Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Application usage policy enforcement

An application package and application identifier technology, applied in the field of enforcing application usage policies, which can solve problems such as difficulty and trouble in user migration

Active Publication Date: 2013-06-26
APPLE INC
View PDF13 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This process prevents unauthorized copying, but it also makes it difficult for users to migrate from one machine to another
Also, this scheme is cumbersome when the software developer has a policy that allows users to install the software on a specified number of machines

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application usage policy enforcement
  • Application usage policy enforcement
  • Application usage policy enforcement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Various embodiments of the present disclosure are discussed in detail below. While specific implementations are discussed, it should be understood that this is done for illustration purposes only. A person skilled in the relevant art will recognize that other components and configurations may be used without departing from the spirit and scope of the present disclosure. The present disclosure addresses the need in the art for an improved method of selecting targeted content for presentation to a user based on characteristics describing the user and / or the user's interaction with one or more items of targeted content.

[0026] The systems and methods of the present disclosure are particularly useful for enforcing application usage policies on computers. figure 1 An exemplary system configuration 100 is shown for application distribution and usage, where electronic devices 102 , 104 communicate with an electronic application distributor 112 via a network 110 . The syste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed herein are systems, methods, and non-transitory computer-readable media for enforcing application usage policies. As part of an application purchase transaction, the application distributor creates a unique proof of purchase receipt. This receipt can be bundled with the application and delivered to the purchaser. Each machine can maintain an authorization file that lists the users authorized to use applications on that machine. A system configured to practice the method verifies that a user is authorized to use an application on a machine based on an application proof of purchase receipt and the authorization file. If the application proof of purchase receipt and the authorization file are both valid, the system checks if the user account identifier in the receipt is contained in the authorization file. If so, the user can be considered authorized to use the application on the machine.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to US Patent Application Serial No. 12 / 907,915, filed October 19, 2010, entitled "APPLICATION USAGE POLICY ENFORCEMENT," which is hereby incorporated by reference in its entirety. technical field [0003] The present disclosure relates to enforcing application usage policies, and more specifically, to preventing unauthorized execution of applications on computers. Background technique [0004] An important characteristic of computer software is that a single piece of software can be installed on multiple machines without changing the software. This is advantageous for a software developer because the software developer can develop the software once and then distribute it to many different users without any additional effort. This is also advantageous for the user, since the user can move his software from one machine to another, eg when the user buys a new computer. Software portabili...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/10G06Q30/06
CPCG06Q30/0601G06Q30/0641G06F21/105G06F21/10
Inventor J-P·西大德A·J·法鲁吉亚D·米来希B·M·图贝尔特G·法索利N·T·苏立万
Owner APPLE INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products