US20060165005A1 - Business method for pay-as-you-go computer and dynamic differential pricing - Google Patents
Business method for pay-as-you-go computer and dynamic differential pricing Download PDFInfo
- Publication number
- US20060165005A1 US20060165005A1 US11/006,837 US683704A US2006165005A1 US 20060165005 A1 US20060165005 A1 US 20060165005A1 US 683704 A US683704 A US 683704A US 2006165005 A1 US2006165005 A1 US 2006165005A1
- Authority
- US
- United States
- Prior art keywords
- computer
- resource
- usage
- provisioning
- providing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0283—Price estimation or determination
- G06Q30/0284—Time or distance, e.g. usage of parking meters or taximeters
Definitions
- FIG. 1 is a block diagram of a network interconnecting a plurality of computing resources
- FIG. 2 is a block diagram of a system in accordance with an embodiment of the current disclosure
- FIG. 4 is a block diagram of a computer that may be connected to the network of FIG. 1 ;
- FIG. 5 is a block diagram of the local provisioning-module of the computer of FIG. 4 ;
- FIG. 1 illustrates a network 10 that may be used to implement a dynamic software provisioning system.
- the network 10 may be the Internet, a virtual private network (VPN), or any other network that allows one or more computers, communication devices, databases, etc., to be communicatively connected to each other.
- the network 10 may be connected to a personal computer 12 and a computer terminal 14 via an Ethernet network 16 and a router 18 , and a landline 20 .
- the network 10 may be wirelessly connected to a laptop computer 22 and a personal data assistant 24 via a wireless communication station 26 and a wireless link 28 .
- a server 30 may be connected to the network 10 using a communication link 32 and a mainframe 34 may be connected to the network 10 using another communication link 36 .
- An exemplary computer 202 may have resources 206 and 208 and a local provisioning module (LPM) 204 .
- the LPM 204 may manage and securely store value that can be applied toward the use of one or more computer resources 206 , 208 .
- the resources 206 , 208 may be provisioned in the computer 202 at any point prior to their use, for example, during manufacturing, set-up, or previous operation.
- the resources 206 , 208 are provisioned in a manner that allows metering or gating of their operation.
- Metering their operation may include monitoring an aspect of their operation, such as number of launches, the time (duration) of use, use over a period of time, such as a calendar month, or use of a particular aspect, such as saving data generated by an application program, or output, such as printing.
- Installation may be performed by any number of parties with physical or logical access to the computer 202 including the service provider 210 or several others not depicted, such as a resource provider, a user, a manufacturer, or a dealer.
- the service provider 210 may be coupled to the computer 202 via a link 212 , preferably in real time, but off-line mechanisms work equally well. Examples of real-time connections may include dial-up access or the Internet. Off-line mechanisms for the link 212 may include known methods, for example, smart cards, other removable media, or even hardcopy information suitably coded to ensure accuracy and authenticity.
- the service provider 210 uses the link 212 to send provisioning packets to add value to the computer 202 , as discussed in more detail below.
- An additional participant may optionally be a bank or other funding source 218 . In some cases, the funding source 218 may be incorporated by the service provider 210 .
- the funding source 218 may be coupled to the service provider 210 by the link 220 .
- provisioning system 214 is shown to provision use of a resource on the computing device 202 communicatively connected to the network 10 , it may be used to implement such use on a computing device that may not be connected to the network 10 , or it may be only intermittently connected to the network 10 .
- the provisioning system 214 may include a core provisioning service module 230 , a distribution service module 232 , a certificate service module 234 , a core database 236 , and a distribution database 238 .
- the provisioning system 214 may communicate with the billing system 218 via the billing adapter 216
- the core provisioning service module 230 may communicate with the distribution database 238 via a database writer 240 and the distribution database 238 communicates with the distribution service 232 via a database reader 242 .
- the computing device 202 may include a local provisioning module (LPM) 204 that communicates with the distribution service module 232 via a distribution web service module 244 .
- LPM local provisioning module
- Computer storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
- Memory 404 , removable storage 406 and non-removable storage 408 are all examples of computer storage media.
- Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by the computing device 400 . Any such computer storage media may be part of the computing device 400 .
- the computing device 400 may also have input device(s) 410 such as keyboard, mouse, pen, voice input device, touch input device, etc.
- input device(s) 410 such as keyboard, mouse, pen, voice input device, touch input device, etc.
- output device(s) 412 such as a display, speakers, a printer, etc. may also be included.
- the computing device 400 may also contain communications connection(s) 414 that allow the device to communicate with other devices.
- the communications connection(s) 414 is an example of communication media.
- the communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
- a “modulated data signal” may be a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
- communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media.
- Computer readable media may include both storage media and communication media.
- a local provisioning module (LPM) 204 may provide part of the security basis surrounding the computing device 400 .
- the local provisioning module 204 is discussed in more detail in the following description of FIG. 5 .
- Components of the LPM 204 may be located on non-removable non-volatile memory, as part of the system memory 404 , as part of various hardware components of the computer 400 , including the processing unit 402 , interface circuitry (not depicted) or as any combination of these. The functioning of the LPM 204 is explained in further detail below.
- FIG. 5 illustrates a further detailed block diagram of the LPM 204 .
- the LPM may be part of a trusted computing base, as know in the art, or may be an extension of a trusted computing base.
- the LPM 204 is communicatively coupled to the service provider 210 .
- the LPM 204 resides computing system such as the computing device 400 .
- the LPM 204 may perform various functions including interacting with users of the computing devices for interacting with the service provider 210 via the network 10 , etc.
- the LPM 204 may perform the function of enforcing a particular state on the computing device 400 by interacting with the particular login program used by the client computing device 400 .
- the LPM 204 may interact with the WPA to enforce the particular state on the client computing device 400 .
- the LPM 204 may interact with any other appropriate operating system login program.
- the implementation of the LPM 204 may be a grouping of various logical components implemented in software and composed as a library linked into a login program used by the WPA.
- the LPM 204 may include an enforcement add-on module 452 to enforce the computing device 400 to operate in a particular state, a metering module 454 to meter use of a resource provisioned on the computing device 400 , a transaction engine 456 to process provisioning packets provided by the service provider 210 , a secure storage manager 458 to provide secure storage for the provisioning packets, a communication module 460 to communicate with the service provider 210 , and a user experience module 462 to interact with a user.
- an enforcement add-on module 452 to enforce the computing device 400 to operate in a particular state
- a metering module 454 to meter use of a resource provisioned on the computing device 400
- a transaction engine 456 to process provisioning packets provided by the service provider 210
- a secure storage manager 458 to provide secure storage for the provisioning packets
- a communication module 460 to communicate with the service provider 210
- a user experience module 462 to interact with a user.
- the enforcement module 452 may be inserted into the login logic 464 of the computing device 400 .
- the enforcement module 452 may query the metering module 454 for balance information. If the enforcement module 452 determines that the computing device 400 has enough value for the requested activity, it may allow the computing device 400 to operate in its normal manner and allow the user to log onto the computing device 400 , or use the requested resource 206 208 . However, if the enforcement module 452 determines that the computing device 400 does not have enough value available, it denies the login or access to the requested resource and may invoke a user interface to prompt the user to add value to the available balance.
- the enforcement module 452 may be able to disable or otherwise sanction resources under the direct influence or control of the computing device 400 .
- the metering module 454 may include a balance manager 466 for reading and verifying a current balance available for login or usage of provisioned resource and for updating the current balance.
- the metering module 454 may also include a configuration manager 468 for determining valid system configuration information, such as authorized, i.e. chargeable, peripherals and a reliable clock manager 470 for maintaining a monotonic timer, for example, a clock or timer that always counts in one direction and is not resettable.
- the metering module 454 may provide the mechanism for monitoring how often, how much, or over what period the computing device 400 , or components thereof, are used.
- the metering module 454 may utilize hooks in the operating system to count application starts, for example, when metering usage by application.
- the metering circuit 454 may monitor the processing unit 402 cycles/usage to determine how much the computing device 400 or an individual application has actually been in operation.
- the reliable clock manager 470 may be monitored to determine when a given period for authorized use has expired, for example, a calendar month or 30 days.
- the enforcement add-on module 452 may function as an event dispatcher that invokes the balance manager 466 based upon certain events, while the balance manager 466 may determine what action to take when it is invoked in response to an event.
- Examples of various events that may cause the enforcement add-on module 452 to invoke the balance manager 466 are those system events that are covered by the usage plan currently in effect. Such events may include (1) a logon event, (2) a system unlock event, (3) a restore from hibernation event, (4) a wake up from standby event, (5) a user triggered event, such as a request to use a peripheral (6) a logoff event, (7) a packet download, (8) a timer tick, etc.
- the transaction engine 456 may process a provisioning packet in order to update the balance in the balance manager 466 .
- the transaction engine 456 may ensure that any provisioning packet is consumed only once to update the balance.
- the transaction engine 456 may be designed so that it performs atomic update transactions, so the balance update and the consumption of the provisioning packet are always performed together.
- the transaction engine 456 may include a digital signature verification circuit 467 .
- the digital signature verification circuit 467 may have circuitry and/or software for decrypting the provisioning packet, whether the provisioning packet is received electronically over the Internet, locally from a local area network, from removable media 406 , entered manually, or another method of transport.
- PKI public key infrastructure
- the message may be decrypted, if encrypted, and the hash may be generated and checked against the digital signature to validate the integrity and authenticity of the provisioning packet.
- the particular encryption algorithm employed, for example, RSATM or elliptic curve, is not significant.
- Digital signature technology including sender verification and content verification is well known and not covered in detail here.
- the secured storage manager 458 may allow the LPM 204 to store balance data in a secured manner so that it cannot be tampered with by a user and so that it is accessible only by the LPM 204 . After a provisioning packet is downloaded by the LPM 204 , it may be stored in the secured storage manager 458 . Similarly, the balance counter and the packet consumption counter may also be stored in the secured storage manager 458 . The secured storage manager 458 may also store data that is used in the set-up and operation of the local provisioning module 416 . In general, this is data that, if compromised, may be used to circumvent the controls for pay-per-use or pre-pay operation. Among such data may be a unique identifier.
- State data stored by the secure memory manager 458 , may be used to indicate whether the computing device 400 is in a fully operational mode or if the computing device 400 or an application is under some restriction or sanction. While most software may be stored or executed from system memory 404 there may some executable code, for example, applications, routines, or drivers that are ideally tamper resistant. For example, a routine that sets the reliable hardware clock 472 may itself need to be protected to prevent tampering and fraud.
- a certificate revocation list (“CRL”) may be used to determine if the current root certificate is valid.
- the CRL may be securely stored locally to prevent tampering that may allow fraudulent use by presenting a provisioning packet signed by a compromised or non-authorized private key.
- the public keys of a root certificate are in the public domain and technically do not need protection, in the interest of the integrity of provisioning packet verification, the root certificate may be stored in the secure storage manager 458 .
- the secured storage manager 458 may be implemented as a dynamic link library (dll) so that the user experience module 462 can access the secured storage manager 458 .
- the packet/certificate request manager 486 may receive a request to download a packet or a certificate from the service provider 210 .
- the packet/certificate request manager 486 may communicate with the service provider 210 to receive a certificate from a known source, such as the service provider 210 .
- the packet/certificate request manager 486 may also be responsible to acknowledge to the service provider 210 upon successful download of a certificate or a provisioning packet.
- the packet/certificate request manager 486 may use a provisioning protocol to communicate with the service provider 210 .
- a packet downloaded by the packet/certificate request manager 486 may be stored in the secured storage manager 458 .
- the purchase manager 488 may allow a user of the computing device 400 to add value to the local balance by purchasing provisioning packets by receiving payment information from the user and communicating the payment information to the service provider 210 or a funding account 218 .
- the purchase of a scratch card at a local outlet may be used to add value to the funding account 620 that is then used to create a provisioning packet that is downloaded, verified and used to update the balance in the balance manager 466 .
- Both the packet/certificate request manager 486 and the purchase manager 488 may communicate with the network 10 using the web service communication manager 490 .
- the web service communication manager may use a network services manager 492 and a network interface card (NIC) 494 to communicate with the network 10 .
- NIC network interface card
- the web service communication manager 490 is used to communicate with the network 10 in an alternate implementation, other communication tools, such as file transfer protocol (FTP), etc., may be used to communicate with the network 10 .
- FTP file transfer protocol
- the user experience module 462 may include an activation user interface (UI) 496 to ask a user to enter an InitKey that allows the packet/certificate request manager 486 to download the certificate from the service provider 210 , and a notification UI 498 that allows the LPM 204 to interact with the user.
- the activation UI 496 may also invoke the purchase manager 488 to allow a user to purchase additional provisioning packets for balance recharging.
- the notification UI 498 may include various user interfaces that allow the user to query current balance information, usage history, etc.
- the notification UI 498 may be invoked by the user or by the login logic 464 . In a situation where the balance available for using a provisioned resource is low, the login logic 464 may invoke the notification UI 498 to inform the user that an additional purchase may be necessary.
- the notification UI may be constantly active and it may provide notification service to the user via a taskbar icon, a control panel applet, a balloon pop-up, or by using any other commonly known UI method.
- an exemplary method of operating the system 200 may begin at either 502 or 504 depending on the stage of operation.
- a user proactively decides to extend the operation of the computer 202 , either initially or after a period of operation, the user may instantiate 502 a provisioning user interface (shown in priority application 30835/40399 listed above) and contact 506 a service provider.
- the service provider 210 may typically be the operator that provided the computer, or may be an entity contractually linked to the service provider 210 .
- the service provider 210 may typically provide the computer and at least one usage plan for determining operation of the computer 210 .
- the computer 210 may be provided for little or no upfront money.
- the service provider 210 may sell the user provisioning packets that add to a value balance in the balance manager 466 of the metering circuit 454 . It may be a key part of the service provider's business strategy to prevent provisioning packets from being accepted by the computer 202 from a rogue provider (not depicted). Rogue providers may include both hackers and unauthorized service providers acting without the permission of the service provider 210 who supplied, and who may still own title to, the computer 202 .
- scratch card may allow a user without a bank account or credit to operate the computer 202 by buying scratch cards from a retailer.
- the cards may be activated and then registered by the user for later use in buying provisioning packets. Payment is then made by the clearinghouse function of the scratch card issuer.
- Another account type may be offered through an existing service provider 210 , such as a telephone company, that already has a credit and billing system in place.
- a telephone company may not only provide the computer 202 but an Internet connection, such as dial-up or digital subscriber line (DSL).
- DSL digital subscriber line
- the service provider 210 and the funding account 218 may be the same entity.
- the metering module 454 may determine 518 that the balance of funds is sufficient based on the currently active service plan. The yes branch of 518 may be followed and the authorization is granted back through the chain of the enforcement module 452 to the login logic 464 .
- the requested service in this case login, may be activated 526 and the user may use the computer in the prescribed fashion until the next event that causes a service request 514 to be generated, initiating action as described.
- the no branch from 518 may be followed.
- the request is denied 520 and action taken depending on the business rules associated with the currently active usage plan may be invoked.
- the action taken may range from an initial warning that funds have been depleted or, in an extreme circumstance, the enforcement module 452 may invoke a sanction such as slowing the computer 202 to a virtual standstill and/or disabling all computer 202 capabilities except those required to contact the service provider 210 for provisioning.
- the user may be presented 522 with an option to request more provisioning packets.
- the yes branch is followed to 506 and provisioning occurs as described above.
- the no branch from 522 may be followed to 524 , where any sanction activated remains in place until the user chooses to restart at either 502 or 504 .
- a change in usage plan may accommodate a different usage pattern or simply to take advantage of better pricing offered by the service provider 210 .
- the payment method may be changed as a user's preferences or financial situation dictate.
- the user may contact 506 the service provider 210 in conjunction with either entry point 504 or 502 .
- a selection of usage plans and payment options may be presented 530 .
- the user can select the usage plan that best meets his or her anticipated usage.
- the service provider 210 may want to provide an incentive to increase use of the computer and also to protect the service provider's investment at the low usage end.
- the payback period for a computer 202 provided at low cost may be determined almost exclusively by how much the user actually uses the computer 202 or the provisioned resources 206 208 .
- the payback to the service provider 210 may be unacceptably long from a financial standpoint.
- extremely high use may pay back the computer unexpectedly quickly. While not necessarily bad, high-use users may be attractive targets for competition. Therefore, it may be useful to provide usage plans that consume more value during early use, for example, in a month, and consume value more slowly after certain usage levels are achieved.
- the enforcement module 452 may be programmed to report back to a requesting service, for example, during step 518 , that a usage trigger has been reached and subsequent use will require less value to be deducted from the balance.
Landscapes
- Business, Economics & Management (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Economics (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Telephonic Communication Services (AREA)
- User Interface Of Digital Computer (AREA)
- Debugging And Monitoring (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
- Mobile Radio Communication Systems (AREA)
Priority Applications (56)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/006,837 US20060165005A1 (en) | 2004-11-15 | 2004-12-08 | Business method for pay-as-you-go computer and dynamic differential pricing |
| US11/022,493 US8464348B2 (en) | 2004-11-15 | 2004-12-22 | Isolated computing environment anchored into CPU and motherboard |
| US11/040,968 US20060165227A1 (en) | 2004-11-15 | 2005-01-21 | System and method for distribution of provisioning packets |
| US11/074,558 US7421413B2 (en) | 2004-11-15 | 2005-03-08 | Delicate metering of computer usage |
| US11/109,438 US7562220B2 (en) | 2004-11-15 | 2005-04-19 | System and method for programming an isolated computing environment |
| US11/150,001 US20060168664A1 (en) | 2004-11-15 | 2005-06-10 | Profitable free computing resources leveraging the advertising model |
| US11/152,214 US8176564B2 (en) | 2004-11-15 | 2005-06-14 | Special PC mode entered upon detection of undesired state |
| US11/224,635 US8336085B2 (en) | 2004-11-15 | 2005-09-12 | Tuning product policy using observed evidence of customer behavior |
| AU2005232307A AU2005232307A1 (en) | 2004-11-15 | 2005-11-11 | Method for pay-as-you-go computer and dynamic differential pricing |
| EP05819896A EP1815639A4 (en) | 2004-11-15 | 2005-11-12 | IN THE DETECTION OF AN UNWANTED CONDITION, ACTIVATED SPECIAL PC MODE |
| BRPI0518914-4A BRPI0518914A2 (pt) | 2004-11-15 | 2005-11-12 | modo especial de pc iniciado pela detecÇço de um estado indesejado |
| KR1020077011073A KR20070084257A (ko) | 2004-11-15 | 2005-11-12 | Cpu 및 마더보드에 고정된 고립형 컴퓨팅 환경 |
| KR1020077011077A KR20070084260A (ko) | 2004-11-15 | 2005-11-12 | 프로비저닝 패킷의 분배를 위한 시스템 및 방법 |
| PCT/US2005/040966 WO2006055428A2 (en) | 2004-11-15 | 2005-11-12 | System and method for distribution of provisioning packets |
| BRPI0518921-7A BRPI0518921A2 (pt) | 2004-11-15 | 2005-11-12 | ambiente de computaÇço isolado ancorado na cpu e na placa mçe |
| JP2007541355A JP2008521091A (ja) | 2004-11-15 | 2005-11-12 | 分離コンピューティング環境をプログラムするためのシステムおよび方法 |
| MX2007005657A MX2007005657A (es) | 2004-11-15 | 2005-11-12 | Medicion delicada de uso de computadora. |
| BRPI0518003-1A BRPI0518003A (pt) | 2004-11-15 | 2005-11-12 | medição delicada de utilização de computador |
| EP05821183A EP1815641A4 (en) | 2004-11-15 | 2005-11-12 | SYSTEM AND METHOD FOR DISTRIBUTING SERVICE PACKAGES |
| RU2007122339/09A RU2007122339A (ru) | 2004-11-15 | 2005-11-12 | Изолированное вычислительное окружение, привязанное к центральному процессору и материнской плате |
| EP05820177A EP1815327A4 (en) | 2004-11-15 | 2005-11-12 | SYSTEM AND METHOD FOR PROGRAMMING ISOLATED COMPUTER ENVIRONMENT |
| EP05820090A EP1815640A4 (en) | 2004-11-15 | 2005-11-12 | ACCURATE MEASUREMENT OF COMPUTER USE |
| RU2007117916/09A RU2007117916A (ru) | 2004-11-15 | 2005-11-12 | Система и способ для распределения пакетов предоставления |
| PCT/US2005/040950 WO2006055425A2 (en) | 2004-11-15 | 2005-11-12 | Isolated computing environment anchored into cpu and motherboard |
| RU2007117897/09A RU2007117897A (ru) | 2004-11-15 | 2005-11-12 | Тонкое измерение используемости компьютера |
| MX2007005659A MX2007005659A (es) | 2004-11-15 | 2005-11-12 | Sistema y metodo para programar un ambiente de computo aislado. |
| JP2007541356A JP2008521092A (ja) | 2004-11-15 | 2005-11-12 | Cpuおよびマザーボード内に固定された分離コンピューティング環境 |
| JP2007541351A JP2008521089A (ja) | 2004-11-15 | 2005-11-12 | 望ましくない状態の検知時に入る特別なpcモード |
| RU2007117900/09A RU2007117900A (ru) | 2004-11-15 | 2005-11-12 | Особый режим работы пк, инициируемый при обнаружении нежелательного состояния |
| PCT/US2005/040940 WO2006055420A2 (en) | 2004-11-15 | 2005-11-12 | Special pc mode entered upon detection of undesired state |
| PCT/US2005/040965 WO2006055427A2 (en) | 2004-11-15 | 2005-11-12 | Delicate metering of computer usage |
| PCT/US2005/040949 WO2006055424A2 (en) | 2004-11-15 | 2005-11-12 | System and method for programming an isolated computing environment |
| KR1020077011074A KR20070084258A (ko) | 2004-11-15 | 2005-11-12 | 원하지 않은 상태의 검출시에 진입되는 특수한 pc 모드 |
| KR1020077011072A KR20070088633A (ko) | 2004-11-15 | 2005-11-12 | 컴퓨터 사용량 계측 방법 및 이를 기억한 컴퓨터 판독 가능매체 |
| RU2007117899/09A RU2007117899A (ru) | 2004-11-15 | 2005-11-12 | Система и способ для программирования изолированной вычислительной среды |
| JP2007541361A JP2008521093A (ja) | 2004-11-15 | 2005-11-12 | コンピュータ使用量の精密な課金 |
| EP05824535A EP1815629A4 (en) | 2004-11-15 | 2005-11-12 | INSULATED COMPUTER ENVIRONMENT IN CPU AND HARD DRIVE |
| BRPI0518912-8A BRPI0518912A2 (pt) | 2004-11-15 | 2005-11-12 | sistema e mÉtodo para distribuiÇço de pacotes programÁveis |
| KR1020077011075A KR20070084259A (ko) | 2004-11-15 | 2005-11-12 | 고립형 컴퓨팅 환경을 프로그래밍하기 위한 시스템 및 방법 |
| BRPI0515720-0A BRPI0515720A (pt) | 2004-11-15 | 2005-11-12 | sistema e método para programar um ambiente de computação isolado |
| MX2007005655A MX2007005655A (es) | 2004-11-15 | 2005-11-12 | Modo de pc especial introducido despues de la deteccion de un estado indeseado. |
| CN2005800387738A CN101292248B (zh) | 2004-11-15 | 2005-11-12 | 在检测到非期望状态后进入特殊pc模式的方法和计算机 |
| MX2007005662A MX2007005662A (es) | 2004-11-15 | 2005-11-12 | Sistema y metodo para la distribucion de paquetes de provision. |
| JP2007541362A JP2008521094A (ja) | 2004-11-15 | 2005-11-12 | プロビジョニングパケットを配信するためのシステムおよび方法 |
| MX2007005656A MX2007005656A (es) | 2004-11-15 | 2005-11-12 | Ambiente de computo aislado anclado a un cpu y tarjeta madre. |
| CA002526588A CA2526588A1 (en) | 2004-11-15 | 2005-11-14 | Method for pay-as-you-go computer and dynamic differential pricing |
| RU2005135424/09A RU2005135424A (ru) | 2004-11-15 | 2005-11-14 | Способ предоставления компьютера с оплатой по ходу использования и динамического дифференцированного тарифа |
| EP05110697A EP1659530A1 (en) | 2004-11-15 | 2005-11-14 | Method for pay-as-you-go computer and dynamic differential pricing |
| BRPI0504855-9A BRPI0504855A (pt) | 2004-11-15 | 2005-11-14 | método para computador de pagamento relativo ao uso e apreçamento diferencial dinámico |
| TW094139942A TW200634584A (en) | 2004-11-15 | 2005-11-14 | Method for pay-as-you-go computer and dynamic differential pricing |
| TW094140178A TW200631377A (en) | 2004-11-15 | 2005-11-15 | System and method for distribution of provisioning packets |
| JP2005330496A JP2006190254A (ja) | 2004-11-15 | 2005-11-15 | 従量制コンピュータおよび動的な差別的価格決定に関する方法 |
| KR1020050109213A KR20060054164A (ko) | 2004-11-15 | 2005-11-15 | 선불 지급식 컴퓨터 및 동적인 가격 차별화를 위한 방법 |
| TW094140175A TW200630885A (en) | 2004-11-15 | 2005-11-15 | System and method for programming an isolated computing environment |
| US11/612,436 US7979721B2 (en) | 2004-11-15 | 2006-12-18 | Enhanced packaging for PC security |
| US13/711,549 US9224168B2 (en) | 2004-11-15 | 2012-12-11 | Tuning product policy using observed evidence of customer behavior |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US10/989,122 US7610631B2 (en) | 2004-11-15 | 2004-11-15 | Method and apparatus for provisioning software |
| US11/006,837 US20060165005A1 (en) | 2004-11-15 | 2004-12-08 | Business method for pay-as-you-go computer and dynamic differential pricing |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US10/989,122 Continuation-In-Part US7610631B2 (en) | 2004-11-15 | 2004-11-15 | Method and apparatus for provisioning software |
Related Child Applications (4)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US11/022,493 Continuation-In-Part US8464348B2 (en) | 2004-11-15 | 2004-12-22 | Isolated computing environment anchored into CPU and motherboard |
| US11/040,968 Continuation-In-Part US20060165227A1 (en) | 2004-11-15 | 2005-01-21 | System and method for distribution of provisioning packets |
| US11/074,558 Continuation-In-Part US7421413B2 (en) | 2004-11-15 | 2005-03-08 | Delicate metering of computer usage |
| US11/150,001 Continuation-In-Part US20060168664A1 (en) | 2004-11-15 | 2005-06-10 | Profitable free computing resources leveraging the advertising model |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20060165005A1 true US20060165005A1 (en) | 2006-07-27 |
Family
ID=35677653
Family Applications (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US11/006,837 Abandoned US20060165005A1 (en) | 2004-11-15 | 2004-12-08 | Business method for pay-as-you-go computer and dynamic differential pricing |
| US11/074,558 Expired - Fee Related US7421413B2 (en) | 2004-11-15 | 2005-03-08 | Delicate metering of computer usage |
| US11/150,001 Abandoned US20060168664A1 (en) | 2004-11-15 | 2005-06-10 | Profitable free computing resources leveraging the advertising model |
Family Applications After (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US11/074,558 Expired - Fee Related US7421413B2 (en) | 2004-11-15 | 2005-03-08 | Delicate metering of computer usage |
| US11/150,001 Abandoned US20060168664A1 (en) | 2004-11-15 | 2005-06-10 | Profitable free computing resources leveraging the advertising model |
Country Status (10)
| Country | Link |
|---|---|
| US (3) | US20060165005A1 (es) |
| EP (1) | EP1659530A1 (es) |
| JP (2) | JP2008521093A (es) |
| KR (1) | KR20060054164A (es) |
| AU (1) | AU2005232307A1 (es) |
| BR (2) | BRPI0518003A (es) |
| CA (1) | CA2526588A1 (es) |
| MX (1) | MX2007005657A (es) |
| RU (3) | RU2007117916A (es) |
| TW (1) | TW200634584A (es) |
Cited By (27)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070058807A1 (en) * | 2005-04-22 | 2007-03-15 | Microsoft Corporation | Establishing a unique session key using a hardware functionality scan |
| US20070136570A1 (en) * | 2005-12-09 | 2007-06-14 | Microsoft Corporation | Computing device limiting mechanism |
| US20080077420A1 (en) * | 2006-09-27 | 2008-03-27 | Daryl Cromer | System and Method for Securely Updating Remaining Time or Subscription Data for a Rental Computer |
| US20080147555A1 (en) * | 2006-12-18 | 2008-06-19 | Daryl Carvis Cromer | System and Method for Using a Hypervisor to Control Access to a Rental Computer |
| US20080184283A1 (en) * | 2007-01-29 | 2008-07-31 | Microsoft Corporation | Remote Console for Central Administration of Usage Credit |
| US20080183712A1 (en) * | 2007-01-29 | 2008-07-31 | Westerinen William J | Capacity on Demand Computer Resources |
| US20080243628A1 (en) * | 2007-03-26 | 2008-10-02 | Microsoft Corporation | Differential pricing based on social network standing |
| US20080250250A1 (en) * | 2007-04-04 | 2008-10-09 | Microsoft Corporation | Method and Apparatus for Using USB Flash Devices and Other Portable Storage as a Means to Access Prepaid Computing |
| US20090132308A1 (en) * | 2007-11-20 | 2009-05-21 | Microsoft Corporation | Solution for Managed Personal Computing |
| US20090254995A1 (en) * | 2008-04-03 | 2009-10-08 | Microsoft Corporation | Client controlled lock for electronic devices |
| US20100005532A1 (en) * | 2008-07-04 | 2010-01-07 | Koninklijke Kpn N.V. | Software Usage Controlled by CPU Utilization |
| US20110029348A1 (en) * | 2008-03-31 | 2011-02-03 | Saffre Fabrice T P | Scheduling usage or provision of resources |
| US8176564B2 (en) | 2004-11-15 | 2012-05-08 | Microsoft Corporation | Special PC mode entered upon detection of undesired state |
| EP2506181A1 (en) * | 2011-03-28 | 2012-10-03 | Alcatel Lucent | A method, a system, a device, a computer program and a computer program product for managing remote devices |
| US8336085B2 (en) | 2004-11-15 | 2012-12-18 | Microsoft Corporation | Tuning product policy using observed evidence of customer behavior |
| US8347078B2 (en) | 2004-10-18 | 2013-01-01 | Microsoft Corporation | Device certificate individualization |
| US8353046B2 (en) | 2005-06-08 | 2013-01-08 | Microsoft Corporation | System and method for delivery of a modular operating system |
| US20130035065A1 (en) * | 2008-03-04 | 2013-02-07 | Adler Mitchell D | Secure device configuration profiles |
| US8438645B2 (en) | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
| US8464348B2 (en) | 2004-11-15 | 2013-06-11 | Microsoft Corporation | Isolated computing environment anchored into CPU and motherboard |
| US8700535B2 (en) | 2003-02-25 | 2014-04-15 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
| US8725646B2 (en) | 2005-04-15 | 2014-05-13 | Microsoft Corporation | Output protection levels |
| US8781969B2 (en) | 2005-05-20 | 2014-07-15 | Microsoft Corporation | Extensible media rights |
| US8930266B2 (en) | 2010-05-24 | 2015-01-06 | Simpa Networks, Inc. | Techniques for progressive purchasing |
| US9189605B2 (en) | 2005-04-22 | 2015-11-17 | Microsoft Technology Licensing, Llc | Protected computing environment |
| US9363481B2 (en) | 2005-04-22 | 2016-06-07 | Microsoft Technology Licensing, Llc | Protected media pipeline |
| US9756031B1 (en) * | 2011-12-21 | 2017-09-05 | Amazon Technologies, Inc. | Portable access to auditing information |
Families Citing this family (61)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7590508B1 (en) * | 2004-10-22 | 2009-09-15 | Sprint Communications Company L.P. | Method and system for forecasting usage costs and computer capacity |
| EP1946152B1 (en) * | 2005-11-10 | 2014-03-12 | Halliburton Energy Services, Inc. | Displaced electrode amplifier |
| US8146157B2 (en) * | 2005-12-19 | 2012-03-27 | Rockstar Bidco, LP | Method and apparatus for secure transport and storage of surveillance video |
| JP4911984B2 (ja) * | 2006-02-08 | 2012-04-04 | 東京エレクトロン株式会社 | ガス供給装置,基板処理装置,ガス供給方法及びシャワーヘッド |
| US8224695B2 (en) | 2006-03-31 | 2012-07-17 | Google Inc. | Monetizing service calls through advertising |
| US20070255618A1 (en) * | 2006-04-28 | 2007-11-01 | Meerbergen Jason R | System and method for improving online advertising effectiveness and promoting digital content creation |
| US8122258B2 (en) * | 2006-05-22 | 2012-02-21 | Hewlett-Packard Development Company, L.P. | System and method for secure operating system boot |
| US7984283B2 (en) * | 2006-05-22 | 2011-07-19 | Hewlett-Packard Development Company, L.P. | System and method for secure operating system boot |
| CA2649015C (en) | 2006-05-24 | 2014-01-21 | Vidoop, L.L.C. | Graphical image authentication and security system |
| US8117458B2 (en) * | 2006-05-24 | 2012-02-14 | Vidoop Llc | Methods and systems for graphical image authentication |
| US20070277224A1 (en) | 2006-05-24 | 2007-11-29 | Osborn Steven L | Methods and Systems for Graphical Image Authentication |
| US9189603B2 (en) | 2006-05-24 | 2015-11-17 | Confident Technologies, Inc. | Kill switch security method and system |
| JP2008006623A (ja) | 2006-06-27 | 2008-01-17 | Brother Ind Ltd | 記録装置の製造方法 |
| EP2078273A1 (en) * | 2006-11-02 | 2009-07-15 | International Business Machines Corporation | A method, system and computer program for metering usage of software products with a dynamically optimised license use |
| US8640162B2 (en) * | 2006-11-14 | 2014-01-28 | At&T Intellectual Property I, Lp | System and method for distributing advertisements in an internet protocol television system |
| US20080183623A1 (en) * | 2007-01-29 | 2008-07-31 | Zhangwei Xu | Secure Provisioning with Time Synchronization |
| JP2010518515A (ja) * | 2007-02-05 | 2010-05-27 | ヴィドゥップ・エルエルシー | 後援された帯域外パスワードの配信方法およびシステム |
| WO2008098029A1 (en) * | 2007-02-06 | 2008-08-14 | Vidoop, Llc. | System and method for authenticating a user to a computer system |
| US20100250937A1 (en) * | 2007-03-05 | 2010-09-30 | Vidoop, Llc | Method And System For Securely Caching Authentication Elements |
| US20080254890A1 (en) * | 2007-04-12 | 2008-10-16 | Peter Sispoidis | Inventory placement |
| WO2008137158A1 (en) * | 2007-05-07 | 2008-11-13 | Biap, Inc. | Context-dependent prediction and learning with a universal re-entrant predictive text input software component |
| US8214885B2 (en) * | 2007-05-07 | 2012-07-03 | Mocana Corporation | Managing network components using USB keys |
| US8364782B2 (en) * | 2007-05-25 | 2013-01-29 | Microsoft Corporation | Ad-funded web services |
| US20080305832A1 (en) * | 2007-06-07 | 2008-12-11 | Microsoft Corporation | Sharing profile mode |
| GB2448957B (en) * | 2007-06-20 | 2009-06-17 | Cvon Innovations Ltd | Mehtod and system for identifying content items to mobile terminals |
| US7778956B2 (en) | 2007-06-21 | 2010-08-17 | Microsoft Corporation | Portal and key management service database schemas |
| US8244640B2 (en) * | 2007-06-21 | 2012-08-14 | Microsoft Corporation | Packet schema for pay-as-you-go service provisioning |
| US9392074B2 (en) | 2007-07-07 | 2016-07-12 | Qualcomm Incorporated | User profile generation architecture for mobile content-message targeting |
| US9485322B2 (en) | 2007-07-07 | 2016-11-01 | Qualcomm Incorporated | Method and system for providing targeted information using profile attributes with variable confidence levels in a mobile environment |
| KR101387496B1 (ko) * | 2007-07-31 | 2014-04-21 | 엘지전자 주식회사 | 방송 수신기, 데이터 전송 방법 및 데이터 처리 방법 |
| US8910234B2 (en) | 2007-08-21 | 2014-12-09 | Schneider Electric It Corporation | System and method for enforcing network device provisioning policy |
| JP2009053905A (ja) * | 2007-08-27 | 2009-03-12 | Chugoku Electric Power Co Inc:The | 機器管理装置、機器管理方法および機器管理プログラム |
| US20100043062A1 (en) * | 2007-09-17 | 2010-02-18 | Samuel Wayne Alexander | Methods and Systems for Management of Image-Based Password Accounts |
| US20090076904A1 (en) * | 2007-09-17 | 2009-03-19 | Frank David Serena | Embedding digital values for digital exchange |
| US20090094455A1 (en) * | 2007-10-09 | 2009-04-09 | Microsoft Corporation | Frequency Managed Performance |
| US20090125517A1 (en) * | 2007-11-14 | 2009-05-14 | Qualcomm Incorporated | Method and system for keyword correlation in a mobile environment |
| US9391789B2 (en) | 2007-12-14 | 2016-07-12 | Qualcomm Incorporated | Method and system for multi-level distribution information cache management in a mobile environment |
| US8510661B2 (en) * | 2008-02-11 | 2013-08-13 | Goldspot Media | End to end response enabling collection and use of customer viewing preferences statistics |
| US8701051B2 (en) * | 2008-02-11 | 2014-04-15 | Goldspot Media, Inc. | Hot spot use in advertising |
| US9189794B2 (en) * | 2008-02-11 | 2015-11-17 | Goldspot Media, Inc. | Method and apparatus for maximizing brand exposure in a minimal mobile display |
| US20090240578A1 (en) * | 2008-03-18 | 2009-09-24 | Christopher James Lee | Methods and systems for graphical security authentication and advertising |
| US8621578B1 (en) | 2008-12-10 | 2013-12-31 | Confident Technologies, Inc. | Methods and systems for protecting website forms from automated access |
| US20100212021A1 (en) * | 2009-02-18 | 2010-08-19 | Harris Technology, Llc | Decrement software |
| US8036990B1 (en) * | 2009-04-28 | 2011-10-11 | GumGum, Inc. | Systems and methods for electronically managing content licenses |
| JP5103441B2 (ja) * | 2009-05-26 | 2012-12-19 | 株式会社エヌ・ティ・ティ・データ | 料金管理装置、料金管理システムおよび料金管理方法 |
| US20100319049A1 (en) * | 2009-06-10 | 2010-12-16 | Microsoft Corporation | Trusted agent for advertisement protection |
| US20110010243A1 (en) * | 2009-07-10 | 2011-01-13 | Microsoft Corporation | User control of advertising content |
| US20110010433A1 (en) * | 2009-07-10 | 2011-01-13 | Microsoft Corporation | Targeted presentation and delivery of themes |
| GB2473196B (en) * | 2009-09-02 | 2012-01-04 | 1E Ltd | Monitoring the performance of and controlling a computer |
| GB2473194A (en) * | 2009-09-02 | 2011-03-09 | 1E Ltd | Monitoring the performance of a computer based on the value of a net useful activity metric |
| US9167312B2 (en) * | 2009-11-24 | 2015-10-20 | Verizon Patent And Licensing Inc. | Pause-based advertising methods and systems |
| GB2483932A (en) * | 2010-09-27 | 2012-03-28 | Buy As You View Ltd | System and method for controlling a device based upon usage and payments |
| CN102780810B (zh) * | 2011-05-13 | 2014-09-10 | 英华达(南京)科技有限公司 | 全球卫星定位系统服务申请方法 |
| US9300814B2 (en) * | 2011-09-12 | 2016-03-29 | Microsoft Technology Licensing Llc | Network adaptive content download |
| US10121138B2 (en) | 2013-01-03 | 2018-11-06 | International Business Machines Corporation | Correctable pre-payment for database services |
| US10223294B2 (en) * | 2015-09-01 | 2019-03-05 | Nxp Usa, Inc. | Fast secure boot from embedded flash memory |
| US9996279B2 (en) | 2015-12-18 | 2018-06-12 | Intel Corporation | Integrity protection for system management mode |
| JP6548599B2 (ja) * | 2016-03-17 | 2019-07-24 | Kddi株式会社 | 通信データ量管理システム、カード管理サーバ、データ量付与管理サーバ、データ残量管理サーバ、方法、及びプログラム |
| US10893113B2 (en) | 2016-06-06 | 2021-01-12 | International Business Machines Corporation | Generating push notifications |
| US10489826B2 (en) | 2016-12-27 | 2019-11-26 | Rovi Guides, Inc. | Systems and methods for submitting user selected profile information to an advertiser |
| IT202000030989A1 (it) | 2020-12-16 | 2022-06-16 | Univ Degli Studi Di Brescia | Metodi, tecniche e strumenti hardware e software per il monitoraggio dell'attività di utenti al videoterminale (vdt) |
Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5768382A (en) * | 1995-11-22 | 1998-06-16 | Walker Asset Management Limited Partnership | Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols |
| US5825883A (en) * | 1995-10-31 | 1998-10-20 | Interval Systems, Inc. | Method and apparatus that accounts for usage of digital applications |
| US6253224B1 (en) * | 1998-03-24 | 2001-06-26 | International Business Machines Corporation | Method and system for providing a hardware machine function in a protected virtual machine |
| US20020184508A1 (en) * | 1999-03-08 | 2002-12-05 | Bialick William P. | Method and system for enforcing access to a computing resource using a licensing attribute certificate |
| US20030028454A1 (en) * | 2001-08-01 | 2003-02-06 | Masahiro Ooho | Device and method for managing content usage right |
| US20040054908A1 (en) * | 2002-08-30 | 2004-03-18 | Edgar Circenis | Tamper-evident data management |
| US6816809B2 (en) * | 2002-07-23 | 2004-11-09 | Hewlett-Packard Development Company, L.P. | Hardware based utilization metering |
| US20060106920A1 (en) * | 2004-11-15 | 2006-05-18 | Microsoft Corporation | Method and apparatus for dynamically activating/deactivating an operating system |
| US7143297B2 (en) * | 2000-08-24 | 2006-11-28 | Wibu-Systems, Ag | Procedure for the protection of computer software and/or computer-readable data as well as protective equipment |
| US7395245B2 (en) * | 2001-06-07 | 2008-07-01 | Matsushita Electric Industrial Co., Ltd. | Content usage management system and server used in the system |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JPH09251494A (ja) * | 1996-03-18 | 1997-09-22 | U Card:Kk | 仮想プリペイドカードによる決済システム |
| JPH1091556A (ja) * | 1996-09-11 | 1998-04-10 | Nri & Ncc Co Ltd | ソフトウェア、データベース、コンピュータの利用情報取得方法 |
| US6442529B1 (en) * | 1998-11-17 | 2002-08-27 | Novaweb Technologies, Inc. | Methods and apparatus for delivering targeted information and advertising over the internet |
| WO2001065368A2 (en) * | 2000-03-01 | 2001-09-07 | Tashenberg Bradley A | A distributed operating network and method for using and implementing same |
| JP2001338233A (ja) * | 2000-03-24 | 2001-12-07 | Sony Corp | 電子機器、使用時間による課金システムおよび方法、課金処理装置、記録媒体、プリペイドカード |
| AUPQ736200A0 (en) * | 2000-05-08 | 2000-06-01 | Canon Kabushiki Kaisha | Information appliance cost subsidy |
| JP3527211B2 (ja) * | 2000-08-01 | 2004-05-17 | 日立マクセル株式会社 | 電子クーポン・システム |
| JP2002251478A (ja) * | 2001-02-22 | 2002-09-06 | Hitachi Ltd | 電子モールシステム |
| US20030027549A1 (en) * | 2001-07-30 | 2003-02-06 | Msafe Inc. | Prepaid communication system and method |
| US8271400B2 (en) * | 2002-01-15 | 2012-09-18 | Hewlett-Packard Development Company, L.P. | Hardware pay-per-use |
| JP2003242415A (ja) * | 2002-02-18 | 2003-08-29 | Dainippon Printing Co Ltd | ソフトウェア課金管理システムおよび方法 |
| US20030172376A1 (en) * | 2002-03-11 | 2003-09-11 | Microsoft Corporation | User controlled targeted advertisement placement for receiver modules |
-
2004
- 2004-12-08 US US11/006,837 patent/US20060165005A1/en not_active Abandoned
-
2005
- 2005-03-08 US US11/074,558 patent/US7421413B2/en not_active Expired - Fee Related
- 2005-06-10 US US11/150,001 patent/US20060168664A1/en not_active Abandoned
- 2005-11-11 AU AU2005232307A patent/AU2005232307A1/en not_active Abandoned
- 2005-11-12 RU RU2007117916/09A patent/RU2007117916A/ru not_active Application Discontinuation
- 2005-11-12 JP JP2007541361A patent/JP2008521093A/ja active Pending
- 2005-11-12 RU RU2007117897/09A patent/RU2007117897A/ru not_active Application Discontinuation
- 2005-11-12 BR BRPI0518003-1A patent/BRPI0518003A/pt not_active IP Right Cessation
- 2005-11-12 MX MX2007005657A patent/MX2007005657A/es active IP Right Grant
- 2005-11-14 EP EP05110697A patent/EP1659530A1/en not_active Withdrawn
- 2005-11-14 TW TW094139942A patent/TW200634584A/zh unknown
- 2005-11-14 CA CA002526588A patent/CA2526588A1/en not_active Abandoned
- 2005-11-14 RU RU2005135424/09A patent/RU2005135424A/ru not_active Application Discontinuation
- 2005-11-14 BR BRPI0504855-9A patent/BRPI0504855A/pt not_active IP Right Cessation
- 2005-11-15 JP JP2005330496A patent/JP2006190254A/ja active Pending
- 2005-11-15 KR KR1020050109213A patent/KR20060054164A/ko not_active Ceased
Patent Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5825883A (en) * | 1995-10-31 | 1998-10-20 | Interval Systems, Inc. | Method and apparatus that accounts for usage of digital applications |
| US5768382A (en) * | 1995-11-22 | 1998-06-16 | Walker Asset Management Limited Partnership | Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols |
| US6253224B1 (en) * | 1998-03-24 | 2001-06-26 | International Business Machines Corporation | Method and system for providing a hardware machine function in a protected virtual machine |
| US20020184508A1 (en) * | 1999-03-08 | 2002-12-05 | Bialick William P. | Method and system for enforcing access to a computing resource using a licensing attribute certificate |
| US7143297B2 (en) * | 2000-08-24 | 2006-11-28 | Wibu-Systems, Ag | Procedure for the protection of computer software and/or computer-readable data as well as protective equipment |
| US7395245B2 (en) * | 2001-06-07 | 2008-07-01 | Matsushita Electric Industrial Co., Ltd. | Content usage management system and server used in the system |
| US20030028454A1 (en) * | 2001-08-01 | 2003-02-06 | Masahiro Ooho | Device and method for managing content usage right |
| US6816809B2 (en) * | 2002-07-23 | 2004-11-09 | Hewlett-Packard Development Company, L.P. | Hardware based utilization metering |
| US20040054908A1 (en) * | 2002-08-30 | 2004-03-18 | Edgar Circenis | Tamper-evident data management |
| US20060106920A1 (en) * | 2004-11-15 | 2006-05-18 | Microsoft Corporation | Method and apparatus for dynamically activating/deactivating an operating system |
Cited By (36)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8719171B2 (en) | 2003-02-25 | 2014-05-06 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
| US8700535B2 (en) | 2003-02-25 | 2014-04-15 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
| US9336359B2 (en) | 2004-10-18 | 2016-05-10 | Microsoft Technology Licensing, Llc | Device certificate individualization |
| US8347078B2 (en) | 2004-10-18 | 2013-01-01 | Microsoft Corporation | Device certificate individualization |
| US8464348B2 (en) | 2004-11-15 | 2013-06-11 | Microsoft Corporation | Isolated computing environment anchored into CPU and motherboard |
| US8336085B2 (en) | 2004-11-15 | 2012-12-18 | Microsoft Corporation | Tuning product policy using observed evidence of customer behavior |
| US9224168B2 (en) | 2004-11-15 | 2015-12-29 | Microsoft Technology Licensing, Llc | Tuning product policy using observed evidence of customer behavior |
| US8176564B2 (en) | 2004-11-15 | 2012-05-08 | Microsoft Corporation | Special PC mode entered upon detection of undesired state |
| US8725646B2 (en) | 2005-04-15 | 2014-05-13 | Microsoft Corporation | Output protection levels |
| US9189605B2 (en) | 2005-04-22 | 2015-11-17 | Microsoft Technology Licensing, Llc | Protected computing environment |
| US9436804B2 (en) | 2005-04-22 | 2016-09-06 | Microsoft Technology Licensing, Llc | Establishing a unique session key using a hardware functionality scan |
| US9363481B2 (en) | 2005-04-22 | 2016-06-07 | Microsoft Technology Licensing, Llc | Protected media pipeline |
| US20070058807A1 (en) * | 2005-04-22 | 2007-03-15 | Microsoft Corporation | Establishing a unique session key using a hardware functionality scan |
| US8438645B2 (en) | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
| US8781969B2 (en) | 2005-05-20 | 2014-07-15 | Microsoft Corporation | Extensible media rights |
| US8353046B2 (en) | 2005-06-08 | 2013-01-08 | Microsoft Corporation | System and method for delivery of a modular operating system |
| US7669048B2 (en) * | 2005-12-09 | 2010-02-23 | Microsoft Corporation | Computing device limiting mechanism |
| US20070136570A1 (en) * | 2005-12-09 | 2007-06-14 | Microsoft Corporation | Computing device limiting mechanism |
| US20080077420A1 (en) * | 2006-09-27 | 2008-03-27 | Daryl Cromer | System and Method for Securely Updating Remaining Time or Subscription Data for a Rental Computer |
| US20080147555A1 (en) * | 2006-12-18 | 2008-06-19 | Daryl Carvis Cromer | System and Method for Using a Hypervisor to Control Access to a Rental Computer |
| US20080184283A1 (en) * | 2007-01-29 | 2008-07-31 | Microsoft Corporation | Remote Console for Central Administration of Usage Credit |
| US20080183712A1 (en) * | 2007-01-29 | 2008-07-31 | Westerinen William J | Capacity on Demand Computer Resources |
| US8583564B2 (en) | 2007-03-26 | 2013-11-12 | Microsoft Corporation | Differential pricing based on social network standing |
| US20080243628A1 (en) * | 2007-03-26 | 2008-10-02 | Microsoft Corporation | Differential pricing based on social network standing |
| US20080250250A1 (en) * | 2007-04-04 | 2008-10-09 | Microsoft Corporation | Method and Apparatus for Using USB Flash Devices and Other Portable Storage as a Means to Access Prepaid Computing |
| US20090132308A1 (en) * | 2007-11-20 | 2009-05-21 | Microsoft Corporation | Solution for Managed Personal Computing |
| US8948729B2 (en) * | 2008-03-04 | 2015-02-03 | Mitchell D. Adler | Secure device configuration profiles |
| US20130035065A1 (en) * | 2008-03-04 | 2013-02-07 | Adler Mitchell D | Secure device configuration profiles |
| US20110029348A1 (en) * | 2008-03-31 | 2011-02-03 | Saffre Fabrice T P | Scheduling usage or provision of resources |
| US9679339B2 (en) * | 2008-03-31 | 2017-06-13 | British Telecommunications Public Limited Company | Scheduling usage or provision of resources |
| US8984653B2 (en) | 2008-04-03 | 2015-03-17 | Microsoft Technology Licensing, Llc | Client controlled lock for electronic devices |
| US20090254995A1 (en) * | 2008-04-03 | 2009-10-08 | Microsoft Corporation | Client controlled lock for electronic devices |
| US20100005532A1 (en) * | 2008-07-04 | 2010-01-07 | Koninklijke Kpn N.V. | Software Usage Controlled by CPU Utilization |
| US8930266B2 (en) | 2010-05-24 | 2015-01-06 | Simpa Networks, Inc. | Techniques for progressive purchasing |
| EP2506181A1 (en) * | 2011-03-28 | 2012-10-03 | Alcatel Lucent | A method, a system, a device, a computer program and a computer program product for managing remote devices |
| US9756031B1 (en) * | 2011-12-21 | 2017-09-05 | Amazon Technologies, Inc. | Portable access to auditing information |
Also Published As
| Publication number | Publication date |
|---|---|
| CA2526588A1 (en) | 2006-05-15 |
| BRPI0518003A (pt) | 2008-10-21 |
| AU2005232307A1 (en) | 2006-06-01 |
| KR20060054164A (ko) | 2006-05-22 |
| JP2008521093A (ja) | 2008-06-19 |
| RU2005135424A (ru) | 2007-05-27 |
| TW200634584A (en) | 2006-10-01 |
| JP2006190254A (ja) | 2006-07-20 |
| MX2007005657A (es) | 2007-07-24 |
| US7421413B2 (en) | 2008-09-02 |
| EP1659530A1 (en) | 2006-05-24 |
| US20060168664A1 (en) | 2006-07-27 |
| RU2007117916A (ru) | 2008-11-20 |
| BRPI0504855A (pt) | 2006-06-27 |
| US20060105739A1 (en) | 2006-05-18 |
| RU2007117897A (ru) | 2008-11-20 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20060165005A1 (en) | Business method for pay-as-you-go computer and dynamic differential pricing | |
| US20060106845A1 (en) | System and method for computer-based local generic commerce and management of stored value | |
| CN1783138A (zh) | 用于随付随用的计算机以及动态微分定价的方法 | |
| CA2418050C (en) | Linking public key of device to information during manufacture | |
| CA2709327C (en) | System and method for controlling features on a device | |
| US6330549B1 (en) | Protected shareware | |
| US7770205B2 (en) | Binding a device to a computer | |
| JP2000222488A (ja) | 選択的補償条項付証明メータ | |
| CN101385041A (zh) | 计算机主存多安全执行环境 | |
| CN101248428A (zh) | 根据许可证改变产品行为 | |
| CN101595500A (zh) | 分解的安全执行环境 | |
| US8073442B2 (en) | Binding a device to a provider | |
| Bar-El | Intra-vehicle information security framework | |
| MXPA05012285A (es) | Metodo para pago al ir en computadora y dinamico | |
| AU2008203525B2 (en) | Linking public key of device to information during manufacturing | |
| EP1815640A2 (en) | Delicate metering of computer usage | |
| US20090094455A1 (en) | Frequency Managed Performance |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: MICROSOFT CORPORATION, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FRANK, ALEXANDER;STEEB, CURT ANDREW;EDELSTEIN, DAVID B.;AND OTHERS;REEL/FRAME:016071/0089;SIGNING DATES FROM 20041130 TO 20041202 |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
| AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034766/0001 Effective date: 20141014 |