SYSTEM AND METHOD FOR SECURE SOFTWARE LICENSE DISTRIBUTION
First Claim
1. A method comprising:
- receiving, on a computer system comprising at least one server computer, a request to remove one or more limitations imposed on a full-featured base application executing on a client computer;
wherein the request comprises a user signature and a hardware fingerprint;
creating, by the computer system, a license package, the license package comprising a first layer and a second layer separately encrypted therein;
wherein the second layer comprises a license key operable to be consumed by the full-featured base application to remove the one or more limitations;
wherein the first layer comprises information sufficient to identify the license key;
encapsulating, by the computer system, the license package into a file having a file-type association with the full-featured base application;
transmitting, by the computer system, the file to the client computer;
the computer system interacting with the full-featured base application to allow decryption of the first layer and the second layer so that the license key can be applied; and
wherein the interacting comprises verifying a user of the client computer, hardware of the client computer, and the license key.
0 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method includes receiving a request to remove one or more limitations imposed on a full-featured base application executing on a client computer. The method further includes creating a license package. The license package includes a first layer and a second layer separately encrypted therein. The second layer includes a license key operable to be consumed by the full-featured base application to remove the one or more limitations. The first layer comprises information sufficient to identify the license key. In addition, the method includes encapsulating the license package into a file having a file-type association with the full-featured base application. Further, the method includes transmitting the file to the client computer. The method also includes interacting with the full-featured base application to allow decryption of the first layer and the second layer so that the license key can be applied.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, on a computer system comprising at least one server computer, a request to remove one or more limitations imposed on a full-featured base application executing on a client computer; wherein the request comprises a user signature and a hardware fingerprint; creating, by the computer system, a license package, the license package comprising a first layer and a second layer separately encrypted therein; wherein the second layer comprises a license key operable to be consumed by the full-featured base application to remove the one or more limitations; wherein the first layer comprises information sufficient to identify the license key; encapsulating, by the computer system, the license package into a file having a file-type association with the full-featured base application; transmitting, by the computer system, the file to the client computer; the computer system interacting with the full-featured base application to allow decryption of the first layer and the second layer so that the license key can be applied; and wherein the interacting comprises verifying a user of the client computer, hardware of the client computer, and the license key. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method comprising:
-
transmitting, by a client computer, a request to remove one or more limitations imposed on a full-featured base application; wherein the request comprises a user signature and a hardware fingerprint; receiving a file having a file-type association with the full-featured base application, the file encapsulating a license package; wherein the license package comprises a first layer and a second layer separately encrypted therein; wherein the second layer comprises a license key operable to be consumed by the full-featured base application to remove the one or more limitations; wherein the first layer comprises information sufficient to identify the license key; the client computer interacting with a secure computer system to decrypt the first layer and the second layer; and applying the license key to the full-featured base application. - View Dependent Claims (7, 11, 12)
-
- 8. The method of claim 8, wherein the interacting comprises decrypting the first layer.
-
13. A system comprising:
-
a license server operable to create and verify license keys; an authentication server operable to authenticate users and client-computer hardware; an email server operable to transmit emails; a secure network for enabling communication among the license server, the authentication server, and the email server; and wherein the license server, the authentication server, and the email server, in combination, are operable to; receive a request to remove one or more limitations imposed on a full-featured base application executing on a client computer; wherein the request comprises a user signature and a hardware fingerprint; create a license package, the license package comprising a first layer and a second layer separately encrypted therein; wherein the second layer comprises a license key operable to be consumed by the full-featured base application to remove the one or more limitations; wherein the first layer comprises information sufficient to identify the license key; encapsulate the license package into a file having a file-type association with the full-featured base application; and transmit the file to the client computer; interact with the full-featured base application to allow decryption of the first layer and the second layer so that the license key can be applied; and wherein the interaction comprises verification of a user of the client computer, hardware of the client computer, and the license key. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A computer-program product comprising a computer-usable medium having computer-readable program code embodied therein, the computer-readable program code adapted to be executed to implement a method comprising:
-
receiving a request to remove one or more limitations imposed on a full-featured base application executing on a client computer; wherein the request comprises a user signature and a hardware fingerprint; creating a license package, the license package comprising a first layer and a second layer separately encrypted therein; wherein the second layer comprises a license key operable to be consumed by the full-featured base application to remove the one or more limitations; wherein the first layer comprises information sufficient to identify the license key; encapsulating the license package into a file having a file-type association with the full-featured base application; transmitting the file to the client computer; interacting with the full-featured base application to allow decryption of the first layer and the second layer so that the license key can be applied; and wherein the interacting comprises verifying a user of the client computer, hardware of the client computer, and the license key. - View Dependent Claims (19, 20)
-
Specification