Dynamic selection of authorization processes
First Claim
Patent Images
1. A method for licensing applications, the method comprising:
- identifying conditions associated with an initiation of an application comprising a roaming status of the application and an installation status of the key-based authorization process;
selecting, based on the conditions, a preferred authorization process from at least a key-based authorization process and a keyless authorization process with which to authorize the application;
attempting to authorize the application using the preferred authorization process; and
monitoring for a change in the conditions associated with the application, and responsive to detecting the change in the conditions, attempting to authorize the application using another authorization process different from the preferred authorization process.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems, methods, and software are disclosed herein for licensing applications using a preferred authorization process dynamically identified based on conditions associated with an initiation of an application. Authorization is then attempted using the preferred authorization process. In some examples, the preferred authorization process is selected from at least a keyless authorization process and a key-based authorization process.
17 Citations
20 Claims
-
1. A method for licensing applications, the method comprising:
-
identifying conditions associated with an initiation of an application comprising a roaming status of the application and an installation status of the key-based authorization process; selecting, based on the conditions, a preferred authorization process from at least a key-based authorization process and a keyless authorization process with which to authorize the application; attempting to authorize the application using the preferred authorization process; and monitoring for a change in the conditions associated with the application, and responsive to detecting the change in the conditions, attempting to authorize the application using another authorization process different from the preferred authorization process. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more computer readable storage device having stored thereon program instructions for licensing applications that, when executed by a processing system, direct the processing system to:
-
identify conditions associated with an initiation of an application; select, based on the conditions, a preferred authorization process from a plurality of authorization processes with which to authorize the application; and initiate an attempt to authorize the application using the preferred authorization process; wherein a first authorization process of the plurality of authorization processes is selected as the preferred authorization process when the environment within which the application is executed is a roaming environment and when the status of a second authorization process of the plurality of authorization processes indicates that the second authorization process is unavailable. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An apparatus comprising:
-
one or more computer readable storage device; program instructions stored on the one or more computer readable storage device for licensing applications; and a processing system operatively coupled with the one or more computer readable storage device that, when executing the program instructions, is directed to at least; identify an environment within which an application is initiated; when the environment is a roaming environment, initiate a roaming attempt to authorize the application based on an identity of a user associated with the application; when the environment is not the roaming environment, initiate a key-based attempt to authorize the application based on a key associated with the application when a key-based process that performs the key attempt is available; when the key-based process is not available, initiate a keyless attempt to authorize the application based on the identity of the user associated with the application; and when the key-based process becomes available after having initiated the keyless attempt, initiate another key-based attempt to authorize the application. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification