System for computer software protection
First Claim
1. A system for restricting the execution of a computer program comprising:
- means for re-enciphering the computer program from a first cipher forms stored on a distribution media to a second cipher form during initial installation of said program onto a predetermined storage means of an authorized computer systemwherein said second cipher form is unique to the authorized computer system;
means for loading the computer program in said second cipher form onto the computer system; and
means for executing the computer program on the authorized computer system.
2 Assignments
0 Petitions
Accused Products
Abstract
This system protects proprietary software from disclosure and unauthorized use, enforces license limits on number of users of the software, and prevents corruption of protected software by computer viruses. Software protected under this system may execute only on computer systems which incorporate a microprocessor capable of deciphering enciphered instructions in real time. Program files are first enciphered under control of a distribution cipher key. Prior to first use of software, program files must be customized on the user computer system. This customization procedure re-enciphers the programs, so that they are enciphered under a second cipher key. Customized programs may not execute on a computer system other than one constructed with a processor chip which incorporates a crypto microprocessor. The crypto microprocessor is capable of performing this re-encipherment, and of executing both enciphered and unenciphered programs. The customization program runs on user'"'"'s computer system and normally accesses a remote Exchange database system by means of a modem to accomplish its task. Variations of customization process provide for storage of enciphered software on either a single system, a network server, or a site license repository system.
502 Citations
12 Claims
-
1. A system for restricting the execution of a computer program comprising:
-
means for re-enciphering the computer program from a first cipher forms stored on a distribution media to a second cipher form during initial installation of said program onto a predetermined storage means of an authorized computer system wherein said second cipher form is unique to the authorized computer system; means for loading the computer program in said second cipher form onto the computer system; and means for executing the computer program on the authorized computer system. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system for restricting the execution of a computer program comprising:
-
means for re-enciphering a computer program from a first cipher form stored on a distribution media to a second cipher form during initial installation of said program onto predetermined storage means of a file server wherein said second cipher form is executable only on authorized computer systems attached to said server; means for loading said program from said file server onto the authorized computer systems; and means for executing said program on the authorized computer systems. - View Dependent Claims (7)
-
-
8. A method for restricting the execution of a computer program comprising the steps of:
-
enciphering a computer program in a first cipher form stored on a distribution media; initially installing said program in a computer system having a crypto microprocessor by perfoming the steps of; obtaining data from a remote exchange system; re-enciphering said program from said first cipher form to a second cipher form by translating said program with said crypto microprocessor an said data; and storing said program onto storage a predetermined means of the computer system in said second form; and transferring said program from the predetermined storage means to the computer system, deciphering said program from said second cipher form to a deciphered form with said crypto microprocessor, and executing said program in said deciphered form. - View Dependent Claims (9, 10, 11, 12)
-
Specification