Electrical computers and digital processing systems: support – Data processing protection using cryptography – By stored data protection
Reexamination Certificate
2007-11-27
2007-11-27
Zand, Kambiz (Department: 2134)
Electrical computers and digital processing systems: support
Data processing protection using cryptography
By stored data protection
Reexamination Certificate
active
10337064
ABSTRACT:
Systems and methods for implementing a hardware ID with time- and weight-based flexibility use a hardware ID (HWID) including identifying information about hardware components. When software is run, a current HWID is generated. When the current HWID is compared to a stored HWID to determine if the two HWIDs match, a time vector and a weight vector are used in the comparison. A running matching score is kept of matches. For each hardware component, the weight vector indicates the weight given to a correct match of the hashed value for the hardware component. For example, if the weight value for the hardware component is three and there is a match, then the running total is increased by three. For each hardware component, the time vector may indicate an expiration period after which a change in the component may be allowed. For example, if the expiration period for the component is one year, and one year has passed since activation, the running total may be increased even though the component's information in the verification HWID does not match the current component information.
REFERENCES:
patent: 5715403 (1998-02-01), Stefik
patent: 5815709 (1998-09-01), Waldo et al.
patent: 6148407 (2000-11-01), Aucsmith
patent: 6243468 (2001-06-01), Pearce et al.
patent: 2001/0044782 (2001-11-01), Hughes et al.
patent: 2002/0112176 (2002-08-01), Murray
patent: 2002/0147922 (2002-10-01), Hartinger et al.
patent: 2003/0126456 (2003-07-01), Birzer et al.
patent: 2004/0073789 (2004-04-01), Powers
patent: WO 00/72119 (2000-11-01), None
Beese, L.J. “Security Strategy for Networked Computers”,Proceedings of the1987 Carnahan Conference on Security Technology:Electronic Crime Countermeasures, 1987, 141-147.
Devanbu, P. et al., “Research Directions for Automated Software Verification; Using Trusted Hardware”,Proceedings. 12thIEEE International Conference Automated Software Engineering(Cat. No.97TB100200). 1997, 274-279.
Griswold, G.N., “A Method for Protecting Copyright on Networks”,IMA Intellectual Property Project Proceedings, 1994, 1(1), 169-178.
Kahn, R.E., “Deposit, Registration, and Recordation in an Electronic Copyright Management System”,IMA Intellectual Property Project Proceedings, 1994, 1(1), 111-120.
Lindqvist, U. et al., “An Analysis of a Secure System Based on Trusted Components”,COMPASS '96. Proceedings of the Eleventh Annual Conference on Computer Assurance. Systems Integrity. Software Safety. Process Security(Cat. No. 96CH35960), 1996, 213-223.
Smith, S.W. et al., “Trusting Trusted Hardware: Towards a Formal Model for Programmable Secure Coprocessors”,Proceedings of the 3rdUSENIX Workshop on Electronic Commerce, 1998, 83-98.
Weinberg, J. “Hardware-based ID, rights management, and trusted systems”,Journal, 2000, 52(5), 1251-1281.
Dublish Pratul
Gunyakti Caglar
Hughes Aidan T.
Woodcock & Washburn LLP
Wyszynski Aubrey H
Zand Kambiz
LandOfFree
Systems and methods for providing time-and weight-based... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Systems and methods for providing time-and weight-based..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for providing time-and weight-based... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3869801