Movatterモバイル変換


[0]ホーム

URL:


US20120095877A1 - Application usage policy enforcement - Google Patents

Application usage policy enforcement
Download PDF

Info

Publication number
US20120095877A1
US20120095877A1US12/907,915US90791510AUS2012095877A1US 20120095877 A1US20120095877 A1US 20120095877A1US 90791510 AUS90791510 AUS 90791510AUS 2012095877 A1US2012095877 A1US 2012095877A1
Authority
US
United States
Prior art keywords
application
authorization
user
purchase receipt
authorization file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/907,915
Inventor
Jean-Pierre Ciudad
Augustin J. Farrugia
David M'Raihi
Bertrand Mollinier Toublet
Gianpaolo Fasoli
Nicholas T. Sullivan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Apple Inc
Original Assignee
Apple Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Apple IncfiledCriticalApple Inc
Priority to US12/907,915priorityCriticalpatent/US20120095877A1/en
Assigned to APPLE INC.reassignmentAPPLE INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: CIUDAD, JEAN-PIERRE, FARRUGIA, AUGUSTIN J., FASOLI, GIANPAOLO, M'RAIHI, DAVID, SULLIVAN, NICHOLAS T., TOUBLET, BERTRAND MOLLINIER
Priority to BR112013009278-5Aprioritypatent/BR112013009278B1/en
Priority to JP2013534945Aprioritypatent/JP5624681B2/en
Priority to PCT/US2011/055653prioritypatent/WO2012054252A2/en
Priority to CN201180050396.5Aprioritypatent/CN103180859B/en
Priority to KR1020137012753Aprioritypatent/KR101492757B1/en
Priority to MX2013004434Aprioritypatent/MX2013004434A/en
Priority to EP11776044.7Aprioritypatent/EP2630606B1/en
Priority to AU2011318417Aprioritypatent/AU2011318417B2/en
Publication of US20120095877A1publicationCriticalpatent/US20120095877A1/en
Priority to US16/177,250prioritypatent/US11475106B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Disclosed herein are systems, methods, and non-transitory computer-readable media for enforcing application usage policies. As part of an application purchase transaction, the application distributor creates a unique proof of purchase receipt. This receipt can be bundled with the application and delivered to the purchaser. Each machine can maintain an authorization file that lists the users authorized to use applications on that machine. A system configured to practice the method verifies that a user is authorized to use an application on a machine based on an application proof of purchase receipt and the authorization file. If the application proof of purchase receipt and the authorization file are both valid, the system checks if the user account identifier in the receipt is contained in the authorization file. If so, the user can be considered authorized to use the application on the machine.

Description

Claims (43)

6. A system for enforcing an application usage policy, the system comprising:
a processor;
a first module configured to control the processor to receive a request from a user to purchase a first application;
a second module configured to control the processor to construct an application purchase receipt for the first application;
a third module configured to control the processor to send an application bundle including the first application and the application purchase receipt to the user;
a fourth module configured to control the processor to receive a request to verify a second application on a client device based on an application purchase receipt and an authorization file; and
a fifth module configured to control the processor to verify the second application based on the application purchase receipt and the authorization file.
9. A server for enforcing an application usage policy on a client device, the server comprising:
a processor;
a network interface;
a first module configured to control the processor to receive, via the network interface, a request from the client device to purchase a first application;
a second module configured to control the processor to construct an application purchase receipt for the first application; and
a third module configured to control the processor to send to the client device an application bundle based on the first application and the application purchase receipt,
wherein the client device receives a request to verify a second application on the client device based on the application purchase receipt and an authorization file, and verifies the second application based on the application purchase receipt and the authorization file.
11. The server ofclaim 10, further comprising:
a fifth module configured to control the processor to receive, via the network interface, a de-authorization request from a second client device, wherein the de-authorization request includes an account identifier and an authorization file;
a sixth module configured to control the processor to identify an entry in the authorization records associated with the account identifier;
a seventh module configured to control the processor to remove the client device specified in the authorization file from the list of authorized client devices in the entry;
an eighth module configured to control the processor to create an updated authorization file; and
a nineth module configured to control the processor to send the updated authorization file to the second client device.
19. A client device for enforcing a server-generated application usage policy, the client device comprising:
a processor;
a network interface;
a user input interface;
receiving, from a server, an application bundle including a first application and an application purchase receipt, wherein the application bundle is generated at the server by steps comprising:
receiving a request from a user to purchase a first application;
constructing an application purchase receipt for the first application; and
generating the application bundle based on the first application and the application purchase receipt;
receiving a request, via the user input interface, to verify a second application on the client device based on the application purchase receipt and an authorization file; and
verifying the second application based on the application purchase receipt and the authorization file.
US12/907,9152010-10-192010-10-19Application usage policy enforcementAbandonedUS20120095877A1 (en)

Priority Applications (10)

Application NumberPriority DateFiling DateTitle
US12/907,915US20120095877A1 (en)2010-10-192010-10-19Application usage policy enforcement
AU2011318417AAU2011318417B2 (en)2010-10-192011-10-10Application usage policy enforcement
CN201180050396.5ACN103180859B (en)2010-10-192011-10-10Application uses strategy to enforce
JP2013534945AJP5624681B2 (en)2010-10-192011-10-10 Enforce application usage policy
PCT/US2011/055653WO2012054252A2 (en)2010-10-192011-10-10Application usage policy enforcement
BR112013009278-5ABR112013009278B1 (en)2010-10-192011-10-10 USER TERMINAL AND METHOD FOR IMPOSING A SERVER GENERATED APPLICATION USE POLICY
KR1020137012753AKR101492757B1 (en)2010-10-192011-10-10Application usage policy enforcement
MX2013004434AMX2013004434A (en)2010-10-192011-10-10Application usage policy enforcement.
EP11776044.7AEP2630606B1 (en)2010-10-192011-10-10Application usage policy enforcement
US16/177,250US11475106B2 (en)2010-10-192018-10-31Application usage policy enforcement

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US12/907,915US20120095877A1 (en)2010-10-192010-10-19Application usage policy enforcement

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US16/177,250ContinuationUS11475106B2 (en)2010-10-192018-10-31Application usage policy enforcement

Publications (1)

Publication NumberPublication Date
US20120095877A1true US20120095877A1 (en)2012-04-19

Family

ID=44872612

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US12/907,915AbandonedUS20120095877A1 (en)2010-10-192010-10-19Application usage policy enforcement
US16/177,250Active2032-12-17US11475106B2 (en)2010-10-192018-10-31Application usage policy enforcement

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US16/177,250Active2032-12-17US11475106B2 (en)2010-10-192018-10-31Application usage policy enforcement

Country Status (9)

CountryLink
US (2)US20120095877A1 (en)
EP (1)EP2630606B1 (en)
JP (1)JP5624681B2 (en)
KR (1)KR101492757B1 (en)
CN (1)CN103180859B (en)
AU (1)AU2011318417B2 (en)
BR (1)BR112013009278B1 (en)
MX (1)MX2013004434A (en)
WO (1)WO2012054252A2 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20130047271A1 (en)*2011-08-192013-02-21Ding-Yuan TangAuthor Authorization of Electronic Works
CN103312513A (en)*2013-06-192013-09-18北京华胜天成科技股份有限公司Method and system for verifying use authorization in distributed environment
US20130290130A1 (en)*2012-04-252013-10-31Alibaba Group Holding LimitedTemperature-based determination of business objects
US20140067676A1 (en)*2012-09-042014-03-06Microsoft CorporationManagement of digital receipts
US20140150123A1 (en)*2012-11-282014-05-29Apple Inc.Using receipts to control assignments of items of content to users
US9424576B2 (en)*2014-09-152016-08-23Xerox CorporationMethods and systems of creating a payment record with a cryptographically secure audit trail
US9794231B2 (en)2015-03-162017-10-17Schlage Lock Company LlcLicense management using cloud based enrollment
US20200358603A1 (en)*2017-11-202020-11-12Telefonaktiebolaget Lm Ericsson (Publ)Deployment of Components of a Distributed Application to Runtime Environments
US11475106B2 (en)2010-10-192022-10-18Apple Inc.Application usage policy enforcement

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9311491B2 (en)*2013-09-302016-04-12Google Inc.Systems, methods, and computer program products for securely managing data on a secure element
AU2013406576B2 (en)*2013-11-292017-07-27Huawei Device Co., Ltd.Installation package authorization method and device
US9256752B2 (en)*2014-01-072016-02-09Microsoft Technology Licensing, LlcProduct authorization with cross-region access
CN105741153A (en)*2014-12-102016-07-06北京奇虎科技有限公司Method and device for obtaining toolkits
CN106600281A (en)*2016-12-132017-04-26宁夏凯速德科技有限公司Integrated and encrypted mobile payment app control device and method
CN106651342A (en)*2016-12-132017-05-10宁夏宁信信息科技有限公司Mobile payment app control device and method
CN106789073B (en)*2016-12-262019-10-15北京小米支付技术有限公司Signing messages generation method and device
CN111597526B (en)*2020-07-232020-10-27飞天诚信科技股份有限公司Credential correction method, system, data processing terminal and working method thereof
CN112202772B (en)*2020-09-292021-06-29北京海泰方圆科技股份有限公司 An authorization management method, device, electronic device and medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5708709A (en)*1995-12-081998-01-13Sun Microsystems, Inc.System and method for managing try-and-buy usage of application programs
US5790664A (en)*1996-02-261998-08-04Network Engineering Software, Inc.Automated system for management of licensed software
US20040088541A1 (en)*2002-11-012004-05-06Thomas MessergesDigital-rights management system
US20050022025A1 (en)*2003-06-302005-01-27Hug Joshua D.Rights enforcement and usage reporting on a client device
US20060106727A1 (en)*2004-11-182006-05-18Yellai Prabhakara RMethod and system for transferring software and hardware feature licenses between devices
US20060131397A1 (en)*2001-06-072006-06-22Reddy Karimireddy HProtected content distribution system
US20060272031A1 (en)*2005-05-242006-11-30Napster LlcSystem and method for unlimited licensing to a fixed number of devices
US20060282391A1 (en)*2005-06-082006-12-14General Instrument CorporationMethod and apparatus for transferring protected content between digital rights management systems
US20060287959A1 (en)*2005-06-172006-12-21Macrovision CorporationSoftware license manager employing license proofs for remote execution of software functions
US20080319779A1 (en)*2007-06-252008-12-25Microsoft CorporationActivation system architecture
US7549047B2 (en)*2002-11-212009-06-16Xerox CorporationMethod and system for securely sharing files
US20100138903A1 (en)*2008-12-032010-06-03General Instrument CorporationTicket-Based Implementation of Content Leasing

Family Cites Families (25)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPH0844633A (en)*1994-07-271996-02-16Hitachi Software Eng Co LtdIllegal use preventing method for data
AU6269796A (en)*1995-06-071996-12-30Digital River, Inc.Try-before-you-buy software distribution and marketing syste m
EP0968585A1 (en)1997-03-142000-01-05Cryptoworks Inc.Digital product rights management technique
US6189146B1 (en)*1998-03-182001-02-13Microsoft CorporationSystem and method for software licensing
US7073063B2 (en)1999-03-272006-07-04Microsoft CorporationBinding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like
US7024393B1 (en)*1999-03-272006-04-04Microsoft CorporationStructural of digital rights management (DRM) system
US7051005B1 (en)1999-03-272006-05-23Microsoft CorporationMethod for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system
US6920567B1 (en)1999-04-072005-07-19Viatech Technologies Inc.System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files
JP2003513388A (en)*1999-10-292003-04-08コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ System and method for ensuring data reliability with a secured counter
JP2002268764A (en)*2001-03-142002-09-20Dainippon Printing Co Ltd Software license management system using IC card
US20030014635A1 (en)2001-03-202003-01-16Laforge Laurence E.Method and mechanism for authenticating licenses of software and other digital products
US20020184161A1 (en)2001-06-042002-12-05Allen ChangSystem and method for network address based software authorization
DE60212920T3 (en)*2001-06-072016-01-14Contentguard Holdings, Inc. METHOD AND SYSTEM FOR MANAGING DIGITAL SUBSCRIPTION RIGHTS
US7203966B2 (en)2001-06-272007-04-10Microsoft CorporationEnforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices
US8011015B2 (en)2002-12-172011-08-30Sony CorporationContent access in a media network environment
JP4340856B2 (en)*2003-04-252009-10-07ソニー株式会社 Data protection method and protection device therefor
EP1678943A1 (en)*2003-09-172006-07-12Matsushita Electric Industrial Co., Ltd.Application execution device, application execution method, integrated circuit, and computer-readable program
JP4842836B2 (en)2003-12-302011-12-21ヴィーブ−システムズ アクチエンゲゼルシャフト How to recover the authorization code
JP4908961B2 (en)2006-07-272012-04-04キヤノン株式会社 Information processing method, information processing apparatus, program, and storage medium
US20080114695A1 (en)2006-11-102008-05-15Semantic Components S.L.Process for implementing a method for the on-line sale of software product use licenses through a data network, and software component which allows carrying out said process
KR101456489B1 (en)2007-07-232014-10-31삼성전자주식회사Method and apparatus for managing access privileges in a CLDC OSGi environment
JP4954031B2 (en)*2007-11-162012-06-13キヤノン株式会社 Image processing apparatus and reinstallation method
CN101339592A (en)*2008-08-142009-01-07冯振周All-purpose digital copyright protection technology frame
CN101866404B (en)*2010-06-132012-11-28用友软件股份有限公司Software system module independent authorization control method and device
US20120095877A1 (en)2010-10-192012-04-19Apple, Inc.Application usage policy enforcement

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5708709A (en)*1995-12-081998-01-13Sun Microsystems, Inc.System and method for managing try-and-buy usage of application programs
US5790664A (en)*1996-02-261998-08-04Network Engineering Software, Inc.Automated system for management of licensed software
US20060131397A1 (en)*2001-06-072006-06-22Reddy Karimireddy HProtected content distribution system
US20040088541A1 (en)*2002-11-012004-05-06Thomas MessergesDigital-rights management system
US7549047B2 (en)*2002-11-212009-06-16Xerox CorporationMethod and system for securely sharing files
US20050022025A1 (en)*2003-06-302005-01-27Hug Joshua D.Rights enforcement and usage reporting on a client device
US20060106727A1 (en)*2004-11-182006-05-18Yellai Prabhakara RMethod and system for transferring software and hardware feature licenses between devices
US20060272031A1 (en)*2005-05-242006-11-30Napster LlcSystem and method for unlimited licensing to a fixed number of devices
US20060282391A1 (en)*2005-06-082006-12-14General Instrument CorporationMethod and apparatus for transferring protected content between digital rights management systems
US20060287959A1 (en)*2005-06-172006-12-21Macrovision CorporationSoftware license manager employing license proofs for remote execution of software functions
US20080319779A1 (en)*2007-06-252008-12-25Microsoft CorporationActivation system architecture
US20100138903A1 (en)*2008-12-032010-06-03General Instrument CorporationTicket-Based Implementation of Content Leasing

Cited By (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11475106B2 (en)2010-10-192022-10-18Apple Inc.Application usage policy enforcement
US20130047271A1 (en)*2011-08-192013-02-21Ding-Yuan TangAuthor Authorization of Electronic Works
US20130290130A1 (en)*2012-04-252013-10-31Alibaba Group Holding LimitedTemperature-based determination of business objects
US9633387B2 (en)*2012-04-252017-04-25Alibaba Group Holding LimitedTemperature-based determination of business objects
US20140067676A1 (en)*2012-09-042014-03-06Microsoft CorporationManagement of digital receipts
JP2015531501A (en)*2012-09-042015-11-02マイクロソフト テクノロジー ライセンシング,エルエルシー Managing digital receipts
US20140150123A1 (en)*2012-11-282014-05-29Apple Inc.Using receipts to control assignments of items of content to users
US9424405B2 (en)*2012-11-282016-08-23Apple Inc.Using receipts to control assignments of items of content to users
CN103312513A (en)*2013-06-192013-09-18北京华胜天成科技股份有限公司Method and system for verifying use authorization in distributed environment
US9424576B2 (en)*2014-09-152016-08-23Xerox CorporationMethods and systems of creating a payment record with a cryptographically secure audit trail
US9794231B2 (en)2015-03-162017-10-17Schlage Lock Company LlcLicense management using cloud based enrollment
US20200358603A1 (en)*2017-11-202020-11-12Telefonaktiebolaget Lm Ericsson (Publ)Deployment of Components of a Distributed Application to Runtime Environments

Also Published As

Publication numberPublication date
WO2012054252A2 (en)2012-04-26
KR20130084671A (en)2013-07-25
BR112013009278B1 (en)2020-11-24
JP2013546060A (en)2013-12-26
US11475106B2 (en)2022-10-18
MX2013004434A (en)2013-07-17
WO2012054252A3 (en)2012-09-07
KR101492757B1 (en)2015-02-12
JP5624681B2 (en)2014-11-12
AU2011318417A1 (en)2013-05-02
CN103180859A (en)2013-06-26
BR112013009278A2 (en)2016-07-26
EP2630606B1 (en)2018-11-21
US20190114399A1 (en)2019-04-18
EP2630606A2 (en)2013-08-28
CN103180859B (en)2015-11-25
AU2011318417B2 (en)2015-10-08

Similar Documents

PublicationPublication DateTitle
US11475106B2 (en)Application usage policy enforcement
JP7652820B2 (en) Blockchain-enabled method and system
JP7588171B2 (en) Blockchain-enabled method and system
US20230086191A1 (en)Systems and Methods for Token Content Unlocking, Biometric Authentication using Privacy-Protecting Tokens, Ownership-Based Limitations of Content Access, Policy-Based Time Capsule Technology, and Content Lock Mechanisms
US20210097528A1 (en)Blockchain hot wallet based on secure enclave and multi-signature authorization
JP3753885B2 (en) Host system elements of the international cryptosystem
US9871821B2 (en)Securely operating a process using user-specific and device-specific security constraints
JP5373997B2 (en) System and method for using a domain specific security sandbox to facilitate secure transactions
CN105760716B (en)Digital certificates management
US11431503B2 (en)Self-sovereign data access via bot-chain
US20240281796A1 (en)Systems and Methods for Facilitating Digital Wallet-Based Transactions
US12170738B2 (en)Composite cryptographic systems with variable configuration parameters and memory bound functions
CN112801659A (en)Privacy transaction processing method and device based on intelligent contract and storage medium
JP2001256413A (en)System and method for limiting contents secondary distribution and program providing medium
Austgen et al.Liquefaction: Privately liquefying blockchain assets
CN105324774B (en) Device for licensed program, program transaction device and method for licensed program
Yi et al.Bitcoin, Ethereum, Smart Contracts and Blockchain Types
JP2001256196A (en)Limiting system for inter-generation distribution of contents, limiting method for inter-generation distribution of contents and program provision medium
CN109167785A (en)A kind of call method and service server of virtual credible root
US20250131427A1 (en)Bot prevention techniques
JP2001256355A (en)System and method for managing use of contents and program providing medium
HK40022119A (en)Credit-based ride payment method, device, electronic equipment and storage medium
US9607295B1 (en)Automated enforcement of software application usage license
CN120688038A (en) Software authorization method, device, computer-readable medium, and electronic device

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:APPLE INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CIUDAD, JEAN-PIERRE;FARRUGIA, AUGUSTIN J.;M'RAIHI, DAVID;AND OTHERS;SIGNING DATES FROM 20101020 TO 20101112;REEL/FRAME:025363/0675

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp