Claims
- 1. A method of providing access to software over a network to a plurality of computers, the method comprising:
generating a plurality of keys, wherein the keys are associated with a single organization, and validity of at least one of the keys is controllable separately from another one of the keys; receiving a received key out of the keys in a request for software associated with the received key; and over the network, selectively providing access to the software associated with the received key based on whether the received key is valid.
- 2. The method of claim 1 wherein the plurality of network references comprise keys associated with the organization in a database.
- 3. The method of claim 1 wherein providing access to the software comprises providing access to the software in a downloadable format.
- 4. The method of claim 1 wherein the software is agent software for administering administered software via an application service provider scenario.
- 5. The method of claim 4 wherein the administered software is anti-virus software.
- 6. The method of claim 1 wherein the plurality of network references comprise Uniform Resource Locators.
- 7. The method of claim 1 wherein the key is received from a requesting node, the method further comprising:
responsive to receiving an indication of an identity of the requesting node, associating the identity with a group associated with the key.
- 8. The method of claim 7 further comprising:
receiving a configuration directive for the group via an application service provider scenario; and implementing the configuration directive for the node.
- 9. A method of generating a key for providing access to software associated with the key to a plurality of nodes within an organization, the method comprising:
generating a key; associating the key with the organization; associating the key with a group; and providing the key for distribution to a node whereat software associated with the key is to be installed; wherein at least one other key can be associated with the organization and is separately revocable.
- 10. The method of claim 9 wherein:
the group is associated with the organization in a database; and associating the key with the organization comprises associating, via the database, the key with the group associated with the organization.
- 11. The method of claim 9 further comprising:
receiving the key and a node identifier from a node; and responsive to receiving the key and the node identifier from the node, associating the node with the group in a database.
- 12. The method of claim 9 wherein the key is further associated with an expiration date.
- 13. The method of claim 9 wherein the providing is performed via an application service provider scenario.
- 14. A method of administering software at a node, the method comprising:
from the node, receiving a request for software associated with a key, wherein the key is associated with a group; responsive to the request, providing the software associated with the key; receiving a node identifier identifying the node; and responsive to receiving the node identifier identifying the node, associating the node with the group for purposes of software administration.
- 15. The method of claim 14 wherein the request for software associated with a key comprises an HTTP request comprising the key.
- 16. The method of claim 14 wherein
the software is administered at more than one node in an organization; and more than one key is associated with the organization.
- 17. The method of claim 14 further comprising:
verifying that the key is valid with reference to a database.
- 18. The method of claim 14 further comprising:
receiving a configuration directive for the group of the node via an application service provider scenario; and implementing the configuration directive for the node.
- 19. The method of claim 14 wherein the software comprises an agent for implementing configuration directives at the node.
- 20. A method of downloading software from a server computer to a downloading computer, wherein the downloading computer is one of a plurality of computers associated with an organization, the method comprising:
accessing the server computer with the downloading computer; and requesting a download of software, wherein the requesting comprises providing a key as input to the server computer; wherein the accessing comprises processing a network reference comprising the key, and wherein the key is one of a plurality of keys associated with the organization.
- 21. The method of claim 20 wherein the network reference comprises a Uniform Resource Locator.
- 22. The method of claim 20 wherein the key comprises a token identifier.
- 23. The method of claim 20 wherein the key is associated with a group of computers for which software administration directives can be implemented.
- 24. The method of claim 20 wherein the server computer is operated by an application service provider.
- 25. The method of claim 20 further comprising downloading the requested software from the server computer to the downloading computer.
- 26. The method of claim 25 wherein the requested software comprises an update of existing software on the downloading computer.
- 27. A method of presenting a user interface for generating a network reference comprising a token for installing software at one or more computers, the method comprising:
receiving a request to create the network reference comprising the token for installing software at one or more computers; receiving an indication of a named group within an organization with which computers receiving the network reference are to be associated; and presenting the network reference comprising a token for installing software at one or more computers.
- 28. The method of claim 27 further comprising:
receiving an expiration date for the token.
- 29. A computer-implemented method of installing agent software at a computer operated by an organization to facilitate anti-virus software administration at the computer, the method comprising:
receiving a reference to a uniform resource locator comprising a token, wherein the token is associated with a named group, and more than one token can be provided per organization; based on the token, providing a dynamically-generated web page comprising a software component operable to initiate installation of the agent software; after installing the agent software at the computer, receiving from the agent an indication of a node identifier associated with the computer; based on the node identifier, associating the computer with the named group in a database; receiving a query from the computer regarding anti-virus software to be installed at the computer; and providing a release of anti-virus software to the computer based on the named group with which the computer is associated.
- 30. A computer-readable medium comprising computer-executable instructions stored thereon for performing the method of any of the preceding claims.
- 31. A system for downloading software over a network, the system comprising:
a data center operable to generate network references comprising a key for authorizing downloading of software, wherein the key is one of a plurality of keys associated with an organization; and a communication link to a network, wherein the communication link is operable to allow communication between the data center and an accessing computer operable to access the data center.
- 32. The system of claim 31 wherein the network references comprise uniform resource locators.
- 33. The system of claim 31 further comprising a downloading computer operable to request a download of software using a network reference generated by the data center.
- 34. A system for receiving tokens for installation of software, the system comprising:
means for receiving a received token; means by which the received token is associated with a group, wherein more than one group can be associated with an organization; means for determining whether the token is valid; and means for receiving a node identifier from a node; and means for, upon receiving the node identifier and the token, associating the node of the node identifier with the group associated with the received token.
- 35. An install string-comprising:
a token for providing access to software over a network, wherein the token is one of a plurality of tokens associated with an organization.
- 36. The install string of claim 35 wherein the install string comprises a uniform resource locator.
- 37. The install string of claim 35 wherein the software comprises agent software for implementing configuration directives related to administered software at a node.
- 38. The install string of claim 35 wherein the string is valid for a finite number of accesses to the software.
PRIORITY CLAIM
[0001] This application claims the benefit of U.S. Provisional Patent Application No. 60/375,174, filed Apr. 23, 2002, which is hereby incorporated herein by reference.
[0002] The U.S. provisional patent applications No. 60/375,215, Melchione et al., entitled, “Software Distribution via Stages”; Ser. No. 60/375,216, Huang et al., entitled, “Software Administration in an Application Service Provider Scenario via Configuration Directives”; Ser. No. 60/375,176, Vigue et al., entitled, “Fault-tolerant Distributed Computing Applications”; Ser. No. 60/375,154, Melchione et al., entitled, “Distributed Server Software Distribution,”; and Ser. No. 60/375,210, Melchione et al., entitled, “Executing Software In A Network Environment”; all filed Apr. 23, 2002, are hereby incorporated herein by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60375174 |
Apr 2002 |
US |