System and method for remote authorization for unlocking electronic data

  • US 5,982,892 A
  • Filed: 12/22/1997
  • Issued: 11/09/1999
  • Est. Priority Date: 12/22/1997
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for controlling unauthorized use of software distributed by a software vendor comprising the steps of:

  • generating, with a digital signature algorithm, a verification key with a product key generator;

    combining software and the verification key to create distributable software;

    distributing the distributable software to a user;

    installing the distributable software on a user computer system as protected software;

    inputting user identifying information to a user key generator;

    converting, by the user key generator, the user identifying information to a numeric representation;

    generating, using the numeric representation, a user key, with the digital signature algorithm;

    conveying the user key to the user computer system; and

    verifying, with the verification key, a relationship between the user key and the user identifying information to determine an access level to the protected software.

View all claims
    ×
    ×

    Thank you for your feedback

    ×
    ×