Patent classifications
G06F2221/0775
License authentication device and license authentication method
A license authentication device includes a memory that stores a license file including a license expiration date of an application that adjusts a parameter of a semiconductor manufacturing apparatus in a semiconductor factory; and a processor coupled to the memory. The processor acquires log data when the semiconductor manufacturing apparatus executes a processing; and determines whether or not a time included in the log data has passed the license expiration date stored in the license information storage.
MEDIA COMPOSITION USING NON-FUNGIBLE TOKEN (NFT) CONFIGURABLE PIECES
A system and method for receiving one or more non-fungible tokens (NFTs) that are associated with links to digital assets, ownership information, NFT metadata, media content metadata, or other media content information. The system may associate the one or more NFTs with other NFTs to create a collection of NFTs that form a song, album, video, or other collection/combination of media content. The system may provide a NFT collectible player to interact with the combination of NFTs in a particular order or for a particular duration.
Secure count in cloud computing networks
Inducements are provided to customers to regularly connect back to a service provider and report usage that is expressed using a count of requests from a local computing device for cloud-based operations such as packet routing, container instantiation, virtual machine (VM) utilization, calls to a service or application, and the like. The count information is reported within a secure context, such as a trusted execution environment (TEE), using public-private key pair cryptography by which key derivation is dependent on some form of counting. For example, a customer computing device that is subject to a usage license encrypts an operation count and reports it to the service provider.
Data management platform
Techniques are disclosed relating to the management of data. A data provider computer system may store particular data of a user. The data provider computer system may commence sharing of a portion of the particular data with a data consumer computer system. The data provider computer system may continue sharing additional portions of the particular data with the data consumer computer system in response to receiving a report from a verification environment indicating that the particular data is being utilized by the data consumer computer system in accordance with a specified usage policy.
Map output device, map output system, and computer-readable storage medium including program
A map output device is provided for preventing a storage medium from being sharedly used. The map output device comprises a connection unit; an output unit that outputs map data; and a control unit. The control unit is configured, when a storage medium is connected to the connection unit or when a movable body is used beyond a predetermined usage amount, to write a file containing information on a unique value related to the movable body into the storage medium connected to the connection unit, and to output, to the output unit, the map data read from the storage medium.
ANTI-PIRACY PROTECTION SERVICE-BASED SOFTWARE LICENSE MANAGEMENT SYSTEM TO PREVENT USAGE OF UNLICENSED SOFTWARE AFTER THE TRIAL PERIOD
One example method, includes checking, by an intelligent time detector service running on a computing system, a trial period duration of software on the computing system, starting, by the intelligent time detector service, a counter for the software, and the counter is operable to generate a counter value based on a clock of the computing system, storing, by the intelligent time detector service, a counter value of the counter, and decommissioning, by the intelligent time detector service, the software after the trial period has expired.
Database access, monitoring, and control system and method for reacting to suspicious database activities
A database access, monitoring, and control system and method monitor database access, detect suspicious database activities, and react to suspicious database activities by initiating one or more control functions. In at least one embodiment, suspicious database activities include activities related to a number of rows of data retrieved in response to one or more queries within a predetermined threshold window of time. Data retrieval row count above a predetermined threshold that represents an anticipated maximum request for legitimate users can indicate a suspicious database activity. In at least one embodiment, the database access, monitoring, and control system and method detects suspicious database activities even if a data requestor has thwarted other security measures or if the data requestor has authorized access but is potentially accessing data inappropriately.