System and method of authenticating licensed computer programs
First Claim
1. A method for protecting the use of a program on a computer system by determining if said program is an authorized licensed copy, said method comprising the steps of:
- generating a license table for maintaining identification of authorized programs;
placing a license identifier in a first location in the license table;
placing a unique installation identifier in a second location in the license table;
placing a status code in a third location in the license table, said status code indicating if a license exists and if so a type of said license, and;
searching the license table for said license identifier to authenticate said authorized licensed copy.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for authorizing access to programs and data on a computer system is disclosed. A license table contains entries for identifying programs that are authorized to be run on the computer system. The license table is stored in an area of the computer'"'"'s hard disk that is not affected by disk operations and can not be accessed or modified by computer users. The license table entries are encoded to contain verifying information which is not based on the hardware upon which the program is installed. The license entries also contain usage restriction information to be decoded upon license verification.
20 Citations
20 Claims
-
1. A method for protecting the use of a program on a computer system by determining if said program is an authorized licensed copy, said method comprising the steps of:
-
generating a license table for maintaining identification of authorized programs;
placing a license identifier in a first location in the license table;
placing a unique installation identifier in a second location in the license table;
placing a status code in a third location in the license table, said status code indicating if a license exists and if so a type of said license, and;
searching the license table for said license identifier to authenticate said authorized licensed copy. - View Dependent Claims (2, 3, 4, 5, 6, 8)
-
-
7. A system for authentication of a protected computer program comprising:
-
a license table comprising a marker and a plurality of table entries, the marker signifying the location of the license table; and
a library comprising a customer identifier and product identifier, the library encrypting the customer identifier and the product identifier to form a license identifier, the library storing the license identifier as a table entry in the license table;
the library comparing a key transmitted by and end-user to the license identifier, the library allowing for the use of the program upon matching the license identifier to the key - View Dependent Claims (9, 10)
-
-
11. A method for authorizing a protected computer program comprising:
-
storing a customer identifier and product identifier in a library;
encoding a customer identifier and a product identifier into a license identifier;
storing the license identifier in a license table;
receiving an authorization request to the library, the request comprising a first key;
retrieving an identifier associated with the program from the license table;
encrypting the identifier to form an second key;
comparing the first key and the second key;
authorizing use of the program upon matching the first key to the second key. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification