throbber
5,864,620
`[11] Patent Number:
`[19]
`United States Patent
`
`Pettitt
`[45] Date of Patent:
`Jan. 26, 1999
`
`U8005864620A
`
`[54] METHOD AND SYSTEM FOR
`CONTROLLING DISTRIBUTION OF
`SOFTWARE IN A MULTITIERED
`DISTRIBUTION CHAIN
`
`[75]
`
`Inventor:
`
`John Philip Pettitt, Los Altos, Calif.
`
`[73] Assignee: Cybersource Corporation, San Jose,
`Cahfi
`
`[21] Appl. No.: 638,949
`
`[22]
`
`Filed:
`
`Apr. 24, 1996
`
`6
`
`Int. Cl.
`[51]
`........................................................ H04L 9/00
`[52] US. Cl.
`...................................... 380/4; 705/1; 380/25
`[58] Field of Search ......................... 380/3, 4, 25; 705/1;
`395/712
`
`.
`
`.
`
`.
`
`.
`
`9/1993 Loeb et a1.
`5,245,656
`11/1993 Wyman .
`5,260,999
`11/1993 Perlman et al.
`5,261,002
`11/1993 Stambler .
`5,267,314
`2/1994 Holmes .
`5,287,407
`8/1994 Chou et al. .
`5,337,357
`8/1994 Fischer .
`5,337,360
`8/1994 Goldfine et al.
`5,343,529
`5,375,240 12/1994 Grundy .
`5,390,297
`2/1995 Barber et al.
`5,420,927
`5/1995 Micali.
`5,434,918
`7/1995 Kung et al. .
`5,438,508
`8/1995 Wyman .
`5,442,342
`8/1995 Kung .
`5,455,953
`10/1995 Russell .
`5,457,746
`10/1995 Dolphin.
`.
`.
`:3”er @‘aml’ierjeorlgg DEMOS“?
`sststant xammer
`. au
`.
`rozow1cz .
`Attorney, Agent, or Fer—Sawyer & Assoc1ates
`
`[56]
`
`References Cited
`
`[57]
`
`ABSTRACT
`
`.
`
`U.S. PATENT DOCUMENTS
`7/1984 Uchenick .
`4,458,315
`7/1986 Yarbrough et a1.
`4,598,288
`4/1987 Hellman .
`4,658,093
`6/1987 Fascenda .
`4,677,434
`7/1987 Mollier .
`4,683,553
`4,888,798 12/1989 Earnest.
`4,924,378
`5/1990 Hershey et a1.
`479377863
`6/1990 RObert 6t al~ -
`.
`4,941,175
`7/1990 Enescu et al.
`4,999,806
`3/1991 Chernow et al.
`5,018,196
`5/1991 Takaragi et al.
`5,023,907
`6/1991 Johnson et a1.
`5,103,476
`4/1992 Waite et a1.
`.
`5,138,712
`8/1992 Corbin .
`5,204,897
`4/1993 Wyman .
`5,214,700
`5/1993 Pinkas et al.
`5,222,134
`6/1993 Waite et 81..
`5,235,642
`8/1993 Wobber et al.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`.
`
`Asystem and method and system for controlling distribution
`of software to an user in a multitiered distribution chain. The
`system includes at
`least one entity that distributes the
`software in a locked software container, and includes means
`for receiving a request from the user to use the software. The
`method and system further includes a license clearing house
`for controlling usage rights of the software. The license
`clearing house includes means for receiving the request from
`the at least one entity, means for validating the request,
`means for generating a unique authentication certificate if
`the request was validated, and means for sending a reply to
`the user. The reply includes the authentication certificate and
`a master key, where the master key unlocks the software
`container and enables the user to use the software, and the
`authentication certificate identifies the user as an authorized
`user of the software.
`
`9 Claims, 3 Drawing Sheets
`
`12
`
`
`
`Registration
`.
`.
`.
`Notificatlon
`
`License
`
`Clearin
`
`g
`
`
`
`
`
`
`20
`
`14
`
`34
`
`16
`
`17
`
`18
`
`Petitioner Apple - EX. 1006
`
`Petitioner Apple - Ex. 1006
`
`

`

`US. Patent
`
`Jan. 26, 1999
`
`Sheet 1 0f3
`
`5,864,620
`
`S/W
`
`FIG. 1A
`
`(PRIOR ART)
`
`12'
`
`16'
`
`Distributor 18'
`
`FIG. 1B
`
`(PRIOR ART)
`
`Petitioner Apple - EX. 1006
`
`Petitioner Apple - Ex. 1006
`
`

`

`US. Patent
`
`Jan. 26, 1999
`
`Sheet 2 0f3
`
`5,864,620
`
`12
`
`
`
`Author
`
` Registration
`
`License
`Clearing
`
`House
`
`.
`.
`_
`Notiflcatlon
`
`
`
` Distributor
`
`Reseller
`
`20
`
`FIG. 2
`
`14
`
`34
`
`1 6
`
`17
`
`18
`
`
`
`52
`
`Distribute S/W
`
`Pack and Lock S/W
`
`
`
`50
`
`
`
`
`
`
`Register Key
`with LCH
`
`54
`
`FIG. 3
`
`Petitioner Apple - EX. 1006
`
`Petitioner Apple - Ex. 1006
`
`

`

`US. Patent
`
`Jan. 26, 1999
`
`Sheet 3 0f3
`
`5,864,620
`
`60
`
`62
`
`User Obtains Software
`
`
`
`
`
`Submit Authorization Request
`
`
`
`
`64
`
`Authorize
`Transaction
`
`I)
`
`
`Inform User
`
`Pass Auth. Req.
`to Next Entity
`
`68
`
`Record Transaction at LCH
`
`Request is Denied
`
`
`
`to User
`
`the Transaction
`
`70
`
`72
`
`Perform Validation
`
`Create Reply Envelope
`
`74
`
`Transmit Reply Envelope
`
`LCH
`
`Sign. Verified
`?
`
`Pass Contents
`
`of Reply Env.
`
`76
`
`
`
`Notify User of
`
`
`
`Unlock S/W
`Container with
`
`Master Key
`
`82
`
`84
`
`FIG. 4
`
`Petitioner Apple - EX. 1006
`
`Petitioner Apple - Ex. 1006
`
`

`

`5,864,620
`
`1
`METHOD AND SYSTEM FOR
`CONTROLLING DISTRIBUTION OF
`SOFTWARE IN A MULTITIERED
`DISTRIBUTION CHAIN
`
`FIELD OF THE INVENTION
`
`The present invention is a method and system for con-
`trolling distribution of software in a multitiered distribution
`chain, and more particularly to a method and system for
`distinguishing authorized users from unauthorized users.
`BACKGROUND OF THE INVENTION
`
`Software today is developed by authors who represent
`both large software companies and independent program-
`mers. Both types of authors, however, are faced with prob-
`lems associated with marketing their software, and with
`limiting the use of the software to only authorized users.
`In a direct-marketing system, an author markets software
`directly to the user via a computer network, such as the
`internet for example. Typically, a large software company
`distributcs dcmonstration copies of commercial software
`products and invites the user to test the software. If the user
`is satisfied, the user sends a payment to the company in
`return for the commercial version of the software. Indepen-
`dent programmers,
`in contrast, often distribute what
`is
`known as shareware, in which the user is allowed to test
`software that is typically a smaller, but fully functioning
`version of a commercial program. If the user is satisfied, the
`user is requested to pay the programmer a fraction of the cost
`of the commercial product in return for technical support
`and documentation.
`
`Providing the user with demonstration software or pro-
`viding the software without documentation prior to payment
`is an attempt by the author to restrict users who have not paid
`from using the software. To prevent unauthorized copying,
`the author could send the software to the users in encrypted
`form and require the user to send for a key in order to unlock
`the software. However, after the user has received the key
`and unlocked the software,
`the user may distribute the
`software to others, and the author has no way of knowing
`which users have been formally authorized.
`Another problem is that no matter whether the author is a
`large company or an independent programmer, direct-
`marketing becomes too burdensome for the author as the
`number of user’s continue to grow. Instead,
`it
`is more
`advantageous for the author to take advantage of traditional
`multitier distribution chains.
`
`Multitier distribution chains typically include a distributor
`or reseller who sells copies of the software for the author.
`Examples of a distributor include mail-order houses and
`computer bulletin boards,
`for instance. Most often,
`the
`distributor provides the software to the user in a box that
`identifies the distributor. The buyer then sends payment to
`the author along with the identity of the distributor; and the
`author,
`in turn, pays a commission to the distributor.
`Optionally, the buyer pays the distributor, who then pays the
`author a royalty.
`The problem with conventional multitier distribution
`chains is that the distributor must trust the author to pay the
`commissions, or the author must trust the distributor to pay
`the royalties. In either case, neither party has a mechanism
`to ensure payment. In addition, the distributor or the user
`may provide copies of the software to others. Even if the
`user is required to obtain a key, once the software is
`unlocked and distributed to other users, the author has no
`mechanism to distinguish authorized users from unautho-
`rized users.
`
`2
`Accordingly, what is needed is an improved system and
`method for controlling distribution of software in a multit-
`iered distribution chain that enables the author to distinguish
`between authorized and unauthorized users. The present
`invention addresses such a need.
`
`SUMMARY OF THE INVENTION
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`The present invention provides a method and system for
`controlling distribution of software to an user in a multit-
`iered distribution chain. The system includes at least one
`entity that distributes the software in a locked software
`container. The distribution includes means for receiving a
`request from the user to use the software. The method and
`system further includes a license clearing house for control-
`ling usage rights of the software. The license clearing house
`includes means for receiving the request from the at least
`one entity, means for validating the request, means for
`generating a unique authentication certificate if the request
`was validated, and means for sending a reply to the user. The
`reply includes the authentication certificate and a master key,
`where the master key unlocks the software container and
`enables the user to use the software, and the authentication
`certificate identifies the user as an authorized user of the
`software.
`
`According to the system and method disclosed herein, the
`only trusted entity in the distribution chain is the license
`clearing house, all other entities including the author of the
`software are incapable of generating authorization certifi-
`cates.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1A and 1B are block diagrams illustrating conven-
`tional software distribution methods.
`
`FIG. 2 is a block diagram of a multitier software distri-
`bution method and system in accordance with the present
`invention.
`
`FIG. 3 is a flow chart illustrating the interaction between
`an author and the license clearing house of the present
`invention.
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`FIG. 4 is a flow chart of the steps performed by multitier
`software distribution system in response to an authorization
`request by a user.
`
`DESCRIPTION OF THE INVENTION
`
`The present invention relates to an improvement in dis-
`tributing software in a multitier distribution network. The
`following description is presented to enable one of ordinary
`skill in the art to make and use the invention and is provided
`in the context of a patent application and its requirements.
`Various modifications to the preferred embodiment will be
`readily apparent to those skilled in the art and the generic
`principles herein may be applied to other embodiments.
`Thus, the present invention is not intended to be limited to
`the embodiment shown but is to be accorded the widest
`
`scope consistent with the principles and features described
`herein.
`
`FIG. 1A is block diagram illustrating a conventional
`direct-marketing system for distributing software in which
`an author 12' of a software program widely distributes the
`software directly to a user 18' via computer networks, for
`example. The author 12' may be a large software company
`who is distributing demonstration programs for the user 18'
`to try, or the author may be an independent programmer who
`is distributing shareware. As shown,
`if the user 18'
`is
`satisfied with the product, the user 18' sends some form of
`
`Petitioner Apple - Ex. 1006
`
`Petitioner Apple - Ex. 1006
`
`

`

`5,864,620
`
`3
`payment directly to the author 12'. Besides problems with
`controlling unauthorized use of the program after the sale,
`the direct-marketing system is incapable of supporting a
`traditional multitier distribution chain.
`
`FIG. 1B is block diagram illustrating a conventional
`multitier software distribution chain in which an author 12'
`
`provides software to one or more distributors 16', who then
`sell the software to the user 18'. In this system, the user 18'
`pays the author 12', who in turn, pays a commission to the
`distributor 16', or the user 18' pays the distributor 16' for the
`software, and the distributor 16' then pays the author 12' a
`royalty.
`In either case, neither the distributor 16' or the author 12'
`can ensure payment from the other party. Each party is
`forced to trust the other. In addition, the distributor 16‘ or the
`user 18' may provide unauthorized copies of the software to
`others. Even if the user 18' is required to obtain a key, once
`the software is unlocked, the author 12' has no mechanism
`to distinguish authorized users from unauthorized users.
`The present invention is a method and system for distrib-
`uting software in a multitiered distribution chain that enables
`an author to distinguish authorized users from unauthorized
`users. To more particularly illustrate the method and system
`in accordance with the present invention, refer now to FIG.
`2 depicting a block diagram of one embodiment of such a
`system.
`FIG. 2 is block diagram of the multitiered software
`distribution system 10 of the present invention. The system
`10 includes an author 12 who has developed software 13,
`and one or more distributors 16, one or more optional
`resellers 17, and an end user 18. In accordance with the
`present invention, the multitiered software distribution sys-
`tem 10 also includes a license clearing house (LCH) 14,
`which ensures the integrity and controls the usage rights of
`the software 13.
`
`Referring to FIG. 3, a flow chart of the interaction
`between the author 12 and the LCH 14 is shown. After the
`
`author 12 has developed software 13 that s/he wants to
`market, the author 12 packs the software 13 in a digital
`shipping container 20 shown in FIG. 2, and locks the
`container 20 through encryption in step 50. For purposes of
`this specification,
`the term digital shipping container 20
`means an encrypted data object in which the software 13 is
`stored that can be opened only by a validated key. As will be
`appreciated by those with ordinary skill in the art, many
`types of encryption schemes may be used, such as DES, for
`example.
`After the software 13 has been encrypted, the author 12
`distributes the software 13 for public availability in step 52.
`In a preferred embodiment, copies of the encrypted software
`13 are provided to the distributor 16, who then provides
`them to the reseller 17 for public sale. Copies of the
`encrypted software 13 may also be provided directly to the
`user via computer networks, such as the Internet, or via cable
`TV.
`
`After the software 13 has been made publicly available,
`the author 12 registers the identity of each container 20 with
`the LCH 14 in step 54 by identifying the key or keys used
`to encrypt the containers 20. The author 12 also registers the
`identities of those distributor(s) 16 and reseller(s) 17 that the
`author 12 has chosen to distribute the software 13. The
`author 12 may either encrypt each copy of the distributed
`software 13 with a single master key and deposit the master
`key with the LCH 14, or the master key may be encrypted
`with a second key, and the second key deposited with the
`LCH 14.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`In a preferred embodiment, the public encryption keys of
`the distributor 16 and reseller 17 are also registered with the
`LCH 14. To ensure authentication, the LCH 14 may obtain
`public key certificates for the distributor 16 and reseller 17
`from an external authority (not shown).
`FIG. 4 is a flow chart depicting the steps performed by
`multitier software distribution system 10 in response to an
`authorization request by the user 18. Referring to both FIGS.
`2 and 4, the process begins once the user 18 obtains a copy
`of the digital software container 20 in step 60. In order to
`purchase or license the software 13 and to unlock the
`container 20, the user 18 must first submit an authorization
`request 30 to the reseller 17 in step 62. In a preferred
`embodiment, the request includes:
`1. information identifying the software,
`2. information identifying the user,
`3. some form of payment (e.g. a credit card number), and
`4. a digital signature of the user.
`Upon receiving the request 30, the reseller 17 performs a
`payment validation and optionally authorizes the transaction
`in step 64. If the reseller 17 denies the transaction, then the
`user 18 is notified in step 66. If the transaction is accepted,
`then the reseller 17 passes the user’s authorization request
`30 to the distributor 16 in step 66.
`The reseller 17 ensures the integrity of the information by
`placing the user’s authorization request 30 inside a digital
`envelope through encryption, and by digitally signing the
`envelope with the reseller’s signature. The reseller 17 also
`assigns a transaction identification number to the envelope
`before transmitting the envelope to the distributor 18.
`Since the multitier distribution system 10 may include
`many levels, steps 64 and 67 are repeated by each entity in
`the distribution chain until the envelope is transmitted to the
`LCH. For example, step 64 is repeated when the distributor
`16 receives the envelope from the reseller 17 and performs
`a payment validation, this time for the reseller, and option-
`ally authorizes the transaction. Step 67 is repeated when the
`distributor 16 places the reseller’s envelope into a distributor
`envelope, and digitally signs the envelope with the distribu-
`tor’s signature before transmitting the distributor envelope
`to the LCH.
`
`Assuming the multitier distribution system 10 contained
`only the two levels shown in FIG. 2, then the envelope
`reaching the LCH 14 would include:
`1. the transaction identification number,
`. information identifying the software,
`. information identifying the user,
`. the digital signature of the reseller, and
`. the digital signature of the distributor.
`After receiving the envelope, the LCH 14 records the
`transaction in step 68, and performs a validation in step 70.
`The result of the validation is a result code that indicates
`whether or not the LCH 14 authorizes the transaction. The
`
`Ul-PWN
`
`LCH 14 validates the transaction by comparing the digital
`signatures of the distributor 16 and reseller 17 with their
`registered public keys. If the digital signatures do not match
`the registered public keys, then the result code indicates that
`LCH 14 denies the transaction. If the digital signatures do
`match the registered public keys,
`then the result code
`indicates that LCH 14 authorizes the transaction.
`
`After generating the result code, the LCH 14 creates a
`reply envelope 34 through encryption in step 72. The reply
`envelope 34 includes:
`1. information identifying the software,
`2. information identifying the user,
`
`Petitioner Apple - Ex. 1006
`
`Petitioner Apple - Ex. 1006
`
`

`

`5,864,620
`
`5
`3. the digital signature of the reseller,
`4. the digital signature of the distributor,
`5. a master key that unlocks the software container 20 (if
`the transaction has been authorized), and
`6. a digital authorization certificate.
`The digital authorization certificate is generated by hash-
`ing the above-identified information and encrypting it with
`the LCH’s a private key.
`Since the distributor 16 and reseller 17 need to know
`whether the transaction was authorized, the LCH 14 trans-
`mits the reply envelope 34 to the user 18 back through the
`distribution chain in step 74, rather than transmitting the
`reply envelope 34 directly to the user 18.
`In a preferred embodiment of the present invention, the
`envelope 34 is created by encrypting the contents of the
`reply envelope 34 with the reseller’s public key. Because
`only the reseller 17 can decrypt the envelope, the identity of
`the user 18 is protected from entities in the chain other than
`the reseller. This also prevents these entities from decrypting
`the envelope 34 and gaining access to the master key.
`The LCH 14 also digitally signs the envelope with the
`signature of LCH 14 by hashing the contents of the reply
`envelope and encrypting the result of the hash with the
`LCH’s private key. In order to enable the entities in the chain
`other than the reseller 17 to record the transaction before
`
`passing the envelope to the next entity, the transaction ID.
`and the result code are also placed on the outside of the reply
`envelope 34 in unencrypted form.
`After the LCH 14 transmits the reply envelope 34, the
`LCH 14 notifies the author 12 of the transaction in step 76
`if the transaction was authorized by the LCH 14. In a
`preferred embodiment, the LCH 14 also pays the author 12
`his or her royalty for the transaction by debiting a distributor
`16 account and transferring the amount to an author 12
`account. This way, the author 12 is ensured payment for each
`copy of the software 13 sold.
`As the reply envelope 34 is passed down from one entity
`to the next in the chain, each entity verifies the LCH 14
`signature on the return envelope 34 in step 78 to check for
`authenticity. This is accomplished by hashing the contents of
`the reply envelope 34, decrypting the LCH 14 signature with
`the LCH’s public key and comparing the result of hash with
`the decrypted LCH 14 signature. If there is a match, then the
`LCH 14 signature is authenticated.
`Once the reply envelope 34 is received by the reseller, the
`reseller 17 verifies the LCH 14 signature, as described
`above, in step 78 and examines the result code. If the LCH
`14 signature is not authenticated or the result code indicates
`that the LCH 14 did not authorize the transaction, then the
`reseller 17 informs the user 18 that the request was denied
`in step 66. If the LCH 14 signature is authenticated and the
`result code indicates that
`the LCH 14 has authorized
`
`transaction, then the reseller 17 decrypts the reply envelope
`34 using the reseller’s public key, and passes the contents
`onto the user 18 in step 82.
`The user 18 then uses the authorization certificate and the
`
`master key to unlock the software container 20 and install
`the software in step 84. Since the authorization certificate
`passed down from the LCH 14 will be different for each user
`18 because the certificate was derived from the user’s
`
`information, the possession of the authorization certificate is
`the user’s proof of purchase, and proof that s/he is an
`authorized user.
`
`intended to stop illegal
`invention is not
`The present
`copying of the software once it is unlocked. The present
`invention does, however, provide the author 12 with a
`mechanism to distinguish authorized users from unautho-
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`rized users. To determine whether a particular user 18 is
`authorized, the author 12 may request the original authori-
`zation certificate from the user 18. If the user 18 cannot
`
`provide it, then the user 18 has no proof that s/he is an
`authorized user.
`
`If the user 18 provides the author 12 with an original
`authorization certificate, then the author 12 takes the identity
`of the user 18 and derives a new authorization certificate.
`
`This new authorization certificate is then compared to the
`original authorization certificate. If the new authorization
`certificate does not match the original authorization
`certificate, then the author 12 may conclude that the person
`is an unauthorized user.
`
`According to the multitier distribution system 10 of the
`present invention, the only trusted entity in the distribution
`chain is the LCH 14, all other entities including the author
`12 are incapable of generating authorization certificates.
`Further,
`the use of the LCH 14 signature on the reply
`envelope 34 ensures that the envelope contents including the
`master key and authentication certificate, has not been
`tampered (integrity) with.
`Although the present invention has been described in
`accordance with the embodiments shown, one of ordinary
`skill in the art will readily recognize that there could be
`variations to the embodiments and those variations would be
`
`invention.
`within the spirit and scope of the present
`Accordingly, many modifications may be made by one of
`ordinary skill in the art without departing from the spirit and
`scope of the appended claims.
`What is claimed is:
`
`1. A system for controlling distribution of software to a
`user in a multitiered distribution chain, the system compris-
`ing:
`at least one entity that distributes the software in a locked
`software container,
`the at least one entity including
`means for receiving a request from the user to use the
`software; and
`a license clearing house coupled to the entity for control-
`ling usage rights of the software, the license clearing
`house including,
`means for receiving the request from the at least one
`entity,
`means for validating the request,
`means for generating a unique authentication certificate
`if the request was validated, and
`means for sending a reply to the user, the reply includ-
`ing the authentication certificate and a master key,
`the master key for unlocking the software container
`and enabling the user to use the software, and the
`authentication certificate for identifying the user as
`an authorized user of the software.
`
`2. A system as in claim 1 wherein the license clearing
`house further includes means for signing the reply with a
`digital signature of the license clearing house.
`3. A system as in claim 2 wherein the at least one entity
`further includes:
`
`means for authorizing user transactions;
`means responsive to the authorizing means for signing the
`authorization request with a digital signature of the
`entity;
`means for receiving the reply from the license clearing
`house;
`means for verifying the digital signature of the license
`clearing house;
`means for passing the master key and the authentication
`certificate from the reply to the user.
`
`Petitioner Apple - Ex. 1006
`
`Petitioner Apple - Ex. 1006
`
`

`

`5,864,620
`
`7
`4. A system as in claim 3 further including:
`an author for developing and placing the software in the
`software container using the master key,
`the author
`registering the master key and the identity of the at least
`one entity with the license clearing house.
`5. A system as in claim 4 wherein the license clearing
`house further includes means for placing a transaction
`number and result code on the reply, and wherein the at least
`one entity further includes means for recording the transac-
`tion using the transaction number and result code.
`6. A method for controlling distribution of software in a
`multitiered distribution chain, the multitiered distribution
`chain including at
`least one entity who distributes the
`software, the method comprising the steps of:
`(a) distributing encrypted software;
`(b) registering the encrypted software and the identity of
`the at least one entity with a license clearing house;
`(c) providing a user with the encrypted software;
`(d) receiving an authorization request by the at least one
`entity from the user;
`(e) signing the authorization request with a signature of
`the entity.
`(f) passing the authorization request to the license clearing
`house;
`
`(g) validating the signature of the at least one entity and
`the authorization request by the license clearing house;
`
`8
`
`(h) signing a master key with a signature of the license
`clearing house;
`
`(i) transmitting the signature of the license clearing house
`and the master key to the at least one entity;
`
`(j) validating the signature of the license clearing house
`and passing the master key from the at least one entity
`to the user; and
`
`10
`
`15
`
`20
`
`25
`
`(k) using the master key to decrypt the software.
`7. Amethod as in claim 6 wherein step (g) further includes
`the step of:
`(g2) generating an authentication certificate from infor-
`mation regarding the user if the authorization request
`was validated by the license clearing house.
`8. Amethod as in claim 7 wherein step (i) further includes
`the step of:
`(i1) transmitting the authentication certificate to the at
`least one entity along with the master key.
`9. Amethod as in claim 8 wherein step (j) further includes
`the step of:
`(jl) passing the authentication certificate to the user along
`with the master key, whereby the authentication cer-
`tificate identifies the user as an authorized user of the
`software.
`
`Petitioner Apple - EX. 1006
`
`Petitioner Apple - Ex. 1006
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket