Security features in on-line and off-line delivery of applications
First Claim
1. A method for protecting against unauthorized use of an application on a computer system, comprising:
- (a) storing saved data associated with the application, wherein storing the saved data comprises binding usage information to the saved data, wherein the usage information includes one or more parameters set by the application indicating how the application has been used by a user; and
(b) processing a request to access the saved data, wherein processing the request comprises (i) performing an integrity check on the bound usage information and saved data, and (ii) denying access to the saved data if the integrity check determines that the usage information has been altered by a user.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for protecting against unauthorized use of an application on a computer system. First, saved data associated with the application is stored. Storing the save data includes binding usage information to the saved data, wherein the usage information includes one or more parameters set by the application indicating how the application has been used by a user. Then, a request to access the saved data is processed. Processing the request includes performing an integrity check on the bound usage information and saved data, and denying access to the saved data if the integrity check determines that the usage information has been altered by a user.
-
Citations
46 Claims
-
1. A method for protecting against unauthorized use of an application on a computer system, comprising:
-
(a) storing saved data associated with the application, wherein storing the saved data comprises binding usage information to the saved data, wherein the usage information includes one or more parameters set by the application indicating how the application has been used by a user; and
(b) processing a request to access the saved data, wherein processing the request comprises (i) performing an integrity check on the bound usage information and saved data, and (ii) denying access to the saved data if the integrity check determines that the usage information has been altered by a user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer system that provides protection against unauthorized use of an application, comprising:
-
means for storing saved data associated with an application, wherein the means for storing the saved data comprises means for binding usage information to the saved data, wherein the usage information includes one or more parameters set by the application indicating how the application has been used by a user; and
means for processing a request to access the saved data, wherein the means for processing the request comprises means for performing an integrity check on the bound usage information and saved data, and means for denying access to the saved data if the integrity check determines that the usage information has been altered by a user. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A method for protecting against unauthorized use of an application on a computer system, comprising:
-
(a) storing saved data associated with the application, wherein storing the saved data comprises (i) generating a checkword based on usage information associated with the application, wherein the usage information includes one or more parameters set by the application indicating how the application has been used by a user, and (ii) encrypting the saved data based on the checkword; and
(b) accessing the saved data from the repository, wherein accessing the saved data comprises (i) generating a new checkword based on the usage information, and (ii) decrypting the saved data based on the new checkword. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A computer system that protects against unauthorized use of an application, comprising:
-
means for storing saved data associated with the application, wherein the means for storing the saved data comprises means for generating a checkword based on usage information associated with the application, wherein the usage information includes one or more parameters set by the application indicating how the application has been used by a user, and means for encrypting the saved data based on the checkword; and
means for accessing the saved data, wherein the means for accessing the saved data comprises means for generating a new checkword based on the usage information, and means for decrypting the saved data based on the new checkword. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46)
-
Specification