System and method for processing protected text information
First Claim
1. A computer comprising:
- an input device;
a display;
a memory;
a first processor effective to receive text information;
a second processor effective to process the received text information;
a generator effective to generate a first identifier, the first identifier being based at least in part on one or more characteristics of the computer;
a transmitter effective to transmit the first identifier to a licensing processor;
a second receiver effective to receive a generated password based at least in part on the first identifier, the generated password generated using a technique which does not require any additional information that is characteristic of the computer; and
means for using the generated password to control access to at least one of the received text information and the processed text information.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus of encouraging distribution, registration, and purchase of free copyable software and other digital information which is accessed on a User'"'"'s System via a Programmer'"'"'s Program. Software tools which can be incorporated into a Programmer'"'"'s Program allow the User to access Advanced Features of the Programmer'"'"'s Program only in the presence of a valid Password which is unique to a particular Target ID generated on an ID-Target such as the User'"'"'s System. Advanced features will thus relock if the Password is copied to another ID-target. If a valid Password is not present, the User is invited to obtain one, and provided with the means of doing so, and of installing that Password in a place accessible to the User'"'"'s System on subsequent occasions. The present invention also provides Programmers with means to invoke business operations as well as computational operations with their programs, and thus to automatically obtain payment from Users who elect to obtain passwords.
104 Citations
50 Claims
-
1. A computer comprising:
-
an input device;
a display;
a memory;
a first processor effective to receive text information;
a second processor effective to process the received text information;
a generator effective to generate a first identifier, the first identifier being based at least in part on one or more characteristics of the computer;
a transmitter effective to transmit the first identifier to a licensing processor;
a second receiver effective to receive a generated password based at least in part on the first identifier, the generated password generated using a technique which does not require any additional information that is characteristic of the computer; and
means for using the generated password to control access to at least one of the received text information and the processed text information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 20)
-
-
12. A method for controlling access to text information in a computer, the method comprising:
-
receiving text information;
processing the received text information;
generating an identifier, the identifier being based at least in part on one or more characteristics of an entity to which access to the text information is linked;
transmitting the first identifier to a licensing processor;
receiving a generated password based at least in part on the identifier, the generated password generated using a technique which does not require any additional information that is characteristic of the entity; and
using the generated password by a computer to control access to at least one of the received text information and the processed text information. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 21, 22, 23, 24)
-
-
25. A method for operating a licensing server to distribute passwords to a plurality of users to access text files at remote computers, the method comprising:
-
receiving, at a licensing server, a first identifier associated with a request for access to a text file, the request generated by a first program at a first remote computer, the first identifier being based at least in part on one or more characteristics of an entity to which access to the text file is linked, the first identifier being previously unknown to the licensing server;
generating, at the licensing server, a password based at least in part on the first identifier; and
transmitting the password to a first location accessible to the first remote computer. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
-
38. A method for enabling access to a text file using a computer, the method comprising:
-
receiving a request to access a first program;
enabling access to the first program using the computer;
receiving a request to access a text file while the first program is being accessed;
in response to the request to access the text file, awakening a second program from a dormant state, the second program includes the steps of;
checking the computer for a first password; and
when the computer does not include the first password, requesting the first password from a licensing system; and
providing the text file in response to the first password being received from the licensing system. - View Dependent Claims (39, 40, 41)
-
-
42. A method for distributing a text file created by a creator, the text file accessible only with a password, the method comprising:
-
providing a storage device storing software effective to process a text file, the storage device provided through a first distribution channel comprising a first set of one or more distribution methods;
providing the text file to a user through a second distribution channel comprising a second set of one or more distribution methods; and
providing a password to access the text file to the user through an authorization channel comprising a third set of one or more distribution methods, the authorization channel being distinct from the second distribution channel, the authorization channel excluding participation by the creator. - View Dependent Claims (43, 44, 45, 46, 47)
-
-
48. A method for creating a plurality of text files to be accessed by a user, the method comprising:
-
generating a first text file, the first text file being accessible to the user after the user communicates with a licensing system and acquires a first password from the licensing system; and
generating a second text file, the second text file being accessible to the user after the user communicates with the licensing system and acquires a second password from the licensing system;
whereinthe first and second passwords are distinct. - View Dependent Claims (49, 50)
-
Specification