G06F21/128

Media distribution system with manifest-based entitlement enforcement
11463413 · 2022-10-04 · ·

A method for enforcing entitlements includes configuring a wide variety of entitlements at a server; determining applicable combination of entitlements for a given client request; sending entitlements to the requesting client securely; handling entitlement information securely on a plurality of client devices at run time; storing entitlement information securely on a plurality of client devices for offline use; and enforcing entitlements on a plurality of client devices. The method employs manipulation of manifest files by a proxy that may be included in the client device or located in the network.

Providing enhanced functionality in an interactive electronic technical manual

Embodiments of the present disclosure provide methods, apparatus, systems, computer program products for generating an annotation for textual information and/or media content for technical documentation for an item in an interactive electronic technical manual system (IETM) configured to provide electronic and credentialed access to the technical documentation via an IETM viewer. In one embodiment, a method is provided comprising: providing a window for display comprising the textual information and/or media content; receiving input of a selection of an annotation selection mechanism; and responsive to receiving the input: generating the annotation for the textual information and/or media content; receiving an indication of a position in the textual information and/or media content to associate with the annotation; and providing an annotation window for the annotation for display via the IETM viewer, wherein the annotation window comprises an attach file mechanism, a capture mechanism, a share mechanism, and a change form mechanism.

Providing enhanced functionality in an interactive electronic technical manual

Embodiments of the present disclosure provide methods, apparatus, systems, computer program products for displaying a data source of data found in technical documentation for an item via an interactive electronic technical manual system (IETM) configured to provide electronic and credentialed access to the technical documentation via an IETM viewer. In one embodiment, a method is provided comprising: providing a window comprising (1) textual information from and/or an illustration related to the data and (2) a selection mechanism; receiving a first type or a second type of selection of the mechanism; responsive to receiving the first type of selection, generating a data source window comprising a relevant section of the data source that relates to the textual information and/or the illustration; responsive to receiving the second type of selection, generating the data source window comprising the data source; and providing the data source window for display via the IETM viewer.

Systems and Methods for Dynamically Restricting the Rendering of Unauthorized Content Included in Information Resources
20220255955 · 2022-08-11 ·

Systems and methods for dynamically restricting rendering of unauthorized content included in information resources are provided herein. A computing device can identify an information resource including a content object specifying one or more graphical characteristics. The computing device can determine that the content object corresponds to a restricted content object by applying at least one of an action-based detection policy to detect actions performed on the information resource or a visual-based detection policy to detect the graphical characteristics of the content object. The computing device can modify by applying a content rendering restriction policy the information resource to alter rendering of the content element on the information resource responsive to the determination.

METHOD AND SYSTEM FOR RELIABLE AUTHENTICATION OF THE ORIGIN OF A WEBSITE
20220245223 · 2022-08-04 ·

The present invention is enclosed in the area of authentication protocols, in particular web-based authentication protocols for reliably determining the origin of a web content, namely a website, and thereby legitimise/certify such website. It is an object of the present invention a method for reliable authentication of the origin of a website which includes obtaining brand digital information which is digitally associated with the website, wherein the brand digital information comprises a registered trademark and the website has a Uniform Resource Indicator (URI) which is digitally associated to the registered trademark in at least one server of a brand verification system. The solution of the present invention takes a completely different approach with regard to the above referred prior art solutions, as it focusses on a brands digital property, by attributing a self-sovereign identity with which to present itself to its customers/partners, thereby being highly simple and efficient.

Web application execution with secure element extension
11386214 · 2022-07-12 · ·

Various examples are directed to systems and methods for executing a web application with client-side encryption. A web browser can receive a document comprising a plurality of data elements including a secure element that comprises an encrypted value. An extension component may generate a secure container element to replace the secure element. The extension component can also insert a subdocument into the secure container element. The web browser may be configured to prevent web applications from accessing the subdocument. The extension component may also decrypt the encrypted value to generate a clear value and write the clear value to the subdocument. The web browser may render the document using the clear value.

Secure communication application registration process

A method for registering and activating an application downloaded to a user device, the application being provided from an application server of an enterprise. The method comprises generating an activation code for activating downloaded applications which are pending activation, storing the generated activation code on the application server, the first server not being accessible to the user and only being accessible to a jump server, enabling an administrator to access the jump server using two-factor authentication, accessing the first sever via the jump server, responding to a command by the administrator, provided through a remote connection between the jump server and the application server, by electronically communicating to the administrator activation codes associated with applications pending activation, and completing registration and activation of the application by providing a manually transferred code into the user device. The activation code is manually transferred from the administrator to the user.

METHOD AND APPARATUS FOR COLLECTING INFORMATION REGARDING DARK WEB

A method for collecting dark web information is provided. The method for collecting dark web information is performed by a computing device and comprises obtaining a list of onion addresses of a plurality of target dark web sites, accessing at least one of the plurality of target dark web sites, collecting web page information of the accessed dark web site, storing information on the accessed dark web site by analyzing the collected web page information and providing an analysis result of the accessed dark web site by using the stored information on the accessed dark web site.

SANDBOXED APPLICATION EXTENSIONS

Embodiments are directed to managing sandboxed application extensions. A first request that include includes information that identifies an extension may be provided to an extension server. Information included in a first response may be employed to instantiate an extension shell that corresponds to the extension and embed it in the hosting application such that the extension shell is associated with a first security policy included in the first response. A second request may be provided to the extension server based on information included in the extension shell such that the second request includes an identifier associated with an extension body that corresponds to the extension shell. The first security policy or the second security policy may be employed to enable one or more of the extension shell or the extension body to just access the hosting application or just access the extension server.

CONTENT MANAGEMENT SYSTEM USING AN APPLICATION FRAMEWORK FOR INTEGRATING APPS FOR EDITING CONTENT

A process for rendering a user interface that provides access to applications that integrate with a content management system (CMS), includes: providing a content management API configured to enable creating or updating a content project; receiving a command to enable an APP for the content project, wherein the APP includes a front-end component; providing, over a network, a web editor of the CMS to access the content project, wherein the APP and the front-end component are launched in an APP runtime environment of a client browser that is independent of a web editor runtime environment in which the web editor is executed, and wherein the execution of the web editor renders the user interface, and the service provided by the APP is visually integrated with services of the web editor in a predefined context of the user interface.