Patent classifications
G06F21/1076
Systems and methods for managing secure sharing of online data
Systems and methods are disclosed for managing online advertising data secure sharing. One method includes receiving, at a server, a request for proprietary data from a data consumer, the request including a data consumer identifier; retrieving, from a database of proprietary data, proprietary data based on the request; determining, by the server, whether the retrieved proprietary data is at least one of: designated to be processed and designated to have privileges set; processing, by the server, the proprietary data when the server determines the proprietary data is designated to be processed; setting one or more privileges to the proprietary data using the certificate associated with the data consumer identifier when the server determines the proprietary data is designated to have privileges set; encrypting the proprietary data using the certificate associated with the data consumer identifier; and transmitting the encrypted proprietary data to the data consumer.
Controlling just in time access to a cluster
Examples include a system and computer-implemented method to receive a notification from an application programming interface (API) of creation of a just in time (JIT) grant, the JIT grant defining a request for a user to be authorized to access a cluster according to a JIT policy; determine if access to the cluster by the user is authorized according to the JIT policy; grant access to the user to the cluster when access is authorized according to the JIT policy; and send a notification to the API that access by the user to the cluster is granted.
IN-CIRCUIT SECURITY SYSTEM AND METHODS FOR CONTROLLING ACCESS TO AND USE OF SENSITIVE DATA
At a first electronic device with a display and one or more biometric sensors a request is made for user authentication using the one or more biometric sensors. After requesting the user authentication, biometric information associated with the user is detected with the one or more biometric sensors. In response to detecting the biometric information associated with the user and in accordance with a determination that the detected biometric information associated with the user meets authentication criteria, (1) access to the first electronic device is provided based on the detected biometric information and (2) the second electronic device is provided with information based on the biometric information that, when received by the second electronic device, grants access to operate the second electronic device. In accordance with a determination that the detected biometric information associated with the user does not meet the authentication criteria, access the first electronic device is not provided and the second electronic device is not provided with information based on the biometric information that, when received by the second electronic device, grants access to operate the second electronic device.
Application security framework
In accordance with the teaching described herein, systems and methods are provided for providing secure access to a software application on a computing device. The software application may include a security framework having a set of predetermined security requirements. Prior to enabling access to the software application by a user, the computing device may, (i) verify installation of a device security configuration profile on the computing device, wherein the device security configuration profile certifies that the software application includes the set of predetermined security requirements, (ii) receive identifying information from the user via a user interface, (iii) verify the identifying information with an authentication server, and (iv) based on a successful verification of the identifying information, receive and store a security token. Access to the software application on the computing device may be provided for a specified period identified by the security token.
LICENSE SYSTEM, LICENSE MANAGEMENT SERVER, METHOD, AND STORAGE MEDIUM
A license management server generates a license including information about update confirmation date and usage period. An image forming apparatus tries to communicate with the license management server until the usage period elapses since the update confirmation date.
IMAGE FORMING APPARATUS, SYSTEM, METHOD, AND STORAGE MEDIUM
An image forming apparatus that is capable of communicating with a license management server configured to generate a license and that validates an application corresponding to the license by applying the license determines whether current timing has exceeded timing set in the applied license, requests, in response to determining that current timing has exceeded timing set in the applied license, a new license for the application from the license management server, applies the acquired new license, adds, in a case where the new license is not yet applied and the applied license has expired, the application to a screen for receiving an instruction for renewing the license from a user, and requests, apart from requesting the new license in response to a result of the determination, the new license in response to an instruction for renewing the license being received via the screen.
CONSISTENT SNAPSHOTS AND CLONES IN AN ASYMMETRIC VIRTUAL DISTRIBUTED FILE SYSTEM
Processing in an asymmetrically distributed file system may include storing first data representative of the content of the files in a file system volume among a plurality of storage nodes. Second data representative of attributes of the files in the file system volume may be stored in only one of the storage nodes. Time-limited leases allow clients direct access to the plurality of storage node in order to access portions of the file system volume. The time-limited leases may be provided to client lessors. Snapshots of the file system volume may be generated after sending a revocation to the client lessors to revoke time-limited leases provided to the client lessors and having received the acknowledgements of the revocations or after the leases have expired for non-responding lessors, to ensure that changes are not made to the file system volume during snapshot processing.
Content management system, content management server and management program for server, client terminal and management program for terminal, and removable media
A content management system including a content management server and a client terminal connected to the content management server via a communication network, wherein the content management server transmits, to the client terminal, a management server ID identifying the content management server and a content deletion request, the client terminal receives the management server ID and the content deletion request from the content management server, determines whether or not the received management server ID matches a management server ID saved on the client terminal side, and if they match, deletes the content saved on the client terminal side, in a removable media, the content corresponding to the deletion request. A content, that is saved in various forms on the client terminal side is disabled for playback at an appropriate timing; accordingly, it is possible to reduce risks such as information leakage to ensure security, and also ensure content integrity.
Delivering digital content for an application
The present disclosure relates to systems, methods, and computer-readable media for providing digital content for an application to users. For example, systems described herein can provide a license for the digital content during a rental time. Systems disclosed herein may additionally track a duration of use of an application and compare the tracked use against an amount of rental time purchased (e.g., rented) by a user. The systems described herein may further extend a license or terminate the license based on a determination of whether the amount of use exceeds a rental time. Features and functionality described herein provide a flexible and efficient mechanism that enables users having a variety of content-consuming preferences to receive affordable content while ensuring that use of an application is efficiently and accurately tracked.
CONTROLLING JUST IN TIME ACCESS TO A CLUSTER
Examples include a system and computer-implemented method to receive a notification from an application programming interface (API) of creation of a just in time (JIT) grant, the JIT grant defining a request for a user to be authorized to access a cluster according to a JIT policy; determine if access to the cluster by the user is authorized according to the JIT policy; grant access to the user to the cluster when access is authorized according to the JIT policy; and send a notification to the API that access by the user to the cluster is granted.