Tse v. Google Inc., et al.

Filing 1

COMPLAINT against All Defendants ( Filing fee $ 350 receipt number 0540-3611342.), filed by Ho Keung TSE. (Attachments: # 1 Civil Cover Sheet, # 2 Exhibit A-US Patent 6665797, # 3 Exhibit B-Notice of Intent to Issue Ex Parte Reexamination Certificate, # 4 Exhibit C-Final State of Claims)(Keung TSE, Ho)

Download PDF
EXHIBIT A (US PATENT 6665797) This PDF file is Searchable. Please note that it is originally a non-searchable PDF file consists of pages of images only. Plaintiff transforms the PDF image file into searchable PDF file by the “OCR Text Recognition” function of Adobe Acrobat 9 Pro Extended. When opening the file with PDF reader, the original images will be displayed, not the OCR generated texts. As the “search” function of the PDF reader is actually basing on the OCR generated texts which are hidden and not visually displayed, and also for the sake that, the OCR generated texts may not be all correct, therefore Plaintiff cannot guarantee a search can generate a correct result. Hopefully, this searchable PDF file would be more useful than the original. 111111 1111111111111111111111111111111111111111111111111111111111111 US006665797B 1 United States Patent (10) Keung (12) (45) (54) Inventor: Tse Ho Keung, P.O. Box 54670, North Point Post Office (HK) ( *) Notice: Subject to any disclaimer, the term of this patent is extended or adjusted under 35 U.S.c. 154(b) by 0 days. 5,155,680 5,586,186 5,719,938 5,737,416 PROTECTION OF SOFTWARE AGAIN AGAINST UNAUTHORIZED USE (76) Patent No.: US 6,665,797 BI Date of Patent: Dec. 16,2003 A A A A * * * * 10/1992 12/1996 2/1998 4/1998 Wiedemer .................... 705/52 Yuval et al. .................. 380/30 Haas et al. ................. 380/281 Cooper ........................ 705/51 * cited by examiner Primary Examiner-Gilberto Barron ABSTRACT (21) Appl. No.: 09/112,276 (57) (22) Filed: A central program comprising a EI sub-program for providing identity information of the rightful user thereof for accessing a network central computer to obtain service(s) or software product(s) or alike, in which a secure operation on an account of the rightful user for payment therefor involved; and a AS sub-program for using the existence of the EI sub-program in a computer as a precondition for authorising use of those software products obtained on that computer. The central program is for managing the use of the individual sub-programs therein so that the AS sub-program can be protected from being copied individually. Jul. 9, 1998 Related U.S. Application Data (63) Continuation-in-part of application No. 08/587,448, filed on Dec. 1, 1995. (51) (52) (58) Int. CI? ................................................ H04L 12/22 U.S. CI. ............................ 713/193; 705/51; 705/59 Field of Search .............................. 705/51, 52, 56, 705/58, 59; 713/193 References Cited (56) U.S. PATENT DOCUMENTS 4,796,181 A * 1/1989 Wiedemer .................... 705/52 22 Claims, 1 Drawing Sheet EI PROOR#v1 ES PR()GRMV1 AC PROGR,ANl THE CENTRAl PR()GRMV1 u.s. Patent US 6,665,797 BI Dec. 16,2003 EI FIG. 1 PROORAM ES AC PROGRAM PROOR.AJ\I1 THE CENTRAL PROGRAM FIG.2 PART A JUMP TO PART BDECRYPTED -------------_._._..__._.--._._._..._._._.. PART B Encrypted PART C ~ PROGR.AJ\I1 PAATB DECR"VPfED JUMP TO PAAT C US 6,665,797 Bl 1 2 protection and according to the present invention, the AS sub-program is protected from being unauthorised copied by its rightful user to someone else lies on the fact that a rightful user would not copy a software, i.e., the central program in This is a continuation-in-part of patent application Ser. No. 08/587,448, filed on Dec. 1, 1995, which is still pending. 5 which the EI sub-program exists and which can be used by an unauthorised user to provide the rightful user's identity FIELD OF THE INVENTION information for using the rightful user's account in obtaining, for eg., network services or software products, to The present invention relates to protection of software, someone else. As seen from the use of automatic teller and particularly, to protection of software against unautho10 machine(ATM) magnetic cards, which although can readily rised use or copying. be forged, has been proved to be remarkably secure. According to a second embodiment of the present BACKGROUND OF THE INVENTION invention, the central program comprising the EI subConventionally, software protection methods for protectprogram only, and the AS sub-program become an indiing commercial software products such as programs, mul- 15 vidual program which authorises the software product(s) to timedia software, distributed through a communication be used only when the EI sub-program exists in the same network, such as a telephone system, require a user comcomputer it runs and which is being determined by receiving puter to have a piece of hardware comprising decryption an encrypted identity of the EI sub-program from the same. keys and system be installed therein, for to be authenticated According to a third embodiment, the EI and AS subby a software program running on the computer. Hardware, 20 programs are basically equivalent such that copying the AS rather than software, are being used because software duplisub-program by its rightful user to someone else is equivacation facilities are commonly found in personal computers. lent to copying the EI sub-program to someone else, thereby However, this is extremely cumbersome and places a large preventing the AS sub-program from unauthorised copying burden on users and vendors alike. or use. It is therefore an object of the present invention to provide 25 BRIEF DESCRIPTION OF DRAWINGS a piece of software to replace the above-mentioned piece of FIG. 1 is a block diagram of the central program. hardware and the rightful user of that piece of software is FIG. 2 is a diagrammatic view of a program in which a being discouraged from copying it to someone else, by part B thereof being encrypted, in RAM space. means of a psychological barrier. It is therefore another object of the present invention is to 30 DETAILED DESCRIPTION OF THE provide a method to discourage a rightful user from copying PREFERRED EMBODIMENTS his software to someone else. The present invention is directed to protecting software product(s) distributed through a communication network, SUMMARY OF THE INVENTION 35 against unauthorised copying or use, and for the sake of According to a first embodiment of the present invention, simplicity, the following description is directed to protection there is provided a central program comprising 1) a subof such software product(s) stored in a user's IBM PC program for providing an Encrypted Identity (herein below computer. And, the present invention will be described under referred to as EI sub-program), 2) a sub-program for authothe following headings: rising use of a software product (herein below referred to as 40 1) The Central Program. AS sub-program), 3) a sub-program for authenticating user 2) The Sub-program for providing an Encrypted Identity (EI computer (herein below referred to as AC sub-program). sub-program). The central program is for managing the use of the 3) The Sub-program for authorising use of a software individual sub-programs therein so that the AS sub-program product (AS sub-program). can be protected from being accessed directly, thereby 45 4) The Sub-program for authenticating user computer (AC preventing it from being copied individually. The EI subsub-program). program is for providing identity information( an encrypted 5) Other Embodiments. identity) of its rightful owner for accessing a network central 1) The Central Program. computer to obtain services or software products or alike in According to the first embodiment, there is provided a which a secure operation on a user account of that owner for 50 central program which being an executable program and can payment therefor involved. The AC sub-program is for be caused to be executed a) by user by entering its filename authenticating the computer on which it runs as being a in DOS environment, b) by a running program. FIG. 1 is a particular predetermined computer, by determining the hardblock diagram of the central program, details are provided as ware and software configuration as well as hardware charfollows: acteristics of that computer by software means and compar- 55 a) If a user desires to access a network central computer ing the result with that required. The AS sub-program is for through a communication link, the user has to cause the using the authentication result of the AC sub-program and central program to be executed. The central program the existence of the EI sub-program which being not prowill request the user to enter a password to enable its tected against unauthorised use and being capable of being operation and if the password coincidents with that used by any user thereof, on a computer, as preconditions for 60 required, it will be responsive to user's command(s) to authorising those software products "which may be pursend an encrypted identity of its rightful user, who chased commercial computer software" obtained to be used should be that user, to the central computer. on that computer. This requirement of user password is necessary to prevent It should be noted that in the central program, as far as someone to access the central computer and use the account protection of the software products from being unlawfully 65 of the rightful user without his authorisation. The central program will cause the EI sub-program, of copied by the rightful user to someone else is concerned, the AS sub-program is the only sub-program which needs which details will be described herein below, to be executed PROTECTION OF SOFTWARE AGAIN AGAINST UNAUTHORIZED USE US 6,665,797 Bl 3 4 for providing an encrypted identity of the user, to the central It should be noted that continuous use of the software computer. The central computer will permit the access program requires continuously receiving encrypted comrequest from the user if the encrypted identity is correct, for mands. which details will be described in item 2 herein below. It should also be noted that for each user, each of the b) When a running program desires to cause the AS 5 software products for use on his/her computer(s) use a same sub-program to be executed, to authorise it to continue respective encryption algorithm A2 and the encryption algoto run, it will first prepare an input parameter for rithm A2 being included into each such software product by indicating to the central program such a request and the central computer at the time when the central computer store the input parameter in a predetermined location in is to supply the same to the user computer. RAM, then through the use of a PC DOS service call 10 ii) by decrypting an encrypted part of a software product for that purpose, cause the central program to be or a completely encrypted software product. executed. If the central program is being enabled preIt should be noted that if the software product is a viously by the above-mentioned password, it will program, then it will be sufficient to have a part thereof to be access the input parameter in the predetermined locaencrypted, for preventing unauthorised copying and use, tion and from it the central program can determine that a running program is requesting for an authorisation 15 however, if the software product is an audio/visual multimedia data file, it should be more desirable to have the whole command from the AS sub-program, and will then software product be encrypted. cause the AS sub-program to be executed. Otherwise, The decryption of a part of or an entire software product the central program will not cause the AS sub-program takes place on a temporary copy of which in RAM, and that to authorise the running program to continue to run. As the password is a password for enabling use of AS 20 temporary copy should no longer exist after user finish using the software product, so as to prevent illegal copy from sub-program, as well as the EI sub-program, the rightbeing made. Given by example only, FIG. 2 is a diagramful user is discouraged from providing the password to someone else, in order that the someone else can use his matic view of a program in RAM space, with a part B AS sub-program. thereof being encrypted. As seen, the AS sub-program For the case the central program is being caused by user 25 decrypts part B and stores the result which size should be not to be executed, there will be no valid or no input parameter equivalent to that of the encrypted copy, in 'part B and the central program can thus know this fact. decrypted' . 2) The sub-Program for Providing an Encrypted Identity (EI The AS sub-program then overwrites at the first location Sub-program). of 'part B encrypted' an instruction 'JUMP TO part B This sub-program uses the method used in IC credit card 30 decrypted' and at the end of 'part B decrypted' appends an for identity authentication and in which an encrypted ideninstruction 'JUMP TO part C'. In this way, the encrypted tity is generated. part of the software will not be executed and the decrypted When starts, the EI sub-program sends an access request part will be executed instead. to the central computer which in return will send back a In the case of audio/visual multimedia software, the random number. The EI sub-program will then encrypt the 35 software will be decrypted a small part by a small part and random number with a predetermined algorithm AI and send each small part is decrypted at the time it is about to be the result to the central computer which will permit access utilized by a audio/visual program for causing audio/visual if the result is identical with another result it obtained by effect. In other words, that audio/visual program has to cause performing the same encryption algorithm on that random the AS sub-program to be executed in the manner as number. 40 described above in item Ib, everytime it wants a decryption It should be noted that for each user, there is a correof a small part. Desirably, a newly decrypted small part will sponding respective encryption algorithm AI for the identity overwrite a previously decrypted one so that a whole copy authentication thereof and also that the central computer of the decrypted software will not exist in RAM. may use the encryption result received from the EI sub4) The sub-Program for Authenticating User Computer (AC program, if it being correct, as a user authorisation for 45 Sub-program). payment to be made, from a user account for obtaining The AC sub-program for authenticating a computer on network services or software products or the like. which it runs as being a particular predetermined computer, 3) The sub-Program for Authorising Use of a Software and prevent use of protected software if the computer is not, Product (AS Sub-program). and its operation is under control of the central program. According to the present invention, there are 2 approaches 50 Specifically, when the central program is being installed for authorising a software product to be used: in a harddisk of a user computer and executed, it will check i) by sending encrypted command to a running software an encrypted status information stored in itself and from program for authorising it to continue to run on a which it knows this is the first time it being executed and will computer, in a similar manner as that mentioned above cause an initialization process to take place. In the initialin item 2 for identity authentication. Specifically, the 55 ization process, the central program sends to the central computer, as mentioned herein above in item 2, an unenrunning software program includes in the input crypted identity of the rightful user of the central program, parameter, as mentioned above in item Ib, a random number it generated, then causes the central program to then the AC sub-program requests for an encrypted combe executed. The AS sub-program, which being caused mand from the central computer which will provide such an to be executed by the central program, as mentioned 60 encrypted command, in the manner as described hereinabove in item Ib, sends the result it obtained by above in item 3i, if the rightful user has a valid account performing a predetermined encryption algorithm A2 which is not closed. on that random number, to the running software proAfter authenticating the command, the AC sub-program gram which will accept the encrypted command and determines the hardware and software configuration of the continue to run, if the result is identical to another result 65 user computer, which includes, for eg., identities of peripherals such as mouse, printer, joystick, harddisk and floppy it obtained by performing the same encryption algodisk drive etc; characteristics of hardware such as running rithm A2 on that random number. US 6,665,797 Bl 5 6 speed determination which is a function of CPU frequency, of itself by, for instance, checksum method. Alternatively, it cache memory size etc; number and number of heads, may also be that the AS program performs the checking. cylinders, sectors of harddisk and locations of bad sectors And, if the checking result is that some data in the EI therein; version number of operation system software and sub-program being altered, then in the former case, the AS physical position of a particular software product including 5 will be caused to be not operable by the EI sub-program by the central program in the harddisk; by skills well known to not sending it an encrypted identity, and in the latter case, the those in the art. For instance, the running speed can be AS program will be caused to be not operable by itself. determined by causing the computer to execute a test According to the third embodiment, the encryption algoprogram and initializing a hardware counter to measure the rithms Al and A2 that the EI and AS sub-programs use time the computer has taken to finish executing the program. 10 respectively for providing an encrypted identity to the For another instance, the version number of the operation central computer and for generating encrypted commands to system may be determined by using a particular DOS authorise use of a software product respectively, is a same service call. algorithm. The result of the determination and a status information Thus, it would be equivalent for a rightful user to copy his indicative of the central program being initialized will be stored by the AC sub-program in a predetermined part of the 15 EI sub-program to someone else if he copies his AS subprogram to someone else. In this case, a slight modification central program in the harddisk, in the form of encrypted on the AS sub-program can make it equivalent to the EI data. Thereafter, every time when the central program is sub-program and which involves adding a simple interface executed, it will first check the status information, and after program for receiving a random number from the central determining that it is being initialized, it will perform a job as requested, as mentioned in item 1 herein above, and in 20 computer, feeding the random number into the AS subaddition thereto, it will also automatically cause the AC program, receiving the encryption result from the AS subprogram and supplying the encryption result to the central sub-program to be executed which will determine at least a part of the above-mentioned hardware and software concomputer, and such functions are commonly found in any network interface software. Alternatively, the Al and A2 figuration as well as hardware characteristics of the computer on which it runs, at a time, and the AC sub-program 25 algorithms may be 2 different algorithms, but information will encrypt an indication information in another predeterrepresentative of the Al algorithm is being included into the mined part of the central program for causing the AS AS sub-program and be accessible by user or when the AS sub-program not to operate, if any part of the configuration/ sub-program being executed, capable of being used by AS sub-program to perform the corresponding encryption funccharacteristics determined is not identical to the correspond30 tion which being user-usable. ing part of that it encrypted and stored previously. In addition thereto, theAC sub-program will also reset the In addition, according to another embodiment of the encrypted status information so that another initialization present invention, the software products and AS subprogram each includes an identity of its rightful user, so as process will automatically take place when the user causes to facilitate legal action against piracy. Further, the AS the central program to be executed, and for the authorisation of which another encrypted command from the central 35 sub-program, when executed, will access each of the softcomputer will be required. ware products, by using a particular DOS service call for loading a software product stored in the computer on which This prevents a user from deliberately adapting the central it runs, from harddisk to RAM, one by one, for checking program to computer of other user(s), after closing his account. such an identity therein, if any software product is found to In addition, the encrypted command from the central 40 have an identity not identical to that of the AS sub-program, computer may alternatively be supplied to the user via, e.g., the AS sub-program will inhibit use of all software products a telephone line, and then entered into the user computer by under its control, including itself, on the computer. Such the user. Specifically, to request for an encrypted command, identities may be stored in a predetermined location of the the AC sub-program generates a random number and consoftware products, and is protected from being altered by veys the random number to the user who in turn supplies it 45 having an encrypted one stored in another location in each to the central computer by means of telephone dual tone software product, and each of those another locations is signals, generated by entering the random number on a different in different software products so that it would not telephone keypad, through the telephone line, and after be discovered and altered. And, each such software product, encrypting the random number, the central computer sends when executed, will automatically check the unencrypted the result to the user via the same telephone line by means 50 identity stored therein against the decryption result of the of a voice synthesizer. encrypted one, if they are not consistent, the software S) Other Embodiments product will fail to operate. The identity or encrypted According to the second embodiment, the AS subidentity of the rightful user being included into each of the program is separated from the central program and become software products by the central computer at the time when an independent program, whereas the central program com- 55 the central computer is to supply the same to the user computer. Further, to prevent the AS sub-program from prises the EI sub-program only. The AS program is bound to the EI sub-program by requiring the AS program to operate mistakenly regarding a software product which stored in the only when the EI sub-program exists in the same computer. computer and which being not supplied from the central Specifically, the AS program when running, can cause the EI computer, as a software product under its control, the central sub-program to be executed for generating an encrypted 60 computer may further include information in a third predetermined location of each software product for indicating identity for the AS program to authenticate. The EI subprogram knows that this is a request for encrypted identity this fact, that is, the software product being supplied from from the AS program, not a request from user for encrypted the central computer, to the AS sub-program and each identity for accessing the central computer, by the method of software product will not operate if when being executed, it input parameter as mentioned above in item lb. 65 finds that information therein being altered. It should be noted that the above embodiments are given Further, the EI sub-program before sending the encrypted by way of example only, and it will be obvious to those identity to the AS program, may first check the data integrity US 6,665,797 Bl 7 8 skilled in the art that various changes and modifications may said identity program code and said authorising be made without departing from the spirit of the present software are stored in said medium in such a invention. manner that said authorising software is prevented What is claimed is: from being copied therefrom individually; and 1. A method for protecting publicly distributed software 5 the improvement resides in said protection basing on from unauthorised use, comprising the steps of: no hardware and/or software specific to said rightful user(s) other than said identity program code determining if identity information, is existing in a proand said identity program code being specific to cessing apparatus; said rightful user(s). using a positive result of said determination as a pre7. A computer software product as claimed in claim 6, condition for causing said processing apparatus to 10 wherein said operation being operation related to making provide user access to said software desired to be payment from an account of said rightful user(s). protected; 8. A computer software product as claimed in claim 6, wherein: wherein said authorising software contains said identity said identity information, if so existing, being capable of being used in enabling electronic commerce 15 program code therein. 9. A computer software product for protecting other operation(s) for which rightful user(s) of said softsoftware against unauthorised use, comprising: ware desired to be protected has to be responsible; authorising program for, when being executed on a proaccess to said software desired to be protected is being cessing apparatus, providing user access to said softprovided without causing a said operation being ware desired to be protected; performed and said identity information being spe- 20 a computer readable medium having said authorising cific to said rightful user(s). program 2. A method for protecting software from unauthorised wherein: use, as claimed in claim 1, wherein further comprising the information specific to rightful users) of said software steps of: desired to be protected, exists in said authorising 25 authenticating said identity information; program as a part thereof; determining said identity information as existing, if said said existing information being capable of being used identity information being authentic and as not existing in enabling electronic commerce operation(s) for if otherwise. which said rightful user(s) has to be responsible, but 3. A method for protecting software from unauthorised not being usable by said processing apparatus for use, as claimed in claim 1, wherein said operation being 30 said electronic commerce purpose, when said authooperation related to making payment from an account of said rising program being loaded on said processing rightful user(s), for obtaining a service/product. apparatus as a part thereof, and access to said soft4. A method for protecting software from unauthorised ware desired to be protected is being provided withuse, as claimed in claim 1, wherein said software desired to out causing a said operation being performed. be protected comprises a plurality of protected programs; 35 10. A computer software product as claimed in claim 9, each of said protected programs having validity information wherein said operation being operation related to making in a first predetermined location therein for indicating a valid payment from an account of said rightful user(s). identity of its rightful user exists in a second predetermined 11. A method for protecting publicly distributed software location therein, and an encrypted identity of its rightful user therein; and each of said protected programs, when being 40 from unauthorised use, comprising the steps of: executed, will fail to operate if said validity information obtaining first information from a user of a processing therein being altered, or said identity therein and the decrypapparatus having an identity software; tion result of said encrypted identity therein being inconsisusing said first information received being correct as a tent. pre-condition for causing said processing apparatus to 5. A method for protecting software from unauthorised provide user access to said software desired to be use, as claimed in claim 4, wherein further comprising the 45 protected; steps of: wherein: storing an encrypted identity of a user in said processing said identity software being for providing a second apparatus; and if all of said protected programs stored information specific to rightful user(s) of said softin said processing apparatus has a valid user identity ware desired to be protected, if said correct first which being consistent with the decryption result of 50 information is being obtained from a user thereof; said stored encrypted identity, permitting use of said and said second information being capable of being protected programs and not permitting if otherwise. used in enabling electronic commerce operation(s) 6. A computer software product for protecting software for which said rightful user(s) has to be responsible; publicly and individually distributed against unauthorised access to said software desired to be protected is being use; 55 provided without causing a said operation being persaid software product comprising: formed. identity program code for enabling electronic com12. A method for protecting software from unauthorised merce operation(s) for which rightful user(s) of said use, as claimed in claim 11, wherein said operation being software desired to be protected has to be responoperation related to making payment from an account of said sible; 60 rightful user(s) and said first information being a password. authorising software effectively under the control of 13. A method for protecting software from unauthorised said rightful user(s) for, when executed, providing use, as claimed in claim 11, wherein said software desired to user access to said software desired to be protected, be protected being first software used on said processing without causing a said operation being performed; apparatus for determining third information related to harda computer readable medium having said identity pro- 65 ware and/or software of said processing apparatus; gram code and said authorising software; wherein further comprising second software for, when being executed, authenticating the identity of the comwherein: US 6,665,797 Bl 9 10 puter on which said second software runs as being said permitting use of said software on said first processing processing apparatus, basing on at least a part of said apparatus; third information; wherein said sub-method a cost is being charged from and for providing user access to third software if said said account; and thereafter, said sub-method being computer has an authentic identity. 5 capable of being used on a processing apparatus, say, 14. A method for protecting publicly distributed software second processing apparatus, without re-charging from unauthorised use, comprising the steps of: from said account said cost. authenticating identity information associated with a pro19. A method for protecting software from unauthorised cessing apparatus; use, as claimed by claim 18, wherein no charge for repeating using a positive result of said authentication as a pre- 10 said sub-method. condition for causing said processing apparatus to 20. A method for protecting software, for use by a user, provide user access to said software desired to be from unauthorised use; comprising a sub-method; protected; wherein said sub-method a protection software being used wherein said identity information existing in such a and "the presence of identity information in a processmanner that said identity information being capable of 15 ing apparatus" is being used in the creation of said being used in enabling electronic commerce operation protection software as an "installation" pre-condition (s) for which rightful user(s) of said software desired to for said protection software to perform in said processbe protected has to be responsible; ing apparatus step (a) below; and said identity inforwherein access to said software desired to be protected is mation being specific to said user and capable of being being provided without causing a said operation being 20 used in enabling electronic commerce operation(s) for performed and said identity information being specific which said user has to be responsible; to said rightful user(s). said sub-method comprising the steps of: 15. A method for protecting software from unauthorised (a) determining by said protection software running on use, as claimed in claim 14, wherein said operation being operation related to making payment from an account of said 25 a processing apparatus, say, first processing appararightful user(s). tus with said "installation" precondition being met, 16. A method for protecting software from unauthorised first information related to the hardware or/and softuse, comprising the steps of: ware of said first processing apparatus, for future (a) obtaining by protection software running on a proreference in step ( c) below; thereafter cessing apparatus, say, first processing apparatus, first 30 (b) determining from a processing apparatus, say, secinformation from the user thereof; ond processing apparatus, second information (b) determining by said protection software, from said related to the hardware or/and software thereof; processing apparatus second information related to the (c) determining if said second information is consistent hardware or/and software thereof for future reference in with said first information; step (c) below, in response to said first information 35 (d) using a positive result of said determination of obtained being consistent with third information conconsistence as a pre-condition for permitting use of tained in said protection software, thereafter said software desired to be protected on said second (c) authenticating a processing apparatus, say, second processing apparatus, with said "installation" preprocessing apparatus, basing on at least a part of said second information; condition not being met; 40 (d) using a positive result of said authentication as a thereafter, said sub-method being capable of being used pre-condition for permitting use of said software on a processing apparatus, say, third processing desired to be protected on said second processing apparatus, without causing any user responsible apparatus; operation(s) being performed therefor and with no step wherein said third information being confidential inforrelating to a new user payment therefor. mation of a rightful user of said software desire to be 45 21. A method for verifying identity of a user of a data protected and being necessary for enabling elecprocessing apparatus, comprising the steps of: tronic commerce transaction(s) for which said rightreceiving, by said data processing apparatus, information ful user has to be responsible; and said method is specific to a user and necessary for accessing an being performed without causing a said transaction account of said user; 50 take place. verifying said account being valid, by an electronic trans17. A method for protecting software from unauthorised action system by use of said information received by use, as claimed by claim 12, wherein said software desired said data processing apparatus; to be protected being purchased commercial software. 18. A method for protecting software from unauthorised using by said data processing apparatus, a positive result use, by restricting the use thereof to be under control of a 55 of said verification as a precondition for providing user single person, comprising a sub-method; said sub-method access to at least a part of the functionality of said data comprising the steps of: processing apparatus; (a) establishing a communication between a processing wherein said method is being performed without chargapparatus, say, first processing apparatus and a remote ing said account and said at least a part of function60 electronic transaction system; ality being not related to said validity status of said (b) verifying said person having a valid account, by said account. remote electronic transaction system, basing on authen22. A software product comprising a computer readable ticated information related to said person, said informedium having computer code for causing one or more mation being communicated to said remote electronic processing apparatus to perform the method of claim 1, 12, transaction system from said processing apparatus; 65 14, 16, 18, 20 or 21. (c) using a positive result of said verification as a precondition for * * * * * UNITED STATES PATENT AND TRADEMARK OFFICE CERTIFICATE OF CORRECTION PATENT NO. : 6,665,797 B1 DATED : December 16, 2003 INVENTOR(S) : Ho Keung, Tse Page 1 of 1 It is certified that error appears in the above-identified patent and that said Letters Patent is hereby corrected as shown below: Title page, Item [75], Inventor, "Keung" should be -- Tse -- Signed and Sealed this Twenty-seventh Day of April, 2004 JONW.DUDAS Acting Director of the United States Patent and Trademark Office UNITED STATES PATENT AND TRADEMARK OFFICE CERTIFICATE OF CORRECTION PATENT NO. : 6,665,797 B1 DATED : December 16, 2003 INVENTOR(S) : Ho Keung, Tse Page 1 of 1 It is certified that error appears in the above-identified patent and that said Letters Patent is hereby corrected as shown below: Title page, Item [54], Title, "PROTECTION OF SOFTWARE AGAIN AGAINST UNAUTHORIZED USE" should be -- COMPUTER APPARATUS/SOFTWARE ACCESS RIGHT MANAGEMENT --; Column 1, Line 8, insert -- /data processing apparatus -- after "protection of software"; Line 9, delete "software" and insert -- them --; Line 10, insert -- /illegitimate -- after "unautho-rised"; Line 10, "or copying" should be deleted; Line 14, after "Conventionally" delete "software protection"; Line 31, after "present invention" delete "is"; Line 34, after "someone else" insert new paragraph -- It is therefore a further object of the present invention to provide a method to verify the identity of a user of data processing apparatus. --; Column 2, Line 33, replace "The" with -- One object of the --; Line 33, "directed" should be deleted; Line 33, "protecting" should be -- protect --; Line 38, insert -- the first embodiment of -- before "the present invention"; Column 4, Lines 56-57, "unen-crypted" should be -- encrypted --. Signed and Sealed this Third Day of January, 2006 JONW.DUDAS Director of the United States Patent and Trademark Office

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?