H04L2463/103

System and method for administering licenses stored in an electronic module, and product unit comprising said module

The product unit disclosed herein has identification data that are stored internally in memory. This stored identification data can be viewed as the product unit's digital nameplate, in that the data can represent the product unit's identifier, brand, and so on. Each data set is digitally signed while on the production line by using an encryption technique. The digitally signed data set is then written into the product unit's memory where it can be used for verification. A first digitally-signed data set can be used to control the use of one or more software modules that are provided by a software owner. The data that are undergoing signature contain at least one globally-unique identifier, which can be used to identify cloning attempts. Additionally, more than one digital signature can be used, in order to protect and control the use of features other than the software, such as the product brand.

CONTROLLING VISIBILITY AND DISTRIBUTION OF SHARED CONFERENCING DATA

A meeting server receives shared content from a presenter device in an online conference session with one or more attendee devices. The meeting server generates one or more digital watermarks corresponding to the one or more attendee devices. Each respective digital watermark includes an indication of the presenter device and an indication of a respective attendee device. The meeting server transmits the shared content with the respective digital watermark to the respective attendee device as part of the online conference session. The respective digital watermark is visible in the shared content displayed on the respective attendee device.

Reducing time to first encrypted frame in a content stream
12153873 · 2024-11-26 · ·

Techniques are described for reducing time to decrypt a next encrypted frame in a content stream by optimizing a license/key acquisition process. When requesting content, a key identifier and/or license identifier may be included within a webpage using a link, script, or similar access point. When a client device sends a request for content, the loading of the webpage within the client device includes the embedded key identifier. Access to the key/license identifier at the client device then may initiate a key/license acquisition process by the client device. The key/license may be obtained from a key management device in parallel with, or prior to, downloading of at least a portion of the content stream.

System for an aircraft modification user interface marketplace

Methods and systems for managing modifications to aircraft using a graphical user interface. A navigation section is displayed in the graphical user interface and includes at least one of a models menu control or a scenarios menu control. The models menu control is selectable to present model options to a user, the model options being customized based on at least one of identification information associated or customer information. The scenarios menu control is selectable to present scenario options to a user, the scenario options being tailored for the customer based on the at least one of identification information associated with the user or customer information retrieved for the customer. An effectivity selector allows the user to select a set of aircraft for modification. Based on the set of aircraft selected, features displayed in the graphical user interface based on an option from the model or scenario options are customized automatically.

Methods and apparatus to identify media distributed via a network

Methods, apparatus, systems and articles of manufacture to monitor media presentations are disclosed. An example method includes extracting first network packet parameters from a first network packet received at a media device when retrieving a first encrypted web page, storing the first network packet parameters in association with identifying information for the first encrypted web page, extracting second network packet parameters from a second network packet received at the media device from an unknown encrypted web page, when the extension does not collect identifying information for the unknown encrypted web page, comparing the second network packet parameters to the first network packet parameters, and identifying the unknown encrypted web page as the first encrypted web page when the comparison of the second network packet parameters to the first network packet parameters has a similarity above a threshold.

METHOD OF MANAGING ACCESS TO A SERVICE

The invention is a method for managing access to a service wherein the method comprises the following steps: a client application sends to an application server a request to access the service by using credentials and a first anti-clone code, the application server performs a verification of the credentials and said first anti-clone code, the application server sends a second anti-clone code to the client application and deactivates said first anti-clone code only in case of successful verification, said second anti-clone code being required for the next attempt to access the service.

SIGNAL CONTINUITY ASSESSMENT USING EMBEDDED WATERMARKS

Methods, apparatus, and systems use embedded watermarks to determine whether the segments of a multimedia content has been rearranged. The embedded watermarks are recovered from the content and one or more attributes associated with the recovered watermarks are identified. A continuity of the content can then be assessed in accordance with the one or more attributes. The continuity assessment may be based on a variety of factors, including but not limited to a determined heartbeat of the recovered watermarks, a density, separation, location, or extent, of the recovered watermarks, as well as information associated with the watermarks, such as a stego key, channel bits, packet numbers, a fingerprint, or the like.

Controlled environment secure media streaming system
09930042 · 2018-03-27 · ·

A Controlled Environment Secure Media Streaming System manages the delivery of content to Secured Devices. Cloud Services provide content to Integration Hub. The Integration Hub interfaces with various cloud services providers and prepares content for consumption by a resident of a secured facility. Integration Hub utilizes Content Filter to inspect content received from cloud service providers for suitability for use in a secured environment. Once content is retrieved, filtered, formatted, and packaged by Integration Hub, the content is stored in Data Warehouse. Secured Devices request content from the Distribution Hub, the Distribution Hub retrieves the content from the Data Warehouse, and then Distribution Flub manages the transfer of content to the Secured Devices. In some embodiments, Distribution Hub utilizes Content Filter to determine whether or not a particular Secured Device can access particular content.

Information processing system, information processing apparatus, method of controlling the same, and storage medium
09930022 · 2018-03-27 · ·

There is provided an information processing system, information processing apparatus, and a method of controlling the same. Upon receiving an encrypted application and encrypted license information, the information processing apparatus decrypts the encrypted license information and the encrypted application. It is determined whether or not the decrypted application is a web application, and in the case where the application is determined to be a web application, a URL contained in the application and information contained in the license information are registered, and a display item corresponding to the application is displayed in a menu screen.

TECHNOLOGIES FOR SECURE SERVER ACCESS USING A TRUSTED LICENSE AGENT
20180041513 · 2018-02-08 ·

Technologies for secure server access include a client computing device that loads a license agent into a secure enclave established by a processor of the client computing device. The license agent receives a request from an application to access a remote server device. The license agent opens a secure connection with the server device and performs remote attestation of the secure enclave. The license agent authenticates the user and transmits a machine identifier and a user identifier to the server device. The machine identifier may be based on an enclave sealing key of the client computing device. The server device verifies that the machine identifier and the user identifier are bound to a valid application license. If the machine identifier and the user identifier are successfully verified, the application communicates with the server device using the secure connection. Other embodiments are described and claimed.