Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification
First Claim
1. A method of distributing a software object from a source to a user, comprising the method steps of:
- encrypting said software object with an encryption operation utilizing an encryption key;
transmitting said encrypted software object from said source to said user;
loading said encrypted software object onto a user-controlled data processing system having a particular configuration;
generating a numerical machine identification based at least in part upon said particular configuration of said user-controlled data processing system;
generating a temporary key based at least in part upon said numerical machine identification, a prescribed interval, and said encryption key;
sending said temporary key to a key generator;
using said key generator to produce said encryption key; and
entering said temporary key to initiate said prescribed interval to generate said encryption key to access said software object.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus is provided for distributing a software object from a source to a user. A software object is encrypted with an encryption operation utilizing a long-lived encryption key. It is directed from the source to the user. It is loaded onto a user-controlled data processing system having a particular configuration. A numerical machine identification is derived based at least in part upon the particular data processing system configuration of the user-controlled data processing system. A temporary key is derived which is based at least in part upon the numerical machine identification and the long-lived encryption key. The long-lived key generator is provided for receiving the temporary key and producing the long-lived encryption key. The user is allowed to utilize the temporary key for a prescribed interval to generate the long-lived encryption key to access the software object.
-
Citations
8 Claims
-
1. A method of distributing a software object from a source to a user, comprising the method steps of:
-
encrypting said software object with an encryption operation utilizing an encryption key; transmitting said encrypted software object from said source to said user; loading said encrypted software object onto a user-controlled data processing system having a particular configuration; generating a numerical machine identification based at least in part upon said particular configuration of said user-controlled data processing system; generating a temporary key based at least in part upon said numerical machine identification, a prescribed interval, and said encryption key; sending said temporary key to a key generator; using said key generator to produce said encryption key; and entering said temporary key to initiate said prescribed interval to generate said encryption key to access said software object. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of distributing software objects from a producer to a user, comprising the method steps of:
-
encrypting a software object utilizing a key; recording said software object onto a computer-accessible memory media; shipping said computer-accessible memory media from said producer to said user; loading a file management program into a user-controlled data processing system; utilizing said file management program to derive a numerical machine identification based upon at least one attribute of said user-controlled data processing system; reading said computer-accessible memory media with said user-controlled data processing system; generating a temporary key based at least in part upon said numerical machine identification and a prescribed interval; utilizing said file management program by executing it with said user-controlled data processing system to restrict access to said software object for said prescribed interval defined by said temporary key; and utilizing a key generator in said user-controlled data processing system to provide said key in response to receipt of at least said temporary key. - View Dependent Claims (8)
-
Specification