METHODS FOR CONTROLLING SOFTWARE USAGE
First Claim
1. A computer implemented method for controlling software usage, the method comprising:
- receiving a request for at least one software application license by a computing apparatus comprising at least one processor and a readably coupled memory, wherein the request comprises a user count;
generating, by the computing apparatus, one or more sets of license data in response to the request, wherein a set of license data comprises at least one of the user count and a corresponding sequence number;
signing each of the one or more sets of license data digitally with a private key;
embedding a set of signed license data into the software application;
receiving user identification data from a user through an input interface associated with the computing apparatus; and
validating the user identification data.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods for controlling software usage are described. Methods comprise receiving a request for at least one software application license, wherein the request comprises a user count, generating, by the computing apparatus, one or more sets of license data in response to the request, wherein a set of license data comprises at least one of the user count and a corresponding sequence number, signing each of the one or more sets of license data digitally with a private key, embedding a set of signed license data into the software application, receiving user identification data from a user through an input interface associated with the computing apparatus, and validating the user identification data. Additional embodiments incorporate mechanisms for license renewal, user registration and user authentication by means of associating a range of user identification data with the license data.
-
Citations
18 Claims
-
1. A computer implemented method for controlling software usage, the method comprising:
-
receiving a request for at least one software application license by a computing apparatus comprising at least one processor and a readably coupled memory, wherein the request comprises a user count; generating, by the computing apparatus, one or more sets of license data in response to the request, wherein a set of license data comprises at least one of the user count and a corresponding sequence number; signing each of the one or more sets of license data digitally with a private key; embedding a set of signed license data into the software application; receiving user identification data from a user through an input interface associated with the computing apparatus; and validating the user identification data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer readable storage medium having stored thereon computer executable instructions for performing a method for controlling software usage, the method comprising:
-
receiving a request for at least one software application license by a computing apparatus comprising at least one processor and a readably coupled memory, wherein the request comprises a user count; generating, by the computing apparatus, one or more sets of license data in response to the request, wherein a set of license data comprises at least one of the user count and a corresponding sequence number; signing each of the one or more sets of license data digitally with a private key; embedding a set of signed license data into the software application; receiving user identification data from a user through an input interface associated with the computing apparatus; and validating the user identification data. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification