G06F21/1085

SYSTEMS AND METHODS TO TRANSFER SOFTWARE ENTITLEMENTS BETWEEN INFORMATION HANDLING SYSTEMS
20230044720 · 2023-02-09 ·

Embodiments of systems and computer implemented methods are provided to transfer software licenses and entitlements associated with a user account from a first information handling system (IHS) to a second IHS. A computer implemented method in accordance with the present disclosure may generally include executing an entitlement management service to reassign the software licenses and entitlements associated with the user account to the second IHS, executing at least one local validation service on the second IHS to validate the second IHS and the user's workspace, and if the second IHS and the user's workspace is successfully validated by the at least one local validation service, executing one or more cloud-based orchestration services to verify the user account, determine which software licenses and entitlements are associated with the user account, and acquire and validate the software licenses and entitlements before transferring the software licenses and entitlements to the second IHS.

NON-FUNGIBLE TOKEN-BASED PLATFORM FOR TRACING SOFTWARE AND REVISIONS

A non-fungible token (NFT)-based platform is provided for validating the authenticity of software and providing software traceability on a device and/or user-level. Software is configured by the developer with logic that detects installation and, in some embodiments, change (i.e., upgrades, patches or the like) and, in response generates a non-fungible token (NFT) that is subsequently verified via a distributed trust computing network. The NFT may be linked to one or more of the device, the user(s), IP address(es), licensee, such that a distributed ledger storing the linked NFTs can be accessed to readily determine which devices the software is installed on and the users of the software.

Methods for Conditional Transaction Tokens, Secure Sharing of Token Assets, Wallet Spam Protection, and User Interfaces for Acceptance of Terms

Devices can be configured to implement distributed ledgers capable of immutably recording a first set of data and a second set of data of an item, wherein the second set of data is made available by satisfaction of a condition. Such devices can include network interfaces, memory and processors. The processors can be configured to obtain a conditional item. The conditional item includes a first set of data that is available. The conditional item can further include a second set of data that is unavailable. The processor can be further configured to determine whether a condition is satisfied, and when the condition is satisfied perform an evolution to the conditional item.

Method, system, control device and node device for data transmission

The application discloses a method, system, control device and node device for data transmission. The method includes determining a source node for data transmission; selecting a node which has not been selected for reception of the data as a destination node for the data transmission, from a list of nodes for the reception of the data, wherein the destination node serves as the next nearest node of the source node; wherein the list of nodes comprises at least one identifier and an address of each node; and issuing a data transmission task to the source node, wherein the data transmission task comprises the identifier and the address of the destination node, so that the source node transmits the data to the destination node according to the address of the destination node. The technical solutions of the application can guarantee the data transmission speed and the data transmission efficiency.

SECURE 3D MODEL SHARING USING DISTRIBUTED LEDGER

This document generally describes systems, methods, devices, and other techniques for using distributed ledgers, such as a blockchain database, to facilitate secure distribution and use of 3D model files to 3D printers over a computing network. A 3D printer controller may access an electronic ledger that identifies a plurality of 3D model files that have been made available for distribution. A particular 3D model file and a secret key may be obtained by the printer, where the 3D model file is encrypted based on the secret key. The secret key can be decrypted using a private key associated with the computing device that corresponds to the public key. After decrypting the secret key, the particular 3D model file can be decrypted using the secret key, and after decrypting the particular 3D model file, the particular 3D model file can be executed on the printer to print a physical 3D object.

CRYPTOGRAPHICALLY GENERATED DATA TETHERED TO BIOLOGICAL DATASET PROVIDED BY A USER THROUGH SYNCHRONIZATION OVER PEER-TO-PEER NODES

Systems and methods for minting cryptographically generated data supported by a blockchain through synchronization over peer-to-peer nodes are provided. A method comprises sending a biological dataset to a certifier, where the certifier is trusted by nodes of the blockchain network. The method further comprises sending a unique identifier of each of one or more contributors to the certifier, wherein each contributor is a user that contributed to the provision of the biological dataset. The method further comprises receiving a corresponding claim certificate, each claim certificate associating the identifier of the corresponding contributor with an anonymous credential of that contributor and a dataset identifier for uniquely identifying the biological dataset, each claim certificate signed by the certifier. The method further comprises communicating, directly or indirectly, one or more contribution messages to a mint.

Peer-to-peer transmission system with a controlled, double-tier cryptographic key structure

Aspects of the disclosure provides a secure key management and data transmission system that includes a transmission system, a data consumer network device, a user network device, and a data transmission network. The transmission management system is configured to receive user-specific data from the user network device via the data transmission network and receive a request for a service corresponding to processing the user-specific data according to a proprietary process provided by the data consumer network device. The transmission management system is also configured to generate service response data based on processing the user-specific data according to the proprietary process in response to the received request, encrypt the service response data to become single-encrypted service response data, transmit the single-encrypted service response data to the data consumer network device, and receive and store double-encrypted service response data from the user network device.

PEER TO PEER (P2P) ENCRYPTED DATA TRANSFER/OFFLOAD SYSTEM AND METHOD
20230376573 · 2023-11-23 · ·

A peer to peer (P2P) system and method for sharing encrypted digital content may be used in a content delivery network system.

INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING METHOD, AND RECORDING MEDIUM
20220101454 · 2022-03-31 · ·

An apparatus includes circuitry to: in response to a request for processing first information indicating an ownership of energy, determine whether a requester of the request has authority to process the first information and based on a determination indicating that the requester has authority to process the first information, generate second information for tracking enemy that instructs processing of the first information.

Non-fungible token (NFT) based digital rights management in a decentralized data delivery network
11075891 · 2021-07-27 · ·

Methods and systems are described for implementing decentralized digital rights management (DRM) within a decentralized network, satisfying an important need of content owners. First, the method implemented by a source cacher node includes broadcasting, to one or more viewer peer nodes in the decentralized network, a notification of the source cacher node's intent to transmit a data stream. Then, recording a smart contract on a blockchain associated with the decentralized network, the smart contract associated with the data stream and allowing the authentication of a viewer peer node through the smart contract by an ownership of a non-fungible token (NFT) in order to receive a data key to decrypt the data stream. Next, receiving a request from an authenticated viewer peer node for receiving the data stream. Finally, generating an encrypted data stream based on the data stream and the data key to decrypt the data stream, and transmitting the encrypted data stream and the data key to the authenticated viewer peer node.