Key-limited use applications are maintained at a central service where the
central service can receive requests from a remote computing device for
access to the key-limited use applications. The key-limited use
applications include publicly available portions and a locked portions
accessible with a key. The central service can provide a key to the
remote computing device associated with a key-limited use application for
complete access. The key can be stored in a memory device associated with
the remote computing device. A digital signature can be assigned to the
key to prevent operation of the key in a second computing device.
Unauthorized or unlicensed computing devices are prevented from using the
applications.