Systems and methods for licensing and providing selective access to network applications
First Claim
Patent Images
1. A method of selectively providing user access to a network application, comprising the steps of:
- issuing a first key to a user, wherein said first key gives said user access to an input record format associated with said network application, wherein further said input record format includes a first key field and a second key field;
issuing a second key to said user;
receiving an input from said user, said input associated with said network application and formatted according to said input record format; and
allowing said network application to process said input if said first key field of said input contains said first key and said second key field of said input contains said second key.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention provides systems and methods for controlling access to networked applications. An embodiment of the invention discloses using developer and access keys to validate and control user access to one or more network applications. The network access and licensing system disclosed includes a customer computer, one or more network tools, and an access application configured to issue and license the use of developer and access keys.
-
Citations
32 Claims
-
1. A method of selectively providing user access to a network application, comprising the steps of:
-
issuing a first key to a user, wherein said first key gives said user access to an input record format associated with said network application, wherein further said input record format includes a first key field and a second key field;
issuing a second key to said user;
receiving an input from said user, said input associated with said network application and formatted according to said input record format; and
allowing said network application to process said input if said first key field of said input contains said first key and said second key field of said input contains said second key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method to allow an application provider to track access to network applications by users of third-party software, said method comprising the steps of:
-
issuing a first key to a developer of said third-party software, wherein said first key is common to a plurality of users of said third-party software;
issuing a second key to a user, wherein said user is one of said plurality of users of said third-party software;
requiring that said first and second keys be provided to access said network application; and
tracking said access to said network application by said first and second keys. - View Dependent Claims (11, 12, 13, 14, 15, 17, 18, 19)
-
-
16. A system for selectively providing a user with access to an application over a network, the system comprising:
-
a customer computer;
an access application in electronic communication with said customer computer via a network; and
a network application in electronic communication with said access application and said customer computer;
wherein said access application is configured to issue a developer key and access key to said customer computer, and allow access to said network application upon receipt from said customer computer of input that includes said developer and access keys.
-
-
20. A system for selectively providing a user with access to an online tool over a network, the system comprising:
-
a customer computer;
an access control application in electronic communication with said customer computer via said network, said access control application configured to authorize said user to access said online tool, and said access control application further configured to issue a developer key and access key to said authorized user; and
an access tracking application in electronic communication with said access control application, said access tracking application configured track said authorized user access to said online tool.
-
-
21. A method for selectively providing access to software over a network, comprising the steps of:
-
issuing a first developer key to a first third-party developer and a second developer key to a second third-party developer, wherein said first third-party developer is associated with a first client application and said second third-party developer is associated with a second client application;
issuing a first access key to a first user, wherein said first user is one of a first plurality of users that access said software via said first client application;
issuing a second access key to a second user, wherein said second user is one of a second plurality of users that access said software via said second client application; and
providing access to said software to said first and second users. - View Dependent Claims (22, 23, 24, 25, 26, 28, 29, 30, 31, 32)
-
-
27. A system for selectively enabling and disabling access to a software application, the system comprising:
-
a first client application residing on a first and second computer system;
a second client application residing on a third computer system;
an access application residing on a software provider system;
wherein said access application is configured to associate a first developer key with said first client application, and to associate a second developer key with said second client application;
wherein said access application is configured to associate a first access with said first computer system, associate a second access key with said second computer system, and associate a third access key with said third computer system; and
wherein further said access application is configured to enable access to said software application by said first computer system upon receipt of an input containing at least one of said first developer key and said first access key; and
is configured to enable access to said software application by said second computer system upon receipt of an input containing at least one of said first developer key and said second access key; and
is configured to enable access to said software application by said third computer system upon receipt of an input containing at least one of said second developer key and said third access key.
-
Specification