Methods and apparatus for protecting information

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S029000, C726S028000, C726S031000

Reexamination Certificate

active

07131144

ABSTRACT:
System, methods and apparatus are applicable to enable owners and vendors of software to protect their intellectual property and other rights in that software. The system also enables vendors or distributors of software to charge per-use for an instance of software. The system produces a unique, unforgeable, tag for every vendor supplied instance (copy) of specific software. Each user device is equipped with a supervising program that ensures, by use of the tag and other information, that no software instance will be used on the device in a manner infringing on the vendor, distributor, or software owner's rights. When installing or using a vendor-supplied software instance, the supervising program verifies the associated tag and stores the tag. When installing or using untagged software, the supervising program fingerprints selected portions of the software and stores the fingerprints. Software is used on a user's device through the supervising program which ensures proper use of the software. A vendor can submit a copy of infringing software to a guardian center which fingerprints appropriate portions of the infringing software. A user device's (104) supervising program periodically calls up, or can be called up, by the guardian center. During call-up, the supervising program can securely sends to the guardian center information about the use of the software instances associated with tags and fingerprints. The guardian center detects unauthorized use of software by comparison of current call-up data with records of past call-ups involving the same tags, and/or by comparing call-up supplied fingerprints with fingerprints of infringing software stored by the guardian center. The guardian center completes the call-up by enabling continued use of properly used software instances and generating appropriate punitive actions upon detection of improperly used software instances on the calling user's device. The data supplied by a supervising program during call-up is also employed by the guardian center to prepare data on usage by a user's device of vendor or distributor supplied software instances, for pay-per-use or pay-per-view billing.

REFERENCES:
patent: 3609697 (1971-09-01), Blevins et al.
patent: 3996449 (1976-12-01), Attanasio et al.
patent: 4458315 (1984-07-01), Uchenick
patent: 4658093 (1987-04-01), Hellman
patent: 4866769 (1989-09-01), Karp
patent: 5023907 (1991-06-01), Johnson et al.
patent: 5109413 (1992-04-01), Comerford et al.
patent: 5132992 (1992-07-01), Yurt et al.
patent: 5375206 (1994-12-01), Hunter et al.
patent: 5483658 (1996-01-01), Grube et al.
patent: 5598470 (1997-01-01), Cooper et al.
patent: 5606663 (1997-02-01), Kadooka
patent: 5613004 (1997-03-01), Cooperman et al.
patent: 5646997 (1997-07-01), Barton
patent: 5719941 (1998-02-01), Swift et al.
patent: 5724425 (1998-03-01), Chang et al.
patent: 5745569 (1998-04-01), Moskowitz et al.
patent: 5761651 (1998-06-01), Hasebe et al.
patent: 5825883 (1998-10-01), Archibald et al.
patent: 5892900 (1999-04-01), Ginter et al.
patent: 5910987 (1999-06-01), Ginter et al.
patent: 5915019 (1999-06-01), Ginter et al.
patent: 5917912 (1999-06-01), Ginter et al.
patent: 5920861 (1999-07-01), Hall et al.
patent: 5922208 (1999-07-01), Demmers
patent: 5926624 (1999-07-01), Katz et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 5943422 (1999-08-01), Van Wie et al.
patent: 6052780 (2000-04-01), Glover
patent: 6115802 (2000-09-01), Tock et al.
patent: 6134327 (2000-10-01), Van Oorschot
patent: 6165072 (2000-12-01), Davis et al.
patent: 6170058 (2001-01-01), Kausik
patent: 6170060 (2001-01-01), Mott et al.
patent: 6240184 (2001-05-01), Huynh et al.
patent: 6341352 (2002-01-01), Child et al.
patent: 6691229 (2004-02-01), Nelson
patent: 6697948 (2004-02-01), Rabin et al.
patent: 6889209 (2005-05-01), Rabin et al.
patent: 6889325 (2005-05-01), Sipman et al.
patent: 6920436 (2005-07-01), Stefik et al.
patent: 6920567 (2005-07-01), Doherty et al.
patent: 6948070 (2005-09-01), Ginter et al.
patent: 6963859 (2005-11-01), Stefik et al.
patent: 2005/0010475 (2005-01-01), Perkowski et al.
patent: 411136618 (1999-05-01), None
patent: WO 98/45768 (1998-10-01), None
Digimarc: Digimarc Watermarking Technology Receives U.S Patent,Business Wire, File 810, Jun. 11, 1997.
Kaplan, Mark A., “IBM Cryptolopes™, Super Distribution and Digital Rights Management,” http://www.research.ibm.com/peop...plan/cryptolope-docs/crypap,html, 7 pages (1996).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Methods and apparatus for protecting information does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Methods and apparatus for protecting information, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Methods and apparatus for protecting information will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3645811

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.