×

Remote authorization for unlocking electronic data system and method

DC
  • US 7,346,583 B2
  • Filed: 03/31/2003
  • Issued: 03/18/2008
  • Est. Priority Date: 12/22/1997
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for controlling unauthorized use of software distributed by a vendor comprising the steps of:

  • generating, with a digital signature algorithm, a verification key;

    combining software and the verification key to create distributable software;

    inputting identifying information, with the identifying information including user-identifying information, licensing information, batch number, user token, date, or time, or with the identifying information including a hash of user-identifying information, licensing information, batch number, user token, date, or time, to a user-key generator;

    converting, with the user-key generator, the identifying information to a numeric representation;

    generating, using the numeric representation, a user key, with the digital signature algorithm;

    conveying the user key to the user computer system; and

    verifying, with the verification key, a relationship between the user key and the identifying information to determine an access level to the software.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×