G06F21/121

CONTROL SERVER, DATA SHARING SYSTEM, AND CONTROL PROGRAM

Upon receiving a usage request that includes a file identifier and a version identifier from a user terminal 20, a control server 10 transmits a file request that is based on the usage request to a file management system, and transmits a permission information request that is based on the usage request to a distributed ledger system. Upon receiving the file request, the file management system acquires the file that corresponds to the combination of the file identifier and the version identifier and transmits the file to the control server 10. Upon receiving the permission information request, the distributed ledger system acquires permission information that corresponds to the combination of the file identifier and the version identifier from a distributed ledger, and transmits the permission information to the control server 10. The control server 10 transmits the file to the user terminal 20 if the user of the user terminal has viewing permission based on the permission information.

Remote feature activation in power machines

Implementations of the present disclosure are generally directed to activating features in power machines. More particularly, implementations of the present disclosure are directed to remote activation of features in power machines. Implementations include, methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for transmitting a request for an initialization indicator for a software package from an initialization system of a power machine comprising hardware physically capable of executing at least one function, the request being transmitted, by a communication link of the initialization system, from a machine controller of the initialization system to a remote system, communicating, by the communication link, the initialization indicator from the remote system to the machine controller, and in response to receiving the initialization indicator: storing, by the machine controller, the initialization indicator, and executing, by the machine controller, the software package to control the at least one function.

Device and method for checking properties of resources
11706257 · 2023-07-18 · ·

Device, computer program product and method for checking properties of resources, wherein a checking device for checking properties of resources of a web server includes a calculation unit for calculating an identifier identifying a particular resource using the particular resource, a detection unit for detecting a license requirement for the particular resource using the calculated identifier, and a determination unit for determining an existing license for the web server in the case of a license requirement detected for the particular resource using the calculated identifier, such that unauthorized posting of a particular resource to a web server can be easily detected and prevented.

Machine learning model with watermarked weights

In some examples, a system includes storage storing a machine learning model, wherein the machine learning model comprises a plurality of layers comprising multiple weights. The system also includes a processing unit coupled to the storage and operable to group the weights in each layer into a plurality of partitions; determine a number of least significant bits to be used for watermarking in each of the plurality of partitions; insert one or more watermark bits into the determined least significant bits for each of the plurality of partitions; and scramble one or more of the weight bits to produce watermarked and scrambled weights. The system also includes an output device to provide the watermarked and scrambled weights to another device.

METHODS AND SYSTEMS TO IDENTIFY A COMPROMISED DEVICE THROUGH ACTIVE TESTING

Methods and devices for determining whether a mobile device has been compromised. File tree structure information for the mobile device is obtained that details at least a portion of a tree-based structure of folders and files in a portion of memory. The file tree structure information is analyzed to determine that the mobile device has been compromised, has not been compromised, or might be compromised. Based on determining that the mobile device might be compromised, the mobile device is instructed to execute a restricted action. If the restricted action occurs on the mobile device then it is determined that the mobile device has been compromised. Based on that determination, an action is taken.

Information processing device, management device, and non-transitory computer readable medium

An information processing device not connected to a communication line includes a processor configured to generate information on each specific processing repeatedly executed, the information being to be managed by a management device, and refer to management information indicating information already managed by the management device, and output information which is among the generated information and not yet managed by the management device.

Systems and methods for validating licenses
11698948 · 2023-07-11 · ·

A method for license validation is disclosed herein, including receiving one or more strings of one or more parameters defining a license authorizing access to at least one or more portions of software, generating a first hash based on the one or more parameters defining the license and a key, storing parameters defining the generated first hash, storing the generated first hash, responsive to an element rendering on a web page, determining a version of an application program interface used to generate the first hash and the key used to generate the hash, by interpreting the hash, and integrating the one or more portions of software for use by a user. The one or more portions of software are integrated based on the one or more parameters defining the license embedded in the first hash.

SYSTEMS AND METHODS FOR CONTROLLING ACCESS TO MEDIA ASSETS USING TWO-FACTOR AUTHENTICATION

Systems and methods for authorizing operations associated with blocked media assets using two-factor authentication. In some aspects, a media guidance application (e.g., executed by a set-top box or other user equipment used to store and display media assets) prompts a user for a password (e.g., a personal information number) in order to unlock the content for viewing. In response to receiving a second request from the user to perform an operation related to the media asset (e.g., delete), the media guidance application prompts the user for an additional factor confirming his or her identity, consistent with two-factor authentication protocol. If the user's identity is authenticated as a user that has authority to perform the operation related to the media asset (e.g., delete the stored media asset), the media guidance application performs the operation related to the media asset (e.g., deletes the media asset).

Standardized interface for intellectual property blocks

There is disclosed in one example, a system-on-a-chip (SoC), including: a processor core; a fabric; an intellectual property (IP) block communicatively coupled to the processor core via the fabric, the IP block having a microcontroller configured to provide a microcontroller architecture; a firmware load interface configured to provide a standardized hardware interface to the microcontroller architecture, wherein the standardized hardware interface provides an architecture-agnostic mechanism to securely load a firmware to the intellectual property block; and logic to provide a loader to load a firmware to the IP block via the firmware load interface.

Methods and systems for the reservation and registration of internet of things device licenses from authorized licenses associated with vendor software

Novel tools and techniques for an IoT shell are provided. A system includes an internet of things (IoT) device, a database, and a license manager. The database may include one or more sets of authorized licenses, each set of authorized licenses associated with a respective vendor software. The license manager may be in communication with the IoT device and the database, and further include a processor and a non-transitory computer readable medium comprising instructions executable by the processor. The license manager may be configured to receive a request to reserve a license for a first vendor software, determine an availability of the license associated with the first vendor software, register a unique identifier of the IoT device in association with the license, and grant the license to the IoT device.