US20130179287A1 - System and method for electronic distribution of software and data - Google Patents

System and method for electronic distribution of software and data Download PDF

Info

Publication number
US20130179287A1
US20130179287A1 US13/570,076 US201213570076A US2013179287A1 US 20130179287 A1 US20130179287 A1 US 20130179287A1 US 201213570076 A US201213570076 A US 201213570076A US 2013179287 A1 US2013179287 A1 US 2013179287A1
Authority
US
United States
Prior art keywords
data
data provider
provider
software
specified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US13/570,076
Inventor
Gennady SLOBODSKIY
Vladmir Kilatchko
Shawn Edwards
Claudio Storelli
Satoko Highstein
Tom Secunda
Navanath Prabuhudessal
Oleg Polonsky
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bloomberg Finance LP
Original Assignee
Bloomberg Finance LP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bloomberg Finance LP filed Critical Bloomberg Finance LP
Priority to US13/570,076 priority Critical patent/US20130179287A1/en
Assigned to BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT reassignment BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT SECURITY AGREEMENT Assignors: BLOOMBERG FINANCE L.P.
Assigned to BLOOMBERG FINANCE L.P. reassignment BLOOMBERG FINANCE L.P. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SECUNDA, Tom, EDWARDS, SHAWN, KLIATCHKO, VLADIMIR, PRABHUDESSAI, Navanath, SLOBODSKIY, Gennadiy, STORELLI, CLAUDIO, HIGHSTEIN, Satoko, POLONSKY, Oleg
Publication of US20130179287A1 publication Critical patent/US20130179287A1/en
Priority to US15/637,537 priority patent/US20170300667A1/en
Assigned to BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT reassignment BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BLOOMBERG FINANCE L.P.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions

Definitions

  • Data providers often provide software, e.g., tools, applications, applets, plug-ins, etc., for analyzing, manipulating, and otherwise using the data (e.g., content, media, etc.) that they provide.
  • an application portal may provide for electronic distribution of such software and data.
  • Embodiments of the invention support distribution of software and data by data and service providers, and other services and organization (e.g., ISPs, software developers, etc., insofar as they provide data in a role other than as a mere conduit for network traffic), which are referred to generally herein as “providers.”
  • providers e.g., ISPs, software developers, etc., insofar as they provide data in a role other than as a mere conduit for network traffic
  • Embodiments of the invention are described herein in connection with software and data.
  • “Software” is meant in a broad sense and may include software applications, applets, plug-ins, and other software components.
  • “Software component” is also meant in a broad sense, and may include any unit of software intended to be distributed, installed, and/or used as a unit, and may include, e.g., a standalone application, a plug-in, a library, or other component.
  • Data is also meant in a broad sense, and may include digital content and media.
  • software components may be configured to receive data that a provider provides and in some way process, present, and/or store that data.
  • Some embodiments include an application portal, application marketplace, or application store (any of which may hereinafter be referred to as an “application portal”) comprising data available for downloading and/or streaming (either of which may hereinafter be referred to as “downloading”).
  • sandbox is well known in the art and may refer to a protected computing environment in which software components may be executed with limited privileges. Although operating systems are also known to control processes' access to various facilities, a sandbox is not an operating system as such, but typically refers instead to a relatively tightly controlled environment, which may exist within an operating system, and which may impose restrictions on access to resources in addition to the restrictions that are imposed by the operating system that hosts the sandbox. (The more formal term “controlled execution environment” may also be used to refer to a sandbox.)
  • data downloaded from an application portal is used in a sandbox or other controlled and/or protected environment, and in some embodiments, may be used only on authorized devices. In some embodiments, such data may only be accessed through predetermined data sources and/or providers, including those operated by the provider of the application portal and external providers.
  • the application portal may be accessible via private or semi-private networks such as LANs, WANs, VPNs, intranets, or extranets; by private electronic communication networks (ECNs); by public networks such as the Internet; or by other communication networks or methods, including via wired and wireless technologies.
  • the application portal may run on or be accessible from a computer, server, media player, mobile and/or cellular device, tablet, storage device, entertainment device, or other electronic device.
  • data providers provide created or acquired data
  • software developers provide created or acquired software components that are uploaded to the application portal for electronic distribution.
  • data may include, for example, financial data, news, movies, music, books, and games that are distributed in a variety of formats.
  • software components may include tools, applications and plug-ins for analyzing or manipulating data, or presenting or playing data.
  • the data available for download from the application portal includes data drawn from or otherwise relevant to the fields of financial services, investments, and trading, and the software components display, chart, and/or analyze financial data, instruments and/or products, or execute or make easier the trading of financial instruments.
  • a data provider operates the application portal.
  • another service or organization, unrelated to a data provider operates the application portal.
  • the application portal is operated by one party and at least one other party provides software components and/or data.
  • the portal operator contractually binds third-party software component developers and/or third party data providers to comply with certain policies, e.g., terms of service, set forth by the operator of the application portal.
  • third-party software component developers and data providers may be individuals or organizations.
  • software component developers and data providers may use a software development kit (“SDK”) developed and maintained by the operator of the application portal.
  • SDK software development kit
  • Such an SDK may be based on, or leverage the power of, an existing development environment, framework, and/or runtime environment, e.g., Microsoft Visual Studio and .NET technologies.
  • the application portal SDK may include or otherwise be associated with tools that allow the application portal operator to handle version control and deployment of software components and data on the application portal.
  • the application portal SDK may also allow the software components to access other data or software stored on or offered by the application portal operator, either with or without a subscription requirement.
  • a financial services software component developed using the application portal SDK may be configured to access data about financial instruments, where the data is offered by the operator of the application portal.
  • This provides for controlled integration of a third-party software component into the data provider/portal operator's sandbox to access and use data supplied by the data provider.
  • a stock charting software component developed by a third party may access historical stock information and charting functions provided by a data provider and portal operator such as Bloomberg Finance L.P. (“Bloomberg”).
  • Bloomberg Finance L.P. (“Bloomberg”).
  • software components distributed from the application portal that are configured to access other data may be required, by technical restrictions, contractual obligation, or both, to access such data through the services of the application portal operator and to use data delivered by the operator of the application portal if such data is available through the application portal or from the application portal operator.
  • a stock charting software component developed by a third party may access historical stock information and charting functions provided by a data provider such as Bloomberg, where Bloomberg is also the operator of the application portal, but would be prohibited from accessing historical stock information and charting functions from a different data provider.
  • a data provider such as Bloomberg
  • Such a model would integrate the software component on the application portal with other services offered by the operator of the application portal and, in an embodiment, may support various subscription and revenue models, as discussed in more detail below.
  • software components distributed from the application portal may receive triggers or alerts from the data providers, and may update the data used by software component accordingly.
  • a stock charting software component developed for an application portal by a third party may access historical stock information and charting functions provided by the application portal operator such as Bloomberg, with the application portal operator alerting the third-party stock charting software component of changes in data, e.g., upon receipt of a press release, execution of a stock trade, or some other notable event.
  • software components available on the application portal may be configured to be downloadable, accessible, or executable only on certain devices.
  • a stock charting software component developed by a third-party may be configured to run on an authorized desktop or mobile device accessing the Bloomberg Professional® Service (“BPS”), only within the BPS sandbox and only on one or more authorized devices.
  • BPS Bloomberg Professional® Service
  • software components available on the application portal may be configured to be downloadable, accessible, or executable only by certain individuals, groups, or users meeting certain criteria, in either moderated or non-moderated application portals.
  • a stock charting software component developed by a third-party investment bank may be configured to run only on devices registered to employees of that investment bank.
  • permissioning to access data available to the bank may be configured at various access levels. For example, whether or not a particular user is allowed to download and/or execute a software component that uses certain data can depend upon whether that user has been separately permissioned to use that data with that software component. Administratively, however, some or all such separate permissions may in an embodiment of the invention be commonly administered, e.g., with reference to a single user account or group of accounts.
  • software components available on the application portal may be configured to receive “roaming” information from the application portal or other source to allow a user to utilize different devices/terminals and retain a common user profile, settings, etc. with respect to the devices, terminals, and software components.
  • software components may execute in a sandboxed run-time environment on user devices to allow unknown third-party software to safely run on user devices.
  • a sandboxed run-time environment may prevent the software components from accessing functions or information otherwise accessible on the device but outside the intended reach of the sandbox.
  • the sandbox environment may prevent access to certain operating system, local file system, registry, and memory resources.
  • the application portal operator may promote this safeguard to potential users, who can be assured that software components provided by the application portal can safely run on the users' devices, including devices which are used to support mission-critical operations and decisions.
  • software developers and data providers may undergo a vetting process by the operator of the application portal.
  • the operator of the application portal may conduct a background review of the developer/data provider; require that the business interests or goals of the developer/data provider comport with the interests and goals of the application portal operator; require that the developer/data provider comply with technical and data usage rules and terms of service; require that the software component be capable of running in a sandbox environment; and/or require that any external data served by the software component be served by the application portal operator, and not from a third-party server or other data source.
  • the operator may require that external data be served by the application portal operator only if that data is available from that operator, allowing access to data from a third-party server otherwise. Even when access to data from a third-party server is allowed, however, the application portal operator may act as a proxy between the third-party server and a software component that requests the data.
  • users of the software component may download the data for a pre-determined fee.
  • the fee may be a one-time charge, or may be a recurring charge based on a subscription model. Any such fee may be subsumed in another charge not specifically associated with the component or its use of data, such as, e.g., a general subscription or other fee charged by a data provider for use of its data.
  • the application portal operator may collect the fees directly from the purchaser, and may then share the fees with the developer/data provider, e.g., according to a previously agreed formula. For example, it may be agreed that 70% of the revenue derived from sales of a software component may be passed along to the developer/data provider and the operator may retain 30%. Any formula for dividing revenue may be adaptive, based, e.g., on the sales volume of the developer/data provider. In addition to or instead of the foregoing, such a formula may vary based on whether the software component accesses data delivered by the operator of the application portal.
  • the application portal operator may allow one or more software components to access data on the application portal at no charge, e.g., to stimulate sales of the software components.
  • the developer/data provider may be required to meet one or more standards to remain a developer/data provider on the application portal. For example, an operator may impose a monthly or yearly revenue or quantity minimum to remain a developer/data provider.
  • the developer/data provider may also be required to lease from the application portal operator, or have access to, test devices compatible with the application portal, which may include proprietary user devices.
  • the developer/data provider may be required to comply with service level agreements (“SLAs”) to ensure that the developer/data provider will timely fix high-priority software bugs identified by users.
  • SLAs service level agreements
  • the developer/data provider may be allowed to use a proprietary front-end or user interface for a software component, but may be required to adhere to workflow or design standard guidelines set forth by the application portal operator.
  • the application portal operator may be responsible for the deployment and version control of software components as well as billing administration, technical support, and serving as the first point of contact for users.
  • the presence of a software component on the application portal may be advantageous to the developer/data provider, as the application portal may have a wide audience or established user base.
  • the application portal operator may choose to feature the software component of a particular developer/data provider to increase sales.
  • systems for carrying out the functionality and or methods disclosed herein comprise at least one computer which receives, stores, and/or transmits data provided by developers and data providers, and receives, stores, and/or transmits other data, e.g., data provided by the application portal operator.
  • the at least one computer comprises or has access to electronic storage to store data described herein and access to code to cause the at least one computer to perform the functionality described herein.
  • devices that may access the application portal may comprise at least one computer or computing device, appropriate data and code storage, and input and output devices, e.g., a keyboard, a pointing device, a scanner, a computer monitor, a printer, communication devices, etc., or may comprise a media player, mobile and/or cellular device, tablet, storage device, entertainment device, or other electronic device.
  • input and output devices e.g., a keyboard, a pointing device, a scanner, a computer monitor, a printer, communication devices, etc.
  • media player e.g., mobile and/or cellular device, tablet, storage device, entertainment device, or other electronic device.
  • a method is provided of electronically distributing computer software, by a distributor, in a networked computing environment.
  • the method comprises: electronically transmitting through a computer network computer software that comprises a controlled execution environment, the controlled execution environment being capable of controlling use of the computer network by one or more components that execute within the controlled execution environment; configuring the controlled execution environment so that a component executing within the controlled execution environment is restricted to communication via the computer network only to one or more network hosts specified by the distributor; and electronically transmitting through the computer network computer software that comprises a component, the component being configured to be capable of execution only within the controlled execution environment.
  • a method is provided of electronically distributing computer software to a purchaser, by a provider of electronic data, in a networked computing environment.
  • the method comprises: electronically transmitting through a computer network computer software that comprises a controlled execution environment, the controlled execution environment being capable of controlling use of the computer network by one or more components that execute within the controlled execution environment; configuring the controlled execution environment so that any component executing within the controlled execution environment is restricted to communication via the computer network only to one or more network hosts specified by the provider of electronic data; receiving from an entity that is independent of the provider of electronic data, a component, the component being configured to be capable of execution only within the controlled execution environment; electronically receiving from the purchaser one or more queries via the computer network comprising purchase of, or a subscription to, the component in exchange for one or more first payments; and in response to receipt of the one or more queries, electronically transmitting to the purchaser through the computer network the component.
  • the method comprises receiving from the purchaser one or more second payments in exchange for electronic data services and paying the independent entity an amount
  • configuring the controlled execution environment comprises individually restricting one or more specified components executing within the controlled execution environment to communication only to one or more respective specified network hosts. According to an alternative embodiment, configuring the controlled execution environment comprises collectively restricting one or more components executing within the controlled execution environment to communication only to one or more specified network hosts. According to an alternative embodiment, configuring the controlled execution environment comprises restricting one or more components executing within the controlled execution environment from accessing one or more resources of a client device.
  • the specified network hosts are controlled by the distributor.
  • a method comprises electronically receiving one or more queries from the computer network, wherein electronically transmitting the software that comprises the component takes place automatically in response to receipt of the one or more queries.
  • the one or more queries comprise a purchase of, or subscription to, the component or the software that comprises the component in exchange for one or more first payments.
  • receiving the software prior to receiving the one or more queries, receiving the software from an entity that is independent of the distributor.
  • the specified network hosts are controlled by the distributor.
  • the distributor is a provider of electronic data services and the purchase or subscription is made by a purchaser, comprising receipt from the purchaser of one or more second payments in exchange for the electronic data services.
  • payment by the distributor to the independent entity is of an amount based on the one or more first payments.
  • the distributor does not make any payment to the independent entity based on the one or more second payments.
  • Embodiments of the invention include computer systems configured and/or otherwise programmed to carry out the above methods.
  • Embodiments also include computer readable storage media encoded with instructions that, when executed by one or more processors within a computer system, cause the computer system to carry out the above methods.
  • FIG. 1 illustrates a computer system according to one embodiment of this invention.
  • FIG. 2 illustrates a computer network according to one embodiment of this invention.
  • FIG. 3 illustrates an embodiment of an electronic delivery platform comprising a developer/data provider data source, an application portal, an application portal operator data source/data center, and user devices.
  • FIG. 4 illustrates an embodiment of an application on the application portal consuming data from a data center operated by the application portal operator.
  • FIG. 5 illustrates an embodiment of a software component on the application portal consuming data from a data center operated by the developer/data provider or other third-party data source, via the data center operated by the application portal operator.
  • FIG. 6 illustrates an embodiment of a software component on the application portal consuming data from the developer/data provider or other third-party data source, with such data hosted within the data center operated by the application portal operator.
  • FIG. 7 illustrates an embodiment of the release process of an application onto the application portal.
  • FIG. 8 illustrates a screen which may used to display categories of software components, or data, available on the application portal.
  • FIG. 9 illustrates a screen which may used to display the top, most-downloaded, and/or most-shared software components, or data, currently available on the application portal.
  • FIG. 10 illustrates a screen which may used to display featured or most popular software components, or data, available on the application portal.
  • FIG. 11 illustrates a screen which may used to display data about a particular software component, or data, available on the application portal.
  • FIG. 12 illustrates an embodiment of three .NET Application Domain sandboxes as utilized on the application portal.
  • FIG. 1 depicts an example of one such computer system 100 , which includes at least one processor 110 , such as, e.g., an Intel or Advanced Micro Devices microprocessor, coupled to a communications channel or bus 112 .
  • the computer system 100 further includes at least one input device 114 such as, e.g., a keyboard, mouse, touch pad or screen, or other selection or pointing device, at least one output device 116 such as, e.g., an electronic display device, at least one communications interface 118 , at least one data storage device 120 such as a magnetic disk or an optical disk, and memory 122 such as ROM and RAM, each coupled to the communications channel 112 .
  • the communications interface 118 may be coupled to a network (not depicted) such as the Internet.
  • FIG. 1 Although the computer system 100 is shown in FIG. 1 to have only a single communications channel 112 , a person skilled in the relevant arts will recognize that a computer system may have multiple channels (not depicted), including for example one or more busses, and that such channels may be interconnected, e.g., by one or more bridges. In such a configuration, components depicted in FIG. 1 as connected by a single channel 112 may interoperate, and may thereby be considered to be coupled to one another, despite being directly connected to different communications channels.
  • data storage device 120 and memory 122 are depicted as different units, the data storage device 120 and memory 122 can be parts of the same unit or units, and that the functions of one can be shared in whole or in part by the other, e.g., as RAM disks, virtual memory, etc. It will also be appreciated that any particular computer may have multiple components of a given type, e.g., processors 110 , input devices 114 , communications interfaces 118 , etc.
  • the data storage device 120 may store instructions executable by one or more processors or kinds of processors 110 , data, or both. Some groups of instructions, possibly grouped with data, may make up one or more programs, which may include an operating system 132 such as Windows 7, Microsoft Windows XP® or VistaTM, Linux®, Mac OS®, or Unix®. Other programs 134 may be stored instead of or in addition to the operating system. It will be appreciated that a computer system may also be implemented on platforms and operating systems other than those mentioned.
  • an operating system 132 such as Windows 7, Microsoft Windows XP® or VistaTM, Linux®, Mac OS®, or Unix®.
  • Other programs 134 may be stored instead of or in addition to the operating system. It will be appreciated that a computer system may also be implemented on platforms and operating systems other than those mentioned.
  • Any operating system 132 or other program 134 may be written using one or more programming languages such as, e.g., Java®, C, C++, C#, Visual Basic®, VB.NET®, Perl, Ruby, Python, or other programming languages, possibly using object oriented design and/or coding techniques.
  • programming languages such as, e.g., Java®, C, C++, C#, Visual Basic®, VB.NET®, Perl, Ruby, Python, or other programming languages, possibly using object oriented design and/or coding techniques.
  • the computer system 100 may also include additional components and/or systems, such as network connections, additional memory, additional processors, network interfaces, input/output busses, for example.
  • a computer-readable storage medium (CRSM) reader 136 such as, e.g., a magnetic disk drive, magneto-optical drive, optical disk drive, or flash drive, may be coupled to the communications channel 112 for reading from a CRSM 138 such as, e.g., a magnetic disk, a magneto-optical disk, an optical disk, or flash RAM.
  • CRSM computer-readable storage medium
  • one or more CRSM readers may be coupled to the rest of the computer system 100 , e.g., through a network interface (not depicted) or a communications interface 118 . In any such configuration, however, the computer system 100 may receive programs and/or data via the CRSM reader 136 .
  • the term “memory” herein is intended to include various types of suitable data storage media, whether permanent or temporary, including among other things the data storage device 120 , the memory 122 , and the CSRM 138 .
  • FIG. 1 Two or more computer systems 100 may communicate, e.g., in one or more networks, via, e.g., their respective communications interfaces 118 and/or network interfaces (not depicted).
  • FIG. 2 is a block diagram depicting an example of one such interconnected network 142 .
  • Network 142 may, for example, connect one or more workstations 144 with each other and with other computer systems, such as file servers 146 or mail servers 148 .
  • a workstation 144 may comprise a computer system 100 .
  • the connection may be achieved tangibly, e.g., via Ethernet® or optical cables, or wirelessly, e.g., through use of modulated microwave signals according to the IEEE 802.11 family of standards.
  • a computer workstation 144 or system 100 that participates in the network may send data to another computer workstation system in the network via the network connection.
  • a user station or trader station or client station may be embodied by computer workstation 144 or other suitable equipment known in the art.
  • a network 142 ( FIG. 2 ) is to enable a computer system to provide services to other computer systems, consume services provided by other computer systems, or both.
  • a file server 146 may provide common storage of files for one or more of the workstations 144 on a network 142 .
  • a workstation 144 sends data including a request for a file to the file server 146 via the network 142 and the file server 146 may respond by sending the data from the file back to the requesting workstation 144 .
  • a computer system may simultaneously act as a workstation, a server, and/or a client.
  • a workstation 144 is connected to a printer 152 . That workstation 144 may allow users of other workstations on the network 142 to use the printer 152 , thereby acting as a print server.
  • a user may be working at the workstation 144 on a document that is stored on the file server 146 .
  • the network 142 may be connected to one or more other networks, e.g., via a router 156 .
  • a router 156 may also act as a firewall, monitoring and/or restricting the flow of data to and/or from the network 142 as configured to protect the network.
  • a firewall may alternatively be a separate device (not pictured) from the router 156 .
  • An internet may comprise a network of networks 142 ( FIG. 2 ).
  • the term “the Internet” refers to the worldwide network of interconnected, packet-switched data networks that use the Internet Protocol (IP) to route and transfer data.
  • IP Internet Protocol
  • a client and server on different networks may communicate via the Internet 158 , e.g., a workstation 144 may request a World Wide Web document from a Web Server 160 .
  • the Web Server 160 may process the request and pass it to, e.g., an Application Server 162 .
  • the Application Server 162 may then conduct further processing, which may include, for example, sending data to and/or receiving data from one or more other data sources.
  • a data source may include, e.g., other servers on the same computer system 100 or LAN 102 , or a different computer system or LAN and/or a Database Management System (“DBMS”) 162 .
  • DBMS Database Management System
  • a workstation may, for example, be a computer that one or more users work with directly, e.g., through a keyboard and monitor directly coupled to the computer system.
  • a computer system that requests a service through a network is often referred to as a client, and a computer system that provides a service is often referred to as a server.
  • any particular workstation may be indistinguishable in its hardware, configuration, operating system, and/or other software from a client, server, or both.
  • client and “server” may describe programs and running processes instead of or in addition to their application to computer systems described above.
  • server may describe programs and running processes instead of or in addition to their application to computer systems described above.
  • a (software) client may consume information and/or computational services provided by a (software) server.
  • FIG. 3 illustrates an embodiment of an electronic delivery platform comprising a data provider data source 302 , an application portal 304 , a data source/data center 306 operated by the application portal operator, and user devices 308 .
  • developers and data providers create software components and/or digital content that may be considered to exist in a developer “cloud” 302 , from which they may be uploaded to the application portal 304 .
  • the application portal 304 may receive the software component and/or content from developers and data providers that have been vetted by the application portal operator.
  • the application portal 304 or the data center 306 may transmit the software component provided by the developer and the content provided by the data provider to one or more user devices 308 , which may be a computer, server, media player, mobile and/or cellular device, tablet, storage device, entertainment device, or other electronic device.
  • the software component may run in a sandboxed run-time environment on user devices 308 to allow third-party digital data to safely run on such devices.
  • the application portal 304 may be based on the Microsoft .NET Framework, with software components written in one of the .NET languages, e.g., C# or VB.NET.
  • the sandbox of the .NET framework may provide runtime security by preventing software component code from interacting with the local file system, registry, or any other unnecessary local computer resources.
  • the secure sandbox environment restricts application access to critical desktop resources such as the registry, file system, network, and unmanaged code, e.g., DLLs and COM servers. Under no circumstances, in one embodiment, will a software component running in the sandbox have the ability to launch any processes. According to some embodiments, sandbox protection is enforced using .NET Code Access Security policies.
  • each instance of a software component executes in its own .NET Application Domain sandbox within a hosting process, as shown in FIG. 12 .
  • the sandbox also improves overall system reliability. For example, if an individual software component encounters an unexpected error, the application portal hosting process may terminate the component, without affecting other software components.
  • the application portal 304 may rely on a private virtualized distribution of the .NET Framework Client Profile, so that a local installation is not required.
  • the software component or content is delivered to the user device 308 and executed in the separate .NET AppDomain.
  • the application portal 304 will also monitor installed versions of software components and content, and will automatically download a new version of the software component or content when it becomes available, e.g., when a new version with bug fixes, new functionality, or updated content is released by the developer or data provider.
  • the application portal 304 may support redownload and/or repair of damaged software components and content.
  • application portal 304 may be configured to allow software components and content to only be downloadable, accessible, or executable on certain devices, or by certain individuals, groups, or users meeting certain criteria.
  • application portal 304 may have moderated or non-moderated features and/or controls.
  • a “manager” or other party at a customer entity can control the one or more individuals or parties at the entity that may purchase and/or receive updates to software components.
  • a manager at a given entity may permit only a particular set of individuals in Research & Development at the manager's entity to receive updates to software components, whereas the remaining individuals at the manager's entity do not receive such updates.
  • a manger at an entity may permit only a particular group of individuals to purchase software components while restricting all others at the manager's entity from making app portal purchases.
  • once a given entity is enabled there are minimal or no restrictions placed on individuals at the entity from purchasing and/or receiving updates to software components on the application portal.
  • software components may be supplemented by data from data center 306 , which may be operated by the operator of the application portal 304 .
  • software components may be supplemented by data from data source 302 supplied by the developer/data provider or a third-party data source, using the application portal operator's data center 306 as a proxy.
  • software components configured to be supplemented by data from data source 306 may receive triggers or alerts from data source 306 , and update the software component or content accordingly.
  • FIG. 4 illustrates an embodiment of an software component on the application portal 402 consuming data from a data center 404 operated by the application portal operator, e.g., data center 306 shown in FIG. 3 , through a software component programming interface (“API”) 406 .
  • API 406 operates as an interface between application portal 402 and data center 404 , and may negate the need for application portal 402 and data center 404 to be configured to directly communicate.
  • API 406 may also allow software components and data available on the application portal 402 to access other services and data provided by the application portal operator at data center 404 , e.g., fetching information on financial instruments, launching a trade ticket populated with information from the software component, providing “roaming” information to allow a user to utilize different terminals and retain a common user profile and settings, etc.
  • FIG. 5 illustrates an embodiment of a software component on the application portal 402 consuming data from a data center 504 operated by the developer or other third-party data source, via the data center 506 operated by the application portal operator, and serving as a proxy.
  • API 508 operates as an interface between application portal 502 and data center 506 , and may negate the need for application portal 502 and data center 506 to be configured to directly communicate.
  • API 510 operates as an interface between data center 506 and data center 504 , and may negate the need for data center 506 and data center 504 to be configured to directly communicate.
  • data center 506 is operated by the application portal and data center 504 is operated by a developer or other third-party data source, i.e., data center 504 and data center 506 may not be configured to directly communicate, and can therefore rely on API 510 .
  • FIG. 6 illustrates an embodiment of a software component on the application portal 602 consuming data from a third-party data source 606 , with such third-party data hosted within the data center 606 operated by the application portal operator.
  • API 604 operates as an interface between application portal 602 and data center 606 , and may negate the need for application portal 602 and data center 606 to be configured to directly communicate.
  • FIG. 7 illustrates an embodiment of the release process of a software component onto the application portal.
  • a software component is created on application portal 304 and assigned a unique identifier by the application portal provider.
  • the software component is built and uploaded by the developer, passed through quality assurance checks, and prepared for release.
  • step 3 ( 706 ) the application portal operator publishes the software component for release, pending review of the software component by the application portal operator in step 4 ( 708 ).
  • step 5 ( 710 ) the software component is released to entitled users.
  • FIG. 8 illustrates a screen that may used to display categories of software components, or data, available on the application portal.
  • the screen displays a right-hand pane comprising such categories, e.g., Automatic Trading, Customer Relationship Management, Data Analysis, etc., which are individually selectable. Selecting from any of the categories may lead to a screen (not shown) which displays the relevant software components within each category, each of which is individually selectable.
  • FIG. 9 illustrates a screen that may used to display the top, most-downloaded, and/or most-shared software components, or content, currently available on the application portal.
  • the screen displays a right-hand pane comprising such categories, e.g., Most Downloaded and Most Shared, which are individually selectable.
  • categories may be dynamically updated at preset intervals based on current activity on the application portal.
  • FIG. 10 illustrates a screen that may used to display featured or most popular software components, or content, available on the application portal.
  • Featured software components on this screen may be static and chosen by a review team, or may be dynamically updated based on other criteria such as the amount of time a software component has spent on a most downloaded list.
  • Featured software components on this screen may also be displayed with graphical previews of the software component.
  • FIG. 11 illustrates a detail screen that may used to display data about a particular software component, or content, available on the application portal.
  • the screen of FIG. 11 may be accessible by searching for a particular software component or content by name or keyword using a built-in search feature; by finding the software component or content from within one of the categories discussed above and as displayed on the left-hand pane of FIGS. 8-11 ; by direct-linking to the software component or content screen via, for example, a URL; or by any other means for locating an software component on the application portal.
  • the screen of FIG. 11 displays information about the selected software component including a description, data provider information, support information, release and update dates, and price.
  • the screen may also allow the user to buy and install the software component or run a free demonstration of the software component, e.g., a one-time trial run of the software component, or a trial run of the software component for a pre-determined time period.

Abstract

According to computerized methods of distributing software and data, software components may be distributed electronically for execution in controlled environments. Such a controlled environment may, for example, restrict the components' ability to communicate through a network to one or more specified hosts. When a component requests data, such as a stream of financial data, the request may specify a source of the data, and the request may be granted or denied by the distributor based on whether the specified source is an authorized source of the data and/or whether the requested data is available from an authorized source.

Description

    CROSS-REFERENCE TO RELATED APPLICATION
  • This application claims the benefit of provisional U.S. Patent Application No. 61/521,192, titled “System and Method for Electronic Distribution of Software and Data” and filed on 8 Aug. 2011, which is incorporated herein by reference including all appendices thereto.
  • COPYRIGHT NOTICE
  • A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure as it appears in the Patent and Trademark Office patent files or records but otherwise reserves all copyrights whatsoever.
  • BACKGROUND OF THE INVENTION
  • Data providers often provide software, e.g., tools, applications, applets, plug-ins, etc., for analyzing, manipulating, and otherwise using the data (e.g., content, media, etc.) that they provide.
  • For example, an application portal may provide for electronic distribution of such software and data.
  • SUMMARY OF THE INVENTION
  • Embodiments of the invention support distribution of software and data by data and service providers, and other services and organization (e.g., ISPs, software developers, etc., insofar as they provide data in a role other than as a mere conduit for network traffic), which are referred to generally herein as “providers.”
  • Embodiments of the invention are described herein in connection with software and data. “Software” is meant in a broad sense and may include software applications, applets, plug-ins, and other software components. “Software component” is also meant in a broad sense, and may include any unit of software intended to be distributed, installed, and/or used as a unit, and may include, e.g., a standalone application, a plug-in, a library, or other component. “Data” is also meant in a broad sense, and may include digital content and media.
  • According to some embodiments, software components may be configured to receive data that a provider provides and in some way process, present, and/or store that data. Some embodiments include an application portal, application marketplace, or application store (any of which may hereinafter be referred to as an “application portal”) comprising data available for downloading and/or streaming (either of which may hereinafter be referred to as “downloading”).
  • The term “sandbox” is well known in the art and may refer to a protected computing environment in which software components may be executed with limited privileges. Although operating systems are also known to control processes' access to various facilities, a sandbox is not an operating system as such, but typically refers instead to a relatively tightly controlled environment, which may exist within an operating system, and which may impose restrictions on access to resources in addition to the restrictions that are imposed by the operating system that hosts the sandbox. (The more formal term “controlled execution environment” may also be used to refer to a sandbox.)
  • According to some embodiments, data downloaded from an application portal is used in a sandbox or other controlled and/or protected environment, and in some embodiments, may be used only on authorized devices. In some embodiments, such data may only be accessed through predetermined data sources and/or providers, including those operated by the provider of the application portal and external providers.
  • According to embodiments, the application portal may be accessible via private or semi-private networks such as LANs, WANs, VPNs, intranets, or extranets; by private electronic communication networks (ECNs); by public networks such as the Internet; or by other communication networks or methods, including via wired and wireless technologies. In various embodiments, the application portal may run on or be accessible from a computer, server, media player, mobile and/or cellular device, tablet, storage device, entertainment device, or other electronic device.
  • According to some embodiments, data providers provide created or acquired data, and software developers provide created or acquired software components that are uploaded to the application portal for electronic distribution. Such data may include, for example, financial data, news, movies, music, books, and games that are distributed in a variety of formats. Such software components may include tools, applications and plug-ins for analyzing or manipulating data, or presenting or playing data. In one embodiment, the data available for download from the application portal includes data drawn from or otherwise relevant to the fields of financial services, investments, and trading, and the software components display, chart, and/or analyze financial data, instruments and/or products, or execute or make easier the trading of financial instruments.
  • According to some embodiments, a data provider operates the application portal. In other embodiments, another service or organization, unrelated to a data provider, operates the application portal.
  • According to some embodiments, the application portal is operated by one party and at least one other party provides software components and/or data. According to some embodiments, the portal operator contractually binds third-party software component developers and/or third party data providers to comply with certain policies, e.g., terms of service, set forth by the operator of the application portal. According to some embodiments, third-party software component developers and data providers may be individuals or organizations.
  • According to some embodiments, software component developers and data providers may use a software development kit (“SDK”) developed and maintained by the operator of the application portal. Such an SDK may be based on, or leverage the power of, an existing development environment, framework, and/or runtime environment, e.g., Microsoft Visual Studio and .NET technologies.
  • In an embodiment, the application portal SDK may include or otherwise be associated with tools that allow the application portal operator to handle version control and deployment of software components and data on the application portal. The application portal SDK may also allow the software components to access other data or software stored on or offered by the application portal operator, either with or without a subscription requirement.
  • For example, in one embodiment, a financial services software component developed using the application portal SDK may be configured to access data about financial instruments, where the data is offered by the operator of the application portal. This provides for controlled integration of a third-party software component into the data provider/portal operator's sandbox to access and use data supplied by the data provider. For example, a stock charting software component developed by a third party may access historical stock information and charting functions provided by a data provider and portal operator such as Bloomberg Finance L.P. (“Bloomberg”). Such integration between a third-party software component and underlying data from the application portal operator creates a synergistic effect.
  • According to some embodiments, software components distributed from the application portal that are configured to access other data may be required, by technical restrictions, contractual obligation, or both, to access such data through the services of the application portal operator and to use data delivered by the operator of the application portal if such data is available through the application portal or from the application portal operator.
  • For example, in one embodiment, a stock charting software component developed by a third party may access historical stock information and charting functions provided by a data provider such as Bloomberg, where Bloomberg is also the operator of the application portal, but would be prohibited from accessing historical stock information and charting functions from a different data provider. Such a model would integrate the software component on the application portal with other services offered by the operator of the application portal and, in an embodiment, may support various subscription and revenue models, as discussed in more detail below.
  • According to some embodiments, software components distributed from the application portal that are configured to access data from the application portal operator or a third-party data provider may receive triggers or alerts from the data providers, and may update the data used by software component accordingly. For example, a stock charting software component developed for an application portal by a third party may access historical stock information and charting functions provided by the application portal operator such as Bloomberg, with the application portal operator alerting the third-party stock charting software component of changes in data, e.g., upon receipt of a press release, execution of a stock trade, or some other notable event.
  • According to some embodiments, software components available on the application portal may be configured to be downloadable, accessible, or executable only on certain devices. For example, in an embodiment, a stock charting software component developed by a third-party may be configured to run on an authorized desktop or mobile device accessing the Bloomberg Professional® Service (“BPS”), only within the BPS sandbox and only on one or more authorized devices.
  • According to some embodiments, software components available on the application portal may be configured to be downloadable, accessible, or executable only by certain individuals, groups, or users meeting certain criteria, in either moderated or non-moderated application portals. For example, in an embodiment, a stock charting software component developed by a third-party investment bank may be configured to run only on devices registered to employees of that investment bank. In addition to or instead of the foregoing, permissioning to access data available to the bank may be configured at various access levels. For example, whether or not a particular user is allowed to download and/or execute a software component that uses certain data can depend upon whether that user has been separately permissioned to use that data with that software component. Administratively, however, some or all such separate permissions may in an embodiment of the invention be commonly administered, e.g., with reference to a single user account or group of accounts.
  • According to some embodiments, software components available on the application portal may be configured to receive “roaming” information from the application portal or other source to allow a user to utilize different devices/terminals and retain a common user profile, settings, etc. with respect to the devices, terminals, and software components.
  • According to some embodiments, software components may execute in a sandboxed run-time environment on user devices to allow unknown third-party software to safely run on user devices. Such an environment may prevent the software components from accessing functions or information otherwise accessible on the device but outside the intended reach of the sandbox. For example, the sandbox environment may prevent access to certain operating system, local file system, registry, and memory resources. In such an embodiment, the application portal operator may promote this safeguard to potential users, who can be assured that software components provided by the application portal can safely run on the users' devices, including devices which are used to support mission-critical operations and decisions.
  • As another safeguard, in an embodiment, software developers and data providers may undergo a vetting process by the operator of the application portal. For example, in an embodiment, the operator of the application portal may conduct a background review of the developer/data provider; require that the business interests or goals of the developer/data provider comport with the interests and goals of the application portal operator; require that the developer/data provider comply with technical and data usage rules and terms of service; require that the software component be capable of running in a sandbox environment; and/or require that any external data served by the software component be served by the application portal operator, and not from a third-party server or other data source.
  • Alternatively, the operator may require that external data be served by the application portal operator only if that data is available from that operator, allowing access to data from a third-party server otherwise. Even when access to data from a third-party server is allowed, however, the application portal operator may act as a proxy between the third-party server and a software component that requests the data.
  • According to some embodiments, after developers and data providers have created software components and uploaded the software components to the application portal for electronic distribution, users of the software component may download the data for a pre-determined fee. In an embodiment, the fee may be a one-time charge, or may be a recurring charge based on a subscription model. Any such fee may be subsumed in another charge not specifically associated with the component or its use of data, such as, e.g., a general subscription or other fee charged by a data provider for use of its data.
  • In an embodiment, the application portal operator may collect the fees directly from the purchaser, and may then share the fees with the developer/data provider, e.g., according to a previously agreed formula. For example, it may be agreed that 70% of the revenue derived from sales of a software component may be passed along to the developer/data provider and the operator may retain 30%. Any formula for dividing revenue may be adaptive, based, e.g., on the sales volume of the developer/data provider. In addition to or instead of the foregoing, such a formula may vary based on whether the software component accesses data delivered by the operator of the application portal.
  • In an embodiment, the application portal operator may allow one or more software components to access data on the application portal at no charge, e.g., to stimulate sales of the software components.
  • According to embodiments, the developer/data provider may be required to meet one or more standards to remain a developer/data provider on the application portal. For example, an operator may impose a monthly or yearly revenue or quantity minimum to remain a developer/data provider. The developer/data provider may also be required to lease from the application portal operator, or have access to, test devices compatible with the application portal, which may include proprietary user devices. In an embodiment, the developer/data provider may be required to comply with service level agreements (“SLAs”) to ensure that the developer/data provider will timely fix high-priority software bugs identified by users.
  • In an embodiment, the developer/data provider may be allowed to use a proprietary front-end or user interface for a software component, but may be required to adhere to workflow or design standard guidelines set forth by the application portal operator.
  • According to embodiments, the application portal operator may be responsible for the deployment and version control of software components as well as billing administration, technical support, and serving as the first point of contact for users.
  • According to embodiments, the presence of a software component on the application portal may be advantageous to the developer/data provider, as the application portal may have a wide audience or established user base. In an embodiment, the application portal operator may choose to feature the software component of a particular developer/data provider to increase sales.
  • According to some embodiments, systems for carrying out the functionality and or methods disclosed herein comprise at least one computer which receives, stores, and/or transmits data provided by developers and data providers, and receives, stores, and/or transmits other data, e.g., data provided by the application portal operator. The at least one computer comprises or has access to electronic storage to store data described herein and access to code to cause the at least one computer to perform the functionality described herein.
  • In an embodiment, devices that may access the application portal may comprise at least one computer or computing device, appropriate data and code storage, and input and output devices, e.g., a keyboard, a pointing device, a scanner, a computer monitor, a printer, communication devices, etc., or may comprise a media player, mobile and/or cellular device, tablet, storage device, entertainment device, or other electronic device.
  • According to an embodiment of the invention, a method is provided of electronically distributing computer software, by a distributor, in a networked computing environment. The method comprises: electronically transmitting through a computer network computer software that comprises a controlled execution environment, the controlled execution environment being capable of controlling use of the computer network by one or more components that execute within the controlled execution environment; configuring the controlled execution environment so that a component executing within the controlled execution environment is restricted to communication via the computer network only to one or more network hosts specified by the distributor; and electronically transmitting through the computer network computer software that comprises a component, the component being configured to be capable of execution only within the controlled execution environment.
  • According to an embodiment of the invention, a method is provided of electronically distributing computer software to a purchaser, by a provider of electronic data, in a networked computing environment. The method comprises: electronically transmitting through a computer network computer software that comprises a controlled execution environment, the controlled execution environment being capable of controlling use of the computer network by one or more components that execute within the controlled execution environment; configuring the controlled execution environment so that any component executing within the controlled execution environment is restricted to communication via the computer network only to one or more network hosts specified by the provider of electronic data; receiving from an entity that is independent of the provider of electronic data, a component, the component being configured to be capable of execution only within the controlled execution environment; electronically receiving from the purchaser one or more queries via the computer network comprising purchase of, or a subscription to, the component in exchange for one or more first payments; and in response to receipt of the one or more queries, electronically transmitting to the purchaser through the computer network the component. In an embodiment of the invention, the method comprises receiving from the purchaser one or more second payments in exchange for electronic data services and paying the independent entity an amount that is based on the one or more first payments but is not based on the one or more second payments.
  • According to an embodiment, configuring the controlled execution environment comprises individually restricting one or more specified components executing within the controlled execution environment to communication only to one or more respective specified network hosts. According to an alternative embodiment, configuring the controlled execution environment comprises collectively restricting one or more components executing within the controlled execution environment to communication only to one or more specified network hosts. According to an alternative embodiment, configuring the controlled execution environment comprises restricting one or more components executing within the controlled execution environment from accessing one or more resources of a client device.
  • According to an embodiment, the specified network hosts are controlled by the distributor.
  • A method according to an embodiment comprises electronically receiving one or more queries from the computer network, wherein electronically transmitting the software that comprises the component takes place automatically in response to receipt of the one or more queries. According to an embodiment, the one or more queries comprise a purchase of, or subscription to, the component or the software that comprises the component in exchange for one or more first payments. According to an embodiment, prior to receiving the one or more queries, receiving the software from an entity that is independent of the distributor. According to an embodiment, the specified network hosts are controlled by the distributor.
  • According to an embodiment, the distributor is a provider of electronic data services and the purchase or subscription is made by a purchaser, comprising receipt from the purchaser of one or more second payments in exchange for the electronic data services. According to an embodiment, payment by the distributor to the independent entity is of an amount based on the one or more first payments. In an embodiment, the distributor does not make any payment to the independent entity based on the one or more second payments.
  • Embodiments of the invention include computer systems configured and/or otherwise programmed to carry out the above methods. Embodiments also include computer readable storage media encoded with instructions that, when executed by one or more processors within a computer system, cause the computer system to carry out the above methods.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The invention is illustrated in the figures of the accompanying drawings, which are meant to be exemplary and not limiting, and in which like references are intended to refer to like or corresponding parts, elements, or functions.
  • FIG. 1 illustrates a computer system according to one embodiment of this invention.
  • FIG. 2 illustrates a computer network according to one embodiment of this invention.
  • FIG. 3 illustrates an embodiment of an electronic delivery platform comprising a developer/data provider data source, an application portal, an application portal operator data source/data center, and user devices.
  • FIG. 4 illustrates an embodiment of an application on the application portal consuming data from a data center operated by the application portal operator.
  • FIG. 5 illustrates an embodiment of a software component on the application portal consuming data from a data center operated by the developer/data provider or other third-party data source, via the data center operated by the application portal operator.
  • FIG. 6 illustrates an embodiment of a software component on the application portal consuming data from the developer/data provider or other third-party data source, with such data hosted within the data center operated by the application portal operator.
  • FIG. 7 illustrates an embodiment of the release process of an application onto the application portal.
  • FIG. 8 illustrates a screen which may used to display categories of software components, or data, available on the application portal.
  • FIG. 9 illustrates a screen which may used to display the top, most-downloaded, and/or most-shared software components, or data, currently available on the application portal.
  • FIG. 10 illustrates a screen which may used to display featured or most popular software components, or data, available on the application portal.
  • FIG. 11 illustrates a screen which may used to display data about a particular software component, or data, available on the application portal.
  • FIG. 12 illustrates an embodiment of three .NET Application Domain sandboxes as utilized on the application portal.
  • DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
  • Embodiments of the invention may be implemented by systems using one or more programmable digital computers. FIG. 1 depicts an example of one such computer system 100, which includes at least one processor 110, such as, e.g., an Intel or Advanced Micro Devices microprocessor, coupled to a communications channel or bus 112. The computer system 100 further includes at least one input device 114 such as, e.g., a keyboard, mouse, touch pad or screen, or other selection or pointing device, at least one output device 116 such as, e.g., an electronic display device, at least one communications interface 118, at least one data storage device 120 such as a magnetic disk or an optical disk, and memory 122 such as ROM and RAM, each coupled to the communications channel 112. The communications interface 118 may be coupled to a network (not depicted) such as the Internet.
  • Although the computer system 100 is shown in FIG. 1 to have only a single communications channel 112, a person skilled in the relevant arts will recognize that a computer system may have multiple channels (not depicted), including for example one or more busses, and that such channels may be interconnected, e.g., by one or more bridges. In such a configuration, components depicted in FIG. 1 as connected by a single channel 112 may interoperate, and may thereby be considered to be coupled to one another, despite being directly connected to different communications channels.
  • One skilled in the art will recognize that, although the data storage device 120 and memory 122 are depicted as different units, the data storage device 120 and memory 122 can be parts of the same unit or units, and that the functions of one can be shared in whole or in part by the other, e.g., as RAM disks, virtual memory, etc. It will also be appreciated that any particular computer may have multiple components of a given type, e.g., processors 110, input devices 114, communications interfaces 118, etc.
  • The data storage device 120 (FIG. 1) and/or memory 122 may store instructions executable by one or more processors or kinds of processors 110, data, or both. Some groups of instructions, possibly grouped with data, may make up one or more programs, which may include an operating system 132 such as Windows 7, Microsoft Windows XP® or Vista™, Linux®, Mac OS®, or Unix®. Other programs 134 may be stored instead of or in addition to the operating system. It will be appreciated that a computer system may also be implemented on platforms and operating systems other than those mentioned. Any operating system 132 or other program 134, or any part of either, may be written using one or more programming languages such as, e.g., Java®, C, C++, C#, Visual Basic®, VB.NET®, Perl, Ruby, Python, or other programming languages, possibly using object oriented design and/or coding techniques.
  • One skilled in the art will recognize that the computer system 100 (FIG. 1) may also include additional components and/or systems, such as network connections, additional memory, additional processors, network interfaces, input/output busses, for example. One skilled in the art will also recognize that the programs and data may be received by and stored in the system in alternative ways. For example, a computer-readable storage medium (CRSM) reader 136, such as, e.g., a magnetic disk drive, magneto-optical drive, optical disk drive, or flash drive, may be coupled to the communications channel 112 for reading from a CRSM 138 such as, e.g., a magnetic disk, a magneto-optical disk, an optical disk, or flash RAM. Alternatively, one or more CRSM readers may be coupled to the rest of the computer system 100, e.g., through a network interface (not depicted) or a communications interface 118. In any such configuration, however, the computer system 100 may receive programs and/or data via the CRSM reader 136. Further, it will be appreciated that the term “memory” herein is intended to include various types of suitable data storage media, whether permanent or temporary, including among other things the data storage device 120, the memory 122, and the CSRM 138.
  • Two or more computer systems 100 (FIG. 1) may communicate, e.g., in one or more networks, via, e.g., their respective communications interfaces 118 and/or network interfaces (not depicted). FIG. 2 is a block diagram depicting an example of one such interconnected network 142. Network 142 may, for example, connect one or more workstations 144 with each other and with other computer systems, such as file servers 146 or mail servers 148. A workstation 144 may comprise a computer system 100. The connection may be achieved tangibly, e.g., via Ethernet® or optical cables, or wirelessly, e.g., through use of modulated microwave signals according to the IEEE 802.11 family of standards. A computer workstation 144 or system 100 that participates in the network may send data to another computer workstation system in the network via the network connection. A user station or trader station or client station may be embodied by computer workstation 144 or other suitable equipment known in the art.
  • One use of a network 142 (FIG. 2) is to enable a computer system to provide services to other computer systems, consume services provided by other computer systems, or both. For example, a file server 146 may provide common storage of files for one or more of the workstations 144 on a network 142. A workstation 144 sends data including a request for a file to the file server 146 via the network 142 and the file server 146 may respond by sending the data from the file back to the requesting workstation 144.
  • Further, a computer system may simultaneously act as a workstation, a server, and/or a client. For example, as depicted in FIG. 2, a workstation 144 is connected to a printer 152. That workstation 144 may allow users of other workstations on the network 142 to use the printer 152, thereby acting as a print server. At the same time, however, a user may be working at the workstation 144 on a document that is stored on the file server 146.
  • The network 142 (FIG. 2) may be connected to one or more other networks, e.g., via a router 156. A router 156 may also act as a firewall, monitoring and/or restricting the flow of data to and/or from the network 142 as configured to protect the network. A firewall may alternatively be a separate device (not pictured) from the router 156.
  • An internet may comprise a network of networks 142 (FIG. 2). The term “the Internet” refers to the worldwide network of interconnected, packet-switched data networks that use the Internet Protocol (IP) to route and transfer data. For example, a client and server on different networks may communicate via the Internet 158, e.g., a workstation 144 may request a World Wide Web document from a Web Server 160. The Web Server 160 may process the request and pass it to, e.g., an Application Server 162. The Application Server 162 may then conduct further processing, which may include, for example, sending data to and/or receiving data from one or more other data sources. Such a data source may include, e.g., other servers on the same computer system 100 or LAN 102, or a different computer system or LAN and/or a Database Management System (“DBMS”) 162.
  • As will be recognized by those skilled in the relevant art, the terms “workstation,” “client,” and “server” are used herein to describe a computer's function in a particular context. A workstation may, for example, be a computer that one or more users work with directly, e.g., through a keyboard and monitor directly coupled to the computer system. A computer system that requests a service through a network is often referred to as a client, and a computer system that provides a service is often referred to as a server. But any particular workstation may be indistinguishable in its hardware, configuration, operating system, and/or other software from a client, server, or both.
  • The terms “client” and “server” may describe programs and running processes instead of or in addition to their application to computer systems described above. Generally, a (software) client may consume information and/or computational services provided by a (software) server.
  • FIG. 3 illustrates an embodiment of an electronic delivery platform comprising a data provider data source 302, an application portal 304, a data source/data center 306 operated by the application portal operator, and user devices 308.
  • in an embodiment, developers and data providers create software components and/or digital content that may be considered to exist in a developer “cloud” 302, from which they may be uploaded to the application portal 304. The application portal 304 may receive the software component and/or content from developers and data providers that have been vetted by the application portal operator.
  • According to some embodiments, the application portal 304 or the data center 306 may transmit the software component provided by the developer and the content provided by the data provider to one or more user devices 308, which may be a computer, server, media player, mobile and/or cellular device, tablet, storage device, entertainment device, or other electronic device. According to some embodiments, the software component may run in a sandboxed run-time environment on user devices 308 to allow third-party digital data to safely run on such devices.
  • In an embodiment, the application portal 304 may be based on the Microsoft .NET Framework, with software components written in one of the .NET languages, e.g., C# or VB.NET. The sandbox of the .NET framework may provide runtime security by preventing software component code from interacting with the local file system, registry, or any other unnecessary local computer resources.
  • In an embodiment, for example, the secure sandbox environment restricts application access to critical desktop resources such as the registry, file system, network, and unmanaged code, e.g., DLLs and COM servers. Under no circumstances, in one embodiment, will a software component running in the sandbox have the ability to launch any processes. According to some embodiments, sandbox protection is enforced using .NET Code Access Security policies.
  • In an embodiment, each instance of a software component executes in its own .NET Application Domain sandbox within a hosting process, as shown in FIG. 12. In addition to providing a secure hosting environment, the sandbox also improves overall system reliability. For example, if an individual software component encounters an unexpected error, the application portal hosting process may terminate the component, without affecting other software components.
  • In an embodiment, the application portal 304 may rely on a private virtualized distribution of the .NET Framework Client Profile, so that a local installation is not required. According to some embodiments, when a user associated with a given user device 308 purchases a software component or data from the application portal 304, the software component or content is delivered to the user device 308 and executed in the separate .NET AppDomain.
  • In an embodiment, the application portal 304 will also monitor installed versions of software components and content, and will automatically download a new version of the software component or content when it becomes available, e.g., when a new version with bug fixes, new functionality, or updated content is released by the developer or data provider. In an embodiment of the invention, the application portal 304 may support redownload and/or repair of damaged software components and content.
  • According to some embodiments, application portal 304 may be configured to allow software components and content to only be downloadable, accessible, or executable on certain devices, or by certain individuals, groups, or users meeting certain criteria.
  • According to some embodiments, application portal 304 may have moderated or non-moderated features and/or controls. In a moderated environment, in an embodiment, a “manager” or other party at a customer entity can control the one or more individuals or parties at the entity that may purchase and/or receive updates to software components. For example, a manager at a given entity may permit only a particular set of individuals in Research & Development at the manager's entity to receive updates to software components, whereas the remaining individuals at the manager's entity do not receive such updates. Similarly, a manger at an entity may permit only a particular group of individuals to purchase software components while restricting all others at the manager's entity from making app portal purchases. In a non moderated environment, in an embodiment, once a given entity is enabled, there are minimal or no restrictions placed on individuals at the entity from purchasing and/or receiving updates to software components on the application portal.
  • In an embodiment, software components may be supplemented by data from data center 306, which may be operated by the operator of the application portal 304. In another embodiment, software components may be supplemented by data from data source 302 supplied by the developer/data provider or a third-party data source, using the application portal operator's data center 306 as a proxy. According to some embodiments, software components configured to be supplemented by data from data source 306 may receive triggers or alerts from data source 306, and update the software component or content accordingly.
  • FIG. 4 illustrates an embodiment of an software component on the application portal 402 consuming data from a data center 404 operated by the application portal operator, e.g., data center 306 shown in FIG. 3, through a software component programming interface (“API”) 406. API 406 operates as an interface between application portal 402 and data center 404, and may negate the need for application portal 402 and data center 404 to be configured to directly communicate. API 406 may also allow software components and data available on the application portal 402 to access other services and data provided by the application portal operator at data center 404, e.g., fetching information on financial instruments, launching a trade ticket populated with information from the software component, providing “roaming” information to allow a user to utilize different terminals and retain a common user profile and settings, etc.
  • FIG. 5 illustrates an embodiment of a software component on the application portal 402 consuming data from a data center 504 operated by the developer or other third-party data source, via the data center 506 operated by the application portal operator, and serving as a proxy. API 508 operates as an interface between application portal 502 and data center 506, and may negate the need for application portal 502 and data center 506 to be configured to directly communicate. API 510 operates as an interface between data center 506 and data center 504, and may negate the need for data center 506 and data center 504 to be configured to directly communicate. Such a configuration may be especially advantageous as, in an embodiment, data center 506 is operated by the application portal and data center 504 is operated by a developer or other third-party data source, i.e., data center 504 and data center 506 may not be configured to directly communicate, and can therefore rely on API 510.
  • FIG. 6 illustrates an embodiment of a software component on the application portal 602 consuming data from a third-party data source 606, with such third-party data hosted within the data center 606 operated by the application portal operator. API 604 operates as an interface between application portal 602 and data center 606, and may negate the need for application portal 602 and data center 606 to be configured to directly communicate.
  • FIG. 7 illustrates an embodiment of the release process of a software component onto the application portal. In an embodiment, in step 1 (702), a software component is created on application portal 304 and assigned a unique identifier by the application portal provider. In step 2 (704), the software component is built and uploaded by the developer, passed through quality assurance checks, and prepared for release.
  • In an embodiment, in step 3 (706), the application portal operator publishes the software component for release, pending review of the software component by the application portal operator in step 4 (708). In step 5 (710), the software component is released to entitled users.
  • FIG. 8 illustrates a screen that may used to display categories of software components, or data, available on the application portal. In an embodiment, the screen displays a right-hand pane comprising such categories, e.g., Automatic Trading, Customer Relationship Management, Data Analysis, etc., which are individually selectable. Selecting from any of the categories may lead to a screen (not shown) which displays the relevant software components within each category, each of which is individually selectable.
  • FIG. 9 illustrates a screen that may used to display the top, most-downloaded, and/or most-shared software components, or content, currently available on the application portal. In an embodiment, the screen displays a right-hand pane comprising such categories, e.g., Most Downloaded and Most Shared, which are individually selectable. Such categories may be dynamically updated at preset intervals based on current activity on the application portal.
  • FIG. 10 illustrates a screen that may used to display featured or most popular software components, or content, available on the application portal. Featured software components on this screen may be static and chosen by a review team, or may be dynamically updated based on other criteria such as the amount of time a software component has spent on a most downloaded list. Featured software components on this screen may also be displayed with graphical previews of the software component.
  • FIG. 11 illustrates a detail screen that may used to display data about a particular software component, or content, available on the application portal. The screen of FIG. 11 may be accessible by searching for a particular software component or content by name or keyword using a built-in search feature; by finding the software component or content from within one of the categories discussed above and as displayed on the left-hand pane of FIGS. 8-11; by direct-linking to the software component or content screen via, for example, a URL; or by any other means for locating an software component on the application portal.
  • In an embodiment, the screen of FIG. 11 displays information about the selected software component including a description, data provider information, support information, release and update dates, and price. According to embodiments, the screen may also allow the user to buy and install the software component or run a free demonstration of the software component, e.g., a one-time trial run of the software component, or a trial run of the software component for a pre-determined time period.
  • While the invention has been described and illustrated in connection with certain embodiments, many variations and modifications as will be evident to those skilled in this art may be made without departing from the spirit and scope of the invention, and the invention is thus not to be limited to the precise details of methodology or construction set forth above as such variations and modifications are intended to be included within the scope of the invention as may be defined by claims.

Claims (31)

1. A method of providing computer software from a software provider and data, the method being performed by a computer system that comprises one or more processors, one or more memories operatively coupled to at least one of the processors, and one or more interfaces operatively coupled to at least one of the processors, and the method comprising:
transmitting through at least one of the interfaces a software component that is restricted to execution in a controlled execution environment;
receiving through at least one of the interfaces, from the software component executing in the controlled execution environment, a request for data from a data provider specified in the request; and
in response to receiving the request for the data, at least one of the processors executing instructions to determine
(i) whether the specified data provider is also a data provider authorized by the provider of the software component,
(ii) whether the requested data is available from the specified data provider, and
(iii) if the specified data provider is not the authorized data provider, whether the requested data is available from the authorized data provider.
2. The method of claim 1, comprising:
in response to determining that the requested data is available from the specified data provider and further determining either
(i) that the specified data provider is the authorized data provider, or
(ii) that the specified data provider is not the authorized data provider and that the requested data is not available from the authorized data provider,
transmitting the requested data to the software component through at least one of the interfaces;
wherein the computer system is configured to refuse to transmit the requested data to the software component in response to determining either
(i) that the requested data is not available from the specified data provider, or
(ii) that the requested data is available from the authorized data provider and that the specified data provider is not the authorized data provider.
3. The method of claim 2, wherein the requested data is a stream of data.
4. The method of claim 2, comprising transmitting the controlled execution environment through at least one of the interfaces, wherein the controlled execution environment is configured to restrict one or more components that execute within it to communicate only with one or more respective specified network hosts.
5. The method of claim 2, wherein the authorized data provider is the provider of the software component.
6. The method of claim 2, wherein the specified data provider is not the authorized data provider, the method comprising acting as network proxy between the software component executing in the controlled execution environment and the specified data provider.
7. The method of claim 1, comprising electronically receiving one or more queries from the computer network, wherein electronically transmitting the software that comprises the component takes place automatically in response to receipt of the one or more queries.
8. The method of claim 7, wherein the one or more queries comprise a purchase of, or subscription to, the component or the software that comprises the component in exchange for one or more first payments.
9. The method of claim 8, comprising, prior to receiving the one or more queries, receiving the software from an entity that is independent of the distributor.
10. The method of claim 9, wherein the specified network hosts are controlled by the distributor.
11. The method of claim 10, wherein the distributor is a vendor of electronic data services and the purchase or subscription is made by a purchaser, comprising receipt from the purchaser of one or more second payments in exchange for the electronic data services.
12. The method of claim 11, comprising payment by the distributor to the independent entity of an amount based on the one or more first payments.
13. The method of claim 12, wherein the distributor does not make any payment to the independent entity based on the one or more second payments.
14. A computerized method of electronically distributing computer software to a purchaser, by a vendor of electronic data, in a networked computing environment, the method comprising:
electronically transmitting through a computer network computer software that comprises a controlled execution environment, the controlled execution environment being capable of controlling use of the computer network by one or more components that execute within the controlled execution environment;
configuring the controlled execution environment so that any component executing within the controlled execution environment is restricted to communication via the computer network only to one or more network hosts specified by the vendor;
receiving a software component from an entity that is independent of the vendor of electronic data, the component being configured to be capable of execution only within the controlled execution environment;
electronically receiving from the purchaser one or more queries via the computer network comprising purchase of, or a subscription to, the component in exchange for one or more first payments;
in response to receipt of the one or more queries, electronically transmitting to the purchaser through the computer network the component; and
receiving from the purchaser one or more second payments in exchange for electronic data services wherein the distributor does not make any payment to the independent entity based on the one or more second payments.
15. The method of claim 14, comprising paying the entity that is independent of the vendor of electronic data an amount that is based on the one or more first payments but is not based on the one or more second payments.
16. A computer system for providing computer software from a software provider and data, the computer system comprising:
one or more processors;
one or more memories operatively coupled to at least one of the processors;
one or more interfaces operatively coupled to at least one of the processors; and
one or more computer-readable storage media operatively coupled to at least one of the processors and encoded with instructions that, when executed by at least one of the processors, cause the computer system at least to
transmit through at least one of the interfaces a software component that is restricted to execution in a controlled execution environment;
receive through at least one of the interfaces, from the software component executing in the controlled execution environment, a request for data from a data provider specified in the request; and
in response to receiving the request for the data, determine (i) whether the specified data provider is also a data provider authorized by the provider of the software component, (ii) whether the requested data is available from the specified data provider, and (iii) if the specified data provider is not the authorized data provider, whether the requested data is available from the authorized data provider.
17. The computer system of claim 16, wherein:
the instructions comprise instructions that, when executed by at least one of the processors, cause the computer system at least to, in response to determining that the requested data is available from the specified data provider and further determining either (i) that the specified data provider is the authorized data provider, or (ii) that the specified data provider is not the authorized data provider and that the requested data is not available from the authorized data provider, transmit the requested data to the software component through at least one of the interfaces; and
the instructions are such that the computer system refuses to transmit the requested data to the software component in response to determining either (i) that the requested data is not available from the specified data provider, or (ii) that the requested data is available from the authorized data provider and that the specified data provider is not the authorized data provider.
18. The computer system of claim 17, wherein the requested data is a stream of data.
19. The computer system of claim 17, wherein:
the instructions comprise instructions that, when executed by at least one of the processors, cause the computer system at least to transmit the controlled execution environment through at least one of the interfaces; and
the controlled execution environment is configured to restrict one or more components that execute within it to communicate only with one or more respective specified network hosts.
20. The computer system of claim 17, wherein the authorized data provider is the provider of the software component.
21. The computer system of claim 17, wherein:
the specified data provider is not the authorized data provider; and
the instructions comprise instructions that, when executed by at least one of the processors, cause the computer system at least to act as network proxy between the software component executing in the controlled execution environment and the specified data provider.
22. The computer system of claim 6, wherein:
the instructions comprise instructions that, when executed by at least one of the processors, cause the computer system at least to electronically receive one or more queries from the computer network; and
electronically transmitting the software that comprises the component takes place automatically in response to receipt of the one or more queries.
23. The computer system of claim 22, wherein the one or more queries comprise a purchase of, or subscription to, the component or the software that comprises the component in exchange for one or more first payments.
24. A computer-readable storage medium encoded with instructions that, when executed by one or more processors within a computer system that comprises one or more memories operatively coupled to at least one of the processors, and one or more interfaces operatively coupled to at least one of the processors, cause the computer system at least to
transmit through at least one of the interfaces a software component that is restricted to execution in a controlled execution environment;
receive through at least one of the interfaces, from the software component executing in the controlled execution environment, a request for data from a data provider specified in the request; and
determine (i) whether the specified data provider is also a data provider authorized by the provider of the software component, (ii) whether the requested data is available from the specified data provider, and (iii) if the specified data provider is not the authorized data provider, whether the requested data is available from the authorized data provider.
25. The computer-readable storage medium of claim 24, wherein:
the instructions comprise instructions that, when executed by at least one of the processors, cause the computer system at least to, in response to determining that the requested data is available from the specified data provider and further determining either (i) that the specified data provider is the authorized data provider, or (ii) that the specified data provider is not the authorized data provider and that the requested data is not available from the authorized data provider, transmit the requested data to the software component through at least one of the interfaces; and
the instructions are such that the computer system refuses to transmit the requested data to the software component in response to determining either (i) that the requested data is not available from the specified data provider, or (ii) that the requested data is available from the authorized data provider and that the specified data provider is not the authorized data provider.
26. The computer-readable storage medium of claim 25, wherein the requested data is a stream of data.
27. The computer-readable storage medium of claim 25, wherein:
the instructions comprise instructions that, when executed by at least one of the processors, cause the computer system at least to transmit the controlled execution environment through at least one of the interfaces; and
the controlled execution environment is configured to restrict one or more components that execute within it to communicate only with one or more respective specified network hosts.
28. The computer-readable storage medium of claim 25, wherein the authorized data provider is the provider of the software component.
29. The computer-readable storage medium of claim 25, wherein:
the specified data provider is not the authorized data provider; and
the instructions comprise instructions that, when executed by at least one of the processors, cause the computer system at least to act as network proxy between the software component executing in the controlled execution environment and the specified data provider.
30. The computer-readable storage medium of claim 24, wherein:
the instructions comprise instructions that, when executed by at least one of the processors, cause the computer system at least to receive one or more queries from the computer network; and
electronically transmitting the software that comprises the component takes place automatically in response to receipt of the one or more queries.
31. The computer-readable storage medium of claim 30, wherein the one or more queries comprise a purchase of, or subscription to, the component or the software that comprises the component in exchange for one or more first payments.
US13/570,076 2011-08-08 2012-08-08 System and method for electronic distribution of software and data Abandoned US20130179287A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/570,076 US20130179287A1 (en) 2011-08-08 2012-08-08 System and method for electronic distribution of software and data
US15/637,537 US20170300667A1 (en) 2011-08-08 2017-06-29 System and method for electronic distribution of software and data

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201161521192P 2011-08-08 2011-08-08
US13/570,076 US20130179287A1 (en) 2011-08-08 2012-08-08 System and method for electronic distribution of software and data

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/637,537 Continuation US20170300667A1 (en) 2011-08-08 2017-06-29 System and method for electronic distribution of software and data

Publications (1)

Publication Number Publication Date
US20130179287A1 true US20130179287A1 (en) 2013-07-11

Family

ID=46754761

Family Applications (2)

Application Number Title Priority Date Filing Date
US13/570,076 Abandoned US20130179287A1 (en) 2011-08-08 2012-08-08 System and method for electronic distribution of software and data
US15/637,537 Pending US20170300667A1 (en) 2011-08-08 2017-06-29 System and method for electronic distribution of software and data

Family Applications After (1)

Application Number Title Priority Date Filing Date
US15/637,537 Pending US20170300667A1 (en) 2011-08-08 2017-06-29 System and method for electronic distribution of software and data

Country Status (5)

Country Link
US (2) US20130179287A1 (en)
EP (1) EP2742473B1 (en)
AU (1) AU2012294372B2 (en)
CA (1) CA2844667C (en)
WO (1) WO2013022999A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110179483A1 (en) * 2010-01-15 2011-07-21 Apple Inc. Methods for handling a file associated with a program in a restricted program environment
US20170372044A1 (en) * 2011-10-11 2017-12-28 Google Inc. Application Marketplace Administrative Controls

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011146898A2 (en) * 2010-05-21 2011-11-24 Bologh Mark J Internet system for ultra high video quality
US11094015B2 (en) 2014-07-11 2021-08-17 BMLL Technologies, Ltd. Data access and processing system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5629980A (en) * 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6275938B1 (en) * 1997-08-28 2001-08-14 Microsoft Corporation Security enhancement for untrusted executable code
US20020013910A1 (en) * 2000-03-30 2002-01-31 Edery Yigal Mordechai Malicious mobile code runtime monitoring system and methods
US20070038765A1 (en) * 2002-02-27 2007-02-15 Microsoft Corporation User-centric consent management system and method
US20070061396A1 (en) * 2005-09-09 2007-03-15 Morris Robert P Methods, systems, and computer program products for providing service data to a service provider
US20080320583A1 (en) * 2007-06-22 2008-12-25 Vipul Sharma Method for Managing a Virtual Machine
US8290763B1 (en) * 2008-09-04 2012-10-16 Mcafee, Inc. Emulation system, method, and computer program product for passing system calls to an operating system for direct execution

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ATE441897T1 (en) * 1995-02-13 2009-09-15 Intertrust Tech Corp SYSTEMS AND METHODS FOR MANAGING SECURED TRANSACTIONS AND PROTECTING ELECTRONIC RIGHTS
US5978484A (en) * 1996-04-25 1999-11-02 Microsoft Corporation System and method for safety distributing executable objects
US6651171B1 (en) * 1999-04-06 2003-11-18 Microsoft Corporation Secure execution of program code
WO2000072183A2 (en) * 1999-05-24 2000-11-30 Aprisma Management Technologies, Inc. Service level management
WO2002039222A2 (en) * 2000-10-20 2002-05-16 Wave Systems Corporation System and method for managing trust between clients and servers
US7099663B2 (en) * 2001-05-31 2006-08-29 Qualcomm Inc. Safe application distribution and execution in a wireless environment
US7073059B2 (en) * 2001-06-08 2006-07-04 Hewlett-Packard Development Company, L.P. Secure machine platform that interfaces to operating systems and customized control programs
US7921299B1 (en) * 2003-12-05 2011-04-05 Microsoft Corporation Partner sandboxing in a shared multi-tenant billing system
US7685598B1 (en) * 2003-12-23 2010-03-23 The Weather Channel, Inc. Desktop application framework
US8799680B2 (en) * 2005-09-15 2014-08-05 Microsoft Corporation Transactional sealed storage
EP1901190A1 (en) * 2006-09-15 2008-03-19 Sony DADC Austria AG Method and system for managing access to add-on data files
ES2311375B1 (en) * 2006-10-06 2009-11-30 Vodafone España, S.A. SYSTEM FOR PROGRAMMING MOBILE DEVICES BASED ON EVENTS.
US8584147B2 (en) * 2006-12-21 2013-11-12 Microsoft Corporation Managed execution environment for software application interfacing
US9391826B1 (en) * 2006-12-29 2016-07-12 Google Inc. Collaborative web based applications
US20090037287A1 (en) * 2007-07-31 2009-02-05 Ahmad Baitalmal Software Marketplace and Distribution System
GB2455796A (en) * 2007-12-21 2009-06-24 Symbian Software Ltd Mechanism for controlling access to a key store
US9197417B2 (en) * 2009-04-24 2015-11-24 Microsoft Technology Licensing, Llc Hosted application sandbox model
US8414390B1 (en) * 2009-09-30 2013-04-09 Amazon Technologies, Inc. Systems and methods for the electronic distribution of games
US8925101B2 (en) * 2010-07-28 2014-12-30 Mcafee, Inc. System and method for local protection against malicious software
US8938800B2 (en) * 2010-07-28 2015-01-20 Mcafee, Inc. System and method for network level protection against malicious software
AU2012220669A1 (en) * 2011-02-22 2013-05-02 Visa International Service Association Universal electronic payment apparatuses, methods and systems
US9619779B2 (en) * 2011-08-26 2017-04-11 Apple Inc. Client-side policy enforcement of developer API use
US8955067B2 (en) * 2012-09-12 2015-02-10 Capital One, Na System and method for providing controlled application programming interface security

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5629980A (en) * 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6275938B1 (en) * 1997-08-28 2001-08-14 Microsoft Corporation Security enhancement for untrusted executable code
US20020013910A1 (en) * 2000-03-30 2002-01-31 Edery Yigal Mordechai Malicious mobile code runtime monitoring system and methods
US20070038765A1 (en) * 2002-02-27 2007-02-15 Microsoft Corporation User-centric consent management system and method
US20070061396A1 (en) * 2005-09-09 2007-03-15 Morris Robert P Methods, systems, and computer program products for providing service data to a service provider
US20080320583A1 (en) * 2007-06-22 2008-12-25 Vipul Sharma Method for Managing a Virtual Machine
US8290763B1 (en) * 2008-09-04 2012-10-16 Mcafee, Inc. Emulation system, method, and computer program product for passing system calls to an operating system for direct execution

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110179483A1 (en) * 2010-01-15 2011-07-21 Apple Inc. Methods for handling a file associated with a program in a restricted program environment
US8850572B2 (en) * 2010-01-15 2014-09-30 Apple Inc. Methods for handling a file associated with a program in a restricted program environment
US20170372044A1 (en) * 2011-10-11 2017-12-28 Google Inc. Application Marketplace Administrative Controls
US9898592B2 (en) * 2011-10-11 2018-02-20 Google Llc Application marketplace administrative controls

Also Published As

Publication number Publication date
AU2012294372B2 (en) 2016-03-03
CA2844667C (en) 2018-07-17
AU2012294372A1 (en) 2014-03-06
US20170300667A1 (en) 2017-10-19
EP2742473B1 (en) 2022-07-13
EP2742473A1 (en) 2014-06-18
WO2013022999A1 (en) 2013-02-14
CA2844667A1 (en) 2013-02-14

Similar Documents

Publication Publication Date Title
US10326637B2 (en) Functionality management via application modification
US9426019B1 (en) Resource pooling and subletting from user to another user
US20070198427A1 (en) Computer service licensing management
US20070198428A1 (en) Purchasing of computer service access licenses
US20170300667A1 (en) System and method for electronic distribution of software and data
Miric et al. Does piracy lead to product abandonment or stimulate new product development?: Evidence from mobile platform‐based developer firms
US20120254042A1 (en) Integrated Mobile/Server Applications
US20090037337A1 (en) Software Licensing and Enforcement System
KR20140097145A (en) Marketplace for composite application and data solutions
US20120290455A1 (en) System and Method for Providing Computer Services
US20140208399A1 (en) Method and system for accessing a computing resource
WO2009018489A2 (en) Software marketplace and distribution system
US20160180418A1 (en) Catalogue manager and methods for managing subscriptions
KR101697118B1 (en) Cloud service system and method
JP2012208747A (en) Public advertised development system for software in cloud system, public advertised development method, program and recording medium
KR101908214B1 (en) Cloud based broker platform for remote desktop sharing
KR101712609B1 (en) Cloud service system and method for providing initial information
JP5592332B2 (en) Application usage management system
Restall The potential value and viability of Open Source software solutions in Malta’s Public Administration
KR101712642B1 (en) Cloud service system and method for providing campaigns
Woldu Cloud Governance Model and Security for Cloud Service Providers
Chambers Windows Azure: Using Windows Azure's Service Bus to Solve Data Security Issues
Ravi Conceptual Framework for Evaluating and Selecting PaaS Solution for Airline Company
CA3059716A1 (en) Construction mobile services
Reagan et al. Introducing Azure

Legal Events

Date Code Title Description
AS Assignment

Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, NORTH CAROLINA

Free format text: SECURITY AGREEMENT;ASSIGNOR:BLOOMBERG FINANCE L.P.;REEL/FRAME:029228/0503

Effective date: 20121030

Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, NO

Free format text: SECURITY AGREEMENT;ASSIGNOR:BLOOMBERG FINANCE L.P.;REEL/FRAME:029228/0503

Effective date: 20121030

AS Assignment

Owner name: BLOOMBERG FINANCE L.P., NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SLOBODSKIY, GENNADIY;KLIATCHKO, VLADIMIR;EDWARDS, SHAWN;AND OTHERS;SIGNING DATES FROM 20111221 TO 20130405;REEL/FRAME:030205/0713

AS Assignment

Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, NORTH CAROLINA

Free format text: SECURITY INTEREST;ASSIGNOR:BLOOMBERG FINANCE L.P.;REEL/FRAME:044217/0047

Effective date: 20160715

Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, NO

Free format text: SECURITY INTEREST;ASSIGNOR:BLOOMBERG FINANCE L.P.;REEL/FRAME:044217/0047

Effective date: 20160715

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION