Remote Authorization for Unlocking Electronic Data System and Method
First Claim
1. A method for controlling unauthorized use of software distributed by a vendor, comprising the steps of:
- generating, with a digital signature algorithm, a verification key;
combining the software and the verification key to create distributable software;
inputting identifying information;
generating, with the digital signature algorithm using the identifying information, a user key;
conveying the user key to a user computer system; and
verifying, with the verification key, a relationship between the user key and the identifying information to determine an access level to the software.
1 Assignment
0 Petitions
Accused Products
Abstract
Controlling unauthorized access to software distributed to a user by a vendor. A verification key is generated by a product key generator and either embedded in the software prior to distribution or packaged with the software as a self-installing package. The verification key includes a public verification key. The combination of the software and the verification key create distributable software which is distributed to a user. The user installs the software on a user computer system as protected software. To obtain a user key, the user inputs identifying information, which may be for the user or for a group, which is sent to a user key generator. The user key generator converts the identifying information to a numeric representation and then generates, by signing the numeric representation with the private signing key, a user key, which is returned to the user. Using the verification key, a user key verifier verifies a relationship between the user key and the identifying information to determine an access level to the protected software. The system verifies the relationship between the user key and the identifying information every time the software is run to ensure continued protection of the software after installation.
55 Citations
25 Claims
-
1. A method for controlling unauthorized use of software distributed by a vendor, comprising the steps of:
-
generating, with a digital signature algorithm, a verification key;
combining the software and the verification key to create distributable software;
inputting identifying information;
generating, with the digital signature algorithm using the identifying information, a user key;
conveying the user key to a user computer system; and
verifying, with the verification key, a relationship between the user key and the identifying information to determine an access level to the software. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for controlling unauthorized use of software distributed by a vendor, comprising the steps of:
-
generating, with a digital signature algorithm, a verification key;
combining the software and the verification key to create distributable software;
inputting user identifying information;
generating, with the digital signature algorithm using the user identifying information, a user key;
conveying the user key to a user computer system; and
verifying, with the verification key, a relationship between the user key and the user identifying information to determine an access level to the software. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer program product comprising:
a computer-useable medium having a computer-readable program code embodied in said medium for controlling unauthorized use of software distributed by a vendor, the computer readable program code in said computer program product comprising;
computer-readable program code for causing the computer to receive identifying information; and
computer-readable program code for causing the computer to generate, with the digital signature algorithm using the identifying information, a user key for use in determining an access level to the software. - View Dependent Claims (22)
-
23. A computer program product comprising:
a computer-useable medium having a computer-readable program code embodied in said medium for controlling unauthorized use of software distributed by a vendor, the computer readable program code in said computer program product comprising;
computer-readable program code for causing the computer to generate, with a digital signature algorithm, a verification key; and
computer-readable program code for causing the computer to combine the software and the verification key to create distributable software.
-
24. A computer program product comprising:
a computer-useable medium having a computer-readable program code embodied in said medium for controlling unauthorized use of software distributed by a vendor, the software having a verification key, the computer readable program code in said computer program product comprising;
computer-readable program code for causing the computer to receive identifying information;
computer-readable program code for causing the computer to receive a user key; and
computer-readable program code for causing the computer to verify, with the verification key generated with a digital signature algorithm, a relationship between the user key and the identifying information to determine an access level to the software. - View Dependent Claims (25)
Specification