HARDWARE BASED METHOD FOR DIGITAL RIGHTS MANAGEMENT INCLUDING SELF ACTIVATING/SELF AUTHENTICATION SOFTWARE
First Claim
1. A method for securing software to reduce unauthorized use, the method comprising:
- providing at least one hardware based authorized representative entity installed on or in a user device;
obtaining registration information corresponding to at least one user device;
generating an authentication code at least partially based on the registration information;
associating the authentication code with the software;
determining whether a current user device is authorized based on the authentication code associated with the software and registration information associated with the current user device; and
controlling access to the software based on whether the current user device is authorized.
1 Assignment
0 Petitions
Accused Products
Abstract
Hardware based digital rights management includes designating software for protection via a code or identifier associated with the software and detected by a hardware based authorized representative entity resident on a user computer, network, or device, remotely located relative to the user, or both. Representative hardware based implementations may be in the form of a chip, chipset, PC card, processor, and/or integral with a CPU, preferably supplied on an OEM basis. Authorized representative functions are programmable and/or hard coded. Software/digital content is self-activating/self-authenticating when used in conjunction with a resident authorized administrator. During the first use or transfer of content designated for protection, the authorized representative generates a password or authentication code at least partially based on registration information including user system information and links the code to the content. Registration information associated with the user/device remains within a trusted network associated with the user providing optimal user privacy.
-
Citations
99 Claims
-
1. A method for securing software to reduce unauthorized use, the method comprising:
-
providing at least one hardware based authorized representative entity installed on or in a user device;
obtaining registration information corresponding to at least one user device;
generating an authentication code at least partially based on the registration information;
associating the authentication code with the software;
determining whether a current user device is authorized based on the authentication code associated with the software and registration information associated with the current user device; and
controlling access to the software based on whether the current user device is authorized. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A method for securing software to reduce unauthorized use having an hardware based authorized representative entity installed on or in a user device, the method comprising:
-
determining whether the user device is authorized to access the software using the authorized representative entity; and
controlling access to the software based on whether the user device is determined to be authorized. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 82, 99)
-
-
78. A method for reducing unauthorized use of software, the method comprising:
-
associating at least one identifier with the software corresponding to a request for digital rights management;
distributing the software to a user;
detecting the at least one identifier using an authorized representative entity;
associating at least one authentication code with the software;
determining whether a user device is authorized to access the software; and
controlling access to the software based on whether the user device is authorized. - View Dependent Claims (79, 80, 81, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98)
-
Specification