System and method for creating and running protected information
First Claim
1. A method for creating protected information accessed by a user, the method comprising:
- generating a first feature of protected information accessed by the user, the first feature being accessible to the user after the user communicates with a licensing system and acquires a first password from the licensing system, wherein the first password is based at least in part on a first characteristic of an entity to which access to the first feature is linked, different characteristics of such entity being usable for such first characteristic; and
generating a second feature of the protected information accessed by the user, the second feature being accessible to the user after the user communicates with the licensing system and acquires a second password from the licensing system, wherein the second password is based at least in part on a second characteristic of an entity to which access to the second feature is linked, different characteristics of such entity being usable for such second characteristic,wherein the first and second passwords are distinct.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus of encouraging distribution, registration, and purchase of free copyable software and other digital information which is accessed on a User'"'"'s System via a Programmer'"'"'s Program. Software tools which can be incorporated into a Programmer'"'"'s Program allow the User to access Advanced Features of the Programmer'"'"'s Program only in the presence of a valid Password which is unique to a particular Target ID generated on an ID-Target such as the User'"'"'s System. Advanced features will thus re-lock if the Password is copied to another ID-target. If a valid Password is not present, the User is invited to obtain one, and provided with the means of doing so, and of installing that Password in a place accessible to the User'"'"'s System on subsequent occasions. The present invention also provides Programmers with means to invoke business operations as well as computational operations with their programs, and thus to automatically obtain payment from Users who elect to obtain passwords.
101 Citations
28 Claims
-
1. A method for creating protected information accessed by a user, the method comprising:
-
generating a first feature of protected information accessed by the user, the first feature being accessible to the user after the user communicates with a licensing system and acquires a first password from the licensing system, wherein the first password is based at least in part on a first characteristic of an entity to which access to the first feature is linked, different characteristics of such entity being usable for such first characteristic; and generating a second feature of the protected information accessed by the user, the second feature being accessible to the user after the user communicates with the licensing system and acquires a second password from the licensing system, wherein the second password is based at least in part on a second characteristic of an entity to which access to the second feature is linked, different characteristics of such entity being usable for such second characteristic, wherein the first and second passwords are distinct. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for enabling a user to access protected information, the method comprising:
-
receiving a request for access to a first feature of protected information from a user, the protected information including the first feature accessible only with a first password, and the protected information further including a second feature accessible only with a second password, the first password being based at least in part on a first characteristic of an entity to which access to the first feature is linked, different characteristics of such entity being usable for such first characteristic, the second password being based at least in part on a second characteristic of an entity to which access to the second feature is linked, different characteristics of such entity being usable for such second characteristic, the first and second passwords being distinct; and enabling the user access the first feature without being able to access the second feature. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer readable storage medium on which is stored the steps of:
-
storing first code to perform a function; storing protected information in association with the first code, the protected information accessible only with a password, the password being based at least in part on a characteristic of an entity to which access to one or more items of protected information is linked, different characteristics of such entity being usable to provide access to different ones of the one or more items of protected information; and storing second code in association with the protected information, the second code to enable a user to request the password to access the protected information. - View Dependent Claims (20, 21, 22, 23)
-
-
24. A computer readable storage medium having stored thereon:
-
first code to perform a function; protected information in association with the first code, the protected information accessible only with a password, the password being based at least in part on a characteristic of an entity to which access to one or more items of protected information are linked, different characteristics of such entity being usable to provide access to different ones of the one or more items of protected information; and second code in association with the protected information, the second code to enable a user to request the password to access the protected information. - View Dependent Claims (25, 26, 27, 28)
-
Specification