H04L2463/103

Terminal and server for applying security policy, and method of controlling the same

A method of operating a terminal using Mobile Device Management (MDM) solution includes: installing an application, requesting for registration by a license key received from an Enterprise License Management (ELM) server, receiving a Right Object (R/O) that corresponds to the license key and comprises a permission list, setting at least one permission based on the permission list comprised in the received R/O, and performing the set permission. A terminal using MDM comprises an MDM application configured to control an installed application to acquire a required permission, a ELM agent configured to request for registration by a license key from an ELM server, and receive a R/O that corresponds to the license key and comprises a permission list, and an ELM permission enforcer configured to set at least one permission based on the permission list comprised in the received R/O.

Computerized, copy detection and discrimination apparatus and method
09576115 · 2017-02-21 ·

An engine identifying segments or portions of one source material or source file common to or found in another source material or file. The engine may receive a first data stream in binary form as well as a second stream in binary form. The engine may include a data stream processor or pre-processor programmed to translate the first and second data streams to generate respective first and second processed data streams. The commonality between the first and second processed data streams may be greater than the commonality between the first and second data streams themselves. Also, a comparator may be programmed to compare the first and second process data streams and identify binary segments found in both the first and second processed data streams.

NETWORK MANAGEMENT FOR CONTENT BROADCAST
20170048111 · 2017-02-16 ·

Providing integrated LTE-B network and service management is disclosed. Changes to an LTE or LTE-B network can be propagated in real-time, or near-real-time, to a mapping profile representative of the LTE or LTE-B network. This mapping profile can be employed in updating the LTE or LTE-B network. Further, the mapping profile can be employed in establishing a new LTE-B session, adapting an existing LTE-B session, maintaining an existing LTE-B session, etc. Access to a reporting rule can enable the LTE or LTE-B network to proactively report changes to the LTE or LTE-B network. Integrated LTE-B network and service management can be integrated and/or centralized, such as, at a carrier-network, core-component. Moreover, integrated LTE-B network and service management can be virtualized.

METHODS AND APPARATUS TO IDENTIFY MEDIA DISTRIBUTED VIA A NETWORK

Methods, apparatus, systems and articles of manufacture to monitor media presentations are disclosed. An example method includes extracting first network packet parameters from a first network packet received at a media device when retrieving a first encrypted web page, storing the first network packet parameters in association with identifying information for the first encrypted web page, extracting second network packet parameters from a second network packet received at the media device from an unknown encrypted web page, when the extension does not collect identifying information for the unknown encrypted web page, comparing the second network packet parameters to the first network packet parameters, and identifying the unknown encrypted web page as the first encrypted web page when the comparison of the second network packet parameters to the first network packet parameters has a similarity above a threshold.

MOBILE TOKEN DRIVEN SOFTWARE LICENSING
20170039354 · 2017-02-09 ·

A token contains licensing information for software stored on another computer. The token connects to the computer wirelessly, and transmits the licensing information, preferably automatically. While the token is connected to the computer, at least one factor in a multi-factor authentication scheme is satisfied for licensed use of the software. When the token disconnects from the computer either at will, or by exceeding the range of the wireless connection, the software on the computer becomes unlicensed and then can no longer execute.

System and method for digitally signing documents from a mobile device
09565188 · 2017-02-07 · ·

A system and method for embedding a written signature into a secure electronic document is disclosed. In certain embodiments, a user views the electronic document on a first computing device and creates an electronic digital signature on a mobile computing device. The user is securely certified by a system created alphanumeric code and the identification of the mobile device. The signature is then embedded into the electronic document and stored securely on a central server.

System Automating the Preparation of International Intellectual Property Applications for Filing
20170032482 · 2017-02-02 ·

A system for automating preparation of IP applications has a server, a priority computer associated with a priority professional and a priority jurisdiction, and a second computer associated with a second professional and a second jurisdiction. A data store has portions associated with each professional, and which are only accessible by the respective professional after authentication. The priority professional sends application data for an IP application to the server for storage in the data store. The priority professional sends an instruction to initiate filing of the IP application in the second jurisdiction. A replicator on the server copies the application data to the portion of the data store associated with the second professional. A document assembler on the server assembles filing documents for the second jurisdiction by combining the application data with at least one form. The server sends the filing documents to the second professional for review and filing.

Signal continuity assessment using embedded watermarks

Methods, apparatus, and systems for signal continuity assessment using embedded watermarks are provided. The embedded watermarks are recovered from the content and one or more attributes associated with the recovered watermarks are identified. A continuity of the content can then be assessed in accordance with the one or more attributes. The continuity assessment may be based on a variety of factors, including but not limited to a determined heartbeat of the recovered watermarks, a density, separation, location, or extent, of the recovered watermarks, as well as information associated with the watermarks, such as a stego key, channel bits, packet numbers, a fingerprint, or the like.

Method and apparatus for providing content protection in a computer system

A computer system includes a server device which provides one or more content packages each comprising a plurality of asset files. A client device stores the content packages, and generates a virtual environment based on the asset files to be displayed on a display unit. A tracker is arranged to record an asset list directly or indirectly representing a sequence of the asset files according to progress through the virtual environment at the client device, and to distinguish between legitimate and non-legitimate behavior of the client device according to the recorded asset list.

Matching delayed live reference streams with user uploaded streams

A system and method for identifying unauthorized uploaded content that has been uploaded before a validated live reference stream has been ingested is disclosed herein. The live reference stream is compared against the indexed uploaded content repeatedly as the live reference stream is received. The matching process is done once per a time period until a match meeting a minimum match duration threshold is identified. The match is then determined to be unauthorized, and a claim is issued against the unauthorized uploaded content. The time period can be based on a utility based analysis that factors the computational costs of repeated matching versus the diminishing value of the live reference stream as time progresses.