摘要:
A system, a method, and computer-readable media are provided for altering behavior of software based on detection of an Internet connection. The system, method, and media detect when a computer has connected to the Internet or is capable of connecting to the Internet. This detection may include analyzing a connection history of the computer to the Internet, reporting in real-time when the computer establishes a connection to the Internet, or attempting to actively establish a connection with an Internet resource using the computer. A first set of software functionality may be disabled when a previously established connection with the Internet is identified, a real-time report of a connection with the Internet is generated, or a connection with the Internet resource is established. In addition, a second set of software functionality may be enabled when the first set of software functionality is disabled.
摘要:
A system, a method, and computer-readable media are provided for altering behavior of software based on detection of an Internet connection. The system, method, and media detect when a computer has connected to the Internet or is capable of connecting to the Internet. This detection may include analyzing a connection history of the computer to the Internet, reporting in real-time when the computer establishes a connection to the Internet, or attempting to actively establish a connection with an Internet resource using the computer. A first set of software functionality may be disabled when a previously established connection with the Internet is identified, a real-time report of a connection with the Internet is generated, or a connection with the Internet resource is established. In addition, a second set of software functionality may be enabled when the first set of software functionality is disabled.
摘要:
A mechanism for delegating trust to activate a target program from the vendor (or its intermediary) to a customer (or its intermediary) using an issuance license. The customer may then activate using their own authentication implementation. Also, a method for formulating an issuance license that permits such delegation. Furthermore, a method for an entity outside of a customer to gather trace information from the activation process after the fact that allows a customer to identify the activating entity without the outside entity first identifying the activating entity.
摘要:
A software license for a particular version of a software product on a computing device includes both a branding identifier that identifies the particular version of the software product and component dependency information that identifies one or more aspects of the particular version of the software product. To activate a software product on the computing device, the branding identifier is compared to a portion of the software product on the computing device. If the branding identifier matches the portion of the software product, then the component dependency information is compared to one or more aspects of the software product on the computing device. If the component dependency information matches the one or more aspects of the software product then the software product is activated. Otherwise, the a license state of the software product is kept unchanged.
摘要:
A software license for a particular version of a software product on a computing device includes both a branding identifier that identifies the particular version of the software product and component dependency information that identifies one or more aspects of the particular version of the software product. To activate a software product on the computing device, the branding identifier is compared to a portion of the software product on the computing device. If the branding identifier matches the portion of the software product, then the component dependency information is compared to one or more aspects of the software product on the computing device. If the component dependency information matches the one or more aspects of the software product then the software product is activated. Otherwise, the a license state of the software product is kept unchanged.
摘要:
A method and a processing device are provided for detecting a hardware-based virtual machine environment. An execution time of a privileged instruction may be measured and an execution time of a nonprivileged instruction may be measured. The execution time of the privileged instruction may be compared with the execution time of the nonprivileged instruction. When the execution time of the privileged instruction exceeds the execution time of the nonprivileged instruction by at least a threshold or a threshold factor, then a hardware-based virtual machine environment is detected. In some embodiments, a well-known technique for detecting a software-based virtual machine environment may be used in conjunction with a technique for detecting a hardware-based virtual machine environment. A licensing policy of a software product may be accessed and the software product may be prevented from executing when a detected machine environment is in violation of the licensing policy.
摘要:
A method and a processing device are provided for detecting a hardware-based virtual machine environment. An execution time of a privileged instruction may be measured and an execution time of a nonprivileged instruction may be measured. The execution time of the privileged instruction may be compared with the execution time of the nonprivileged instruction. When the execution time of the privileged instruction exceeds the execution time of the nonprivileged instruction by at least a threshold or a threshold factor, then a hardware-based virtual machine environment is detected. In some embodiments, a well-known technique for detecting a software-based virtual machine environment may be used in conjunction with a technique for detecting a hardware-based virtual machine environment. A licensing policy of a software product may be accessed and the software product may be prevented from executing when a detected machine environment is in violation of the licensing policy.
摘要:
Through one or more transaction calls, an application domain manager enables a host application to create, initialize, customize, and otherwise manage an isolation construct within the application.
摘要:
Systems, methods, and apparatus for validating product keys. In some embodiments, a product key includes security information and identification information identifying at least one copy of a software product. The security information may include a first portion to be processed by a first validation authority using first validation information and a second portion to be processed by a second validation authority using second validation information. The second validation information may be stored separately from the first validation information and may not be accessible to the first validation authority. In some embodiments, the first validation authority randomly determines whether a product key is to be audited by the second validation authority. Alternatively, the first validation authority may determine whether to audit based on a type of the software product associated with the product key and/or a perceived level of security risk.
摘要:
Through one or more transaction calls, an application domain manager enables a host application to create, initialize, customize, and otherwise manage an isolation construct within the application.