Electrical computers and digital processing systems: support – Computer program modification detection by cryptography
Reexamination Certificate
2006-05-23
2006-05-23
Vu, Kim (Department: 2135)
Electrical computers and digital processing systems: support
Computer program modification detection by cryptography
C713S193000, C713S152000, C713S152000, C380S201000, C380S277000, C380S286000, C705S051000, C705S056000, C705S057000, C705S059000, C717S174000, C717S176000, C717S177000, C717S178000
Reexamination Certificate
active
07051211
ABSTRACT:
Methods, systems and computer program products are provide for controlling access to software is provided by the software to be controlled being divided into a first encrypted portion and a second unencrypted portion. The second unencrypted portion has access to, and may even incorporate, a first secret value and a software identification associated with a copy of the software. The first encrypted portion is encrypted with a first key value which is based on the first secret value and a second secret value. The second secret value is obtained and the first key value generated from the obtained second secret value and the first secret value. The first encrypted portion of the software may then be decrypted with the first key value. The software may be installed on a data processing system utilizing the decrypted first encrypted portion of the software.
REFERENCES:
patent: 4471163 (1984-09-01), Donald et al.
patent: 4525599 (1985-06-01), Curran et al.
patent: 4593353 (1986-06-01), Pickholtz
patent: 4634807 (1987-01-01), Chorley et al.
patent: 4757534 (1988-07-01), Matyas et al.
patent: 4817140 (1989-03-01), Chandra et al.
patent: 5024495 (1991-06-01), Anderson
patent: 5267311 (1993-11-01), Bakhoum
patent: 5287407 (1994-02-01), Holmes
patent: 5337357 (1994-08-01), Chou et al.
patent: 5390297 (1995-02-01), Barber et al.
patent: 5416840 (1995-05-01), Cane et al.
patent: 5666411 (1997-09-01), McCarty
patent: 5757907 (1998-05-01), Cooper et al.
patent: 5870726 (1999-02-01), Lorphelin
patent: 5915019 (1999-06-01), Ginter et al.
patent: 5915025 (1999-06-01), Taguchi et al.
patent: 5920630 (1999-07-01), Wertheimer et al.
patent: 5974141 (1999-10-01), Saito
patent: 6000030 (1999-12-01), Steinberg et al.
patent: 6002772 (1999-12-01), Saito
patent: 6044469 (2000-03-01), Horstmann
patent: 6226747 (2001-05-01), Larsson et al.
patent: 6408390 (2002-06-01), Saito
patent: 6483921 (2002-11-01), Harkins
patent: 6744894 (2004-06-01), Saito
Schneier, Bruce,Applied Cryptography: Protocols, Algorithms, and Source Code in C, Chapter 14, (Dec. 1995).
Manezes, Alfred J., et al.,Security of RSA, Handbook of Applied Cryptography, Chapters 7 and 15 (1997).
Federal Information Processing Standards Publication 46-2, Data Encryption Standard (DES), Dec. 30, 1993.
Federal Information Processing Standards Publication 46-3, Data Encryption Standard (DES), Oct. 25, 1999.
Matyas, Jr. Stephen Michael
Peyravian Mohammad
Roginsky Allen Leonid
Zunic Nevenko
Dada Beemnet W.
International Business Machines - Corporation
Myers Bigel & Sibley & Sajovec
Vu Kim
LandOfFree
Secure software distribution and installation does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Secure software distribution and installation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Secure software distribution and installation will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3641447