Security features in on-line and off-line delivery of applications
First Claim
1. A method for determining whether a client is attempting to copy an application or use the application without authorization, the method comprising:
- creating data for at least one prediction log file for the application;
based on said at least one prediction log file, determining prediction knowledge for the application, wherein said prediction knowledge is stored in a prediction file;
forwarding said prediction file to the client executing the application; and
using said prediction file to determine whether the client is attempting to copy the application or use the application without authorization.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and system for determining whether a client is attempting to copy an application or use the application without authorization. First, data for at least one prediction log file for the application is created. Then, based on the at least one prediction log file, prediction knowledge is determined for the application, where the prediction knowledge is stored in a prediction file. The prediction file is then forwarded to the client executing the application. It is then determined by using the predication file whether the client is attempting to copy the application or use the application without authorization. If the client is attempting to copy the application or use the application without authorization, then the client'"'"'s access to the application is terminated. In an offline mode, usage information is bound to user saved data such that modification of usage information renders user saved data unusable. This prevents unauthorized access to an offline delivered application.
-
Citations
10 Claims
-
1. A method for determining whether a client is attempting to copy an application or use the application without authorization, the method comprising:
-
creating data for at least one prediction log file for the application;
based on said at least one prediction log file, determining prediction knowledge for the application, wherein said prediction knowledge is stored in a prediction file;
forwarding said prediction file to the client executing the application; and
using said prediction file to determine whether the client is attempting to copy the application or use the application without authorization. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for determining whether a client is attempting to copy an application or use the application without authorization, the method comprising:
-
means for creating data for at least one prediction log file for the application;
based on said at least one prediction log file, means for determining prediction knowledge for the application, wherein said prediction knowledge is stored in a prediction file;
means for forwarding said prediction file to the client executing the application; and
means for using said prediction file to determine whether the client is attempting to copy the application or use the application without authorization. - View Dependent Claims (7, 8, 9, 10)
-
Specification