Method and system to automatically activate software options upon initialization of a device
First Claim
1. A method to enable software options comprising the steps of:
- receiving a request for activation of an inactive option in memory of a device located remotely from a centralized facility;
determining whether to activate the inactive option in response to the electronic request based on whether a set of criteria has been satisfied;
if unsatisfied, denying use of the inactive option;
if satisfied, generating an activation key configured to permit use of the inactive option upon installation in the device;
sending the activation key from the centralized facility to the device; and
automatically installing the activation key and enabling the inactive option upon initialization of the device.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method are provided for activating inactive software options pre-installed on a device upon initialization of the device and thereby preventing installation during device operation. The invention includes receiving a request from a user at a centralized facility for access to an inactive option resident on the device. After validation of the request, an option-specific activation key or code is generated at the centralized facility using data from at least one of a user identifier, a system identifier, a host identifier, a use period identifier, and the selected option. The activation key is then transmitted from the centralized facility to the device whereupon only during initialization or reboot of the device is access to the inactive option automatically granted. The limiting of access to the inactive option until device initialization ensures that option enablement is prevented during device operation.
198 Citations
34 Claims
-
1. A method to enable software options comprising the steps of:
-
receiving a request for activation of an inactive option in memory of a device located remotely from a centralized facility;
determining whether to activate the inactive option in response to the electronic request based on whether a set of criteria has been satisfied;
if unsatisfied, denying use of the inactive option;
if satisfied, generating an activation key configured to permit use of the inactive option upon installation in the device;
sending the activation key from the centralized facility to the device; and
automatically installing the activation key and enabling the inactive option upon initialization of the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
verifying activation of the inactive option; and
if verified, notifying a user of activation of the inactive option.
-
-
5. The method of claim 1 further comprising the step of prompting a user for an authorization to install the activation key and receiving the authorization from the user prior to installation of the activation key.
-
6. The method of claim 1 further comprising the steps of:
-
accessing a graphic user interface (GUI) from a user station;
selecting the inactive option sought to activate; and
transmitting an option identifier to the centralized facility.
-
-
7. The method of claim 6 further comprising the step of electronically sending a user identifier and a system identifier to the centralized facility.
-
8. The method of claim 1 wherein the step of receiving the request for activation of an inactive option further includes the steps of:
-
determining a host identifier;
determining a system identifier;
identifying a modality; and
identifying a use period including one of a trial use period, a limited use period, a pay-per use period, and an indefinite use period.
-
-
9. The method of claim 1 further comprising the step of sending the request electronically.
-
10. The method of claim 1 wherein the step of determining if the set of criteria has been satisfied comprises the steps of:
-
receiving a user identifier;
validating the user identifier; and
determining if a user status includes one of a delinquent account, an exhausted line of credit, a poor credit history, and a non-completion of training requirements.
-
-
11. A system to enable an inactive software application resident in memory of a device comprising:
-
a computerized network;
a receiving center connected to the computerized network;
a processing station located within the receiving center having a processor, wherein the processor is configured to;
receive a request from a user for activation of at least one inactive software application resident on the device;
generate an electronic enabler configured to activate the at least one inactive software application;
transmit the electronic enabler from the receiving center to the device, wherein the device includes a remote processor programmed to;
control access to the at least one inactive software application;
verify transmission of the electronic enabler and if transmitted, determine a device operation status;
if in an active status, prohibit enablement of the at least one inactive software application; and
if in an inactive status, enable the at least one inactive software application. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
receive a user identifier;
validate the user identifier;
receive a user authentication code;
validate the user authentication code;
receive a system identifier; and
validate the system identifier.
-
-
19. The system of claim 11 wherein the electronic enabler is an alphanumeric software key.
-
20. The system of claim 11 wherein the at least one processor is further configured to deny the request of the user in which the user is identified as having one of a delinquent account, an exhausted line of credit, an open credit history, and a non-completion of a training requirement.
-
21. The system of claim 11 wherein an active status includes a device in operation.
-
22. A computer data signal embodied in a carrier wave and representing a sequence of instructions which, when executed by at least one processor, causes the at least one processor to:
-
review, at a centralized facility, a request from a user to activate an inactive software application stored in memory of a medical imaging device located remotely from the centralized facility;
determine whether the user is qualified, and if so;
generate a software script designed to enable the software application;
transmit the software script from the centralized facility to the device; and
enable the software application only during a reboot of the device. - View Dependent Claims (23, 24, 25, 26)
-
-
27. A software enabling system comprising:
-
a centralized facility;
a medical imaging scanner remotely located from the centralized facility and capable of receiving transmissions from the centralized facility, wherein the medical imaging scanner includes a computer having one or more inactive applications resident in memory of the computer; and
a data script creator designed to generate a data script configured to enable a selected inactive application, wherein the data script is further configured to automatically enable the selected inactive application only upon initialization of the device. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34)
a valid user identifier;
a valid system identifier; and
a qualified customer status.
-
-
31. The software enabling system of claim 30 wherein a qualified customer status includes a satisfactory billing status and a compliant training status.
-
32. The software enabling system of claim 27 wherein the data script is further configured to prevent enabling of the selected inactive application within the medical imaging scanner during device operation.
-
33. The software enabling system of claim 32 wherein the data script is further configured to prompt a user for authorization to enable the inactive application.
-
34. The software enabling system of claim 29 wherein the one or more computers are further configured to verify a transmission of the data script and notify a user of the transmission.
Specification