Software distribution method and apparatus
First Claim
Patent Images
1. A computerized apparatus configured to control access to a proprietary software application resident on the computerized apparatus after being sold to a purchaser, the apparatus comprising:
- an input device;
a storage device having the software application stored thereon;
a processing apparatus in communication with the storage device; and
a network interface in communication with the processing apparatus;
wherein said access is controlled according to the method comprising;
receiving an initial request from the purchaser via the input device of the apparatus to utilize the application;
substantially automatically accessing a remote third party authorization entity via the network interface in order to obtain an authorization to access the application;
recording information relating to the obtained authorization on the computerized apparatus for subsequent use;
accessing the application pursuant to the initial request using at least the authorization; and
receiving a subsequent request for access to the application from the purchaser; and
granting access to the application pursuant to the subsequent request based at least in part on the recorded information and without having to contact said third party again.
7 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides for a method and apparatus for distributing digital information, such as software applications, to application users. By providing the digital information on unused memory space of a computer system, and providing a process for authorizing access to the information, the information can be efficiently and cost effectively transferred to users. Traditional inventory and distribution channel difficulties are avoided.
38 Citations
38 Claims
-
1. A computerized apparatus configured to control access to a proprietary software application resident on the computerized apparatus after being sold to a purchaser, the apparatus comprising:
-
an input device; a storage device having the software application stored thereon; a processing apparatus in communication with the storage device; and a network interface in communication with the processing apparatus; wherein said access is controlled according to the method comprising; receiving an initial request from the purchaser via the input device of the apparatus to utilize the application; substantially automatically accessing a remote third party authorization entity via the network interface in order to obtain an authorization to access the application; recording information relating to the obtained authorization on the computerized apparatus for subsequent use; accessing the application pursuant to the initial request using at least the authorization; and receiving a subsequent request for access to the application from the purchaser; and granting access to the application pursuant to the subsequent request based at least in part on the recorded information and without having to contact said third party again.
-
-
2. A computer apparatus configured to control access to digital data stored in the computer apparatus, the apparatus comprising:
-
processing apparatus; and non-volatile data storage apparatus in communication with processing apparatus and comprising a plurality of computer readable instructions, the instructions configured to, when executed on the processing apparatus, control access to the digital data by at least; based at least in part on receiving a first request for access to the digital data from a first entity, causing the computer apparatus to contact a party authorized to grant access to the digital data; receiving authorization to grant access to the digital data; causing the computer apparatus to record at least a portion of the received authorization in the computerized apparatus, and grant access to the digital data based at least in part on the authorization; and in response to receiving at least a second request for access to the digital data, cause the computer apparatus to grant another access to the digital data based on the at least portion of the authorization recorded in the computer apparatus, and without further contact with the party. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computerized apparatus configured for distribution of software, the apparatus comprising:
-
digital data recorded on a non-volatile storage device; and computer readable instructions recorded in the computerized apparatus, the instructions configured to, when executed by the computerized apparatus, substantially automatically control access to the digital data by at least; based at least in part on a first request for access to the digital data, executing the computer readable instructions causing the computerized apparatus to contact a party authorized to grant access to the digital data, the contact comprising transmission of at least a portion of the digital data; and when the party provides authorization to grant access to the digital data, executing the computer readable instructions causing the computerized apparatus to record at least a portion of the authorization in the computerized apparatus, and grant a first access to the digital data based on the authorization; wherein the recording of the at least portion of the authorization in the computerized apparatus enables subsequent execution of the computer readable instructions, said subsequent execution causing the computerized apparatus to grant a second access to the digital data substantially automatically based at least in part on receiving at least a second request for access to the digital data, the second access not requiring contact with the party authorized to grant access to the digital data. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A computerized apparatus configured for controllable distribution of software applications, the apparatus comprising:
-
a processor; and a storage device in data communication with the processor, the storage device having recorded thereon a software application, and a plurality of computer readable instructions, the recordation of each having been performed by a first entity; wherein the plurality of instructions are configured to, when executed, enable substantially automated control of access to the software application by at least; based at least in part on receiving a first request for access to the software application from a second entity, causing the computerized apparatus to contact via a network a party authorized to grant access to the software application; receiving authorization to grant access to the software application; causing the computerized apparatus to record at least a portion of the received authorization in the computerized apparatus, and grant access to the software application based at least in part on the authorization; and in response to receiving at least a second subsequent request from the second entity for access to the software application, causing the computerized apparatus to grant another access to the software application based at least in part on the authorization recorded in the computerized apparatus, said another access being granted without requiring further contact with the party. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34)
-
-
35. Computer readable apparatus having a storage medium, the storage medium comprising at least one software application and at least a plurality of instructions configured to control access to the software application, the plurality of instructions being configured to, when executed, enable substantially automated control of access to the software application by at least:
-
based at least in part on receiving a first request for access to software application from a user, causing contact via a network with a party authorized to grant access to the software application; receiving authorization to grant access to the software application; causing recordation of at least a portion of the received authorization so as to be accessible for future access, and grant access to the software application based at least in part on the authorization; and in response to receiving at least a second subsequent request from a user for access to the software application, granting another access to the software application based at least in part on the recorded authorization, said another access being granted without requiring further contact with the party. - View Dependent Claims (36, 37, 38)
-
Specification