Software distribution service federation
First Claim
1. One or more computer-readable devices configured with computer-executable instructions that, when executed by one or more processors, configure the one or more processors to perform acts comprising:
- receiving, by an update agent from a content source authenticator, authentication information associated with a plurality of content sources that comprises a list of the plurality of content sources;
selecting a first content source from the list of the plurality of content sources included in the authentication information, wherein the first content source is configured to provide updates for a first software application; and
checking the first content source for updates for the first software application.
2 Assignments
0 Petitions
Accused Products
Abstract
Software update distribution techniques are disclosed. Authentication information is received, from a content source authenticator, by an update agent included in a client device. The authentication information comprises a list of a plurality of content sources, wherein the plurality of content sources have been verified by the content source authenticator as being authentic content sources for legitimate software applications. The update agent selects a first content source of the plurality of content sources, where the first content source is configured to provide updates for a first software application. The update agent checks the first content source for updates for the first software application.
-
Citations
20 Claims
-
1. One or more computer-readable devices configured with computer-executable instructions that, when executed by one or more processors, configure the one or more processors to perform acts comprising:
-
receiving, by an update agent from a content source authenticator, authentication information associated with a plurality of content sources that comprises a list of the plurality of content sources; selecting a first content source from the list of the plurality of content sources included in the authentication information, wherein the first content source is configured to provide updates for a first software application; and checking the first content source for updates for the first software application. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system comprising:
-
one or more processors; and memory, communicatively coupled to the one or more processors, storing instructions that, when executed by the one or more processors, configure the one or more processors to perform acts comprising; receiving, by an update agent from a content source authenticator, authentication information associated with a plurality of content sources that comprises a list of the plurality of content sources; selecting a first content source from the list of the plurality of content sources included in the authentication information, wherein the first content source is configured to provide updates for a first software application; and checking the first content source for updates for the first software application. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method comprising:
-
determining, by a processor, that a plurality of content sources are authentic content sources for providing updates for a corresponding plurality of software applications; and generating authentication information that comprises; a list of the plurality of content sources, and for each of the plurality of content sources, an authorization token that indicates an authenticity of the corresponding content source and an expiration time of the authorization token. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A system comprising:
-
one or more processors; and memory, communicatively coupled to the one or more processors, storing instructions that, when executed by the one or more processors, configure the one or more processors to perform acts comprising; determining that a plurality of content sources are authentic content sources for providing updates for a corresponding plurality of software applications; and generating authentication information that comprises; a list of the plurality of content sources, and for each of the plurality of content sources, an authorization token that indicates an authenticity of the corresponding content source and an expiration time of the authorization token. - View Dependent Claims (17, 18, 19, 20)
-
Specification