摘要:
A mechanism for delegating trust to activate a target program from the vendor (or its intermediary) to a customer (or its intermediary) using an issuance license. The customer may then activate using their own authentication implementation. Also, a method for formulating an issuance license that permits such delegation. Furthermore, a method for an entity outside of a customer to gather trace information from the activation process after the fact that allows a customer to identify the activating entity without the outside entity first identifying the activating entity.
摘要:
A system, a method, and computer-readable media are provided for altering behavior of software based on detection of an Internet connection. The system, method, and media detect when a computer has connected to the Internet or is capable of connecting to the Internet. This detection may include analyzing a connection history of the computer to the Internet, reporting in real-time when the computer establishes a connection to the Internet, or attempting to actively establish a connection with an Internet resource using the computer. A first set of software functionality may be disabled when a previously established connection with the Internet is identified, a real-time report of a connection with the Internet is generated, or a connection with the Internet resource is established. In addition, a second set of software functionality may be enabled when the first set of software functionality is disabled.
摘要:
A system, a method, and computer-readable media are provided for altering behavior of software based on detection of an Internet connection. The system, method, and media detect when a computer has connected to the Internet or is capable of connecting to the Internet. This detection may include analyzing a connection history of the computer to the Internet, reporting in real-time when the computer establishes a connection to the Internet, or attempting to actively establish a connection with an Internet resource using the computer. A first set of software functionality may be disabled when a previously established connection with the Internet is identified, a real-time report of a connection with the Internet is generated, or a connection with the Internet resource is established. In addition, a second set of software functionality may be enabled when the first set of software functionality is disabled.
摘要:
In some embodiments, an activation object used to activate a software product is stored in a directory service. The activation object may, for example, comprise a proof of purchase token and/or information about the directory service, and may be communicated from the directory service to a client computer after the directory service authenticates a request from a client computer for access to the activation object. In some embodiments, a directory service is interrogated for an activation object used to activate software on a client computer. A client computer may, for example, receive an activation object from the interrogated directory service, and use the received activation object to activate a software product on the client computer. In some embodiments, a non-transitory computer-readable medium has instructions stored thereon that, when executed by a computer, cause the computer to interrogate a directory service for an activation object used to activate software on the computer. The computer may, for example, receive the activation object from the directory service, and use the received activation object to activate a software product.
摘要:
In some embodiments, an activation object used to activate a software product is stored in a directory service. The activation object may, for example, comprise a proof of purchase token and/or information about the directory service, and may be communicated from the directory service to a client computer after the directory service authenticates a request from a client computer for access to the activation object. In some embodiments, a directory service is interrogated for an activation object used to activate software on a client computer. A client computer may, for example, receive an activation object from the interrogated directory service, and use the received activation to object to activate a software product on the client computer. In some embodiments, a non-transitory computer-readable medium has instructions stored thereon that, when executed by a computer, cause the computer to interrogate a directory service for an activation object used to activate software on the computer. The computer may, for example, receive the activation object from the directory service, and use the received activation object to activate a software product.
摘要:
A trailing rear suspension for a motor vehicle having a twist beam axle coupled at its ends to a pair of trailing arms wherein the twist beam axle raises the shear center of the central portion of its cross-beam above the wheel center of the vehicle. The raising of the shear center is achieved by rotating the cross-beam to orient one leg of its cross-section to be aligned with the top of the trailing arms.
摘要:
Methods and systems are disclosed in which inherited activation opens a secure communication path from the host operating system (OS) to the guest (virtual machine) OS. The license state of the software on the host is passed through this channel, and software installed in the guest uses this information to inform its own product activation process. The virtualized (guest) software may then activate without any outside communication when the license requirements for the host are met.
摘要:
Methods and systems are disclosed in which inherited activation opens a secure communication path from the host operating system (OS) to the guest (virtual machine) OS. The license state of the software on the host is passed through this channel, and software installed in the guest uses this information to inform its own product activation process. The virtualized (guest) software may then activate without any outside communication when the license requirements for the host are met.