Software application protection by way of a digital rights management (DRM) system
First Claim
1. A method in combination with a digital rights management (DRM) system, an application, and a DRM digital license for the application, all on a computing device, the application for being executed to perform a function and including code requiring that the DRM system determine that the application is allowed to be executed to perform the function based on the license, the method comprising:
- triggering the code;
requesting, by the code, that the DRM system prove validity thereof by proffering a document;
receiving, by the code, the proffered document and reviewing same;
judging, by the code, based on the proffered document, whether the DRM system is to be trusted as valid and able to enforce the license;
requesting, by the code, that the DRM system determine whether the license allows the application to execute to perform the function, the DRM system thereafter reviewing any terms in the license to determine whether such terms permit such execution of the application;
executing the application only if the DRM system is judged to be trusted and only if the DRM system determines that the license in fact allows the application to execute to perform the function.
2 Assignments
0 Petitions
Accused Products
Abstract
A digital rights management (DRM) system, an application, and a DRM digital license for the application are all on a computing device. The application is for being executed to perform a function and includes code requiring that the DRM system determine that the application is allowed to be executed to perform the function based on the license. The application further includes code for determining that the application is to be executed on one of the computing device or in connection with the DRM system.
181 Citations
25 Claims
-
1. A method in combination with a digital rights management (DRM) system, an application, and a DRM digital license for the application, all on a computing device, the application for being executed to perform a function and including code requiring that the DRM system determine that the application is allowed to be executed to perform the function based on the license, the method comprising:
-
triggering the code;
requesting, by the code, that the DRM system prove validity thereof by proffering a document;
receiving, by the code, the proffered document and reviewing same;
judging, by the code, based on the proffered document, whether the DRM system is to be trusted as valid and able to enforce the license;
requesting, by the code, that the DRM system determine whether the license allows the application to execute to perform the function, the DRM system thereafter reviewing any terms in the license to determine whether such terms permit such execution of the application;
executing the application only if the DRM system is judged to be trusted and only if the DRM system determines that the license in fact allows the application to execute to perform the function. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-readable medium having stored thereon an application including computer-executable instructions for performing a method in combination with a digital rights management (DRM) system on a computing device, and a DRM digital license for the application, the application for being executed to perform a function and the computer-executable instructions thereof requiring that the DRM system determine that the application is allowed to be executed to perform the function based on the license, the method comprising:
-
requesting that the DRM system prove validity thereof by proffering a document;
receiving the proffered document and reviewing same;
judging based on the proffered document whether the DRM system is to be trusted as valid and able to enforce the license; and
requesting that the DRM system determine whether the license allows the application to execute to perform the function, the DRM system thereafter reviewing any terms in the license to determine whether such terms permit such execution of the application, wherein the application is executed only if the DRM system is judged to be trusted and only if the DRM system determines that the license in fact allows the application to execute to perform the function. - View Dependent Claims (11, 12, 13, 14, 15)
-
- 16. A computing device having thereon a digital rights management (DRM) system, an application, and a DRM digital license for the application, the application for being executed to perform a function and including first code requiring that the DRM system determine that the application is allowed to be executed to perform the function based on the license, the application further including second code for determining that the application is to be executed on one of the computing device or in connection with the DRM system.
- 18. An application for being executed on a computing device to perform a function, the computing device having thereon a digital rights management (DRM) system, and a DRM digital license for the application, the application including first code requiring that the DRM system determine that the application is allowed to be executed to perform the function based on the license, the application further including second code for determining that the application is to be executed on one of the computing device or in connection with the DRM system.
-
20. A method in combination with a digital rights management (DRM) system, an application, and a DRM digital license for the application, all on a computing device, the application for being executed to perform a function and including code requiring that the DRM system determine that the application is allowed to be executed to perform the function based on the license, the method comprising:
-
triggering the code;
performing, by the code, a review of the DRM system to establish validity thereof;
judging, by the code, based on the review, whether the DRM system is to be trusted as valid and able to enforce the license;
requesting, by the code, that the DRM system determine whether the license allows the application to execute to perform the function, the DRM system thereafter reviewing any terms in the license to determine whether such terms permit such execution of the application;
executing the application only if the DRM system is judged to be trusted and only if the DRM system determines that the license in fact allows the application to execute to perform the function. - View Dependent Claims (21, 22)
-
-
23. A computer-readable medium having stored thereon computer-executable instructions for performing a method in combination with a digital rights management (DRM) system, an application, and a DRM digital license for the application, all on a computing device, the application for being executed to perform a function and including code requiring that the DRM system determine that the application is allowed to be executed to perform the function based on the license, the method comprising:
-
triggering the code;
performing, by the code, a review of the DRM system to establish validity thereof;
judging, by the code, based on the review, whether the DRM system is to be trusted as valid and able to enforce the license;
requesting, by the code, that the DRM system determine whether the license allows the application to execute to perform the function, the DRM system thereafter reviewing any terms in the license to determine whether such terms permit such execution of the application;
executing the application only if the DRM system is judged to be trusted and only if the DRM system determines that the license in fact allows the application to execute to perform the function. - View Dependent Claims (24, 25)
-
Specification