Method and apparatus for protecting information and privacy
First Claim
Patent Images
1. A computer implemented system for purchasing software comprising:
- a supervising program executing on a user device, which is associated with a purchaser, where the integrity of the supervising program on the user device is ensured; and
the supervising program having computer readable instructions that enable a purchaser to purchase software from a vendor while protecting the privacy of the purchaser from the vendor during the purchase by;
creating, on the user device, a data structure including;
an identification of said software; and
a tag table identifier value associated with a tag table in the user'"'"'s device, the tag table providing information about one or more tags that convey permission to use the software, the tag table identifier value identifying the tag table;
where the tag table identifier value is independent of any identifying information associated with hardware of said user device and where use of the same tag table identifier value on multiple user devices is detectable by a communication protocol using a call-up mechanism;
computing, by said user device, a function value of said data structure using a one-way function, where the tag table identifier value cannot be determined by the vendor;
sending, by said user device, a message to the vendor comprising said function value and said identification of said software, where the tag table identifier is masked by the one-way function to avoid revealing the tag table identifier to the vendor; and
wherein the call-up mechanism includes sending, at some time, by the supervising program from the user device, a call-up message to a guardian center, where the call-up message assists the guardian center in detecting whether another user device is using the same tag table identifier value.
7 Assignments
0 Petitions
Accused Products
Abstract
A mechanism for the purchase of tags for copies of software ensures that identity of the purchaser of a tag table identifier value included in a purchased tag is not revealed. A mechanism of Call-Ups from the user device to a guardian center ensures that each tag table identifier value appears in only one user device and that the data included in a tag table and other data stored in the user device for the purpose of protecting vendor'"'"'s and owner'"'"'s rights in software, cannot be modified.
-
Citations
18 Claims
-
1. A computer implemented system for purchasing software comprising:
-
a supervising program executing on a user device, which is associated with a purchaser, where the integrity of the supervising program on the user device is ensured; and the supervising program having computer readable instructions that enable a purchaser to purchase software from a vendor while protecting the privacy of the purchaser from the vendor during the purchase by; creating, on the user device, a data structure including; an identification of said software; and a tag table identifier value associated with a tag table in the user'"'"'s device, the tag table providing information about one or more tags that convey permission to use the software, the tag table identifier value identifying the tag table; where the tag table identifier value is independent of any identifying information associated with hardware of said user device and where use of the same tag table identifier value on multiple user devices is detectable by a communication protocol using a call-up mechanism; computing, by said user device, a function value of said data structure using a one-way function, where the tag table identifier value cannot be determined by the vendor; sending, by said user device, a message to the vendor comprising said function value and said identification of said software, where the tag table identifier is masked by the one-way function to avoid revealing the tag table identifier to the vendor; and wherein the call-up mechanism includes sending, at some time, by the supervising program from the user device, a call-up message to a guardian center, where the call-up message assists the guardian center in detecting whether another user device is using the same tag table identifier value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. An apparatus for purchasing software comprising:
-
means for enabling a purchaser to purchase software from a vendor while protecting the privacy of the purchaser from the vendor during the purchase by; means for creating, on a user device associated with the purchaser, a data structure including; identification of said software; and a tag table identifier value associated with a tag table in the user'"'"'s device, the tag table providing information about one or more tags that convey permission to use the software, the tag table identifier value identifying the tag table; where the tag table identifier value is independent of any identifying information associated with hardware of said user device and where use of the same tag table identifier value on multiple user devices is detectable by a communication protocol using a call-up mechanism; means for computing, by said user device, a function value of said data structure using a one-way function, where the tag table identifier value cannot be determined by the vendor; and means for sending, by said user device, a message to the vendor comprising said function value and said identification of said software, where the tag table identifier is masked by the one-way function to avoid revealing the tag table identifier to the vendor; and the call-up mechanism including; means for sending, at some time, by the supervising program from the user device, a call-up message to a guardian center; and means for assisting the guardian center in detecting whether another user device is using the same tag table identifier value.
-
-
18. A computer implemented system for purchasing software comprising:
-
a supervising program executing on a purchaser'"'"'s user device, where the integrity of the supervising program on the user device is ensured; the supervising program enabling the user device to purchase software from a vendor while protecting the privacy of the purchaser from the vendor during the purchase by; creating, on the user device, a data structure including; a tag table identifier value associated with a tag table in the user'"'"'s device, the tag table providing information about one or more tags that convey permission to use software, an identification of said software, where the tag table identifier cannot be determined by the vendor, the tag table identifier value being independent of any identifying information associated with hardware of said user device and where use of the same tag table identifier on value multiple user devices is detectable by a communication protocol using a call-up mechanism; computing, by said user device, a function value of said data structure using a one-way function, where the tag table identifier value cannot be determined by the vendor; and sending, by said user device, a message to the vendor said message comprising said function value and said identification of said software, where the tag table identifier is masked by the one-way function to avoid revealing the tag table identifier to the vendor; an anonymous communication channel for enabling the purchaser to purchase the software, where the anonymous communication channel prevents the vendor from determining the network identifier of the user device; a one way function value storing a portion of said software in said identification of software; said supervising program verifying that said one way function value in said identification of said software equals a computed one way function value on said portion of said software; and wherein the call-up mechanism includes sending, at some time, by the supervising program from the user device, a call-up message to a guardian center, where the call-up message assists the guardian center in detecting whether another user device is using the same tag table identifier value.
-
Specification