Abstract:
A software computing based environment (10) for providing secured authentication of media (12) downloaded from a network or loaded from a media player includes two peer-mode operating virtual machines (22, 24). The low-level virtual machine (22) provides decoding and decryption functions whereas the high-level virtual machine (24) provides application level functions such as user interface, input/output.
Abstract:
A software computing based environment for providing secured authentication of media downloaded from a network or loaded from a media player includes two peer-mode operating virtual machines. The low-level virtual machine provides decoding and decryption functions whereas the high-level virtual machine provides application level functions such as user interface, input/output.
Abstract:
A system and method for delegating administration tasks (ABC) comprising determining at least one capability (C) for a first user (1) based on evaluation of at least one role rule and delegating the at least one capability to a second user (3).
Abstract:
An Extensible Markup Language (XML) document adapted to describe a portlet that is implemented in JavaServer Page (JSP) (410) and can manage its own graphical user application within the portal graphical user application (402). The adapted XML comprising a name element including a name tag, a description element including a description tag and a content resource element including a content tag.
Abstract:
Methods and apparatus to enable owners and vendors of software to protect intellectual property and to charge per-use. The system produces a unique tag for every instance of software. Each user device runs a supervising program that ensures, by use of the tag, that no software instance will be used infringing on the software owner's rights. When installing or using a software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. A user device's supervising program periodically calls up, or is called up by a guardian center. The guardian center detects unauthorized use of software by comparison of current call-up data with records of past call-ups. The guardian center completes the call-up by enabling or disabling continued use of the monitored software instances.
Abstract:
A limited-use browser and related security system control access to content stored on a server computer linked to a network. The security system secures the content on the server and only permits it to be downloaded to a client computer running the limited-user browser or a general purpose browser executing an add-in security module providing the same functions as the limited-use browser. The limited-use browser or module secures the downloaded content on the client computer and displays it in a "view-only" mode. While the secured content is being displayed, menu selections, key combination, or pointing device commands initiated on the client computer that would modify the content or create a copy on another medium are either disabled as a default or monitored to determine if the action is permitted.