System and method for selling protected information in an oem context
First Claim
1. A method for enabling access to a software program, the method comprising:
- loading a plurality of software programs on to a hard drive of a computer, the software programs being at least partially inaccessible to a user without a password, the loading being performed by a first entity, the software programs being created by at least a second entity distinct from the first entity;
selling the computer to a user;
thereafter, receiving a request from the user to access a select software program; and
forwarding the password to the user.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus of encouraging distribution, registration, and purchase of free copyable software and other digital information which is accessed on a User'"'"'s System via a Programmer'"'"'s Program. Software tools which can be incorporated into a Programmer'"'"'s Program allow the User to access Advanced Features of the Programmer'"'"'s Program only in the presence of a valid Password which is unique to a particular Target ID generated on an ID-Target such as the User'"'"'s System. Advanced features will thus re-lock if the Password is copied to another ID-target. If a valid Password is not present, the User is invited to obtain one, and provided with the means of doing so, and of installing that Password in a place accessible to the User'"'"'s System on subsequent occasions. The present invention also provides Programmers with means to invoke business operations as well as computational operations with their programs, and thus to automatically obtain payment from Users who elect to obtain passwords.
-
Citations
31 Claims
-
1. A method for enabling access to a software program, the method comprising:
-
loading a plurality of software programs on to a hard drive of a computer, the software programs being at least partially inaccessible to a user without a password, the loading being performed by a first entity, the software programs being created by at least a second entity distinct from the first entity;
selling the computer to a user;
thereafter, receiving a request from the user to access a select software program; and
forwarding the password to the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for accessing software, the method comprising:
-
purchasing a computer, the computer including a plurality of software programs stored on a hard drive, the plurality of software programs being at least partially inaccessible to a user without a password, the software programs being loaded on the computer by a first entity, the software programs being created by at least a second entity distinct from the first entity;
requesting access to a select software program;
requesting the password;
receiving the password; and
using the password to access the select software program. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification