Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files
Patent
1997-02-26
2000-06-06
Trammell, James P.
Data processing: financial, business practice, management, or co
Business processing using cryptography
Usage protection of distributed data files
705 57, 705 51, 705 52, 705 59, G06F 1760
Patent
active
060731230
ABSTRACT:
A method and apparatus for detecting unauthorized copies of software. Each copy of software is uniquely identified by a license number. Each use of each copy is termed a session. Each copy's sessions are numbered sequentially. Each session is assigned a random session stamp when it begins. For each copy, a stamp history is kept, giving the next session number and the session stamps for prior sessions. If software copies having the same license number are used on two different computers, their stamp histories will show different next-session numbers and/or different session stamps for prior sessions, indicating two copies of the software exist, which may be, e.g., a license violation. Each software copy maintains a stamp history database (SHD) comprising a stamp history for itself and for other copies of software for which it has received a stamp history. When a software copy creates data files or transmits information over a network, it attaches all or part of its SHD to the files or information, in order to relay stamp history data to other copies of software. When another software copy receives the data files or information, it updates its own SHD using the attached SHD information. In addition to protection of a software copy, the present method can be applied to protection of a data set, detecting old versions of software that remain in use after newer versions have been installed, and to limit the number of times a copy of software is executed.
REFERENCES:
patent: 4658093 (1987-04-01), Hellman
patent: 4740890 (1988-04-01), William
patent: 5592651 (1997-01-01), Rackman
patent: 5754864 (1998-05-01), Hill
patent: 5790664 (1998-08-01), Coley et al.
patent: 5930357 (1999-07-01), Fukui
patent: 5964876 (1999-10-01), Shimomura et al.
Y. Malhotra, Controlling Copyright Infringements of Intellectual Property, Journal of Systems Management, v45 n7, pp. 12-17.
D. Grover, The protection of Computer Software, 1989, Cambridge University Press, Table of Contents and pp. 1-22, an overview chapter.
Rosen Nicholas David
Trammell James P.
LandOfFree
Method and apparatus for detecting unauthorized copies of softwa does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for detecting unauthorized copies of softwa, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for detecting unauthorized copies of softwa will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2223101