US20120047562A1 - Software applications distribution method and apparatus - Google Patents
Software applications distribution method and apparatus Download PDFInfo
- Publication number
- US20120047562A1 US20120047562A1 US13/288,755 US201113288755A US2012047562A1 US 20120047562 A1 US20120047562 A1 US 20120047562A1 US 201113288755 A US201113288755 A US 201113288755A US 2012047562 A1 US2012047562 A1 US 2012047562A1
- Authority
- US
- United States
- Prior art keywords
- access
- authorization
- software application
- application
- computerized apparatus
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000009826 distribution Methods 0.000 title abstract description 10
- 238000013475 authorization Methods 0.000 claims description 42
- 238000003860 storage Methods 0.000 claims description 11
- 230000004044 response Effects 0.000 claims description 7
- 238000004519 manufacturing process Methods 0.000 claims description 4
- 238000012545 processing Methods 0.000 claims description 3
- 230000003213 activating effect Effects 0.000 claims description 2
- 230000005540 biological transmission Effects 0.000 claims 1
- 238000004891 communication Methods 0.000 claims 1
- 230000000694 effects Effects 0.000 claims 1
- 230000008569 process Effects 0.000 abstract description 6
- 238000012546 transfer Methods 0.000 description 7
- 230000004913 activation Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000415 inactivating effect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Buyer or seller confidence or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/12—Accounting
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99933—Query processing, i.e. searching
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99941—Database schema or data structure
- Y10S707/99943—Generating database or data structure, e.g. via user interface
Definitions
- the present invention is directed toward a method and apparatus for providing digital data, such as software applications, to users. More specifically, the method and apparatus eliminate conventional inventory and distribution inefficiencies by transmitting digital data, along with means for activating that data, as part of originally manufactured computer systems.
- a product supplier sometimes uses offers to maintain ownership of a product until actual time of purchase by an end user as an incentive to convince end sellers to carry the products of the product supplier.
- This is well known as consignment sales.
- Consignment sales and highly accurate inventory management, e.g. just-in-time inventory management, are illustrated in the prior art with regard to product distribution in U.S. Pat. Nos. 5,912,818, 5,712,989, and 5,671,362.
- inventory issues have also changed.
- a distinct advantage enjoyed by information products over physical products is that information products can be stored with a minimal physical presence. For instance, the product may be stored on a recording media. However, under traditional models of distribution, information products are copied onto multiple physical media and to subsequently distributed just like any other physical product.
- Another option for information products is to transfer or download an electronic copy of the information over a network such as a local or wide area network, or the Internet. Such transfers, especially with regard to transfer over the Internet, are typically slower than is convenient because of the relatively low bandwidth of the network. Long transfer time is a negative factor that potentially discourages an end user from using an information product.
- DIVX Digital Video Express
- ADOBE SYSTEMS, INC. has sold a product entitled “Type on Call.”
- Type on Call stores many fonts on a CD-ROM.
- the CD-ROM is distributed to users who then must contact and pay ADOBE in order to receive an access code needed to activate one or more of the fonts.
- This art is disadvantageous because traditional distribution channels must still be used, and because a user must intervene and request an access code rather than having the computer system automatically control access.
- AOL The email, network, and Internet service provider AMERICA ONLINE, INC.
- AOL has used various methods to distribute its access software. AOL sometimes directly distributes free media containing its access software, and subsequently charges consumers for access to its connections and network. However, the software itself is not the value provided to the customer. The associated service is the value. The software is provided free of change and “as is.”
- a downside of the AOL model is that it still requires traditional distribution of media or a relatively slow download. Additionally, because there is no value assigned to the software itself, access to the software is not controlled. The access control is with regard to the associated service.
- An improved system would conveniently provide digital data to an end user quickly and with little effort so that the user would be encouraged to use the data. Supply of the data in an improved system would avoid traditional distribution channels as well as physical inventory, thereby reducing costs to all parties. An improved system would also activate automatically in response to access to the digital data and would verify access rights of a user or provide the user with options to activate access rights. Improved systems could also take advantage of unused space in a computer system's nonvolatile memory space to cost effectively record data for subsequent transfer.
- An embodiment of the invention is a method of distributing software with a computer system to a user.
- An act of the embodiment is to record data on a fixed medium in the computer system.
- Another act is to provide for transfer of the computer system to the user. Additionally, access to the data is controlled through computer executable code that requires authorization for continued access to the data.
- Another embodiment of the invention is a software module used in a computer system operable to provide controlled access to a software application being stored on a fixed medium in the computer system and being distributed with the computer system.
- the software module of the embodiment detects use of the software application on the computer system, and verifies authority to access the software application.
- Still another embodiment of the invention is a computer system operable to provide controlled access to a software application stored on a fixed medium in the computer system and distributed with the computer system.
- the embodiment may include a processor, a memory coupled to the processor, and a software module executable on the processor and the memory.
- the software module is responsive to the activation of the software application.
- the software module verifies authority to access the software application. If authority is verified, then uninterrupted access to the software application is allowed. If authority is not verified, then access to the software application is interrupted.
- FIG. 1 is a functional block diagram of a computer system of an embodiment of the invention.
- FIG. 2 is a flowchart illustrating acts of an embodiment of the invention.
- FIG. 3 is a flowchart illustrating more specific acts of embodiments illustrated in FIG. 2 .
- Embodiments of the present invention are directed toward a computer system 1 as illustrated in FIG. 1 .
- the computer system 1 can be any of a number of computer systems capable of carrying out computer executable code.
- the computer system may be, for example, an INTERNATIONAL BUSINESS MACHINES, INC. type personal computer, or IBM clone, an APPLE COMPUTER, INC. machine, a mainframe or network host computer, a personal digital assistant (PDA) or handheld, or any other computing device having the capacity to process computer executable code.
- PDA personal digital assistant
- the computer system 1 illustrated also includes a processor 2 .
- the processor 2 may be an INTEL CORPORATION or equivalent personal computer processor, SPARC processor, ALPHA processor, MIPS processor, or a processor specialized to execute instructions in any of the computer systems as exemplified above.
- the memory 3 may be system or subsystem memory of any variety that couples to the processor 2 to store programs and/or data in the computer system 1 .
- Example types of useable memory include dynamic random access Memory and programmable read only memory, as well as other types of memory as are commonly used in computer systems.
- the computer system 1 illustrated in FIG. 1 also includes a hard disk drive 4 that provides nonvolatile storage for the system.
- the hard disk drive 4 would be classified as a “fixed medium” in a computer system.
- a fixed medium is generally distinguishable from a removable media storage device in that the media, or physical part of the device on which information is stored, typically remains in the drive of the device. Examples of removable media are CD-ROM disks, floppy disks, DVD disks, and magnetic tapes.
- the hard disk drive 4 may store a software module 5 and at least one software application 6 .
- Embodiments of the computer system 1 are operable to provide controlled access to the software application 6 stored on the hard disk drive 4 .
- the software application 6 may be placed on and distributed with the hard disk drive 4 during the manufacturing process. Access control may be provided by the software module 5 .
- the software module 5 may be executable on the processor 2 and the memory 3 .
- the software module 5 is responsive to activation of the software application 6 on the computer system 1 . That is, some embodiments of the invention are capable of detecting use of the software application 6 and acting on that detection. Upon detection, the software module 5 acts to verify authority to access the software application 6 .
- FIG. 2 illustrates a method of distributing software in accordance with an embodiment of the invention.
- data is recorded on a fixed medium such as a hard disk drive at the manufacturer.
- the fixed medium could be another type of nonvolatile storage device as is known in the art of computer system manufacture.
- the fixed medium could be a fixed optical disk, a programmable read-only memory, or some other such device capable of storing information in a nonvolatile way.
- the data that is recorded on the fixed medium may include both software application program instructions and the instructions of the software module.
- the software application program instructions enable a software application that does not depend on continued access to a network for fully functional operation.
- the software application of these embodiments is a traditional software application such as a word processing application, spreadsheet application, a gaming application, or some other application that does not require continued access to a network.
- software applications requiring continued access to a network for full functionality are: Internet or network access applications, multi-player interactive Web based games, and hosted application software.
- the second set of applications are not enabled to perform their full range of functions. For instance, a Web browser could open and read a JPEG file from a computer system's hard disk drive without a connection to a network, but could not read a JPEG file from an external Web page.
- Embodiments of the present invention are capable of continuing fully functional use after only a brief authorizing act via a network.
- a computer system is transferred to a user.
- the user may be an end-user, such as a consumer, or the user could be a reseller. Transfer of the computer system to a user could be by any delivery means, including conventional means as are well known in the art.
- the executable computer code may be the code of the software module 5 of FIG. 1 as discussed above.
- controlling or verifying rights to access the data a software application in this case, may be accomplished by first detecting use of the software application, block 31 .
- the software module may be configured to verify authority to access a software application either by verifying the access, permissions of a particular user or by verifying access permissions of a particular accessing computer system.
- the right to access a software application may be automatically checked when an attempt is made to access the software application.
- the means by which access is checked is the Internet.
- the code of the software module automatically makes a connection to the Internet and presents a query to a party authorized to grant access to the software application.
- a network link other than a link to the Internet is made in the process of granting access to data such as the software application.
- the software module must interact with the authorizing party to determine a user's access authority. See block 33 of FIG. 3 .
- the software module will interact with the authorizing party to determine if a particular computer system, rather than a particular user, is authorized to access the data.
- the authorization process would include the basic steps of identifying the accessed data, identifying the accessing user or computer system, and comparing the user or computer system with those authorized to access the data.
- the response to this query would be recorded in the software module, or in a location the software module could query. Therefore, if a user or system has authority to access the data, the user or system is allowed to continue access to the data, as illustrated in block 34 .
- access to the data may be interrupted, or the function of the data may be disabled.
- the user may be presented with an opportunity to set up an account so that future access to the data will be granted.
- the act of block 33 would be determined by checking whether the user or system had sufficient account credit continue access to the data.
- users or systems with adequate qualifications could simply be billed for accessing the data regardless of the account balance.
- a user that does not have authority to access the data may be given the opportunity to set up an account and thereby gain access to the data. If the user does not wish to set up an account, the users ability to access the data may be disabled, block 36 . Alternatively, if the user does want to set up an account for continued access to the data, the user will be asked to input personal data and make payment arrangements, block 37 . Successful entry of adequate personal data and payment arrangements leads to continued access to the data, block 34 . Unsuccessful entry may lead to the disabling of access to the data, as was noted in block 36 .
- Embodiments of the invention provide digital data, such as computer application software, to an end user quickly and with little required effort by the user. The user is therefore encouraged to “impulse buy” access to a software application that the user might otherwise forego.
- digital data such as computer application software
- embodiments of the invention provide significant advances to the state of the art.
- embodiments of the present invention provide for delivery of digital data on a fixed medium in an originally manufactured computer system, there is absolutely no additional shipping or inventory cost associated with the delivery of the data.
Abstract
The present invention provides for a method and apparatus for distributing digital information, such as software applications, to application users. By providing the digital information on unused memory space of a computer system, and providing a process for authorizing access to the information, the information can be efficiently and cost effectively transferred to users. Traditional inventory and distribution channel difficulties are avoided.
Description
- The present invention is directed toward a method and apparatus for providing digital data, such as software applications, to users. More specifically, the method and apparatus eliminate conventional inventory and distribution inefficiencies by transmitting digital data, along with means for activating that data, as part of originally manufactured computer systems.
- Maintenance of inventory has long been a costly and unfortunate reality of providing products to downstream users such as resellers or customers. In order to have products on hand for use, a supplier must either maintain a large enough inventory of products to meet any use requirements, or be able to very accurately predict use requirements and control supplies at the predicted use rate. A key variable, and one often disputed among buyers and sellers in a supply chain, is who will maintain ownership of a product at different points along the supply chain. The owner of a product bears the obvious cost of the time value of money of the product for as long as the product is owned.
- A product supplier sometimes uses offers to maintain ownership of a product until actual time of purchase by an end user as an incentive to convince end sellers to carry the products of the product supplier. Traditionally, this is well known as consignment sales. Consignment sales and highly accurate inventory management, e.g. just-in-time inventory management, are illustrated in the prior art with regard to product distribution in U.S. Pat. Nos. 5,912,818, 5,712,989, and 5,671,362. As the economy has moved from a physical product distribution system to a system that includes distribution of information and information products, inventory issues have also changed.
- Many products of the modern economy are in fact information or digital data products. Examples include computer applications software, computer data files, analog and digital artistic and informational recordings, and the like. A distinct advantage enjoyed by information products over physical products is that information products can be stored with a minimal physical presence. For instance, the product may be stored on a recording media. However, under traditional models of distribution, information products are copied onto multiple physical media and to subsequently distributed just like any other physical product. Another option for information products is to transfer or download an electronic copy of the information over a network such as a local or wide area network, or the Internet. Such transfers, especially with regard to transfer over the Internet, are typically slower than is convenient because of the relatively low bandwidth of the network. Long transfer time is a negative factor that potentially discourages an end user from using an information product.
- One recent product that was introduced on a pay-as-you-use basis was Digital Video Express (DIVX). However, with DIVX a customer had to both buy digital media and pay a license fee each time the content of the media was accessed. This model did not prove commercially viable and new DIVX disks are no longer being sold. A significant problem with DIVX was the need to both buy the media and pay for its use.
- ADOBE SYSTEMS, INC. has sold a product entitled “Type on Call.” Type on Call stores many fonts on a CD-ROM. The CD-ROM is distributed to users who then must contact and pay ADOBE in order to receive an access code needed to activate one or more of the fonts. This art is disadvantageous because traditional distribution channels must still be used, and because a user must intervene and request an access code rather than having the computer system automatically control access.
- The email, network, and Internet service provider AMERICA ONLINE, INC. (AOL) has used various methods to distribute its access software. AOL sometimes directly distributes free media containing its access software, and subsequently charges consumers for access to its connections and network. However, the software itself is not the value provided to the customer. The associated service is the value. The software is provided free of change and “as is.” A downside of the AOL model is that it still requires traditional distribution of media or a relatively slow download. Additionally, because there is no value assigned to the software itself, access to the software is not controlled. The access control is with regard to the associated service.
- An improved system would conveniently provide digital data to an end user quickly and with little effort so that the user would be encouraged to use the data. Supply of the data in an improved system would avoid traditional distribution channels as well as physical inventory, thereby reducing costs to all parties. An improved system would also activate automatically in response to access to the digital data and would verify access rights of a user or provide the user with options to activate access rights. Improved systems could also take advantage of unused space in a computer system's nonvolatile memory space to cost effectively record data for subsequent transfer.
- An embodiment of the invention is a method of distributing software with a computer system to a user. An act of the embodiment is to record data on a fixed medium in the computer system. Another act is to provide for transfer of the computer system to the user. Additionally, access to the data is controlled through computer executable code that requires authorization for continued access to the data.
- Another embodiment of the invention is a software module used in a computer system operable to provide controlled access to a software application being stored on a fixed medium in the computer system and being distributed with the computer system. The software module of the embodiment detects use of the software application on the computer system, and verifies authority to access the software application.
- Still another embodiment of the invention is a computer system operable to provide controlled access to a software application stored on a fixed medium in the computer system and distributed with the computer system. The embodiment may include a processor, a memory coupled to the processor, and a software module executable on the processor and the memory. The software module is responsive to the activation of the software application. The software module verifies authority to access the software application. If authority is verified, then uninterrupted access to the software application is allowed. If authority is not verified, then access to the software application is interrupted.
-
FIG. 1 is a functional block diagram of a computer system of an embodiment of the invention. -
FIG. 2 is a flowchart illustrating acts of an embodiment of the invention. -
FIG. 3 is a flowchart illustrating more specific acts of embodiments illustrated inFIG. 2 . - Embodiments of the present invention are directed toward a
computer system 1 as illustrated inFIG. 1 . Thecomputer system 1 can be any of a number of computer systems capable of carrying out computer executable code. The computer system may be, for example, an INTERNATIONAL BUSINESS MACHINES, INC. type personal computer, or IBM clone, an APPLE COMPUTER, INC. machine, a mainframe or network host computer, a personal digital assistant (PDA) or handheld, or any other computing device having the capacity to process computer executable code. - The
computer system 1 illustrated also includes aprocessor 2. Theprocessor 2 may be an INTEL CORPORATION or equivalent personal computer processor, SPARC processor, ALPHA processor, MIPS processor, or a processor specialized to execute instructions in any of the computer systems as exemplified above. Similarly, thememory 3 may be system or subsystem memory of any variety that couples to theprocessor 2 to store programs and/or data in thecomputer system 1. Example types of useable memory include dynamic random access Memory and programmable read only memory, as well as other types of memory as are commonly used in computer systems. - The
computer system 1 illustrated inFIG. 1 also includes ahard disk drive 4 that provides nonvolatile storage for the system. Thehard disk drive 4 would be classified as a “fixed medium” in a computer system. A fixed medium is generally distinguishable from a removable media storage device in that the media, or physical part of the device on which information is stored, typically remains in the drive of the device. Examples of removable media are CD-ROM disks, floppy disks, DVD disks, and magnetic tapes. Among other information, thehard disk drive 4 may store asoftware module 5 and at least onesoftware application 6. Embodiments of thecomputer system 1 are operable to provide controlled access to thesoftware application 6 stored on thehard disk drive 4. As will be discussed in further detail below, thesoftware application 6 may be placed on and distributed with thehard disk drive 4 during the manufacturing process. Access control may be provided by thesoftware module 5. - The
software module 5 may be executable on theprocessor 2 and thememory 3. Thesoftware module 5 is responsive to activation of thesoftware application 6 on thecomputer system 1. That is, some embodiments of the invention are capable of detecting use of thesoftware application 6 and acting on that detection. Upon detection, thesoftware module 5 acts to verify authority to access thesoftware application 6. -
FIG. 2 illustrates a method of distributing software in accordance with an embodiment of the invention. As shown in the first action, block 10, data is recorded on a fixed medium such as a hard disk drive at the manufacturer. In addition to a hard disk drive, the fixed medium could be another type of nonvolatile storage device as is known in the art of computer system manufacture. For instance, the fixed medium could be a fixed optical disk, a programmable read-only memory, or some other such device capable of storing information in a nonvolatile way. The data that is recorded on the fixed medium may include both software application program instructions and the instructions of the software module. In some embodiments, the software application program instructions enable a software application that does not depend on continued access to a network for fully functional operation. In other words, the software application of these embodiments is a traditional software application such as a word processing application, spreadsheet application, a gaming application, or some other application that does not require continued access to a network. Examples of software applications requiring continued access to a network for full functionality are: Internet or network access applications, multi-player interactive Web based games, and hosted application software. Without a continuing connection to a network, the second set of applications are not enabled to perform their full range of functions. For instance, a Web browser could open and read a JPEG file from a computer system's hard disk drive without a connection to a network, but could not read a JPEG file from an external Web page. Embodiments of the present invention, on the other hand, are capable of continuing fully functional use after only a brief authorizing act via a network. - In a second act, block 20, a computer system is transferred to a user. The user may be an end-user, such as a consumer, or the user could be a reseller. Transfer of the computer system to a user could be by any delivery means, including conventional means as are well known in the art.
- By the act of
block 30, access to the data is controlled through the execution of computer code that implements authorization procedures. The executable computer code may be the code of thesoftware module 5 ofFIG. 1 as discussed above. As illustrated inFIG. 3 , controlling or verifying rights to access the data, a software application in this case, may be accomplished by first detecting use of the software application, block 31. The software module may be configured to verify authority to access a software application either by verifying the access, permissions of a particular user or by verifying access permissions of a particular accessing computer system. The right to access a software application may be automatically checked when an attempt is made to access the software application. As illustrated inblock 32 ofFIG. 3 , the means by which access is checked is the Internet. Therefore, when the software application is accessed, the code of the software module automatically makes a connection to the Internet and presents a query to a party authorized to grant access to the software application. In some systems, a network link other than a link to the Internet is made in the process of granting access to data such as the software application. - Once a link is established with a party authorized to grant access to the data, the software module must interact with the authorizing party to determine a user's access authority. See
block 33 ofFIG. 3 . In some cases, the software module will interact with the authorizing party to determine if a particular computer system, rather than a particular user, is authorized to access the data. The authorization process would include the basic steps of identifying the accessed data, identifying the accessing user or computer system, and comparing the user or computer system with those authorized to access the data. The response to this query would be recorded in the software module, or in a location the software module could query. Therefore, if a user or system has authority to access the data, the user or system is allowed to continue access to the data, as illustrated inblock 34. However, if the user or system is not authorized, access to the data may be interrupted, or the function of the data may be disabled. Alternatively, the user may be presented with an opportunity to set up an account so that future access to the data will be granted. In the circumstance where a user or computer system already has an account, the act ofblock 33 would be determined by checking whether the user or system had sufficient account credit continue access to the data. Also, rather than inactivating access to data for insufficient account credit, users or systems with adequate qualifications could simply be billed for accessing the data regardless of the account balance. - As illustrated in
block 35 ofFIG. 3 , a user that does not have authority to access the data may be given the opportunity to set up an account and thereby gain access to the data. If the user does not wish to set up an account, the users ability to access the data may be disabled, block 36. Alternatively, if the user does want to set up an account for continued access to the data, the user will be asked to input personal data and make payment arrangements, block 37. Successful entry of adequate personal data and payment arrangements leads to continued access to the data, block 34. Unsuccessful entry may lead to the disabling of access to the data, as was noted inblock 36. - Embodiments of the invention provide digital data, such as computer application software, to an end user quickly and with little required effort by the user. The user is therefore encouraged to “impulse buy” access to a software application that the user might otherwise forego. Specifically, if a user developed a data processing need during the period of ownership of a computer system, it would be a significant convenience for the user to merely activate a software application that met that need. Once activated the user would merely allow the system to automatically establish or assist in establishing the user's access permissions. Compared with the traditional process of traveling to a retail outlet to buy a software application, mail ordering a software application that must be both inventoried and delivered, or going through the relatively long process of downloading the software application, embodiments of the invention provide significant advances to the state of the art.
- Additionally, because embodiments of the present invention provide for delivery of digital data on a fixed medium in an originally manufactured computer system, there is absolutely no additional shipping or inventory cost associated with the delivery of the data.
- Most computer systems ship with significant amounts of free digital storage space that typically is not employed by a user until a significant amount of time has passed. Therefore, inclusion of data such as software applications on the free digital storage space is an efficient and valuable contribution to the state of the art. When the balance of free digital storage space is consumed, a user can simply delete the digital data provided with the computer system.
- From the foregoing it will be appreciated that, although specific embodiments of the invention have been described herein for purposes of illustration, various modifications may be made without deviating from the spirit and scope of the invention. Accordingly, the invention is not limited except as by the claims.
Claims (34)
1-29. (canceled)
30. A method of controlling access to a proprietary software application resident on a new handheld computerized apparatus sold to a purchaser, the method comprising:
receiving an initial request from the purchaser via an input device of the apparatus to access the application;
substantially automatically accessing a remote third party authorization entity via a network interface of the computerized apparatus in order to obtain an authorization to access the application;
recording information relating to the authorization on the handheld computerized apparatus for subsequent use;
accessing the application pursuant to the initial request using at least the authorization; and
receiving a subsequent request for access to the application from the purchaser; and
granting access to the application pursuant to the subsequent request based at least in part on the recorded information.
31. A method of distributing application software with a personal computerized apparatus having digital data recorded thereon, the method comprising:
recording computer readable instructions in the personal computerized apparatus, the instructions configured to, when executed by the personal computerized apparatus, substantially automatically control access to the digital data by at least:
executing, based at least in part on a first request for access to the digital data, the computer readable instructions, the executing causing the personal computerized apparatus to contact a party authorized to grant access to the digital data, the contact comprising transmission of at least a portion of the digital data; and
executing, after the party provides authorization to grant access to the digital data, the computer readable instructions, the executing causing the computerized apparatus to record at least a portion of the authorization in the personal computerized apparatus, and to grant a first access to the digital data based on the authorization;
wherein the recording of the at least portion of the authorization in the computerized apparatus enables subsequent execution of the computer readable instructions, said subsequent execution causing the computerized apparatus to grant a second access to the digital data, substantially automatically, based at least in part on receiving at least a second request for access to the digital data.
32. The method of claim 31 , wherein:
the recordation of the digital data and the recording computer readable instructions are both performed by a first party; and
the second request is received from a second party, the second party being different from the first party.
33. The method of claim 31 , wherein:
the second access does not require contact with the party authorized to grant access to the digital data; and
said contact of the party authorized to grant access to the digital data comprises accessing a network connection.
34. The method of claim 33 , wherein recordation of the software application and recording computer readable instructions are each performed during manufacture of the computerized apparatus.
35. The method of claim 33 , wherein recordation of the software application and recording computer readable instructions are each performed prior to sale of the computerized apparatus to a purchaser.
36. The method of claim 33 , wherein recordation of the software application and recording computer readable instructions are each performed based at least on a sale of the software application.
37. The method of claim 33 , wherein the authorization to grant access to the digital data is based at least in part on verifying a permission of the computerized apparatus to access the software application.
38. The method of claim 33 , wherein the software application is selected from a group consisting of: (i) a word processing application, (ii) a spreadsheet application, (iii) a gaming application, and (iv) an Internet access application.
39. The method of claim 31 wherein recordation of the digital data and the computer readable instructions are each performed based at least in part on a purchase request for the personal computerized apparatus.
40. A method of activating digitally rendered information in a portable computerized apparatus, the method comprising:
recording the digitally rendered information on at least one non-volatile storage medium of the portable computerized apparatus by a first entity;
recording computer readable instructions in the portable computerized apparatus; and
controlling access to the digitally rendered information by at least:
based at least in part on receiving a first request from a second entity to access the digitally rendered information, causing automatic execution of the computer readable instructions, the instructions causing (i) access a network link, and (ii) contact of a party authorized to grant access to the digitally rendered information;
when the party provides an authorization to grant access to the digitally rendered information, causing recording of the authorization in the portable computerized apparatus, and causing granting of a first access to the digitally rendered information based at least in part on the recorded authorization; and
based at least in part on receiving a second request from the second entity to access the digitally rendered information, granting at least a second access to the digitally rendered information based at least in part on the authorization recorded in the computerized apparatus.
41. The method of claim 40 , wherein the digitally rendered information comprises a software application, and recording the application is performed based at least in part on a purchase the software application by the second entity.
42. The method of claim 40 , wherein recording the digitally rendered information is performed by the first entity substantially at a time of manufacture or sale of the portable computerized apparatus.
43. The method of claim 42 , wherein said providing an authorization to grant access to the digitally rendered information comprises authenticating the second entity for access the software application.
44. The method of claim 42 , wherein:
the digitally rendered information comprises a software application; and
providing an authorization to grant access to the software application comprises authenticating the portable computerized apparatus for access to the software application.
45. The method of claim 40 , wherein said second entity is different than the first entity; and said second entity is a user of said portable computerized apparatus.
46. The method of claim 45 , wherein providing an authorization to grant access to the digitally rendered information comprises authenticating said user of the portable computerized apparatus for access to the digitally rendered information.
47. The method of claim 45 , further comprising causing presentation at the portable computerized apparatus of an opportunity for said user to qualify for access to the digitally rendered information if the party does not provide authorization to grant access to the digitally rendered information.
48. The method of claim 47 , wherein said opportunity to qualify for access to the digitally rendered information comprises establishment of an account associated with said user, the establishment of the account configured at least in part to effect granting of access to the digitally rendered information.
49. The method of claim 48 , wherein said opportunity to qualify for access to the digitally rendered information comprises billing the user for granting of access to the digitally rendered information.
50. Portable computer readable apparatus having a storage medium, the storage medium comprising at least one software application and at least a plurality of instructions configured to control access to the software application, the plurality of instructions being configured to, when executed, enable substantially automated control of access to the software application by at least:
based at least in part on receiving a first request for access to software application from a user, causing contact via a network link with a party authorized to grant access to the software application;
receiving an authorization to grant access to the software application;
causing recordation of at least a portion of the authorization so as to be accessible for future access to grant access to the software application; and
in response to receiving at least a second subsequent request from a user for access to the software application, granting another access to the software application based at least in part on said recorded at least portion of the authorization.
51. The apparatus of claim 50 , wherein said another access can be granted without requiring further contact with the party.
52. The apparatus of claim 50 , wherein the computer readable apparatus is distributed with a portable computerized device at time of sale thereof.
53. The apparatus of claim 52 , wherein the computer readable apparatus comprises a removable storage apparatus configured to interface with the portable computerized device.
54. The apparatus of claim 52 , wherein the computer readable apparatus comprises a programmable memory device of the portable computerized device.
55. The apparatus of claim 54 , wherein said:
first request for access is provided by a first user of the portable computerized device; and
providing an authorization to grant access to the software application comprises authenticating said user for access the software application.
56. The apparatus of claim 54 , wherein providing an authorization to grant access to the software application comprises authenticating the portable computerized device for access to the software application.
57. The apparatus of claim 56 , wherein said control of access to the software application further comprises causing presentation at the portable computerized apparatus of an opportunity to qualify for access to the software application if the party does not provide authorization to grant access to the software application.
58. Computer readable apparatus for use in a mobile computerized apparatus, the computer readable apparatus comprising a storage medium having a proprietary software application resident therein, the software application configured to:
receive an initial request from a user of the computerized apparatus to access the application;
substantially automatically cause access to a remote third party authorization entity via a network interface of the computerized apparatus in order to obtain an authorization to access the application;
record information relating to the authorization on the computerized apparatus for subsequent use;
access the application pursuant to the initial request using at least the authorization; and
receiving a subsequent request for access to the application from the user; and
grant access to the application pursuant to the subsequent request based at least in part on the recorded information.
59. A method of controlling access to a proprietary software application resident on a new handheld computerized apparatus sold to a purchaser, the method comprising:
configuring the software application so that, in response to receiving an initial request from the purchaser via an input device of the apparatus to access the application, the application:
causes, substantially automatically, an access of a remote third party authorization entity via a network interface of the computerized apparatus in order to obtain an authorization to access the application;
records information relating to the authorization on the handheld computerized apparatus for subsequent use; and
accesses the application pursuant to the initial request using at least the authorization; and
configuring the software application so that, in response to receiving a subsequent request for access to the application from the purchaser, the application grants access thereto pursuant to the subsequent request based at least in part on the recorded information.
60. A method of controlling access to a proprietary software application resident on a new handheld computerized apparatus sold to a purchaser, the method comprising:
providing from a first party the software application, the software application configured so that:
(i) in response to receiving an initial request from the purchaser via an input device of the apparatus to access the application, the application:
causes, substantially automatically, an access of a remote authorization entity via a network interface of the computerized apparatus in order to obtain an authorization to access the application;
records information relating to the authorization on the handheld computerized apparatus for subsequent use; and
accesses the application pursuant to the initial request using at least the authorization; and
(ii) in response to receiving a subsequent request for access to the application from the purchaser, the application grants access thereto pursuant to the subsequent request based at least in part on the recorded information;
receiving a communication from said computerized apparatus pursuant to said substantially automated access of said remote authorization entity requesting said authorization; and
providing at least a portion of said information to said computerized apparatus.
61. The method of claim 60 , wherein said remote authorization entity is controller or operated by said first party.
62. The method of claim 60 , wherein said remote authorization entity is operated by a third party, said third party being authorized to perform said providing of said at least portion of said information to said computerized apparatus.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/288,755 US20120047562A1 (en) | 2000-03-03 | 2011-11-03 | Software applications distribution method and apparatus |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/518,787 US7103598B1 (en) | 2000-03-03 | 2000-03-03 | Software distribution method and apparatus |
US11/501,213 US8099366B2 (en) | 2000-03-03 | 2006-08-07 | Software distribution method and apparatus |
US13/288,755 US20120047562A1 (en) | 2000-03-03 | 2011-11-03 | Software applications distribution method and apparatus |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/501,213 Continuation US8099366B2 (en) | 2000-03-03 | 2006-08-07 | Software distribution method and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
US20120047562A1 true US20120047562A1 (en) | 2012-02-23 |
Family
ID=36939600
Family Applications (7)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/518,787 Expired - Lifetime US7103598B1 (en) | 2000-03-03 | 2000-03-03 | Software distribution method and apparatus |
US11/501,213 Expired - Lifetime US8099366B2 (en) | 2000-03-03 | 2006-08-07 | Software distribution method and apparatus |
US13/227,896 Expired - Lifetime US8266063B2 (en) | 2000-03-03 | 2011-09-08 | Software distribution method and apparatus |
US13/227,730 Expired - Lifetime US9727703B2 (en) | 2000-03-03 | 2011-09-08 | Software distribution method and apparatus |
US13/234,854 Expired - Fee Related US8374969B2 (en) | 2000-03-03 | 2011-09-16 | Computer systems manufacturing method and apparatus |
US13/288,755 Abandoned US20120047562A1 (en) | 2000-03-03 | 2011-11-03 | Software applications distribution method and apparatus |
US15/670,961 Abandoned US20180025134A1 (en) | 2000-03-03 | 2017-08-07 | Software distribution method and apparatus |
Family Applications Before (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/518,787 Expired - Lifetime US7103598B1 (en) | 2000-03-03 | 2000-03-03 | Software distribution method and apparatus |
US11/501,213 Expired - Lifetime US8099366B2 (en) | 2000-03-03 | 2006-08-07 | Software distribution method and apparatus |
US13/227,896 Expired - Lifetime US8266063B2 (en) | 2000-03-03 | 2011-09-08 | Software distribution method and apparatus |
US13/227,730 Expired - Lifetime US9727703B2 (en) | 2000-03-03 | 2011-09-08 | Software distribution method and apparatus |
US13/234,854 Expired - Fee Related US8374969B2 (en) | 2000-03-03 | 2011-09-16 | Computer systems manufacturing method and apparatus |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/670,961 Abandoned US20180025134A1 (en) | 2000-03-03 | 2017-08-07 | Software distribution method and apparatus |
Country Status (1)
Country | Link |
---|---|
US (7) | US7103598B1 (en) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7640186B1 (en) | 1999-11-16 | 2009-12-29 | Cfph, Llc | Systems and methods for reselling electronic merchandise |
US7103598B1 (en) * | 2000-03-03 | 2006-09-05 | Micron Technology, Inc | Software distribution method and apparatus |
US7506053B1 (en) * | 2001-10-17 | 2009-03-17 | Cisco Technology, Inc. | Software distribution system and method |
GB0212314D0 (en) * | 2002-05-28 | 2002-07-10 | Symbian Ltd | Secure mobile wireless device |
US20070179854A1 (en) * | 2006-01-30 | 2007-08-02 | M-Systems | Media predictive consignment |
US8533847B2 (en) * | 2007-05-24 | 2013-09-10 | Sandisk Il Ltd. | Apparatus and method for screening new data without impacting download speed |
US9020993B2 (en) | 2008-12-16 | 2015-04-28 | Sandisk Il Ltd. | Download management of discardable files |
US8849856B2 (en) | 2008-12-16 | 2014-09-30 | Sandisk Il Ltd. | Discardable files |
US9104686B2 (en) | 2008-12-16 | 2015-08-11 | Sandisk Technologies Inc. | System and method for host management of discardable objects |
US8205060B2 (en) | 2008-12-16 | 2012-06-19 | Sandisk Il Ltd. | Discardable files |
US8375192B2 (en) | 2008-12-16 | 2013-02-12 | Sandisk Il Ltd. | Discardable files |
US9015209B2 (en) * | 2008-12-16 | 2015-04-21 | Sandisk Il Ltd. | Download management of discardable files |
US20100235329A1 (en) * | 2009-03-10 | 2010-09-16 | Sandisk Il Ltd. | System and method of embedding second content in first content |
US20100333155A1 (en) * | 2009-06-30 | 2010-12-30 | Philip David Royall | Selectively using local non-volatile storage in conjunction with transmission of content |
US8463802B2 (en) | 2010-08-19 | 2013-06-11 | Sandisk Il Ltd. | Card-based management of discardable files |
US8549229B2 (en) | 2010-08-19 | 2013-10-01 | Sandisk Il Ltd. | Systems and methods for managing an upload of files in a shared cache storage system |
US8788849B2 (en) | 2011-02-28 | 2014-07-22 | Sandisk Technologies Inc. | Method and apparatus for protecting cached streams |
RU2697742C1 (en) * | 2018-09-20 | 2019-08-19 | Общество с ограниченной ответственностю "Ре-Апп" | Method of establishing and tracking the relationship of the counselor's identification data with the target actions to be performed on consumer electronic devices and the system for implementing it |
CN110008759A (en) * | 2019-03-29 | 2019-07-12 | 北京中安兴坤科技有限公司 | Erasing of information method and device for storage medium |
US10867655B1 (en) | 2019-07-08 | 2020-12-15 | Micron Technology, Inc. | Methods and apparatus for dynamically adjusting performance of partitioned memory |
US11449577B2 (en) | 2019-11-20 | 2022-09-20 | Micron Technology, Inc. | Methods and apparatus for performing video processing matrix operations within a memory array |
US11853385B2 (en) | 2019-12-05 | 2023-12-26 | Micron Technology, Inc. | Methods and apparatus for performing diversity matrix operations within a memory array |
Citations (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5337357A (en) * | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
US5553143A (en) * | 1994-02-04 | 1996-09-03 | Novell, Inc. | Method and apparatus for electronic licensing |
US5754864A (en) * | 1992-04-10 | 1998-05-19 | Charles E. Hill & Associates, Inc. | Software piracy detection system |
US5758068A (en) * | 1995-09-19 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for software license management |
US5790664A (en) * | 1996-02-26 | 1998-08-04 | Network Engineering Software, Inc. | Automated system for management of licensed software |
US5864620A (en) * | 1996-04-24 | 1999-01-26 | Cybersource Corporation | Method and system for controlling distribution of software in a multitiered distribution chain |
US5893910A (en) * | 1996-01-04 | 1999-04-13 | Softguard Enterprises Inc. | Method and apparatus for establishing the legitimacy of use of a block of digitally represented information |
US5898780A (en) * | 1996-05-21 | 1999-04-27 | Gric Communications, Inc. | Method and apparatus for authorizing remote internet access |
US5905860A (en) * | 1996-03-15 | 1999-05-18 | Novell, Inc. | Fault tolerant electronic licensing system |
US5940504A (en) * | 1991-07-01 | 1999-08-17 | Infologic Software, Inc. | Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site |
US5982889A (en) * | 1997-04-30 | 1999-11-09 | Demont; Jason Paul | Method and apparatus for distributing information products |
US6044471A (en) * | 1998-06-04 | 2000-03-28 | Z4 Technologies, Inc. | Method and apparatus for securing software to reduce unauthorized use |
US6169976B1 (en) * | 1998-07-02 | 2001-01-02 | Encommerce, Inc. | Method and apparatus for regulating the use of licensed products |
US6195432B1 (en) * | 1996-03-11 | 2001-02-27 | Kabushiki Kaisha Toshiba | Software distribution system and software utilization scheme for improving security and user convenience |
US6298341B1 (en) * | 1999-09-22 | 2001-10-02 | Raredomains.Com, Llc | System and method for generating domain names and for facilitating registration and transfer of the same |
US6301666B1 (en) * | 1999-08-31 | 2001-10-09 | Everdream, Inc. | Method and apparatus for remotely enabling a preinstalled and previously disabled application on a computer system |
US6317878B1 (en) * | 1996-05-22 | 2001-11-13 | Fujitsu Limited | Information processing system and recording media |
US6442696B1 (en) * | 1999-10-05 | 2002-08-27 | Authoriszor, Inc. | System and method for extensible positive client identification |
US6468160B2 (en) * | 1999-04-08 | 2002-10-22 | Nintendo Of America, Inc. | Security system for video game system with hard disk drive and internet access capability |
US6578199B1 (en) * | 1999-11-12 | 2003-06-10 | Fujitsu Limited | Automatic tracking system and method for distributable software |
US6581044B1 (en) * | 2000-06-12 | 2003-06-17 | Sun Microsystems, Inc. | Method and apparatus for encoding license parameters within a license number for authentication purposes |
US6599194B1 (en) * | 1998-09-08 | 2003-07-29 | Darren Smith | Home video game system with hard disk drive and internet access capability |
US6732106B2 (en) * | 2000-12-08 | 2004-05-04 | Matsushita Electric Industrial Co., Ltd. | Digital data distribution system |
US6829593B1 (en) * | 1998-12-29 | 2004-12-07 | Swisscom Mobile Ag | Method and system to provide objects, especially documents, multimedia objects, software applications and/or processes to users of a telecommunications network |
US6876984B2 (en) * | 2001-05-31 | 2005-04-05 | Contentguard Holdings, Inc. | Method and apparatus for establishing usage rights for digital content to be created in the future |
US6915275B2 (en) * | 2001-06-07 | 2005-07-05 | International Business Machines Corporation | Managing customization of projects prior to manufacture in an electronic commerce system |
US6963846B1 (en) * | 2000-07-17 | 2005-11-08 | Kelly Registration Systems, Inc. | System and method of managing registration, sale, distribution and use of regulated agricultural products and the licensing/certification of dealers and applicators of agricultural products |
US6965877B2 (en) * | 2001-06-07 | 2005-11-15 | International Business Machines Corporation | Brokering and facilitating consumer projects in an e-commerce system |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5438508A (en) * | 1991-06-28 | 1995-08-01 | Digital Equipment Corporation | License document interchange format for license management system |
IL107044A0 (en) * | 1992-09-21 | 1993-12-28 | Uniloc Singapore Private Ltd | System for software registration |
FR2697357B1 (en) | 1992-10-23 | 1994-12-23 | Gemplus Card Int | Software acquisition process and computer system for implementing the process. |
US5912818A (en) | 1993-01-25 | 1999-06-15 | Diebold, Incorporated | System for tracking and dispensing medical items |
US5712989A (en) | 1993-04-02 | 1998-01-27 | Fisher Scientific Company | Just-in-time requisition and inventory management system |
JP3531978B2 (en) * | 1994-08-10 | 2004-05-31 | 富士通株式会社 | Software billing system |
JPH0887460A (en) * | 1994-09-19 | 1996-04-02 | Seiko Epson Corp | Installation system |
US5671362A (en) | 1995-04-04 | 1997-09-23 | Cowe; Alan B. | Materials monitoring systems, materials management systems and related methods |
US6233567B1 (en) * | 1997-08-29 | 2001-05-15 | Intel Corporation | Method and apparatus for software licensing electronically distributed programs |
US6226618B1 (en) * | 1998-08-13 | 2001-05-01 | International Business Machines Corporation | Electronic content delivery system |
US7225333B2 (en) * | 1999-03-27 | 2007-05-29 | Microsoft Corporation | Secure processor architecture for use with a digital rights management (DRM) system on a computing device |
US6882979B1 (en) * | 1999-06-18 | 2005-04-19 | Onadine, Inc. | Generating revenue for the use of softgoods that are freely distributed over a network |
US6564247B1 (en) * | 1999-11-18 | 2003-05-13 | International Business Machines Corporation | System and method for registering user identifiers |
US7103598B1 (en) * | 2000-03-03 | 2006-09-05 | Micron Technology, Inc | Software distribution method and apparatus |
-
2000
- 2000-03-03 US US09/518,787 patent/US7103598B1/en not_active Expired - Lifetime
-
2006
- 2006-08-07 US US11/501,213 patent/US8099366B2/en not_active Expired - Lifetime
-
2011
- 2011-09-08 US US13/227,896 patent/US8266063B2/en not_active Expired - Lifetime
- 2011-09-08 US US13/227,730 patent/US9727703B2/en not_active Expired - Lifetime
- 2011-09-16 US US13/234,854 patent/US8374969B2/en not_active Expired - Fee Related
- 2011-11-03 US US13/288,755 patent/US20120047562A1/en not_active Abandoned
-
2017
- 2017-08-07 US US15/670,961 patent/US20180025134A1/en not_active Abandoned
Patent Citations (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5940504A (en) * | 1991-07-01 | 1999-08-17 | Infologic Software, Inc. | Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site |
US5754864A (en) * | 1992-04-10 | 1998-05-19 | Charles E. Hill & Associates, Inc. | Software piracy detection system |
US5337357A (en) * | 1993-06-17 | 1994-08-09 | Software Security, Inc. | Method of software distribution protection |
US5553143A (en) * | 1994-02-04 | 1996-09-03 | Novell, Inc. | Method and apparatus for electronic licensing |
US5758068A (en) * | 1995-09-19 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for software license management |
US5893910A (en) * | 1996-01-04 | 1999-04-13 | Softguard Enterprises Inc. | Method and apparatus for establishing the legitimacy of use of a block of digitally represented information |
US5790664A (en) * | 1996-02-26 | 1998-08-04 | Network Engineering Software, Inc. | Automated system for management of licensed software |
US6195432B1 (en) * | 1996-03-11 | 2001-02-27 | Kabushiki Kaisha Toshiba | Software distribution system and software utilization scheme for improving security and user convenience |
US5905860A (en) * | 1996-03-15 | 1999-05-18 | Novell, Inc. | Fault tolerant electronic licensing system |
US5864620A (en) * | 1996-04-24 | 1999-01-26 | Cybersource Corporation | Method and system for controlling distribution of software in a multitiered distribution chain |
US5898780A (en) * | 1996-05-21 | 1999-04-27 | Gric Communications, Inc. | Method and apparatus for authorizing remote internet access |
US6317878B1 (en) * | 1996-05-22 | 2001-11-13 | Fujitsu Limited | Information processing system and recording media |
US5982889A (en) * | 1997-04-30 | 1999-11-09 | Demont; Jason Paul | Method and apparatus for distributing information products |
US6044471A (en) * | 1998-06-04 | 2000-03-28 | Z4 Technologies, Inc. | Method and apparatus for securing software to reduce unauthorized use |
US6169976B1 (en) * | 1998-07-02 | 2001-01-02 | Encommerce, Inc. | Method and apparatus for regulating the use of licensed products |
US6599194B1 (en) * | 1998-09-08 | 2003-07-29 | Darren Smith | Home video game system with hard disk drive and internet access capability |
US6769989B2 (en) * | 1998-09-08 | 2004-08-03 | Nintendo Of America Inc. | Home video game system with hard disk drive and internet access capability |
US6829593B1 (en) * | 1998-12-29 | 2004-12-07 | Swisscom Mobile Ag | Method and system to provide objects, especially documents, multimedia objects, software applications and/or processes to users of a telecommunications network |
US6712704B2 (en) * | 1999-04-08 | 2004-03-30 | Nintendo Of America Inc. | Security system for video game system with hard disk drive and internet access capability |
US6468160B2 (en) * | 1999-04-08 | 2002-10-22 | Nintendo Of America, Inc. | Security system for video game system with hard disk drive and internet access capability |
US6942573B2 (en) * | 1999-04-08 | 2005-09-13 | Nintendo Co., Ltd. | Security system for video game system with hard disk drive and internet access capability |
US6301666B1 (en) * | 1999-08-31 | 2001-10-09 | Everdream, Inc. | Method and apparatus for remotely enabling a preinstalled and previously disabled application on a computer system |
US6298341B1 (en) * | 1999-09-22 | 2001-10-02 | Raredomains.Com, Llc | System and method for generating domain names and for facilitating registration and transfer of the same |
US6442696B1 (en) * | 1999-10-05 | 2002-08-27 | Authoriszor, Inc. | System and method for extensible positive client identification |
US6578199B1 (en) * | 1999-11-12 | 2003-06-10 | Fujitsu Limited | Automatic tracking system and method for distributable software |
US6581044B1 (en) * | 2000-06-12 | 2003-06-17 | Sun Microsystems, Inc. | Method and apparatus for encoding license parameters within a license number for authentication purposes |
US6963846B1 (en) * | 2000-07-17 | 2005-11-08 | Kelly Registration Systems, Inc. | System and method of managing registration, sale, distribution and use of regulated agricultural products and the licensing/certification of dealers and applicators of agricultural products |
US6732106B2 (en) * | 2000-12-08 | 2004-05-04 | Matsushita Electric Industrial Co., Ltd. | Digital data distribution system |
US6876984B2 (en) * | 2001-05-31 | 2005-04-05 | Contentguard Holdings, Inc. | Method and apparatus for establishing usage rights for digital content to be created in the future |
US6915275B2 (en) * | 2001-06-07 | 2005-07-05 | International Business Machines Corporation | Managing customization of projects prior to manufacture in an electronic commerce system |
US6965877B2 (en) * | 2001-06-07 | 2005-11-15 | International Business Machines Corporation | Brokering and facilitating consumer projects in an e-commerce system |
Also Published As
Publication number | Publication date |
---|---|
US8099366B2 (en) | 2012-01-17 |
US7103598B1 (en) | 2006-09-05 |
US20110320312A1 (en) | 2011-12-29 |
US20110320311A1 (en) | 2011-12-29 |
US20180025134A1 (en) | 2018-01-25 |
US9727703B2 (en) | 2017-08-08 |
US20070027813A1 (en) | 2007-02-01 |
US8374969B2 (en) | 2013-02-12 |
US8266063B2 (en) | 2012-09-11 |
US20120011023A1 (en) | 2012-01-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8266063B2 (en) | Software distribution method and apparatus | |
US6799084B2 (en) | Data vending system | |
CA2539211C (en) | Point-of-sale activation of media device account | |
US6655580B1 (en) | System and method for renting or purchasing digital media | |
KR100202768B1 (en) | Contents sales system | |
US9652732B1 (en) | Processing a return request | |
US20040064374A1 (en) | Network-based system and method for retail distribution of customized media content | |
CN101329712A (en) | Method and apparatus for authorizing a software product to be used on a computer system | |
WO1995034857A1 (en) | Apparatus and method for controlling the registration, paid licensing and metered usage of software products | |
US20010011249A1 (en) | Electronic money card, electronic money receiving/paying machine, and electronic money card editing device. | |
US20050044049A1 (en) | License and privilege management method in digital contents sale | |
JP2003029861A (en) | Method for supplying application program, application program to be used for the method and recording medium with the program recorded thereon | |
US20060089911A1 (en) | Method for transferring purchased and downloaded content to a new information handling system by consuming additional content rights | |
US20020091693A1 (en) | Software program providing system and software program providing method | |
JP2003216872A (en) | Method and program for providing rental software | |
US11615375B2 (en) | Electronic management of supply chain factoring with shared state storage in a distributed ledger | |
WO1994016508A9 (en) | Software evaulation and distribution apparatus, system, and method | |
WO1994016508A1 (en) | Software evaulation and distribution apparatus, system, and method | |
KR980004191A (en) | Data vending machine and its management method | |
JP2002123700A (en) | Data right purchasing/selling device and recording medium with data right purchase/sales program recorded | |
JP2003331141A (en) | Download vending system for charged software | |
JP2002123760A (en) | Information distributing system, information distributing device, information receiving device, recording medium stored with information distributing program and recording medium stored with information receiving program | |
KR20120116060A (en) | Digital contents distribution system, medhod and data structure thereof | |
KR20050037333A (en) | System and method for providing partial payment in the electronic commerce | |
JP2002297253A (en) | Software accounting method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |