×

Key interface for secure object manipulation

  • US 8,504,479 B2
  • Filed: 08/29/2002
  • Issued: 08/06/2013
  • Est. Priority Date: 08/29/2001
  • Status: Active Grant
First Claim
Patent Images

1. A method for controlling access to a certain functionality of a first software stored on a computer, the first software comprising a plurality of functionalities, the method comprising the steps of:

  • receiving, at the first software stored on the computer from a second software, a key associated with at least one functionality to be accessed within the first software, wherein the key is provided by the second software;

    verifying the key using the computer; and

    allowing, using the computer, the second software to access the at least one functionality to be accessed within the first software stored on the computer when the key is verified, the at least one functionality to be accessed within the first software stored on the computer including a customer-added service tier.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×