Patent classifications
H04L63/10
Systems and Methods for Binding Content Playback to the Pairing of a Playback Device and Removable Memory Storage Device
Systems and methods for binding content to pairing of a playback device and removable memory storage device are disclosed. In one embodiment, a method for requesting authorization to play content using a playback device and a removable memory storage device includes retrieving a coupon identifier from a removable memory storage device while it is attached to the playback device, generating a coupon code using the coupon identifier, sending a request for storefront token that includes a device match data token and an application identifier, receiving a storefront token associated with a storefront identifier where the storefront identifier identifies a storefront application, sending a request for ticket token that includes the coupon code, the storefront identifier, and a content identifier that identifies the content, sending a request for license file that includes the ticket token, and receiving a license file that grants playback rights to the piece of content.
SYSTEM, METHOD AND COMPUTER PROGRAM PRODUCT FOR SHARING CONTENT VIA LINKS
In accordance with embodiments, there are provided mechanisms and methods for sharing content via links. These mechanisms and methods for sharing content via links can enable customizable features associated with the operations related to those links. These features may include generating customized reports on usage of the links, and/or exposing one or more application programming interfaces (APIs) enabling applications to access the links and/or logic associated with operations related to those links.
Methods and systems for managing website access through machine learning
A method may include obtaining a request to unblock a predetermined website in a network and that is associated with a predetermined list. The predetermined list may be used to determine whether a respective user device among various user devices can access one or more websites. The method may further include determining an impact level of the predetermined website for an organization using a machine-learning algorithm and website gateway data. The method may further include determining a probability of a security breach using the machine-learning algorithm and threat data. The method may further include determining whether to unblock the predetermined website based on the impact level and the probability of a security breach. The method may further include transmitting, in response to determining that the predetermined website should be unblocked, a command that modifies the predetermined list to enable the respective user device to access the predetermined website.
Continuing a media access control security (MACsec) key agreement (MKA) session upon a network device becoming temporarily unavailable
A network device may communicate with another network device via a media access control security (MACsec) key agreement (MKA) communication link, wherein an MKA session has been established between the network device and the other network device. The network device may determine that the other network device is unavailable. The network device may cause, based on determining that the other network device is unavailable, an MKA state of the network device to be placed in a paused state. The network device may receive, after causing the MKA state of the network device to be placed in the paused state, a packet from the other network device via the MKA communication link. The network device may determine, based on the packet, that the MKA session has not ended. The network device may continue, based on the MKA session having not ended, the MKA session by reactivating the MKA state.
Security systems, methods, and computer program products for information integration platform
An information integration system may include a set of integration services embodied on one or more server machines in a computing environment. The set of integration services may include connectors communicatively connected to disparate information systems. The connectors may be configured for integrating data stored in the disparate information systems utilizing a common model employed by the set of integration services. The common model may overlay, augment, integrate, or otherwise utilize a content management interoperability services data model and may include common property definitions and a common security model. The common security model may include permissions particularly defined for use by the set of integration services. These common property definitions and permissions may be uniquely defined and utilized by the information integration system.
INFORMATION SUCCEEDING METHOD, INFORMATION SUCCEEDING SYSTEM, AND INFORMATION PROCESSING APPARATUS
Disclosed is an information succeeding method executed by a computer. The information succeeding method includes determining whether a context satisfies a predetermined condition; distributing a content to a terminal in a case where the context is determined to satisfy the predetermined condition; transmitting, upon receiving succeeding information indicating succeeding of the content from the terminal, content information corresponding to the succeeding information to the terminal; receiving from the terminal the previously distributed content, based on the content information; and transmitting the previously distributed content to a succeeding destination, upon receiving a content request that has been transmitted from the succeeding destination based on the content information, the content information having been received by the succeeding destination from the terminal.
SYSTEM AND METHOD FOR ADMINISTERING PHYSICAL SECURITY ACCESS TO COMPONENTS OF A PROCESS CONTROL SYSTEM
A system for restricting physical access to at least one component process control system component has a locking device that is integrated with process control system security administration data. The locking device accesses the process control system security data when authenticating a user. Upon authentication of a user for physical access to the particular process control component, the user may directly access the component for which the user is authorized. The system provides tracking of all authenticated users and attempts to access the various control system components.
LOGON USING MASTER PASSWORD OR TURN-VARYING PASSWORD
Embodiments utilize two types of passwords that each, separately, allow a device user to logon to a network. The first is a master password that allows a user to log on at any time. The second is a turn-varying password that changes with each logon and is valid for only one logon. The network may be accessed by using either the master password or the turn-varying password. The turn-varying password may be presented to a user at the device. A device and a network apparatus may each initially synchronize and maintain a turn state that is based on a number of user logons. When a logon occurs, the device and network apparatus update the turn-varying password for the next logon using the turn-varying password. If a user is in an unsecure location and logs on only using the turn-varying password, a sniffed or stolen turn-varying password is not useable.
APPLICATION-DRIVEN STORAGE SYSTEMS FOR A COMPUTING SYSTEM
Systems and methods that allow secure application-driven arbitrary compute in storage devices in a cloud-based computing system are provided. A computing system including a compute controller configured to: (1) provide access to host compute resources, and (2) operate in at least one of a first mode or a second mode is provided. The computing system may further include a storage controller configured to provide access to storage systems including storage components, at least one compute component, and at least one cryptographic component. In the first mode, the host compute resources may be configured to execute at least a first operation on at least a first set of data stored in at least one of the storage components. In the second mode, the at least one compute component may be configured to execute at least a second operation on at least a second set of data.
METHOD AND SYSTEM FOR SHARING OF REAL-TIME, DYNAMIC, ADAPTIVE AND NON-LINEARLY ASSEMBLED VIDEOS ON PUBLISHER PLATFORMS
The present disclosure provides a method and system for sharing a real time, dynamic, adaptive and non-linearly assembled video on one or more publisher platforms. The method includes collection of a first set of information associated with a publisher platform of the one or more publisher platforms and fetching a set of preference data of the user from the publisher platform in the real time. The method includes fragmentation of each tagged video into the one or more tagged fragments and segregation of one or more mapped fragments into one or more logical sets of mapped fragments. The method includes mining of semantic context information and clustering of the one or more logical sets of mapped fragments into the one or more logical clusters of mapped fragments. The method includes assembling the one or more logical clusters of mapped fragments and sharing an assembled video on the publisher platform.