Method and apparatus for repeated contact software end-user
First Claim
1. A method for securing software to reduce unauthorized use of the software and provide repeated contact with a software user, the method comprising:
- associating passwords with the software prior to distribution of the software;
requiring entry of a first password of the passwords associated with the software upon first use of the software;
repeatedly requiring the user to obtain another password of the passwords associated with the software to continue using the software; and
transferring marketing, promotional, or advertising information to the user while the user obtains at least one of the passwords.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for providing repeated contact with a software user to transfer information which may include advertising, promotional, or marketing information include repeatedly contacting the software manufacturer or third party representative or agent for continued use of the software. The invention provides for automatically obtaining authorization information in addition to marketing, advertising, and/or promotional information prior to expiration of each authorization interval or period. The user and/or software contacts an authorized representative of the software to obtain authorization information which may be downloaded directly to the software or provided to the user for entry. Authorization intervals may vary depending upon the particular application. For example, in one embodiment, the present invention provides authorization information which allows continued use of the software for a period based on value of the software. The value of the software may be based on price or the availability of a subsequent version of the software. Authorization intervals of decreasing length may be supplied for software of increasing value. As the value of the software decreases, for example when one or more subsequent versions are released, the authorization intervals may increase accordingly.
-
Citations
21 Claims
-
1. A method for securing software to reduce unauthorized use of the software and provide repeated contact with a software user, the method comprising:
-
associating passwords with the software prior to distribution of the software;
requiring entry of a first password of the passwords associated with the software upon first use of the software;
repeatedly requiring the user to obtain another password of the passwords associated with the software to continue using the software; and
transferring marketing, promotional, or advertising information to the user while the user obtains at least one of the passwords. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for providing continuing contact with a software user to repeatedly transfer information to the user, the method comprising:
-
receiving registration information from the user;
transferring authorization information to authorize continued use of the software beyond a current authorization interval in response to a request by the user or software for authorization for continued use of the software beyond the current authorization interval; and
transferring marketing, promotional, or advertising information each time the user or software requests authorization for continued use of the software beyond the current authorization interval. - View Dependent Claims (11, 12, 13, 14, 15)
comparing the registration information with previously received registration information;
transferring authorization information which authorizes continued use of the software only if the registration information is substantially similar to the previously received information; and
transferring the marketing, promotional, or advertising information regardless of the registration information.
-
-
14. The method of claim 10 further comprising:
-
comparing the registration information with previously received registration information to determine whether the user is an authorized user;
transferring authorization information which authorizes continued use of the software if the registration information indicates that the user is an authorized user;
transferring information which disables continued operation of the software if the registration information indicates that the user is an unauthorized user; and
transferring the marketing, promotional, or advertising information regardless of whether the registration information indicates the user is authorized or unauthorized.
-
-
15. The method of claim 10 further comprising:
-
determining whether the user is an authorized user based on the registration information;
transferring the marketing, promotional, or advertising information only if the registration information indicates the user is an unauthorized user.
-
-
16. A method for securing software to reduce unauthorized use of the software while providing repeated contact with a software user, the method comprising:
-
requiring entry of a first password upon first use of the software;
subsequently requiring entry of another password by the user to continue using the software;
transferring information to the user each time another password is required for continued operation of the software; and
repeating the step of subsequently requiring entry of another password at predetermined intervals. - View Dependent Claims (17, 18, 19, 20, 21)
requiring entry of registration information prior to receiving another password to continue using the software.
-
Specification