Patent application number | Description | Published |
20090150674 | System and Method for Device Bound Public Key Infrastructure - Techniques are provided secured communication of data, such as in the context of a public key infrastructure (PKI). In one embodiment, the technique may involve using a private key that is bound to the device requesting the secure data, thereby making it harder for someone to copy, steal or fake. The private key may be generated by adding a filler code to a unique device identifier. The identifier may be based on at least one user-configurable parameter and at least one non-user-configurable parameter of the device. | 06-11-2009 |
20090217384 | License Auditing for Distributed Applications - The provided software application includes a module that determines a machine fingerprint of a client device at an appropriate time, such as during initial software load on the client. The fingerprint may comprise various machine-determinable measures of system configuration for the client. Each application copy may be associated with a serial number. A license host may collect serial number, fingerprint and/or IP address information from clients on which the application is installed. The host may generate a map of application installations, including geographic locations of installations and number of unique serial numbers per client in specified regions. | 08-27-2009 |
20090292816 | Device and Method for Secured Communication - Devices and methods are provided for securing communication between a traffic management center (TMC) and a traffic controller via utilization of a field security device. In one embodiment, the field security device transmits a device identifier to the TMC upon being powered up or connected to the traffic controller. The device identifier is generally based on a combination of user-configurable and non-user-configurable parameters of the field security device. In response to the TMC authenticating the device identifier, the field security device establishes a secure private network (SPN) between the field security device and the TMC. | 11-26-2009 |
20090327070 | System and Method for Monitoring Efficacy of Online Advertising - Systems and methods are provided for determining the efficacy of online advertising campaigns. In one approach, the method involves, in response to a user of a network device accessing a web page on which an advertisement is displayed, caching an impression in a first database, and receiving device data regarding the network device. The device data may comprise a combination of user-configurable and non-user-configurable machine parameters. A unique device identifier for the network device may be generated based on the machine parameters. The generated device identifier may be utilized to gain insight into which online ads users look at and which products and/or services they tend to buy. | 12-31-2009 |
20100229224 | Web Content Access Using a Client Device Identifier - Systems and methods are provided for controlling access to online services. For example, the system may include an application running on a user computer ( | 09-09-2010 |
20100323790 | Devices and Methods for Auditing and Enforcing Computer Game Licenses - Techniques are provided for monitoring and controlling use of a computer game on a remote computing device. One such technique employs a processor with memory and transceiver configured to receive from the device, in response to an attempt to play the game on the device, a combination of a game identifier for the game and a device identifier for the device, the device identifier based on a combination of user-configurable parameter and non-user-configurable parameters, and to access a database of known game identifiers, each known game identifier being associated with a device count corresponding to a total number of known devices on which a known game was previously played and with known device identifiers for the known devices, to control remote access to games, for example, according to licensing constraints. | 12-23-2010 |
20100323798 | Systems and Methods for Game Activation - Techniques are provided for controlling the activation of computer games. In one embodiment, the technique may involve receiving a combination of a game identifier for the game and a device identifier for the device. The technique may further involve accessing a database of known game identifiers, each known game identifier being associated with a device count corresponding to a total number of known devices on which a known game was previously played or activated, and obtaining a usage policy for the game. | 12-23-2010 |
20100324981 | System and Method for Media Distribution on Social Networks - An apparatus and method for distributing media via an exchange club or social networking site effects or includes the process of identifying a member by authenticating a unique device identifier received from the user's computing device when accessing the social networking site, enabling the member to select one or more media for sharing or broadcasting to other members of the site using information obtained from the site, enabling members to select or enter contact information of friends with whom the user would like to share the media or information about the media, and rewarding the member for any purchase of the media resulting from the broadcasting. | 12-23-2010 |
20100324983 | System and Method for Media Distribution - A method for media distribution executable on a computer readable medium that, if executed by a device, causes the device to perform steps for determining whether a usage license for a media is present on the device using a distribution application stored on the computer readable medium, soliciting for the purchase of the usage license based on the usage license determination, collecting financial information from a user of the device, generating a unique device identifier using one or more parameters of the device, sending the financial information, a media identifier, and a device identifier to a server, and receiving a license key that enables the media to be fully operational on the device. | 12-23-2010 |
20100325025 | System and Method for Sharing Media - An apparatus or method for sharing media on a social network effects, or includes steps for, accessing a social networking site using login information provided by a first member, broadcasting a media sharing announcement for a first media belonging to the first member to a second member of the social networking site, and granting the second member a usage license to the first media in exchange for a relinquishment of a usage license of a second media. | 12-23-2010 |
20100325424 | System and Method for Secured Communications - A system for secured communications includes a control center, a network transceiver, an authentication server communicatively coupled between the control center and the network transceiver, and an extended trust device communicatively coupled between the authentication server and a client, the extended trusted device being configured to send a device identifier to the authentication server via the network transceiver, the device identifier being based on a combination of a user-configurable parameter and a non-user-configurable parameter of the extended trust device, wherein the authentication server is configured to determine access privilege of a client to the control center by authenticating the device identifier received from extended trust device. | 12-23-2010 |
20100325710 | Network Access Protection - A system or method for network access protection executes steps for receiving, at a server, an access request for access to at least one network resource from a client machine, the access request including account authentication information comprising an account identifier and password, obtaining a client machine identifier from the client machine in response to receiving the request for access, and controlling access to the network resource in response to the access request by authorizing access to the network resource for the access request if the client machine identifier matches a registered machine identifier that is registered for use with the account authentication information and the account authentication information matches registered information for a valid account, but denying access to the network resource if the client machine identifier does not match a registered client machine identifier that is registered for use with the account authentication information. | 12-23-2010 |
20100325734 | Modular Software Protection - A method for modular software protection includes steps for receiving, at a server, a license key registered for a software executable installed on a client device and machine fingerprint data generated at the client device, accessing, using the server, stored usage rights data indicated by the license key, the usage rights data specifying a number of client devices on which the software executable is licensed to operate and which features of the software executable are enabled, determining, using the machine fingerprint data received by the server, whether operation of the software executable on the client device would cause the number of client devices on which the software executable is licensed to operate to be exceeded, and creating, in response to the determining step, an encrypted license file for transmission to the client device that defines separate features of the software executable to be enabled on the client device. | 12-23-2010 |
20100325735 | System and Method for Software Activation - A system and related method for activating use of software on a computing device utilizes a license server configured so that, responsive to a communication link being available between the license server and the computing device, the license server receives from the computing device, via the communication link, an activation request including (a) a software identifier identifying the software, (b) a device identifier identifying the computer, and (c) a license key for the software, accesses a database storing previously received software identifiers, device identifiers, and license keys, determines an activation instruction through application of a usage policy that compares the activation request to records within the database, and sends the activation instruction to the computing device. | 12-23-2010 |
20110093474 | System and Method for Tracking and Scoring User Activities - A system for tracking user activities on a computing network and generating a peer-group score based on those activities may be implemented in hardware and software that when executed performs steps for receiving at a server information including a device identifier, a user score associated with the device identifier, and content provider information from a content provider, the device identifier being based on one or more of user-configurable and non-user-configurable parameters of a user device used to access network-accessible content of the content provider, categorizing the content provider as belonging to one or more classes of service based on the received information, retrieving from a database one or more provider-generated user scores belonging to an identical one of the one or more classes of service and being associated with an identical device identifier, and generating a peer-group score for the received device identifier based on the received user score and the one or more retrieved provider-generated user scores. | 04-21-2011 |
20110093503 | Computer Hardware Identity Tracking Using Characteristic Parameter-Derived Data - A method for computer identity tracking may be implemented by executing software, for example, from a server, for generating a baseline machine fingerprint for a client device by reading data indicating current configuration states of hardware making up the client device and processing the data to generate the baseline machine fingerprint, storing the baseline machine fingerprint in a database of stored machine fingerprints, subsequently generating a working machine fingerprint for the client device, the working machine fingerprint derived from a portion of the data, the portion determined according to a sampling protocol, querying the database of stored machine fingerprints using the working machine fingerprint and the sampling protocol to determine whether the working machine fingerprint matches a machine fingerprint previously stored in the database, and providing an indication of results from querying the database. | 04-21-2011 |
20110093701 | Software Signature Tracking - A method for preventing unauthorized use of software may be achieved by executing computer-readable code with instructions for recording an indication of at least one selected file of a software application in a memory location accessible to a security component of the software application, in which software application the security component is configured to cause a hash signature of the at least one selected file to be generated in response to a signal arising from use of the software application, hashing the at least one selected file to generate a first file signature, transmitting the first file signature to a secure network-accessible computer memory for storage and subsequent comparison to at least one subsequent file signature generated via operation of the security component on a client device, comparing the first file signature to a second file signature generated by the security component in response to a signal arising from use of the software application on the client device, and disabling the software application on the client device, in response to determining that the first file signature does not match the second file signature. | 04-21-2011 |
20110093703 | Authentication of Computing and Communications Hardware - A method for authenticating a computing device or hardware component includes computer-implemented process steps for assigning a unique identifier to the hardware component, generating a baseline fingerprint for the hardware component using algorithm-processing characteristic configuration data determined from the hardware component as input, wherein the baseline fingerprint is capable of being regenerated from the hardware component so long as configuration of the hardware component is not changed, transmitting the identifier in association with the baseline fingerprint for storage in a computer-readable data structure, and generating a data signal, in response to a query comprising the assigned identifier, indicating whether the stored baseline fingerprint for the assigned identifier matches a second fingerprint regenerated from the hardware component at a time after the baseline fingerprint is generated. | 04-21-2011 |
20110093920 | System and Method for Device Authentication with Built-In Tolerance - A system for building tolerance into authentication of a computing device includes a means for executing, from a computer-readable medium, computer-implementable steps of: (a) receiving and storing a first digital fingerprint of the device during a first boot of an authenticating software on the device, the first digital fingerprint based on a first set of device components, (b) receiving a second digital fingerprint from the device at a subsequent time, (c) comparing the second digital fingerprint with a plurality of stored digital fingerprints of known devices, (d) in response to the comparison indicating a mismatch between the second digital fingerprint and the plurality of stored digital fingerprints, generating a request code comprising instructions for the device to generate a third digital fingerprint using the first set of device components, (e) sending the request code to the remote device, (f) receiving the third digital fingerprint from the remote device in response to the request code, and (g) authenticating the device based on a comparison of the first and third digital fingerprints. | 04-21-2011 |