System and method for selectively enabling access based on...

Data processing: financial – business practice – management – or co – Business processing using cryptography – Usage protection of distributed data files

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C705S052000, C707S793000, C707S793000

Reexamination Certificate

active

11026477

ABSTRACT:
Software lineages arise through purchase and reproduction. Lineages are tracked by storing lineage-relevant information in variable regions of software instances and/or in a central database according to methods disclosed.

REFERENCES:
patent: 3609697 (1971-09-01), Blevins et al.
patent: 3798605 (1974-03-01), Feistel
patent: 3806882 (1974-04-01), Clarke
patent: 3956615 (1976-05-01), Anderson et al.
patent: 4168396 (1979-09-01), Best
patent: 4253157 (1981-02-01), Kirschner et al.
patent: 4278837 (1981-07-01), Best
patent: 4319079 (1982-03-01), Best
patent: 4433207 (1984-02-01), Best
patent: 4458315 (1984-07-01), Uchenick
patent: 4528643 (1985-07-01), Freeny, Jr.
patent: 4593376 (1986-06-01), Volk
patent: 4658093 (1987-04-01), Hellman
patent: 4683553 (1987-07-01), Mollier
patent: 4688169 (1987-08-01), Joshi
patent: 4740890 (1988-04-01), William
patent: 4747139 (1988-05-01), Taaffe
patent: 4796220 (1989-01-01), Wolfe
patent: 4817140 (1989-03-01), Chandra et al.
patent: 4827508 (1989-05-01), Shear
patent: 4864494 (1989-09-01), Kobus, Jr.
patent: 4864616 (1989-09-01), Pond et al.
patent: 4888798 (1989-12-01), Earnest
patent: 4924378 (1990-05-01), Hershey et al.
patent: 4991208 (1991-02-01), Walker et al.
patent: 4998279 (1991-03-01), Weiss
patent: 4999806 (1991-03-01), Chernow et al.
patent: 5010571 (1991-04-01), Katznelson
patent: 5023907 (1991-06-01), Johnson et al.
patent: 5027398 (1991-06-01), Miyoshi
patent: 5046090 (1991-09-01), Walker et al.
patent: 5046092 (1991-09-01), Walker et al.
patent: 5047928 (1991-09-01), Wiedemer
patent: 5054064 (1991-10-01), Walker et al.
patent: 5058162 (1991-10-01), Santon et al.
patent: 5065429 (1991-11-01), Lang
patent: 5070479 (1991-12-01), Nakagawa
patent: 5099516 (1992-03-01), Durkin et al.
patent: 5103476 (1992-04-01), Waite et al.
patent: 5109413 (1992-04-01), Comerford et al.
patent: 5113518 (1992-05-01), Durst, Jr. et al.
patent: 5117458 (1992-05-01), Takaragi et al.
patent: 5119319 (1992-06-01), Tanenbaum
patent: 5126728 (1992-06-01), Hall
patent: 5166886 (1992-11-01), Molnar et al.
patent: 5193185 (1993-03-01), Lanter
patent: 5199066 (1993-03-01), Logan
patent: 5222134 (1993-06-01), Waite et al.
patent: 5235642 (1993-08-01), Wobber et al.
patent: 5257373 (1993-10-01), Kurihara et al.
patent: 5260999 (1993-11-01), Wyman
patent: 5291598 (1994-03-01), Grundy
patent: 5305447 (1994-04-01), Hampshire
patent: 5337360 (1994-08-01), Fischer
patent: 5363483 (1994-11-01), Jones et al.
patent: 5438508 (1995-08-01), Wyman
patent: 5479509 (1995-12-01), Ugon
patent: 5490216 (1996-02-01), Richardson, III
patent: 5509070 (1996-04-01), Schull
patent: 5530752 (1996-06-01), Rubin
patent: 5606609 (1997-02-01), Houser et al.
patent: 5629980 (1997-05-01), Stefik et al.
patent: 5634012 (1997-05-01), Stefik et al.
patent: 5638443 (1997-06-01), Stefik et al.
patent: 5649013 (1997-07-01), Stuckey et al.
patent: 5754864 (1998-05-01), Hill
patent: 5765152 (1998-06-01), Erickson
patent: 5790664 (1998-08-01), Coley et al.
patent: 5845281 (1998-12-01), Benson et al.
patent: 6243692 (2001-06-01), Floyd et al.
patent: 6256393 (2001-07-01), Safadi et al.
patent: 6266654 (2001-07-01), Schull
patent: 6298317 (2001-10-01), Wiemann
patent: 6343295 (2002-01-01), MacLeod et al.
patent: 6434558 (2002-08-01), MacLeod et al.
patent: 0 084 441 (1982-01-01), None
patent: 0 128 672 (1983-05-01), None
patent: 0 197 963 (1984-10-01), None
patent: 0 180 460 (1985-05-01), None
patent: 0 469 864 (1990-07-01), None
patent: 0 593 305 (1992-10-01), None
patent: 2136175 (1983-03-01), None
patent: WO 85/02310 (1983-11-01), None
patent: WO 90/02382 (1988-08-01), None
patent: WO 93/01550 (1991-07-01), None
patent: WO 98/16882 (1996-10-01), None
Anguita, Davide, “Smart Adaptive Systems: State of the Art and Future Directions of Research”, DIBE, University of Geneva, from the Internet at www.eunite.org, 2001.
Best, Robert M., “Preventing Software Piracy with Crypto-Microprocessors”, Digest of Papers, VLSI: New Architectural Horizons, Feb. 25-28, 1980, pp. 466-469.
Blom, Rolf, et al., “Encryption Methods in Data Networks”, Erickson Technics, No. 3, 1976, pp. 74-105.
Brändli, Martin, “A Process-Oriented Approach for Representing Lineage Information of Spatial Data”, 3rdAGILE Conference on Geographic Information Science, Helsinki/Espoo, Finland, May 25-27, 2000, pp. 126-130.
Diffie, Whitfield and Hellman, Martin E., “New Directions in Cryptography”, IEEE Transaction on Information Theory, vol. RR22, No. 6, Nov. 1976, pp. 644-653.
Diffie, Whitfield and Hellman, Martin E., “Privacy and Authentification: An Introduction to Cryptography”, Proceedings of the IEEE, vol. 67, No. 3, Mar. 1979, pp. 397-427.
Electronic Publishing Resources, Inc. “Protecting Electronically Published Properties Increasing Publishing Profits”, Chevy Chase, Maryland, pp. 1-8.
Goulde, Michael A., “Unix and NT Challenge”, Computerworld, Jul. 28, 1997, pp. 1-3.
Guillou, Louis C., “Smart Cards and Conditional Access”, Advances in Cryptology—Proceedings of EUROCRYPT 84, Editions Springer-Verlag, 1985, pp. 480-489.
Harrison, David R., “Client/Server Operating Systems: Challenges on All Fronts”, Network Computing, No. 508, 1994, pp. 1-3.
Herzberg, Amir and Pinter, Shlomit S., “Public Protection of Software”, ACM Transactions on Computer Systems, vol. 5, No. 4, Nov. 1987, pp. 371-393.
Kent, Stephen Thomas, “Protecting Externally Supplied Software in Small Computers”, Laboratory for Computer Science, Massachusetts Institute of Technology, Sep. 1980, pp. 1-253.
Mori, R. et al.,“Superdistribution: The Concept and the Architecture”,The Transactions of the IEICE, vol. E 73, No. 7, 1990, Tokyo, JP, pp. 1133-1146*Translation Only*.
Variar, Ganesh, “The Origin of Data”, IntelligentEnterprise, from the Internet at www.intelligententerprise.com/020201/503feat3—1.shtml, Feb. 1, 2002, pp. 1-6.
Weingart, Steve H., “Physical Security for the μABYSS System”, IBM Thomas J. Watson Research Center, Yorktown Heights, New York, 1987.
White, Steve R. and Comerford, Liam, “ABYSS: A Trusted Architecture for Software Protection”, IBM Thomas J. Watson Research Center, Yorktown Heights, New York, 1987, pp. 38-51.
Henry H. Perritt, Jr., Permissions Headers and Contract Law, paper for the conference on Technological Strategies For Protecting Intellectual Property In The Networked Multimedia Environment (Apr. 2-3, 1993).
Robert E. Kahn & Vinton G. Cerf, The Digital Library Project vol. 1: The World Of Knowbots (Draft), An Open Architecture For A Digital Library System And A Plan for It's Development, Corp. for National Research Initiatives (1988).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for selectively enabling access based on... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for selectively enabling access based on..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for selectively enabling access based on... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3781017

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.