Controlled Application Distribution
A technology of application distribution and sender, applied in the direction of program/content distribution protection, instrumentation, computing, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] The following detailed description relates to concepts and techniques for distributing applications. According to some of the concepts and techniques disclosed herein, authorization tokens can be used by application senders to control the distribution and use of applications. An authorization token may be used by an application recipient to gain access to and use one or more applications associated with the authorization token. To generate an authorization token, an application sender may access an application store and select one or more applications for use by an application recipient. The application sender can submit a set of distribution terms and payment (if required) to the application store. Once submitted, the application sender may receive an authorization token. The authorization token may encapsulate the application license details, any restrictions provided by the application store, and distribution terms. This information can be used to generate recipie...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


