G06F21/1077

Detecting and tracking virtual containers

Examples of techniques for detecting and tracking virtual containers are disclosed. In one example implementation according to aspects of the present disclosure, a computer-implemented method includes detecting a virtual container. The method further includes collecting virtual container data for the virtual container. The method also includes associating, by a processing device, the virtual container to at least one of a plurality of images. Additionally, the method includes building, by the processing device, a container event database based on the virtual container data and the association of the virtual container to the at least one of the plurality of images, so as to enable tracking of software in the plurality of images and in live virtual containers.

Information processing system, method of controlling the system, information processing apparatus, web server, and storage medium
09842199 · 2017-12-12 · ·

In an information processing apparatus, upon the calling of a web application being instructed, the information processing apparatus sets a URL corresponding to the web application in the web browser and makes a request to the web server, and when a request to perform a confirmation process for the license is received from the web server, the information processing apparatus generates signature information of the information processing apparatus, sends the signature information to the URL, and obtains authorization information from the web server. The web server confirms a license of the information processing apparatus in response to the request from the information processing apparatus, and responds to the information processing apparatus with web application content upon the license of the information processing apparatus being successfully confirmed.

SYSTEMS AND METHODS FOR EXPEDITED ENTITLEMENT CHECKS
20220366016 · 2022-11-17 ·

Systems and methods for managing access data are disclosed. One method can comprise receiving prediction information relating to one or more content options and requesting access information associated with the prediction information. At least a portion of the received access information can be processed to provide a preliminary access decision. A request for access relating to the one or more data options can be received and an access decision based at least in part on the preliminary access decision can be provided.

METHOD AND APPARATUS FOR MANAGING CONTENT IN STORAGE-BASED SECURITY SYSTEM
20170337356 · 2017-11-23 · ·

The present invention provides a method for reproducing a content stored in a storage device connected through at least one interface, the method comprising the steps of: transmitting transaction information stored in a detected storage device to a license server, wherein the transaction information includes a transaction identification file which identifies at least one of a corresponding transaction, a seller, and a user; receiving, from the license server, license information which grants permission to reproduce the content; and reproducing the content on the basis of the license information, wherein the license information includes a license file and a license key.

AUTOMATICALLY DETECTING MISUSE OF LICENSED SOFTWARE
20220358188 · 2022-11-10 ·

An example embodiment may involve communicating with a server to separately access first and second records of sessions between the server and computing devices of a network, the first record including a first set of fields not present in the second record and the second record includes a second set of fields not present in the first record; identifying a common field present the first and second records; correlating information across the first and second records using the common field; using a set of license misuse criteria to identify, from the correlated information, (i) a set of the sessions that meets the set of criteria and (ii) a network address of a target device involved in the set of sessions; identifying the target device using the network address; and storing an indication identifying the target device as a potential source of misuse of licensed software executable on the server.

SYSTEM AND METHODS FOR PROVISIONING AND MONITORING LICENSING OF APPLICATIONS OR EXTENSIONS TO APPLICATIONS ON A MULTI-TENANT PLATFORM
20170300668 · 2017-10-19 ·

Embodiments of the invention provide a mechanism for a multi-tenant platform operator (or a developer or publisher of an application or an extension to an existing platform application) to control the access and functionality available within the application or extension on an account specific basis, based on the subscription license terms applicable to each account/customer. Embodiments of the invention enable a more practical and efficient management of access controls and functionality for a relatively large customer base, where certain accounts, customers, or users may be entitled to a different or at least partially different set of rights and functionality

Methods and devices for intracorporeal bonding of implants with thermal energy

The present invention provides a method for stabilizing a fractured bone. The method includes positioning an elongate rod in the medullary canal of the fractured bone and forming a passageway through the cortex of the bone. The passageway extends from the exterior surface of the bone to the medullary canal of the bone. The method also includes creating a bonding region on the elongate rod. The bonding region is generally aligned with the passageway of the cortex. Furthermore, the method includes positioning a fastener in the passageway of the cortex and on the bonding region of the elongate rod and thermally bonding the fastener to the bonding region of the elongate rod while the fastener is positioned in the passageway of the cortex.

Usage rights information for protected content having two parts
09740834 · 2017-08-22 · ·

The invention relates to a device for accessing protected content, the device comprising a secure module for accessing the protected content and a control unit external to the secure module for controlling access operations for the protected content. The device is configured to receive usage rights data for the protected content, the usage rights data including first and second usage rights data defining permissions for uses of the protected content, and the device is configured to enable a requested use of the protected content upon a check whether the use is permitted by usage rights data, the check being made in the secure module based on to the first usage rights data and the check being made in the control unit based on the second usage rights data. Moreover, the invention relates to a method for operating the device.

Methods and systems for providing conditional access to indoor location information

The invention relates to a system and methods for providing conditional access to indoor location information in a system comprising a mobile device (320), a positioning webservice (310) and an authorization authority (360), the method comprising: the mobile device (320) performing the steps of: transmitting license information to the authorization authority (360) and transmitting a request for indoor location information to the positioning webservice, the request comprising a request-location-estimate corresponding to a location estimate of the mobile device (320) at the time of making the request, the authorization authority (360) performing the steps of: receiving the license information, verifying whether the license information authorizes access to indoor location information by the mobile device (320), issuing a secure proof, verifiable by the positioning webservice (310) upon successful verification, the secure proof indicating that the license information authorizes access to indoor location information by the mobile device (320) for an authorized region; the positioning webservice (310) performing the steps of: receiving the request for indoor location information and the secure proof; verifying whether the secure proof authorizes the transmission of indoor location information to the mobile device (320) for the request-location-estimate; and upon successful verification sending indoor location information for the request-location-estimate to the mobile device (320).

Method and system for firmware-updating a control device for process control
11429720 · 2022-08-30 · ·

For simplifying and/or improving the updating of firmware of a control device, in particular of a safety controller, the invention provides a method and a system for updating firmware, in which a device-specific authorization check for performing a firmware update is performed by the manufacturer, and in case of a successful authorization check a device-specific activation code for performing the firmware update is provided, and for this purpose an enabling device is provided on the manufacturer's side and an updating device connectable to a control device on the user's side. The improvement is that the safe and secure firmware update proceeds under the control and long-term archiving of the manufacturer. The invention furthermore relates to a digital storage medium having instructions stored thereon for use when performing the method according to the invention.