Prevention of unauthorized software distribution
First Claim
1. A method to generate a medium to configure a processor-controlled system operating in an operating environment, the method comprising:
- receiving a set of instructions to configure the processor-controlled system; and
encrypting the set of instructions as a function of an identification code unique to the operating environment.
1 Assignment
0 Petitions
Accused Products
Abstract
Royalty and other fee collection for software upgrades and updates is facilitated by generating a software package that is unique to the system on which it is to be installed. As a result, when a consumer purchases a software upgrade, the upgrade can only be used on one particular system. In one implementation, distribution of upgrades and updates for a vehicle audio system is controlled by encrypting the vehicle identification number (VIN) of a vehicle into the software package used for the upgrade or update. The software package can only be used to upgrade software residing on the vehicle corresponding to the VIN. As a result, unauthorized distribution of the software package is prevented.
-
Citations
31 Claims
-
1. A method to generate a medium to configure a processor-controlled system operating in an operating environment, the method comprising:
-
receiving a set of instructions to configure the processor-controlled system; and
encrypting the set of instructions as a function of an identification code unique to the operating environment. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method to configure a processor-controlled system operating in an operating environment, the method comprising:
-
receiving an encrypted set of instructions;
decrypting the encrypted set of instructions to generate a validation code;
comparing the validation code with a identification code unique to the operating environment; and
configuring the processor-controlled system as a function of the decrypted set of instructions only if the validation code matches the identification code. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A processor-readable medium having processor-executable instructions for:
-
receiving a set of instructions to configure a processor-controlled system operating in an operating environment; and
encrypting the set of instructions as a function of an identification code unique to the operating environment. - View Dependent Claims (16, 17)
-
-
18. A processor-readable medium having processor-executable instructions for:
-
receiving an encrypted set of instructions;
decrypting the encrypted set of instructions to generate a validation code;
comparing the validation code with a identification code unique to an operating environment; and
configuring a processor-controlled system operating in the operating environment as a function of the decrypted set of instructions only if the validation code matches the identification code. - View Dependent Claims (19, 20, 21)
-
-
22. A processor-readable medium comprising:
-
a set of processor-executable instructions for configuring a processor-controlled system operating in an operating environment; and
a validation code encrypted into the set of processor-executable instructions, wherein the set of processor-executable instructions is configured to be executed only if the validation code matches an identification code unique to the operating environment. - View Dependent Claims (23, 24, 25)
-
-
26. A processor-controlled system operating in an operating environment, the processor-controlled system comprising:
-
an input subsystem configured to receive an encrypted set of instructions; and
a processor coupled to the input subsystem and configured to decrypt the encrypted set of instructions to generate a validation code, compare the validation code with a identification code unique to the operating environment, and configure the processor-controlled system as a function of the decrypted set of instructions only if the validation code matches the identification code. - View Dependent Claims (27, 28, 29, 30, 31)
-
Specification