Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2008-04-15
2008-04-15
Lanier, Benjamin E. (Department: 2132)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C726S028000, C726S029000, C726S030000, C726S031000, C713S187000, C713S189000, C380S239000, C380S240000, C705S059000
Reexamination Certificate
active
09521709
ABSTRACT:
Software is securely distributed with limited usage rights. The software may be an executable program and/or one or more data files such as image or multimedia data files. The software includes an access control object which prevents at least some usage of the software without the use of a first access control code. The first access control code is produced based on selected information characteristic of the user's computer system. The access control code is produced in a server computer to which the user directs a request for the access control code. The user makes a payment to receive the access control code, which is then downloaded to the user's computer system.
REFERENCES:
patent: 4464650 (1984-08-01), Eastman et al.
patent: 4558302 (1985-12-01), Welch
patent: 4658093 (1987-04-01), Hellman
patent: 4796220 (1989-01-01), Wolfe
patent: 4937863 (1990-06-01), Robert et al.
patent: 4953209 (1990-08-01), Ryder, Sr. et al.
patent: 4999806 (1991-03-01), Chernow et al.
patent: 5008814 (1991-04-01), Mathur
patent: 5049881 (1991-09-01), Gibson et al.
patent: 5051745 (1991-09-01), Katz
patent: 5166886 (1992-11-01), Molnar et al.
patent: 5199066 (1993-03-01), Logan
patent: 5222134 (1993-06-01), Waite et al.
patent: 5224166 (1993-06-01), Hartman, Jr.
patent: 5287407 (1994-02-01), Holmes
patent: 5287408 (1994-02-01), Samson
patent: 5337357 (1994-08-01), Chou et al.
patent: 5440401 (1995-08-01), Parulski et al.
patent: 5509070 (1996-04-01), Schull
patent: 5530752 (1996-06-01), Rubin
patent: 5553139 (1996-09-01), Ross et al.
patent: 5559884 (1996-09-01), Davidson et al.
patent: 5563946 (1996-10-01), Cooper et al.
patent: 5564038 (1996-10-01), Grantz et al.
patent: 5598470 (1997-01-01), Cooper et al.
patent: 5687191 (1997-11-01), Lee et al.
patent: 5689560 (1997-11-01), Cooper et al.
patent: 5708709 (1998-01-01), Rose
patent: 5729223 (1998-03-01), Trissel
patent: 5737416 (1998-04-01), Cooper et al.
patent: 5745569 (1998-04-01), Moskowitz et al.
patent: 5754646 (1998-05-01), Williams et al.
patent: 5757907 (1998-05-01), Cooper et al.
patent: 5757908 (1998-05-01), Cooper et al.
patent: 5758068 (1998-05-01), Brandt et al.
patent: 5771347 (1998-06-01), Grantz et al.
patent: 5819091 (1998-10-01), Arendt et al.
patent: 5845281 (1998-12-01), Benson et al.
patent: 5862325 (1999-01-01), Reed et al.
patent: 5864620 (1999-01-01), Pettitt
patent: 5870543 (1999-02-01), Ronning
patent: 5875247 (1999-02-01), Nakashima et al.
patent: 5883954 (1999-03-01), Ronning
patent: 5883955 (1999-03-01), Ronning
patent: 5903647 (1999-05-01), Ronning
patent: 5903650 (1999-05-01), Ross et al.
patent: 5905860 (1999-05-01), Olsen et al.
patent: 5907617 (1999-05-01), Ronning
patent: 5915025 (1999-06-01), Taguchi et al.
patent: 5917908 (1999-06-01), Takenaka et al.
patent: 5933497 (1999-08-01), Beetcher et al.
patent: 5984508 (1999-11-01), Hurley
patent: 5995625 (1999-11-01), Sudia et al.
patent: 6006328 (1999-12-01), Drake
patent: 6067639 (2000-05-01), Rodrigues et al.
patent: 6081784 (2000-06-01), Tsutsui
patent: 6226618 (2001-05-01), Downs et al.
patent: 6272636 (2001-08-01), Neville et al.
patent: 6343280 (2002-01-01), Clark
patent: 6466209 (2002-10-01), Bantum
patent: WO98/33106 (1998-07-01), None
Bashar, et al. Low-Threat Security Patches, and Tools, Purdue University Department of Computer Sciences, West Lafayette, IN. 1997.
Collberg, et al., A Taxonomy of Obfuscating Transformations, University of Aukland Department of Computer Sciences, Technical Report #148, Auckland, New Zealand PP. 1-36, 1997.
Collberg et al. On the Limits of Software Watermarking, University of Auckland, Department of Computer Sciences, Technical Report. #164 Auckland, New Zealand, Aug. 26, 1998.
Pfitzmann, Birgit Information Hiding Terminology, Proc. Information Hiding Workshop. Cambridge, UK, 1996, pp. 1-4.
Roth et al., A Wrapper Architecture for Legacy Data Sources, 1997, IBM Almaden Research Center pp. 1-21.
Glenn Michael A.
Glenn Patent Group
Lanier Benjamin E.
Macrovision Corporation
LandOfFree
Method and apparatus for secure distribution of software does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for secure distribution of software, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for secure distribution of software will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3946160