|Publication number||USRE40547 E1|
|Application number||US 09/654,929|
|Publication date||Oct 21, 2008|
|Filing date||Sep 5, 2000|
|Priority date||Aug 10, 1994|
|Also published as||CN1097788C, CN1141450A, DE19529320A1, DE19529320C2, US5812661|
|Publication number||09654929, 654929, US RE40547 E1, US RE40547E1, US-E1-RE40547, USRE40547 E1, USRE40547E1|
|Inventors||Ryota Akiyama, Makoto Yoshioka|
|Original Assignee||Fujitsu Limited|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (57), Non-Patent Citations (10), Classifications (22), Legal Events (2)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The present invention relates to a software reproduction apparatus.
The present invention relates to an effective technology applicable for distribution systems for computer programs or software such as copyrighted image materials, etc., especially digitized information software.
As large-scale memory media such as CD-ROM, MO etc., and large-volume, high-speed communications technologies such as B-ISDN, etc., are further developed, it is expected that not only, of course, computer programs that use these means, but also image and sound, will be distributed as digital data.
In other words, copyrighted image analog data that have been supplied in the past in such forms as video tapes are now being stored as degital data in CD-ROM and sold, or such materials are beginning to be distributed within the market as game software through utilizing the interactive (bidirectional) nature of CD-ROM.
Also, the same situation is occurring with communications circuits: such data as the previously mentioned copyrighted image data are now beginning to be placed in the hands of users via communications.
Incidentally, it is extremely easy to copy this type of digital data onto other media. Moreover, since there is no worry that deterioration will occur through the copying of digital information as occurs when analog information is copied, it is possible to duplicate digital information, and there is an extremely high possibility that these types of acts of copying will impair the profits of manufacturers. In other words, it is easy to copy the contents of a CD-ROM with only a rudimentary knowledge of DOS commands, so long as the would-be copier posses an optical magnetic disk or an optical magnetic disk apparatus, etc., that is capable of large-volume rewrites.
In this way, for the reason that a sufficient security check is impossible, acts of renting these types of digital data media have, in most cases, been prohibited by manufacturers.
However, currently end-users often hesitate to purchase this type of software because the price is too high, or because they don't know if the software will truly match their desired software, or they wait to ascertain whether or not the software is usable on the hardware that they now possess.
In regards to this point, a new software offering system is beginning to be realized wherein multiple software with limited functions are stored on a CD-ROM and sold for a low price, and whereby the end-use pays a fee for desired software on the CD-ROM, and is thereby notified of a code that will remove the functional limitations.
However, the software offering method noted above cannot be said to have sufficiently reflected the special characteristics of the software.
In other words, for the previously mentioned removal of functional limitations, the fee payment in most cases consists of a one-time only, lump-sum payment, and this fee inevitably consists of a high amount. Thus, for example, in those cases where a user only wants to view for a short period a single scene of an image, or when a user wants to use a spreadsheet for only a week, it is difficult to manage fees according to the usage amounts.
In regards to this point, a method was proposed in the Laid-Open Patent No. 19707/1996 whereby the usable price amount was registered beforehand on an IC card, and, in the case where billable software is used, the usable price amount on the IC card is registered within the system, and every time an applicable item of software is used, the system deducts the amount from the balance.
Also, a method was proposed by the present applicants in the Laid-Open Patent No. 9687/1995 whereby a rewriteable domain is provided within the memory medium of the CD-ROM, etc., and whereby usage-time data is managed.
The present invention provides an input switchover means for switching input routes according to the type of data offering format (for example, communications or a medium) provided to the user, a software management means for decoding encrypted software data and for managing monetary charges according to the amount of the software data used, a data conversion section for converting decoded data output from the previously mentioned software management means to output data for presenting to the user, and an output route switchover means for outputting encrypted software data to the previously mentioned software management means, and for outputting non-encrypted software data to the previously mentioned data conversion section.
The present invention, as shown in the conceptual diagram that is
Software data is, for example, program, sound, animation, or still image, etc., data, and this software data may be obtained from the route of public-circuit, dedicated communications-circuit, etc., wired/wireless communications (51), or it may be obtained by the method of a CD-ROM, an optical magnetic disk, a portable magnetic disk, etc., medium (52).
Software data provided to the user through these means consists of encrypted data and non-encrypted data; encrypted software data is managed by the monetary charges system to be discussed below according to the usage amount (reproduction amount) of that software data.
The software management means (55) is comprised of, for example, a decoding means (7) called a “DES” (Data Encryption Standard) equipped with various blocks for decoding the previously mentioned software data, and through key data granted from the management center that is not shown in
The data conversion section (56) is, for example, a section for performing expansions of compressed image data, and for controlling the synchronism of image data and sound data, and this data conversion section (56) is connected to an external speaker, a TV monitor, etc.
Within the present invention, the output switchover means (54) is made to, when the software data is encrypted, output that data to the software management means (55), and when the software is not encrypted, to directly output that data to the data conversion section (56). Therefore, with the present invention, both encrypted software and non-encrypted software is uniformly manipulatable.
Next, a specific preferred embodiment will be explained.
In the diagram, the switchover switch 57 (SW1) may also function as the input interface, and inputs software data from various offering routes, including the communications circuit 51, the CD-ROM 52, etc. Also, within this switchover switch 57 (SW1), it is also possible to rewrite software data through an optical magnetic disk drive apparatus not shown in the diagram to the optical magnetic disk 58. In other words, the switchover switch 57, although abbreviated in the diagram, is comprised of a miscellaneous reception apparatus and an interface circuit for generating interrupt signals when individual signals are received at separate input terminals, and is operated through the control of the host CPU 10.
Placed on the next level after the switchover switch 57 (SW1) are, as the signal processing means, the reception apparatus 58, the MO modulator device 59, and the CD/MO demodulator device 60. The reception apparatus 58 is an apparatus for converting software data provided as reception signals from the communications circuit 51 into a data format that can be manipulated within the present apparatus; the MO modulator device 59 is a modulation means for performing writing to the optical magnetic disk 58. Also, the CD/MO demodulator device 60 is a device for demodulating read data from the optical magnetic disk 58 or the CD-ROM 52, and demodulation control is accomplished through the control route.
The switchover switch 61 (SW2) is a switch for outputting selectively to each type of error processing means data outputted from the miscellaneous signal processing means explained previously. Also, in the case where writing to the optical magnetic disk 58 is performed, the switchover switch 61 (SW2) controls the transfer of inverse direction data from the error processing means to the signal processing means.
This switchover switch 61 (SW2), although abbreviated in the diagram, is comprised of a miscellaneous reception apparatus and an interface circuit for generating interrupt signals when individual signals are received at separate input terminals, and is operated through the control of the host CPU 10.
The error processing means is divided into the communications-system error processing section 62, the optical magnetic disk-system error processing section 62 [sic] (62a, 62b), and the magnetic disk/CD-system error processing section 63.
The optical magnetic disk-system error processing section 62 is comprised of an error check code generation section 62a for performing error check processing of data when such data is written to the optical magnetic disk, and an error check code correction section 62b for performing error checks when data is read from the optical magnetic disk.
Furthermore, the magnetic disk/CD-system error processing section 63 can also perform processing such as bit relisting, etc., together with error check code corrections.
In this way, with the present preferred embodiment, error processing corresponding to each offering format is enabled, and only data that has completely undergone error processing is subject to decoding processing and monetary charges processing, both to be discussed below.
Located at the last step of the previously mentioned error processing means is the switchover switch 64 (SW3). This switchover switch 64 (SW3) has the function of controlling routes, either by outputting to the software management section 3 of the next step the software data processed with the previously mentioned signal processing means and the error processing means, or by outputting this data to the switchover switch 65 (SW4) to be discussed below; or it may take output from the previously mentioned error check code correction section 62b and return it to the error check code generation section 62a.
Here, the sequence of controlling the switchover switch 64 (SW3), and of writing encrypted software data read from the CD-ROM 52 to the optical magnetic disk 58 will be simply explained.
First, data read from the CD-ROM 52 through route switching by the switchover switch 57 (SW1) operated by the host CPU 10 is inputted to the CD/MO demodulator device 60. Data that is demodulated here is sent to the magnetic disk/CD-system error processing section 63 through a route switchover by the switchover switch 61 (SW2). Data that has undergone error check code correction and bit relisting here has added to it an error check code corresponding to the optical magnetic disk sent to the error check code generation section 62a through a route switchover by the switchover switch 64 (SW3). Then, this data, through a route switchover by the switchover switch 61 (SW2), is sent to the MO modulator device 59, where it is transformed into a data format that can be written onto the optical magnetic disk 58, and, through the switchover switch 57 (SW1), the data is then written onto the optical magnetic disk 58.
In this way, data written onto the optical magnetic disk 58 is sent from the switchover switch 57 (SW1) via the CD/MO demodulator device 60, the switchover switch 61 (SW2), the optical magnetic disk error processing section 62a [sic], and the switchover switch 64 (SW3), and is inputted to the software management section 3; data that has been decoded here is inputted via the switchover switch 65 (SW4) to the sound-image separation section 66 (DE-MUX), and is output through MPEG 67a, MPEG 67b, etc., externally as image data or sound data. Here, MPEG processing is performed in conformance with “ISO/IEC CD13818′ 1-3”.
The software management section 3 is realized with module architecture, for example, with an IC card (for example, a card format that conforms to PCMCIA), a board, etc., and is chiefly comprised of a DES (Fip's Publication Co.'s 460DATA ENCRYPTION STANDARD NIST) as the decoding section 7 that possesses the input buffer 21 and the output buffer 24.
The previously mentioned DES is made to receive the key data 16 from an external source, and, based on this key data, the DES functions and is made to decode encrypted data. Furthermore, within the present preferred embodiment, the DES possesses a mode identification section 18 (MODE), and this mode identification section 18 has the function of selecting the most appropriate mode from multiple DES modes for the specific data format, etc.
Next, a representative block of the previously mentioned DES mode will be explained.
The previously mentioned mode identification section 18 analyzes data format, etc., and reads out the most suitable of these modes from the mode table 20, and sends this mode to the decoding section (DES). The decoding section 7 (DES) performs encryption/decoding processing based on the mode that is selected in this way.
In the diagram, as the input buffer 21 of the input side, a 64-bit register (REG1) that consists of 8 connected registers, each with an 8-bit configuration, is placed, and on the next level selectors (sel) are placed. These selectors (sel) are made to input selectively either output from the DES processing main circuit 25 to be discussed below, or output from the previously mentioned shift register (REG1).
Placed on the next level after the selectors (sel) is register 23 (REG2), each register of which has an 8-bit configuration, and placed on the next level is the DES processing main circuit 25. This DES processing main circuit 25 functions as the DES that is the core of the decoding section 7. In other words, within the DES processing main circuit 25 is registered as ROM (Read Only Memory) each type of DES mode explained with FIG. 3. This DES processing main circuit 25 is made to select the optimum DES mode logic through commands from the control CPU 4, and to perform decoding processing.
Output from the previously mentioned DES processing main circuit 25 branches out to the output register (REG3) that is the output buffer 24 and to the previously mentioned selectors (sel). Then, output from the output register (REG3) is used as either encrypted or decoded data.
The sequence of this processing is shown in FIG. 5.
In this way, with the present preferred embodiment, through having provided independently the input register (REG1) as the input buffer 21 and the output register (REG3) as the output buffer 24, both inputting of encrypted data and outputting of decoded data may be performed continuously and independently. As a result, compared with existing DES where input and output is performed cyclically, high-speed encrypting/decoding processing has been made possible.
The decoding section 7 (DES) explained above is controlled by the control CPU 4; connected to the bus of this control CPU 4, besides the previously mentioned decoding section 7 (DES), is the monetary charges table 8, which is comprised of memory, and the interface 72 (I/O).
Within the monetary charges table 8 is registered a prescribed balance value, and monetary charge values are deducted according to the decoding processing amounts or processing time for encrypted software data.
In the case where one wants a balance value updated, as shown in
The interface 72 (I/O) is connected to the host CPU 10 exterior to the software management section 3. Furthermore, the previously mentioned CPU 4 can be made to work together with the host CPU 10 of the host apparatus (in other words, the software reproduction apparatus entity) side.
Output from the software management section 3 is output through the switchover switch 65 (SW4) to the sound-image separation section 66 (DE-MUX: demultiplexer), the image extension section 67a, and the sound extension section 76b (MPEG), etc., which comprise a portion of the data conversion section.
Image data separated from sound data with the sound-image separation section 66 (DE-MUX) is extended with the image extension section 67a (MPEG), converted with the DA conversion section 68a, and is outputted as NTSC signals to an analog display apparatus such as a TV display, etc.
Sound data is extended with the sound extension section 67b (MPEG), converted with the DA conversion section 68b, and outputted as audio signals to an analog audio apparatus such as a speaker, etc. Then, the synchronism of image and sound is controlled by the synchronism control section 70 (VCR).
With the present preferred embodiment, regardless of whether software is encrypted or is not encrypted, it can be uniformly reproduced.
Also, software data from different offering routes can also be manipulated uniformly; if, for example, software data obtained from a CD-ROM or software data obtained from a communications circuit is stored on a writable medium such as the optical magnetic disk 58, etc., through each type of switchover switch, usage and reproduction may be performed when required.
In other words, in
In the diagram, the software management section 3 possesses an access code register 78, and within this access code register 78 is registered an access code for a prescribed medium 76 (or for the data within the medium).
This access code register 78 may be provided within the monetary charges table; in sum, this is a method whereby permission to reproduce is given only in those cases where reproducible software types, data names, etc., are previously registered, and where the medium 76 (CD-ROM or optical magnetic disk MO) on which the permitted data is registered is installed.
When the medium 76 is installed within the drive apparatus, and the data format is converted with the CD/MO demodulator device 60, and error processing has been executed with the magnetic disk/CD-system error processing section 63, the host CPU 10 first reads out an access code from this medium 76.
Next, the host CPU 10 accesses the access code register 78, and performs a retrieval within the key of the access code read out from the medium 76. As a result, in the case where this code was found to be registered within the access code register 78, the host CPU 10 operates the switchover switch 4 and outputs the software data from the medium 76.
With this example, since the data within the medium 76 is not encrypted, high-speed data processing is enabled.
Within the present preferred embodiment, software is shipped to the distribution route from a shipment center (here, for simplification, the management center and the shipment center are the same); however, the format at this time may be encrypted software stored on a CD-ROM, or it may be shipped over a communications route, or it may be shipped as an optical magnetic disk, etc.
The end user proceeds to the sales store 27, etc. (communications sales are also permissible), and purchases the CD-ROM 52 as the software storage medium that stores the software. At the same time, the user also purchases an operating application disk 26 such as drive software, etc., that makes this software reproducible on the user's software reproduction apparatus 105, and an SD card that is the software management module (on which is stored the software management section 3 of the present preferred embodiment)
Here, even though the CD-ROM stores multiple software, since this is not a sales method whereby this CD-ROM 52 is to be sold out, the sales price of the CD-ROM itself may be set at a low price. Also, the sales store 27 may also be a rental store.
In other words, within the present invention, all of the software data stored on the CD-ROM 52 is encrypted, and in the case where this data is decoded and reproduced, it is essential that the SD card 102 that maintains a high level of security be used. Also, as will be discussed below, a charge collection system corresponding to the amount of software used is put fully into place. Furthermore, even if the encrypted data stored on the CD-ROM itself is copied onto a separate medium (for example, the optical magnetic disk 58), this alone is meaningless; and even if the CD-ROM is rented, if a charge collection system that corresponds to the amount of software used is fully in place, there will be no decline in the profits of the software provider.
The end user, in the case where he or she desires to reproduce the software stored on this CD-ROM 52 within his or her own software reproduction apparatus 105, first inserts the SD card 102 into the card drive apparatus 28. Then, the user loads both the CD-ROM 52 and the operating application disk 26 into the software reproduction apparatus 105.
Then, the user starts up the communications application (this communications application may also be provided as an operating application) inserted within the software reproduction apparatus 105, and sends from the modem 73 through the home telephone unit 30 a software usage request to the management center 31. In response, the management center 31 encrypts a consent command (key data) for this user and sends it to the software reproduction apparatus 105.
Furthermore, this usage request and usage consent may also take the format of the end user verbally communicating the code with an operator.
The software reproduction apparatus that has received the previously mentioned consent command reads the CD-ROM 52, sequentially decodes the required software through the decoding section 7 (DES) of the SD card, and transmits this software to the program storage area (memory) of the software reproduction apparatus 105.
Along with this, the control CPU 4 counts either the decoded data amount or the decode time for this software, and deducts a monetary charges balance value from the monetary charges table 8. Then, until the monetary charges balance value becomes “0”, the control CPU 4 continues decoding processing of decrypted software data.
Here, in the case where the monetary charges balance value of the monetary charges table becomes “0”, the control CPU 4 terminates output of encrypted software data. Furthermore, prior to or following termination of output of software data, the user may be warned through image or sound data of a monetary charges balance insufficiency.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4247106||Apr 12, 1978||Jan 27, 1981||Jerrold Electronics Corporation||System arrangement for distribution and use of video games|
|US4433207 *||Sep 10, 1981||Feb 21, 1984||Best Robert M||Cryptographic decoder for computer programs|
|US4439670||Nov 10, 1982||Mar 27, 1984||Electronique Marcel Dassault||Method and device for the checking of the number of access attempts to an electronic store, notably that of an integrated circuit of an object such as a credit card or a buyer's card|
|US4446519||May 26, 1981||May 1, 1984||Corban International, Ltd.||Method and apparatus for providing security for computer software|
|US4484217||May 11, 1982||Nov 20, 1984||Telease, Inc.||Method and system for remote reporting, particularly for pay television billing|
|US4558176||Sep 20, 1982||Dec 10, 1985||Arnold Mark G||Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software|
|US4590557||Sep 12, 1983||May 20, 1986||Pitney Bowes Inc.||Method and apparatus for controlling software configurations in data processing systems|
|US4646234||Feb 29, 1984||Feb 24, 1987||Brigham Young University||Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of computer programs|
|US4649510||Apr 30, 1982||Mar 10, 1987||Schmidt Walter E||Methods and apparatus for the protection and control of computer programs|
|US4654799||May 15, 1985||Mar 31, 1987||Brother Kogyo Kabushiki Kaisha||Software vending system|
|US4658093||Jul 11, 1983||Apr 14, 1987||Hellman Martin E||Software distribution system|
|US4672554||May 8, 1984||Jun 9, 1987||Brother Kogyo Kabushiki Kaisha||Software vending instrument|
|US4674055||May 29, 1984||Jun 16, 1987||Brother Kogyo Kabushiki Kaisha||Software vending system|
|US4740890||Dec 22, 1983||Apr 26, 1988||Software Concepts, Inc.||Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media|
|US4780905||Nov 26, 1984||Oct 25, 1988||Nightwatch, Inc.||Computer data encryption system|
|US4787050||Nov 12, 1986||Nov 22, 1988||Brother Industries, Ltd.||Apparatus for managing software bending machines|
|US4796181||Oct 24, 1986||Jan 3, 1989||Wiedemer John D||Billing system for computer software|
|US4816653||May 16, 1986||Mar 28, 1989||American Telephone And Telegraph Company||Security file system for a portable data carrier|
|US4816654||May 16, 1986||Mar 28, 1989||American Telephone And Telegraph Company||Improved security system for a portable data carrier|
|US4817140||Nov 5, 1986||Mar 28, 1989||International Business Machines Corp.||Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor|
|US4864516||Mar 10, 1986||Sep 5, 1989||International Business Machines Corporation||Method for implementing an on-line presentation in an information processing system|
|US4879645||Feb 10, 1988||Nov 7, 1989||Kabushiki Kaisha Toshiba||Data processing device with high security of stored programs|
|US4949257||Nov 7, 1989||Aug 14, 1990||Zvi Orbach||Automated merchandising system for computer software|
|US4999806||Sep 4, 1987||Mar 12, 1991||Fred Chernow||Software distribution system|
|US5006849||Jul 26, 1989||Apr 9, 1991||Astro, Inc.||Apparatus and method for effecting data compression|
|US5008814||Aug 15, 1988||Apr 16, 1991||Network Equipment Technologies, Inc.||Method and apparatus for updating system software for a plurality of data processing units in a communication network|
|US5014234||Aug 25, 1986||May 7, 1991||Ncr Corporation||System with software usage timer and counter for allowing limited use but preventing continued unauthorized use of protected software|
|US5016009||Jan 13, 1989||May 14, 1991||Stac, Inc.||Data compression apparatus and method|
|US5051822||Oct 19, 1989||Sep 24, 1991||Interactive Television Systems, Inc.||Telephone access video game distribution center|
|US5056009||Apr 7, 1989||Oct 8, 1991||Mitsubishi Denki Kabushiki Kaisha||IC memory card incorporating software copy protection|
|US5103392||Dec 5, 1990||Apr 7, 1992||Fujitsu Limited||System for storing history of use of programs including user credit data and having access by the proprietor|
|US5103476||Nov 7, 1990||Apr 7, 1992||Waite David P||Secure system for activating personal computer software at remote locations|
|US5166886||Feb 12, 1992||Nov 24, 1992||Molnar Charles E||System to demonstrate and sell computer programs|
|US5181107||Sep 20, 1991||Jan 19, 1993||Interactive Television Systems, Inc.||Telephone access information service distribution system|
|US5199066||Apr 18, 1989||Mar 30, 1993||Special Effects Software, Inc.||Method and apparatus for protecting software|
|US5214697||Mar 27, 1991||May 25, 1993||Kabushiki Kaisha Toshiba||Program execution apparatus for ensuring security of a program|
|US5222134||Apr 9, 1991||Jun 22, 1993||Tau Systems Corporation||Secure system for activating personal computer software at remote locations|
|US5224166 *||Aug 11, 1992||Jun 29, 1993||International Business Machines Corporation||System for seamless processing of encrypted and non-encrypted data and instructions|
|US5245330||Sep 10, 1991||Sep 14, 1993||U.S. Philips Corporation||Microprocessor-controlled apparatus with improved disabling|
|US5267171||Mar 19, 1991||Nov 30, 1993||Brother Kogyo Kabushiki Kaisha||Computer software vending machine|
|US5386471||Jan 25, 1994||Jan 31, 1995||Hughes Aircraft Company||Method and apparatus for securely conveying network control data across a cryptographic boundary|
|US5410598 *||Sep 27, 1994||Apr 25, 1995||Electronic Publishing Resources, Inc.||Database usage metering and protection system and method|
|US5418713 *||Aug 5, 1993||May 23, 1995||Allen; Richard||Apparatus and method for an on demand data delivery system for the preview, selection, retrieval and reproduction at a remote location of previously recorded or programmed materials|
|US5495411 *||Dec 22, 1993||Feb 27, 1996||Ananda; Mohan||Secure software rental system using continuous asynchronous password verification|
|US5524230||Mar 27, 1995||Jun 4, 1996||International Business Machines Incorporated||External information storage system with a semiconductor memory|
|US5548645 *||Jul 7, 1994||Aug 20, 1996||Ananda; Mohan||Secure software rental system using distributed software|
|US5563946 *||Apr 25, 1994||Oct 8, 1996||International Business Machines Corporation||Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems|
|US5566290||Apr 28, 1993||Oct 15, 1996||Canon Kabushiki Kaisha||Multi-media device|
|JPH0527924A||Title not available|
|JPH0695871A||Title not available|
|JPH05250236A||Title not available|
|JPH05268566A||Title not available|
|JPH05307597A||Title not available|
|JPH05314014A||Title not available|
|JPH06209444A||Title not available|
|JPH07105284A||Title not available|
|JPS63191228A||Title not available|
|1||Japanese Patent Laid-Open Publication No. 5-266575, Oct. 15, 1993.|
|2||Japanese Patent Laid-Open Publication No. 5-298085, Nov. 12, 1993.|
|3||Japanese Patent Laid-Open Publication No. 57-127249, Aug. 7, 1982 (equivalent to Japanese Patent Publication No. 61-22815).|
|4||Japanese Patent Laid-Open Publication No. 5-89363, Apr. 9, 1993.|
|5||Japanese Patent Laid-Open Publication No. 6-95871, Apr. 8, 1994.|
|6||Japanese Patent Office Notice of Reason for Rejection mailed Aug. 8, 2006, for corresponding Japanese Patent Application No. 2002-376826.|
|7||Japanese Patent Office Notice of Reason for Rejection mailed Feb. 27, 2007 for corresponding Japanese Patent Application No. 2002-376826.|
|8||Kazunori Seki, et al., "A Proposal of a New Distribution Scheme for Software Product", Information Processing Association Research Report, Information Processing Society, Jul. 20, 1993, vol. 93, No. 64, pp. 19-28.|
|9||Office Action dated Oct. 29, 2002 for corresponding Japanese Application No. Hei-6-219364.|
|10||US 5,272,750, 12/1993, Shear (withdrawn)|
|International Classification||G06F21/10, G06Q10/00, G06Q30/04, G06Q30/06, G06Q50/00, G06Q50/10, G06F21/12, G06F21/14, G09C1/00, H04K1/00, G09C5/00, G06F1/00, G11B19/02|
|Cooperative Classification||G06Q30/04, G06F2211/007, G06F2221/2135, G06F21/10, G11B19/02|
|European Classification||G06Q30/04, G06F21/10, G11B19/02|
|Mar 3, 2010||FPAY||Fee payment|
Year of fee payment: 12
|Jun 22, 2010||CC||Certificate of correction|