Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files
Reexamination Certificate
2006-06-20
2006-06-20
Cangialosi, Salvatore (Department: 3621)
Data processing: financial, business practice, management, or co
Business processing using cryptography
Usage protection of distributed data files
C705S055000
Reexamination Certificate
active
07065508
ABSTRACT:
A method and apparatus of encouraging distribution, registration, and purchase of free copyable software and other digital information which is accessed on a User's System via a Programmer's Program. Software tools which can be incorporated into a Programmer's Program allow the User to access Advanced Features of the Programmer's Program only in the presence of a valid Password which is unique to a particular Target ID generated on an ID-Target such as the User's System. Advanced features will thus re-lock if the Password is copied to another ID-target. If a valid Password is not present, the User is invited to obtain one, and provided with the means of doing so, and of installing that Password in a place accessible to the User's System on subsequent occasions. The present invention also provides Programmers with means to invoke business operations as well as computational operations with their programs, and thus to automatically obtain payment from Users who elect to obtain passwords.
REFERENCES:
patent: 3609697 (1971-09-01), Blevins et al.
patent: 3798605 (1974-03-01), Feistel
patent: 3806882 (1974-04-01), Clarke
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4168396 (1979-09-01), Best
patent: 4253157 (1981-02-01), Kirschner et al.
patent: 4278837 (1981-07-01), Best
patent: 4319079 (1982-03-01), Best
patent: 4433207 (1984-02-01), Best
patent: 4458315 (1984-07-01), Uchenick
patent: 4528643 (1985-07-01), Freeny, Jr.
patent: 4593376 (1986-06-01), Volk
patent: 4658093 (1987-04-01), Hellman
patent: 4683553 (1987-07-01), Mollier
patent: 4685055 (1987-08-01), Thomas
patent: 4688169 (1987-08-01), Joshi
patent: 4740890 (1988-04-01), William
patent: 4747139 (1988-05-01), Taaffe
patent: 4757534 (1988-07-01), Matyas et al.
patent: 4796220 (1989-01-01), Wolfe
patent: 4817140 (1989-03-01), Chandra et al.
patent: 4827508 (1989-05-01), Shear
patent: 4864494 (1989-09-01), Kobus, Jr.
patent: 4864616 (1989-09-01), Pond et al.
patent: 4885778 (1989-12-01), Weiss
patent: 4888798 (1989-12-01), Earnest
patent: 4896346 (1990-01-01), Belfield et al.
patent: 4924378 (1990-05-01), Hershey et al.
patent: 4949248 (1990-08-01), Caro
patent: 4949379 (1990-08-01), Cordell
patent: 4991208 (1991-02-01), Walker et al.
patent: 4998279 (1991-03-01), Weiss
patent: 4999806 (1991-03-01), Chernow et al.
patent: 5010571 (1991-04-01), Katznelson
patent: 5023907 (1991-06-01), Johnson et al.
patent: 5027398 (1991-06-01), Miyoshi
patent: 5046090 (1991-09-01), Walker et al.
patent: 5046092 (1991-09-01), Walker et al.
patent: 5047928 (1991-09-01), Wiedemer
patent: 5054064 (1991-10-01), Walker et al.
patent: 5058162 (1991-10-01), Santon et al.
patent: 5065429 (1991-11-01), Lang
patent: 5070479 (1991-12-01), Nakagawa
patent: 5099516 (1992-03-01), Durkin et al.
patent: 5103476 (1992-04-01), Waite et al.
patent: 5109413 (1992-04-01), Comerford et al.
patent: 5113518 (1992-05-01), Durst, Jr. et al.
patent: 5117458 (1992-05-01), Takaragi et al.
patent: 5119319 (1992-06-01), Tanenbaum
patent: 5126728 (1992-06-01), Hall
patent: 5138712 (1992-08-01), Corbin
patent: 5166866 (1992-11-01), Molnar et al.
patent: 5199066 (1993-03-01), Logan
patent: 5222134 (1993-06-01), Waite et al.
patent: 5235642 (1993-08-01), Wobber et al.
patent: 5257373 (1993-10-01), Kurihara et al.
patent: 5260999 (1993-11-01), Wyman
patent: 5291598 (1994-03-01), Grundy
patent: 5293452 (1994-03-01), Picone et al.
patent: 5305447 (1994-04-01), Hampshire
patent: 5337360 (1994-08-01), Fischer
patent: 5363483 (1994-11-01), Jones et al.
patent: 5438508 (1995-08-01), Wyman
patent: 5479509 (1995-12-01), Ugon
patent: 5495411 (1996-02-01), Ananda
patent: 5509070 (1996-04-01), Schull
patent: 5530752 (1996-06-01), Rubin
patent: 5606609 (1997-02-01), Houser et al.
patent: 5629980 (1997-05-01), Stefik et al.
patent: 5634012 (1997-05-01), Stefik et al.
patent: 5638443 (1997-06-01), Stefik et al.
patent: 5649013 (1997-07-01), Stuckey et al.
patent: 5717604 (1998-02-01), Wiggins
patent: 5754864 (1998-05-01), Hill
patent: 5765152 (1998-06-01), Erickson
patent: 5790664 (1998-08-01), Coley et al.
patent: 5933497 (1999-08-01), Beetcher et al.
patent: 6243692 (2001-06-01), Floyd et al.
patent: 6256393 (2001-07-01), Safadi et al.
patent: 6266654 (2001-07-01), Schull
patent: 6298317 (2001-10-01), Wiemann
patent: 6343280 (2002-01-01), Clark
patent: 6343295 (2002-01-01), MacLeod et al.
patent: 6434558 (2002-08-01), MacLeod et al.
patent: 6829368 (2004-12-01), Meyer et al.
patent: 0 084 441 (1982-01-01), None
patent: 0 128 672 (1983-05-01), None
patent: 0 197 963 (1984-10-01), None
patent: 0 180 460 (1985-05-01), None
patent: 0 593 305 (1992-10-01), None
patent: 2136175 (1983-03-01), None
patent: WO 85/02310 (1983-11-01), None
patent: WO 90/02382 (1988-08-01), None
patent: WO 93/01550 (1991-07-01), None
patent: WO 98/16882 (1996-10-01), None
Anguita, Davide, “Smart Adaptive Systems: State of the Art and Future Directions of Research”, DIBE, University of Geneva, from the Internet at www.eunite.org, 2001.
Best, Robert M., “Preventing Software Piracy with Crypto-Microprocessors”, Digest of Papers, VLSI: New Architectural Horizons, Feb. 25-28, 1980, pp. 466-469.
Blom, Rolf, et al., “Encryption Methods in Data Networks”, Erickson Technics, No. 3, 1976, pp. 74-105.
Brändli, Martin, “A Process-Oriented Approach for Representing Lineage Information of Spatial Data”, 3rdAGILE Conference on Geographic Information Science, Helsinki/Espoo, Finland, May 25-27, 2000, pp. 126-130.
Diffie, Whitfield and Hellman, Martin E., “New Directions in Cryptography”, IEEE Transaction on Information Theory, vol. RR22, No. 6, Nov. 1976, pp. 644-653.
Diffie, Whitfield and Hellman, Martin E., “Privacy and Authentification: An Introduction to Cryptography”, Proceedings of the IEEE, vol. 67, No. 3, Mar. 1979, pp. 397-427.
Goulde, Michael A., “Unix and NT Challenge”, Computerworld, Jul. 28, 1997, pp. 1-3.
Guillou, Louis C., “Smart Cards and Conditional Access”, Advances in Cryptology—Proceedings of EUROCRYPT 84, Editions Springer-Verlag, 1985, pp. 480-489.
Harrison, David R., “Client/Server Operating Systems: Challenges on All Fronts”, Network Computing, No. 508, 1994, pp. 1-3.
Herzberg, Amir and Pinter, Shlomit S., “Public Protection of Software”, ACM Transactions on Computer Systems, vol. 5, No. 4, Nov. 1987, pp. 371-393.
Kent, Stephen Thomas, “Protecting Externally Supplied Software in Small Computers”, Laboratory for Computer Science, Massachusetts Institute of Technology, Sep. 1980, pp. 1-253.
Mori, R. et al., “Superdistribution: The Concept and the Architecture”,The Transactions of the IEICE, vol. E 73, No. 7, 1990, Tokyo, JP, pp. 1133-1146*Translation Only*.
Variar, Ganesh, “The Origin of Data”, IntelligentEnterprise, from the Internet at www.intelligententerprise.com/020201/503feat3—l.shtml, Feb. 1, 2002, ps. 1-6.
Weingart, Steve H., “Physical Security for the μABYSS System”, IBM Thomas J. Watson Research Center, Yorktown Heights, New York, 1987.
White, Steve R. and COMERFORD, Liam, “ABYSS: A Trusted Architecture for Software Protection”, IBM Thomas J. Watson Research Center, Yorktown Heights, New York, 1987, pp. 38-51.
Brown & Raysman Millstein Felder & Steiner LLP
Cangialosi Salvatore
SL Patent Holdings LLC
LandOfFree
System and method for operating a licensing server does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for operating a licensing server, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for operating a licensing server will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3710362