System and method of using physical objects to control software access

ABSTRACT

A system and method is provided for controlling access to software via a physical object. The system may include one or more of a physical object, such as a toy, a computing device, and a server. The toy may include a unique identifier that permits an owner of the toy to download software to the computing device via the server. In some variations, a purchaser of the toy may be permitted to download software to the computing device directly from a storage device associated with the toy.

FIELD OF THE INVENTION

The invention relates generally to a system and method of using physical objects to control software access, and more particularly to a system and method of providing physical toys that enable users to download, unlock, or otherwise access all (or a portion of) a software application.

BACKGROUND OF THE INVENTION

Research indicates that toy purchases for children are typically met with less resistance from parents than are purchases (or free downloads) of mobile software applications (or mobile “apps”). Indeed, there are a number of considerations that often give parents pause when it comes to allowing their children to download mobile games or other apps. For example, parents are often concerned with things such as the age appropriateness of an app's content, the collection and sharing of personal data (e.g., name, birthdate, location, etc.) about their children, and the risk of cyberbullying or exposure to inappropriate language or conduct (e.g., for those apps that have a social networking component). Many parents also worry about the potential for children to incur substantial charges, whether knowingly or not, through repeated in-app purchases. Further, some parents may be unwilling to initiate accounts with application marketplaces (e.g., the App Store, Google Play, Amazon Marketplace, the Windows Store, Steam, etc.), many of which require users to link a credit card to the account.

Unlike concerns associated with app downloads, parents often have a greater level of comfort when it comes to the purchase of a physical toy (e.g., whether on-line or at a brick-and mortar retailer) since they are able to, among other things, examine a tangible product, read directions, identify recommended age levels, etc. in order to arrive at a level of comfort with the purchase.

Unfortunately, children miss out on benefits that some mobile apps can provide when parents restrict their use. For example, many mobile games and other apps developed for children can be fun and relaxing, and can help children develop important skills such as, for example, time management, multi-tasking, etc., in addition to basic computing skills Many children's mobile apps are additionally intended to be used with parents, thereby allowing parents and their kids to spend quality time together.

These and other drawbacks exist.

SUMMARY OF THE INVENTION

The invention addressing these and other drawbacks relates generally to a system and method of using physical objects to control software access, and more particularly to a system and method of providing physical toys that enable users to download, unlock, or otherwise access all (or a portion of) a software application.

One aspect of the invention relates to a computer-implemented method of providing access to an executable software application stored on a host computer system, the method being implemented in the host computer system having one or more physical processors programmed with computer program instructions that, when executed by the one or more physical processors, cause the host computer system to perform the method, the method comprising: receiving, at the host computer system, from a computing device, a unique identifier read from a physical object; authenticating, by the host computer system, the unique identifier; authorizing, by the host computer system, a download of the executable software application to the computing device responsive to authentication of the unique identifier; transmitting, by the host computer system, the executable software application to the computing device; and restricting, by the host computer system, further downloads of the executable software application for the unique identifier.

One aspect of the invention relates to a system for providing access to an executable software application stored on a host computer system, the system comprising: a physical object, the physical object comprising a unique identifier; and a host computer system, the host computer system having one or more physical processors programmed with computer program instructions that, when executed by the one or more physical processors, cause the host computer system to: receive, from a computing device, the unique identifier read from the physical object; authenticate the unique identifier; authorize a download of the executable software application to the computing device responsive to authentication of the unique identifier; transmit the executable software application to the computing device; and restrict further downloads of the executable software application for the unique identifier.

These and other objects, features, and characteristics of the system and/or method disclosed herein, as well as the methods of operation and functions of the related elements of structure and the combination of parts and economies of manufacture, will become more apparent upon consideration of the following description and the appended claims with reference to the accompanying drawings, all of which form a part of this specification, wherein like reference numerals designate corresponding parts in the various figures. It is to be expressly understood, however, that the drawings are for the purpose of illustration and description only and are not intended as a definition of the limits of the invention. As used in the specification and in the claims, the singular form of “a”, “an”, and “the” include plural referents unless the context clearly dictates otherwise.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an exemplary system for using a physical object to control access to software, according to an implementation of the invention.

FIG. 2 illustrates an exemplary computing device, according to an implementation of the invention.

FIG. 3 illustrates an exemplary process of controlling software access via a physical object, according to an implementation of the invention.

FIG. 4 illustrates an exemplary system for using a physical object to control access to software, according to an implementation of the invention.

FIG. 5 illustrates an exemplary process of controlling software access via a physical object, according to an implementation of the invention.

FIG. 6 illustrates an exemplary system for using a physical object to control access to software, according to an implementation of the invention.

FIG. 7 illustrates an exemplary process of controlling software access via a physical object, according to an implementation of the invention.

DETAILED DESCRIPTION OF THE INVENTION

The invention relates generally to a system and method of using physical objects to control software access, and more particularly to a system and method of providing physical toys that enable users to download, unlock, or otherwise access all (or a portion of) a software application.

As used herein, a “toy” may comprise any type of object for children to play with, including, but not limited to, teddy bears, action figures, robots, dolls, figurines, cars, trains, building blocks, balls, trading cards, etc. The toys may be designed for use by children of various recommended age levels.

The invention enables an owner of a toy (e.g., a purchaser or a recipient) to download, unlock, or otherwise access all (or a portion) of a software application (e.g., a mobile application). In some implementations, a stand-alone, executable application may be downloaded, unlocked, or otherwise accessed using a toy, as described in greater detail herein. In other implementations, updates, add-ons, or other components of a previously-acquired or installed software application may be downloaded, unlocked, or otherwise accessed using the toy. Accordingly, any of the implementations described herein may be equally applicable to stand-alone, executable software applications, as well as updates, add-ons, or other components of previously-acquired or installed software applications.

In some implementations, the software may have a direct relationship with the toy, and may include content related to the toy. As a non-limiting example, the software may include a game, video, story and/or other application associated with the toy, and may include, in some instances, a virtual (or digital) depiction of the toy. In other implementations, the software may have an indirect relationship with the toy.

In one implementation, a toy may include a key for accessing software, such as a mobile device app or content for a mobile device. For example, a toy may include a unique printed identifier (“ID”) in the form of a barcode, QR code, watermark, or alphanumeric passcode, or other form of unique ID. In some implementations, the toy may include a unique electronic ID readable via wireless technologies such as, for instance, Bluetooth, Near Field Communication (NFC) and/or Radio Frequency Identification (RFID). A toy owner may use a mobile device, such as a smart phone or tablet, to read or otherwise detect the unique printed or electronic ID. The toy owner may then be granted download access to a corresponding mobile device app.

In another implementation, a toy may include the software itself. For example, a toy may include a digital storage device such as a solid state memory device (or other storage device) that stores an app or other software. The toy may be configured to communicate with a mobile device via a wired (e.g., USB) and/or wireless connection (e.g., Bluetooth, NFC, RFID, etc.). The mobile device may download the app or other software from the toy. After download, the mobile device may communicate with a server to authenticate the software and/or may authenticate the software via further communication with the toy.

For ease of explanation, the invention will be described herein with reference to a toy and a corresponding (or associated) mobile application. It should be appreciated, however, that any of the implementations described herein may be equally applicable to any type of physical object and corresponding software application, for users of any age, and for any intended purpose (whether for entertainment, business, educational, or other purposes). As one non-limiting example, a sports fan may purchase a replica football helmet (or other object) corresponding to their favorite football team that enables them to download, unlock, or otherwise access all (or a portion of) a software application that includes content directed to the team. Countless other examples exist.

FIG. 1 illustrates a system 100 for controlling software access with a physical object. In one implementation, system 100 may include a toy 110, a computing device 120, a server (or host computer system) 130 and/or other components.

Toy 110 may, as noted above, comprise any type of object for children to play with. In one implementation, toy 110 may include a unique identifier 160. Unique identifier 160 may comprise a series of numbers and/or characters that serve to uniquely identify toy 110. Unique identifier 160 may be represented visually as a visual identifier, and may be printed directly on the toy, may be printed on a label adhered to the toy, may be included separately from the toy in packaging of the toy, may be etched or incised into the toy, and/or may be associated with the toy in any other appropriate manner.

A unique visual identifier may include a QR code, a bar code, a watermark, a series of numbers and/or characters, or any other visual means of presenting unique identifier 160. Identifier 160 may also comprise an electronic identifier including, but not limited to, an RFID chip, a smart chip, and/or any other type of identifying means via which the identifier 160 may be read through electronic means.

Unique identifier 160 may include any type of identifier or code that may differ from other unique identifiers 160 associated with other, similar, toys. Unique identifier 160 may include hierarchical information identifying the class of toy with which it is associated (e.g., action figure or train), the member within the identified class (e.g., a specific action figure), a numbered one of the members of that class, and/or other information. For example, identifier 160 may identify a toy as being a particular numbered toy in a series of similarly-manufactured action figures. Thus, unique identifier 160 may serve to uniquely identify toy 110 from all other toys 110. Unique identifier 160 may additionally or alternatively include information about software to be downloaded, for example, the name of the software, an identification number, a version number, and a download location, among other information.

In some implementations, toy 110 may be packaged to prevent access to unique identifier 160 to someone that has not purchased toy 110. For example, a visual identifier may be hidden by toy packaging or by an adhesive label covering the identifier. An electronic identifier may be electromagnetically shielded by packaging components to prevent a non-purchaser from reading the identifier 160 through the packaging without making a purchase. In some implementations, toy 110 may include an identifier 160 that includes both an electronic portion readable by electronic means and a visual portion, for example, a number sequence for authenticating the electronic portion.

Computing device 120 may be any computing device configurable to run software applications. For example, computing device 120 may comprise, without limitation, a gaming console, a handheld gaming device, a personal computer (e.g., a desktop computer, a laptop computer, etc.), a smartphone, a tablet computing device, and/or other device that can be programmed to run software applications. In some implementations, computing device 120 may comprise a handheld mobile device configured to play games. Computing device 120 may be configured to run operating systems such as, for example, Apple iOS, Android, Windows Mobile, or other operating systems. Computing device 120 may additionally be configured to run an operating system specific to toys 110 including unique identifiers 160.

As shown in FIG. 2, computing device 120 may include one or more processors 122 (also interchangeably referred to herein as processors 122, processor(s) 122, or processor 122 for convenience), one or more storage devices 124 (which may store at least a communications module 125), and/or other components. Processors 122 may be programmed by one or more computer program instructions. For example, processors 122 may be programmed by communications module 125 and/or other instructions. Computing device 120 may further include one or more input devices 126. Input device 126 may include, for example, a camera, a data port (e.g., USB port, lightning cable port), and/or an antenna designed for Bluetooth, RFID and/or NFC communications. The computer program instructions described herein may be stored in one or more storage devices 124, which may comprise random access memory (RAM), read only memory (ROM), and/or other memory. The one or more storage devices 124 may store the computer program instructions (e.g., the aforementioned instructions) to be executed by processor 122 as well as data that may be manipulated by processor 122. The one or more storage devices 124 may comprise floppy disks, hard disks, optical disks, tapes, or other storage media for storing computer-executable instructions and/or data.

Referring back to FIG. 1, server 130 may include may include one or more processors 140 (also interchangeably referred to herein as processors 140, processor(s) 140, or processor 140 for convenience), one or more storage devices 150, and/or other components. Processors 140 may be programmed by one or more computer program instructions, which may be stored on storage devices 150 and/or elsewhere.

Although illustrated in FIG. 1 as comprising individual components, computing device 120 and server 130 may each include a plurality of components (e.g., computer devices) each programmed with at least some of the functions described herein. In this manner, some components of computer device 120 and/or server 130 may perform some functions while other components may perform other functions, as would be appreciated. The one or more processors 122 and 140 may each include one or more physical processors that are programmed by computer program instructions. The various instructions described herein are exemplary only. Other configurations and numbers of instructions may be used, so long as the processor(s) 122 and 140 are programmed to perform the functions described herein.

Furthermore, the description of the functionality provided by the different instructions described herein is for illustrative purposes, and is not intended to be limiting, as any of instructions may provide more or less functionality than is described. For example, one or more of the instructions may be eliminated, and some or all of its functionality may be provided by other ones of the instructions. As another example, processor(s) 122 and 140 may be programmed by one or more additional instructions that may perform some or all of the functionality attributed herein to one of the instructions.

FIG. 3 illustrates an exemplary process 300 of controlling access to software with a physical object, according to an implementation of the invention. The various processing operations and/or data flows depicted in FIG. 3 (and in the other drawing figures) are described in greater detail herein. The described operations may be accomplished using some or all of the system components described in detail above and, in some implementations, various operations may be performed in different sequences and various operations may be omitted. Additional operations may be performed along with some or all of the operations shown in the depicted flow diagrams. One or more operations may be performed simultaneously. Accordingly, the operations as illustrated (and described in greater detail below) are exemplary by nature and, as such, should not be viewed as limiting.

Operation 301 of process 300 may comprise the reading of unique identifier 160 associated with toy 110 by computing device 120. Computing device 120 may perform an identifier reading operation 301 with input device 126. For example, a camera of computing device 120 may be used to capture an image of a visual identifier such as a QR code, a bar code, a watermark, a series of numbers and/or characters, or other visual identifier. Alternatively, a data port of computing device 120 may be used to connect directly to a corresponding data port of toy 110 to electronically read identifier 160. In some implementations, computing device 120 may read identifier 160 via Bluetooth, RFID, NFC, or other techniques. In some implementations, a unique identifier may be manually input by a user.

Operation 302 of process 300 may comprise the transmission of unique identifier 160 to server 130. For example, computing device 120 may transmit identifier 160 to server 130 for verification. Computing device 120 may transmit identifier 160 via any communication means available. In computing devices that include cellular antennas, identifier 160 may be transmitted via a cellular network. In some implementations, computing device 120 may transmit identifier 160 over a network (e.g., the Internet) via a network connection. Computing device 120 may further transmit information that uniquely identifies computing device 120. In some implementations, computing device 120 may connect to another device, e.g. a laptop, to establish a connection with server 130 and transmit identifier 160.

Operation 303 of process 300 may comprise authentication of identifier 160. Server 130 may, for example, compare a received identifier 160 with an identifier database 152 of permissible identifiers stored on memory device 150. As discussed above, identifier 160 may include information about the toy 110 with which it is associated. Server 130 may confirm that the identifier 160 is a valid identifier (e.g., that the identifier exists within identifier database 152 of valid identifiers). Server 130 may further identify the app or other software associated with the identifier 160. Server 130 may also confirm that identifier 160 is valid for use on the device 120 that transmitted it. That is, server 130 may determine whether or not identifier 160 is restricted (as discussed in further detail below). Upon determination that identifier 160 is a valid identifier and is valid for use on the computing device from which it was sent, server 130 may then authorize a software download in an operation 304.

Thus, server 130 may receive unique identifier 160 and associate it with a specific software application for download. For example, an identifier 160 associated with a toy 110, where the toy is an action figure, may identify a software application for download associated with the action figure. In another example, an identifier 160 associated with a toy 110, where the toy is a teddy bear, may identify a software application for download associated with teddy bears. In some implementations, an identified software application may have a specific relationship with toy 110 (e.g., the software application may feature a digital or virtual version of the toy itself). In some implementations, the digital version of the toy may be controllable or useable by a user of the software application. In some implementations, an identified software application may have a generic relationship with toy 110, e.g., the software application may feature characters similar to or related to toy 110. In some implementations, an identified software application may have a plurality of versions, one or more of which is associated with a toy 110. In some implementations, an identified software application may be associated with toys sharing a same class or type with a toy 110. Non-limiting examples of toy classes or types include whether the toy is from a particular series, franchise, or storyline, whether the toy is a vehicle, action figure, etc., whether the toy is a wizard, warrior, thief, etc., whether the toy has certain powers, etc. Any other characteristics may be used to define toy classes or types. In some implementations, identified software may include add-ons, boosters, or other additional content for previously acquired application. For example, software identified by a race car may permit a user to use a digital version of the race car inside of a previously purchased racing game. In some implementations, unique identifier 160 may be associated with multiple applications or software and a user may select one or more that they wish to download.

Operation 304 of process 300 may comprise authorization of a software download. Software download authorization permits a user of computing device 120 to download the software application identified or selected during authentication operation 303.

Operation 305 of process 300 may comprise download of the identified software application to computing device 120. The identified application may be downloaded to computing device 120 via any available method, including, but not limited to, cellular connections, Wi-Fi connections, LAN connections, and others. After downloading, computing device 120 may launch or run the identified application and confirm to server 130 that the downloaded software has been downloaded and installed properly. After software download, usage of the software may not require toy 110. That is, toy 110 may be necessary to authorize the software download, but may not be necessary for software use.

Operation 306 of process 300 may comprise the restriction of unique identifier 160. For example, server 130 may update identifier database 152 with information that indicates that unique identifier 160 has been used. For example, server 130 may update identifier database 152 with information about the computing device 120 that downloaded software associated with identifier 160. Thus, server 130 may prevent any device other than computing device 120 from downloading the software. In some implementations, server 130 may update identifier database 152 with information about the user or user account that downloaded software associated with identifier 160 and prevent any other users or user accounts from downloading the software. In some implementations, server 130 may be further configured to deauthorize the software downloaded to computing device 120 to permit download to a second, different device. In some implementations, server 130 may permit multiple downloads of software associated with identifier 160, and may update the database after each download. In some implementations, server 130 may authorize two or more computing devices 120 for software download. In some implementations, the number of computing devices 120 authorized for software download may be limited in number. In some implementations, server 130 may permit computing device 120 to download the software multiple times, for example, if the downloaded software becomes corrupted or is deleted, or if a new version or update is available.

Operation 307 of process 300 may comprise updating the identified software. In some implementations, computing device 120 may regularly communicate with server 130, either by transmitting a query or receiving a notification, or both, to ascertain the status of downloaded software on computing device 120. If a version of the software stored on server 130 is an updated version, server 130 may authorize downloads of software updates to computing device 120, which may be associated with the identified software in identifier database 152.

Thus, according to the above system and processing operations, a customer may purchase toy 110. The customer may then unpackage toy 110 to access the unique identifier 160. As discussed above, toy 110 may be packaged so as to prevent a non-purchaser from reading unique identifier 160. The customer may read the identifier 160 with their computing device 120 and download the associated software from server 130. Toy 110 may therefore authorize or control access to software.

FIG. 4 is an exemplary depiction of a system 400 for using a physical object to control access to software, according to an implementation of the invention. In some implementations, system 400 may include a toy 410, a computing device 120, a server 130 and/or other components.

According to an aspect of the invention, toy 410 may comprise at least one processor 450, a memory device 460, a communications interface 470, and/or other components (e.g., an internal power source). Memory device 460 may comprise a non-volatile memory device, such as an SD card, for example. Communications interface 470 may comprise any device to facilitate data transfer with a computing device. For example, communications interface 470 may include a data port or an antenna configured for communication with a computing device, such as via RFID, Bluetooth, and/or NFC technologies. Processor 450 may be programmed with software instructions to access memory device 460 and communications interface 470.

Memory device 460 may be connected to communications interface 470, such that processor 450 may facilitate transfer of data from memory device 460 to computing device 120. Such data transfer may occur through wired transfer, e.g. via a USB port, and/or via wireless transfer, e.g. via a Bluetooth, RFID, Wi-Fi, or NFC connection. In some implementations, toy 410 may exclude processor 450 and may permit access to data stored on memory device 460 without the intervention of such processor. In some implementations, toy 410 may be configured to permit data transfer to mobile device 120 without the need for an internal source of power.

Memory device 460 may be configured to store a software application. Thus, computing device 120 may establish a data transfer connection with memory device 460 of toy 410 to transfer a software application from memory device 460 of toy 410 to computing device 120.

Toy 410 may include unique identifier 160. As discussed above, identifier 160 may be a visual identifier and/or an electronic identifier. In implementations including an electronic identifier, identifier 160 may be stored on memory device 460. In some implementations, identifier 160 may be included within software stored on memory device 460. Unique identifier 160 may uniquely identify toy 410 and/or the software applications stored on toy 410.

In some implementations, toy 410 may be packaged to prevent access to unique identifier 160 and memory device 460 to someone that has not purchased toy 110. For example, a visual identifier may be hidden by toy packaging or by an adhesive label covering the identifier. Communications interface 470 may be covered by packaging and/or may be electromagnetically shielded by packaging components to prevent a non-purchaser from reading the identifier 160 through the packaging without making a purchase. In some implementations, toy 410 may include an identifier 160 that includes both an electronic portion readable by electronic means and a visual portion, for example, a number sequence for authenticating the electronic portion.

As illustrated in FIG. 4, computing device 120 and server 130 may each be substantially similar to that described with respect to FIG. 1.

FIG. 5 illustrates an exemplary process 500 of controlling access to software with a physical object, according to an implementation of the invention. The various processing operations and/or data flows depicted in FIG. 5 are described in greater detail herein. The described operations may be accomplished using some or all of the system components described in detail above and, in some implementations, various operations may be performed in different sequences and various operations may be omitted. Additional operations may be performed along with some or all of the operations shown in the depicted flow diagrams. One or more operations may be performed simultaneously. Accordingly, the operations as illustrated (and described in greater detail below) are exemplary by nature and, as such, should not be viewed as limiting.

An operation 501 of process 300 may comprise establishing a communications link between computing device 120 and communications interface 470 of toy 410. The communications link may be facilitated by processor 122 of computing device 120 and/or processor 450 of toy 410. The communications link may be established to permit the transfer of data from memory device 460 of toy 410 to a storage device 124 of computing device 120.

An operation 502 of process 500 may comprise downloading a software application from memory device 460 of toy 410 to storage device 124 of computing device 120. Software may include applications for running on computing device 120, for example, a game, video, story and/or other application associated with toy 410. Downloaded software may have a direct or indirect relationship with toy 410.

An operation 503 of process 500 may comprise reading unique identifier 160 by computing device 120. The reading of unique identifier 160 may be performed by transferring unique identifier 160 from memory 460 of toy 410 to storage device 124 of computing device 120. In implementations wherein identifier 160 is a visual identifier, computing device 120 may receive the identifier 160 via input device 126. In some implementations, a user of computing device 120 may enter the characters of an identifier 160 into computing device 120 via a user interface. In some implementations, downloaded software application may include unique identifier 160, in which case unique identifier 160 may be read from the downloaded software.

Operation 504 of process 500 may comprise transmitting unique identifier 160 to server 130. Computing device 120 may be used to transmit identifier 160 to server 130 for verification. Computing device 120 may transmit the identifier via any communication means available. In computing devices that include cellular antennas, identifier 160 may be transmitted via a cellular network. In some implementations, computing device 120 may transmit identifier 160 over the internet, for example via a Wi-Fi or LAN connection. Computing device 120 may further transmit information that uniquely identifies the computing device 120. In some implementations, computing device 120 may require connection to another device, e.g. a laptop, to establish a connection with server 130 and transmit identifier 160.

Operation 505 of process 500 may comprise authentication of identifier 160. Server 130 may compare a received identifier 160 with an identifier database 152 of permissible identifiers stored on memory device 150. Identifier 160 may include information about toy 410 and/or the software application with which it is associated. Server 130 may confirm that the identifier 160 is a valid identifier, e.g., that the identifier code exists within identifier database 152 of valid identifiers. Server 130 may further identify the app or other software associated with the identifier 160. Server 130 may also confirm that identifier 160 is valid for use on the computing device 120 that transmitted it. That is, server 130 may determine whether or not identifier 160 is restricted (as discussed in further detail below.) Upon determination that identifier 160 is a valid identifier and is valid for use on the computing device from which it was sent, server 130 may then authorize a software key download at operation 506. The software key may be necessary to activate the application downloaded from toy 410 to computing device 120.

Operation 505 of process 500 may comprise downloading the authorized software key to computing device 120. The authorized software key may be downloaded to computing device 120 via any available method, including, but not limited to, cellular connections, Wi-Fi connections, LAN connections, and others. After downloading, computing device 120 may launch or run the identified software or application and confirm to server 130 that the downloaded software has been properly authorized. After software key download, usage of the software application on computing device 420 may no longer require toy 410.

Operation 507 of process 500 may comprise the restriction of unique identifier 160. Server 130 may update identifier database 152 with information that unique identifier 160 has been used, and that further downloads should be restricted. For example, server 130 may update identifier database 152 with information about computing device 120, which downloaded software associated with identifier 160. Thus, server 130 may prevent any device other than computing device 120 from downloading the software key. In some implementations, server 130 may update identifier database 152 with information about the user or user account that downloaded software associated with identifier 160 and prevent any other users or user accounts from downloading the software. In some implementations, server 130 may be further configured to deauthorize the software key downloaded to computing device 120 to permit download to a second, different device. In some implementations, server 130 may permit multiple downloads of a software key associated with identifier 160, and may update the database after each download. In some implementations, server 130 may authorize two or more computing devices 120 for software key download. In some implementations, the number of computing devices 120 authorized for software key download may be limited in number. In some implementations, server 130 may permit computing device 120 to download the software key multiple times, for example, if the downloaded software key becomes corrupted or is deleted.

In some implementations, operation 508 of process 500 may comprise de-authorizing toy 410 from permitting further downloads of the software. Software download and authorization may occur simultaneously on computing device 120. In some implementations, an additional step may cause computing device 120 to notify processor 450 of toy 410 to update memory device 460 so as to prevent further attempts to download the associated software. In some implementations, the software may be deleted from toy 410. In some implementations, server 130 may be further configured to cause computing device 120 to reauthorize toy 410 for future downloads. Such reauthorization may occur, for example, if a user has lost or deleted the software from computing device 120.

Operation 509 of process 500 may comprise updating the identified software. In some implementations, computing device 120 may regularly communicate with server 130, either by transmitting a query or receiving a notification, or both, to ascertain the status of downloaded software on computing device 120. For example, a provider of toy 410 and/or an administrator associated with the software application stored on toy 410 (when toy 410 is manufactured) may make software application updates available via server 130. In other words, a user may download the software application from toy 410, and then receive subsequent software application updates from server 130.

Thus, according to the above system and processing operations, a customer may purchase toy 410. The customer may then unpackage toy 410 to access a software application stored on memory 460 of toy 410 with computing device 120. As discussed above, toy 410 may be packaged so as to prevent a non-purchaser from downloading the software. The customer may further use computing device 120 to read the identifier 160 and download the associated software key from server 130. Toy 410 may therefore authorize or control access to software.

FIG. 6 illustrates an exemplary system 600 for using a physical object to control access to software, according to an implementation of the invention. System 600 may comprise a toy 610 and a computing device 120, and/or other components. In this implementation, a software application may be downloaded from toy 610 to computing device 120 without the need for a software (activation) key from a server. As shown, toy 610 may include at least one processor 450, a memory device 460 and a communications interface 470 similar to toy 410 of FIG. 4. Computing device 120 may be substantially similar to that described with respect to FIG. 1.

FIG. 7 illustrates an exemplary process 700 of controlling access to software with a physical object according to an implementation of the invention. The various processing operations and/or data flows depicted in FIG. 7 are described in greater detail herein. The described operations may be accomplished using some or all of the system components described in detail above and, in some implementations, various operations may be performed in different sequences and various operations may be omitted. Additional operations may be performed along with some or all of the operations shown in the depicted flow diagrams. One or more operations may be performed simultaneously. Accordingly, the operations as illustrated (and described in greater detail below) are exemplary by nature and, as such, should not be viewed as limiting.

An operation 701 of process 700 may comprise establishing a communications link between computing device 120 and communications interface 470. The communications link may be facilitated by processor 122 of computing device 120 and processor 450 of toy 410. The communications link may be established to permit the transfer of data from memory device 460 to a storage device 124 of computing device 120.

An operation 702 of process 700 may comprise downloading software from memory device 460 of toy 610 to storage device 124 of computing device 120. The software may comprise an application for running on computing device 120 such as, for example, a game, video, story and/or other application associated with toy 610. Downloaded software may have a direct or indirect relationship with toy 610. As noted above, a downloaded software application may be immediately launched upon download without requiring server authorization.

An operation 703 of process 700 may comprise restricting toy 610 from permitting further downloads to other computing devices. Once the software application has completed the download to computing device 120, toy 610 may be restricted from permitting future downloads to additional devices. In some implementations, toy 610 may prevent all future downloads. In some implementations, the software application may be deleted from toy 610. In some implementations, toy 610 may register an identity of computing device 120 and prevent future downloads to any other device. In some implementations, toy 610 may be reauthorized for future downloads through an interaction between computing device 120 and toy 610 that includes deleting the software.

In some implementations, process 700 may end after step 703. That is, the software application download from toy 610 to computing device 120 may be the final step in process 700.

In some implementations, process 700 may optionally include additional operations 704-709 associated with the use of a unique identifier to obtain software application updates from a server (such as, for example, server 130 depicted in FIGS. 1 and 4).

In an operation 704 of process 700, a unique identifier 160 may be read by computing device 120. Reading unique identifier 160 may be performed by transferring the unique identifier 160 from memory 460 of toy 610 to storage device 124 of computing device 120. In implementations wherein identifier 160 is a visual identifier, computing device 120 may receive the identifier 160 via input device 126. In some implementations, a user of computing device 120 may enter the characters of an identifier 160 into computing device 120 via a user interface. In some implementations, the downloaded software application may include unique identifier 160, and the step of reading unique identifier 160 may include extracting it from the downloaded software application.

Operation 705 of process 700 may comprise transmitting unique identifier 160 to server 130. Computing device 120 may be used to transmit identifier 160 to server 130 for verification. Computing device 120 may transmit the identifier via any communication means available. In computing devices that include cellular antennas, identifier 160 may be transmitted via a cellular network. In some implementations, computing device 120 may transmit identifier 160 over the internet, for example via a Wi-Fi or LAN connection. Computing device 120 may further transmit information that uniquely identifies the computing device 120. In some implementations, computing device 120 may require connection to another device, e.g. a laptop, to establish a connection with server 130 and transmit identifier 160.

Operation 706 of process 700 may comprise authentication of identifier 160. Server 130 may compare a received identifier 160 with an identifier database 152 of permissible identifiers stored on memory device 150. Identifier 160 may include information about toy 610 and/or software with which it is associated. Server 130 may confirm that the identifier 160 is a valid identifier, e.g., that the identifier code exists within identifier database 152 of valid identifiers. Server 130 may further identify the app or other software associated with the identifier 160. Server 130 may also confirm that identifier 160 is valid for use on the device 120 that transmitted it. That is, server 130 may determine whether or not identifier 160 is restricted (as discussed below.) Upon determination that identifier 160 is a valid identifier and is valid for use on the computing device from which it was sent, server 130 may then authorize the download of software updates to computing device 120 at step 707.

Operation 708 of process 700 may comprise the restriction of unique identifier 160. Server 130 may update identifier database 152 with information that unique identifier 160 has been used, and restrict further software updates based on that unique identifier 160. For example, server 130 may update identifier database 152 with information about computing device 120, which downloaded software associated with identifier 160. Thus, server 130 may prevent any device other than computing device 120 from downloading software updates based on unique identifier 160. In some implementations, server 130 may update identifier database 152 with information about the user or user account that downloaded software associated with identifier 160 and prevent any other users or user accounts from downloading the software. In some implementations, server 130 may be further configured to reauthorize software updates to a different computing device through a process which may include deauthorizing computing device 120 from software updates and deletion of the software from computing device 120. In some implementations, server 130 may downloads of software updates associated with identifier 160 to multiple devices, and may update the database after device is authorized. The number of multiple devices to which updates are permitted may be limited. In some implementations, once computing device 120 has been authorized for software updates, further provision of the unique identifier 160 is unnecessary. In alternative implementations, computing device 120 may be required to retrieve unique identifier 160 from toy 610 to authorize each software update.

Operation 709 of process 700 may comprise downloading software updates to computing device 120. Software updates may be downloaded to computing device 120 via any available method, including, but not limited to, cellular connections, Wi-Fi connections, LAN connections, and others. In some implementations, computing device 120 may regularly communicate with server 130, either by transmitting a query or receiving a notification, or both, to ascertain the status of downloaded software on computing device 120. If a version of the software stored on server 130 is an updated version, server 130 may authorize downloads of software updates to computing device 120, which may be associated with the identified software in identifier database 152.

Thus, according to the above system and processing operations, a customer may purchase toy 610. The customer may then unpackage toy 610 to access software stored on memory 460 with computing device 120. As discussed above, toy 610 may be packaged so as to prevent a non-purchaser from downloading the software. The customer may then operate the software on computing device 120. The customer may further use computing device 120 to read identifier 160 and download software updates from server 130. Toy 610, may therefore authorize or control access to software.

Other implementations, uses and advantages of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. The specification should be considered exemplary only, and the scope of the invention is accordingly intended to be limited only by the following claims. 

What is claimed is:
 1. A computer-implemented method of providing access to a stand-alone executable video game application stored on a host computer system, the method being implemented in the host computer system having one or more physical processors programmed with computer program instructions that, when executed by the one or more physical processors, cause the host computer system to perform the method, the method comprising: receiving, at the host computer system, from a computing device, a unique identifier read from a physical object; authenticating, by the host computer system, the unique identifier, wherein said authenticating includes determining that the unique identifier is not restricted; authorizing, by the host computer system, a download of all of the stand-alone executable video game application to the computing device responsive to authentication of the unique identifier; transmitting, by the host computer system, the stand-alone executable software application to the computing device such that a user of the computing device has access to the stand-alone executable video game application via the computing device; and restricting, by the host computer system, further downloads of the stand-alone executable video game application for the unique identifier.
 2. The method of claim 1, wherein the computing device is a mobile device.
 3. The method of claim 1, wherein the physical object comprises a toy.
 4. The method of claim 1, wherein the unique identifier read from the physical object comprises a printed identifier on the physical object.
 5. The method of claim 4, wherein the printed identifier comprises at least one of a barcode, QR code, watermark, or alphanumeric code.
 6. The method of claim 1, wherein the unique identifier read from the physical object comprises an electronic identifier.
 7. The method of claim 6, wherein the electronic identifier is stored in an RFID tag of the physical object.
 8. The method of claim 1, wherein the video game application includes a virtual representation of the physical object.
 9. The method of claim 8, wherein the virtual representation of the physical object is controllable by a player of the video game.
 10. The method of claim 1, wherein restricting, by the host computer system, further downloads of the stand-alone executable video game application for the unique identifier further comprises: storing, by the host computer system, an association between the unique identifier and the computing device.
 11. A system for providing access to stand-alone executable video game application stored on a host computer system, the system comprising: a physical object, the physical object comprising a unique identifier; and a host computer system, the host computer system having one or more physical processors programmed with computer program instructions that, when executed by the one or more physical processors, cause the host computer system to: receive, from a computing device, the unique identifier read from the physical object; authenticate the unique identifier inclusive of determining that the unique identifier is not restricted; authorize a download of all of the stand-alone executable video game application to the computing device responsive to authentication of the unique identifier; transmit the stand-alone executable video game application to the computing device such that a user of the computing device has access to the stand-alone executable video game application via the computing device; and restrict further downloads of the stand-alone executable video game application for the unique identifier.
 12. The system of claim 11, wherein the computing device is a mobile device.
 13. The system of claim 11, wherein the physical object comprises a toy.
 14. The system of claim 11, wherein the unique identifier comprises a printed identifier on the physical object.
 15. The system of claim 14, wherein the printed identifier comprises at least one of a barcode, QR code, watermark, or alphanumeric code.
 16. The system of claim 11, wherein the unique identifier comprises an electronic identifier.
 17. The system of claim 16, wherein the electronic identifier is stored in an RFID tag of the physical object.
 18. The system of claim 11, wherein the video game application includes a virtual representation of the physical object.
 19. The system of claim 18, wherein the virtual representation of the physical object is controllable by a player of the video game.
 20. The system of claim 11, wherein the host computer system is caused to restrict further downloads of the stand-alone executable video game application for the unique identifier by storing an association between the unique identifier and the computing device. 