×

Remote feature activation authentication file system

  • US 7,890,997 B2
  • Filed: 01/20/2003
  • Issued: 02/15/2011
  • Est. Priority Date: 12/26/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising:

  • providing a first computational component for installation by an untrusted user on a first computational system, the first computational component having a first set of authentication information permitting a first set of operations to be performed on the first computational component, wherein the first set of authentication information corresponds to a first login and comprises a first key and/or password, and wherein the first set of operations comprises requesting delivery of a second set of authentication information to enable a second set of operations to be performed on the first computational component, the first and second sets of operations being different, wherein the first set of operations provides access by the user to fewer validly licensed operational features than the second set of operations;

    receiving by a remote feature activation system, at the time of sale or after purchase and installation of the first computational component, a request to create and/or update a system record associated with at least one of the first computational system and component;

    creating or updating, by the remote feature activation system, the system record;

    after the system record is created or updated successfully, receiving, by an input via signal transmission over a geographically distributed processing network, a request from the untrusted user for the second set of authentication information;

    generating, by the remote feature activation system, the second set of authentication information, wherein the second set of authentication information comprises a unique first identifier of the first computational system, corresponds to at least a second login, and comprises a second key and/or password, whereby the unique first identifier associates the second set of authentication information with the first computational system and prevents use of the second set of authentication information with a second computational system having a different unique second identifier;

    encrypting, by the remote feature activation system, the second set of authentication information to form an encrypted second set of authentication information;

    transmitting, by the remote feature activation system over the geographically distributed processing network, the encrypted second set of authentication information to the first computational system; and

    prohibiting, by the first computational system, the untrusted user from accessing a plain text version of at least one of the second key and/or password in the second set of authentication information.

View all claims
  • 24 Assignments
Timeline View
Assignment View
    ×
    ×