Software fingerprinting and branding

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

380 4, 380 23, 380 25, H04L 900

Patent

active

060000309

ABSTRACT:
A method and apparatus for controlling the distribution of computer software products stored at a file server provide for requesting the identity of the user and the user's secret key prior to enabling access to a requested program product. The program product, upon proper verification of the user identify, is encoded using a second key which is known to the user, and preferably an identification of the user is embedded in the encoding program. Various methods are employed for tracking user access to particular programs, including storing the identify of the user either camouflaged in a commonly found program in non-volatile memory or hidden in a typically overlooked portion of non-volatile memory. In addition, the encoded program can have embedded therein one, and preferably two identifications of the user which can be used to track the program as well as to ensure that the program, when executed has not been tampered with. Upon execution of the encoded program by the user's system, the code is executed "on the fly" and no executable copy of the code is stored in non-volatile memory at any time. In the event that decoding does not result in a properly executable program, the system may need to be rebooted and/or the program may be at least partially destroyed.

REFERENCES:
patent: 4135240 (1979-01-01), Ritche
patent: 4646234 (1987-02-01), Tolman et al.
patent: 4652990 (1987-03-01), Pailen et al.
patent: 4688169 (1987-08-01), Joshi
patent: 4864494 (1989-09-01), Kobus, Jr.
patent: 4864616 (1989-09-01), Pond et al.
patent: 5210795 (1993-05-01), Lipner et al.
patent: 5241594 (1993-08-01), Kung
patent: 5416840 (1995-05-01), Cane et al.
patent: 5563946 (1996-10-01), Cooper et al.
Spender, "Technologial . . . PC", Dateline, Mar. 1985.
Fischer-Innis, "Watchdog . . . unleashed", Dateline, Aug. 23, 1985.
David Hammond, "Security . . . Option", Dateline, Feb. 26, 1996.
Rob Stuart et al., "How to stop . . . occurs", EMAP, Oct. 1989.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Software fingerprinting and branding does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Software fingerprinting and branding, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Software fingerprinting and branding will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-836717

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.