Claims
- 1. A method for upgrading a user environment, wherein the user environment has a product with a component operable to run at a low operating level and a high operating level, the component of the product being set to operate at the low operating level, the method comprising:
associating an upgrade key with the product, the upgrade key having permission instructions for the component of the product to operate at the high operating level; and enabling the component of the product to operate at the high operating level in response to the upgrade key being associated with the product in order to upgrade the user environment.
- 2. The method of claim 1 further comprising:
associating a security mechanism with the product, the security mechanism containing permission instructions for the component of the product to run at the low operating level, wherein the security mechanism updates the permission instructions for the component to run at the high operating level upon the upgrade key being associated with the product.
- 3. The method of claim 1 wherein:
the product is a computer.
- 4. The method of claim 3 wherein:
the component is a central processing unit of the computer.
- 5. The method of claim 3 wherein:
the component is a hard disk of the computer.
- 6. The method of claim 3 wherein:
the component is random access memory of the computer.
- 7. The method of claim 3 wherein:
the component is software of the computer.
- 8. The method of claim 1 wherein:
the upgrade key is a cryptographic update key.
- 9. The method of claim 1 wherein:
associating an upgrade key with the product includes associating a smart card having the upgrade key with the product.
- 10. The method of claim 1 wherein:
associating an upgrade key with the product includes transferring the update key from the Internet to the product.
- 11. The method of claim 1 further comprising:
disabling the component of the product from operating at the high operating level in response to the upgrade key being associated with the product after expiration of a lease period.
- 12. The method of claim 1 wherein:
enabling includes enabling the component of the product to operate at the high operating level for a single use of the product.
- 13. The method of claim 1 wherein:
enabling includes enabling the component of the product to operate at the high operating level for multiple uses of the product.
- 14. The method of claim 1 wherein:
enabling includes enabling the component of the product to operate at the high operating level permanently.
- 15. The method of claim 1 wherein:
enabling includes enabling the component of the product to operate at the high operating level temporarily.
- 16. A system for enhancing a user environment, wherein the user environment has product with a component operable to run at a low operating level and a high operating level, the component of the product being set to operate at the low operating level, the system comprising:
an upgrade key having permission instructions for the component of the product to operate at the high operating level; and an enabling mechanism for enabling the component of the product to operate at the high operating level in response to the upgrade key being associated with the product in order to upgrade the user environment.
- 17. The system of claim 16 wherein:
the enabling mechanism includes a security mechanism containing permission instructions for the component of the product to run at the low operating level, wherein the security mechanism updates the permission instructions for the component to run at the high operating level upon the upgrade key being associated with the product.
- 18. The system of claim 16 wherein:
the product is a computer.
- 19. The system of claim 18 wherein:
the component is a central processing unit of the computer.
- 20. The system of claim 18 wherein:
the component is a hard disk of the computer.
- 21. The system of claim 18 wherein:
the component is random access memory of the computer.
- 22. The system of claim 18 wherein:
the component is software of the computer.
- 23. The system of claim 16 wherein:
the upgrade key is a cryptographic update key.
- 24. The system of claim 16 wherein:
the upgrade key is contained on a smart card.
- 25. The system of claim 16 wherein:
the upgrade key is contained in data of the Internet.
- 26. A method for upgrading a user environment, wherein the user environment has a service operable to run at a low operating level and a high operating level, the service being set to operate at the low operating level, the method comprising:
associating an upgrade key with the service, the upgrade key having permission instructions for the service to operate at the high operating level; and enabling the service to operate at the high operating level in response to the upgrade key being associated with the service in order to upgrade the service.
Parent Case Info
[0001] CROSS-REFERENCE TO RELATED APPLICATIONS
[0002] This application claims the benefit of U.S. provisional application Ser. No. 60/218,756 filed Jul. 17, 2000.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60218756 |
Jul 2000 |
US |