System, method and computer-readable medium for enhanced user deletion of software from a computer

ABSTRACT

A system, method and computer-readable medium are provided for deleting software from a computational device, such as a personal computer, a cell phone or a personal digital assistant. The invented method includes (a.) providing a visual representation of application icons associated with a demo center icon, each icon having a one-to-one correspondence with at least one software application; (b.) enabling a user to select an icon; and (c.) directing the at least one computational device to delete the software application associated with the selected icon from the computational device. The software application may be provided in an operational state of (1.) being incomplete and requiring additional software encoded instructions to be read into the computer in order to at least partially function; (2.) being complete and enabled to operate only within a trial period; or (3.) being complete and requiring a purchase for operation or use.

FIELD OF THE INVENTION

The present invention relates to information technology that enables thedeletion of software. The present invention more particularly relates toinformation technology systems and methods that comprise or providemethods to delete software from consumer electronics devices.

BACKGROUND OF THE INVENTION

A typical purchaser's satisfaction with a consumer electronics devicecan be significantly affected by the initial set-up experience with thatdevice. Moreover, the out-of-the-box set-up experience of a newlypurchased personal computer, digital telephone or personal digitalassistant can therefore significantly affect the brand equity of theequipment manufacturer or marketer. The purchaser of a consumer personalcomputer, or “PC”, is often faced with the task of experiencingundesired marketing and promotional experiences when doing an initialset-up of a newly purchased PC. These user experiences can lead toconsumer dissatisfaction, and can create a disincentive in the mind ofsome consumers to purchase again from a manufacturer or brand namesupplier of a PC that delivered the undesired software marketing andpromotional experience.

Many consumer electronics manufacturers and marketers derive a revenuesource from including additional software and offers for sale ofsoftware products in part or in full with the device as delivered to thepurchaser. The additional revenue may be provided by the marketers ofthe additional software, which is bundled in with the device forpromotional purposes or in an attempt to sell a software program or aservice offering. The additional software may include one or moresoftware applications, demonstration software programs, software encodedoffers for sale, and/or marketing information. Furthermore, theadditional software may be provided in whole or in part, and/or maycomprise access to an Internet service or web service.

The consumer experience in dealing with unrequested software andpromotional experiences can be particularly annoying to a devicepurchaser when the additional software is difficult to delete from thedevice, persists in disrupting the purchaser's user experience, and/orundesirably uses up memory capacity of the device.

The prior art includes U.S. Pat. No. 5,960,411 that presents a methodand system for placing a purchase order via a communications network;U.S. Pat. No. 6,496,875 discloses a software product uninstallationsystem and method; U.S. Pat. No. 7,107,366 that shows a system, method,and computer program product for uninstalling computer software; and USPatent Application Publication No. 20060282834 that presents a softwareuninstallation system, method and computer program product. Each andevery other patent and patent application, including U.S. Pat. No.5,960,411; U.S. Pat. No. 6,496,875; U.S. Pat. No. 7,107,366; and USPatent Application Publication No. 20060282834, mentioned in thisdisclosure is incorporated in its entirety and for all purposes in thepresent patent application and this disclosure.

There is therefore a long felt need to enable a computational deviceuser to easily remove or delete software from a computational device.

SUMMARY OF THE INVENTION

Towards this object and other objects that will be made obvious in lightof this disclosure, the method of the present invention provides methodsand computational systems that include or provide a capability to deletesoftware from a computational device, such as a PC, a mobile digitaltelephone or a personal digital assistant.

The term “software application” is defined herein to include softwareprograms, software application programs, and software enabling one ormore communications network-enabled services. The term “communicationsnetwork” is defined herein to include the Internet, a computer network,an intranet, and extranet, a telephony network, a digital wirelesscommunications network, a digital wireless telephony network, and adigital electronics communications network.

Within an information technology system including or consisting of atleast one computational device, a first alternate preferred embodimentof the method of the present invention, or first method, provides acomputer implemented method for automatically deleting a previouslyloaded software application from the computational device. The firstmethod includes (a.) providing a visual representation of a plurality ofapplication icons and locally stored information in association with ademonstration center icon, where each icon and locally storedinformation has a one-to-one correspondence with at least one softwareapplication; (b.) enabling a user to select at least one icon; and (c.)directing the computational device to delete the software applicationsassociated with selected icons from the computational device.

The software application may be initially presented to the user in anoperational state selected from the group of states consisting of (1.)being incomplete and requiring additional software encoded instructionsto be read into the device in order to at least partially function; (2.)being complete and enabled to operate only within a trial period; and(3.) being complete and requiring a purchase for operation or use.

The first method may include a selection of the one or more icons byusing a pointing device; by clicking a button; by clicking a mousebutton; by clicking a mouse button when a cursor is positioned over apredefined area of the displayed information; by depressing a key on akey pad; and/or by selection of a visually displayed indication.

A still alternate preferred embodiment of the method of the presentinvention provides a computational apparatus having a display means, aselection means and a control means. The display means provides a visualrepresentation of application icons, each icon having a one-to-onecorrespondence with at least one software application or information.The selection means enables a user to select at least one icon. Thecontrol means directs the computer to delete software applicationsassociated with the selected icon from the computer.

A yet alternate preferred embodiment of the method of the presentinvention provides a computer-readable media comprising software-encodedinstructions that directs an information technology system to practiceone or more aspects of one or more alternate preferred embodiments ofthe method of the present invention.

The foregoing and other objects, features and advantages will beapparent from the following description of the preferred embodiment ofthe invention as illustrated in the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

These, and further features of the invention, may be better understoodwith reference to the accompanying specification and drawings depictingthe preferred embodiment, in which:

FIG. 1 is schematic diagram of a computational device;

FIG. 2 is a schematic of a communications network comprising thecomputational device of FIG. 1;

FIG. 3 is a process diagram of a process that enables an implementationof the first method by means of-the computational device of FIG. 1;

FIG. 4 is a schematic diagram of a demonstration center registry of thecomputational device of FIG. 1 in accordance with the first method;

FIG. 5 is an illustration of a demo room icon displaying information of,or associated with the demonstration center registry of FIG. 4 aspresented on the display screen of the computational device of FIG. 1;

FIG. 6 is a software architecture of the computational device 2 of FIG.1;

FIG. 7 is a flowchart of an application of the first method and a singleicon of the demo room icon of FIG. 5;

FIG. 8 is a flowchart of an application of the first method and thesingle icon of the demo room icon of FIG. 5 to delete one softwareapplication of FIGS. 1 and 6;

FIG. 9 is a flowchart of the first method applied by means of the demoroom icon of FIG. 5 to delete one or more software applications of FIGS.1 and 6; and

FIG. 10 is a flowchart of the first method applied to fetch additionalsoftware code to complete, enhance or enable a software application ofFIGS. 1 and 6, and to apply a time limitation of use to the execution ofa software application of FIGS. 1 and 6.

DETAILED DESCRIPTION OF A PREFERRED EMBODIMENT

In describing the preferred embodiments, certain terminology will beutilized for the sake of clarity. Such terminology is intended toencompass the recited embodiment, as well as all technical equivalents,which operate in a similar manner for a similar purpose to achieve asimilar result.

Referring now generally to the Figures, and particularly to FIG. 1, FIG.1 is schematic diagram of a computational device 2. A host processor 4includes a central processing unit 6, an internal communications bus 8,a main system memory 10, an auxiliary memory 11, a network interface 12,a video device interface 14, an input device interface 16, and anelectronic media reader 18. The central processing unit 6, hereafter“CPU” 6 may be or comprise a PENTIUM™ microprocessor or other suitablelogic-processing unit known in the art. The internal communications bus8 bi-directionally communicatively couples the CPU 6, the main systemmemory 10, the network interface 12, the video device interface 14, theinput device interface 16, and the electronic media reader 18. The mainsystem memory 10, hereafter “main memory” 10, and the auxiliary memory11 may store both data structures and executable software programs, andmake the stored data structures and software executable programsavailable to the central processing unit 6 via the internalcommunications bus 8.

The main memory 10 or the auxiliary memory 11 may be or comprise anelectronic solid state memory, random access memory, programmablememory, field programmable memory, a floppy disk, a flexible disk, harddisk, magnetic tape, or any suitable other magnetic medium known in theart, a CD-ROM, other suitable optical medium known in the art, a PROM,and EPROM, a FLASH-EPROM, any other suitable memory chip or cartridgeknown in the art, or any other suitable medium known in the art fromwhich a computer can read machine executable instructions.

Referring now generally to the Figures and particularly to FIGS. 1 and2, the network interface 12 is bi-directionally communicatively coupledwith an electronics communications network 20 (of FIG. 2) and enablesthe communication of software code and message packets to and from thecomputational device 2 and a plurality of network computers 22 of thecommunications network 20.

In a preferred embodiment of the method of the present invention, thenetwork 20 is the Internet, and more specifically, the World Wide Webportion thereof; The various computational devices 2 computers 22thereby support the protocols for FTP, and HTTP, and provide for thedisplay and rendering of HTML, VRML, or other text or interfacedescription languages. Each computational device 20 and networkcomputers 22 has an IP address that specifies its location on thecommunications network 2, thereby allowing such computers 2, 22 tocommunicate with each other in a conventional manner. Software files,such as executables, binaries, and text files may be identified withinthe various computers by universal resource locators (URLs) as known inthe art.

The video device interface 14 is bi-directionally communicativelycoupled with a video display device 24 and enables the visualpresentation of information to be visually presented to a user via avideo screen 26 of the video display device 24.

The input device interface 16 is communicatively coupled with an inputdevice 28 and enables the user to input alphanumeric messages, commandsand requests and otherwise interact with the host processor 20. Theinput device 28 may further comprise a point and click device 29, e.g.,a computer mouse, an optical mouse, or a touch pad. The point and clickdevice 29 is configured to enable a user to position a cursor 30 (pleasesee FIG. 5) within the display screen 26, wherein the cursor 30 has avisible representation on the display screen 26. The computationalsystem 2 enables the user to select and execute applications by placingthe cursor 30, as positioned within a visible image of the displaydevice 26 by the point and click device 29 and/or the input device 28,and then directing the computational device to execute a command orprogram associated with an icon or text image presented on the displayscreen 26 by manipulation of buttons of the point and click device 29and/or one or more keys of the input device 28. The input device 28 maybe or comprise a key pad have keys, wherein software selection anddeletion commands to the CPU 6 may be initiated and communicated bydepressing one or more keys.

The electronic media reader 18 is configured to read machine-executableinstructions from a computer-readable medium 31, wherein themachine-executable instructions direct the host processor to perform oneor more of the steps of the method of the present invention.

In certain alternate preferred embodiments of the method of the presentinvention the computational device I and one or more of the networkcomputers 22 may be, comprise, or be comprised within, a cellulartelephone, a personal digital assistant or a computer. For example, thecomputational system may be selected from a group of electronic devicesincluding (1.) a Nokia Model E61™ cellular telephone marketed by NokiaCorporation of Espoo Finland; (2.) a BLACKBERRY™ wireless personaldigital assistant marketed by Research-in-Motion of Waterloo, Ontario,Canada; (3.) a VAIO FS8900™ notebook computer marketed by SonyCorporation of America, of New York City, N.Y.; and (4.) POWERBOOK G4™personal computer marketed by Apple Computer, Inc., of Cupertino, Calif.The bi-directional communicative coupling between the communicationsnetwork 20 and the computational device may be accomplished by radiofrequency transmissions, wherein the network interface device 12 is awireless module and includes an antenna.

Referring now generally to the Figures, and particularly to FIG. 2, FIG.2 is a schematic of a communications network 20 comprising thecomputational device 2 of FIG. 1 and a plurality of network computers22. The network interface device 12 of computational device 2 may be awireless interface device or module and may be configure tobi-directionally communicatively couple the computational network 2 witha wireless network transceiver 32 of the communications network 20. Thecommunications network 2 may further comprise a telephony network 34that includes a wireless telephony transceiver 36 configured tobi-directionally communicatively couple the computational device 2 withthe telephony network 34. The communications network 2 may furthercomprise some or all of the Internet 36.

Referring now, generally to the Figures, and particularly to FIG. 3,FIG. 3 is a process diagram of the first method that may be implementedby means of the computational device of FIG. 1. In step 3.0 thecomputational device is powered up and its operating system isbootstrapped into enabling the processing of information and executionof one or more software applications. The computational device 2determines in step 3.2 whether,the computational device 2 shall load anapplication-software 38A-38X. When the computational device 2 determinesin step 3.2 to not load an application software 38A-38X, thecomputational device proceeds onto step 3.4 and therefrom may proceed toshut down or to perform alternate operations. Alternatively, when thecomputational device moves on from step 3.2 to step 3.6, a softwareapplications 38A-38X is loaded into the main memory 10, and/or fully orpartially stored in the auxiliary memory 11 of the computational device2 via the media reader 16 and/or the network interface 12. In step 3.8the computational device 2 determines whether information the softwareapplication 38A-38X loaded into the computational device 2 in the mostrecently initiated execution of step 3.6 shall be stored into ademonstration center registry 40, hereafter “demo registry” 40. In step3.10 the computational device 2 stores information related to theapplication software 38A-38X loaded into the computational device 2 inthe most recently initiated execution of step 3.6. In step 3.12 thecomputational device 2 determines whether there is at least oneadditional application software 38A-38X to be considered for loadinginto the computational device 2. When the computational device 2determines in step 3.12 to not examine an application software 38A-38Xfor uploading or downloading, the computational device proceeds ontostep 3.4 and may proceed therefrom to shut down or to perform alternateoperations. Alternatively, when the computational device 2 determines instep 3.12 to examine an application software 38A-38X for uploading ordownloading, the computational device proceeds on from step 3.12 to step3.2.

It is understood that one or more software applications 38A-38X may bemade available by the computational system 2 in an operational state of(1.) being incomplete and requiring additional software encodedinstructions to be read into the computational device 2 in order tofully or at least partially function; (2.) being complete and enabled tooperate only within a trial time period; and (3.) being complete andrequiring a purchase for operation or use.

Referring now generally to the Figures, and particularly to FIG. 4, FIG.4 is a schematic diagram of the demo registry 40 containing informationin application records 42A-42X related to the software applications 38Athrough 38X. Each application record 42A-42X contains three data fieldsthat contain information to a same software application 38A-38X, thesethree application record fields being an ID FIELD 40.A, an ICON FIELD40.B and a MEMORY LOCATION FIELD 40.C. For example, a first applicationrecord 42A contains an identifier of a first software application 38A inits ID FIELD 40.A; its ICON FIELD 40.B contains information that enablesthe computational device 2 to instantiate a visual presentation of anicon associated with the first software application 38A; and its MEMORYLOCATION FIELD 40.C contains information that enables the computationaldevice 2 to locate and erase or delete the memory locations of thecomputational device 2, e.g., in the main memory 10 or the auxiliarymemory 11, wherein some or all the first software application 38A isstored. It is understood that deletion or erasure of a softwareapplication may be made effected by merely allowing the memory locationsstoring the main memory 10 to be made available for overwrite andstorage of other information. It is further understood that some or allof the information stored in the demo registry 40 may be references orpointers to information stored elsewhere in the computational device,e.g., in the main memory 10 or the auxiliary memory 11, that whenaccessed by the controller 4 or the CPU 6 enable the computationaldevice to visually display an icon associated with an applicationsoftware 38A-38X and/or delete an application software 38A-38X from thecomputational device 2. Deletion commands, and selections, of a softwareapplication 38A-38X from the computational device 2 may be may beinitiated by the user and communicated to the CPU 6 by depressing one ormore keys of a keyboard of the input device 28.

Referring now generally to the Figures, and particularly to FIG. 5, FIG.5 is an illustration of visual representations of information of orassociated with the demo registry 40 of FIG. 4 as presented on thedisplay screen 26 of the computational device 2. A demo room icon 44includes a plurality of application descriptors 46A-46X that eachdisplay (1.) text images information in TEXT FIELD 44A; (2.) iconinformation contained in an ICON FIELD 44B; (3.) descriptive informationconcerning the instant software application 38A-38X in an INFO FIELD44C; (4.) an OPEN COMMAND FIELD 44D; and a DELETE COMMAND FIELD 44E.There is a one-to-one unique correspondence between each applicationdescriptors 46A-46X and an individual application record 42A-42Xregistered in the demo registry 40. For example, application descriptor46A is generated and/or derived by the computational device 2 frominformation contained in the individual application record 42A;application descriptor 46X is generated and/or derived by thecomputational device 2 from information contained in the individualapplication record 42X.

One or more TEXT FIELDS 44A and the ICON FIELDS 44B may contain (1.) avisually displayed indication of a software application 38A-38X; (2.) avisual image NAME1-NAME8 or ICON1-ICON8 identifying at least onesoftware application associated with at least one image NAME1-NAME8 orICON1-ICON8 identifying a software application 38A-38X; and/or (3.) avisual image NAME1-NAME8 or ICON1-ICON8 comprising text identifying atleast one software application associated with the image NAME1-NAME8 orICON1-ICON8 comprising the text.

The user may direct the computational device 2 to initiate deletion orerasure of a software application 38A-38X identified by an applicationname image NAME1-NAME8 or an icon image ICON1-ICON8 by pointing to andselecting the DELETE COMMAND FIELD 44E of the same applicationdescriptor 46A-46X. Alternatively, the user may direct the computationaldevice 2 to initiate execution of a software application 38A-38Xidentified by an application name image NAME1-NAME8 or an icon imageICON1-ICON8 by pointing to and selecting the OPEN COMMAND FIELD 44D ofthe same application descriptor 46A-46X. Still additionally oralternatively, the user may direct the computational device 2 toinformation describing or related to a software application 38A-38Xidentified by an application name image NAME1-NAME8 or an icon imageICON1-ICON8 by pointing to and selecting the INFO FIELD 44C of the sameapplication descriptor 46A-46X, wherein the displayed informationreferenced by the selected INFO FIELD 44C content INFO1-INFO8 iscontained in or referenced by the demo registry as further discussedherein.

A delete button icon 48 is also presented within the demo room icon 44,whereby a plurality of software applications 38A-38X may be deleted orerased from the computational device 2 by first selecting each of theplurality application descriptor 46A-46X to be deleted by the user'smanipulation of the cursor 30, and then point to and selecting thedelete button icon, whereupon the computational device 2 is directed bythe user to erase or delete each software applications 38A-38Xidentified by information contained in either the text imagesinformation in a TEXT FIELD 44A, or icon information contained in anICON FIELD 44B of the selected application descriptor 46A-46X, thepointing and selecting and positioning of the cursor 30 may beaccomplished by means of the input device 28 and/or the point and clickdevice 29.

A close button icon 49 is also presented within the demo room icon 44,whereby the demo icon may be removed from the display screen 26 whenselected by positioning of the cursor 30 and manipulation of the pointand click device 29.

Alternatively or additionally, a single application icon 50 may bevisually displayed as derived by the computational system 2 from anapplication record 42A-42X, whereby a specific software application38A-38X is uniquely identified by the single application icon 50. Theuser may select the single application icon 50 and thereby direct thecomputational device 2 to visually display a drop down menu 52, by meansthe user may direct the computational device 2 to delete, execute, orprovide information about the associated software application 38A-38X.

As an exemplary application of the demo room 44, a first applicationdescriptor 46A may be derived from information provide within orassociated with the first software application 38A. User selection ofthe DELETE COMMAND FIELD 44E of the first application descriptor 46A maydirect the computational device 2 to delete or erase the first softwareapplication 38A. Alternatively or additionally, user selection of theapplication name image NAME1 of the TEXT FIELD 44A and/or the icon imageICON1 of the ICON FIELD 44B of the first application descriptor 46Afollowed by a selection of the delete command button 48 may direct thecomputational device 2 to delete or erase the first software application38A. Furthermore, user selection of the INFO1 text of the INFO FIELD 44Cof the first application descriptor 46A may direct the computationaldevice 2 to display information derived from a first header HDR1 of thesoftware application 38A, as discussed below, to be displayed via thevideo display device 28. In addition, user selection of the OPEN APP1image of the OPEN COMMAND FIELD 44D of the first application descriptor46A may direct the computer to initiate execution, or attempt toexecute, the first software application 38A.

As an additional exemplary application of the demo room 44, a lastapplication descriptor 46X may be derived from information providewithin or associated with the last software application 38X. Userselection of the DELETE COMMAND FIELD 44E of the last applicationdescriptor 46X may direct the computational device 2 to delete or erasethe last software application 38X. Alternatively or additionally, userselection of the application name image NAME8 of TEXT FIELD 44A and/orthe icon image ICON8 of the ICON FIELD 44B the last applicationdescriptor 46X followed by a selection of the delete command button 48may direct the computational device 2 to delete or erase the lastsoftware application 38X. Furthermore, user selection of the INFO8 textof the INFO FIELD 44C of the last application descriptor 46X may directthe computational device 2 to display information derived from a lastheader HDRX of the last software application 38X, as discussed below, tobe displayed via the video display device 28. In addition, userselection of the OPEN APP8 image of the OPEN COMMAND FIELD 44D of thelast application descriptor 46X may direct the computer to initiateexecution, or attempt to execute, the last software application 38X.

It is understood that one or more software applications 38A-38X mayconsist mostly, primarily or entirely of certain information rather thanexecutable software code, wherein a access to the certain informationmay be desirable to the user and/or of economic, financial or personalvalue.

Referring now generally to the FIG. 6, and particularly to FIG. 6, FIG.6 is a software architecture of the computational device 2 of FIG. 1. Anaddressable memory 54 and a processor core 56 reside within thecomputational device. The addressable memory 54 may comprise the mainmemory 10, the auxiliary memory 11, cache memory of the CPU 6, and otheraddressable memory locations of the computational device 2. Theprocessor core 56 of the comprises one or more computational processors,e.g., the CPU 6. The computational device executes a conventionaloperating system 56; such as Windows NT.R™. from Microsoft Corp., or oneof various UNIX-based operating systems, such as Sun Microsystems'Solaris 2.5. A demo room logic software application 60 provides thedirection and instructions to enable the computational device to executeor support the execution of the aspects of the first method as disclosedherein and particularly as presented in FIGS. 3 and 7 through 10. Aplurality of communications interface drivers 62 enables the hostprocessor 4 to direct the network interface device 12, the video displayinterface device 14 and the input device interface 16, media reader 18to (1.) upload or download software applications 38A-38X in whole or inpart from the communications network 2, the computer-readable medium 31and/or the input device 28; (2.) accept information from input device 28and the computer-readable medium 31; and (3.) display information viathe video display device 24.

One or more software applications 38A-38X may contain a headerHDR1-HDRX, application software code APP1-APPX, and/or icon informationICON1-ICONX. A first header HDR1 of the first software application 38Amay contain a universal resource locator, or URL, of a network computer22 wherefrom elements of, information relating to, or informationapplicable by, the first software application 38A. The HDR1 may alsocontain offer-for-sale information specifying the price, terms andconditions of sale or licensing in accordance with which the firstsoftware application 38A may be licensed or purchased. The first headerHDR1 may also contain information specifying a limited time periodduring which the first application software 38A may be used at no-chargeor under temporary permission. The first header HDR1 may also oralternatively contain information displayed in the INFO1 of the firstapplication descriptor 46A, as well as information that may be stored inthe ID FIELD 40.A of the first application record 42A. A first iconinformation ICONA may contain information displayed in the firstapplication name image NAME1 and/or the first icon image ICON1 of thefirst application descriptor 46A. The first icon information ICONA alsomay contain information stored in the ICON FIELD 40.B of the firstapplication record 42A.

Referring now generally to the Figures and particularly to FIG. 7, FIG.7 is a flowchart of an application of the first method and the singleicon 50. In one exemplary application of the first method, the firsticon 50 is associated with the first application software 38A and theimage of the first icon 50 is at least partially derived frominformation stored in the ICON FIELD 40.B of the first applicationrecord 42A. In step 7.2 the single icon 50 is displayed on the displayscreen 26. In step 7.4 the computational device 2 determines whether thecursor 30 is pointing to the single icon 50, and proceeds on toalternate processes 7.6 when the cursor 50 is not determined to bepointing to or indicating a selection of the single icon 50. It isunderstood that the alternate process of step 7.6 may includeperiodically returning to step 7.2 to reexamine the cursor positionand/or accept interrupts to proceed on to step 7.8. When the cursor 30is determined in step 7.4 by the computational device 2 to be pointingto or indicating a selection of the single icon 50, the computationaldevice 2 proceeds onto step 7.10 and displays the drop down menu 52.

In step 7.10 the computational device 2 determines whether the deletefunction of the drop down menu 52 is selected by the user by means ofpositioning the cursor 30 over the delete function text of the drop downmenu 52. When the cursor 30 is determined in step 7.10 by thecomputational device 2 to be pointing to or indicating a selection ofthe delete text of the drop down menu 52, the computational device 2proceeds onto step 7.12 and initiates deletion of the first application38A from the addressable menu 54. Deletion of the first application 38Afrom the addressable menu 54 may include deleting or erasing part or allof the first application 38A from the main memory 10 and/or auxiliarymemory 11. In step 7.14 the computational device updates the demo roomregistry 40 and erases or deletes first application record 42A and thefirst application descriptor 46A of the demo room icon 44. In step 7.16the computational device 2 determines whether to proceed onto execute analternate processes of step 7.20 or to return to other operations as perstep 7.18.

Referring now generally to the Figures and particularly to FIG. 8, Fig.is a flowchart of an application of the first method and the demo roomicon 44. In step 8.2 the computational device 2 determines whether thedemo room icon 44 has been selected, and proceeds onto step 8.4 andreturns to, or initiates, other processes in when the cursor 30 is notdetermined to be pointing to or indicating a selection of the demo roomicon 44. It is understood that computational device may periodicallyreturn to step 8.2 to reexamine the cursor position and/or acceptinginterrupts to proceed on to step 8.6. In step 8.6 the demo room icon 44is generated by the demo room logic software application 60 and is atleast partly contains and/or is derived from demo registry 40. In step8.8 the computational device 2 determines whether an element 46A-46X, 48or 49 of the demo room icon 44 has been selected, and if a selection hasbeen determined, proceeds onto step 8.10 and returns to determinewhether the point and click device is communication a selection of aDELETE COMMAND FIELD 44E. When a DELETE COMMAND FIELD 44E has beendetermined to be selected in step 8.10, the computational deviceproceeds onto to step 8.12 to initiate deletion of the softwareapplication 38A-38X associated with the DELETE COMMAND FIELD 44Eselected in step 8.10. In step 8.14 the demo registry 40 is updated,wherein the computational device 2 erases or deletes both (1.) theapplication record 42A-42X associated with selected software application38A-38X of step 8.10; and (2.) and the application descriptor 46A-46X ofthe demo room icon 44 associated with selected software application38A-38X of step 8.10. Alternatively, the computational device mayproceed from step 8.10 to step 8.16 when a DELETE COMMAND FIELD 44E isnot determined to have been selected in step 8.10. From step 8.16 thecomputational device may proceed onto step 8.18 to perform alternateprocesses or to step 8.4.

Referring now generally to the Figures and particularly to FIG. 9, FIG.9 is a flowchart of the first method applied by means of the demo roomicon 44 to delete one or more software applications 38A-38X by theactions of (1.) selection in steps 9.2 and 9.14; and (2.) directing thecomputational device to initiate execution of the selected softwareapplications 38A and 38X in step 9.4. In step 9.2 a first DELETE COMMANDFIELD 44E of an application descriptor 46A-46X may be selected. In step9.14 additional selection DELETE COMMAND FIELD 44E of an additionalapplication descriptor 46A-46X may be determined and noted in step 9.16.The selections recorded in step 9.16 may be stored in the addressablememory 54.

FIG. 10 is a flowchart of the first method applied to fetch additionalsoftware code to complete, enhance or enable a software application38A-38X of FIGS. 1 and 6, and to apply a time limitation of use to theexecution of a software application 38A-38X. In step 10.2 thecomputational device 2 determines whether to open or execute a selectedsoftware application 38A-38X, and if no to proceed onto step 10.4 andinitiate or return to performing other processes. In step 10.6 thecomputational device 2 determines whether additional software code shallbe uploaded or downloaded to complete, enhance, enable or support theexecution of the software application 38A-38X of step 10.2. In step 10.8additional software code is requested and in step 10.10 the uploaded,downloaded or otherwise fetched software code is loaded into theaddressable memory 54. It is understood that software code loaded instep 10.10 may comprise of, or consist only of an encryption key,information, executable instructions, and/or executable instructions incombination with information. It is further understood that thecomputational device 2 may seek the additional software code from anetwork computer 22 of the communications network 20 addressable by aURL denoted in either (1.) a header HDR1-HDRX of the instant softwareapplication 38A-38X of step 10.2, or (2.) the addressable memory 54. Instep 10.12 the software application 38A-38X of step 10.2 is executed,and in step 10.14 the computational device 2 returns to or initiatesother processes.

In step 10.16 the computational engine 2 determines whether a timelimitation of use is applicable to the software application of step10.2, and if so, determines whether the time limit of use has beenexceeded. If an applicable time limitation of use has been exceeded,then the computational system 2 proceeds on from step 10.16 to step10.14. If there is no applicable time limitation of use, or noapplicable time limitation of use has been exceeded, then thecomputational system 2 proceeds onto step 10.12 and to initiateexecution of software application of step 10.2.

The computational apparatus 2 comprises the video display device 28 asdisplay means for providing a visual representation of a plurality ofapplication icons, as per NAME1-NAME8 and ICON1-ICON8, wherein eachimage NAME1-NAME8 or ICON1-ICON8 has a one-to-one correspondence withonly one software application 38A-38X. The computational device furthercomprises the input device 28, the point and click device 29 and theinput device interface as selection means for enabling a user to selectat least one image NAME1-NAME8 or ICON1-ICON8 and delete softwareapplications 38A-38X from the computational device 2.The computationaldevices also employs the host processor .x 4, the processor core 56, theoperating system 56, the demo room logic application 60, thecommunications interface drivers 62 and the addressable memory 54 ascontrol means for directing the computational device 2 to deletesoftware applications 38A-38X.

The computer-readable media 31 comprises software-encoded instructionsthat direct the computational system 2 to execute one or more aspects ofthe method of the present invention.

The term “computer-readable medium” as used herein refers to anysuitable medium known in the art that participates in providinginstructions to the network for execution. Such a medium may take manyforms, including but not limited to, non-volatile media, volatile media,and transmission media. Non-volatile media includes, for example,optical or magnetic disks, tapes and thumb drives. Volatile mediaincludes dynamic memory. Transmission media includes coaxial cables,copper wire and fiber optics. Common forms of computer-readable mediainclude, for example, a floppy disk, a flexible disk, hard disk,magnetic tape, or any other magnetic medium, a CD-ROM, any other opticalmedium, RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip orcartridge, or any other suitable medium known in the art from which acomputer can read machine executable instructions.

Various forms of computer readable media may be involved in carrying oneor more sequences of one or more instructions to the network forexecution. For example, the instructions may initially be carried on amagnetic disk of a remote computer. The remote computer can load theinstructions into its dynamic solid-state electronic memory 8 and sendthe instructions over a telephone line using a modem. A modem local toor communicatively linked with the network can receive the data on thetelephone line and use an infra-red transmitter to convert the data toan infra-red signal. An infra-red detector can receive the data carriedin the infra-red signal and appropriate circuitry can provide the datato the network.

The foregoing disclosures and statements are illustrative only of thePresent Invention, and are not intended to limit or define the scope ofthe Present Invention. The above description is intended to beillustrative, and not restrictive. Although the examples given includemany specificities, they are intended as illustrative of only certainpossible embodiments of the Present Invention. The examples given shouldonly be interpreted as illustrations of some of the preferredembodiments of the Present Invention, and the full scope of the PresentInvention should be determined by the appended claims and their legalequivalents. Those skilled in the art will appreciate that variousadaptations and modifications of the just-described preferredembodiments can be configured without departing from the scope andspirit of the Present Invention. Therefore, it is to be understood thatthe Present Invention may be practiced other than as specificallydescribed herein. The scope of the Present Invention as disclosed andclaimed should, therefore, be determined with reference to the knowledgeof one skilled in the art and in light of the disclosures presentedabove.

1. Within an information technology system comprising at least onecomputational device, a computer implemented method for automaticallydeleting a previously loaded software application on the at least onecomputational device of the information technology system, the methodcomprising: providing a visual representation of a plurality ofapplication icons and locally stored information in association with ademo center icon, each icon and locally stored information having aone-to-one correspondence with at least one software application;enabling a user to select at least one icon; and directing the at leastone computational device to delete the at least one software applicationassociated with the selected icon from the at least one computationaldevice.
 2. The computer-implemented method of claim 1, wherein the atleast one software application is provided in an operational stateselected from the group consisting of (1.) being incomplete andrequiring additional software encoded instructions to be read into thecomputational device in order to at least partially function; (2.) beingcomplete and enabled to operate only within a trial period; and (3.)being complete and requiring a purchase for operation or use.
 3. Thecomputer-implemented method of claim 1, wherein the selection of the atleast one icon is affected by clicking a button.
 4. The computerimplemented method of claim 3, wherein the selection of the at least oneicon is affected by clicking a mouse button.
 5. The computer implementedmethod of claim 4, wherein the selection of the at least one icon isaffected by clicking a mouse button when a cursor is positioned over apredefined area of the displayed information.
 6. The computerimplemented method of claim 1, wherein the selection of the at least oneicon is affected by depressing a key on a key pad.
 7. The computerimplemented method of claim 1, wherein the selection of the at least oneicon is affected by using a pointing device.
 8. The computer implementedmethod of claim 1, wherein the selection of the at least one icon isaffected by selection of a visually displayed indication.
 9. Thecomputer implemented method of claim 1, wherein the at least one iconcomprises a visual image identifying at least one software applicationassociated with the at least one icon.
 10. The computer implementedmethod of claim 1, wherein the visual image of the icon comprises textidentifying at least one software application associated with the atleast one icon.
 11. The computer implemented method of claim 1, furthercomprising: enabling a user to select at least two icons to direct thecomputational device to delete at least two software applicationsassociated with each selected icon; enabling the user to direct thecomputational device to initiate deletion of the software applicationsassociated with any selected icon; and deleting all softwareapplications or associated with the selected icons from thecomputational device.
 12. The computer-implemented method of claim 11,wherein at least one software application is incomplete and requiresadditional instructions to be read into the computational device inorder to at least partially be executed by the computational device. 13.The computer-implemented method of claim 12, wherein the at least onesoftware application is incomplete and requires additional instructionsto be downloaded from the computer network and read into thecomputational device in order to at least partially be executed by thecomputational device or wherein the at least one software application orcommunications network-enabling service software is complete andexecutable.
 14. The computer-implemented method of claim 13, wherein thecomputer network comprises the Internet.
 15. The computer-implementedmethod of claim 12, wherein the selection of the at least one icon isaffected by clicking a button.
 16. The computer implemented method ofclaim 15, wherein the selection of the at least one icon is affected byclicking a mouse button.
 17. The computer implemented method of claim16, wherein the selection of at least one icon is affected by clicking amouse button when a cursor is positioned over a predefined area of thedisplayed information.
 18. The computer implemented method of claim 12,wherein the selection of the at least one icon is affected by using apointing device.
 19. A computational apparatus comprising: display meansfor providing a visual representation of a plurality of applicationicons, each icon having a one-to-one correspondence with at least onesoftware application; selection means for enabling a user to select atleast one icon; and control means for directing the computational deviceto delete the at least one software application associated with theselected icon from the computational device.
 20. A computer-readablemedia comprising software-encoded instructions that direct aninformation technology system to practice the method of claim 1.