Software distribution method and apparatus
First Claim
Patent Images
1. A method of distributing software, comprising digital data and computer executable programs useful with a computer system, the method comprising:
- recording the digital data and the computer executable programs on a non-volatile storage device in the computer system;
recording computer readable instructions in the computer system, the computer readable instructions configured to automatically implement access authorization procedures; and
automatically controlling access to the digital data and the computer executable programs in the computer system by at least;
in response to receiving a first request from a first entity for access to the digital data and the computer executable programs, automatically executing the computer readable instructions causing the computer system to contact a party authorized to grant access to the digital data;
when the party provides authorization to grant access to the digital data and the computer executable programs, automatically executing the computer readable instructions causing the computer system to record the authorization in the computer system and grant a first access to the digital data and the computer executable programs based on the recorded authorization; and
in response to receiving at least a second request from the first entity for access to the digital data and the computer executable programs, automatically executing the computer readable instructions causing the computer system to grant a second access to the digital data based on the authorization recorded in the computer system and without contacting the party authorized to grant access to the digital data and the computer executable programs;
wherein the computer executable programs comprise program instructions configured to enable stand-alone operation of the software without continued access to a network.
8 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides for a method and apparatus for distributing digital information, such as software applications, to application users. By providing the digital information on unused memory space of a computer system, and providing a process for authorizing access to the information, the information can be efficiently and cost effectively transferred to users. Traditional inventory and distribution channel difficulties are avoided.
38 Citations
46 Claims
-
1. A method of distributing software, comprising digital data and computer executable programs useful with a computer system, the method comprising:
-
recording the digital data and the computer executable programs on a non-volatile storage device in the computer system; recording computer readable instructions in the computer system, the computer readable instructions configured to automatically implement access authorization procedures; and automatically controlling access to the digital data and the computer executable programs in the computer system by at least; in response to receiving a first request from a first entity for access to the digital data and the computer executable programs, automatically executing the computer readable instructions causing the computer system to contact a party authorized to grant access to the digital data; when the party provides authorization to grant access to the digital data and the computer executable programs, automatically executing the computer readable instructions causing the computer system to record the authorization in the computer system and grant a first access to the digital data and the computer executable programs based on the recorded authorization; and in response to receiving at least a second request from the first entity for access to the digital data and the computer executable programs, automatically executing the computer readable instructions causing the computer system to grant a second access to the digital data based on the authorization recorded in the computer system and without contacting the party authorized to grant access to the digital data and the computer executable programs; wherein the computer executable programs comprise program instructions configured to enable stand-alone operation of the software without continued access to a network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method of controlling access to digital data in a first computer system, the method comprising:
-
receiving a first request via the first computer system for access to the digital data, the first request based at least in part on a first entity attempting to access the digital data; in response to receiving the first request, automatically executing computer readable instructions causing the first computer system to electronically contact a second computer system authorized to grant access to the digital data; responsive to the second computer system provides authorization to grant access to the digital data, automatically recording the authorization in the first computer system and granting a first access to the digital data based on the recorded authorization; receiving at least a second request via the first computer system for access to the digital data, the second request based at least in part on a user attempting to access the digital data; and responsive to the receiving the second request, automatically granting a second access to the data based on the authorization recorded in the first computer system and without electronically contacting the second computer system authorized to grant access to the digital data. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A method of controlling access to digital data in a computerized apparatus, the method comprising:
-
receiving a first request for access to the digital data; based at least in part on receiving the first request, automatically executing computer readable instructions to activate a network link to contact a party authorized to grant access to the digital data; if the party fails to provide authorization to grant access to the digital data, not granting a first access to the digital data; if the party provides authorization to grant access to the digital data, recording the authorization in the computerized apparatus, and granting a first access to the digital data based at least in part on the recorded authorization; receiving at least a second request for access to the digital data; and based at least in part on receiving the second request, granting a second access to the data based on the authorization recorded in the computerized apparatus and without contacting the party authorized to grant access to the digital data; wherein the digital data comprises a software application, and the method further comprises storing the software application on the first computerized apparatus during manufacture of the computerized apparatus. - View Dependent Claims (20)
-
-
21. A software module operable to control access to a software application recorded on a storage device in a computerized apparatus, the software module operating by a method comprising:
-
detecting a first use of the software application on the computerized apparatus; based at least in part on detecting the first use, contacting a party authorized to grant access to the software application; based on the party providing or not providing authorization to grant access to the software application, (i) recording the authorization in the computerized apparatus and granting a first access to the software application based on the recorded authorization, or (ii) not granting a first access to the software application, respectively; detecting at least a second use of the software application on the computerized apparatus; and based at least in part on detecting the second use, granting a second access to the software application based on the authorization recorded in the computerized apparatus and without contacting the party authorized to grant access to the software application. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. A method of using a computerized apparatus comprising a processor, a memory in data communication with the processor, and a first and a second storage device, the method comprising:
-
recording a software application on the first storage device by a first party; recording computer readable instructions executable on the processor and the memory in the computerized apparatus; transferring the computerized apparatus to a second party, the second party being different from the first party; based at least in part on a first request for access to the software application, automatically executing the computer readable instructions causing the computerized apparatus to contact a party authorized to grant access to the software application; and when the party authorized to grant access provides authorization to grant access to the software application, automatically executing the computer readable instructions causing the computerized apparatus to record the authorization in the computerized apparatus, and to grant a first access to the software application based on the recorded authorization; wherein; the recording of the authorization in the computerized apparatus is configured to enable automatic execution the computer readable instructions causing the computerized apparatus to grant a second access to the software application based at least in part on receiving at least a second request for access to the software application without contacting the party authorized to grant access to the software application; and recording of the software application is performed based at least in part on a purchase of the computerized apparatus. - View Dependent Claims (30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A method of distributing software with a computerized apparatus, the method comprising:
-
recording digital data on a storage device in the computerized apparatus; recording computer readable instructions in the computerized apparatus that automatically implement access authorization procedures; and automatically controlling access to the digital data in the computerized apparatus by at least; based at least in part on a first request for access to the digital data, automatically executing the computer readable instructions causing the computerized apparatus to contact a party authorized to grant access to the digital data; and when the party provides authorization to grant access to the digital data, automatically executing the computer readable instructions causing the computerized apparatus to record the authorization in the computerized apparatus, and grant a first access to the digital data based on the authorization; wherein the recording of the authorization in the computerized apparatus enables subsequent automatic execution the computer readable instructions causing the computerized apparatus so as to grant a second access to the digital data based at least in part on receiving at least a second request for access to the digital data, the second access not requiring contact with the party authorized to grant access to the digital data; and wherein the contact with the party comprises transmission of at least a portion of the digital data recorded on the computerized apparatus to the party. - View Dependent Claims (39, 40, 41, 42, 43, 44, 45)
-
-
46. A computerized apparatus, comprising:
-
a processor; a first storage device having digital data stored thereon substantially at time of sale or manufacture; a plurality of computer readable instructions stored on a second storage device of the computerized apparatus, the instructions configured to, when executed on the processor, implement authorization and control access to the digital data by at least; based at least in part on receiving a first request from a user for access to the digital data, causing the computerized apparatus to contact a party authorized to grant access to the digital data; receiving authorization to grant access to the digital data; causing the computerized apparatus to record the received authorization in the computerized apparatus, and grant access to the digital data based at least in part on the authorization; and in response to receiving at least a second request a user for access to the digital data, cause the computerized apparatus to grant another access to the digital data based on the authorization recorded in the computerized apparatus, and without further contact with the party; wherein; said contact with the party authorized to grant access to the digital data comprises transmission of at least a portion of the digital data recorded on the computerized apparatus to the party; and said digital data being stored based at least in part on a purchase request for the computerized apparatus.
-
Specification