Software distribution method and apparatus
First Claim
Patent Images
1. A method of controlling access to a proprietary software application resident on a new computerized apparatus sold to a purchaser, the method comprising:
- receiving an initial request from the purchaser via an input device of the apparatus to execute the application;
automatically accessing a remote third party authorization entity via a network interface of the computerized apparatus in order to obtain an authorization for the initially requested execution of the application;
recording information relating to the obtained authorization on the computerized apparatus for subsequent use;
accessing the application pursuant to the initial request using at least the authorization;
receiving a subsequent request to execute the application from the purchaser; and
granting access to the application pursuant to the subsequent request based at least in part on the recorded information and without having to contact said third party again.
7 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides for a method and apparatus for distributing digital information, such as software applications, to application users. By providing the digital information on unused memory space of a computer system, and providing a process for authorizing access to the information, the information can be efficiently and cost effectively transferred to users. Traditional inventory and distribution channel difficulties are avoided.
46 Citations
41 Claims
-
1. A method of controlling access to a proprietary software application resident on a new computerized apparatus sold to a purchaser, the method comprising:
-
receiving an initial request from the purchaser via an input device of the apparatus to execute the application; automatically accessing a remote third party authorization entity via a network interface of the computerized apparatus in order to obtain an authorization for the initially requested execution of the application; recording information relating to the obtained authorization on the computerized apparatus for subsequent use; accessing the application pursuant to the initial request using at least the authorization; receiving a subsequent request to execute the application from the purchaser; and granting access to the application pursuant to the subsequent request based at least in part on the recorded information and without having to contact said third party again.
-
-
2. A computer-implemented method of controlling access to digital data in a computer apparatus, the data having been recorded on a non-volatile storage device of the computer apparatus, the method comprising:
recording in the computer apparatus a plurality of computer readable instructions, the instructions configured to, when executed by the computer apparatus, control access to the digital data by at least; based at least in part on receiving a first request for access to the digital data from a first entity, causing the computer apparatus to contact a party authorized to grant access to the digital data when the digital data has not been previously accessed; receiving authorization to grant access to the digital data; causing the computer apparatus to record at least a portion of the received authorization in the computerized apparatus, and grant access to the digital data based at least in part on the authorization; and in response to receiving at least a second request for access to the digital data, cause the computer apparatus to grant another access to the digital data based on the at least portion of the authorization recorded in the computer apparatus, and without further contact with the party. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
16. A method of distributing software with a computerized apparatus having digital data recorded thereon, the method comprising:
-
recording computer readable instructions in the computerized apparatus, the instructions configured to, when executed by the computerized apparatus, automatically control access to the digital data by at least; based at least in part on a first request for access to the digital data, executing the computer readable instructions causing the computerized apparatus to contact a party authorized to grant access to the digital data, the contact comprising transmission of at least a portion of the digital data; and when the party provides authorization to grant access to the digital data, executing the computer readable instructions causing the computerized apparatus to record at least a portion of the authorization in the computerized apparatus, and grant a first access to the digital data based on the authorization; wherein the recording of the at least portion of the authorization in the computerized apparatus enables subsequent execution of the computer readable instructions, said subsequent execution causing the computerized apparatus to grant a second access to the digital data automatically based at least in part on receiving at least a second request for access to the digital data, the second access not requiring contact with the party authorized to grant access to the digital data. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A method of distributing a software application with a computerized apparatus, the method comprising:
-
recording the software application on a non-volatile storage device in the computerized apparatus by a first entity; recording a plurality of computer readable instructions in the computerized apparatus by the first entity; and arranging for a transfer of the computerized apparatus to a second entity; wherein the plurality of instructions are configured to enable automated control of access to the software application by at least; based at least in part on receiving a first request to run the software application from the second entity, causing the computerized apparatus to contact via a network a party authorized to grant access to the software application; receiving authorization to grant access to the software application; causing the computerized apparatus to record at least a portion of the received authorization in the computerized apparatus, and grant access to the software application based at least in part on the authorization; and in response to receiving at least a second request from the second entity to run the software application, causing the computerized apparatus to grant another access to the software application based on the authorization recorded in the computerized apparatus, said another access being granted without requiring further contact with the party. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A method of controlling access to digitally rendered information in a computerized apparatus, the method comprising:
-
recording the digitally rendered information on at least one non-volatile storage medium of the computerized apparatus by a first entity; recording computer readable instructions in the computerized apparatus; and controlling access to the digitally rendered information by at least; based at least in part on detecting an attempted use of the digitally rendered information by a second entity, causing automatic execution of the computer readable instructions adapted to (i) access a network link, and (ii) to contact a party authorized to grant access to the digitally rendered information; when the party provides an authorization to grant access to the digitally rendered information, cause recording of the authorization in the computerized apparatus, and causing granting of a first access to use the digitally rendered information based at least in part on the recorded authorization; and based at least in part on receiving a second request from the second entity to access the digitally rendered information, granting at least a second access to use the digitally rendered information based at least in part on the authorization recorded in the computerized apparatus, and without further contact with the party. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41)
-
Specification