SOFTWARE DISTRIBUTION METHOD AND APPARATUS
7 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides for a method and apparatus for distributing digital information, such as software applications, to application users. By providing the digital information on unused memory space of a computer system, and providing a process for authorizing access to the information, the information can be efficiently and cost effectively transferred to users. Traditional inventory and distribution channel difficulties are avoided.
39 Citations
73 Claims
-
1-29. -29. (canceled)
-
30. A method of controlling access to a proprietary software application resident on a new computerized apparatus sold to a purchaser, the method comprising:
-
receiving an initial request from the purchaser via an input device of the apparatus to utilize the application; substantially automatically accessing a remote third party authorization entity via a network interface of the computerized apparatus in order to obtain an authorization to access the application; recording information relating to the obtained authorization on the computerized apparatus for subsequent use; accessing the application pursuant to the initial request using at least the authorization; and receiving a subsequent request for access to the application from the purchaser; and granting access to the application pursuant to the subsequent request based at least in part on the recorded information and without having to contact said third party again.
-
-
31. A computer-implemented method of controlling access to digital data in a computer apparatus, the data having been recorded on a non-volatile storage device of the computer apparatus, the method comprising:
recording in the computer apparatus a plurality of computer readable instructions, the instructions configured to, when executed by the computer apparatus, control access to the digital data by at least; based at least in part on receiving a first request for access to the digital data from a first entity, causing the computer apparatus to contact a party authorized to grant access to the digital data; receiving authorization to grant access to the digital data; causing the computer apparatus to record at least a portion of the received authorization in the computerized apparatus, and grant access to the digital data based at least in part on the authorization; and in response to receiving at least a second request for access to the digital data, cause the computer apparatus to grant another access to the digital data based on the at least portion of the authorization recorded in the computer apparatus, and without further contact with the party. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
48. A method of distributing software with a computerized apparatus having digital data recorded thereon, the method comprising:
-
recording computer readable instructions in the computerized apparatus, the instructions configured to, when executed by the computerized apparatus, substantially automatically control access to the digital data by at least; based at least in part on a first request for access to the digital data, executing the computer readable instructions causing the computerized apparatus to contact a party authorized to grant access to the digital data, the contact comprising transmission of at least a portion of the digital data; and when the party provides authorization to grant access to the digital data, executing the computer readable instructions causing the computerized apparatus to record at least a portion of the authorization in the computerized apparatus, and grant a first access to the digital data based on the authorization; wherein the recording of the at least portion of the authorization in the computerized apparatus enables subsequent execution of the computer readable instructions, said subsequent execution causing the computerized apparatus to grant a second access to the digital data substantially automatically based at least in part on receiving at least a second request for access to the digital data, the second access not requiring contact with the party authorized to grant access to the digital data. - View Dependent Claims (49, 50, 51, 52, 53, 54, 55, 56)
-
-
57. A method of distributing a software application with a computerized apparatus, the method comprising:
-
recording the software application on a non-volatile storage device in the computerized apparatus by a first entity; recording a plurality of computer readable instructions in the computerized apparatus by the first entity; and arranging for a transfer of the computerized apparatus to a second entity; wherein the plurality of instructions are configured to enable substantially automated control of access to the software application by at least; based at least in part on receiving a first request for access to software application from the second entity, causing the computerized apparatus to contact via a network a party authorized to grant access to the software application; receiving authorization to grant access to the software application; causing the computerized apparatus to record at least a portion of the received authorization in the computerized apparatus, and grant access to the software application based at least in part on the authorization; and in response to receiving at least a second request from the second entity for access to the software application, causing the computerized apparatus to grant another access to the software application based on the authorization recorded in the computerized apparatus, said another access being granted without requiring further contact with the party. - View Dependent Claims (58, 59, 60, 61, 62, 63, 64, 65)
-
-
66. A method of controlling access to digitally rendered information in a computerized apparatus, the method comprising:
-
recording the digitally rendered information on at least one non-volatile storage medium of the computerized apparatus by a first entity; recording computer readable instructions in the computerized apparatus; and controlling access to the digitally rendered information by at least; based at least in part on receiving a first request from a second entity to access the digitally rendered information, causing automatic execution of the computer readable instructions adapted to (i) access a network link, and (ii) to contact a party authorized to grant access to the digitally rendered information; when the party provides an authorization to grant access to the digitally rendered information, cause recording of the authorization in the computerized apparatus, and causing granting of a first access to the digitally rendered information based at least in part on the recorded authorization; and based at least in part on receiving a second request from the second entity to access the digitally rendered information, granting at least a second access to the digitally rendered information based at least in part on the authorization recorded in the computerized apparatus, and without further contact with the party. - View Dependent Claims (67, 68, 69, 70, 71, 72, 73)
-
Specification