Method and system of using personal information as a key when distributing information
First Claim
1. A method for using personal information as a key, said method comprising the steps of:
- a) purchasing software in a purchase transaction that includes providing human readable personal information known to the purchaser;
b) acquiring at a seller said human readable personal information from the purchaser of software;
said human readable personal information including at least three pieces of personal information selected from among the purchaser'"'"'s name, address, telephone number, mother'"'"'s name, maiden name, spouse'"'"'s name, children'"'"'s names, birthdate, and social security number;
designing a key for accessing the purchased software, said key being said human readable personal information acquired from the purchaser, wherein the personal information is independent of a particular electronic medium in which the software will be installed;
c) embedding the human readable personal information key in the purchased software;
d) conveying the purchased software to the purchaser through an electronic medium;
e) asking the purchaser to enter a human readable personal information key, by a prompt from the electronic medium, before allowing the purchaser to access the conveyed software;
f) entering by the purchaser the human readable personal information key;
g) comparing the entered key with the key embedded in the software; and
h) allowing the purchaser to access the conveyed software if the entered and embedded keys match.
1 Assignment
0 Petitions
Accused Products
Abstract
"A method of using personal information as a decryption key for encrypted software. When software is sold, a purchaser provides a seller with several pieces of personal information that will be used as part of a decryption key. The personal information is tied to the purchaser or a user of the software. For example, the personal information can include, but is not limited to, the purchaser'"'"'s social security number, telephone number, expiration date of the credit card, address, mother'"'"'s maiden name, children'"'"'s names, bank account information. This personal information is embedded in the purchased or licensed software. The material is then conveyed to the purchaser. To activate the software the purchaser must enter the key that includes the personal information. The software compares the key that the purchaser enters with the personal information embedded in the software. The software will only be installed if the key and the personal information match."
-
Citations
29 Claims
-
1. A method for using personal information as a key, said method comprising the steps of:
-
a) purchasing software in a purchase transaction that includes providing human readable personal information known to the purchaser; b) acquiring at a seller said human readable personal information from the purchaser of software; said human readable personal information including at least three pieces of personal information selected from among the purchaser'"'"'s name, address, telephone number, mother'"'"'s name, maiden name, spouse'"'"'s name, children'"'"'s names, birthdate, and social security number; designing a key for accessing the purchased software, said key being said human readable personal information acquired from the purchaser, wherein the personal information is independent of a particular electronic medium in which the software will be installed; c) embedding the human readable personal information key in the purchased software; d) conveying the purchased software to the purchaser through an electronic medium; e) asking the purchaser to enter a human readable personal information key, by a prompt from the electronic medium, before allowing the purchaser to access the conveyed software; f) entering by the purchaser the human readable personal information key; g) comparing the entered key with the key embedded in the software; and h) allowing the purchaser to access the conveyed software if the entered and embedded keys match. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system using personal information as a key, said system comprising:
-
means for purchasing software in a purchase transaction that includes providing human readable personal information know to a purchaser; a device for conveying, by the purchaser to a seller of said software, at least three pieces of said personal information in said human readable form; said personal information including at least three pieces of personal information selected from among the purchaser'"'"'s name, address, telephone number, mother'"'"'s name, maiden name, spouse'"'"'s name, children'"'"'s names, birthdate, and social security number; means for designing a key, said key for accessing the purchased software, said key being said at least three pieces of personal information in human readable form; and
means for embedding said key in said software;downloading means for downloading said purchased software, with said key being embedded therein, to a computer of the purchaser; a device for entering information, connected to the computer of the purchaser, through which the key is entered to the computer; and a comparator for comparing said entered key with said being at least three pieces of personal information in human readable form embedded in said purchased software, whereby the purchaser is allowed to access said purchased software only if there is a match between the entered and embedded keys; wherein said at least three pieces of personal information forming the keys are independent of the computer. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
Specification