Sign In to Follow Application
View All Documents & Correspondence

"A System And Method For Binding A Subscription Based Computing System To An Internet Service Provider"

Abstract: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
22 September 2009
Publication Number
49/2009
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

MICROSOFT CORPORATION.,
ONE MICROSOFT WAY,REDMOND, WASHINGTON 98052-6399

Inventors

1. CARPENTER, TODD
C/O MICROSOFT CORPORATION, INTERNATIONAL PATENTS, ONE MICROSOFT WAY,REDMOND, WASHINGTON 98052-6399
2. SCHMIDT, SHON
C/O MICROSOFT CORPORATION, INTERNATIONAL PATENTS, ONE MICROSOFT WAY,REDMOND, WASHINGTON 98052-6399
3. SEBESTA, DAVID J
C/O MICROSOFT CORPORATION, INTERNATIONAL PATENTS, ONE MICROSOFT WAY,REDMOND, WASHINGTON 98052-6399
4. WESTERINEN, WILLIAM J
C/O MICROSOFT CORPORATION, INTERNATIONAL PATENTS, ONE MICROSOFT WAY,REDMOND, WASHINGTON 98052-6399

Specification

BACKGROUND
[0001] This Background is intendtxl to provide the basic context of this patent application and is not intended to describe a specific problem to be solved.
[0002] Pay-as-you-go or pay-per-use and subscription business models have been used in many areas of commerce, firom (xUular telephones to commercial launderettes. In developing a pay-as-you go business, a provider, for example, a cellular telephone provider, offers the use of hardware (a cellular telephone) at a lower-than-market cost in exchange for a commitment to remain a subscriber to their network. In this specific example, the customer receives a cellular phone for little or no money in exchange for signing a contract to become a subscriber for a given period of time. Over the course of the contract, the service provider recovers the cost of the hardware by charging the consumer for using the cellular phone.
[0003] The pay-as-you-go business model is predicated on the concept that the hardware provided has little or no value, or use, if disconnected firom the service provider. To illustrate, should the subscriber mentioned above cease to pay his or her bill, the service provider deactivates their account, and while the cellular telephone may power up, calls cannot be made because the service provider will not allow them. The deactivated phone has no "salvage" value, because the phone will not work elsewhere and the component parts are not easily salvaged nor do they have a significant street value. When the accoimt is brought current, the service providei* will reconnect the device to network and allow the subscriber to make calls.
[0004] This model works well when the service provider, or other entity taking the financial risk of providing subsidized hardware, has tight control on the use of the hardware and when the device has little salvage value. This business model does not work well when the hardware has substantial uses outside the service provider's span of control. Thus, a typical personal computer does not meet these criteria since a personal computer may have substantial uses beyond an original intent and the components of a personal computer, e.g. a display or disk drive, may have a significant salvage value.
[0005] In a typical pay-as-you-go computing system, a user leases or subscribes to an internet service provider (ISP) or other underwriter for a monthly fee which includes a PC and a limited amount of downloaded content. The ISP relies on the user downloading more than the limited amount included in the subscription for profit. However, should the same

user subscribe to another ISP or otherwise be able to download content from another ISP, a user may effectively circumvent the original subscription agreement.
SUMMARY
[0006] This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
[0007] A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.
BRIEF DESCRIPTION OF THE FIGURES
[0008] Fig. 1 is an illustration of a computer that implements a method or includes an apparatus for binding communication between a subscription-based or pay-per-use computer system and an ISP;
[0009] Fig. 2 is a simplified and r<5presentative block diagram of a network module of a secure computing system;
[0010] Fig. 3 is a simplified and n;presentative block diagram of a binding module of a computing system;
[0011] Fig. 4 is a simplified and exemplary block diagram of a system supporting a pay-per-use and subscription computing business model; and
[0012] Fig. 5 is a simplified and exemplary block diagram of a method for binding communication between a subscription-based computing system and an ISP.

SPECIFICATION
[0013] Although the following text sets forth a detailed description of numerous different embodiments, it should be understood that the legal scope of the description is defined by the words of the claims set forth at tlie end of this disclosure. The detailed description is to be construed as exemplary only and does not describe every possible embodiment since describing every possible embodiment would be impractical, if not impossible. Numerous alternative embodiments could be implemented, using either current technology or technology developed after the filing date of this patent, which would still fall within the scope of the claims.
[0014] It should also be understood that, unless a term is expressly defined in this patent
using the sentence "As used herein, the term ' ' is hereby defined to mean..." or a
similar sentence, there is no intent to limit the meaning of that term, either expressly or by implication, beyond its plain or ordinary meaning, and such term should not be interpreted to be limited in scope based on any statement made in any section of this patent (other than the language of the claims). To the extent that any term recited in the claims at the end of this patent is referred to in this patent in a maimer consistent with a single meaning, that is done for sake of clarity only so as to not confiise the reader. It is not intended that such claim term be limited, by implication or otherwise, to that single meaning. Finally, unless a claim element is defined by reciting the word "means" and a fiinction without the recital of any structure, it is not intended that tlie scope of any claim element be interpreted based on the application of 35 U.S.C. § 112, sixth paragraph.
[0015] Much of the inventive fiinctionality and many of the inventive principles are best implemented with or in software proj?"ams or instructions and integrated circuits (ICs) such as application specific ICs. It is esxpected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation. Therefore, in the interest of brevity and minimization of any risk of obscuring the present invention's principles and concepts, fiirther discussion of such software and ICs, if any, will be limited to the essentials with respect to the preferred embodiments.

[0016] Many prior-art high-value computers, personal digital assistants, organizers, and the like, are not suitable for secure subscription use without modification. The ability to enforce a contract requires a service provider, i.e., an "ISP" or other enforcement entity, to be able to affect a device's operation even though the device may not be connected to the service provider, e.g. connected to the Internet. A first stage of enforcement may include a simple pop up or other graphical interface warning, indicating the terms of the contract are nearing a critical point. A second stage of enforcement, for example, after pay-per-use minutes have expired or a subscription period has lapsed, may be to present a system modal user interface for adding value and restoring service. A provider's ultimate leverage for enforcing the terms of a subscription or pay-as-you go agreement is to disable the device. Such a dramatic step may be appropriate when it appears that the user has made a deliberate attempt to subvert the metering or othier security systems active in the device.
[0017] Uses for the ability to place an electronic device into a limited ftmction mode may extend beyond subscription and pay-per-use applications. For example, techniques for capacity consumption could be used for licensing enforcement of an operating system or individual applications.
[0018] Fig. 1 illustrates a logical view of a computing device in the form of a computer 110 that may be used in a pay-per-use; or subscription mode. For the sake of illustration, the computer 110 is used to illustrate the principles of the instant disclosure. However, such principles apply equally to other electronic devices, including, but not limited to, cellular telephones, personal digital assist^mts, media players, appliances, gaming systems, entertainment systems, set top boxes, and automotive dashboard electronics, to name a few. With reference to Fig. 1, an exemphiry system for implementing the claimed method and apparatus includes a general purpos(3 computing device in the form of a computer 110. Components shown in dashed outline are not technically part of the computer 110, but are used to illustrate the exemplary embodiment of Fig. 1. Components of computer 110 may include, but are not limited to, a processor 112, a system memory 114, a memory/graphics interface 116, also known as a Northbridge chip, and an I/O interface 118, also known as a Southbridge chip. The memory 114 and a graphics processor 120 may be coupled to the memory/graphics interface 116. A monitor 122 or other graphic output device may be coupled to the graphics processor 120,
[0019] A series of system busses may couple various system components including a high speed system bus 124 between the processor 112, the memory/graphics interface 116

and the I/O interface 118, a front-side bus 126 between the memory/graphics interface 116 and the system memory 114, and an advanced graphics processing (AGP) bus 128 between the memory/graphics interface 116 and the graphics processor 120. The system bus 124 may be any of several types of bus structures including, by way of example, and not limitation, an hidustry Standard /irchitecture (ISA) bus, Micro Chaimel Architecture (MCA) bus and Enhanced ISA (EISA) bus. As system architectures evolve, other bus architectures and chip sets may be: used but often generally follow this pattern. For example, companies such as Intel and AMD support the Intel Hub Architecture (IHA) and the Hypertransport architecture, respectively.
[0020] Computer 110 typically includes a variety of computer readable media. Computer readable media may be any available media that is accessed by computer 110 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, removable and non-njmovable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer 110. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term "modulated data signal" means a sigjial that has one or more of its characteristics set or changed in such a maimer as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media.
[00211 The system memory 114 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 130 and random access memory (RAM) 132. The system ROM 130 may contain permanent system data 134, such

as identifying and manufacturing information. In some embodiments, a basic input/output system (BIOS) may also be stored in system ROM 130. RAM 132 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processor 112. By way of example, and not limitation. Fig. 1 illustrates operating system 136, application programs 138, other program modules 140, and program data 142.
[0022] The I/O interface 118 may couple the system bus 124 with a number of other busses 144, 146, and 148 that join a variety of internal and external devices to the computer 110. A serial peripheral interface (SPI) bus 144 may cormect to a basic input/output system (BIOS) memory 150 containing basic routines to help transfer information between elements within computer 110. For example, the BIOS may execute during start-up.
[0023] A super inpufoutput chip 152 may be used to cormect to a number of 'legacy' peripherals, such as floppy disk 154, keyboard/mouse 156, and printer 158. In one embodiment, the super I/O chip 152 is connected to the I/O interface 118 with a low pin count (LPC) bus 146. The super I/O chip is widely available in the commercial marketplace.
[0024] In one embodiment, bus 148 may be a Peripheral Component Interconnect (PCI) bus, or a variation thereof, may be used to cormect higher speed peripherals to the I/O interface 118. A PCI bus may also be known as a Mezzanine bus. Variations of the PCI bus include the Peripheral Component Interconnect-Express (PCI-E) and the Peripheral Component Intercoimect - Extended (PCI-X) busses, the former having a serial interface and the latter being a backward compatible parallel interface. In other embodiments, bus 148 may be an advanced technology attachment (ATA) bus, in the form of a serial ATA bus (SATA) or parallel ATA (PATA).
[0025] The computer 110 may also include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only, Fig. 1 illustrates a hard disk drive 160 that reads from or writes to non-removable, nonvolatile magnetic media. Removable media, such as a universal serial bus (USB) memory 162 or CD/DVD drive 164 may be coimected to the PCI bus 148 directly or through an interface 166. Other removable/non-removable, volatile/nonvolatile computer storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, digitall versatile disks, digital video tape, solid state RAM, solid state ROM, and the like.

[0026] The drives and their associated computer storage media discussed above and illustrated in Fig. 1, provide storage of computer readable instructions, data structures, program modules and other data for the computer 110. In Fig. 1, for example, hard disk drive 160 is illustrated as storing operating system 168, appUcation programs 170, other program modules 172, and program data 174. Note that these components can either be the same as or different from operating system 136, application programs 138 other program modules 140, and program data 142. Operating system 168, application programs 170, other program modules 172, and program data 174 are given different nimibers here to illustrate that, at a minimum, they are different copies. A user may enter commands and information into the computer 110 thirough input devices such as a mouse/keyboard 156 or other input device combination. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 112 through one of the I/O interface busses, such as the SPI 144, the LPC 146, or the PCI 148, but other busses may be used. In some embodiments, other devices may be coupled to parallel ports, infrared interfaces, game ports, and the like (not depicted), via the super I/O chip 152.
[00271 The computer 110 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 178 via a network interface confroUer (NIC) 180. The remote computer 178 may be a personal computer, a server, a router, a network PC, a peei' device or other conmion network node, and typically includes many or all of the elements described above relative to the computer 110. The logical connection depicted in Fig. 1 may include a local area network (LAN), a wide area network (WAN), or both, but may also include other networks. Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the Internet.
[0028] In some embodiments, the network interface may use a modem (not depicted) when a broadband connection is not available or is not used. It will be appreciated that the network connection shown is exemplary and other means of establishing a commimications link between the computers may be usied.
[0029] The computer 110 may also include a security module (SM) 182. The SM 182 may be enabled to perform security monitoring, pay-per-use and subscription usage management, and policy enforcement; related to terms and conditions associated with paid use. The SM 182 may be particularly suited to securely enabling a computer 110 in a


subsidized purchase business model. The SM 182 may be a set of virtualized containers executing on the processor 112 or real containers such as an embedded processor or controller. In one embodiment, the SM 182 is connected to 1/0 Interface 118 on the SPI bus 144. In another embodiment, the SM 182 may be embodied in the processing unit 112, part of the I/O Interface 118, as a standalone component, or in a hybrid, such as a multi-chip module. A clock 184 may be incorporated into the SM 182 to help ensure tamper resistance. To allow user management of local time setting, including daylight savings or movement between time zones, the clock 184 may maintain its time in a coordinated universal time (UTC) format and usi^r time may be calculated using a user-settable offset. The SM 182 may also include a cryptographic function (not depicted).
(0030) Additionally, the SM may include firmware or other form of secure memory 186. The secure memory 186 may include: routines or applications that may facilitate the secure operation of the computer 110 through the security module 182. Additionally, the secure memory 186 may include any other data that may be securely accessed, stored, or modified without unauthorized tampering. In one embodiment, the secure memory 186 includes a lower provisioning module (LPM) that manages the allocation of the usage time. The LPM of the secure memory 186 may act as a secure execution environment of the SM 182 and may account for a user's pre-paid access time or subscription information. Additionally, the LPM may be described by U.S. Patent Application No. 10/988,907, and U.S. Patent Application No. 11/612,433 the entire disclosure of which is hereby incorporated by reference.
[0031] The secure memory 186 may also include a cryptographic core that may act as an authentication device for all communication between the SM 182 and other devices. For example, the cryptographic core of the execution xmit 225 may provide a processing and encryption subsystem of the secxirity module 182 that reaches a suitable Common Criteria Evaluation Assurance Level to ensun; that the computer 110 and any communication with the SM 182 may not be compromised.
[0032] The memory 186 may also include storage for system-critical items such as a BIOS for a computer or other electronic device in which the SM 182 is operating. The secure memory 186 may also include memory dedicated to the operation of the SM 182 itself, such as storage, for example, for storing metering code to access and decrement subscription data. The secure memory 186 may also act as a repository for subscription or pay-per-use data such as data representing an amount of access time. With the LPM, the

access time data may be decremented during computer 110 use. Further, an application for use in providing functionality during limited operation modes, such as a "hardware limited mode," (HLM) may also be stored in the secure memory 186. To support a limited operation mode, a second BIOS, and optionally, an alternate copy of the second BIOS, may also be stored in the secure memor>' 186. The second BIOS may be used for booting the computer or other electronic device incorporating the SM 182. The second BIOS may be activated as a secure boot enviromnent to replace the standard BIOS 150 to enforce a subscription or other security policy. Furthermore, the SM 182 may also have an ability to force a system reset at any time which may ensure that pay per use or subscription terms are met, as well as provide a clean environment to start with either a normal or a restricted operation BIOS.
[0033] The SM 182 may also include a network module 188 in communication with the LPM. The network module 188 may include a network stack that may control all network traffic to the OS 136, 168 through the SM 182. For example, the network module 188 may be implemented in a 32-bit RISC Microcontroller. One example of a suitable microcontroller may be the LPC2378 microcontroller manufactured by NXP Semiconductors of Eindhoven, The Netherlands. Additionally, the network module 188 may include a web server within the SM 182 that may host a number of interfaces that allow secure management of a subscription-based computing system. In one embodiment, the network module 188 includes a nuitnber of user interfaces as web pages in a standard publishing format that are served to the user through the SM 182. The standard publishing format may be Hypertext Markup Language or any similar format. The network module 182 may also include a cryptogiraphic module or function that may encrypt all commimications between an internet service provider (ISP) and the computer 100 using a secret key stored in the secure memory 186. In another embodiment, the network module 188 manages a network stack and provides packet filtering and redirection within a subscription-based or pay-per-use computing system. The network module may be in communication with or act as a substitute for the LPM and/or an upper provisioning module (UPM) as described in U.S. Patent Application No. 10/988,907, and U.S. Patent Application No. 11/612,433.
[0034] With reference to Fig. 2, th*; network module 188 may be in communication with the SM 182. In one embodiment, tlie network module includes a UPM in the form of a number of web pages in an OS independent format 205, a memory 210, a network stack and


driver 215, and a web server 220. In one embodiment, the UPM 205 is a series of web pages that allow a user to add access time and perform other subscription account administrative functions. The UPM 205 may be hosted inside the web server 220 and may invoke the LPM, as previously discussed, to retrieve information to be presented on the web sites that are served by the web server 220 to a web browser executing on the OS. In a further embodiment, the web sites invoke the LPM to retrieve a current time balance and provide packets to provision access; time from the SM 182 to the computer 110. The network stack and driver 215 may miike a network port available to the OS during operation of the computer 110. In one embodiment, the network stack and driver 215 determines if incoming requests are destined for the web server 220 based on an internet protocol (IP) address and a port of the incoming packet. For example, if the incoming packet is for the web server 220, then the network stack and driver 215 may forward the packet to the web server 220 unencrypted. However, if the incoming packet is destined for another location, i.e., a remote computer 178, then the network stack and driver 215 may encrypt the packet and send it to its destination. In oni3 embodiment, the network stack and driver 215 may provide a processing and encryption subsystem of the module 188 that reaches a suitable Common Criteria Evaluation Assurance Level to ensure that the module 188 and any communication between the computer 110 and an outside device 178 may not be compromised. In a further embodiment, the network stack and driver 215 manages all communication from the computer 110 to a system that manages user subscription information, as further discussed in relation to Fig. 4.
[0035] With reference to Fig. 3, a binding module 189 may be integrated into the I/O Interface 118. The binding module 189 may communicate directly with the SM 182 within the I/O interface 118, over one of several busses, for example, the SPI bus 144, or over a dedicated communication line. The binding module 189 may include various components to ensure that the computer 110 ma])' only communicate externally with a particular ISP, several ISPs, a class or type of peripheral device, or any other desired system or device. In one embodiment, the binding module may only allow the computer 110 to communicate with an ISP to which a user of the computer 110 is a subscriber.
[0036] The binding module 189 raay include a detection module 305. The detection module 305 may include logic implemented as hardware, software or another form of computer readable instructions that may identify communications from the NIC 180 or other peripheral devices 160, 166. In one embodiment, the binding module 189 is an


integrated circuit that detects configuration information or events originating from any type of peripheral device. For example, when an OS 136, 168 enumerates a peripheral device, either during a boot-up procedure or if a user connects a peripheral device after a boot-up procedure, the I/O Interface 118 may receive a configuration packet or other communication data from the peripheral device. The binding module 189 may then detect, with the detection module 305, configuration packets, cycles, or any other forms of communication or connection events from the peripheral device to the I/O Interface 118 over any of the busses 124, 144, 146, 148 in communication with the I/O Interface 118. The communication may originate from any peripheral device including, but not limited to devices described as or implementing protocols compatible with USB, 1394, PCI, network, NICs, hard drives, flash devices, or other devices.
[0037] The binding module 189 may also include memory 310 for storing detected information and a list of acceptabhj ISPs and other sources of approved configuration information. In one embodiment, the binding module 189 will discard any data it receives from an unauthorized peripheral dodce or originating from anything other than a set of approved devices or ISPs. By discarding unauthorized communications at the I/O Interface 118, the binding module 189 may pre:vent communication originating from an unauthorized source from reaching its intended destination by preventing the computer 110 from processing any unauthorized data. For example, the binding device 189 may identify the first communication received at the I/O Interface 118 having a device class of network controller. All future communications originating from a network controller and matching the characteristics of the first-identified network controller may then be passed to the intended destination.
[0038] Alternatively, the binding module 189 may communicate with the memory 310 or other storage that includes a list of authorized peripheral sources for data arriving at the module 189 or the I/O Interface 118 and only permit data matching a characteristic of the list to reach its destination. Further, the binding module 189 may communicate with a peripheral device to determine if it contains a secret identifier or other cryptographic function to permit communication between the device and the I/O Interface 118. Allowing the binding module 189 to cryptographically authenticate communication received at the I/O Interface 118 may permit more than one peripheral device or network interface 180 to communicate with the computer 110. Of course, the memory may also include a list of excluded sources whereby a match would prevent the incoming data from reaching its


intended destination. For example, the binding module 189 may exclude data coming to the I/O Interface 118 with a device class of network controller after a first network controller is authenticated. Many other methods; of permitting only authorized data from reaching its intended destination through the I/O Interface 118 are also possible.
[0039] Further, the binding module 189 may include a cryptographic module 315 that may encrypt communications fi-om the computer 110 to a remote computer 178. In one embodiment, the cryptographic module 315 may authenticate data received at the I/O Interface 118 as from an approved source. For example, the cryptographic module 315 may decrypt communication from a peripheral device to determine its authenticity as originating from one or a number of approved sources. In another embodiment, the cryptographic module sends an encoded "heartbeat" signal to the remote computer 178 or ISP at a random interval. Because only an ISP that is able to decrypt the heartbeat signal may be able to answer the signal, the cryptographic module 315 may ensure that the computer 110 only communicates with specific ISPs. In a fiirther embodiment, the binding device 189 may include the LPM as described in relation to the SM 182. In a still fiirther embodiment, the LPM and binding module 189 may be incorporated into the NIC 180. The binding module 189 may also be connected to the PC:i bus 148 between the NIC 180 and I/O Interface 118 or other computer 110 components to communicate with the SM 182. For example, for the binding module 189 to be located outside of the I/O Interface 118, the busses 124, 144,146, 148 in communication with the I/O Interface 118 may be configured to "no connect" while replicating this fimctionality within the binding module 189,
[0040] Other embodiments may in(;lude an activation fiise 190. The fiise 190 may be any type of device or firmware that may be selectively activated from an inactive state to enable communication between the I/O Interface 118 and the SM 182. When deactivated, i.e., when the fiise 190 does not maintain a connection between the SM 182 and the I/O Interface 118, the computer 110 may not operate as a subscription-based computing device, but rather, as a normal PC. However, when activated, i.e., when the fixse 189 maintains a connection between the SM 182 and the I/O Interface 118, the computer may operate as a subscription-based computing device. In one embodiment, the fiise 190, once activated to enable communication between the SM 182 and other components and devices, may not be deactivated. For example, the computer 110 may be manufactured initially to operate as a normal, non-subscription-based PC and may later be activated by an underwriter or subscriber to operate as a subscription-based PC. Therefore, while the fiise is activated and


upon boot-up, connection, or disconnection of the device 188, firmware of the SM 182 (i.e., the previously-described local provisioning module of the secure memory 186) may seek subscription or usage time stored in the metered computing device 188.
(0041] Fig. 4 is a simplified and exemplary block diagram of a system 400 supporting pay-per-use and subscription usage of a computer or other electronic device. A provisioning server 402 may serve as a trusted endpoint for provisioning requests firom one or more electronic devices participating in the pay-per-use business ecosystem. One electronic device 404 may be similar- to computer 110 of Fig. 1 including the SM 182, and at least one of a network module 18!? and a binding module 189. Other electronic devices 406 may perform substantially the same as the exemplary device 404. Commimication between the provisioning server 402 and the electronic device 404 may be accomplished through a network 408 to a NIC 180 of the computer 110 and that may include landline, wireless, or broadband networks, or other networks known in the art.
[0042] An accoimting server 410 may be linked to the provisioning server 402 and may maintain account data corresponding to the electronic device 404. Account data may also be stored at the SM 182. The accounting server 410 may also serve as a clearinghouse for financial transactions related to the electronic device 404, such as, replenishing or adding value to a pay-per-use account maintained on the accounting server 410. In one embodiment, the electronic device 404, communicating through the NIC 180, through the binding module 189, establishes a connection with a vendor 412 that communicates with the accounting server 410. In another tanbodiment, the device 404 establishes a connection directly with the accoimting server 410 through the module 189. During use, an LPM within the SM 182 of the device 404 may decrement access data stored in the secure memory 186. The access data may be any value, access time for operating any secure OS or application of the electronic device 404, 406, or any other data that may be recorded at the accounting server 410 and stored at the SM 182 for use with a computer 110. In a fiirther embodiment, the user may purchase a. generic amount of time that may be used for any OS, application, or any other activity at a secure electronic device 404. Of course, many other types of data, access time, and subscription information may be purchased and stored at the SM 182 or an accounting server 410.
[0043] Fig. 5 is a simplified and exemplary block diagram of a method 500 for binding a subscription-based computer 110 to a particular ISP. At block 505, a user desiring to operate a subscription-based computer 110 with a binding module 189 and a security


module 182 including the network module 188 may boot or re-boot the computer 110. Upon boot or reboot, peripheral devices may communicate configuration or other data to the computer 110. In one embodiment, upon boot-up, the I/O Interface 118 receives configuration data from a peripheral device. For example, a network interface card (NIC) 180 may seek to establish a connection with the computer 110 by sending configuration data to the I/O Interface 118. Alternatively, the I/O Interface 118 may request configuration data from all connected devices.
[0044] At block 510, the I/O Interface 118 may detect configuration data. In one embodiment, the detection module 305 distinguishes configuration data sent to the I/O interface 118 from a peripheral devi<;e. For example, a network interface card 180 or other device may send a configuration cji'cle to the I/O Interface 118 upon a boot or re-boot process or upon a connection to the computer 110. The configuration cycle may then be intercepted by the detection module 305.
(0045] At block 515, the binding module 189 may authenticate the received configuration data. In one embodiment, the detection module 305 may process the configuration data to determine its source or other identification data. For example, the detection module 305 may process a configuration cycle packet to determine if it originates from a source that matches data retrieved from an approved source list stored in the memory 310. In another embodiment, the detection module 305 may communicate with the peripheral device that sent the configuration data to determine if the sending device contains an acceptable key or other piece of cryptographic data. For example, the binding device 189 may prompt the peripheral device 180 to send an encrypted message to the I/O Interface 118. The detection module 305 may then intercept the encrypted message and commimicate with the cryptographic module 315 to authenticate the received message.
[0046] If, at block 515, the confij;uration data is not authentic, then, at block 520, the method 500 may discard the data which may, at block 525, cause the peripheral device to timeout. Additionally, at block 530, configuration data that is not authenticated may cause the computer to enter a degraded mode such as HLM, as previously described. If, at block 515, the configuration data is authentic, at block 535, the peripheral device 180 may initiate fiirther communication with the computer 110. In one embodiment, the user initiates a web browser executing on the OS 136, 168 of the computer 110. The LPM within the secure memory 186 of the SM 182 or within the binding module 189 may send a packet to a remote computer 178 at the ISP. In one embodiment, the packet may contain a random


number or may be signed to identiify the packet as belonging to the subscription-based computer 110.
[0047] At block 540, the ISP may receive and authenticate the packet from the computer 110. If, at block 545, the ISP determines that the received packet is authentic, then, at block 545, the ISP may allow the comput(;r 110 access to the internet. In one embodiment, the ISP and computer 110 may authenticate the communication using PKI or other suitable cryptographic techniques. If, at block 540, the ISP determines that the received packet is not authentic, then, at block 525, the communication may timeout and, at block 530, the LPM of the SM 182 or binding module 189 may force the computer 110 into a degraded mode of operation.
[0048] At block 550, the ISP may send a cryptographic reply to the computer 110. In one embodiment, the ISP sends a "heartbeat" packet to the computer 110 at a random interval. The random interval may be below & threshold time that, if exceeded, the LPM may force the computer 110 into a degraded mode. If, at block 555, the LPM does not receive the cryptographic reply, then the LPM raay force the computer 110 into a degraded mode of operation at block 530. In one embodiment, the LPM may limit the computer's 110 capability until a connection is restored with the ISP or it receives the cryptographic signal. In another embodiment, the type of response, allowable latency, and any other parameter required by the LPM is included in title cryptographic packets between the binding module 189andtheSM182.
[0049] If, at block 555, the computer receives and authenticates the cryptographic reply of block 550, then the method 500 may return to block 545 to allow the computer 110 continued internet access. In one embodiment, the LPM of the SM 182 or the binding module 189 may authenticate the rqjly by detecting configuration cycles as described in relation to Fig. 3. In a further embodiment, only configuration cycles or properly-authenticated packets may be accepted by the LPM for processing and continued access of the computer 110 to the ISP. Thus, a binding module 189 may bind a subscription-based computer 110 to a particular ISP.
[0050] Many modifications and vajriations may be made in the techniques and structures described and illustrated herein without departing from the spirit and scope of the present invention. Accordingly, it should be understood that the methods and apparatus described herein are illustrative only and are not limiting upon the scope of the invention

We Claim:
1. A system for binding a subscription-based computer 110 to a service provider comprising:
a binding module 189 residing on the computer 110 including a computer-readable medium having computer executable instructions comprising:
a detection module 305 for identifying configuration data fi-om a peripheral device of the computer;
a validation module 315 for authenticating the configuration data; and a security module 182 residing on the computer, in communication with the binding module 189, and including a computer-readable medium having computer executable instructions comprising:
a network module 188 for degrading operation of the computer 110 if the validation module 315 does not authenticate the configuration data.
2. The system of claim 1, wherein the binding module resides on a Southbridge of the computer.
3. The system of claim 1, \vherein the binding module fiirther comprises a cryptographic module for encrypting a request for data fi"om the computer to a remote computer and for decrypting a response to the request for data from the remote computer;
wherein the validation module; authenticates the configuration data and the response to the request for data from the remote computer; and
wherein the network module degrades the operation of the computer if the validation module does not authenticate the configuration data or the response to the request for data from the remote computer.
4. The system of claim 1, wherein the security module fiirther comprises computer
executable instructions comprising:
a provisioning module for accessing, decrementing, and storing subscription data during operation of the subscription-based computer;
wherein the subscription data includes a number of subscription units.


5. The system of claim 1, wherein the cryptographic module includes a secure memory storing an encryption key.
6. The system of claim 3, wherein the network module further comprises computer executable instructions for degrading the operation of the computer if a time between sending the request for data from the remote computer and receiving the response is above threshold.
7. The system of claim 1, wherein the binding module resides on a PCI bus of the computer.
8. The system of claim 1, wherein the peripheral device includes at least one of a USB device, a 1394 device, a NIC, a h£ird drive, a network device, or a flash device.
9. The system of claim 3, furthei* comprising a heartbeat module including a computer-readable medium having computer executable instructions comprising:
a heartbeat transmission module for transmitting an encrypted ping message; and a heartbeat validation module for receiving and verifying the encrypted ping
message;
wherein the network module does not degrade operation of the computer if the
validation module authenticates the (jonfiguration data and the response to the request for
data from the remote computer, and the heartbeat validation module receives and verifies
the encrypted ping message.
10. The system of claim 9, wherein the heartbeat transmission module resides at the remote computer and the heartbeat validation module resides at the subscription-based computer.
11. A method for binding a subscription-based computer 110 to an internet service provider (ISP) comprising:
communicating configuration (data from a peripheral device to the computer 110; detecting the configuration data at the computer 110; authenticating a source of the configuration data;

passing the configuration data to a processor 112 of the computer 110 if the source of the configuration data is authentic; and
discarding the configuration data if the source of the configuration data is not authentic.
12. The method of claim 1, further comprising detecting the configuration data at a Southbridge of the computer.
13. The method of claim 1, further comprising communicating an encrypted packet from the computer to a remote computer of the ISP if the source of the configuration data is authentic, the encrypted packet uniquely identifying the computer;
authenticating the encrypted piacket at the remote computer; communicating a heartbeat packet from the remote computer to the computer; authenticating the heartbeat packet at the computer; and
maintaining communication between the ISP and the computer if the heartbeat packet is authentic.
14. The method of claim 13, wherein the heartbeat packet includes an encrypted ping
message from the ISP to the compiuter.
15. The method of claim 13, further comprising communicating the heartbeat packet fi-om the remote computer to the computer at a random time interval.
16. The method of claim 13, further comprising degrading the operation of the computer if either the source is not authentic, the encrypted packet is not authentic, the encrypted heartbeat packet is not authentic, or the communication between the ISP and the computer is disrupted.
17. The method of claim 16, furthier comprising degrading operation of the computer if the detected configuration cycle does not belong to a NIC of the computer.
18. A system including a binding imodule 189 in communication with a security module 182 of a subscription-based computer 110, the binding module including a detection

module 305 and a cryptographic module 315, at least one of the binding 189 module and the security module 182 including a memory 310, 186 and a processor physically configured to execute computer executable code for:
accessing, decrementing, and storing a number of subscription units in the memory 310,186 during operation of the computer 110;
communicating configuration data fi-om a peripheral device to the computer 110;
detecting the configuration data at the computer 110;
authenticating a source of the configuration data;
passing the configuration data to a processor 112 of the computer 112 if the source of the configuration data is authentic;
discarding the configuration data if the source of the configuration data is not authentic.
communicating an encrypted packet fi-om the computer 110 to a remote computer 178 of the ISP if the source of the configuration data is authentic, the encrypted packet uniquely identifying the computer;
authenticating the encrypted packet at the remote computer 178;
communicating an encrypted ping message fi-om the remote computer 178 to the computer allO t a random time interval;
authenticating the encrypted ping message at the computer 110;
maintaining communication between the ISP 178 and the computer 110 if the heartbeat packet is authentic;
degrading operation of the computer 110 if the configuration data is not authentic;
19. Degrading operation of the computer if the configuration data is not authentic.The system of claim 18, wherein the p(;ripheral device is a NIC of the computer.
20. The system of claim 18, fiirther comprising degrading the operation of the computer if either the encrypted packet is not authentic or the encrypted ping message packet is not authentic.

Documents

Application Documents

# Name Date
1 5602-CHENP-2009-AbandonedLetter.pdf 2018-11-15
1 abs 5602-chenp-2009 abstract 22-09-2009.jpg 2009-09-22
2 5602-chenp-2009 power of attorney 22-09-2009.pdf 2009-09-22
2 5602-CHENP-2009-FER.pdf 2018-01-31
3 5602-chenp-2009 pct search report 22-09-2009.pdf 2009-09-22
3 5602-chenp-2009 correspondence others 09-03-2011.pdf 2011-03-09
4 5602-chenp-2009 pct 22-09-2009.pdf 2009-09-22
4 5602-chenp-2009 form-18 09-03-2011.pdf 2011-03-09
5 5602-chenp-2009 form-5 22-09-2009.pdf 2009-09-22
5 5602-chenp-2009 form-3 22-03-2010.pdf 2010-03-22
6 5602-chenp-2009 form-3 22-09-2009.pdf 2009-09-22
6 5602-chenp-2009 abstract 22-09-2009.pdf 2009-09-22
7 5602-chenp-2009 form-2 22-09-2009.pdf 2009-09-22
7 5602-chenp-2009 claims 22-09-2009.pdf 2009-09-22
8 5602-chenp-2009 form-1 22-09-2009.pdf 2009-09-22
8 5602-chenp-2009 correspondence others 22-09-2009.pdf 2009-09-22
9 5602-chenp-2009 description (complete) 22-09-2009.pdf 2009-09-22
9 5602-chenp-2009 drawings 22-09-2009.pdf 2009-09-22
10 5602-chenp-2009 description (complete) 22-09-2009.pdf 2009-09-22
10 5602-chenp-2009 drawings 22-09-2009.pdf 2009-09-22
11 5602-chenp-2009 correspondence others 22-09-2009.pdf 2009-09-22
11 5602-chenp-2009 form-1 22-09-2009.pdf 2009-09-22
12 5602-chenp-2009 claims 22-09-2009.pdf 2009-09-22
12 5602-chenp-2009 form-2 22-09-2009.pdf 2009-09-22
13 5602-chenp-2009 abstract 22-09-2009.pdf 2009-09-22
13 5602-chenp-2009 form-3 22-09-2009.pdf 2009-09-22
14 5602-chenp-2009 form-3 22-03-2010.pdf 2010-03-22
14 5602-chenp-2009 form-5 22-09-2009.pdf 2009-09-22
15 5602-chenp-2009 form-18 09-03-2011.pdf 2011-03-09
15 5602-chenp-2009 pct 22-09-2009.pdf 2009-09-22
16 5602-chenp-2009 correspondence others 09-03-2011.pdf 2011-03-09
16 5602-chenp-2009 pct search report 22-09-2009.pdf 2009-09-22
17 5602-chenp-2009 power of attorney 22-09-2009.pdf 2009-09-22
17 5602-CHENP-2009-FER.pdf 2018-01-31
18 abs 5602-chenp-2009 abstract 22-09-2009.jpg 2009-09-22
18 5602-CHENP-2009-AbandonedLetter.pdf 2018-11-15

Search Strategy

1 5602_CHENP_2009_31-01-2018.pdf