Patent classifications
H04L2463/103
System and method for device authorization and remediation
A method is provided for authorizing a device for consuming content. In method includes the steps of generating an authorization request, the authorization request for authorization data including device diagnostic data (instructions) an device remedial data (instructions), transmitting the authorization request from the device to an authorizing service, and authorizing or remediating the device according to an authorization response to the authorization request received from an authorization server.
Method and system for the delivery and storage of high definition audio-visual content
A system for permitting temporary access for delivery of owned content to a location selected by a subscriber is provided. The system includes a central facility in communication with a plurality of local networks. Through one of the local networks, the subscriber can access a database in the central facility, which contains content owned by the subscriber. An enhanced progressive download system and method for high definition audio-visual content is also provided. This method uses the download speed of the subscriber, the run time of the content to be downloaded, the size of the content, and the amount of local storage in the appliance of the subscriber. A desired wait time for downloading the content is selected, and based on these parameters, the amount of local storage needed for the content is calculated. If a ratio of the local storage available to the local storage needed for the content is above a desired threshold, a download of the content can begin.
Tracking usage of computing resources
Systems and methods for tracking computing resources are provided. Aspects include receiving, by a workload manager, a workload, wherein the workload is executable on a customer machine, and wherein the customer machine comprises a plurality of computing resources. The workload is analyzed to determine a workload profile. A token associated with the workload is received and associated with the workload profile. The token is authenticated and the workload is executed based at least in part on authentication of the token.
System and method to allow third-party developer to debug code in customer environment
A platform is provided to allow the developer to log into a subscriber's computer system by using the credential of the developer or the subscriber to view and to debug at least a portion of executable code that is used by the subscriber. The executable code used by the subscriber may be part of managed package code, at least portions of which are customized for various subscribers. Cooperative debugging may be provided between developer and subscriber with lifting of code encapsulation for the developer in the subscriber implementation. The developer and the subscriber may be granted debugging licenses each authorizing a limited number of debugging sessions, and each debugging session run by the developer may be counted against the debugging license of either the developer or the subscriber. Debugging licenses may be transferred between the developer and the subscriber.
Information rights management offline file access facility
Systems and methods for providing secure offline file access utilizing information rights management (IRM) are provided herein. In some embodiments, the method may comprise storing one or more IRM-protected documents in a secure local storage on a user device; storing one or more consumption licenses associated with the one or more IRM-protected documents in the secure local storage on the user device, wherein the one or more consumption licenses is required to access one or more IRM-protected documents; detecting a loss of network connectivity on the user device; writing the one or more consumption licenses to an IRM location in memory on the user device; receiving a request to open a document of the one or more IRM-protected documents; reading the consumption license from the IRM location in memory; and enabling access to the requested IRM-protected document based on the consumption license.
BLOCKCHAIN-BASED LICENSE MANAGEMENT
Blockchain-based license management provides capabilities for managing licensable aspects of a plurality of IHSs (Information Handling Systems) participating in the blockchain comprised of individual license blocks that record licensing transactions. A licensing authority initiates the blockchain and modifies licensable aspects of a specific participating target IHS by distributing license blocks that include one or more license tokens and license logic specifying instructions for the target's evaluation of the license tokens. Each participating IHS validates the received license blocks and adds them to a local copy of the blockchain. If a participating IHS is the target, that IHS uses the license logic to determine licensing modifications indicated by the licensing token. Licensable aspects of the IHS may then be modified based on the determined licensing modifications. A participating IHSs may directly transfer licenses to another IHS through the transfer of license tokens and the corresponding license logic.
Linked account system using personal digital key (PDK-LAS)
One embodiment of the invention includes a system comprising: a personal digital key and a computer readable medium that is accessible when authenticated by the personal digital key.
System and method for protecting content
A method for protecting content, comprising receiving, from a client device, a request for an encryption key for encrypting the content comprising a reference associated with the client device, identifying a set of supported security capabilities corresponding to the reference associated with the client device, identifying a set of required security capabilities corresponding to the content associated with the key request, determining if the set of supported security capabilities satisfy the set of required security capabilities, and in response to determining that the supported security capabilities satisfy the set of required security capabilities, transmitting the encryption key to the client device.
Real-time feature level software security
Systems and techniques for real-time feature level software security are described herein. A request may be received from a computing device for data from the feature of the software application. The request for data may include authorization information of a user of the computing device. It may be identified that the feature of the software application contains code containing a reference to a security configuration service. A security configuration may be determined for the feature of the software application by comparing a resource identifier and a feature identifier of the feature of the software application to a set of security configurations of the security configuration service. The security configuration may provide access rules for the feature of the software application. A response may be sent to the computing device based on a comparison of the received authorization information of the user of the computing device to the determined security configuration.
Real-time feature level software security
Systems and techniques for real-time feature level software security are described herein. A request may be received from a computing device for data from the feature of the software application. The request for data may include authorization information of a user of the computing device. It may be identified that the feature of the software application contains code containing a reference to a security configuration service. A security configuration may be determined for the feature of the software application by comparing a resource identifier and a feature identifier of the feature of the software application to a set of security configurations of the security configuration service. The security configuration may provide access rules for the feature of the software application. A response may be sent to the computing device based on a comparison of the received authorization information of the user of the computing device to the determined security configuration.