Tse v. Google Inc., et al.
Filing
1
COMPLAINT against All Defendants ( Filing fee $ 350 receipt number 0540-3611342.), filed by Ho Keung TSE. (Attachments: # 1 Civil Cover Sheet, # 2 Exhibit A-US Patent 6665797, # 3 Exhibit B-Notice of Intent to Issue Ex Parte Reexamination Certificate, # 4 Exhibit C-Final State of Claims)(Keung TSE, Ho)
EXHIBIT A
(US PATENT 6665797)
This PDF file is Searchable.
Please note that it is originally a non-searchable PDF file consists of pages of images
only. Plaintiff transforms the PDF image file into searchable PDF file by the “OCR
Text Recognition” function of Adobe Acrobat 9 Pro Extended.
When opening the file with PDF reader, the original images will be displayed, not the
OCR generated texts.
As the “search” function of the PDF reader is actually basing on the OCR generated
texts which are hidden and not visually displayed, and also for the sake that, the OCR
generated texts may not be all correct, therefore Plaintiff cannot guarantee a search
can generate a correct result.
Hopefully, this searchable PDF file would be more useful than the original.
111111
1111111111111111111111111111111111111111111111111111111111111
US006665797B 1
United States Patent
(10)
Keung
(12)
(45)
(54)
Inventor:
Tse Ho Keung, P.O. Box 54670, North
Point Post Office (HK)
( *)
Notice:
Subject to any disclaimer, the term of this
patent is extended or adjusted under 35
U.S.c. 154(b) by 0 days.
5,155,680
5,586,186
5,719,938
5,737,416
PROTECTION OF SOFTWARE AGAIN
AGAINST UNAUTHORIZED USE
(76)
Patent No.:
US 6,665,797 BI
Date of Patent:
Dec. 16,2003
A
A
A
A
*
*
*
*
10/1992
12/1996
2/1998
4/1998
Wiedemer .................... 705/52
Yuval et al. .................. 380/30
Haas et al. ................. 380/281
Cooper ........................ 705/51
* cited by examiner
Primary Examiner-Gilberto Barron
ABSTRACT
(21)
Appl. No.: 09/112,276
(57)
(22)
Filed:
A central program comprising a EI sub-program for providing identity information of the rightful user thereof for
accessing a network central computer to obtain service(s) or
software product(s) or alike, in which a secure operation on
an account of the rightful user for payment therefor
involved; and a AS sub-program for using the existence of
the EI sub-program in a computer as a precondition for
authorising use of those software products obtained on that
computer. The central program is for managing the use of the
individual sub-programs therein so that the AS sub-program
can be protected from being copied individually.
Jul. 9, 1998
Related U.S. Application Data
(63)
Continuation-in-part of application No. 08/587,448, filed on
Dec. 1, 1995.
(51)
(52)
(58)
Int. CI? ................................................ H04L 12/22
U.S. CI. ............................ 713/193; 705/51; 705/59
Field of Search .............................. 705/51, 52, 56,
705/58, 59; 713/193
References Cited
(56)
U.S. PATENT DOCUMENTS
4,796,181 A
* 1/1989 Wiedemer .................... 705/52
22 Claims, 1 Drawing Sheet
EI
PROOR#v1
ES
PR()GRMV1
AC
PROGR,ANl
THE
CENTRAl
PR()GRMV1
u.s. Patent
US 6,665,797 BI
Dec. 16,2003
EI
FIG. 1
PROORAM
ES
AC
PROGRAM
PROOR.AJ\I1
THE
CENTRAL
PROGRAM
FIG.2
PART A
JUMP TO PART BDECRYPTED
-------------_._._..__._.--._._._..._._._..
PART B
Encrypted
PART C
~ PROGR.AJ\I1
PAATB
DECR"VPfED
JUMP TO PAAT C
US 6,665,797 Bl
1
2
protection and according to the present invention, the AS
sub-program is protected from being unauthorised copied by
its rightful user to someone else lies on the fact that a rightful
user would not copy a software, i.e., the central program in
This is a continuation-in-part of patent application Ser.
No. 08/587,448, filed on Dec. 1, 1995, which is still pending. 5 which the EI sub-program exists and which can be used by
an unauthorised user to provide the rightful user's identity
FIELD OF THE INVENTION
information for using the rightful user's account in
obtaining, for eg., network services or software products, to
The present invention relates to protection of software,
someone else. As seen from the use of automatic teller
and particularly, to protection of software against unautho10 machine(ATM) magnetic cards, which although can readily
rised use or copying.
be forged, has been proved to be remarkably secure.
According to a second embodiment of the present
BACKGROUND OF THE INVENTION
invention, the central program comprising the EI subConventionally, software protection methods for protectprogram only, and the AS sub-program become an indiing commercial software products such as programs, mul- 15 vidual program which authorises the software product(s) to
timedia software, distributed through a communication
be used only when the EI sub-program exists in the same
network, such as a telephone system, require a user comcomputer it runs and which is being determined by receiving
puter to have a piece of hardware comprising decryption
an encrypted identity of the EI sub-program from the same.
keys and system be installed therein, for to be authenticated
According to a third embodiment, the EI and AS subby a software program running on the computer. Hardware, 20 programs are basically equivalent such that copying the AS
rather than software, are being used because software duplisub-program by its rightful user to someone else is equivacation facilities are commonly found in personal computers.
lent to copying the EI sub-program to someone else, thereby
However, this is extremely cumbersome and places a large
preventing the AS sub-program from unauthorised copying
burden on users and vendors alike.
or use.
It is therefore an object of the present invention to provide 25
BRIEF DESCRIPTION OF DRAWINGS
a piece of software to replace the above-mentioned piece of
FIG. 1 is a block diagram of the central program.
hardware and the rightful user of that piece of software is
FIG. 2 is a diagrammatic view of a program in which a
being discouraged from copying it to someone else, by
part B thereof being encrypted, in RAM space.
means of a psychological barrier.
It is therefore another object of the present invention is to 30
DETAILED DESCRIPTION OF THE
provide a method to discourage a rightful user from copying
PREFERRED EMBODIMENTS
his software to someone else.
The present invention is directed to protecting software
product(s) distributed through a communication network,
SUMMARY OF THE INVENTION
35 against unauthorised copying or use, and for the sake of
According to a first embodiment of the present invention,
simplicity, the following description is directed to protection
there is provided a central program comprising 1) a subof such software product(s) stored in a user's IBM PC
program for providing an Encrypted Identity (herein below
computer. And, the present invention will be described under
referred to as EI sub-program), 2) a sub-program for authothe following headings:
rising use of a software product (herein below referred to as 40 1) The Central Program.
AS sub-program), 3) a sub-program for authenticating user
2) The Sub-program for providing an Encrypted Identity (EI
computer (herein below referred to as AC sub-program).
sub-program).
The central program is for managing the use of the
3) The Sub-program for authorising use of a software
individual sub-programs therein so that the AS sub-program
product (AS sub-program).
can be protected from being accessed directly, thereby 45 4) The Sub-program for authenticating user computer (AC
preventing it from being copied individually. The EI subsub-program).
program is for providing identity information( an encrypted
5) Other Embodiments.
identity) of its rightful owner for accessing a network central
1) The Central Program.
computer to obtain services or software products or alike in
According to the first embodiment, there is provided a
which a secure operation on a user account of that owner for 50 central program which being an executable program and can
payment therefor involved. The AC sub-program is for
be caused to be executed a) by user by entering its filename
authenticating the computer on which it runs as being a
in DOS environment, b) by a running program. FIG. 1 is a
particular predetermined computer, by determining the hardblock diagram of the central program, details are provided as
ware and software configuration as well as hardware charfollows:
acteristics of that computer by software means and compar- 55
a) If a user desires to access a network central computer
ing the result with that required. The AS sub-program is for
through a communication link, the user has to cause the
using the authentication result of the AC sub-program and
central program to be executed. The central program
the existence of the EI sub-program which being not prowill request the user to enter a password to enable its
tected against unauthorised use and being capable of being
operation and if the password coincidents with that
used by any user thereof, on a computer, as preconditions for 60
required, it will be responsive to user's command(s) to
authorising those software products "which may be pursend an encrypted identity of its rightful user, who
chased commercial computer software" obtained to be used
should be that user, to the central computer.
on that computer.
This requirement of user password is necessary to prevent
It should be noted that in the central program, as far as
someone to access the central computer and use the account
protection of the software products from being unlawfully 65 of the rightful user without his authorisation.
The central program will cause the EI sub-program, of
copied by the rightful user to someone else is concerned, the
AS sub-program is the only sub-program which needs
which details will be described herein below, to be executed
PROTECTION OF SOFTWARE AGAIN
AGAINST UNAUTHORIZED USE
US 6,665,797 Bl
3
4
for providing an encrypted identity of the user, to the central
It should be noted that continuous use of the software
computer. The central computer will permit the access
program requires continuously receiving encrypted comrequest from the user if the encrypted identity is correct, for
mands.
which details will be described in item 2 herein below.
It should also be noted that for each user, each of the
b) When a running program desires to cause the AS 5 software products for use on his/her computer(s) use a same
sub-program to be executed, to authorise it to continue
respective encryption algorithm A2 and the encryption algoto run, it will first prepare an input parameter for
rithm A2 being included into each such software product by
indicating to the central program such a request and
the central computer at the time when the central computer
store the input parameter in a predetermined location in
is to supply the same to the user computer.
RAM, then through the use of a PC DOS service call 10
ii) by decrypting an encrypted part of a software product
for that purpose, cause the central program to be
or a completely encrypted software product.
executed. If the central program is being enabled preIt should be noted that if the software product is a
viously by the above-mentioned password, it will
program, then it will be sufficient to have a part thereof to be
access the input parameter in the predetermined locaencrypted, for preventing unauthorised copying and use,
tion and from it the central program can determine that
a running program is requesting for an authorisation 15 however, if the software product is an audio/visual multimedia data file, it should be more desirable to have the whole
command from the AS sub-program, and will then
software product be encrypted.
cause the AS sub-program to be executed. Otherwise,
The decryption of a part of or an entire software product
the central program will not cause the AS sub-program
takes place on a temporary copy of which in RAM, and that
to authorise the running program to continue to run. As
the password is a password for enabling use of AS 20 temporary copy should no longer exist after user finish using
the software product, so as to prevent illegal copy from
sub-program, as well as the EI sub-program, the rightbeing made. Given by example only, FIG. 2 is a diagramful user is discouraged from providing the password to
someone else, in order that the someone else can use his
matic view of a program in RAM space, with a part B
AS sub-program.
thereof being encrypted. As seen, the AS sub-program
For the case the central program is being caused by user 25 decrypts part B and stores the result which size should be not
to be executed, there will be no valid or no input parameter
equivalent to that of the encrypted copy, in 'part B
and the central program can thus know this fact.
decrypted' .
2) The sub-Program for Providing an Encrypted Identity (EI
The AS sub-program then overwrites at the first location
Sub-program).
of 'part B encrypted' an instruction 'JUMP TO part B
This sub-program uses the method used in IC credit card 30 decrypted' and at the end of 'part B decrypted' appends an
for identity authentication and in which an encrypted ideninstruction 'JUMP TO part C'. In this way, the encrypted
tity is generated.
part of the software will not be executed and the decrypted
When starts, the EI sub-program sends an access request
part will be executed instead.
to the central computer which in return will send back a
In the case of audio/visual multimedia software, the
random number. The EI sub-program will then encrypt the 35 software will be decrypted a small part by a small part and
random number with a predetermined algorithm AI and send
each small part is decrypted at the time it is about to be
the result to the central computer which will permit access
utilized by a audio/visual program for causing audio/visual
if the result is identical with another result it obtained by
effect. In other words, that audio/visual program has to cause
performing the same encryption algorithm on that random
the AS sub-program to be executed in the manner as
number.
40 described above in item Ib, everytime it wants a decryption
It should be noted that for each user, there is a correof a small part. Desirably, a newly decrypted small part will
sponding respective encryption algorithm AI for the identity
overwrite a previously decrypted one so that a whole copy
authentication thereof and also that the central computer
of the decrypted software will not exist in RAM.
may use the encryption result received from the EI sub4) The sub-Program for Authenticating User Computer (AC
program, if it being correct, as a user authorisation for 45 Sub-program).
payment to be made, from a user account for obtaining
The AC sub-program for authenticating a computer on
network services or software products or the like.
which it runs as being a particular predetermined computer,
3) The sub-Program for Authorising Use of a Software
and prevent use of protected software if the computer is not,
Product (AS Sub-program).
and its operation is under control of the central program.
According to the present invention, there are 2 approaches 50
Specifically, when the central program is being installed
for authorising a software product to be used:
in a harddisk of a user computer and executed, it will check
i) by sending encrypted command to a running software
an encrypted status information stored in itself and from
program for authorising it to continue to run on a
which it knows this is the first time it being executed and will
computer, in a similar manner as that mentioned above
cause an initialization process to take place. In the initialin item 2 for identity authentication. Specifically, the 55 ization process, the central program sends to the central
computer, as mentioned herein above in item 2, an unenrunning software program includes in the input
crypted identity of the rightful user of the central program,
parameter, as mentioned above in item Ib, a random
number it generated, then causes the central program to
then the AC sub-program requests for an encrypted combe executed. The AS sub-program, which being caused
mand from the central computer which will provide such an
to be executed by the central program, as mentioned 60 encrypted command, in the manner as described hereinabove in item Ib, sends the result it obtained by
above in item 3i, if the rightful user has a valid account
performing a predetermined encryption algorithm A2
which is not closed.
on that random number, to the running software proAfter authenticating the command, the AC sub-program
gram which will accept the encrypted command and
determines the hardware and software configuration of the
continue to run, if the result is identical to another result 65 user computer, which includes, for eg., identities of peripherals such as mouse, printer, joystick, harddisk and floppy
it obtained by performing the same encryption algodisk drive etc; characteristics of hardware such as running
rithm A2 on that random number.
US 6,665,797 Bl
5
6
speed determination which is a function of CPU frequency,
of itself by, for instance, checksum method. Alternatively, it
cache memory size etc; number and number of heads,
may also be that the AS program performs the checking.
cylinders, sectors of harddisk and locations of bad sectors
And, if the checking result is that some data in the EI
therein; version number of operation system software and
sub-program being altered, then in the former case, the AS
physical position of a particular software product including 5 will be caused to be not operable by the EI sub-program by
the central program in the harddisk; by skills well known to
not sending it an encrypted identity, and in the latter case, the
those in the art. For instance, the running speed can be
AS program will be caused to be not operable by itself.
determined by causing the computer to execute a test
According to the third embodiment, the encryption algoprogram and initializing a hardware counter to measure the
rithms Al and A2 that the EI and AS sub-programs use
time the computer has taken to finish executing the program.
10 respectively for providing an encrypted identity to the
For another instance, the version number of the operation
central computer and for generating encrypted commands to
system may be determined by using a particular DOS
authorise use of a software product respectively, is a same
service call.
algorithm.
The result of the determination and a status information
Thus, it would be equivalent for a rightful user to copy his
indicative of the central program being initialized will be
stored by the AC sub-program in a predetermined part of the 15 EI sub-program to someone else if he copies his AS subprogram to someone else. In this case, a slight modification
central program in the harddisk, in the form of encrypted
on the AS sub-program can make it equivalent to the EI
data. Thereafter, every time when the central program is
sub-program and which involves adding a simple interface
executed, it will first check the status information, and after
program for receiving a random number from the central
determining that it is being initialized, it will perform a job
as requested, as mentioned in item 1 herein above, and in 20 computer, feeding the random number into the AS subaddition thereto, it will also automatically cause the AC
program, receiving the encryption result from the AS subprogram and supplying the encryption result to the central
sub-program to be executed which will determine at least a
part of the above-mentioned hardware and software concomputer, and such functions are commonly found in any
network interface software. Alternatively, the Al and A2
figuration as well as hardware characteristics of the computer on which it runs, at a time, and the AC sub-program 25 algorithms may be 2 different algorithms, but information
will encrypt an indication information in another predeterrepresentative of the Al algorithm is being included into the
mined part of the central program for causing the AS
AS sub-program and be accessible by user or when the AS
sub-program not to operate, if any part of the configuration/
sub-program being executed, capable of being used by AS
sub-program to perform the corresponding encryption funccharacteristics determined is not identical to the correspond30 tion which being user-usable.
ing part of that it encrypted and stored previously.
In addition thereto, theAC sub-program will also reset the
In addition, according to another embodiment of the
encrypted status information so that another initialization
present invention, the software products and AS subprogram each includes an identity of its rightful user, so as
process will automatically take place when the user causes
to facilitate legal action against piracy. Further, the AS
the central program to be executed, and for the authorisation
of which another encrypted command from the central 35 sub-program, when executed, will access each of the softcomputer will be required.
ware products, by using a particular DOS service call for
loading a software product stored in the computer on which
This prevents a user from deliberately adapting the central
it runs, from harddisk to RAM, one by one, for checking
program to computer of other user(s), after closing his
account.
such an identity therein, if any software product is found to
In addition, the encrypted command from the central 40 have an identity not identical to that of the AS sub-program,
computer may alternatively be supplied to the user via, e.g.,
the AS sub-program will inhibit use of all software products
a telephone line, and then entered into the user computer by
under its control, including itself, on the computer. Such
the user. Specifically, to request for an encrypted command,
identities may be stored in a predetermined location of the
the AC sub-program generates a random number and consoftware products, and is protected from being altered by
veys the random number to the user who in turn supplies it 45 having an encrypted one stored in another location in each
to the central computer by means of telephone dual tone
software product, and each of those another locations is
signals, generated by entering the random number on a
different in different software products so that it would not
telephone keypad, through the telephone line, and after
be discovered and altered. And, each such software product,
encrypting the random number, the central computer sends
when executed, will automatically check the unencrypted
the result to the user via the same telephone line by means 50 identity stored therein against the decryption result of the
of a voice synthesizer.
encrypted one, if they are not consistent, the software
S) Other Embodiments
product will fail to operate. The identity or encrypted
According to the second embodiment, the AS subidentity of the rightful user being included into each of the
program is separated from the central program and become
software products by the central computer at the time when
an independent program, whereas the central program com- 55 the central computer is to supply the same to the user
computer. Further, to prevent the AS sub-program from
prises the EI sub-program only. The AS program is bound to
the EI sub-program by requiring the AS program to operate
mistakenly regarding a software product which stored in the
only when the EI sub-program exists in the same computer.
computer and which being not supplied from the central
Specifically, the AS program when running, can cause the EI
computer, as a software product under its control, the central
sub-program to be executed for generating an encrypted 60 computer may further include information in a third predetermined location of each software product for indicating
identity for the AS program to authenticate. The EI subprogram knows that this is a request for encrypted identity
this fact, that is, the software product being supplied from
from the AS program, not a request from user for encrypted
the central computer, to the AS sub-program and each
identity for accessing the central computer, by the method of
software product will not operate if when being executed, it
input parameter as mentioned above in item lb.
65 finds that information therein being altered.
It should be noted that the above embodiments are given
Further, the EI sub-program before sending the encrypted
by way of example only, and it will be obvious to those
identity to the AS program, may first check the data integrity
US 6,665,797 Bl
7
8
skilled in the art that various changes and modifications may
said identity program code and said authorising
be made without departing from the spirit of the present
software are stored in said medium in such a
invention.
manner that said authorising software is prevented
What is claimed is:
from being copied therefrom individually; and
1. A method for protecting publicly distributed software 5
the improvement resides in said protection basing on
from unauthorised use, comprising the steps of:
no hardware and/or software specific to said rightful user(s) other than said identity program code
determining if identity information, is existing in a proand said identity program code being specific to
cessing apparatus;
said rightful user(s).
using a positive result of said determination as a pre7. A computer software product as claimed in claim 6,
condition for causing said processing apparatus to 10
wherein said operation being operation related to making
provide user access to said software desired to be
payment from an account of said rightful user(s).
protected;
8. A computer software product as claimed in claim 6,
wherein:
wherein said authorising software contains said identity
said identity information, if so existing, being capable
of being used in enabling electronic commerce 15 program code therein.
9. A computer software product for protecting other
operation(s) for which rightful user(s) of said softsoftware against unauthorised use, comprising:
ware desired to be protected has to be responsible;
authorising program for, when being executed on a proaccess to said software desired to be protected is being
cessing apparatus, providing user access to said softprovided without causing a said operation being
ware desired to be protected;
performed and said identity information being spe- 20
a computer readable medium having said authorising
cific to said rightful user(s).
program
2. A method for protecting software from unauthorised
wherein:
use, as claimed in claim 1, wherein further comprising the
information specific to rightful users) of said software
steps of:
desired to be protected, exists in said authorising
25
authenticating said identity information;
program as a part thereof;
determining said identity information as existing, if said
said existing information being capable of being used
identity information being authentic and as not existing
in enabling electronic commerce operation(s) for
if otherwise.
which said rightful user(s) has to be responsible, but
3. A method for protecting software from unauthorised
not being usable by said processing apparatus for
use, as claimed in claim 1, wherein said operation being 30
said electronic commerce purpose, when said authooperation related to making payment from an account of said
rising program being loaded on said processing
rightful user(s), for obtaining a service/product.
apparatus as a part thereof, and access to said soft4. A method for protecting software from unauthorised
ware desired to be protected is being provided withuse, as claimed in claim 1, wherein said software desired to
out causing a said operation being performed.
be protected comprises a plurality of protected programs; 35
10. A computer software product as claimed in claim 9,
each of said protected programs having validity information
wherein said operation being operation related to making
in a first predetermined location therein for indicating a valid
payment from an account of said rightful user(s).
identity of its rightful user exists in a second predetermined
11. A method for protecting publicly distributed software
location therein, and an encrypted identity of its rightful user
therein; and each of said protected programs, when being 40 from unauthorised use, comprising the steps of:
executed, will fail to operate if said validity information
obtaining first information from a user of a processing
therein being altered, or said identity therein and the decrypapparatus having an identity software;
tion result of said encrypted identity therein being inconsisusing said first information received being correct as a
tent.
pre-condition for causing said processing apparatus to
5. A method for protecting software from unauthorised
provide user access to said software desired to be
use, as claimed in claim 4, wherein further comprising the 45
protected;
steps of:
wherein:
storing an encrypted identity of a user in said processing
said identity software being for providing a second
apparatus; and if all of said protected programs stored
information specific to rightful user(s) of said softin said processing apparatus has a valid user identity
ware desired to be protected, if said correct first
which being consistent with the decryption result of 50
information is being obtained from a user thereof;
said stored encrypted identity, permitting use of said
and said second information being capable of being
protected programs and not permitting if otherwise.
used in enabling electronic commerce operation(s)
6. A computer software product for protecting software
for which said rightful user(s) has to be responsible;
publicly and individually distributed against unauthorised
access to said software desired to be protected is being
use;
55
provided without causing a said operation being persaid software product comprising:
formed.
identity program code for enabling electronic com12. A method for protecting software from unauthorised
merce operation(s) for which rightful user(s) of said
use, as claimed in claim 11, wherein said operation being
software desired to be protected has to be responoperation related to making payment from an account of said
sible;
60 rightful user(s) and said first information being a password.
authorising software effectively under the control of
13. A method for protecting software from unauthorised
said rightful user(s) for, when executed, providing
use, as claimed in claim 11, wherein said software desired to
user access to said software desired to be protected,
be protected being first software used on said processing
without causing a said operation being performed;
apparatus for determining third information related to harda computer readable medium having said identity pro- 65 ware and/or software of said processing apparatus;
gram code and said authorising software;
wherein further comprising second software for, when
being executed, authenticating the identity of the comwherein:
US 6,665,797 Bl
9
10
puter on which said second software runs as being said
permitting use of said software on said first processing
processing apparatus, basing on at least a part of said
apparatus;
third information;
wherein said sub-method a cost is being charged from
and for providing user access to third software if said
said account; and thereafter, said sub-method being
computer has an authentic identity.
5
capable of being used on a processing apparatus, say,
14. A method for protecting publicly distributed software
second processing apparatus, without re-charging
from unauthorised use, comprising the steps of:
from said account said cost.
authenticating identity information associated with a pro19. A method for protecting software from unauthorised
cessing apparatus;
use, as claimed by claim 18, wherein no charge for repeating
using a positive result of said authentication as a pre- 10 said sub-method.
condition for causing said processing apparatus to
20. A method for protecting software, for use by a user,
provide user access to said software desired to be
from unauthorised use; comprising a sub-method;
protected;
wherein said sub-method a protection software being used
wherein said identity information existing in such a
and "the presence of identity information in a processmanner that said identity information being capable of 15
ing apparatus" is being used in the creation of said
being used in enabling electronic commerce operation
protection software as an "installation" pre-condition
(s) for which rightful user(s) of said software desired to
for said protection software to perform in said processbe protected has to be responsible;
ing apparatus step (a) below; and said identity inforwherein access to said software desired to be protected is
mation being specific to said user and capable of being
being provided without causing a said operation being 20
used in enabling electronic commerce operation(s) for
performed and said identity information being specific
which said user has to be responsible;
to said rightful user(s).
said sub-method comprising the steps of:
15. A method for protecting software from unauthorised
(a) determining by said protection software running on
use, as claimed in claim 14, wherein said operation being
operation related to making payment from an account of said 25
a processing apparatus, say, first processing appararightful user(s).
tus with said "installation" precondition being met,
16. A method for protecting software from unauthorised
first information related to the hardware or/and softuse, comprising the steps of:
ware of said first processing apparatus, for future
(a) obtaining by protection software running on a proreference in step ( c) below; thereafter
cessing apparatus, say, first processing apparatus, first 30
(b) determining from a processing apparatus, say, secinformation from the user thereof;
ond processing apparatus, second information
(b) determining by said protection software, from said
related to the hardware or/and software thereof;
processing apparatus second information related to the
(c) determining if said second information is consistent
hardware or/and software thereof for future reference in
with said first information;
step (c) below, in response to said first information 35
(d) using a positive result of said determination of
obtained being consistent with third information conconsistence as a pre-condition for permitting use of
tained in said protection software, thereafter
said software desired to be protected on said second
(c) authenticating a processing apparatus, say, second
processing apparatus, with said "installation" preprocessing apparatus, basing on at least a part of said
second information;
condition not being met;
40
(d) using a positive result of said authentication as a
thereafter, said sub-method being capable of being used
pre-condition for permitting use of said software
on a processing apparatus, say, third processing
desired to be protected on said second processing
apparatus, without causing any user responsible
apparatus;
operation(s) being performed therefor and with no step
wherein said third information being confidential inforrelating to a new user payment therefor.
mation of a rightful user of said software desire to be 45
21. A method for verifying identity of a user of a data
protected and being necessary for enabling elecprocessing apparatus, comprising the steps of:
tronic commerce transaction(s) for which said rightreceiving, by said data processing apparatus, information
ful user has to be responsible; and said method is
specific to a user and necessary for accessing an
being performed without causing a said transaction
account of said user;
50
take place.
verifying said account being valid, by an electronic trans17. A method for protecting software from unauthorised
action system by use of said information received by
use, as claimed by claim 12, wherein said software desired
said data processing apparatus;
to be protected being purchased commercial software.
18. A method for protecting software from unauthorised
using by said data processing apparatus, a positive result
use, by restricting the use thereof to be under control of a 55
of said verification as a precondition for providing user
single person, comprising a sub-method; said sub-method
access to at least a part of the functionality of said data
comprising the steps of:
processing apparatus;
(a) establishing a communication between a processing
wherein said method is being performed without chargapparatus, say, first processing apparatus and a remote
ing said account and said at least a part of function60
electronic transaction system;
ality being not related to said validity status of said
(b) verifying said person having a valid account, by said
account.
remote electronic transaction system, basing on authen22. A software product comprising a computer readable
ticated information related to said person, said informedium having computer code for causing one or more
mation being communicated to said remote electronic
processing apparatus to perform the method of claim 1, 12,
transaction system from said processing apparatus;
65 14, 16, 18, 20 or 21.
(c) using a positive result of said verification as a precondition for
* * * * *
UNITED STATES PATENT AND TRADEMARK OFFICE
CERTIFICATE OF CORRECTION
PATENT NO.
: 6,665,797 B1
DATED
: December 16, 2003
INVENTOR(S) : Ho Keung, Tse
Page 1 of 1
It is certified that error appears in the above-identified patent and that said Letters Patent is
hereby corrected as shown below:
Title page,
Item [75], Inventor, "Keung" should be -- Tse --
Signed and Sealed this
Twenty-seventh Day of April, 2004
JONW.DUDAS
Acting Director of the United States Patent and Trademark Office
UNITED STATES PATENT AND TRADEMARK OFFICE
CERTIFICATE OF CORRECTION
PATENT NO.
: 6,665,797 B1
DATED
: December 16, 2003
INVENTOR(S) : Ho Keung, Tse
Page 1 of 1
It is certified that error appears in the above-identified patent and that said Letters Patent is
hereby corrected as shown below:
Title page,
Item [54], Title, "PROTECTION OF SOFTWARE AGAIN AGAINST
UNAUTHORIZED USE" should be -- COMPUTER APPARATUS/SOFTWARE
ACCESS RIGHT MANAGEMENT --;
Column 1,
Line 8, insert -- /data processing apparatus -- after "protection of software";
Line 9, delete "software" and insert -- them --;
Line 10, insert -- /illegitimate -- after "unautho-rised";
Line 10, "or copying" should be deleted;
Line 14, after "Conventionally" delete "software protection";
Line 31, after "present invention" delete "is";
Line 34, after "someone else" insert new paragraph -- It is therefore a further object of
the present invention to provide a method to verify the identity of a user of data processing apparatus. --;
Column 2,
Line 33, replace "The" with -- One object of the --;
Line 33, "directed" should be deleted;
Line 33, "protecting" should be -- protect --;
Line 38, insert -- the first embodiment of -- before "the present invention";
Column 4,
Lines 56-57, "unen-crypted" should be -- encrypted --.
Signed and Sealed this
Third Day of January, 2006
JONW.DUDAS
Director of the United States Patent and Trademark Office
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?