G06F21/128

SYSTEMS AND METHODS FOR FACILITATING SECURE STREAMING OF ELECTRONIC GAMING CONTENT

A game identifier of an encrypted streaming electronic game to be streamed to a playback device may be received. The game identifier may comprise a title of the encrypted streaming electronic game. An electronic ticket for access by the playback device to a secured portion of the encrypted streaming electronic game may be gathered. The electronic ticket may specify a first gameplay state. The electronic ticket may be used to access the secured portion of the encrypted streaming electronic game at the first gameplay state. One or more gameplay actions to transform the encrypted streaming electronic game to a second gameplay state may be received. The second gameplay state may be provided to a state server, where the state server configured to instruct a license server to modify the electronic ticket to specify the second gameplay state for the encrypted streaming electronic game.

Media distribution system with manifest-based entitlement enforcement
10841282 · 2020-11-17 · ·

A method for enforcing entitlements includes configuring a wide variety of entitlements at a server; determining applicable combination of entitlements for a given client request; sending entitlements to the requesting client securely; handling entitlement information securely on a plurality of client devices at run time; storing entitlement information securely on a plurality of client devices for offline use; and enforcing entitlements on a plurality of client devices. The method employs manipulation of manifest files by a proxy that may be included in the client device or located in the network.

Method and system of hardening applications against security attacks
10839052 · 2020-11-17 ·

In one aspect, computerized method for hardening security of an application includes the step of modifying a set of instructions of an application to include at least one sensor adapted to capture a set of information snapshots from within the application in a running state. The method includes the step of analyzing, from within the application, the set of information snapshots from the at least one sensor. The method includes the step of detecting a presence, a status, and a configuration of a security defense mechanism based on an analysis of the information snapshots; invoking an appropriate hardening action to improve the security defense mechanism of the application.

Authentication translation
10824696 · 2020-11-03 · ·

Authentication translation is disclosed. A request to access a resource is received at an authentication translator, as is an authentication input. The authentication input corresponds to at least one stored record. The stored record is associated at least with the resource. In response to the receiving, a previously stored credential associated with the resource is accessed. The credential is provided to the resource.

INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS AND INFORMATION PROCESSING METHOD
20200334342 · 2020-10-22 · ·

An information processing system, apparatus, and method are disclosed each of which: receives a request for using an application from an electronic device via a network; determines whether the requested application is applicable to the electronic device and is currently useable by the electronic device; determines whether a number of devices currently using the requested application has reached an upper limit number that is previously set, when the determining determines that the requested application is applicable to the electronic device but is not currently useable by the electronic device; and allows the electronic device to use the requested application, when the determining determines that a number of devices using the requested application has not reached the upper limit number.

VALIDATION OF A NETWORK OPERATION RELATED TO USE OF A TOKEN VIA TOKEN-REQUEST-TRIGGERED STORAGE OF SNAPSHOT URL DATA

In some embodiments, validation of a network operation based on screenshot-derived uniform resource locator (URL) data may be facilitated. In some embodiments, in connection with use by a user of a first token associated with a first entity, user activity data associated with the user may be stored in a database in association with the first token. In some embodiments, the first user activity data may comprise first URL data and first timestamps associated with the first URL data. After the storage of the first user activity data, a first action request for a first action involving use of the first token may be obtained. A validation process may be performed on the first action by performing a first query of the database for user activity data based on the first action request.

PROVIDING ENHANCED FUNCTIONALITY IN AN INTERACTIVE ELECTRONIC TECHNICAL MANUAL
20240015192 · 2024-01-11 ·

Embodiments of the present disclosure provide methods, apparatus, systems, computer program products for generating an annotation for textual information and/or media content for technical documentation for an item in an interactive electronic technical manual system (IETM) configured to provide electronic and credentialed access to the technical documentation via an IETM viewer. In one embodiment, a method is provided comprising: providing a window for display comprising the textual information and/or media content; receiving input of a selection of an annotation selection mechanism; and responsive to receiving the input: generating the annotation for the textual information and/or media content; receiving an indication of a position in the textual information and/or media content to associate with the annotation; and providing an annotation window for the annotation for display via the IETM viewer, wherein the annotation window comprises an attach file mechanism, a capture mechanism, a share mechanism, and a change form mechanism.

PROVIDING ENHANCED FUNCTIONALITY IN AN INTERACTIVE ELECTRONIC TECHNICAL MANUAL
20240015191 · 2024-01-11 ·

Embodiments of the present disclosure provide methods, apparatus, systems, computer program products for performing functionality requiring network connectivity in an interactive electronic technical manual system (IETM) configured to provide electronic and credentialed access to technical documentation for an item. In one embodiment, a method is provided comprising: receiving input comprising informational data; and responsive to receiving the data: generating a graphical security code; receiving input indicating a scanning of the code, wherein the scanning of the code (1) is performed by a user using a remote device connected to a network and (2) causes access to scanning functionality provided by an application installed on the device; and responsive to receiving the input: generating a graphical form code comprising the data; and causing display of a third window comprising the code, wherein the code can be scanned using the application to send the data to a third party over the network.

Information processing system, information processing apparatus and information processing method
10769251 · 2020-09-08 · ·

An information processing system, apparatus, and method are disclosed each of which: receives a request for using an application from an electronic device via a network; determines whether the requested application is applicable to the electronic device and is currently useable by the electronic device; determines whether a number of devices currently using the requested application has reached an upper limit number that is previously set, when the determining determines that the requested application is applicable to the electronic device but is not currently useable by the electronic device; and allows the electronic device to use the requested application, when the determining determines that a number of devices using the requested application has not reached the upper limit number.

Systems and methods for automatically detecting desktop applications to access content when multiple access options are available

Described herein is a computer implemented method comprising receiving a link to content served by a remote server, detecting activation of the link, and in response to detecting activation of the link attempting to load a passive mixed content item from a local web server. In response to determining the passive mixed content item successfully loaded the method further comprises extracting installed application information from the passive mixed content item, determining whether or not the installed application information indicates a relevant installed desktop application, and if so accessing the content referenced by the link from the remote application server using the relevant installed desktop application.