Patent classifications
G06F2221/0773
Device and method for checking properties of resources
Device, computer program product and method for checking properties of resources, wherein a checking device for checking properties of resources of a web server includes a calculation unit for calculating an identifier identifying a particular resource using the particular resource, a detection unit for detecting a license requirement for the particular resource using the calculated identifier, and a determination unit for determining an existing license for the web server in the case of a license requirement detected for the particular resource using the calculated identifier, such that unauthorized posting of a particular resource to a web server can be easily detected and prevented.
Method for controlling execution of an application
The invention is a method for controlling execution of an application. The method comprising: installing and activating a software license unit including License terms and a secure repository comprising both an applet and parameters, providing a virtual USB dongle including a command gate, a License validator, a VM controller and a VM engine initially devoid of applet, verifying the License terms and only if the verification of the License terms is successful: loading said applet and parameters to the VM engine and enabling the Command gate, initializing configuration data and secret data in the VM engine by using the parameters stored in the VM engine then exchanging, between the applet and said hardware function driver, USB messages to control execution of said application.
Secure count in cloud computing networks
Inducements are provided to customers to regularly connect back to a service provider and report usage that is expressed using a count of requests from a local computing device for cloud-based operations such as packet routing, container instantiation, virtual machine (VM) utilization, calls to a service or application, and the like. The count information is reported within a secure context, such as a trusted execution environment (TEE), using public-private key pair cryptography by which key derivation is dependent on some form of counting. For example, a customer computing device that is subject to a usage license encrypts an operation count and reports it to the service provider.
Systems and methods for providing access to wireless gaming devices
Systems and methods for controlling access to wireless gaming devices and networks are provided. For example, access is controlled through one or more levels of security check, such as a hard security check instead of or in addition to a soft security check. In a hard security check, the user employs an apparatus such as a card or other physical token that can be used to access the wireless gaming device. Such an apparatus may communicate information that identifies the user to the device or may simply be used to produce a signal without which the device is locked to users.
Control of applications based on licensing objects
An example of a computer-readable medium to store machine-readable instructions. The instructions may cause a processor to verify a licensing object and determine a license has expired. An application may be controlled based on an expiration parameter specific to the licensing object.
SYSTEMS, METHODS, AND MEDIA FOR MEDIA SESSION CONCURRENCY MANAGEMENT WITH RECURRING LICENSE RENEWALS
The disclosed subject matter relates to systems, methods, and media for media session concurrency management with recurring license renewals. More particularly, the disclosed subject matter relates to using recurring license renewals for concurrent playback detection and concurrency limit enforcement for video delivery services and managing server resources for handling such recurring license renewals.
CLUSTER-WISE LICENSE INFORMATION REPLICATION
System and methods for evaluating license information in a computer cluster are described. An example method may include retrieving a cluster-license-info from a peer-node selected from a plurality of cluster nodes in the computer cluster, wherein the cluster-license-info contains a plurality of peer-license-info collected from the plurality of cluster nodes, receiving a revised cluster-license-info generated by detecting license violations in the cluster-license-info, and transmitting the revised cluster-license-info to the peer-node.