Method of protecting computer software from unauthorized executi

Cryptography – Cryptanalysis

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

H04L 900

Patent

active

052221334

ABSTRACT:
A method of protecting computer software is provided by storing a first key in a plug-in hardware device, storing an algorithm for processing a purality of keys including the first key in software to be protected, loading the software containing the algorithm in the computer and plugging in a hardware device in a communications port of the computer. A second key, external to the software, to be protected which bears a relationship to the first key by the algorithm is loaded into the computer where processing takes place of the first and second keys in the algorithm for deriving a control key, if present, for the continued processing of the software being protected. The step of loading the second key is performed using a computer keyboard, any input/output port, a hard disk file or any other method of entry in the computer. Additional keys external to the software which bear a relationship to the first and second keys configured in the algorithm may be provided.

REFERENCES:
patent: 4599489 (1986-07-01), Cargile
patent: 4609777 (1986-09-01), Cargile
patent: 4817140 (1989-03-01), Chandra et al.
patent: 4866769 (1989-09-01), Karp
patent: 4959861 (1990-09-01), Howlette
patent: 5033084 (1991-07-01), Beecher
patent: 5081676 (1992-01-01), Chou et al.
patent: 5083309 (1992-01-01), Beysson

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method of protecting computer software from unauthorized executi does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method of protecting computer software from unauthorized executi, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method of protecting computer software from unauthorized executi will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1445515

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.