Method and system for networked installation of uniquely customi

Cryptography – Cryptanalysis

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 9, 380 23, 380 25, 380 30, 380 49, 395186, 39518701, H04L 900, H04L 930

Patent

active

061084204

ABSTRACT:
A method to create, distribute and install on an installation computer a uniquely customized instance of a software application that is authenticable and traceable to a particular user. A secure distribution agent resident on a distribution computer collects identifying information, and calculates a cryptographic signature of the software application and identifying information. The identifying information and cryptographic signature are embedded in the software application by the secure distribution agent. The software application with embedded data is transmitted via a distribution channel to the installation computer. A user installation agent resident on the installation computer manages the installation of the software application with embedded data on the installation computer. Prior to installation, the user installation agent may use the cryptographic signature to verify that the software application, and the identifying information are authentic and have not been tampered with.

REFERENCES:
patent: 5103476 (1992-04-01), Waite et al.
patent: 5222134 (1993-06-01), Waite et al.
patent: 5341429 (1994-08-01), Stringer et al.
patent: 5416840 (1995-05-01), Cane et al.
patent: 5493649 (1996-02-01), Slivka et al.
patent: 5509070 (1996-04-01), Schull
patent: 5509074 (1996-04-01), Choudhury et al.
patent: 5530752 (1996-06-01), Rubin
patent: 5553143 (1996-09-01), Ross et al.
patent: 5559884 (1996-09-01), Davidson et al.
patent: 5586186 (1996-12-01), Yuval et al.
patent: 5586304 (1996-12-01), Stupek, Jr. et al.
patent: 5724425 (1998-03-01), Chang et al.
patent: 5825877 (1998-10-01), Dan et al.
"Electronic Software Distribution Policies", Internet Special Interest Group, Software Publishers Association, Oct. 7, 1996; pp. 1 to 24.
Bruce Schneier, Applied Cryptography, Second Edition, 1996; chapter 2, pp. 21 to 46, chapter 3, pp. 47 to 74 and chapter 18, pp. 429 to 459.
Ziplock White Paper, Portland Software, copyright 1996, last updated Jan. 27, 1997; pp. 1 to 14.
Lein Harn et al., "A Software Authentication System For Information Integrity", Computers & Security International Journal Devoted To The Study of Technical and Financial Aspects of Computer Security, vol. II, No. 8, Dec. 1, 1992, pp. 747-752.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for networked installation of uniquely customi does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for networked installation of uniquely customi, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for networked installation of uniquely customi will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-590048

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.