Dynamic selection of authorization processes
First Claim
Patent Images
1. A method for licensing applications, the method comprising:
- identifying conditions associated with an initiation of an application;
selecting, based on the conditions, a preferred authorization process from at least a key-based authorization process and a keyless authorization process with which to authorize the application; and
attempting to authorize the application using the preferred authorization process;
wherein the conditions comprise a roaming status of the application and an installation status of the key-based authorization process, wherein the keyless authorization process is selected as the preferred authorization process when the roaming status is roaming, and wherein the keyless authorization process is selected as the preferred authorization process when the installation status is incomplete.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and software are disclosed herein for licensing applications using a preferred authorization process dynamically identified based on conditions associated with an initiation of an application. Authorization is then attempted using the preferred authorization process. In some examples, the preferred authorization process is selected from at least a keyless authorization process and a key-based authorization process.
14 Citations
16 Claims
-
1. A method for licensing applications, the method comprising:
-
identifying conditions associated with an initiation of an application;
selecting, based on the conditions, a preferred authorization process from at least a key-based authorization process and a keyless authorization process with which to authorize the application; andattempting to authorize the application using the preferred authorization process; wherein the conditions comprise a roaming status of the application and an installation status of the key-based authorization process, wherein the keyless authorization process is selected as the preferred authorization process when the roaming status is roaming, and wherein the keyless authorization process is selected as the preferred authorization process when the installation status is incomplete. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. One or more non-transitory computer readable media having stored thereon program instructions for licensing applications that, when executed by a processing system, direct the processing system to:
-
identify conditions associated with an initiation of an application; select, based on the conditions, a preferred authorization process from a plurality of authorization processes of at least a key-based authorization process and a keyless authorization process with which to authorize the application; and initiate an attempt to authorize the application using the preferred authorization process; wherein the conditions comprise a roaming status of the application and an installation status of the key-based authorization process, wherein the keyless authorization process is selected as the preferred authorization process when the roaming status is roaming, and wherein the keyless authorization process is selected as the preferred authorization process when the installation status is incomplete. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. One or more non-transitory computer readable media having stored thereon program instructions for licensing applications that, when executed by a processing system, direct the processing system to:
-
identify an environment within which an application is initiated; when the environment is a roaming environment, initiate a roaming attempt to authorize the application based on an identity of a user associated with the application; when the environment is not the roaming environment, initiate a key-based attempt to authorize the application based on a key associated with the application when a key-based process that performs the key attempt is available; and when the key-based process is not available, initiate a keyless attempt to authorize the application based on the identity of the user associated with the application; wherein the environment is the roaming environment when the application is streamed from an application server and the environment is not the roaming environment when the application is not streamed from an application server during installation of the application; wherein the application includes a key-based authorization process that performs the key-based attempt to authorize the application, and wherein the keyless attempt to authorize the application occurs prior to installation of the key-based authorization process. - View Dependent Claims (15, 16)
-
Specification