`Doc code IDS
`Approved for use through 11/50/2008. OMB 0651-0031
`:
`,
`eh
`U.S. Patent and Trademark Office. U.S. DEPARTMENT OF COMMERCE
`Doc description: Information Disclosure Statement (IDS) Filed
`Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number
`
`
`Application Number
`
`INFORMATION DISCLOSURE
`STATEMENT BY APPLICANT
`
`( Not for submission under 37 CFR 1.99)
`
`
`Filing Date
`
`
`
`[Ric B. Richardson
`First Named Inventor
`
`At Unit |
`
`Examiner Name |
`
`Attorney Docket Number | 70243-00018
`
`
`
`U.S.PATENTS
`
`Examiner]
`Initial*
`
`Patent Super
`
`aug Dale
`
`Nameof Patentee or Applicant
`of cited Document
`
`Pages,Columns,Lines where
`Relevant Passages or Relevant
`Figures Appear
`
`6976009
`
`2005-12-13
`
`Jadayon étal.
`
`
`
`7069595
`
`2006-06-27
`
`Coagnigni et al.
`
`
`
`7085741
`
`2006-08-01
`
`Lao et al.
`
`
`
`7203966
`
`2007-04-10
`
`Abburi et al.
`
`U.S.PATENT APPLICATION PUBLICATIONS
`
`
`
`
`
`
`7206765
`
`2007-04-17
`
`Gilliam etal.
`
`
`
`7337147
`
`2008-02-26
`
`Chen etal
`
`
`
`7343297
`
`2008-03-14
`
`Bergler etal.
`
`If you wish to add additional U.S. Patent citation information please click the Add button.
`
`EFS Web 2.1.7
`
`1
`
`GOOGLE 1002
`
`1
`
`GOOGLE 1002
`
`
`
`
`
`Application Number
`Filing Date
`
`First Named Inventor Ric B. Richardson
`
`Art Unit
`
`INFORMATION DISCLOSURE
`STATEMENT BY APPLICANT
`( Not for submission under 37 CFR 1.99)
`
`Examiner Name |
`
`
`Attorney Docket Number | 70243-00018
`
`
`
`Pages,Columns,Lines where
`
`
`Examiner Cite Publication Number Kind|Publication Name of Patentee or Applicant Relevant Passagesor Relevant
`Initial
`No
`Code’| Date
`of cited Document
`.
`Figures Appear
`
`
`1
`
`200200198714
`
`20020082997
`
`20020161718
`
`2002-02-14
`
`Ganesan
`
`2002-06-27
`
`Kobata et al.
`
`2002-10-31
`
`Coley et al.
`
`
`
`20030172035
`
`2003-09-11
`
`Cronce et al.
`
`
`
`
` 10 20070198422
` 2007-08-23
`
`
`
`
`
`Rodgersetal.
`
`
`20040059929
`
`2004-03-25
`
`20050108173
`
`2005-05-19
`
`Stefik et al
`
`
`
`20070165288
`
`20070203846
`
`20070219917
`
`2007-07-19
`
`Bozeman
`
`Prahlad etal.
`
`2007-08-30
`
`Kavuri et al.
`
`2007-09-20
`
`Liu et al.
`
`
`
`EFS Web 2.1.6
`
`2
`
`
`
`
`
`Application Number
`
`( Not for submission under 37 CFR 1.99)
`
`
`
`
`
`
`Filing Date
`First Named Inventor
`INFORMATION DISCLOSURE
`Ric B. Richardson
`
`STATEMENT BY APPLICANT
`|
`|
`Examiner Name
`Attorney Docket Number
`
`
`
`| 70243-00018
`
`
`
`
`
`
`Examiner] Cite
`
`
`
`W
`
`20070282615
`
`2007-12-06
`
`Hamilton et al.
`
`
`
`
`
`12|20080065552 2008-03-13 Elazaretal.
`
`
`
`20080086423
`
`2008-14-10
`
`Waites.
`
`20080147556
`
`2008-06-19
`
`Smith etal.
`
`
`
`20080228578
`
`2008-09-18
`
`If you wish to add additional U.S, Published Application citation information please click the Add button
`
`
`FOREIGN PATENT DOCUMENTS
`
`
`Pages,Columns,Lines
`Name of Patentee or
`where Relevant
`
`Examiner! Foreign Document|Country Kind|Publication
`
`Applicantof cited
`Passages or Relevant
`Initial*
`Numbers
`Code? j
`Code4| Date
`Document
`Figures Appear
`
`If you wish to add additional Foreign Patent Documentcitation information please click the Add button
`
`
`NON-PATENT LITERATURE DOCUMENTS
`
`
`Include name of the author (in CAPITAL LETTERS),title of the article (when appropriate),title of the item
`(book, magazine,journal, serial, symposium, catalog, etc), date, pages(s), volume-issue number(s),
`publisher, city and/or country where published.
`
`EFS Web 2.1.6
`
`3
`
`
`
`
`
`Application Number
`
`
`Filing Date
`First Named Inventor
`INFORMATION DISCLOSURE
`Ric B. Richardson
`
`
`STATEMENT BY APPLICANT |
`
`Examiner Name |
`
`Attorney Docket Number | 70243-00018
`
`( Not for submission under 37 CFR 1.99)
`
`
`EXAMINER SIGNATURE
`Examiner Signature | Date Considered
`
`
`
`“EXAMINER: Initial if reference considered, whetheror notcitation is in conforrnance with MPEP 609. Draw line through a
`citation if not in conformance and not considered. Include copy of this form with next communication to applicant.
`
`* Enter office that issued the document, by the two-letter code (WIPO
`1 See Kind Codes of USPTO Patent Dacuments at www.USPTO.GOY or MPEP 801.04.
`Standard ST.3). * For Japanese patent documents,the indication of the year of the reign of the Emperor must precede the serial numberof the patent document.
`4“ Kind of documentby the appropriate symbols as indicated on the document under WIPO Standard ST.16 if possible.
`° Applicant is to place a check mark here if
`
`English languagetranslation is attached.
`
`EFS Web 2.1.6
`
`4
`
`
`
`
`
`Application Number
`
`Filing Date
`
`
`
`| Ric B. Richardson
`First Named Inventor
`INFORMATION DISCLOSURE
`
`STATEMENT BY APPLICANT | |
`Examiner Name
`|
`Attorney Docket Number
`
`( Not for submission under 37 CFR 1.99)
`
`
`
`
`
`[ 70243-00018
`
`
`
`CERTIFICATION STATEMENT
`
`Please see 37 CFR 1.97 and 1.98 to make the appropriate selection(s):
`
`[_]
`
`That each item of information contained in the information disclosure statement was first cited in any communication
`from a foreign patent office in a counterpart foreign application not more than three months prior to the filing of the
`information disclosure statement. See 37 CFR 1,97(e)(1).
`
`OR
`
`[-]
`
`That no ttem of information contained in the information disclosure statement was cited in a communication from a
`foreign patent office in a counterpart foreign application, and, to the knowledge of the person signing the certification
`after making reasonable inquiry, no item of information contained in the information disclosure statement was known to
`any individual designated in 37 CFR 1.56(c) more than three months prior to the filing of the information disclosure
`statement. See 37 CFR 1.97(e)(2).
`
`[| See attached certification statement.
`[_] Fee set forth in 37 CFR 1.17 (p) has been submitted herewith.
`[x] None
`
`SIGNATURE
`A signature of the applicant or representative Is required in accordance with CFR 1.33, 10.18. Please see CFR 1.4(d) for the
`form of the signature.
`
`
`Signature
`
`‘John L. Paik/
`
`John L. Paik
`
`Date (YYYY-MM-DD)
`
`2008-11-17
`
`Registration Number
`
`54355
`
`VA 22313-1450.
`
`This collection of information is required by 37 CFR 1.97 and 1.98. The information is required to obtain or retain a benefit by the
`public whichis to file (and by the USPTO to process) an application. Confidentiality is governed by 35 U.S.C. 122 and 37 CFR
`1.14. This collection is estimated to take 1 hour to complete, including gathering, preparing and submitting the completed
`application form tothe USPTO. Time will vary depending upon the individual case. Any comments on the amountof time you
`require to complete this form and/or suggestions for reducing this burden, should be sent to the Chief Information Officer, U.S,
`Patent and Trademark Office, U.S. Department of Commerce, P.O. Box 1450, Alexandria, VA 22313-1450. DO NOT SEND
`FEES OR COMPLETED FORMS TO THIS ADDRESS. SEND TO: Commissionerfor Patents, P.O. Box 1450, Alexandria,
`
`EFS Web2.1.6
`
`5
`
`
`
`Privacy Act Statement
`
`
`The Privacy Act of 1974 (P.L. 93-579) requires that you be given certain information in connection with your submission of the
`attached form related to a patent application or patent. Accordingly, pursuant to the requirements of the Act, please be advised
`that:
`(1) the general authority for the collection of this information is 35 U.S.C. 2(b)(2); (2) furnishing of the information solicited
`is voluntary; and (3) the principal purpose for which the information is used by the U.S. Patent and Trademark Office is to
`process and/or examine your submission related to a patent application or patent.
`If you do not furnish the requested
`information, the U.S. Patent and Trademark Office may not be able to process and/or examine your submission, which may
`result in termination of proceedings or abandonmentof the application or expiration of the patent.
`
`The information provided by youin this form will be subject to the following routine uses:
`
`At
`
`The information on this form will be treated confidentially to the extent allowed under the Freedom of Information Act
`(5 U.S.C, 552) and the Privacy Act (5 U.S.C. 552a). Records from this system of records may be disclosed to the
`Depariment of Justice to determine whether the Freedom of Information Act requires disclosure of these record s.
`
`A record from this system of records may be disclosed, as a routine use, in the course of presenting evidence to a
`court, magistrate, or administrative tribunal, including disclosures to opposing counselin the course of settlement
`negotiations.
`
`A record in this system of records may be disclosed, as a routine use, to a Member of Congress submitting a
`requestinvolving an individual, to whom the record pertains, when the individual has requested assistance from the
`Memberwith respect to the subject matter of the record.
`
`A record in this system of records may be disclosed, as a routine use, to a contractor of the Agency having need for
`the information in order to perform a contract. Recipients of information shall be required to comply with the
`requirements of the Privacy Act of 1974, as amended, pursuant to 5 U.S.C. 552a(m).
`
`A record related to an International Application filed under the Patent Cooperation Treaty in this system of records
`may be disclosed, as a routine use, to the International Bureau of the World Intellectual Property Organization, pursuant
`to the Patent Cooperation Treaty.
`
`A record in this system of records may be disclosed, as a routine use, to another federal agency for purposesof
`National Security review (35 U.S.C. 181) and for review pursuantto the Atomic Energy Act (42 U.S.C. 218(c)).
`
`A record from this system of records may be disclosed, as a routine use, to the Administrator, General Services, or
`his/her designee, during an inspection of records conducted by GSAaspart of that agency's responsibility to
`recommend improvements in records managementpractices and programs, under authority of 44 U.S.C, 2904 and
`2906. Such disclosure shall be made in accordance with the GSA regulations governing inspection of records for this
`purpose, and anyotherrelevant(i,e,, GSA or Commerce) directive, Such disclosure shall not be used to make
`determinations aboutindividuals.
`
`A record from this system of records may be disclosed, as a routine use, to the public after either publication of the
`application pursuant to 35 U.S.C. 122(b) or issuance of a patent pursuant to 35 U.S.C. 151. Further, a record may be
`disclosed, subject to the limitations of 37 CFR 1.14, as a routine use,to the public if the record was filed in an application
`which became abandonedorin which the proceedings were terminated and which application is referenced by either a
`published application, an application open to public inspections or an issued patent.
`
`g;
`
`A record from this systern of records may be disclosed, as a routine use, to a Federal, State, or local law
`enforcement agency, if the USPTO becomes awareof a violation or potential violation of law or regulation,
`
`
`
`EFS Web 2.17
`
`6
`
`
`
`70243-00018
`
`SYSTEM AND METHOD FOR ADJUSTABLE LICENSING OF DIGITAL
`PRODUCTS
`
`Cross-Reference to Related Application(s
`
`This application claims priority pursuant to 35 U.S.C, §119(e) to U.S.
`
`Provisional Application No, 60/ 988,778, entitled “SYSTEM FOR ADJUSTABLE
`
`DIGITAL LICENSING OVER TIME,”filed November 17, 2007, which application is
`
`10
`
`specifically incorporated herein, in its entirety, by reference.
`
`Field of the Invention
`
`Background of the Invention
`
`The present application relates generally to managing software use, and more
`
`specifically to systems and methods to enable the monitoring and adjusting software
`
`usage under a software license.
`
`Description of the Related Art
`
`A common capability of digital product license systemsis the ability to control
`
`20
`
`how many devices are allowed to be used with each product license whichis usually
`
`sold to an individual customer or company. For example U.S. Patent No. 5,490,216
`
`refers to a system wherea license is given to an individual, but in turn that licenseis
`
`linked to a specific personal computer thereby limiting the copyright holders exposure
`
`to copyright abuse if the user decided to share their license with other unauthorized
`users.
`
`A problem thathas arisen over timeis the fact that consumers of software have
`
`normal patterns of use that includethe installation and use of digital products on
`
`multiple devices. For example a person may wish ta buy software and use it on three
`
`computers at their home, a computer at work, a mobile computer and the computers at
`
`30
`
`their holiday home and their parent’s house. In addition to these uses, computers are
`
`also bought, sold and replaced so over time maybe twoor three times this number of
`
`24255_}
`
`1
`
`7
`
`
`
`computers may be used by the user over time with a legitimate need to install and use
`
`the software on every computer.
`
`Publishers of digital products have a dilemmain that they may want their
`
`customers to receive the normal freedom to use the software that they have purchased
`
`but they also do not wantthe softwarelicenses to be freely shared amongst end users or
`
`even in worst case shared anonymously over the Internet resulting in massive piracy and
`
`copyright abuse ofthe product.
`
`To solve this problem some publishers have set a relatively high device to
`
`license ratio in their control systems in the hope that customers will not exceed the
`
`maximum number of devices per license. An example of this is Apple {Tunes which
`
`enables customers to play a purchased music file on up to a preset number(e.g., five) of
`
`devices (e.g., PCs) per license before being requested to buy an additional license, They
`
`have also implemented a system that allows customers to turn off the license rights of
`
`individual devices with regard to a specific music file license and therefore free up that
`
`device installation so that the music file can be used on one additional device,
`
`While this method does go some way to appeasing the problem of a normal
`
`customers usage expectations, it does not take into consideration the normalattrition
`
`that occurs with the purchase and upgrade of personal computing devicesorthe like and
`
`places an expectation on the user to go through a numberofinvolved stepsto retain
`
`20
`
`their tights to use the software. Accordingly, there is a need for an improved technique
`
`for allowing for a changing number of device installations on a per license basis over
`
`time.
`
`Summary of the Invention
`
`25
`
`The following presents a simplified summary of one or more embodiments in
`
`order to provide a basic understanding of such embodiments. This summary is not an
`
`extensive overview ofall contemplated embodiments, andis intended to neither identify
`
`key or critical elements of all embodiments nor delineate the scope of anyorall
`
`embodiments. Its sole purpose is to present some concepts of one or more embodiments
`
`30
`
`in a simplified form as a prelude to the more detailed description that is presented later.
`
`24255_1
`
`2
`
`8
`
`
`
`In accordance with one or more embodiments and corresponding disclosure
`
`thereof, various aspects are described in connection with adjusting a license for a digital
`
`product over time. The license may comprise at least one allowed copy count
`
`corresponding to a maximum number of devices authorized for use with the digital
`
`product. In one embodiment, a system for adjustable licensing includes: a
`
`communication module for receiving a request for authorization to use the digital
`
`product from a given device; a processor module in operative communication with the
`
`communication module; and a memory module in operative communication with the
`
`processor module,
`
`10
`
`The memory module may include executable code for the processor moduleto:
`
`(a) verify that a license data associated with the digital product is valid basedatleast in
`
`part on a device identity associated with the given device; and (b) in response to the
`
`device identity already being on a record, allow the digital product to be used on the
`
`given device.
`
`15
`
`The memory module may further include executable code for the processor
`
`module to: (c) in response to the device identity not being on the record,set the allowed
`
`copy countto a first upper limit for a first time period; (d) calculate a device count
`
`cofresponding to total number of devices already authorized for use with the digital
`
`product; and (e) when the calculated device count is less than the first upper limit, allow
`
`20
`
`the digital product to be used onthe given device.
`
`In related aspects, the processor module may be adaptedto: (a) in response to the
`
`device identity not being on the record, after the first time period has expired, set the
`
`allowed copy count to a second upperlimit for a second time period; (b) recalculate the
`
`device count; and/or (c) when the recalculated device count is less than the second
`
`25
`
`upperlimit, allow the digital product to be used on the given device. For example, the
`
`second time period may comprise a defined numberof days since theinitial
`
`authorization, The processor module may be adapted to, in response to the calculated
`
`device count equaling the second upperlimit, send a warning regarding the allowed
`
`copy count to the given device. The processor module may be adaptedto, in response to
`
`30
`
`the calculated device count exceeding the second upperlimit, deny the request for
`
`authorization.
`
`24255_1
`
`3
`
`9
`
`
`
`In further related aspects, the processor module may be adapted to: (a) in
`
`response to the device identity not being on the record, after the second time period has
`
`expired, set the allowed copy count to a third upper limit; (b) recalculate the device
`
`count; and (c) whenthe recalculated device count is less than the third upper limit,
`
`allow the digital product to be used on the given device. The processor module may be
`
`adapted to, in response fo the calculated device count equaling the third upper limit,
`
`send a warning regarding the allowed copy count to the given device. The processor
`
`module may be adapted to, in response to the calculated device count exceeding the
`
`third upper limit, deny the request for authorization.
`
`10
`
`To the accomplishmentof the foregoing and related ends, the one or more
`
`embodiments comprise the features hereinafler fully described and particularly pointed
`
`out in the claims. The following description and the annexed drawingsset forth in
`
`detail certain illustrative aspects of the one or more embodiments, These aspects are
`
`indicative, however, of but a few of the various ways in which the principles of various
`
`15
`
`embodiments may be employed and the described embodiments are intended to include
`
`all such aspects and their equivalents,
`
`Brief Description of the Drawings
`
`Figure 1 is an exemplary set of license rules that may be implementedto adjust
`
`20
`
`the numberof device installations on a per license basis over time.
`
`Figure 2 shows an exemplary approach for adjusting a license for a digital
`
`product.
`
`Figure 3A shows one embodiment for a method for adjusting a license for a
`
`digital product.
`
`25
`
`Figure 3B shows several sample aspects of the method shown in Figure 3A,
`
`Figure 4 shows one embodimentfor a system for adjusting a license fora digital
`
`product.
`
`30
`
`Various embodiments are now described with reference to the drawings, wherein
`
`like reference numerals are used to refer to like elements throughout. In the following
`
`Detailed Description
`
`242551
`
`4
`
`10
`
`
`
`description, for purposes of explanation, numerous specific details are set forth in order
`
`to provide a thorough understanding of one or more embodiments. It may be evident,
`
`however, that such embodiment(s) can be practiced without these specific details. In
`
`other instances, well-known structures and devices are shown in block diagram form in
`
`order to facilitate describing one or more embodiments.
`The techniques described herein allow for a changing numberof device
`
`installations on a perlicense basis over time. Aspects of the techniques may include a
`
`customer feedback system that warns a user whenthey are nearing the limit oftheir
`
`device installation ceiling for their license. An example scenario could be as follows. A
`
`sofiware publisher wants to commencedistribution of a software product and to
`
`minimize unauthorized copying of their software, Their license may state that the
`
`publisher authorizes the user to use their software on up to, for example, five devices,
`
`but that the publisher reserves the right to increase this limit at their own discretion. The
`
`customer installs the software on the three computers they have at home. Each time the
`
`15
`
`software connects to a license management server controlled by the publisher overthe
`
`Internet to ensure thatthe device limit for the individual license has not been exceeded.
`
`The customer may choose to install the same software ontheir personal
`
`computer (PC) at work. Upon contacting the publishers license management server over
`
`the Internet a messageis displayed to the user warning them that they are nearing the
`
`20
`
`limit of their device count for their license.
`
`Two weekslater the user wishesto install their software on the two computers
`
`they own at the customers holiday home.If the publisher uses the proposed invention
`
`the maximum numberof devicesfor the license may have been adjusted to
`
`accommodate a reasonable small increase in the number of devices linked to a specific
`
`25
`
`license and both PCs maybe allowedto install and run even though the publishers
`
`stated device limit per license is five.
`
`Then three monthslater, the user experiences water damage from a floodin their
`
`house and a new PC is purchased. Uponinstallation of the protected software the
`
`invention will allow the user to obtain additional device installations from the
`
`30
`
`publishers license managementserver for the samelicense (e.g., up to a total of seven
`
`devices) even though the device limit is initially set to five. However, if that user shares
`
`24255_}
`
`5
`
`11
`
`
`
`their license with all the computer users in a college dormitory, the invention can be set
`
`to stop wholesale abuse of the license terms, as described in further detail herein.
`
`In accordance with one or more aspects of the embodiments described herein,
`
`there is provided a system for adjustable digital licensing over time allows a software
`
`user to increase the numberof devices they can use with a particular software license
`
`over the period of ownership ofthat license. The terms or rules 60 of an exemplary
`
`software license are shown in Figure 1, For example,initially, the publisher or
`
`distributor of the software sets rules 60 that govern the use of the software on a specific
`
`numberof devices. The number of devices allowed to run the software in an authorized
`
`10
`
`or enabled state may increase over time to reflect the normal usage pattern of software
`
`users where the user adds devices, replaces or upgrades devices over time. The rules 60
`
`mayreflect this pattern of an increasing numberof devices authorized over time. For the
`
`first five days of the users use of the software a total of five devices can be authorized
`
`on new devices. For the next twenty-five days until the thirtieth day after first
`
`15
`
`authorization, the useris allowed to authorize a total of seven new devices. After the
`
`first thirty days an additional four devices can be authorized, delivering the maximum
`
`number of copies on separate devices under the license which, in this example
`
`embodiment, is eleven.
`
`It is noted that the various numbers used to describe the embodiments herein,
`
`20
`
`such as, for example, the allowed copy counts, the maximum numberof devices
`
`authorized for use, the upper limit on the number of devices for a given time period, or
`
`the like, are purely exemplary, and that other numbers, data, values, or algorithms may
`
`be used in lieu of the exemplary numbersherein.
`
`In related aspects, Figure 2 shows an example embodiment of a software system
`
`25
`
`that is designed to manage and implementthe rules under a license, such as, for
`
`example, the licensing terms 60 described in Figure 1. Device locked license systems
`
`such as described in U.S. Patent No. 5,490,216, entitled “SYSTEM FOR SOFTWARE
`
`REGISTRATION,” whichis specifically incorporated herein, in its entirety, by
`
`reference, allow a software license to be locked to aJicense agreement and specific
`
`30
`
`authorized devices. With continued reference to Figure 2, there is shown a system
`
`comprising a device 50 that requests authorization via a software process, and a
`
`242551
`
`6
`
`12
`
`
`
`licensing authority 55 that may be a software system that represents the publisher or
`
`distributors interests and regulates the number of devices that can be used with each
`
`license,
`
`Typically the device 50 requesting authorization collects license related
`
`information 10 and unique device identifying information 1], compiles the collected
`
`information into a communication and sends it to the authorization authority 55. Upon
`
`receipt of this communication ftom the device 50, the license authority 55 checks that
`
`the license informationis valid (step 13). If the request fails, an authorization is
`
`disallowed (step 14) and the device based software is sent a messageto this effect. In
`
`practice this may involve further action by the device based software to notify the user
`
`ofthe failure to authorize and then either terminate the software or allow the software to
`
`continue in some form oftrial modeorthelike.
`
`If the request for authorization 12 includes license information/datathatis valid,
`
`the license information checking process (at step 13) will pass and the requesting
`
`15
`
`devices unique identity information 1] is checked to see if it exists in the database of
`
`prior authorizations 15. Ifthe device identity exists (step 16), meaning that the software
`
`has been successfully registered on the same device in the past, then according to the
`
`license terms 60 for the software a re-authorization is automatically allowed (step 17). A
`
`communication allowing the software to continue in an authorizedstate is passed to the
`
`20
`
`requesting device software 50 and the soflware on the device is subsequently authorized
`
`(step 18) and allowed to run.
`
`If the unique identity of the device 11 is not in the authorization database 15 of
`
`previous device requests, then the licensing authority 55 checksto see if the new
`
`authorizationrequest is the first request or is a subsequent request that has occurred in
`
`25
`
`the first five days from the date ofthe first successful authorization (step 19),
`
`At step 19, if the request is within the first five day period, the authorization
`
`database 15 is consulted for a count of how many successful authorizations for new
`
`devices have been allowed. Underthe license rules 60, if the device countis less than
`
`five then a messageis sent to the request device that allows the software to continue in
`
`30
`
`an authorized state (step 18). If the device count is equal to five thenthe licensing
`
`authority 55 may send a message to the requesting device 50 allowing the device to run
`
`24255_1
`
`7
`
`13
`
`
`
`in an authorized state (step 18), but also may optionally inform the userthat the limit of
`
`the numberof devices available to run under this license has been reached and that
`
`subsequent requests for authorization may be denied in the short term (step 22).
`
`If the count of devices authorized for use with the specific license 10 is greater
`
`than five (step 23), then the licensing authority 55 sends a message denying
`
`authorization (step 25) and the user is optionally notified that the limit of devices that
`
`can be authorized with their license terms has been exceeded (step 24). In practice, the
`
`software on the requesting device 50 may subsequently terminate the software or may
`
`allow the software to run in a limited trial mode if this is available.
`
`If the number of days sincethe first authorization of a device for the license 10 is
`
`notless than six (step 19), then the licensing authority tests the time elapsed from the
`
`first successful authorization to see if it is less than thirty-one days since the date and
`
`time ofthe first successful authorization (step 26). If this test at step 26 is successful
`
`(i.e., if the lime elapsed since the first successful authorization is less than thirty-one
`
`days), then a test is made to see if the count of successful new device authorizationsis
`
`less than seven(step 27). If this is so, a communication is made to the requesting device
`
`50 authorizing the device 50 to run the software (step 28). If the new device count is
`
`equal to seven (step 29), then the user is warned that their device limit has been reached
`
`(step 30) and the device 50 is subsequently authorized to run (step 28),
`
`20
`
`However,if the new device countis greater than seven (step 31), a
`
`communication is made to the requesting device 50 that the authorization is denied (step
`
`33) and optionally the user is notified that their license device count has been exceeded
`
`(step 32).
`
`If the number of days since the first successful authorization is greater than thirty
`
`25
`
`days (step 34), the device count for the license 10 is checked in the authorization
`
`database 15 and the device count for the license 10 retrieved. If ihe number of
`
`successful new device authorizationsis ten or less (step 35), then the device
`
`authorization is allowed (step 36). If the device count is equal to eleven (step 37), then
`
`the user is optionally warned that they have reached the limit (step 38) and the device 50
`
`30
`
`is authorized to run (step 36).
`
`24255_1
`
`g
`
`14
`
`
`
`Howeverif the device count is greater than eleven (step 39), then a
`
`communication is made to the requesting device 50 that the user be optionally notified
`
`that the maximum number of allowed devices under terms of the license has been
`
`exceeded (step 40) and the authorization is denied (step 41),
`
`i
`
`Theresult is a license system that allows consumers of software to load their
`
`software on new or replacement devices as they are purchased over time without
`
`exposing the publisher to copying abusesthat is common amongst software pirates and
`
`casual software copiers.
`
`In one alternative embodiment, there is provided a license management system
`
`that is linked to a fixed calendar date rather than the date of first successful
`
`authorization. This approach can be used for marketing and distribution purposes such
`
`as specifying specific periods of high copy counts to encourage word of mouth and user
`
`to user sharing but later restricting the device count to encourage people to begin paying
`
`for copies that have been intentionally shared.
`
`15
`
`It is noted that the example embodiment of Figures 1 and 2 is simple for the
`
`purposes of understanding but can include any number of evaluation periods, not just
`
`the five, thirty and unlimited day periods described in the example. Also the number of
`
`notification stages can be indefinitely expanded, for example the user could be given a
`
`polite message encouraging them to be careful with making copies when they are two
`
`20
`
`copies away from their count limit and a stronger message whenit is their last copy
`
`before being denied authorizations. Messages could also optionally tel) the user how
`
`many days they have to wait before additional device authorizations will be available.
`
`It is further noted that in Figure | and 2 the allowed copy count increases over
`
`time. An alternative embodiment could be used where the allowed copy count decreases
`
`25
`
`over time, This may be useful in a situation, for example, where the publisher supplies
`
`their software with a fairly open device countlicense rule but discovers individual
`
`instances of copy abuse and decides to limit the license terms of those specific licenses.
`
`The described system could also be used with authorizations for software that is
`
`rented or otherwise allowed to be used for a specific period of time or numberofuses
`
`rather than indefinitely as in the example embodiment of Figures 1 and 2.
`
`24255_1
`
`9
`
`15
`
`
`
`Anotheralternative embodiment of the above scenarios could include an
`
`algorithm rather than an arbitrary value in calculating both the time period for the
`
`calculationof the device count, and the device countrelated to that specific measured
`
`time period. For example, the algorithm for the available device count could be equal to
`the number of elapsed days since thefirst successful activation divided by five in
`brackets plus five. Using the example algorithm a device countoffive would be
`
`available from day one, and a device count of eleven at daythirty and so on.
`
`In yet anotheralternative embodiment, the techniques described herein may be
`
`used for security applications where access is granted to data or some other valuable or
`
`10
`
`important item as a result of a successful autho