Tamper-resistant method for authorizing access to data between a host and a predetermined number of attached workstations
First Claim
Patent Images
1. A method for authorizing access to application software resident in a CPU host from among N <
- M workstations or users communicatively attaching said CPU host, said CPU manifesting indicia of identity, comprising the steps of;
(a) forming a list of authorized users and encrypting thereon a depth parameter N, said encryption using a function of the CPU identity and an offset as a key;
(b) responsive to each application software access request from among the workstations or users, accessing the list and decrypting the depth parameter N with the key; and
(c) scanning the list within the depth N and returning an access authorization to the requester only upon an identity
1 Assignment
0 Petitions
Accused Products
Abstract
A tamper-resistant method is disclosed for controlling the number of users given authorized access to licensed software in a host-based, multiple terminal system by use of an encrypted authorization list depth parameter. The method embedded in the host-licensed software can decrypt the depth parameter only using a key derived from its own CPU ID and an offset.
97 Citations
7 Claims
-
1. A method for authorizing access to application software resident in a CPU host from among N <
- M workstations or users communicatively attaching said CPU host, said CPU manifesting indicia of identity, comprising the steps of;
(a) forming a list of authorized users and encrypting thereon a depth parameter N, said encryption using a function of the CPU identity and an offset as a key; (b) responsive to each application software access request from among the workstations or users, accessing the list and decrypting the depth parameter N with the key; and (c) scanning the list within the depth N and returning an access authorization to the requester only upon an identity - View Dependent Claims (2, 3, 4, 5)
- M workstations or users communicatively attaching said CPU host, said CPU manifesting indicia of identity, comprising the steps of;
-
6. A tamper resistant method for authorizing access to data between a host and a predetermined number N <
- M attached work stations or users, said host including a communications server for managing physical data transmission between the host and M work stations or users; and
means for storing access control software and related information;
said host manifesting indicia of identity, comprising the steps at the host of;(a) responsive to a service request from a work station or user, invoking access control software from said storage means and a pre-computed list, said list includes M station or user identities and an encrypted representation of N indicative of the number of work stations or users authorized access or attachment to said host, said encrypted representation N being formed using an encryption key as a function of the host identity and an offset; (b) ascertaining the depth N to which the list may be searched by decrypting the representation using the key; and (c) comparing identity of the work station or user originating the service request with the identities of the M stations or users on the list but only to a depth N, and, returning an authorization only upon a match condition. - View Dependent Claims (7)
- M attached work stations or users, said host including a communications server for managing physical data transmission between the host and M work stations or users; and
Specification