Remote feature activation authentication file system
First Claim
1. A method, comprising:
- providing a first computational component for installation by an untrusted user on a first computational system, the first computational component having a first set of authentication information permitting a first set of operations to be performed on the first computational component, wherein the first set of authentication information corresponds to a first login and comprises a first key and/or password, and wherein the first set of operations comprises requesting delivery of a second set of authentication information to enable a second set of operations to be performed on the first computational component, the first and second sets of operations being different, wherein the first set of operations provides access by the user to fewer validly licensed operational features than the second set of operations;
receiving by a remote feature activation system, at the time of sale or after purchase and installation of the first computational component, a request to create and/or update a system record associated with at least one of the first computational system and component;
creating or updating, by the remote feature activation system, the system record;
after the system record is created or updated successfully, receiving, by an input via signal transmission over a geographically distributed processing network, a request from the untrusted user for the second set of authentication information;
generating, by the remote feature activation system, the second set of authentication information, wherein the second set of authentication information comprises a unique first identifier of the first computational system, corresponds to at least a second login, and comprises a second key and/or password, whereby the unique first identifier associates the second set of authentication information with the first computational system and prevents use of the second set of authentication information with a second computational system having a different unique second identifier;
encrypting, by the remote feature activation system, the second set of authentication information to form an encrypted second set of authentication information;
transmitting, by the remote feature activation system over the geographically distributed processing network, the encrypted second set of authentication information to the first computational system; and
prohibiting, by the first computational system, the untrusted user from accessing a plain text version of at least one of the second key and/or password in the second set of authentication information.
24 Assignments
0 Petitions
Accused Products
Abstract
A system for providing a user with authorization to perform one or more functions using or otherwise involving a computational component is provided. The system includes an authentication file system 100 operable to (a) receive a request from a user for a second set of authentication information permitting a second set of operations to be performed on a computational component, wherein the computational component is operable to be installed by the user on the computational system, wherein the computational component contains a first set of authentication information permitting a first set of operations to be performed on the computational component; and wherein the first and second sets of operations are different; (b) generate an authentication file containing the second set of authentication information; and (c) transmit the authentication file to the computational system.
-
Citations
52 Claims
-
1. A method, comprising:
-
providing a first computational component for installation by an untrusted user on a first computational system, the first computational component having a first set of authentication information permitting a first set of operations to be performed on the first computational component, wherein the first set of authentication information corresponds to a first login and comprises a first key and/or password, and wherein the first set of operations comprises requesting delivery of a second set of authentication information to enable a second set of operations to be performed on the first computational component, the first and second sets of operations being different, wherein the first set of operations provides access by the user to fewer validly licensed operational features than the second set of operations; receiving by a remote feature activation system, at the time of sale or after purchase and installation of the first computational component, a request to create and/or update a system record associated with at least one of the first computational system and component; creating or updating, by the remote feature activation system, the system record; after the system record is created or updated successfully, receiving, by an input via signal transmission over a geographically distributed processing network, a request from the untrusted user for the second set of authentication information; generating, by the remote feature activation system, the second set of authentication information, wherein the second set of authentication information comprises a unique first identifier of the first computational system, corresponds to at least a second login, and comprises a second key and/or password, whereby the unique first identifier associates the second set of authentication information with the first computational system and prevents use of the second set of authentication information with a second computational system having a different unique second identifier; encrypting, by the remote feature activation system, the second set of authentication information to form an encrypted second set of authentication information; transmitting, by the remote feature activation system over the geographically distributed processing network, the encrypted second set of authentication information to the first computational system; and prohibiting, by the first computational system, the untrusted user from accessing a plain text version of at least one of the second key and/or password in the second set of authentication information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system, comprising a non-transitory computer-readable medium that includes:
-
a processor-executable retrieval agent operable to (i) receive, at the time of sale or after purchase and installation of a first computational component, from a remote feature activation system, and by a network, a request to create or update a system record associated with at least one of a first computational system and the first computational component and (ii) create and/or update the system record; and a processor-executable authentication file system operable, after the system record is created or updated successfully, to; (a) receive a request from an untrusted user for a second set of authentication information permitting a second set of operations to be performed on the first computational component, wherein the first computational component is operable to be installed by the untrusted user on the first computational system, wherein the first computational component contains a first set of authentication information permitting a first set of operations to be performed on the first computational component, wherein the first set of authentication information corresponds to a first login and comprises a first key and/or password, and wherein the first set of operations comprises requesting delivery of the second set of authentication information, and wherein the first and second sets of operations are different; (b) generate an encrypted authentication file containing the second set of authentication information, wherein the second set of authentication information comprises a unique first identifier of the first computational system, corresponds to at least a second login, and comprises a second key and/or password, whereby the unique first identifier prevents use of the second set of authentication information with a second computational system having a different unique second identifier; and (c) transmit, over a geographically distributed processing network, the encrypted authentication file to the first computational system, wherein the untrusted user does not have a privilege to access, through the first computational system, a plain text version of at least one of the second key and/or password in the encrypted authentication file. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method, comprising:
-
providing a first computational component for installation by an untrusted user on a first computational system; providing the untrusted user with at least one of a first password and key corresponding to a first login; after a first set of operations is enabled and after the untrusted user has successfully logged in to the first computational component using the first login and the at least one of the first password and key, receiving, at an input, a request from the untrusted user for authentication information permitting a second set of operations by the first computational component on the first computational system to be enabled, the authentication information corresponding to at least a second login and comprising a unique first identifier of at least one of the first computational component and first computational system and at least one of a second password and key, whereby the unique first identifier prevents use of the authentication information, on a second computational system, with a second computational component, wherein at least one of the second computational component and second computational system has a unique second identifier different from the first identifier; generating, by a remote feature activation system, an encrypted authentication file containing the set of authentication information; and transmitting, by the remote feature activation system over a distributed processing network, the encrypted authentication file to the user, wherein the user is not privileged to access, through the first computational system, a plain text version of at least one of the second password and key in the encrypted authentication file. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A system, comprising a non-transitory computer-readable medium that includes:
a processor-executable authentication file system operable to; receive a request from an untrusted user for authentication information permitting installation of a first computational component on a first computational system, wherein the untrusted user uses at least one of a first password and key corresponding to a first login to generate the request, the authentication information corresponding to at least a second login and comprising a unique first identifier of at least one of the first computational component and first computational system and at least one of a second password and key, whereby the unique first identifier prevents use of the authentication information, on a second computational system, with a second computational component, wherein at least one of the second computational component and second computational system has a unique second identifier different from the first identifier; generate an encrypted authentication file containing the set of authentication information as cipher text; and transmit, over a distributed processing network, the encrypted authentication file to the user, wherein the user is prohibited, by the first computational system, from accessing a plain text form of the at least one of the second password and key in the encrypted authentication file. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52)
Specification