Providing access to software over a network via keys
First Claim
1. A method of providing access to software over a network to a plurality of computers, the method comprising:
- generating a plurality of keys, wherein the keys are associated with a single organization, and validity of at least one of the keys is controllable separately from another one of the keys;
receiving a received key out of the keys in a request for software associated with the received key; and
over the network, selectively providing access to the software associated with the received key based on whether the received key is valid.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for providing access to software is described. A network reference (e.g., a URL) comprising a key is provided to a computer in an organization. The key can be used to download software. The key can be associated with data such as identifiers for the organization or groups within the organization. Additional network references comprising other keys also may be provided for other groups within the organization. The network reference can be generated via a request over a network in an application service provider scenario. When a request for software associated with the key is received, the key can be validated by comparing against a set of valid keys stored in a data center. Keys can be individually revoked within an organization. Downloading computers can access server computers via a web browser over an Internet connection. A node requesting software via a key can be placed into the group associated with the key. The key can be used to install agent software by which software administration in an application service provider scenario can be accomplished.
180 Citations
38 Claims
-
1. A method of providing access to software over a network to a plurality of computers, the method comprising:
-
generating a plurality of keys, wherein the keys are associated with a single organization, and validity of at least one of the keys is controllable separately from another one of the keys;
receiving a received key out of the keys in a request for software associated with the received key; and
over the network, selectively providing access to the software associated with the received key based on whether the received key is valid. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 30)
-
-
9. A method of generating a key for providing access to software associated with the key to a plurality of nodes within an organization, the method comprising:
-
generating a key;
associating the key with the organization;
associating the key with a group; and
providing the key for distribution to a node whereat software associated with the key is to be installed;
wherein at least one other key can be associated with the organization and is separately revocable. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method of administering software at a node, the method comprising:
-
from the node, receiving a request for software associated with a key, wherein the key is associated with a group;
responsive to the request, providing the software associated with the key;
receiving a node identifier identifying the node; and
responsive to receiving the node identifier identifying the node, associating the node with the group for purposes of software administration. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A method of downloading software from a server computer to a downloading computer, wherein the downloading computer is one of a plurality of computers associated with an organization, the method comprising:
-
accessing the server computer with the downloading computer; and
requesting a download of software, wherein the requesting comprises providing a key as input to the server computer;
wherein the accessing comprises processing a network reference comprising the key, and wherein the key is one of a plurality of keys associated with the organization. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
-
27. A method of presenting a user interface for generating a network reference comprising a token for installing software at one or more computers, the method comprising:
-
receiving a request to create the network reference comprising the token for installing software at one or more computers;
receiving an indication of a named group within an organization with which computers receiving the network reference are to be associated; and
presenting the network reference comprising a token for installing software at one or more computers. - View Dependent Claims (28)
-
-
29. A computer-implemented method of installing agent software at a computer operated by an organization to facilitate anti-virus software administration at the computer, the method comprising:
-
receiving a reference to a uniform resource locator comprising a token, wherein the token is associated with a named group, and more than one token can be provided per organization;
based on the token, providing a dynamically-generated web page comprising a software component operable to initiate installation of the agent software;
after installing the agent software at the computer, receiving from the agent an indication of a node identifier associated with the computer;
based on the node identifier, associating the computer with the named group in a database;
receiving a query from the computer regarding anti-virus software to be installed at the computer; and
providing a release of anti-virus software to the computer based on the named group with which the computer is associated.
-
-
31. A system for downloading software over a network, the system comprising:
-
a data center operable to generate network references comprising a key for authorizing downloading of software, wherein the key is one of a plurality of keys associated with an organization; and
a communication link to a network, wherein the communication link is operable to allow communication between the data center and an accessing computer operable to access the data center. - View Dependent Claims (32, 33)
-
-
34. A system for receiving tokens for installation of software, the system comprising:
-
means for receiving a received token;
means by which the received token is associated with a group, wherein more than one group can be associated with an organization;
means for determining whether the token is valid; and
means for receiving a node identifier from a node; and
means for, upon receiving the node identifier and the token, associating the node of the node identifier with the group associated with the received token.
-
-
35. An install string-comprising:
a token for providing access to software over a network, wherein the token is one of a plurality of tokens associated with an organization. - View Dependent Claims (36, 37, 38)
Specification