Method of distributing piracy protected computer software

Information security – Access control or authentication – Stand-alone

Reissue Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S007000, C726S009000, C726S019000, C726S027000, C713S186000

Reissue Patent

active

RE042861

ABSTRACT:
A method and a system for disabling execution of a software application stored within a computer absent data indicative of an authorized use of the software application are disclosed. At start up or during execution of a software application a user is prompted for user authorization information. Using a processor within a smart card the received user authorization information is compared with user authorization information stored in memory of the smart card to produce a comparison result. If the comparison result is indicative of an authorized user of the software application, then data indicative of the authorized use of the software application is provided from the smart card to the computer. Upon receipt of the data indicative of the authorized use of the software application execution of the software application is continued. When the data is not data indicative of the authorized use of the software application further execution of the software application is disabled. For example, biometric information in the form of a fingerprint may be used for user authorization.

REFERENCES:
patent: 4658093 (1987-04-01), Hellman
patent: 4683553 (1987-07-01), Mollier
patent: 4791565 (1988-12-01), Dunham et al.
patent: 5260999 (1993-11-01), Wyman
patent: 5495411 (1996-02-01), Ananda
patent: 5509070 (1996-04-01), Schull
patent: 5566327 (1996-10-01), Sehr
patent: 5615061 (1997-03-01), Singh
patent: 5625690 (1997-04-01), Michel et al.
patent: 5692917 (1997-12-01), Rieb et al.
patent: 5745879 (1998-04-01), Wyman
patent: 5754646 (1998-05-01), Williams et al.
patent: 5757907 (1998-05-01), Cooper et al.
patent: 5790663 (1998-08-01), Lee et al.
patent: 5790668 (1998-08-01), Tomko
patent: 5796824 (1998-08-01), Hasebe et al.
patent: 5841868 (1998-11-01), Helbig, Sr.
patent: 5848231 (1998-12-01), Teitelbaum et al.
patent: 5893910 (1999-04-01), Martineau et al.
patent: 5923884 (1999-07-01), Peyret et al.
patent: 5933498 (1999-08-01), Schneck et al.
patent: 6044471 (2000-03-01), Colvin
patent: 6067621 (2000-05-01), Yu et al.
patent: 6087955 (2000-07-01), Gray
patent: 6134659 (2000-10-01), Sprong et al.
patent: 6314409 (2001-11-01), Schneck et al.
patent: 6655585 (2003-12-01), Shinn
patent: 7366918 (2008-04-01), Barlow et al.
patent: 7552340 (2009-06-01), Ooi et al.
patent: 2003/0149877 (2003-08-01), Liao et al.
patent: 2005/0091507 (2005-04-01), Lee et al.
patent: 2005/0139685 (2005-06-01), Kozlay
patent: 2005/0144446 (2005-06-01), Kishimoto
patent: 2005/0216739 (2005-09-01), Lee et al.
patent: 2005/0216763 (2005-09-01), Lee et al.
Harvey, Mike. “Why veins could replace fingerprints and retinas as most secure form of ID.”Times OnlineNov. 11, 2008, 2 pages <http://technology.timesonline.co.uk/tol
ews/tech—and—web/articles5129384.ece>.
Sanderson, “Distributed file systems: stepping stone to distributed computing,”LAN Technology,May 1991, 7(5), 41-50.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of distributing piracy protected computer software does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of distributing piracy protected computer software, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of distributing piracy protected computer software will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4290585

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.