Pfh Private Hochschule Göttingen
Professor
Heig-Vd
Adjunct Professor
Preview Systems 1996 - 2001
Chief Technology Officer
Preview Systems 1997 - 2000
Vice President of Technology and Chief Technology Officer
Horstmann Software 1986 - 1996
President
The present invention, generally speaking, makes possible an associates program for electronic content distribution by providing a mechanism whereby a referrer may be identified at the time of purchase in a download-then-pay system. In accordance with one embodiment of the invention, an identifier or marker is added to the electronic content at the time of download. Merchant and purchase location information may also be added. At the time of purchase, a commerce module retrieves the identifier and presents it to the merchant server. The commerce module may also form part of the download or may originate from another source. The identifier may be used for various purposes. For example, the identifier may be used, directly or indirectly, to identify a referrer, to whom a referral fee is then credited. Also, the identifier may be used to look up offer information, since the price at the time of purchase may be different than the offer price at the time of download. The invention is applicable not only to Try/Buy software distribution but more generally to download-then-pay electronic content distribution and rental programs.
Server-Side Commerce For Deliver-Then-Pay Content Delivery
MICHEL FLOYD - REDWOOD CITY CA, US CAY S. HORSTMANN - CUPERTINO CA, US RON E. LUNDE - PORTLAND OR, US
International Classification:
G06F017/60
US Classification:
705/051000
Abstract:
The present invention, generally speaking, provides a flexible mechanism for effecting a payment/unlock transaction for deliver-then-pay content distribution. Instead of interacting with a local client interface, purchase is effected by interacting with a commerce Web site. The content is unlocked by delivering to the client a certificate, which serves as proof of purchase. The certificate is rendered secure so that it cannot simply be replicated to gain additional unauthorized access. In a preferred embodiment, a local application (e.g., a stand-alone application or a browser plug-in) is present on the end-user's machine and is registered with the local operating system and browser to handle files of a particular type used for certificates. Downloading and processing of the certificate may therefore be done transparently, without user-intervention. Piracy is prevented by “individuation” of the certificate. If the certificate simply unlocked the product, then nothing would prevent that certificate from simply being moved to any number of other machines or used by multiple unauthorized users. To prevent this, certificate individuation is performed. Preferably, the certificate is generated in a unique manner when it is first provided to the consumer. Alternatively, the first time a certificate is processed on an end-user machine, the certificate together with unique local machine information (such as the hard drive ID) and/or unique user information (e.g., biometric information such as fingerprint information, information from a smart card, etc.) is then presented back to the server (either the original server or a separate reference server) for validation. The server can therefore control how many times a certificate is used.
Cay Horstmann - San Francisco CA, US Michael Ure - Cupertino CA, US
International Classification:
G06F017/60
US Classification:
705027000
Abstract:
The present invention, generally speaking, provides for a personal electronic repository, or electronic “shoebox,” that receives electronic information from disparate sources and automatically organizes that information in such a way as to enable the owner to readily view the collection of electronic information, find a desired piece of information, act upon a piece of information, etc., all in a secure and controlled way. As opposed to email, which is episodic in nature, the personal electronic repository is thematic in nature. Furthermore, as opposed to personal information management, which is factual in nature, the personal electronic repository is well-suited for information that is transactional in nature. A further characteristic of the shoebox is its long-term nature. Email can be archived, but few individuals expend a concerted effort towards that goal. Personal information management records are fleeting—when a user changes a calendar item or ticks off a to-do item, it's gone. But the shoebox can keep material around for years, so that, for example, the executor of a deceased's estate can locate the deceased's estate documents readily, or divorcing spouses can trace their premarital income. These characteristics (thematic, transactional, long-term) characterize what may be referred to as “life information management,” or “elife.”
Try/Buy Wrapping Of Installation-Ready Software For Electronic Distribution
The present invention, generally speaking, provides a semi- or fully-automated process that allows an electronic collection of software titles previously made ready for installation to be Try/Buy enabled. In accordance with an exemplary embodiment of the invention, the process involves, for each of a potentially large number of software programs, identifying how the software program has been made ready for installation, and consulting a table or database to determine how, based on the installation particulars, to unpack and repack the setup file set, or program archives The program archive is unpacked, executable modules are identified, and one or more of thee modules are chosen for Try/Buy wrapping. Repacking may be performed by modifying the program archive or by entirely rebuilding the program archive. The setup ruleset remains unchanged.
Methods of electronic software distribution are provided in which software products may be wrapped by their publishers in a straightforward, secure manner, but in such a way as to allow for the addition of information by downstream distribution channel partners, e. g. , distributors and merchants (resellers). Distribution policies, or business rules, governing the distribution process may be fixed by the software publisher or may be left to the discretion of channel partners. The software product itself, however, is secured against tampering or inadvertent infection by a virus. A tool facilitates the foregoing incremental wrapping process without requiring sophistication in computer technology on the part of channel partners. The publisher may use a conventional setup tool of the publisher's choice to prepare a setup file set for distribution. That is, the wrapping tool need not influence the publisher's choice of setup tools.
Software Publisher Or Distributor Configurable Software Security Mechanism
The present invention, generally speaking, provides a software protection mechanism that may be conveniently configured by a software publisher and applied to a software product. Various predefined software protection measures are presented to the software publisher, who selects which protection measures, if any, the software publisher wishes to apply to a software product. The software publisher may select all of the software protection measures, none of the software protection measures, or any logically consistent combination thereof. An option is also provided for the software publisher to provide code implementing a custom software protection mechanism. The software publisher's selections are saved in a license file that is attached to the software product. A Protector Module is also attached to the software product. The Protector Module includes code for each predefined software protection option.
Secure Electronic Software Packaging Using Setup-External Unlocking Module
Michel Floyd - Redwood City CA Cay S. Horstmann - Cupertino CA
Assignee:
Preview Software - Cupertino CA
International Classification:
G06F 1760
US Classification:
705 59
Abstract:
The present invention, generally speaking, provides for secure electronic software packaging using a setup-external unlocking module. As a result, a software publisher can produce a single ESD-ready version of a software title that may later be prepared for distribution through multiple different ESD channels by adding channel-specific unlocking modules. Duplication of the injection process prior to the packing of the setup file set is eliminated and great flexibility is achieved. Preferably, the single ESD-ready version allows for trial of the software, e. g. , a free 30-day trial. Software publishers are incentivized to produce trial versions of their software for marketing purposes. Once such a trial version of a software title has been produced, no further modifications are required on the part of the software publisher in order to distribute the software through various different channels. In one embodiment, the software publisher produces a trial version of a software title using a technology provider tool to inject the program executable with "guard code" referred to herein as a protection module.
Advertising-Subsidized And Advertising-Enabled Software
The present invention, generally speaking, provides a mechanism allowing a software developer to present advertisements through a software program. In accordance with an exemplary embodiment of the invention, an advertisement module is attached to the software program. The function of the advertisement module is to retrieve advertisements from an advertisement server and to display them to the user. The advertisements are varied to retain the interest of the user. Furthermore, information about the user may be sent to the advertisement server, allowing advertisements to be targeted to the user. Such information may include the category of the software program and the user's usage of the software program, for example. Associated with the ad server are a rules engine and a usage database. Various policies may be controlled by the software developer as well as the operator of the ad server, including the nature of information to be sent to the advertisement server, whether connection will be scheduled or will occur "opportunistically" in conjunction with user-initiated Internet access, whether prolonged inability to connect will result in use of the software being disallowed, etc.