Key interface for secure object manipulation
First Claim
1. A method for controlling access to a certain functionality of a first software stored on a computer, the first software comprising a plurality of functionalities, the method comprising the steps of:
- receiving, at the first software stored on the computer from a second software, a key associated with at least one functionality to be accessed within the first software, wherein the key is provided by the second software;
verifying the key using the computer; and
allowing, using the computer, the second software to access the at least one functionality to be accessed within the first software stored on the computer when the key is verified, the at least one functionality to be accessed within the first software stored on the computer including a customer-added service tier.
10 Assignments
0 Petitions
Accused Products
Abstract
A method and system for controlling access to various tiers of functionality of core software are provided. A software developer/vendor can develop a single version of software having one or more limited-access functionalities and provide the single version of the software to various types of customers. Each customer, using the single version of the core software, may develop additional software that utilizes one or more functionalities of the core software as authorized by the software developer/vendor. Access to a certain functionality or set of functionalities by the customer developed software is obtained by adapting the customer developed software to submit a key, provided by the software developer/vendor, to the core software through, for example, an application programming interface (API) of the core software. The core software is adapted to verify the provided key and, if the provided key is correct, allow the customer developed software access to the corresponding one or more functionalities of the core software.
26 Citations
29 Claims
-
1. A method for controlling access to a certain functionality of a first software stored on a computer, the first software comprising a plurality of functionalities, the method comprising the steps of:
-
receiving, at the first software stored on the computer from a second software, a key associated with at least one functionality to be accessed within the first software, wherein the key is provided by the second software; verifying the key using the computer; and allowing, using the computer, the second software to access the at least one functionality to be accessed within the first software stored on the computer when the key is verified, the at least one functionality to be accessed within the first software stored on the computer including a customer-added service tier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer readable medium for controlling access to at least one functionality of a first software, the computer readable medium comprising a set of instructions being adapted to manipulate a processor to:
-
receive, from a second software, a key associated with at least one functionality to be accessed of the first software; verify the key; and allow the second software to access the at least one functionality to be accessed within the first software when the key is verified, the at least one functionality to be accessed including a customer-added service tier. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for controlling access to a development service tier of a first software stored on a computer, the method comprising the steps of:
-
receiving, at the first software stored on a computer, a key associated with at least one development service tier within the first software stored on a computer, wherein the key is provided by a second software; verifying the key using a computer; and allowing, using the computer, the second software to access the at least one development service tier within the first software stored on a computer when the key is verified, the at least one development service tier within the first software stored on the computer including a customer-added service tier. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification