H04L2463/103

AIRCRAFT PRODUCTION MARKETPLACE
20200134705 · 2020-04-30 ·

Methods and systems for building a configuration for a new aircraft. A link to a customer information database is established in response to receiving a launch input for a production marketplace entered by a user via a graphical user interface. The user is associated with a customer. The customer information database includes identification information associated with the user. A determination is made as to whether the user is authorized to access the production marketplace using the identification information user. Guidance information is generated for presentation via the graphical user interface to guide the user through a build process for building the configuration in response to the user being authorized to access the production marketplace, the guidance information being customized for the customer. Feature selections are received by the user via the graphical user interface. The configuration is built for the new aircraft based on the feature selections.

TRUSTED TRANSACTION SYSTEM FOR DIGITAL ASSET LICENSING
20200134585 · 2020-04-30 ·

A licensing system and related methods are described utilizing aspects of distributed ledger technologies to facilitate trusted and verifiable licensing transactions for creative works. A client device can include an asset editing tool for incorporating an asset selected from a plurality of licensable assets into a new creative work. The selected asset can be downloaded for incorporation into the new creative work. The new creative work incorporating the selected asset can be analyzed to determine an amount that the selected asset contributed to the new creative work, or an amount that the new creative work is attributable to the selected asset. Based on the analysis, a smart contract associated with the new creative work can be generated to include license fees for licensing the new creative work, receive payment transactions for licensing the new creative work, and fairly disperse calculated portions of received payment transactions to a licensor of the new creative work and to another licensor of the incorporated selected asset.

CONTENTS BLOCKCHAIN PLATFORM
20200117771 · 2020-04-16 ·

A platform and method for content management is disclosed. A content right management method includes receiving contents from a user, and generating a create key for a right for the contents by encrypting the contents using encryption information, in which the create key includes a copyright of the contents and a creation right of the contents.

AUTOMATICALLY DETECTING MISUSE OF LICENSED SOFTWARE
20200074048 · 2020-03-05 ·

An example embodiment may be performed by a software application executable on a computing device and may involve communicating with a server to access records of sessions between the server and computing devices of a managed network. The managed network may contain the server and a database associated with licensed software executable on the server. The database may store the records, and the records may include network addresses of the computing devices. The example embodiment may also involve: using a set of license misuse criteria to identify, within the records, (i) a set of the sessions that meets the set of criteria and (ii) a network address of a target device involved in the set of sessions; based on the network address of the target device, identifying the target device; and storing in memory an indication identifying the target device as a potential source of misuse of the licensed software.

Methods of Restricted Virtual Asset Rendering in a Multi-user System
20200066042 · 2020-02-27 ·

Embodiments relate to receiving an indication of a desired item by a user in a multi-use virtual world. The indication requests a rendering of a restricted virtual object in a space of the user. A server can determine and retrieve a partially rendered model of the restricted virtual object, determine a rendering location based on position data, and link the partially rendered model to the user and to the rendering location. The partially rendered model and the rendering location can be sent to user devices for rendering the partially rendered model at the rendering location. A partially rendered appearance of the restricted virtual object indicates to a second user the desired item by a first user. A fully rendered model may contain restricted content data, whereas a partially rendered model may not contain restricted content data. The restricted content data may include a restricted digital media file.

Method, manufacture, and apparatus for instantiating plugin from within browser
10572633 · 2020-02-25 · ·

A method, apparatus, and manufacture for instantiating a browser plugin is provided. A client web browser of a client is employed to instantiate a browser plugin for the client web browser. Next, the client web browser is employed to obtain a reference to the browser plugin. Then, a command is given to the browser plugin via the reference to the browser plugin. The browser plugin is used by the client web browser rather than the web page.

System and method for secure sharing of a source code

The system and method for secure sharing of a source code is disclosed. The method comprises. The method comprises receiving a source code associated with an application, and a defect identification number associated with a defective feature in the application. The method comprises identifying a defective feature of an application and non-defective features of the application based on a defect investigation methodology. The method comprises generating a checkout ID associated with the application and further generates a secured second set of source code based on one of an encryption methodology and an obfuscating methodology. The method further comprises providing a secured source code to a third party for debugging the defective feature in the application.

Image chain of title management

In an apparatus and method, image metadata is assigned to a master image file including an image from a base work, the image metadata including an identification of the base work and provenance of the base work. Objects in the image are detected and recognized. Object metadata, including recognition of the object, is assigned to the master image file. A cryptographic hash of, altogether, the image, the image metadata, and the object metadata is generated. An image product from the master image file for transfer is generated. A data packet structure is written to a node of a transaction processing network, wherein the data packet structure includes the cryptographic hash, and transferor and transferee identification for a transfer of the image product.

BACKEND SERVICE INTEGRATION
20200053071 · 2020-02-13 ·

A method for providing an integrated service includes assigning a digital credential to a user account; receiving a request to schedule an integrated service in relation to the scheduled presentation of the digital content item; identifying, based on the digital credential assigned to the user account, the scheduled presentation of the digital content item; determining, based on the scheduled presentation of the digital content item, a set of available integrated services; providing, to the computing device, data identifying the set of available integrated services; receiving, from the computing device, a user selection of a first integrated service from the set of available integrated services; generating, based on data associated with the scheduled presentation of the digital content item, a service request to provide the first integrated service; and transmitting, to a remote server that provides the first integrated service, the service request to provide the first integrated service.

Threat-monitoring systems and related methods

Disclosed herein are methods, devices, systems and computer-executable instructions for managing software in threat-monitoring systems. One such method comprises receiving a plurality of licence identifiers identifying respective licences available for assignment to a threat monitoring system. The method further comprises receiving a selection of at least one of the licence identifiers. The method also comprises uploading, to the threat monitoring system, an activation tool for activating at least one operational function of the threat monitoring system, the at least one operational function corresponding to the selected at least one licence identifier.