Method for defining and verifying user access rights to a comput

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

713201, 380 4, 380 25, 380 27, G06F 1300, H04L 932, H04L 912, H04K 100

Patent

active

060414111

ABSTRACT:
A method for minimizing the potential for unauthorized use of digital information, particularly software programs, digital content and other computer information, by verifying user access rights to electronically transmitted digital information. A second computer system transmits requested digital information to a requesting first computing system in wrapped form, which includes digital instructions that must be successfully executed, or unwrapped, before access to the digital information is allowed. Successful unwrapping requires that certain conditions must be verified in accordance with the digital instructions, thereby allowing access to the digital information. In one embodiment, verification includes locking the digital information to the requesting computer system by comparing a generated digital fingerprint associated with the digital information to a digital fingerprint previously generated which is unique to the requesting computer system.

REFERENCES:
patent: Re32985 (1989-07-01), Nagata et al.
patent: 4259720 (1981-03-01), Campbell
patent: 4270042 (1981-05-01), Case
patent: 4302810 (1981-11-01), Bouricius et al.
patent: 4528643 (1985-07-01), Freeny, Jr.
patent: 4688169 (1987-08-01), Joshi
patent: 4797920 (1989-01-01), Stein
patent: 4823264 (1989-04-01), Deming
patent: 4912762 (1990-03-01), Lee et al.
patent: 4933971 (1990-06-01), Bestock et al.
patent: 5022076 (1991-06-01), Rosenow et al.
patent: 5121345 (1992-06-01), Lentz
patent: 5138712 (1992-08-01), Corbin
patent: 5222134 (1993-06-01), Waite et al.
patent: 5283829 (1994-02-01), Anderson
patent: 5349643 (1994-09-01), Cox et al.
patent: 5371797 (1994-12-01), Bocinsky, Jr.
patent: 5388211 (1995-02-01), Hornbuckle
patent: 5416840 (1995-05-01), Cane et al.
patent: 5457798 (1995-10-01), Alfredsson
patent: 5465206 (1995-11-01), Hilt et al.
patent: 5548645 (1996-08-01), Ananda
patent: 5557518 (1996-09-01), Rosen
patent: 5734819 (1998-03-01), Lewis
patent: 5737416 (1998-04-01), Cooper et al.
patent: 5758068 (1998-05-01), Brandt et al.
"Secure Electronic Commerce Method and Apparatus", Serial No. 08/735,308, filed Oct. 22, 1996.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method for defining and verifying user access rights to a comput does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method for defining and verifying user access rights to a comput, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for defining and verifying user access rights to a comput will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-738914

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.