Application digital rights management (DRM) and portability using a mobile device for authentication
First Claim
1. A computer system having a processor and a memory, the computer system operable to execute a method for operating a computing device and a mobile device to access one or more computer software with a secure access, comprising:
- communicating between the computing device and the mobile device over a connection, wherein the connection is selected from a group including a USB connection, an Ethernet connection, a serial port connection, a parallel port connection, and a wireless connection, and wherein the wireless connection is selected from a group including Bluetooth, infrared, WiFi, and WiMax;
accessing for an authentication a set of information on the mobile device from the computing device;
authenticating, with authentication information on the mobile device, a user at the computing device by validating at least a digital rights management (DRM) access for the user to execute a computer software installed on the mobile device; and
operating from the computing device the computer software executed on the mobile device.
6 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and medium are provided for operating a computing device and a mobile device to access computer software with a secure access and to access a packet network, and for operating a computer software on a mobile device with different computing devices. A mobile device is used to authenticate a user'"'"'s access to computer software. The computer software may reside on the mobile device, the user'"'"'s computing device, or another computing device. A unique identifier is stored in the mobile device associated with the computer software to enable the authentication.
57 Citations
25 Claims
-
1. A computer system having a processor and a memory, the computer system operable to execute a method for operating a computing device and a mobile device to access one or more computer software with a secure access, comprising:
-
communicating between the computing device and the mobile device over a connection, wherein the connection is selected from a group including a USB connection, an Ethernet connection, a serial port connection, a parallel port connection, and a wireless connection, and wherein the wireless connection is selected from a group including Bluetooth, infrared, WiFi, and WiMax; accessing for an authentication a set of information on the mobile device from the computing device; authenticating, with authentication information on the mobile device, a user at the computing device by validating at least a digital rights management (DRM) access for the user to execute a computer software installed on the mobile device; and operating from the computing device the computer software executed on the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer system having a processor and a memory, the computer system operable to execute a method for operating a computing device and a mobile device to access one or more computer software with a secure access and to access a packet network, comprising:
-
communicating between the computing device and the mobile device over a connection, wherein the connection is selected from a group including a USB connection, an Ethernet connection, a serial port connection, a parallel port connection, and a wireless connection, and wherein the wireless connection is selected from a group including Bluetooth, infrared, WiFi, and WiMax; accessing a set of information on the mobile device from the computing device for an authentication; authenticating, with authentication information on the mobile device, a user at the computing device by validating at least a digital rights management (DRM) access for the user to execute a computer software located on the mobile device; operating from the computing device the computer software executed on the mobile device; and accessing from the computing device the packet network through the mobile device. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. One or more non-transitory computer-readable media containing thereon computer-readable code executed by a mobile device for causing the mobile device to perform a method for authenticating a user at a computing device, the method comprising:
-
receiving at the mobile device one or more notifications that the user at the computing device is attempting to execute a computer software program installed on the mobile device via the computing device; receiving at the mobile device a set of data associated with the computer software program; performing, at the mobile device, an authorization for the user at the computing device by validating at least a digital rights management (DRM) access for the user to access the computer software program located on the mobile device from one or more information stored on at least one of the mobile device and another computing device; and providing one or more other information based on the authorization provided by the mobile device to the computing device to allow the access to the computer software program to allow operation of the computer software program on the computing device via execution of the computer software program on the mobile device. - View Dependent Claims (19, 20, 21)
-
-
22. A computer system having a processor and a memory, the computer system operable to execute a method for operating a first computer software program located on a mobile device with different computing devices, comprising:
-
installing the first computer software program onto the mobile device; providing a unique identifier to associate with the mobile device, wherein the unique identifier is stored with the first computer software program or stored in the mobile device; configuring the first computer software program to execute from the mobile device with the unique identifier by validating at least a digital rights management (DRM) access for the first computer program; and connecting the mobile device to a first computing device, wherein the first computing device operates the first computer software program executed on the mobile device. - View Dependent Claims (23, 24, 25)
-
Specification