Method and apparatus for distributing information products
DC CAFCFirst Claim
Patent Images
1. A method comprising:
- receiving an encrypted launch code;
decrypting said encrypted launch code with a string, R, as the key to recover a first candidate authentication code and an indicium of a first information product; and
installing said first information product onto said computer when said candidate authorization code matches a first known authorization code.
1 Assignment
Litigations
1 Petition
Accused Products
Abstract
A method and apparatus for distributing information products is described that comprises: receiving an encrypted launch code; decrypting the encrypted launch code with a string, R, as the key to recover a first candidate authentication code and an indicium of a first information product; and installing the first information product onto the computer when the candidate authorization code matches a first known authorization code.
53 Citations
19 Claims
-
1. A method comprising:
-
receiving an encrypted launch code;
decrypting said encrypted launch code with a string, R, as the key to recover a first candidate authentication code and an indicium of a first information product; and
installing said first information product onto said computer when said candidate authorization code matches a first known authorization code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
decrypting said encrypted launch code with said string, R, as the key to recover an indicium of a second information product; and
installing said second information product onto said computer when said first candidate authorization code matches said first known authorization code.
-
-
3. The method of claim 1 further comprising:
-
decrypting said encrypted launch code with said string, R, as the key to recover an indicium of when the authorization for said first information product expires; and
installing said first information product onto said computer when said first candidate authorization code matches said first known authorization code and said indicium of when the authorization for said first information product expires has not expired.
-
-
4. The method of claim 1 further comprising:
-
creating a token comprising a second known authentication code and said indicium of said first information product;
encrypting said token with a string, T, to create an encrypted token; and
storing said encrypted token on said computer.
-
-
5. The method of claim 4 wherein said token further comprises an indicium of a second information product.
-
6. The method of claim 4 wherein said token further comprises an indicium of when the authorization for said first information product expires.
-
7. The method of claim 4 wherein said token further comprises an indicium of the end-user to whom said encrypted launch code is provided.
-
8. The method of claim 4 wherein said first known authentication code and said second known authentication code are the same and said string R and said string T are the same.
-
9. The method of claim 4 further comprising:
-
reading said encrypted token from said computer;
recovering from said encrypted token with said string, T, to recover a second candidate authentication code and said indicium of a first information product; and
installing said first information product onto said computer when said second candidate authorization code matches said second known authorization code.
-
-
10. The method of claim 9 further comprising:
-
recovering from said encrypted token an indicium of when the authorization for said first information product expires; and
installing said first information product onto said computer when said second candidate authorization code matches said second known authorization code and said indicium of when the authorization for said first information product expires has not expired.
-
-
11. The method of claim 5 further comprising:
-
recovering from said token an indicium of a second information product and an indicium of when the authorization for said second information product expires; and
installing said second information product onto said computer when said second candidate authorization code matches said second known authorization code and said indicium of when the authorization for said second information product expires has not expired.
-
-
12. The method of claim 11 wherein said indicium of when the authorization for said first information product expires and said indicium of when the authorization for said second information product expires are the same.
-
13. The method of claim 1 further comprising installing at least one nominal file for a second information product onto said computer.
-
14. A method comprising:
-
reading an encrypted token from a computer;
decrypting said encrypted token with a string, T, as the key to recover an indicium of a first information product;
installing said first information product onto said computer; and
installing at least one nominal file for a second information product onto said computer. - View Dependent Claims (15, 16)
recovering from said encrypted token with said string, T, as the key to recover an indicium of a second information product; and
installing said second information product onto said computer.
-
-
16. The method of claim 14 further comprising:
-
recovering from said encrypted token with said string, T, as the key to recover an indicium of when the authorization for said first information product expires; and
installing said first information product onto said computer when said indicium of when the authorization for said first information product expires has not expired.
-
-
17. A method comprising:
-
reading an encrypted token from a computer;
decrypting said encrypted token with a string, T, as the key to recover a token that comprises an indicium of a first information product;
modifying said token to comprise an indicium of a second information product;
encrypting said token with said string, T, as the key to create a newly encrypted token; and
storing said newly encrypted token on said computer. - View Dependent Claims (18, 19)
-
Specification