System for authorizing functionality in adaptable hardware devices
First Claim
Patent Images
1. A method for authorizing the use of a configurable device, the method comprising:
- detecting that the configurable device is configured to perform a first type of operation at a first point in time;
detecting that the configurable device is configured to perform a second type of operation at a second point in time;
using the detected configurations to determine whether to authorize the continued use of the device, wherein the detecting steps include the substep ofreceiving usage information from the device;
wherein the usage information includes information about resources that the device has used, and wherein a resource includes instruction type.
4 Assignments
0 Petitions
Accused Products
Abstract
A system for authorizing new or ongoing functional use of an adaptable device. The device generates usage information including the times that the device is used, types of functionality provided, indication of amount and type of resources used, and other information. The usage information is transmitted back to a controlling entity, such as an original manufacturer of the adaptable device. The controlling entity can act to enable or prevent use of the provided functionality, as desired. Part of the requirement for using functionality can be monetary, by predetermined agreement, or by other criteria.
-
Citations
23 Claims
-
1. A method for authorizing the use of a configurable device, the method comprising:
-
detecting that the configurable device is configured to perform a first type of operation at a first point in time; detecting that the configurable device is configured to perform a second type of operation at a second point in time; using the detected configurations to determine whether to authorize the continued use of the device, wherein the detecting steps include the substep of receiving usage information from the device; wherein the usage information includes information about resources that the device has used, and wherein a resource includes instruction type.
-
-
2. A method for authorizing the use of a configurable device, the method comprising:
-
detecting that the configurable device is configured to perform a first type of operation at a first point in time; detecting that the configurable device is configured to perform a second type of operation at a second point in time; using the detected configurations to determine whether to authorize the continued use of the device, wherein the detecting steps include the substep of receiving usage information from the device; wherein the usage information includes information about resources that the device has used, and wherein a resource includes instruction execution frequency.
-
-
3. A method for authorizing the use of a configurable device, the method comprising:
-
detecting that the configurable device is configured to perform a first type of operation at a first point in time; detecting that the configurable device is configured to perform a second type of operation at a second point in time; using the detected configurations to determine whether to authorize the continued use of the device, wherein the detecting steps include the substep of receiving usage information from the device; wherein the usage information includes information about resources that the device has used, and wherein a resource includes instruction type.
-
-
4. A method for authorizing the use of a configurable device, the method comprising:
-
detecting that the configurable device is configured to perform a first type of operation at a first point in time; detecting that the configurable device is configured to perform a second type of operation at a second point in time; using the detected configurations to determine whether to authorize the continued use of the device, wherein the detecting steps include the substep of receiving usage information from the device; wherein the usage information includes information about resources that the device has used, and wherein a resource includes instruction execution frequency.
-
-
5. A system for authorizing the use of configurable devices, the system comprising:
-
an authorization system; and a communications link to transfer adaptation information from the authorization system to a configurable device including a plurality of heterogeneous computational elements coupled to a configurable interconnection network, the configurable interconnection network being configured in response to the adaptation information to provide corresponding interconnections between the plurality of heterogeneous computational elements to configure the device to perform a function, wherein the configurable device transmits usage information regarding the use of the function, wherein the usage information comprises a device identification that is transmitted to the authorization system over the communications link, and wherein the authorization system transmits an authorization code over the communications link to the configurable device, wherein the authorization code provides limitations on resources of the configurable device used by the function. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A configurable device comprising:
-
a plurality of computational units, the plurality of computational units including at least a first computational unit configured to perform a linear operation, a second computational unit configured to perform a non-linear operation, a third computational unit configured to perform memory management, and a fourth computational unit configured to perform bit-level manipulation; and a communication network interface configured to transmit an identification tag to an external entity and receive an authorization code allowing use of at least a portion of the configurable device for a period of time, wherein the communication network interface is further configured to receive adaptation information that enables the configurable device to perform a function, and wherein the fourth computational element is configured to decrypt the adaptation information based on the authorization code, wherein the authorization code provides limitations on resources of the configurable device used by the function. - View Dependent Claims (19, 20, 21, 22, 23)
-
Specification