Method and apparatus for feature configuration in remotely located ultrasound imaging system
DCFirst Claim
1. A method for configuring a computerized system at a remote location, comprising the steps of:
- storing a validation identifier inside said system;
transmitting an option identifier which identifies a change in system configuration from said remote location to a central location;
encrypting said validation identifier and said option identifier at said central location;
transmitting an encrypted feature key comprising a sequence of characters from said central location to said remote location, said encrypted feature key comprising said encrypted validation identifier and said encrypted option identifier;
placing said system in a feature key entry mode;
inputting said encrypted feature key into said system by operation of a sequence of input keys corresponding to said sequence of characters of said encrypted feature key;
decrypting said encrypted feature key inside said system to form decrypted data comprising a decrypted validation identifier and a decrypted option identifier;
comparing said decrypted validation identifier with said stored validation identifier;
altering a system configuration database inside said system to reflect said change in system configuration if said decrypted validation identifier matches said stored validation identifier.
0 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A method and apparatus for configuring an ultrasound imaging system at a remote location by obtaining an encrypted feature key from a central location (e.g., via telephone) and then inputting that feature key into the ultrasound imaging system using an operator interface (e.g., a keyboard). To validate the feature key, the ultrasound imaging system decrypts the encrypted data and then compares the decrypted data to validation data pre-stored in the system. If the decrypted data matches the validation data, then the optional feature identified by the feature key will be enabled each time the system is booted or initialized. Optionally, an expiration date can be associated with the activated option, after which date the feature will be disabled when the system is initialized. Similarly, an activated optional feature can be disabled at a remote location by the input of an encrypted key obtained from a central location.
13 Citations
31 Claims
-
1. A method for configuring a computerized system at a remote location, comprising the steps of:
-
storing a validation identifier inside said system;
transmitting an option identifier which identifies a change in system configuration from said remote location to a central location;
encrypting said validation identifier and said option identifier at said central location;
transmitting an encrypted feature key comprising a sequence of characters from said central location to said remote location, said encrypted feature key comprising said encrypted validation identifier and said encrypted option identifier;
placing said system in a feature key entry mode;
inputting said encrypted feature key into said system by operation of a sequence of input keys corresponding to said sequence of characters of said encrypted feature key;
decrypting said encrypted feature key inside said system to form decrypted data comprising a decrypted validation identifier and a decrypted option identifier;
comparing said decrypted validation identifier with said stored validation identifier;
altering a system configuration database inside said system to reflect said change in system configuration if said decrypted validation identifier matches said stored validation identifier. - View Dependent Claims (2, 3)
-
-
4. A method for configuring a computerized system, comprising the steps of:
-
booting a system with an intial system configuration;
placing said system in a feature key entry mode;
inputting an encrypted feature key into said system via an operator interface, said encrypted feature key comprising an encrypted validation identifier and an encrypted option identifier;
decrypted said encrypted feature key inside said system to from decrypted date comprising a decrypted validation identifier and a decrypted option identifier;
comparing said decrypted validation identifier with a pre-stored validation identifier;
altering a system configuration database inside said system to reflect a change in system configuration identifier by said decrypted option identifier if said decrypted validation identifier matches said stored validation identifier; and
rebooting said system with said change system configuration following said altering step and before use of said system. - View Dependent Claims (5, 6)
-
-
7. An ultrasound imaging system comprising:
-
an ultrasound transmitter for transmitting ultrasound energy into a volume of ultrasound scatterers;
a signal processing chain for acquiring display data representing an image of ultrasound scatterers in said volume in accordance with a system configuration comprising enabled features, said display data being based on ultrasound energy scattered by said ultrasound scatterers;
a monitor for displaying said image in response to receipt of said display data;
a memory for storing a system configuration database representing said enabled features of said system configuration;
an operator interface comprising a plurality of keys for inputting data into said system;
means for placing said system in a feature key entry mode in response to a predetermined command input via said operator interface; and
decrypting means for outputting decrypted data in response to depression of a sequence of keys of said operator representing an encrypted feature key comprising an encrypted validation identifier and an encrypted option identifier, said decrypted data comprising a decrypted validation identifier and a decrypted option identifier;
validating means for determining if said decrypted validation identifier is valid; and
means for altering said system configuration as a function of said decrypted option identifier only if said decrypted validation identifier is valid. - View Dependent Claims (8, 9, 10)
-
-
11. A system comprising:
-
an operation interface;
memory which stores a computer booting routine, an optional computer feature, a system configuration database comprising a validation identifier and a list of computer features to be activated at during computer booting, and a computer feature activation/de-activation routine for selectively adding or deleting an identifier of said optional computer feature to or from said list of activated computer features in said system configuration database; and
a computer which executes said computer booting routine during booting, executes said computer feature activation/de-activation routine only in response to entry of a first predetermined command via said operator interface after booting, and executes said computer optional feature in response to entry of a second predetermined command via said operator interface after booting if said optional computer feature has been activated during booting, wherein said computer feature activation/de-activation routine comprises the following steps;
decrypting a feature key entered via said operator interface to form decrypted data comprising a decrypted validation identifier and a decrypted optional computer feature identifier;
comparing said decrypted validation identifier with said stored validation identifier in said system configuration database; and
adding or deleting said decrypted optional computer feature identifier to or from said list of activated computer features in said system configuration database provided that said decrypted validation identifier matches said stored validation identifier. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for configuring a computerized system, comprising the following steps:
-
booting said computerized system with a system configuration wherein only those optional computer features which are identified in a list of activated optional computer features listed in a system configuration database stored in system memory are activated;
inputting a command via an operator interface which causes said computerized system to enter a feature activation mode;
inputting an encrypted feature key into said computerized system via said operator interface while said computerized system is in said feature activation mode, said encrypted feature key comprising an encrypted validation identifier and an encrypted optional computer feature identifier, wherein said encrypted optional computer feature identifier corresponds to an optional computer feature not identified in said list of activated optional computer features;
automatically decrypting said feature key inputted via said operator interface to form decrypted data comprising a decrypted validation identifier and a decrypted optional computer feature identifier;
automatically comparing said decrypted validation identifier with a stored validation identifier in said system configuration database; and
automatically adding said decrypted optional computer feature identifier to said list of activated computer features in said system configuration database if said decrypted validation identifier matches said stored validation identifier. - View Dependent Claims (20, 21, 22, 23, 24)
-
-
25. A method for configuring a computerized system, comprising the following steps:
-
booting said computerized system to have a system configuration wherein only those optional computer features which are identified in a list of activated optional computer features listed in a system configuration database stored in system memory are activated;
inputting a command via an operator interface which causes said computerized system to enter a feature de-activation mode;
inputting an encrypted feature key into said computerized system via said operator interface while said computerized system is in said feature de-activation mode, said encrypted feature key comprising an encrypted validation identifier and an encrypted optional computer feature identifier, wherein said encrypted optional computer feature identifier corresponds to an optional computer feature identified in said list of activated optional computer features;
automatically decrypting said feature key inputted via said operator interface to form decrypted data comprising a decrypted validation identifier and a decrypted optional computer feature identifier;
automatically comparing said decrypted validation identifier with a stored validation identifier in said system configuration database; and
automatically deleting said decrypted optional computer feature identifier from said list of activated computer features in said system configuration database if said decrypted validation identifier matches said stored validation identifier. - View Dependent Claims (26)
-
-
27. A method for configuring a computerized system, comprising the steps of:
-
pre-storing an option and an activation status datum in said system, said activation status datum having a first value indicating that said option should not be activated when said system is booted;
transmitting data comprising an option identifier identifying said option and a machine identification number identifying said system from a remote location to a central location;
at said central location, receiving said data, adding a key identifier to said data, encrypting said key identifier and said data to form an encrypted feature key, and transmitting said encrypted feature key to said remote location;
inputting said encrypted feature key into said system via an operator interface;
inside said system, automatically performing the following steps;
decrypting said encrypted feature key inside said system to form decrypted data comprising said key identifier, said option identifier and said machine identification number;
validating said key identifier and said machine identification number resulting from decryption; and
changing said activation status datum from said first value to a second value if said key identifier and said machine identification number are valid, said second value indicating that said option should be activated when said system is booted.
-
-
28. A method for configuring a computerized system, comprising the steps of:
-
pre-storing an option and an activation status datum in said system, said activation status datum having a first value indicating that said option should be activated when said system is booted;
transmitting data comprising an option identifier identifying said option and a machine identification number identifying said system from a remote location to a central location;
at said central location, receiving said data, adding a key identifier to said data, encrypting said key identifier and said data to form an encrypted feature key, and transmitting said encrypted feature key to said remote location;
inputting said encrypted feature key into said system via an operator interface; and
inside said system, automatically performing the following steps;
decrypting said encrypted feature key to form decrypted data comprising said key identifier, said option identifier and said machine identification number;
validating said key identifier and said machine identification number resulting from decryption; and
changing said activation status datum from said first value to a second value if said key identifier and said machine identification number are valid, said second value indicating that said option should not be activated when said system is booted.
-
-
29. A system comprising:
-
an operator interface;
memory storing an option, an option identifier identifying said option, and an activation status datum, said activation status datum having either first or second values, said first value indicating that said option should not be activated when said system is booted and said second value indicating that said option should be activated when said system is booted; and
a computer programmed to perform the following steps in an option activation mode;
detecting entry of an encrypted feature key via said operator interface;
decrypting said encrypted feature key to form decrypted data;
verifying that said decrypted data comprise a valid key identifier and a valid machine identification number; and
after verification, changing said activation status datum from one of said first and second values to the other of said first and second values if said decrypted data comprise said option identifier. - View Dependent Claims (30)
-
-
31. A method for changing a state of activation of an optional software feature stored in a computerized system via an operator interface, comprising the steps of:
-
inputting an enter feature key entry mode command; and
inputting an encrypted feature key comprising a machine identification number identifying said computerized system, an option identifier identifying said optional software feature, an expiration date on which said optional software feature should be de-activated, and a key identifier.
-
Specification