Method, system, and program for distributing software between computer systems
First Claim
1. A system comprising a source computer system for distributing computer software to a target computer system, comprising:
- a computer readable medium maintaining keys of computer systems authorized to access software to be distributed;
a program executed by the source computer system for performing operations, the operations comprising;
receiving a request for software from the target computer system;
generating a message;
encrypting the generated message;
transmitting the encrypted message to the target computer system;
receiving an encrypted response from the target computer system;
determining whether there is one maintained key for the target computer system capable of decrypting the received encrypted response;
decrypting the encrypted response with the determined key if there is one determined key;
determining whether the decrypted response includes a part of the generated message transmitted to the target computer system, wherein the target computer system is authorized to access the software if the decrypted response includes the part of the generated message and wherein the target computer system is not authorized to access the software if there is not one maintained key for the target computer system that is capable of decrypting the encrypted response or the decrypted response does not include the part of the generated message transmitted to the target computer system; and
permitting the target computer system access to the software after determining that the target computer system is authorized to access the software.
0 Assignments
0 Petitions
Accused Products
Abstract
Disclosed is a system, method, and program for distributing computer software from a first computer system. The first computer system receives a request for software from a second computer system. In response, the first computer system generates a message, encrypts the generated message, and transmits the encrypted message to the second computer system. The first computer system later receives an encrypted response from the second computer system and processes the encrypted response to determine whether the second computer system is authorized to access the software. The second computer system is permitted access to the software after determining that the second computer system is authorized to access the software. To access the computer software with the second computer system, the second computer system transmits a request for the software to the first computer system. The second computer system receives an encrypted message from the first computer system and processes the encrypted message to generate a response message. The response message is transmitted to the first computer system. In response, the second computer system is permitted access to the requested software.
-
Citations
21 Claims
-
1. A system comprising a source computer system for distributing computer software to a target computer system, comprising:
-
a computer readable medium maintaining keys of computer systems authorized to access software to be distributed; a program executed by the source computer system for performing operations, the operations comprising; receiving a request for software from the target computer system; generating a message; encrypting the generated message; transmitting the encrypted message to the target computer system; receiving an encrypted response from the target computer system; determining whether there is one maintained key for the target computer system capable of decrypting the received encrypted response; decrypting the encrypted response with the determined key if there is one determined key; determining whether the decrypted response includes a part of the generated message transmitted to the target computer system, wherein the target computer system is authorized to access the software if the decrypted response includes the part of the generated message and wherein the target computer system is not authorized to access the software if there is not one maintained key for the target computer system that is capable of decrypting the encrypted response or the decrypted response does not include the part of the generated message transmitted to the target computer system; and permitting the target computer system access to the software after determining that the target computer system is authorized to access the software. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system comprising a target computer system for accessing computer software from a source computer system, comprising:
-
a computer program executed by the target computer system to perform operations, the operations comprising; providing a key to the source computer system capable of decrypting an encrypted response from the target computer system; transmitting a request for the software to the source computer system; receiving an encrypted message from the source computer system; processing the encrypted message to generate a response message including a part of the encrypted message; encrypting the response message, wherein the encrypted response message is capable of being decrypted by the provided key at the source computer system; transmitting the encrypted response message to the source computer system; and receiving access to the requested software in response to the encrypted response message. - View Dependent Claims (11)
-
-
12. A system, comprising:
-
a target computer system; a source computer system in communication with the target computer system; wherein the source and the target computer systems perform operations, the operations comprising; maintaining, by the source computer system, keys of computer systems authorized to access software to be distributed; providing, by the target computer system, a key to the source computer system capable of decrypting an encrypted response from the target computer system; transmitting, by the target computer system, a request for the software to the source computer system; receiving, by the source computer system, the request for software from the target computer system; generating, by the source computer system;
a message;encrypting, by the source computer system, the generated message; transmitting, by the source computer system, the encrypted message to the target computer system; receiving, by the target computer system, the encrypted message from the source computer system; processing, by the target computer system, the encrypted message to generate a response message including a part of the encrypted message; encrypting, by the target computer system, the response message, wherein the encrypted response message is capable of being decrypted by the provided key at the source computer system; transmitting, by the target computer system, the encrypted response message to the source computer system; receiving, by the source computer system, the encrypted response from the target computer system; determining, by the source computer system, whether there is one maintained key for the target computer system capable of decrypting the received encrypted response; decrypting, by the source computer system, the encrypted response with the determined key if there is one determined key; determining, by the source computer system, whether the decrypted response includes a part of the generated message transmitted to the target computer system, wherein the target computer system is authorized to access the software if the decrypted response includes the part of the generated message and wherein the target computer system is not authorized to access the software if there is not one maintained key for the target computer system that is capable of decrypting the encrypted response or the decrypted response does not include the part of the generated message transmitted to the target computer system; transmitting, by the source computer system, indication of access to the target computer system after determining that the target computer system is authorized to access the software; receiving, by the target computer system, access to the requested software in response to the encrypted response message; and permitting, by the source computer system, the target computer system access to the software after determining that the target computer system is authorized to access the software. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
Specification