the method includes building, by the processing device, a container event database based on the virtual container data and the association of the virtual container to the at least one of the plurality of images, so as to enable tracking of software in the plurality of images and in live virtual containers.

METHOD AND SYSTEM FOR DATA LICENSE AGREEMENTS AND LICENSEE AUDITABILITY
20210026931 · 2021-01-28 ·

A method for managing data use operations in accordance with one or more embodiments of the invention includes sending, by a licensed data transfer engine executing on a local data manager, a license verification request to a data management system, obtaining a license verification response, providing licensed data to a client, and sending a ledger entry to a ledger service based on the licensed data provided to the client.

Method and Devices for Intracorporeal Bonding of Implants with Thermal Energy
20210000515 · 2021-01-07 ·

A system for dynamically controlling a weld profile includes a generator, and end effector, a sensor, and a computer. The generator is configured to supply energy based on the weld profile. The end effector operatively connected to the generator and configured to apply vibratory energy and pressure to an object. The sensor configured to provide an output with respect to the object. The computer configured to monitor the output and change the weld profile of the generator based on the output.

Software-Enabled Remote Licensing and Provisioning

Described herein are systems and methods for providing software provisioning of functionality in a wireless communications device. Software-enabling functionality may include systems for granting a license to intellectual property or other pre-embedded functionality within a device. Communications to and from the device may be used to send or receive activation messages and/or licensing messages. Network capabilities may be provisioned using activation messages sent over the network. Activation messages may be sent in-band or out-of-band, for a device connected to the Internet and/or a mobile operator core network. Licenses may be required for any functions or intellectual property present on a given device. Activation may enable logical modules of a system-on-chip (SOC), functions of a software-defined radio (SDR), baseband, or DSP core. The disclosed systems and methods could thereby provide a new, flexible paradigm, namely, Silicon as a Service (SaaS).

CLUSTER-WISE LICENSE INFORMATION REPLICATION

System and methods for replicating and enforcing license information in a computer cluster are described. The method may include: receiving, by a core-node in the computer cluster, a plurality of peer-license-info from a plurality of peer-nodes selected from a plurality of cluster nodes. Each of the plurality of peer-license-info may include license-info collected by and associated with a corresponding one of the plurality of peer-nodes. The method may include generating, by the core-node, a first cluster-license-info based on the plurality of peer-license-info. The method may further include propagating, by the core-node, the first cluster-license-info to each of the plurality of peer-nodes. The first cluster-license-info is configured for detecting license violations among the plurality of cluster nodes.

Systems and methods for expedited entitlement checks

Systems and methods for managing access data are disclosed. One method can comprise receiving prediction information relating to one or more content options and requesting access information associated with the prediction information. At least a portion of the received access information can be processed to provide a preliminary access decision. A request for access relating to the one or more data options can be received and an access decision based at least in part on the preliminary access decision can be provided.

AUTOMATICALLY DETECTING MISUSE OF LICENSED SOFTWARE
20200349238 · 2020-11-05 ·

An example embodiment may involve communicating with a server to separately access first and second records of sessions between the server and computing devices of a network, the first record including a first set of fields not present in the second record and the second record includes a second set of fields not present in the first record; identifying a common field present the first and second records; correlating information across the first and second records using the common field; using a set of license misuse criteria to identify, from the correlated information, (i) a set of the sessions that meets the set of criteria and (ii) a network address of a target device involved in the set of sessions; identifying the target device using the network address; and storing an indication identifying the target device as a potential source of misuse of licensed software executable on the server.

Detecting and tracking virtual containers

Examples of techniques for detecting and tracking virtual containers are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes detecting a virtual container. The method further includes collecting virtual container data for the virtual container. The method also includes associating, by a processing device, the virtual container to at least one of a plurality of images. Additionally, the method includes building, by the processing device, a container event database based on the virtual container data and the association of the virtual container to the at least one of the plurality of images, so as to enable tracking of software in the plurality of images and in live virtual containers.

Graphical user interfaces for software asset management
10824305 · 2020-11-03 · ·

A computational instance of a remote network management platform may be associated with a managed network and include a database containing: (i) indications of software applications installed on computing devices of the managed network, and (ii) indications of software models that respectively define publisher, product, and licensing information related to the software applications. The computational instance may include a server device configured to (i) generate a representation of a first graphical user interface, (ii) transmit, to a client device associated with the managed network, the representation of the first graphical user interface, (iii) receive, from the client device, a selection, (iv) based on the particular set of the software applications and the particular set of the software models, generate a representation of a second graphical user interface, and (v) transmit, to the client device, the representation of the second graphical user interface.

GRAPHICAL USER INTERFACES FOR SOFTWARE ASSET MANAGEMENT
20200341598 · 2020-10-29 ·

A computational instance of a remote network management platform may be associated with a managed network and include a database containing: (i) indications of software applications installed on computing devices of the managed network, and (ii) indications of software models that respectively define publisher, product, and licensing information related to the software applications. The computational instance may include a server device configured to (i) generate a representation of a first graphical user interface, (ii) transmit, to a client device associated with the managed network, the representation of the first graphical user interface, (iii) receive, from the client device, a selection, (iv) based on the particular set of the software applications and the particular set of the software models, generate a representation of a second graphical user interface, and (v) transmit, to the client device, the representation of the second graphical user interface.