Method and apparatus for protecting information and privacy
First Claim
1. A method of requesting a continuation message comprising the steps of:
- storing a call-up message in a user device, the call-up message being generated by a user device including;
a. a tag table identifier value;
b. a set of user device descriptive values, where one or more of the user device descriptive values provide information concerning a state associated with the user device;
c. a nonce; and
d. a hash function; and
applying said hash function to the combination of said set of user device descriptive values and said nonce to provide a hash result value that conceals the user device descriptive values from a guardian center and all other devices, where the concealing of the user descriptive values protects the privacy of a user associated with the user device;
processing the call-up message at the guardian center to detect use of an infringing copy of software on the user device, where the call-up message is used to prevent a tag table identifier value from being used simultaneously on multiple user devices; and
requesting a continuation message for use in connection with controlling use of protected software on the user device by securely sending from the user device to the guardian center said tag table identifier value and said hash result value in a call-up message.
5 Assignments
0 Petitions
Accused Products
Abstract
A system for protecting software against piracy while protecting a user'"'"'s privacy enables enhancements to the protection software in a user device and extended protections against piracy. The protection system allows the user device to postpone validation of purchased tags stored in a tag table for installed software and to re-establish ownership of a tag table to recover from invalidation of a tag table identifier value resulting from revelation of a tag table identifier value. Continued use of the tag table is provided by the use of credits associated with a tag table. A protection center is protected against denial of service attacks by making calls to the protection center cost time or money to the attackers.
89 Citations
16 Claims
-
1. A method of requesting a continuation message comprising the steps of:
-
storing a call-up message in a user device, the call-up message being generated by a user device including; a. a tag table identifier value; b. a set of user device descriptive values, where one or more of the user device descriptive values provide information concerning a state associated with the user device; c. a nonce; and d. a hash function; and applying said hash function to the combination of said set of user device descriptive values and said nonce to provide a hash result value that conceals the user device descriptive values from a guardian center and all other devices, where the concealing of the user descriptive values protects the privacy of a user associated with the user device; processing the call-up message at the guardian center to detect use of an infringing copy of software on the user device, where the call-up message is used to prevent a tag table identifier value from being used simultaneously on multiple user devices; and requesting a continuation message for use in connection with controlling use of protected software on the user device by securely sending from the user device to the guardian center said tag table identifier value and said hash result value in a call-up message. - View Dependent Claims (2, 3, 4, 9, 10, 11, 12, 13, 14)
-
-
5. A method of re-establishing ownership of a tag table, comprising the steps of:
-
a. securely sending, by a user device, a message to an authorized server, the message including a new tag table identifier, a tag table identifier, an original tag table identifier and an ownership certificate pertaining to the original tag table identifier, where the new tag table identifier identifies a tag table having one or more tags, the tags indicating a right to use protected software; b. verifying, by the authorized server, that said ownership certificate pertains to the original tag table identifier and securely sending to the user device a digitally signed message allowing the user device to employ the new tag table identifier; c. creating, by the authorized server, an association between said new tag table identifier and said original tag table identifier, said new tag table identifier and said tag table identifier both related to said original tag table identifier; d. processing, by the authorized server, call-up messages to detect use of an infringing copy of software on the user device, where a call-up message is used to prevent a tag table identifier from being used simultaneously on multiple user devices, the call-up message including a concealed portion to protect the privacy of a user associated with the user device; and e. ensuring, by the authorized server, that call-up messages including said tag table identifier without said new tag table identifier are rejected. - View Dependent Claims (6, 15)
-
-
7. A method of re-establishing ownership of a tag table employing a one-way function, comprising the steps of:
-
a. securely sending, by a user device, a message to an authorized server, the message including a new tag table identifier, where the new tag table identifier identifies a tag table having one or more tags, the tags indicating a right to use protected software; b. verifying, by the authorized server, that applying one-way function to the new tag table identifier yields a tag table identifier, the tag table identifier stored on the authorized server and associated with an original tag table identifier, said new tag table identifier and said tag table identifier both related to said original tag table identifier; c. creating, by the authorized server, an association between said new tag table identifier and said original tag table identifier; d. processing, by the authorized server, call-up messages to detect use of an infringing copy of software on the user device, where a call-up message is used to prevent a tag table identifier from being used simultaneously on multiple user devices, the call-up message including a concealed portion to protect the privacy of a user associated with the user device; and e. ensuring, by the authorized server, that call-up messages including said tag table identifier without said new tag table identifier are rejected. - View Dependent Claims (8, 16)
-
Specification