Claims
- 1. A computational module for facilitating access to a computational hardware simulation object, the module comprising:
a. instructions facilitating establishment of an interface to the simulation object; and b. instructions implementing an authorization module precluding access to the object via the interface prior to satisfaction of at least one authorization criterion.
- 2. The module of claim 1 wherein the authorization criterion comprises provision of a key to the authorization module.
- 3. The module of claim 2 wherein the authorization module comprises instructions facilitating communication with a remote server, the key being issued by the remote server in response to satisfaction of an authorization condition.
- 4. The module of claim 1 wherein the authorization module comprises instructions internal to the object, the authorization criterion comprising an identifier associated with a single designated computer.
- 5. The module of claim 4 wherein the authorization criterion further comprises satisfaction of an authorization condition.
- 6. The module of claim 3 wherein the authorization condition comprises acceptance of a license.
- 7. The module of claim 5 wherein the authorization condition comprises acceptance of a license.
- 8. The module of claim 1 wherein the instructions facilitating establishment of an interface and the instructions implementing an authorization module are contained in a stand-alone program separate from the object.
- 9. The module of claim 1 wherein the instructions facilitating establishment of an interface and the instructions implementing an authorization module are internal to the object.
- 10. The module of claim 2 wherein the key is specific to a designated computer such that access to the interface is possible only via the designated computer.
- 11. The module of claim 10 wherein the module and the object are transferable among and operable on a plurality of computers but access to the object via the interface is possible only following provision of a computer-specific key.
- 12. A method of facilitating controlled access to a computational hardware simulation object, the method comprising the steps of:
a. establishing an interface to the simulation object; and b. precluding user access to the object via the interface prior to satisfaction of at least one authorization criterion.
- 13. The method of claim 12 wherein the authorization criterion comprises provision of a key to the authorization module.
- 14. The method of claim 13 further comprising the step causing a remote server to issue the key in response to satisfaction of an authorization condition.
- 15. The method of claim 12 wherein the authorization criterion comprises an identifier associated with a single designated computer.
- 16. The method of claim 12 wherein the authorization criterion comprises a biometric indicium associated with a designated individual.
- 17. The method of claim 12 wherein the authorization criterion comprises satisfaction of an authorization condition.
- 18. The method of claim 17 wherein the authorization condition comprises acceptance of a license.
- 19. The method of claim 17 wherein the authorization condition comprises registration with a third party.
- 20. The method of claim 13 wherein the key is specific to a designated computer such that access to the interface is possible only via the designated computer.
- 21. The module of claim 10 wherein the object and the interface are transferable among and operable on a plurality of computers but access to the object via the interface is possible only following provision of a computer-specific key.
RELATED APPLICATION
[0001] This application claims priority to and the benefits of U.S. Provisional Application Serial No. 60/424,930, filed on Nov. 8, 2002 (the entire disclosure of which is hereby incorporated by reference).
Provisional Applications (1)
|
Number |
Date |
Country |
|
60424930 |
Nov 2002 |
US |