×

Remote feature activation authentication file system

  • US 7,913,301 B2
  • Filed: 10/30/2006
  • Issued: 03/22/2011
  • Est. Priority Date: 12/26/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method for installing a computational component on a first computational system, comprising:

  • providing a computational component for installation by a user on a first computational system, the computational component having a first set of authentication information permitting a first set of operations to be performed on the computational component, wherein the first set of authentication information corresponds to a first login and comprises a first key and/or password, and wherein the first set of operations comprises requesting delivery of a second set of authentication information;

    receiving, at a network interface of a remote feature activation system, the first set of authentication information from the user before, during, or after installation of the computational component on the first computational system;

    verifying, at the remote feature activation system, the first set of authentication information;

    after the first set of authentication information is successfully verified, receiving a request from the user for the second set of authentication information, which permits a second set of operations to be performed on the computational component, the first and second sets of operations being different, wherein the first set of operations provides access by the user to fewer validly licensed operational features than the second set of operations;

    receiving an authentication file containing the second set of authentication information, the second set of authentication information comprising a unique identifier of the first computational system, corresponding to a second login, and comprising a second key and/or password, whereby the unique identifier links the second set of authentication information with the first computational system such that the second set of authentication information cannot be used on a second computational system having a different unique identifier; and

    loading the authentication file onto the first computational system.

View all claims
  • 23 Assignments
Timeline View
Assignment View
    ×
    ×