Method and system for authenticating software
First Claim
1. A method of authenticating software, the method comprising:
- receiving, at a mobile terminal, an execution instruction for software installed in the mobile terminal;
generating a first code for the software;
generating a first authentication key based on a mobile terminal identifier of the mobile terminal and the first code; and
executing the installed software only if the first authentication key corresponds to a second authentication key stored in the mobile terminal.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method and system for authenticating software. One embodiment of the invention provides a system for authenticating software in a mobile terminal, wherein the system is configured to: receive an execution instruction for software installed in the mobile terminal through an inputting means, generate a first error code for the software, extract a mobile terminal identifier of the mobile terminal, generate a first authentication key by combining the mobile terminal identifier and the first error code, and execute the software when the first authentication key corresponds to a second authentication key stored in the mobile terminal. By authenticating the software for a wireless mobile terminal, one embodiment of the invention can prevent unauthorized duplication and execution of the software at the mobile terminal.
-
Citations
24 Claims
-
1. A method of authenticating software, the method comprising:
-
receiving, at a mobile terminal, an execution instruction for software installed in the mobile terminal;
generating a first code for the software;
generating a first authentication key based on a mobile terminal identifier of the mobile terminal and the first code; and
executing the installed software only if the first authentication key corresponds to a second authentication key stored in the mobile terminal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 20)
-
-
10. A method of authenticating software between a server and a mobile terminal communicating data through a network, the method comprising:
-
receiving, at the server, a download request signal from the mobile terminal, wherein the download request signal includes a mobile terminal identifier of the mobile terminal;
identifying the mobile terminal based on the mobile terminal identifier;
determining whether or not the software is authorized to be downloaded to the mobile terminal;
obtaining software data corresponding to the download request signal;
generating, a code for the software data, corresponding to the mobile terminal;
generating a download file including the software data and the code; and
transmitting the download file to the mobile terminal, wherein the generated code, in combination with the mobile terminal identifier, is configured to control the execution of the software at the mobile terminal. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
21. A system for authenticating software between a server and a mobile terminal communicating data through a network, wherein the system is configured to i) receive a download request signal from the mobile terminal, ii) obtain software data corresponding to the download request signal, iii) generate a code, for the software data, corresponding to the mobile terminal, iv) generate a download file including the software data and the code, and v) transmit the download file to the mobile terminal,
and wherein the generated code, in combination with a mobile terminal identifier of the mobile terminal, is configured to control the execution of the software at the mobile terminal.
-
23. One or more processor readable storage devices having processor readable code embodied on the processor readable storage devices, the processor readable code for programming one or more processors to perform a method of identifying extreme behavior in elements of a network, the method comprising:
-
receiving, at a mobile terminal, an execution instruction for software installed in the mobile terminal;
generating a first code for the software;
generating a first authentication key based on a mobile terminal identifier of the mobile terminal and the first code; and
executing the installed software only if the first authentication key corresponds to a second authentication key stored in the mobile terminal.
-
-
24. A system for authenticating software, the system comprising:
-
means for receiving, at a mobile terminal, an execution instruction for software installed in the mobile terminal;
means for generating a first code for the software;
means for generating a first authentication key based on a mobile terminal identifier of the mobile terminal and the first code; and
means for executing the installed software only if the first authentication key corresponds to a second authentication key stored in the mobile terminal.
-
Specification