scispace - formally typeset
Patent

Hybrid encryption method and system for protecting reusable software components

Reads0
Chats0
TLDR
In this article, a system and method for providing a reuser of a software reuse library with an indication of whether a software component from the reuse library is authentic and whether or not the software component has been modified.
Abstract
Disclosed is a system and method for providing a reuser of a software reuse library with an indication of whether or not a software component from the reuse library is authentic and whether or not the software component has been modified. The system and method disclosed provides a reuser with assurance that the software component retrieved was placed in the reuse library by the original publisher and has not modified by a third party. The system and method disclosed uses a hybrid cryptographic technique that combines a conventional or private key algorithm with a public key algorithm.

read more

Citations
More filters
Patent

Systems and Methods for Secure Transaction Management and Electronic Rights Protection

TL;DR: In this article, the authors proposed a secure content distribution method for a configurable general-purpose electronic commercial transaction/distribution control system, which includes a process for encapsulating digital information in one or more digital containers, a process of encrypting at least a portion of digital information, a protocol for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container, and a process that delivering one or multiple digital containers to a digital information user.
Patent

Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information

TL;DR: In this article, a matching and classification utility system comprising a kind of Commerce Utility System is used to perform the matching, narrowcasting, classifying and/or selecting process, non-limiting examples of which include software objects.
Patent

System and method for managing copyrighted electronic media

TL;DR: In this article, the authors present a system for the management of copyright-preserving electronic media in a secure electronic format and registered on associated registration server, which serves to provide on-line licensing and copyright management for that media.
Patent

Trusted and secure techniques, systems and methods for item delivery and execution

TL;DR: A trusted electronic go-between can validate, witness and/or archive transactions while, in some cases, actively participating in or directing the transaction as mentioned in this paper, while providing an extremely high degree of confidence and trustedness.
Patent

Multifactorial optimization system and method

TL;DR: In this paper, the authors propose a method for providing unequal allocation of rights among agents while operating according to fair principles, comprising assigning a hierarchal rank to each agent, providing a synthetic economic value to a first set of agents at the a high level of the hierarchy, allocating portions of the synthetic economy value by the first sets of agents to a second subset of agents, at respectively different hierarchal ranks than the first set, and conducting an auction amongst agents using the synthetic economic values as the currency.
References
More filters
Patent

Database usage metering and protection system and method

TL;DR: In this article, a "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program resident in the hardware device.
Patent

Public key/signature cryptosystem with enhanced digital signature certification

TL;DR: In this paper, a public key cryptographic system is disclosed with enhanced digital signature certification which authenticates the identity of the public key holder, and a hierarchy of nested certifications and signatures are employed which indicate the authority and responsibility levels of the individual whose signature is being certified.
Patent

Software distribution system

TL;DR: In this paper, the authors propose a software authorization system where a software can be authorized for use a given number of times by a base unit after which the base unit (computer, videogame base unit, record player, videorecorder or videodisk player) cannot use that software until the manufacturer sends an authorization for additional uses to the user's base unit.
Patent

Apparatus and method for licensing software on a network of computers

TL;DR: In this article, the authors proposed an approach to the verification and license check out functions which are normally performed by a license server of a network software license system, where the encrypted license information is contained in a license token, and is sorted in the database controlled by the license server.
Patent

Digital signature algorithm

TL;DR: In this paper, a method for generating and verifying a digital signature of a message m is presented, which requires a pair of corresponding public and secret keys (y and x) for each signer, as well as the pair of private values (r and k) generated for each message by the signer.