System and method for creating and running protected information
First Claim
1. A method for creating protected information to be accessed by a user, the method comprising:
- generating a first feature of protected information to be accessed by the user, the first feature being accessible to the user after the user communicates with a licensing system and acquires a first password from the licensing system; and
generating a second feature of the protected information to be accessed by the user, the second feature being accessible to the user after the user communicates with the licensing system and acquires a second password from the licensing system;
wherein the first and second passwords are distinct.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus of encouraging distribution, registration, and purchase of free copyable software and other digital information which is accessed on a User'"'"'s System via a Programmer'"'"'s Program. Software tools which can be incorporated into a Programmer'"'"'s Program allow the User to access Advanced Features of the Programmer'"'"'s Program only in the presence of a valid Password which is unique to a particular Target ID generated on an ID-Target such as the User'"'"'s System. Advanced features will thus re-lock if the Password is copied to another ID-target. If a valid Password is not present, the User is invited to obtain one, and provided with the means of doing so, and of installing that Password in a place accessible to the User'"'"'s System on subsequent occasions. The present invention also provides Programmers with means to invoke business operations as well as computational operations with their programs, and thus to automatically obtain payment from Users who elect to obtain passwords.
93 Citations
69 Claims
-
1. A method for creating protected information to be accessed by a user, the method comprising:
-
generating a first feature of protected information to be accessed by the user, the first feature being accessible to the user after the user communicates with a licensing system and acquires a first password from the licensing system; and
generating a second feature of the protected information to be accessed by the user, the second feature being accessible to the user after the user communicates with the licensing system and acquires a second password from the licensing system;
whereinthe first and second passwords are distinct. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for creating protected information to be accessed by a user, the system comprising:
-
a user;
a licensing system; and
a creator, the creator effective to generate a first feature of protected information to be accessed by the user, the first feature being accessible to the user after the user communicates with the licensing system and acquires a first password from the licensing system; and
generate a second feature of the protected information to be accessed by the user, the second feature being accessible to the user after the user communicates with the licensing system and acquires a second password from the licensing system;
wherein the first and second passwords are distinct. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method for accessing protected information, the method comprising:
-
requesting access to a first feature of protected information, the protected information including the first feature accessible only with a first password, and the protected information further including a second feature accessible only with a second password, the first and second passwords being distinct; and
accessing the first feature without being able to access the second feature. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A method for enabling a user to access protected information, the method comprising:
-
receiving a request for access to a first feature of protected information from a user, the protected information including the first feature accessible only with a first password, and the protected information further including a second feature accessible only with a second password, the first and second passwords being distinct; and
enabling the user access the first feature without being able to access the second feature. - View Dependent Claims (33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A system for enabling a user to access protected information, the system comprising:
-
a user; and
a licensing server;
whereinthe licensing server receives a request for access to a first feature of protected information from the user, the protected information including the first feature accessible only with a first password, and the protected information further including a second feature accessible only with a second password, the first and second passwords being distinct; and
the licensing server sends the first password to the user, the first password enabling the user to access the first feature without being able to access the second feature. - View Dependent Claims (42, 43, 44, 45, 46)
-
-
47. A method for storing a program, the method comprising:
-
storing first code effective to perform a function on a digital device for a user;
storing protected information in association with the first code, the protected information accessible only with a password; and
storing second code in association with the protected information, the second code effective to enable a user to request the password to access the protected information. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56)
-
-
57. A computer readable storage medium produced by the steps of
storing first code effective to perform a function; -
storing protected information in association with the first code, the protected information accessible only with a password; and
storing second code in association with the protected information, the second code effective to enable a user to request the password to access the protected information. - View Dependent Claims (58, 59, 60, 61)
-
-
62. A computer readable storage medium having stored thereon:
-
first code effective to perform a function;
protected information in association with the first code, the protected information accessible only with a password; and
second code in association with the protected information, the second code effective to enable a user to request the password to access the protected information. - View Dependent Claims (63, 64, 65, 66)
-
-
67. A method for enabling access to protected information using a digital device, the method comprising:
-
receiving a request to access a first program;
enabling access to the first program using the digital device;
receiving a request to access protected information while the first program is being accessed;
in response to the request to access the protected information, awakening a second program from a dormant state, the second program includes the steps of;
checking the digital device for the first password; and
when the digital device does not include the first password, requesting the first password from a licensing system; and
providing the protected information in response to a password received from the licensing system. - View Dependent Claims (68, 69)
-
Specification