H04L2463/103

Software-enabled remote licensing and provisioning

Described herein are systems and methods for providing software provisioning of functionality in a wireless communications device. Software-enabling functionality may include systems for granting a license to intellectual property or other pre-embedded functionality within a device. Communications to and from the device may be used to send or receive activation messages and/or licensing messages. Network capabilities may be provisioned using activation messages sent over the network. Activation messages may be sent in-band or out-of-band, for a device connected to the Internet and/or a mobile operator core network. Licenses may be required for any functions or intellectual property present on a given device. Activation may enable logical modules of a system-on-chip (SOC), functions of a software-defined radio (SDR), baseband, or DSP core. The disclosed systems and methods could thereby provide a new, flexible paradigm, namely, Silicon as a Service (SaaS).

Fine-granularity resource control method and apparatus
10374907 · 2019-08-06 · ·

Disclosed are a fine-grained resource control method and apparatus. The method includes: defining, for a function of which resource usage is needed to be restricted, a license item in a license file, wherein the license item is used for representing a resource restriction number for supporting the function; and judging whether a preferential support command is preset for resources of the function, if presetting, controlling the resources of the function according to the preferential support command, a value of the license item and an actual resource number for supporting the function, otherwise, controlling the resources of the function directly according to the value of the license item and the actual resource number for supporting the function.

CONTROLLED ENVIRONMENT SECURE MEDIA STREAMING SYSTEM
20190230084 · 2019-07-25 · ·

A Controlled Environment Secure Media Streaming System manages the delivery of content to Secured Devices. Cloud Services provide content to Integration Hub. The Integration Hub interfaces with various cloud services providers and prepares content for consumption by a resident of a secured facility. Integration Hub utilizes Content Filter to inspect content received from cloud service providers for suitability for use in a secured environment. Once content is retrieved, filtered, formatted, and packaged by Integration Hub, the content is stored in Data Warehouse. Secured Devices request content from the Distribution Hub, the Distribution Hub retrieves the content from the Data Warehouse, and then Distribution Hub manages the transfer of content to the Secured Devices. In some embodiments, Distribution Hub utilizes Content Filter to determine whether or not a particular Secured Device can access particular content.

Controlling visibility and distribution of shared conferencing data

A meeting server receives shared content from a presenter device in an online conference session with one or more attendee devices. The meeting server generates one or more digital watermarks corresponding to the one or more attendee devices. Each respective digital watermark includes an indication of the presenter device and an indication of a respective attendee device. The meeting server transmits the shared content with the respective digital watermark to the respective attendee device as part of the online conference session. The respective digital watermark is visible in the shared content displayed on the respective attendee device.

Temporarily providing a software product access to a resource

Functionality is disclosed herein for providing temporary access to a resource. A software product that is executing in response to a request from a customer may access one or more resources of a software provider. The resources that may be accessed by a software product may be identified within an access policy. The customer is prevented from accessing the resource when the software product is not executing.

SYSTEM AND METHOD TO LIMIT CONTENT DISTRIBUTION
20190171795 · 2019-06-06 ·

A content distribution system that groups assets sharing the same required security capabilities in digital rights management service instances. Assets are encrypted with the help of media keys, effectively grouping media keys sharing the same required security capabilities. Digital rights management service instances are organized to cover different geographical areas, and asset groups are configured to migrate according to a configurable distribution range.

TRACKING USAGE OF COMPUTING RESOURCES

Systems and methods for tracking computing resources are provided. Aspects include receiving, by a workload manager, a workload, wherein the workload is executable on a customer machine, and wherein the customer machine comprises a plurality of computing resources. The workload is analyzed to determine a workload profile. A token associated with the workload is received and associated with the workload profile. The token is authenticated and the workload is executed based at least in part on authentication of the token.

Efficient access to user-related data for determining usage of enterprise resource systems
12009995 · 2024-06-11 · ·

An example embodiment may involve a method performed by a software application executable on a central enterprise resource planning (ERP) client of a plurality of ERP clients. The ERP clients may be contained within a managed network. Each ERP client may be associated with one or more computing devices of the managed network on which ERP software is executable. Each ERP client may include a database that stores user-related data for individual users of the managed network whom are authorized to access the ERP client. The method may involve communicating with other ERP clients of the plurality of ERP clients to retrieve the user-related data stored in databases of the other ERP clients, storing the user-related data from the other ERP clients, and transmitting the user-related data to a computing device of a computational instance contained in a remote network management platform associated with the managed network.

Resource entitlement in a multi-computer system controlled by a single instance

An entitlement system includes at least two computing devices and a management controller which all include a trusted platform module. Each of the trusted platform modules include a non-volatile storage for storing entitlement records. A management unit of each computing device includes configuration means to enable and disable computing resources of the respective computing device based on entitlement records. The management controller receives ensemble entitlement records in encrypted form and distributes sub-entitlement records in a second encrypted form to the management units of the computing devices.

Method and system for secure sharing of recorded copies of a multicast audiovisual program using scrambling and watermarking techniques
10269086 · 2019-04-23 · ·

A thin high strength steel sheet having excellent formability has a composition which includes, by mass %, 0.08 to 0.15% of C, 0.5 to 1.5% of Si, 0.5 to 1.5% of Mn, 0.01 to 0.1% of Al, and 0.005% or less of N.