Patent classifications
H04L2463/101
SOURCE-BASED AUTHENTICATION FOR A LICENSE OF A LICENSE DATA STRUCTURE
Technology is disclosed herein for source-based authentication for a license of a license data structure. In at least one implementation, program instructions stored on one or more computer readable storage media, when executed by a processing system, direct the processing system to at least, responsive to a launch of an application, obtain a license file for the application, the license file comprising a user license. The processing system is further directed to determine authentication of the user license based on a source of the license file and, if the user license is authenticated, enable features of the application based on the user license and initiate presentation of the application in accordance with the enabled features.
Information processing apparatus, communication system and control method of information processing apparatus
Provided is an information processing apparatus including a determination unit and a control unit. The determination unit is configured to determine whether a predetermined condition for performing a communication process related to a specific service provided by a service provider between an information processing system related to the service provider and a wireless communication apparatus is satisfied. The control unit is configured to perform control when the predetermined condition is satisfied in a manner that a connection right of connecting to a predetermined network using wireless communication is set in the wireless communication apparatus, the wireless communication apparatus connects to the network based on the set connection right, and the communication process is performed with the information processing system.
Collision avoidance in a distributed tokenization environment
A client receives sensitive data to be tokenized. The client queries a token table with a portion of the sensitive data to determine if the token table includes a token mapped to the value of the portion of the sensitive data. If the mapping table does not include a token mapped to the value of the portion of the sensitive data, a candidate token is generated. The client queries a central token management system to determine if the candidate token collides with a token generated by or stored at another client. In some embodiments, the candidate token includes a value from a unique set of values assigned by the central token management system to the client, guaranteeing that the candidate token does not cause a collision. The client then tokenizes the sensitive data with the candidate token and stores the candidate token in the token table.
Permission Information Management System, User Terminal, Right-Holder Terminal, Permission Information Management Method, and Permission Information Management Program
A user terminal generates a first key pair and a second key pair, transmits a permission request including a public encryption key of the second key pair after electronically signing the permission request with a secret encryption key, and acquires, from permission information transmitted from a right-holder terminal, a content decryption key by using a secret decryption key of the second key pair and uses the content. The right-holder terminal stores a third key pair and the content decryption key, verifies the permission request received, and encrypts the content decryption key by using the public encryption key of the second key pair included in the permission request and transmits the permission information including the encrypted content decryption key after electronically signing the permission information with a secret encryption key of the third key pair. The permission request and the permission information are transmitted and received via a blockchain.
Software-enabled remote licensing and provisioning
Described herein are systems and methods for providing software provisioning of functionality in a wireless communications device. Software-enabling functionality may include systems for granting a license to intellectual property or other pre-embedded functionality within a device. Communications to and from the device may be used to send or receive activation messages and/or licensing messages. Network capabilities may be provisioned using activation messages sent over the network. Activation messages may be sent in-band or out-of-band, for a device connected to the Internet and/or a mobile operator core network. Licenses may be required for any functions or intellectual property present on a given device. Activation may enable logical modules of a system-on-chip (SOC), functions of a software-defined radio (SDR), baseband, or DSP core. The disclosed systems and methods could thereby provide a new, flexible paradigm, namely, Silicon as a Service (SaaS).
Digital rights and integrity management in three-dimensional (3D) printing
Systems, methods and media for managing digital rights and pre-verification of structural integrity in three-dimensional (3D) printing are provided. In one example, a system comprises at least one module, executing on one or more computer processors, to receive a request from a user to print a 3D object by a 3D printer or printing service and receive a conditional authorization from an owner of digital rights in the 3D object to print the 3D object. The conditional authorization can include a printing specification or limitation. The at least one module pre-verifies, for structural integrity once printed by the 3D printer or printing service, a digital model on which the 3D object is based. In response to a received conditional authorization, the at least one module transmits instructions to the 3D printer or printing service to print the 3D object.
Registering content to a digital locker
An approach is provided for registering specific content in a portable storage medium to a digital locker. The portable storage medium is configured to include a content access application which causes the user interface to display a content access and registration part on a terminal executing the content access application, to request user entry of access validation information associated with the specific content. Upon access validation, the specific content can be registered to the digital locker of the user.
METHODS OF DISTRIBUTING DIGITAL PUBLICATIONS INCORPORATING USER GENERATED AND ENCRYPTED CONTENT WITH UNIQUE FINGERPRINTS
Electronic publications are increasingly replacing physical media but to date standards have evolved to mimic these physical media. Accordingly it is beneficial to provide electronic publication software systems and/or software applications to enable new paradigms that provide consumers, authors, publishers, retailers, and others with new models for releasing digital content from editorial and authorship viewpoints; new models for providing digital rights management with licensing, re-assignable rights and the ability to issue sub-rights or issue partial licenses with predetermined validity; new models for publishers to release revised editions, errata, new additions, etc; engaging social network type collaborative behavior within work and private environments with associated content (annotations) to the original release content; and supporting discussion and information dissemination within a wide variety of environments from education to business to book clubs etc. The invention also supports distributing electronic content with fingerprinting allowing unique identification of sources of non-authorised content.
Implementing user-specified transaction parameters for transferring digital content items amongst users
The disclosure relates to a system and a method for implementing user-specified transaction parameters for transferring digital content items amongst users. The method includes: receiving a request from a first user to transfer a right of possession to a first digital content item, wherein the first digital content item includes a content portion and a metadata portion for displaying a visual representation of the first digital content item; in response to receiving the request, precluding user access to at least the content portion of the first digital content item on one or more computing devices associated with an account of the first user; and providing the visual representation of the first digital content item on a display of at least one of the one or more computing devices based on the metadata portion of the first digital content item.
METHOD AND APPARATUS FOR PROTECTING DIGITAL CONTENT USING DEVICE AUTHENTICATION
A user device may strengthen the protection level of a digital content by dividing the security and normal modes and performing an operation. In order to further strengthen the protection level of the digital content, the user device may determine whether the main operating system is hacked or not, and blocks the operation in the secure mode. Otherwise, the device authorization information indicating the device security level of the user device is authorized by the content service server, and the user device blocks the operation in the secure mode according to the result.