Cryptography – Key management – Having particular key generator
Patent
1993-02-26
1996-01-09
Bowler, Alyssa H.
Cryptography
Key management
Having particular key generator
380 3, 380 4, 380 23, 380 25, 39520011, 395550, 395186, 364DIG1, 3642225, 3642865, 3642866, H04L 900
Patent
active
054836581
ABSTRACT:
A monitoring computer monitors the communications occurring within at least one communication system for at least one unique processing device identification code associated with a processing device. Upon detecting the at least one device identification code, the monitoring computer compares the type of application in use by the processing device with known software parameters (including the allowable types of applications and their serial numbers) for the processing device. When the type of application in use by the processing device does not substantially match the known software parameters for the processing device, the processing device is identified as using an unauthorized and/or duplicated software application.
REFERENCES:
patent: 4866769 (1989-09-01), Karp
patent: 4956769 (1990-09-01), Smith
patent: 5023907 (1991-06-01), Johnson et al.
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5113518 (1992-05-01), Durst, Jr. et al.
patent: 5182770 (1993-01-01), Medveczky et al.
patent: 5204897 (1993-04-01), Wyman
patent: 5287408 (1994-02-01), Samson
Grube Gary W.
Markison Timothy W.
Bowler Alyssa H.
Davis Jr. Walter D.
Moreno Christopher P.
LandOfFree
Detection of unauthorized use of software applications in proces does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Detection of unauthorized use of software applications in proces, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detection of unauthorized use of software applications in proces will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1309392