Method and apparatus for preventing reuse of text, images and software transmitted via networks
First Claim
Patent Images
1. A method for limiting the operational life of software in a network environment, the method comprising:
- transmitting a program applet with a password embedded therein from a server computer to a client computer, via a network, the password having a limited operational life, and the program applet including executable code that runs on the client computer;
receiving by the server computer, from said program applet running on the client computer, via said network, (i) a request for information stored in a restricted access storage area of the server computer, and (ii) said embedded password;
authenticating said embedded password by the server computer, whenever said receiving occurs;
thereafter transmitting said information from the server computer, to said program applet running on the client computer, via said network, while said embedded password is valid; and
invalidating said embedded password by the server computer, coincident with an invalidation event.
9 Assignments
0 Petitions
Accused Products
Abstract
A method for providing textual information in a network environment, the method comprising: receiving a request via a network for text-editable textual information; converting the text-editable textual information into a non-text-editable textual format on line upon receiving the request; and sending the non-text-editable textual information via the network. Network-based systems are also disclosed.
78 Citations
9 Claims
-
1. A method for limiting the operational life of software in a network environment, the method comprising:
-
transmitting a program applet with a password embedded therein from a server computer to a client computer, via a network, the password having a limited operational life, and the program applet including executable code that runs on the client computer; receiving by the server computer, from said program applet running on the client computer, via said network, (i) a request for information stored in a restricted access storage area of the server computer, and (ii) said embedded password; authenticating said embedded password by the server computer, whenever said receiving occurs; thereafter transmitting said information from the server computer, to said program applet running on the client computer, via said network, while said embedded password is valid; and invalidating said embedded password by the server computer, coincident with an invalidation event. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A network-based software authentication system comprising a server computer, the server computer comprising:
-
a password generator; password validation apparatus; a restricted-access storage area; a program applet including executable code that runs on a client computer; and invalidation apparatus; wherein said server computer is operative to; a) cause said password generator to generate a password, the password having a limited operational life; b) embed said password within said program applet, and transmit said program applet with said password embedded therein to the client computer via a network; c) receive from said program applet running on the client computer, (i) a request for information, and (ii) said embedded password for authentication; d) authenticate said embedded password using said password validation apparatus, whenever information requested is stored in the restricted-access storage area; e) transmit said information to said program applet running on the client computer, via said network, while said embedded password is valid; and f) invalidate said embedded password using said invalidation apparatus coincident with an invalidation event. - View Dependent Claims (7, 8, 9)
-
Specification