G06F21/128

MANAGING CONTENT DELIVERY TO CLIENT DEVICES

Managing content delivery and content usage for client devices can include receiving, using computer hardware, HyperText Markup Language (HTML) code from a content server, wherein the HTML code is sent in response to a request originating from a client device, sending to an HTML licensing server, using the computer hardware, a query specifying the content server and a list including an HTML construct detected in the HTML code, receiving from the HTML licensing server, using the computer hardware, HTML license information specifying a validity status for the HTML construct on the list and a period of time for which the validity status is active, and determining, using the computer hardware, that the HTML code is invalid based on a current time, the validity status of the HTML construct, and the period of time.

Regulate content playlists
10681014 · 2020-06-09 · ·

Methods, systems, and storage media are described for generating, regulating, and distributing regulated content playlists. A cloud computing service/system may facilitate a user in creating a regulated content playlist, verify that the regulated content playlist complies with various standards promulgated by regulatory agencies and/or governing bodies, and facilitate and control distribution of the regulated content playlist to various recipients that are permitted to access the regulated content playlist. Other embodiments may be described and/or claimed.

SESSION CONTROL FOR CLIENT-SIDE APPLICATIONS IN PROXY SOLUTIONS
20200167446 · 2020-05-28 ·

Methods, systems, and media are shown for session control by a proxy service of client-side applications in a client. A service request from a client is received by the proxy service and forwarded to a service provider, which sends a service response with a document. Event monitoring code is injected into the document and the response is forwarded to the client. The event monitoring code intercepts a user action and sends a query to the proxy service to determine whether the user action is permitted. The proxy service checks the user action against access data defined for the document and sends a query response to the event monitoring code indicating whether the user action is permitted. If the user action is permitted, the event monitoring code allows normal execution flow. If the user action is denied, the code blocks further execution.

Virtual vault of licensed content

A technique for content management involves storing runtime state of content externally. A system created according to the technique may include a state server that receives runtime state of content from a playback device, and provides the runtime state to that or another playback device upon request. A playback device constructed according to the technique may include a content state recovery engine for recovering runtime state that was previously stored externally to the playback device. A method according to the technique may include generating the runtime state locally, storing the runtime state externally, and re-acquiring the runtime state.

SECURELY STORING DIGITAL CONTENT USING A DISTRIBUTED LEDGER

Software for securely storing digital content using a distributed ledger. The software performs the following operations: (i) receiving identification information of an owner of a digital asset, metadata of the digital asset, a digital hash of the digital asset, and the digital asset; (ii) verifying authenticity of the owner based, at least in part, the received identification information; (iii) in response to verifying the authenticity of the owner, creating a watermarked version of the digital asset based on the identification information of the owner, the metadata of the digital asset, and the digital hash; and (iv) storing the digital asset and the watermarked version of the digital asset in a first distributed ledger.

On-demand web-server execution instance for website hosting with custom back-end functionality

An online website building system includes: an online database configured to store a library of website building elements for configuring a front-end of a webpage, the webpage having been built on a platform including at least common server code; and store rules for accessing code associated with the website building elements; and at least one processor configured to enable the user to edit code associated with a webpage, and to provide a programmable event for activating the resultant user-editable code, wherein the user-editable code is configured to provide dynamic customized back-end functionality associated with the webpage; store the edited user-editable code in a code storage system in communication with the online database; receive a request to access the webpage, and in response to the request and before the request times out, provide access to a virtualized execution instance comprising at least the common server code and the edited user-editable code.

SYSTEMS AND METHODS FOR SECURE SAAS REDIRECTION FROM NATIVE APPLICATIONS
20200153818 · 2020-05-14 ·

Systems and methods discussed for redirection of launch requests for local applications to corresponding remote applications, such as SaaS or network applications provided by an application server, and access of the corresponding remote application via an embedded browser of a client application. A client application executed by a client device may detect a request of a user to launch a local application of the client device. The client application may determine that the local application corresponds to a network application provided by an application server. The client application may intercept the request to launch the local application, responsive to the determination. An embedded browser of the client application may access the network application from the application server, responsive to interception of the request.

Management of calls to transformed operations and objects

In an embodiment, a method comprises intercepting a first set of instructions from a server computer that define one or more objects and one or more original operations that are based, at least in part, on the one or more objects; modifying the first set of instructions by adding one or more supervisor operations that are based, at least in part, on the one or more objects; transforming the one or more original operations to produce one or more transformed operations that are based, at least in part, on the one or more supervisor operations; rendering a second set of instructions which define the one or more supervisor operations and the one or more transformed operations; sending the second set of instructions to a remote client computer.

Method, system and application programmable interface within a mobile device for indicating a confidence level of the integrity of sources of information
10652748 · 2020-05-12 ·

The present disclosure discloses a method of allowing WebView to verify the source context, source reputation, integrity and/or security level of a web content and inform the user with regards to the security and blocks web contents that are determined harmful or inappropriate. In one embodiment of the present disclosure, the WebView checks a trusted data source to see if the visited web content has been labeled or flagged as suspect, safe or unsafe by initiating a connection to a trusted third-party database using a to determine whether or not the URL is associated with a domain that has been classified or labeled as safe or unsafe. The WebView then informs the user about the security level, suspect quality, reputation and/or integrity of the web content through a visual indicator or it can redirect the user to a warning page explaining why access to the site is prohibited, or it can block access without warning.

PRESENTING CONTENT PROTECTED BY MULTIPLE DRMS

Examples are disclosed related to presenting on a client device configured for a first digital rights management technology (DRM-1) content that is protected by a second digital rights management technology (DRM-2). One example provides a computing device configured to receive a request from an application for a DRM-2 license acquisition challenge, forward the request to a DRM-2 license acquisition challenge generator, receive a DRM-2 license acquisition challenge and DRM-2 state information, send the DRM-2 license acquisition challenge to the application, receive, from the application, a DRM-2 license acquisition response, generate a DRM-1 license acquisition challenge incorporating the DRM-2 license acquisition challenge, the DRM-2 license acquisition response, and the DRM-2 state information, send the DRM-1 license acquisition challenge to a remote DRM-1 license acquisition server, receive a DRM-1 license acquisition response comprising a key and a license policy, enforce the license policy for content protection, and decrypt content using the key.