Abstract:
Described is a method and system for controlling usage of software on a computing device. An authorization key is generated as a function of a devic e string, a unique string stored in the device, and a software string, a uniqu e string stored in software authorized for use on the device. The authorizatio n key is encrypted using a private key and stored in the device. Upon a reques t to use software on the device, the authorization key is decrypted using a public key corresponding to the private key. A test key is generated as a function of the device string and a request software string, a unique string stored in the software for which use has been requested. The authorization k ey is compared to the test key. When the test key matches the authorization key , usage of the requested software is permitted.
Abstract:
Described is a method and system for controlling usage of software on a computng device An authorization key (16a) is generated as a function of a device string (6a), a unique string (6a) stored in the device, and a software string (10), a unique string (10) stored in software (4) authorized for use on the device The authorization key (16a) is encrypted using a private key and stored in the device Upon a request to use software (4) on the device, the authorization key (16a) is decrypted using a public key corresponding to the private key A test key is generated as a function of the device string and a request software string, a unique string stored in the software for which use has been requested The authorizatin key is compared to the test key When the test key matches the authorization key, usage of the requested software is permitted