Software revalidation and invalidation
First Claim
1. One or more non-transitory computer-readable media storing one or more programs that cause one or more processors to execute a method for software revalidation, the method comprising:
- newly collecting machine configuration information from a machine on which a software application has previously been installed and activated;
applying, at the machine, activation rules to the newly-collected machine configuration information from the machine to determine whether a product key remains valid for the newly-collected machine configuration information; and
in response to determining that the product key remains valid for the newly-collected machine configuration information, revalidating, at the machine, the software application to authorize continued access to the software application.
4 Assignments
0 Petitions
Accused Products
Abstract
Software revalidation or invalidation. In one example embodiment, one or more non-transitory computer-readable media may store one or more programs that cause one or more processors to execute a method for software revalidation or invalidation that may include newly collecting machine configuration information from a machine on which a software application has previously been installed and activated and applying, at the machine, activation rules to the newly-collected machine configuration information from the machine to determine whether a product key remains valid for the newly-collected machine configuration information. In response to determining that the product key remains valid for the newly-collected machine configuration information, the method may include revalidating, at the machine, the software application to authorize continued access to the software application. Alternatively, the method may include invalidating, at the machine, the software application to prevent continued access to the software application.
-
Citations
20 Claims
-
1. One or more non-transitory computer-readable media storing one or more programs that cause one or more processors to execute a method for software revalidation, the method comprising:
-
newly collecting machine configuration information from a machine on which a software application has previously been installed and activated; applying, at the machine, activation rules to the newly-collected machine configuration information from the machine to determine whether a product key remains valid for the newly-collected machine configuration information; and in response to determining that the product key remains valid for the newly-collected machine configuration information, revalidating, at the machine, the software application to authorize continued access to the software application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. One or more non-transitory computer-readable media storing one or more programs that cause one or more processors to execute a method for software invalidation, the method comprising:
-
newly collecting machine configuration information from a machine on which a software application has previously been installed and activated; applying, at the machine, activation rules to the newly-collected machine configuration information from the machine to determine whether a product key remains valid for the newly-collected machine configuration information; and in response to determining that the product key does not remain valid for the newly-collected machine configuration information, invalidating, at the machine, the software application to prevent continued access to the software application. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification