Method for controlling distribution and use of software products with net-work-connected computers
First Claim
1. A method of controlling a distribution and/or use of computer-based objects including data collections and/or computer programs, the computer-based objects being stored in a server computer and made available on demand at least temporarily for a use in a client computer interconnected to the server computer via a data network, comprising the steps of:
- providing an user-specific access right indicator for granting a user an access right to a computer-based object depending on a user role;
the user-specific access right indicator being digitally signed with a private signature key of an access rights administration entity;
upon a user request for the computer-based object, transmitting the user-specific access right indicator to the client computer;
sending a request to the server computer for a transmission of the computer-based object from the server computer to the client computer;
validating the user-specific access right indicator in the server computer by a public signature key of the access rights administration entity for checking authorization of the request for the transmission of the computer-based object to the client computer;
transmitting the computer-based object to the client computer after a successful validation of the user-specific access right indicator; and
controlling access to the computer-based object in the client computer by a dedicated control program validating the user-specific access right indicator.
3 Assignments
0 Petitions
Accused Products
Abstract
The distribution in controlled by means of central certificates acting as a link between the authorization granted to various users and the right-of-access code allocated to the software products in connection with a special separated control program. The certificates are issued to users on request and intended for calling the wanted software products. Such certificates can be supplemented with distinct control functions. Said functions are executed by the control program, which is supplemented accordingly, especially for recording data on the utilization volume. The invention also relates to the following items: key safety, use of a chip card, integrated copy protection.
-
Citations
16 Claims
-
1. A method of controlling a distribution and/or use of computer-based objects including data collections and/or computer programs, the computer-based objects being stored in a server computer and made available on demand at least temporarily for a use in a client computer interconnected to the server computer via a data network, comprising the steps of:
-
providing an user-specific access right indicator for granting a user an access right to a computer-based object depending on a user role;
the user-specific access right indicator being digitally signed with a private signature key of an access rights administration entity;
upon a user request for the computer-based object, transmitting the user-specific access right indicator to the client computer;
sending a request to the server computer for a transmission of the computer-based object from the server computer to the client computer;
validating the user-specific access right indicator in the server computer by a public signature key of the access rights administration entity for checking authorization of the request for the transmission of the computer-based object to the client computer;
transmitting the computer-based object to the client computer after a successful validation of the user-specific access right indicator; and
controlling access to the computer-based object in the client computer by a dedicated control program validating the user-specific access right indicator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification