Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


By authorizing client

Subclass of:

726 - Information security

726026000 - PREVENTION OF UNAUTHORIZED USE OF DATA INCLUDING PREVENTION OF PIRACY, PRIVACY VIOLATIONS, OR UNAUTHORIZED DATA MODIFICATION

726027000 - Access control

Patent class list (only not empty are listed)

Deeper subclasses:

Entries
DocumentTitleDate
20130031642LICENSING VERIFICATION FOR APPLICATION USE - Techniques involving detection of misuse of digital licenses pertaining to application use. An identification of unsigned applications or other use-protected applications enabled for use at a user device is obtained. The identification of such applications is directed to a licensing authority to seek digital license renewal for using the applications. A renewed digital license is received if the provided identification of use-protected applications corresponds to what is authorized by the licensing authority for use at the user device. In other embodiments, verification information may be provided to protect the identification of unsigned applications from tampering, such as information indicative of whether the identification of unsigned applications originated at the user device in which the use-protected applications are used, and indicative of whether the identification of the unsigned applications is a copy of a previous identification of the unsigned applications.01-31-2013
20130031643Methods and Apparatus for Sharing, Transferring and Removing Previously Owned Digital Media - The invention provide systems and methods for management of digital media objects, comprising first and second client digital data processors (e.g., personal (or private) computers, laptops, dedicated music devices, electronic book readers, and so forth) that are in communications coupling with one or more stores (e.g., dedicated disk drives, flash drives, cloud storage, etc.). At least one digital media object (DMO) or copy thereof is stored in one or more of those stores and is accessible by at least one of the first and second client digital data processors.01-31-2013
20120204272METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR PUBLISHING PUBLIC CONTENT AND PRIVATE CONTENT ASSOCIATED WITH THE PUBLIC CONTENT - A publishing method is disclosed, which process enables a publisher to publish in a simple and easy manner a set of content that includes both public content and private content. In some embodiments, this advantageous solution is achieved by implementing a multi-step publishing process. In one step, the publisher publishes a feed that contains: (08-09-2012
20110191863System and Method for Identifying Systems and Replacing Components - A system, method, and computer-readable medium are disclosed for managing a system's entitlement to digital assets when the system's components are replaced. A unique system identifier, comprising the unique identifiers of predetermined system components, is associated with digital assets data to generate digital assets entitlement data, which in turn entitles the system to process the digital assets data. The digital assets entitlement is perpetuated when a first unique system component identifier is replaced with a second unique system component identifier.08-04-2011
20130086699AGGREGATION SYSTEM - A machine and methods, the machine including a computer, networking hardware connecting the computer to the Internet, and a memory storing executable instructions which when executed, enable the end-user computer system to perform the operations of: connecting to a plurality of sites on the Internet; authenticating itself with each of the sites; retrieving information from each of the sites; parsing the information from each of the sites so as to produce an aggregation of the parsed information, wherein the aggregation is produced at the end-user computer system; and rendering the aggregation as output.04-04-2013
20130086698METHOD AND APPARATUS FOR DISTRIBUTED UPLOAD OF CONTENT - A system and method for distributed uploading of content utilizes one or more viewer systems, coupled over a network to a remote content source, to upload transmit at least a portion of the content to a remote storage system along with authorization/identification indicia identifying the viewer system. In one embodiment, fractional portions of the same content program from multiple different viewer systems are aggregated at the remote storage system for subsequent download streaming to a requesting of the viewer systems for viewing thereby at a second time, which is time-shifted from the initial transmission from the content source.04-04-2013
20130086697Systems and methods for pairing identification data to a network-based service - Disclosed are methods and systems of providing access, indexing, and/or connecting a user to a network-based service, associated with a particular entity, using an identifier that can be uniquely associated with the particular entity (e.g., with respect to a given scope of identification), can be proprietary to the entity, and/or issued by a third-party (i.e., a party not providing the method or system). A method can comprising receiving from a client computer system an entity identifier uniquely associated with a real world entity in a scope of identification, the entity identifier being issued by a third-party in association with the real world entity. The method can select a network-based service uniquely associated with the entity identifier, determine a public access parameter to the network-based service, and provide the client computer system with public access to the network-based service according to the public access parameter.04-04-2013
20110203006METHOD AND SYSTEM FOR DELIVERING CLOSED-AUDIENCE CONTENT TO A CLOSED MOBILE AUDIENCE - A method and system for delivering closed-audience content to a closed mobile audience is described. In one embodiment, a method for delivering closed-audience content to a closed mobile audience is described. The method for delivering closed-audience content to a closed mobile audience involves obtaining closed-audience content, establishing a closed mobile audience, identifying a mobile user or a mobile device as being part of the closed mobile audience, and delivering the closed-audience content to the mobile user or the mobile device. Other embodiments are also described.08-18-2011
20080256646Managing Digital Rights in a Member-Based Domain Architecture - Techniques enable seamless movement and consumption of licensed digital content amongst multiple devices. In some embodiments, these techniques allow establishment of a domain capable of having multiple member devices. Each member device of the domain typically comprises a content-consuming device such as a personal computer, a portable media player, or the like. These techniques enable a license associated with digital content to bind to a domain rather than an individual device. As such, each member device of the domain may contain a domain identity and, with the identity, may consume the content with use of the license and in accordance with policy described in the license. These tools may also enable a member device to join multiple domains and to contain an identification of each of these multiple domains.10-16-2008
20130036479CONTENT RECORD TERMINAL, CONTENT RECORD/REPRODUCTION SYSTEM, AND CONTENT RECORDING METHOD - When a content write unit records a content on a medium, a control unit controls to record a dummy license which is generated by a dummy license generation unit and an expiration time limit is set into a past time, into the medium. When a recording of the content on the medium is completed, the control unit controls to delete the dummy license recorded on the medium and to record a normal license into the medium.02-07-2013
20120167233EMAIL TRUST SERVICE - In embodiments of an email trust service, an email message is received at an email distribution service for distribution to a client device that corresponds to a recipient of the email message. Authentication techniques can be applied to verify that the email message is received from an authorized domain as specified in a sender address field of the email message. Additionally, it can be determined whether an Extended Validation certificate is associated with the authorized domain. Responsive to determining that an Extended Validation certificate is associated with the authorized domain, a trust indicator is associated with the email message to generate a trusted email message. The trust indicator indicates that the trusted email message is from an authorized domain when the email message is displayed at the client device.06-28-2012
20130047270METHOD AND APPARATUS FOR DYNAMIC DATA FLOW CONTROL USING PRIORITIZATION OF DATA REQUESTS - A data center determines whether requested content is available at the data center. The content is available when the content is both present at the data center and current. When the requested content is available at the data center, the data center returns the requested content to the browser. When the requested content is locally unavailable at the data center, the requested content is retrieved from an origin server. When retrieval of the content is delayed, the request is prioritized and placed in a queue for handling by the origin server based on the priority of the request. A status page may be communicated to the browser to inform a user of the delay and provide alternate content and status information related to the request determined as a function of the request or the current state of the origin server.02-21-2013
20120311724APPARATUS AND METHOD OF IN-APPLICATION LICENSING - Apparatus and methods for licensing include executing a base application on a device, initiating a transaction with an application store to obtain access to a subordinate licensable item that is usable by the base application, receiving a transaction receipt corresponding to the transaction for the subordinate licensable item, and obtaining, from a license server, a subordinate license that corresponds to the subordinate licensable item. Additionally, the apparatus and methods may include storing a base license for a base application on a device, acquiring a subordinate license for a subordinate licensable item usable by the base application, receiving a request to execute the base application, enforcing, by a license agent service on the device, the base license with respect to executing the base application, and enforcing, by the base application, the subordinate license during execution of the base application.12-06-2012
20090271873METHOD AND SYSTEM FOR DISPLAYING A SEQUENCE OF MEDIA FILES - A server connected to a network may receive a media file and divide the media file into one or more display files according to the number of display components in the media file. The display files may be stored in a media storage library on the server. An image display sequence including an order list of one or more selected display files stored in the media storage library may be generated. The server may authenticate a display client configured for viewing a sequence of images on the server and transmit to the display client a pointer to the image in the sequence of images to present.10-29-2009
20120227114ACCESS CONTROL SYSTEM, COMMUNICATION TERMINAL, SERVER, AND ACCESS CONTROL METHOD - Terminal certification means of a communication terminal manages a content and certification information on the content in association with each other. Upon access to a server associated with the execution of the content, request means sends the server a request including certification information associated with the content. In response to the request from the communication terminal, the server uses server certification means to certify the request. Access control means performs access control based on policy information stored in policy information storage means.09-06-2012
20120117663SEMICONDUCTOR MEMORY CARD AND DATA READING APPARATUS, AND DATA READING/REPRODCUING APPARATUS - A semiconductor memory card comprising a control IC 05-10-2012
20130067598TECHNIQUES FOR PRESENTING AND COLLECTING END USER LICENSE AGREEMENT ACCEPTANCE - Techniques are disclosed for presenting and collecting end user license agreement acceptance for software applications or firmware components executed on a computing appliance. A sentry component allows only certain commands to be executed before the relevant end user license agreements are accepted, e.g., commands to configure a network interface and web server on the appliance executed on a shell over a serial interface. Once configured the web server is used to provide a rich interface for presenting end user license agreements and obtaining acceptance thereof. Once the user accepts the terms of the relevant license agreements, then the appliance is made active and all configuration commands become operational, including commands needed to configure the device and start services which would otherwise be prohibited by the sentry component prior to license acceptance.03-14-2013
20130067599Software distribution service federation - Software update distribution techniques are disclosed. Authentication information is received, from a content source authenticator, by an update agent included in a client device. The authentication information comprises a list of a plurality of content sources, wherein the plurality of content sources have been verified by the content source authenticator as being authentic content sources for legitimate software applications. The update agent selects a first content source of the plurality of content sources, where the first content source is configured to provide updates for a first software application. The update agent checks the first content source for updates for the first software application.03-14-2013
20090235365DATA ACCESS SYSTEM - A data access system includes a host and a storage device. The host has a security setup function and includes a first identity code storage block to store a first identity code. The storage device has a security check function and includes a second identity code storage block. The host executes the security setup function to set a second identity code according to the first identity code, and the second identity code is stored into the second identity code storage block. The storage device executes the security check function to determine if the host is allowed to access the storage device according to the first and second identity codes.09-17-2009
20130185812SYSTEM AND METHOD FOR SECURE CLOUD COMPUTING - In a method for secure cloud computing, a virtual machine (VM) associated with a client is executed at a computer within a trusted computing cloud. An image including state information of the VM is obtained; storage of the image is arranged; a freshness hash of the image is determined; and the freshness hash is sent to the client. Subsequently, at the same computer or at a different computer within the trusted computing cloud, the stored image may be retrieved; a freshness hash of the retrieved image may be determined; the freshness hash of the retrieved image may be sent to the client; and an indication may be received from the client verifying the integrity of the freshness hash of the stored image.07-18-2013
20110321177INFORMATION PROCESSING APPARATUS AND OPERATION METHOD OF THE SAME - Provided is a service processor (SVP) 12-29-2011
20130167252AUTONOMOUS ACCESS CONTROL - Methods and devices for controlling actions associated with a plurality of resources available on a computing device are described herein. One example embodiment comprises: presenting a request for a usage preference that indicates a manner in which the computing device is preferred to be used; receiving input indicating the usage preference; determining an action for a resource that is to be controlled in order to satisfy the usage preference, wherein the determining is performed according to a heuristic that maps the usage preference to the action for the at least one resource; and controlling whether or not to allow the action to be performed; wherein the request for the usage preference or the input identifying the usage preference does not explicitly indicate that the determined action is to be controlled in order to satisfy the usage preference.06-27-2013
20130167253METHOD AND APPARATUS FOR PROVIDING CLOUD-BASED DIGITAL RIGHTS MANAGEMENT SERVICE AND SYSTEM THEREOF - A method for providing a Digital Rights Management (DRM) service in a network is provided. The method includes receiving a request message for device registration, which includes DRM-related identification information, from a user device; and registering registration information of the user device, which is distinguished according to a corresponding user account and according to a corresponding DRM solution, based on the DRM-related identification information.06-27-2013
20110283366METHOD AND SYSTEM FOR PREVENTING BROWSER-BASED ABUSE - Disclosed is a method and system of preventing browser-based abuse. The method of preventing browser-based abuse may include determining whether an access based on a browser function extension module is a malicious access for acquiring data of an Internet browser, and blocking the access based on the browser function extension module when the access is determined to be a malicious access.11-17-2011
20110302662CONTENT PROTECTION SYSTEM - Provided is a content protection system, in which: a user terminal judges, when a content is to be reproduced or executed, whether or not the user terminal has a usage right of the content, and makes, if it is judged that the user terminal does not have the usage right of the content, a request to a license management apparatus to acquire the usage right of the content; the license management apparatus generates, when the request to acquire the usage right is received from the user terminal, license information containing information on an expiration date that is set based on a timing when the request is received, and transmits the generated license information to the user terminal; and the user terminal judges that the user terminal has the usage right of the content until the expiration date indicated by the license information received from the license management apparatus arrives.12-08-2011
20110289599SERVICE PROVISION - A method and system for service provision, comprising: a web browser (11-24-2011
20120110679SERVICE PROVIDING SYSTEM, SERVICE PROVIDING METHOD, PORTABLE COMMUNICATION TERMINAL AND SERVER - A service providing system includes a portable communication terminal operated by a user; a service providing apparatus providing a service to the user, and a server managing the service providing apparatus, wherein the service providing apparatus calculates a response using a challenge, and the portable communication terminal transmits a challenge generated by the server to the service providing apparatus subjected to a legitimacy check of the service providing apparatus and presents a result of the legitimacy check based on a response calculated by the service providing apparatus subjected to the legitimacy check using the transmitted challenge.05-03-2012
20100122351Software Application Framework for Network-Connected Devices - A facility for provisioning and managing registered applications is described. Registered applications can be downloaded to a mobile device from an application provisioning server. When the download is complete, the mobile device may begin execution of the registered application. However, at least portions of the registered application cannot be executed by the mobile device without first passing control to an application provisioning server via a network connection. Upon receiving temporary control of the registered application, the application provisioning server can perform tasks such as license verification and other tasks before turning control of the application back to the mobile device.05-13-2010
20090089885RADIO FREQUENCY IDENTIFIERS FOR PROVIDING USER ACCESS TO COMPUTING RESOURCES - A system for controlling access to computing resources including an authentication device operatively associated with a computing device, the authentication device being configured to transmit an interrogation signal to a predetermined area. A computing device has at least one software application resides thereon. A wireless license device is configured to transmit license information to the authentication device in response to the interrogation signal and to allow the software application to run while the wireless license device is within the predetermined area and to prevent the software application from running when the wireless license device is not within the predetermined area.04-02-2009
20080209575License Management in a Privacy Preserving Information Distribution System - A system and method for transferring licenses from a first user to one or several other users in an information distribution system, while providing privacy for said users. The level of privacy is enhanced by the license format and the use of a master license, an anonymous license and by the inclusion of a revocation lists in the certificate corresponding to a license.08-28-2008
20100287622System and Method for Preventing Proper Execution of an Application Program in an Unauthorized Processor - A system and method for preventing an application program, which is licensed to a customer to be exclusively executed in a processor based on a certain processor design, from being executed properly in unauthorized processors is provided. The system includes a scrambling module and a recovery module. The scrambling module scrambles a selected portion of the application program using an identifier which identifies the authorized processor design. The recovery module adds an unscrambling program to the application program such that when the program is running in a processor, it retrieves a second identifier from the processor and unscrambles the scrambled portion of the application program using the retrieved second identifier. If the second identifier does not correspond to an authorized processor design, the unscrambling operation will incorrectly unscramble the scrambled portion and the application program will not run properly.11-11-2010
20090265793PREVENTING UNAUTHORIZED DISTRIBUTION OF MEDIA CONTENT WITHIN A GLOBAL NETWORK - One embodiment of the invention is a method for providing media content while preventing its unauthorized distribution. The method includes transmitting from a client to an administrative node a request for delivery of an instance of media content (IMC); determining which content source (CS) of a plurality of CSs to provide delivery of the IMC, provided the client is authorized to receive the IMC; transmitting to the client an access key and a location of the IMC; transmitting from the client to the CS a second request and the access key; in response to receiving the second request and the access key, transferring the IMC from the CS to the client; transmitting from the client to the administrative node an indicator indicating a successful transfer of the IMC; and generating a transaction applicable to the client and associated with the transfer of the IMC to the client.10-22-2009
20090265792Memory security override protection for manufacturability of information handling systems - Systems and methods are disclosed for providing memory security override protection for improved manufacturability of information handling systems. A security authentication system is added to a software driven security override signal for unlocking programmable memory circuitry, such as flash memory, according to security protection techniques associated with the Intel AMT (Active Management Technology) architecture. This security authentication system disclosed requires authentication of software security override requests before they are allowed. More particularly, the systems and methods disclosed add specific BIOS (Basic Input Output System) code to check the security override status and the software security override request signals on boots of the computer system to make sure these requests are not coming from rogue elements within the computer system. If the authentication is validated, then the programmable memory circuitry is unlocked on the next boot of the system to allow for reprogramming.10-22-2009
20080235810Method of Authorizing Access to Content - A method of and source device (09-25-2008
20080209577Method of Controlled Access to Content - A method of controlled access to content, comprising joining an access sharing network, obtaining a content item from the access sharing network which requires access control data to enable playback, obtaining the access control data, determining from the access control data that a particular other device is authorized to play back the content item, and enabling playback of the content item in accordance with the access control data upon a positive determination that said other device is a member of said access sharing network. Preferably the access control data is used also during a predetermined period of time after making a determination that said other device has ceased to be a member of the access sharing network. Also a device (101) configured to carry out the method.08-28-2008
20080271162Software execution management apparatus, method, and computer-readable medium thereof - Even if the process for permitting execution of software is enabled in accordance with first license information, upon transmitting an invalidation signal from the invalidation signal transmitter 10-30-2008
20080271161Method and Apparatus for Transferring a Data Carrier of a First System to a Second System - A description is given of a method of transferring a first electronic data carrier (10-30-2008
20130219519PHYSICAL KEY SECURE PERIPHERAL INTERCONNECTION - A multi-display device can interface with two or more different types of docking stations. The device can determine the type of dock and change the pin outs for a connector to interface with that dock. Once docked, the device can determine a charge status for the device and the dock to present the status to the user. Further, the dock can enter one of several modes, including a call receipt mode and an entertainment mode. The modes allow for expanded functionality for the device while docked. Two particular docks, the laptop dock and the smart dock, provide special functionality with the device.08-22-2013
20090083861Systems and Methods for Server Load Balancing Using Authentication, Authorization, and Accounting Protocols - Systems and methods for dynamically load-balancing clients across available servers without the need for a load balancer in front of a network are provided. Exemplary methods assign servers to clients in wireless and wireline networks based on server load. Methods and systems for using the authentication, authorization, and accounting (AAA) protocols to load-balance network servers are provided. The load-balancing systems and methods further include using the Diameter AAA protocol routing attribute value pairs (AVPs) to implement bootstrap functionality and load balancing. Methods and systems using the Diameter protocol to manage client assignments are disclosed. Methods and systems for dynamically load-balancing clients across available servers using an AAA protocol are further described. Methods and systems to redirect clients to available servers with the least load are disclosed.03-26-2009
20090165147Control technique for object production rights - Methods for a control technique for object production rights include but are not limited to receiving at the duplication control system a digital rights management code, the digital rights management code associated with one or more object data files; generating an authorization status based on the digital rights management code; and configuring one or more manufacturing machines to operate as a function of the authorization status.06-25-2009
20090172823MANAGEMENT ENGINE SECURED INPUT - In some embodiments a controller controls an input device, receives input information from the input device, excludes a host processor from controlling the input device, and secures the input information received from the input device so that the input information is not received by the host processor or by any software running on the host processor. Other embodiments are described and claimed.07-02-2009
20120198567DIGITAL WORKS HAVING USAGE RIGHTS AND METHOD FOR CREATING THE SAME - Digital work adapted to be distributed within a system for controlling at least one of the distribution and use of digital works. The digital work includes digital content representing a portion of a digital work suitable for being rendered by a rendering device and usage rights associated with the digital content. The usage rights specify a manner of use indicating one or more stated purposes for which the digital work can be at least one of used and distributed by an authorized party.08-02-2012
20120079607Request Based License Mode Selection - Methods and systems are disclosed for providing a mechanism for dynamically switching between the licensing modes on the remote presentation host to handle different kinds of licenses. In one embodiment, the mode switching may be based on the configuration of the users that are connecting to the remote presentation host. In an embodiment, users may be provided with remote presentation session files that define what type of license to be used for the current connection to the remote presentation host. In some embodiments, mechanisms are disclosed to provide the ability to convert a remote client access license from one type to another by using a convertibility matrix.03-29-2012
20090064347Protection Against Unauthorized Copying of Digital Medial Cotent - Protection against unauthorized copying of digital media content is achieved by receiving information from a client device related to its storing function used to store digital media content that is to be sent to the client device; and performing a procedure to protect against unauthorized copying of the digital media content if the client device is able to store the digital media content using its storing function.03-05-2009
20090064346PROVIDING SERVICES TO A GUEST DEVICE IN A PERSONAL NETWORK - A method may include sending personal network connection information from a mobile device to a guest device; sending authentication credentials from the mobile device to the guest device; receiving the authentication credentials in the personal network from the guest device; authenticating the guest device based on the authentication credentials; and granting access to the guest device to content stored in the personal network for a guest session.03-05-2009
20080263677Client Health Validation Using Historical Data - Implementations of client health validation using historical data are described. In one implementation, historical data on a client, such as a laptop, attempting to access a network is scanned. The historical data can come in many forms, including cookies and application data caches saved on the client. The historical data can be used to assess a health of the client. For example, if historical data stored in an application data cache indicates interactions between the client and a website known to disseminate malicious agents, the client can be assessed to have unacceptable health. Alternately, if the historical data indicates that the client has not interacted with enough suspicious sources to constitute a danger to the network, the client can be assessed to have acceptable health. In such a case, the client can be allowed to access the network.10-23-2008
20110231941LICENSE MANAGEMENT IN A MEDIA NETWORK ENVIRONMENT - Acquiring a license in a hub network, including: sending a license request from a client to a server through an intermediary device; sending a connection confirmation from the client to the server through the intermediary device; and receiving license data at the client from the server through the intermediary device in response to the license request, wherein the client and the server are not connected in a hub network, wherein the license request identifies a sub-copy version stored on the client, wherein the sub-copy version includes sub-copy locked content data, and wherein the license data is bound to the hub network.09-22-2011
20090205052Coupling of a computer program or of data to a reference system and associated verification - The invention relates to a method of coupling a computer program and/or data to a reference system, implementation of the computer program and/or access to the data being carried out by executing software, a group of parameters being associated with the reference system. The method comprises the protection of a value V08-13-2009
20090144835System, method and computer-readable medium for providing a unifed computer-mediated purchasing experience - A method, system and computer-readable medium are provided to enable in an electronic communications network comprising a client system, an order processing computer and a plurality of fulfillment systems, a method for processing purchase requests. The method may include (a.) providing a managed client with user interface and navigation on the client system to a user, the user interface enabling a user to place purchase requests via the client system; (b.) transmitting at least one purchase request from the client system to the order processing computer; and (c.) enabling the order processing computer to direct at least one fulfillment system to execute at least one aspect of the at least one purchase request. The at least one fulfillment system may authorize an execution of a software by the client system, authorize a webservice, and/or a download of data to the client system.06-04-2009
20110145932System and Method for Remote Management of Applications Downloaded to a Personal Portable Wireless Appliance - The present invention relates to a system and method for remote management of applications downloaded to a personal portable appliance. Applications comprising programs and data structures are updated to include a dummy application that can replace the ordinarily executable application and that manipulates the data structure when invoked, so as to limit it. The dummy application is subsequently reduced to have a limited amount of the original functionality and to prompt the user to delete it.06-16-2011
20090320145APPARATUS, METHOD, AND COMPUTER PROGRAM FOR CONTROLLING USE OF A CONTENT - A content usage control apparatus prevents a content managed by an end user from being illegally used. To prevent a content from being used by an apparatus or user other than an authorized apparatus or user, a content usage control apparatus registers the authorized apparatus or user and determines, before providing the content, whether the content is going to be provided to the authorized apparatus or user. The content usage control apparatus also has the capability of imposing a limitation on rewriting of registration. The above-described capabilities of the content usage control apparatus make it possible to protect copyright of information to be provided. A specific example of the content usage control apparatus is a server which stores contents such as movie contents or music contents, and may be used in a system in which a content is provided in response to a request from a client such as a portable telephone, a TV set, or a personal computer, connected to the server.12-24-2009
20120246743SYSTEM AND METHOD FOR ACCESSING PRIVATE DIGITAL CONTENT - Method for providing access to private digital content installed on a content server C(s), wherein a content manager server C(a) has a number of clients potentially interested in the private content; the method comprising the following steps performed at the content management server C(a): 09-27-2012
20110119772Media Content Transfer and Remote License Acquisition - In one embodiment of a method of providing protected data from a network server, a data file is downloaded from an external source to a computer on a network. The downloaded file is stored in a location accessible to a server on the network. Using a computer on the network connected to the server, a license linked to the server for the data is procured from an external source. The data file is played from the server using the license.05-19-2011
20100212026IMAGE FORMING APPARATUS, LICENSE MANAGEMENT SYSTEM AND LICENSE MANAGEMENT METHOD - An image forming apparatus comprises a communication interface unit that performs communication with a terminal device, a storage unit that stores an application program installed under license and a management application program for managing the application program, an arithmetic processing unit that executes the application program and the management application program stored in the storage unit, a determination unit that determines whether or not predetermined software installed in the terminal device has a legitimate license code corresponding to the license of the management application program, and an installing unit that, when it is determined that the predetermined software has a legitimate license code, obtains the application program from the terminal device and installs the application program into the storage unit.08-19-2010
20100212027SYSTEM AND METHOD FOR RENDERING CONTENT ASSOCIATED WITH A DIGITAL WORK - A method, system and software for permitting use of digital works having rights associated therewith in a system having repositories configured to enable use of the digital work in accordance with the rights, including associating a transfer right with a digital work, the transfer right specifying that the digital work is transferred from a first repository to a second repository; transferring the digital work from the first repository to the second repository in accordance with the transfer right; and in response to the transferring, step updating transfer right information in respect of the digital work.08-19-2010
20080295182Distribution System of Contents Embedding License Machine ID11-27-2008
20110067116Method for Validating User Equipment, a Device Identity Register and an Access Control System - The present invention discloses a method for validating user equipment, a device identity register and an access control system. Wherein the method for validating user equipment comprises: setting a central device identity register shared by different networks, wherein illegal user equipment identities are stored in the central device identity register; the central device identity register receiving an ID validation request from a mobility management entity, wherein the ID validation request carries ID parameters of a user equipment; the central device identity register validating the validity of the user equipment according to the ID parameters, and returning a validation result to the mobility management entity. In virtue of the present invention, the accessing of the illegal non-3GPP network user equipment which is capable of accessing 3GPP network to the 3GPP network is able to be controlled.03-17-2011
20110067115SYSTEM AND METHODS FOR SELECTIVE ADVERTISING IN MEDIA CONTENT - Embodiments of techniques for distributing and rendering media content are provided. In response to a request for a first media file, a combined media file is generated having first and second segments that together include data from the first media file and from a second media file. The combined media file is then provided to a player module operable to render only data from the first media file during a first operating mode, and operable to render data from both the first and second media files during a second operating mode. For example, the first media file may be a music file, and the second media file an advertisement. A consumer may play the music portion without special software or a license, but the advertisement will be rendered as well. Alternatively, the consumer may purchase a license and use special playback software to render the music without the advertisement.03-17-2011
20090320144Method and system for transferring protected content - There is provided a method of transferring a protected content, in which the method comprises receiving from a first player the protected content via a transmission medium calculating usage rights associated with the protected content to confirm receipt from the first player of some or all of the usage rights associated with the protected content making available the protected content for distribution to a second player, and transmitting the protected content to the second player. The method also includes confirming that the first player has relinquished the some or all of the usage rights associated with the protected content prior to transmitting the protected content to the second player. The protected content may comprise a music file, and the some or all of the usage rights may comprise a usage right for a limited number of protected content players, or comprise a usage right for a limited time duration.12-24-2009
20090320143SENSOR INTERFACE - A sensor application programming interface (API) is capable of restricting an application's access to sensor data measured by a sensor, while at the same time providing access to sensor properties of the sensor, even if access has not been granted to the application for the sensor.12-24-2009
20090113560CONTENT PROCESSING DEVICE, SERVER DEVICE, COMMUNICATION METHOD, AND STORAGE MEDIUM CONTAINING COMPUTER PROGRAM04-30-2009
20100223674CONTENT DISTRIBUTION SYSTEM, DISTRIBUTION METHOD, CONTENT PROCESSING DEVICE, AND PROCESSING METHOD - The present invention provided a content delivery system that can deliver content by way of the Internet. In the system, a browser requests a content server to deliver a startup file. The content server transmits the startup file to the browser. The startup file describes that the content is to be delivered by streaming or that it is to be delivered by downloaded files. A content reproducing section determines if the content is that to be delivered by streaming or that to be delivered by downloaded files according to the description of the startup file it receives from the browser. A television receiving set may be used as content processing apparatus for receiving the delivery of the content from a content delivery apparatus of such a system.09-02-2010
20090113559Stateless challenge-response protocol - A two-party stateless protocol by which a server receives a request from a client, transmits a tamper-resistant challenge to the client, receives a response to the challenge, and validates the response, where each of the challenge and the response contain a copy of the request. If the client responds correctly to the challenge and does not modify the request during the protocol, the server executes the request.04-30-2009
20080229431System and Method to Manage Device Access in a Software Partition - A system and method to manage device access in a software partition are provided. The illustrative embodiments provide a mechanism for exporting resources/devices from an administrator partition to a software partition in its purview. A trusted device list data structure is provided that identifies which devices are permitted to be exported into a software partition from an administrative partition. This trusted device list data structure also identifies which of the devices in the list of devices should be exported by default when exporting devices to a software partition, i.e. if no overrides are specified. In addition, a user-specifiable mechanism to override the entries in the trusted device list data structure is provided. For security purposes, this mechanism may not be used to export devices not listed in the trusted device list data structure. The mechanism may also be used to prevent the exporting of devices which are exported by default.09-18-2008
20110010777Digital receipt for use with an interoperable keychest - There is provided a system and method for a digital receipt for use with an interoperable keychest. There is provided a method for online registration of a digital receipt associated with a content, comprising performing a transaction to obtain from a first distributor the content encrypted by a title key and a first digital rights management (DRM) license usable with the first distributor to access the title key, receiving from the first distributor the digital receipt associated with the content including information relevant to the transaction, and transmitting the digital receipt to the interoperable keychest acting as a central key repository (CKR) for an online registration of the digital receipt associated with the content. Authorized media distributors may then generate new DRM licenses using the CKR, enabling interoperable content playback of the same universal file across different media distributors and clients.01-13-2011
20110023131Method and Apparatus for Checking Aggregated Web Services - Method and apparatus for checking an aggregated web service requested by a terminal user (01-27-2011
20100251387TERMINAL APPARATUS, DATA PROVIDING SYSTEM, DATA PROVIDING METHOD, AND COMPUTER PROGRAM - A terminal apparatus includes requester that requests data used for installed software from an external apparatus, a receiver that receives the data requested by the requester, a storage unit that stores the data received by the receiver, a restoring unit that restores the storage unit to the state at an arbitrary point of time; and a restoration controller that enables or disables the restoration operation of the restoring unit, wherein the storage unit stores the data that is requested by the requester and received by the receiver after the restoration controller disables the restoration operation of the restoring unit, the restoration controller enables the restoration operation of the restoring unit after the data received by the receiver is stored in the storage unit, and the restoring unit restores the storing unit to the state at a point of time when or after the restoration controller enables the restoration operation.09-30-2010
20100333214INFORMATION PROCESSING APPARATUS, CONTROL METHOD, AND CONTROL PROGRAM - An information processing apparatus in which an application managed by a license based on license data operates. The information processing apparatus includes a recording unit to record transfer information indicating that the license data is transferred from the information processing apparatus to a second information processing apparatus, and a prohibition unit to prohibit use in the information processing apparatus of the license data corresponding to the transfer information when the transfer information indicates that the license data has been transferred from the information processing apparatus to the second information processing apparatus.12-30-2010
20100333212PORTABLE PARAMETER-BASED LICENSING - Portable parameter-based licensing techniques are described. These techniques allow licenses to be decoupled from any particular host device and utilized in a portable and flexible fashion. In at least some embodiments, license data that includes a license to use computer-related functionality can be stored in a secure execution environment. The secure execution environment can be provided by a suitable secure execution environment hosting device(s) (SEHD), such as a portable flash memory device for instance. The license data in the secure execution environment can then be utilized to authorize use of the computer-related functionality, according to the license, on any number of host devices not responsible for providing the secure execution environment. As a result, the owner of the license can use the computer-related functionality without being restricted to any particular host device.12-30-2010
20110035812DIGITAL RIGHTS MANAGEMENT USING TRUSTED TIME - A method for monitoring time so that the use of protected content can be controlled includes receiving a trusted time value from a trusted authority external to a client device. When the client is no longer in communication with the trusted authority, the previously-received trusted time value is updated by use of the client's operating system counter so that a calculated trusted time value is derived for content license evaluation purposes.02-10-2011
20110035811PROVIDING AN ACCESS MECHANISM ASSOCIATED WITH A DOCUMENT PART TO DETERMINE AN ACTION TO TAKE IF CONTENT OF THE DOCUMENT PART IS INACCESSIBLE - A modular document is composed of plural parts, where at least a particular one of the parts is associated with an access right policy that restricts access to the particular part. In response to a request to access the modular document, it is determined based on the access right policy whether content of the particular part is accessible in an electronic device. In response to determining that the content of the particular part is inaccessible in the electronic device, an access mechanism associated with the particular part is accessed to determine an action to take with respect to the particular part when presenting the modular document.02-10-2011
20110055935SYSTEM FOR GROUP ACCESS TO SHARED MEDIA, RESOURCES, AND SERVICES - A system and method for establishing a group of wireless devices for sharing software and hardware resources as well as media stored thereupon associates each group member device of the group of wireless devices, communicates with at least some of the group member devices of the group of wireless devices to identify shared media and upon receiving a request transmitted by a group member device of the group of wireless devices, supports access to shared media. The shared media may be stored on a different group member device, upon a managing portal device, or a media server. Upon a successful validation, the group member device that made the request is notified to facilitate the access to the shared media. The notification includes access information.03-03-2011
20110131665INFORMATION PROCESSING APPARATUS, DATA PROCESSING METHOD AND PROGRAM - A configuration is achieved in which content copying between media and content downloading are performed effectively and under strict management. In content copying between media, the identification information (medium ID) of a copying destination medium is obtained using an API for providing a predefined processing, then the obtained medium ID is transmitted to a server to obtain copying permission information from the server, and then content copying is performed under the management of the server. This configuration allows a copying destination medium to be managed, which can eliminate the unauthorized use of the content. Also, the configuration in which content downloading from the server is performed according to, for example, a Java® program allows a ROM disc on which the content is recorded to store the program and to be provided to a user.06-02-2011
20100263059Virtualization Based Conditional Access Tuner Module For Providing Secure Linear And Non-Linear Content Services - A virtualized, general-purpose computer or consumer electronics (CE) device is provided with and hosts a plug-in module for securely accessing various content services. These modules are referred to as content personalization portable on demand storage units (content personalization PODs).10-14-2010
20090313704CONTENT MANAGEMENT METHODS AND SYSTEMS - Content management methods and systems are provided. First, a UID of a component of a device is read. The UID may be performed with an operation or not. Then, it is determined whether or not the UID matches with a predefined identification attached to the content. When the UID matches with the predefined identification, the content in the device is allowed to be accessed.12-17-2009
20100064378METHOD AND APPARATUS FOR MANAGING DIGITAL RIGHTS MANAGEMENT MODULE - Provided are a method and apparatus for managing a digital rights management (DRM) module. A DRM module for removing a DRM scheme applied to a content selected from among contents, and the content being protected with the DRM scheme, are received. The content is used by using the DRM module, and then the DRM module is partially or completely removed.03-11-2010
20120304314METHODS FOR ADMINISTERING AN AUTONOMOUS RIGHTS COMPONENT, AUTONOMOUS RIGHTS ADMINISTRATION SYSTEMS AND DEVICES CARRYING OUT THE METHODS - A method for an autonomous rights administration component of a computer system includes recording devices of the computer system, determining unique identifiers for each recorded device, permanently storing the unique identifiers, defining a usage rights contingent and a usage rights requirement and activation of at least one application function on the basis of a comparison of the usage rights contingent with the usage rights requirement.11-29-2012
20120304313FACILITATING DATA ACCESS CONTROL IN PEER-TO-PEER OVERLAY NETWORKS - Methods and apparatuses are provided for facilitating data access controls in peer-to-peer or other similar overlay networks. A peer node storing a data object may receive a request for access to the stored data object, and may locate in the network an access control list associated with the data object using a routing mechanism included in the data object. The peer node may determine whether the requested access is authorized based on the access control list, and may grant or deny access based on the determination. A peer node storing an access control list may receive a request from a peer node storing a data object for information relating to access controls associated with the data object. The peer node storing the access control list may then send the requested information relating to the access controls associated with the data object.11-29-2012
20110088101INFORMATION EXCHANGE/SHARE SYSTEM, METHOD AND PROGRAM THEREOF - It is checked whether or not information requested in an information request is present in a message sharing/storing unit which stores information provided from an information provider and accessibility information setting an information requester which is allowed to access the information. It is also determined whether or not the information requester can access information requested in an information request message based on the accessibility information. When it is determined that the information requested in the information request message is already registered in the message sharing/storing unit and the information requester can access the information, information on a request-reply-message to the information requester is created based on the information in the message sharing/storing unit.04-14-2011
20110083198PROGRAM LICENCE MANAGEMENT TECHNIQUE IN AN AUDIO SIGNAL PROCESSING SYSTEM - CPU of a console accepts a full application activation instruction generated via an activation instruction switch. The CPU searches through all of apparatus of a mixing system, which the console belongs to, to detect any apparatus having connected thereto a USB dongle that has recorded therein an access key corresponding to an application program to be fully activated. If such an apparatus has been detected within the mixing system, the CPU places the application program in a fully activated state. If, on the other hand, no such apparatus has been detected, the CPU terminates a full application activation process. Such arrangements allows the application program, which requires authentication of the access key, to be executed with simple operation, while preventing unauthorized use of the application program.04-07-2011
20110072521SECURE CONTENT DELIVERY SYSTEM AND METHOD - A system and method for secure content delivery is provided. The system and method has a content system that verifies a device with a media player based on one or more properties of the device with the media player wherein the content system delivers content to the device with the media player only when the device with the media player is verified.03-24-2011
20110030069SYSTEM AND METHOD FOR PREVENTING UNAUTHORISED USE OF DIGITAL MEDIA - A method for protecting digital media content from unauthorised use on a client, is described. The method comprising the steps of receiving from a server on the client a list of processes, instructions, activity descriptions or data types that must not be active simultaneously with playback of the digital media content (“the blacklist”). The method further comprising checking, on the client, for the presence of any items on the list; and continuing interaction with the server, key management and playback of protected content only if no items on the list are detected on the client. A system is also described.02-03-2011
20100325740MANAGING ELECTRONIC DEVICES USING AN ELECTRONIC DEVICE AS A ROOT OF TRUST - Various embodiments pertain to managing electronic devices using an electronic device as a root of trust. According to one embodiment, registration information for an electronic device 12-23-2010
20110162088COMMUNICATION TERMINAL APPARATUS AND METHOD OF CONTROLLING FUNCTION - A communication terminal apparatus for communicating data is disclosed, the communication terminal apparatus including a sending part configured to send, upon occurrence of an operation event, first identification data that identifies the communication terminal apparatus to another communication terminal apparatus which is in communication with the communication terminal apparatus; a receiving part configured to receive, from the another communication terminal apparatus, second identification data that identifies the another communication terminal apparatus; a memory part configured to store the first identification data upon occurrence of the operation event and the second identification data upon reception by the receiving part of the second identification data; and a controlling part configured to prevent an operation locally performed on the communication terminal apparatus from changing a setting of a function of the communication terminal apparatus while the second identification data is stored in the memory part.06-30-2011
20110162087VIRTUALIZING REMOTE PRESENTATION SESSION CLIENT LICENSING WITH A SERVER-BASED BROKER - Systems, methods, and computer-readable storage media are disclosed for virtualizing remote presentation session licensing issuance for a system executing a plurality of virtual machines hosting a remote presentation session server. In an embodiment, a licensing broker is executed in the host partition of the system, and each session server, upon receiving a request for a license from a client, transmits the request to the broker. The broker completes the license negotiation with a license server responsible for issuing licenses, and once issued, the broker transmits this to the corresponding session server, which completes the licensing transaction with the client.06-30-2011
20090126027FILE ACCESSING AND RETRIEVAL USING SOFT DIGITAL RIGHTS MANAGEMENT TECHNOLOGY - The subject matter disclosed herein relates to a method and/or system for enabling access to computer file content using an open routine having a proprietary argument.05-14-2009
20090100530Method And System For Using Location Information Acquired From GPS For Secure Authentication - Secure functions may be accessed via an authentication process utilizing a password that may be generated within a chip integrated on a device. The password may be unique per chip location, per challenge and/or per chip. The location of the chip may be determined based on GPS information and securely stored and securely communicated to an external entity. Two or more of the chip location, a generated random number sample and a key from a table of keys may be passed to a hash function that may generate a password. An external entity attempting access may be challenged to respond with a password that matches the password generated by the hash function. The response may be compared with the password generated by the hash function and access to one or more secure functions may be granted based on the comparison.04-16-2009
20090049559Informing recipient device of message content properties - According to an aspect of the invention, a content class of a data set for a message to be transmitted to the recipient device is defined. A network element transferring messages to the recipient device specifies at least one information element in a message to the recipient terminal such that the information element comprises an indication of the content class. The message is transmitted to the recipient device.02-19-2009
20120151606SOFTWARE SYSTEM FOR DENYING REMOTE ACCESS TO COMPUTER CAMERAS - A program and method for detecting and preventing the unauthorized remote access of a computer camera by determining whether the camera is activated, and scanning applications to determine if the activation is authorized, and if it is not authorized, then the user is alerted.06-14-2012
20100325739DATA TRANSMISSION APPARATUS AND METHOD, DATA RECEIVING APPARATUS AND METHOD, AND DATA TRANSMISSION AND RECEPTION SYSTEM AND METHOD - The protection of data against illicit transfer with respect to specific data can be ensured. An integrated receiver decoder determines whether or not ATRAC (Adaptive Transform Acoustic Coding) data requiring authentication is contained in selected piece-of-music data in accordance with determination data added into transmitted data. When ATRAC data requiring authentication is contained, the integrated receiver decoder performs an authentication process between it and a storage which is a transfer destination of the ATRAC data, and performs downloading of the ATRAC data after confirming that the storage is a valid apparatus to which the downloading may be performed.12-23-2010
20100333213Systems and Methods for Determining Authorization to Operate Licensed Software Based on a Client Device Fingerprint - Methods and systems disclosed herein may be used to determine if licensed software has been previously installed or used on a device by monitoring an identifier associated with the device on which the licensed software is to be installed or used. Prior to operation of licensed software, a client device requires authorization from a license server. The license server may retrieve a unique identifying device fingerprint from the client device to authorize installation of the software based on a probabilistic comparison of the identifier with stored device identifiers subject to a license. If the comparison yields a match and if total instances of retrieval of the retrieved device fingerprint does not exceed licensed rights, the authorization is granted.12-30-2010
20130198866APPLICATION LICENSING USING SYNC PROVIDERS - A method, system, and computer-readable storage media for licensing an application using sync providers are provided herein. The method includes receiving a request for a license for an application from a client sync provider at a licensing service and receiving information relating to the license from a commerce partner offering the application via a commerce partner sync provider. The method also includes returning the license for the application to a client computing device, receiving information relating to a state of the license from the client sync provider, and adjusting conditions of the license according to the state of the license.08-01-2013
20130198867A Docking Station for Portable Devices Providing Authorized Power Transfer and Facility Access - A docking station for docking portable electronic devices is disclosed. The docking station is configured to mechanically accept and operatively interface with the portable electronic device for non-contact charging and data transfer. The docking station can provide security features for providing and/or restricting access to computational facilities such as printers, databases, installed programs, etc. Such security features can include installing applications on such portable devices that limit access.08-01-2013
20120311726DOWNLOAD METHOD OF MEDIA CONTENTS - Disclosed is a download method of media contents, wherein an electronic book terminal is registered with a contents server to be provided with a DRM (Digital Right Message)code, and the electronic book terminal is allowed to view the media contents downloaded from the contents server by decoding the media contents using the DRM code, and where the media contents downloaded from the contents server are prevented in advance from being illegally copied and used. Furthermore, the periodically published media contents are set up for periodic subscription to allow a convenient downloading.12-06-2012
20120311725MODERATION OF SHARED DATA OBJECTS - Methods, system, and computer storage media are provided for moderating actions performed on shared data objects. Rule enforcement logic is received for an application that is associated with one or more data objects shared between various clients. The rule enforcement logic is stored at a data server that also stores data associated with data objects. A moderator, also stored on the data server, is used to enforce the rule enforcement logic corresponding to the application when a client attempts to perform an action to a data object associated with the application.12-06-2012
20110078801UTILITY COMPUTING WITH PREVIEW AND PAY FEATURE - A remote computing service is provided that allows a user to preview results of processing at a remote computing device on a client device before committing to pay for and download result data. The remote computing device derives a series of preview data sets from the result data processed at the remote computing devices. The client device receives the preview data sets and presents output to a user for inspection, evaluation or examination of various aspects of the result data. By allowing the user to inspect, evaluate or examine the result data based on the series of preview data sets, there are fewer occasions where the user needs to download the result data that may have a large size to the client device. Further, the series of preview data sets is structured so that the result data cannot be reconstructed by harvesting the series of preview data sets. Hence, the user cannot take advantage of the preview data to reconstruct the result data without paying for the result data.03-31-2011
20110138484Embedded content requests in a rights locker system for digital content access control - Access to digital content may be controlled by determining a digital content specification and associated authenticated rights locker access request, sending the authenticated rights locker access request and the digital content specification, and receiving a new authenticated rights locker access request and a Web page with clickable links in response to the sending, where at least one of the clickable links is associated with an authenticated digital content request. When an indication of a user selection of one of the clickable links is received, an authenticated digital content request associated with the user-selected clickable link is sent to a digital content repository. The digital content is received in response to the sending of the authenticated digital content request.06-09-2011
20110138483MOBILE PHONE AND IP ADDRESS CORRELATION SERVICE - A system, method and program product for controlling access to a restricted item. A method is provided that includes: receiving a request for access to a restricted item at a computer system associated with a provider, said request originating from a client system; determining an IP address of the client system; determining a mobile phone number of a mobile phone associated with the requester; transmitting to a third party service provider the IP address and mobile phone number; and receiving back from the third party service provider a confirmation message indicating whether or not the IP address and mobile phone are located within an acceptable range of each other.06-09-2011
20110258708METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR CACHING OF CONTENT FROM SERVER - Disclosed are a method, an apparatus and a computer program product. The method includes receiving a server feed from a server for accessing a content stored in the server. The method further includes determining a Unique Identifier (ID) of at least one hierarchical level of the content by parsing the server feed. Further, the method includes comparing the determined UniqueID of the at least hierarchical level of the content to a stored UniqueID of the at least one hierarchical level. Thereafter, the method facilitates for accessing the content based on the comparison of the determined UniqueID to the stored UniqueID.10-20-2011
20100031373METHOD AND SYSTEM FOR SECURE FLEXIBLE SOFTWARE LICENSING - When executing a licensing management application, data indicative of licensing privileges of a software application for simultaneous execution on a subset of a plurality of computers are received from a licensor of the software application. The data indicative of licensing privileges comprise data indicative of a licensing key. For each of a plurality of users a peripheral licensing device is provided and the data indicative of a licensing key are then stored in memory thereof. Data indicative of a total number of users—equal to a number of the subset—are determined and provided to the licensor, or storage of the licensing key is prevented, when the total number is greater than a predetermined number of the subset. After execution of the licensing management application and provision of each of the users with a respective peripheral licensing device, each of the users is enabled to execute the software application by interfacing the peripheral licensing device with one of the computers, after which the data indicative of a licensing key are retrieved and the software application is executed.02-04-2010
20100017891Method of Controlling a Browser Window - A method of controlling a browser window is disclosed. The method comprises the steps of associating the browser window to a token indicative of a personalized session; and repetitively, verifying said token; and, closing the browser window in dependence of said token. A valid token is generated at startup of the personalized session. The token is invalidated when the user logoffs from the personalized session. Upon detection of an invalid token all browser windows associated with said personalized session will be closed.01-21-2010
20120210448SYSTEM AND METHOD FOR ACCESSING PRIVATE DIGITAL CONTENT - A system, method and computer program product for providing access to private digital content are disclosed. The private digital content is owned by an owner and installed on a content server and access is provided to a first client which is capable of rendering said digital content. Predetermined information required for gaining authorized access to said content server by said first client is generated by a second client. The predetermined information is transferred from said second client to said first client then used by said first client to get access to said private digital content.08-16-2012
20120066773INFORMATION SAFEGUARD TOOL - Embodiments of the present invention relate to methods and apparatuses for safeguarding information by, for example, controlling access to electronic files. Some embodiments of the present invention provide a method that includes embedding a script in an electronic file, where the script comprises commands that when operated on by a processor allow a recipient device to access the electronic file if either a token associated with the recipient device is detected or the recipient device is determined to be an authorized device.03-15-2012
20110167502TIME-BASED DIGITAL CONTENT AUTHORIZATION - Methods and apparatuses for time-based access to digital content are provided. Access to a set of digital content is provided for a predetermined period of time. During the predetermined period of time, a user can access (e.g., download, play) any digital content in the set of digital content. At the end of the predetermined period of time, the user is denied access to the digital content regardless of where the content is stored (e.g., in a digital content library, on a computer system controlled by the user, on a playback device controlled by the user). Simplified access and control of digital content is thereby provided in the form of time-based access.07-07-2011
20120011595PERMISSION BASED TEXT MESSAGING - A system and method for narrowcasting text messages to a plurality of cellular phones. The system and method allow a potential user to opt in to receive the text messages the user wants to receive. The potential user can opt in through a computer network based web page. Once the potential user sends a sign up request application to participate via the computer network, the user will receive a first text message containing an authorization code on their cell phone. The user enters the authorization code into the web page and sends the authorization code. Receipt of the authorization code back through the computer network will trigger the phone number of the potential user to be added to a list of authorized text message receivers. A narrowcaster then instructs the central computer to narrowcast text messages to the phone numbers on the list that have indicated they want to receive messages on a certain topic.01-12-2012
20120060227COMMUNICATION APPARATUS AND COMMUNICATION METHOD - A communication apparatus includes a user signal transmission unit that transmits a user signal required for an end user to perform communication; a manager function implementing unit that implements a function provided to a manager of the present apparatus; a license monitoring unit that monitors a license of the present apparatus, and outputs a function limitation signal when the license has expired; and a function limitation unit that limits the function implemented by the manager function implementing unit when receiving the function limitation signal. In a communication apparatus that transmits a user signal required for an end user to perform communication, a function of the apparatus is limited when a relevant license has expired, while preventing an influence of the limitation upon the end user.03-08-2012
20120023596Electronic License Management - In one aspect, this application describes a method for determining a license status of a software application. The method includes receiving a license status request to obtain an indication of whether a software application is licensed for use on a client computing device. The method also includes identifying identity information that corresponds to user identity information, device identity information, or both. The method also includes sending a communication generated from the license status request and the identity information to a licensing service, the communication being used by the licensing service to generate the indication based at least in part on the identity information and licensing information associated with the software application. The method also includes receiving a license status response from the licensing service that includes the indication. The method also includes sending the license status response to the software application for processing by the software application.01-26-2012
20080209576PREVENTION OF SOFTWARE PIRACY USING UNIQUE INTERNAL INTELLIGENCE WITH EVERY SOFTWARE APPLICATION COPY - Each copy of a software package utilizing this invention would contain unique self knowledge, the method of interpreting the self knowledge being based upon the self knowledge contents itself, using one or more internal characters, strings of characters and tables of one or more characters meant for self-recognition, that are in themselves unique to each and every copy of a software application product that employs this invention, along with dynamically created actuation codes that would work only for the intended unique copy of the said software package.08-28-2008
20120124678ACTIVATING LICENSABLE COMPONENT PROVIDED BY THIRD PARTY TO AUDIO VIDEO DEVICE - An audio-video display device can download from a third party server a licensable component on which a royalty is to be paid. Various methods are disclosed for accounting for royalties associated with downloading the licensable component to the client device between the third party server and a client device manufacturer server.05-17-2012
20110107436APPARATUS AND METHODS FOR DEVICE AUTHORIZATION IN A PREMISES NETWORK - Apparatus and methods for enabling protected premises networking capabilities. In one embodiment, a white list of devices authorized to access a premises network and a black list of device not authorized to access a premises network are utilized. The black and white lists may be stored at a database in communication with an authorization manager or may be stored at the manager itself. When a client device is connected to a premise, the manager determines, based on the premises and/or device identity, whether the device is entitled to access. The authorization manager makes this determination based on whether the device is on the white or black list. If the device is on neither list, the manager may add the device to the white list upon appropriate verification. The manager may also facilitate removal of a device from the white list to the black list upon request or automatically.05-05-2011
20120174237LOCATION AWARE SELF-LOCKING SYSTEM AND METHOD FOR A MOBILE DEVICE - A mobile device includes a protected mode in which the device automatically locks itself after a period of inactivity. In the protected mode, the device can determine whether it is in a trusted location. If the device is not in a trusted location, the device continues in the protected mode. If the device is within a trusted location, the device can alter the protected mode, such as by disabling the protected mode. Alternatively, a parameter associated with the protected mode can be changed. For instance, the period of inactivity before the device automatically self locks can be increased. The trusted location can be defined by a specific network, specific wireless access point, specific geographic coordinates or an express user indication. Such a device can avoid the frustration of repeatedly locking and unlocking the device if the user is located in an environment in which privacy and security concerns are minimized.07-05-2012
20120317659SYSTEM, APPARATUS, AND MEDIA FOR GRANTING ACCESS TO AND UTILIZING CONTENT - Apparatus, system, and media for utilizing content. An exemplary system comprises a first computing device and a second computing device, wherein the first computing device transmits a request for access to content to the second computing device, receives the content from the second computing device, and grants at least one permitted utilization of the content, and wherein the second computing device receives the request for access to content from the first computing device, determines whether the first second computing device is permitted to receive the content, grants access to the content based at least in part on the first computing device being permitted to receive the content, and transmits the content to the first computing device based at least in part on the first computing device being permitted to receive the content.12-13-2012
20120124677COLLECTION USER INTERFACE - Collection user interface techniques are described. In one or more implementations, a plurality of inputs are recognized as gestures received via interaction with a user interface to navigate through a file system of a computing device and select representations of objects managed by file system of the computing device, at least two of which are accessible via different devices. In response, copies of the representations are displayed by the computing device in a collection portion of the user interface. An option is output in conjunction with the collection portion by the computing device that is selectable to initiate a command to be performed using the objects that have corresponding representations included in the collection portion.05-17-2012
20120317657DIGITAL CATALOGUE RAISONNE PLATFORM - A content management system for creating a digital catalogue raisonné includes at least one computer, a public user interface, a private catalogue raisonné manager, and a private user interface. The private catalogue raisonné manager is configured to instruct at least one object-oriented database to store first digital data for at least one artist, the first digital data including at least one of an image of an artwork of the at least one artist and a description of the artwork. The private user interface is configured to receive the first digital data, transmit information permitting a user to provide a command to the content management system to make available, at the public user interface, a public catalogue raisonné including the first digital data, and receive the command to make available the public catalogue raisonné.12-13-2012
20120222135ADVANCED USER INTERFACE AND CONTROL PARADIGM INCLUDING DIGITAL RIGHTS MANAGEMENT FEATURES FOR MULTIPLE SERVICE OPERATOR EXTENDED FUNCTIONALITY OFFERS - Methods and systems for presenting information regarding multiple categories of content are provided. In addition, methods and systems that suggest activities by a user in relation to content and determined affinity for content in relation to user contacts are provided. A user interface application is provided that operates to display status and/or historical information regarding content, suggested activities, and suggested contacts. The user can interact with the interface to access detailed information and to act on suggestions. In addition the user can interact with the interface to share content to other users, including users participating in real time communication sessions.08-30-2012
20120255037LICENSE MANAGEMENT FOR DIGITAL CONTENT - Aspects of the present disclosure relate to managing licenses for playback of digital content. A license management device may create licenses that determine the number of playback devices that can be authorized by the license. Each license may be included in a corresponding digital content. In addition, each license may be distributed to a set of playback devices. Thereafter, a playback device may playback digital content that includes a license when the playback device stores a matching license. A single license can be used to provide authorization to play digital content from multiple sources and/or multiple types of content. Playback devices can store multiple licenses, which allows playback devices to belong to multiple sets of playback devices authorized to playback various digital content. In one embodiment digital content files can contain multiple licenses to allow the content files to be shared by multiple sets of playback devices.10-04-2012
20120317660SYSTEM AND METHOD FOR UTILIZING CONTENT IN ACCORDANCE WITH USAGE RIGHTS - Apparatus, method, and media for utilizing content. An exemplary method comprises storing a description structure comprising one or more usage rights, storing content associated with the one or more usage rights, receiving a request for the content, the request corresponding to a utilization of the content, determining whether the utilization corresponds to at least one of the one or more usage rights, determining whether the computing device is an authorized device, and utilizing the content in accordance with the at least one of the one or more usage rights based at least in part on a determination that the utilization corresponds to the at least one of the one or more usage rights and a determination that the computing device is an authorized device.12-13-2012
20120317658SYSTEM AND METHOD FOR DISTRIBUTING DIGITAL CONTENT TO BE RENDERED IN ACCORDANCE WITH USAGE RIGHTS INFORMATION - Methods, apparatus, and media for distributing digital content to at least one recipient computing device to be rendered by the at least one recipient computing device in accordance with usage rights information. An exemplary method comprises determining, by at least one sending computing device, if the at least one recipient computing device is trusted to receive the digital content from the at least one sending computing device, sending the digital content, by the at least one sending computing device, to the at least one recipient computing device only if the at least one recipient computing device has been determined to be trusted to receive the digital content from the at least one sending computing device, and sending usage rights information indicating how the digital content may be rendered by the at least one recipient computing device, the usage rights information being enforceable by the at least on recipient computing device.12-13-2012
20120131684AUTOMATIC BACKUP LICENSE TO AVOID SERVICE INTERRUPTIONS IN CONTINUOUS SERVICE, HIGH RELIABILITY SYSTEMS - Methods for automatically providing a backup license for a device that relies on a primary license to operate when the primary license for the device fails to satisfy a licensing requirement are provided. A backup license that can become automatically available for use upon noncompliance of a primary license can prevent service interruptions, which are unacceptable for systems that provide continuous service and require high reliability. For example, methods of the disclosure can be used in cable systems and more specifically in cable modem termination systems to prevent an interruption in service.05-24-2012
20120167232Mobile Device for Authenticating A Device Accessory - A mobile device for authenticating a device accessory is disclosed. The mobile device receives a unique identifier from a device accessory, sends the received unique identifier to a server via a communication network, and receives information from the server relating to the unique identifier.06-28-2012
20120167235UNIVERSAL IDENTITY SERVICE AVATAR ECOSYSTEM - A system is configured to receive personal data associated with a user, verify one or more facts from the personal data, and form an avatar based on a first subset of the received personal data, where a second, differing, subset of the received personal data is not associated with the avatar. The system is also configured to receive, from a data requester, a query including a request for the avatar, and send, to the data requester, a message that includes information associated with the avatar and an indication that the one or more facts from the personal data were verified.06-28-2012
20120167234PERSONA-BASED IDENTITY MANAGEMENT SYSTEM - A method, performed by a computer device, may include receiving personal data from a user device associated with personas, where each of the personas corresponds to at least one classification of requesters, associating the received personal data with at least one of the personas, and identifying any of the classifications that correspond to the personas associated with received personal data. The method may further include receiving, from a data requester, a query including a request for the personal data; associating the data requester with a classification; and comparing the classification associated with the data requester to the classifications associated with personal data. The method may further include sending, to the data requester, a message containing the personal data in response to the classification of the data requester corresponding to the classifications of the personal data.06-28-2012
20120216299Server-Side Security Mechanism for Untrusted Clients Using Directory Hiding - A security mechanism provided by a server protects files in data storage from untrusted clients. In one embodiment, the server generates a filename in response to a request from a client for creating a filename. The filename is associated with a file to be stored in the data storage managed by the server. The server manages a directory that contains the filename, and hides the directory contents from the client. The client is granted access to the file when the client provides the filename associated with the file.08-23-2012
20120174238METHOD AND SYSTEM FOR COORDINATING CLIENT AND HOST SECURITY MODULES - A system and methods for coordinating the operation of a client security module and a host security module on a mobile electronic device. The modules communicate with each other through a platform abstraction layer using application programming interfaces to coordinate their activities. In particular, the client security module instructs the host security module when to lock and unlock the device, and the host security module alerts the client security module to attempts by the user to lock or unlock the device.07-05-2012
20100050274CONTENT CONTROL SYSTEM - A content control system capable of controlling delivery destinations of user contents in respective groups, identifying each group through which each content is delivered, and delivering information/advertisements according to the attribution information of the content. In a content control server, group identifying information is set in each user content to be uploaded to or downloaded from a group memory area corresponding to a gateway ID from a terminal through a gateway having a plurality of its subordinate terminals. The information identifies each gateway through which each object content is delivered according to the gateway ID. The control system controls the delivery destination of each content according to the combination of the content delivery route and a table prepared in the content control server.02-25-2010
20120185950METHOD, ACCESS NODE, AND SYSTEM FOR OBTAINING DATA - The present invention discloses a method, an access node, and a system for obtaining data. The method includes: receiving a data obtaining request sent by a client and obtaining an authentication result of multilevel authentication performed on the data obtaining request; when the authentication result of the data obtaining request is successful, obtaining data to be obtained corresponding to the data obtaining request and sending the data to be obtained to the client, or, obtaining information about a content storage node to which the data to be obtained corresponding to the data obtaining request belongs and sending the information about the content storage node to the client. The embodiments of the present invention may ensure security of data obtaining, avoid a single-point failure or bottleneck, and reduce the cost when data is obtained from a data storage platform.07-19-2012
20120227113REMOTE DATA VIEWER - A medical image and data application service provider system provides a way of remotely viewing and manipulating medical images and data for diagnostic and visualization purposes by users unconstrained by geography. Medical images and data are stored on one or more servers running application service provider software along with meta-data such as access control information, origin of information and references to related data. A set of medical data consisting related information is sent as an encrypted stream to a viewing station running client software in a secure execution environment that is logically independent of the viewing station's operating system.09-06-2012
20120227112METHOD AND APPARATUS FOR SECURING MEDIA ASSET DISTRIBUTION FOR A MARKETING PROCESS - A method and apparatus for securing media asset distribution for a marketing process is described. In one embodiment, the method includes generating a dynamic security component for each media asset allocation to at least one receiver, wherein the dynamic security component verifies the at least one receiver upon login, coupling the dynamic security component to at least one file having a media asset and communicating a locator reference associated with the at least one file to the at least one receiver, wherein the locator reference is created using the dynamic security component.09-06-2012
20120260353METHOD AND APPARATUS FOR IDENTIFYING INSTALLED SOFTWARE AND REGULATING ACCESS TO CONTENT - A system and method for controlling use of content in accordance with usage rights associated with the content and determined in accordance with the environment of a user device. A request is received for secure content from a user device and the integrity of the environment of the user device is verified. Appropriate usage rights are retrieved based upon the results of the verification of integrity and the content is rendered on the user device in accordance with the appropriate usage rights.10-11-2012
20120233705SYSTEM AND METHODS FOR IDENTITY ATTRIBUTE VALIDATION - A method of identity attribute validation at a computer server involves the computer server receiving an identity attribute validation request from a communication terminal. The computer server further receives a credential, and is configured with an attribute disclosure profile of attributes authorized for disclosure to the communication terminal. The computer server determines the validity of the credential, and provides the communication terminal with a response to the identity attribute validation request based on an outcome of the credential validity determination. The attribute validation response includes attributes data associated with the credential authorized for disclosure by the attribute disclosure profile but excludes attributes data associated with the credential not authorized for disclosure by the attribute disclosure profile.09-13-2012
20120240244CERTIFICATES TO CREATE PRODUCT MAPPINGS - A server receives a consumer request pertaining to product asset management from a client. The consumer request comprises one or more product-related certificates that associates the client with one or more products. The product-related certificate comprises at least one extended attribute object identifier that has a corresponding product attribute. For each extended attribute object identifier, the server searches a data store to identify a product that corresponds to the extended attribute object identifier and generates a response to the consumer request based on the product that is identified in the data store.09-20-2012
20130174278DIGITAL RIGHTS MANAGEMENT (DRM) SERVICE CONTROL METHOD, APPARATUS, AND SYSTEM - A digital rights management service control method, including: receiving an authorization file request transmitted from a client terminal for a selected service operation; obtaining an authorization file template matching an authorization type included in the authorization file request; generating, based on the obtained authorization file template, an authorization file including digital resource feature information included in the authorization file request and rights feature information; and transmitting the generated authorization file to the client terminal.07-04-2013
20100251388Systems and Methods for Challenge-Response Animation and Randomization Testing - Systems and methods are provided for challenge/response animation. In one implementation, a request for protected content may be received from a client, and the protected content may comprise data. A challenge phrase comprising a plurality of characters may be determined, and a computer processor may divide the challenge phrase into at least two character subsets selected from the characters comprising the challenge phrase. Each of the at least two character subsets may include less than all of the characters comprising the challenge phrase. The at least two character subsets may be sent to the client in response to the request; and an answer to the challenge phrase may be received from the client in response to the at least two character subsets. Access to the protected content may be limited based on whether the answer correctly solves the challenge phrase.09-30-2010
20110277040Methods for electronically communicating with a person where the person's e mail address or cell phone number is unknown - Methods and apparatus are provided to allow a person to obtain the e mail address and or cell phone number of another person. However at least two blocks are provided to assure that a computer cannot obtain the same. A Directory of phone numbers and or e mail address is created by voluntary permission of each registrant. Each registrant is able to add personal and additional blocks to prevent unwanted seekers, even humans, from obtaining any information not permitted by an individual registrant. Accordingly, each registrant is in control of the information obtained by a seeker.11-10-2011
20120331569SYSTEM AND METHOD FOR RENDERING DIGITAL CONTENT IN ACCORDANCE WITH USAGE RIGHTS INFORMATION - Methods, apparatus, and media for rendering digital content by at least one recipient computing device in accordance with usage rights information. An exemplary method comprises receiving the digital content by the at least one recipient computing device from at least one sending computing device only if the at least one recipient computing device has been determined to be trusted to receive the digital content from the at least one sending computing device, receiving, by the at least one recipient computing device, a request to render the digital content, determining, based on the usage rights information, whether the digital content may be rendered by the at least one recipient computing device, and rendering the digital content, by the at least one recipient computing device, only if it is determined that the content may be rendered by the at least one recipient computing device.12-27-2012
20120331570RULE-BASED APPLICATION ACCESS MANAGEMENT - A container that manages access to protected resources using rules to intelligently manage them includes an environment having a set of software and configurations that are to be managed. A rule engine, which executes the rules, may be called reactively when software accesses protected resources. The engine uses a combination of embedded and configurable rules. It may be desirable to assign and manage rules per process, per resource (e.g. file, registry, etc.), and per user. Access rules may be altitude-specific access rules.12-27-2012
20120331568GROUP AUTHORIZATION METHOD AND SOFTWARE - A method for sharing information limited by permission comprising a user providing content to be shared, the user specifying a plurality of individuals or Groups with which to share the content, after the providing and specifying, automatically creating a new Group comprising the specified plurality, and distributing the content to the new Group. Also a method for sharing information limited by permission comprising compiling in an online service a plurality of individual members and Groups, providing content associated with the individuals and Groups, and displaying to a user a combined content view capable of being based on any combination of one or more of: types of Group content; Groups in which the user is a member; combinations of individual members in Groups in which the user is a member; content shared with the user by any of the user's contacts; content from sources external to the online service; access and permissions levels; and user selectable display settings.12-27-2012
20120102575DIGITAL CONTENT DELIVERY SYSTEM AND METHOD - A method and system for securing digital content for transmission to an end user device. In a preferred embodiment, the invention provides for: a control center for controlling access to the digital content by the end user device; transmitting scrambled digital content to the end user device, such that the end user device cannot play back the said scrambled digital content; contacting the control center to request a PECM (personal ECM), the PECM being specific to the end user device; transmitting the PECM to the end user device by the control center; and unscrambling the scrambled digital content by the end user device according to the PECM.04-26-2012
20130014285COMMUNICATION SERVICE SYSTEM - A communication service system includes a SNS server 01-10-2013
20130019322CONTENT RECEIVER, LICENSE SERVER, CONTENT UTILIZATION SYSTEM, AND CONTENT VIEWING TIME LIMIT MANAGEMENT METHOD - A license receiver comprises a viewing license invalidating unit which invalidates a viewing license of a content a viewing time limit of which is not determined, and a first control unit. When the first control unit reproduces the content, (i) if the viewing license is valid, the first control unit determines the viewing time limit, and (ii) if the viewing license is invalid, the first control unit transmits a viewing license request including a request of determining viewing time limit, to the license server, and receives the determined viewing time from the license server. When the first control unit writes out the content to an exchangeable medium before reproducing the content, if the viewing license is valid, the first control unit invalidates the viewing license and writes out the non-determined viewing time limit to the exchangeable medium.01-17-2013
20130019321MULTI-MODE HANDHELD WIRELESS DEVICE - Various embodiments of the invention relate to a multi-function handheld user device that may have multiple selectable modes of operation. Various mechanisms may be provided for switching between modes. Within each mode, context awareness and situational awareness may be used to obtain additional information or perform additional functions not directly requested by the user.01-17-2013
20130024950SYSTEMS AND METHODS FOR CHALLENGE-RESPONSE ANIMATION AND RANDOMIZATION TESTING - Systems and methods are provided for challenge/response animation. In one implementation, a request for protected content may be received from a client, and the protected content may comprise data. A challenge phrase comprising a plurality of characters may be determined, and a computer processor may divide the challenge phrase into at least two character subsets selected from the characters comprising the challenge phrase. Each of the at least two character subsets may include less than all of the characters comprising the challenge phrase. The at least two character subsets may be sent to the client in response to the request; and an answer to the challenge phrase may be received from the client in response to the at least two character subsets. Access to the protected content may be limited based on whether the answer correctly solves the challenge phrase.01-24-2013
20080235811Method for Device Dependent Access Control for Device Independent Web Content - A method, an apparatus, and computer instructions are provided for device-dependent access control for device independent web content. In an illustrative embodiment, a module may be implemented in a computer program detects a client device and security level from a request for a resource by a client device. The module loads, from a data source or configuration file, a three-dimensional device dependent access control matrix, which includes a user role axis, a device axis, and a resource axis. Based on the security level of the device indicated by the device matrix, the module grants or denies access to the resource by the user device. The security levels may include security protocols implemented by different devices, encryption schemes implemented by different devices, and security patches applied by the same device.09-25-2008
20130174279Secure Read-Write Storage Device - A method and system for securing a read write storage (RWS) device, the method comprising, providing the RWS device, the RWS device comprising a controller comprising a processor and a bit bucket storing data, and employing the controller to corrupt at least a portion of the data.07-04-2013
20130179991SYSTEMS AND METHODS FOR ENFORCING SECURITY IN MOBILE COMPUTING - Methods and systems described herein relate to enhancing security on a device by configuring one or more software functions in a trusted zone of a processor using object firewalls, IPC mechanisms, and/or a policy engine.07-11-2013
20120255036PROPRIETARY ACCESS CONTROL ALGORITHMS IN CONTENT DELIVERY NETWORKS - Mechanisms are provided to allow application of proprietary access control algorithms during requests for resources obtained using a content delivery network (CDN). Requests to a CDN are augmented with a content provider specific token. The content provider can maintain strict control over access to restricted content at the time of request with a proprietary authorization algorithm and maintains real-time usage information for restricted content.10-04-2012
20130104248Distributing Licensed Content Across Multiple Devices - Distributing licensed content across multiple devices, including: identifying, by a mobile device, licensed content being presented by a local presentation device; determining, by the mobile device, whether the mobile device is eligible to receive the licensed content; requesting, by the mobile device, a license for the licensed content being presented by the local presentation device; receiving, by the mobile device, the license for the licensed content being presented by the local presentation device; receiving, by the mobile device, licensed content for mobile device presentation; and presenting, by the mobile device, the licensed content for mobile device presentation.04-25-2013
20130104247Verification Of Content Possession By An Announcing Peer In A Peer-To-Peer Content Distribution System - A tracker node verifies content possession by a peer node in a peer-to-peer content distribution system. Upon receiving an announcement that a peer node claims to possess a content item, the tracker node in one embodiment obtains the content item, selects a random portion of the content item; formulates a challenge based on the random portion of the content item and determines an expected challenge response. The challenge may comprise, for example, a request for a hash of the random portion (or alternatively, a hash of the random portion and a random seed value). The tracker node issues the challenge to the announcing node and verifies the announcing node's possession of the content item if the challenge response from the announcing node matches the expected challenge response.04-25-2013
20130152217MACHINE-TO-MACHINE APPARATUS CAPABLE OF FACILITATING ADDITION OF EXTENSION FUNCTIONALITIES - Disclosed is a Machine-To-Machine (M2M) apparatus capable of facilitating addition of extension functionalities. The apparatus includes an input/output unit configured to connect with an external peripheral, a wireless communication unit configured to connect with the external peripheral or a control center (server), a storage unit configured to store details about the exchange of data between the input/output unit and the wireless communication unit, programs of one or more inherent functionalities and scripts of one or more extension functionalities, Application Programming Interfaces (APIs) and libraries configured to be provided to obtain a command code of each of the extension functionalities from the script of the extension functionality, control means configured to verify a right to use to determine whether to execute the command code, and an interpreter configured to provide an environment in which command codes of the APIs and libraries are sequentially executed, and to add the extension functionality.06-13-2013
20130152218COMPUTER-READABLE MEDIUM RECORDED WITH INFORMATION PROCESSING PROGRAM, INFORMATION PROCESSING APPARATUS, INFORMATION PROCESSING SYSTEM, AND INFORMATION PROCESSING METHOD - An example information processing program that causes a computer of an information processing apparatus 06-13-2013
20120284806EMBEDDED CONTENT REQUESTS IN A RIGHTS LOCKER SYSTEM FOR DIGITAL CONTENT ACCESS CONTROL - Access to digital content may be controlled by determining a digital content specification and associated authenticated rights locker access request, sending the authenticated rights locker access request and the digital content specification, and receiving a new authenticated rights locker access request and a Web page with clickable links in response to the sending, where at least one of the clickable links is associated with an authenticated digital content request. When an indication of a user selection of one of the clickable links is received, an authenticated digital content request associated with the user-selected clickable link is sent to a digital content repository. The digital content is received in response to the sending of the authenticated digital content request.11-08-2012
20120284805SYSTEM FOR ELIMINATING UNAUTHORIZED ELECTRONIC MAIL - A system for eliminating unauthorized email sent to a user on a network employs an email-receiving server connected between the network and the user's email client for receiving email addressed to the user and rejecting those in which the sender address does not match any of sender addresses maintained on an “authorized senders” list (ASL list). The ASL lists are maintained by an ASL manager in an ASL database operable with a spam processor module. A redirector module rejects the email if, upon sending a request for validation to the spam processor module, the sender's address does not match any authorized sender address on the ASL list. Email rejected by the redirector module is redirected to a web-based messaging (WBM) module which sends a message to the sender to confirm that the sender is a legitimate sender of email to the intended recipient.11-08-2012
20120284804SYSTEM AND METHOD FOR PROTECTING DIGITAL CONTENTS WITH DIGITAL RIGHTS MANAGEMENT (DRM) - An approach for protecting digital contents includes a content delivery phase wherein a client stores digital contents or retrieves them in streaming, transmits to a user device the digital content in a protected format along with an enabling code for enabling the user device to access or read the protected digital content. The approach includes a key generation phase in a DRM (Digital Right Management) server which derives at least one key for encrypting the digital contents. A key transmission phase involves the derived key being transmitted from the DRM server to the client. For decrypting the digital content, the user device requests the key from the DRM server, with the request including a key identification defined by the enabling code transmitted by the client to the user device which is used by the DRM server to derive the key for the user device.11-08-2012
20130160144ENTITY VERIFICATION VIA THIRD-PARTY - Among other things, one or more techniques and/or systems are provided for verifying an identity of an entity via a third-party authentication system. As an example, an entity may be logged into a website and may have certain access permissions given the manner within which the entity was logged into the website. The entity may attempt to access, via the website, protected data owned by the website and/or owned by a third-party (e.g., social networking website). If the access permissions presently associated with the entity do not allow the entity to access the protected data, a request may be made to the third-party authentication system (e.g., operated by the social networking website) to verify the identity of the entity before increasing the access permissions to grant the entity access to the protected data.06-20-2013
20130160145SYSTEM AND METHOD FOR ASSET LEASE MANAGEMENT - Disclosed herein are systems, methods, and non-transitory computer-readable storage media for asset lease management. The system receives, from a client device associated with a user profile, a lease start request for an asset for which the user profile is authorized. The system identifies a number of available slots for progressively downloading content. If the number of available slots is greater than zero, the system assigns an available slot from the number of available slots to the client device to yield an assigned slot. The system transmits security information, a lease key, and a lease duration associated with the assigned slot to the client device in response to the lease start request, wherein the security information and lease key allow the client device to start a progressive download of the asset for the lease duration. At the end of the lease, the system terminates the lease and releases the assigned slot.06-20-2013
20130185811SUSTAINED DATA PROTECTION - Among other things, one or more techniques and/or systems are provided for sustained data protection. In particular, a data protector may define a set of access levels associated with content within data using a set of access policies (e.g., a partial access level to inventory data for an inventory server, a full access level to inventory data and billing data for a shopping website server, etc.). The data protector may secure (e.g., encrypt) the data to create protected data, so that clients may be unable to access content of the protected data without obtaining access through the data protector. In this way, the data protector may selectively provide clients with access to content within the protected data according to respective access levels for the different clients (e.g., access to inventory data, but not billing data, may be provided to the inventory server by the data protector).07-18-2013
20130185814TECHNIQUES FOR PRESENTING AND COLLECTING END USER LICENSE AGREEMENT ACCEPTANCE - Techniques are disclosed for presenting and collecting end user license agreement acceptance for software applications or firmware components executed on a computing appliance. A sentry component allows only certain commands to be executed before the relevant end user license agreements are accepted, e.g., commands to configure a network interface and web server on the appliance executed on a shell over a serial interface. Once configured the web server is used to provide a rich interface for presenting end user license agreements and obtaining acceptance thereof. Once the user accepts the terms of the relevant license agreements, then the appliance is made active and all configuration commands become operational, including commands needed to configure the device and start services which would otherwise be prohibited by the sentry component prior to license acceptance.07-18-2013
20130185813ACTIVATION OF DEVICE HAVING LIMITED USER INTERFACE - An electronic device performing device activation includes: a wireless communication module operated in an access point (AP) mode to perform communication with a mobile terminal or operated in a client mode to perform communication with a server; an input unit configured to receive a signal requesting conversion of a mode of the wireless communication module; and a controller configured to convert a mode of the wireless communication module and generate device identification information, wherein when a mode conversion request signal is received by the input unit, the controller converts the wireless communication module to the AP mode, and when user authentication information is received from the mobile terminal, the controller converts the wireless communication module into the client mode and transmits an activation request for requesting performing a registration to a device management server based on the user authentication information and the device identification information.07-18-2013
20130185810CONTROLLED SERIALIZATION AND/OR DESERIALIZATION - Among other things, one or more techniques and/or systems are provided for controlling the serialization of data into a serialized structure and/or the deserialization of data from the serialized structure. That is, a first client may request serialization of data comprising one or more entities. Entities that the first client has permission to serialize may be serialized for inclusion within a serialized structure, which may be encrypted. A set of deserialization permissions specifying which entities may be accessed by which clients may be defined for the serialized structure. In this way, one or more entities within the serialized structure may be deserialized for a second client based upon evaluating the second client against the set of deserialization permissions to determine which entities the second client has permission to access. The serialized structure may otherwise remain encrypted to provide sustained protection of serialized data comprised therein.07-18-2013
20110314561Server implemented method and system for securing data - A server implemented method for securing data is provided. The method includes generating a context container for storing data objects transferred to the server during a session with a client, creating, from the data objects in the context container, a plurality of protected zones of data objects, wherein each protected zone includes data objects of a different class of security and creating a reference for each protected zone. Further, the method includes providing the client access to that protected zone via the reference, wherein the reference is non-persistently stored in the server.12-22-2011
20130198868METHODS AND APPARATUS FACILITATING ACCESS TO STORAGE AMONG MULTIPLE COMPUTERS - Multiple computers in a cluster maintain respective sets of identifiers of neighbor computers in the cluster for each of multiple named resource. A combination of the respective sets of identifiers define a respective tree formed by the respective sets of identifiers for a respective named resource in the set of named resources. Upon origination and detection of a request at a given computer in the cluster, a given computer forwards the request from the given computer over a network to successive computers in the hierarchical tree leading to the computers relevant in handling the request based on use of identifiers of neighbor computers. Thus, a combination of identifiers of neighbor computers identify potential paths to related computers in the tree.08-01-2013
20120297492SYSTEM AND METHOD OF INTEGRATING MODULES FOR EXECUTION ON A COMPUTING DEVICE AND CONTROLLING DURING RUNTIME AN ABILITY OF A FIRST MODULE TO ACCESS A SERVICE PROVIDED BY A SECOND MODULE - A system for integrating modules of computer code may include a sandbox validator for receiving a first module and verifying that the first module complies with one or more sandbox constraints. A computing device may execute the first module within a runtime environment. A module integrator may operate within the runtime environment for receiving a request from the first module to access a service provided by a second module and only allowing the first module to access the service when the first module is authorized to access the service according to a service authorization table. The sandbox validator may ensure the first module correctly identifies itself when requesting a service provide by another module and that the first module includes runtime policing functions for non-deterministic operations. A service authorizer may generate an authorization policy for the first module, which is sent to the computing device along with the first module.11-22-2012
20120042394System and method for alerting on open file-share sessions associated with a device - A method and system for detecting an active file-share session on a monitored device associated with a client device, alerting the user of the client device, and enabling them to terminate the file-share session, are disclosed. In accordance with the disclosed method and system, when a remote device (e.g., on a network, the internet, etc.) connects to a shared file or folder on a monitored device (e.g., a personal computer, network area storage, a game console, a storage area network, a smart telephone, etc.) the user of the client device receives an immediate, automatic alert with the specifics of the file-sharing session and data affected. The user is then presented with an option of whether to OK the file-sharing session (i.e. allow data access to proceed), or to disconnect the file-share session (i.e. cause the remote user to lose access to the monitored device's shared data).02-16-2012
20130205411METHOD FOR PROTECTING DATA CONTENT - A method is provided for protecting data content against illegal copying. The data content is provided by an entertainment system and is output to output units in an authorized playback environment for playing back the data content. The method includes transmitting the data content in the authorized playback environment from the entertainment system to an output unit, and adding an interference signal to the data content such that, during playback of the data content outside the authorized playback environment a disruption is induced.08-08-2013
20130205412ON BOARD VEHICLE MEDIA CONTROLLER - The present disclosure describes a microprocessor executable media controller on board a vehicle operable (a) to determine a first spatial location of an external communication device, the external communication device being in wireless communication with the on board media controller and the first spatial location being associated with a first set of restrictions, the first set of restrictions being at least one of a control on connectivity access by the external communication device, a restriction on the connectivity access, and a restriction on one or more functions of the external communication device and (b), in response, to apply the first set of restrictions.08-08-2013
20130212709System and Method for Securing Virtual Computing Environments - A computer implemented method includes introducing unpredictable temporal disruptions to the operating states of an authorized process and an unauthorized process. The authorized process is migrated to a virtual machine to avoid the unpredictable temporal disruptions while the unauthorized process is subject to the unpredictable temporal disruptions and thereby experiences an unstable environment that induces operating faults.08-15-2013
20130212707Document control system - Systems and techniques to provide a document control system. In general, in one implementation, the technique includes: receiving, at a permissions-broker server, a request from a client to take an action with respect to an electronic document, identifying, at the permissions-broker server and in response to the request, first document-permissions information associated with the electronic document, the first document-permissions information being in a first permissions-definition format, translating, at the permissions-broker server, the identified first document-permissions information into second document-permissions information in a second permissions-definition format, and sending the second document-permissions information to the client to govern the action with respect to the electronic document at the client. The first permissions-definition format can include at least one type of permission information that cannot be fully defined in the second permissions-definition format, and translating the first information into the second information can involve translating based upon additional information associated with the request.08-15-2013
20130212708SYSTEM AND METHODS THEREOF FOR DETECTION OF CONTENT SERVERS, CACHING POPULAR CONTENT THEREIN, AND PROVIDING SUPPORT FOR PROPER AUTHENTICATION - An apparatus and methods thereof provide for efficient usage of network bandwidth and ability to identify whether a client is authorized to receive such bandwidth. Content provided by a content source for a first content consumer is stored in the apparatus located in between the content source and the content consumer allowing delivery of such content to another content consumer from the apparatus thereby reducing the overall network load. For protected content, the apparatus identifies the need for authorization and provides a random identification to the target content consumer and storing that random identification as well as at least another parameter associated thereto such that when revalidation is necessary the content consumer can be validated by the apparatus.08-15-2013

Patent applications in class By authorizing client