G06F21/1084

Automating quality assurance for standardized content sharing
10382277 · 2019-08-13 · ·

Automating quality assurance (QA) for standardized content sharing is disclosed. A system includes a shared content receiver, a rule retriever, an augmenting data checker, and a verification transmitter. The shared content receiver is configured to receive shared content and receive, from a source of the shared content, augmenting data that describes one or more characteristics of the shared content in a pre-determined format. The rule retriever is configured to retrieve rules associated with serving the shared content. The augmenting data checker is configured to determine if the augmenting data is compliant according to the retrieved rules. The verification transmitter is configured to transmit an indication of whether the augmenting data is compliant.

PORTING DIGITAL ENTITLEMENTS ACROSS APPLICATIONS

Methods, systems, and storage media for managing digital entitlements are disclosed. Exemplary implementations may: determine at least one digital entitlement; generate a digital backpack; select a third party platform; generate an application program interface (API) call associated with the at least one digital entitlement to a third party application; and store the at least one entitlement in the digital backpack.

INFORMATION TERMINAL, COMMUNICATION TERMINAL, SERVER, LICENSE TRANSFER SYSTEM AND LICENSE TRANSFER METHOD
20190155998 · 2019-05-23 ·

Provided is an information terminal connected to a communication terminal which is connectable to one or more other information terminals, wherein the information terminal comprises a communication unit which receives, from the communication terminal, a connection history with the other information terminals which were previously connected to the communication terminal, and a license transfer management unit which extracts an information terminal among the other information terminals that satisfies a license transfer condition based on the received connection history.

Information processing device and information processing method
10103884 · 2018-10-16 · ·

An information processing device includes a first processor, an information protection circuit, and a first communication path which connects between the information protection circuit and the first processor. The information protection circuit includes an interface circuit which connects the information protection circuit to the first communication path, a second processor, and a first memory which is inaccessible from the first processor but accessible from the second processor. When a command received from the first communication path is a command destined for the information protection circuit, the interface circuit passes the command to the second processor and the second processor executes a process related to information stored in the first memory in accordance with the command, but when the command received from the first communication path is not a command destined for the information protection circuit, the interface circuit does not pass the command to the second processor.

COMPUTER-BASED SYSTEMS CONFIGURED TO ORCHESTRATE A TRANSFER OF A DIGITAL ARTIFACT AND METHODS OF USE THEREOF

In some embodiments, the present disclosure provides an exemplary method that may include steps of identifying a plurality of entities seeking to interact with each other; determining a set of artifacts associated with each entity of the plurality of entities; Utilizing a cloud-based functionality to dynamically connect at least two entities based on a determination of the set of artifacts shared between the at least two entities; dynamically integrating a plurality of protocols into an interaction session associated with the at least two entities; verifying the plurality of protocols associated with the interaction session; initiating the interaction session between at least two entities based on the plurality of protocols and the set of artifacts; and automatically modifying the interaction session to orchestrate a transfer of at least one artifact of the set of artifacts between the at least two entities.

AUTOMATING QUALITY ASSURANCE FOR STANDARDIZED CONTENT SHARING
20180109422 · 2018-04-19 ·

Automating quality assurance (QA) for standardized content sharing is disclosed. A system includes a shared content receiver, a rule retriever, an augmenting data checker, and a verification transmitter. The shared content receiver is configured to receive shared content and receive, from a source of the shared content, augmenting data that describes one or more characteristics of the shared content in a pre-determined format. The rule retriever is configured to retrieve rules associated with serving the shared content. The augmenting data checker is configured to determine if the augmenting data is compliant according to the retrieved rules. The verification transmitter is configured to transmit an indication of whether the augmenting data is compliant.

Automating quality assurance for standardized content sharing
09935842 · 2018-04-03 · ·

A system and method for automating quality assurance for standardized content sharing is provided. The system includes a shared content receiver to receive shared content augmented with augmenting data; an authorized provider to determine whether a source of the shared content is authorized to provide shared content to the system; a rule retriever to retrieve rules associated with serving the shared content; an augmenting data checker to determine if the augmenting data is compliant according to the retrieved rules; and a verification transmitter to transmit an indication of whether the augmenting data is compliant.

Multimedia container for physical object authentication and verification of attendance
12177369 · 2024-12-24 ·

A method, server, system, and computer program product creates a three-dimensional (3D) virtual certificate of authenticity (COA) that is a multimedia container having a media file that provides for an experiential presentation in the 3D COA itself. The multimedia container with media file lends credibility to the authenticity of the 3D COA. The ownership of the 3D COA can be stored in a blockchain as a non-fungible token, and easily transferred from one claimant of the 3D COA to another.

Interoperable Systems and Methods for Peer-to-Peer Service Orchestration
20170163645 · 2017-06-08 ·

Systems and methods are described for performing policy-managed, peer-to-peer service orchestration in a manner that supports the formation of self-organizing service networks that enable rich media experiences. In one embodiment, services are distributed across peer-to-peer communicating nodes, and each node provides message routing and orchestration using a message pump and workflow collator. Distributed policy management of service interfaces helps to provide trust and security, supporting commercial exchange of value. Peer-to-peer messaging and workflow collation allow services to be dynamically created from a heterogeneous set of primitive services. The shared resources are services of many different types, using different service interface bindings beyond those typically supported in a web service deployments built on UDDI, SOAP, and WSDL. In a preferred embodiment, a media services framework is provided that enables nodes to find one another, interact, exchange value, and cooperate across tiers of networks from WANs to PANs.

METHOD FOR THE SECURE PROVISION OF A SERVICE THROUGH A CENTRAL PROVISION ENTITY AND DEVICE
20250126109 · 2025-04-17 ·

The participants in the Industrial Edge ecosystem want extensive automatic integration mechanisms, if possible without interfering with currently common OPC UA software stacks. The OPC UA server applications cannot however be externally accessed without further measures so that the user has to balance the server ports between the application view and the edge device view and must in the process consider port conflicts and compliance with possible network environment restrictions, as well as the other parts of its automation application with the servers via the concrete network addressing information. It is proposed to produce an initial trust relationship (with a certificate of origin). This certificate of origin/initial trust relationship corresponds to the CA certificate of the provision entity. In addition, it is proposed to expand a combination of proxy plus local directory service (Local Discovery Server,