Well, the xapsign tool gives the whole algorithm of how the xaps are signed. the whole structure. it is useful information!
The way the pc communicates with the device is written in .net as I said. It's tcp, in a custom byte protocol that the main data is an authcode. The authcode is retrieved by calling the url via a com dll. So, we could tell the com dll to call a custom service (probably with a trusted cert). We can see what requests are posted. Forwarding those to the real url, we also get the result. So the logic is kind of revealed without digging in the dll. But anyway, I do not think this will get anywhere if the url returns the authcode and the dll just wraps some tcp logic. If the dll has some validation logic, we could brute-force it to also reveal the validation rules. useful info too!
Whether the dlls are signed or not makes no difference... since i do not think ms put their unlock code in a distributable dll and not on their servers.