DATA LOCKER MANAGEMENT
First Claim
Patent Images
1. A non-transitory computer-readable medium embodying a program executable in a computing device, the program comprising:
- code that maintains a plurality of entitlement lockers for a plurality of users in a remote network storage device, each entitlement locker corresponding to a respective user;
code that receives identification of a current user;
code that receives a request from a local computing device of the current user to emulate a mobile game on the local computing device;
code that emulates the mobile game in response to verifying that the mobile game is included in an entitlement locker of the current user; and
wherein the mobile game is emulated as being executed on a virtual mobile computing device, wherein a model of the virtual mobile computing device matches a model of an actual mobile computing device registered to the current user.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments enabling users to identify themselves to a computing device and then be provided access to the entitlement locker of applications and/or data to which the user is entitled.
30 Citations
20 Claims
-
1. A non-transitory computer-readable medium embodying a program executable in a computing device, the program comprising:
-
code that maintains a plurality of entitlement lockers for a plurality of users in a remote network storage device, each entitlement locker corresponding to a respective user; code that receives identification of a current user; code that receives a request from a local computing device of the current user to emulate a mobile game on the local computing device; code that emulates the mobile game in response to verifying that the mobile game is included in an entitlement locker of the current user; and wherein the mobile game is emulated as being executed on a virtual mobile computing device, wherein a model of the virtual mobile computing device matches a model of an actual mobile computing device registered to the current user. - View Dependent Claims (2, 3)
-
-
4. A system, comprising:
-
at least one computing device; and a locker management application executable in the at least one computing device, the locker management application comprising; logic that maintains a plurality of entitlement lockers for a plurality of users in a remote network storage device, each entitlement locker corresponding to a respective user; logic that receives identification of a current user; logic that receives a request to emulate an application on the at least one computing device; logic that emulates the application in response to verifying that the application is included in the entitlement locker of the current user; and logic that denies a request to emulate the application in response to verifying that the application is not included in the entitlement locker of the current user. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11)
-
-
12. A method, comprising the steps of:
-
receiving, by a computing device, identification of a current user of the computing device; receiving, by the computing device, a request to launch an application on the computing device; and launching, by the computing device, the application in response to verifying that the application is included in an entitlement locker of the current user, wherein a plurality of entitlement lockers for a plurality of users, including the current user, is maintained in a remote network storage device, each entitlement locker corresponding to a respective user. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20)
-
Specification