Feeds

Amazon outlines Android bill of rights

Galloping away from Google Marketplace

Internet Security Threat Report 2014

Amazon's foray into mobile applications is getting firmer, with the company's approach to copy protection showing how it plans to differentiate itself from Google's Marketplace, or not.

Amazon Appstore Digital Rights Management apparently "simplifies life for developers and customers", but only by virtue of operating on principles made familiar by Google's Licence Verification Library (LVL). But, just like Google, Amazon is hoping that mobile applications will tie customers into its cloud for the long term.

That's important as Amazon continues migrating away from its bookstore roots towards becoming a provider of cloud services, with the application store being an ideal way to punish those who stray from the one true path.

Amazon's DRM system, like LVL, requires applications to periodically ping the on-device store application to ensure the licence is still valid. The on-device store will, once in a while, check with the cloud store to ensure the licence is still valid, and presumably pick up notifications regarding updates and rogue applications - the former for re-downloading, the latter for deinstallation.

Applications purchased through the Amazon Android store, and protected by Amazon's DRM, will only operate as long as the store is installed. So if one buys a new phone one can install all the purchased applications onto it, as long as one installs the Amazon app store first. That means anyone who buys an application from Amazon is locked in for the duration - which is rather the point.

That's the same as Google's Android Marketplace, though as the 'Marketplace comes preinstalled on most Android handsets few users notice. When Google reached out and uninstalled rogue applications over the weekend the association was that Google could remove applications from "Android" when in fact it’s the Android Marketplace application, not the operating system, which does the dirty work.

Amazon's app store will presumably come with similar abilities, those details have yet to be announced, but the DRM details show how Amazon sees applications as a way of ensuring cloud loyalty. That is still dependent on whether developers decide to make use the app-store DRM (there are other DRM mechanisms available, and neither store mandates their own DRM). But the app-stores make their own DRM extremely easy to deploy, which makes sense as they have most to gain from its use. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.