Remote authorization for unlocking electronic data system and method
DCFirst Claim
1. A method for controlling unauthorized use of software distributed by a software vendor to a group of users with the group having group-identifying information, comprising the steps of:
- generating, with a digital signature algorithm, a verification key with a product key generator;
combining software and the verification key to create distributable software;
distributing the distributable software to a user within the group of users;
inputting group-identifying information to a user key generator;
converting, by the user key generator, the group-identifying information to a numeric representation;
generating, using the numeric representation, a user key, with the digital signature algorithm;
conveying the user key to the user computer system; and
verifying, with the verification key, a relationship between the user key and the group-identifying information to determine an access level to the protected software.
1 Assignment
Litigations
0 Petitions
Accused Products
Abstract
Controlling unauthorized access to software distributed to a user by a vendor. A verification key is generated by a product key generator and either embedded in the software prior to distribution or packaged with the software as a self-installing package. The verification key includes a public verification key. The combination of the software and the verification key create distributable software which is distributed to a user. The user installs the software on a user computer system as protected software. To obtain a user key, the user inputs identifying information, which may be for the user or for a group, which is sent to a user key generator. The user key generator converts the identifying information to a numeric representation and then generates, by signing the numeric representation with the private signing key, a user key, which is returned to the user. Using the verification key, a user key verifier verifies a relationship between the user key and the identifying information to determine an access level to the protected software. The system verifies the relationship between the user key and the identifying information every time the software is run to ensure continued protection of the software after installation.
-
Citations
36 Claims
-
1. A method for controlling unauthorized use of software distributed by a software vendor to a group of users with the group having group-identifying information, comprising the steps of:
-
generating, with a digital signature algorithm, a verification key with a product key generator;
combining software and the verification key to create distributable software;
distributing the distributable software to a user within the group of users;
inputting group-identifying information to a user key generator;
converting, by the user key generator, the group-identifying information to a numeric representation;
generating, using the numeric representation, a user key, with the digital signature algorithm;
conveying the user key to the user computer system; and
verifying, with the verification key, a relationship between the user key and the group-identifying information to determine an access level to the protected software. - View Dependent Claims (2, 3, 4, 5, 6, 7, 18)
embedding the verification key into the software; and
embedding a user key verifier into the software, the user key verifier verifying, with the verification key, the relationship between the user key and the group-identifying information.
-
-
3. The method as set forth in claim 1, the step of combining including the step of creating a self-installing distributable package containing the verification key, the software, and a user key verifier.
-
4. The method as set forth in claim 3, the step of installing including the step of running the self-installing distributable package to embed the verification key and the user key verifier into the software.
-
5. The method as set forth in claim 1, further comprising the step of storing the user key and the group-identifying information.
-
6. The method as set forth in claim 1, with the step of generating a verification key comprising the steps of:
-
generating, with the digital signature algorithm, a private signing key; and
generating, with the digital signature algorithm, a public verification key.
-
-
7. The method as set forth in claim 6, with the step of generating a user key comprising the step of signing, using the digital signature algorithm, the numeric representation with the private signing key.
-
18. The method as set forth in claim 1, with the step of inputting group-identifying information including step of inputting licensing information.
-
8. A system for controlling unauthorized use of software distributed to a group of users by a vendor, with the group having group-identifying information, comprising:
-
a product key generator for generating, with a digital signature algorithm, a verification key to accompany the software at distribution;
a user key generator for generating, responsive to group-identifying information, using the digital signature algorithm, an user key using a numeric representation of the group-identifying information; and
a user key verifier for validating, using the verification key, a relationship between the user key and the numeric representation of the group-identifying information to determine an access level to the software. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17)
means for embedding the verification key into the software; and
means for embedding a user key verifier into the software, the user key verifier verifying, with the verification key, the relationship between the user key and the group-identifying information.
-
-
13. The system as set forth in claim 8, further including means for creating a self-installing distributable package containing the verification key, the software, and a user key verifier.
-
14. The system as set forth in claim 13, further including means for running the self-installing distributable package to embed the verification key and the user key verifier into the software.
-
15. The system as set forth in claim 8, further comprising means for storing the user key and the group identifying information.
-
16. The system as set forth in claim 8, with the product key generator further including:
-
means, using the digital signature algorithm, for generating a private signing key; and
means, using the digital signature algorithm, for generating a public verification key.
-
-
17. The system as set forth in claim 16, with the user key verifier further including means for signing, using the digital signature algorithm, the numeric representation with the private signing key.
-
19. A method for controlling unauthorized use of software distributed by a software vendor comprising the steps of:
-
generating, with a digital signature algorithm, a verification key with a product key generator;
combining software and the verification key to create distributable software;
distributing the distributable software to a user;
inputting identifying information to a user key generator;
converting, by the user key generator, the identifying information to a numeric representation;
generating, using the numeric representation, a user key, with the digital signature algorithm;
conveying the user key to the user computer system; and
verifying, with the verification key, a relationship between the user key and the identifying information to determine an access level to the protected software. - View Dependent Claims (20, 21, 22, 23, 24, 25, 36)
embedding the verification key into the software; and
embedding a user key verifier into the software, the user key verifier verifying, with the verification key, the relationship between the user key and the identifying information.
-
-
21. The method as set forth in claim 19, the step of combining including the step of creating a self-installing distributable package containing the verification key, the software, and a user key verifier.
-
22. The method as set forth in claim 21, the step of installing including the step of running the self-installing distributable package to embed the verification key and the user key verifier into the software.
-
23. The method as set forth in claim 19, further comprising the step of storing the user key and the identifying information.
-
24. The method as set forth in claim 19, with the step of generating a verification key comprising the steps of:
-
generating, with the digital signature algorithm, a private signing key; and
generating, with the digital signature algorithm, a public verification key.
-
-
25. The method as set forth in claim 24 with the step of generating a user key comprising the step of signing, using the digital signature algorithm, the numeric representation with the private signing key.
-
36. The method as set forth in claim 19, with the step of inputting identifying information including step of inputting licensing information.
-
26. A system for controlling unauthorized use of software distributed to a user by a vendor, comprising:
-
a product key generator for generating, with a digital signature algorithm, a verification key to accompany the software at distribution;
a user key generator for generating, responsive to identifying information, using the digital signature algorithm, an user key using a numeric representation of the identifying information; and
a user key verifier for validating, using the verification key, a relationship between the user key and the numeric representation of the identifying information to determine an access level to the software. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35)
means for embedding the verification key into the software; and
means for embedding a user key verifier into the software, the user key verifier verifying, with the verification key, the relationship between the user key and the identifying information.
-
-
31. The system as set forth in claim 26, further including means for creating a self-installing distributable package containing the verification key, the software, and a user key verifier.
-
32. The system as set forth in claim 31, further including means for running the self-installing distributable package to embed the verification key and the user key verifier into the software.
-
33. The system as set forth in claim 26, further comprising means for storing the user key and the identifying information.
-
34. The system as set forth in claim 26, with the product key generator further including:
-
means, using the digital signature algorithm, for generating a private signing key; and
means, using the digital signature algorithm, for generating a public verification key.
-
-
35. The system as set forth in claim 34, with the user key verifier further including means for signing, using the digital signature algorithm, the numeric representation with the private signing key.
Specification