Patent application number | Description | Published |
20080263651 | Integrating operating systems with content offered by web based entities - Example embodiments are provided for integrating operating systems with content offered by internet based entities. | 10-23-2008 |
20080301784 | Native Use Of Web Service Protocols And Claims In Server Authentication - Architecture for natively authenticating a client application to a web server via HTTP authentication. The Web Services Architecture, and more specifically, Web Services Security, is leveraged to enable legacy applications to access web services transparently to the existing legacy applications. A security support provider (SSP) is created that employs WS-* protocol to at least emulate ws-trust and ws-mex thereby enabling policy exchange via an HTTP protocol stack. Policy can be exchanged via a WWW-Authenticate header enabling legacy applications to use the WS-* family of protocols without modifying the client application. The WS-* protocols are abstracted into a generic programming interface for native client application use. | 12-04-2008 |
20080320554 | SECURE DATA STORAGE AND RETRIEVAL INCORPORATING HUMAN PARTICIPATION - A computer related security mechanism requires that a human participate in an access verification sequence. Upon a request to access secure data, a puzzle is provided to the requester. Proper solution of the puzzle requires human participation. The puzzle is chosen such that its solution is within the capabilities of a human, but beyond the current state of the art for computer systems. The puzzled can be visually and/or audibly rendered to the user. In one configuration, the puzzle is obtained via a library of pluggable puzzle generators. Puzzle generators in the library can be replaced as the state of the art of computing technology improves. | 12-25-2008 |
20090327094 | PLATFORM INDEPENDENT ECOSYSTEM FOR CREATION, CONSUMPTION AND TRADE OF USER-GENERATED DIGITAL CONTENT - A platform (e.g. game console) and application (e.g. game title) independent ecosystem for the creation, consumption and trade of user generated digital content permits any application operating on any platform to participate in a market driven economy for user generated digital objects (UGDOs). The trading system is independent of (i.e. external to) all participating applications. A metadata attribution method for UGDOs in combination with heterogeneous application support through well-defined interfaces facilitates unlimited participation. Attributed metadata may be understood and consumed across platforms and applications. Flexible UGDO rights enforcement techniques in combination with a flexible fair exchange service for those rights support all manner of UGDOs and commercial transactions therefore. Participating application may provide rights enforcement in some instances. The nature of enforcement may rest on the nature of UGDO content, rights in UGDOs or author preferences. The trading system assures that all transactions in the UGDO economy are secure, fault tolerant and atomic, providing integrity and confidence in the UGDO economy. | 12-31-2009 |
20100029371 | Personal Game Services Commerce System (PGSCS) - A Personal Game Services Commerce System is disclosed. The system allows a user to contract with another user to perform service within a virtual environment. The services may include operating in a virtual environment on behalf of another user, operating as a team member, or operating as an opponent in competition. Memory state may be copied and used by the service-providing user. The user requesting the service may confirm that the service has been satisfactorily rendered before making the copied memory state permanent and/or before paying for the service. Users may select service-providing users based on any available criteria. Funds to pay for the service may be frozen while the service is being performed and until the recipient of the service confirms successful performance of the service. | 02-04-2010 |
20100151822 | Security Protocols for Mobile Operator Networks - Security protocols for mobile operator networks are described. In embodiments, mobile communication link is established between a mobile phone and a media content provider via a communication service provider with which the mobile phone is registered for mobile communications, and via at least one roaming node network with which the communication service provider has a roaming service agreement. The media content provider receives a security policy request from the mobile phone to establish a security policy for end-to-end security of the mobile communication link between the media content provider and the mobile phone for data communication security. The media content provider then communicates a security policy response to the mobile phone to establish the security policy for the end-to-end security of the mobile communication link that is adaptable to security restrictions of the roaming node network. | 06-17-2010 |
20100153227 | MOBILE PHONE BILLING FOR CONTENT PAYMENT - Mobile phone billing for content payment is described. In embodiments, a media content provider receives a billing identifier that is associated with a mobile phone. The billing identifier is received from a communication service provider that authenticates the mobile phone for communications, and a network communication link is established between the mobile phone and the media content provider via the communication service provider. The media content provider receives a request from the mobile phone to purchase and download a media asset. The media content provider determines the billing identifier that is associated with the mobile phone for the purchase of the media asset, and communicates a charge for the media asset to the communication service provider that then bills a user associated with the mobile phone. The user that is associated with the mobile phone is billed for the media asset in a mobile phone service bill. | 06-17-2010 |
20120036075 | DETERMINING MOBILE ACCOUNT TO APPLY MARKETPLACE CHARGES - Identifying a mobile operator account associated with a user to apply charges incurred by the user at a mobile marketplace service. The mobile operator provides an account identifier for the account to a billing token service associated with the mobile marketplace service. The billing token service creates a billing token including the account identifier, and provides the billing token to the user. When subsequently ordering from the mobile marketplace service, the user sends order requests with the billing token to the mobile marketplace service. The mobile marketplace service extracts the account identifier from the billing token and provides the order requests and the extracted account identifier to a mobile operator billing service. The mobile operator billing service applies a charge to the mobile operator account identified by the account identifier. Based on a charge status from the mobile operator billing service (e.g., a successful or unsuccessful charge), the mobile marketplace service allows or denies access by the user to an item identified in the order request. | 02-09-2012 |
20120167061 | IDENTIFYING FACTORABLE CODE - Various embodiments are disclosed that relate to the automated identification of one or more computer program functions for potentially placing on a remote computing device in a split-computational computing environment. For example, one disclosed embodiment provides, on a computing device, a method of determining a factorable portion of code to locate remotely from other portions of the code of a program to hinder unauthorized use and/or distribution of the program. The method includes, on a computing device, receiving an input of a representation of the code of the program, performing analysis on the representation of the code, the analysis comprising one or more of static analysis and dynamic analysis, and based upon the analysis of the code, outputting a list of one or more functions determined from the analysis to be candidates for locating remotely. | 06-28-2012 |
20120191803 | DECOMMISSIONING FACTORED CODE - Various embodiments are disclosed that relate to decommissioning factored code of a program on a computing device. For example, one disclosed embodiment provides a method of operating a computing device. The method includes executing a program on the computing device, and while executing the program, identifying a remote location of a factored function via a code map, sending a call to the factored function and receiving a return response. The method further comprises, upon occurrence of a decommissioning event, receiving a copy of the factored function; and updating the code map with a location of the copy of the factored function. | 07-26-2012 |
20120192209 | FACTORING MIDDLEWARE FOR ANTI-PIRACY - Embodiments are disclosed that relate to hindering unauthorized use or distribution of a middleware program contained within an application. One example embodiment provides a method for hindering unauthorized use or distribution of a middleware program contained within an application. The method comprises acquiring factored middleware code, the factored middleware code having a missing function residing on a remote computing device, and building an application around the factored middleware code such that the application is configured to call to the remote computing device for execution of the missing function during use. The application may be configured to send a call to the remote computing device for execution of the missing function during use. | 07-26-2012 |
20140059653 | INTEGRATING OPERATING SYSTEMS WITH CONTENT OFFERED BY WEB BASED ENTITIES - Example embodiments are provided for integrating operating systems with content offered by internet based entities. | 02-27-2014 |