Cryptography – Cryptanalysis
Patent
1997-04-10
2000-08-22
Gregory, Bernarr E.
Cryptography
Cryptanalysis
380 9, 380 23, 380 25, 380 30, 380 49, 395186, 39518701, H04L 900, H04L 930
Patent
active
061084204
ABSTRACT:
A method to create, distribute and install on an installation computer a uniquely customized instance of a software application that is authenticable and traceable to a particular user. A secure distribution agent resident on a distribution computer collects identifying information, and calculates a cryptographic signature of the software application and identifying information. The identifying information and cryptographic signature are embedded in the software application by the secure distribution agent. The software application with embedded data is transmitted via a distribution channel to the installation computer. A user installation agent resident on the installation computer manages the installation of the software application with embedded data on the installation computer. Prior to installation, the user installation agent may use the cryptographic signature to verify that the software application, and the identifying information are authentic and have not been tampered with.
REFERENCES:
patent: 5103476 (1992-04-01), Waite et al.
patent: 5222134 (1993-06-01), Waite et al.
patent: 5341429 (1994-08-01), Stringer et al.
patent: 5416840 (1995-05-01), Cane et al.
patent: 5493649 (1996-02-01), Slivka et al.
patent: 5509070 (1996-04-01), Schull
patent: 5509074 (1996-04-01), Choudhury et al.
patent: 5530752 (1996-06-01), Rubin
patent: 5553143 (1996-09-01), Ross et al.
patent: 5559884 (1996-09-01), Davidson et al.
patent: 5586186 (1996-12-01), Yuval et al.
patent: 5586304 (1996-12-01), Stupek, Jr. et al.
patent: 5724425 (1998-03-01), Chang et al.
patent: 5825877 (1998-10-01), Dan et al.
"Electronic Software Distribution Policies", Internet Special Interest Group, Software Publishers Association, Oct. 7, 1996; pp. 1 to 24.
Bruce Schneier, Applied Cryptography, Second Edition, 1996; chapter 2, pp. 21 to 46, chapter 3, pp. 47 to 74 and chapter 18, pp. 429 to 459.
Ziplock White Paper, Portland Software, copyright 1996, last updated Jan. 27, 1997; pp. 1 to 14.
Lein Harn et al., "A Software Authentication System For Information Integrity", Computers & Security International Journal Devoted To The Study of Technical and Financial Aspects of Computer Security, vol. II, No. 8, Dec. 1, 1992, pp. 747-752.
Allan David Ian
Larose Gordon Edward
Channelware Inc.
Gregory Bernarr E.
LandOfFree
Method and system for networked installation of uniquely customi does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for networked installation of uniquely customi, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for networked installation of uniquely customi will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-590048