×

PROTECTION OF SOFTWARE TRANSMITTED OVER AN UNPROTECTED INTERFACE

  • US 20080301465A1
  • Filed: 06/04/2007
  • Published: 12/04/2008
  • Est. Priority Date: 06/04/2007
  • Status: Abandoned Application
First Claim
Patent Images

1. A computer-implemented method for protecting software, the method comprising:

  • parsing a first cryptographic key into at least one component;

    decrypting an encrypted second cryptographic key utilizing a first component of the at least one component;

    encrypting a session key utilizing the second cryptographic key;

    providing the encrypted session key;

    receiving a signal indicative of an encrypted phrase, the phrase being encrypted with a decrypted version of the provided encrypted session key, the decrypted version of the provided encrypted session key being encrypted with a third cryptographic key;

    decrypting the encrypted phrase with the session key for generating a decrypted phrase;

    comparing the decrypted phrase with a predetermined phrase;

    determining a validity of the decrypted phrase in accordance with the step of comparing; and

    if the decrypted phrase is determined to be valid, allowing communication of the software.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×