Key authentication method and key authentication apparatus
First Claim
1. A key authentication apparatus having a software storage medium for storing software that comprises encoded programs, characters, graphs, images, or sound, the key authentication apparatus comprising:
- input characteristics detection means for detecting characteristics of input operations performed by a user at a time the user uses the software of said software storage medium;
a management center for encoding the input characteristics detected by said input characteristics detection means and, in response, generating consent information; and
comparison means for comparing the consent information generated by said management center with the input characteristics detected by said input characteristics detection means, and if both are in correspondence with each other, for approving the use of said software.
1 Assignment
0 Petitions
Accused Products
Abstract
A key authentication device and method which, through the use of user-unique information, prevents the improper use of software. The key authentication device is equipped with a software storage medium for storing software with encoded characters, graphs, images, or sound, and, when using the software of this software storage medium, employs an input characteristics detection section for detecting the characteristics of input operations performed by a user, a management center for encoding input characteristics detected by the input characteristics detection section and for generating consent information, and a comparison section for comparing the consent information generated by the management center with the input characteristics detected by the input characteristics detection section.
67 Citations
13 Claims
-
1. A key authentication apparatus having a software storage medium for storing software that comprises encoded programs, characters, graphs, images, or sound, the key authentication apparatus comprising:
-
input characteristics detection means for detecting characteristics of input operations performed by a user at a time the user uses the software of said software storage medium; a management center for encoding the input characteristics detected by said input characteristics detection means and, in response, generating consent information; and comparison means for comparing the consent information generated by said management center with the input characteristics detected by said input characteristics detection means, and if both are in correspondence with each other, for approving the use of said software. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A key authentication method comprising:
-
an input characteristics detection step detecting characteristics of input operations performed by a user at a time when the user uses software of a software storage medium, wherein the software includes encoded programs, characters, graphs, images, or sound; a consent information generation step encoding the input characteristics, and in response, generating consent information; and a comparison step comparing the consent information and the input characteristics, and, in only those cases where both are in correspondence with each other, approving the use of said software. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A key authentication method comprising the steps of:
-
calling up, when encoded software is used at a terminal, a management center that manages use of each item of software; sending from said terminal to said management center identification information that specifies the user at said terminal and input-characteristics information; disconnecting calls that connect said terminal with said management center in response to sending said identification information to said management center; retrieving a charge history of the user by said management center based on said identification information, and discriminating whether the user has an ability to pay usage fees for the software; calling up said terminal by said management center if said user has the ability to pay usage fees for the software; and sending consent information from said management center to said terminal to decode the software, said consent information being based upon said input-characteristics information.
-
Specification