Controlling an application provided on a portable object
First Claim
1. A method of controlling the use of an application capable of being run on a portable object (SC), comprising:
- a requesting step (REQ), in which a licence request is sent to a licensing remote server (LRS);
a sending step (SEN), in which the licensing remote server (LRS) sends a token (TK) to the portable object (SC);
a validating step (VAL2), in which the token (TK) is checked so as to determine whether the token is valid or not; and
if the token (TK) is not valid, in an application-aborting step (ABO2), the running of the application is aborted.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of controlling the use of an application. The application is capable of being executed on a portable object (SC. The method is characterized in that the method comprises the following steps:—a requesting step (REQ), in which a licence request is sent to a licensing remote server LRS;—a sending step (SEN), in which the licensing remote server (LRS) sends a token TK to the portable object (SC);—a validating step (VAL2), in which the token (TK) is checked so as to determine whether the token is valid or not; and—if the token (TK) is not valid, in an application-aborting step (ABO2), the execution of the application is aborted.
-
Citations
4 Claims
-
1. A method of controlling the use of an application capable of being run on a portable object (SC), comprising:
-
a requesting step (REQ), in which a licence request is sent to a licensing remote server (LRS);
a sending step (SEN), in which the licensing remote server (LRS) sends a token (TK) to the portable object (SC);
a validating step (VAL2), in which the token (TK) is checked so as to determine whether the token is valid or not; and
if the token (TK) is not valid, in an application-aborting step (ABO2), the running of the application is aborted. - View Dependent Claims (2, 3, 4)
-
Specification