Patent classifications
G06F21/121
Determine whether to perform action on computing device based on analysis of endorsement information of a security co-processor
Examples disclosed herein relate to a computing device that includes a central processing unit, a management controller separate from the central processing unit, and a security co-processor. The management controller is powered using an auxiliary power rail that provides power to the management controller while the computing device is in an auxiliary power state. The security co-processor includes device unique data. The management controller receives the device unique data and stores a representation at a secure location. At a later time, the management controller receives endorsement information from an expected location of the security co-processor. The management controller determines whether to perform an action on the computing device based on an analysis of the endorsement information and the stored representation of the device unique data.
Correspondence of external operations to containers and mutation events
A method is provided for determining command-to-process correspondence. The method includes identifying, by the hardware processor, initial processes resulting from executions of container immutability change events for each of multiple containers in a cluster, based on an execution time, a process identifier and a process group identifier for each of the container immutability change events. The method further includes checking, by the hardware processor, if an initial process from among the identified initial processes matches an entry in a database that stores external container commands and at least one respective process resulting from executing each of the external container commands. The method also includes designating, by the hardware processor, a particular external command, from among the external container commands stored in the database, as having a correspondence to the initial process, responsive to the initial process matching the at least one respective process resulting from executing the particular external command.
Information processing system and computer readable medium
An information processing system includes: a first receiving unit that receives, from a first user, an instruction to distribute content that the first user owns to a second user; a distribution unit that distributes the content to the second user based on the instruction; a storage unit that stores information that the content is distributed by the distribution unit; a second receiving unit that receives, from a third user, a request to use content that the third user owns; and an execution unit that executes processing in accordance with the request in a case where the content identified by the request is determined as content that has been distributed by the distribution unit, based on the information stored in the storage unit.
Authentication translation
Authentication translation is disclosed. A request to access a resource is received at an authentication translator, as is an authentication input. The authentication input corresponds to at least one stored record. The stored record is associated at least with the resource. In response to the receiving, a previously stored credential associated with the resource is accessed. The credential is provided to the resource.
Context-based secure controller operation and malware prevention
In one implementation, a method for providing security on an externally connected controller includes launching, by the controller, a security layer that includes a whitelist of permitted processes on the controller, the whitelist including (i) signatures for processes that are authorized to be executed and (ii) context information identifying permitted controller contexts within which the processes are authorized to be executed; determining, by the security layer, whether the particular process is permitted to be run on the controller based on a comparison of the determined signature with a verified signature for the particular process from the whitelist; identifying, by the security layer, a current context for the controller; determining, by the security layer, whether the particular process is permitted to be run on the controller based on a comparison of the current context with one or more permitted controller contexts for the particular process from the whitelist.
Execution type software license management
Techniques for managing licensing of a software application that includes a plurality of executables are presented. The techniques can include detecting an initiation of the software application on a client computer; obtaining a license for a usage of a first executable of the plurality of executables; detecting an initiation of at least a second executable; obtaining execution type data for the second executable specifying one of: a license for a usage of the second executable is not required if an instance of the second executable is executing on the client computer, or a license for a usage of the second executable is not required if at least one executable of the plurality of executables is executing on the client computer; determining, based on the execution type data, that a license for a usage of the second executable is not required; and executing the second executable.
Instant Messaging Private Tags
Systems for instant messaging private tags preferably comprise a parser for parsing an instant message for sensitive data and an encryption engine for encrypting the sensitive data. A modified uuencoder is also preferably included for converting the encrypted sensitive data into a data stream that complies with an XML format. Other systems and methods are also provided.
Earpiece with Digital Rights Management
A wireless earpiece for digital rights management is provided. The wireless earpiece includes a processor disposed within the ear piece housing, a speaker operatively connected to the processor, a storage medium disposed within the ear piece housing and operatively connected to the processor, and a wireless transceiver disposed within the ear piece housing and operatively connected to the processor. The processor may be configured to access audio files stored on the storage medium to play the audio files over the speaker. The processor may be configured to provide a digital rights management feature for one or more of the audio files. The processor may be further configured to access an audio stream conveyed to the earpiece through the wireless transceiver. The processor may be further configured to provide a digital rights management for the audio stream.
Authenticated service application sessions using visual authentication indicia
Embodiments of the present disclosure provide methods, systems, apparatuses, and computer program products that are configured to provide authenticated access to a service application. The embodiments disclose an apparatus and system configured to launch an authenticated service application session in response to capturing authentication success rendering comprising visual authentication indicia. The authentication success rendering is a captured via a user device display, and includes visual authentication indicia. To facilitate rendering of the authentication success rendering, embodiments output a browser sign-in session request configured to launch a browser sign-in session associated with a browser application. Additionally, to facilitate capturing the rendering, embodiments initiate a display recorder module configured to capture, during the browser sign-in session and via the user device display, authentication success rendering comprising visual authentication indicia. Embodiments may be configured to parse the captured authentication success rendering to identify the visual authentication indicia, and decode the visual authentication indicia to identify user authentication data. Finally, embodiments may execute a service application sign-in protocol using the user authentication data to launch the authenticated service application session.
REMOTE FEATURE ACTIVATION IN POWER MACHINES
Implementations of the present disclosure are generally directed to activating features in power machines. More particularly, implementations of the present disclosure are directed to remote activation of features in power machines. Implementations include, methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for transmitting a request for an initialization indicator for a software package from an initialization system of a power machine comprising hardware physically capable of executing at least one function, the request being transmitted, by a communication link of the initialization system, from a machine controller of the initialization system to a remote system, communicating, by the communication link, the initialization indicator from the remote system to the machine controller, and in response to receiving the initialization indicator: storing, by the machine controller, the initialization indicator, and executing, by the machine controller, the software package to control the at least one function.