System and method for rendering a set of program instructions as executable or non-executable
First Claim
1. At a user device comprising a data storage device containing a first set of computer-readable program instructions and a second set of computer-readable program instructions, a method comprising:
- the user device receiving a first access-token that includes an expiration indicator;
after receiving the first access-token, the user device executing the first set of program instructions to determine that the expiration indicator is not expired and to responsively render the second set of program instructions as executable; and
thereafter, the user device executing the first set of program instructions to determine that the expiration indicator is expired and to responsively render the second set of program instructions as non-executable.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for rendering a set of computer-readable program instructions on a user device as executable or non-executable. The user device or an intermediary device may transmit an access-token request including a device identifier to a server device. The server device determines whether the device identifier matches a registered device identifier, and if so, transmits an access-token to the user device, or to the intermediary device, which in turn transmits the access-token to the user device. The access-token includes an expiration indicator. Preferably, the expiration indicator is not expired when received by the user device, but expires some time after being received by the user device. The user device executes a first set of program instruction to determine whether the expiration indicator is expired, and if so, renders a second set of program instructions as non-executable, otherwise the second set of program instructions are rendered as executable.
109 Citations
30 Claims
-
1. At a user device comprising a data storage device containing a first set of computer-readable program instructions and a second set of computer-readable program instructions, a method comprising:
-
the user device receiving a first access-token that includes an expiration indicator; after receiving the first access-token, the user device executing the first set of program instructions to determine that the expiration indicator is not expired and to responsively render the second set of program instructions as executable; and thereafter, the user device executing the first set of program instructions to determine that the expiration indicator is expired and to responsively render the second set of program instructions as non-executable. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A user device comprising:
-
a communications interface operable to receive an access-token that includes an expiration indicator; a data storage device that contains a first set of computer-readable program instructions and a second set of computer-readable program instructions; and a processor that is operable to execute the first set of program instructions and the second set of program instructions, wherein the first set of program instructions includes program instructions that cause the processor to (i) determine whether the expiration indicator is expired, (ii) render the second set of program instructions as executable if the processor determines that the expiration indicator is not expired, and (iii) render the second set of program instructions as non-executable if the processor determines that the expiration indicator is expired. - View Dependent Claims (10, 11, 12)
-
-
13. At a server device comprising a data storage device, a method comprising:
-
at the data storage device, maintaining at least one registered device identifier; the server device receiving a first access-token request including a first device identifier that identifies a first remote device; the server device determining that the first device identifier matches a registered device identifier being maintained at the data storage device; after the server device determines that the first device identifier matches a registered device identifier being maintained at the data storage device, the server device generating an access-token including an expiration indicator, and thereafter transmitting the generated access-token to a communications network for transmission, in turn, to the first remote device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A server device comprising:
-
a processor; a data storage device that contains computer-readable program instructions and at least one registered device identifier; and a communications interface that is operable to receive a first access-token request including a first device identifier, wherein the first device identifier identifies a first remote device, and wherein the computer-readable program instructions comprise program instructions that are executable by the processor to (i) determine that the first device identifier matches a registered device identifier contained at the data storage device, and responsively generate a first access-token that includes an expiration indicator, and (ii) cause the communications interface to transmit the first access-token to a communications network for transmission, in turn, to the first remote device. - View Dependent Claims (24, 25, 26)
-
-
27. At an intermediary device that interfaces to a user device and to a server device, a method comprising:
-
the intermediary device obtaining a device identifier that identifies the user device; the intermediary device transmitting to the server device an access-token request including (i) the device identifier that identifies the user device, and (ii) a device identifier that identifies the intermediary device; the intermediary device receiving from the server device an access-token including an expiration indicator; and the intermediary device transmitting the access-token including the expiration indicator to the user device, wherein the user device uses the expiration indicator to determine whether a set of computer-readable program instructions maintained at the user device should be rendered as executable or as non-executable. - View Dependent Claims (28, 29)
-
-
30. An intermediary device comprising:
-
a communications interface that interfaces to a user device and to a server device; a processor; and a data storage device that contains a first device identifier and computer-readable program instructions that are executable by the processor, wherein the first device identifier identifies the intermediary device, wherein the computer-readable program instructions include instructions that (i) cause the processor to determine a second device identifier that identifies the user device, (ii) cause the communications interface to transmit to the server device the first device identifier, the second device identifier, and an access-token request, and (iii) cause the communications interface to transmit to the user device an access-token that is received by the communications interface after the communications interface transmits to the server device the access-token request, wherein the received access-token includes an expiration indicator, and wherein the user device uses the expiration indicator to determine whether a set of computer-readable program instructions maintained at the user device should be rendered as executable or as non-executable.
-
Specification