SOFTWARE DELIVERY MODELS
First Claim
1. A method, comprising:
- receiving a request, at a remote server from an end user system, to download at least one software application to the end user system;
installing, on the end user system by the remote server, a software agent module configured to control user access to the at least one software application and configured to monitor the usage of the at least one software application;
provisioning, by the remote server, a software encryption key and controlling the end user system to store the software encryption key on the end user system; and
downloading, by the remote server to the end user system, the software application and encrypting the software application using the software encryption key.
1 Assignment
0 Petitions
Accused Products
Abstract
Generally, this disclosure describes software delivery systems (and methods). A server is provided that operates to provision software on a customer'"'"'s local machine. The server system, in response to a software purchase from an end user (customer), is configured to install the software on the customer'"'"'s machine, encrypt the software, and provision encryption keys to grant the customer access to the software. In addition, a software agent is installed on the customer'"'"'s machine that enables monitoring, by the server, of the customer'"'"'s installed software. The server system is configured to control customer access to the installed software, via the software agent, and to terminate customer access to the software (for example, for nonpayment of fees). Thus, the software provider can retain control over software that is remotely deployed at an end user location.
-
Citations
24 Claims
-
1. A method, comprising:
-
receiving a request, at a remote server from an end user system, to download at least one software application to the end user system; installing, on the end user system by the remote server, a software agent module configured to control user access to the at least one software application and configured to monitor the usage of the at least one software application; provisioning, by the remote server, a software encryption key and controlling the end user system to store the software encryption key on the end user system; and downloading, by the remote server to the end user system, the software application and encrypting the software application using the software encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A software distribution system, comprising:
a server system configured to communicate with an end user system;
the server system is further configured to;receive a request, from the end user system, to download at least one software application to the end user system; install, on the end user system, a software agent module configured to control user access to the at least one software application and configured to monitor the usage of the at least one software application; provision a software encryption key and control the end user system to store the software encryption key on the end user system; and download, to the end user system, the software application and encrypt the software application using the software encryption key. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
17. A computer-readable storage medium having instructions stored thereon which when executed by a processor result in the following operations comprising:
-
receiving a request, at a remote server from an end user system, to download at least one software application to the end user system; installing, on the end user system by the remote server, a software agent module configured to control user access to the at least one software application and configured to monitor the usage of the at least one software application; provisioning, by the remote server, a software encryption key and controlling the end user system to store the software encryption key on the end user system; and downloading, by the remote server to the end user system, the software application and encrypting the software application using the software encryption key. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification