REFERENCE TO RELATED APPLICATIONSThe present application is a continuation-in-part of U.S. patent application Ser. No. 09/372,253, filed Aug. 11, 1999, and entitled “Apparatus and Method for Adaptive Fraud Screening for Electronic Commerce Transactions,” which is a continuation-in-part of provisional U.S. Patent Application Serial No. 60/110,952, filed Dec. 4, 1998, and entitled “Apparatus and Method for Providing Electronic Commerce,” both of which are incorporated herein by reference as if fully set forth.[0001]
The present application is related to the following applications, all of which are incorporated herein by reference as if fully set forth: United States Patent Application of Joel Ronning, Kelly Wical, and Marc Kukura, entitled “Apparatus and Method for Controlling Distribution of Files and File Updates,” and filed on even date herewith; United States Patent Application of Joel Ronning and Kelly Wical, entitled “Apparatus and Method for Secure Downloading of Files,” and filed on even date herewith; United States Patent Application of Joel Ronning and Kelly Wical, entitled “Cache Management for Dynamic Web Pages,” and filed on even date herewith; and United States Patent Application of Joel Ronning and Kelly Wical, entitled “Global Web Site Management,” and filed on even date herewith.[0002]
FIELD OF THE INVENTIONThe present invention relates to an apparatus and method for controlling distribution of files and updates to files. automatically downloads files upon request by a user and can download a file in multiple portions by tracking an amount of a received portion of the file.[0003]
The method and apparatus include transmitting a request to download a file, the request including an identification of the file and an indication of starting point for transmission of the file. A serial transmission of digital information for the file is received beginning at the starting point, and the digital information is appended to a previously-received portion of the file, if present. The received digital information is also stored.[0004]
The agent can also search for updates to files by using application signatures to uniquely identify files stored on a user's machine and transmitting the application signatures to a server storing the updates. In addition, the agent uses a number of screens for displaying information to a user concerning the downloading of files and updates to files. The screens also permit the user to enter schedule information to control downloading of files and searching for updates to files.[0005]
BRIEF DESCRIPTION OF THE DRAWINGSFIG. 1 is a block diagram of an environment for providing electronic commerce.[0006]
FIG. 2 is a block diagram of an electronic commerce system.[0007]
FIG. 3 is a block diagram of exemplary hardware components of an electronic commerce system.[0008]
FIG. 4 is a flow chart of processing for an electronic commerce system.[0009]
FIGS. 5[0010]aand5bare a flow chart of a home screen routine for implementing an agent to manage distribution of digital information and file updates.
FIG. 6 is a flow chart of a downloads screen routine for the agent.[0011]
FIG. 7 is a flow chart of a downloads routine for distribution of digital information using the agent.[0012]
FIG. 8 is a flow chart of an updates screen routine for the agent.[0013]
FIGS. 9[0014]aand9bare a flow chart of find updates routine for the agent to locate and download information concerning update to files.
FIGS.[0015]10-24 are diagrams of exemplary screens supported by the routines shown in FIGS.5-9 and used to implement an embodiment of an agent for distribution of digital information and file updates.
FIG. 10 is a diagram of a home screen.[0016]
FIG. 11 is a diagram of a news and deals screen.[0017]
FIG. 12 is a diagram of a shopping screen.[0018]
FIG. 13 is a diagram of a customer service screen.[0019]
FIG. 14 is a diagram of a privacy screen.[0020]
FIG. 15 is a diagram of a general settings screen.[0021]
FIG. 16 is a diagram of a tour screen.[0022]
FIG. 17 is a diagram of a downloads screen.[0023]
FIG. 18 is a diagram of an install screen.[0024]
FIG. 19 is a diagram of a schedule downloads screen.[0025]
FIG. 20 is a diagram of a download help screen.[0026]
FIG. 21A is a diagram of a download status screen.[0027]
FIG. 21B is a diagram of a continue download screen.[0028]
FIG. 22 is a diagram of an updates screen[0029]
FIG. 23 is a diagram of an updates help screen.[0030]
FIG. 24 is a diagram of an update status screen.[0031]
DETAILED DESCRIPTIONOverviewAs shown in FIG. 1, an end user at[0032]computer100 enters a particularclient web site102 throughconnection101 in order to shop for products, which may include, but is not necessarily limited to, digital products. Digital products include any information capable of being represented in digital form; examples of digital products include, but are not limited to, the following: software applications; data, music, video, books, text, audio-visual information, multimedia information, graphical information, fonts, and artistic works.
The end user may view a page from the client's web site, for example, listing and describing various products. When the end user indicates a desire to purchase a product by, for example, selecting a purchase icon on the client's web page, the end user's[0033]connection103 is transferred to a commerce network server providing the client's on-line web store104, and this typically occurs as a background process. The end user may make asecure purchase105 throughpage106 from a product library and, as represented byarrow107, the purchased product is delivered electronically over the network connection, physically such as by mail, or both electronically and physically.
The purchase typically involves the end user entering payment and related information, such as a credit card number and an associated name and address. In response, the commerce network server determines whether to accept the order and, if accepted, may provide a secure download of the purchased product to the end user's computer for digital products. Determining whether to accept or decline the order involves the use of accessing information concerning prior attempted purchases using information related to or associated with the information in the order, and determining from the related or associated information the likelihood that the order involves a fraudulent attempt to obtain products. Although only one[0034]computer100 andweb site102 are shown, a commerce network server may provide multiple on-line web stores104 and may interact with end users at multiple computers and multiple web sites.
Electronic Commerce System and ProcessFIG. 2 is a block diagram of an[0035]electronic commerce system200 illustrating interaction between anend user machine201 and aserver205, illustrating exemplary software modules, caches, and related databases.Server205 may correspond with the commerce network server described above providing on-line web stores. As shown,end user machine201 interacts throughnetwork204, such as the Internet or other type of network, withserver205.End user machine201 may also access a web page on an intermediate server and subsequently be transferred toserver205.End user machine201 may interact directly withserver205 or interact through anagent module203, which performs processing specific to a user atend user machine201.End user machine201 transmits arequest228 or229 to server205 fromagent module203 orpage202, possibly including a request for a particular web page, a request to purchase and download a digital product, or a request for a search for a particular product. Although only oneend user machine201 is shown,server205 may interact vianetwork204 with multiple end user machines and multiple intermediate servers maintaining web sites accessed by users at the end user machines. Other examples of systems providing electronic commerce are disclosed in the following United States patents, all of which are incorporated herein by reference as if fully set forth: U.S. Pat. Nos. 5,907,617; 5,903,647; 5,887,060; 5,883,955; 5,883,954; and 5,870,543.
In[0036]server205, the request may be transmitted through a uniform resource locator (URL)spoofer module206, which performs initial processing of the URL. In particular,URL spoofer module206 changes the URL so that if a user subsequently downloads a product,end user machine201 by default saves the product under a file name associated with the product but gives no direct access to the physical location on the server. It may also misdirect the user in order to detect attempts to fraudulently obtain products. Alternatively, the request may be transmitted directly to aweb server module207, which performs initial processing on the request.
A log in[0037]module208 receives the request and records certain data associated with the request, such as the user's request, Internet Protocol (IP) address, date and time, and particular demographic information. The request is then transmitted to asecurity module209, which uses heuristics and other techniques in order to detect a person attempting to bypass particular steps of the process, or otherwise receive or access the products without providing payment.
A[0038]process request module211 first checks a page/product cache218 to determine if the requested web page has been previously requested or, if applicable, the relevant product has been previously requested. If so,process request module211 accesses information in page/product cache218 in order to avoid repeatedly generating the same information for the same or a similar request. If applicable,process request module211 also checks asearch cache217 to determine if the requested search has been previously requested and, if so, it uses information insearch cache217 to generate particular output. Abuild cache module212 withinprocess request module211, if applicable, builds information for storage in either of the caches.
A fraud (payment)[0039]module210, typically withinprocess request module211, performs processing necessary to conduct the payment transaction, including processing of credit card information. It also records payment-related information.
A[0040]build output module213 next assembles information for the request. It first checks a graphical user interface (GUI)implementation cache216 to determine if a requested web page has been previously constructed and provided. If so, it may use the information inGUI implementation cache216 to avoid unnecessary repeated processing of the same information. If applicable, abuild cache module214 withinbuild output module213 creates information for storage inGUI implementation cache216.
A[0041]log completion module215 performs final processing on the request. If the request is only for a web page or search, logcompletion module215 transmits the web page or search information back toend user machine201. Ifend user machine201 usesagent module203, logcompletion module215 may transmit information to anagent transaction server219, which constructs and creates the web page based upon that information and transfers it back toagent module203 for construction of the web page atpage202 onend user machine201.
If the request included a request for a product, log[0042]completion module215 transmits the request to adownload processor224, which checks withprocess request module211 to verify the authenticity of the request and perform a security check If the request is valid, as determined by information transmitted back fromprocess request module211, downloadprocessor224 securely transmits the requested product from aproduct download database225 toend user machine201. The transmitted product may be transmitted throughagent transaction server219 ifend user machine201 usesagent module203.
The following provides a description of each database shown in FIG. 2. A[0043]data warehouse database221 provides log in information along with keys, which provides an index to associated information in acommerce database223.Commerce database223 contains data tables storing information related to products and requests, such as a product table, order table, and other such tables. Asummary database220 provides information from the data warehouse database in summary form.Product download database225 provides products in digital form for retrieval by the download processor. This configuration provides the advantage of storing the products without wrappers or associated passwords, and instead providing for a secure download of the products. Wrappers or associated passwords may still be used, if desired.
A site GUI/[0044]feature control database226 and default GUI/feature control database227 may be accessed byprocess request module211 and buildoutput module213 for storage and retrieval of information related to web sites.
A credit[0045]card fraud database222 stores credit card transaction information, including credit card processing history, and other information for adaptive fraud screening. Such information may thus be used in performing another security check. For example, the database may store a list of stolen credit card numbers.
FIG. 3 depicts an exemplary[0046]data processing system300 with acomputer301 illustrating exemplary hardware components ofend user machine201,server205, and an intermediate server, if used to transfer the end user's connection.Computer301 includes a connection with anetwork307 such as the Internet or other type of network, which may correspond withnetwork204.Computer301 typically includes a memory302, asecondary storage device304, aprocessor305, aninput device306, adisplay device303, and anoutput device308.
Memory[0047]302 may include random access memory (RAM) or similar types of memory, and it may store one ormore applications309 for execution byprocessor305.Applications309 may correspond with the modules shown in FIG. 2.Secondary storage device304 may include a hard disk drive, floppy disk drive, CD-ROM drive, or other types of non-volatile data storage, and it may correspond with the various databases shown in FIG. 2.Processor305 may execute applications or programs stored in memory302 orsecondary storage304, or received from the Internet orother network307.Input device306 may include any device for entering information intocomputer301, such as a keyboard, cursor-control device, or touch-screen.Display device303 may include any type of device for presenting visual information such as, for example, a computer monitor or flat-screen display.Output device308 may include any type of device for presenting a hard copy of information, such as a printer, and other types of output devices include speakers or any device for providing information in audio form.
Although[0048]computer301 is depicted with various components, one skilled in the art will appreciate that this computer can contain additional or different components. In addition, although aspects of an implementation consistent with the present invention are described as being stored in memory, one skilled in the art will appreciate that these aspects can also be stored on or read from other types of computer program products or computer-readable media, such as secondary storage devices, including hard disks, floppy disks, or CD-ROM; a carrier wave from the Internet or other network; or other forms of RAM or. ROM. The computer-readable media may include instructions for controlling a computer system, such ascomputer301, to perform a particular method.
FIG. 4 illustrates high-[0049]level processing400 throughelectronic commerce system200. Inprocess400,web server module207 receives a request from end user machine201 (step401). Log-inmodule208 processes the request to obtain log information (step402).Security module209 performs a security check (step403).Process request module211 checks page/product cache218 (step405) and checkssearch cache217, if applicable (step406).Fraud module210 performs payment-related functions andprocess request module211 processes the request and usesbuild cache module212 to build a cache, if applicable (step407).Build output module213 checks GUI implementation cache216 (step408), assembles information for responding to the request, and usesbuild cache module214 to build a cache, if applicable (step409).
[0050]Log completion module215 performs final processing of the request (step410), and it determines if the request is a purchase request (step411). If so, it transfers the request to download processor224 (step412), which securely downloads the requested product and delivers it to the end user machine201 (step413). If the request was not a purchase request as determined bystep411, logcompletion module215 delivers page and optional search information to end user machine201 (step414).
Commerce SystemThis feature of[0051]electronic commerce system200 involves providing a single transaction point for processing of electronic commerce, generally involving the series of modules shown in FIG. 2. Examples of the processing in this single transaction point include security, checking for fraud, on-line reporting, and processing orders. The benefits of providing such processing through a single transaction point typically include, for example, scalability, reliability of processing, simplicity of design by avoiding multiple disparate systems, and avoiding repeated processing.
Fraud Detection and PreventionThis feature of[0052]electronic commerce system200 involves preventing fraud and ensuring security during electronic commerce transactions. An electronic commerce transaction involves a user electronically requesting purchase of a product and providing payment for the product. The user may receive the product electronically for digital products or may receive it by other means such as via mail service. The terms fraud and fraudulent refer to attempts by a user to obtain a product without providing proper payment, or otherwise not satisfying requirements for obtaining a product. For example, a user may attempt to use a stolen or false credit card number to obtain a product or attempt to tamper with the system so that the user obtains a product for less than the required price. As another example, certain information related to a user's order may tend to indicate that the user is likely to fail to provide payment, even if the credit card number used appears valid, andsystem200 attempts to make that determination based on an analysis of the user's information and associated information.
The fraud detection and prevention may also involve preventing users or customers from having access to certain stored data such as credit card information and products. It involves preventing users from bypassing particular modules or processing in[0053]system200. Users typically interact withsystem200 in a known manner for non-fraudulent transactions. Likewise, particular types of interaction tend to indicate that a user is attempting to circumventsystem200 and fraudulently obtain products. Therefore,system200 analyzes a user's interaction, as well as a user's information submitted on an order typically using an order form and related information in a database, in order to determine a likelihood or probability that the user is engaging in attempted fraud during the transaction. That determination is used as a basis to either accept or decline the order.
The fraud detection and prevention features of[0054]system200 generally include functions within the security and fraud (payment)modules209 and210, as further explained below.System200 may implementmodules209 and210, or a single module or any number of modules to implement the features, using software stored in memory302 orsecondary storage304 for execution byprocessor305.Modules209 and210 may also be implemented using program products or a combination of software and specialized hardware components. In addition, the modules may be executed on multiple processors for processing a large number of transactions, if necessary or desired.
An exemplary implementation of[0055]modules209 and210 for fraud detection and prevention is disclosed in U.S. application Ser. No. 09/372,253, filed Aug. 11, 1999, and entitled “Apparatus and Method for Adaptive Fraud Screening for Electronic Commerce Transactions.”
Global Web Site ManagementThis feature of[0056]electronic commerce system200 involves providing centralized management of host sites, managing all host sites through a central database. It may include, for example, extending a look and feel of a particular web site into another web site. For example, when an intermediate server transfers an end user's connection to a commerce network server, as described with respect to FIG. 1, the commerce network server may transmit a page having the same look and feel as the page on the intermediate server, thus providing an apparent seamless transition to the end user.
This feature also may include making local changes to a large number of managed web sites. Therefore, instead of making similar changes to each individual web site,[0057]system200 may broadcast those particular changes and make the corresponding changes to the managed web sites. It thus provides an advantage, for example, of easily making changes to a large number of web sites. For example, it may automatically broadcast a few particular features every week to the managed web sites in order to regularly update the sites.
Security AreaThis feature of[0058]electronic commerce system200 provides for securely storing clients' products and providing a secure download process, typically without the use of wrappers or passwords. This feature generally involving the series of modules shown in FIG. 2. It includes a database type of security intended at least to simplify the purchase process for a user. A user typically need only enter a credit card number and in response receives a requested product.
Cache Management for Dynamic Web PagesThis feature of[0059]electronic commerce system200 concerns a dynamic cache providing for a fast page response and dynamic pages, typically guaranteeing that pages contain current information. It generally involvescaches216,217 and218 shown in FIG. 2, providing cache processing for three areas: product searching; GUI implementation (particular features on a web page); and static page building (a web page as a whole).
The complexity of product searching often affects speed of a response. Providing caching of information means that the same information need not be repeatedly retrieved from an external database and constructed into a responsive web page. Rather, the information may be cached locally and quickly retrieved in response to the same or a similar request. This feature maintains up-to-date information by knowing to create and destroy information interactively for the caches.[0060]
Intelligent AgentAn intelligent agent includes an application that resides locally on a client machine in order to perform processing specific to a user of the machine, generally involving[0061]agent module203 andagent transaction server219 shown in FIG. 2. It includes at least two aspects, a pull side and a push side. The pull side involves the agent obtaining information and knowing how to link to a server and provide the information to the user in a personal way, customized for that user. It shields the user from the order process, for example, in order to simplify it. The agent may also perform system management, for example, performing a background process that scans the user's system in order to manage licensed software, perform archival control, and perform other such processing.
The push side involves making special information available to the user through the agent. For example, if the user already ordered a particular product, the agent may inform the user of any bugs in the product, product upgrades, or related products. That information is “pushed” to the agent from the server. The server may provide initial filtering of information given to the agents, and the agents perform additional filtering in order to present the information in a specific way to the user.[0062]
Therefore, an agent manages distribution and download of files including digital products to a user's machine, as well as locating and downloading updates to files contained on the user's machine. The term “file” refers to any type of digital product. A file may include associated information concerning the file, such as a name and size, which is possibly useful for downloading purposes. Alternatively, a file may include only a digital product itself or a portion of a digital product.[0063]
The agent can thus assist a user in managing the downloading of particular digital information, as well as provide recommendations concerning updates to files on the user's machine. An embodiment consistent with the agent may be implemented in software or program products within[0064]agent module203 inuser machine201, and it may be included within agent modules on many particular end user machines interacting withserver205. FIGS.5-9 are flow charts of routines for implementing an agent inagent module203. The term “agent” refers to any software or other type of application for executing the functions in FIGS.5-9.
FIGS.[0065]10-24 are diagrams of screens supported by the routines in FIGS.5-9. The term “screen” refers to any visual element or combinations of visual elements for displaying information; examples include, but are not limited to, user interfaces on a display device or information displayed in web pages or in windows on a display device. The screens may be formatted, for example, as web pages in HyperText Markup Language (HTML), or in any other suitable form for presentation on a display device depending upon applications used by users to interact with the system.
The screens include various sections, as explained below, to provide information or to receive information or commands. The term “section” with respect to screens refers to a particular portion of a screen, possibly including the entire screen. Sections are selected, for example, to enter information or commands or to retrieve information or access other screens. The selection may occur, for example, by using a cursor-control device to “click on” or “double click on” the section; alternatively, sections may be selected by entering a series of key strokes or in other ways such as through voice commands or use of a touch screen. In addition, although the screens shown in FIGS.[0066]10-24 illustrate a particular arrangement and number of sections in each screen, other arrangements are possible and different numbers of sections in the screens may be used to accomplish the same or similar functions of displaying information and receiving information or commands. Also, the same section may be used for performing a number of functions, such as both displaying information and receiving a command.
FIGS. 5[0067]aand5bare a flow chart of ahome screen routine500 for the agent.Routine500 supports ahome screen700 shown in FIG. 10.Home screen700 is a main screen shown to a user upon launching the agent. Inroutine500, the agent typically resides active as a background process on a user's machine (step502). By remaining active in the background, the agent may automatically execute certain functions, as scheduled by the user and further explained below. The user launches the agent, as determined bystep504. The user may launch the agent in a number of ways such as, for example, selecting the agent from a start menu, executing a run command, or selecting the agent as represented by an icon in a system tray on the user's computer. If the user launches the agent, the agent displays home screen700 (step506). The term “eBot” is a trademark of Digital River, Inc.
[0068]Home screen700 includes asection701 for use in providing information to the user and receiving information from the user. Fromhome screen700, a user may select a function by selecting a particular section ofhome screen700 shown in FIG. 10 (step508). Selection of home section704 (step510) causes display of home screen700 (step530). Selection of news and deals section706 (step512) causes display of a news and deals screen726 shown in FIG. 11 (step532). News and dealsscreen726 illustrates an example of providing particular information insection 701 to users. News and dealsscreen 726 typically includes asection727 by which a user may connect with a particular web site as related to the information withinsection701. The agent determines if the user selects section727 (step552); if so, the agent launches a web browser on the user's machine and connects with the appropriate web site (step554). The agent may work with any type of web browser or other application executed byuser machine201 for network or Internet communication; examples of web browsers include the Netscape Navigator program and the Microsoft Internet Explorer program.
Selection in[0069]home screen700 of a shopping section708 (step513) causes display of ashopping screen728 shown in FIG. 12 (step534).Shopping screen728 permits display of information related to on-line shopping withinsection701. In addition,shopping screen728 typically includes a connect section730 by which a user may connect with a particular web site. Fromshopping screen728, the agent determines if the user selects connect section730 (step552); if so, the agent launches the web browser and connects with the appropriate web site for on-line shopping (step554). The agent may store and associate connect section730 with a URL or a uniform resource indicator (URI) for use in accessing a particular web site.
In[0070]home screen700, selection of a customer service section710 (step514) causes display of acustomer service screen732 shown in FIG. 13 (step536).Customer service screen732 provides for display of information to a user concerning operation of the agent. It typically includes a plurality ofconnect sections734 for a selection by a user in order to connect with an appropriate web site in order to obtain customer service information. Therefore, fromcustomer service screen732 the agent determines if a user selects one of the connect sections734 (step552); if so, the agent launches a web browser and connects with an appropriate web site for customer service information (step554).
From[0071]home screen700, selection of a privacy section712 (step516) causes display of aprivacy screen736 shown in FIG. 14 (step538).Privacy screen736 permits display of information to a user concerning the privacy of the information used by the agent for downloading information and providing for file updates.Privacy screen736 also typically includes connect section730 for connection with a web site to obtain information concerning privacy. Fromprivacy screen736 the agent determines if the user selects section730 (step552), and if so, the agent launches a web browser and connects with an appropriate web site for providing privacy information to a user (step554).
From[0072]home screen700, selection of a general settings section714 (step518) causes display of general settings screen738 shown in FIG. 15 (step540). From general settings screen738, the agent receives and saves settings as entered by the user, including schedule information for finding updates (step556). In particular, general settings screen738 includes aname section739 in which a user may enter a name or other identifier. Selection of a section740 permits the user to instruct the agent to search for updates on a periodic basis. In particular, the user may enter a number of days insection741 by which they want the agent to automatically search for update to the files on the user's machine, as explained below. Using the information insection741, the agent automatically searches for updates to the files on the user's machine using a connection withserver205 based upon the days parameter insection741. Instead of using a number of days parameter, the agent may alternatively search for updates on a different periodic basis such as the first day of every month, or at a particular time and day each week or month.
Selection of a[0073]section742 permits the user to specify a particular proxy server for downloads as entered insection743 identifying a server and port for use with the web browser. Selection of asection744 permits the user to specify automatic downloads such that the agent will automatically download a file without prompting the user for permission. Selection of asection745 permits the user to instruct the agent to download from any web site on the Internet throughserver205. Selection of asection746 permits the user to instruct that the agent software be activated upon system start-up of the user's machine.
From[0074]home screen700, a selection of a tour section716 (step520) causes display of atour screen748 shown in FIG. 16 (step542).Tour screen748 permits the agent to display information concerning its operation to the user. The user may typically obtain more information concerning operation of the agent by selecting connect section730 in order to connect with an appropriate web site. Therefore, ontour screen748 the agent determines if the user selects connect section730 (step552); if so, the agent launches a web browser and connects with an appropriate web site in order to provide information concerning its operation (step554).
From[0075]home screen700, selection of a downloads section718 (step552) causes execution of a downloads screen routine (step554), as further explained below. Selection of anupdates section720 in home screen700 (step524) causes execution of an update screen routine (step546), as further explained below. Abanner section722 inhome screen700 permits the agent to display advertising or other information to a user. The user may select the banner in order to connect with a corresponding web site and obtain more information or shop on-line for products or services. Therefore, a selection of banner section722 (step526) causes the agent to launch a web browser and connect with an appropriate web site as determined by network address information, such as a URL, associated with the banner (step548). If the user selects a close section724 (step528), the agent closes home screen700 (step550).
The agent may also be programmed or instructed by the user to automatically perform downloads of files and search for file updates using time parameter information. The agent monitors a current date and time, and compares it with schedule information to detect occurrence of a particular date and time (step[0076]557). The agent can monitor a current date and time by accessing an internal calendar and clock foruser machine201 on which it runs.
The agent determines if the user has scheduled a particular function (step[0077]558). That determination may be based upon comparing stored time parameter information as entered by a user with time information as determined by settings on a user's machine, as monitored instep557. If the user has scheduled a particular download for this time (step560), the agent executes a downloads routine based on the scheduled information (step562). If the user has scheduled an update for this time (step564), the agent executes a find updates routine based upon the scheduled information (step566). In order for the scheduled function to occur, the agent software typically must be active as a background process such that it is operational and the user's machine must maintain or provide for a network connection such that the agent may automatically perform the downloads and search for the file updates through the network connection without requiring further interaction by the user.
FIG. 6 is a flow chart of downloads screen routine[0078]544 activated upon the user's selection ofdownloads section718 inhome screen700. Upon selection ofdownloads section718, the agent displays adownloads screen750 shown in FIG. 17 (step568). Downloads screen750 includes a number of sections for providing status information to a user concerning downloads21, and for a user to instruct the agent to perform certain operations concerning downloads. Inroutine544, a user selects a function within downloads screen750 (step570), and the agent in response executes the selected function. Selection of adownload section752 causes execution of a downloads routine (step584), as further explained below. For the download information, downloads screen750 provides astatus section764 having status information concerning files. In particular, a name column766 provides a listing of file names, astatus column768 provides identification on the status of each file, acompletion column770 provides information concerning an amount of the file downloaded, if any, and adate section772 provides date information concerning when the file was downloaded.
[0079]Status section768, as shown, provides various types of status information, such as the following: a ready status indicates that the selected file is ready to be downloaded; a downloaded status indicates that the selected file has been successfully downloaded; an in progress status indicates that the selected file is currently being downloaded withcompletion column770 providing an indication of the percentage downloaded; a cancelled status indicates that a request to download the selected file has been cancelled. A details section774 provides information concerning a particular selected file insection764. The highlighting indicates that a file insection764 has been selected by a user, and the user may select the file in the same manner that a user selects a section.
In downloads[0080]screen750, selection of an open/install section754 (step574) provides for the user to request installation of a particular file as selected instatus section764. In response, the agent determines if the requested file has been downloaded (step586). If the file has not been downloaded, the agent may provide an error message to the user indicating that the file must first be downloaded before it can be installed (step588). If the file has been successfully downloaded, the agent installs the file (step590). Installation of the file typically requires any conventional installation permitting for execution of the file byuser machine201. Prior to installation, the agent may display an install screen776, shown in FIG. 18, requesting that the user confirm whether to install the selected file or not through a selection of section777 to confirm installation or selection of asection778 cancel installation.
Selection of a scheduled[0081]section756 in downloads screen750 permits the user to schedule downloading of a file selected instatus section764. Selection of schedule section756 (step576) causes display of aschedule download screen780 shown in FIG. 19 (step592). Usingschedule download screen780, the agent receives and stores schedule information for the selected file for downloading a selected file (step594). Schedule information includes any type of date-based or time-based information for use in scheduling downloading of files or searching for file updates. For example, a user may enter a date indate section781 and a time in time section782 in order to schedule a download for the selected file. By selectingsection783 the user confirms the schedule and by selecting a section784 the user cancels the function.
Selection of a[0082]remove section758 in downloads screen750 causes removal of a selected file instatus section764. Upon selection of remove section758 (step577), the agent removes the file indication fromstatus section764 if verified by the user (step593).
Selection of a[0083]help section762 in downloads screen750 (step578) causes display of ahelp screen786 shown in FIG. 20 (step596). Downloads help screen786 permits display of information concerning downloading of information to a user. It typically includes connect section730 in order for the user to connect with the web site and obtain more help information. The agent determines if the user selects connect section730 (step598); if so, the agent launches the web browser and connects with the appropriate web site to obtain more help information (step600).
In downloads[0084]screen750, selection of an updates section720 (step580) causes execution of an updates screen routine (step546), as further explained below. Selection of home section702 (step582) causes the agent to return todisplay home screen700 and executehome screen routine500.
FIG. 7 is a flow chart of downloads routine[0085]584 executed upon a user's selection ofdownload section752 in downloads screen750 or based on schedule information as determined insteps557 and558. Upon selection ofdownload section752, the agent displays adownload status screen788 as shown in FIG. 21A. In downloads routine584,server205 typically transmits a file list to the agent (step606). The file list provides for the identification of files instatus section764. The list may be transmitted one time or repeatedly transmitted and updated. The user selects a file in the file list download (step608). Alternatively, the user may have preselected a file for downloading using schedule information. The agent sends a get file request to the server, including a URL and starting point of where to begin transmission of the file (step610). In this example, the starting point is a start byte; however, the starting point may include any type of indication of where to begin transmission of the file. The agent may optionally encrypt the request using any type of encryption routine.
If this was the first time the file is requested to be downloaded, the start byte will be zero. By tracking start bytes, the agent may maintain an indication of an amount of the file downloaded and therefore need only request to download an additional portion if the download is interrupted. In response to the get file request,[0086]server205 downloads the requested file to the agent by serial transmission of digital information for the file using conventional Transmission Control Protocol/Internet Protocol (TCP/IP) transmission (step612). In this example, the serial transmission occurs through a stream of bytes for the file; however, it may occur through transmission of other forms of digital information such as, for example, bits, contiguous collections of bytes, or packets. The transmission may occur through any wireline or wireless network.
As the agent receives the file, it stores the file in a temporary folder on the user's machine such as “C:\temp\” on the hard disk drive for the user machine, and it uses a counter to track receives bytes. It also appends the bytes to a previously-received portion, if present in the temporary drive, for downloading the file in multiple portions (step[0087]614). It may store the bytes under a file name related to the file in order to detect a previously-received portion under the same name, if present. It may simultaneously store and append the bytes, or separately perform those steps. Also, instead of using the temporary drive, the agent may store the file in other drives or storage mediums.
Table 1 provides the levels of protocol used for the transmission.
[0088]| TABLE 1 |
|
|
| level | protocol | |
|
| 1 | Agent Transfer Protocol (ATP) |
| 2 | encryption |
| 3 | TCP/IP |
|
The ATP (level 1) includes the processing shown in downloads routine[0089]584 (FIG. 7). The encryption protocol (level 2) provides for optional encryption of the transmitted bytes using various types of encryption such as triple Data Encryption Standard, referred to as 3DES. Level 3 includes the standard TCP/IP transmission of data over the Internet.
While the file is being downloaded, the agent displays and continually updates download status screen[0090]788 (step616).Download status screen788, in particular, includes a file identification section789 providing for identification of the file being downloaded, astatus section790 providing for an indication of the status of the file, whether a new download or a continued download, and asection791 providing for additional status information such as a size of the file and an estimated remaining time to completion of the download.Section791 also provides a visual indication of download in progress by continuously displaying the current number of bytes downloaded along with the total number to be downloaded. A section792 provides for another visual indication of the download as in progress. In particular, it provides for an expanding status bar displaying essentially in realtime a relative indication of the amount that the file is downloaded. The status bar moves, for example, from left to right filling up section792 until the file is completely downloaded. Selection of a cancel section793 permits the user to cancel the download.
The agent may track a percentage or a relative amount downloaded by tracking received bytes and by knowing in advance a file size corresponding with the file. For example, conventional operating systems such as the Microsoft Windows program includes the ability to store file sizes in bytes associated with file names and potentially other information associated with the file such as a type of file and when the file was last modified. The agent continuously divides the received number of bytes by the file size in bytes to display the status bar and the percent downloaded.[0091]
Interruption of the transmission may occur in a number of ways such as, for example, through a user's selection of cancel section[0092]793 indownload status screen788, through any type of loss of the network connection, or through software or web browser failure. For example, transmission interruption may occur if a user turns off power to the user machine, if the user machine otherwise experiences a loss of power, if the user disconnects it from the network, if a server or router for network transmission fails, or through any other type of software or hardware failure.
If the transmission was interrupted (step[0093]618), the agent requests whether the user wishes to continue downloading (step620). For example, the agent may display a continuedownload screen794 as shown in FIG. 21B. Continuedownload screen794 includes a section796 for the user to select in order to continue the download and asection798 for the user to select in order to not continue the download at this time. If the agent continues to download the same file at another time, it may search for the same file name in the temporary folder, along with the associated start byte number, in order to download only the remaining portion and append it to the previously-received portion before the interruption occurred. Continuedownload screen794 may alternatively include another option to cancel the download and delete the portion of the file already received.
If the user wants to continue transmission (step[0094]622), the agent sends another get file request including a URL of the file and start byte (step610). Since the agent tracks received bytes, it may now continue transmission by the next start byte following the last byte received. In particular, the agent sets the starting byte to the number of the last byte successfully received plus one. The download process then continues insteps612,614, and616, and the agent appends the remaining bytes to the previously-received portion of the file in the temporary folder, for example. If the downloading is not interrupted (step618), the agent monitors the download to determine if it receives an end of file (EOF) indication (step626); downloading continues while uninterrupted and until an EOF indication is received. The EOF may include any type of symbol, character, code, or other information providing an indication that t
Once the agent receives the EOF indication, it has successfully downloaded the file, and it requests whether the user wishes to install the file (step[0095]628). The agent may, for example, display installation screen776 (FIG. 18) in order to request installation. If the user does not request installation, the agent stores the file on the desktop (step632), and the user may, at a later time, request installation. Otherwise, if installation is requested, the user installs the file by performing the necessary processing so that the file is executable by the user (step630).
Throughout the downloads routine, the agent saves and updates the status in[0096]download status section764 in downloads screen750 for the particular file being processed (step624). Updating the status provides for changing the status instatus column768 for the corresponding file in order to indicate its status, as well as providing an indication of the amount downloaded incompletion column770 and an indication of the date when last downloaded indate column772.
FIG. 8 is a flow chart of updates screen routine[0097]546 executed upon a user's selection ofupdates section720 inhome screen700 ordownloads screen750. Inroutine546, the agent displays anupdates screen795, shown in FIG. 22, upon a user's selection of updates section720 (step634). Within updates screen795, the user selects a particular function (step636) and the agent in response executes the requested function. Updates screen795 includes an update status section802 providing for information concerning updates to particular files. In particular, aname column803 provides an identification of a file name and, as shown indented, an indication of updates to the corresponding files. Aprice column804 indicates a price for the particular update, and atype column805 indicates that type of update such as an add-on. Adetails section806 provides for information concerning the particular highlighted (selected) update in update status section802.
In[0098]updates screen routine546, selection of download section797 (step638) causes execution of downloads routine584 (FIG. 7) for the selected update (step650). A selected update is shown with highlighting, for example, and a user may select an update in the same manner as selecting a section. Selection of a find updates section799 (step640) causes execution of a find updates routine as further explained below (step652). Selection of a remove section801 (step642) causes the agent to remove a file or update selected by user, if the user verifies the removal (step654). Selection of a help section807 (step644) causes display of ahelp screen808 shown in FIG. 23 (step656).Help screen808 provides for display of information to the user concerning finding updates for files.Help screen808 specifically includes connect section730 for a user to connect with an appropriate web site in order to obtain more help information. Fromhelp screen808 the agent determines if the user selects connect section730 (step658); if so, the agent launches the web browser and connects with the appropriate web site in order to obtain more help information (step660).
Selection of[0099]downloads section718 in updates screen795 (step646) causes the agent to execute downloads screen routine544 (FIG. 6). Selection of home section702 (step648) causes the agent to displayhome screen700 and execute home screen routine500 (FIGS. 5aand5b).
FIGS. 9[0100]aand9bare a flow chart of find updates routine652 executed upon selection offind updates section799 in updates screen795 or based upon schedule information. Find updates routine652 permits the agent through interaction withserver205 to automatically search for updates to particular files. The agent and server use application signatures in order to uniquely identify the files stored on a user system. By uniquely identifying those files, the server may determine whether updates exist for particular files. The use of application signatures is particularly useful when files have many different versions, as often exists for software applications, and the server must determine whether an update exists for a particular version of the file on a user machine. The term “application signature” refers to any information used to uniquely identify a file, an example of which is provided below.
In find updates routine[0101]652, the user selects find update section799 (step666). The agent may include an end user license agreement for the user. If it has an end user agreement, the agent determines if this is the first time the user has requested to find updates (step668); if so, the agent displays an end user license agreement (step670) and determines if the user accepts the agreement (step672). The agent may be configured to only look for updates if the user has accepted the end user license agreement. Alternatively, the agent may operate without an end user license agreement or with varying versions of such agreement.
Based upon a user's selection of[0102]find updates section799 or upon schedule information as determined insteps557 and558, the agent searches for updates. The agent scans the hard disk drive on the user's machine in order to search for executable (.exe) files, dynamic link library (.dll) files, and driver (.drv) files, and the agent constructs a message including the directories and file names (step674). Executable files are identified by an “.exe” suffix, dynamic link library files are identified by a “.dll” suffix, and driver files are identified by a “.drv” suffix. The agent may alternatively look for other types of files; however, in the exemplary embodiment it generally searches for the executable, dynamic link library, and driver files. The agent returns a get file information message toserver205 with application signatures (step676).
In this example, the application signatures include a file name and corresponding size in bytes. Certain windows applications, for example, provide file name and size information, and the agent may obtain the file name and size information from such an application or generate the information itself. For certain files, different versions of the executable file may have the same size and, therefore, the executable file name plus size will not alone uniquely identify a particular version. In that case, the agent and server may also use corresponding dynamic link library file names plus associated sizes to construct the application signatures, and for that signature to match, both the executable file name and size, and dynamic link library file name and size, must match a stored signature. Driver files may be used in the application signature in the same manner, requiring a match between driver file names and sizes in addition to the matches between other types of file names and sizes. Therefore, an application signature in this example may include multiple file names and associated sizes for a particular file. Various types of files associated with a single file may be used to generate a unique application signature, depending upon application signatures already stored in the server database.[0103]
[0104]Server205 uses the application signature to determine if updates exist for the corresponding files (step678). In particular, the server selects an application signature (step680) and determines if a match exists in an updates database by individually comparing the received file names and associated sizes with stored file names and associated sizes (step682). If a match exists, the server retrieves the corresponding update information (step684). Update information includes any type of indication of updates to files. The server may include links to a different database including the update information based upon the application signature. The server then determines if more application signatures exist to be processed (step686); if so, it returns to step680 to process additional application signatures. After processing all of the application signatures, the server sends to the agent a file information-response with recommended updates from the retrieved update information (step688). The server also checks if the update recommendation is on the user's machine; if so, it skips the update.
The agent presents an indication of the recommended updates to the user, for example, as shown in update status section[0105]802 in updates status screen795 (step689). The agent determines if the user selects an update to be downloaded (step690). For example, user may select an update and then selectdownload section797 in order to download that update. If the user requests to download an update, the agent executes the download routine584 (FIG. 7) to download the selected update (step692).
While the-agent executes processing to find the updates, it displays update information in an[0106]update status screen810 shown in FIG. 24 (step693). In particular,update status screen810 includes asection811 for the agent to indicate status of preparing to search, a section812 indicating that it is scanning the user system to obtain particular hardware information and file information, asection813 to indicate that it is checking for updates with the server, and a section814 indicating that it has received update information from the server and is compiling the results. In this example, the status of each section is indicated by a check-mark displayed in the corresponding box. A cancel section815 permits the user to cancel the selected function.
In find updates routine[0107]652,steps678,680,682,684,686, and688 are executed by the server, while the agent executes the other steps.
While the present invention has been described in connection with an exemplary embodiment, it will be understood that many modifications will be readily apparent to those skilled in the art, and this application is intended to cover any adaptations or variations thereof. For example, different labels for the various modules and databases, and various hardware embodiments for the servers and machines, may be used without departing from the scope of the invention. This invention should be limited only by the claims and equivalents thereof.[0108]