MONETIZING PRODUCT FEATURES AS PART OF ENFORCING LICENSE TERMS
First Claim
1. A method comprising:
- receiving a command input associated with an action;
using a mapping database to determine if the action is associated with a defined feature;
identifying any validation rules associated with the defined feature;
identifying one or more capabilities associated with a target of the action;
determining if a validation rule applies to the target; and
sending a communication to a command executor when the one or more capabilities of the target violate the validation rule.
2 Assignments
0 Petitions
Accused Products
Abstract
Control access features include the use of a number of validation rules and capabilities of a target as part of proving license control and revenue generating functionalities, but the embodiments are not so limited. An exemplary role-based computing architecture includes the use of feature to command mappings and one or more validation rules to determine if a target of a command has a proper set of capabilities as part of allowing the command to execute. A computing method of one embodiment operates to provide a validation mechanism that performs a validation evaluation as part of a scope check to ensure that a target command is within the command issuer'"'"'s scope along with a validation rule check for a particular service feature.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving a command input associated with an action; using a mapping database to determine if the action is associated with a defined feature; identifying any validation rules associated with the defined feature; identifying one or more capabilities associated with a target of the action; determining if a validation rule applies to the target; and sending a communication to a command executor when the one or more capabilities of the target violate the validation rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system comprising:
-
an access control runtime component; a feature mapping component including one or more feature to command mappings; a validation component including validation rules associated with features of an online service; and a capability identifier to identify capabilities associated with a target object, wherein the access control runtime component uses identified capabilities as part of sending error messages when one or more validation rules are violated. - View Dependent Claims (15, 16, 17)
-
-
18. A computer-readable medium, having instructions which, when executed, control access by:
-
identifying a service feature associated with an action; using a scope set and one or more validation rules to control use of the service feature; identifying a set of capabilities associated with at least one target of the action; and sending a message if the at least one target has a set of restricted capabilities associated with the one or more validation rules and the service feature. - View Dependent Claims (19, 20)
-
Specification