SYSTEM, METHOD AND SECURITY DEVICE FOR AUTHORIZING USE OF A SOFTWARE TOOL
First Claim
1. A security device, comprising:
- at least one communication subsystem for enabling communication between the security device and a first external device, wherein the external device has a software tool executable on the first external device;
a processor coupled to the at least one communication subsystem and configured to control the at least one communication subsystem; and
memory accessible to the processor and storing a key for authorizing use of the software tool, the memory further storing program instructions which, when executed by the processor, cause the processor to execute a security application;
wherein the security application is configured to process an encrypted request received from the first external device to use the software tool and to generate a signed response to the encrypted request, the signed response being signed using the key and comprising authorization information to enable the first external device to prove authorization to a second external device for use of the software tool by the first external device in relation to the second external device.
4 Assignments
0 Petitions
Accused Products
Abstract
The described embodiments relate generally to methods, systems and security devices for authorizing use of a software tool. Certain embodiments of the invention relate to a security device. The security device comprises at least one communication subsystem for enabling communication between the security device and a first external device, wherein the first external device has a software tool executable on the first external device. The security device further comprises a memory and processor coupled to the at least one communication subsystem and configured to control the at least one communication subsystem. The memory is accessible to the processor and stores a key for authorizing use of the software tool. The memory further stores program instructions which, when executed by the processor, cause the processor to execute a security application.
-
Citations
31 Claims
-
1. A security device, comprising:
-
at least one communication subsystem for enabling communication between the security device and a first external device, wherein the external device has a software tool executable on the first external device; a processor coupled to the at least one communication subsystem and configured to control the at least one communication subsystem; and memory accessible to the processor and storing a key for authorizing use of the software tool, the memory further storing program instructions which, when executed by the processor, cause the processor to execute a security application; wherein the security application is configured to process an encrypted request received from the first external device to use the software tool and to generate a signed response to the encrypted request, the signed response being signed using the key and comprising authorization information to enable the first external device to prove authorization to a second external device for use of the software tool by the first external device in relation to the second external device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system for authorizing use of a software tool, the system comprising:
-
a security device comprising a processor, at least one communication subsystem responsive to the processor and a first memory accessible to the processor, the first memory storing a key for authorizing use of the software tool and storing program instructions which, when executed by the processor, cause the processor to execute a security application; a computing device comprising a second memory storing the software tool, the computing device being capable of communication with the security device via the at least one communication subsystem; and a target device in communication with the computing device; wherein the computing device is configured to transmit an encrypted request to the security device to use the software tool, and wherein the security device is configured to execute the security application to generate a signed response in response to the encrypted request, and to send the signed response to the computing device, the signed response being signed using the key and comprising authorization information to enable the computing device to prove authorization to the target device for use of the software tool in relation to the target device. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for authorizing use of a software tool, the method comprising:
-
receiving, at a security device, an encrypted request to use the software tool, the encrypted request being received from a first external device; generating a signed response in response to the encrypted request, the signed response being signed using a key stored in the security device and comprising authorization information to enable the first external device to prove authorization to a second external device for use of the software tool by the first external device in relation to the second external device; and transmitting the signed response to the first external device. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
-
26. In a system comprising a computer system, a security device and a target device, wherein the security device and the target device are each in communication with the computer system, a method of authorizing use of a software tool stored in the computer system, the method comprising:
-
transmitting from the computer system to the target device an authorization request to use the software tool; generating at the target device a session key in response to the authorization request; encrypting the session key with a public key associated with the software tool; transmitting an encrypted request comprising the encrypted session key to the computer system from the target device; transmitting the encrypted request to the security device from the computer system; generating at the security device a signed response in response to the encrypted request, the signed response being signed using a private key stored in the security device, the private key being associated with the software tool, wherein the signed response comprises authorization information to enable the computer system to prove authorization to the target device for use of the software tool by the computer system in relation to the target device; and transmitting the signed response from the security device to the computer system. - View Dependent Claims (27, 28, 29, 30, 31)
-
Specification