SYSTEMS AND METHODS FOR PROVIDING SOFTWARE RENTAL SERVICES TO DEVICES CONNECTED TO A NETWORK
First Claim
1. A method for providing a rental service for a software application via a network, comprising:
- installing a first application in a device;
downloading the software application to the device via the network, the software application including a decryption key embedded therein;
causing the first application to send a request for a key via the network;
causing the first application to receive the key via the network, the received key being encrypted with an encryption that forms an asymmetric key pair with the decryption key; and
activating, by use of the key, the software application for a rental period.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and computer readable media for providing a rental service for a software application via a network. The user of a device downloads a rental agent application via the network and installs a rental agent application in the device. The user also downloads a software application via the network and installs the software application in the device, where the software application includes a decryption key embedded therein. The user causes the rental agent application to send to a rental system a request for a key to activate the software application via the network. The rental system sends the key to the rental agent via the network, where the key is encrypted with an encryption key that forms an asymmetric key pair with the decryption key. Then, the rental agent relays the key to the software application to thereby activate the software application for a rental period.
24 Citations
28 Claims
-
1. A method for providing a rental service for a software application via a network, comprising:
-
installing a first application in a device; downloading the software application to the device via the network, the software application including a decryption key embedded therein; causing the first application to send a request for a key via the network; causing the first application to receive the key via the network, the received key being encrypted with an encryption that forms an asymmetric key pair with the decryption key; and activating, by use of the key, the software application for a rental period. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for providing a rental service for a software application in a device via a network, wherein the software application includes a decryption key embedded therein, the method comprising:
-
receiving a request for a key from the device via the network, wherein the key is adapted to run the software application; validating the request; generating the key and encrypting the key with an encryption key that forms an asymmetric key pair with the decryption key; and sending the encrypted key to the device via the network to thereby run the software application. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A computer readable medium carrying one or more sequences of pattern data for providing a rental service for a software application via a network, wherein execution of one or more sequences of pattern data by one or more processors causes the one or more processors to perform the steps of:
-
installing a first application in a device; downloading the software application to the device via the network, the software application including a decryption key embedded therein; causing the first application to send a request for a key via the network; causing the first application to receive the key via the network, the received key being encrypted with an encryption that forms an asymmetric key pair with the decryption key; and activating, by use of the key, the software application for a rental period. - View Dependent Claims (25, 26)
-
-
27. A computer readable medium carrying one or more sequences of pattern data for providing a rental service for a software application via a network, wherein the software application includes a decryption key embedded therein and wherein execution of one or more sequences of pattern data by one or more processors causes the one or more processors to perform the steps of:
-
receiving a request for a key from the device via the network, wherein the key is adapted to activate the software application for a rental period; validating the request; generating the key and encrypting the key with an encryption key that forms an asymmetric key pair with the decryption key; and sending the encrypted key to the device via the network to thereby activate the software application. - View Dependent Claims (28)
-
Specification