|Publication number||US20060168294 A1|
|Application number||US 11/274,442|
|Publication date||Jul 27, 2006|
|Filing date||Nov 14, 2005|
|Priority date||Nov 13, 2004|
|Also published as||EP1825390A2, US8359591, US8949820, US20060123185, US20130081009, US20150143351, WO2006055445A2, WO2006055445A3|
|Publication number||11274442, 274442, US 2006/0168294 A1, US 2006/168294 A1, US 20060168294 A1, US 20060168294A1, US 2006168294 A1, US 2006168294A1, US-A1-20060168294, US-A1-2006168294, US2006/0168294A1, US2006/168294A1, US20060168294 A1, US20060168294A1, US2006168294 A1, US2006168294A1|
|Inventors||Jeff de Vries, Greg Zavertnik, Ann Hubbell|
|Original Assignee||De Vries Jeff, Greg Zavertnik, Ann Hubbell|
|Export Citation||BiBTeX, EndNote, RefMan|
|Referenced by (23), Classifications (35), Legal Events (1)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application claims priority to U.S. Provisonal Application 60/627,502 filed Nov. 13, 2004, U.S. Provisonal Application 60/628,517 filed Nov. 15, 2004, and co-pending U.S. Utility Application No.: ______, filed Nov. 14, 2005, all of which are hereby incorporated by reference in their entirety.
Software streaming involves downloading small pieces of files as the pieces are needed by the program being streamed. These small pieces may be referred to as blocks. A streaming client sends requests for blocks as they are needed up to a streaming server, which sends back streaming data that is associated with the requested block. Sending a request and receiving the streaming data may cause delays that can slow down the streamed program.
On advantage of streamed applications is that users only download what is needed to execute a program. The provider of a streamed application has more control over the streamed application than, for example, a provider of a program that is installed to hard disk. For example, the provider of a streamed application may charge a per hour rate for the use of the application. Alternatively, the provider of a streamed application may prevent a local disk from being filled up unnecessarily with code that will not be accessed.
While streaming has certain advantages, there are many problems associated with streaming software that it would be advantageous to negate, work around, or reduce. For example, speeding up execution of streaming programs is an on-going issue. As another example, it may be desirable to provide a user with an experience similar to that associated with an installed, as opposed to streamed, program. As another example, it may be desirable to provide streamed programs on consoles.
In addition, a provider of a streamed application may desire to attempt copyright protection. This can be difficult because if a streamed application is downloaded entirely to a local machine, the user of the local machine may gain access to all portions of the streamed application, eliminating the need to stream and increasing the risks of copyright violations. Thus, an additional concern for some may be to prevent a user from gaining access to all of a given program locally.
A technique for streaming from a local device and a remote device involves providing a subset of data associated with a streaming application to a local device. By way of example but not limitation, a first subset of the data may be provided to a consumer on a removable storage device. An example of a method according to the technique includes running a streaming software player, accessing data from a local storage device necessary to stream a software application, accessing data from a local cache necessary to stream the software application, and accessing data from a remote location necessary to stream the software application using the streaming software player. In a non-limiting embodiment, the method may include sending a request to stream the software application. The software application may then be streamed from both the local storage device and the remote, for example, streaming server.
Another example of a method according to the technique includes maintaining, at a streaming server, first content associated with a streaming application, receiving a request to stream the streaming application, and providing a token file in response to the request. The token file may include, by way of example but not limitation, an address associated with the streaming server, instructions to receive the first content from the streaming server, and instructions to receive second content from a local streaming source, wherein said first content and said second content are necessary for properly streaming the streaming application. In a non-limiting embodiment, the method may include dividing content associated with a streaming application into the first content and the second content.
An example of a system according to the technique may include, by way of example but not limitation, a means for streaming a first subset of content associated with a streaming application from a streaming server, a means for streaming a second subset of content associated with the streaming application from a local source, and a means for periodically querying the streaming server, wherein the periodic querying informs the streaming server that the streaming application is running.
Embodiments of the invention are illustrated in the figures. However, the embodiments and figures are illustrative rather than limiting; they provide examples of the invention.
A technique for a “streaming install” of a software title involves reducing many of the steps typically required to run the software, such as installation of the software and configuration of the environment. A goal when streaming a title is providing a user experience after startup that closely resembles that of an installed software title.
An advantage of an aspect of the technique is that users can experience faster and easier startup than is typical for installation of non-streaming software titles. Another advantage is that PC games, for example, can be made as quick and easy to play as console games. A measure of performance in a streaming application is whether the streamed application performs virtually the same as the same title installed traditionally (i.e., not streamed). In some cases, streamed titles have even performed better than traditionally installed titles.
Some users believe that installation on a hard disk can improve streaming software title performance. This may be true since a CD or DVD may spin down at certain points and incur the delay of spinning up again. Accordingly, in an embodiment, streaming applications are installed on a hard disk. It should be noted that installation of a streaming application on a hard disk is not the same as installation of a non-streaming application; the streaming application is still streamed after installation, it is just streamed from the hard disk instead of, for example, a CD or DVD.
Since it may be desirable to support streaming from multiple disks, a full installation can be used to reduce the problem of having to swap disks. In some cases, it may be desirable to require that a single CD or DVD be available as a key, such as a Macrovision SafeDisc key. This may be valuable as a piracy-prevention measure.
Similarly, streamed applications may support applications utilizing Macrovision SafeDisc for security. For example, a CD key may be verified at startup an periodically through the use of the software title using Macrovision SDK features. The Macrovision SafeDisc key may be on each CD.
Some users may wish to modify (“mod”) a software title, which requires access to assets and files associated with the software title. Accordingly, users may be provided with access to source assets provided with the software title, such as art assets (models, textures, sounds, level files, etc.) These can be opened modified, copied, or inserted locally. Similarly, users may be able to download a mod from a network and integrate the mod into the software title.
Users and software title providers typically also find software patches desirable. A streamed application may provide a method for users to download the latest patches.
As is common for most software titles in the industry, product registration may be desired when providing CD or DVD streaming titles.
Compression techniques may be applied to fully utilize media on which streamed data files are provided. For example, packaging of data into streaming buffers may be as compact as Zip-style compression.
The Stub program may provide features, such as product registration, streaming player (e.g., Stream Weaver) detection, streaming player installation, providing the user with various menu options, etc. Product registration may involve determining whether a CD registration key has been entered by checking persistent memory on the user's computer. In an embodiment, if the product has not been registered (typically, this is true the first time a title is streamed), then a registration program prompts the user for the relevant registration information, as illustrated in
In an embodiment, the Stub program may provide a screen for entering the CD registration key and product registration. The Stub program may save information about the CD registration key and product registration in persistent memory. Registration information may be sent to a vendor or producer of the software title over a network (e.g., the Internet). If no network connection is available, registration may be handled in some other manner, as is well-understood in the art of software registration.
If the user skips the registration process, this fact may be saved in persistent memory, and used when deciding whether to ask the user to register again later. If the registration has been previously declined, then this fact may be saved in persistent memory and a check for whether a predetermined time period has passed is made. If the time period has passed, then the user is given the chance to register again.
In another embodiment, if a CD has been previously registered, the Stub program skips registration and goes directly to a splash screen, as described later with reference to
As previously indicated, the Stub program may provide features such as streaming player detection and streaming player installation, as illustrated in
In a non-limiting embodiment, at module 106 (
If the user clicks on the autoplay option, as illustrated in
At module 118 (
At module 124 (
When installing a streaming title on the hard drive, the system typically checks for adequate disk space and copies all of the streaming files to the hard drive, if space is sufficient, as illustrated in
At module 112 (
As with application patching, the editor should be processed with the streamed application and included in the same stream file as the streamed application so that the files are visible from within the editor. When the modified file is saved, it will not go to the stream file but will be saved under the directory specified above. The editor may modify and write out files that are to be made visible to external applications. Data files may not be “unpackable” so the streaming data files may not be extracted from them in an offline manner.
At module 114 (
The patch program should be streamed and processed with the streaming application. This may be required if, for example, the application file structure is hidden from outside applications. File hiding may be done for security reasons, to prevent unauthorized copying of an application.
When a streaming application expects content on a CD or DVD in, for example, a CD or DVD drive, the user may be required to swap in the appropriate disc. The streaming application itself may include a token file that is encoded with information related to data that resides on a particular CD or DVD. In order to reduce the problems with making sure the proper disc is available, the CD or DVD drive can be virtualized.
In an embodiment, the second streaming content database 304 is included on a removable media, such as a CD or DVD, that is distributed to a consumer. The second streaming content may be streamed directly from the removable media or installed in local memory or non-volatile storage, such as a hard disk drive. The removable media may include copy protection safeguards of types that are well-known in the art and are continuously being developed to protect against privacy and other forms of intellectual property theft.
In an embodiment, the second streaming content database 304 does not include all of the content associated with a streaming application. The first streaming content database 302, however, includes the rest of the streaming content for the streaming application. As is known in the art of content streaming, the local cache 306 may be utilized while the streaming player 308 runs the streaming application. When content, such as a block, is requested from the first streaming content, the streaming player requests the block from the streaming server 310. On the other hand, when content, such as another block, is requested from the second streaming content, the streaming player requests the block from a local source, such as the removable media on which the second streaming content database 304 was provided, or a local source, such as a hard drive onto which the second streaming content database 304 was installed. A request may be honored by the local cache 306 if the requested content, such as a block, is cached.
Advantageously, the system 300 can be used to stream software at a high rate of speed, even if broadband access is unavailable or limited, because some of the requested blocks are available locally. For large software titles, this can be of great value. Moreover, it is sometimes valuable to keep certain data relatively secure. The data that should be kept secure can be encoded into the blocks that are provided locally.
One technique for streaming software is described in the co-pending patent application Ser. No. 10/988,014 filed Nov. 11, 2004, entitled “SYSTEM AND METHOD FOR PREDICTIVE STREAMING”, which is incorporated herein by reference.
In an embodiment, the first content database 404 is missing every 20th block and the second content database 406 includes every 20th block. When the streaming player 402 runs a streaming application associated with the blocks in the first and second content databases 404, 406, the streaming player 402 makes block requests of the databases. If a block request is for one of the blocks in the first content database 404, the block request is honored locally. If, on the other hand, the block request is for one of the blocks in the second content database 406, then the block request is made via the network 420. The request is honored by the streaming server 410, which sends a reply to the block request through the network interface 408 via the network 420 to the streaming player. It should be noted that once a request has been honored by the streaming server 410, the requested block may be cached locally.
The streaming application may be configured to hold any of a variety of different sets of blocks (e.g., every 5th block, every block that is smaller than a given size, etc.).
Advantageously, arranging the content databases as depicted in
an address associated with the streaming server;
instructions to receive the first content from the streaming server; and
instructions to receive the second content from a local streaming source.
The streaming software player used to stream applications, in an embodiment, may make use of a DLL that is used to determine if an FSD has been loaded or if a user has been loaded. The user should be able to stream from multiple stream files. Common files of an application must fit on one CD. The user should be able to intercept requests for new discs or the virtual equivalent for an installed to hard drive software title switching stream files.
For files installed on the hard drive, the registry should be checked for the streaming software player to determine if streaming is to be done from a CD, from the stream files stored on the hard disk, or from somewhere else. If it is desired for a streaming application to run like software that has been fully installed on disk, then that streaming application should know when it is to switch to a different stream file. The user file system driver may support a system level call to switch between stream files for this purpose. Fully installed applications, may make an application call to the FSD to change. For patch support, a user may be required to support a command line switch to invoke different executables. For software title editor support, the logic for when files are written out to a directory associated with the streaming software player, as distinguished from the software title, should be handled carefully.
A streaming application may be configured to enable reading SafeDisc data. The streamed application may be configured so that it appears as if the application is entirely installed on the C: drive whether it is running off CD or the hard drive. The problem occurs if part of the application appears to be installed on the hard drive and part on the CD. If this is the case, this fact may be captured during application processing and stored in a token file. When the application makes a request from the CD, the file system driver may intercept the request and determine if the request is valid for the application. If the request is for SafeDisc information, then the interception of the CD request by the ST FSD may cause this request to fail.
However, if the application is organized (everything appears on the C: drive) so that no data remains on the CD in the installed state, during the processing of the application this fact may be indicated in the token file. In this case, the file system driver will not intercept the calls to the CD and requests for the SafeDisc information may succeed.
This might seem confusing because where the application thinks the files are located and where the actual data is streamed from are two different things. The actual stream data could be coming from CD, the network, or the hard disc where in all these cases the files and executables all appear to be on the C: drive. Nevertheless, when the installed version of the application is transformed into a streaming format, the application does not assume that some of the data is on the CD (excluding SafeDisc data).
For a multi-CD streamed application, there are specific requirements imposed on how the code is developed and structured. In a non-streamed multi-CD game, as new files are needed that are located on different CDs, the application requests that a particular CD be inserted. The old CD is unmounted and the new CD is mounted upon CD insertion. For a streamed multi-CD game, the behavior may be somewhat different. To a streamed application, the entire directory structure for all the files appear to be present even though the actual files are not on a currently mounted CD. This is because the entire application file and directory structure has to be known at the time the application is streamified.
This causes a problem if the application tries to reference a part of the application that is not present because the CD with the stream data blocks is not present. Even though the read file appears to be available, the read will fail. Because of this, the application has this structural dichotomy that it appears as if all the files are present but the application has to be aware of when it needs to request that a different CD be inserted. Like in a non-streamed multi-CD game, the game puts up a request for the new CD to be inserted. This also implies that each CD can't have an overlapping directory structure.
Streamed applications may be structured so that the parts of the application that are common between CDs are known. The streamed application can lock these common parts into the cache or copy them to the hard drive. These files may be identified at the time the application is turned into a streamed application.
Online game play may proceed similarly to a game accessed through a CD or through a CD with formatted stream data. The access time to retrieve executables or data for a game that was traditionally executed from a CD is virtually identical to the time required to access data from a CD with stream data. This is also true for applications saved to disk. Additionally, given in this situation that none of the executables or data are accessed over the network, there is no or minimal competition for bandwidth between on-line playing data exchanges and the accesses to the hard disk or CD.
The game file system may be modified to search the hierarchy of local, hard drive, and streamed CD caches. Files may have a disc (cache) identifier. The file system may prompt the user to insert the correct disc, if necessary. The game should limit disc swapping points for simplicity; this is likely on level boundaries (at least), so the swapping happens in the user interface shell, not the running gameplay. This directory could be pre-computed before hand and be an additional data file on the CD. Handling multiple discs will require duplicated data on each disc; this could impact overall media space requirements negatively. Possible alternatives to address this are to always do a partial install to the hard disc, installing shared components rather than duplicating them in the stream theory buffers on separate discs.
The following description of
The web server 704 is typically at least one computer system which operates as a server computer system and is configured to operate with the protocols of the world wide web and is coupled to the Internet. The web server system 704 can be a conventional server computer system. Optionally, the web server 704 can be part of an ISP which provides access to the Internet for client systems. The web server 704 is shown coupled to the server computer system 706 which itself is coupled to web content 708, which can be considered a form of a media database. While two computer systems 704 and 706 are shown in
Access to the network 702 is typically provided by Internet service providers (ISPs), such as the ISPs 710 and 716. Users on client systems, such as client computer systems 712, 718, 722, and 726 obtain access to the Internet through the ISPs 710 and 716. Access to the Internet allows users of the client computer systems to exchange information, receive and send e-mails, and view documents, such as documents which have been prepared in the HTML format. These documents are often provided by web servers, such as web server 704, which are referred to as being “on” the Internet. Often these web servers are provided by the ISPs, such as ISP 710, although a computer system can be set up and connected to the Internet without that system also being an ISP.
Client computer systems 712, 718, 722, and 726 can each, with the appropriate web browsing software, view HTML pages provided by the web server 704. The ISP 710 provides Internet connectivity to the client computer system 712 through the modem interface 714, which can be considered part of the client computer system 712. The client computer system can be a personal computer system, a network computer, a web TV system, or other computer system. While
Similar to the ISP 714, the ISP 716 provides Internet connectivity for client systems 718, 722, and 726, although as shown in
Client computer systems 722 and 726 are coupled to the LAN 730 through network interfaces 724 and 728, which can be Ethernet network or other network interfaces. The LAN 730 is also coupled to a gateway computer system 732 which can provide firewall and other Internet-related services for the local area network. This gateway computer system 732 is coupled to the ISP 716 to provide Internet connectivity to the client computer systems 722 and 726. The gateway computer system 732 can be a conventional server computer system.
Alternatively, a server computer system 734 can be directly coupled to the LAN 730 through a network interface 736 to provide files 738 and other services to the clients 722 and 726, without the need to connect to the Internet through the gateway system 732.
In the example of
The computer 742 interfaces to external systems through the communications interface 750, which may include a modem or network interface. It will be appreciated that the communications interface 750 can be considered to be part of the computer system 740 or a part of the computer 742. The communications interface can be an analog modem, isdn modem, cable modem, token ring interface, satellite transmission interface (e.g. “direct PC”), or other interfaces for coupling a computer system to other computer systems.
The processor 748 may be, for example, a conventional microprocessor such as an Intel Pentium microprocessor or Motorola power PC microprocessor. The memory 752 is coupled to the processor 748 by a bus 760. The memory 752 can be dynamic random access memory (DRAM) and can also include static ram (SRAM). The bus 760 couples the processor 748 to the memory 752, also to the non-volatile storage 756, to the display controller 754, and to the I/O controller 758.
The I/O devices 744 can include a keyboard, disk drives, printers, a scanner, and other input and output devices, including a mouse or other pointing device. The display controller 754 may control in the conventional manner a display on the display device 746, which can be, for example, a cathode ray tube (CRT) or liquid crystal display (LCD). The display controller 754 and the I/O controller 758 can be implemented with conventional well known technology.
The non-volatile storage 756 is often a magnetic hard disk, an optical disk, or another form of storage for large amounts of data. Some of this data is often written, by a direct memory access process, into memory 752 during execution of software in the computer 742. One of skill in the art will immediately recognize that the terms “machine-readable medium” or “computer-readable medium” includes any type of storage device that is accessible by the processor 748 and also encompasses a carrier wave that encodes a data signal.
Objects, methods, inline caches, cache states and other object-oriented components may be stored in the non-volatile storage 756, or written into memory 752 during execution of, for example, an object-oriented software program. In this way, the components illustrated in, for example,
The computer system 740 is one example of many possible computer systems which have different architectures. For example, personal computers based on an Intel microprocessor often have multiple buses, one of which can be an I/O bus for the peripherals and one that directly connects the processor 748 and the memory 752 (often referred to as a memory bus). The buses are connected together through bridge components that perform any necessary translation due to differing bus protocols.
Network computers are another type of computer system that can be used with the present invention. Network computers do not usually include a hard disk or other mass storage, and the executable programs are loaded from a network connection into the memory 752 for execution by the processor 748. A Web TV system, which is known in the art, is also considered to be a computer system according to the present invention, but it may lack some of the features shown in
In addition, the computer system 740 is controlled by operating system software which includes a file management system, such as a disk operating system, which is part of the operating system software. One example of an operating system software with its associated file management system software is the family of operating systems known as Windows® from Microsoft Corporation of Redmond, Wash., and their associated file management systems. Another example of operating system software with its associated file management system software is the Linux operating system and its associated file management system. The file management system is typically stored in the non-volatile storage 756 and causes the processor 748 to execute the various acts required by the operating system to input and output data and to store data in memory, including storing files on the non-volatile storage 756.
Some portions of the detailed description are presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of operations leading to a desired result. The operations are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as “processing” or “computing” or “calculating” or “determining” or “displaying” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
The present invention, in some embodiments, also relates to apparatus for performing the operations herein. This apparatus may be specially constructed for the required purposes, or it may comprise a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems may be used with programs in accordance with the teachings herein, or it may prove convenient to construct more specialized apparatus to perform the methods of some embodiments. The required structure for a variety of these systems will appear from the description below. In addition, the present invention is not described with reference to any particular programming language, and various embodiments may thus be implemented using a variety of programming languages.
While this invention has been described in terms of certain embodiments, it will be appreciated by those skilled in the art that certain modifications, permutations and equivalents thereof are within the inventive scope of the present invention. It is therefore intended that the following appended claims include all such modifications, permutations and equivalents as fall within the true spirit and scope of the present invention; the invention is limited only by the claims.
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US8434093||Aug 7, 2008||Apr 30, 2013||Code Systems Corporation||Method and system for virtualization of software applications|
|US8438298||Jun 13, 2006||May 7, 2013||Endeavors Technologies, Inc.||Intelligent network streaming and execution system for conventionally coded applications|
|US8468175||Sep 10, 2010||Jun 18, 2013||Code Systems Corporation||Method and system for building a streaming model|
|US8583816 *||Dec 5, 2008||Nov 12, 2013||Electronics And Telecommunications Research Institute||System for providing streaming-based portable application under selective conditions|
|US8626806||Apr 17, 2012||Jan 7, 2014||Code Systems Corporation||Method and system for managing execution of virtual applications|
|US8762495 *||Sep 8, 2010||Jun 24, 2014||Code Systems Corporation||Method and system for building and distributing application profiles via the internet|
|US8763009||Apr 15, 2011||Jun 24, 2014||Code Systems Corporation||Method of hosting a first application in a second application|
|US8769051||Sep 10, 2010||Jul 1, 2014||Code Systems Corporation||Method and system for prediction of software data consumption patterns|
|US8776038||Aug 7, 2008||Jul 8, 2014||Code Systems Corporation||Method and system for configuration of virtualized software applications|
|US8782106||Sep 3, 2010||Jul 15, 2014||Code Systems Corporation||Method and system for managing execution of virtual applications|
|US8863116 *||Nov 20, 2008||Oct 14, 2014||Symantec Corporation||Pre-storing blocks for a streamed application in a local cache on a host computer system|
|US8893249||Nov 26, 2012||Nov 18, 2014||Numecent Holdings, Inc.||Intelligent network streaming and execution system for conventionally coded applications|
|US8914427||Apr 17, 2012||Dec 16, 2014||Code Systems Corporation||Method and system for managing execution of virtual applications|
|US8949820||Nov 26, 2012||Feb 3, 2015||Numecent Holdings, Inc.||Streaming from a media device|
|US8954958||Jan 11, 2010||Feb 10, 2015||Code Systems Corporation||Method of configuring a virtual application|
|US8959183||Feb 12, 2010||Feb 17, 2015||Code Systems Corporation||System for downloading and executing a virtual application|
|US8968087||Jun 29, 2010||Mar 3, 2015||Sony Computer Entertainment America Llc||Video game overlay|
|US9021015||Oct 18, 2010||Apr 28, 2015||Code Systems Corporation||Method and system for publishing virtual applications to a web server|
|US9094480||Aug 7, 2013||Jul 28, 2015||Numecent Holdings, Inc.||Software streaming system and method|
|US9104517||Jan 27, 2010||Aug 11, 2015||Code Systems Corporation||System for downloading and executing a virtual application|
|US9106425||Nov 21, 2012||Aug 11, 2015||Code Systems Corporation||Method and system for restricting execution of virtual applications to a managed process environment|
|US20100268842 *||Dec 5, 2008||Oct 21, 2010||Electronics And Telecommunications Research Institute||System and method for providing streaming-based portable application|
|US20120005309 *||Sep 8, 2010||Jan 5, 2012||Code Systems Corporation||Method and system for building and distributing application profiles via the internet|
|Cooperative Classification||G06F9/54, G06F8/65, G06F8/61, A63F13/10, H04N21/2541, H04L67/34, H04N21/42646, H04N7/17318, H04L65/4084, H04N21/835, H04N21/6581, H04N21/4325, A63F2300/207, H04N21/631, H04L65/604, H04L67/36, A63F2300/6009, H04N21/8193, H04L29/06027|
|European Classification||H04N7/173B2, H04N21/81W4, H04N21/426D, H04N21/63M, H04N21/835, H04L29/08N35, H04L29/08N33, H04L29/06M6C4, H04N21/432P, H04N21/658R, H04N21/254R, A63F13/10, H04L29/06C2, H04L29/06M4S4|
|Feb 13, 2006||AS||Assignment|
Owner name: STREAM THEORY, INC., CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:DE VRIES, JEFFREY;ZAVERTNIK, GREGORY;HUBBELL, ANN;REEL/FRAME:017160/0050;SIGNING DATES FROM 20030127 TO 20060118