Method and system for supplying a custom software image to a computer system
First Claim
1. A software transport package comprising:
- a software transport medium storing a software image, the software image being configured for downloading to and execution on a single unique computer, said software transport medium including a first tag identification file having an identification tag keyed to an identifier of the computer; and
a software download medium storing a download program, the download program for controlling a downloading of the software image to a storage of the computer, said software download medium including a second tag identification file having an identification tag keyed to the identifier of the computer and an identification tag identifying the first tag identification file, wherein said software transport medium, said software download medium, and the computer are mutually keyed so that the software image is downloadable to the storage of only the single unique computer and no other, wherein the download program includes a routine executable by the computer for accessing the first tag identification file via identification information in the second tag identification file, accessing the identifier, mutually comparing the identifier to the identification tags in the first and second tag identification files, and transferring the software image from the software transport medium to the storage only if the identifier corresponds to the identification tags.
12 Assignments
0 Petitions
Accused Products
Abstract
A method and system for supplying a software image to a computer system utilize a custom-programmed compact disk (CD) ROM that is configured for a specified individual computer system and constrained to be downloaded to and operable on only the specified individual computer system. The method and system further utilize an installation procedure for restoring the specified computer system to the software state that the computer was in at the time the computer left the factory after initial configuration and downloading. The custom-programmed CD ROM 106 is delivered to a customer in combination with a bootable flexible diskette 108, and an instructional technical instruction sheet for usage by the customer to restore the computer system to a “factory new” software condition.
150 Citations
51 Claims
-
1. A software transport package comprising:
-
a software transport medium storing a software image, the software image being configured for downloading to and execution on a single unique computer, said software transport medium including a first tag identification file having an identification tag keyed to an identifier of the computer; and
a software download medium storing a download program, the download program for controlling a downloading of the software image to a storage of the computer, said software download medium including a second tag identification file having an identification tag keyed to the identifier of the computer and an identification tag identifying the first tag identification file, wherein said software transport medium, said software download medium, and the computer are mutually keyed so that the software image is downloadable to the storage of only the single unique computer and no other, wherein the download program includes a routine executable by the computer for accessing the first tag identification file via identification information in the second tag identification file, accessing the identifier, mutually comparing the identifier to the identification tags in the first and second tag identification files, and transferring the software image from the software transport medium to the storage only if the identifier corresponds to the identification tags. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
an instruction sheet for directing a user in usage of the software download medium and the download program for controlling downloading of the software image to the storage.
-
-
3. The software transport package according to claim 1 wherein:
-
the computer further includes a first media drive and a second media drive;
said software transport medium is loadable to the first media drive; and
said software download medium is loadable to the second media drive, further wherein, upon execution by the computer, the download program controls the downloading of the software image from the software transport medium to the storage.
-
-
4. The software transport package according to claim 3 wherein:
the download program controls reformatting of the storage prior to downloading of the software image from the software transport medium to the storage.
-
5. The software transport package according to claim 4 wherein:
the download program controls displaying of a warning message and waiting for intervention prior to reformatting of the storage.
-
6. The software transport package according to claim 3 wherein:
the download program controls clearing of the storage prior to downloading of the software image from the software transport medium to the storage.
-
7. The software transport package according to claim 6 wherein:
the download program controls displaying of a warning message and waiting for intervention prior to clearing of the storage.
-
8. The software transport package according to claim 1 wherein:
-
the computer includes a compact disk (CD) ROM drive and a diskette drive, and the storage is a hard disk drive;
the software transport medium includes a CD ROM; and
the software download medium includes a diskette.
-
-
9. A software transport package comprising:
-
a software transport medium storing a software image, the software image being configured for downloading to and execution on a single unique computer encoded with a unique identifier that distinguishes the computer from all other computers, said software transport medium including a first identification file that is keyed with the unique identifier; and
a software download medium storing a download program, the download program for controlling a downloading of the software image to a storage of the computer, said software download medium including a second identification file that is keyed with the unique identifier, wherein said software transport medium, said software download medium, and the computer are mutually keyed so that the software image is downloadable to the storage of only the single unique computer and no other, wherein the download program includes a routine executable by the computer for accessing the first and second identification files, accessing the identifier, mutually comparing the identifier to identification keys in the first and second identification files, and transferring the software image from the software transport medium to the storage only if the identifier corresponds to the identification keys. - View Dependent Claims (10)
the second identification file is keyed with the unique identifier and keyed with an identifier of the first identification file, further wherein the download program includes a routine executable by the computer for accessing the first identification file via identification information in the second identification file.
-
-
11. A software transport package comprising:
-
a software transport medium storing a software image, the software image being configured for downloading to and execution on a single unique computer encoded with a unique identifier that distinguishes the computer from all other computers, said software transport medium including a first identification file that is keyed with the unique identifier and a randomly-generated number; and
a software download medium storing a download program, the download program for controlling a downloading of the software image to a storage of the computer, said software download medium including a second identification file that is keyed with the unique identifier and the randomly-generated number, wherein said software transport medium, said software download medium, and the computer are mutually keyed so that the software image is downloadable to the storage of only the single unique computer and no other, wherein the download program includes a routine executable by the computer for accessing the first and second identification files, accessing the identifier, mutually comparing a randomly-generated number key in the first identification file with a randomly-generated number key in the second indentification file, mutually comparing the identifier to identification keys in the first and second identification files, and transferring the software image from the software transport medium to the storage only if the randomly-generated number key of the first identification file corresponds to the randomly-generated number key of the second identification file and the identifier corresponds to the identification keys.
-
-
12. A computer program product including computer usable media having computable readable code embodied therein comprising:
-
a software transport medium storing a software image, the software image being configured for downloading to and execution on a single unique computer, the software transport medium including a first tag identification file having an identification tag keyed to an identifier of the computer; and
a software download medium storing a download program, the download program for controlling a downloading of the software image to a storage of the computer, the software download medium including a second tag identification file having an identification tag keyed to the identifier of the computer and an identification tag identifying the first tag identification file, wherein the software transport medium, the software download medium, and the computer are mutually keyed so that the software image is downloadable to the storage of only the single unique computer and no other, wherein the download program includes a routine executable by the computer for accessing the first tag identification file via identification information in the second tag identification file, accessing the identifier, mutually comparing the identifier to the identification tags in the first and second tag identification files, and transferring the software image from the software transport medium to the storage only if the identifier corresponds to the identification tags. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
an instruction sheet for directing a user in usage of the software download medium and the download program for controlling downloading of the software image to the storage.
-
-
14. The computer program product according to claim 12 wherein:
-
the computer further includes a first media drive and a second media drive;
the software transport medium is loadable to the first media drive; and
the software download medium is loadable to the second media drive, further wherein upon execution by the computer, the download program controls the downloading of the software image from the software transport medium to the storage.
-
-
15. The computer program product according to claim 14 wherein:
the download program controls reformatting of the storage prior to downloading of the software image from the software transport medium to the storage.
-
16. The computer program product according to claim 15 wherein:
the download program controls displaying of a warning message and waiting for intervention prior to reformatting of the storage.
-
17. The computer program product according to claim 14 wherein:
the download program controls clearing of the storage prior to downloading of the software image from the software transport medium to the storage.
-
18. The computer program product according to claim 17 wherein:
the download program controls displaying of a warning message and waiting for intervention prior to clearing of the storage.
-
19. The computer program product according to claim 12 wherein;
-
the computer includes a compact disk (CD) ROM drive and a diskette drive, and the storage is a hard disk drive;
the software transport medium includes a CD ROM; and
the software download medium includes a diskette.
-
-
20. A computer program product including computer usable media having computable readable code embodied therein comprising:
-
a software transport medium storing a software image, the software image being configured for downloading to and execution on a single unique computer encoded with a unique identifier that distinguishes the computer from all other computers, the software transport medium including a first identification file that is keyed with the unique identifier; and
a software download medium storing a download program, the download program for controlling a downloading of the software image to a storage of the computer, the software download medium including a second identification file that is keyed with the unique identifier, wherein the software transport medium, the software download medium, and the computer are mutually keyed so that the software image is downloadable to the storage of only the single unique computer and no other, wherein the download program includes a routine executable by the computer for accessing the first and second identification files, accessing the identifier, mutually comparing the identifier to identification keys in the first and second identification files, and transferring the software image from the software transport medium to the storage only if the identifier corresponds to the identification keys. - View Dependent Claims (21)
the second identification file is keyed with the unique identifier and keyed with an identifier of the first identification file, further wherein the download program includes a routine executable by the computer for accessing the first identification file via identification information in the second identification file.
-
-
22. A computer program product including computer usable media having computable readable code embodied therein comprising:
-
a software transport medium storing a software image, the software image being configured for downloading to and execution on a single unique computer encoded with a unique identifier that distinguishes the computer from all other computers, the software transport medium including a first identification file that is keyed with the unique identifier and a randomly-generated number; and
a software download medium storing a download program, the download program for controlling a downloading of the software image to a storage of the computer, the software download medium including a second identification file that is keyed with the unique identifier and the randomly-generated number, wherein the software transport medium, the software download medium, and the computer are mutually keyed so that the software image is downloadable to the storage of only the single unique computer and no other, wherein the download program includes a routine executable by the computer for accessing the first and second identification files, accessing the identifier, mutually comparing a randomly-generated number key in the first identification file with a randomly-generated number key in the second indentification file, mutually comparing the identifier to identification keys in the first and second identification files, and transferring the software image from the software transport medium to the storage only if the randomly-generated number key of the first identification file corresponds to the randomly-generated number key of the second identification file and the identifier corresponds to the identification keys.
-
-
23. A computer comprising:
-
a processor;
a storage coupled to the processor, the storage for storing a software image that is executable by the processor;
a first media drive coupled to the processor;
a second media drive coupled to the processor; and
a software transport package, wherein the software transport package includes;
a software transport medium that is loadable to the first media drive, the software transport medium storing the software image, the software image being configured for downloading to and execution on a single identified computer, the software transport medium including a first tag identification file having an identification tag keyed to an identifier of said computer; and
a software download medium that is loadable to the second media drive, the software download medium storing a download program, the download program for controlling a downloading of the software image to the storage of the computer, the software download medium including a second tag identification file having an identification tag keyed to the identifier of the computer and an identification tag identifying the first tag identification file, wherein the software transport medium, the software download medium, and said computer are mutually keyed so that the software image is downloadable to the storage of only the single identified computer and no other, wherein the download program includes a routine executable by said processor for accessing the first tag identification file via identification information in the second tag identification file, accessing the identifier, mutually comparing the identifier to the identification tags in the first and second tag identification files, and transferring the software image from the software transport medium to the storage only if the identifier corresponds to the identification tags. - View Dependent Claims (24, 25, 26, 27, 28, 29)
the download program controls clearing of said storage prior to downloading of the software image to said storage.
-
-
25. The computer according to claim 24 wherein:
the download program controls displaying of a warning message and waiting for intervention prior to clearing of said storage.
-
26. The computer according to claim 23 wherein:
the download program controls reformatting of said storage prior to downloading of the software image to said storage.
-
27. The computer according to claim 26 wherein:
the download program controls displaying of a warning message and waiting for intervention prior to reformatting of said storage.
-
28. The computer according to claim 23 further comprising:
an instruction sheet for directing a user in usage of the software download medium and the download program for controlling downloading of the software image to said storage.
-
29. The computer according to claim 23 wherein:
-
said first media drive includes a compact disk (CD) ROM drive;
said second media drive includes a diskette drive;
said storage includes a hard disk drive;
the software transport medium includes a CD ROM; and
the software download medium includes a diskette.
-
-
30. A computer comprising:
-
a processor;
a storage coupled to the processor, said storage for storing a software image that is executable by said processor;
a first media drive coupled to said processor;
a second media drive coupled to said processor; and
a software transport package, wherein the software transport package includes;
a software transport medium that is loadable to said first media drive, the software transport medium storing the software image, the software image being configured for downloading to and execution on a single identified computer encoded with a unique identifier that distinguishes said computer from all other computers, the software transport medium including a first identification file that is keyed with the unique identifier; and
a software download medium that is loadable to the second media drive, the software download medium storing a download program, the download program for controlling a downloading of the software image to said storage, the software download medium including a second identification file that is keyed with the unique identifier, wherein the software transport medium, the software download medium, and said computer are mutually keyed so that the software image is downloadable to said storage of only the single identified computer and no other, wherein the download program further includes a routine executable by said processor for accessing the first and second tag identification files, accessing the identifier, mutually comparing the identifier to identification keys in the first and second identification files, and transferring the software image from the software transport medium to said storage only if the identifier corresponds to the identification keys. - View Dependent Claims (31)
the second identification file is keyed with the unique identifier and keyed with an identifier of the first identification file, further wherein the download program includes a routine executable by the processor for accessing the first identification file via identification information in the second identification file.
-
-
32. A computer comprising:
-
a processor;
a storage coupled to the processor, said storage for storing a software image that is executable by said processor;
a first media drive coupled to said processor;
a second media drive coupled to said processor; and
a software transport package, wherein the software transport package includes;
a software transport medium that is loadable to said first media drive, the software transport medium storing the software image, the software image being configured for downloading to and execution on a single identified computer encoded with a unique identifier that distinguishes said computer from all other computers, the software transport medium including a first identification file that is keyed with the unique identifier and a randomly-generated number; and
a software download medium that is loadable to the second media drive, the software download medium storing a download program, the download program for controlling a downloading of the software image to said storage, the software download medium including a second identification file that is keyed with the unique identifier and the randomly-generated number, wherein the software transport medium, the software download medium, and said computer are mutually keyed so that the software image is downloadable to said storage of only the single identified computer and no other, wherein the download program further includes a routine executable by said processor for accessing the first and second tag identification files, accessing the identifier, mutually comparing a randomly-generated number key in the first identification file with a randomly-generated number key in the second identification file, mutually comparing the identifier to identification keys in tile first and second identification files, and transferring the software image from the software transport medium to said storage only if the randomly-generated number key of the first identification file corresponds to the randomly-generated number key of the second identification file and the identifier corresponds to the identification keys.
-
-
33. A software protection system permitting software to be downloaded to a storage of an authorized computer alone, the authorized computer having an unique identifier, said software protection system comprising:
-
computer-readable media containing;
a software image formed for a hardware-software configuration of the authorized computer, a tag identification file having an identification tag keyed to the unique identifier of the authorized computer; and
an executable file including a routine for accessing the unique identifier, comparing the unique identifier to the identification tag, and transferring the software image from the computer-readable media to the storage only if the unique identifier corresponds to the identification tag, wherein the computer-readable media includes;
a first medium containing;
the software image, and a first tag identification file having the identification tag keyed to the unique identifier of the authorized computer; and
a second medium containing;
a second tag identification file having an identification tag keyed to the unique identifier of the authorized computer and an identification tag identifying the first tag identification file, and the executable file, wherein the routine is further for accessing the first tag identification file via identification information in the second tag identification file, accessing the unique identifier, mutually comparing the unique identifier to the identification tags in the first and second tag identification files, and transferring the software image from the computer-readable media to the storage only if the unique identifier corresponds to the identification tags. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41)
the executable file routine accesses the unique identifier using an XBIOS call.
-
-
35. The software protection system according to claim 33 wherein:
the executable file routine accesses the unique identifier using a desktop management interface (DMI) call.
-
36. The software protection system according to claim 33 wherein:
the executable file routine accesses the unique identifier using a technique for reading a CMOS ROM.
-
37. The software protection system according to claim 33 wherein the executable file routine includes a subroutine for:
clearing the storage prior to transferring the software image from the computer-readable media to the storage.
-
38. The software protection system according to claim 37 wherein the executable file routine includes a subroutine for:
-
displaying a warning message; and
waiting for intervention prior to clearing the storage.
-
-
39. The software protection system according to claim 33 wherein the executable file routine includes a subroutine for:
reformatting the storage prior to transferring the software image from the computer-readable media to the storage.
-
40. The software protection system according to claim 39 wherein the executable file routine includes a subroutine for:
-
displaying a warning message; and
waiting for intervention prior to reformatting the storage.
-
-
41. The software protection system according to claim 33 wherein:
-
the first medium includes a custom-programmed compact disk (CD) ROM medium;
the second medium includes a bootable flexible diskette; and
the storage includes a hard disk drive.
-
-
42. A software protection system permitting software to be downloaded to a storage of an authorized computer alone, the authorized computer having an unique identifier, said software protection system comprising;
-
computer-readable media containing;
a software image formed for a hardware-software configuration of the authorized computer;
a tag identification file having an identification tag keyed to the unique identifier of the authorized computer; and
an executable file including a routine for accessing the unique identifier, comparing the unique identifier to the identification tag, and transferring the software image from the computer-readable media to the storage only if the unique identifier corresponds to the identification tag, wherein the computer-readable media includes;
a first medium containing;
the software image; and
a first tag identification file having a first identification tag keyed to the unique identifier of the authorized computer and a second identification tag keyed to a randomly-generated number;
a second medium containing;
a second tag identification file having a third identification tag keyed to the unique identifier of the authorized computer and a fourth identification tag keyed to the randomly-generated number; and
the executable file, the executable file including a routine for comparing the second identification tag to the fourth identification tag, accessing the unique identifier, mutually comparing the unique identifier to the first identification tag and the third identification tag, and transferring the software image from the computer-readable media to the storage only if the second identification tag corresponds to the fourth identification tag, and the unique identifier corresponds to the first identification tag and the second identification tag. - View Dependent Claims (43, 44, 45, 46, 47)
the first medium includes a custom-programmed compact disk (CD) ROM medium;
the second medium includes a bootable flexible diskette; and
the storage includes a hard disk drive.
-
-
44. The software protection system according to claim 42 wherein:
the executable file routine accesses the unique identifier using a command selected from among an XBIOS call, a desktop management interface (DMI) call, and a technique for reading a CMOS ROM.
-
45. The software protection system according to claim 42 wherein:
-
the executable file routine accesses the unique identifier using a command selected from among an XBIOS call, a desktop management interface (DMI) call, and a technique for reading a CMOS ROM; and
the executable file routine accesses a system ID code Of the authorized computer and uses the system ID code to select the command.
-
-
46. The software protection system according to claim 42 wherein:
the unique identifier is a Service Tag.
-
47. The software protection system according to claim 42 wherein:
the executable file routine operates without user intervention.
-
48. A computer program product including computer usable media having computable readable code embodied therein comprising:
-
a software protection system permitting software to be downloaded to a storage of an authorized computer alone, the authorized computer having an unique identifier, the software protection system including;
a software image formed for a hardware-software configuration of the authorized computer;
a tag identification file having an identification tag keyed to the unique identifier of the authorized computer; and
an executable file including a routine for accessing the unique identifier, comparing the unique identifier to the identification tag, and transferring the software image from the computer-readable media to the storage only if the unique identifier corresponds to the identification tag, wherein the computer usable media includes;
a first medium containing;
the software image; and
a first tag identification file having an identification tag keyed to the unique identifier of the authorized computer; and
a second medium containing;
a second tag identification file having an identification tag keyed to the unique identifier of the authorized computer and an identification information identifying the first tag identification file; and
the executable file, the executable file including a routine for accessing first tag identification file via identification information in the second tag identification file, accessing the unique identifier, mutually comparing the unique identifier to the identification tags in the first and second tag identification files, and transferring the software image from the computer-readable media to the storage only if the unique identifier corresponds to the identification tags. - View Dependent Claims (49)
the first medium includes a custom-programmed compact disk (CD) ROM medium;
the second medium includes a bootable flexible diskette; and
the storage includes a hard disk drive.
-
-
50. A computer program product including computer usable media having computable readable code embodied therein comprising:
-
a software protection system permitting software to be downloaded to a storage of an authorized computer alone, the authorized computer having an unique identifier, the software protection system including;
a software image formed for a hardware-software configuration of the authorized computer;
a tag identification file having an identification tag keyed to the unique identifier of the authorized computer; and
an executable file including a routine for accessing the unique identifier, comparing the unique identifier to the identification tag, and transferring the software image from the computer-readable media to the storage only if the unique identifier corresponds to the identification tag, wherein the computer usable media includes;
a first medium containing;
the software image; and
a first tag identification file having a first identification tag keyed to the unique identifier of the authorized computer and a second identification tag keyed to a randomly-generated number;
a second medium containing;
a second tag identification file having a third identification tag keyed to the unique identifier of the authorized computer and a fourth identification tag keyed to the randomly-generated number; and
the executable file, the executable file including a routine for comparing the second identification tag to the fourth identification tag, accessing the unique identifier, mutually comparing the unique identifier to the first identification tag and the third identification tag, and transferring the software image from the computer-readable media to the storage only if the second identification tag corresponds to the fourth identification tag, and the unique identifier corresponds to the first identification tag and the second identification tag. - View Dependent Claims (51)
the first medium includes a custom-programmed compact disk (CD) ROM medium;
the second medium includes a bootable flexible diskette; and
the storage includes a hard disk drive.
-
Specification