Licensing verification for application use
First Claim
1. A method performed by a computing device, the method comprising:
- managing use-protected applications by distinguishing between signed use-protected applications and unsigned use-protected applications, wherein use-protected applications that are signed are permitted to be used based on being signed, and wherein use of use-protected applications that are not signed requires a license from a licensing authority;
responsive to a determination that the license has expired or is going to expire, identifying use-protected applications on the computing device that are not signed, and forming a plurality of identifiers of the respective use-protected applications identified as not being signed;
transmitting a license renewal request from the computing device via a network to a licensing authority, the license renewal request comprising the plurality of identifiers; and
according to whether or not a renewed digital license is received responsive to the license renewal request, either prohibiting or permitting use of the identified use-protected applications on the computing device, wherein whether a renewed digital license is to be provided by the licensing authority depends on the identifiers of the unsigned use-protected applications received by the licensing authority.
2 Assignments
0 Petitions
Accused Products
Abstract
Techniques involving detection of misuse of digital licenses pertaining to application use. An identification of unsigned applications or other use-protected applications enabled for use at a user device is obtained. The identification of such applications is directed to a licensing authority to seek digital license renewal for using the applications. A renewed digital license is received if the provided identification of use-protected applications corresponds to what is authorized by the licensing authority for use at the user device. In other embodiments, verification information may be provided to protect the identification of unsigned applications from tampering, such as information indicative of whether the identification of unsigned applications originated at the user device in which the use-protected applications are used, and indicative of whether the identification of the unsigned applications is a copy of a previous identification of the unsigned applications.
-
Citations
11 Claims
-
1. A method performed by a computing device, the method comprising:
-
managing use-protected applications by distinguishing between signed use-protected applications and unsigned use-protected applications, wherein use-protected applications that are signed are permitted to be used based on being signed, and wherein use of use-protected applications that are not signed requires a license from a licensing authority; responsive to a determination that the license has expired or is going to expire, identifying use-protected applications on the computing device that are not signed, and forming a plurality of identifiers of the respective use-protected applications identified as not being signed; transmitting a license renewal request from the computing device via a network to a licensing authority, the license renewal request comprising the plurality of identifiers; and according to whether or not a renewed digital license is received responsive to the license renewal request, either prohibiting or permitting use of the identified use-protected applications on the computing device, wherein whether a renewed digital license is to be provided by the licensing authority depends on the identifiers of the unsigned use-protected applications received by the licensing authority. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-readable storage device having instructions stored thereon that when executed by a computing device cause the computing device to perform steps comprising:
-
regulating execution of applications on the computing device according to whether applications are signed or unsigned, wherein determining whether a signed application is allowed to execute is based on a signature thereof, and wherein determining whether an unsigned application is allowed to execute depends on whether a valid license is available on the computing device; as part of a license-obtaining process, obtaining licensing information by;
specifically identifying unsigned applications on the computing device and obtaining respective application identifiers, obtaining a timestamp from the computing device, and obtaining a machine identifier identifying the computing device;encrypting the licensing information with a key available at the computing device; obtaining a hardware identifier of the computing device; associating the hardware identifier with the encrypted licensing information to construct a data package; and transmitting the data package via a network to a licensing service; responsive to transmitting the data package, receiving a license from the licensing service, the license having been granted at least in part according to the application identifiers in the data package, wherein the license enables arbitrary unsigned applications to be executed on the computing device. - View Dependent Claims (10, 11)
-
Specification