Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files
Reexamination Certificate
2008-03-18
2008-03-18
Worjloh, Jalatee (Department: 3621)
Data processing: financial, business practice, management, or co
Business processing using cryptography
Usage protection of distributed data files
C705S057000, C705S059000, C726S026000, C726S033000, C713S176000, C713S175000, C380S277000, C380S278000, C380S279000
Reexamination Certificate
active
10402237
ABSTRACT:
Controlling unauthorized access to software distributed to a user by a vendor. A verification key is generated by a product key generator and either embedded in the software prior to distribution or packaged with the software as a self-installing package. The verification key includes a public verification key. The combination of the software and the verification key create distributable software which is distributed to a user. The user installs the software on a user computer system as protected software. To obtain a user key, the user inputs identifying information, which may be for the user or for a group, which is sent to a user key generator. The user key generator converts the identifying information to a numeric representation and then generates, by signing the numeric representation with the private signing key, a user key, which is returned to the user. Using the verification key, a user key verifier verifies a relationship between the user key and the identifying information to determine an access level to the protected software. The system verifies the relationship between the user key and the identifying information every time the software is run to ensure continued protection of the software after installation.
REFERENCES:
patent: 5235642 (1993-08-01), Wobber et al.
patent: 5337357 (1994-08-01), Chou et al.
patent: 5481720 (1996-01-01), Loucks et al.
patent: 5490216 (1996-02-01), Richardson, III
patent: 5586186 (1996-12-01), Yuval et al.
patent: 5649185 (1997-07-01), Antognini et al.
patent: 5754761 (1998-05-01), Wisley
patent: 5982892 (1999-11-01), Hicks et al.
patent: 6343280 (2002-01-01), Clark
Moreh, Johan, “Digital Certificates and Certificate Authorities,” Sep. 1997, Database Web Adviser, v15, n9, p. 74 (4).
Lyons et al., “Who Holds the Keys? Debating Data Encryption Standards,” Jul. 1990, Communications of the ACM; v35, n7, pp. 32-54.
Creath Peter Janssen
Hicks Christian Bielefeldt
Guerin & Rodriguez LLP
Worjloh Jalatee
LandOfFree
Remote authorization for unlocking electronic data system... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Remote authorization for unlocking electronic data system..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Remote authorization for unlocking electronic data system... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3950271