throbber
W0 92/20022
`
`PCT/US92/03812
`
`21/32
`
`
`
`
`
`.._<ZO_._.n_OmEEm>.$:_.:U_._n=>__5.
`
`
`
`
`
`.._<ZO_._.n_OmE_.:m>._3:_.:U_._n=>__Sq.
`
`
`
`
`
`._<ZO_._.n_OoE_.rU._.D.:U_._n=>__F..
`
`
`
`
`
`.._<ZO_._.n_OmE_55.:U_._n=>=_N_
`
`
`
`
`
`J<zo_EoE052..:U_._n=>__B.
`
`
`
`
`
`._<ZO_._.n_O59:2.._._U_._n=>__5.
`
`..N;_:o-:o_S.__.E_.-_mas
`
`.mEo_u:£._um_u-_m::mE
`
`..::o_S£.am_u-;mm._..m._
`
`_
`
`u::oo->._um._-E:E_xmE
`
`cm_EEmtm.mw_._$.
`
`$mu-tBm-Eo._._:o
`
`3mu-u:o-Eo._._:o
`
`_m>._3:_-;mm._..o._
`
`_m>._3:_->.=o._
`
`
`
`_59:2.:u_._n_s__5.Vmozmaommu3
`uo_.twE-:o_:.5_=m_u
`
`_o.::oU:o=:n_.=m_n_
`
`
`
`
`
`Em._mm_DxS:>w_o.z:oU:o_..:n_.=m_n_rm.m.u_n_
`
`
`
`
`
`SUBSTITUTE SHEET
`
`Petitioner Apple Inc. — Exhibit 1024, p. 5001
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5001
`
`

`

`WO 92/20022
`
`PCT/US92/0381 2
`
`22/32
`
`
`
`
`
`.._<ZO_._.n_Om:_=m-.$oeEo“.0muzmaomm._._U_._n=>__.0.Ew«m>m-m:_um._maovmozwsommnumE_m=mcoUco_Sooxw
`
`
`
`
`
`
`
`
`
`
`
`._<ZO_._.n_Ou.5_EoE:9__>:m“.0muzmacmm._._U_._n:>=_N_
`
`um__-EmEco._>cw
`
`
`
`
`
`.._<ZO_._.n_Oum_..ux3coU._._U_._n=>__.2«x3coo-co_Suoxm
`
`fl
`
`.._EBB_585.n3_.._:_v_EmE:o._>5
`
`..N.w>_..om..mE_
`
`..3x..o25wc
`
`.m.3oEm.
`
`.§_8o_
`
`
`
`EfimfloxmE>mmE_m=m:oUcorzumxmNM_
`
`
`
`
`
`SUBSTITUTE SHEET
`
`Petitioner Apple Inc. — Exhibit 1024, p. 5002
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5002
`
`

`

`W0 92/20022
`
`PCT/US92/03812
`
`23/32
`
`
`._._U_._n:)=8.._._U_.._n=)=E.m:_=m-.Bo22_o o5:<nmEmmom»z_.EU_.._n:>=E.m:_.5-.Bom.£u
`
`
`
`
`
`
`Wmozmaommnu
`
`._mnE:c-_m_.mw
`
`ucmEucmEm
`
`._m:mm_
`
`n=mmcoo_..
`
`
`
`Em.mm_oxmE>wn:mm:mo_._mum.mu_n_
`
`_
`SUBSTITUTE SHEET
`Petitioner Apple Inc. — Exhib1t 1024, p. 5003
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5003
`
`

`

`WO 92/20022
`
`PCI‘/US92/0381 2
`
`
`
`mam»bzfimaz<5oom:u:._s__8.8=_E.8-co_sc_._Eoo_muzmsommus233
`
`
`
`
`.mfl<u_Safimoz<Soom:o_#_s__Eas_=3.-mc_8o_-=sEo>o
`
`.oSsfimaE85..—._U_._n=2_E._E__-:eEo>o
`
`J<zo_Eommum»z_.—._U_._n=2_.2fi_m-co_§o__m
`
`
`..::5_.mmwm»z_._._U_._n:2_E_E_V_-E_:=_
`
`
`
`
`
`
`24/32
`
`J<zo_Eo9._=.o.-§om§_u:u_:s__E_._-:=_-_8ES4
`
`
`
`J<zo_EoE35.:o:._s__5.S_§-EE=_
`
`
`
` .4<zo_Eo59:2.:o:._s__EEoE2_:S.-._c=-._=£%
`
`
`
`.m.EE:_-Bm>_E
`
`gwzcmumcoo
`
`SUBSTITUTE SHEET
`
`Petitioner Apple Inc. — Exhibit 1024, p. 5004
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5004
`
`

`

`WO 92/20022
`
`PCTIUS92/0381 2
`
`25/32
`
`
`
`
`
`
`
`._._U_._n:>=Emam».m:E._.._:<n_moz<m._oom_.._:<”_moz<m._oom:o_._n__2_R.u3._E.8-a3_o2_
`
`
`
`
`
`
`
`
`
`
`._<ZO_._.n_OmE_.:m>.$c_._._U_.E_>__S;
`.uo_.oa-:o=mmm_wu-E:E_xmE
`
`uwt_E_ma-:o=mmm_mu
`
`mE_m=mcouEmEmmm:m_>_.._<zO_.EO5_._saEoo._._o_.E_>__5.§.B:oo-EoEomm:mE_mozmzcmwH3
`
`
`
`
`
`
`
`
`
`..:E._otm_a-w_m:_mVEoE.z_.—._U_.._n:>=E8o8-Em:a%.ae
`
`.._<zo_.Eo*
`
`..NE_mEon-EoEmmmcmE
`
`.m§._o>5o:-o.__u:m
`
`
`
`
`
`
`
`ESmm_ox3:>wmu:_m=m:ooEmEmmm:m_>_mm.mu_n_
`
`Petitioner Apple Inc. — Exhibit 1024, p. 5005
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5005
`
`

`

`W0 92/20022
`
`PCT/ US92/03812
`
`26/32
`
`._<ZO_._.n_OmE_._._m>._m:.__._._U_.._n=2_B.
`
`
`.._<ZO_._.n_OE052.._._U_.._n=2_TE
`
`
`.._<20_._.n_O55:3._._U_._n=2__m_
`
`
`
`J<zo_Eo_
`to£mE-:o_«m:_E.3mu-5_
`E_mbm:ou-EoE:m_mmmm.
`«_E__-m:_..mcm-:o_«muo__m
`
`*
`
`
`
`8_>tx2:o3:mnomuzmnowm.:o_#=2__:
`
`
`
`.E032.:u_._.=2__~_
`
`J<zo_Eo
`
`.
`
`
`
`.E052.._._U_.._n=>=_o_
`
`.muzmaowm
`
`..N.m>_EE:m:oo
`
`.m.o_>«m-3m>_._n
`
`..—.m>_«moo__m
`
`>o__on=:mEmmm:m_.2
`
`m_>um
`
`2m_nEmu-«xmEou
`
`..Zcozommcmz
`
`..w=:mE:m_mmm
`
`§2~_BEE_
`
`cozmiu
`
`
`
`ESmm_oxwE>m>o__on.EoEmmm:m_>_Om.U_n_
`
`
`
`
`
`SUBSTITUTE SHE ‘T
`Petitioner Apple Inc. — Exhibit 1024, p. 5006
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5006
`
`

`

`W0 92/20022
`
`PCT/US92/03812
`
`27/32
`
`
`
`
`
` .._<ZO_._.n_OE._m:_m>EEmz._._U_._n:>=_N_:ov_3-.onEmE
`
`
`..2:§a_m._._U_._n:>=_:o=zm:m_w-.onEwE
`
`
`
`
`
`o_.o%e._._._U_._n:>__5.S:noE-.mnEmE_muzmsommnu_BEms_
`
`
`
`
`
`Em.mm_oxmE>w.mnEm_>_Rm.mu_n_
`
`9::-5ofimwz_EmHmhuo._._U_._n=>=.2_m.m:mm..m:_m>
`
`
`
`
`
`
`.ma:0nommzmsomm._._U3n=>___N_~x2.w:_m>
`
`3mn_m:_m>u_A.Omuzmaomm._._U_._n=>__.3um__-m:_m>
`
`.503.2.._._U_._n=>=.2._om3:_-m:_m>
`
`
`
`z<m:oom.._._U_._n=>=_o_:mo_oon-m:_m>Vmu_o:onuSmDm:_m>
`
`
`
`m:_m>nmEm2nomuzmsommH3um_._o:_m>nmEmZ
`
`
`
`o:_m>nmEmz.m:_=m-.3oem._uoEm:-o:_m>_mozmsommnu
`
`
` %.3mDo:_m>3mn-m:_m>
`
`
`
`
`
`
`
`
`
`
`o:_m>6:.._m>uoEmzmm.mu_u_wEm_mm.n_xS:>wum:o:_m>nmEm2aSan.
`
`SUBSTITL11’-<[=:t§ti(S)r'-1"g§l;-L)p1e Inc. — Exhibit 1024, p. 5007
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5007
`
`

`

`WO 92/20022
`
`PCT/US92/038] 2
`
`28/32
`
`T...tonaamo:o:ao_o.r.a:_=m-.3om=Eo~oEm:-o:_m>
`
`
`
`
`
`
`
`
`
`:.m~_-mmm.82_+.ac_=m-_£oE£o.3mc-o:_m>
`
`
`
`
`
`T1250mmmcufinr.m:_=m-.3om:Eo~oEm:-o:_m>
`
`
`
`
`
`
`Emvvm.Eumfiza23.8.?
`
`
`
`
`
`Vm:_m>umEmZVH:«m_._m:_m>coEmZ«m_._o_aEmxw
`
`Wo:_m>umEm2.
`
`
`
`
`
`J<zo_Eo2555:o:.=2_EJ<zo_Eoco_2o>:o:.=2..2
`
`
`
`
`
`
`
`
`
`4<zo_Eo2555:o_:s__.2
`
`
`
`EEmm_DxE:>w0.Save...
`
`ow.0_n_
`
`
`
`0_QEmXmum:m:_m>nmEmZ
`
`
`
`
`
`
`
`
`
`J<zo_Eo.a_2o>:o:&2__~_
`
`
`
`.9__=m-_£8§_o:u_:s__8.
`
`
`
`.9__=m-.8o2Eo:o:m_2_:_
`
`.uuzuzomwnu
`
`o_§._§._
`
`mm.O_n_
`
`oEmc-«u:no.u
`
`:o_m.o>-«mE
`
`co_m.o>-«mm_
`
`Busuoa
`
`3mc-ommo_oEmE
`
`3mo-mmmo_oZmm_
`
`_
`_
`SUBSTITUTE SHEET
`Petitioner Apple Inc. — Exh1b1t 1024, p. 5008
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5008
`
`

`

`WO 92/20022
`
`PCT/US92/03812
`
`29/'33
`
`
`
`oz_Em._.m:.UO._._U_._n=>:_N_
`
`
`
`
`
`
`
`
`
`J<zo_Eos:m:_m>BEmz.._._U_._n=>:2..
`
`
`
`.9.Em-.22:_:_u:u:._s___o_
`
`.muzmaommu3
`
`2:555
`
`w_m..mEm.mu-m.3m:m_m
`
`E5_.om_m-m:3m:m_m
`
`o:_m>-E3m:m_m
`
`
`
`
`
`J<ZO_._.n_CwE_._.U._.3.._._U_._n=>__5.
`
`
`
`
`
`.._<ZO_._.n_OwEFU._.D.:U_._...=>=.2
`
`.muzmsommuH“
`
`Bmuémum
`
`mfiuficm
`
`E55.
`
`
`
`
`
`EEmm_oxmE>mo._3m:m_m
`
`
`
`
`
`_.:w._mm_DxmF_>m_.:..w.—.
`
`SUBSTITIIQ,-t§ti§rt'!:§E¥)p1e Inc. — Exhibit 1024, p. 5009
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5009
`
`

`

`W0 92/20022
`
`PCT/US92/03812
`
`30/32
`
`
`
`.85.2o_._o8m$§__£<
`
`
`
`.oZ:<umo59:2.:u_._....s___:«£8
` _.oSzfimoE032.:u:....s__.23.2.oSzfimoE85.
`
`
`tongs:_~_m-:8
`
`
`.mmoEz_:u_:_2_.23.8._muzmaommnuS_2m>
`
`3..o_n_
`
`..s__%s_8
`
`III.25_2__u_.._ss
`
`3dz
`
`
`
`
`
`Es._s__u_.§._82§_.s_:
`
`o:_m>o:_m>m:_m>
`
`355:256:04xS:>mm:5_5<
`
`
`
`
`
`
`
`
`
`
`SUBSTITUTE SHEET
`Petitioner Apple Inc. — Exhibit 1024, p. 5010
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5010
`
`
`

`

`W0 92/ 20022
`
`PCT/US92/0381 2
`
`31/32
`
`m:_m>
`
`o:_m>
`
`>__m_.._:_
`I.mnE:z
`
`0.52..50To
`
`
`
`as”.3o_._o2_w$255.4
`
`QQ3:22.32
`:3__n_:oo_no
`
`ESUBSTTTUTE SHEET
`Petitioner Apple Inc. — Exhi
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5011
`
`

`

`W0 92/20022
`
`PCT/ US92/038] 2
`
`32/32
`
`Fiiter {
`Fi|ter—Type AND
`Filter-Item {
`Filter-|tem~Type SELECT
`Attribute-Type Product-Use-Authorization
`Filter {
`Filter-Type AND
`Filter-ltem{
`Filter-Item-Type SELECT
`Attribute-Type Calling-Authorization
`Filter{
`
`Filter-Type AND
`Filter-item {
`Filter-Item-Type EQUALITY
`Atribute-Type Producer
`Match-Value "Digital"
`
`} F
`
`}
`
`ilter-Item {
`Filter-Item-Type EQUALITY
`Attribute-Type Producer
`Match-Value "Amazing Database"
`
`I
`
`} F
`
`ilter-Item {
`Filter-Item-Type EQUALITY
`Attribute-Type Producer
`Match-Value "Digital"
`
`} F
`
`ilter—|tem{
`Filter—|tem-Type EQUALITY
`Attribute-Type Issuer
`Match-Value "Digital"
`
`} F
`
`}
`
`}
`
`}
`
`ilter-Item {
`Filter-Item-Type EQUALITY
`
`Attribute-Type Product-Name
`Match-Value "Amazing Graphics System"
`
`FIG. 46
`
`Example Filter Value Notation
`
`SUBST|TU1Eet§t'i-+0g1§1TApp1e Inc. — Exhibit 1024, p. 5012
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5012
`
`

`

`INTERNATIONAL SEARCH REPORT
`international Apputcanon no
`
`on ,,,Q Q, ,,,,,,1,
`
`I. CLASSIFICATION OF SUBJECI MATTER (if sevaal classification symhols apply, indicate all)‘
`
`According to International Patent Classlfiutlotu (IPQ or to both National Classification and [PC
`Int.Cl.
`5 G06F1/00
`
`U. FIELDS SEARCHED
`
`0355559“ SFW“
`
`IntICl. 5
`
`G06F
`
`Minimum Documentation Sardtefl
`
`Classification Sytnhols
`
`Documentation Searched other than Minimum Documentation
`to the Extent that such Documents are Included in the Fields Su.rehed'
`
`III. DOCUMENTS CONSIDERED TO BE REL!-IVANT9
`Category " |
`Citation of Doeumetut. U with indiution, whee appropriate, of the relevant passages ‘3
`
`Relevant to Claim No.“
`
`EP,A,O 332 304 (OIGITAL EQUIPMENT CORPORATION)
`13 September 1989
`cited in the application
`
`-
`
`see figure 1
`cited in the application
`
`see column 3,
`
`line 31- column 7,
`
`line 55
`
`_/.-
`
`1-3,
`6-19,22,
`24,
`26-29,
`31-33,
`35-37,39
`43-45
`
`S,15,21,
`25,30
`
`‘’ Spedal categories of cited documents :‘°
`‘A’ document defining the general state of the art which is not
`consider!‘ m In ‘If PING!" man“
`'E' arlier document but puhlished on or after the lntanational
`filung date
`'L' docutmt _whlch may throw douhts_on priority claim(s) or
`"P"? L‘ “"4 "’ 5‘‘'.'l'‘h "” P"N"3u"." “'° "f "M"
`‘““'‘°“ °'' "5" ‘P“""" "a‘°“ ('5 ‘P°"fi“)
`'0' document referring to an oral disdosure, use, exhihitlon or
`other mans
`'9' document puhllshed prior to the inta'natltuna.l filing date but
`Iater than the priority date dainud
`IV. JR'l'IFlCA'I'lOl\'
`
`'1" later document puhllshed after the international filing date
`or priority date and not In tnnfliet with the a
`Iiation but
`-
`-
`-
`ttiluundetstand the prunctple or thtnry utn erlyung the
`-x- damn‘ Hf “Nah, "lune: me dam“ invfinn
`unnot be considered novel or annot be considered to
`involve an inventive step
`'Y' document of partlcnhr relevance; the claimed lnvuttlon
`tannot be consldaed to involve an inveu-utive step when the
`document is mmhined with one or more other such docu-
`ments. such mmhinatlon hdng obvious to a pawn skilled
`in W "'-
`'&' document member of the same patent family
`
`Date of the Actual Complaion of the International Sarch
`09 SEPTEMBER 1992
`
`Date of Malling of this International Surch Report
`1 7, [ya 92
`
`International Sarching Authority
`EUROPEAN PATENT OFFICE
`
`Signature of Authorized Officer
`WEISS P.
`
`Fem PCTI1SARt0t|n:nd Ihnet|(J-nary 1915)
`
`Petitioner Apple Inc. — Exhibit 1024, p. 5013
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5013
`
`

`

`(CONTINUED FROM THE SECOND SEED
`m. DOCUNIEANTS CONSDERED TO BE RHEVANT
`Category ‘'
`Cnarinn nf Docmum. with indiation, when appropriate. of the nlevanl pasags
`
`I
`
`Rzlevznt to Clziln No.
`
`lnlernznnnzl Appllauon !\o
`
`D"‘T /l!(‘
`
`09 /n')Q1’J
`
`see the whole document
`
`1 January 1989, NEW YORK US
`vol. 31, no. 8,
`‘METHOD FOR MANAGING
`pages 195 - 198;
`CLIENT/SERVER RELATIONSHIP IN THE AIX OPERATING
`SYSTEM‘
`
` IBM TECHNICAL DISCLOSURE BULLETIN.
`
`Fun PC'I'IISAi210 Inn 0-!) (liq IIJI
`
`Petitioner Apple Inc. — Exhibit 1024, p. 5014
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5014
`
`

`

`ANNEX TO THE INTERNATIONAL SEARCH REPORT
`ON INTERNATIONAL PATENT APPLICATION N0. 3 9203§é§57
`
`This um Est: the pltfllt fumily Inunhu-I ranting to the punt douunam dad in the above-menfinned inn:-national ward: upon.
`The manner: nn 3: contained in the European Patcnt Oflice EDP file on
`‘nae hwupean Pntmt Olin: is in no way liable for the putiaxlars whidl Ire Inudy givu: for thc punaoa ofinformalion. 09/09/92
`
`US-A-
`JP-A-
`
`4937863
`2014321
`
`26-06-90
`18-01-90
`
`For more tails Ibout this nnncx : see Oflicinl Journnl of the European Patent Ofliec, No. 12/82
`
`Petitioner Apple Inc. — Exhibit 1024, p. 5015
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5015
`
`

`

`PCT
`
`International Bureau
`WORLD INTELLECTUAL PROPERTY ORGANIZATION
`
`
`
`IN”.-I'ERNATIONAL APPLICATION PUBLISHED UNDER THE PATENT COOPERATION TREATY (PCT)
`
`(51) Illtemfimlnal Patent 0355159350“ 5 3
`G061? 11/349 H041’ 9/00
`'
`
`_(1l) Intemalional Publication Number:
`(43) International Publication Date:
`
`.. WO 93/01550
`2”] .lanuar'y 19-93 (2l.01.9_3)
`
`(81) Designated States: AT, AU, BB, BG, BR, CA, CH, CS,
`DE, DK. ES, FL GB, HU. JP. KP. KR. 1-«K. LU. MG.
`MN, MW, NL, NO, PL, RO, RU, SD, SE, European pa-
`tent (AT, BE, CH, DE, DK, ES, FR, GB, GR, IT, LU,
`MC, NL SE), OAPI patent (BF, BJ, CF, CG, CI, CM,
`GA, GN, ML, MR, SN, TD, TG).
`,
`
`Published
`With international search report.
`
`(21) International Application Number:
`
`PCT/US92/05387
`
`(22) International Filing Date:
`
`30 June 1992 (30.06.92)
`
`(30) Priority data:
`724,180
`907,934
`
`.
`1 July 1991 (0l.07.91)
`29 June 1992 (29.06.92)
`
`US
`US
`
`~
`‘
`INC. [US/US];
`(71) Applicant: INFOLOGIC SOFTWARE,
`1223 Peoples Avenue, Suite 5405, Troy, NY 12180 (US).
`
`(72) Inventor: GRISWOLD, Gary, N.
`Schenectady, NY 12309 (US).
`
`; 1937 Regent Street,
`
`(74) Agents: LAZAR, Dale, S. et al.; Cushman, Darby & Cush-
`man, Ninth Floor, 1100 New York Avenue, N.W., Wash-
`ington, DC 20005-3918 (US).
`
`(54) Title: LICENSE MANAGEMENT SYSTEM AND METHOD
`
`At Licensee's Site
`
`"
`
`On Communications
`
`(57) Abstract
`
`A license management system and method for recording (6) the use of licensed product (1), and for controlling (4) its use.
`A licensed product invokes a license check monitor (2) at regular time ‘intervals. The monitor generates request datagrams (3)
`which identifiy the licensee and the product and sends the request datagrams over a communications facility to a license control
`system (4). The license control system maintains arecord (6) of the received datagrams, and compares the received datagrams to .
`' data stored in its licensee database (5). Consequently, the license control system (4) transmits reply datagrams with either a denial
`or an approval message. The monitor (2) generates its own denial message if its request datagrams are unanswered after a prede-
`termined interval of time. The datagrams are counted at the control system to provide billing information.
`
`/
`Petitioner Apple Inc. — Exhibit 1024, p. 5016 ~
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5016
`
`

`

`~.
`
`z
`
`‘
`
`-V
`‘
`
`Mali
`Mongolia
`Mauritania
`Malawi
`Nexhcrlanda
`Norway
`Poland
`Romania
`Russian Federation
`Sudan
`Sweden
`Senegal
`Soviet Union
`(.‘had
`Togo
`United Status of America
`
`FOR THE PURPOSES OF INFORMATION ONLY
`
`Code: used to identify Slalcs party lo the PCI' on the from page: of pamphlets publishing international
`applications under the PCT.
`
`Madagascar
`
`AT
`AU
`BB
`BE
`BF
`BC
`3.!
`BR
`CA
`CF
`CC
`CH
`Cl
`
`5'
`DE
`UK
`['3
`
`.
`
`Aualna
`Aualralia
`Barbuda:
`Belgium
`Buriina I-aw
`I:lulgaria
`Benin
`Braail
`('anada
`('cnlr:xl Afru.-.'m Republic
`(‘ongo
`Swiuullanul
`(‘file d'lvuin:
`(‘ameroun
`(‘zechuslovafia
`Germany
`Denmark
`Spain
`
`'
`
`l-inland
`I-rance
`(iahun
`Unilul Kinplum
`Guinea
`Greece
`Hungary
`Ireland
`llaly
`Japan
`Demoeralic People’: Republic
`of Runs:
`Republic of Korea
`l ieelnenalein
`sri Lnnka
`Luxembourg
`Monaco
`
`Petitioner Apple Inc. — Exhibit 1024, p. 5017
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5017
`
`

`

`\w()93¢o155o
`
`,
`
`PCIT/[H592/05387"
`
`LICENSE MANAGEMENT SYSTEM AND METHOD '
`
`‘
`
`Field of the Invention
`
`EAQEQBQQED
`
`The present
`
`invention generally relates
`
`to
`
`5
`
`systems for managing licenses of products such as
`
`computer software, video games, CD-ROM information,
`movies and other video products, music and other audio
`
`products, multimedia products, and other systems for
`
`up—to-date
`
`recording of actual usage of
`
`such a
`
`10
`
`licensed product to enable efficient billing therefor.
`
`Qescgiption of gelgtgd Art
`
`Licenses
`
`for
`
`‘information
`
`products
`
`such
`
`as
`
`computer software, music, video products and the like
`
`usually provide licensees with limited rights.
`The
`licenses may restrict sites of use, duration of use,
`
`15
`
`or number of concurrent uses of the products.
`
`The
`
`licenses also may
`
`limit "the use of
`
`the products
`
`depending won currentness of
`
`licensee's payments.
`
`However, enforcing the conditions of the licenses is
`
`20_ difficult, because,
`
`in general,
`
`the licensed products
`
`may be easily copied or "pirated" and used without the
`
`licensor's knowledge.
`
`'
`
`Compliance with limited license rights has been
`
`encouraged with copy protection.
`
`Known methods of
`
`25
`
`computer software copy protection include putting a
`
`V
`SUBSTITUTE. SHEET
`Petitioner Apple Inc. — Exhibit-.l
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5018
`
`

`

`W0 93/01550
`
`-
`
`PCT/US92/05387
`
`physical hole or mark on.the diskette containing a
`product, or placing data on the diskette in a location
`where no data is expected.
`A disk with an illegally
`copied software product usually would not contain the
`5 marks. At the beginning of its operation,
`a. copy-
`protected, but illegally copied software product would
`search its own diskette for the marks. Upon failing
`to detect the marks, the software would abort from its
`
`10
`
`normal procedures.
`Most software products sold today do not have
`such copy protection, partly because copy protection
`renders
`legitimate duplication of
`copy protected
`" software difficult,
`but
`not
`impossible.
`Copy
`protection frustrates the making of legitimate copies,
`15 while not eliminating unauthorized copying.
`Many
`software publishers have experienced higher sales by
`eliminating copy protection schemes.
`Another method for enforcing limited licensing
`rights of computer
`software is described in U.S.
`patent No. 4,932,054 to Chou. Chou describes a "coded
`filter“ hardware device which is plugged into a port
`of
`a
`computer.
`The
`“coded
`filter“ outputs
`an
`authorization control
`code when
`a predetermined
`control code is sent
`to it.
`The licensed software
`functions properly only
`if
`the
`"coded
`filter"
`transmits the correct authorization control code to
`
`20
`
`25
`
`the software.
`
`30
`
`While devices such as described by Chou have
`existed for several years,
`they have not been well
`accepted by the market. Since the device is attached
`to the outside of a computer, it can easily be lost or
`stolen, preventing the use of licensed software.
`In
`addition, if a licensee purchased a number of software
`
`Petitioner Apple Inc. — Exhibit 1024, p. 5019
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5019
`
`

`

`wo 93/01550
`
`-
`
`V
`
`PC!‘/US92/0538.7
`
`products, each of which used Chou's protection scheme,
`the licensee would collect a stack of "coded'filters."
`Hershey,
`in U.S. patent No. 4,924,378, describes”
`a method for limiting the number of concurrent uses of
`a licensed software product.
`Each workstation of a
`network has a
`license storage area in its local
`memory. License Management System (LMS) daemons are
`provided in the network in a number corresponding to
`the permissible number of concurrent uses of
`the
`software product. To use the software, a work station
`stores a daemon in its license storage area.
`If all
`daemons are in use, no further work stations may use
`
`the software.
`in U.S. patent No. 4,937,863,
`Robert et al.,
`describe a similar invention. This invention "includes
`a-
`license management
`facility which
`accesses
`a
`database of license information related to licensed
`computer software programs. When a user attempts to
`use
`a
`licensed program,
`the
`license management
`facility first” checks the database. Access to the
`licensed product is prevented if licensing conditions
`related to the product are not satisfied (e.g..,
`
`expiration of licensing dates, etc).
`while the Robert et al. and Hershey patents show" "
`
`effective techniques for controlling licensed computer
`software, each also reveals components that cannot be
`easily managed by an average user. A..system manager,
`or
`someone with special access. privileges to the
`internals of a machine, must
`install
`the licensed
`software.
`This hinders
`the distribution of
`the
`
`software.
`
`Licensable products. other than computer software
`have not generally been copy-protected. For example,
`
`5
`
`10
`
`A
`
`15
`
`20
`
`25"»
`
`30
`
`Petitioner Apple Inc. — Exhibit 1—0—
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5020
`
`

`

`W0 93/01550
`
`PCI‘/US92/05387
`
`video tapes can be easily. copied by anyone with two
`VCR machines, and audio tapes and music CDs can be
`
`easily copied to tape. Computer CD-ROMS can be copied
`to magnetic disk; however,
`their
`large information
`storage capacity relative to that of magnetic disks
`makes
`this
`a
`very
`expensive proposition.
`The
`
`5
`
`introduction of digital audio tape is being delayed,
`
`because some view its ability to easily produce very
`
`high quality copies as a threat to music royalties.
`Hellman,
`in U.S. patent No. 4,658,093, describes
`
`10
`
`means to bill by usage.
`
`This is accomplished via
`
`communication of an encrypted authorization code from
`
`a licensor to a base unit at the licensee's site. The
`
`information
`encrypted authorization code contains
`related to an identification of
`the base unit,
`a
`
`15
`
`number of uses
`
`requested,
`
`and
`
`a random or non-
`
`implementation of Hellman's
`repeating number; however,
`scheme requires a "base unit", such as
`a computer,
`
`record player, video recorder, or
`video game unit,
`video disk player, with a unique
`identification
`
`20
`
`number.
`
`The requirement
`
`is difficult
`
`to satisfy,
`
`because, at
`the present, only a
`fraction of
`such
`systems on the market have an internally readable
`serial
`number
`for
`identification.
`In addition,
`
`25
`
`vendors of these systems provide no guarantees for the
`
`number.
`any given device's serial
`uniqueness of
`Furthermore, an internal serial number can change when
`
`hardware maintenance
`
`is performed on
`
`the device.
`
`Also, He11man's approach requires that an identical
`
`30
`
`the
`each software product be stored at
`copy of
`authorization site.
`These copies are used in the
`
`The unstated assumption
`generation of unique keys.
`that all copies of a specific version of a software
`
`Petitioner Apple Inc. — Exhibit 1024, p. 5021
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5021
`
`

`

`wo 93/01550
`
`PCT/USb92/05387"
`
`1353
`
`5
`
`product are identical is unrealistic.» Minor-bug fixes
`to software are often made without generating a new
`version of the product. Also, some software products,
`such as those which run on Macintosh computers, are
`self-modifying.
`'
`e While Hellman's invention counts each use of the
`software, it does not monitor the duration of use.
`Thus, Hellman's system would not be able to bill for
`extensive use of
`licensed software if the software
`10 _ were continuously operated.
`Finally, while Hellman
`suggests the inclusion of an automated communication
`system as part of his invention, he does not disclose
`how this communication system could be implemented.
`
`Instead, he mentions noneautomated use of telephone
`
`15
`
`and mail.
`
`In summary, Hellman's patent
`
`is an
`
`interesting discussion of cryptographic techniques,
`
`but
`
`it does not provide a practical,
`
`real-world
`
`_
`implementation of those techniques.
`Shear,
`in U.s. Patent No. 4,977,594, describes a
`
`20
`
`'
`
`system and‘ method to meter usage of distributed
`databases
`such
`as
`CD-ROM systems.
`The method
`
`A25“
`
`I
`
`describes a hardware module which must be part of the
`
`to access the distributed database.
`computer used;
`This module retains records of the information viewed.
`once the module storage is filled, the module must be
`removed and delivered to someone who will charge for
`the usage recorded therein and set the module back to
`zero usage.
`Like Hellman's method,
`this method
`
`requires a hardware module which must be incorporated
`
`30 within the computer so the system can control user
`access.
`No database publisher will be able to use
`
`this method until there are a very large number of
`
`units containing such modules. Hardware manufacturers
`
`Petitioner Apple Inc. — Exhibit 1024, p. 5022
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5022
`
`

`

`W0 93/01550
`
`PCT/US92/05387
`
`will be hesitant to include the module in the design
`of their computers until there is sufficient demand
`from customers or publishers for this system.
`The
`method
`and
`apparatus
`according
`to the present
`invention can be implemented entirely in software and
`hence does not require special, dedicated computer
`
`5
`
`subsystems.
`
`SUMMARY OF THE LQEQEION
`
`invention to
`the present
`It is an object of
`10 - provide a license management system and method which
`can ensure that a licensed product is used only on
`
`machines under which it is licensed.
`
`It is another object of the present invention to
`provide a license management system and method which
`may terminate access to a licensed product once its
`
`license has expired.
`It is yet another object of the present invention
`to provide a
`license management system and method
`which may terminate access to a licensed product when
`
`payment for a license is overdue.
`It is a further object of the present invention to
`provide a license management system and method which
`can limit the number of concurrent uses of a licensed
`
`product.
`It is yet another object of the present invention
`to provide a license management system and method
`which can bill licensees for the duration of actual
`
`usage of a licensed product.
`The present
`invention provides an advantageous
`feature of quickly and
`effectively implementing
`license agreements between a licensor and licensee.
`
`15
`
`20
`
`25
`
`30
`
`Petitioner Apple Inc. — Exhibit 1024, p. 5023
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5023
`
`

`

`wo 93/01550
`
`PCI‘/US92/05387,
`
`The
`
`present
`
`invention
`
`provides " another
`
`advantageous feature of allowing logic used to control_
`
`licenses to be easily changed.
`
`The present
`
`invention provides yet
`
`another
`
`5
`
`advantageous feature of detecting, at the licensor's
`
`site, many types of attempts to alter the license
`
`management system.
`
`a
`
`further
`a
`provides
`invention
`present
`The
`advantageous
`feature of permitting anyone without
`special
`access privileges
`to install
`a
`licensed
`
`10
`
`product.
`licensed product
`a
`invention,
`In the present
`generates request "datagrams," messages transmitted
`
`over a communications network. The request datagrams.
`
`15
`
`are sent to the licensor's site. At
`
`the licensor's
`
`site the datagram is compared to information stored in
`
`a license database. After the comparison, a reply
`
`datagram is sent to the licensee. Upon receiving the
`
`reply datagram,
`
`the
`
`licensed product
`
`reacts
`
`in
`
`'20
`
`accordance with the instructions therewithin.
`
`For
`
`example if a reply datagram contained a "denial," the
`
`licensed product would display an appropriate message
`
`to the user and then suspend further execution of its
`
`programs.
`
`_
`
`25.
`
`In the present
`
`invention,
`
`the licensed product
`
`is implemented on a network node attached to a
`
`communications network-
`
`that
`
`includes the licensor.
`
`The network node may he a computer, a CD-ROM player,
`
`a tele-computer or other multimedia machine, or any
`
`30
`
`other appropriate device.
`
`The node may also be an
`
`intelligent type of consumer electronic device used
`
`such as an intelligent
`for presenting information,
`television, VCR. Videodisk player, music CD player,
`
`Petitioner Apple Inc. — Exhibit 1024, p. 5024
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5024
`
`

`

`WO 93/01550
`
`PC!‘IUS92/05387
`
`telephone or other similar device.
`audio tape player,
`Further,
`the communications network may be’ any two-
`way network such as a computer network,
`telephone
`
`network,
`
`a cellular
`
`telephone
`
`network or _other
`
`5 wireless network, a two-way cable TV network, or any
`
`other equivalent system.
`
`Should the user detach the node from the network,
`
`the licensed product will
`
`fail
`
`to receive reply
`
`10
`
`Upon several failures to receive reply
`datagrams.
`datagrams, the licensed product will generate its own
`denial.
`
`After a request datagram has been sent out, a
`
`user may be permitted to use the licensed product for
`
`a limited duration.
`
`This feature may be necessary
`
`15
`
`because of the delays in network communications. when
`
`networks are sufficiently fast, use of a licensed
`
`product can be postponed until the reply datagram is
`received.
`
`In the preferred embodiment of
`
`the present
`
`20
`
`invention,
`
`licensees‘ network addresses are used to
`
`identify the licensees.
`
`other embodiments may use a
`
`licensed product serial number or hardware serial
`
`numbers for the identification.
`
`A licensed product as in the present
`
`invention
`
`25
`
`generates a request datagram after each period of
`product use. The number of request datagrams received
`
`by the licensor can be used to bill the licensee. For
`
`example,
`
`if datagrams are sent after every hour of
`
`product use,
`
`the licensee will be billed for the
`
`30
`
`amount equal
`
`to the number of
`
`request datagrams
`
`received by the licensor multiplied by the hourly
`
`rate.
`
`Petitioner Apple Inc. — Exhibit 1024, p. 5025
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5025
`
`

`

`wo 93/01550
`
`PCT/US92/05387
`
`invention may
`the present‘
`The embodiments of
`incorporate a query system at a licensor"s site for
`reporting on problem datagrams. This would allow the
`
`licensors to take appropriate actions in accordance
`
`5 with problems associated with each datagram.
`
`ERIE]? DESCRIPTION OF THE DRAWING§
`
`These and other objects and advantages of this
`
`invention will become more apparent and more readily
`appreciated from the following detailed description
`of the presently preferred exemplary embodiment of the
`
`10
`
`invention, taken in conjunction with the accompanying
`
`drawings, of which:
`
`'
`
`the
`is a general block diagram of
`FIGURE 1
`preferred exemplary
`embodiment
`of
`the
`present
`
`15
`
`invention;
`
`FIGURE 2
`
`shows representative diagrams of
`
`the
`
`contents
`
`and formats of data at
`
`licensee's site,
`
`contained in datagrams, and at licensor's site;
`
`FIGURE 3 illustrates a sequence of representative
`
`20
`
`operations executed at the licensee's site and at the
`
`licensor's site, together with required inputs for the
`
`execution of the operations and with outputs produced
`
`therefrom;
`
`FIGURE 4 illustrates a sequence of representative
`
`25
`
`operations to send a request datagram,
`
`together with
`
`required inputs for the execution of the operations
`
`and with outputs produced therefrom;
`
`FIGURE 5 illustrates a sequence of representative
`
`operations when a reply datagram is overdue, together
`
`30' with required inputs
`
`for
`
`the
`
`execution of
`
`the
`
`«operations and with outputs produced therefrom;
`
`Petitioner Apple Inc. — Exhibit l02
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5026
`
`

`

`\vt)93/01550
`
`-19-
`
`P(?r/[H592/05387
`
`FIGURE 6
`shows
`a
`sequence of
`representative
`operations to process a reply datagram,
`together with
`required inputs for the execution of
`the operations
`and with outputs produced therefrom;
`_
`FIGURE 7
`shows
`a
`sequence of
`representative
`operations to generate an authorization code, together
`with required inputs
`for
`the
`execution of
`the
`operations and with outputs produced therefrom; and
`FIGURE 8
`shows
`a
`sequence of
`representative
`
`together with
`operations to send a reply datagram,
`required inputs for the execution of the operations
`and with outputs produced therefrom.
`
`5
`
`10
`
`PRES
`
`DETAILED DESCRIEEION OF THE
`Y PREFERRED EXEHPLARY EMBODIMENT
`
`15
`
`is
`As shown in FIGURE 1, a licensed product 1
`located at a licensee's site. Product 1 may include
`
`a data portion 1B and a functional portion 1A such as
`computer
`software product or
`any other kind of
`information product used to control use of data
`portion 18.
`If data portion 18 is CD-ROM database
`information, functional portion 1A should enable the
`
`licensee to search indexes and display text.
`
`If data
`
`portion 1B is video information, functional portion 1A
`should control the display of the video information.
`
`For audio information,
`functional portion 1A should
`play the audio information.
`If data portion 1B is an
`electronic book, functional portion 1A should display
`
`The above examples show some of the
`and turn pages.
`ways functional portion 1A can control data portion
`1B; however,
`they are hardly exhaustive.
`By including in product 1 both information and
`software which controls the information, product 1 is
`
`20
`
`25
`
`30
`
`Petitioner Apple Inc. — Exhibit 1024, p. 5027
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5027
`
`

`

`wo 93/01550
`
`.
`
`‘pct/U592/05387
`
`'
`
`- 11 -
`
`5
`
`10
`
`15
`
`an executable product. Ron-software information in
`product 1 is preferably encrypted so that it cannot
`be easily extracted,from the product.
`License check monitor 2 sends license datagrams
`
`3 to the licensor and also receives license datagrams
`3
`from the licensor.
`license check monitor 2 also
`prevents further use of product 1 when a datagram 3
`containing a "denial" message is received.
`License datagrams 3 are messages that describe
`information related to the use of licensed product 1.
`Datagrams 3 are sent over a communications network
`between the licensee and licensor.
`Initially,
`the
`
`licensee sends a request datagram 3 over the network
`to the licensor.
`The licensor then returns a reply
`
`It
`datagram containing either an approval or denial.
`is also possible to implement the present invention by
`y having the licensor transmit a reply datagram only for
`
`approvals.
`At the licensor's site,
`
`license control system 4
`
`20
`
`makes
`
`licensing decisions
`
`by
`
`comparing
`
`request
`
`the
`After
`datagram 3 with license records 5.
`information
`comparison,
`control
`system 4 [stores
`related to request datagram 3 into history of license
`
`datagram record 6.
`It is noted that request datagrams
`3 are periodically sent while product
`1 is in use.
`Thus,
`the history of license datagrams in record 6
`provides means for measuring the duration of use of
`product 1.
`A
`Representations of data and records stored at the
`licensee's site, contained in datagrams, and stored at
`
`the licensor's site_are illustrated in FIGURE 2. At
`
`the licensee's site, network service 7, which handles
`
`delivery and transmission of datagrams 3, supplies
`
`25
`
`30
`
`Petitionkn‘ Apple Inc. — Exhibit 1024, p. 5028
`
`Petitioner Apple Inc. - Exhibit 1024, p. 5028
`
`

`

`W0 93/01550
`
`PCI‘/US92/05387
`
`network address 8.
`control
`system 4
`
`It is by this address that license
`identifies a
`location of use of
`
`10
`
`product 1.
`is contained within
`record 9
`Licensed product
`5 monitor 2. Within the license product record 9 is an
`identification record 10, which contains the following
`two items: licensor's network address 11, and product
`model number 12 that
`identifies pr

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket