Method and apparatus for protecting information and privacy
7 Assignments
0 Petitions
Accused Products
Abstract
A mechanism for the purchase of tags for copies of software ensures that identity of the purchaser of a tag table identifier value included in a purchased tag is not revealed. A mechanism of Call-Ups from the user device to a guardian center ensures that each tag table identifier value appears in only one user device and that the data included in a tag table and other data stored in the user device for the purpose of protecting vendor'"'"'s and owner'"'"'s rights in software, cannot be modified
85 Citations
99 Claims
-
1-32. -32. (canceled)
-
33. A method for purchasing software comprising the steps of:
-
creating, by a purchaser, a data structure including a tag table identifier value associated with a tag table in a user device and an identification of said software;
computing, by said purchaser, a hash function value of said data structure; and
sending, by said purchaser, a message to a vendor, said message comprising said hash function value and said identification of said software. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40)
-
-
41-98. -98. (canceled)
-
99. An apparatus for purchasing software comprising:
-
means for creating, by a purchaser, a data structure including a tag table identifier value associated with a tag table in a user device and an identification of said software;
means for computing, by said purchaser, a hash function value of said data structure; and
means for sending, by said purchaser, a message to a vendor, said message comprising said hash function value and said identification of said software.
-
Specification