Patent application number | Description | Published |
20080209558 | Self-defensive protected software with suspended latent license enforcement - A method and system of computer program modules for extending the cover time of protection for a licensed software product, by increasing the difficulty and time required for an attacker to produce a workable cracked version of the program. When an attack is detected, critical information about the effectiveness of the attack are withheld from the attacker by simulating the behavior of a cracked program, thereby inducing the attacker to prematurely consider the attack successful. Latent license enforcement features are provided, whose activation is suspended until predefined environmental conditions are met. | 08-28-2008 |
20080209559 | Method for detecting that a protected software program is cracked - A method for determining if a software program having a protective envelope has been cracked, and signaling an indication thereof. A direct determination is made of whether the protective envelope is intact or has been compromised by an attack, without requiring a license violation to occur. Executable code in the protective envelope generates an envelope confirmation which is validated by executable code in the program itself. Any disabling or separation of the envelope from the program will be detectable by the program at validation time. Provisions are made for a secure envelope confirmation, the use of arguments as input to the confirmation generation, and for incorporating information related to the computer and user to facilitate identifying the attacker. Signaled indications can include network messaging to alert the licensor that the program has been cracked. | 08-28-2008 |
20080226065 | Method for secure communication between a secure hardware device and a computer and apparatus for changing a shared secret for generating a session key for a secure communication between a secure hardware device and a computer - There is provided a method for secure communication between a secure hardware device connected to a computer and said computer, | 09-18-2008 |
20080228649 | Method and apparatus for obtaining a protected application protected against unauthorized use by implementing a predetermined licensing model - There is provided a method for obtaining a protected application protected against unauthorized use by implementing a predetermined licensing model, said method comprising the steps of: adding a software product to said application, said software product providing the possibility of defining one of several different manners of realizing a functionality to be used for implementing the predetermined licensing model, and defining one of the several manners of realizing the functionality and an apparatus for obtaining a protected application protected against unauthorized use by implementing a predetermined licensing model, which apparatus adds a software product to said application, said software product providing the possibility of defining one of several different manners of realizing a functionality to be used for implementing the predetermined licensing model, and defines one of the several manners of realizing the functionality. Further, there is provided a software product, which is to be added to an application in order to obtain a protected application protected against unauthorized use by implementing a predetermined licensing model, said software product providing the possibility of defining one of several different manners of realizing a functionality to be used for implementing the predetermined licensing model and a method of distributing a software application, said method comprising the steps of: protecting the software application to be distributed by adding a software product to said software application, said software product providing the possibility of defining one of several different manners of realizing a functionality to be used for implementing a predetermined licensing model, and defining one of the several manners of realizing the functionality, sending the protected software application to the user. | 09-18-2008 |
20080312943 | Method And System For Data Product License-Modification Coupons - A method and system for issuing and redeeming digital coupons for requesting and granting modifications of licensed computer data products. Modifications include versions and configurations of the licensed data product as well as licensing issues related thereto. A product licensor issues authenticated coupons to customer organizations which utilize the licensed data products. The coupons are not necessarily specific to any particular computer or device, data product, version, license or configuration. Coupons can thereby be easily distributed to users within the organization. A user fills out the coupon with a request for the desired modifications and sends the coupon to the licensor, who fulfills the request by sending modification installation code directly to the user, thereby avoiding unnecessary overhead burdens on the organization. Digital coupons may be used in conjunction with external hardware devices (“dongles”) or with internal software licensing modules. | 12-18-2008 |
20090006865 | Efficient Remotely-Keyed Symmetric Cryptography For Digital Rights Management - An efficient symmetrical-cryptographic method for using a fast but insecure host to perform encryption/decryption based on a secret key in a secure, but slow hardware token, such as a smartcard or similar device, without revealing the secret key to the host, and such that the ciphertext and plaintext are exactly the same size. The present method is suitable for use in Digital Rights Management and Software Rights Management applications which require precise interchangeability of ciphertext and plaintext in pre-allocated areas of data storage. | 01-01-2009 |
20090172631 | Method Of Adding A Functionality To An Executable First Module Of A Program Package - What is provided is a method of adding a functionality to an executable first module of a program package, wherein the executable first module, during execution, provides an internal function or utilizes an internal function of an executable second module of the program package;
| 07-02-2009 |
20090205040 | COMPUTER DATA PRODUCT LICENSE INSTALLATION / UPDATE CONFIRMATION - An authenticated digital confirmation of an installation or an update of a licensed computer data product, for providing the licensor with a validation that the installation/update was carried out as intended, and conveying relevant details of the installation/update. The installation/updating facility (internal software, external hardware device, or combination thereof) examines and documents the pre-installation/update state of the target computer system, performs the installation/update, examines and documents the post-installation/update state, and generates the confirmation, which is a summary or digest of the process and the status thereof. The confirmation is securely authenticated and sent to the licensor for validation, to be used for order fulfillment, billing and accounting, and other purposes. | 08-13-2009 |
20110029774 | SECURE COMMUNICATION BETWEEN A HARDWARE DEVICE AND A COMPUTER - A group of secret sets is provided, each set including a key and an assigned identifier. The sets are stored in a secure hardware device that can retrieve the key of any of the sets using the key's corresponding identifier. A set is stored in an application, and the application is executed on a computer coupled to the secure device. The application defines a session key, encrypts the session key using the key from the set stored in the application, generates session data including the stored set's identifier and the encrypted session key, and sends the session data to the secure device. The secure device obtains from the session data the encrypted session key and the identifier, retrieves the key corresponding to the identifier, and uses the retrieved key to decrypt the session key. The session key is then used to encrypt and decrypt communications between the secure device and the computer. | 02-03-2011 |
20120266249 | Automatic Selection of Routines for Protection - An apparatus, computer readable medium, and method of protecting an application, the method including responding to receiving a level of security for the application by evaluating each of a plurality of routines of the application to generate an evaluation for each of the plurality of routines of the application; selecting a number of the plurality of routines to protect based on the evaluation for each of the plurality of routines and the received level of security; and protecting the selected number of the plurality of routines. | 10-18-2012 |