Security features in on-line and off-line delivery of applications

a technology of security features and applications, applied in the field of applications delivery, can solve the problems of preventing or corrupting user saved data, deterring or preventing further use of applications

Inactive Publication Date: 2006-02-09
EXENT TECH
View PDF4 Cites 98 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Here, user saved data is bound with usage information, so that any unauthorized attempt to access the usage information corrupts the user saved data, deterring or preventing further use of the application.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security features in on-line and off-line delivery of applications
  • Security features in on-line and off-line delivery of applications
  • Security features in on-line and off-line delivery of applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] A preferred embodiment of the present invention is now described with reference to the figures, where generally like reference numbers indicate identical or functionally similar elements. Also in the figures, generally the left-most digit of each reference number corresponds to the figure in which the reference number is first used. While specific configurations and arrangements are discussed, it should be understood that this is done for illustrative purposes only. A person skilled in the relevant art will recognize that other configurations and arrangements can be used without departing from the spirit and scope of the invention. It will be apparent to a person skilled in the relevant art that this invention can also be employed in a variety of other devices and applications.

Table of Contents

[0033] I. System overview

[0034] II. Prediction Based Security

[0035] III. Offline Security

[0036] IV. Computing Context

[0037] IV. Conclusion

I. System Overview

[0038] The present i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system and method for protecting against unauthorized use of an application on a computer system. First, saved data associated with the application is stored. Storing the save data includes binding usage information to the saved data, wherein the usage information includes one or more parameters set by the application indicating how the application has been used by a user. Then, a request to access the saved data is processed. Processing the request includes performing an integrity check on the bound usage information and saved data, and denying access to the saved data if the integrity check determines that the usage information has been altered by a user.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS [0001] This application is a continuation of U.S. application Ser. No. 10 / 815,962, filed Apr. 2, 2004, now pending, which is a continuation of U.S. application Ser. No. 10 / 694,435, filed Oct. 28, 2003, now abandoned, all of which are incorporated herein by referenceBACKGROUND OF THE INVENTION [0002] 1. Field of the Invention [0003] This technology relates generally to delivery of applications across a network. [0004] 2. Related Art [0005] The delivery of applications from a server to client across a network has become commonplace. Examples of such applications include utilities, games, and productivity applications. Nonetheless, the delivery process is not necessarily convenient or secure. Considerable amounts of data need to be transferred for the complete delivery of an application, and a complete download may take hours in some circumstances. This may be followed by a cumbersome installation process. Moreover, such transactions may be furth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06Q99/00G06FG06F11/30G06F21/00
CPCG06F21/10G06F21/554G06F21/121
Inventor NAVE, ITAYSHEORY, OHAD
Owner EXENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products