TWI267753B - System and method for licensing software - Google Patents

System and method for licensing software Download PDF

Info

Publication number
TWI267753B
TWI267753B TW93125155A TW93125155A TWI267753B TW I267753 B TWI267753 B TW I267753B TW 93125155 A TW93125155 A TW 93125155A TW 93125155 A TW93125155 A TW 93125155A TW I267753 B TWI267753 B TW I267753B
Authority
TW
Taiwan
Prior art keywords
software
technology
party
registration
user
Prior art date
Application number
TW93125155A
Other languages
Chinese (zh)
Other versions
TW200608227A (en
Inventor
Michael Francis Demeyer
Original Assignee
Cyberlink Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cyberlink Corp filed Critical Cyberlink Corp
Priority to TW93125155A priority Critical patent/TWI267753B/en
Publication of TW200608227A publication Critical patent/TW200608227A/en
Application granted granted Critical
Publication of TWI267753B publication Critical patent/TWI267753B/en

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

A system and method for licensing software using a clearinghouse to license only the technology modules that an end user registers are disclosed. The clearinghouse maintains registration information which can be used to bill a software provider for the technology licensed to the end user. The system can be used to compensate technology owners only after the end user registers an unlicensed technology module. Thus, the system and method allows software vendors to reduce costs by licensing only the technologies that an end user actually uses. The clearinghouse can also be used to track the usage of software functionality to determine the popularity of a particular technology.

Description

1267753 九、發明說明: 【發明所屬之技術領域】 軟體統與方法;特別是—種有關於 體授權I:與;法。所需要時而取得特定技術模組授權的軟 【先前技術】 體套=腦=售?常包含一些已經預先安裝於電腦的隨附軟 的S〇ftWare PackageS)。同樣地,電腦週邊設備 =販售也包含隨附軟體套件,其可使用在週邊媒介如DVD機、光 碟機、軟碟機及其他已知的儲存裝置。或者,個人電腦及週邊設 備所使用的軟體可以經由網際網路從遠端伺服器來下載。這些軟 體套件通常提供給購買個人電腦及週邊設備的使用者來使用其功1267753 IX. Description of the invention: [Technical field to which the invention belongs] Software system and method; in particular, the type of body authorization I: and; Software that requires authorization from a specific technology module when needed [Prior Art] Body Set = Brain = Sale? Often included are some of the soft S〇ftWare Packages) that have been pre-installed on your computer. Similarly, computer peripherals = sold also include the included software package, which can be used in peripheral media such as DVD players, CD players, floppy disks, and other known storage devices. Alternatively, the software used by the PC and peripherals can be downloaded from a remote server via the Internet. These software kits are usually provided to users who purchase PCs and peripherals to use their work.

能。舉例來說,DVD機的販售通常會隨機附有可播放、記錄DVD 電影或資料的軟體。同樣地,掃描機通常會隨機附有用來擷取、 觀看已掃瞄的影像、操控影像、提供光學文字辨識(optical character recognition,OCR)之軟體;或者附有用來讓同一台 個人電腦所共享的掃描機、印表機可以當作影印機來使用之軟 體。此外,個人電腦的販售通常會隨機附有已安裝的防毒軟體、 觀看數位影像的工具軟體、影片編輯軟體、或者是作業系統。can. For example, DVD players are usually sold with software that can play and record DVD movies or materials. Similarly, scanners are usually equipped with software for capturing, viewing scanned images, manipulating images, providing optical character recognition (OCR), or with the same personal computer. Scanners and printers can be used as software for photocopiers. In addition, personal computer sales are usually accompanied by installed anti-virus software, software for viewing digital images, movie editing software, or operating systems.

這些隨附的軟體產品通常包含一些需要付版稅給技術持有者 (technology holders)才能執行的功能。此一使用在單一軟體 產品的技術,可能係由一個或多個技術持有者軟體開發、授權。 軟體供應商通常在開始軟體販售給使用者之前,必須先取得每一 個技術持有者智慧財產權的授權。授權通常係涵蓋每一份販售的 軟體。此授權的費用包含於軟體產品的成本中,並且轉嫁至使用 者上。在播放商業DVD電影的播放軟體的例子中,此軟體通常會 包含一與技術授權(播放特定内容的需求時)有關的軟體所需授 權費用。而此軟體授權費用會轉嫁至使用者上,且反映在播放軟 體或硬體(包含隨附軟體)的售價上。舉例來說,由杜比實驗室 所提供的杜比數位音效解碼技術即為一授權使用例子。具體地 說,杜比音效技術的授權係DVD電影播放軟體中,用來做為DVD 1267753 電影(内含此音效技術)的解碼。 然而,播放DVD時實際需要杜比解碼技術的使用者比例並非 百分之百,因為有些使用者只是用來播放個人的影片内容,而另 外有些使用者則是僅利用DVD機來做為資料儲存裝置,或其他電 腦用途。而且,有些使用者可能根本沒使用DVD機。上述所提及 的杜比音效解碼技術,此項技術在播放商業DVD電影時需要用到; 然而,在觀看大型圖書館館藏的DVD電影時,因其不使用杜比音 效技術,故不需要用到此解碼技術。對於這些使用者來說,這項 技術授權費用將徒增花費。 如第一 A圖所示,在先前技術的授權系統中,提供一使用者 10與軟體供應商20之間的互動。在第一個例子中,軟體供應商 20直接提供一軟體產品11給使用者10,以交換相對的報酬。在 此例中,與技術(例如,杜比音效解碼技術)有關的授權費用在 每一套軟體的販售,會由軟體供應商20付費給技術持有者30, 不考慮此授權技術使用者10實際的使用狀況。而是,技術持有 者30予以每一套軟體供應商20所販售軟體產品此技術的授權。 以DVD機隨附軟體的例子來說,如第一 B圖所示,在先前技 術的授權系統中,提供一使用者10、硬體供應商40、軟體供應 商20、技術持有者30之間隨附軟體的授權。軟體供應商20提供 給硬體供應商40 —無任何功能限制的軟體授權,以交換報酬。 使用者10則是獲得硬體供應商40所提供的包含於個人電腦或電 腦週邊產品中的隨附軟體12授權使用。在目前技術的授權系統 中,與技術(例如,杜比音效解碼)有關的授權費用在每一套軟 體的販售,會由軟體供應商20 (且/或硬體供應商40)提供給 技術持有者30,而不考慮此授權技術使用者10實際的使用狀況。 由於軟體產品中特定技術的使用狀況通常並不會被追蹤,於是, 特定技術的授權將會被要求於每一内含此技術的隨附軟體12銷 售上。因此,此技術的授權費用(硬體或軟體供應商20)跟實際 所需(使用者10)並不一致,此種狀況對於使用者10以及軟體 供應商20皆不利。對於使用者10來說,如果沒有使用到特定技 術,那麼授權費用就等於白費了;而對於軟體供應商20來說, 很高的授權費用限制住市場佔有率,其不是降低產品獲利率,就 1267753 是在售價上將費用轉嫁至使用者ίο上。 因此,開發一軟體授權系統與方法對於產業界來說是非常需 要的,用以滿足上述所提及的缺點及不適當處。 【發明内容】 本發明乃廣泛地針對一新穎的系統與方法,其反映使用者在 軟體使用上的需求或啟用功能,並引致兩公司之間(例如:一硬 體供應商與一軟體供應商間、一軟體供應商與一技術持有者間、 或一硬體供應商與一技術持有者間)付款或帳務往來。 依據本發明的一具體實施例,係提供在一電腦硬體平台中軟 體授權的方法,且該軟體至少包含一項限制使用的功能。此方法 包括一步驟:傳遞一使用者啟用需求至註冊資料交換中心,其為 了啟用必須通過註冊後才能使用的功能。此方法也包括與該技術 有關的註冊資訊,將之編譯在註冊資料庫且儲存於註冊資料交換 中心。並且,此方法也包括接收一訊息,其可以用來解除軟體特 定功能的使用限制。最後,此技術的實際使用狀況則是根據在註 冊資料庫中的註冊資訊來決定。 根據上述過程更進一步的增強功能,軟體開發工程師可以依 照註冊資料庫中所編譯的註冊資訊來付費給技術持有者。 因此,本發明的目的之一係藉由僅當每一套軟體實際使用此 技術時,支付技術授權費用,用以減少公司(如:個人電腦製造 商或DVD機製造商)在隨附軟體上的成本。 本發明的另一個目的係在僅當每一套軟體實際使用此技術 時,支付給技術持有者授權費用,並提供此技術在市場使用狀況 清楚的認識與憑證。 本發明的另一個目的係在替使用者降低產品價格,其得益於 公司隨附軟體所降低的成本,並提供一便捷的途徑以得知使用者 所需的技術需求。 1267753 本發明的另一個目的係可以讓軟體供應商傳達更多的價值給 那些供應隨附軟體的公司,以及提供與使用者之間更多直接互動 的機會。 【實施方式】These accompanying software products typically contain features that require royalties to be executed by technology holders. This technology, which is used in a single software product, may be developed and licensed by one or more technology holder software. Software vendors usually have to obtain authorization from each technology holder's intellectual property rights before they can begin selling software to users. Authorization usually covers every software sold. The cost of this license is included in the cost of the software product and is passed on to the user. In the example of playing a commercial DVD movie playback software, the software typically includes a license fee for the software associated with the technology license (when the specific content is played). The software license fee is passed on to the user and is reflected in the price of the playback software or hardware (including the included software). For example, the Dolby Digital Audio Decoding Technology provided by Dolby Laboratories is an example of an authorized use. Specifically, the license for Dolby sound technology is used in DVD movie playback software as a decoding for DVD 1267753 movies (with this sound technology). However, the proportion of users who actually need Dolby decoding technology when playing DVDs is not 100%, because some users only use to play personal video content, while others use DVD players as data storage devices, or Other computer uses. Moreover, some users may not use a DVD player at all. The Dolby audio decoding technology mentioned above, this technology is needed for playing commercial DVD movies; however, when watching DVD movies in large library collections, it does not need to use Dolby sound technology. This is the decoding technology. For these users, this technology licensing fee will be increased. As shown in FIG. A, in the prior art authorization system, an interaction between a user 10 and a software provider 20 is provided. In the first example, the software vendor 20 provides a software product 11 directly to the user 10 to exchange relative rewards. In this example, the license fee associated with the technology (eg, Dolby Audio Decoding Technology) will be paid by the software vendor 20 to the technology holder 30 for sale in each software package, regardless of the authorized technology user. 10 actual use conditions. Instead, the technology holder 30 authorizes each of the software vendors 20 to sell the software for this technology. In the example of the software that comes with the DVD player, as shown in FIG. B, in the prior art authorization system, a user 10, a hardware supplier 40, a software supplier 20, and a technology holder 30 are provided. Authorization for the software included. The software vendor 20 provides the hardware vendor 40 - a software license without any functional restrictions to exchange rewards. The user 10 is authorized to use the accompanying software 12 included in the personal computer or computer peripheral product provided by the hardware supplier 40. In current technology licensing systems, licensing fees associated with technology (eg, Dolby Audio Decoding) are sold to each vendor via software vendor 20 (and/or hardware vendor 40). Holder 30, regardless of the actual usage of this authorized technology user 10. Since the use of specific technologies in software products is not normally tracked, the license for a particular technology will be required to be sold on each accompanying software 12 that contains this technology. Therefore, the licensing fee (hardware or software supplier 20) of this technology is not consistent with the actual needs (user 10), which is disadvantageous for both the user 10 and the software vendor 20. For the user 10, if no specific technology is used, the license fee is in vain; for the software provider 20, the high license fee limits the market share, which is not to lower the product profit rate. In the case of 1267753, the cost is passed on to the user ίο. Therefore, the development of a software authorization system and method is very necessary for the industry to meet the above mentioned shortcomings and inadequacies. SUMMARY OF THE INVENTION The present invention is broadly directed to a novel system and method that reflects a user's need for or use of software in use and results in a relationship between two companies (eg, a hardware supplier and a software vendor) Payment or accounting transactions between a software supplier and a technology holder, or between a hardware supplier and a technology holder. In accordance with an embodiment of the present invention, a method of software authorization in a computer hardware platform is provided, and the software includes at least one function that restricts usage. The method includes a step of passing a user enabled request to the registration clearinghouse to enable the function that must be registered before it can be used. This method also includes registration information related to the technology, compiled in the registration database and stored in the registration data exchange. Moreover, the method also includes receiving a message that can be used to relieve usage restrictions for the particular function of the software. Finally, the actual use of this technology is based on the registration information in the registration database. Based on the further enhancements described above, the software development engineer can pay the technology holder in accordance with the registration information compiled in the registration database. Accordingly, one of the objects of the present invention is to reduce the company's (eg, a PC manufacturer or a DVD player manufacturer) on the accompanying software by simply paying the technology license fee when the software is actually used by each set of software. the cost of. Another object of the present invention is to pay the technology holder an authorization fee only when each set of software actually uses the technology, and to provide a clear understanding and credentials of the technology in the market. Another object of the present invention is to reduce the price of the product for the user, which benefits from the reduced cost of the company's accompanying software and provides a convenient way to know the technical needs of the user. 1267753 Another object of the present invention is to enable software vendors to convey more value to companies that supply the accompanying software and to provide more direct interaction with the user. [Embodiment]

第二A至第二E圖描述一上述所提到的有效率軟體授權系統 中許多具體實施例的總覽。依照此系統更寬廣的觀點,第二A圖 描述一軟體授權系統中第一具體實施例,其包括第一方(通常係 使用者160)、第二方(通常係軟體供應商150)以及一技術持有 者120。在此系統中,第二方150支付給技術持有者12〇授權使 用每一軟體產品110的費用,其包括技術持有者120所擁有技術 的費用。第一方160取得軟體產品110,其為完整授權的軟體, 也包含了未註冊的軟體功能。因此,不是第一方160也不是第二 方150需要提供其所使用軟體功能的費用給技術持有者ι2〇。然 而,儘管該功能被授權使用,其他特定的軟體功能仍無法使用了 除非弟一方16 0向第二方15 0申請註冊該功能。在接收到註冊申 請後,第二方15 0記錄該註冊資訊,並且藉由傳送一解除機制 (relieving mechanism)至第一方160啟用新註冊的軟體。現 在,第二方150可以使用由第一方16〇所獲得的註冊資訊,用以 決定軟體產品110中的何項功能最常被使用。第二方丨、5〇可以因 此而做決策,將來在軟體發行新版本時會包括何種功能。The second through second E diagrams depict an overview of many of the specific embodiments of the above mentioned efficient software authorization system. In accordance with a broader aspect of the system, FIG. 2A depicts a first embodiment of a software authorization system including a first party (typically user 160), a second party (typically a software vendor 150), and a Technology holder 120. In this system, the second party 150 pays the technology holder 12 the cost of authorizing each software product 110, including the cost of the technology owned by the technology holder 120. The first party 160 obtains the software product 110, which is a fully licensed software and also includes unregistered software functions. Therefore, it is not the first party 160 nor the second party 150 that needs to provide the cost of the software functions it uses to the technology holder. However, although this feature is licensed for use, other specific software features are not available unless the younger party 16 0 applies to the second party 15 0 to register the feature. Upon receipt of the registration application, the second party 150 records the registration information and enables the newly registered software by transmitting a relieving mechanism to the first party 160. Now, the second party 150 can use the registration information obtained by the first party 16〇 to determine which function in the software product 110 is most commonly used. The second party, 5〇, can therefore make decisions about what features will be included in the future when the software releases a new version.

第二B圖描述一第二具體實施例更寬廣的觀點,其中第三 /通吊疋硬體供應商170)提供包含部分功能限制的隨附軟 第一方160。隨附軟體係由第二方15〇所製造,且該軟體 丨 要由第四方(通常是技術持有者12〇)授權才能使用 :方160向第二方150提出一未註冊功能的註冊申請。在I : 注=申請後,第二方15G記錄該註冊資訊且藉由傳送—解: 至弟一方160啟用新註冊的軟體。最後,第二方15〇 方120實際上授權第一方160使用的技術。相較於第苐 二B圖的系統付費給第四方12〇,僅當 f 方120所持有的技術。 第二C圖描述一第三具體實施例更寬廣的觀點,其中第三方 11 1267753 f功能限制的隨附軟體產⑤iig給第—方⑽。 由第二方150所製造’且該軟體產品110包 idi: 授權使用的技術。第—方160向第二方150 功能Γ主冊中請。在接收到註冊中請後,第二方⑽ 貝訊且藉由傳送一解除機制至第-方160啟用新註冊 使用的技術。最後,第三方170付費給第 一方⑽所使㈣技術。 π⑽貫際上权權弟 17Π I二ϋ1描述一第四具體實施例更寬廣的觀點,其中第三方 110 160°The second B diagram depicts a broader view of a second embodiment in which the third/pass-up hardware vendor 170) provides an accompanying soft first party 160 that includes partial functional limitations. The accompanying soft system is manufactured by the second party, and the software is authorized by the fourth party (usually the technology holder 12〇): the party 160 submits an unregistered function registration to the second party 150. Application. After the I: Note = application, the second party 15G records the registration information and transmits the solution - the solution: the young party 160 enables the newly registered software. Finally, the second party 15 is actually authorizing the technology used by the first party 160. Compared to the system of Figure 2B, the system pays to the fourth party, only the technology held by the f-party 120. The second C diagram depicts a broader view of a third embodiment in which the third party 11 1267753 f functionally restricted accompanying software product 5iig is given to the first party (10). Manufactured by the second party 150' and the software product 110 includes idi: a technology authorized for use. The first-party 160 to the second party 150 function Γ main volume please. After receiving the registration, the second party (10) and the technology to enable the new registration by transmitting a release mechanism to the first party 160. Finally, the third party 170 pays the technology of the first party (10). π(10) on the right authority 17ΠI II describes a broader view of a fourth embodiment, where the third party 110 160°

Ik附軟體產口口 110係由苐二方15〇所製造, 口 t需要由第四方12〇授權使用的技術。第 提出一未註冊功能的註冊申請。在接收到註冊申請後,第•方150 160 的軟體取後,弟二方170付費給第四方i2〇實際上沪趨黛一方 1 方6:用的技術。因此,第四方12。可以傳送一授權“給第三 2描述一第五具體實施㈣寬廣的觀點,其中第三方 170 k供包含部分功能限制的隨附軟體產 ,軟體產品no係、由第二方15。所製造,=軟1方6〇; 含需要由第四方·授權使用的技術。第一方 =註=訊除機产第心 160 € ^ L $;1,1;0 ^ Τ2ί ;!χ 方170。 乃iZU可以傳送一授權使用給第三 值得注意的是,上述的各具體實施例之間有著 ί 設 统 送軟體?哪一方追縱註冊資訊?子哪(,=^ 12 1267753 匕★Γ义方付費給技術持有者?以上這些係可以被互換的,且仍 發明,範圍内。這個觀念使得先前技術獲致一改善,其依 用二f在母一軟體的販售而支付給技術持有者一完整授權的費 =。除此以外,此系統跟先前技術有所區別處在於, 去 支付額外魏的授權_。 U便用f 首券第弋1描1如一第二A至第二E圖中之系統更寬廣的觀點。 供了部分功能限制的受保護軟體給第一方(步驟200 )。 ί2f —方可以是接收到電腦系統中隨附軟體的使用者。 f匕中,第一方希望能使用受保護軟體中的部分限制功能。 Ϊ要註冊,例如DVD機播放程式中的杜比音效解碼技 ΐ2 ^在步驟220 亥軟體決定使用該功能是否需要註冊。 作即註冊(狀況即為否),使用者不需要額外的動 t疋,軟體需要向第二方或第三方註冊(步驟24〇)。 二t 1弟二方或第三方可以是硬體供應商或軟體供應商。在 250中,該軟體決定是否需要支付新註冊功能的額外費用。 ίί不ί要支付這筆f用(狀況即為否),係如同第:A圖中的 成第,一方可以執行新註冊軟體(步驟230 )。如果需要支付這 聿費用(狀況即為是),那麼註冊就會啟動而由第二方戋第三方 付費給第四方(如步驟270及280)。舉例來說,硬體或軟體&廡 商可能會因該註冊技術而付費給技術持有者。除此之外,該^冊 Ιΐϊ動而由第三方付費給第二方(步驟26G)。舉例來說了硬體 供應商可能因該註冊技術而付費給軟體供應商。此技蓺中一 ,,巧係因應履行狀況而定,實際上可以稍後再支付‘用,即^ 疋第一方立即經授權執行該軟體。 、 一更為具體的例子如第二B圖所示,該系統允許軟體供商 授權由電腦系統100提供的軟體’或者是電腦週邊的G附J =在於使用者16G所需的特定技術。舉例來說,為了要減低授 權費用的成本,DVD播放軟體可以由硬體供應商提供部分功能限 :的軟體給使用者160,特別是排除那些跟授權費用有% : 技術。當使用者160需要使用某些功能時,可以由軟 際網路或-些其他電子、實體的機制來下 術。當使用者160首次試圖去播放商業DVD,或是使用者任g時 13 1267753 候的需求,如此便會自動發生。 抑當使用<者_ 16〇,要一必需的技術時,他將驗證自己當做此技 術單一及授權的接受者至提供技術啟用服務的電腦(在這個例子 係指DVD軟體供應商)。關於此有許多可行的機制,包括序號 (serial number)的使用(剛開始購買時提供),或者一些單一 驗證電腦系統1〇〇的工具,如戴爾個人電腦中的服務碼(service code)。基於此驗證資訊,提供給使用者適當的技術而軟體供應 商150被收取該項技術授權費用。接著,軟體供應商15〇可以選 擇由硬體製造商收回授權費用;或者,硬體供應商17〇可以基於 ,,者160的軟體註冊資訊,被要求支付授權使用費用給技術持 有者170。 當使用者160在接收或啟用該所需技術的同時,將會創造一 =的產品銷售機t,以及可以擷取使用者資訊以做為往後的銷 ΐ些額外交易的收入可以用來分擔硬體供應商且有助於 如此也提供一銷•更多•自技術持有者進階技術的 機會,因而導致額外的授權費用。 參照第四圖所示,其為一更加詳細描述授權系統的圖式。軟 f 110可以在電腦系統1〇〇中被執行。該電腦系統1〇〇也可 ^ 一電細系統100互動的使用者介面,提供給使用者1⑼包 裝置,如滑鼠及鍵盤(圖中未列出)。此電腦系統可以包 同的儲存裝置,如用來讀取資料的光學裝置,其使用⑶或DVD ,。軟體產品110包括功能模組丨06。功能模組1〇6代表一授 =或气授權的軟體特點。舉例來說,一播放DVD電影的軟體產品 或一軟體包括一功能模組係為DVD電影中壓縮影像的解碼, 严=^放DVD電影時音效解碼技術,例如:杜比音效解碼、杜比 曰效解碼' DivX解碼、DTS數位音效。值得注意的是,本具 中描述一功能模組106,惟於實際應用時,軟體產品110 亦可此存在超過一個功能模組。 振知气二功能模組106可能使用一個或多個技術模組10了,技術 時表軟體產品uo中,當執行一特定軟體功能模組106 月匕而要用到的智慧財產權。舉例來說,技術模組107可能包 14 1267753 含一用來杜比音效解碼的技術。技術模組1〇7係包含於功能模級 106 ^,其屬於技術持有者12〇所有。舉例來說,杜比音效解碼 技術係屬於杜比實驗室所有。因此,技術持有者12()可能會擁有 包括專利、版權或是其他與技術模組丨〇7有關的受保護權益。 因、此’軟體產品11〇可能包含需要由一個或多個技術持有者 wo獲得的額外授權功能模組106。這些模組將會與未授權技術 模組1〇2有關。軟體產品u〇也可能包括有超出軟體產品n〇基 本,用範圍、而不需要單獨授權的功能模組1〇6。舉例來說,〜 功能模組γ〇6允許播放DVD而不需要特定的音效解碼技術,或觀 $ DVD隱藏的附加内容(enhance(j contents),此即為一不需要 單獨授權而可以使用該功能的例子。一功能模組1〇6可能包括許 多技術模曰組107。因此,雖然第四圖所描述僅有一個技術持有者 12〇,但是值得注意的是,在軟體產品11〇中一個或多個技術 組107可能為許多不同的技術持有者12〇所有。 、 特疋的功能模組106是受到保護的,除非功能模組需 ,所有的技術模組ι〇7都已完成註冊,否則功能模組1〇6 失^作用或是受到限制。舉例來說,未授權的技術模組1〇7可 ,,使用者160註冊,以獲得一適當的授權及解除軟體功能限制^ 為了解除軟體功能限制,註冊資料交換中心14〇提供一適當的 =機制130給軟體產品Π0。一旦註冊後,軟體供應商15〇可以 ,二ί授權技術模组107藉由支付授權費用給技術持有者而轉換 成一授權技術模組107。已經授權的技術模組ι〇γ也可以視其需 要而申請一專用S的之註冊。 八 註冊資料交換中心140係電腦系統1〇〇或使用者16〇與技術 持=者120之間的介面。如第四圖所示,註冊資料交換中心14〇 了月b跟軟體供應商15 〇有關,也可能是一獨自的單元。更佳地, f冊資料交換中心140及電腦系統1〇〇的介面透過通訊網路112。 f冊資料交換中心140由電腦系統1〇〇接收到註冊需求,儲存該 註冊資訊134,而後傳送一解除機制130至電腦系統100用來解 除,術模組107的軟體保護。註冊資料交換中心140也儲存與註 冊資料庫133中驗證資訊有關的授權資訊。'特别的是,註冊^料 庫133包含用來追蹤技術模組1〇7使用狀況的資訊。軟體供應商 15 1267753 150可以藉由此技術使用狀況的資訊,以決定何種技術產品最 土使用者160使用。然後,此技術使用狀況的資訊可以被用來決 疋將來在軟體發行時,何種技術應該被包括進來。缺後,軟體供 ,商乂5〇可以選擇將來在軟體發行時,去除較不受-迎的技術- in!!二如此一來使得授權費用降到最低。同樣地,軟體供應商 50如果不再希望授權該項技術,亦可以由遠端選 啟用該 術。 甘i來說,解除機制130可以是一數字碼(key code) 131, 5里訊網路112自動傳送至電腦系統1〇〇 :或經由電話網路 給使用者I60數字碼131 ;或者,解除機制也可以是一 始竭(missingsourcecode) U2,供應給軟體產品 >去除文保護的功能模組10 6。 —本i五圖描述使用如第四圖中軟體授權系統的一較佳流程圖。 f步驟300中,電腦系統100裝有受保護的軟體產品11〇。舉例 來說,用來播放DVD電影的軟體產品11 〇,其可能是購買dVj)機 =軟體。在其他具體實施例中,軟體產品110被預先安裝 ίϊί系統ι〇0。或者,軟體產品110可能以實體傳送的方式提 使用者I60,例如·_ CD-ROM、DVD或其他已知的儲存裝置。 二,用者160可以經由光學裝置或其他已知的裝置(係指電 ^系A =〇中,可讀取資料之一可攜式儲存裝置)安裝軟體產品 者,軟體產品110可能藉由一傳統的傳輸系統,例如藉 ΐϊί、,、罔路由遠端軟體空間下載的技術提供至電腦系統1〇〇。舉 ^ 此通訊網路可以是一網際網路(internet) 〇 你田系統100中,一旦軟體產品I10被執行,步驟301中 吏f 60可以使用最初安裝程式所提供的任何無保護的功能模 而今’所有任何與功能模組106有關的技術模組107已 。舉例來說,DVD機的播放軟體中,使用者160可以播 放電衫而不需要杜比音效解碼技術。 能mi可以受保護以避免技術模組iq7未經授權驗證 二搭ft於取得任何技術模組ι〇7的註冊。舉例來說, 使用技術模組107的功能模組刚可以藉由以下方式而受保護: 16 1267753 允件Γ用it i 。如步驟303所示,當軟體產品110不 mu ^包含至少一項未授權技術模組107的功能模 面產二10 J以被設定成在電腦系統1。〇的使用者介 是戽俘^«的心視窗,用以告知使用者160該功能模組106 ;nf且,該錯誤訊息視窗將指示使用*⑽如何去註 冊技術棋組107,使之解除保護並獲得功能模組1〇6的使用。 顯干ΪΪγιΙ體fD°〇 U〇可以在電腦系,统100的使用者介面中不 以告知使用_該功能模,且106是受保護的; 而疋自動開始-啟用巾請來#代,不另行通知使用者16〇。 接屮如2 3由〇 1所示’軟體產0口口 11 〇開始向註冊資料交換中心14 〇 ίί:2Γ在步驟305 ’註冊資料交換中心140承認該啟 註冊資料交換中心140中請註冊 地特二的蚀田^的確^身讯。更佳地,該確認資訊應該區別各自 或者特定的軟體產品11Q,如此—來該確認 mdh定:特定軟體產品110是否已經被註冊。舉例 遽二訊可能包括使用者160的確認、技術模組1〇7的 確涊以及軟體產品110中的序號(例如:CD key)。 值=^Λ07所示,為了回應該確認申請,軟體產品110準備 ,輸訊至註冊資料交換中心140。接著,如步驟所 I’,ίΐί ΐ 110傳輸確認資訊至註冊資料交換中心140。接下 楛細ιη^Γ女09中,註冊資料交換中心140驗證與至少一項技術 模、、、ΗΠ有關的確認資訊,其中註冊資料交換中心、授權該註冊。 中,註冊資料交換中心140在註冊資料庫133中 gin组=ϊ當做已註冊。—較佳的具體實施例中,註 ^獲得第—次成功授權之後,將記錄一註冊 、,並田做已a主冊」。因此,一旦與一特定軟體產品110 17 1267753 有關的該註冊模組107被成功地授權,那麼註冊資料交換中心14〇 將不會在註冊資料庫133中,再次記錄其後的註冊申請。舉例來 說,假如使用者160重新安裝軟體產品110,註冊資料交換中心-14〇可以提供該註冊模組1〇7的註冊步驟如上所述,但不應該在 註冊資料庫133中記錄一額外的註冊資訊。然而,在其他具體實、 施例中許多連續的安裝將被記錄下來。另一具體實施例中,在每 次的使用可能需要註冊該技術模組107以收集更進一步的使用資 訊;或者在每次的使用提供軟體授權。舉例來說,使用者1⑼每 次執行一功能模組106,註冊程序可能包含增加、以及在註冊資 料庫133中記錄一次,用以決定進行的授權費用。 、 在步驟311中,註冊資料交換中心140提供一解除機制13〇 至軟體產品110,因此啟用原先受保護的技術模組1〇7,其與解 _ 除機制130有關的。更佳地,此解除機制13〇由通訊網路^'被 ,送。不過,解除機制130可使用其他已知的方法,由註冊資 交換中心140傳送至電腦系統100。舉例來說,解除機制13〇 經可以透過一電子郵件訊息、電話回傳、郵件服務或其他任何 知合適的通訊方式來提供,用以傳送此合適的解除機制130。 - ^步驟312所示,所提供的解除機制13〇被用來啟用技術 -組107。舉例來說,自動鍵入一數字碼131至軟體產品11〇中,、 或是自動提供一缺少的原始碼132以啟用技術模組107。假如一 功能模組106中所有的技術模組107被授權,使用者16〇可以 即地使用該功能模組106。 在步驟314中,軟體供應商15〇可以提供註冊資訊134,Α 可以被用來決定何種授權的技術模組1〇7最常被使用者16〇 ^ 用。此註冊資訊134可以在註冊時立即地被傳送至軟體供應 150,且被軟體供應商150收集、擷取(如果需要的話),或者 期地被傳送至軟體供應商。該資訊可以經由通訊網路134(例如, 網際網路)而被傳送。不過,其他傳送註冊資訊134的方式, 括郵件、電話也可以被接受。並且如預期的,註冊資訊134可以 被提供至除了軟體供應商150外的其他方。舉例來說,技術持有 者120也希望可以有註冊的技術模組1〇7相關說明。 18 1267753 註冊資料交換中心 個額外的與使用者1β〇 服務可以被加以宣傳, 後的鎖售用途。 140也可以使用上述註冊步驟,以當做一 之間互動的機會。舉例來說,軟體產品及 或是額外的使用者資訊之收集,以做為往 版,具體地說’軟體供應商150可::產:軟:mi 權費用給技術議i20。:應該是? 巧仏應商150使用所接收到的註冊資訊134 (Ik with software product mouth 110 is manufactured by 苐二方15〇, and the mouth t needs to be authorized by the fourth party. The first application for registration of an unregistered function is filed. After receiving the registration application, the software of the first party 150 160 is taken, and the second party 170 pays to the fourth party i2. In fact, the Shanghai side tends to use one party. Therefore, the fourth party is 12. It is possible to transmit an authorization "to the third 2 description, a fifth implementation (4) broad view, wherein the third party 170 k is provided with the accompanying software product including the partial function limitation, the software product no system, manufactured by the second party 15. = soft 1 party 6 〇; contains the technology that needs to be authorized by the fourth party. The first party = note = signal machine to produce the first heart 160 € ^ L $; 1,1; 0 ^ Τ 2ί ;! χ side 170. It is the iZU that can transmit an authorized use to the third. It is worth noting that the above specific embodiments have a connection software. Which party is tracking the registration information? Which one (, =^ 12 1267753 匕★Γ义方Paid to technology holders? These systems can be exchanged and still invented, within the scope of this concept. This concept has led to an improvement in prior technology, which is paid to the technology holders in the sale of the parent software. A full authorization fee =. In addition, this system differs from the prior art in that it pays for the authorization of the additional Wei. _ U uses the first coupon 弋 1 description 1 as a second A to the second E The system has a broader view. Protected software for some functional limitations is given first (Step 200) ί2f — The user can receive the software that is included in the computer system. f匕, the first party wants to use some of the restricted functions in the protected software. Ϊ Register, for example, DVD player Dolby audio decoding technology 2 ^ In step 220, the software determines whether the function needs to be registered. If the user registers (the status is no), the user does not need extra action, the software needs to be the second party or the first Three-party registration (step 24〇). Two or two parties or a third party may be a hardware vendor or a software provider. In 250, the software determines whether it is necessary to pay an additional fee for the new registration function. This f is used (the status is no), as in the figure: A, the party can execute the new registration software (step 230). If you need to pay the fee (the situation is yes), then the registration will be The second party will initiate a payment by the second party to the fourth party (steps 270 and 280). For example, the hardware or software & merchant may pay the technology holder for the registration technology. In addition to the book Incentives are paid by a third party to the second party (step 26G). For example, the hardware supplier may pay for the software vendor due to the registration technology. In this technique, the skill is determined by the performance status. In fact, it can be paid later, that is, the first party is immediately authorized to execute the software. A more specific example, as shown in FIG. 2B, allows the software vendor to be authorized by the computer system 100. The software provided 'or the G around the computer is J = the specific technology required by the user 16G. For example, in order to reduce the cost of the license fee, the DVD player software can be provided by the hardware supplier for some functional limitations: The software is given to the user 160, in particular to exclude those with the authorization fee: technology. When the user 160 needs to use certain functions, it can be operated by the network or some other electronic, physical mechanism. This is true when the user 160 first attempts to play a commercial DVD, or when the user is in need of 13 1267753. When using a required technology, he will verify that he is the sole and authorized recipient of this technology to the computer that provides the technology enablement service (in this case, the DVD software vendor). There are many possible mechanisms for this, including the use of serial numbers (provided at the beginning of the purchase), or some single-factor authentication system, such as the service code in Dell personal computers. Based on this verification information, the appropriate technology is provided to the user and the software provider 150 is charged the technical license fee. Next, the software vendor 15〇 may choose to recover the license fee from the hardware manufacturer; or the hardware vendor 17 may be based on the software registration information of the 160, and is required to pay the license fee to the technology holder 170. When the user 160 receives or enables the required technology, a product vending machine t will be created, and the user information can be retrieved as a revenue for the subsequent sales. Hardware vendors also help to provide a single offer • More • Opportunities for advanced technology from technology holders, resulting in additional licensing fees. Referring to the fourth figure, it is a diagram that describes the authorization system in more detail. Soft f 110 can be executed in the computer system. The computer system can also provide a user interface for the user (1), such as a mouse and a keyboard (not shown). This computer system can include the same storage device, such as an optical device for reading data, using (3) or DVD. The software product 110 includes a functional module 丨06. The function module 1〇6 represents a software feature of a given or gas authorization. For example, a software product or a software that plays a DVD movie includes a function module for decoding a compressed image in a DVD movie, and a sound decoding technology for a DVD movie, such as: Dolby sound decoding, Dolby Decoding 'DivX decoding, DTS digital sound. It should be noted that a functional module 106 is described in the present invention. However, in actual application, the software product 110 may also have more than one functional module. The vibrating gas function module 106 may use one or more technical modules 10, the technical time table software product uo, the intellectual property rights to be used when executing a specific software function module 106 months. For example, the technology module 107 may include 14 1267753 with a technique for Dolby sound decoding. The technical module 1〇7 is included in the functional module level 106^, which belongs to the technology holder 12〇. For example, Dolby Audio Decoding is part of Dolby Laboratories. Therefore, the technology holder 12() may have a patent, copyright or other protected interest in relation to the technical module. Because of this, the software product 11 may contain additional authorization function modules 106 that need to be obtained by one or more technology holders. These modules will be associated with the Unauthorized Technology Module 1〇2. The software product u〇 may also include functional modules 1〇6 that are beyond the basics of the software product, and do not require separate authorization. For example, ~ function module γ〇6 allows DVD playback without the need for a specific audio decoding technology, or viewing the hidden content of the DVD (enhance(j contents), which is a need for a separate authorization. An example of the function. A function module 1〇6 may include a number of technical modules 107. Therefore, although the fourth figure describes only one technology holder 12〇, it is worth noting that in the software product 11〇 One or more technology groups 107 may be owned by many different technology holders. The feature module 106 is protected, and all technical modules ι〇7 are completed unless required by the function module. Registration, otherwise the function module 1〇6 is disabled or restricted. For example, the unauthorized technology module 1〇7, the user 160 registers to obtain an appropriate authorization and release the software function limit^ In order to remove the software function restriction, the registration data exchange center 14 provides an appropriate = mechanism 130 to the software product 。 0. Once registered, the software provider 15 〇 can, the lic authorization technology module 107 by paying the authorization fee The technology holder converts it into an authorization technology module 107. The authorized technology module ι〇γ can also apply for registration of a dedicated S according to its needs. Eight registration data exchange center 140 system computer system 1 or use The interface between 16〇 and the technology holder 120. As shown in the fourth figure, the registration data exchange center 14 is related to the software supplier 15 ,, or it may be a separate unit. More preferably, The interface of the data exchange center 140 and the computer system is transmitted through the communication network 112. The data exchange center 140 receives the registration request from the computer system 1 , stores the registration information 134, and then transmits a release mechanism 130 to the computer. The system 100 is used to release the software protection of the operation module 107. The registration data exchange center 140 also stores authorization information related to the verification information in the registration database 133. 'Specially, the registration database 133 includes a technique for tracking technology. Group 1〇7 information on the status of use. Software supplier 15 1267753 150 can use the information on the state of use of this technology to determine which technology product is used by the most user 160. Then, Information on the state of use can be used to determine which technologies should be included in the software release in the future. After the lack of software, the software can choose to remove the unwelcome in the future when the software is released. Technology - in!! Secondly, the license fee is minimized. Similarly, if the software provider 50 no longer wishes to authorize the technology, the remote option can be enabled by the remote party. It can be a key code 131, 5 the network 112 is automatically transmitted to the computer system 1: or the user can access the I60 digital code 131 via the telephone network; or the release mechanism can be an initial ( Missingsourcecode) U2, supplied to the software product> The function module 106 that removes the text protection. - Figure 5 is a preferred flow chart for the use of the software authorization system as in the fourth figure. In step 300, computer system 100 is loaded with a protected software product 11〇. For example, the software product used to play DVD movies is 11 〇, which may be the purchase of dVj) machine = software. In other embodiments, the software product 110 is pre-installed ίϊί system ι〇0. Alternatively, the software product 110 may be presented to the user I60 by physical transfer, such as a CD-ROM, DVD or other known storage device. Second, the user 160 can install the software product via an optical device or other known device (referred to as a portable storage device in the electrical system A=〇, which can read data), and the software product 110 may be Traditional transmission systems, such as the technology of remote software space downloading by ΐϊ, 罔, 罔, are provided to the computer system. This communication network can be an Internet (Internet) in your field system 100. Once the software product I10 is executed, the 吏f 60 in step 301 can use any unprotected function provided by the original installation program. All of the technical modules 107 associated with the functional module 106 have been. For example, in the playback software of a DVD player, the user 160 can play a discharge shirt without the need for Dolby sound decoding technology. Can mi can be protected to avoid unauthorized verification of the technical module iq7. Take the registration of any technical module ι〇7. For example, the functional module using the technical module 107 can be protected by the following means: 16 1267753 The access device uses it i . As shown in step 303, when the software product 110 does not contain at least one functional module of the unlicensed technology module 107, it is set to be in the computer system 1. The user interface of the user is a heart window for the user to inform the user 160 of the function module 106; nf, and the error message window will indicate how to use the *(10) to register the technical game group 107 to remove the protection. And use the function module 1〇6.显 Ι ΪΪ Ι f f f f f f f f f f f f f f f f f f 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑 电脑The user will be notified 16 times. The connection is as shown in Fig. 2, which is indicated by 〇1, 'software production 0 port 11 〇 starts to register with the clearing house 14 〇 ίί: 2 Γ in step 305 'registration clearinghouse 140 acknowledgment of the registration of the registration clearinghouse 140 The second eclipse ^ is indeed ^ body news. More preferably, the confirmation information should distinguish between the respective or specific software products 11Q, so that the confirmation mdh determines whether the specific software product 110 has been registered. For example, the second message may include the confirmation of the user 160, the confirmation of the technical module 1〇7, and the serial number in the software product 110 (for example, CD key). As shown in the value =^Λ07, in order to confirm the application, the software product 110 is prepared and transmitted to the registration data exchange center 140. Next, the confirmation information is transmitted to the registration clearinghouse 140 as in step I', ίΐί ΐ 110. Next, in the 楛 ι η Γ Γ 09 09, the registration clearinghouse 140 verifies the confirmation information related to at least one technical model, and ΗΠ, in which the registration data exchange center authorizes the registration. In the registration database 133, the gin group = ϊ is registered. - In the preferred embodiment, after the first successful authorization is obtained, a registration will be recorded, and the field will be a master book. Therefore, once the registration module 107 associated with a particular software product 110 17 1267753 is successfully authorized, the registration clearinghouse 14 will not record the subsequent registration application in the registration database 133 again. For example, if the user 160 reinstalls the software product 110, the registration clearinghouse-14 can provide the registration module 1 to 7 as described above, but should not record an additional record in the registration database 133. Registration information. However, many successive installations will be recorded in other specific implementations. In another embodiment, the technology module 107 may need to be registered for each use to collect further usage information; or provide software authorization for each use. For example, user 1 (9) executes a function module 106 each time, and the registration process may include an addition and a record in the registration database 133 to determine the authorization fee to be performed. In step 311, the registration clearinghouse 140 provides a release mechanism 13 to the software product 110, thereby enabling the previously protected technology module 101, which is associated with the solution defragmentation mechanism 130. More preferably, the release mechanism 13 is sent by the communication network ^'. However, the dismissal mechanism 130 can be transmitted to the computer system 100 by the registry exchange 140 using other known methods. For example, the dismissal mechanism 13 can be provided via an e-mail message, a telephone backhaul, a mail service, or any other suitable communication means for transmitting the appropriate dismissal mechanism 130. - ^ As shown in step 312, the release mechanism 13 provided is used to enable the technology - group 107. For example, a digital code 131 is automatically entered into the software product 11A, or a missing source code 132 is automatically provided to enable the technology module 107. If all of the technical modules 107 in a functional module 106 are authorized, the user 16 can use the functional module 106 immediately. In step 314, the software vendor 15 can provide registration information 134, which can be used to determine which authorized technology modules 1〇7 are most commonly used by the user. This registration information 134 can be immediately transferred to the software offering 150 upon registration and collected, retrieved (if needed) by the software vendor 150, or periodically transmitted to the software vendor. This information can be transmitted via a communication network 134 (e.g., the Internet). However, other ways of transmitting registration information 134, including mail and phone calls, can also be accepted. And as expected, the registration information 134 can be provided to other parties than the software provider 150. For example, the technology holder 120 also wishes to have a description of the registered technical module 1-7. 18 1267753 Registration Clearinghouse An additional 1β service with the user can be advertised for later use. The 140 registration steps can also be used as an opportunity to interact. For example, software products and or additional user information are collected as a version, specifically 'software supplier 150 can:: production: soft: mi rights fee to technical discussion i20. : Should it be? Qiao Hao 150 uses the registration information received 134 (

S需持有者120的授權版稅。因此,如步驟315 二僅t技術模組1〇7被使用者160註冊之後,軟體供應商150 1由已知的付帳方式而定期的支付。另外,硬體 商170 士可以根據所收集的註冊資tfL 134,被要求=付2 持有者120的款項。 具馬叉灯、、口孜何 ㈣因it ^第^圖^示的方法,係指軟體供應商150僅在技術 模、、且107被使用者160註冊後,才需支付費用的軟 。 此軟體授權方法通常可以用來減低軟體供應商15〇及 6〇S requires a royalty of the holder 120. Therefore, after step 315, only the t-technology module 1〇7 is registered by the user 160, the software provider 150 1 pays periodically by the known payment method. In addition, the hardware vendor 170 can be required to pay 2 holders 120 based on the registered capital tfL 134 collected. With the forklight, and the mouth (4), the method shown in it ^^^ means that the software supplier 150 only needs to pay the fee after the technical model, and 107 is registered by the user 160. This software authorization method can usually be used to reduce software suppliers 15〇 and 6〇.

的花費,因其在軟體產品110中未使用的技術模組並 因此,軟體供應商150的購買成本及使用者16〇實㉗ 不一致將會減少。對使用者160來說,如果該技術;^組1〇7丄繪 使用,那麼花在授權的費用不會白白浪費掉;而對軟^供應商15曰〇 而言,與未使用技術模組有關的授權費用將不再降低其、於利率。 同樣地,因為未使用技術模組在售價上不再轉嫁至使用、者&16〇身 上’產品的成本將會降低,因此而提高其市場佔有率。最後,言主 冊資料庫及使用者之間的互動提供另一機會,用以宣傳軟體供應 商、技術持有者及(或)製造公司額外的產品。 — 八… 在另一具體實施例’啟用及開啟其功能(步驟3〇4至312) 其實施係經由註冊資料交換中心140與使用者16〇之間的電話介 面13 0。舉例來說’如步驟3 0 4所不的具體實施例中,使用者16 q 撥打電話至註冊資料交換中心140,以開始該技術模組IQ?的啟 19 1267753 用申請。註冊資料交換中心140可以雇用現場人員或利用自動電 話系統,用來施行承認啟用申請305、申請確認資訊306、接收 確認資訊309、記錄註冊310,以及提供一解除機制130等功能。 使用者160可以傳送確認資訊、接收解除機制130,以及與電腦 系統100互動並鍵入已接收的解除機制130,因而使作用該技術 模組107。 雖然藉由通訊網路112及電話網路113而完成一技術模組107 啟用的具體實施例,已詳細敘述如上,在此技藝中的一項需要知 道的技巧:任何一項傳送必需的啟用需求、確認資訊以及解除機 制130的工具,都可以被此技藝中的例行程序替代。舉例來說, 這是可以被預期的:啟用及註冊步驟也可以經由郵件來完成。 在其他具體實施例中,第四圖中的軟體授權系統可以被設定 為暫時地啟用該技術模組107的使用,即使電腦系統1〇〇暫時地 離開網路112或使用者160不能藉由電話網路113立即地註冊該 軟體。如此允許一功能模組106在一限定的時間中運作,儘管技 術模組107未被註冊。在這個例子中,使用者16〇在需要註冊技 術模組107的功能模組106未啟用之前,可以在預先決定好的時 間週期使用,或是可以使用技術模組107數次。此一具體實施例 對於使用者160特別地有所幫助,使用者不需要去透過電話網路 113或通訊網路112註冊’而能使用一小段的時間。舉例來說, 使用者160在飛機上(其透過電話網路113或通訊網路112是不 方便時)希望能觀看DVD電影時(其使用杜比音效解碼技術), 可能會需要暫時使用未註冊技術模組107。一旦使用者16〇已經 透過電話網路113,或一電腦系統1〇〇藉由通訊網路112可以存 取註冊資料交換中心140,那麼技術模組將被註冊以及解除(如 第五圖中步驟304至312所述)。 ’、 並且,軟體供應商150可以同意基於每一次的使用,由技術 持有者120授權技術模組1〇7。因此,該系統可以被設計為符合 基於同一技術模組多重註冊被使用於同一使用者的版二^定。二 此,授權系統可以在每一次使用一技術模組107 ;版=行: 些註冊及啟用其功能(步驟304至312)的結合。在此一具體實 施例中,每一次使用的註冊資訊134被儲存在註冊資料庫丨中, 1267753 並且使用已知的付款方式付費給軟體供應商150。因此,軟體授 權系統可以被設定為註冊技術模組107,不管是每一次使用、僅 使用一次皆可。 · 本發明也可以用一三方(three-party)軟體交易系統與方法 來加以描述。如第六圖所示的軟體父易系統中先前技術的系統與 方法,其說明一軟體供應商18提供一軟體182至一單一使用^ 14。軟體供應商18支付該技術162授權費用給所有技術持有者 16。軟體供應商18可以是一軟體製造商、硬體製造商或任何一 銷售該軟體182至使用者14的群體。使用者14可以是任何消費 者或任何合法取得使用該軟體182版權的群體。技術持有者16 可以由軟體供應商18基於銷售量得到一授權費用。使用者14可 以不用明確地支付一授權費用給技術持有者16,而這項授權費用 _ 通常包含於軟體的售價上。並且,為了避免軟體182被非法複製, 如果使用者14從網際網路下載,或從店家鱗買,或由郵件傳送 後,他們通常會被要求輸入一與軟體182有關的CD-key或服務 碼(service code)。通常不是軟體供應商18,也不是技術持有 者16會被告知一安裝訊息。因此,他們並不知道軟體182實際 的安裝份數。還有,與軟體182有關的技術162可能不只一個二-因為使用者14可能從沒使用過軟體182特定的功能,2安裝的 次數並不知情,已授權技術162實際的使用狀況也不知情。t 軟體交易系統中第一具體實施例的系統,與傳統的交易系統 有所不同,後者係由軟體供應商在每一筆軟體的銷售支付授權費 鲁 用給技術持有者。而在本發明中’軟體供應商可以監控軟體中白^ 何種技術較少被使用,因此提供給軟體供應商基於技術最常 被使用,以做為產品決策的相關資料。 參考第七A圖,軟體交易系統中的第一具體實施例,現有發 明中的受保護軟體520包括:一個或多個技術限制526、一個或 多個功能522以及註冊程式528。每一技術限制526被用來限制 一個或多個技術524的使用。每一功能522使用一個或多個技術 524,且每一技術524為一個或多個功能522所使用。與一技術524 有關的技術限制526,可以禁止一個或多個功能522的使用。每 一註冊程式528被用來解除技術限制526(與一個或多個技術524 21 1267753 有關)的限制。每一技術524對應至一註冊程式528。因此,一 註冊程式528與一個或多個技術限制526有關,且在技術524 (與 技術限制526有關)的功能522被實行之前被執行。一旦註冊程 式528被成功地執行,與註冊程式528有關的技術限制526將被 解除,跟技術524有關的註冊程式528不會再次被實行。舉例來 說’假如一功能522需要三項技術524,且此三項技術524需要 兩個註冊程式528來解除附加於其上的技術限制526,此兩個註 冊程式528可以解除共计六項技術524的技術限制$26。假如另 外其他三項技術524被其他功能522所需,一旦此兩個註冊程式 528已經被執行,其他功能522可以立即地自動存取。 第七B圖說明執行註冊程式528過程中的所有步驟。首先, 啟用步驟582將被執行;在接下來的確認步驟584,一授權確認 春 被傳送至一伺服器;在接下來的承認步驟586,將得到—授權= 承認並完成註冊;最後,解除步驟588被施行而導致技術限& 526 被解除了。 在本發明中,啟用步驟582可以用手動方式啟用註冊程式 528、當一相關功能被執行時則自動啟用註冊程式,且成功地^ 動成功啟用此與所包含的技術524有關的註冊程式528。 授權確認步驟584被用來修正受保護軟體520的使用。為了 存取受保護軟體520中技術524的授權費用,軟體使用單元 應傳送一授權確認,其可以是一行的形式、或電子信號、以及一 文件諸如CD key、序號或服務碼。授權確認可以藉由軟體使 元414而手動輸入、藉由註冊程式528自動確認;或是在軟 = 裝期間藉由一確認文件來展示、在軟體安裝之後藉由一付 的使用來展示。 、^ 授權承認步驟586係用來承認受保護軟體520的技術限帝 是否被解除。授權承認可以由以下方式獲得:經網路自動開= 得一伺服器的承認、經網路手動開始取得一伺服器的承認=σ $ 至伺服器後開始取得、利用電子郵寄至伺服器後開始取$ : 其他類似的方法。在註冊程式528接收到授權確認後,此1 = ^ 質上已完成。 W冊實 22 1267753 在上述的具體實施例中,受保護軟體520可以藉由以下來受 保護:運作失敗的功能(failed function)、隱藏功能、或缺乏 運作功能522所需的原始碼。當受保護軟體520受運作失敗功能 的保護,與一特定技術524有關的特定功能522運作失敗,除非 技術限制526被與技術524有關的註冊所解除。當受保護軟體 受隱藏功能的保護,軟體使用單元414將功能522隱藏掉,除 相關技術的註冊完成後。當受保護軟體520受缺乏所需的原^ 保護,受保護軟體520未包括運作一特定技術524所需的原馬 因此,一個或多個功此5 2 2因為缺乏所需的原始碼而無法‘執二 相關技術的註冊完成後,運作一技術524所需的原始碼將會 供。舉例來說,所需的原始碼係可藉由在受保護軟體52〇 所缺少的原始碼(missin§ s〇urce code)、或取代其6聲6 入 碼而取得。 八儿9原始 使用上述的具體實施例,一軟體提供單元742 技術524被一特定使用者或軟體所註冊。訝於影 如f$種 放軟體來說,其可能包括許多每一認證技術所雷的古 、播 相當合適的。舉例來說,藉由追蹤何種技彳軒,這是 414所使用,一軟體提供單元742可以決定贽用單元 在將來受保護軟體520發行時。 7種技術將繼續提供, 軟體交易系統第二具體實施例包括一如 易方法。首先,在步驟632中,一受保護敕二戶的三方交 至第二方。在先前具體實施例中,此傳送的方傳送 一個或多個與技術524有關的技術限制52彳^^軟體520包括 634中,第二方向一個或多個第三方註冊所+二=二$註冊步驟 方記錄該註冊資訊。接下來,在解除步驟二f 2技枣J24。第三 方申請與一特定技術有關的一解除機制。挺 二,一方向第三 接收到並用來解除一技術限制526。最後,^,该解除機制將被 第一方支付一授權費用給第三方。 在付費步驟638中, 在軟體交易系統第二具體實施例中的受 具體實施例的受保護軟體是—樣的。因此,與第一 定的功能也如同第一具體實施例中所述。為^保遵軟體52〇中特 任第二具體實施例中, 23 1267753 使用受保護軟體520 (通當孫私 直接支付技術的授權費用·而用單元414)的第二方不是 (可以是軟體供應商或技術二方根據一實際需求向第三方 一方(如軟體供應商)根註冊該付費技術。之後,第 授權費用給第三方(可以η術524有關的註冊資訊來支付一 从疋一技術持有者)。 註冊資訊762包括第一次註 > 資訊。第一次註冊資訊的產生,=严二也可以包括隨後的註冊 528第一次接收了授權確認。卩、& 4、$第二方從第二方的註冊程式 方從第二方的註冊程式52^ ^ ^註冊資訊的產生,係當第三 體使用單元414可以重新安裝軟^收工授權確認。舉例來說,軟 528再次接收了授權確認,這^彳―’苐二方從第二方的註冊程式 第一次註冊時要求付費。黛二古!Γ有可能的。技術524可以僅在 付費,且該費用可以直接或;接註:j 以在同一時間提供一互動的機割仏弟一方並且,弟二方可 索舉例來說’;互—二制===服ί技 第九圖係一三方交易系統的第三具體實施例。此三方包括一 ,體$供單元742、一軟體使用單元414、以及一個或多個軟體 註巧f元746 :軟體提供單元742提供受保護軟體52〇給軟體使 用單元414。受保濩軟體520包括一個或多個功能522、一個或 多個技術524、一個或多個技術限制526、以及一個或多個註冊 程式528。每一技術限制526被用來限制一個或多個技術524的 使用。母一功能522使用一個或多個技術524,而每一技術524 被一個或多個功能522所使用。每一註冊程式528被用來解除一 與個或多個技術5 2 4有關的技術限制5 2 6。每一軟體註冊^元 746提供一註冊資訊762,其係由註冊程式528所提供。每一註 冊單元746在技術524註冊之後,記錄註冊資訊762。 在軟體交易系統中第三具體實施例的受保護軟體52〇與第一 24 1267753 具體實施例、第一 護軟體520可以實施例中的受保護軟體520相同。該受保 遞、或其他已知壬i可機制如··網路下載、隨機附贈、實體傳 體使用單元遞方式,由軟體提供單元742傳送至軟 的費用。值得注體^供皁兀742掌控支付給軟體使用單元414 限制。軟體註冊此技藝中一純熟的技巧係付款方式未受 單元414技術限制控制整個註冊過程以及解除一軟體使用 元414存取,其難士 過程。軟體註冊單元746可以被軟體使用單 電子信號、遠dt網路、電話、郵件、聲音傳遞、信件、 載、儲存媒介傳送、或其他已知的方式。 一次註冊ItU62、被軟&體註忍單元746所儲存,其可以包括第 元414同-技術後的註冊資訊762。由同-軟體使用單 次註冊資訊762的注,乂可以僅收費一次或重複收費。第一 單元414的註冊1式生%係註冊單* 746經由軟體使用 冊資訊762的產$ ,接收了一授權確認。而隨後註 體使用單^ 2 ,咖係當—軟體註冊單元746經由軟 來說,軟體使用單亓IfH’再次接收了-授權確認。舉例 746經由軟體使用單元;而軟體註冊單元 嫁認,這是復有可妒的程式528,再次接收了 一授權 費。軟體註冊單元^^ ;技可以僅在第一次註冊時要求付 供單元742的授權來支H軟$供單* 742 it付,或軟體提 動的機制給第二方,赤,體;^^早70 746可以在同時間提供一互 746解除。舉例來' f 供,技術524係由軟體註冊單元 傳或特價方案。’’匕互動機制可以包括顧客服務、廣告、宣 以限以以請僅之較佳實施例,並非用 範圍中。 又雙次乜飾均應包含在下述之申請專利 【圖式簡單說明】 本發明的許多觀點可以參考以下的圖式而更加清楚的了解。 25 1267753 相關圖式並未依比例繪製,其作用僅在清楚表現本發明 理。並且,使用數字來表示圖式中相對應的部分。 關定 ,一 A圖,一先前技術中的軟體授權系統圖式; ,一 B圖係另一先前技術中的隨附軟體授權系統圖式; 第一 A圖係一軟體授權系統之具體實施例,豆中二記錄第1 (first卿⑺軟體產品中㈣ 第二B圖係一軟體授權系統之具體實施例,其中第三方(third 提供隨附軟體給第一方,而第二方記錄第一方的註冊資 汛以二、疋支付給第四方(f〇urth party)此技術的授權費用;、隨附軟fn统之具體實施例,其中第三方提供 四方授權註冊技術的費用; 、弟 第^二D圖係一軟體授權系統之具體實施例, 由第广方所記錄的註冊資訊來支付給第四方費用 第二E圖係一軟體授權系統之具體實施例, 由第,所記錄的註冊資訊來支付給第四方費用 第二圖為一軟體授權系統與方法的系統流程圖; ^四圖係描述此軟體授權系統之一具體實施例; 圖係一流程圖,用以展示執行一軟體授權系統的每一步 驟(如本發明的系統與方法所敘述); 弟/、圖描述先刖技術的軟體交易系統(s〇hware trading system)中三方的總攬;The cost of the software module is not used because of the technical module that is not used in the software product 110. Therefore, the purchase cost of the software supplier 150 and the user's 16 inconsistency will be reduced. For the user 160, if the technology; ^ group 1〇7丄 use, then the cost of the license will not be wasted; and for the soft supplier 15曰〇, with the unused technology module The relevant licensing fees will no longer be reduced by the interest rate. Similarly, because the cost of the unused technology module is no longer passed on to the user, the cost of the product will be reduced, thus increasing its market share. Finally, the interaction between the forum database and the users provides another opportunity to promote additional products from software vendors, technology holders and/or manufacturing companies. - Eight... In another embodiment, the function is enabled and enabled (steps 3〇4 to 312). The implementation is via the telephone interface 130 between the registration clearinghouse 140 and the user 16〇. For example, in the specific embodiment, as in step 3 0, the user 16 q makes a call to the registration clearinghouse 140 to begin the application of the technical module IQ. The registration clearinghouse 140 can employ field personnel or utilize an automated telephone system for performing functions such as acknowledgment activation application 305, application confirmation information 306, receipt confirmation information 309, record registration 310, and providing a release mechanism 130. User 160 can transmit confirmation information, receive release mechanism 130, and interact with computer system 100 and type in the received release mechanism 130, thereby enabling the technology module 107 to function. Although a specific embodiment of enabling a technical module 107 is enabled by the communication network 112 and the telephone network 113, as described above, one of the techniques in the art requires knowledge: any one of the necessary activation requirements for transmission, The confirmation information and the tools of the dismissal mechanism 130 can be replaced by routines in the art. For example, this can be expected: the enable and register steps can also be done via email. In other embodiments, the software authorization system of the fourth figure may be configured to temporarily enable the use of the technology module 107 even if the computer system 1 temporarily leaves the network 112 or the user 160 cannot use the phone. The network 113 immediately registers the software. This allows a function module 106 to operate for a limited time, although the technology module 107 is not registered. In this example, the user 16 may use the predetermined time period before the function module 106 requiring the registration of the technical module 107 is not enabled, or the technical module 107 may be used several times. This embodiment is particularly helpful to the user 160, who does not need to register via the telephone network 113 or the communication network 112 to use for a short period of time. For example, when the user 160 wants to be able to watch a DVD movie (which uses Dolby audio decoding technology) on an airplane (which is inconvenient via the telephone network 113 or the communication network 112), it may be necessary to temporarily use unregistered technology. Module 107. Once the user 16 has accessed the registration clearinghouse 140 via the telephone network 113, or a computer system 1 via the communication network 112, the technical module will be registered and released (eg, step 304 in the fifth figure). To 312). And, the software provider 150 can agree to authorize the technology module 1〇7 by the technology holder 120 based on each use. Therefore, the system can be designed to conform to the same version of the same technology module based on the same user. Second, the authorization system can use a combination of technology modules 107; version=line: register and enable its functions (steps 304-312). In this particular embodiment, the registration information 134 used each time is stored in the registration database, 1267753, and is paid to the software vendor 150 using a known payment method. Therefore, the software authorization system can be set as the registration technology module 107, regardless of whether it is used once or only once. The invention can also be described using a three-party software trading system and method. A prior art system and method in a software parenting system as shown in Figure 6, which illustrates a software vendor 18 providing a software 182 to a single use. Software vendor 18 pays the technology 162 authorization fee to all technology holders 16 . The software vendor 18 can be a software manufacturer, a hardware manufacturer, or any group that sells the software 182 to the user 14. User 14 can be any consumer or any group legally obtaining the copyright to use the software 182. The technology holder 16 can obtain an authorization fee based on the sales amount by the software vendor 18. The user 14 may not have to explicitly pay an authorization fee to the technical holder 16, and this authorization fee _ is usually included in the selling price of the software. Also, in order to prevent the software 182 from being illegally copied, if the user 14 downloads from the Internet, buys from the store, or sends it by mail, they are usually required to enter a CD-key or service code associated with the software 182. (service code). Usually not a software vendor 18, nor a technology holder 16 will be notified of an installation message. Therefore, they do not know the actual number of copies of the software 182. Also, the technology 162 associated with the software 182 may be more than one-two - since the user 14 may never have used the software 182 specific functions, 2 the number of installations is not known, and the actual usage of the licensed technology 162 is not known. The system of the first embodiment of the software trading system differs from the conventional trading system in that the software vendor pays the license fee for the sales payment of each software to the technology holder. In the present invention, the software supplier can monitor the software in the software. Which technology is less used, and therefore is provided to the software supplier based on the technology most frequently used as the relevant information for product decision making. Referring to the seventh embodiment, a first embodiment of the software transaction system, the protected software 520 of the prior art includes one or more technical limitations 526, one or more functions 522, and a registration program 528. Each technical limit 526 is used to limit the use of one or more techniques 524. Each function 522 uses one or more techniques 524, and each technique 524 is used by one or more functions 522. The technical limitations 526 associated with a technique 524 may prohibit the use of one or more functions 522. Each registration program 528 is used to remove the restriction of the technical limit 526 (related to one or more of the techniques 524 21 1267753). Each technique 524 corresponds to a registration program 528. Thus, a registration program 528 is associated with one or more of the technical limits 526 and is performed prior to the implementation of the function 522 of the technique 524 (related to the technical limit 526). Once registration process 528 is successfully performed, the technical limit 526 associated with registration program 528 will be released and registration program 528 associated with technique 524 will not be executed again. For example, if a function 522 requires three techniques 524, and the three techniques 524 require two registration programs 528 to remove the technical restrictions 526 attached thereto, the two registration programs 528 can release a total of six techniques 524. The technical limit is $26. If the other three techniques 524 are required by other functions 522, once the two registration programs 528 have been executed, the other functions 522 can be automatically accessed immediately. Figure 7B illustrates all of the steps in the process of executing the registration program 528. First, the enable step 582 will be performed; in the next confirmation step 584, an authorization confirmation spring is transmitted to a server; in the next acknowledgement step 586, it will be obtained - authorization = acknowledge and complete registration; finally, the release step 588 was executed and the technical limit & 526 was released. In the present invention, the enabling step 582 can manually enable the registration program 528, automatically enable the registration program when a related function is executed, and successfully activate the registration program 528 associated with the included technology 524. The authorization confirmation step 584 is used to correct the use of the protected software 520. In order to access the authorization fee for the technology 524 in the protected software 520, the software usage unit shall transmit an authorization confirmation, which may be in the form of a line, or an electronic signal, and a file such as a CD key, serial number or service code. The authorization confirmation can be manually entered by the software enabler 414, automatically confirmed by the registration program 528, or displayed by a confirmation file during the soft installation, and displayed by the use of the software after the software installation. The authorization authorization step 586 is used to recognize whether the technical limit of the protected software 520 is released. Authorization can be obtained by automatically opening the network = receiving a server acknowledgement, manually obtaining a server acknowledgement via the network = σ $ to the server, starting to obtain, using e-mail to the server Take $: Other similar methods. After the registration program 528 receives the authorization confirmation, this 1 = ^ is qualitatively completed. W booklet 22 1267753 In the specific embodiment described above, protected software 520 can be protected by a failed function, a hidden function, or a source code that lacks operational function 522. When the protected software 520 is protected by the operational failure function, the particular function 522 associated with a particular technique 524 fails unless the technical limit 526 is removed by the registration associated with the technique 524. When the protected software is protected by the hidden function, the software usage unit 414 hides the function 522, except when the registration of the related technology is completed. When the protected software 520 is lacking the required protection, the protected software 520 does not include the original horse required to operate a particular technique 524. Therefore, one or more of the functions may not be possible due to the lack of the required source code. After the completion of the registration of the relevant technology, the source code required to operate a technology 524 will be available. For example, the required source code can be obtained by missing the original code (missin§ s〇urce code) in the protected software 52〇, or by replacing its 6-sound 6-code. Eight children 9 original Using the specific embodiment described above, a software providing unit 742 technique 524 is registered by a particular user or software. Surprisingly, as the f$ kind of software, it may include many of the ancient and broadcast of each certification technology. For example, by tracking which technology, which is used by 414, a software providing unit 742 can determine when the device is to be released by the protected software 520 in the future. Seven techniques will continue to be provided, and the second embodiment of the software transaction system includes an easy method. First, in step 632, a protected party and two parties are handed over to the second party. In the previous embodiment, the transmitting party transmits one or more technical restrictions associated with the technique 524. The software 520 includes 634, the second direction one or more third party registrations + two = two $ registration The step party records the registration information. Next, in the second step of the lifting of the f 2 technique J24. The third party applies for a release mechanism related to a particular technology. Very second, one direction third received and used to lift a technical limit 526. Finally, ^, the release mechanism will be paid by the first party for an authorization fee to the third party. In the payment step 638, the protected software of the specific embodiment in the second embodiment of the software transaction system is the same. Therefore, the same function as described above is also as described in the first embodiment. In the second specific embodiment of the software, the second party of the protected software 520 (using the unit 414 for the authorization fee of the private direct payment technology) is not (may be software) The supplier or the technical two parties register the payment technology with a third party (such as a software supplier) according to an actual demand. After that, the third party authorizes the fee to the third party (you can pay for the registration information related to η 524). Holder) The registration information 762 includes the first note > information. The first registration information is generated, and the second registration may include the subsequent registration 528 for the first time to receive the authorization confirmation. 卩, & 4, $ The second party generates the registration information from the second party's registration program from the second party's registration program 52^^^, and the third body usage unit 414 can reinstall the soft acceptance authorization. For example, soft 528 Re-accepted the authorization confirmation, this ^ 彳 苐 苐 苐 从 从 从 从 从 从 从 从 从 从 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 第二 技术 技术 技术 技术 技术 技术 技术 技术Or :j to provide an interactive machine at the same time to cut off the younger brother and the younger brother can ask for example '; mutual-two system === service qi technology ninth figure is the third implementation of a three-party trading system The three parties include a body $ unit 742, a software usage unit 414, and one or more software components f 746: the software providing unit 742 provides the protected software 52 to the software usage unit 414. Software 520 includes one or more functions 522, one or more techniques 524, one or more technical limitations 526, and one or more registration programs 528. Each technical limitation 526 is used to limit one or more techniques 524. The parent-function 522 uses one or more techniques 524, and each technique 524 is used by one or more functions 522. Each registration program 528 is used to relieve one or more techniques 5 2 4 Technical Restrictions 5 2 6. Each software registration unit 746 provides a registration information 762 provided by the registration program 528. Each registration unit 746 records the registration information 762 after registration of the technology 524. In the software transaction system Three concrete The protected software 52〇 of the embodiment is the same as the first embodiment of the first 24 1267753, the first soft body 520 can be the protected software 520 in the embodiment. The protected, or other known mechanism can be The road download, the random bonus, and the physical transfer use unit transfer mode are transmitted by the software providing unit 742 to the soft fee. It is worthy of the injection of the sputum 742 to control the payment to the software use unit 414. The software registration is skillful in the art. The trick is that the payment method is not subject to the technical restrictions of unit 414 to control the entire registration process and to remove a software usage meta-414 access, its difficult process. The software registration unit 746 can be used by the software using a single electronic signal, a remote dt network, a telephone, a mail, a voice delivery, a letter, a carrier, a storage medium, or other known means. The ItU 62 is registered once, stored by the Soft & Body Note Unit 746, which may include the registration information 762 of the 414th-technical. By using the same-software single-registration information 762 note, you can charge only once or repeatedly. The registration of the first unit 414, the % registration number* 746, receives an authorization confirmation via the production of the software usage information 762. The subsequent use of the single-use 2, the software-based software registration unit 746 via soft, the software uses the single IfH' to receive the - authorization confirmation again. For example, 746 uses the unit via the software; and the software registration unit marries, this is a refillable program 528, which again receives an authorization fee. The software registration unit ^^; technology can only request the authorization of the payment unit 742 to support the H soft $ supply * 742 it payment, or the mechanism of the software promotion to the second party, red, body; ^ Early 70 746 can provide a mutual 746 release at the same time. For example, 'f supply, technology 524 is a software registration unit or a special offer. The ''interaction mechanism' may include customer service, advertising, and disclosure to the preferred embodiment, not in the scope of use. Further, the double-twisted decoration should be included in the following patent application. [Brief Description of the Drawings] Many aspects of the present invention can be more clearly understood by referring to the following drawings. 25 1267753 The related drawings are not to scale and the effect is only to clearly illustrate the invention. Also, numbers are used to indicate the corresponding parts of the drawing. Correlation, an A diagram, a software authorization system diagram in the prior art; a B diagram is a diagram of an accompanying software authorization system in another prior art; a first embodiment is a specific embodiment of a software authorization system Bean II records 1 (first (7) software products (4) The second B diagram is a specific embodiment of a software authorization system, where a third party (third provides the accompanying software to the first party, and the second party records the first The registration fee of the party is paid to the fourth party (f〇urth party) for the authorization fee of this technology; and the specific embodiment of the soft fn system is provided, wherein the third party provides the fee for the four-party authorized registration technology; The second embodiment is a specific embodiment of a software authorization system, and the registration information recorded by the party is used to pay the fourth party fee. The second embodiment of the software authorization system is recorded by the first embodiment. The registration information is used to pay the fourth party fee. The second diagram is a system flow chart of a software authorization system and method. ^ Four diagrams describe one specific embodiment of the software authorization system. The diagram is a flow chart for demonstrating execution. Soft software Each step of the step system (e.g., system and method of the present invention as described); brother / INTRODUCTION prior art overview is described in FIG software transaction system (s〇hware trading system) in tripartite;

其中第三方根據 其中第三方根據 ^七A圖係展示在一軟體交易系統中受保護的軟體; 二七β-係一軟體父易系統中第一具體實施例流程圖; 圖係一軟體交易系統中第二具體實施例流程圖;以及 苐九圖描述一軟體交易系統中第三具體實施例。 【主要元件符號說明】The third party according to the third party according to the ^7 A system is displayed in a software trading system protected software; the second seven beta-system software parental system in the first embodiment of the flow chart; Figure one software trading system A flow chart of a second specific embodiment; and a nine-figure diagram depict a third embodiment of a software transaction system. [Main component symbol description]

使用者10 隨附軟體12 技術持有者30 電腦系統100 技術模組107 軟體產品11 軟體供應商20 硬體供應商40 功能模組106 軟體產品110 26 1267753 通訊網路112 技術持有者(第四方)120 數字碼131 註冊資料庫133 註冊資料交換中心140 使用者(第一方)160 單一使用者14 技術162 軟體182 受保護軟體520 技術524 註冊程式528 軟體註冊單元746 電話網路113 解除機制130 原始碼132 註冊資訊134 軟體供應商(第二方)150 硬體供應商(第三方)170 技術持有者16 軟體供應商18 軟體使用單元414 功能522 技術限制526 軟體提供單元742 註冊資訊762User 10 Software included 12 Technology holder 30 Computer system 100 Technology module 107 Software product 11 Software supplier 20 Hardware supplier 40 Function module 106 Software product 110 26 1267753 Communication network 112 Technology holder (fourth Party) 120 Number Code 131 Registration Database 133 Registration Data Exchange Center 140 User (first party) 160 Single User 14 Technology 162 Software 182 Protected Software 520 Technology 524 Registration Program 528 Software Registration Unit 746 Telephone Network 113 Release Mechanism 130 Source code 132 Registration information 134 Software supplier (second party) 150 Hardware supplier (third party) 170 Technology holder 16 Software supplier 18 Software unit 414 Function 522 Technical limitation 526 Software providing unit 742 Registration information 762

2727

Claims (1)

1267753 十、申請專利範圍: 上之軟體執行方法’該方法包括: 方所ii 行—軟體例行程序,其中該請求係由-第一 否需要付費給-第三方;以及 -方所請求,且該通以用一以!=體=程:已經被該第 要求該第二方支付執行該軟體以表明該第三方 方係為一技術 以請===:,其_ 一電腦硬體供應商;以及 一軟體供應商。 利1ϋί 1項所述之方法,其中該第二方係為-電腦 更體供應商,且該第三方係為一軟體供應商。万係為電 4·如:,f圍ί 1項所述之方法,該方法更包括以…: 方。义,°"人-例仃程序的使用,直到該通知已經傳送至1亥第二 在授權Μ,該軟體包括至少-傳送-對-=之 技術必严經由註冊才能夠使用至少一i功能:乂換中心,其中該 將該必須經由註冊才能鈞 '、 冊資訊編譯至-註冊資料庫用至少—項功能之技術之相關註 少一?功能之使用限制的訊息; 使用狀況。、' 所編澤的註冊資訊來決定該技術之實際 6·如申請專利範圍第5項所沭 #七$ 提供付費給一技術持有J之巧:;以包括以下步驟: 使用狀況。 /、中4付費係基於該技術之實際 281267753 X. Patent application scope: Software implementation method 'This method includes: a line-by-way software-software routine, where the request is made by - the first no need to pay to - a third party; and - the party requests, and The pass uses a != body=程: the second party has been required to pay the execution of the software to indicate that the third party is a technology to please ===:, its _ a computer hardware supplier ; and a software supplier. The method of claim 1, wherein the second party is a computer body supplier and the third party is a software supplier. 10,000 is the electricity 4 · such as:, f ί 1 method, the method further includes ...: square. The use of the right-of-one-case program until the notification has been transmitted to the 1st second is authorized, the software includes at least the -transfer-pair-= technology must be registered to be able to use at least one i function : 乂 change center, which should be registered by the 钧', the book information compiled to - the registration database with at least - the function of the technology is less concerned about one? Information on the use of features; usage status. , 'The registered information is used to determine the actuality of the technology. 6. If the scope of the patent application is 5, #七$ provides payment to a technology holding J:: to include the following steps: Usage. /, 4 pay is based on the actuality of the technology 28
TW93125155A 2004-08-20 2004-08-20 System and method for licensing software TWI267753B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW93125155A TWI267753B (en) 2004-08-20 2004-08-20 System and method for licensing software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW93125155A TWI267753B (en) 2004-08-20 2004-08-20 System and method for licensing software

Publications (2)

Publication Number Publication Date
TW200608227A TW200608227A (en) 2006-03-01
TWI267753B true TWI267753B (en) 2006-12-01

Family

ID=38220441

Family Applications (1)

Application Number Title Priority Date Filing Date
TW93125155A TWI267753B (en) 2004-08-20 2004-08-20 System and method for licensing software

Country Status (1)

Country Link
TW (1) TWI267753B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013061992A (en) * 2009-03-16 2013-04-04 Apple Inc Application products with in-application subsequent feature access using network-based distribution system
TWI416343B (en) * 2007-10-05 2013-11-21 Chi Mei Comm Systems Inc System and method for customizing function groups in a user interface
TWI484364B (en) * 2007-06-25 2015-05-11 Microsoft Corp Activation system and method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113112262B (en) * 2021-04-30 2023-07-25 支付宝(杭州)信息技术有限公司 Digital asset circulation method corresponding to intellectual property

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI484364B (en) * 2007-06-25 2015-05-11 Microsoft Corp Activation system and method
US9881348B2 (en) 2007-06-25 2018-01-30 Microsoft Technology Licensing, Llc Activation system architecture
TWI416343B (en) * 2007-10-05 2013-11-21 Chi Mei Comm Systems Inc System and method for customizing function groups in a user interface
JP2013061992A (en) * 2009-03-16 2013-04-04 Apple Inc Application products with in-application subsequent feature access using network-based distribution system

Also Published As

Publication number Publication date
TW200608227A (en) 2006-03-01

Similar Documents

Publication Publication Date Title
US9015696B2 (en) System and method for licensing software
EP1684223A1 (en) System and method for licensing software
US9875312B2 (en) System and devices for digital media distribution
US6882979B1 (en) Generating revenue for the use of softgoods that are freely distributed over a network
JP4005619B2 (en) Secure transaction management device and system and method for electronic rights protection
US20050234826A1 (en) Storage medium rental system
JP3701350B2 (en) Content sales period verification terminal and center, and content decryption key expiration date verification terminal
WO2004066154A1 (en) Content delivery system, information processing apparatus or information processing method, and computer program
JP2011523113A (en) Digital content library service
EP1700302A1 (en) Secure multimedia content delivery on storage media
CN101036099A (en) Centralized management of digital rights licensing
JP2002541528A (en) Protected online music distribution system
US20080313084A1 (en) Digital Content Royalty Management System and Method
WO2012014311A1 (en) Content sale promoting system in which digital copyright management and affiliate are integrated, and information processing method
JPH0855021A (en) Key authentication system
TWI267753B (en) System and method for licensing software
EP1249771B1 (en) Large capacity data sales/mediation/purchase method, system, server, terminal and recording medium recording program thereof
CN1759363A (en) Distribution and rights management of digital content
JP2001297262A (en) Method for charging use fee of literary work, network system used for the same, and recording medium with recorded control program
JP2002140637A (en) Device and method for electronic data rental and computer readable recording medium with electronic data rental program recorded thereon
JP2003331145A (en) Method and program for selling contents
JP2006215890A (en) Software licensing system and method
KR20090057981A (en) Transferring licensed digital content between users
JP4932777B2 (en) Software execution method
KR100698903B1 (en) Methods for creating and playing intelligent contents that enables copyright management, and a recording media recorded with a program for the same