×

Software license authorization system

  • US 7,703,142 B1
  • Filed: 05/06/2004
  • Issued: 04/20/2010
  • Est. Priority Date: 05/06/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method of operating an authorization network, the method comprising:

  • in a service provider network, providing a wireless communication service to a user device operated by a user, wherein a service provider operates the service provider network and an authorization system;

    in an enterprise system, obtaining a license for an application from an application vendor and transferring authorization instructions for the license based on the license to the authorization system over an internet, wherein the enterprise system is operated by an enterprise, wherein the enterprise is not the service provider, wherein the user device has the application;

    in the authorization system, receiving the authorization instructions from the enterprise system, wherein the authorization instructions indicate authorization parameters comprising a quantity of users allowed to be authorized under the license and a quantity of users authorized under the license, receiving an authorization request from the user device through the service provider network, wherein the authorization request is transmitted wirelessly to the service provider network by the user device, wherein the user device transfers the authorization request each time the application is selected for execution, and wherein the authorization request indicates the application, the enterprise, and at least one of the user and the user device, and processing the authorization request and the authorization parameters to determine if the execution of the application is authorized based on the enterprise and a determination that the quantity of users authorized under the license is less than the quantity of users allowed to be authorized under the license, if the execution of the application is authorized, transferring an authorized message to the user device, wherein the user device executes the application in response to the authorized message and, if the execution of the application is not authorized, transferring an unauthorized message to the user device, wherein the user device does not execute the application in response to the unauthorized message.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×