Manipulating rights-to-execute in connection with a software cop

Cryptography – Cryptanalysis

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

H04L 900

Patent

active

051094134

ABSTRACT:
A software asset protection mechanism segregates the right to execute software from the software itself. The rights to execute, when installed on a composite computing system, are stored in a coprocessor element of the composite computing system. The software asset protection mechanism is enhanced as described herein by providing for the manipulation of those rights to execute. More particularly, the rights to execute can be conditioned at least in terms of a valid period of execution at least in terms of a valid period of execution or a valid number of executions. The rights to execute can be safely transferred from one coprocessor to another, or can be returned to the software vendor. Finally, a method of backing up the rights to execute to provide the user with the rights to execute in case the coprocessor element of the composite computing system fails.

REFERENCES:
patent: 3798359 (1974-03-01), Feistel
patent: 3958081 (1976-05-01), Ehrsam et al.
patent: 3996449 (1976-12-01), Attanasio et al.
patent: 4104721 (1978-08-01), Markstein et al.
patent: 4120030 (1978-10-01), Johnstone
patent: 4168396 (1979-09-01), Best
patent: 4183085 (1980-01-01), Roberts et al.
patent: 4238854 (1980-12-01), Ehrsam et al.
patent: 4246638 (1981-01-01), Thomas
patent: 4278837 (1981-07-01), Best
patent: 4433207 (1984-02-01), Best
patent: 4446519 (1984-05-01), Thomas
patent: 4458315 (1984-07-01), Uchenick
patent: 4465901 (1984-08-01), Best
patent: 4471163 (1984-09-01), Donald et al.
patent: 4471216 (1984-09-01), Herve
patent: 4558176 (1985-12-01), Arnold et al.
patent: 4562306 (1985-12-01), Chou et al.
patent: 4599489 (1986-07-01), Cargile
patent: 4609777 (1986-09-01), Cargile
patent: 4621321 (1986-11-01), Boebert et al.
patent: 4633388 (1986-12-01), Chiu
patent: 4644493 (1987-02-01), Chandra et al.
patent: 4646234 (1987-02-01), Tolman et al.
patent: 4652990 (1987-03-01), Pailen et al.
patent: 4796181 (1989-01-01), Wiedemer
patent: 5034980 (1991-07-01), Kubota
patent: 5047928 (1991-09-01), Wiedemer
patent: 5052040 (1991-09-01), Preston et al.
Best, "Preventing Software Piracy with Crypto-Microprocessors", IEEE, 1980.
Everett, "Padlock", Computer Bulletin, Mar. 1985, pp. 16 et seq/"Software Protection", Open Computer Security.
Herzberg, "Public Protection of Software", Lecture Notes in Computer Science, vol. 218, 1986, pp. 158 et seq.
Kent, "Protecting Externally Supplied Software in Small Computers", Ph.D. Thesis, M.I.T., 1980.
Lipson, "Little Black Box `Blocks` Illicit Software Copying", Stamford Advocate (Sep. 14, 1986), pp. E1 and E2.
Maude, "Hardware Protection Against Software Piracy", The Communications of the ACM, Sep. 1984, vol. 27, No. 9, pp. 950 et seq.
Purdy, "A Software Protection Scheme", IEEE 1982.
ROI
Simmons, "How to (Selectively) Broadcast a Secret", IEEE 1985.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Manipulating rights-to-execute in connection with a software cop does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Manipulating rights-to-execute in connection with a software cop, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Manipulating rights-to-execute in connection with a software cop will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1253330

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.