Method for monitoring software using encryption including digital signatures/certificates
First Claim
1. A method for reducing unauthorized use of computer software, the method comprising:
- contacting a computer software representative to obtain an activation code to authorize continued operation of the computer software on a computer such that the computer software is useable without requiring continuous contact with the computer software representative;
collecting registration information from at least one of the computer software user and the computer upon contact with the computer software representative;
transferring an activation code from the computer software representative to at least one of the computer software, the computer software user, and the computer using a digital signature or certificate to resist modification of the activation code;
verifying authenticity of the digital signature or certificate before allowing the computer software to operate on the computer; and
repeating the steps of contacting, collecting, transferring, and verifying at predetermined periods.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system for reducing unauthorized software use include generating a key based on computer-specific information of a computer on which the software is installed and using the key to encrypt an authorization code which enables use of the software on the computer. A representative maintains contact with the software user as a new authorization code from the representative is required after some period of use of the software. The representative encrypts the new password using the key and transfers the encrypted key to authorize use of the software for a next period of use. The encrypted password is a form of digital signature or certificate which is unique to a particular computer and limits use of the software to the particular computer. The key may be generated using various computer-specific information such as the motherboard/processor identification, the number of bad sectors or hard disk identification, and/or the amount of installed memory.
-
Citations
40 Claims
-
1. A method for reducing unauthorized use of computer software, the method comprising:
-
contacting a computer software representative to obtain an activation code to authorize continued operation of the computer software on a computer such that the computer software is useable without requiring continuous contact with the computer software representative;
collecting registration information from at least one of the computer software user and the computer upon contact with the computer software representative;
transferring an activation code from the computer software representative to at least one of the computer software, the computer software user, and the computer using a digital signature or certificate to resist modification of the activation code;
verifying authenticity of the digital signature or certificate before allowing the computer software to operate on the computer; and
repeating the steps of contacting, collecting, transferring, and verifying at predetermined periods. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for reducing unauthorized use of computer software by limiting use of the computer software to a specific computer, the method comprising:
-
automatically collecting computer-specific information from the computer and transferring the collected computer-specific information to a computer software agent;
encrypting digital information at least partially using the computer-specific information;
receiving the encrypted digital information from the computer software agent;
allowing the computer software to operate on the computer during an authorization period only if the digital information can be decrypted by the computer using the computer-specific information; and
repeating the steps of automatically collecting, encrypting, receiving, and allowing at predetermined periods. - View Dependent Claims (17, 18, 19, 20, 21, 22, 24, 25)
-
-
23. The method of 16 wherein:
the authorization period is based on elapsed running time of the computer software.
-
26. A method for providing periodic contact with a computer software user to repeatedly transfer information to the computer software user, the method comprising:
-
contacting a computer software agent to obtain an activation code to authorize continued operation of computer software on a computer such that the computer software is useable without requiring continuous contact with the computer software agent;
receiving registration material from at least one of the computer software user and the computer upon contact with the computer software agent;
encrypting at least a portion of information to be transferred to the computer software user based on the registration material;
transferring the information to the computer software user using a digital signature, a digital certificate, or a digital wrapper; and
repeating the steps of contacting, receiving, encrypting, and transferring at predetermined periods. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
Specification