System and method for controlling access to protected information
First Claim
1. A method for providing a password to a first program to control access to protected information, the method comprising:
- receiving a first identifier, the first identifier being based at least in part on one or more characteristics of an entity to which access to the protected information is linked;
generating a password, based at least in part on the first identifier, which password may only be validated using at least data accessible to the first program including the first identifier; and
storing the password in a first location accessible to the first program.
4 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus of encouraging distribution, registration, and purchase of free copyable software and other digital information which is accessed on a User'"'"'s System via a Programmer'"'"'s Program. Software tools which can be incorporated into a Programmer'"'"'s Program allow the User to access Advanced Features of the Programmer'"'"'s Program only in the presence of a valid Password which is unique to a particular Target ID generated on an ID-Target such as the User'"'"'s System. Advanced features will thus re-lock if the Password is copied to another ID-target. If a valid Password is not present, the User is invited to obtain one, and provided with the means of doing so, and of installing that Password in a place accessible to the User'"'"'s System on subsequent occasions. The present invention also provides Programmers with means to invoke business operations as well as computational operations with their programs, and thus to automatically obtain payment from Users who elect to obtain passwords.
112 Citations
28 Claims
-
1. A method for providing a password to a first program to control access to protected information, the method comprising:
-
receiving a first identifier, the first identifier being based at least in part on one or more characteristics of an entity to which access to the protected information is linked;
generating a password, based at least in part on the first identifier, which password may only be validated using at least data accessible to the first program including the first identifier; and
storing the password in a first location accessible to the first program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
- 8. The method of 1, wherein the first identifier is based at least in part on a characteristic of a user of the first program.
-
27. A method for providing a password to a first program to access protected information, the method comprising:
-
a user processor generating a first identifier using information about the user processor;
transmitting the first identifier from the user processor to a licensing processor;
the licensing processor generating a password, based at least in part on the first identifier, which password may only be validated using at least data accessible to the first program including the first identifier; and
transmitting the generated password from the licensing processor to the user processor.
-
-
28. A method for controlling access to protected information using a first program, the method comprising:
-
generating a first identifier, the first identifier being based at least in part on one or more characteristics of an entity to which access to the protected information is linked;
transmitting the first identifier to a licensing processor;
receiving a password based at least in part on the first identifier, which password may only be validated using at least data accessible to the first program including the first identifier; and
storing the password in a first location accessible to the first program.
-
Specification