Software distribution method and apparatus
First Claim
Patent Images
1. A method of distributing software with a computer system to a user comprising the acts of:
- recording data on a fixed medium in the computer system;
providing for transfer of the computer system to the user; and
controlling access to the data in the computer system by;
in response to receiving a first request for access to the data, contacting a party authorized to grant access to the data;
if the party provides authorization to grant access to the data, recording the authorization in the computer system and granting a first access to the data based on the recorded authorization; and
in response to receiving at least a second request for access to the data, granting a second access to the data based on the authorization recorded in the computer system.
10 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides for a method and apparatus for distributing digital information, such as software applications, to application users. By providing the digital information on unused memory space of a computer system, and providing a process for authorizing access to the information, the information can be efficiently and cost effectively transferred to users. Traditional inventory and distribution channel difficulties are avoided.
-
Citations
29 Claims
-
1. A method of distributing software with a computer system to a user comprising the acts of:
-
recording data on a fixed medium in the computer system; providing for transfer of the computer system to the user; and controlling access to the data in the computer system by; in response to receiving a first request for access to the data, contacting a party authorized to grant access to the data; if the party provides authorization to grant access to the data, recording the authorization in the computer system and granting a first access to the data based on the recorded authorization; and in response to receiving at least a second request for access to the data, granting a second access to the data based on the authorization recorded in the computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A software module used in a computer system operable to provide controlled access to a software application being stored on a fixed medium in the computer system and being distributed with the computer system, the software module operating by:
-
detecting a first use of the software application on the computer system; in response to detecting the first use, verifying authority to access the software application by; contacting a party authorized to grant access to the software application; and if the party provides authorization to grant access to the software application, recording the authorization in the computer system; granting a first access to the software application based on the recorded authorization; detecting at least a second use of the software application on the computer system; and in response to detecting the second use, granting a second access to the software application based on the authorization recorded in the computer system. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer system operable to provide controlled access to a software application stored on a fixed medium in the computer system and distributed with the computer system comprising:
-
a processor; a memory coupled to the processor; and a software module executable on the processor and the memory, the software module being responsive to a first activation of the software application by; contacting a party authorized to grant access to the software application; and if the party provides authorization to grant access to the software application, recording the authorization in the memory and granting a first access to the software application based on the recorded authorization; the software module being further responsive to at least a second activation of the software application by granting a second access to the software application based on the authorization recorded in the memory. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
Specification