Method and system for single reactivation of software product licenses
First Claim
1. A method for reactivation of software products, the method comprising:
- requesting activation of a first software product, wherein the first software product hosts a reactivation policy group;
associating a first hardware identifier with the first software product;
requesting activation of a second software product, wherein the second software product has a binding list;
associating the second software product with the first hardware identifier if the binding list of the second software product indicates a compatibility with the first software product, wherein associating the second software product with the first hardware identifier comprises a binding list indicating compatibility with at least one of the reactivation policy group and the first software product;
requesting a reactivation event of the first software product;
ascribing the reactivation event of the first software product to the second software product, thereby avoiding a request for reactivation event of the second software product;
wherein compatibility with the reactivation policy group is indicated by comparison of a current hardware identifier with the first hardware identifier against a hardware change tolerance associated with the reactivation policy group.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for reactivation of software products includes activating a first software product associated with a reactivation policy group. A hardware identifier derived from the computer hardware configuration is bound with the first software product activation. A second software product is activated having an associated reactivation binding list. Reactivation is requested for the first software product and an updated hardware identifier is associated with a reactivation policy group of the first software product. The second software product may be spared the request for reactivation if the second product can be associated with the reactivation of the first software product given the binding list is compatible with the reactivation policy group.
-
Citations
22 Claims
-
1. A method for reactivation of software products, the method comprising:
-
requesting activation of a first software product, wherein the first software product hosts a reactivation policy group; associating a first hardware identifier with the first software product; requesting activation of a second software product, wherein the second software product has a binding list; associating the second software product with the first hardware identifier if the binding list of the second software product indicates a compatibility with the first software product, wherein associating the second software product with the first hardware identifier comprises a binding list indicating compatibility with at least one of the reactivation policy group and the first software product; requesting a reactivation event of the first software product; ascribing the reactivation event of the first software product to the second software product, thereby avoiding a request for reactivation event of the second software product; wherein compatibility with the reactivation policy group is indicated by comparison of a current hardware identifier with the first hardware identifier against a hardware change tolerance associated with the reactivation policy group. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for reactivation of software products, the method comprising:
-
requesting activation of a first software product, wherein the first software product hosts a reactivation policy group; associating a first hardware identifier with the first software product; requesting activation of a second software product, wherein the second software product has a binding list; associating the second software product with the first hardware identifier if the binding list of the second software product indicates a compatibility with the first software product; requesting a reactivation event of the first software product; ascribing the reactivation event of the first software product to the second software product, thereby avoiding a request for reactivation event of the second software product; wherein requesting activation of the first software product further comprises hosting the reactivation policy group comprising a hardware change tolerance which triggers a reactivation event if the hardware change tolerance is exceeded and the first software product is accessed. - View Dependent Claims (7, 8)
-
-
9. A method for reactivation of software products, the method comprising:
-
requesting activation of a first software product, wherein the first software product hosts a reactivation policy group; associating a first hardware identifier with the first software product; requesting activation of a second software product, wherein the second software product has a binding list; associating the second software product with the first hardware identifier if the binding list of the second software product indicates a compatibility with the first software product; accessing the first software application; comparing a current hardware identifier against the first hardware identifier to produce a hardware difference indication; requesting a reactivation data transaction if the hardware difference indication is greater than a hardware change tolerance associated with the reactivation policy group; and ascribing the reactivation event of the first software product to the second software product, thereby avoiding a request for reactivation event of the second software product.
-
-
10. A method to reactivate multiple software applications, the method comprising:
-
requesting an activation of a first application and associating a first hardware identifier with a reactivation policy group, the first application owning the reactivation policy group; requesting an activation of at least one additional application and associating the at least one additional application with the first hardware identifier if the at least one additional application is compatible with the reactivation policy group, wherein associating the at least one additional application with the first hardware identifier further comprises using a reactivation binding list to associate the at least one additional application with the first application if a current hardware configuration identifier is within a tolerance of the first hardware identifier wherein the tolerance is associated with the reactivation policy group; requesting a reactivation of any one of the applications; and determining that the reactivation of remaining applications is unnecessary if the remaining applications are associated with the reactivation policy group. - View Dependent Claims (11)
-
-
12. A system comprising:
a processor having access to memory, the memory having instructions which, when executed, perform the method comprising; comparing a current hardware identifier against a first hardware identifier when a first software application is accessed, the first hardware identifier associated with a reactivation policy group upon activation of the first software application; requesting a reactivation of the first application if the current hardware identifier exceeds a threshold of difference from the first hardware identifier; associating the current hardware identifier with the reactivation policy group; determining that the reactivation of at least one other software application is unnecessary if the at least one other software application is bound with the reactivation policy group via a bonding list of the at least one other software application, the bonding list associating the at least one other software application with a first software application if a comparison of a current hardware identifier with the first hardware identifier is within a hardware change tolerance associated with the reactivation policy group. - View Dependent Claims (13, 14, 15)
-
16. A computer-readable medium having computer-executable instructions for performing a method, the method comprising:
-
requesting activation of a first software product, wherein the first software product hosts a reactivation policy group comprising a hardware change tolerance which triggers a reactivation event if the hardware change tolerance is exceeded and the first software product is accessed; associating a first hardware identifier with the first software product; requesting activation of a second software product, wherein the second software product has a binding list; associating the second software product with the first hardware identifier if the binding list of the second software product indicates a compatibility with the first software product; requesting a reactivation event of the first software product; ascribing the reactivation event of the first software product to the second software product, thereby avoiding a request for reactivation event of the second software product. - View Dependent Claims (17, 18, 19)
-
-
20. A computer-readable medium having computer-executable instructions for performing a method, the method comprising:
-
requesting activation of a first software product, wherein the first software product hosts a reactivation policy group; associating a first hardware identifier with the first software product; requesting activation of a second software product, wherein the second software product has a binding list; associating the second software product with the first hardware identifier if the binding list of the second software product indicates a compatibility with the first software product; accessing the first software application; comparing a current hardware identifier against the first hardware identifier to produce a hardware difference indication; requesting a reactivation data transaction if the hardware difference indication is greater than a hardware change tolerance associated with the reactivation policy group; and ascribing the reactivation event of the first software product to the second software product, thereby avoiding a request for reactivation event of the second software product.
-
-
21. A computer-readable medium having computer-executable instructions for performing a method, the method comprising:
-
requesting an activation of a first application and associating a first hardware identifier with a reactivation policy group, the first application owning the reactivation policy group; requesting an activation of at least one additional application and associating the at least one additional application with the first hardware identifier if the at least one additional application is compatible with the reactivation policy group, and using a reactivation binding list to associate the at least one additional application with the first application if a current hardware configuration identifier is within a tolerance of the first hardware identifier wherein the tolerance is associated with the reactivation policy group; requesting a reactivation of any one of the applications; and determining that the reactivation of remaining applications is unnecessary if the remaining applications are associated with the reactivation policy group. - View Dependent Claims (22)
-
Specification