CA2095723C - Secure system for activating personal computer software at remote locations - Google Patents
Secure system for activating personal computer software at remote locations Download PDFInfo
- Publication number
- CA2095723C CA2095723C CA002095723A CA2095723A CA2095723C CA 2095723 C CA2095723 C CA 2095723C CA 002095723 A CA002095723 A CA 002095723A CA 2095723 A CA2095723 A CA 2095723A CA 2095723 C CA2095723 C CA 2095723C
- Authority
- CA
- Canada
- Prior art keywords
- file
- program
- registration
- overlay
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 230000003213 activating effect Effects 0.000 title claims abstract description 9
- 238000000034 method Methods 0.000 claims abstract description 59
- 230000008569 process Effects 0.000 claims abstract description 20
- 125000004122 cyclic group Chemical group 0.000 claims description 21
- 230000004913 activation Effects 0.000 claims description 4
- 238000012546 transfer Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000012360 testing method Methods 0.000 description 7
- 230000008859 change Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000010200 validation analysis Methods 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 238000013479 data entry Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 239000003973 paint Substances 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2211/00—Indexing scheme relating to details of data-processing equipment not covered by groups G06F3/00 - G06F13/00
- G06F2211/007—Encryption, En-/decode, En-/decipher, En-/decypher, Scramble, (De-)compress
Abstract
A process and system for activating various programs are provided in a personal computer (10), The personal computer (10) is initially provided with a registration shell program (11). A data link (30) is established between the personal computer (10) and a registration computer (12). By providing the registration computer (12) with various information, a potential licensee can register to utilize the main program (16). Once the registration process is complete, a tamperproof overlay program is constructed at the registration computer (12) and transferred to the personal computer (10). The tamperproof overlay includes critical por-tions of the main program (16), without which the main program (16) would not operate and also contains licensee identification and license control data.
Description
A SECURE SYSTEM FOR ACTIVATING PERSONAL COMPUTER
SOFTWARE AT REMOTE LOCATIONS
HACRGROUND OF THE INVENTION
Generally speaking, most users of personal computers or similar devices obtain additional computer software to run on their devices by purchasing this software in various retail outlets or by obtaining this additional software through the mail. In both situations, a "shrink-wrap" material encases the software product and a license agreement is implied by the removal of the shrink wrap material in an endeavor to protect the licensor of the product from unauthorized copying and use of the product by the licensee/purchaser. This method of doing business has proved to be inadequate for both the licensee and the licensor. For example, the licensee is not given an opportunity to initially operate the software program to determine whether this program would suit the licensee's needs. Additionally, from the licensor's paint of view, identification of the licensee and a means of controlling or monitoring the use of the program by the licensee are not provided by this technique.
Software program protection schemes have been disclosed in U.S. Patent 4,446,519, issued to Thomas, which involve including a programmed Go/No Go Test within the program to confirm the presence of a hardware or firmware security device installed on the computer to which the software is licensed.
This technique is intended to ensure that copies of the program will not be utilized without the physical security device, which is much more difficult to duplicate than the software. Such techniques are easily defeated, however by discovering the correct coded response and providing it through a slight modification to the program. Once defeated, unlimited, defeated copies may be provided and distributed.
U.S. Patent 4,740,890, issued to William, teaches the use of a central (remote) computer to provide unlocking codes or validation codes derived from master lists or algorithms inaccessible to the unscrupulous programmer who may attempt to derive the correct codes . However , the methods taught are eas i ly detected by intercepting the transmitted code, by programming around the test, or by analyzing the program with a debugger ri t'7 ~), '::
SOFTWARE AT REMOTE LOCATIONS
HACRGROUND OF THE INVENTION
Generally speaking, most users of personal computers or similar devices obtain additional computer software to run on their devices by purchasing this software in various retail outlets or by obtaining this additional software through the mail. In both situations, a "shrink-wrap" material encases the software product and a license agreement is implied by the removal of the shrink wrap material in an endeavor to protect the licensor of the product from unauthorized copying and use of the product by the licensee/purchaser. This method of doing business has proved to be inadequate for both the licensee and the licensor. For example, the licensee is not given an opportunity to initially operate the software program to determine whether this program would suit the licensee's needs. Additionally, from the licensor's paint of view, identification of the licensee and a means of controlling or monitoring the use of the program by the licensee are not provided by this technique.
Software program protection schemes have been disclosed in U.S. Patent 4,446,519, issued to Thomas, which involve including a programmed Go/No Go Test within the program to confirm the presence of a hardware or firmware security device installed on the computer to which the software is licensed.
This technique is intended to ensure that copies of the program will not be utilized without the physical security device, which is much more difficult to duplicate than the software. Such techniques are easily defeated, however by discovering the correct coded response and providing it through a slight modification to the program. Once defeated, unlimited, defeated copies may be provided and distributed.
U.S. Patent 4,740,890, issued to William, teaches the use of a central (remote) computer to provide unlocking codes or validation codes derived from master lists or algorithms inaccessible to the unscrupulous programmer who may attempt to derive the correct codes . However , the methods taught are eas i ly detected by intercepting the transmitted code, by programming around the test, or by analyzing the program with a debugger ri t'7 ~), '::
program to inspect for the presence of a code which will allow execution of the program. Once the test is defeated, unlimited copies of the operable program may be produced and distributed.
Additionally, protection schemes for valuable computer programs have been taught which involve invalidating the most valuable algorithms, and only restoring such valuable algorithms by running the invalidated program in a processor while simulta neously running a restoration algorithm in a physically separate and protected processor, the valid result being obtained by the intercommunication of the two processes, which are described in U.S. Patent 4,649,510, issued to Schmidt. Such techniques are dependent upon the physical protection of the restoration algorithm and could easily be defeated by an unscrupulous programmer if the physical security were breached. Therefore, such a scheme is impractical in a mass market where physical security of the restoration storage media cannot be maintained.
Consequently, an economical method for distributing software to a mass market while protecting the software from abuse by anonymous licenses is warranted. Furthermore, a method and system for allowing a potential purchaser/licensee to test a software program prior to purchasing the product is needed.
Still further, a method for distributing enhancements, and updates to registered license is desirable.
20~~~1~' BRIEF DESCRIPTION OF THE INVENTION
The present invention is directed to a method and a system for permitting personal computer software programs or other types of programs to be distributed in a license controlled manner. An operational program will be made available in a particular transaction between the purchaser/licensee and the seller/licensor. Although the relationship between the seller and the purchaser need not be a licensor/licensee agreement, for the purposes of the present invention, we will refer to the seller as the licensor and the purchaser as the licensee or user.
Once the licensee agrees to the terms of the particular transac-tion, licensee identification data is provided to a registration computer. The registration computer records the transaction and provides the operational segments of the licensed program. These segments are both tamperproof and unique to the identified licensee. Based upon this exchange of information, the opera-tional computer program is delivered to the registered licensee's computer in a tamperproof file that also includes licensee unique information.
Although various embodiments of the present invention may be envisioned, it is noted that all embodiments involve building an encrypted package containing unique data identifying the licensee and the protected software program instructions.
Thus, licensees are not anonymous, and protected software is encoded with information traceable to the licensing transaction.
Furthermore, by including license control data within the encrypted package, various limits may be imposed which serve to enforce the terms of the license agreement.
In general, the various embodiments involve a first distribution of a marketing shell which may contain a demonstra tion version of the software. The shell may contain only sample displays and advertising descriptions or, alternatively, may contain an inactive version of the complete program. However, most embodiments are envisioned to include a registration program and a special program module called a loader segment.
The marketing shell would be distributed freely by any appropriate method. If it contains a demonstration version of a , <~, the program, the executive control loop will represent a limited version of the protected program. The marketing shell will prompt the prospective user to register. The registration program within the marketing shell relays registration data to a registration database computer. A unique encrypted package is assembled containing some data unique to the licensed user and an operational version of the program combined within an encrypted file. A unique decryption key is transmitted to the user's computer along with the encrypted file and any unprotected program files which may augment the marketing shell. Upon receiving the decrypt key, encrypted file, and unprotected files, the marketing shell will install each of these on the user's computer.
Subsequently, each time the user executes the program, a loader segment will load and decrypt the encrypted file, as an overlay to the unprotected files, using the decrypt key provided.
The program will be executed in accordance with the design of the protected software program and the unique licensee data is also loaded during the program execution. When the program is not executing, the protected program remains in its encrypted form, in the mass storage of the computer along with the unprotected program files. The protected program is decrypted only when loaded for execution and may not be changed without access to the authentic encryption key.
BRIEF DESCRIPTION OF THE DRAWINGB
FIG. I is a flow diagram of the registration process according to the present invention;
FIG. II is a flow diagram of the program execution process according to the present invention; and FIG. III is a block diagram of a typical personal computer and registration computer according to the teachings of the present invention.
FIG. IV is a block diagram of an alternative embodiment of a typical personal computer and registration computer according to the teachings of the present invention.
WO 92/09160 ~~ ~c~ '~,t PCT/US91/08069 DETAILED DESCRIPTION OF THE INVENTION
The purpose of the present invention is to allow a licensor to maintain accountability of its programs in a manner much more efficient than presently being utilized. Additionally, a second purpose of the present invention is to allow a licensee or user to test a particular program before it is purchased or licensed. Further, it is another purpose of this invention to provide a means for distributing license protected upgrades of a particular programs to registered licenses. Therefore, it is contemplated that the teachings of the present invention are considered to be comprehensive and that any software program could be distributed by this method.
In one embodiment, a particular program which is complete except for an operational executive control loop is initially provided in a personal computer or other device on a magnetic disc, firmware, hardware, or other means. Additionally, a registration shell program is also included with the particular program. However, in the case of small or extremely valuable program, the entire program may be missing and only the shell provided. Due to the exclusion of the executive control loop, the program would not operate without the implementation of the proper registration process. As shown in FIGS. I and III, this registration process is initiated utilizing a registration shell program 11 in the personal computer (PC) 10 as well as a registration program 40 provided in a registration computer 12.
A registration system program is provided in the registration computer 12 and is accessible to the registration shell program 11 by an electronic data link 30. The electronic data link may be a local area network, a telephone modem link, or any other type. However, it should be noted that in a second embodiment, the registration shell and the registration system programs could be on the same medium, but separate from the product application program. In this instance, the transportable media containing the registration shell and the registration systems program are personally transported to the personal computer l0 of the user by a licensed installer, and no electronic data link is needed.
The registration shell program is executed when the user first attempts to execute the product application program provided in the main program file 16 of the PC operating system 14. The registration shell provides and displays on the PC display, descriptive information about the product application program and prompts the potential licensee to register as a user.
The license could be assigned specifically for a particular licensee at a particular site and could be for varying lengths of time or on a temporary trial basis which is offered at no cost to the licensee. However, the registration shell will not attempt to execute the main program unless a tamperproof overlay file is present.
The registration shell program 11 would provide a data entry form which would be displayed on the licensee PC, request ing the licensee to provide identification information, such as a billing address, an account number and the term of the license, etc. This information is entered into a registration request file 25 which is reviewed by the licensee. The registration shell program 11 would then wait for the licensee to initiate registration by pressing a designated key. When this key is pressed, the registration file is closed and a registration shell file transfer program 26 establishes a data link with the registration system file transfer program 32. The registration program 40 in the registration computer is protected by a validation means 42 to perform a security check ensuring that the data link has been established with a legitimate registration shell. The registration shell then transmits the registration request file 25 to the registration system which would receive the file, and perform the necessary error checking and hand-shaking operation between linked file transfer programs 26 and 32. When the complete registration request file is received at the central registration computer, the registration request is validated against a database of registered users 34. The validation would involve various checks to determine if the request should be fulfilled. For example, if a second request for a temporary license is received from a particular licensee, a license would not be granted to the licensee and the executive ~.,~,~~1 control loop of the program would not be transmitted. If this should occur, an appropriate message would be transmitted to the registration shell for display to the potential licensee.
However, if the request is validated, a record entry into the registered user database is prepared, but is not entered until the entire process is complete.
Within the registration computer 12, the user identi-fication data is then used to build a unique tamperproof overlay file generated by merging the user identification data with executive control loop program instructions 36. A cyclic redundancy check (CRC) value is computed which is unique to the merged data and program files and included within the tamperproof overlay file 37. A unique set of encryption and decryption keys is generated and the entire contents of the tamperproof overlay file is encrypted using the encryption key. Based upon the encryption key, a decryption key is provided which is transferred along with the tamperproof overlay file. The encryption algorithm can be any technique which uses a different key for encryption and decryption similar to the public key encryption system. The registration system assembles the tamperproof overlay file and the decryption key into a single shipping file 38 for transmission to the registration shell of the personal computer. Updated main program files may also be included into the shipping file which is transmitted to the registration system of the PC by means of file transfer programs and the previously established data link.
Upon receipt of the complete shipping file, an unpacker-installer subprogram 28 in the registration shell program opens the shipping file and installs the tamperproof overlay file 40 including the executive control loop segment 24, CRC value 22, as well as the decryption key 20 and the updated main program files, if included. The electronic data link may then be disconnected since the registration process is now complete. The registration data base record is entered and billing for the licensee request may be performed by a separate program on the central registration computer 12.
After registration, the distributed product application program installed on the licensee's personal computer may be activated for use by a process that uses the tamperproof overlay file and the decrypt key to load a complete product application program for execution each time the product application program is run.
This program execution process is illustrated in FIG.
II. As shown therein, when the personal computer user commands the operating system to run the product application program, the l0 operating system will load the main program and the loader segment. The loader segment will execute before any other program instructions. The loader segment then executes the activation of the product application program starting with a test for the presence of the tamperproof overlay. If no tamperproof overlay has been installed, the loader segment exits to the operating system, thus preempting the execution of the main program files. If, however, a tamperproof overlay has been installed, the loader segment finds the decryption key and proceeds to decrypt and load the tamperproof overlay, overlaying the main program files with the missing executive control loop program instructions as well as the unique identification and license control data. A cyclic redundancy check is performed during the decrypt and load process and, at completion, is compared to the cyclic redundancy check value stored in the tamperproof overlay when it was generated and transmitted by the registration computer to the PC. If the cyclic redundancy check fails, the overlay is considered to have been modified in some way, and is therefore invalid. At this point, the loader segment will unload the overlay and exit to the operating system.
Therefore, as was true with respect to the non-inclusion of the tamperproof overlay, the execution of the main program files is preempted when any portion of the tamperproof overlay is modified. If the cyclic redundancy check confirms that the overlay has not been modified, the loader segment initiates the execution of the main program files with the overlay included and the product application program executes to completion.
,.. ~~i,.~'~
By requiring the tamperproof overlay to be included in any operable form of the product application program, licensee identification and license control data are always included in subsequent copies of the operable program. Thus license abuse 5 may be curtailed and monitored by the licensor.
As described with respect to FIGS. I and II, the registration process, according to the present invention, produces a tamperproof overlay file which includes executive control loop segments of a main program file and license control 10 data. When the registration process is complete, this tamper-proof overlay file is transferred from the registration computer to the personal computer. The tamperproof overlay is the key device that prevents license abuse after activation because the executive control loop program instructions may not be separated from the unique licensee identification data and license control data without detection, nor may the licensee identification and license control data be changed without detection.
The tamperproof overlay file is considered to be made tamperproof by initially storing a cyclic redundancy check value within the overlay file when the overlay file is generated. The cyclic redundancy check value is computed for the entire contents of the overlay file including program instruction and licensee data. Since licensee data is unique, each CRC will be unique.
The stored CRC value is compared to the cyclic redundancy check value computed by the loader segment each time the overlay is loaded. If the cyclic redundancy check values do not agree, the loader segment will exit to the operating system. Thus, any change to the overlay file contents renders the overlay file defunct, unless a corresponding change the stored cyclic redundancy check value is also made. Secondly, the entire contents of the tamperproof overlay are encrypted by the registration system in such a manner as to obscure the location of the cyclic redundancy check value, thus making it difficult to locate and change its value.
m Encryption also obscures the specific program instructions contained in the tamperproof overlay and the unique user identification and license control data as well. Encryption is accomplished by any technique that uses a different key for encryption than for decryption similar to the public key encryption system. The algorithm for encryption and for generating the unique encryption key and the decryption key resides in the registration system and is therefore inaccessible to the licensee. The decryption key is transmitted to the l0 licensee's computer through the registration system and the registration program shell. Since the algorithm for decrypting the overlay file is in the loader segment, it is possible, although difficult, to use the decrypt key and the decrypt algorithm to decrypt the overlay file and examine its contents.
However, attempts to change the contents and encrypt a new, altered overlay file are hindered by a lack of access to the encryption key. It is a characteristic of the public key encryp-tion system that only overlay files encrypted with a private encryption key may be decrypted using a public complimentary decryption key, and the private key may not easily be derived from the public key.
The tamperproof overlay file contains both the executive control loop segment of the program instructions as well as unique user identification data which is appropriate to the method and control of the license. This data would include the time period of the license, the serial number of the computer, the telephone number of the computer's modem, as well as additional information.
The loader segment 18 is a special purpose subprogram that is linked with the main program files of the product application program by a technique that renders the main program files inoperable if the loader program is removed or bypassed.
The linking technique is a process that embeds certain program instructions within the main program files of the product application program. These embedded instructions test for specific values at specific memory locations unknown to the user.
When the loader program segment is executed, it stores the ~ .~~a~
~G~~~
specif is values at specif is memory address locations required to allow the main program files to operate. The loader program segment does this in addition to its other functions. Thus, if the loader segment is removed, or bypassed, the main program files will not contain the specific values at specific locations and are inoperable.
In another embodiment, the registration shell is distributed as part of a marketing shell package which may include an operable demonstration version of the product application program. The demonstration version of the program is designed to include the loader segment and demonstration version of the decrypt key and a demonstration version of the tamperproof overlay. In this case, the tamperproof overlay would contain no unique license data, but would contain a main program executive control loop which only demonstrates the features and displays of the registered version of the product. The demon-stration version of the executive control loop has various features of the program locked out by the logical design of the executive control loop. For example, a demonstration menu that offers options may be programmed to display the options but the demonstration executive control loop would be programmed to interpret selections as a request to register the product, thus requiring registration prior to operation.
Prior to registration, the prospective licensee would execute the program and the demonstration program would be executed. As previously described and shown in FIG. II, the demonstration version of the decrypt key would be used to load, decrypt and execute the demonstration program executive control loop. After the demonstration, the prospective user would be prompted by the demonstration to register as a user and to obtain a temporary license to try the registered version of the program.
The user may then register as previously described, initiating the process depicted in FIG. IV. In response to the registration request, a shipping file would be received from the registration computer which contains a new tamperproof overly file 40' and a unique decrypt key 20' . Any additional program files and updated versions of program files may also be received in the shipping file. The registration program would overwrite the demonstration versions of the tamperproof overlay 40 and decrypt key 20 with their registered versions 40' and 20'.
Subsequent to registration, when the user executes the program, the program execution process will find and load the registered version of the tamperproof overlay 40' and using the unique decrypt key 20' will decrypt and execute the registered version of the executive control loop. Thus, the demonstration package would be transformed into a fully capable registered version.
If enhanced versions of the program are available, the user may update to a more robust version of the product by invoking the same process to receive yet another decrypt key and another tamperproof overlay containing a more robust executive control loop and additional program files.
Various embodiments may employ any appropriate and ingenious techniques for using a small tamperproof overlay to control the use of large programs. Such techniques, as included herein, are merely illustrative of the potential commercial benefit of the methods disclosed herein for distributing program segments or complete programs in a form that links them with the license transaction.
Obviously, many modifications and variations of the present invention are possible in light of the above teachings.
For example, it is envisioned that this invention may be implemented in a tiered architecture wherein user computers are linked to a local registration computer which is in turn linked to a regional registration computer, and so on. The registration authority of the local registration computer could be controlled by the license control data included in a transaction between the local registration computer and the regional registration computer. It is therefore to be understood that within the scope of the appended claims, the invention may be practiced otherwise than as specifically described.
Additionally, protection schemes for valuable computer programs have been taught which involve invalidating the most valuable algorithms, and only restoring such valuable algorithms by running the invalidated program in a processor while simulta neously running a restoration algorithm in a physically separate and protected processor, the valid result being obtained by the intercommunication of the two processes, which are described in U.S. Patent 4,649,510, issued to Schmidt. Such techniques are dependent upon the physical protection of the restoration algorithm and could easily be defeated by an unscrupulous programmer if the physical security were breached. Therefore, such a scheme is impractical in a mass market where physical security of the restoration storage media cannot be maintained.
Consequently, an economical method for distributing software to a mass market while protecting the software from abuse by anonymous licenses is warranted. Furthermore, a method and system for allowing a potential purchaser/licensee to test a software program prior to purchasing the product is needed.
Still further, a method for distributing enhancements, and updates to registered license is desirable.
20~~~1~' BRIEF DESCRIPTION OF THE INVENTION
The present invention is directed to a method and a system for permitting personal computer software programs or other types of programs to be distributed in a license controlled manner. An operational program will be made available in a particular transaction between the purchaser/licensee and the seller/licensor. Although the relationship between the seller and the purchaser need not be a licensor/licensee agreement, for the purposes of the present invention, we will refer to the seller as the licensor and the purchaser as the licensee or user.
Once the licensee agrees to the terms of the particular transac-tion, licensee identification data is provided to a registration computer. The registration computer records the transaction and provides the operational segments of the licensed program. These segments are both tamperproof and unique to the identified licensee. Based upon this exchange of information, the opera-tional computer program is delivered to the registered licensee's computer in a tamperproof file that also includes licensee unique information.
Although various embodiments of the present invention may be envisioned, it is noted that all embodiments involve building an encrypted package containing unique data identifying the licensee and the protected software program instructions.
Thus, licensees are not anonymous, and protected software is encoded with information traceable to the licensing transaction.
Furthermore, by including license control data within the encrypted package, various limits may be imposed which serve to enforce the terms of the license agreement.
In general, the various embodiments involve a first distribution of a marketing shell which may contain a demonstra tion version of the software. The shell may contain only sample displays and advertising descriptions or, alternatively, may contain an inactive version of the complete program. However, most embodiments are envisioned to include a registration program and a special program module called a loader segment.
The marketing shell would be distributed freely by any appropriate method. If it contains a demonstration version of a , <~, the program, the executive control loop will represent a limited version of the protected program. The marketing shell will prompt the prospective user to register. The registration program within the marketing shell relays registration data to a registration database computer. A unique encrypted package is assembled containing some data unique to the licensed user and an operational version of the program combined within an encrypted file. A unique decryption key is transmitted to the user's computer along with the encrypted file and any unprotected program files which may augment the marketing shell. Upon receiving the decrypt key, encrypted file, and unprotected files, the marketing shell will install each of these on the user's computer.
Subsequently, each time the user executes the program, a loader segment will load and decrypt the encrypted file, as an overlay to the unprotected files, using the decrypt key provided.
The program will be executed in accordance with the design of the protected software program and the unique licensee data is also loaded during the program execution. When the program is not executing, the protected program remains in its encrypted form, in the mass storage of the computer along with the unprotected program files. The protected program is decrypted only when loaded for execution and may not be changed without access to the authentic encryption key.
BRIEF DESCRIPTION OF THE DRAWINGB
FIG. I is a flow diagram of the registration process according to the present invention;
FIG. II is a flow diagram of the program execution process according to the present invention; and FIG. III is a block diagram of a typical personal computer and registration computer according to the teachings of the present invention.
FIG. IV is a block diagram of an alternative embodiment of a typical personal computer and registration computer according to the teachings of the present invention.
WO 92/09160 ~~ ~c~ '~,t PCT/US91/08069 DETAILED DESCRIPTION OF THE INVENTION
The purpose of the present invention is to allow a licensor to maintain accountability of its programs in a manner much more efficient than presently being utilized. Additionally, a second purpose of the present invention is to allow a licensee or user to test a particular program before it is purchased or licensed. Further, it is another purpose of this invention to provide a means for distributing license protected upgrades of a particular programs to registered licenses. Therefore, it is contemplated that the teachings of the present invention are considered to be comprehensive and that any software program could be distributed by this method.
In one embodiment, a particular program which is complete except for an operational executive control loop is initially provided in a personal computer or other device on a magnetic disc, firmware, hardware, or other means. Additionally, a registration shell program is also included with the particular program. However, in the case of small or extremely valuable program, the entire program may be missing and only the shell provided. Due to the exclusion of the executive control loop, the program would not operate without the implementation of the proper registration process. As shown in FIGS. I and III, this registration process is initiated utilizing a registration shell program 11 in the personal computer (PC) 10 as well as a registration program 40 provided in a registration computer 12.
A registration system program is provided in the registration computer 12 and is accessible to the registration shell program 11 by an electronic data link 30. The electronic data link may be a local area network, a telephone modem link, or any other type. However, it should be noted that in a second embodiment, the registration shell and the registration system programs could be on the same medium, but separate from the product application program. In this instance, the transportable media containing the registration shell and the registration systems program are personally transported to the personal computer l0 of the user by a licensed installer, and no electronic data link is needed.
The registration shell program is executed when the user first attempts to execute the product application program provided in the main program file 16 of the PC operating system 14. The registration shell provides and displays on the PC display, descriptive information about the product application program and prompts the potential licensee to register as a user.
The license could be assigned specifically for a particular licensee at a particular site and could be for varying lengths of time or on a temporary trial basis which is offered at no cost to the licensee. However, the registration shell will not attempt to execute the main program unless a tamperproof overlay file is present.
The registration shell program 11 would provide a data entry form which would be displayed on the licensee PC, request ing the licensee to provide identification information, such as a billing address, an account number and the term of the license, etc. This information is entered into a registration request file 25 which is reviewed by the licensee. The registration shell program 11 would then wait for the licensee to initiate registration by pressing a designated key. When this key is pressed, the registration file is closed and a registration shell file transfer program 26 establishes a data link with the registration system file transfer program 32. The registration program 40 in the registration computer is protected by a validation means 42 to perform a security check ensuring that the data link has been established with a legitimate registration shell. The registration shell then transmits the registration request file 25 to the registration system which would receive the file, and perform the necessary error checking and hand-shaking operation between linked file transfer programs 26 and 32. When the complete registration request file is received at the central registration computer, the registration request is validated against a database of registered users 34. The validation would involve various checks to determine if the request should be fulfilled. For example, if a second request for a temporary license is received from a particular licensee, a license would not be granted to the licensee and the executive ~.,~,~~1 control loop of the program would not be transmitted. If this should occur, an appropriate message would be transmitted to the registration shell for display to the potential licensee.
However, if the request is validated, a record entry into the registered user database is prepared, but is not entered until the entire process is complete.
Within the registration computer 12, the user identi-fication data is then used to build a unique tamperproof overlay file generated by merging the user identification data with executive control loop program instructions 36. A cyclic redundancy check (CRC) value is computed which is unique to the merged data and program files and included within the tamperproof overlay file 37. A unique set of encryption and decryption keys is generated and the entire contents of the tamperproof overlay file is encrypted using the encryption key. Based upon the encryption key, a decryption key is provided which is transferred along with the tamperproof overlay file. The encryption algorithm can be any technique which uses a different key for encryption and decryption similar to the public key encryption system. The registration system assembles the tamperproof overlay file and the decryption key into a single shipping file 38 for transmission to the registration shell of the personal computer. Updated main program files may also be included into the shipping file which is transmitted to the registration system of the PC by means of file transfer programs and the previously established data link.
Upon receipt of the complete shipping file, an unpacker-installer subprogram 28 in the registration shell program opens the shipping file and installs the tamperproof overlay file 40 including the executive control loop segment 24, CRC value 22, as well as the decryption key 20 and the updated main program files, if included. The electronic data link may then be disconnected since the registration process is now complete. The registration data base record is entered and billing for the licensee request may be performed by a separate program on the central registration computer 12.
After registration, the distributed product application program installed on the licensee's personal computer may be activated for use by a process that uses the tamperproof overlay file and the decrypt key to load a complete product application program for execution each time the product application program is run.
This program execution process is illustrated in FIG.
II. As shown therein, when the personal computer user commands the operating system to run the product application program, the l0 operating system will load the main program and the loader segment. The loader segment will execute before any other program instructions. The loader segment then executes the activation of the product application program starting with a test for the presence of the tamperproof overlay. If no tamperproof overlay has been installed, the loader segment exits to the operating system, thus preempting the execution of the main program files. If, however, a tamperproof overlay has been installed, the loader segment finds the decryption key and proceeds to decrypt and load the tamperproof overlay, overlaying the main program files with the missing executive control loop program instructions as well as the unique identification and license control data. A cyclic redundancy check is performed during the decrypt and load process and, at completion, is compared to the cyclic redundancy check value stored in the tamperproof overlay when it was generated and transmitted by the registration computer to the PC. If the cyclic redundancy check fails, the overlay is considered to have been modified in some way, and is therefore invalid. At this point, the loader segment will unload the overlay and exit to the operating system.
Therefore, as was true with respect to the non-inclusion of the tamperproof overlay, the execution of the main program files is preempted when any portion of the tamperproof overlay is modified. If the cyclic redundancy check confirms that the overlay has not been modified, the loader segment initiates the execution of the main program files with the overlay included and the product application program executes to completion.
,.. ~~i,.~'~
By requiring the tamperproof overlay to be included in any operable form of the product application program, licensee identification and license control data are always included in subsequent copies of the operable program. Thus license abuse 5 may be curtailed and monitored by the licensor.
As described with respect to FIGS. I and II, the registration process, according to the present invention, produces a tamperproof overlay file which includes executive control loop segments of a main program file and license control 10 data. When the registration process is complete, this tamper-proof overlay file is transferred from the registration computer to the personal computer. The tamperproof overlay is the key device that prevents license abuse after activation because the executive control loop program instructions may not be separated from the unique licensee identification data and license control data without detection, nor may the licensee identification and license control data be changed without detection.
The tamperproof overlay file is considered to be made tamperproof by initially storing a cyclic redundancy check value within the overlay file when the overlay file is generated. The cyclic redundancy check value is computed for the entire contents of the overlay file including program instruction and licensee data. Since licensee data is unique, each CRC will be unique.
The stored CRC value is compared to the cyclic redundancy check value computed by the loader segment each time the overlay is loaded. If the cyclic redundancy check values do not agree, the loader segment will exit to the operating system. Thus, any change to the overlay file contents renders the overlay file defunct, unless a corresponding change the stored cyclic redundancy check value is also made. Secondly, the entire contents of the tamperproof overlay are encrypted by the registration system in such a manner as to obscure the location of the cyclic redundancy check value, thus making it difficult to locate and change its value.
m Encryption also obscures the specific program instructions contained in the tamperproof overlay and the unique user identification and license control data as well. Encryption is accomplished by any technique that uses a different key for encryption than for decryption similar to the public key encryption system. The algorithm for encryption and for generating the unique encryption key and the decryption key resides in the registration system and is therefore inaccessible to the licensee. The decryption key is transmitted to the l0 licensee's computer through the registration system and the registration program shell. Since the algorithm for decrypting the overlay file is in the loader segment, it is possible, although difficult, to use the decrypt key and the decrypt algorithm to decrypt the overlay file and examine its contents.
However, attempts to change the contents and encrypt a new, altered overlay file are hindered by a lack of access to the encryption key. It is a characteristic of the public key encryp-tion system that only overlay files encrypted with a private encryption key may be decrypted using a public complimentary decryption key, and the private key may not easily be derived from the public key.
The tamperproof overlay file contains both the executive control loop segment of the program instructions as well as unique user identification data which is appropriate to the method and control of the license. This data would include the time period of the license, the serial number of the computer, the telephone number of the computer's modem, as well as additional information.
The loader segment 18 is a special purpose subprogram that is linked with the main program files of the product application program by a technique that renders the main program files inoperable if the loader program is removed or bypassed.
The linking technique is a process that embeds certain program instructions within the main program files of the product application program. These embedded instructions test for specific values at specific memory locations unknown to the user.
When the loader program segment is executed, it stores the ~ .~~a~
~G~~~
specif is values at specif is memory address locations required to allow the main program files to operate. The loader program segment does this in addition to its other functions. Thus, if the loader segment is removed, or bypassed, the main program files will not contain the specific values at specific locations and are inoperable.
In another embodiment, the registration shell is distributed as part of a marketing shell package which may include an operable demonstration version of the product application program. The demonstration version of the program is designed to include the loader segment and demonstration version of the decrypt key and a demonstration version of the tamperproof overlay. In this case, the tamperproof overlay would contain no unique license data, but would contain a main program executive control loop which only demonstrates the features and displays of the registered version of the product. The demon-stration version of the executive control loop has various features of the program locked out by the logical design of the executive control loop. For example, a demonstration menu that offers options may be programmed to display the options but the demonstration executive control loop would be programmed to interpret selections as a request to register the product, thus requiring registration prior to operation.
Prior to registration, the prospective licensee would execute the program and the demonstration program would be executed. As previously described and shown in FIG. II, the demonstration version of the decrypt key would be used to load, decrypt and execute the demonstration program executive control loop. After the demonstration, the prospective user would be prompted by the demonstration to register as a user and to obtain a temporary license to try the registered version of the program.
The user may then register as previously described, initiating the process depicted in FIG. IV. In response to the registration request, a shipping file would be received from the registration computer which contains a new tamperproof overly file 40' and a unique decrypt key 20' . Any additional program files and updated versions of program files may also be received in the shipping file. The registration program would overwrite the demonstration versions of the tamperproof overlay 40 and decrypt key 20 with their registered versions 40' and 20'.
Subsequent to registration, when the user executes the program, the program execution process will find and load the registered version of the tamperproof overlay 40' and using the unique decrypt key 20' will decrypt and execute the registered version of the executive control loop. Thus, the demonstration package would be transformed into a fully capable registered version.
If enhanced versions of the program are available, the user may update to a more robust version of the product by invoking the same process to receive yet another decrypt key and another tamperproof overlay containing a more robust executive control loop and additional program files.
Various embodiments may employ any appropriate and ingenious techniques for using a small tamperproof overlay to control the use of large programs. Such techniques, as included herein, are merely illustrative of the potential commercial benefit of the methods disclosed herein for distributing program segments or complete programs in a form that links them with the license transaction.
Obviously, many modifications and variations of the present invention are possible in light of the above teachings.
For example, it is envisioned that this invention may be implemented in a tiered architecture wherein user computers are linked to a local registration computer which is in turn linked to a regional registration computer, and so on. The registration authority of the local registration computer could be controlled by the license control data included in a transaction between the local registration computer and the regional registration computer. It is therefore to be understood that within the scope of the appended claims, the invention may be practiced otherwise than as specifically described.
Claims (31)
1. A method of activating a program file, comprising the steps of:
providing a program file including a loader segment and a registration shell portion to a remote computer having a display, said program file lacking a critical portion, preventing said program file from operating properly, entering user identification information in said registration shell portion;
transmitting said user identification information from said registration shell to a separate registration program provided in a registration computer, said registration program merging user identification data with said critical portion to generate a unique overlay file;
transmitting said unique overlay file from said registration program to said registration shell, said overlay file containing the critical portion originally lacking from said program file; and installing said overlay file in said main program file, thereby allowing operation of said program file only when user identification contained in said overlay file is presently installed.
providing a program file including a loader segment and a registration shell portion to a remote computer having a display, said program file lacking a critical portion, preventing said program file from operating properly, entering user identification information in said registration shell portion;
transmitting said user identification information from said registration shell to a separate registration program provided in a registration computer, said registration program merging user identification data with said critical portion to generate a unique overlay file;
transmitting said unique overlay file from said registration program to said registration shell, said overlay file containing the critical portion originally lacking from said program file; and installing said overlay file in said main program file, thereby allowing operation of said program file only when user identification contained in said overlay file is presently installed.
2. The method in accordance with claim 1 further comprising the step of validating said user identification information prior to transmitting said overlay file from said registration computer to said remote computer.
3. The method in accordance with claim 1, further comprising the step of creating an overlay file which is tamper-proof.
4. The method in accordance with claim 3, wherein said tamperproof overlay file is created by encrypting said overlay file, providing a cyclic redundancy check value within said encrypted overlay file and providing a decrypt key to said overlay file.
5. The method in accordance with claim 4, wherein the cyclic redundancy check value is computed each time said overlay is loaded for execution and compared to the cyclic redundancy check value transmitted within said tamperproof overlay file to determine whether said overlay file has been modified since generation.
6. The method in accordance with claim 1, wherein said user identification information and said overlay file are transmitted between said registration shell and said registration program through an electronic data link.
7. The method in accordance with claim 1, wherein said registration shell program is provided in a first computer remote from a second computer provided with said separate registration computer.
8. The method in accordance with claim 2 , wherein said validating step insures that said user identification information is provided a legitimate registration shell.
9. The method in accordance with claim 1, wherein said user identification and said overlay file are entered and installed on a single computer.
10. A system for activating a program file for a limited or unlimited period of time comprising;
at least one remote computer, initially provided with a program file containing an overlay loader segment but lacking at least one critical program segment, preventing operation of the program file, said overlay loader segment only enabling activation of the program file when an authentic overlay file is presently installed, said remote computer provided with a registration shell program, said registration shell program enabling a user to enter various user identification information;
a registration computer provided with a registra-tion program, a means for receiving and processing said user identification information, a means for creating a unique overlay file containing the critical program segment lacking from the program file and all or portions of the user identification information, and a means for transmitting said overlay file to said remote computer, wherein transmission of said overlay file to said remote computer would allow operation of said program file only when user identification contained in said overlay file is presently installed.
at least one remote computer, initially provided with a program file containing an overlay loader segment but lacking at least one critical program segment, preventing operation of the program file, said overlay loader segment only enabling activation of the program file when an authentic overlay file is presently installed, said remote computer provided with a registration shell program, said registration shell program enabling a user to enter various user identification information;
a registration computer provided with a registra-tion program, a means for receiving and processing said user identification information, a means for creating a unique overlay file containing the critical program segment lacking from the program file and all or portions of the user identification information, and a means for transmitting said overlay file to said remote computer, wherein transmission of said overlay file to said remote computer would allow operation of said program file only when user identification contained in said overlay file is presently installed.
11. The system for activating a program file in accordance with claim 10, further including an electronic data link between said remote computer and said registration computer and file transfer processes provided in both said registration computer and said remote computer.
12. The system for activating a program file in accordance with claim 10, wherein said registration computer is provided with a central data base including all registered users as well as a means for validating said user identification information.
13. The system for activating a program file in accordance with claim 10, wherein said means for creating an overlay file is provided with an encryption device for producing a tamperproof overlay file with a cyclic redundancy check value stored therein, and a decrypt key, and further wherein said decrypt key is transmitted to said remote computer along with said overlay file.
14. The system for activating a program file in accordance with claim 13, wherein said remote computer is provided with a means for decrypting said overlay file, calcu-lating a cyclic redundancy check value each time said overlay file is loaded for execution, and comparing this check value to the redundancy check value transmitted by said registration computer within said overlay file.
15. The method in accordance with claim 1, wherein siad critical portion is an executive control portion and said user identification information is license transaction informa-tion.
16. The system in accordance with claim 10, wherein said critical program segment is an executive control program and said user identification information is license transaction information.
17. The system for controlling a program file in accordance with claim 16, wherein said critical executive control program segment encompasses the entire program file.
18. A method of controlling the use of a program file, comprising the steps of:
providing a program file including a loader segment and a registration shell portion to a computer having a display, said program file containing an executive control program of a first level of control capability;
entering information in said registration shell portion;
transmitting said license transaction information from said registration shell to a separate registration program, said registration program merging license transaction data with an executive control program of a second level of capability to generate a unique overlay file;
transmitting said unique overlay file from said registration program to said registration shell, said overlay file containing said second level executive control program; and installing said overlay file in said main program file, thereby allowing second level of capability operation of said program file only when license transaction information in said overlay file is presently installed.
providing a program file including a loader segment and a registration shell portion to a computer having a display, said program file containing an executive control program of a first level of control capability;
entering information in said registration shell portion;
transmitting said license transaction information from said registration shell to a separate registration program, said registration program merging license transaction data with an executive control program of a second level of capability to generate a unique overlay file;
transmitting said unique overlay file from said registration program to said registration shell, said overlay file containing said second level executive control program; and installing said overlay file in said main program file, thereby allowing second level of capability operation of said program file only when license transaction information in said overlay file is presently installed.
19. The method in accordance with claim 18 further comprising the step of validating said license transaction information prior to transmitting said overlay file from said registration computer to said remote computer.
20. The method in accordance with claim 18 further comprising the step of creating an overlay file which is tamper-proof.
21. The method in accordance with claim 20, wherein said tamperproof overlay file is created by encrypting said tamperproof overlay file with an encryption key, providing a cyclic redundancy check value within said encrypted tamperproof overlay file and providing a decryption key to said tamperproof overlay file. Said encryption and decryption keys being uniquely determine by the unique contents of the overlay file.
22. The method in accordance with claim 21, wherein a new cyclic redundancy check value is computed each time said overlay is loaded for execution and compared to the cyclic redundancy check value transmitted within said tamperproof overlay file to determine whether said overlay file has been modified since generation.
23. The method in accordance with claim 18, wherein said license transaction information and said overlay file are transmitted between said registration shell and said registration program through an electronic data link.
24. The method in accordance with claim 18, wherein said registration shell program is provided in a first computer remote from a second computer provided with said separate registration program.
25. The method in accordance with claim 19, wherein said validating step insures that said license transaction information is provided by means of a legitimate registration shell.
26. The method in accordance with claim 18, wherein said license transaction information and said overlay file are entered and installed on a single computer.
27. A system for upgrading a program file for a limited or unlimited period of time comprising;
at least one remote computer, initially provided with a program file containing an overlay loader segment containing a program of a first level of capability, said overlay loader segment only enabling activation of the program file when the authentic overlay file is presently installed, said remote computer provided with a registration shell program, said registration shell program enabling a user to enter various license transaction information;
a registration computer provided with a registra-tion program, a means for receiving and processing said license transaction information, a means for creating a unique overlay file containing a program module of second level of capability and all or portions of the license transaction information, and a means for transmitting said overlay file to said remote computer, wherein transmission of said overlay file to said remote computer would allow second level capability operation of said program file only when license transaction information contained in said overlay file is presently installed.
at least one remote computer, initially provided with a program file containing an overlay loader segment containing a program of a first level of capability, said overlay loader segment only enabling activation of the program file when the authentic overlay file is presently installed, said remote computer provided with a registration shell program, said registration shell program enabling a user to enter various license transaction information;
a registration computer provided with a registra-tion program, a means for receiving and processing said license transaction information, a means for creating a unique overlay file containing a program module of second level of capability and all or portions of the license transaction information, and a means for transmitting said overlay file to said remote computer, wherein transmission of said overlay file to said remote computer would allow second level capability operation of said program file only when license transaction information contained in said overlay file is presently installed.
28. The system for upgrading a program file in accor-dance with claim 27, further including an electronic data link between said remote computer and said registration computer and file transfer processes provided in both said registration computer and said remote computer.
29. The system for upgrading a program file in accor-dance with claim 27, wherein said registration computer is provided with a central data base including all registered users as well as a means for validating said license transaction information.
30. The system for upgrading a program file in accor-dance with claim 27, wherein said means for creating an overlay file is provided with an encryption key for producing a tamper-proof overlay file with a cyclic redundance check value stored therein, and a decrypt key, and further wherein said decrypt key is transmitted to said remote computer along with said overlay file. Said encryption and decryption keys being uniquely determined by the contents of the file.
31. The system for upgrading a program file in accor-dance with claim 30, wherein said remote computer is provided with a means for decrypting said overlay file, calculating a new cyclic redundancy check value each time said overlay file is loaded for execution, and comparing this check value to the redundancy check value transmitted by said registration computer within said overlay file.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US610,037 | 1990-11-07 | ||
US07/610,037 US5103476A (en) | 1990-11-07 | 1990-11-07 | Secure system for activating personal computer software at remote locations |
US07/682,456 US5222134A (en) | 1990-11-07 | 1991-04-09 | Secure system for activating personal computer software at remote locations |
US682,456 | 1991-04-09 | ||
PCT/US1991/008069 WO1992009160A1 (en) | 1990-11-07 | 1991-11-06 | A secure system for activating personal computer software at remote locations |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2095723A1 CA2095723A1 (en) | 1992-05-08 |
CA2095723C true CA2095723C (en) | 2002-06-04 |
Family
ID=27086180
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002095723A Expired - Fee Related CA2095723C (en) | 1990-11-07 | 1991-11-06 | Secure system for activating personal computer software at remote locations |
Country Status (7)
Country | Link |
---|---|
US (1) | US5222134A (en) |
EP (1) | EP0556305B1 (en) |
JP (1) | JPH0789345B2 (en) |
AT (1) | ATE171024T1 (en) |
CA (1) | CA2095723C (en) |
DE (1) | DE69130175T2 (en) |
WO (1) | WO1992009160A1 (en) |
Families Citing this family (368)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0548869B1 (en) * | 1991-12-23 | 2000-06-14 | Microsoft Corporation | Method for integrating a discrete subprogram into a main program |
CA2145068A1 (en) * | 1992-09-21 | 1994-03-31 | Ric Bailier Richardson | System for software registration |
US5377269A (en) * | 1992-10-29 | 1994-12-27 | Intelligent Security Systems, Inc. | Security access and monitoring system for personal computer |
US6266654B1 (en) * | 1992-12-15 | 2001-07-24 | Softlock.Com, Inc. | Method for tracking software lineage |
US7209901B2 (en) | 1992-12-15 | 2007-04-24 | Sl Patent Holdings Llc C/O Aol Time Warner | Method for selling, protecting, and redistributing digital goods |
US7089212B2 (en) * | 1992-12-15 | 2006-08-08 | Sl Patent Holdings Llc | System and method for controlling access to protected information |
US7831516B2 (en) * | 1992-12-15 | 2010-11-09 | Sl Patent Holdings Llc | System and method for redistributing and licensing access to protected information among a plurality of devices |
US6135646A (en) * | 1993-10-22 | 2000-10-24 | Corporation For National Research Initiatives | System for uniquely and persistently identifying, managing, and tracking digital objects |
US7080051B1 (en) | 1993-11-04 | 2006-07-18 | Crawford Christopher M | Internet download systems and methods providing software to internet computer users for local execution |
US5771354A (en) | 1993-11-04 | 1998-06-23 | Crawford; Christopher M. | Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established when signing up for backup services |
US5475753A (en) * | 1993-11-12 | 1995-12-12 | Matsushita Electric Corporation Of America | Apparatus and method for certifying the delivery of information |
US5625690A (en) * | 1993-11-15 | 1997-04-29 | Lucent Technologies Inc. | Software pay per use system |
JPH07230380A (en) * | 1994-02-15 | 1995-08-29 | Internatl Business Mach Corp <Ibm> | Method and system for controlling utilization of application program |
US5553139A (en) * | 1994-04-04 | 1996-09-03 | Novell, Inc. | Method and apparatus for electronic license distribution |
US6473860B1 (en) | 1994-04-07 | 2002-10-29 | Hark C. Chan | Information distribution and processing system |
US7991347B1 (en) | 1994-04-07 | 2011-08-02 | Data Innovation Llc | System and method for accessing set of digital data at a remote site |
US5699512A (en) * | 1994-04-28 | 1997-12-16 | Nippon Telegraph And Telephone Corp. | Software analysis protection method for changing the software pattern on the memory of a user terminal |
US7181758B1 (en) | 1994-07-25 | 2007-02-20 | Data Innovation, L.L.C. | Information distribution and processing system |
JP3531978B2 (en) * | 1994-08-10 | 2004-05-31 | 富士通株式会社 | Software billing system |
JPH0855164A (en) * | 1994-08-10 | 1996-02-27 | Fujitsu Ltd | Software distribution system, repeating device, and user terminal device |
JP3395863B2 (en) * | 1994-08-10 | 2003-04-14 | 富士通株式会社 | Software management module, software playback management device and software playback management system |
JPH0854951A (en) * | 1994-08-10 | 1996-02-27 | Fujitsu Ltd | Software used amount control device |
JPH0855021A (en) * | 1994-08-10 | 1996-02-27 | Fujitsu Ltd | Key authentication system |
JPH0856356A (en) * | 1994-08-10 | 1996-02-27 | Fujitsu Ltd | Encoding device and decoding device |
JP3519134B2 (en) * | 1994-08-10 | 2004-04-12 | 富士通株式会社 | Software usage measurement device and multimedia information output device |
JP3439838B2 (en) | 1994-08-10 | 2003-08-25 | 富士通株式会社 | Software metering / reproduction device |
JP3542088B2 (en) * | 1994-09-09 | 2004-07-14 | 富士通株式会社 | Data content utilization system |
JPH0877263A (en) | 1994-09-09 | 1996-03-22 | Fujitsu Ltd | Software processor |
JPH0883232A (en) * | 1994-09-09 | 1996-03-26 | Fujitsu Ltd | File server system |
JP3647907B2 (en) * | 1994-09-09 | 2005-05-18 | 富士通株式会社 | Encryption software decompression system |
US5579479A (en) * | 1994-10-03 | 1996-11-26 | Plum Hall Inc. | Computer software licensing authentication method and apparatus |
US8661477B2 (en) | 1994-10-12 | 2014-02-25 | Touchtunes Music Corporation | System for distributing and selecting audio and video information and method implemented by said system |
US7424731B1 (en) | 1994-10-12 | 2008-09-09 | Touchtunes Music Corporation | Home digital audiovisual information recording and playback system |
CA2201909C (en) | 1994-10-12 | 2006-05-02 | Technical Maintenance Corporation | Intelligent digital audiovisual playback system |
US7188352B2 (en) | 1995-07-11 | 2007-03-06 | Touchtunes Music Corporation | Intelligent digital audiovisual playback system |
JPH08123681A (en) * | 1994-10-26 | 1996-05-17 | Canon Inc | Management system and terminal device |
US6865551B1 (en) | 1994-11-23 | 2005-03-08 | Contentguard Holdings, Inc. | Removable content repositories |
JPH08263438A (en) | 1994-11-23 | 1996-10-11 | Xerox Corp | Distribution and use control system of digital work and access control method to digital work |
US20050149450A1 (en) * | 1994-11-23 | 2005-07-07 | Contentguard Holdings, Inc. | System, method, and device for controlling distribution and use of digital works based on a usage rights grammar |
US7117180B1 (en) | 1994-11-23 | 2006-10-03 | Contentguard Holdings, Inc. | System for controlling the use of digital works using removable content repositories |
US6963859B2 (en) * | 1994-11-23 | 2005-11-08 | Contentguard Holdings, Inc. | Content rendering repository |
SE504085C2 (en) * | 1995-02-01 | 1996-11-04 | Greg Benson | Methods and systems for managing data objects in accordance with predetermined conditions for users |
CN100452071C (en) | 1995-02-13 | 2009-01-14 | 英特特拉斯特技术公司 | Systems and methods for secure transaction management and electronic rights protection |
US6948070B1 (en) | 1995-02-13 | 2005-09-20 | Intertrust Technologies Corporation | Systems and methods for secure transaction management and electronic rights protection |
US5943422A (en) | 1996-08-12 | 1999-08-24 | Intertrust Technologies Corp. | Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels |
US6658568B1 (en) | 1995-02-13 | 2003-12-02 | Intertrust Technologies Corporation | Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management |
US6157721A (en) | 1996-08-12 | 2000-12-05 | Intertrust Technologies Corp. | Systems and methods using cryptography to protect secure computing environments |
US7133846B1 (en) | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management |
US5892900A (en) | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6636970B2 (en) | 1995-02-14 | 2003-10-21 | Fujitsu Limited | Software encoding using a combination of two types of encoding and encoding type identification information |
JP3865775B2 (en) * | 1995-04-11 | 2007-01-10 | キネテック インコーポレイテッド | Data identification in data processing systems |
JPH08287653A (en) * | 1995-04-12 | 1996-11-01 | Fujitsu Ltd | Optical recording medium |
JPH08305662A (en) * | 1995-05-02 | 1996-11-22 | Fujitsu Ltd | Method and system for client authentication |
US5903647A (en) * | 1995-06-07 | 1999-05-11 | Digital River, Inc. | Self-launching encrypted digital information distribution system |
US5870543A (en) * | 1995-06-07 | 1999-02-09 | Digital River, Inc. | System for preventing unauthorized copying of active software |
US5887060A (en) * | 1995-06-07 | 1999-03-23 | Digital River, Inc. | Central database system for automatic software program sales |
US5883955A (en) * | 1995-06-07 | 1999-03-16 | Digital River, Inc. | On-line try before you buy software distribution system |
US5883954A (en) * | 1995-06-07 | 1999-03-16 | Digital River, Inc. | Self-launching encrypted try before you buy software distribution system |
EP0870381A4 (en) * | 1995-06-07 | 1999-09-29 | Digital River Inc | Try-before-you-buy software distribution and marketing system |
US5754646A (en) * | 1995-07-19 | 1998-05-19 | Cable Television Laboratories, Inc. | Method for protecting publicly distributed software |
JP3394857B2 (en) * | 1995-09-13 | 2003-04-07 | 株式会社東芝 | Software data distribution and sales equipment |
US5758068A (en) * | 1995-09-19 | 1998-05-26 | International Business Machines Corporation | Method and apparatus for software license management |
US5937164A (en) * | 1995-12-07 | 1999-08-10 | Hyperlock Technologies, Inc. | Method and apparatus of secure server control of local media via a trigger through a network for instant local access of encrypted data on local media within a platform independent networking system |
US6185306B1 (en) * | 1995-12-07 | 2001-02-06 | Hyperlock Technologies, Inc. | Method of secure server control of local media via a trigger through a network for local access of encrypted data on an internet webpage |
US5892825A (en) * | 1996-05-15 | 1999-04-06 | Hyperlock Technologies Inc | Method of secure server control of local media via a trigger through a network for instant local access of encrypted data on local media |
US5826011A (en) * | 1995-12-26 | 1998-10-20 | Rainbow Technologies, Inc. | Method of metering and protecting computer software |
JP2000503154A (en) * | 1996-01-11 | 2000-03-14 | エムアールジェイ インコーポレイテッド | System for controlling access and distribution of digital ownership |
US20010011253A1 (en) | 1998-08-04 | 2001-08-02 | Christopher D. Coley | Automated system for management of licensed software |
US20060265336A1 (en) * | 1996-02-26 | 2006-11-23 | Graphon Corporation | Automated system for management of licensed digital assets |
US6009543A (en) * | 1996-03-01 | 1999-12-28 | Massachusetts Institute Of Technology | Secure software system and related techniques |
JP3486043B2 (en) * | 1996-03-11 | 2004-01-13 | 株式会社東芝 | Operating method of software distribution system and software system |
US5905860A (en) * | 1996-03-15 | 1999-05-18 | Novell, Inc. | Fault tolerant electronic licensing system |
US5758069A (en) * | 1996-03-15 | 1998-05-26 | Novell, Inc. | Electronic licensing system |
US5864620A (en) * | 1996-04-24 | 1999-01-26 | Cybersource Corporation | Method and system for controlling distribution of software in a multitiered distribution chain |
WO1997043717A1 (en) * | 1996-05-13 | 1997-11-20 | Corporation For National Research Initiatives | Identifying, managing, accessing, and tracking digital objects and associated rights and payments |
US5742757A (en) * | 1996-05-30 | 1998-04-21 | Mitsubishi Semiconductor America, Inc. | Automatic software license manager |
US8229844B2 (en) | 1996-06-05 | 2012-07-24 | Fraud Control Systems.Com Corporation | Method of billing a purchase made over a computer network |
US7555458B1 (en) | 1996-06-05 | 2009-06-30 | Fraud Control System.Com Corporation | Method of billing a purchase made over a computer network |
US20030195848A1 (en) | 1996-06-05 | 2003-10-16 | David Felger | Method of billing a purchase made over a computer network |
WO1997046932A1 (en) * | 1996-06-07 | 1997-12-11 | Advanced Micro Devices, Inc. | System for modifying computer related systems |
SG67354A1 (en) * | 1996-06-27 | 1999-09-21 | Inst Of Systems Science Nation | Computationally efficient method for trusted and dynamic digital objects dissemination |
US7356847B2 (en) * | 1996-06-28 | 2008-04-08 | Protexis, Inc. | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US7770230B2 (en) * | 2002-04-22 | 2010-08-03 | Arvato Digital Services Canada, Inc. | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software |
US7010697B2 (en) | 1996-06-28 | 2006-03-07 | Protexis, Inc. | System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software |
US6526456B1 (en) * | 1996-07-01 | 2003-02-25 | David Ian Allan | Distribution and controlled use of software products |
AUPO123196A0 (en) * | 1996-07-24 | 1996-08-15 | Irgurus Pty Ltd | A method and apparatus for enabling the operation of software |
US5864664A (en) * | 1996-08-30 | 1999-01-26 | International Business Machines Corporation | Apparatus and method for protecting system serial number while allowing motherboard replacement |
FR2753868A1 (en) | 1996-09-25 | 1998-03-27 | Technical Maintenance Corp | METHOD FOR SELECTING A RECORDING ON AN AUDIOVISUAL DIGITAL REPRODUCTION SYSTEM AND SYSTEM FOR IMPLEMENTING THE METHOD |
US6021492A (en) * | 1996-10-09 | 2000-02-01 | Hewlett-Packard Company | Software metering management of remote computing devices |
US6120550A (en) * | 1996-10-28 | 2000-09-19 | Altera Corporation | Design file templates for implementation of logic designs |
JPH10133955A (en) * | 1996-10-29 | 1998-05-22 | Matsushita Electric Ind Co Ltd | Portable medium driving device, its method, cooperative device of portable medium and network, and its method |
US6005935A (en) * | 1996-11-20 | 1999-12-21 | At&T Corp. | Method and system of using personal information as a key when distributing information |
SE513104C2 (en) * | 1997-01-09 | 2000-07-10 | Buyonet International Inc | System and method for secure data transmission over electronic link |
AUPO474997A0 (en) * | 1997-01-23 | 1997-02-20 | Commonwealth Bank Of Australia | Distribution system with authentication |
US6141698A (en) * | 1997-01-29 | 2000-10-31 | Network Commerce Inc. | Method and system for injecting new code into existing application code |
US6137805A (en) * | 1997-02-10 | 2000-10-24 | International Business Machines Corporation | Method and apparatus to remotely configure a data processing system |
US5920861A (en) | 1997-02-25 | 1999-07-06 | Intertrust Technologies Corp. | Techniques for defining using and manipulating rights management data structures |
US6233684B1 (en) * | 1997-02-28 | 2001-05-15 | Contenaguard Holdings, Inc. | System for controlling the distribution and use of rendered digital works through watermaking |
EP0864969A1 (en) * | 1997-03-14 | 1998-09-16 | Alcatel | A method to provide a software package and a provider station and a user station realising the method |
US6041411A (en) * | 1997-03-28 | 2000-03-21 | Wyatt; Stuart Alan | Method for defining and verifying user access rights to a computer information |
US6108420A (en) * | 1997-04-10 | 2000-08-22 | Channelware Inc. | Method and system for networked installation of uniquely customized, authenticable, and traceable software application |
US6173403B1 (en) | 1997-04-30 | 2001-01-09 | Achates Reference Publishing, Inc. | Method and apparatus for distributing information products |
US5982889A (en) * | 1997-04-30 | 1999-11-09 | Demont; Jason Paul | Method and apparatus for distributing information products |
SE518017C2 (en) * | 1997-05-21 | 2002-08-13 | Ericsson Telefon Ab L M | Method and apparatus for computer systems |
US7290288B2 (en) | 1997-06-11 | 2007-10-30 | Prism Technologies, L.L.C. | Method and system for controlling access, by an authentication server, to protected computer resources provided via an internet protocol network |
US6904525B1 (en) * | 1997-07-01 | 2005-06-07 | Pitney Bowes Inc. | Method for preventing counterfeiting of articles of manufacture |
US5903896A (en) * | 1997-07-15 | 1999-05-11 | Microsoft Corporation | Method for installing a file on demand using a preview |
US7574727B2 (en) * | 1997-07-23 | 2009-08-11 | Touchtunes Music Corporation | Intelligent digital audiovisual playback system |
JP2001512867A (en) | 1997-08-05 | 2001-08-28 | ヴィットケーター・エアラント | Apparatus and method for protecting the output of electronically transmitted and stored documents |
US6275938B1 (en) * | 1997-08-28 | 2001-08-14 | Microsoft Corporation | Security enhancement for untrusted executable code |
US6233567B1 (en) * | 1997-08-29 | 2001-05-15 | Intel Corporation | Method and apparatus for software licensing electronically distributed programs |
AUPO899697A0 (en) * | 1997-09-05 | 1997-10-02 | Bardell, Norman John Charles | Data dissemination system for computer networks |
FR2769165B1 (en) | 1997-09-26 | 2002-11-29 | Technical Maintenance Corp | WIRELESS SYSTEM WITH DIGITAL TRANSMISSION FOR SPEAKERS |
US6330549B1 (en) * | 1997-10-30 | 2001-12-11 | Xerox Corporation | Protected shareware |
US6112181A (en) | 1997-11-06 | 2000-08-29 | Intertrust Technologies Corporation | Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information |
US6334189B1 (en) | 1997-12-05 | 2001-12-25 | Jamama, Llc | Use of pseudocode to protect software from unauthorized use |
US6643775B1 (en) | 1997-12-05 | 2003-11-04 | Jamama, Llc | Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications |
US6480959B1 (en) | 1997-12-05 | 2002-11-12 | Jamama, Llc | Software system and associated methods for controlling the use of computer programs |
ES2175936T3 (en) | 1998-01-16 | 2002-11-16 | Macrovision Corp | SYSTEM AND METHOD TO AUTHENTICATE HOMOLOGICAL COMPONENTS. |
DE19824653A1 (en) * | 1998-02-25 | 1999-08-26 | Schering Ag | Use of compounds concentrating in necrotic tissue as drug depots, e.g. for radiation therapy, pharmacotherapy, restenosis prevention and diagnosis |
US20040098584A1 (en) * | 1998-03-25 | 2004-05-20 | Sherman Edward G. | Method and system for embedded, automated, component-level control of computer systems and other complex systems |
US6170014B1 (en) * | 1998-03-25 | 2001-01-02 | Community Learning And Information Network | Computer architecture for managing courseware in a shared use operating environment |
JPH11328033A (en) * | 1998-05-20 | 1999-11-30 | Fujitsu Ltd | License transfer device |
FR2781582B1 (en) | 1998-07-21 | 2001-01-12 | Technical Maintenance Corp | SYSTEM FOR DOWNLOADING OBJECTS OR FILES FOR SOFTWARE UPDATE |
FR2781591B1 (en) | 1998-07-22 | 2000-09-22 | Technical Maintenance Corp | AUDIOVISUAL REPRODUCTION SYSTEM |
US8028318B2 (en) | 1999-07-21 | 2011-09-27 | Touchtunes Music Corporation | Remote control unit for activating and deactivating means for payment and for displaying payment status |
FR2781580B1 (en) | 1998-07-22 | 2000-09-22 | Technical Maintenance Corp | SOUND CONTROL CIRCUIT FOR INTELLIGENT DIGITAL AUDIOVISUAL REPRODUCTION SYSTEM |
US7068787B1 (en) | 1998-10-23 | 2006-06-27 | Contentguard Holdings, Inc. | System and method for protection of digital works |
US7017188B1 (en) * | 1998-11-16 | 2006-03-21 | Softricity, Inc. | Method and apparatus for secure content delivery over broadband access networks |
US6763370B1 (en) | 1998-11-16 | 2004-07-13 | Softricity, Inc. | Method and apparatus for content protection in a secure content delivery system |
US7058597B1 (en) * | 1998-12-04 | 2006-06-06 | Digital River, Inc. | Apparatus and method for adaptive fraud screening for electronic commerce transactions |
US20030195974A1 (en) | 1998-12-04 | 2003-10-16 | Ronning Joel A. | Apparatus and method for scheduling of search for updates or downloads of a file |
US7617124B1 (en) * | 1998-12-04 | 2009-11-10 | Digital River, Inc. | Apparatus and method for secure downloading of files |
US6802006B1 (en) | 1999-01-15 | 2004-10-05 | Macrovision Corporation | System and method of verifying the authenticity of dynamically connectable executable images |
US8726330B2 (en) | 1999-02-22 | 2014-05-13 | Touchtunes Music Corporation | Intelligent digital audiovisual playback system |
US6973444B1 (en) * | 1999-03-27 | 2005-12-06 | Microsoft Corporation | Method for interdependently validating a digital content package and a corresponding digital license |
US20020019814A1 (en) * | 2001-03-01 | 2002-02-14 | Krishnamurthy Ganesan | Specifying rights in a digital rights license according to events |
US7136838B1 (en) | 1999-03-27 | 2006-11-14 | Microsoft Corporation | Digital license and method for obtaining/providing a digital license |
US7319759B1 (en) | 1999-03-27 | 2008-01-15 | Microsoft Corporation | Producing a new black box for a digital rights management (DRM) system |
US7073063B2 (en) * | 1999-03-27 | 2006-07-04 | Microsoft Corporation | Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like |
US6829708B1 (en) * | 1999-03-27 | 2004-12-07 | Microsoft Corporation | Specifying security for an element by assigning a scaled value representative of the relative security thereof |
US7103574B1 (en) | 1999-03-27 | 2006-09-05 | Microsoft Corporation | Enforcement architecture and method for digital rights management |
US7024393B1 (en) | 1999-03-27 | 2006-04-04 | Microsoft Corporation | Structural of digital rights management (DRM) system |
US7051005B1 (en) | 1999-03-27 | 2006-05-23 | Microsoft Corporation | Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system |
US7383205B1 (en) | 1999-03-27 | 2008-06-03 | Microsoft Corporation | Structure of a digital content package |
US20020012432A1 (en) * | 1999-03-27 | 2002-01-31 | Microsoft Corporation | Secure video card in computing device having digital rights management (DRM) system |
US6816596B1 (en) | 2000-01-14 | 2004-11-09 | Microsoft Corporation | Encrypting a digital object based on a key ID selected therefor |
US7286665B1 (en) | 1999-04-06 | 2007-10-23 | Contentguard Holdings, Inc. | System and method for transferring the right to decode messages |
US6859533B1 (en) | 1999-04-06 | 2005-02-22 | Contentguard Holdings, Inc. | System and method for transferring the right to decode messages in a symmetric encoding scheme |
US6937726B1 (en) | 1999-04-06 | 2005-08-30 | Contentguard Holdings, Inc. | System and method for protecting data files by periodically refreshing a decryption key |
US7356688B1 (en) | 1999-04-06 | 2008-04-08 | Contentguard Holdings, Inc. | System and method for document distribution |
US7370071B2 (en) | 2000-03-17 | 2008-05-06 | Microsoft Corporation | Method for serving third party software applications from servers to client computers |
US7730169B1 (en) | 1999-04-12 | 2010-06-01 | Softricity, Inc. | Business method and system for serving third party software applications |
WO2000062189A2 (en) * | 1999-04-12 | 2000-10-19 | Reciprocal, Inc. | System and method for data rights management |
KR20020032421A (en) * | 1999-04-16 | 2002-05-03 | 메이오 파운데이션 포 메디칼 에쥬케이션 앤드 리써치 | Cobalamin conjugates useful as antitumor agents |
US7360252B1 (en) | 1999-04-30 | 2008-04-15 | Macrovision Corporation | Method and apparatus for secure distribution of software |
US6966002B1 (en) | 1999-04-30 | 2005-11-15 | Trymedia Systems, Inc. | Methods and apparatus for secure distribution of software |
US8099758B2 (en) * | 1999-05-12 | 2012-01-17 | Microsoft Corporation | Policy based composite file system and method |
US20050246549A1 (en) * | 1999-06-09 | 2005-11-03 | Andres Torrubia-Saez | Methods and apparatus for secure distribution of software |
FR2796482B1 (en) | 1999-07-16 | 2002-09-06 | Touchtunes Music Corp | REMOTE MANAGEMENT SYSTEM FOR AT LEAST ONE AUDIOVISUAL INFORMATION REPRODUCING DEVICE |
US7650504B2 (en) * | 1999-07-22 | 2010-01-19 | Macrovision Corporation | System and method of verifying the authenticity of dynamically connectable executable images |
CA2313839A1 (en) * | 1999-07-27 | 2001-01-27 | Lucent Technologies Inc. | Method of monitoring runtime usage of demo evaluation software |
KR20050013671A (en) * | 1999-10-18 | 2005-02-04 | 인텔 코오퍼레이션 | Method and apparatus for secure automatic playback of content from removable mass storage media |
US6885748B1 (en) | 1999-10-23 | 2005-04-26 | Contentguard Holdings, Inc. | System and method for protection of digital works |
US6668375B1 (en) | 1999-12-15 | 2003-12-23 | Pitney Bowes Inc. | Method and system for providing build-to-order software applications |
US7047411B1 (en) | 1999-12-17 | 2006-05-16 | Microsoft Corporation | Server for an electronic distribution system and method of operating same |
US6996720B1 (en) * | 1999-12-17 | 2006-02-07 | Microsoft Corporation | System and method for accessing protected content in a rights-management architecture |
US6970849B1 (en) | 1999-12-17 | 2005-11-29 | Microsoft Corporation | Inter-server communication using request with encrypted parameter |
US6460140B1 (en) | 1999-12-30 | 2002-10-01 | Starnet Communications Corporation | System for controlling the use of licensed software |
US6304972B1 (en) * | 2000-01-03 | 2001-10-16 | Massachusetts Institute Of Technology | Secure software system and related techniques |
US6772340B1 (en) | 2000-01-14 | 2004-08-03 | Microsoft Corporation | Digital rights management system operating on computing device and having black box tied to computing device |
AU2000269232A1 (en) * | 2000-01-14 | 2001-07-24 | Microsoft Corporation | Specifying security for an element by assigning a scaled value representative ofthe relative security thereof |
US7353209B1 (en) * | 2000-01-14 | 2008-04-01 | Microsoft Corporation | Releasing decrypted digital content to an authenticated path |
US6912528B2 (en) * | 2000-01-18 | 2005-06-28 | Gregg S. Homer | Rechargeable media distribution and play system |
FR2805377B1 (en) | 2000-02-23 | 2003-09-12 | Touchtunes Music Corp | EARLY ORDERING PROCESS FOR A SELECTION, DIGITAL SYSTEM AND JUKE-BOX FOR IMPLEMENTING THE METHOD |
FR2805072B1 (en) | 2000-02-16 | 2002-04-05 | Touchtunes Music Corp | METHOD FOR ADJUSTING THE SOUND VOLUME OF A DIGITAL SOUND RECORDING |
FR2805060B1 (en) | 2000-02-16 | 2005-04-08 | Touchtunes Music Corp | METHOD FOR RECEIVING FILES DURING DOWNLOAD |
US20070271191A1 (en) * | 2000-03-09 | 2007-11-22 | Andres Torrubia-Saez | Method and apparatus for secure distribution of software |
EP1257943A1 (en) * | 2000-03-18 | 2002-11-20 | Kent Ridge Digital Labs | Softgoods distribution via a network |
US20020111997A1 (en) * | 2000-04-26 | 2002-08-15 | Maurice Herlihy | Methods and systems for securing computer software |
JP2004514194A (en) * | 2000-04-28 | 2004-05-13 | モルドフロウ コーポレイション | Networkable application software system and method |
FR2808906B1 (en) | 2000-05-10 | 2005-02-11 | Touchtunes Music Corp | DEVICE AND METHOD FOR REMOTELY MANAGING A NETWORK OF AUDIOVISUAL INFORMATION REPRODUCTION SYSTEMS |
US7024696B1 (en) | 2000-06-14 | 2006-04-04 | Reuben Bahar | Method and system for prevention of piracy of a given software application via a communications network |
FR2811175B1 (en) | 2000-06-29 | 2002-12-27 | Touchtunes Music Corp | AUDIOVISUAL INFORMATION DISTRIBUTION METHOD AND AUDIOVISUAL INFORMATION DISTRIBUTION SYSTEM |
US7539875B1 (en) | 2000-06-27 | 2009-05-26 | Microsoft Corporation | Secure repository with layers of tamper resistance and system and method for providing same |
US7158953B1 (en) | 2000-06-27 | 2007-01-02 | Microsoft Corporation | Method and system for limiting the use of user-specific software features |
US6891953B1 (en) | 2000-06-27 | 2005-05-10 | Microsoft Corporation | Method and system for binding enhanced software features to a persona |
US7017189B1 (en) | 2000-06-27 | 2006-03-21 | Microsoft Corporation | System and method for activating a rendering device in a multi-level rights-management architecture |
US7171692B1 (en) | 2000-06-27 | 2007-01-30 | Microsoft Corporation | Asynchronous communication within a server arrangement |
US7051200B1 (en) | 2000-06-27 | 2006-05-23 | Microsoft Corporation | System and method for interfacing a software process to secure repositories |
US6981262B1 (en) | 2000-06-27 | 2005-12-27 | Microsoft Corporation | System and method for client interaction in a multi-level rights-management architecture |
FR2811114B1 (en) | 2000-06-29 | 2002-12-27 | Touchtunes Music Corp | DEVICE AND METHOD FOR COMMUNICATION BETWEEN A SYSTEM FOR REPRODUCING AUDIOVISUAL INFORMATION AND AN ELECTRONIC ENTERTAINMENT MACHINE |
US20020046045A1 (en) * | 2000-06-30 | 2002-04-18 | Attila Narin | Architecture for an electronic shopping service integratable with a software application |
US7225159B2 (en) * | 2000-06-30 | 2007-05-29 | Microsoft Corporation | Method for authenticating and securing integrated bookstore entries |
JP2002032135A (en) * | 2000-07-18 | 2002-01-31 | Mitsubishi Electric Corp | Software distribution system and its method |
US7010808B1 (en) | 2000-08-25 | 2006-03-07 | Microsoft Corporation | Binding digital content to a portable storage device or the like in a digital rights management (DRM) system |
US7237125B2 (en) | 2000-08-28 | 2007-06-26 | Contentguard Holdings, Inc. | Method and apparatus for automatically deploying security components in a content distribution system |
US7743259B2 (en) | 2000-08-28 | 2010-06-22 | Contentguard Holdings, Inc. | System and method for digital rights management using a standard rendering engine |
US6931545B1 (en) * | 2000-08-28 | 2005-08-16 | Contentguard Holdings, Inc. | Systems and methods for integrity certification and verification of content consumption environments |
US7073199B1 (en) | 2000-08-28 | 2006-07-04 | Contentguard Holdings, Inc. | Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine |
AU2001285265A1 (en) * | 2000-09-12 | 2002-03-26 | Aladdin Knowledge Systems, Ltd. | System for managing rights and permitting on-line playback of digital content |
US6915425B2 (en) * | 2000-12-13 | 2005-07-05 | Aladdin Knowledge Systems, Ltd. | System for permitting off-line playback of digital content, and for managing content rights |
FR2814085B1 (en) | 2000-09-15 | 2005-02-11 | Touchtunes Music Corp | ENTERTAINMENT METHOD BASED ON MULTIPLE CHOICE COMPETITION GAMES |
US7039615B1 (en) | 2000-09-28 | 2006-05-02 | Microsoft Corporation | Retail transactions involving digital content in a digital rights management (DRM) system |
US7149722B1 (en) | 2000-09-28 | 2006-12-12 | Microsoft Corporation | Retail transactions involving distributed and super-distributed digital content in a digital rights management (DRM) system |
US7343324B2 (en) * | 2000-11-03 | 2008-03-11 | Contentguard Holdings Inc. | Method, system, and computer readable medium for automatically publishing content |
US6912294B2 (en) | 2000-12-29 | 2005-06-28 | Contentguard Holdings, Inc. | Multi-stage watermarking process and system |
US6754642B2 (en) | 2001-05-31 | 2004-06-22 | Contentguard Holdings, Inc. | Method and apparatus for dynamically assigning usage rights to digital works |
BR0206506A (en) | 2001-01-17 | 2003-10-21 | Contentguard Holdings Inc | Process and appliance for managing digital content use rights |
US8069116B2 (en) | 2001-01-17 | 2011-11-29 | Contentguard Holdings, Inc. | System and method for supplying and managing usage rights associated with an item repository |
US7028009B2 (en) * | 2001-01-17 | 2006-04-11 | Contentguardiholdings, Inc. | Method and apparatus for distributing enforceable property rights |
US20030220880A1 (en) * | 2002-01-17 | 2003-11-27 | Contentguard Holdings, Inc. | Networked services licensing system and method |
US7206765B2 (en) * | 2001-01-17 | 2007-04-17 | Contentguard Holdings, Inc. | System and method for supplying and managing usage rights based on rules |
US7774279B2 (en) | 2001-05-31 | 2010-08-10 | Contentguard Holdings, Inc. | Rights offering and granting |
US20070219918A1 (en) * | 2001-01-19 | 2007-09-20 | Jonathan Schull | System and method for controlling access to protected information |
US8458754B2 (en) * | 2001-01-22 | 2013-06-04 | Sony Computer Entertainment Inc. | Method and system for providing instant start multimedia content |
US7174568B2 (en) * | 2001-01-31 | 2007-02-06 | Sony Computer Entertainment America Inc. | Method and system for securely distributing computer software products |
WO2002063511A1 (en) * | 2001-02-08 | 2002-08-15 | Alpine-Invent Gmbh | Software licensing method |
US7228342B2 (en) * | 2001-02-20 | 2007-06-05 | Sony Computer Entertainment America Inc. | System for utilizing an incentive point system based on disc and user identification |
US20020116283A1 (en) * | 2001-02-20 | 2002-08-22 | Masayuki Chatani | System and method for transfer of disc ownership based on disc and user identification |
US20020120726A1 (en) * | 2001-02-23 | 2002-08-29 | Microsoft Corporation | Method and system for providing a software license via the telephone |
EP2267626B8 (en) | 2001-03-28 | 2016-11-30 | NDS Limited | Digital rights management system and method |
US7188342B2 (en) * | 2001-04-20 | 2007-03-06 | Microsoft Corporation | Server controlled branding of client software deployed over computer networks |
US20030043852A1 (en) * | 2001-05-18 | 2003-03-06 | Bijan Tadayon | Method and apparatus for verifying data integrity based on data compression parameters |
US7222104B2 (en) * | 2001-05-31 | 2007-05-22 | Contentguard Holdings, Inc. | Method and apparatus for transferring usage rights and digital work having transferrable usage rights |
US6895503B2 (en) | 2001-05-31 | 2005-05-17 | Contentguard Holdings, Inc. | Method and apparatus for hierarchical assignment of rights to documents and documents having such rights |
US6976009B2 (en) | 2001-05-31 | 2005-12-13 | Contentguard Holdings, Inc. | Method and apparatus for assigning consequential rights to documents and documents having such rights |
US8275716B2 (en) | 2001-05-31 | 2012-09-25 | Contentguard Holdings, Inc. | Method and system for subscription digital rights management |
US7725401B2 (en) | 2001-05-31 | 2010-05-25 | Contentguard Holdings, Inc. | Method and apparatus for establishing usage rights for digital content to be created in the future |
US6876984B2 (en) | 2001-05-31 | 2005-04-05 | Contentguard Holdings, Inc. | Method and apparatus for establishing usage rights for digital content to be created in the future |
US8275709B2 (en) | 2001-05-31 | 2012-09-25 | Contentguard Holdings, Inc. | Digital rights management of content when content is a future live event |
US7152046B2 (en) * | 2001-05-31 | 2006-12-19 | Contentguard Holdings, Inc. | Method and apparatus for tracking status of resource in a system for managing use of the resources |
US8099364B2 (en) | 2001-05-31 | 2012-01-17 | Contentguard Holdings, Inc. | Digital rights management of content when content is a future live event |
US6973445B2 (en) * | 2001-05-31 | 2005-12-06 | Contentguard Holdings, Inc. | Demarcated digital content and method for creating and processing demarcated digital works |
US8001053B2 (en) | 2001-05-31 | 2011-08-16 | Contentguard Holdings, Inc. | System and method for rights offering and granting using shared state variables |
CN1539115A (en) * | 2001-06-07 | 2004-10-20 | ��̹�е¿عɹɷ�����˾ | Method and apparatus for managing transfer of rights |
WO2002101490A2 (en) * | 2001-06-07 | 2002-12-19 | Contentguard Holdings, Inc. | Cryptographic trust zones in digital rights management |
US7774280B2 (en) * | 2001-06-07 | 2010-08-10 | Contentguard Holdings, Inc. | System and method for managing transfer of rights using shared state variables |
WO2002101494A2 (en) * | 2001-06-07 | 2002-12-19 | Contentguard Holdings, Inc. | Protected content distribution system |
US7239708B2 (en) * | 2001-06-27 | 2007-07-03 | Microsoft Corporation | Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client |
US6948073B2 (en) * | 2001-06-27 | 2005-09-20 | Microsoft Corporation | Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client |
US20030115575A1 (en) * | 2001-12-19 | 2003-06-19 | David Reyna | Method and system for sharing resources in hierarchical backplanes |
SE524931C2 (en) * | 2002-02-26 | 2004-10-26 | Sightline Vision Ab | Procedure for starting a computer program |
DE10212411B4 (en) * | 2002-03-20 | 2007-05-03 | Siemens Ag | Procedure for installing a license key |
DE50207195D1 (en) * | 2002-04-08 | 2006-07-27 | Aladdin Knowledge Systems Deut | Process for updating and licensing computer programs and computer system therefor |
US7680743B2 (en) * | 2002-05-15 | 2010-03-16 | Microsoft Corporation | Software application protection by way of a digital rights management (DRM) system |
US8909777B2 (en) | 2002-06-26 | 2014-12-09 | Intel Corporation | Systems and methods for dynamic access to program features |
US10373420B2 (en) | 2002-09-16 | 2019-08-06 | Touchtunes Music Corporation | Digital downloading jukebox with enhanced communication features |
US7822687B2 (en) | 2002-09-16 | 2010-10-26 | Francois Brillon | Jukebox with customizable avatar |
US8584175B2 (en) | 2002-09-16 | 2013-11-12 | Touchtunes Music Corporation | Digital downloading jukebox system with user-tailored music management, communications, and other tools |
US8332895B2 (en) | 2002-09-16 | 2012-12-11 | Touchtunes Music Corporation | Digital downloading jukebox system with user-tailored music management, communications, and other tools |
US8151304B2 (en) | 2002-09-16 | 2012-04-03 | Touchtunes Music Corporation | Digital downloading jukebox system with user-tailored music management, communications, and other tools |
US11029823B2 (en) | 2002-09-16 | 2021-06-08 | Touchtunes Music Corporation | Jukebox with customizable avatar |
US8103589B2 (en) | 2002-09-16 | 2012-01-24 | Touchtunes Music Corporation | Digital downloading jukebox system with central and local music servers |
US9646339B2 (en) | 2002-09-16 | 2017-05-09 | Touchtunes Music Corporation | Digital downloading jukebox system with central and local music servers |
US7370212B2 (en) | 2003-02-25 | 2008-05-06 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
US7089425B2 (en) | 2003-03-18 | 2006-08-08 | Ci4 Technologies, Inc. | Remote access authorization of local content |
JP2004295358A (en) * | 2003-03-26 | 2004-10-21 | Internatl Business Mach Corp <Ibm> | Information processor, encryption processing system thereof and method for controlling external storing device |
GB0307098D0 (en) * | 2003-03-27 | 2003-04-30 | Hewwell Ltd | Multilevel software protection system |
US7464408B1 (en) | 2003-08-29 | 2008-12-09 | Solidcore Systems, Inc. | Damage containment by translation |
US8539063B1 (en) | 2003-08-29 | 2013-09-17 | Mcafee, Inc. | Method and system for containment of networked application client software by explicit human input |
US7191898B1 (en) | 2003-09-04 | 2007-03-20 | Union Rich Usa, Llc | Saw blade case |
US7591021B2 (en) * | 2003-09-05 | 2009-09-15 | Microsoft Corporation | Object model document for obfuscating object model therein |
US7681035B1 (en) | 2003-09-10 | 2010-03-16 | Realnetworks, Inc. | Digital rights management handler and related methods |
US20050071656A1 (en) * | 2003-09-25 | 2005-03-31 | Klein Dean A. | Secure processor-based system and method |
US7788496B2 (en) * | 2003-10-08 | 2010-08-31 | Microsoft Corporation | First computer process and second computer process proxy-executing code on behalf thereof |
US7979911B2 (en) * | 2003-10-08 | 2011-07-12 | Microsoft Corporation | First computer process and second computer process proxy-executing code from third computer process on behalf of first process |
US8103592B2 (en) * | 2003-10-08 | 2012-01-24 | Microsoft Corporation | First computer process and second computer process proxy-executing code on behalf of first process |
US7840968B1 (en) | 2003-12-17 | 2010-11-23 | Mcafee, Inc. | Method and system for containment of usage of language interfaces |
US7783735B1 (en) | 2004-03-22 | 2010-08-24 | Mcafee, Inc. | Containment of network communication |
US20060242406A1 (en) * | 2005-04-22 | 2006-10-26 | Microsoft Corporation | Protected computing environment |
US7873955B1 (en) * | 2004-09-07 | 2011-01-18 | Mcafee, Inc. | Solidifying the executable software set of a computer |
US8347078B2 (en) | 2004-10-18 | 2013-01-01 | Microsoft Corporation | Device certificate individualization |
US8336085B2 (en) | 2004-11-15 | 2012-12-18 | Microsoft Corporation | Tuning product policy using observed evidence of customer behavior |
US7890428B2 (en) * | 2005-02-04 | 2011-02-15 | Microsoft Corporation | Flexible licensing architecture for licensing digital application |
US7549051B2 (en) * | 2005-03-10 | 2009-06-16 | Microsoft Corporation | Long-life digital certification for publishing long-life digital content or the like in content rights management system or the like |
US8438645B2 (en) | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
US7856404B2 (en) * | 2005-04-14 | 2010-12-21 | Microsoft Corporation | Playlist burning in rights-management context |
US8738536B2 (en) * | 2005-04-14 | 2014-05-27 | Microsoft Corporation | Licensing content for use on portable device |
US8725646B2 (en) | 2005-04-15 | 2014-05-13 | Microsoft Corporation | Output protection levels |
US8290874B2 (en) * | 2005-04-22 | 2012-10-16 | Microsoft Corporation | Rights management system for streamed multimedia content |
US9363481B2 (en) * | 2005-04-22 | 2016-06-07 | Microsoft Technology Licensing, Llc | Protected media pipeline |
US9507919B2 (en) | 2005-04-22 | 2016-11-29 | Microsoft Technology Licensing, Llc | Rights management system for streamed multimedia content |
US7693280B2 (en) | 2005-04-22 | 2010-04-06 | Microsoft Corporation | Rights management system for streamed multimedia content |
US8091142B2 (en) * | 2005-04-26 | 2012-01-03 | Microsoft Corporation | Supplementary trust model for software licensing/commercial digital distribution policy |
US7603552B1 (en) * | 2005-05-04 | 2009-10-13 | Mcafee, Inc. | Piracy prevention using unique module translation |
US20060265758A1 (en) | 2005-05-20 | 2006-11-23 | Microsoft Corporation | Extensible media rights |
US20060271493A1 (en) * | 2005-05-24 | 2006-11-30 | Contentguard Holdings, Inc. | Method and apparatus for executing code in accordance with usage rights |
US7684566B2 (en) | 2005-05-27 | 2010-03-23 | Microsoft Corporation | Encryption scheme for streamed multimedia content protected by rights management system |
US8494966B2 (en) | 2005-06-03 | 2013-07-23 | Adobe Systems Incorporated | Method and apparatus for facilitating the transfer of a software license between computer systems |
US7856661B1 (en) | 2005-07-14 | 2010-12-21 | Mcafee, Inc. | Classification of software on networked systems |
US7438078B2 (en) * | 2005-08-05 | 2008-10-21 | Peter Woodruff | Sleeping bag and system |
US8321690B2 (en) * | 2005-08-11 | 2012-11-27 | Microsoft Corporation | Protecting digital media of various content types |
WO2007030931A1 (en) * | 2005-09-14 | 2007-03-22 | Tetraglyph Technologies Inc. | System and method for preventing unauthorized use of digital works |
US20070162390A1 (en) * | 2005-12-22 | 2007-07-12 | Macrovision Corporation | Techniques for distributing and monitoring content |
US7584943B2 (en) * | 2005-12-29 | 2009-09-08 | Frommelt Industries Of Canada, Inc. | Loading dock bumper with replaceable metal faceplate |
US7757269B1 (en) | 2006-02-02 | 2010-07-13 | Mcafee, Inc. | Enforcing alignment of approved changes and deployed changes in the software change life-cycle |
US7895573B1 (en) | 2006-03-27 | 2011-02-22 | Mcafee, Inc. | Execution environment file inventory |
US7870387B1 (en) * | 2006-04-07 | 2011-01-11 | Mcafee, Inc. | Program-based authorization |
US8352930B1 (en) | 2006-04-24 | 2013-01-08 | Mcafee, Inc. | Software modification by group to minimize breakage |
US8555404B1 (en) | 2006-05-18 | 2013-10-08 | Mcafee, Inc. | Connectivity-based authorization |
US8332929B1 (en) | 2007-01-10 | 2012-12-11 | Mcafee, Inc. | Method and apparatus for process enforced configuration management |
US9424154B2 (en) | 2007-01-10 | 2016-08-23 | Mcafee, Inc. | Method of and system for computer system state checks |
US9171419B2 (en) | 2007-01-17 | 2015-10-27 | Touchtunes Music Corporation | Coin operated entertainment system |
US9330529B2 (en) | 2007-01-17 | 2016-05-03 | Touchtunes Music Corporation | Game terminal configured for interaction with jukebox device systems including same, and/or associated methods |
US9953481B2 (en) | 2007-03-26 | 2018-04-24 | Touchtunes Music Corporation | Jukebox with associated video server |
US8996409B2 (en) | 2007-06-06 | 2015-03-31 | Sony Computer Entertainment Inc. | Management of online trading services using mediated communications |
US10019570B2 (en) * | 2007-06-14 | 2018-07-10 | Microsoft Technology Licensing, Llc | Protection and communication abstractions for web browsers |
US7671567B2 (en) * | 2007-06-15 | 2010-03-02 | Tesla Motors, Inc. | Multi-mode charging system for an electric vehicle |
JP2009027525A (en) * | 2007-07-20 | 2009-02-05 | Nec Corp | Optical transmission system and optical transmission method |
US9483405B2 (en) | 2007-09-20 | 2016-11-01 | Sony Interactive Entertainment Inc. | Simplified run-time program translation for emulating complex processor pipelines |
US8332887B2 (en) | 2008-01-10 | 2012-12-11 | Touchtunes Music Corporation | System and/or methods for distributing advertisements from a central advertisement network to a peripheral device via a local advertisement server |
US10290006B2 (en) | 2008-08-15 | 2019-05-14 | Touchtunes Music Corporation | Digital signage and gaming services to comply with federal and state alcohol and beverage laws and regulations |
US8528109B2 (en) * | 2007-10-09 | 2013-09-03 | Microsoft Corporation | Optimizing amount of data passed during software license activation |
US8195931B1 (en) | 2007-10-31 | 2012-06-05 | Mcafee, Inc. | Application change control |
EP2223256A1 (en) * | 2007-11-17 | 2010-09-01 | Uniloc Usa, Inc. | System and method for adjustable licensing of digital products |
US8701189B2 (en) | 2008-01-31 | 2014-04-15 | Mcafee, Inc. | Method of and system for computer system denial-of-service protection |
US8615502B2 (en) | 2008-04-18 | 2013-12-24 | Mcafee, Inc. | Method of and system for reverse mapping vnode pointers |
US8578510B2 (en) * | 2008-06-26 | 2013-11-05 | Valve Corporation | Anti-piracy measures for a video game using hidden secrets |
US8849435B2 (en) | 2008-07-09 | 2014-09-30 | Touchtunes Music Corporation | Digital downloading jukebox with revenue-enhancing features |
US8447421B2 (en) * | 2008-08-19 | 2013-05-21 | Sony Computer Entertainment Inc. | Traffic-based media selection |
US8290604B2 (en) * | 2008-08-19 | 2012-10-16 | Sony Computer Entertainment America Llc | Audience-condition based media selection |
US8544003B1 (en) | 2008-12-11 | 2013-09-24 | Mcafee, Inc. | System and method for managing virtual machine configurations |
US10564804B2 (en) | 2009-03-18 | 2020-02-18 | Touchtunes Music Corporation | Digital jukebox device with improved user interfaces, and associated methods |
US10719149B2 (en) | 2009-03-18 | 2020-07-21 | Touchtunes Music Corporation | Digital jukebox device with improved user interfaces, and associated methods |
US9292166B2 (en) | 2009-03-18 | 2016-03-22 | Touchtunes Music Corporation | Digital jukebox device with improved karaoke-related user interfaces, and associated methods |
CN106056367A (en) | 2009-03-18 | 2016-10-26 | 踏途音乐公司 | Entertainment system and related social networking system |
US10325266B2 (en) | 2009-05-28 | 2019-06-18 | Sony Interactive Entertainment America Llc | Rewarding classes of purchasers |
US9047450B2 (en) | 2009-06-19 | 2015-06-02 | Deviceauthority, Inc. | Identification of embedded system devices |
US8423473B2 (en) * | 2009-06-19 | 2013-04-16 | Uniloc Luxembourg S. A. | Systems and methods for game activation |
US9047458B2 (en) | 2009-06-19 | 2015-06-02 | Deviceauthority, Inc. | Network access protection |
US9633183B2 (en) | 2009-06-19 | 2017-04-25 | Uniloc Luxembourg S.A. | Modular software protection |
US20110016182A1 (en) * | 2009-07-20 | 2011-01-20 | Adam Harris | Managing Gifts of Digital Media |
US8381284B2 (en) | 2009-08-21 | 2013-02-19 | Mcafee, Inc. | System and method for enforcing security policies in a virtual environment |
US8341627B2 (en) * | 2009-08-21 | 2012-12-25 | Mcafee, Inc. | Method and system for providing user space address protection from writable memory area in a virtual environment |
US9552497B2 (en) * | 2009-11-10 | 2017-01-24 | Mcafee, Inc. | System and method for preventing data loss using virtual machine wrapped applications |
JP5571200B2 (en) | 2010-01-26 | 2014-08-13 | タッチチューンズ ミュージック コーポレイション | Digital jukebox device with improved user interface and related techniques |
US8977842B1 (en) * | 2010-02-05 | 2015-03-10 | Symantec Corporation | Hypervisor enabled secure inter-container communications |
US8433759B2 (en) | 2010-05-24 | 2013-04-30 | Sony Computer Entertainment America Llc | Direction-conscious information sharing |
JP5252591B2 (en) * | 2010-06-08 | 2013-07-31 | Necアクセステクニカ株式会社 | TERMINAL DEVICE MANAGEMENT METHOD, TERMINAL DEVICE, PROGRAM, AND NETWORK SYSTEM |
US8938800B2 (en) | 2010-07-28 | 2015-01-20 | Mcafee, Inc. | System and method for network level protection against malicious software |
US8925101B2 (en) | 2010-07-28 | 2014-12-30 | Mcafee, Inc. | System and method for local protection against malicious software |
US8549003B1 (en) | 2010-09-12 | 2013-10-01 | Mcafee, Inc. | System and method for clustering host inventories |
US8484219B2 (en) | 2010-09-21 | 2013-07-09 | Sony Computer Entertainment America Llc | Developing a knowledge base associated with a user that facilitates evolution of an intelligent user interface |
US8504487B2 (en) | 2010-09-21 | 2013-08-06 | Sony Computer Entertainment America Llc | Evolution of a user interface based on learned idiosyncrasies and collected data of a user |
AU2011100168B4 (en) | 2011-02-09 | 2011-06-30 | Device Authority Ltd | Device-bound certificate authentication |
US9075993B2 (en) | 2011-01-24 | 2015-07-07 | Mcafee, Inc. | System and method for selectively grouping and managing program files |
US9112830B2 (en) | 2011-02-23 | 2015-08-18 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
AU2011101295B4 (en) | 2011-06-13 | 2012-08-02 | Device Authority Ltd | Hardware identity in multi-factor authentication layer |
AU2011101297B4 (en) | 2011-08-15 | 2012-06-14 | Uniloc Usa, Inc. | Remote recognition of an association between remote devices |
US9594881B2 (en) | 2011-09-09 | 2017-03-14 | Mcafee, Inc. | System and method for passive threat detection using virtual memory inspection |
CA2971002A1 (en) | 2011-09-18 | 2013-03-21 | Touchtunes Music Corporation | Digital jukebox device with karaoke and/or photo booth features, and associated methods |
US8694738B2 (en) | 2011-10-11 | 2014-04-08 | Mcafee, Inc. | System and method for critical address space protection in a hypervisor environment |
US8973144B2 (en) | 2011-10-13 | 2015-03-03 | Mcafee, Inc. | System and method for kernel rootkit protection in a hypervisor environment |
US9069586B2 (en) | 2011-10-13 | 2015-06-30 | Mcafee, Inc. | System and method for kernel rootkit protection in a hypervisor environment |
US8800024B2 (en) | 2011-10-17 | 2014-08-05 | Mcafee, Inc. | System and method for host-initiated firewall discovery in a network environment |
US8713668B2 (en) | 2011-10-17 | 2014-04-29 | Mcafee, Inc. | System and method for redirected firewall discovery in a network environment |
US11151224B2 (en) | 2012-01-09 | 2021-10-19 | Touchtunes Music Corporation | Systems and/or methods for monitoring audio inputs to jukebox devices |
US8739272B1 (en) | 2012-04-02 | 2014-05-27 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
US9105178B2 (en) | 2012-12-03 | 2015-08-11 | Sony Computer Entertainment Inc. | Remote dynamic configuration of telemetry reporting through regular expressions |
US8973146B2 (en) | 2012-12-27 | 2015-03-03 | Mcafee, Inc. | Herd based scan avoidance system in a network environment |
US9143496B2 (en) | 2013-03-13 | 2015-09-22 | Uniloc Luxembourg S.A. | Device authentication using device environment information |
US9286466B2 (en) | 2013-03-15 | 2016-03-15 | Uniloc Luxembourg S.A. | Registration and authentication of computing devices using a digital skeleton key |
SG11201600817SA (en) * | 2013-08-02 | 2016-03-30 | Bothnic Information Co Ltd | Device for permitting program, program transaction device and method for permitting program thereof |
EP3061030A4 (en) | 2013-10-24 | 2017-04-19 | McAfee, Inc. | Agent assisted malicious application blocking in a network environment |
WO2015070070A1 (en) | 2013-11-07 | 2015-05-14 | Touchtunes Music Corporation | Techniques for generating electronic menu graphical user interface layouts for use in connection with electronic devices |
TWI722981B (en) | 2014-03-25 | 2021-04-01 | 美商觸控調諧音樂公司 | Digital jukebox device with improved user interfaces, and associated methods |
CN110110505A (en) * | 2019-05-08 | 2019-08-09 | 上海航天电子有限公司 | Equipment is encrypted based on USBkey and registration sequence number remote control bound |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4446519A (en) * | 1981-05-26 | 1984-05-01 | Corban International, Ltd. | Method and apparatus for providing security for computer software |
US4593353A (en) * | 1981-10-26 | 1986-06-03 | Telecommunications Associates, Inc. | Software protection method and apparatus |
US4458315A (en) * | 1982-02-25 | 1984-07-03 | Penta, Inc. | Apparatus and method for preventing unauthorized use of computer programs |
US4484306A (en) * | 1982-03-22 | 1984-11-20 | Exide Electronics Corporation | Method and apparatus for controlling access in a data transmission system |
US4649510A (en) * | 1982-04-30 | 1987-03-10 | Schmidt Walter E | Methods and apparatus for the protection and control of computer programs |
US4597058A (en) * | 1983-05-09 | 1986-06-24 | Romox, Inc. | Cartridge programming system |
US4652990A (en) * | 1983-10-27 | 1987-03-24 | Remote Systems, Inc. | Protected software access control apparatus and method |
US4740890A (en) * | 1983-12-22 | 1988-04-26 | Software Concepts, Inc. | Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media |
US4646234A (en) | 1984-02-29 | 1987-02-24 | Brigham Young University | Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of computer programs |
US4791565A (en) * | 1984-06-20 | 1988-12-13 | Effective Security Systems, Inc. | Apparatus for controlling the use of computer software |
US4685055A (en) * | 1985-07-01 | 1987-08-04 | Thomas Richard B | Method and system for controlling use of protected software |
EP0266748B1 (en) | 1986-11-05 | 1995-02-08 | International Business Machines Corporation | A software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor |
US4817140A (en) * | 1986-11-05 | 1989-03-28 | International Business Machines Corp. | Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor |
US4796220A (en) * | 1986-12-15 | 1989-01-03 | Pride Software Development Corp. | Method of controlling the copying of software |
US4937863A (en) * | 1988-03-07 | 1990-06-26 | Digital Equipment Corporation | Software licensing management system |
US4924378A (en) * | 1988-06-13 | 1990-05-08 | Prime Computer, Inc. | License mangagement system and license storage key |
US5103476A (en) * | 1990-11-07 | 1992-04-07 | Waite David P | Secure system for activating personal computer software at remote locations |
-
1991
- 1991-04-09 US US07/682,456 patent/US5222134A/en not_active Expired - Lifetime
- 1991-11-06 AT AT92900655T patent/ATE171024T1/en not_active IP Right Cessation
- 1991-11-06 DE DE69130175T patent/DE69130175T2/en not_active Expired - Fee Related
- 1991-11-06 JP JP4501845A patent/JPH0789345B2/en not_active Expired - Lifetime
- 1991-11-06 EP EP92900655A patent/EP0556305B1/en not_active Expired - Lifetime
- 1991-11-06 CA CA002095723A patent/CA2095723C/en not_active Expired - Fee Related
- 1991-11-06 WO PCT/US1991/008069 patent/WO1992009160A1/en active IP Right Grant
Also Published As
Publication number | Publication date |
---|---|
EP0556305B1 (en) | 1998-09-09 |
EP0556305A4 (en) | 1994-04-06 |
DE69130175D1 (en) | 1998-10-15 |
JPH0789345B2 (en) | 1995-09-27 |
DE69130175T2 (en) | 2000-02-10 |
EP0556305A1 (en) | 1993-08-25 |
CA2095723A1 (en) | 1992-05-08 |
US5222134A (en) | 1993-06-22 |
ATE171024T1 (en) | 1998-09-15 |
JPH06501120A (en) | 1994-01-27 |
WO1992009160A1 (en) | 1992-05-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2095723C (en) | Secure system for activating personal computer software at remote locations | |
US5103476A (en) | Secure system for activating personal computer software at remote locations | |
JP3688356B2 (en) | Licensee notification system | |
US6920567B1 (en) | System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files | |
EP1342149B1 (en) | Method for protecting information and privacy | |
US6009525A (en) | Multi-tier electronic software distribution | |
US20100024044A1 (en) | Specifying rights in a digital rights license according to events | |
US20010051928A1 (en) | Protection of software by personalization, and an arrangement, method, and system therefor | |
US20040117664A1 (en) | Apparatus for establishing a connectivity platform for digital rights management | |
US20040225894A1 (en) | Hardware based method for digital rights management including self activating/self authentication software | |
US20040107368A1 (en) | Method for digital rights management including self activating/self authentication software | |
US20040117644A1 (en) | Method for reducing unauthorized use of software/digital content including self-activating/self-authenticating software/digital content | |
US20040117628A1 (en) | Computer readable storage medium for enhancing license compliance of software/digital content including self-activating/self-authenticating software/digital content | |
WO1998009209B1 (en) | Systems and methods for secure transaction management and electronic rights protection | |
KR20010024212A (en) | Method and system of dynamic transformation of encrypted material | |
JP2007514994A (en) | Tamper resistant virtual machine | |
EP2264640B1 (en) | Feature specific keys for executable code | |
US20040117631A1 (en) | Method for digital rights management including user/publisher connectivity interface | |
JPH06324858A (en) | Software use amount managing system and storage medium with software used amount managing function | |
WO2001077795A2 (en) | System and embedded license control mechanism for the creation and distribution of digital content files and enforcement of licensed use of the digital content files | |
JP2001175468A (en) | Method and device for controlling use of software | |
WO2006031127A2 (en) | Methods and arrangements for distributing computer programs and user licenses in a secure manner | |
US20100228673A1 (en) | System and method for using digital strings to provide secure distribution of digital content | |
KR100391168B1 (en) | System and method for preventing illegal copying software | |
EP1054315B1 (en) | System and program for preventing unauthorized copying of software |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |