Patent classifications
H04L2463/103
Method, manufacture, and apparatus for instantiating plugin from within browser
A method, apparatus, and manufacture for instantiating a browser plugin is provided. A client web browser of a client is employed to instantiate a browser plugin for the client web browser. Next, the client web browser is employed to obtain a reference to the browser plugin. Then, a command is given to the browser plugin via the reference to the browser plugin. The browser plugin is used by the client web browser rather than the web page.
CLAIMING DELAYED LIVE REFERENCE STREAMS
A system and method for identifying unauthorized uploaded content that has been uploaded before a validated live reference stream has been ingested is disclosed herein. The live reference stream is compared against the indexed uploaded content repeatedly as the live reference stream is received. The matching process is done once per a time period until a match meeting a minimum match duration threshold is identified. The match is then determined to be unauthorized, and a claim is issued against the unauthorized uploaded content. The time period can be based on a utility based analysis that factors the computational costs of repeated matching versus the diminishing value of the live reference stream as time progresses.
Enhanced access to media, systems and methods
A system and method are described. An illustrative system enables operations such as: receiving new associated content from a user device and quantifying the new associated content via generating at least one new attribute-value pair object according to a multi-dimensional namespace and including at least some quantified attribute-value pairs determined from implementations of recognition algorithms executed on at least some of the new associated content. The operations may further include linking the at least one new attribute-value pair object into the linked list data structure and recording publication of the new associated content and the at least one new attribute-value pair object on a notarized ledger.
FLEXIBLE AND DYNAMIC MANAGEMENT OF FEATURE LICENSES ON NETWORK DEVICES
One aspect of the instant application describes a method, a computer system, and a computer-readable medium which facilitate flexible and dynamic management of feature licenses on a network device. During operation, a network device supporting one or more features can monitor a configuration state associated with the network device. In response to detecting an update of the configuration state, the network device can determine whether a state of a feature is affected. In response to determining that the state of the feature is affected, the network device can determine whether to request issuance or release of a license corresponding to the affected feature and communicate by the network device with a cloud-based license-management platform to request the issuance or release of the license.
Systems and methods for protecting against token-based malicious scripts
Non-fungible token (NFT) platforms in accordance with various embodiments of the invention are described. In an embodiment of the NFT platform includes storing several tokens, where a token includes several data elements and associated access control settings for accessing the several data elements; identifying a script to execute that is associated with a first token, where the script includes at least one instruction for accessing data from at least one data element of a second token; determining, based on access control settings of the second token, that the first token has particular access rights to the at least one data element of the second token; and executing the script based on the particular access rights of the first token.
Method for obtaining file based on over-the-air OTA technology and related device
Embodiments of this application disclose a method for obtaining a file based on an over-the-air OTA technology and a related device. The method includes: A first vehicle obtains a target request, where the target request includes target service information, and the target service information is used to obtain a target file associated with a target function; the first vehicle sends the target request to a server; and the first vehicle receives the target file requested by the target request, where the target file is used to indicate the first vehicle to implement the target function. According to this application, a file can be obtained based on the OTA technology, and file management can be simplified.
Method and device for managing data license in M2M system
The present disclosure related to managing a data license in a machine-to-machine (M2M) system, and a method for operating a first device may include generating a first resource including data and a second resource including information for managing a license of the data, receiving a message for requesting an operation for the data from a second device, determining, based on the information in the second resource, whether the operation is permitted, and transmitting a second message for performing the operation to the second device or a third device.
SECURE MOTHERBOARD REPLACEMENT SYSTEM AND METHOD
Systems and methods for providing a secure motherboard replacement are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions that, upon execution, cause the IHS to, when a replacement motherboard is booted for the first time, attach to a device that stores one or more BIOS entitlements associated with the IHS, configure a BIOS on the replacement motherboard with the BIOS entitlements, and complete booting of the IHS into a normal mode of operation.
Secure motherboard replacement system and method
Systems and methods for providing a secure motherboard replacement are described. In some embodiments, an Information Handling System (IHS) may include a processor and a memory coupled to the processor, the memory having program instructions that, upon execution, cause the IHS to, when a replacement motherboard is booted for the first time, attach to a device that stores one or more BIOS entitlements associated with the IHS, configure a BIOS on the replacement motherboard with the BIOS entitlements, and complete booting of the IHS into a normal mode of operation.