Information security – Prevention of unauthorized use of data including prevention... – Access control
Reexamination Certificate
2007-07-17
2007-07-17
Moazzami, Nasser (Department: 2136)
Information security
Prevention of unauthorized use of data including prevention...
Access control
C713S165000
Reexamination Certificate
active
10616519
ABSTRACT:
A method and system is provided for validating software code provided to a user entity by a software provider. In general terms, the user entity encrypts first data, provides it to the software provider, and receives back an indication that the code is valid only if the software provider has been able to correctly decrypt the encrypted first data, such decryption only being possible using an appropriate decryption key provided by a party with rights in the software code. More particularly, the user entity encrypts the first data using, as encryption parameters, both an encryption key string comprising said software code or a representation thereof, and public data of the aforesaid party. A decryption key appropriate for correctly decrypting the encrypted first data is generated from the encryption key string and provided to the software provider only if the software code provided to the user entity is valid.
REFERENCES:
patent: 5490216 (1996-02-01), Richardson, III
patent: 5638446 (1997-06-01), Rubin
patent: 5982892 (1999-11-01), Hicks et al.
patent: 6330549 (2001-12-01), Merkle
patent: 6986040 (2006-01-01), Kramer et al.
patent: 0 969 366 (2000-01-01), None
patent: 1 267 312 (2002-12-01), None
patent: 2 376 392 (2002-12-01), None
patent: 2 381 173 (2003-04-01), None
patent: 98/16033 (1998-04-01), None
patent: 01/01629 (2001-01-01), None
patent: 02/077773 (2002-10-01), None
Boneh, D., et al., “Identity-Based Encryption from the Weil Pairing,” (Full Version) pp. 1-31; (Partial Version found inAdvances in Cryptology—CRYPTO 2001, LNCS vol. 2139, pp. 213-229, Springer-Verlag, 2001).
Boneh, D., et al., “Identity-Based Mediated RSA,” 12 pages total.
Cocks, C., “An Identity Based Encryption Scheme Based on Quadratic Residues,”Proceedings of the 8th IMA International Conference on Cryptology and Coding, LNCS vol. 2260, 4 pages total, Springer-Verlag (2001).
Menezes, A.J.,Handbook on Applied Cryptography, CRC Press Series on Discrete Mathematices And Its Applications, pp. 1, 397-405 (1997).
Hewlett--Packard Development Company, L.P.
Hoffman Brandon
LandOfFree
Method and system for validating software code does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for validating software code, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for validating software code will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3766294