Method and system for granting access to system and content
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-012/14
G06F-007/04
G06F-017/30
출원번호
US-0317845
(2002-12-11)
등록번호
US-8108687
(2012-01-31)
발명자
/ 주소
Ellis, Richard Donald
Newcombe, Christopher Richard
Jones, Paul David
Birum, Derrick Jason
Dunkle, Harold Michael
Thompson, Mikel Howard
출원인 / 주소
Valve Corporation
대리인 / 주소
Frommer Lawrence & Haug LLP
인용정보
피인용 횟수 :
10인용 특허 :
125
초록▼
A method and system for granting access to system and content is provided. A key is provided that allows access by a client computer to content that includes a plurality of resources. A server is accessed and the key is provided to the server. Based on the key, access is granted to the content. A pr
A method and system for granting access to system and content is provided. A key is provided that allows access by a client computer to content that includes a plurality of resources. A server is accessed and the key is provided to the server. Based on the key, access is granted to the content. A program on the client computer requests a resource of the plurality of resources. If the resource is located locally, the resource is provided to the program. Otherwise, the resource is downloaded from the content server and stored locally. A data structure is modified to indicate that the resource is stored locally and the resource is provided to the program.
대표청구항▼
1. A method for granting access to a system and content, comprising: providing a key that is used by a client computer to validate access to the content comprising resources;displaying at the client computer information about the content, based on the validation of access to content enabled by the k
1. A method for granting access to a system and content, comprising: providing a key that is used by a client computer to validate access to the content comprising resources;displaying at the client computer information about the content, based on the validation of access to content enabled by the key, wherein at least one subset of the content is selected by a user at the client computer;based on the subset of content selected by the user of the client computer, delivering by a server, a separate authentication ticket to the user of the client computer for enabling an authentication of the user and a determination of at least one user right to receive at least one of a plurality of content tickets;employing an affirmative authentication of the user and the determination of the at least one user right to receive the at least one of a plurality of content tickets and to provide the at least one content ticket to the user for accessing at least a portion of the selected subset of content and a granting of access by the user to at least the portion of the subset of the content selected by the user for a defined period of time;using the at least one content ticket to enable at least the portion of the selected subset of the content to be downloaded onto the client computer, wherein the downloaded portion includes executable code blocks and data blocks, the executable code blocks being part of an application;executing some of the downloaded portion of executable code blocks on the client computer;modifying at least one downloaded block of executable code to modify execution of at least a portion of the application using the at least one downloaded block of data before all of the subset of selected content including additional executable code blocks is downloaded and available on the client computer; andif the defined period of time for at least one of the tickets associated with the portion of the at least one selected subset of the content is expired, degrading a performance of the modified application over time, while enabling execution of at least a portion of the modified application. 2. The method of claim 1, wherein the key is encoded onto at least one of a coupon, a computer display, a file on a computer, a file on a disk; mail, email, a business card, a receipt, a dongle, a USB-style plug, a compact flash memory card, a smart card, and a credit card. 3. The method of claim 2, wherein providing the key, further comprises, encoding the key from at least one of a magnetically encoded, a barcode encoded, and an ink encoded. 4. The method of claim 2, wherein the file on the computer is located locally and includes at least one of a cookie, a registry, and a database. 5. The method of claim 1, wherein the application includes a computer game. 6. The method of claim 1, wherein delivering the authentication ticket, further comprises storing the ticket locally and providing the ticket to the server before using the at least one content ticket to access on the client computer the portion of the content. 7. The method of claim 1, wherein the key is provided by a third-party to a customer, and the third-party is charged a fee based, at least in part, on an amount of content utilized by the modified application. 8. The method of claim 1, further comprising notifying the client computer of a time remaining before access to the content is terminated. 9. The method of claim 1, further comprising: associating the key with at least one of a smart card and a credit card; andretrieving the key upon identification of at least one of the smart card and the credit card. 10. The method of claim 1, further comprising: receiving within the portion of the content an advertisement associated with a third-party; and modifying the execution of the application to display the advertisement. 11. The method of claim 1, further comprising providing a user associated with the client computer a purchase option associated with the key, wherein the purchase option includes a rental fee that provides access to particular content for a period of time. 12. The method of claim 1, further comprising providing a user associated with the client computer a purchase option associated with the key, wherein the purchase option includes a subscription fee that may be based on resources used, a fixed fee, or a recurring fee. 13. The method of claim 1, wherein providing the key, further comprises providing the key from a third-party over a network. 14. The method of claim 1, wherein providing the key further comprises: providing the key to a customer by a third-party based at least in part on a purchase transaction of other than the portion of the content or the application by the customer; andassociating the key to the customer. 15. The method of claim 1, wherein the information includes at least one of a type of the content, a price for the content and a length of time the content is accessible. 16. A system for granting access to content, comprising: a content server that provides content; anda client computer that employs a key for validation, an authentication ticket for authentication of a user, and at least one of a plurality of content tickets to enable the user to gain access to at least a portion of content selected by the user, the client computer including a process of downloading at least one resource that includes blocks of executable code of an application from the content server, while the client computer is executing the application using at least on the client computer an other portion of the application that includes other blocks of executable code, the client computer performing acts, comprising: displaying information about a set of resources, wherein the set of resources provided is based on a validation of the client computer that is enabled by the key;selecting at least one resource by the user at the client computer;receiving an authentication ticket based on the at least one selected resource, wherein the authentication ticket enables authentication of the user and enables the user to receive at least one of a plurality of content tickets;receiving at least one of a plurality of content tickets based on the authorization ticket, wherein the at least one content ticket enables the user to gain access to at least a portion of the at least one selected resource for a defined period of time;requesting the at least one selected resource based on the at least one content ticket;providing the requested resource based at least on the at least one content ticket, wherein providing comprises providing the requested resource locally if the requested resource is located local on the client computer; and otherwise, downloading the requested resource from the content server and indicating that the downloaded resource is currently local on the client computer, wherein the downloaded resource includes at least one block of executable code and at least one block of data; andmodifying the at least one downloaded block of executable code to modify the application using the at least one block of data before all of the at least selected portion of the content is available for access on the client computer;receiving within the portion of the content an advertisement associated with a third-party; anddisplaying the advertisement while accessing the resource. 17. The system of claim 16, wherein the content includes a computer program and data associated with the computer program. 18. The system of claim 16, wherein the key is encoded onto at least one of a coupon, a computer display, a file on a computer, mail, email, a business card, a receipt, a dongle, a USB-style plug, a compact flash memory card, a smart card, and a credit card. 19. The system of claim 16, wherein the content server performs acts, comprising: associating the key with a username and password; andproviding the key upon receiving the username and password.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (125)
Krishnan, Murali R., Adaptive bandwidth throttling for network services.
Chow Yen-whei ; Hayes-Roth Frederick A. ; Jacobstein Neil A. ; Manley James E. ; McMahan Christopher B., Automatic retrieval of changed files by a network software agent.
Schmidt, Rene W.; Muller, Hans E.; Violet, Scott R., Browser-independent and automatic apparatus and method for receiving, installing and launching applications from a browser on a client computer.
Bonnaure Patrick P. ; Ziola Tom J. ; Herman William C., Client connects to an internet access provider using algorithm downloaded from a central server based upon client's des.
Steele,Nick; Hawkins,Stan; Maranville,Joe; Bradnan,Andrew, Consumer-controlled limited and constrained access to a centrally stored information account.
Daniel Lucien Durand FR; Gerard Sitbon FR; Fran.cedilla.ois Urbain FR, Device and process for dynamically controlling the allocation of resources in a data processing system.
Katz Donald R. ; Lau Edwin J. ; Mott Timothy ; Brenneman Scott A. ; Jun Benjamin Che-Ming ; Pai Samuel Hong-Yen, Digital information library and delivery system with logic for generating files targeted to the playback device.
Fitzgerald Albion J. ; Fitzgerald Joseph J., Distributed computer network including hierarchical resource information structure and related method of distributing resources.
Shimbo Atsushi,JPX ; Takahashi Toshinari,JPX ; Tomoda Ichiro,JPX ; Murota Masao,JPX, File editing system and shared file editing system with file content secrecy, file version management, and asynchronous.
Nonaka Naomichi (Kawasaki JPX) Nakane Keiichi (Yokohama JPX) Itoh Hiromichi (Yokohama JPX) Ishida Hideaki (Kawasaki JPX), Information processing system having a configuration management system for managing the software of the information proc.
Snyder Michael Dean ; Patel Rajesh, Mechanism for sharing data cache resources between data prefetch operations and normal load/store operations in a data processing system.
Shorey, Rajev; Saran, Huzur; Kamra, Abhinav; Kapila, Sundeep; Khurana, Varun; Yadav, Vikas, Method an congestion control system to allocate bandwidth of a link to dataflows.
Gordon, Robert B.; McBrearty, Gerald Francis; Mullen, Shawn Patrick; Shieh, Johnny Meng-Han, Method and apparatus for balancing bandwidth usage in a browser.
Patel, Achal, Method and apparatus for class based transmission control of data connections based on real-time external feedback estimates obtained using messaging from a wireless network.
Adams Robert ; Perry Burt W. ; Richardson John W. ; Williams David M. ; Yaple Nelson L., Method and apparatus for managing multimedia data files in a computer network by streaming data files into separate str.
Adams Robert ; Perry Burt W. ; Richardson John W. ; Williams David M. ; Yaple Nelson L., Method and apparatus for managing multimedia data files in a computer network by streaming data files into separate str.
Belissent, Jacques E., Method and apparatus for restraining connection request stream associated with high volume burst client in a distributed network.
Bantz, David Frederick; Chefalas, Thomas E.; Karve, Alexei A.; Mastrianni, Steven J., Method and apparatus for selective and quantitative rights management.
Saulsbury, Ashley N.; Kocol, James E.; Lee, Sandra C., Method and apparatus for storing prior versions of modified values to facilitate reliable execution.
James Hanko ; Jerry Wall ; Duane Northcutt ; Lawrence Butcher ; Alan T. Ruberg ; Herbert Bos GB, Method and management of communications over media of finite bandwidth.
Newcombe,Christopher Richard; Jones,Paul David; Ellis,Richard Donald; Birum,Derrick Jason, Method and system for enabling content security in a distributed system.
Caviles, Allen; Gramigna, Kristen; Mondia, Nicole; Rante, John, Method and system for establishing a credit card transaction processing merchant account.
Hopmann, Alexander I.; Anderson, Rebecca L.; Deen, Brian J., Method and system for supporting off-line mode of operation and synchronization using resource state information.
Cox David E. ; Hayes ; Jr. Kent F. ; Kaminsky David L. ; Lindquist David B., Methods, systems and computer program products for management of configurable application programs on a network.
James, Sarita M.; Syme, Brian J.; Raman, Suryanarayanan V.; Sanchez, Lawrence M.; Licata, John A., Methods, systems, architectures and data structures for delivering software via a network.
Simons Corey ; Pearson Terrence S. ; Noel Chris R. ; Kidder Joseph D. ; Branscomb Brian ; Langrind Nicholas A. ; Sullivan Daniel J. ; Fox Barbara A., Network device for supporting multiple redundancy schemes.
Schneier Bruce ; Walker Jay S. ; Jorasch James, Remote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system.
Hurtado, Marco M.; Milsted, Kenneth L.; Gruse, George G.; Downs, Edgar; Lehman, Christopher T.; Spagna, Richard L.; Lotspiech, Jeffrey B., Secure electronic content distribution on CDS and DVDs.
Kidder, Joseph D.; Mahler, Michael B.; Perreault, Edward L.; Stearns, Margaret; Hurley, Jim, Signatures for facilitating hot upgrades of modular software components.
Watson, Robert N. M.; Gudmundsson, Olafur, System and method for preventing a spoofed remote procedure call denial of service attack in a networked computing environment.
Hankin, Keith; Chu, Ching-Wen Alan; Mallavarupu, Nirupama; Kong, James, System and method for providing a persistent object framework for managing persistent objects.
Olson Kipley J. ; Cohen Andrew R., System and method for the distribution and synchronization of data and state information between clients in a distribut.
Travison, Daniel T.; Schliiter, Kent S.; Sleeman, Martin J.; Dillingham, Lara N.; Multerer, Boyd C.; Sprague, Roger W., System and method providing single application image.
Moore, Reagan W.; Rajasekar, Arcot; Wan, Michael Y., System of and method for transparent management of data objects in containers across distributed heterogenous resources.
Berson, Thomas A.; Dean, R. Drews; Franklin, Matthew K.; Lunt, Teresa F.; Smetters, Diana K., System, method and article of manufacture for transition state-based cryptography.
Ellis, Richard Donald; Newcombe, Christopher Richard; Jones, Paul David; Birum, Derrick Jason; Dunkle, Harold Michael; Thompson, Mikel Howard, Method and system for granting access to system and content.
Jones, Paul David; Newcombe, Christopher Richard; Ellis, Richard Donald; Birum, Derrick Jason; Thompson, Mikel Howard, Method and system for preloading resources.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.