throbber
70243~00018
`
`
`
`
`
`
`
`
`
`
`
`
`SYSTEM AND METHOD FOR ADJUSTABLE LICENSING OF DIGITAL
`
`PRODUCTS
`
`
`
`
`
`
`
`CrossnReference to Related Application; $1
`
`
`
`
`
`
`
`
`
`
`
`
`
`This application claims priority pursuant to 35 USE. §119(e) to US.
`
`
`
`
`
`
`
`
`
`Provisional Application No. 60/ 988,778, entitled “SYSTEM FOR ADJUSTABLE
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`DIGITAL LICENSING OVER TIME,” filed November 17, 2007, which application is
`
`l0
`
`
`
`
`
`
`
`
`
`
`specifically incorporated herein, in its entirety, by reference.
`
`
`
`
`
`
`Field of the Invention
`
`
`
`
`
`
`Background of the Invention
`
`
`
`
`
`
`
`
`
`
`
`
`
`The present application relates generally to managing software use, and more
`
`
`
`15
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`specifically to systems and methods to enable the monitoring and adjusting software
`
`
`
`
`
`
`usage under a software license.
`
`
`
`
`
`
`
`Description of the Related Art
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`A common capability of digital product license systems is the ability to control
`
`
`
`20
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`how many devices are allowed to be used with each product license which is usually
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`sold to an individual customer or company. For example U.S. Fatent No. 5,490,216
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`refers to a system where a license is given to an individual, but in turn that license is
`
`
`
`
`
`
`
`
`
`
`
`
`linked to a specific personal computer thereby limiting the copyright holders exposure
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`to copyright abuse if the user decided to share their license with other unauthorized
`users.
`
`
`
`
`
`
`25
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`A problem that has arisen over time is the fact that consumers of software have
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`normal patterns of use that include the installation and use of digital products on
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`multiple devices. For example a person may wish to buy software and use it on three
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`computers at their home, a computer at work, a mobile computer and the computers at
`
`
`
`30
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`their holiday home and their parent’s house. In addition to these uses, computers are
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`also bought, sold and replaced so over time maybe two or three times this number of
`
`
`
`242553
`
`
`
`
`
`1
`
`Amazon v. Uniloc, |PR2017-00948
`Uniloc's Exhibit 2004, page 1
`
`Amazon v. Uniloc, IPR2017-00948
`Uniloc's Exhibit 2004, page 1
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`computers may be used by the user over time with a legitimate need to install and use
`
`
`
`
`
`the software on every computer.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Publishers of digital products have a dilemma in that they may want their
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`customers to receive the normal freedom to use the software that they have purchased
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`but they also do not want the software licenses to be freely shared amongst end users or
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`even in Worst case shared anonymously over the Internet resulting in massive piracy and
`
`
`
`
`
`copyright abuse of the product.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`To solve this problem some publishers have set a relatively high device to
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`license ratio in their control systems in the hope that customers will not exceed the
`
`10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`maximum number of devices per license. An example of this is Apple iTunes which
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`enables customers to play a purchased music file on up to a preset number (cg, five) of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`devices (e. g, PCs) per license before being requested to buy an additional license. They
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`have also implemented a system that allows customers to turn off the license rights of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`individual devices with regard to a specific music file license and therefore free up that
`
`
`
`15
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device installation so that the music file can be used on one additional device.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`While this method does go some way to appeasing the problem of a normal
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`customers usage expectations, it does not take into consideration the normal attrition
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`that occurs with the purchase and upgrade of personal computing devices or the like and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`places an expectation on the user to go through a number of involved steps to retain
`
`
`
`20
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`their rights to use the software. Accordingly, there is a need for an improved technique
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`for allowing for a changing number of device installations on a per license basis over
`
`
`
`time.
`
`
`
`
`
`
`Sunnnfl of the invention
`
`
`
`25
`
`
`
`
`
`
`
`
`
`
`
`
`
`The following presents a simplified summary of one or more embodiments in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`order to provide a basic understanding of such embodiments. This summary is not an
`extensive overview of all contemplated embodiments, and is intended to neither identify
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`key or critical elements of all embodiments nor delineate the scope of any or all
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`embodiments. Its sole purpose is to present some concepts of one or more embodiments
`
`
`
`30
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`in a simplified form as a prelude to the more detailed description that is presented later.
`
`242521
`
`
`
`2
`
`
`
`Amazon v. Uniloc, |PR2017-00948
`Uniloc's Exhibit 2004, page 2
`
`Amazon v. Uniloc, IPR2017-00948
`Uniloc's Exhibit 2004, page 2
`
`

`

`
`
`
`
`
`
`
`
`
`in accordance with one or more embodiments and corresponding disclosure
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`thereof, various aspects are described in connection with adjusting a license for a digital
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`product overtime. The license may comprise at least one ailowed copy count
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`corresponding to a maximum number of devices authorized for use with the digital
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`product. in cue embodiment, a system for adjustable licensing includes: a
`
`
`
`
`
`
`
`
`
`
`
`communication moduie for receiving a request for authorization to use the digital
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`product from a given device; a processor module in operative communication with the
`
`
`
`
`
`
`
`
`
`
`
`
`
`communication module; and a memory module in operative communication with the
`
`
`processor module.
`
`
`
`10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The memory module may include executable code for the processor module to:
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(a) verify that a license data associated with the digital product is valid based at least in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`part on a device identity associated with the given device; and (b) in response to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device identity already being on a record, ailow the digitai product to be used on the
`
`
`
`
`given device.
`
`
`
`15
`
`
`
`
`
`
`
`
`
`
`
`
`
`The memory module may further inciude executable code for the processor
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`module to: (c) in response to the device identity not being on the record, set the allowed
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`copy count to a first upper limit for a first time period; (d) calculate a device count
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`corresponding to total number of devices aiready authorized for use with the digital
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`product; and (e) when the calculated device count is less than the first upper limit, allow
`
`
`
`20
`
`
`
`
`
`
`
`
`
`
`
`
`the digital product to be used on the given device.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`In related aspects, the processor module may be adapted to: (a) in response to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device identity not being on the record, after the first time period has expired, set the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`allowed copy count to a second upper iimit for a second time period; (b) recalculate the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device count; and/or (c) when the recalculated device count is less than the second
`
`
`
`25
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`upper limit, allow the digitai product to be used on the given device. For example, the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`second time period may comprise a defined number of days since the initial
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`authorization. The processor module may be adapted to, in response to the calculated
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device count equaling the second upper limit, send a warning regarding the allowed
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`copy count to the given device. The processor module may be adapted to, in response to
`
`30
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the calculated device count exceeding the second upper limit, deny the request for
`
`authorization.
`
`
`
`“255$
`
`
`
`3
`
`
`
`Amazon v. Uniloc, |PR2017-00948
`Uniloc's Exhibit 2004, page 3
`
`Amazon v. Uniloc, IPR2017-00948
`Uniloc's Exhibit 2004, page 3
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`In further related aspects, the processor module may be adapted to: (a) in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`response to the device identity not being on the record, after the second time period has
`
`
`
`expired, set the allowed copy count to a third upper limit; (b) recalculate the device
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`count; and (0) when the recalculated device count is less than the third upper limit,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`allow the digital product to be used on the given device. The processor module may be
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`adapted to, in response to the calculated device count equaling the third upper limit,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`send a warning regarding the allowed copy count to the given device. The processor
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`module may be adapted to, in response to the calculated device count exceeding the
`
`
`
`
`
`
`
`
`
`
`third upper limit, deny the request for authorization.
`
`
`
`10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`To the accomplishment of the foregoing and related ends, the one or more
`
`
`
`
`
`
`
`
`
`
`
`
`embodiments comprise the features hereinafter fitlly described and particularly pointed
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`out in the claims. The following description and the annexed drawings set forth in
`detail certain iliustrative aspects of the one or more embodiments. These aspects are
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`indicative, however, of but a few of the various ways in which the principles of various
`
`
`
`15
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`embodiments may be employed and the described embodiments are intended to include
`
`
`
`
`
`
`
`
`all such aspects and their equivalents.
`
`
`
`
`
`
`
`Brief Description of the Drawings
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Figure 1 is an exemplary set of license rules that may be implemented to adjust
`
`
`
`20
`
`
`
`
`
`
`
`
`
`
`
`
`
`the number of device installations on a per license basis over time.
`
`
`
`
`
`
`
`
`
`
`
`
`
`Figure 2 shows an exemplary approach for adjusting a license for a digital
`
`
`
`product.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Figure 3A shows one embodiment for a method for adjusting a iicense for a
`
`
`digital product.
`
`
`
`
`25
`
`
`
`
`
`
`
`
`
`
`
`
`
`Figure 3B shows several sample aspects of the method shown in Figure 3A.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Figure 4 shows one embodiment for a system for adjusting a license for a digital
`
`
`
`product.
`
`
`
`30
`
`
`
`
`
`
`
`
`
`
`
`
`
`Various embodiments are now described with reference to the drawings, wherein
`
`
`
`
`
`
`
`
`
`
`
`
`
`like reference numerals are used to refer to iike elements throughout.
`
`
`
`
`
`
`In the following
`
`
`Detailed Description
`
`
`
`
`243511
`
`
`
`4
`
`
`
`Amazon v. Uniloc, |PR2017-00948
`Uniloc's Exhibit 2004, page 4
`
`Amazon v. Uniloc, IPR2017-00948
`Uniloc's Exhibit 2004, page 4
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`description, for purposes of explanation, numerous specific details are set forth in order
`
`
`
`'
`
`
`
`
`
`
`
`
`
`
`
`
`
`to provide a thorough understanding of one or more embodiments. It may be evident,
`
`
`
`
`
`
`
`
`
`
`
`
`
`however, that such embodiment(s) can be practiced without these specific details.
`
`
`
`
`in
`
`
`
`
`
`
`
`
`
`
`
`
`
`other instances, well-known structures and devices are shown in block diagram form in
`
`
`
`
`
`
`
`
`
`
`
`
`order to faciiitate describing one or more embodiments.
`
`
`
`
`
`
`
`
`
`
`
`
`The techniques described herein allow for a changing number of device
`
`
`
`installations on a per license basis over time. Aspects of the techniques may include a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`customer feedback system that warns a user when they are nearing the limit of their
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`device installation ceiling for their license. An example scenario could be as follows. A
`
`
`
`10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`software publisher wants to commence distribution of a software product and to
`
`
`
`
`
`
`
`
`
`
`
`
`minimize unauthorized copying of their software. Their iicense may state that the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`publisher authorizes the user to use their software on up to, for exampie, five devices,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`but that the pubiisher reserves the right to increase this limit at their own discretion. The
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`customer installs the software on the three computers they have at home. Each time the
`
`
`
`15
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`software cennects to a license management server controlled by the publisher over the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Internet to ensure that the device limit for the individual license has not been exceeded.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The customer may choose to install the same software on their personal
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`computer (PC) at work. Upon contacting the publishers license management server over
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the Internet a message is displayed to the user warning them that they are nearing the
`
`
`
`20
`
`
`
`
`
`
`
`
`
`
`limit of their device count for their license.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Two weeks later the user wishes to instali their software on the two computers
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`they own at the customers holiday home. If the publisher uses the proposed invention
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the maximum number of devices for the license may have been adjusted to
`
`
`
`
`
`
`
`
`
`
`
`
`
`accommodate a reasonable small increase in the number of devices iinked to a specific
`
`
`
`
`25
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`license and both PCs may be allowed to instali and run even though the publishers
`
`
`
`
`
`
`
`
`
`
`stated device limit per license is five.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Then three months later, the user experiences water damage from a flood in their
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`house and a new PC is purchased. Upon installation of the protected software the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`invention will allow the user to obtain additional device installations from the
`
`30
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`publishers license management server for the same iicense (cg, up to a total of seven
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`devices) even though the device limit is initially set to five. However, if that user shares
`
`
`
`MESS—l
`
`
`
`5
`
`
`
`Amazon v. Uniloc, |PR2017-00948
`Uniloc's Exhibit 2004, page 5
`
`Amazon v. Uniloc, IPR2017-00948
`Uniloc's Exhibit 2004, page 5
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`their license with all the computer users in a college dormitory, the invention can be set
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`to stop wholesale abuse of the license terms, as described in further detail herein.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`In accordance with one or more aspects of the embodiments described herein,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`there is provided a system for adjustable digital licensing overtime allows a software
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`user to increase the number of devices they can use with a particular software license
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`over the period of ownership of that license. The terms or rules 60 of an exemplary
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`software license are shown in Figure 1. For example, initially, the publisher or
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`distributor of the software sets rules 60 that govern the use of the software on a specific
`
`
`
`number of devices. The number of devices allowed to run the software in an authorized
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`or enabled state may increase over time to reflect the normal usage pattern of software
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`users where the user adds devices, replaces or upgrades devices overtime. The rules 60
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`may reflect this pattern of an increasing number of devices authorized over time. For the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`first five days of the users use of the software a total of five devices can be authorized
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`on new devices. For the next twenty-five days until the thirtieth day after first
`
`15
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`authorization, the user is allowed to authorize a total of seven new devices. After the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`first thirty days an additional four devices can be authorized, delivering the maximum
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`number of copies on separate devices under the license which, in this example
`
`
`
`
`
`embodiment, is eleven.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`It is noted that the various numbers used to describe the embodiments herein,
`
`
`
`20
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`such as, for example, the allowed copy counts, the maximum number of devices
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`authorized for use, the upper limit on the number of devices for a given time period, or
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the like, are purely exemplary, and that other numbers, data, values, or algorithms may
`
`
`
`
`
`
`
`
`
`
`
`be used in lieu of the exemplary numbers herein.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`In related aspects, Figure 2 shows an example embodiment of a software system
`
`
`
`25
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`that is designed to manage and implement the rules under a license, such as, for
`
`
`
`
`
`
`
`
`
`
`
`
`
`example, the licensing terms 60 described in iiigure 1. Device locked iicense systems
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`such as described in US. Patent No. 5,490,216, entitled “SYSTEM FOR SOFTWARE
`
`
`
`
`
`
`
`
`
`
`
`
`REGISTRATION," which is specifically incorporated herein, in its entirety, by
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`reference, allow a software license to be locked to a license agreement and specific
`
`
`
`30
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`authorized devices. With continued reference to Figure 2, there is shown a system
`
`
`
`
`
`
`
`
`
`
`
`
`
`comprising a device 50 that requests authorization via a software process, and a
`
`
`24255-1
`
`
`
`6
`
`
`
`Amazon v. Uniloc, |PR2017-00948
`Uniloc's Exhibit 2004, page 6
`
`Amazon v. Uniloc, IPR2017-00948
`Uniloc's Exhibit 2004, page 6
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`licensing authority 55 that may be a software system that represents the publisher or
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`distributors interests and regulates the number of devices that can be used with each
`
`
`
`license.
`
`
`
`
`
`
`
`
`
`
`
`Typically the device 50 requesting authorization collects license related
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`information 10 and unique device identifying information 11, complies the coiiected
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`information into a communication and sends it to the authorization authority 55. Upon
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`receipt of this communication from the device 50, the license authority 55 checks that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the license information is valid (step 13). If the request fails, an authorization is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`disallowed (step 14) and the device based software is sent a message to this effect. In
`
`10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`practice this may involve further action by the device based software to notify the user
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`of the faiiure to authorize and then either terminate the software or allow the software to
`
`
`
`
`
`
`
`
`
`
`
`
`continue in some form of trial mode or the like.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`If the request for authorization 12 includes license information/data that is valid,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the license information checking process (at step 13) will pass and the requesting
`
`
`
`15
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`devices unique identity information 11 is checked to see if it exists in the database of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`prior authorizations 15. If the device identity exists (step i6), meaning that the software
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`has been successfuily registered on the same device in the past, then according to the
`
`
`
`
`
`
`
`
`
`
`
`
`
`license terms 60 for the software a re—authorization is automatically ailowed (step 17). A
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`communication allowing the software to continue in an authorized state is passed to the
`
`20
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`requesting device software 50 and the software on the device is subsequently authorized
`
`
`
`
`
`
`
`
`
`(step 18) and allowed to run.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`If the unique identity of the device 11 is not in the authorization database 15 of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`previous device requests, then the licensing authority 55 checks to see if the new
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`authorization request is the first request or is a subsequent request that has occurred in
`the first five days from the date of the first successful authorization (step 19).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`25
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`At step 19, if the request is within the first five day period, the authorization
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`database 15 is consulted for a count of how many successful authorizations for new
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`devices have been allowed. Under the license rules 60, if the device count is less than
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`five then a message is sent to the request device that allows the software to continue in
`
`30
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`an authorized state (step 18). if the device count is equal to five then the licensing
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`authority 55 may send a message to the requesting device 50 aliowing the device to run
`
`
`242553
`
`
`
`7
`
`
`
`Amazon v. Uniloc, |PR2017-00948
`Uniloc's Exhibit 2004, page 7
`
`Amazon v. Uniloc, IPR2017-00948
`Uniloc's Exhibit 2004, page 7
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`in an authorized state (step 18), but also may optionally inform the user that the limit of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the number of devices available to run under this license has been reached and that
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`subsequent requests for authorization may be denied in the short term (step 22).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`if the count of devices authorized for use with the specific license 10 is greater
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`than five (step 23), then the licensing authority 55 sends a message denying
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`authorization (step 25) and the user is optionally notified that the limit of devices that
`
`
`
`can be authorized with their license terms has been exceeded (step 24). In practice, the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`software on the requesting device 50 may subsequentiy terminate the software or may
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`ailow the software to run in a limited trial mode if this is available.
`
`
`
`10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`if the number of days since the first authorization of a device for the license 10 is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`not less than six (step 19), then the licensing authority tests the time elapsed from the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`first successful authorization to see if it is less than thirty-one days since the date and
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`time of the first successful authorization (step 26). If this test at step 26 is successful
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(i.e., if the time elapsed since the first successful authorization is less than thirty-one
`
`
`
`15
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`days), then a test is made to see if the count of successful new device authorizations is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`less than seven (step 27). If this is so, a communication is made to the requesting device
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`50 authorizing the device 50 to run the software (step 28). If the new device count is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`equal to seven (step 29), then the user is warned that their device limit has been reached
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`(step 30) and the device 50 is subsequently authorized to run (step 28).
`
`
`
`
`2t)
`
`
`
`
`
`
`
`
`
`
`
`
`
`However, if the new device count is greater than seven (step 31), a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`communication is made to the requesting device 50 that the authorization is denied (step
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`33) and optionally the user is notified that their license device count has been exceeded
`
`
`
`
`(step 32).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`if the number of days since the first successful authorization is greater than thirty
`
`
`
`25
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`days (step 34), the device count for the license 10 is checked in the authorization
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`database 15 and the device count for the license 10 retrieved. If the number of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`successful new device authorizations is ten or less (step 35), then the device
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`authorization is allowed (step 36). If the device count is equal to eleven (step 37), then
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the user is optionally warned that they have reached the limit (step 38) and the device 50
`
`
`
`30
`
`
`
`
`
`
`
`
`is authorized to run (step 36).
`
`
`
`24255.»!
`
`
`
`'
`
`8
`
`
`
`Amazon v. Uniloc, |PR2017-00948
`Uniloc's Exhibit 2004, page 8
`
`Amazon v. Uniloc, IPR2017-00948
`Uniloc's Exhibit 2004, page 8
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`However if the device count is greater than eleven (step 39), then a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`communication is made to the requesting device 50 that the user be optionally notified
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`that the maximum number of allowed devices under terms of the iicense has been
`
`
`
`
`
`
`
`
`
`
`
`
`exceeded (step 40) and the authorization is denied (step 41).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The result is a license system that allows consumers of softWare to load their
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`software on new or replacement devices as they are purchased over time without
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`exposing the publisher to copying abuses that is common amongst software pirates and
`
`
`
`
`
`casual software copiers.
`
`
`
`
`
`
`
`
`
`
`
`
`In one alternative embodiment, there is provided a license management system
`
`
`
`10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`that is linked to a fixed calendar date rather than the date of first successfui
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`authorization. This approach can be used for marketing and distribution purposes such
`
`
`
`as specifying specific periods of high copy counts to encourage word of mouth and user
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`to user sharing but later restricting the device count to encourage peeple to begin paying
`
`
`
`
`
`
`
`
`
`for copies that have been intentionally shared.
`
`
`
`l5
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`It is noted that the example embodiment of Figures 1 and 2 is simple for the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`purposes of understanding but can include any number of evaluation periods, not just
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the five, thirty and unlimited day periods described in the example. Also the number of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`notification stages can be indefinitely expanded, for example the user could be given a
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`polite message encouraging them to be carefui with making copies when they are two
`
`
`
`20
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`copies away from their count limit and a stronger message when it is their last copy
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`before being denied authorizations. Messages could also optionally tel} the user how
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`many days they have to wait before additional device authorizations will be available.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`It is further noted that in Figure 1 and 2 the allowed copy count increases over
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`time. An alternative embodiment could be used Where the allowed copy count decreases
`
`
`
`
`25
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`over time. This may be useful in a situation, for example, where the publisher supplies
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`their software with a fairly open device count license rule but discovers individual
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`instances of copy abuse and decides to iimit the license terms of those specific licenses.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The described system could also be used with authorizations for software that is
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`rented or otherwise allowed to be used for a specific period of time or number of uses
`
`
`
`30
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`rather than indefinitely as in the example embodiment of Figures 1 and 2.
`
`24251.1
`
`
`
`9
`
`
`
`Amazon v. Uniloc, |PR2017-00948
`Uniloc's Exhibit 2004, page 9
`
`Amazon v. Uniloc, IPR2017-00948
`Uniloc's Exhibit 2004, page 9
`
`

`

`
`
`
`
`
`
`
`
`
`Another alternative embodiment of the above scenarios could include an
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`algorithm rather than an arbitrary value in calculating both the time period for the
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`calculation of the device count, and the device count related to that specific measured
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`time period. For example, the algorithm for the available device count could be equal to
`the number of elapsed days since the first successful activation divided by five in
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`brackets plus five. Using the example algorithm a device count of five would be
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`available from day one, and a device count of eleven at day thirty and so on.
`
`
`
`
`
`
`
`
`
`
`
`In yet another alternative embodiment, the techniques described herein may he
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`used for security applications where access is granted to data or some other valuable or
`
`
`
`10
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`important item as a result of a successful authorization rather than in the example of
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Figures 1 and 2 where it is a license that is being granted.
`In accordance with one or more aspects of the embodiments described herein,
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`there is provided a method for adjusting a license for a digital product over time. The
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`license rules may comprise at least one allowed copy count corresponding to a
`
`15
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`maximum number of devices authorized for use with the digital product. With reference
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`to the flow chart shown in Figure 3A, there is provided a method 300 that may involve
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`receiving a request for authorization to use the digital product on a given device (step
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`310). The method 300 may further involve verifying that a license data associated with
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`the digital product is valid based at least in part on a device identity associated with the
`
`20
`
`
`
`
`
`
`given device (step 320).
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`In response to the device identity already being on a record, the method 300 may
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`involve allowing the digital product to be used on the given device (step 330). In
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`response to the device identity not being on the record, the method 300 may involve
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`setting the allowed. copy count to a first upper limit for a first time period after an initial
`
`
`
`
`25
`
`
`
`
`
`
`
`
`
`
`
`
`
`authorization of the digital product (step 340). The method 300 may further involve
`
`
`
`
`
`
`
`
`
`
`
`
`
`calculating a device count corresponding to total number of devices already authorized
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`for use with the digital product (step 350), and when the calculated device count is less
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`than the first upper limit, allowing the digital product to be used on the given device
`
`
`(step 360).
`
`
`
`30
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`With reference to Figure 3B, in on

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket