SYSTEM AND METHOD FOR REMOTELY TRACKING AN ACTIVATION OF PROTECTED SOFTWARE
First Claim
1. System for remotely tracking the activation of a protected software in a device, the protected software remaining unusable by the device as long as the protected software has not been activated;
- the system comprising a plurality of devices and an authorisation apparatus that are adapted to communicate with each other;
each device comprising a storage unit containing the protected software, a device memory and an electronic chip having an identification number uniquely identifying the electronic chip and the device from the other devices, andthe authorisation apparatus comprising an encryption processor adapted to calculate an encrypted identity using the identification number;
wherein each device is adapted to transmit its identification number to the authorisation apparatus;
the authorisation apparatus is adapted to record the received identification number and to transmit an encrypted identity calculated from the identification number to the device; and
the device contains a decryption processor adapted to decrypt the transmitted encrypted identity calculated from the identification number to produce a decrypted identity and the electronic chip is adapted to activate the protected software only if the identification number of the device corresponds to the decrypted identity.
10 Assignments
0 Petitions
Accused Products
Abstract
The invention is related to a system (2) for remotely tracking the activation of a protected software in a device (4), the system (2) comprises a plurality of devices (4) and an authorisation apparatus (6). Each device (4) comprises an electronic chip (8) having an identification number uniquely identifying the electronic chip (8). The authorisation apparatus (6) comprises an encryption processor (18) adapted to calculate an encrypted identity. Each device (4) is adapted to transmit its identification number to the authorisation apparatus (6), the authorisation apparatus (6) is adapted to record the received identification number and to transmit an encrypted identity. The device (4) contains a decryption processor (12) adapted to decrypt the transmitted encrypted identity to produce a decrypted identity and the electronic chip (8) activates the protected software only if the identification number of the device (4) corresponds to the decrypted identity.
-
Citations
13 Claims
-
1. System for remotely tracking the activation of a protected software in a device, the protected software remaining unusable by the device as long as the protected software has not been activated;
-
the system comprising a plurality of devices and an authorisation apparatus that are adapted to communicate with each other; each device comprising a storage unit containing the protected software, a device memory and an electronic chip having an identification number uniquely identifying the electronic chip and the device from the other devices, and the authorisation apparatus comprising an encryption processor adapted to calculate an encrypted identity using the identification number; wherein each device is adapted to transmit its identification number to the authorisation apparatus; the authorisation apparatus is adapted to record the received identification number and to transmit an encrypted identity calculated from the identification number to the device; and the device contains a decryption processor adapted to decrypt the transmitted encrypted identity calculated from the identification number to produce a decrypted identity and the electronic chip is adapted to activate the protected software only if the identification number of the device corresponds to the decrypted identity. - View Dependent Claims (2, 3, 4, 5)
-
-
6. Method for remotely tracking the activation of a protected software in a device belonging to a plurality of devices;
-
the at least one device comprising an electronic chip containing an identification number uniquely identifying the electronic chip and the device from the other devices, a storage unit containing a protected software that is unusable by the device as long as the protected software has not been activated, a decryption processor for calculating a decrypted identity and a device communication interface for communicating with an authorisation apparatus; the authorisation apparatus comprising an encryption processor for calculating an encrypted identity, a central processor to record device related data and an apparatus communication interface for communicating with a device; wherein the method comprises for each device the steps of; transmitting the identification number of the electronic chip from the device to the authorisation apparatus; recording the identification number of the electronic chip and calculating an encrypted identity from the transmitted identification number using the encryption processors; transmitting the calculated encrypted identity from the authorisation apparatus to the device; calculating a decrypted identity from the transmitted encrypted identity using the decryption processor; comparing the decrypted identity to the identification number of the electronic chip; and activating the protected software for employment by the device as a result of a positive comparison of the decrypted identity with the unique identification number. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13)
-
Specification