Restricted software and hardware usage on a computer

Electrical computers and digital processing systems: support – Data processing protection using cryptography – Upgrade/install encryption

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07577853

ABSTRACT:
A client computer runs an operating system that executes additional applications by loading them using an application loader and executes device drivers for peripheral devices by loading the drivers using a device loader. The operating system restricts the functionality of the operating system, such as by making selected portions and functionality of the operating system unavailable to the user or by limiting the user's ability to add software applications or device drivers to the computer. Additionally, various techniques can be used to remove or reduce the functionality limitations of the computer.

REFERENCES:
patent: 5208853 (1993-05-01), Armbruster et al.
patent: 5293422 (1994-03-01), Loiacono
patent: 5349643 (1994-09-01), Cox et al.
patent: 5365587 (1994-11-01), Campbell et al.
patent: 5748960 (1998-05-01), Fischer
patent: 5944821 (1999-08-01), Angelo
patent: 5966691 (1999-10-01), Kibre et al.
patent: 5968136 (1999-10-01), Saulpaugh et al.
patent: 6175924 (2001-01-01), Arnold
patent: 6298025 (2001-10-01), McPherson et al.
patent: 6697948 (2004-02-01), Rabin et al.
patent: 0849658 (1998-06-01), None
Microsoft Computer Dictionary, Microsoft Press, 2002, fifth edition, pp. 276 and 378.
Watts, W., “The protection racket”, .EXE Magazine, vol. 5, Issue 5, Oct. 1990, pp. 12-13, 15-16 and 18.
Barbier, P., “Protection on a card with Argos”, Micro-Systemes, No. 76, Jun. 1987, pp. 86-87.
Ariet, B., “Methods for Protection against computer piracy, myth, and reality”, Micro-Systems, No. 101, Oct. 1989, pp. 75-81.
Holmes, B., “Single-copy security”, Software Protection, Systems International, vol. 16, No. 10, Oct. 1988, pp. 55-56.
Kuchinskas, S., “Aladdin knowledge Systems: securing the global village”, EContent, vol. 26, No. 5, May 2003, pp. 50-51.
Lutz, A., “Access Protection. The safe PC”, Personal Computer, No. 11, Nov. 1987, pp. 98, 100.
Yannicos, B., “Softguard protects programs. Copy protection module on the V.24 Interface”, Mikrocomputer-Zeitschrift, No. 1, 1986, pp. 52-53.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Restricted software and hardware usage on a computer does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Restricted software and hardware usage on a computer, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Restricted software and hardware usage on a computer will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4131622

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.