G06F21/121

Systems and methods for authentication
11544357 · 2023-01-03 · ·

The present disclosure provides systems and methods for parameterized application installation. A client device may provide authentication credentials of a user to an authentication server, which may store an association between the user and a content item linking to an application and identifying a parameter for use by the application. The client device may download and install the application via an application server or application store. Once installed, the application may re-provide the authentication credentials to the authentication server, which may retrieve the association, and provide the parameter for use by the application. Thus, the application server or application store may continue to discard referrer information or parameters for the application, but the application may still receive and utilize the parameters without further user intervention.

METHOD AND APPARATUS FOR PREVENTING ROLLBACK OF FIRMWARE OF DATA PROCESSING DEVICE, AND DATA PROCESSING DEVICE
20220414189 · 2022-12-29 ·

Implementations of the present application propose a method and apparatus for preventing rollback of firmware of a data processing device, and a data processing device. The method includes: enabling a boot loader (BootLoader) to read a current value of a predetermined bit in a one-time programmable memory (eFuse); determining whether the current value and a legal value written into the one-time programmable memory after the latest updating of the firmware of the data processing device satisfy a preset relationship; in response to determining that the current value and the legal value satisfy the preset relationship, enabling the boot loader to call an operating system kernel of the data processing device, and in response to determining that the current value and the legal value do not satisfy the preset relationship, enabling the boot loader not to call the operating system kernel of the data processing device. According to the implementations of the present application, rollback of the firmware can be prevented based on a variety of ways in a link-by-link mode.

Onboarding of Monitoring Tools
20220414187 · 2022-12-29 ·

A system, process, and computer-readable medium for configuring agents for monitoring deployed applications is described. A system, process, and computer-readable medium for configuring monitoring user interfaces, e.g., monitoring dashboards, that use information made available from the agents is also described. Through using application data available during creation of the agents, the agents may be configured using the user interface as modified by selections and displaying subsequent choices from the received application data. Using knowledge of the generated agents, monitoring dashboards may be generated via developers interacting with a user interface providing a list of available metrics accessible by the generated agents. Using the one or more user interfaces, developers may generate agents and/or monitoring dashboards with greater efficiency.

Information processing system, information processing device, storage medium, and information processing method of detecting destruction of data due to file transfer
11537308 · 2022-12-27 · ·

An information processing device, includes a memory; and a processor coupled to the memory and configured to: generate second data by adding, to first data including a machine language, first machine language data that may be destroyed at a time of transfer of the first data and second machine language data that is not destroyed at the time of the transfer, and transmit the second data.

System and Method for Managing Secure Files in Memory
20220405431 · 2022-12-22 ·

A data access manager is provided on a computing device to manage access to secure files stored in memory. The data access manager intercepts function calls from applications to the memory management unit and determines whether an application is allowed to access secure data stored in the memory of the computing device. When an initial request to map the data is received, the data access manager maps both secure data and clear data, obtaining pointers to both secure and clear data. When an application has permission to access the requested data, the data access manager returns the pointer to the clear data. When an application does not have permission to access the requested data, the data access manager returns the pointer to the secure data.

ANTI-PIRACY PROTECTION SERVICE-BASED SOFTWARE LICENSE MANAGEMENT SYSTEM TO PREVENT USAGE OF UNLICENSED SOFTWARE AFTER THE TRIAL PERIOD
20220405354 · 2022-12-22 ·

One example method, includes checking, by an intelligent time detector service running on a computing system, a trial period duration of software on the computing system, starting, by the intelligent time detector service, a counter for the software, and the counter is operable to generate a counter value based on a clock of the computing system, storing, by the intelligent time detector service, a counter value of the counter, and decommissioning, by the intelligent time detector service, the software after the trial period has expired.

IN-VEHICLE INFORMATION PROCESSING APPARATUS, PROGRAM EXECUTION RESTRICTION METHOD, AND COMPUTER PROGRAM
20220396218 · 2022-12-15 ·

Provided are an in-vehicle information processing apparatus, a program execution restriction method and a computer program that can be expected to provide users with an opportunity to fully use the trial version of an application program. An in-vehicle information processing apparatus according to one embodiment is an in-vehicle information processing apparatus to be mounted in a vehicle and for executing a program, the apparatus including a processing unit, whereby the processing unit determines whether the travel distance of the vehicle from when usage of the program is started exceeds a threshold value, and, if it is determined that the travel distance exceeds the threshold value, restricts subsequent execution of the program. The processing unit of the in-vehicle information processing apparatus may acquire the program and information relating to the threshold value from a device provided externally to the vehicle.

FAIL-SAFE SOFTWARE ACCESS LICENSING CONTROL ON A PER PROJECT BASIS WITHOUT A PRIORI KNOWLEDGE OF PROJECT DETAILS

A request may be received to use a software on a first project. A first set of values may be extracted for a set of features of the first project. A classifier may be used to classify the first project based on the first set of values. It may be determined whether to grant the request to use the software on the first project based on an output of the classifier.

STREAMING FRAUD DETECTION USING BLOCKCHAIN

Systems and methods for detecting fraudulent streaming activity. Streaming activity is posted to a blockchain by one or more DSPs. Blockchain streaming data is extracted from the blockchain and used as input in a machine learning model. The machine learning model takes the extracted blockchain data, along with additional inputs such as DSP trend pool and social pool inputs, and makes a determination regarding potentially fraudulent streaming activity.

Template-based software discovery and management in virtual desktop infrastructure (VDI) environments

A technique to manage software licensing in an environment that provides virtual desktop infrastructure (VDI). A license manager is configured to receive first information identifying software applications associated with a virtual machine template used in the infrastructure, as well as second information that a user has logged into the VDI from a client device, thereby creating a VDI session. For a particular time period of interest, the license manager calculates software application usage information from the first and second information. Preferably, the software application usage information represents an application count that is based on the user and the client device “pair” when the user has the VDI session during at least some portion of the time period. The software application usage information is provided to one or more other computing systems to take a given action, such as tracking, managing, auditing, enforcing and accounting for software usage in the VDI environment.