Method and system for validating software code

Information security – Prevention of unauthorized use of data including prevention... – Access control

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S165000

Reexamination Certificate

active

10616519

ABSTRACT:
A method and system is provided for validating software code provided to a user entity by a software provider. In general terms, the user entity encrypts first data, provides it to the software provider, and receives back an indication that the code is valid only if the software provider has been able to correctly decrypt the encrypted first data, such decryption only being possible using an appropriate decryption key provided by a party with rights in the software code. More particularly, the user entity encrypts the first data using, as encryption parameters, both an encryption key string comprising said software code or a representation thereof, and public data of the aforesaid party. A decryption key appropriate for correctly decrypting the encrypted first data is generated from the encryption key string and provided to the software provider only if the software code provided to the user entity is valid.

REFERENCES:
patent: 5490216 (1996-02-01), Richardson, III
patent: 5638446 (1997-06-01), Rubin
patent: 5982892 (1999-11-01), Hicks et al.
patent: 6330549 (2001-12-01), Merkle
patent: 6986040 (2006-01-01), Kramer et al.
patent: 0 969 366 (2000-01-01), None
patent: 1 267 312 (2002-12-01), None
patent: 2 376 392 (2002-12-01), None
patent: 2 381 173 (2003-04-01), None
patent: 98/16033 (1998-04-01), None
patent: 01/01629 (2001-01-01), None
patent: 02/077773 (2002-10-01), None
Boneh, D., et al., “Identity-Based Encryption from the Weil Pairing,” (Full Version) pp. 1-31; (Partial Version found inAdvances in Cryptology—CRYPTO 2001, LNCS vol. 2139, pp. 213-229, Springer-Verlag, 2001).
Boneh, D., et al., “Identity-Based Mediated RSA,” 12 pages total.
Cocks, C., “An Identity Based Encryption Scheme Based on Quadratic Residues,”Proceedings of the 8th IMA International Conference on Cryptology and Coding, LNCS vol. 2260, 4 pages total, Springer-Verlag (2001).
Menezes, A.J.,Handbook on Applied Cryptography, CRC Press Series on Discrete Mathematices And Its Applications, pp. 1, 397-405 (1997).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for validating software code does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for validating software code, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for validating software code will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3766294

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.