Method for providing repeated contact with software end-user using authorized administrator
First Claim
1. A method for providing repeated contact between an administrator and a user computer, computer software, or a computer software user, the method comprising:
- automatically receiving information from the computer software by the administrator;
transferring a password from the administrator to the user computer, the computer software, or the user to authorize continued use of the computer software such that the computer software is useable without requiring continuous communication between the administrator and the user computer, the computer software, or the user; and
repeating the steps of automatically receiving and transferring at predetermined periods without requiring continuous communication between the administrator and the user computer, the computer software, or the user during periods other than the predetermined periods.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for providing repeated contact with computer software or a software user to transfer information which may include advertising, promotional, and/or marketing information includes repeatedly contacting the software manufacturer or third party representative or agent for continued use of the software. The invention provides for automatically obtaining authorization information in addition to marketing, advertising, and/or promotional information prior to expiration of each authorization interval or period. The user and/or software contacts an authorized representative of the software to obtain authorization information which may be downloaded directly to the software or provided to the user for entry. Authorization intervals may vary depending upon the particular application. For example, in one embodiment, the present invention provides authorization information which allows continued use of the software for a period based on value of the software. The value of the software may be based on price or the availability of a subsequent version of the software. Authorization intervals of decreasing length may be supplied for software of increasing value. As the value of the software decreases, for example when one or more subsequent versions are released, the authorization intervals may increase accordingly.
146 Citations
20 Claims
-
1. A method for providing repeated contact between an administrator and a user computer, computer software, or a computer software user, the method comprising:
-
automatically receiving information from the computer software by the administrator;
transferring a password from the administrator to the user computer, the computer software, or the user to authorize continued use of the computer software such that the computer software is useable without requiring continuous communication between the administrator and the user computer, the computer software, or the user; and
repeating the steps of automatically receiving and transferring at predetermined periods without requiring continuous communication between the administrator and the user computer, the computer software, or the user during periods other than the predetermined periods. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for providing repeated contact between an administrator and a user computer, computer software, or a software user, the method comprising:
-
automatically receiving information from the computer software by the administrator;
transferring a password from the administrator to the user computer, the computer software, or the user to authorize continued use of the computer software such that the computer software is useable without requiring continuous communication between the administrator and the user computer, the computer software, or the user;
transferring software information, software upgrades, marketing, promotional, or advertising information from the administrator to the user computer, the computer software, or the user with the transferred password; and
repeating the steps of automatically receiving, transferring a password, and transferring software information, software upgrades, marketing, promotional, or advertising information at specified periods without requiring continuous communication between the administrator and the user computer, the computer software, or the user during periods other than the predetermined periods. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification