throbber
PTO/SB/O8a (10-08)
`Doc code IDS
`Approved for use through 11/50/2008. OMB 0651-0031
`:
`,
`eh
`U.S. Patent and Trademark Office. U.S. DEPARTMENT OF COMMERCE
`Doc description: Information Disclosure Statement (IDS) Filed
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number
`
`
`Application Number
`
`INFORMATION DISCLOSURE
`STATEMENT BY APPLICANT
`
`( Not for submission under 37 CFR 1.99)
`
`
`Filing Date
`
`
`
`[Ric B. Richardson
`First Named Inventor
`
`At Unit |
`
`Examiner Name |
`
`Attorney Docket Number | 70243-00018
`
`
`
`U.S.PATENTS
`
`Examiner]
`Initial*
`
`Patent Super
`
`aug Dale
`
`Nameof Patentee or Applicant
`of cited Document
`
`Pages,Columns,Lines where
`Relevant Passages or Relevant
`Figures Appear
`
`6976009
`
`2005-12-13
`
`Jadayon étal.
`
`
`
`7069595
`
`2006-06-27
`
`Coagnigni et al.
`
`
`
`7085741
`
`2006-08-01
`
`Lao et al.
`
`
`
`7203966
`
`2007-04-10
`
`Abburi et al.
`
`U.S.PATENT APPLICATION PUBLICATIONS
`
`
`
`
`
`
`7206765
`
`2007-04-17
`
`Gilliam etal.
`
`
`
`7337147
`
`2008-02-26
`
`Chen etal
`
`
`
`7343297
`
`2008-03-14
`
`Bergler etal.
`
`If you wish to add additional U.S. Patent citation information please click the Add button.
`
`EFS Web 2.1.7
`
`1
`
`GOOGLE 1002
`
`1
`
`GOOGLE 1002
`
`

`

`
`
`Application Number
`Filing Date
`
`First Named Inventor Ric B. Richardson
`
`Art Unit
`
`INFORMATION DISCLOSURE
`STATEMENT BY APPLICANT
`( Not for submission under 37 CFR 1.99)
`
`Examiner Name |
`
`
`Attorney Docket Number | 70243-00018
`
`
`
`Pages,Columns,Lines where
`
`
`Examiner Cite Publication Number Kind|Publication Name of Patentee or Applicant Relevant Passagesor Relevant
`Initial
`No
`Code’| Date
`of cited Document
`.
`Figures Appear
`
`
`1
`
`200200198714
`
`20020082997
`
`20020161718
`
`2002-02-14
`
`Ganesan
`
`2002-06-27
`
`Kobata et al.
`
`2002-10-31
`
`Coley et al.
`
`
`
`20030172035
`
`2003-09-11
`
`Cronce et al.
`
`
`
`
` 10 20070198422
` 2007-08-23
`
`
`
`
`
`Rodgersetal.
`
`
`20040059929
`
`2004-03-25
`
`20050108173
`
`2005-05-19
`
`Stefik et al
`
`
`
`20070165288
`
`20070203846
`
`20070219917
`
`2007-07-19
`
`Bozeman
`
`Prahlad etal.
`
`2007-08-30
`
`Kavuri et al.
`
`2007-09-20
`
`Liu et al.
`
`
`
`EFS Web 2.1.6
`
`2
`
`

`

`
`
`Application Number
`
`( Not for submission under 37 CFR 1.99)
`
`
`
`
`
`
`Filing Date
`First Named Inventor
`INFORMATION DISCLOSURE
`Ric B. Richardson
`
`STATEMENT BY APPLICANT
`|
`|
`Examiner Name
`Attorney Docket Number
`
`
`
`| 70243-00018
`
`
`
`
`
`
`Examiner] Cite
`
`
`
`W
`
`20070282615
`
`2007-12-06
`
`Hamilton et al.
`
`
`
`
`
`12|20080065552 2008-03-13 Elazaretal.
`
`
`
`20080086423
`
`2008-14-10
`
`Waites.
`
`20080147556
`
`2008-06-19
`
`Smith etal.
`
`
`
`20080228578
`
`2008-09-18
`
`If you wish to add additional U.S, Published Application citation information please click the Add button
`
`
`FOREIGN PATENT DOCUMENTS
`
`
`Pages,Columns,Lines
`Name of Patentee or
`where Relevant
`
`Examiner! Foreign Document|Country Kind|Publication
`
`Applicantof cited
`Passages or Relevant
`Initial*
`Numbers
`Code? j
`Code4| Date
`Document
`Figures Appear
`
`If you wish to add additional Foreign Patent Documentcitation information please click the Add button
`
`
`NON-PATENT LITERATURE DOCUMENTS
`
`
`Include name of the author (in CAPITAL LETTERS),title of the article (when appropriate),title of the item
`(book, magazine,journal, serial, symposium, catalog, etc), date, pages(s), volume-issue number(s),
`publisher, city and/or country where published.
`
`EFS Web 2.1.6
`
`3
`
`

`

`
`
`Application Number
`
`
`Filing Date
`First Named Inventor
`INFORMATION DISCLOSURE
`Ric B. Richardson
`
`
`STATEMENT BY APPLICANT |
`
`Examiner Name |
`
`Attorney Docket Number | 70243-00018
`
`( Not for submission under 37 CFR 1.99)
`
`
`EXAMINER SIGNATURE
`Examiner Signature | Date Considered
`
`
`
`“EXAMINER: Initial if reference considered, whetheror notcitation is in conforrnance with MPEP 609. Draw line through a
`citation if not in conformance and not considered. Include copy of this form with next communication to applicant.
`
`* Enter office that issued the document, by the two-letter code (WIPO
`1 See Kind Codes of USPTO Patent Dacuments at www.USPTO.GOY or MPEP 801.04.
`Standard ST.3). * For Japanese patent documents,the indication of the year of the reign of the Emperor must precede the serial numberof the patent document.
`4“ Kind of documentby the appropriate symbols as indicated on the document under WIPO Standard ST.16 if possible.
`° Applicant is to place a check mark here if
`
`English languagetranslation is attached.
`
`EFS Web 2.1.6
`
`4
`
`

`

`
`
`Application Number
`
`Filing Date
`
`
`
`| Ric B. Richardson
`First Named Inventor
`INFORMATION DISCLOSURE
`
`STATEMENT BY APPLICANT | |
`Examiner Name
`|
`Attorney Docket Number
`
`( Not for submission under 37 CFR 1.99)
`
`
`
`
`
`[ 70243-00018
`
`
`
`CERTIFICATION STATEMENT
`
`Please see 37 CFR 1.97 and 1.98 to make the appropriate selection(s):
`
`[_]
`
`That each item of information contained in the information disclosure statement was first cited in any communication
`from a foreign patent office in a counterpart foreign application not more than three months prior to the filing of the
`information disclosure statement. See 37 CFR 1,97(e)(1).
`
`OR
`
`[-]
`
`That no ttem of information contained in the information disclosure statement was cited in a communication from a
`foreign patent office in a counterpart foreign application, and, to the knowledge of the person signing the certification
`after making reasonable inquiry, no item of information contained in the information disclosure statement was known to
`any individual designated in 37 CFR 1.56(c) more than three months prior to the filing of the information disclosure
`statement. See 37 CFR 1.97(e)(2).
`
`[| See attached certification statement.
`[_] Fee set forth in 37 CFR 1.17 (p) has been submitted herewith.
`[x] None
`
`SIGNATURE
`A signature of the applicant or representative Is required in accordance with CFR 1.33, 10.18. Please see CFR 1.4(d) for the
`form of the signature.
`
`
`Signature
`
`‘John L. Paik/
`
`John L. Paik
`
`Date (YYYY-MM-DD)
`
`2008-11-17
`
`Registration Number
`
`54355
`
`VA 22313-1450.
`
`This collection of information is required by 37 CFR 1.97 and 1.98. The information is required to obtain or retain a benefit by the
`public whichis to file (and by the USPTO to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR
`1.14. This collection is estimated to take 1 hour to complete, including gathering, preparing and submitting the completed
`application form tothe USPTO. Time will vary depending upon the individual case. Any comments on the amountof time you
`require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, U.S,
`Patent and Trademark Office, U.S. Department of Commerce, P.O. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND
`FEES OR COMPLETED FORMS TO THIS ADDRESS. SEND TO: Commissionerfor Patents, P.O. Box 1450, Alexandria,
`
`EFS Web2.1.6
`
`5
`
`

`

`Privacy Act Statement
`
`
`The Privacy Act of 1974 (P.L. 93-579) requires that you be given certain information in connection with your submission of the
`attached form related to a patent application or patent. Accordingly, pursuant to the requirements of the Act, please be advised
`that:
`(1) the general authority for the collection of this information is 35 U.S.C. 2(b)(2); (2) furnishing of the information solicited
`is voluntary; and (3) the principal purpose for which the information is used by the U.S. Patent and Trademark Office is to
`process and/or examine your submission related to a patent application or patent.
`If you do not furnish the requested
`information, the U.S. Patent and Trademark Office may not be able to process and/or examine your submission, which may
`result in termination of proceedings or abandonmentof the application or expiration of the patent.
`
`The information provided by youin this form will be subject to the following routine uses:
`
`At
`
`The information on this form will be treated confidentially to the extent allowed under the Freedom of Information Act
`(5 U.S.C, 552) and the Privacy Act (5 U.S.C. 552a). Records from this system of records may be disclosed to the
`Depariment of Justice to determine whether the Freedom of Information Act requires disclosure of these record s.
`
`A record from this system of records may be disclosed, as a routine use, in the course of presenting evidence to a
`court, magistrate, or administrative tribunal, including disclosures to opposing counselin the course of settlement
`negotiations.
`
`A record in this system of records may be disclosed, as a routine use, to a Member of Congress submitting a
`requestinvolving an individual, to whom the record pertains, when the individual has requested assistance from the
`Memberwith respect to the subject matter of the record.
`
`A record in this system of records may be disclosed, as a routine use, to a contractor of the Agency having need for
`the information in order to perform a contract. Recipients of information shall be required to comply with the
`requirements of the Privacy Act of 1974, as amended, pursuant to 5 U.S.C. 552a(m).
`
`A record related to an International Application filed under the Patent Cooperation Treaty in this system of records
`may be disclosed, as a routine use, to the International Bureau of the World Intellectual Property Organization, pursuant
`to the Patent Cooperation Treaty.
`
`A record in this system of records may be disclosed, as a routine use, to another federal agency for purposesof
`National Security review (35 U.S.C. 181) and for review pursuantto the Atomic Energy Act (42 U.S.C. 218(c)).
`
`A record from this system of records may be disclosed, as a routine use, to the Administrator, General Services, or
`his/her designee, during an inspection of records conducted by GSAaspart of that agency's responsibility to
`recommend improvements in records managementpractices and programs, under authority of 44 U.S.C, 2904 and
`2906. Such disclosure shall be made in accordance with the GSA regulations governing inspection of records for this
`purpose, and anyotherrelevant(i,e,, GSA or Commerce) directive, Such disclosure shall not be used to make
`determinations aboutindividuals.
`
`A record from this system of records may be disclosed, as a routine use, to the public after either publication of the
`application pursuant to 35 U.S.C. 122(b) or issuance of a patent pursuant to 35 U.S.C. 151. Further, a record may be
`disclosed, subject to the limitations of 37 CFR 1.14, as a routine use,to the public if the record was filed in an application
`which became abandonedorin which the proceedings were terminated and which application is referenced by either a
`published application, an application open to public inspections or an issued patent.
`
`g;
`
`A record from this systern of records may be disclosed, as a routine use, to a Federal, State, or local law
`enforcement agency, if the USPTO becomes awareof a violation or potential violation of law or regulation,
`
`
`
`EFS Web 2.17
`
`6
`
`

`

`70243-00018
`
`SYSTEM AND METHOD FOR ADJUSTABLE LICENSING OF DIGITAL
`PRODUCTS
`
`Cross-Reference to Related Application(s
`
`This application claims priority pursuant to 35 U.S.C, §119(e) to U.S.
`
`Provisional Application No, 60/ 988,778, entitled “SYSTEM FOR ADJUSTABLE
`
`DIGITAL LICENSING OVER TIME,”filed November 17, 2007, which application is
`
`10
`
`specifically incorporated herein, in its entirety, by reference.
`
`Field of the Invention
`
`Background of the Invention
`
`The present application relates generally to managing software use, and more
`
`specifically to systems and methods to enable the monitoring and adjusting software
`
`usage under a software license.
`
`Description of the Related Art
`
`A common capability of digital product license systemsis the ability to control
`
`20
`
`how many devices are allowed to be used with each product license whichis usually
`
`sold to an individual customer or company. For example U.S. Patent No. 5,490,216
`
`refers to a system wherea license is given to an individual, but in turn that licenseis
`
`linked to a specific personal computer thereby limiting the copyright holders exposure
`
`to copyright abuse if the user decided to share their license with other unauthorized
`users.
`
`A problem thathas arisen over timeis the fact that consumers of software have
`
`normal patterns of use that includethe installation and use of digital products on
`
`multiple devices. For example a person may wish ta buy software and use it on three
`
`computers at their home, a computer at work, a mobile computer and the computers at
`
`30
`
`their holiday home and their parent’s house. In addition to these uses, computers are
`
`also bought, sold and replaced so over time maybe twoor three times this number of
`
`24255_}
`
`1
`
`7
`
`

`

`computers may be used by the user over time with a legitimate need to install and use
`
`the software on every computer.
`
`Publishers of digital products have a dilemmain that they may want their
`
`customers to receive the normal freedom to use the software that they have purchased
`
`but they also do not wantthe softwarelicenses to be freely shared amongst end users or
`
`even in worst case shared anonymously over the Internet resulting in massive piracy and
`
`copyright abuse ofthe product.
`
`To solve this problem some publishers have set a relatively high device to
`
`license ratio in their control systems in the hope that customers will not exceed the
`
`maximum number of devices per license. An example of this is Apple {Tunes which
`
`enables customers to play a purchased music file on up to a preset number(e.g., five) of
`
`devices (e.g., PCs) per license before being requested to buy an additional license, They
`
`have also implemented a system that allows customers to turn off the license rights of
`
`individual devices with regard to a specific music file license and therefore free up that
`
`device installation so that the music file can be used on one additional device,
`
`While this method does go some way to appeasing the problem of a normal
`
`customers usage expectations, it does not take into consideration the normalattrition
`
`that occurs with the purchase and upgrade of personal computing devicesorthe like and
`
`places an expectation on the user to go through a numberofinvolved stepsto retain
`
`20
`
`their tights to use the software. Accordingly, there is a need for an improved technique
`
`for allowing for a changing number of device installations on a per license basis over
`
`time.
`
`Summary of the Invention
`
`25
`
`The following presents a simplified summary of one or more embodiments in
`
`order to provide a basic understanding of such embodiments. This summary is not an
`
`extensive overview ofall contemplated embodiments, andis intended to neither identify
`
`key or critical elements of all embodiments nor delineate the scope of anyorall
`
`embodiments. Its sole purpose is to present some concepts of one or more embodiments
`
`30
`
`in a simplified form as a prelude to the more detailed description that is presented later.
`
`24255_1
`
`2
`
`8
`
`

`

`In accordance with one or more embodiments and corresponding disclosure
`
`thereof, various aspects are described in connection with adjusting a license for a digital
`
`product over time. The license may comprise at least one allowed copy count
`
`corresponding to a maximum number of devices authorized for use with the digital
`
`product. In one embodiment, a system for adjustable licensing includes: a
`
`communication module for receiving a request for authorization to use the digital
`
`product from a given device; a processor module in operative communication with the
`
`communication module; and a memory module in operative communication with the
`
`processor module,
`
`10
`
`The memory module may include executable code for the processor moduleto:
`
`(a) verify that a license data associated with the digital product is valid basedatleast in
`
`part on a device identity associated with the given device; and (b) in response to the
`
`device identity already being on a record, allow the digital product to be used on the
`
`given device.
`
`15
`
`The memory module may further include executable code for the processor
`
`module to: (c) in response to the device identity not being on the record,set the allowed
`
`copy countto a first upper limit for a first time period; (d) calculate a device count
`
`cofresponding to total number of devices already authorized for use with the digital
`
`product; and (e) when the calculated device count is less than the first upper limit, allow
`
`20
`
`the digital product to be used onthe given device.
`
`In related aspects, the processor module may be adaptedto: (a) in response to the
`
`device identity not being on the record, after the first time period has expired, set the
`
`allowed copy count to a second upperlimit for a second time period; (b) recalculate the
`
`device count; and/or (c) when the recalculated device count is less than the second
`
`25
`
`upperlimit, allow the digital product to be used on the given device. For example, the
`
`second time period may comprise a defined numberof days since theinitial
`
`authorization, The processor module may be adapted to, in response to the calculated
`
`device count equaling the second upperlimit, send a warning regarding the allowed
`
`copy count to the given device. The processor module may be adaptedto, in response to
`
`30
`
`the calculated device count exceeding the second upperlimit, deny the request for
`
`authorization.
`
`24255_1
`
`3
`
`9
`
`

`

`In further related aspects, the processor module may be adapted to: (a) in
`
`response to the device identity not being on the record, after the second time period has
`
`expired, set the allowed copy count to a third upper limit; (b) recalculate the device
`
`count; and (c) whenthe recalculated device count is less than the third upper limit,
`
`allow the digital product to be used on the given device. The processor module may be
`
`adapted to, in response fo the calculated device count equaling the third upper limit,
`
`send a warning regarding the allowed copy count to the given device. The processor
`
`module may be adapted to, in response to the calculated device count exceeding the
`
`third upper limit, deny the request for authorization.
`
`10
`
`To the accomplishmentof the foregoing and related ends, the one or more
`
`embodiments comprise the features hereinafler fully described and particularly pointed
`
`out in the claims. The following description and the annexed drawingsset forth in
`
`detail certain illustrative aspects of the one or more embodiments, These aspects are
`
`indicative, however, of but a few of the various ways in which the principles of various
`
`15
`
`embodiments may be employed and the described embodiments are intended to include
`
`all such aspects and their equivalents,
`
`Brief Description of the Drawings
`
`Figure 1 is an exemplary set of license rules that may be implementedto adjust
`
`20
`
`the numberof device installations on a per license basis over time.
`
`Figure 2 shows an exemplary approach for adjusting a license for a digital
`
`product.
`
`Figure 3A shows one embodiment for a method for adjusting a license for a
`
`digital product.
`
`25
`
`Figure 3B shows several sample aspects of the method shown in Figure 3A,
`
`Figure 4 shows one embodimentfor a system for adjusting a license fora digital
`
`product.
`
`30
`
`Various embodiments are now described with reference to the drawings, wherein
`
`like reference numerals are used to refer to like elements throughout. In the following
`
`Detailed Description
`
`242551
`
`4
`
`10
`
`

`

`description, for purposes of explanation, numerous specific details are set forth in order
`
`to provide a thorough understanding of one or more embodiments. It may be evident,
`
`however, that such embodiment(s) can be practiced without these specific details. In
`
`other instances, well-known structures and devices are shown in block diagram form in
`
`order to facilitate describing one or more embodiments.
`The techniques described herein allow for a changing numberof device
`
`installations on a perlicense basis over time. Aspects of the techniques may include a
`
`customer feedback system that warns a user whenthey are nearing the limit oftheir
`
`device installation ceiling for their license. An example scenario could be as follows. A
`
`sofiware publisher wants to commencedistribution of a software product and to
`
`minimize unauthorized copying of their software, Their license may state that the
`
`publisher authorizes the user to use their software on up to, for example, five devices,
`
`but that the publisher reserves the right to increase this limit at their own discretion. The
`
`customer installs the software on the three computers they have at home. Each time the
`
`15
`
`software connects to a license management server controlled by the publisher overthe
`
`Internet to ensure thatthe device limit for the individual license has not been exceeded.
`
`The customer may choose to install the same software ontheir personal
`
`computer (PC) at work. Upon contacting the publishers license management server over
`
`the Internet a messageis displayed to the user warning them that they are nearing the
`
`20
`
`limit of their device count for their license.
`
`Two weekslater the user wishesto install their software on the two computers
`
`they own at the customers holiday home.If the publisher uses the proposed invention
`
`the maximum numberof devicesfor the license may have been adjusted to
`
`accommodate a reasonable small increase in the number of devices linked to a specific
`
`25
`
`license and both PCs maybe allowedto install and run even though the publishers
`
`stated device limit per license is five.
`
`Then three monthslater, the user experiences water damage from a floodin their
`
`house and a new PC is purchased. Uponinstallation of the protected software the
`
`invention will allow the user to obtain additional device installations from the
`
`30
`
`publishers license managementserver for the samelicense (e.g., up to a total of seven
`
`devices) even though the device limit is initially set to five. However, if that user shares
`
`24255_}
`
`5
`
`11
`
`

`

`their license with all the computer users in a college dormitory, the invention can be set
`
`to stop wholesale abuse of the license terms, as described in further detail herein.
`
`In accordance with one or more aspects of the embodiments described herein,
`
`there is provided a system for adjustable digital licensing over time allows a software
`
`user to increase the numberof devices they can use with a particular software license
`
`over the period of ownership ofthat license. The terms or rules 60 of an exemplary
`
`software license are shown in Figure 1, For example,initially, the publisher or
`
`distributor of the software sets rules 60 that govern the use of the software on a specific
`
`numberof devices. The number of devices allowed to run the software in an authorized
`
`10
`
`or enabled state may increase over time to reflect the normal usage pattern of software
`
`users where the user adds devices, replaces or upgrades devices over time. The rules 60
`
`mayreflect this pattern of an increasing numberof devices authorized over time. For the
`
`first five days of the users use of the software a total of five devices can be authorized
`
`on new devices. For the next twenty-five days until the thirtieth day after first
`
`15
`
`authorization, the useris allowed to authorize a total of seven new devices. After the
`
`first thirty days an additional four devices can be authorized, delivering the maximum
`
`number of copies on separate devices under the license which, in this example
`
`embodiment, is eleven.
`
`It is noted that the various numbers used to describe the embodiments herein,
`
`20
`
`such as, for example, the allowed copy counts, the maximum numberof devices
`
`authorized for use, the upper limit on the number of devices for a given time period, or
`
`the like, are purely exemplary, and that other numbers, data, values, or algorithms may
`
`be used in lieu of the exemplary numbersherein.
`
`In related aspects, Figure 2 shows an example embodiment of a software system
`
`25
`
`that is designed to manage and implementthe rules under a license, such as, for
`
`example, the licensing terms 60 described in Figure 1. Device locked license systems
`
`such as described in U.S. Patent No. 5,490,216, entitled “SYSTEM FOR SOFTWARE
`
`REGISTRATION,” whichis specifically incorporated herein, in its entirety, by
`
`reference, allow a software license to be locked to aJicense agreement and specific
`
`30
`
`authorized devices. With continued reference to Figure 2, there is shown a system
`
`comprising a device 50 that requests authorization via a software process, and a
`
`242551
`
`6
`
`12
`
`

`

`licensing authority 55 that may be a software system that represents the publisher or
`
`distributors interests and regulates the number of devices that can be used with each
`
`license,
`
`Typically the device 50 requesting authorization collects license related
`
`information 10 and unique device identifying information 1], compiles the collected
`
`information into a communication and sends it to the authorization authority 55. Upon
`
`receipt of this communication ftom the device 50, the license authority 55 checks that
`
`the license informationis valid (step 13). If the request fails, an authorization is
`
`disallowed (step 14) and the device based software is sent a messageto this effect. In
`
`practice this may involve further action by the device based software to notify the user
`
`ofthe failure to authorize and then either terminate the software or allow the software to
`
`continue in some form oftrial modeorthelike.
`
`If the request for authorization 12 includes license information/datathatis valid,
`
`the license information checking process (at step 13) will pass and the requesting
`
`15
`
`devices unique identity information 1] is checked to see if it exists in the database of
`
`prior authorizations 15. Ifthe device identity exists (step 16), meaning that the software
`
`has been successfully registered on the same device in the past, then according to the
`
`license terms 60 for the software a re-authorization is automatically allowed (step 17). A
`
`communication allowing the software to continue in an authorizedstate is passed to the
`
`20
`
`requesting device software 50 and the soflware on the device is subsequently authorized
`
`(step 18) and allowed to run.
`
`If the unique identity of the device 11 is not in the authorization database 15 of
`
`previous device requests, then the licensing authority 55 checksto see if the new
`
`authorizationrequest is the first request or is a subsequent request that has occurred in
`
`25
`
`the first five days from the date ofthe first successful authorization (step 19),
`
`At step 19, if the request is within the first five day period, the authorization
`
`database 15 is consulted for a count of how many successful authorizations for new
`
`devices have been allowed. Underthe license rules 60, if the device countis less than
`
`five then a messageis sent to the request device that allows the software to continue in
`
`30
`
`an authorized state (step 18). If the device count is equal to five thenthe licensing
`
`authority 55 may send a message to the requesting device 50 allowing the device to run
`
`24255_1
`
`7
`
`13
`
`

`

`in an authorized state (step 18), but also may optionally inform the userthat the limit of
`
`the numberof devices available to run under this license has been reached and that
`
`subsequent requests for authorization may be denied in the short term (step 22).
`
`If the count of devices authorized for use with the specific license 10 is greater
`
`than five (step 23), then the licensing authority 55 sends a message denying
`
`authorization (step 25) and the user is optionally notified that the limit of devices that
`
`can be authorized with their license terms has been exceeded (step 24). In practice, the
`
`software on the requesting device 50 may subsequently terminate the software or may
`
`allow the software to run in a limited trial mode if this is available.
`
`If the number of days sincethe first authorization of a device for the license 10 is
`
`notless than six (step 19), then the licensing authority tests the time elapsed from the
`
`first successful authorization to see if it is less than thirty-one days since the date and
`
`time ofthe first successful authorization (step 26). If this test at step 26 is successful
`
`(i.e., if the lime elapsed since the first successful authorization is less than thirty-one
`
`days), then a test is made to see if the count of successful new device authorizationsis
`
`less than seven(step 27). If this is so, a communication is made to the requesting device
`
`50 authorizing the device 50 to run the software (step 28). If the new device count is
`
`equal to seven (step 29), then the user is warned that their device limit has been reached
`
`(step 30) and the device 50 is subsequently authorized to run (step 28),
`
`20
`
`However,if the new device countis greater than seven (step 31), a
`
`communication is made to the requesting device 50 that the authorization is denied (step
`
`33) and optionally the user is notified that their license device count has been exceeded
`
`(step 32).
`
`If the number of days since the first successful authorization is greater than thirty
`
`25
`
`days (step 34), the device count for the license 10 is checked in the authorization
`
`database 15 and the device count for the license 10 retrieved. If ihe number of
`
`successful new device authorizationsis ten or less (step 35), then the device
`
`authorization is allowed (step 36). If the device count is equal to eleven (step 37), then
`
`the user is optionally warned that they have reached the limit (step 38) and the device 50
`
`30
`
`is authorized to run (step 36).
`
`24255_1
`
`g
`
`14
`
`

`

`Howeverif the device count is greater than eleven (step 39), then a
`
`communication is made to the requesting device 50 that the user be optionally notified
`
`that the maximum number of allowed devices under terms of the license has been
`
`exceeded (step 40) and the authorization is denied (step 41),
`
`i
`
`Theresult is a license system that allows consumers of software to load their
`
`software on new or replacement devices as they are purchased over time without
`
`exposing the publisher to copying abusesthat is common amongst software pirates and
`
`casual software copiers.
`
`In one alternative embodiment, there is provided a license management system
`
`that is linked to a fixed calendar date rather than the date of first successful
`
`authorization. This approach can be used for marketing and distribution purposes such
`
`as specifying specific periods of high copy counts to encourage word of mouth and user
`
`to user sharing but later restricting the device count to encourage people to begin paying
`
`for copies that have been intentionally shared.
`
`15
`
`It is noted that the example embodiment of Figures 1 and 2 is simple for the
`
`purposes of understanding but can include any number of evaluation periods, not just
`
`the five, thirty and unlimited day periods described in the example. Also the number of
`
`notification stages can be indefinitely expanded, for example the user could be given a
`
`polite message encouraging them to be careful with making copies when they are two
`
`20
`
`copies away from their count limit and a stronger message whenit is their last copy
`
`before being denied authorizations. Messages could also optionally tel) the user how
`
`many days they have to wait before additional device authorizations will be available.
`
`It is further noted that in Figure | and 2 the allowed copy count increases over
`
`time. An alternative embodiment could be used where the allowed copy count decreases
`
`25
`
`over time, This may be useful in a situation, for example, where the publisher supplies
`
`their software with a fairly open device countlicense rule but discovers individual
`
`instances of copy abuse and decides to limit the license terms of those specific licenses.
`
`The described system could also be used with authorizations for software that is
`
`rented or otherwise allowed to be used for a specific period of time or numberofuses
`
`rather than indefinitely as in the example embodiment of Figures 1 and 2.
`
`24255_1
`
`9
`
`15
`
`

`

`Anotheralternative embodiment of the above scenarios could include an
`
`algorithm rather than an arbitrary value in calculating both the time period for the
`
`calculationof the device count, and the device countrelated to that specific measured
`
`time period. For example, the algorithm for the available device count could be equal to
`the number of elapsed days since thefirst successful activation divided by five in
`brackets plus five. Using the example algorithm a device countoffive would be
`
`available from day one, and a device count of eleven at daythirty and so on.
`
`In yet anotheralternative embodiment, the techniques described herein may be
`
`used for security applications where access is granted to data or some other valuable or
`
`10
`
`important item as a result of a successful autho

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket