Remote authorization for unlocking electronic data system and method
First Claim
1. A method for controlling unauthorized use of software distributed by a software vendor to a group of users with the group having group-identifying information, comprising the steps of:
- generating, with a digital signature algorithm, a verification key with a product key generator;
combining software and the verification key to create distributable software;
distributing the distributable software to a user within the group of users;
inputting group-identifying information to a user key generator;
converting, by the user key generator, the group-identifying information to a numeric representation;
generating, using the numeric representation, a user key, with the digital signature algorithm;
conveying the user key to the user computer system; and
verifying, with the verification key, a relationship between the user key and the group-identifying information to determine an access level to the protected software.
1 Assignment
0 Petitions
Accused Products
Abstract
Controlling unauthorized access to software distributed to a user by a vendor. A verification key is generated by a product key generator and either embedded in the software prior to distribution or packaged with the software as a self-installing package. The verification key includes a public verification key. The combination of the software and the verification key create distributable software which is distributed to a user. The user installs the software on a user computer system as protected software. To obtain a user key, the user inputs identifying information, which may be for the user or for a group, which is sent to a user key generator. The user key generator converts the identifying information to a numeric representation and then generates, by signing the numeric representation with the private signing key, a user key, which is returned to the user. Using the verification key, a user key verifier verifies a relationship between the user key and the identifying information to determine an access level to the protected software. The system verifies the relationship between the user key and the identifying information every time the software is run to ensure continued protection of the software after installation.
25 Citations
36 Claims
-
1. A method for controlling unauthorized use of software distributed by a software vendor to a group of users with the group having group-identifying information, comprising the steps of:
-
generating, with a digital signature algorithm, a verification key with a product key generator;
combining software and the verification key to create distributable software;
distributing the distributable software to a user within the group of users;
inputting group-identifying information to a user key generator;
converting, by the user key generator, the group-identifying information to a numeric representation;
generating, using the numeric representation, a user key, with the digital signature algorithm;
conveying the user key to the user computer system; and
verifying, with the verification key, a relationship between the user key and the group-identifying information to determine an access level to the protected software. - View Dependent Claims (2, 3, 4, 5, 6, 7, 18)
-
-
8. A system for controlling unauthorized use of software distributed to a group of users by a vendor, with the group having group-identifying information, comprising:
-
a product key generator for generating, with a digital signature algorithm, a verification key to accompany the software at distribution;
a user key generator for generating, responsive to group-identifying information, using the digital signature algorithm, an user key using a numeric representation of the group-identifying information; and
a user key verifier for validating, using the verification key, a relationship between the user key and the numeric representation of the group-identifying information to determine an access level to the software. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
19. A method for controlling unauthorized use of software distributed by a software vendor comprising the steps of:
-
generating, with a digital signature algorithm, a verification key with a product key generator;
combining software and the verification key to create distributable software;
distributing the distributable software to a user;
inputting identifying information to a user key generator;
converting, by the user key generator, the identifying information to a numeric representation;
generating, using the numeric representation, a user key, with the digital signature algorithm;
conveying the user key to the user computer system; and
verifying, with the verification key, a relationship between the user key and the identifying information to determine an access level to the protected software. - View Dependent Claims (20, 21, 22, 23, 24, 25, 36)
-
-
26. A system for controlling unauthorized use of software distributed to a user by a vendor, comprising:
-
a product key generator for generating, with a digital signature algorithm, a verification key to accompany the software at distribution;
a user key generator for generating, responsive to identifying information, using the digital signature algorithm, an user key using a numeric representation of the identifying information; and
a user key verifier for validating, using the verification key, a relationship between the user key and the numeric representation of the identifying information to determine an access level to the software. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35)
-
Specification