Methods of licensing software programs and protecting them from unauthorized use
First Claim
Patent Images
1. A computer-implemented method comprising:
- determining a key derived from executable code of a licensing module, wherein the licensing module is intended to verify a digital signature of a licensed application installed on a user device;
encrypting protected data with the derived key to protect the executable code of the licensing module from modification, wherein the protected data comprises a portion of the executable code of the licensed application that is required for proper execution of the licensed application and is not decryptable as a result of the executable code of the licensing module being modified; and
distributing a licensed software product to the user device including
1) the executable code of the licensing module,
2) executable code of the licensed application, and
3) the encrypted protected data to the user device, wherein the licensed application is to properly execute on the user device upon successful decryption of the encrypted protected data and verification of the digital signature of the licensed application.
5 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a method for controlling use of a software licensed product is provided. The method comprises tracking a usage of the software licensed product by a plurality of user computers within an intranet; and for all but one instance of the usage of the software licensed product, terminating the usage of the software license product.
51 Citations
18 Claims
-
1. A computer-implemented method comprising:
-
determining a key derived from executable code of a licensing module, wherein the licensing module is intended to verify a digital signature of a licensed application installed on a user device; encrypting protected data with the derived key to protect the executable code of the licensing module from modification, wherein the protected data comprises a portion of the executable code of the licensed application that is required for proper execution of the licensed application and is not decryptable as a result of the executable code of the licensing module being modified; and distributing a licensed software product to the user device including
1) the executable code of the licensing module,
2) executable code of the licensed application, and
3) the encrypted protected data to the user device, wherein the licensed application is to properly execute on the user device upon successful decryption of the encrypted protected data and verification of the digital signature of the licensed application. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system comprising:
-
a memory; and a processor, coupled to the memory, to; determine a key derived from code of a licensing module, wherein the licensing module is intended to verify a digital signature of a licensed application installed on a user device; encrypt protected data with the derived key to protect the code of the licensing module from modification, wherein the protected data is required for proper execution of the licensed application; and distribute the code of the licensing module and the encrypted protected data to the user device, wherein the licensed application is to properly execute on the user device upon successful decryption of the encrypted protected data and verification of the digital signature of the licensed application. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable storage medium including instructions that, when executed by a processor, cause the processor to perform a method, comprising:
-
determining a key derived from code of a licensing module, wherein the licensing module is intended to verify a digital signature of a licensed application installed on a user device; encrypting protected data with the derived key to protect the code of the licensing module from modification, wherein the protected data is required for proper execution of the licensed application; and distributing the code of the licensing module and the encrypted protected data to the user device, wherein the licensed application is to properly execute on the user device upon successful decryption of the encrypted protected data and verification of the digital signature of the licensed application. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification