Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Particular communication authentication technique
Reexamination Certificate
2011-02-01
2011-02-01
Zand, Kambiz (Department: 2434)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Particular communication authentication technique
C713S175000, C726S027000
Reexamination Certificate
active
07882358
ABSTRACT:
Embodiments of the present invention relate to systems and methods to authenticate software licenses. One embodiment of the present invention comprises a method where a vendor creates a reversible hash from a known, predetermined seed value, encrypts the hash to generate a digital signature, and sends the digital signature to the customer. The customer enters the digital signature. The customer's client computer reverses the reversible hash to obtain a determined seed value. The client has access to the known seed value used by the vendor. The known seed value is compared to the determined seed value. If the seed values compare, the software license and the associated software is authenticate.
REFERENCES:
patent: 5343527 (1994-08-01), Moore
patent: 5745574 (1998-04-01), Muftic
patent: 5892829 (1999-04-01), Aiello et al.
patent: 6128737 (2000-10-01), Jakubowski et al.
patent: 6711680 (2004-03-01), Cordery
patent: 6851052 (2005-02-01), Graveman
patent: 6928162 (2005-08-01), Heddes et al.
patent: 6959384 (2005-10-01), Serret-Avila
patent: 6976162 (2005-12-01), Ellison et al.
patent: 6976165 (2005-12-01), Carpentier et al.
patent: 2003/0046566 (2003-03-01), Holopainen
patent: 2003/0084308 (2003-05-01), Van Rijnswou
patent: 2004/0064704 (2004-04-01), Rahman
patent: 2005/0210260 (2005-09-01), Venkatesan et al.
patent: 2009/0003597 (2009-01-01), Gantman et al.
Oehler et al., HMAC-MD5 IP Authentication with Replay Prevention, Feb. 1997, RC#2085.
Bellare et al., Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm, ACM Transactions on ISS, vol. 7(2), May 2004, pp. 206-241.
Preneel, Bart, The State of Cryptographic Hash Functions, Lectures on Data Security, pp. 158-182, (1999).
Hughes Aidan T.
Tankovich Vladimir
Guirguis Michael
Merchant & Gould P.C.
Microsoft Corporation
Zand Kambiz
LandOfFree
Reversible hashing for E-signature verification does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Reversible hashing for E-signature verification, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Reversible hashing for E-signature verification will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2623012