Abstract:
Methods, apparatus, systems, and computer program products are provided for wirelessly synchronizing datasets that are stored on a wireless device and at a network device, such as a network server or database. Present aspects provide for a simplified and efficient synchronization process, whereby synchronization can be completed in a single round-trip of wireless communication between the wireless device and the network device. Single round-trip synchronization provides for less use of network resources, shorter overall synchronization cycle times and lessens the likelihood of wireless network failures, such as call drops or the like, causing the synchronization process to fail. Additionally, simplification and efficiency are further realized by creating a synchronization process that allows the network dataset to be independent of the wireless device datasets, i.e., the network server does not require a full change history nor is the network server required to know the wireless device dataset version.
Abstract:
Described are techniques and mechanisms for enforcing trust between an application and a library loaded by the application. Very generally stated, the application declares one or more trusted code groups ("TCGs") of which a library must be a member to be authorized for execution with the application. Libraries that are authorized to assert membership in one or more TCGs include a secure indicator of that membership. As the application executes and at-tempts to load a library, that libraries membership in a TCG authorized by the application is verified prior to loading the library.
Abstract:
Described are techniques and mechanisms for enforcing trust between an application and a library loaded by the application. Very generally stated, the application declares one or more trusted code groups ("TCGs") of which a library must be a member to be authorized for execution with the application. Libraries that are authorized to assert membership in one or more TCGs include a secure indicator of that membership. As the application executes and at-tempts to load a library, that libraries membership in a TCG authorized by the application is verified prior to loading the library.
Abstract:
An apparatus and method of managing a licensable item includes accessing a licensing policy related to managing a licensable item, and a license agent making a determination to act to enforce the licensing policy or to first communicate with a server before acting to enforce the licensing policy. Further, the apparatus and method include enforcing the licensing policy in accordance with the determination to act to enforce the licensing policy or to first communicate with a server before acting.
Abstract:
Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect a method comprises establishing a first validity range for a first key, establishing a first validity range for at least a second key, and determining if the validity range of the first key overlaps the first validity range of the at least a second key. A certificate is signed with the first validity range of the first key and the first validity range of the at least a second key if the validity ranges overlap. According to another embodiment, signage of the certificate is refused if the first validity range of the first key does not overlap with the first validity range of the at least a second key.
Abstract:
Embodiments describe a system and/or method for multiple party digital signatures. According to a first aspect a method comprises establishing a first validity range for a first key, establishing a first validity range for at least a second key, and determining if the validity range of the first key overlaps the first validity range of the at least a second key. A certificate is signed with the first validity range of the first key and the first validity range of the at least a second key if the validity ranges overlap. According to another embodiment, signage of the certificate is refused if the first validity range of the first key does not overlap with the first validity range of the at least a second key.
Abstract:
A methodology and apparatus for layered licensing is described. A licensable item is detected on a device. A legacy license associated with the licensable item is accessed, wherein the legacy license corresponds to a legacy licensing policy. A layered license associated with the licensable item is accessed, wherein the layered license corresponds to a layered licensing policy. The legacy licensing policy and the layered licensing policy are integrated into an integrated license, and the integrated license is enforced.
Abstract:
Methods, apparatus, systems, and computer program products1 are provided for wirelessly synchronizing datasets that are stored on a wireless device and at a network device, such as a network server or database. Present aspects provide for a simplified and efficient synchronization process, whereby synchronization can be completed in a single round-trip of wireless communication between the wireless device and the network device. Single round-trip synchronization provides for less use of network resources, shorter overall synchronization cycle times and lessens the likelihood of wireless network failures, such as call drops or the like, causing the synchronization process to fail. Additionally, simplification and efficiency are further realized by creating a synchronization process that allows the network dataset to be independent of the wireless device datasets, i.e., the network server does not require a full change history nor is the network server required to know the wireless device dataset version. The synchronization may be applied to network-based gaming applications.