摘要:
Creating directed circuits including encoding of policy and state information associated with directed circuits that may be established between two network entities on separate protected networks. The policies are maintained and implemented according to security methods that initially belong to network apparatus on either of the two protected networks; however the security methods may be relinquished to trusted third parties.
摘要:
A method and apparatus for controlling the unauthorized removal of software from a non-volatile storage medium include storing an encoded version of the software at an address of the storage medium where the address is used as data directly in the process of deriving an encoding key used to encode the software, and decoding the encoded software using a decoding key derived using the location of the software in its storage medium as data.
摘要:
A method and apparatus for controlling the distribution of computer software products stored at a file server provide for requesting the identity of the user and the user's secret key prior to enabling access to a requested program product. The program product, upon proper verification of the user identify, is encoded using a second key which is known to the user, and preferably an identification of the user is embedded in the encoding program. Various methods are employed for tracking user access to particular programs, including storing the identify of the user either camouflaged in a commonly found program in non-volatile memory or hidden in a typically overlooked portion of non-volatile memory. In addition, the encoded program can have embedded therein one, and preferably two identifications of the user which can be used to track the program as well as to ensure that the program, when executed has not been tampered with. Upon execution of the encoded program by the user's system, the code is executed "on the fly" and no executable copy of the code is stored in non-volatile memory at any time. In the event that decoding does not result in a properly executable program, the system may need to be rebooted and/or the program may be at least partially destroyed.