Patent
Hybrid encryption method and system for protecting reusable software components
Reads0
Chats0
TLDR
In this article, a system and method for providing a reuser of a software reuse library with an indication of whether a software component from the reuse library is authentic and whether or not the software component has been modified.Abstract:
Disclosed is a system and method for providing a reuser of a software reuse library with an indication of whether or not a software component from the reuse library is authentic and whether or not the software component has been modified. The system and method disclosed provides a reuser with assurance that the software component retrieved was placed in the reuse library by the original publisher and has not modified by a third party. The system and method disclosed uses a hybrid cryptographic technique that combines a conventional or private key algorithm with a public key algorithm.read more
Citations
More filters
Patent
Systems and Methods for Secure Transaction Management and Electronic Rights Protection
TL;DR: In this article, the authors proposed a secure content distribution method for a configurable general-purpose electronic commercial transaction/distribution control system, which includes a process for encapsulating digital information in one or more digital containers, a process of encrypting at least a portion of digital information, a protocol for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container, and a process that delivering one or multiple digital containers to a digital information user.
Patent
Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
TL;DR: In this article, a matching and classification utility system comprising a kind of Commerce Utility System is used to perform the matching, narrowcasting, classifying and/or selecting process, non-limiting examples of which include software objects.
Patent
System and method for managing copyrighted electronic media
TL;DR: In this article, the authors present a system for the management of copyright-preserving electronic media in a secure electronic format and registered on associated registration server, which serves to provide on-line licensing and copyright management for that media.
Patent
Trusted and secure techniques, systems and methods for item delivery and execution
TL;DR: A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction as mentioned in this paper, while providing an extremely high degree of confidence and trustedness.
Patent
Multifactorial optimization system and method
TL;DR: In this paper, the authors propose a method for providing unequal allocation of rights among agents while operating according to fair principles, comprising assigning a hierarchal rank to each agent, providing a synthetic economic value to a first set of agents at the a high level of the hierarchy, allocating portions of the synthetic economy value by the first sets of agents to a second subset of agents, at respectively different hierarchal ranks than the first set, and conducting an auction amongst agents using the synthetic economic values as the currency.
References
More filters
Patent
Database usage metering and protection system and method
TL;DR: In this article, a "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program resident in the hardware device.
Patent
Public key/signature cryptosystem with enhanced digital signature certification
TL;DR: In this paper, a public key cryptographic system is disclosed with enhanced digital signature certification which authenticates the identity of the public key holder, and a hierarchy of nested certifications and signatures are employed which indicate the authority and responsibility levels of the individual whose signature is being certified.
Patent
Software distribution system
TL;DR: In this paper, the authors propose a software authorization system where a software can be authorized for use a given number of times by a base unit after which the base unit (computer, videogame base unit, record player, videorecorder or videodisk player) cannot use that software until the manufacturer sends an authorization for additional uses to the user's base unit.
Patent
Apparatus and method for licensing software on a network of computers
TL;DR: In this article, the authors proposed an approach to the verification and license check out functions which are normally performed by a license server of a network software license system, where the encrypted license information is contained in a license token, and is sorted in the database controlled by the license server.
Patent
Digital signature algorithm
TL;DR: In this paper, a method for generating and verifying a digital signature of a message m is presented, which requires a pair of corresponding public and secret keys (y and x) for each signer, as well as the pair of private values (r and k) generated for each message by the signer.