Method and apparatus for secure distribution of software

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S028000, C726S029000, C726S030000, C726S031000, C713S187000, C713S189000, C380S239000, C380S240000, C705S059000

Reexamination Certificate

active

07360252

ABSTRACT:
Software is securely distributed with limited usage rights. The software may be an executable program and/or one or more data files such as image or multimedia data files. The software includes an access control object which prevents at least some usage of the software without the use of a first access control code. The first access control code is produced based on selected information characteristic of the user's computer system. The access control code is produced in a server computer to which the user directs a request for the access control code. The user makes a payment to receive the access control code, which is then downloaded to the user's computer system.

REFERENCES:
patent: 4464650 (1984-08-01), Eastman et al.
patent: 4558302 (1985-12-01), Welch
patent: 4658093 (1987-04-01), Hellman
patent: 4796220 (1989-01-01), Wolfe
patent: 4937863 (1990-06-01), Robert et al.
patent: 4953209 (1990-08-01), Ryder, Sr. et al.
patent: 4999806 (1991-03-01), Chernow et al.
patent: 5008814 (1991-04-01), Mathur
patent: 5049881 (1991-09-01), Gibson et al.
patent: 5051745 (1991-09-01), Katz
patent: 5166886 (1992-11-01), Molnar et al.
patent: 5199066 (1993-03-01), Logan
patent: 5222134 (1993-06-01), Waite et al.
patent: 5224166 (1993-06-01), Hartman, Jr.
patent: 5287407 (1994-02-01), Holmes
patent: 5287408 (1994-02-01), Samson
patent: 5337357 (1994-08-01), Chou et al.
patent: 5440401 (1995-08-01), Parulski et al.
patent: 5509070 (1996-04-01), Schull
patent: 5530752 (1996-06-01), Rubin
patent: 5553139 (1996-09-01), Ross et al.
patent: 5559884 (1996-09-01), Davidson et al.
patent: 5563946 (1996-10-01), Cooper et al.
patent: 5564038 (1996-10-01), Grantz et al.
patent: 5598470 (1997-01-01), Cooper et al.
patent: 5687191 (1997-11-01), Lee et al.
patent: 5689560 (1997-11-01), Cooper et al.
patent: 5708709 (1998-01-01), Rose
patent: 5729223 (1998-03-01), Trissel
patent: 5737416 (1998-04-01), Cooper et al.
patent: 5745569 (1998-04-01), Moskowitz et al.
patent: 5754646 (1998-05-01), Williams et al.
patent: 5757907 (1998-05-01), Cooper et al.
patent: 5757908 (1998-05-01), Cooper et al.
patent: 5758068 (1998-05-01), Brandt et al.
patent: 5771347 (1998-06-01), Grantz et al.
patent: 5819091 (1998-10-01), Arendt et al.
patent: 5845281 (1998-12-01), Benson et al.
patent: 5862325 (1999-01-01), Reed et al.
patent: 5864620 (1999-01-01), Pettitt
patent: 5870543 (1999-02-01), Ronning
patent: 5875247 (1999-02-01), Nakashima et al.
patent: 5883954 (1999-03-01), Ronning
patent: 5883955 (1999-03-01), Ronning
patent: 5903647 (1999-05-01), Ronning
patent: 5903650 (1999-05-01), Ross et al.
patent: 5905860 (1999-05-01), Olsen et al.
patent: 5907617 (1999-05-01), Ronning
patent: 5915025 (1999-06-01), Taguchi et al.
patent: 5917908 (1999-06-01), Takenaka et al.
patent: 5933497 (1999-08-01), Beetcher et al.
patent: 5984508 (1999-11-01), Hurley
patent: 5995625 (1999-11-01), Sudia et al.
patent: 6006328 (1999-12-01), Drake
patent: 6067639 (2000-05-01), Rodrigues et al.
patent: 6081784 (2000-06-01), Tsutsui
patent: 6226618 (2001-05-01), Downs et al.
patent: 6272636 (2001-08-01), Neville et al.
patent: 6343280 (2002-01-01), Clark
patent: 6466209 (2002-10-01), Bantum
patent: WO98/33106 (1998-07-01), None
Bashar, et al. Low-Threat Security Patches, and Tools, Purdue University Department of Computer Sciences, West Lafayette, IN. 1997.
Collberg, et al., A Taxonomy of Obfuscating Transformations, University of Aukland Department of Computer Sciences, Technical Report #148, Auckland, New Zealand PP. 1-36, 1997.
Collberg et al. On the Limits of Software Watermarking, University of Auckland, Department of Computer Sciences, Technical Report. #164 Auckland, New Zealand, Aug. 26, 1998.
Pfitzmann, Birgit Information Hiding Terminology, Proc. Information Hiding Workshop. Cambridge, UK, 1996, pp. 1-4.
Roth et al., A Wrapper Architecture for Legacy Data Sources, 1997, IBM Almaden Research Center pp. 1-21.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for secure distribution of software does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for secure distribution of software, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for secure distribution of software will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2787213

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.