System and method for remote authorization for unlocking electronic data
DCFirst Claim
1. A method for controlling unauthorized use of software distributed by a software vendor comprising the steps of:
- generating, with a digital signature algorithm, a verification key with a product key generator;
combining software and the verification key to create distributable software;
distributing the distributable software to a user;
installing the distributable software on a user computer system as protected software;
inputting user identifying information to a user key generator;
converting, by the user key generator, the user identifying information to a numeric representation;
generating, using the numeric representation, a user key, with the digital signature algorithm;
conveying the user key to the user computer system; and
verifying, with the verification key, a relationship between the user key and the user identifying information to determine an access level to the protected software.
1 Assignment
Litigations
0 Petitions
Accused Products
Abstract
A system and method for controlling unauthorized access to software distributed to a user by a vendor in which a verification key is generated by a product key generator and either embedded in the software prior to distribution or packaged with the software as a self-installing package. The verification key includes a private signing key and a public verification key. The combination of the software and the verification key create distributable software which is distributed to a user. The user installs the software on a user computer system as protected software. To obtain a user key, the user inputs user identifying information which is sent to a user key generator. The user key generator converts the user identifying information to a numeric representation and then generates, by signing the numeric representation with the private signing key, a user key, which is returned to the user. Using the verification key, a user key verifier verifies a relationship between the user key and the user identifying information to determine an access level to the protected software. The system verifies the relationship between the user key and the user identifying information every time the software is run to ensure continued protection of the software after installation.
105 Citations
18 Claims
-
1. A method for controlling unauthorized use of software distributed by a software vendor comprising the steps of:
-
generating, with a digital signature algorithm, a verification key with a product key generator; combining software and the verification key to create distributable software; distributing the distributable software to a user; installing the distributable software on a user computer system as protected software; inputting user identifying information to a user key generator; converting, by the user key generator, the user identifying information to a numeric representation; generating, using the numeric representation, a user key, with the digital signature algorithm; conveying the user key to the user computer system; and verifying, with the verification key, a relationship between the user key and the user identifying information to determine an access level to the protected software. - View Dependent Claims (2, 3, 4, 5, 6, 7, 18)
-
-
8. A system for controlling unauthorized use of software distributed to a user by a vendor, comprising:
-
a product key generator for generating, with a digital signature algorithm, a verification key to accompany the software at distribution; a user key generator for generating, responsive to user identifying information, using the digital signature algorithm, a unique user key using a numeric representation of the user identifying information; and a user key verifier for validating, using the verification key, a relationship between the unique user key and the numeric representation of the user identifying information to determine an access level to the software. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17)
-
Specification