EMPATHIC VALIDATION - A METHOD FOR SECURING DIGITAL ASSETS
BACKGROUND OF THE INVENTION
Field of the Invention
This invention relates generally to electronic data processing systems and in particular to securing data transferred in electronic commerce.
Related Art
Protection of digital assets (e.g., a database, source code, object code, executable code, i-nomes, copyrighted jingles, graphic chip designs, test vectors, mechanical drawings, simulation data, gene sequences, corporate policies, legal documents, plans for nuclear reactors, circuit schematics, 3D models, manufacturing processes, chemical formulas and synthesis methods, drug design, empirical research data, drug test results, etc.) is becoming increasingly important. Currently, digital assets are protected using a variety of methods such as encryption of the assets, restricted use of the assets, handicapping the functionality of the assets, and through legal means. However, each of these existing methods have disadvantages, especially when the digital assets must be tested, used, viewed, or otherwise disclosed in an uncontrolled environment before they are purchased.
For example, digital assets are often provided to prospective purchasers before a purchase is actually made so that the purchaser can test, use, and/or view or otherwise be assured that the asset functions properly. This may be the case when a purchaser wants to purchase a
new software program from a software developer. If the digital asset is in a readily copyable form (e.g., source code) , the prospective purchaser may secretly copy, reverse engineer, or otherwise misappropriate the digital asset without ever purchasing it. Encryption cannot protect the digital asset in this instance since the digital asset must be unencrypted prior to testing. Restricting the use of the asset is also difficult since the software is in the hands of the prospective purchaser and not the software developer. Handicapping the functionality of the asset is problematic since the asset must ordinarily be transferred to the prospective purchaser, and while in the hands of the prospective purchaser, the handicapping mechanism may be covertly defeated. Finally, protecting the digital asset through legal means is difficult since a prospective purchaser may copy, reverse engineer, or otherwise misappropriate the digital asset in a clandestine way, therefore providing no indication to the software developer that their legal rights have been violated.
In addition, purchasers and providers of digital assets may be in geographically remote locations, thereby making direct communications difficult.
Accordingly, there is a need for a method and system that allows digital assets to be tested, used, or viewed while protecting the digital assets from being copied, reverse engineered, or otherwise misappropriated.
SUMMARY OF THE INVENTION
The invention provides a method and system for sharing digital assets between solution providers and solution shoppers using a solution broker. A session is initiated between the solution providers and the solution shoppers. During the session, a data communications link
between the solution shoppers and the solution providers is provided. The solution broker administers the flow of data between the solution providers and the solution shoppers over the data communications link. The solution shoppers are allowed to access the digital assets provided by the solution providers. Thus, the present invention provides access to digital assets while, at the same time, protecting the digital assets from being copied, reverse engineered, or otherwise misappropriated. In addition, the present invention allows solution shoppers and solution providers to share digital assets regardless of their respective geographical locations.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a block diagram showing an empathic validation system, in accordance to an embodiment of the present invention.
FIG. 2 is a flowchart illustrating a method for sharing digital assets in accordance to the present invention. FIGS. 3A-3D illustrate different ways in which solution shoppers and solution providers can communicate during a session, in accordance to embodiments of the present invention.
FIGS. 4A and 4B show two ways in which control tokens can be used in accordance to the present invention.
FIGS. 5A-5D show how parameters are used to control the portions of a screen viewed by solution shoppers during a session, in accordance to the present invention.
FIGS. 6A-6C illustrate where digital assets are stored during a session, in accordance to the present invention .
DETAILED DESCRIPTION OF THE INVENTION
General Operation
FIG. 1 illustrates an empathic validation system m accordance to the principles of the present invention. The empathic validation system of FIG. 1 includes solution shoppers 10 On (where n = A, B, C, D etc.) , a solution broker 110, and solution providers 120U (where n = A, B, C, D etc. ) .
Solution shopper lOOn is a person or entity that desires certain digital assets. As used herein, the term "digital assets" describes any information that may be digitized and stored on a computer readable storage medium (e.g., a dataoase, source code, object code, executable code, l-nomes (any transactable quantity of information), copyrighted j ingles, graphic chip designs, test vectors, mechanical drawings, simulation data, gene sequences, corporate policies, legal documents, plans for nuclear reactors, circuit schematics, 3D models, manufacturing processes, chemical formulas and synthesis methods, drug design, empirical research data, drug test results, etc.). Solution broker 110 is a person or entity that connects or matches solution shopper lOOn to solution provider 120U. Solution broker 110 administers the flow of data between solution shopper lOOn and solution provider 120U. Solution provider 120U is a person or entity that possesses digital assets, which are desired by one or more solution shoppers lOOn.
In one example of the invention, solution shopper lOOn, solution broker 110, and solution provider 120U each comprise a computer system. Solution shopper lOOn is connected to solution broker 110 through data communications link 130, and solution broker 110 is connected to solution provider 120U through data communications link 135. Data communications links 130 and 135 may oe telephone networks, a wireless networks,
local, wide or global area computer networks (including the Internet) , or any other computer network connection or communications link and/or any combination thereof known in the art . FIG. 2 is a flowchart illustrating a method for sharing digital assets in accordance to the present invention. In Step 10, solution shopper lOOn makes a request for certain digital assets. For example, solution shopper lOOn can request digital assets through a Web site provided by solution broker 110. Solution shopper lOOn first connects to the solution broker's web site. On the Web site, solution broker 110 provides a request page that allows solution shopper lOOn to enter information or criteria that describes the type of digital asset desired. After inputting the information, solution shopper lOOn submits the information to solution broker 110. It should be apparent to those skilled in the art that there are many other ways for solution shopper 10On to request digital assets. In Step 20, solution broker 110 processes the request from solution shopper lOOn. Solution broker 110 uses the information or criteria provided by solution shopper lOOn to match solution shopper lOOn to one or more solution providers that possess digital assets that meet the solution shopper's criteria.
One way of matching solution shopper 10On to solution provider 120U is to have solution broker 110 display the solution shopper's criteria on the solution broker's web site. A potential solution provider 120U could then access the solution broker's web site, search the site for certain criteria, view the criteria, and determine whether or not it has digital assets that fulfill the solution shopper's criteria. If solution provider 120U determines that it possesses digital assets that fulfill the solution
shopper's criteria, solution provider 120U can then take further steps to contact solution shopper lOOn (as described below) .
An alternative way of matching solution shopper lOOn to one or more solution providers is for solution broker 110 to determine whether any solution providers possess digital assets that meet the solution shopper's criteria. In making this determination, solution broker 110 may find that: (1) multiple solution providers 120U meet the solution shopper's criteria; (2) no solution providers 120U meet the solution shopper's criteria; or (3) more information is needed to determine whether any solution providers 120U meet the solution shopper's criteria.
If multiple several solution providers 120U meet the solution shopper's criteria, solution broker 110 may determine which solution provider 120U is most likely to meet the solution shopper's criteria. Alternatively, solution broker 110 may contact solution shopper 10 On and allow solution shopper lOOn to determine which solution provider 120U is most appropriate. In yet another scenario, solution broker 110 may request more detailed information from solution shopper 10On such that a more appropriate solution provider 120U can be determined.
If no solution providers 120U meet the solution shopper's criteria, solution broker 110 may request additional information from solution shopper 10On and use this information to ascertain whether there may be an appropriate solution provider. Solution broker 110 may also log the solution shopper's criteria, and contact the solution shopper lOOn at later date if solution broker 110 finds a solution provider 120U that meets the solution shopper's criteria.
Solution broker 110 may also determine that more information is needed to find an appropriate solution provider 120U. In this case, solution broker 110 can contact solution shopper lOOn and request more detailed request information.
With respect to Step 20, two examples have been described above showing how solution shopper lOOn can be matched to a solution broker 120U. It should be apparent to one skilled in the art that these examples are only two of many different ways to match solution shopper lOOn to one or more solution providers 120U, and that these two examples are in no way intended to limit the spirit or scope of the present invention.
After a solution provider 120U and a solution shopper lOOn have been matched, a session is initiated between solution shopper lOOn and solution provider 120U. This is shown in Step 30. A session allows solution shopper lOOn and solution provider 120U to share digital assets in a controlled environment. During the session, solution provider 120 retains possession and/or control of the digital assets while allowing solution shopper lOOn to test, use, and/or view the digital assets. During the session, solution broker 110 administers the flow of information between solution shopper lOOn and solution provider 120U. The identity of solution shopper lOOn may be withheld from solution provider 120U during the session. Similarly, the identity of solution provider 120U may be withheld from solution shopper lOOn during the session. In one example of the invention, solution shopper lOOn and solution provider 120U make an appointment. The appointment specifies the date and time a session will take place. At the time of the appointment, solution shopper lOOn connects to solution broker 110 via data
communications link 130, and solution provider 120U connects to solution broker 110 via data communications link 135. For example, solution shopper 110 and solution provider 120U can both connect to a solution broker's Web site. After solution shopper lOOn and solution provider 120U connect to solution broker 110, solution broker 110 connects solution shopper lOOn and solution provider 120U. Solution broker 110 then administers the flow of information between solution shopper lOOn and solution provider 120U.
During the session digital assets are shared among solution shopper lOOn and solution provider 120U according to parameters defined by solution provider 120U. The parameters define which digital assets solution shopper lOOn is entitled to test, use, and/or view during the session. Normally, all or a significant portion of the digital assets will remain in the possession of solution provider 120U during the session. The digital assets may reside on the solution provider' s computer system. Alternatively, the digital assets may reside on a neutral third party' s computer system or even the solution broker's computer system. In all cases, however, possession and control of the digital assets are not turned over to solution shopper lOOn. Rather, possession and control is retained by solution provider 120U. This technique allows solution shopper 10 On to test, use, and/or view the digital assets and therefore be assured that the digital assets meet the solution shopper's required criteria. At the same time, this technique assures solution provider 120U that the digital assets will not copied, reverse engineered, or otherwise misappropriated by solution shopper lOOn.
After solution shopper lOOn has tested, used, and/or viewed the digital assets, solution shopper may agree to
purchase the digital assets from solution provider 120U. At this time, solution provider 120U may transfer the digital assets to solution shopper lOOn.
To this point, the general operation of the present invention has been disclosed. The following sections of the disclosure will discuss particular aspects of the present invention in greater detail.
Communications During A Session
FIGS. 3A-3D illustrate different ways in which solution shopper lOOn and solution provider 120U can communicate during a session. Communicating during a session is advantageous for many reasons. For example, solution shopper 10On may need instructions on how to use or test the digital asset possessed by solution provider 120U. Likewise, solution shopper lOOn may need to ask questions that require immediate response while testing, using, and/or viewing the digital asset.
FIG. 3A shows one way of communicating during a session. Here, a text based system is used to send messages back and forth between solution shopper lOOn and solution provider 120U. Solution shopper lOOn types questions and sends the questions to solution provider 120U. Solution provider 120U answers the questions and sends answers back to solution shopper lOOn. The text messages can be multiplexed over data communications links 130 and 135 or can be sent via conventional email.
FIG. 3B shows another way of communicating during a session. Here, voice device 140 is connected to the solution shopper's computer system and voice device 145 is connected to the solution provider's computer system. The voice devices digitize speech and the-digitized speech is sent over data communications links 130 and 135 on an audio channel. As a result, solution shopper lOOn can
speak with solution provider 120U and vice versa during the session in a convenient and efficient manner.
FIG. 3C illustrates another way of communicating during a session. Here, solution shopper lOOn and solution provider 120U communicate using conventional telephone link 150. Similarly, m FIG. 3D the solution shopper lOOn and the solution provider 120U communicate using cellular telephone link 160. Both methods allow solution shopper 100 and solution provider 120 to communicate m a convenient and efficient manner.
Control Tokens
The present invention makes use of control tokens m several ways. In general, control tokens are generally used to solve contention problems. A person or entity that possesses the control token has control of a specific task to the exclusion of all other persons or entities that may desire control of that specific task. Once the token is relinquished, other persons or entities can gain control of the token, and therefore control of the task. FIG. 4A illustrates one way control tokens are used m the present invention In this example, tokens are used to control access to the digital assets provided by a solution provider. This example assumes that only one solution shopper can have access to a solution provider' s digital assets at a time. In other words, if multiple solution shoppers want access to a particular solution providers' digital assets, the solution shoppers wij.1 have to access these assets one at a time. Referring to FIG. 4A, Solution Shopper #1 has possession of control token 170, and therefore can access the digital assets of
Solution Provider #1. Solution Shoppers #2 through #N do not have possession of control token 170, and therefore cannot access the digital assets provided by Solution
provider #1. When Solution Shopper #1 relinquishes control of control token 170, one of the other solution shoppers can seize control token 170 and gain access to Solution Provider #l's digital assets. FIG. 4B illustrates another way in which control tokens can be used in the present invention. In this example, audio control token 180 is used to control audio. For example, in FIG. 4B Solution Shoppers #1 through #N are simultaneously participating in a session with Solution Provider #1 (this example assumes that multiple solution shoppers can access the solution provider's digital assets simultaneously) . Solution Provider #1 uses the audio control token 180 to allow only one of the solution shoppers to "talk" at any one time. In FIG. 4B, Solution Shopper #1 possesses audio control token 180.
Thus, Solution Shopper #1 can communicate via audio with Solution Provider #1 whereas Solution Shoppers #2 through #N cannot communicate via audio with Solution Provider #1 (even though they are participating in a session with Solution Provider #1) . This technique prevents the obvious problem of having more than one solution shopper talking at the same time.
In this example, there are numerous ways to determine possession of audio control token 180. The solution provider may have absolute control over the audio token thereby having the ability to take the token away from a solution provider at any time. Alternatively, a queue may be provided for solution shoppers to request control of the audio token. When the token becomes available (e.g., another solution shopper has relinquished control of the token) , the first solution shopper in the queue can take control of the token and therefore speak to the solution provider. Yet another way to determine possession of the audio control token would be by creating a hierarchy of
control among solution shoppers or groups of solution shoppers . Solution shoppers that are higher on the hierarchy would be able to take control away from solution shoppers that are lower on the hierarchy. Control can also be tied to keyboard or mouse control.
Those skilled in the art will appreciate that there are many different ways to allocate control of the audio control token. In addition, those skilled in the art will appreciate that there are many other ways control tokens can be used in accordance with the spirit and scope of the present invention.
Parameters
As mentioned above, digital assets are shared during a session according to parameters defined by solution provider 12OU. As used herein, the term parameters is broadly defined as the digital assets solution shopper lOOn is entitled to test, use, and/or view during a session. Thus, parameters are used to allow solution shopper lOOn to test, use, and/or view the digital assets while protecting the digital assets from being copied, reverse, engineered, or otherwise misappropriated by solution shopper lOOn. One skilled in the art will recognize that there are numerous ways to define parameters . FIGS. 5A-5D show how solution provider 120U can use parameters to control which portions of a screen can be viewed by solution shopper lOOn during a session. FIG. 5A shows computer screen 200 with circular window 190 covering a portion of the screen. The portion of computer screen 200 that lies outside of circular window 190 is obscured (i.e., it cannot be viewed) while the portion of computer screen 200 that lies inside of circular window 190 is not obscured (i.e., it can be viewed) . Solution
provider 120U can move circular window 190 using a mouse or using keystrokes. This allows solution provider 120U to control the areas of computer screen 200 that can be viewed. FIGS. 5B, 5C, and 5D show how solution provider 120 can, at his discretion, move circular window 190 throughout the screen allowing solution shopper lOOn to view only selected portions of the screen. This technique may be particularly useful when solution shopper 100 is viewing very sensitive material (e.g., source code) and solution provider 120U wants to retain maximum control over that material. Thus, in FIGS. 5A-5D the solution provider can slowly move the circular window across the computer screen allowing the solution shopper to read the sentence "This is a secret" one word at a time.
The window can be any shape or size and may zoom-in or zoom-out. The window may also be toggled on or off using a key on a computer keyboard, thereby allowing the solution provider to turn on or off the obscuring feature manually during a session.
Solution provider 120U can also use parameters to limit access by creating user accounts. Each user account corresponds to a particular solution shopper or to a group of solution shoppers . Each user account may have a different set of parameters which define the degree of access the solution shopper or group of solution shoppers will have to certain digital assets. For example, one user account may allow a solution shopper (or group of solution shoppers) the right to view a certain digital asset whereas another user account may allow a different solution shopper (or group of solution shoppers) the right to view and use the same digital asset . User accounts may also define permissions given to directories and files (e.g., permission to read, write, and/or execute) .
In another example of the invention, a graphical user interface (GUI) may be provided by solution broker 110 or solution provider 120U. The GUI allows solution shopper lOOn to request access to the digital assets that it cannot currently access. Solution provider 12 OU then receives the request and determines whether or not access to the digital assets should be granted. The GUI therefore provides a dynamic mechanism for changing parameters and therefore granting greater access during a session.
Those skilled in the art will appreciate that there are many different ways to define parameters, and therefore define which digital assets solution shopper lOOn is entitled to test, use, and/or view during a session.
Session Monitoring, Recording And Storing
The activities that take place during a session can be monitored, recorded, and stored. Monitoring may be used in different ways for different reasons. Monitoring may be necessary to assure solution provider 120U that solution shopper lOOn is not attempting to surreptitiously access any digital assets that he is not authorized to access. Some solution shoppers 10On may attempt to "hack" or defeat the parameters or safety measures set up by solution provider 120U. Solution provider 120U, solution broker 110, or a third party may, therefore, monitor the solution shopper's activities during a session. This may be accomplished automatically using a computer program designed to monitor such activities, or it may be accomplished manually by having a human operator observe the solution shopper's activities. If solution provider 120U is monitoring solution shopper lOOn and becomes aware that solution shopper lOOn is
acting m a suspicious or undesirable manner, solution provider 12 OU can send a warning to solution snopper lOOn or terminate the session. Similarly, if solution broker 110 or a third party is monitoring solution snopper lOOn and becomes aware that solution shopper lOOn is acting in a suspicious or undesirable manner, solution broker 110 or the third party can terminate the session, send a warning to solution shopper 110, or notify solution provider 120U of solution shopper's conαuct . In one example of the invention, a computer program resides on the solution provider's computer system and allows the solution shopper's activities (e.g., keystrokes, mouse movements, etc.) to be displayed on the solution provider's computer screen. A similar program may be used by solution broker 110 or a third party to monitor solution shopper lOOn.
Monitoring may also be necessary to assure solution shopper lOOn that solution provider 120U is not attempting to falsify, fabricate, or otherwise misrepresent the digital asset. A computer program may be provided that displays the solution provider' s activities during the session thereby giving solution shopper lOOn some assurances that the digital asset is not being misrepresented in any way. A similar program may be used by solution broker 110 or a third party to monitor solution provider 120U.
The data transferred during a session or specific events which take place during a session may also be recorded and stored by solution shopper lOOn, solution broker 110, solution provider 120U, or a third party. The stored recordings can be used for a variety of purposes including: allowing solution provider 120U to review the portions of the digital asset which were disclosed during a session; allowing solution provider 120U to review the
solution provider's activities during the session; or allowing solution shopper lOOn to review the solution provider's activities during tne session.
Those skilled in the art will appreciate that there are many other different ways to monitor, record, store the activities m accordance with the present invention.
Location Of The Digital Assets During A Session
In general, the digital assets provided by the solution provider are located on a computer system under the control of the solution provider. Thus, the solution shopper will not have possession of the digital assets during a session.
FIG. 6A illustrates the typical case where digital assets 210 reside on the solution provider's computer system during a session. FIG. 6B illustrates the case where digital assets 210 reside on the solution broker' s computer system. FIG. 6C illustrates the case where digital assets 210 reside on a neutral third party's computer system during a session. Often solution shopper lOOn will test, use, and/or view the digital asset on the solution provider' s computer system. But, prior to purchasing the digital asset, the solution shopper may want to be assured that the solution provider' s digital assets function properly when the digital assets are located on a different computer system. Since the solution provider will not allow the solution shopper to transfer the digital assets onto the solution shoppers' computer system for fear of misappropriation, a compromise can be reached by placing the digital assets on either the solution broker's computer system (FIG. 6B) or a neutral third party's computer system 220 (FIG. 6C) and then allowing solution shopper lOOn to test, use, and/or view the digital asset there. Note that solution provider
120U still defines the parameters and thus can limit the solution shopper's access to the digital assets in these cases .
Examples of The Present Invention In Practice Applicants have provided several examples below demonstrating practical applications of the present invention. As should be apparent to one skilled in the art, the present invention has numerous applications. Accordingly, the examples provided below are in no way intended to limit the sprit or scope of the present invention.
Database Example
Suppose a solution shopper has requested marketing information which includes the names and addresses of Los Angeles residents that have purchased automobiles over the Internet in the past year. Further suppose that a solution provider has a database that contains this information. Prior to purchasing the database information, however, a solution shopper would like to see a small sample of the database, for example, the names and addresses of people that live on a particular street in Los Angeles that have purchased automobiles in the past year. Without revealing the contents of the entire database, the solution provider can define parameters which will only allow the solution shopper to view the names and address of the people that live on that particular street in Los Angeles . The buyer could then randomly select one of the entries and confirm that this person had in fact purchased an automobile over the Internet in the past year. Thus, this technique gives the solution shopper ample proof that the database is legitimate while, at the same time, assuring the solution
provider that the database will not be copied or otherwise misappropriated .
Software Program Example
Suppose that a solution shopper wants to purchase a new software program. However, prior to purchasing the program the solution shopper requires proof that the program complies correctly. At the same time, the solution provider does not want to present the source code to the solution shopper since the solution shopper may copy, reverse engineer, or otherwise misappropriate the source code without the solution provider's permission. In this case, the solution shopper can initiate a session through a solution broker. The solution provider can define parameters that grant the solution shopper limited access to the source code. This limited access will allow the solution shopper to log onto the solution provider' s computer system and remotely compile the source code thereby verifying that the source code will indeed compile correctly. As a result, the solution shopper is assured of a working product, while the solution provider is assured that their source code has not been copied, reverse engineered, or otherwise misappropriated.
Verification Example
Suppose a solution shopper is a company that uses software products to verify that its designs work (e.g., a semiconductor design company) . Rather than purchasing an expensive software verification product, the solution shopper could submit its design to the solution provider through the solution broker and have the solution provider process the design data. The results of the simulation or verification could then be sent back to the solution shopper. This could result in cost savings to the solution shopper since the solution shopper would not have
to purcnase the solution provider's verification software. Rather, the solution shopper would only neeα to "rent" the software for a short period of time. This scenario results in a more efficient use of resources and is thus very desirable.
In a different scenario, the solution shopper may want to purchase a design simulation or verification software program, but may want to test the program before purchasing it. Here, the solution shopper would submit a request to a solution broker. The solution broker would then identify a solution provider that meets the needs of the solution shopper. Next, the solution broker would initiate a session between the solution shopper and the solution provider which would allow data to be transmitted from the solution shopper to the solution provider and vice versa.
The amount of data that is transmitted from the solution provider to the solution shopper, however, is restricted using parameters. This is accomplished by manually or automatically restricting the portions of data that can be transferred from the solution shopper to the solution provider. The restriction mechanism can be resident on either the solution provider' s computer system or the solution broker's computer system. To further illustrate how parameters can be used to restrict access, suppose that a solution shopper wants to purchase a new software program, but, prior to purchasing the program the solution shopper requires proof that the program complies correctly. At the same time, the solution provider does not want to present the source code to the solution shopper since the solution shopper may copy, reverse engineer, or otherwise misappropriate the source code without the solution provider's permission. In this case, the solution shopper can contact the
solution broker and have the solution broker initiate a session. The solution shopper can then connect to the solution provider's computer system. Then the solution shopper will be granted limited access to the source code, and will be allowed to compile the source code on the solution provider' s computer system and to verify that the code will indeed compile correctly. Thus, the solution shopper is assured of a working product, while the solution provider is assured that their source code has not been copied, reverse engineered, or otherwise misappropriated .
Encryption Example
Suppose the solution shopper has an encrypted file in its possession. Further suppose that the solution shopper cannot unencrypt the file and does not know anyone who can unencrypt the file.
According to the principles of the present invention, the solution shopper can connect to a solution broker. The solution shopper can request a program that will unencrypt the file. The solution broker can then post the request on its web site or it can seek out a potential solution provider. If a solution broker has a program that can unencrypt the file, the solution broker can contact the solution shopper and set up an appointment to conduct a session.
In the session, the solution provider can allow the solution shopper to test, view, and/or use the program so that the solution shopper can be assured that the program in fact works. If the solution shopper requires further assurances the program works prior to purchasing the program, the solution shopper can request to test, view, and/or use the program on a neutral third party' s computer system. If the solution provider agrees, the solution
provider can transfer the program to a neutral third party' s computer system. Note that the solution provider can still limit the solution shoppers access to the program on the third party's computer system. If the solution shopper is satisfied with the program after further testing, viewing, or using and if the solution shopper and the solution provider agree on a price for the program, a sales agreement is then executed. Thereafter, the program is transferred to the solution shopper, and the solution shopper can use the program in accordance with the sales agreement .
Remote Diagnosis And Troubleshooting Example
The present invention can also be used for remote diagnosis or troubleshooting of a digital asset. In this case, the solution shopper possesses a digital asset, but needs a solution provider to diagnose and possibly fix the problem. Note that in this case it is the solution shopper and not the solution provider that is in possession of the digital asset. Accordingly, the solution shopper will define the parameters to limit the solution provider's access to the digital assets.
To illustrate, suppose a solution shopper has a computer program that is not working correctly on the solution shoppers computer system. The solution shopper can make a request, via a solution broker, for a solution provider that can diagnose the problem with the computer system and possibly fix the problem. In this case, the solution shopper and the solution provider will initiate a session through the solution broker. However, the solution shopper will define parameters and limit access to its computer system. Thus, the solution provider will only be able to access portions of the solution shoppers computer system, those portions that are necessary to
diagnose and possibly fix the problem. During the session, the solution provider will attempt to diagnose the problem and possibly fix it. If the solution provider cannot diagnose the problem the solution shopper may terminate the session and perhaps have another solution provider attempt to diagnose and fix the problem.
While particular examples of the present invention have been shown and described, it will be obvious to those skilled in the art that changes and modifications may be made without departing from this invention in its broader aspects and, therefore, the appended claims are to encompass within their scope all such changes and modifications as fall within the true spirit and scope of this invention.