Method and system for authenticating software
First Claim
1. A method of authenticating software, the method comprising:
- receiving, at the mobile terminal, a download file from a server being in data communication with the mobile terminal, wherein the download file comprises software data and a first error code, and wherein the software data is a data file containing at least a portion of software;
generating a second error code for the software data;
storing the software data on the mobile terminal if the first error code corresponds to the second error code;
generating a first authentication key based on the mobile terminal identifier and the first error code;
receiving, at a mobile terminal, an execution instruction for software installed in the mobile terminal;
generating a third error code for the software, wherein the third error code is configured to determine whether an error has occurred in the installed software;
generating a second authentication key based on a mobile terminal identifier of the mobile terminal and the third error code, wherein the mobile terminal identifier includes an electronic serial number (ESN) of the mobile terminal;
executing the installed software only if the second authentication key corresponds to the first authentication key stored in the mobile terminal, wherein the installed software is configured to use resources of the mobile terminal; and
after the installed software is executed, controlling the amount of the resources of the mobile terminal which can be used by the installed software based on security level information,wherein the resources of the mobile terminal comprise at least one of the following;
an electronic serial number (ESN) of the mobile terminal, subscriber information, channel allocation or stability of the mobile terminal and wireless network, a mobile identification number (MIN) of the mobile terminal, the current state of the mobile terminal, a phone call function and a function of sending a short message service (SMS) message.
2 Assignments
0 Petitions
Accused Products
Abstract
The invention relates to a method and system for authenticating software. One embodiment of the invention provides a system for authenticating software in a mobile terminal, wherein the system is configured to: receive an execution instruction for software installed in the mobile terminal through an inputting means, generate a first error code for the software, extract a mobile terminal identifier of the mobile terminal, generate a first authentication key by combining the mobile terminal identifier and the first error code, and execute the software when the first authentication key corresponds to a second authentication key stored in the mobile terminal. By authenticating the software for a wireless mobile terminal, one embodiment of the invention can prevent unauthorized duplication and execution of the software at the mobile terminal.
14 Citations
23 Claims
-
1. A method of authenticating software, the method comprising:
-
receiving, at the mobile terminal, a download file from a server being in data communication with the mobile terminal, wherein the download file comprises software data and a first error code, and wherein the software data is a data file containing at least a portion of software; generating a second error code for the software data; storing the software data on the mobile terminal if the first error code corresponds to the second error code; generating a first authentication key based on the mobile terminal identifier and the first error code; receiving, at a mobile terminal, an execution instruction for software installed in the mobile terminal; generating a third error code for the software, wherein the third error code is configured to determine whether an error has occurred in the installed software; generating a second authentication key based on a mobile terminal identifier of the mobile terminal and the third error code, wherein the mobile terminal identifier includes an electronic serial number (ESN) of the mobile terminal; executing the installed software only if the second authentication key corresponds to the first authentication key stored in the mobile terminal, wherein the installed software is configured to use resources of the mobile terminal; and after the installed software is executed, controlling the amount of the resources of the mobile terminal which can be used by the installed software based on security level information, wherein the resources of the mobile terminal comprise at least one of the following;
an electronic serial number (ESN) of the mobile terminal, subscriber information, channel allocation or stability of the mobile terminal and wireless network, a mobile identification number (MIN) of the mobile terminal, the current state of the mobile terminal, a phone call function and a function of sending a short message service (SMS) message. - View Dependent Claims (2, 3, 4, 5, 6, 16, 21)
-
-
7. A method of authenticating software between a server and a mobile terminal communicating data through a network, the method comprising:
-
receiving, at the server, a download request signal from the mobile terminal, wherein the download request signal includes a mobile terminal identifier of the mobile terminal and an identification of software to be downloaded, and wherein the mobile terminal identifier includes an electronic serial number (ESN) of the mobile terminal; identifying the mobile terminal based on the mobile terminal identifier; determining whether or not the software is authorized to be downloaded to the mobile terminal; obtaining software data corresponding to the download request signal, wherein the software data is a data file containing at least a portion of the requested software; generating, an error code for the software data, corresponding to the mobile terminal, wherein the error code is configured to determine whether an error has occurred in the software data; generating security level information associated with the software, wherein the software is configured to use resources of the mobile terminal, and wherein the security level information, is configured to control, after the software is executed in the mobile terminal, the amount of the resources of the mobile terminal which can be used by the executed software; generating a download file including the software data, the error code and security level information; transmitting the download file to the mobile terminal; generating, at the mobile terminal, a first authentication key based on the mobile terminal identifier and the error code, wherein the software is installed in the mobile terminal; and executing, at the mobile terminal, the installed software only if the first authentication key corresponds to a second authentication key stored in the mobile terminal, wherein the generated error code, in combination with the mobile terminal identifier of the mobile terminal, and an authentication key generated based on the transmitted download file in the mobile terminal, is configured to control the execution of the software at the mobile terminal, and wherein the resources of the mobile terminal comprise at least one of the following;
an electronic serial number (ESN) of the mobile terminal, subscriber information, channel allocation or stability of the mobile terminal and wireless network, a mobile identification number (MIN) of the mobile terminal, the current state of the mobile terminal, a phone call function and a function of sending a short message service (SMS) message. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15)
-
-
17. A system for authenticating software between a server and a mobile terminal communicating data through a network, wherein the system is configured to i) receive a download request signal from the mobile terminal, wherein the download request signal comprises an identification of software to be downloaded, ii) obtain software data corresponding to the download request signal, wherein the software data is a data file containing at least a portion of the requested software, iii) generate an error code, for the software data, corresponding to the mobile terminal, iv) generate security level information associated with the software, wherein the software is configured to use resources of the mobile terminal, and wherein the security level information, after the software is executed in the mobile terminal, is configured to control the amount of the resources of the mobile terminal which can be used by the executed software, v) generate a download file including the software data, the error code and security level information, vi) transmit the download file to the mobile terminal, wherein the error code is configured to determine whether an error has occurred in the software, vii) generate, at the mobile terminal, a first authentication key based on the mobile terminal identifier and the error code, wherein the software is installed in the mobile terminal and viii) execute, at the mobile terminal, the installed software only if the first authentication key corresponds to a second authentication key stored in the mobile terminal,
wherein the generated error code, in combination with a mobile terminal identifier of the mobile terminal and an authentication key generated based on the transmitted download file in the mobile terminal, is configured to control the execution of the software at the mobile terminal, wherein the mobile terminal identifier includes an electronic serial number (ESN) of the mobile terminal, and wherein the resources of the mobile terminal comprise at least one of the following: - an electronic serial number (ESN) of the mobile terminal, subscriber information, channel allocation or stability of the mobile terminal and wireless network, a mobile identification number (MIN) of the mobile terminal, the current state of the mobile terminal, a phone call function and a function of sending a short message service (SMS) message.
- View Dependent Claims (18)
-
19. One or more processor readable storage devices having processor readable code embodied on the processor readable storage devices, the processor readable code for programming one or more processors to perform a method of identifying extreme behavior in elements of a network, the method comprising:
-
receiving, at a mobile terminal, an execution instruction for software installed in the mobile terminal; generating a first error code for the installed software, wherein the first error code is configured to determine whether an error has occurred in the software; generating a first authentication key based on a mobile terminal identifier of the mobile terminal and the first error code, wherein the mobile terminal identifier includes an electronic serial number (ESN) of the mobile terminal; and executing the installed software only if the first authentication key corresponds to a second authentication key stored in the mobile terminal, wherein the installed software is configured to use resources of the mobile terminal; and after the installed software is executed, controlling the amount of the resources of the mobile terminal which can be used by the installed software based on security level information, wherein the resources of the mobile terminal comprise at least one of the following;
an electronic serial number (ESN) of the mobile terminal, subscriber information, channel allocation or stability of the mobile terminal and wireless network, a mobile identification number (MIN) of the mobile terminal, the current state of the mobile terminal, a phone call function and a function of sending a short message service (SMS) message. - View Dependent Claims (22)
-
-
20. A system for authenticating software, the system comprising:
-
means for receiving, at a mobile terminal, an execution instruction for software installed in the mobile terminal; means for generating a first error code for the installed software, wherein the first error code is configured to determine whether an error has occurred in the software; means for generating a first authentication key based on a mobile terminal identifier of the mobile terminal and the first error code, wherein the mobile terminal identifier includes an electronic serial number (ESN) of the mobile terminal; and means for executing the installed software only if the first authentication key corresponds to a second authentication key stored in the mobile terminal, wherein the installed software is configured to use resources of the mobile terminal; and means for controlling, after the installed software is executed, the amount of the resources of the mobile terminal which can be used by the installed software based on security level information, wherein the resources of the mobile terminal comprise at least one of the following;
an electronic serial number (ESN) of the mobile terminal, subscriber information, channel allocation or stability of the mobile terminal and wireless network, a mobile identification number (MIN) of the mobile terminal, the current state of the mobile terminal, a phone call function and a function of sending a short message service (SMS) message. - View Dependent Claims (23)
-
Specification